text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
BullyProof Life Movement:
This presentation will address bullying, self-harm, and suicide. It is important to know how to support those that have been a victim of bullying; it is even more important to know why people bully so we can STOP it.
How many children are absent today from school? What is their excuse? According to State Justice Dept. 160,000 kids per day do not attend school for fear of being bullied. What if the person bullying had self-worth, would they bully? What if the “victim” had self-worth, would they be bullied. Today bullying is getting out of hand. The only time it is talked about is when there is an incident. Bullying is happening not only at school but by cyber-bullying. Kids today can’t even get on line, because they are afraid. Could you imagine living each day in fear? Veenu knows how to reach these children. You can’t take away a symptom without dealing with the true problem. Is bullying preventable? YES!! Its about teaching children, teachers, parents about the warning signs. Its about teaching the children about self-worth. It's about teaching the children how to be their self without being afraid! Are you going to wait until there is a reason, or do you want to reach the students before? The CHOICE is yours….
Veenu knows all too well what bullying can lead to, as she too was a victim. She used to self-harm and suicide as means to an end. She now realizes the value of life and is teaching others coping skills in order to stop self-harm and suicides.
The taboo word “suicide” What is it? Do you know what the warning signs are? Do you know how to approach a child you suspect is suicidal? What are they feeling? 1 of the reasons why someone contemplates suicide is because they have no compelling future. If you do not know what you are living for, then why live?
Did you know the second leading cause of death from the ages 10-24 is Suicide? It is the third leading cause for college and youth from ages 12-18.
Every day 5.400 children attempt suicide between the 7th-12th grade. Until you walk through the shoes of someone who has been there, you truly never know. Veenu’s been there. Through her pain and depression as a youth, to her gaining strength and finding her passion to live, she will assist students with learning about choices. Suicidal is becoming an epidemic. No one wants to talk about it, until it happens at their school. Suicide is PREVENTABLE. If you know the signs, you can see the signs. It’s all about choice.
Self-harm is the unknown…the unseen… It’s what is happening at a growing number, but no one is talking about it. There are so many ways to self-harm, anorexia, picking at sores, not letting them heal, burning, and cutting… Do you know why people hurt themselves? Perhaps it is to match how they feel from the inside to the outside? Perhaps it is instant gratification. 1 out of 5 girls are cutters and 1 out of 7 boys are cutters. Do you know the signs? Parents, Educators, and Peers do you know if someone you know is hurting themselves. How would you know? Did you know that this is preventable? What if the person hurting themselves had self worth? Would they cut/harm themselves?
Veenu Keller is a dynamic, insightful and fun speaker as she shares her expertise with both parents and children.
See Me, Hear Me, Empower Me:
Do you see the signs? Is your child happy? Do they have coping skills? How do they cope? Have you ever thought does my son/daughter or student have self-worth? Everything we do is a behavior . A behavior will only continue if it is reinforced. Whether you are a parent or a teacher, whether you have a child or a teenager, what are their behaviors saying to you? If you attempted to stop the behavior, is it working? If it is not, it is because the need is being met by the behavior. If your child or student is depressed and has a plan for suicide, that plan is meeting his/her needs. Most kids that are depressed, feel alone, have no self worth, also have no compelling future. YOU can change the behavior. If you have a student or a child that is acting out constantly and nothing you do is working, its because their behavior is getting them what they want. Children/Students act out/tantrum for 2 main reasons: they want attention or they want control.
If you know the signs, if you have the knowledge to do so and if you take action, behaviors can be reshaped. You can help your child/student get their needs met in an appropriate way. Learn how to give them choices, how to talk to them, and how to really help them with making better choices.
6 Leadership Styles and Postures:
Do you know what it takes to make an extraordinary leader? Are you a leader and yet you’re not able to achieve the results you want? What if it wasn’t about your leadership qualities and more about your leadership style.
My presentation will help understand D. Goleman’s 6 leadership styles and when they are best used. (The Pacesetter, Authoritative, Affilitative, Coaching, Coercive, and Democratic) Leaders go 1st. Leading is about mentoring and showing, not dictating. Leadership is about curiosity, and vision not judgment. This presentation will also teach about posture (Superior, Neutral and Inferior) This is an interactive presentation where activities are done to assist the audience with learning and ingraining it . If your students or office need to learn more about leadership in order to increase their productivity or in order to get more done and meet outcomes, this presentation is for you.
|
<urn:uuid:57aed581-f2da-4cc6-9e90-29dc07e98c2a>
|
CC-MAIN-2023-40
|
https://veenuinspires.com/case-studies__trashed/speaking-old/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511369.62/warc/CC-MAIN-20231004120203-20231004150203-00401.warc.gz
|
en
| 0.974409 | 1,256 | 2.71875 | 3 |
History of the High Lighthouse
The High Lighthouse is an imposing landmark situated at the entrance to the old town of Harwich. The building is grade 1 listed in ancient monument and was built in 1818 to serve as one of two leading lights for the port.
The 90ft nine sided tower was built near to the site of the earlier light situated over the town gate, by Alexander under the supervision of the famous English engineer John Rennie, later responsible for London Bridge.
Both lighthouses were sold by General Rebow to Trinity House who administered them until 1863 when they became redundant due to the shifting in direction of the harbour channel. The lighthouses were purchased in 1909 by Harwich Borough Council, who partially restored the High lighthouse in 1974 as their contribution to Architectural Heritage year.
The low lighthouse was taken over by the Harwich society and opened as a maritime museum in 1980. The high lighthouse had stood empty for some time until in March 1991 the lease of the building was made available by Tendring District Council, who were anxious to see the building utilized. The lease was taken up by the National Vintage Wireless and Television Museum Trust. The Trust had been seeking a suitable premises to house its unique collection for many years and was delighted to be able to relocate to the Tendring area, due to the significant connection with the history of broadcasting. Marconi's first wireless school was at nearby Frinton on sea and prior to his first successful transmission across the Atlantic, experimental broadcasts took place from a site set up at Dovercourt, next to the Cliff Hotel.
The museum, previously housed at Dedham Essex, opened to the general public in 1995 and traces the history of broadcasting from Marconi and Baird's early experiments, to the present day developments in satellite communications. The museum is set out as an informative and educational exhibition, showing a large collection of vintage wireless and television
receivers. On show is some early equipment as used by these early pioneers, demonstrating the first wireless transmissions and mechanical scan television. The building also houses the museum's sound and vision archive.
The exhibition is set out chronologically in a series period 'Room sets' on each floor of the lighthouse, each with the decoration of the period.
Audio/Visual interpretation, utilizing a period film and taped radio broadcasts from the museum's archives, is provided in addition to the more traditional photographic and text Information in a lively and unique atmosphere. in this way the importance of Radio and Television in the social development of the 20th century is demonstrated. Examples include, the early news and light entertainment programmes of the Twenties and Thirties, through to the electronic news gathering and video technology of the present. The last Section of the museum features a comprehensive display of the developments in satellite radio and television and the future of broadcasting.
Particular emphasis is made of the education facilities at the museum; an educational programme has been planned to cater for visiting school parties and students studying in the field of broadcasting and information technology, within the National Curriculum.
The museum is overseen by a charitable trust, governed by a board of trustees and it's policies are dedicated to provide for the advancement of public education by the provision of the museum.
The relocation of the museum to Harwich has proved to be a valuable asset to the tourism of the Tendring peninsular and has enabled the living history of British Broadcasting to be presented to the general public in the form of an information and educational museum for the generations of the future.
The museum is indebted to the generosity of the owners of private collectors who have placed, on loan, to the National Vintage Wireless & Television Museum Trust many valuable exhibits and those who have donated treasured possessions.
Many Thanks Tony O' Neil Curator
|
<urn:uuid:c3f7de78-3ba5-4f0c-85b9-b7c9c6c63a41>
|
CC-MAIN-2017-34
|
http://www.nvwm.freeservers.com/history1.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105297.38/warc/CC-MAIN-20170819031734-20170819051734-00016.warc.gz
|
en
| 0.969826 | 761 | 3.078125 | 3 |
• kowtow •
kæu-tæu • Hear it!
Part of Speech: Verb, intransitive
Meaning: 1. To completely prostrate oneself before someone as a sign of complete submission. 2. To completely and obsequiously submit to the will of someone else, to fawn, to servilely fulfill the wishes of another.
Notes: No, today's Good Word has nothing to do with animals of the bovine persuasion. It is spelled with a K and comes from Mandarin Chinese, as the Word History will show. The participle kowtowing may be used as an adjective and an action noun: "His kowtowing to the boss unnerves me." A person guilty of kowtowing is a kowtower, not to be confused with a stack of cows (a cow-tower, something rarely seen these days in North America).
In Play: Kowtowing is not a popular activity in the US, but we all bump into it from time to time: "If Ben Dover thinks that kowtowing to the boss is going to help him get ahead in this company, he is sadly mistaken." Kowtowing should not be misconstrued as affection: "Poor Parker Carr thinks that kowtowing to Candy Cain will win her heart."
Word History: Today's word comes from Mandarin Chinese kòu tóu "a prostrate bow" from kòu "to strike" + tóu "head." Such bows were traditionally made before a powerful leader or a religious shrine. Mandarin is spoken by the largest number of people in China, about 914 million. In speaking of the 'Chinese language', however, we must keep in mind that Mandarin is but one of 14 languages spoken in China today. Although they are often called dialects, they are, in fact, distinct languages. They include Mandarin, Min Dong, Jinyu, Pu Xian, Huizhou, Min Zhong, Dungan, Gan, Hakka, Xiang, Min Bei, Min Nan, Wu, and Yue. (While we don't owe Kathy Garrett and Mike Ferguson a kowtow, we do offer them a gentle bow of gratitude for suggesting today's Good Word.)
Come visit our website at <http://www.alphadictionary.com> for more Good Words and other language resources!
|
<urn:uuid:dcefc51d-805b-46a5-9163-ac1cfd928213>
|
CC-MAIN-2020-16
|
https://www.alphadictionary.com/goodword/word/kowtow
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370524043.56/warc/CC-MAIN-20200404134723-20200404164723-00165.warc.gz
|
en
| 0.94678 | 495 | 2.625 | 3 |
A big announcement was made today by a company called JinkoSolar. The Photovoltaic and Wind Power Systems Quality Test Center at the Chinese Academy of Sciences (CAS) were conducting tests on the new solar panel. The test results showed that Jinko's solar cell achieved a record high 24.2% efficiency. In comparison the next most efficient solar cell is only 22.2% efficient.
JinkoSolar has achieved this efficiency due to their breakthrough in TOPcon (Tunnel Oxide Passivated Contact) This is a new way to manufacture solar panels. Where a very thin oxide layer is put into the silicon cell. This layer helps with efficiency as well as recombination losses. The other technology that helps JinkoSolar achieve such high efficiency is their "HOT" cell design. This design has tunnel oxide passivating contact technology, this coupled with JinkoSolar high quality parts and advanced fine-line printing has allowed them to reach 24.2% efficiency throughout their entire product.
This is a huge breakthrough in solar technology and shows us the path to more efficient solar panels in the future. If you would like to read the original article head over to https://www.solarpowerworldonline.com/2019/01/jinko-hits-24-2-efficiency-with-new-n-type-topcon-solar-cell/
|
<urn:uuid:b771c0da-d9ef-4f22-aec6-5b7b13ee5581>
|
CC-MAIN-2023-14
|
https://www.integritysolarsolutions.com/post/a-new-milestone-in-solar-panel-efficiency
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00702.warc.gz
|
en
| 0.949583 | 287 | 2.6875 | 3 |
Dacetini, Myrmicinae, Formicidae, Hymenoptera, Insecta, Arthropoda, Animalia
Additional images: worker, dorsal view (small, large).
line drawing of worker, lateral view, face view (from Brown 1962).
Southern Mexico to Costa Rica. Costa Rica: Atlantic lowlands.
Apical fork of mandible with one intercalary tooth; mandible with no preapical teeth; petiole with node only feebly differentiated from its anterior peduncle; gastral hairs mostly stiff, spatulate. Also see Bolton (2000:528).
Head length 0.67-0.74mm, mandible length 0.49-0.56, CI 81-84, MI 73-76 (n=9 workers from 6 localities; Brown 1962).
Similar species: elongata, precava, consanii.
Brown and Wilson (1959) summarize the genus as follows:
"Widespread in tropics and warm temperate areas. Primarily forest-dwelling; some species occur in grassland and arid scrub. ... Nests mostly in soil and rotting wood; a few species live in arboreal plant cavities in tropical rain forest. Foraging hypogaeic to epigaeic-arboreal. Food: most species are collembolan feeders; a few are polyphagous predators or occasionally feed on sugary substances..."
Members of the genus are all predaceous, with a kinetic mode of attack (Bolton 1999).
Brown (1962) reports that ludia is a forest species and usually nests in rotten branches or twigs lying on the forest floor. He also reports that the food is chiefly entomobryoid Collembola. In Costa Rica, I have observed ludia in young second growth habitats, and not in Winkler or other samples from mature forest. Thus, this species may be associated with synanthropic habitats.
Abaca plantation, Batan (near Limon): collection reported in Brown (1962).
La Selva: three records of foragers and one ALAS Berlese sample, all from second growth habitat.
Bolton, B. 1999. Ant genera of the tribe Dacetonini (Hymenoptera: Formicidae). J. Nat. Hist. 33:1639-1689.
Bolton, B. 2000. The ant tribe Dacetini, with a revision of the Strumigenys species of the Malagasy Region by Brian L. Fisher, and a revision of the Austral epopostrumiform genera by Steven O. Shattuck. Memoirs of the American Entomological Institute 65:1-1028.
Brown, W. L., Jr. 1954(1953). The neotropical species of the ant genus Strumigenys Fr. Smith: Group of elongata Roger. Journal of the New York Entomological Society 61:189-200.
Brown, W. L., Jr. 1962. The neotropical species of the ant genus Strumigenys Fr. Smith: Synopsis and keys to the species. Psyche 69:238-267.
Brown, W. L., Jr., Wilson, E. O. 1959. The evolution of the dacetine ants. Quart. Rev. Biol. 34:278-294.
John T. Longino, The Evergreen State College, Olympia WA 98505 USA.firstname.lastname@example.org
Go to Ants of Costa Rica Homepage
|
<urn:uuid:f76eb309-bbe9-4c62-8972-5a92242b7047>
|
CC-MAIN-2014-10
|
http://academic.evergreen.edu/projects/ants/genera/strumigenys/species/ludia/ludia.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010776091/warc/CC-MAIN-20140305091256-00083-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.796921 | 744 | 3.203125 | 3 |
What are the major themes in the book Walk Two Moons by Sharon Creech.
The most prominent theme in Walk Two Moons is that of coming of age. Corollary themes are identity and finding self, which are related but have differing fine points. The first, the rites of passage to coming of age, is the most important theme. Sal must pursue understanding and acceptance of things that at the outset of the story are beyond her capability of grasping. For example, by the end of the novel, she must understand her mother's quest and accept her death. Not only this, but Sal must form a new resolve and embrace a new courage to go forward in her world and life without her mother.
A correlated them is that of identity. Sal's mother lost a baby by saving her other child, Sal, and as a result of the event felt at odds with her sense of identity. The same event and his wife's quest caused Sal's father to waver in his sense of identity, so much so that he had to turn his back on all that had previously identified him: the farm and the memories of his wife at home there. This abandonment of the roots of identity shook Sal's own sense of identity and prohibited her from feeling at home in the new town.
Finally, in a closely related theme, Sal had to find herself just as her mother had done. Sal had to find the answers that would quiet her tossed and torn world and connect her with her heritage and her peace of mind. Sal's mother went on her quest to her past and, following in her mother's footsteps, even to her grave, Sal must face the dangers and lessons of her own quest to find her own self.
|
<urn:uuid:1b8755e5-ba06-442c-a52d-69982b106c7e>
|
CC-MAIN-2017-47
|
https://www.enotes.com/homework-help/what-differnt-themes-book-walk-two-moons-by-sharon-106603
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805023.14/warc/CC-MAIN-20171118190229-20171118210229-00285.warc.gz
|
en
| 0.990279 | 345 | 2.640625 | 3 |
Fair weather or foul, nature finds a way to create variety and interest in the garden, and winter is no exception. Whether they’re blooming through a crust of snow, or showing off their vivid colors while dropping temperatures force us indoors, hardy winter plants are doing more than just surviving when the winter rolls in; they’re thriving. These garden inhabitants create interest, texture and a touch of the unexpected in the landscape when our springtime favorites are taking a long winter’s nap — and they do it with style.
Let’s take a look at 10 plants, trees and shrubs that can transform a barren, chilly landscape into a winter wonderland. For each plant, we’ll discuss what it will look like in your garden, what type of soil and water it needs, where it should be planted, and some tips and tricks to give it a chance to excel. We’ll also look at what zones the plants do best in, according to the USDA Hardiness Zone Map. This map splits North America into 11 sections, numbered 1 to 11, with each section being 10 degrees Fahrenheit (12.22 degrees Celsius) warmer or colder than the next section. This map is used to illustrate which plants can survive in which regions.
|
<urn:uuid:1e1636b4-8dd5-41f0-ba19-1b6d7592d0fe>
|
CC-MAIN-2017-30
|
https://mastergarden.wordpress.com/2014/01/23/top-10-winter-plants/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425117.42/warc/CC-MAIN-20170725082441-20170725102441-00001.warc.gz
|
en
| 0.893896 | 260 | 2.859375 | 3 |
Educational standards, also known as academic standards or learning standards, provide clear goals for student learning for teachers, students, parents, and the community. South Carolina has educational standards detailing what students should know and be able to do in order to be successful in each grade and each subject.
Standards list desired student outcomes — the knowledge and skills students need to learn. That learning can take place in many different ways.
Curriculum includes the materials used and the order (planned sequence) in which teachers will teach students the knowledge and skills described in the standards.
Standards list desired student outcomes — the knowledge and skills students need to learn. They help teachers focus on the outcome — what knowledge and skills their students should have at the appropriate education level.
With clear targets like these, teachers can build the best lessons and environments for their classrooms.
Standards also help students and parents by setting clear, realistic goals for success and making sure that parents, teachers, and students have a clear understanding of what is expected.
|
<urn:uuid:1c181b6c-ab3d-4f2d-923d-0e3b0e27f7a7>
|
CC-MAIN-2020-05
|
https://www.lexington1.net/academics/curriculum-standards/overview
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591431.4/warc/CC-MAIN-20200117234621-20200118022621-00121.warc.gz
|
en
| 0.964913 | 207 | 4.53125 | 5 |
Study on Optimization of Artificial Neural Network Generalization Power Based on Architecture
Artificial Neural Networks (ANNs) have attracted considerable attention from researchers in many fields, including economics, medicine, data processing, robotics, quality control, optimization and security, and have been used to solve a wide range of problems. The discovery of numerous applications and promising benefits to a diverse field encourages studies in this area. Architecture of the network is one of the major challenge in the field of Artificial Neural Network. Hidden layers plays a vital role in the performance of ANN causing the problem of either underfitting or overfitting under certain circumstances. Overfitting is the phenomenon wherein the network fits the training data set so well that even noise of the training data are memorized causing performance to drop when it is tested against unknown data set. Underfitting, the opposite of over-fitting, occurs when the model is incapable of capturing the variability of the data and the resulting model will have suboptimal predicative ability. The structure of the network also has direct effect on training time and classification accuracy. Although there are some discussions in the literature of the impact of network structure on the performance of the ANN, there is no standard method or approach for selecting the optimum structure. In this paper, the relationship between the number of hidden layers, nodes (neurons) and the accuracy of the classification is investigated. The result of this study can be used as a guideline for the selection of design parameter in setting artificial neural networks.
Keywords- Artificial Neural Network, Network Architecture, Hidden Layer, Neurons.
|
<urn:uuid:8163b745-3213-4a7d-84e7-14fafce0a041>
|
CC-MAIN-2020-34
|
https://worldresearchlibrary.org/abstract.php?pdf_id=4643
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739328.66/warc/CC-MAIN-20200814130401-20200814160401-00254.warc.gz
|
en
| 0.917739 | 316 | 2.890625 | 3 |
Train accidents often result in severe injuries and sometimes death. Research indicates that approximately 150 people every year get hit by moving trains, and at least 50 victims die. When a train accident occurs, the victims may find it necessary to sue the party at fault. Here is what you need to know about New York train accidents.
Travelers using the New York City subway get exposed to risks and accident predisposing factors such as over speeding, braking failure, electrical malfunctions, intoxication malfunctioning subway equipment, and poor maintenance of trains. Additionally, sudden stops, operator negligence, and failure to label hazards may lead to fatal train accidents. While most train accidents occur due to the lack of preventive measures, some rare cases result from natural causes like storms and earthquakes. The most common forms of train accidents involve derailing, train collisions, and pedestrians getting hit by trains.
|
<urn:uuid:1ecc95bf-b26a-4b90-8ced-85110f411daa>
|
CC-MAIN-2020-29
|
https://www.newyorkaccidentlawyer-blog.com/tag/train-accidents/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655888561.21/warc/CC-MAIN-20200705184325-20200705214325-00037.warc.gz
|
en
| 0.925763 | 172 | 2.859375 | 3 |
Today, many sophisticated tools and technologies allow us to store vast amounts of music and audio recordings on electronic devices. A group of codec technologies comprising encoder and decoder is used to encrypt, alter, and compress media files.
The so-called lossless and lossy codecs are two different categories of codecs. Lossless codecs, including PKZIP and PNG codecs, duplicate the same file as the original file after decompression. On the other hand, lossy compression techniques result in a copy of the original file that looks and/or sounds the same as the original but uses less space on electronic devices.
Lossy audio codecs essentially function by compressing digital audio streams, then decompressing them after eliminating some data. Typically, it is difficult or impossible for humans to differentiate between the original and the decompressed file.
However, lossy codecs can introduce flaws and audibly modify audio signals when they employ high compression rates. Deep learning techniques have recently been employed in an effort to get around the drawbacks of lossy codecs and improve compressed files.
A novel deep learning technique created by Sony Computer Science Laboratories (CSL) researchers improves and restores the quality of excessively compressed music and audio recordings. Their approach builds upon generative adversarial networks (GANs), machine learning models in which two neural networks “compete” to make correct or trustworthy predictions.
The proposed model is made up of two distinct models, the “generator (G)” and the “critic (D).” A spectrogram—a visual representation of an audio signal’s spectrum frequencies—represents an extract of an MP3-compressed musical audio signal provided to the generator.
The generator gradually improves its ability to produce a smaller, repaired replica of the original signal. In the meantime, the critic component of the GAN architecture gains the ability to recognize the distinctions between the original, high-quality files and restored ones. To ensure that the music or audio data included in the restored files are as accurate as that in the original as feasible, the information obtained by the critic is ultimately utilized to improve the quality of the restored files.
In a series of tests, the researchers assessed the performance of their GAN-based architecture. The main objective was to see if it could enhance the MP3 input quality and provide compressed samples that were better and more similar to the original file than those produced by existing baseline models for audio compression. Their findings show that the model’s restorations of MP3 songs that had been severely compressed (16 kbit/s and 32 kbit/s) frequently sounded better to expert human listeners than the original compressed files. On the other hand, the team discovered that their model produced marginally subpar results while utilizing lesser compression rates (64 kbit/s mono).
According to their paper, this architecture could produce and add realistic high-frequency information that enhanced the audio quality of compressed tunes. The created material contained percussion components, guitar sounds, and singing voice sibilants.
The team believes that their work can significantly reduce the size of MP3 audio files without affecting their quality or producing faults obvious to the human ear.
This Article is written as a research summary article by Marktechpost Staff based on the research paper 'Stochastic Restoration of Heavily Compressed Musical Audio using Generative Adversarial Networks'. All Credit For This Research Goes To Researchers on This Project. Check out the paper and reference article. Please Don't Forget To Join Our ML Subreddit
Tanushree Shenwai is a consulting intern at MarktechPost. She is currently pursuing her B.Tech from the Indian Institute of Technology(IIT), Bhubaneswar. She is a Data Science enthusiast and has a keen interest in the scope of application of artificial intelligence in various fields. She is passionate about exploring the new advancements in technologies and their real-life application.
|
<urn:uuid:5a8121fe-858d-42ee-9f8c-ffb8039fe632>
|
CC-MAIN-2023-23
|
https://www.marktechpost.com/2022/09/02/researchers-at-sony-computer-science-laboratories-csl-have-developed-a-new-deep-learning-method-to-enhance-and-restore-the-quality-of-heavily-compressed-songs-and-audio-recordings/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656737.96/warc/CC-MAIN-20230609132648-20230609162648-00521.warc.gz
|
en
| 0.937713 | 805 | 3.890625 | 4 |
Female Lizard Uses Patches of Color to Announce Mother Potential
Lizard moms wear their egg quality on their sleeves – or at least on their necks
Good moms make sure their kids eat well. Lizard moms only get one chance to do that; in most species, their mothering ends when they lay their eggs. So their one and only chance to be a good mom is to create high-quality eggs, and particularly ones with higher levels of antioxidants. But lizard dating isn't particularly drawn out and a female lizard needs a quick way to tell a potential mate she'd make a good mom. How does she do it?
Female striped plateau lizards (Sceloporus virgatus), which live on the rocky slopes of mountains in southeastern Arizona, do this with bright orange patches underneath the jaw. Scientists from the University of Puget Sound and elsewhere, reporting in the Journal of Animal Ecology, found that the size of those patches correlates with the concentration and amount of antioxidants in the yolk of her eggs, and the richness of color with antioxidant concentration.
"Thus, in female S. virgauts, female ornaments may advertise egg quality. In addition these data suggest that more-ornamented females may produce higher-quality offspring, in part because their eggs contain more antioxidants," said lead author Stacey Weiss, of the University of Puget Sound.
That advertising appears to work; previous research has shown that male striped plateau lizards prefer females with darker orange spots.
|
<urn:uuid:c4502334-85fb-499a-ac00-29090e3b969b>
|
CC-MAIN-2023-23
|
https://www.smithsonianmag.com/science-nature/female-lizard-uses-patches-of-color-to-announce-mother-potential-42906534/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00679.warc.gz
|
en
| 0.954848 | 301 | 2.65625 | 3 |
Air Chambers and Master Cylinders
The brake system for the tractor has one air chamber
and one hydraulic brake master cylinder. The brake
system for the scraper has one air chamber and one
hydraulic brake master cylinder.
The air chambers activate the pistons of the hydrau-
lic brake master cylinders. Compressed air in air cham-
ber (A) is pushed against diaphragm (B) to move the air
chamber rod (D) out. When the rod is moved out, it will
push on the back of piston (E). The diaphragm and rod
are pushed back by spring (C) when the air pressure is
NOTE: The valves (3) and (11) let about 3 to 6 psi
(20 to 40 kPa) oil pressure to be in the lines. This
pressure will be enough to let the brake pads release
from the brake discs but will keep a small amount of
pressure so that the brake pads will clean them-
TRACTOR AIR CHAMBER AND MASTER CYLINDER
1. Air line. 2. Master cylinder. 3. Valve. 4. Oil line to
tractor brakes. 5. Air chamber. 6. Stroke indicator.
SCRAPER AIR CHAMBER AND MASTER CYLINDER
7. Master cylinder. 8. Air chamber. 9. Air line.
10. Oil line to scraper brakes. 11. Valve. 12. Stroke
indicator. 13. Quick release valve.
AIR CHAMBER AND MASTER CYLINDER
A. Air chamber. B. Diaphragm. C. Spring. D. Rod.
|
<urn:uuid:0e8efee8-1da4-4e8a-b69e-9d08200495e7>
|
CC-MAIN-2017-43
|
http://constructionearthmover.tpub.com/TM-5-3805-260-24/css/TM-5-3805-260-24_205.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825436.78/warc/CC-MAIN-20171022184824-20171022204824-00244.warc.gz
|
en
| 0.769234 | 356 | 2.765625 | 3 |
The "isolation" of the USA was more formal than substantial (in terms of trade they were well connected to the rest of the world, and ideas circulated widely even before internet).Despite the revolutionary events in Europe, US history, in my opinion, won't change much: America was in isolation during this period and focused on the continent. The divide between north and south would remain even if immigration from Europe is diminished. I'm not an expert on US history but I think that a civil war was unavoidable as long as the comtrasts between north and south remain. Abolitionist would still rise and European events would not influence the New World as much.
There are very few things, if any, which are truly unavoidable, in particular if there are significant changes almost next door (and Europe was almost next door).
12 years from the POD are quite a significant stretch of time to generate changes, even if the POD happened a few thousand kilometers away.
|
<urn:uuid:64c3e43b-c3e1-429b-90ba-8cc9e25d4df3>
|
CC-MAIN-2020-34
|
https://www.alternatehistory.com/forum/threads/italico-valore-a-more-successful-1848-revolution-in-italy-a-tl.491961/page-14
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738905.62/warc/CC-MAIN-20200812141756-20200812171756-00546.warc.gz
|
en
| 0.984672 | 196 | 2.875 | 3 |
DOWN SYNDROMEis a condition in which extra genetic material causes delays in the way a child develops, both physically and mentally.
MODY is a rare form of diabetes which is different from both Type 1 and Type 2 diabetes, and runs strongly in families.
BIRTH DEFECTS are problems that some babies have while they are still in the womb. These defects may affect how their organs develop and perform.
HEREDITARY CANCERcases occur in someone who inherited a genetic mutation that increases cancer risk.
|
<urn:uuid:4f7b8e5c-0b74-4601-9eea-12fdf8afa768>
|
CC-MAIN-2017-43
|
http://mrc-et.com/index.php/en/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826114.69/warc/CC-MAIN-20171023145244-20171023165244-00098.warc.gz
|
en
| 0.948701 | 107 | 2.859375 | 3 |
|Try our online PLC Simulator- FREE. Click here now to try it.|
Learn quickly with our PLC Training DVD Series: on sale
Click here now for details!
Let's now take a look at how the input circuits of a plc work. This will give us a better understanding of how we should wire them up. Bad things can happen if we wire them up incorrectly!
Typically, dc input modules are available that will work with 5, 12, 24, and 48 volts. Be sure to purchase the one that fits your needs based upon the input devices you will use.
We'll first look at how the dc inputs work. DC input modules allow us to connect either PNP (sourcing) or NPN (sinking) transistor type devices to them. If we are using a regular switch (i.e. toggle or pushbutton, etc.) we typically don't have to worry about whether we wire it as NPN or PNP. We should note that most PLCs won't let us mix NPN and PNP devices on the same module. When we are using a sensor (photo-eye, prox, etc.) we do, however, have to worry about its output configuration. Always verify whether it's PNP or NPN. (Check with the manufacturer when unsure)
The difference between the two types is whether the load (in our case, the plc is the load) is switched to ground or positive voltage. An NPN type sensor has the load switched to ground whereas a PNP device has the load switched to positive voltage.
Below is what the outputs look like for NPN and PNP sensors.
On the NPN sensor we connect one output to the PLCs input and the other output to the power supply ground. If the sensor is not powered from the same supply as the plc, we should connect both grounds together. NPN sensors are most commonly used in North America.
Many engineers will say that PNP is better (i.e. safer) because the load is switched to ground, but whatever works for you is best. Just remember to plan for the worst.
On the PNP sensor we connect one output to positive voltage and the other output to the PLCs input. If the sensor is not powered from the same supply as the plc, we should connect both V+'s together. PNP sensors are most commonly used in Europe.
Inside the sensor, the transistor is just acting as a switch. The sensors internal circuit tells the output transistor to turn on when a target is present. The transistor then closes the circuit between the 2 connections shown above. (V+ and plc input).
The only things accessible to the user are the terminals labeled COMMON, INPUT 0000, INPUT 0001, INPUTxxxx... The common terminal either gets connected to V+ or ground. Where it's connected depends upon the type of sensor used. When using an NPN sensor this terminal is connected to V+. When using a PNP sensor this terminal is connected to 0V (ground).
A common switch (i.e. limit switch, pushbutton, toggle, etc.) would be connected to the inputs in a similar fashion. One side of the switch would be connected directly to V+. The other end goes to the plc input terminal. This assumes the common terminal is connected to 0V (ground). If the common is connected to V+ then simply connect one end of the switch to 0V (ground) and the other end to the plc input terminal.
The photocouplers are used to isolate the PLCs internal circuit from the inputs. This eliminates the chance of any electrical noise entering the internal circuitry. They work by converting the electrical input signal to light and then by converting the light back to an electrical signal to be processed by the internal circuit.Learn quickly with our PLC Training DVD Series: on sale
Click here now for details!
|
<urn:uuid:98b465cd-e90f-445b-a5d0-c6cc371211cf>
|
CC-MAIN-2014-23
|
http://www.plcs.net/chapters/dcin25.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894151.32/warc/CC-MAIN-20140722025814-00003-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.90926 | 814 | 3.609375 | 4 |
64: Telling the Story of the Exodus
"You shall tell your sons on that day..." (Shemos 13:8)
It is a mitzvah to relate the story of yetzias Mitzrayim to one's
children and to others, according to their level, on the night of the
The more one elaborates on the story, the more praiseworthy it is
(Haggadah of Pesach).
In every generation a person is obligated to see himself as if he left
Egypt. (Pesachim 116b)
This mitzvah to speak of the episode of the Exodus is reiterated again and
again in the Torah. In fact, we are obligated to mention it also in our
daily evening and morning prayers.
Text Copyright © 2007 by Rabbi Moshe Goldberger and Torah.org.
|
<urn:uuid:b775280f-6dd0-4a4f-9cdd-4283fc88a609>
|
CC-MAIN-2013-48
|
http://torah.org/learning/mitzvah/64.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163049615/warc/CC-MAIN-20131204131729-00098-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.940032 | 178 | 3.359375 | 3 |
Watching and Journaling Suggestions
already spotted your first robin of the season, don't stop looking! You
can see all kinds of interesting behaviors by observing robins carefully.
Take your journal with you so you can capture what you see and hear and
write down questions you have.
for the first female robin to appear. Females usually come
1-2 weeks later than the males. The females' feathers are noticeably
duller than those of the male; in fact, they look faded — like
clothes that have been through the washing machine too many times. Count
the number of days between the arrival of the first robin (presumably
a male) and the arrival of the first female. Write down the date when
you see your first female.
to follow a female for as long as you can. Write down everything
she does. Bring a watch along so you can record how long each behavior
carefully. When male robins arrive, they don't sing as frequently
as they do once the females are in town before their eggs hatch. Once
a week, go outside where you know there are robins. Sit quietly for
5 minutes and count the number of times you hear a robin sing. How does
that number change over time? Try to actually see a robin singing, and
watch him as long as you can. Does he stay in the same position on the
same branch or does he move around? Is his mouth open or closed while
he sings? Does he seem to have his eyes peeled for predators?
what time the sun rises in your area. Try
to wake up one morning an hour before sunrise. Listen for the first
birds to sing. When does the first robin pipe in? What does the sky
look like at that time? How many minutes before sunrise does he start
for battles between males and between females. What do you
notice? When territories are set up for the breeding season, the fiesty
males work hard to earn the best land they can. Some robins even battle
their own reflections in a window! But males aren't the only ones who
fight. Once the females arrive, they often fight one another for the
best male and territory.
for as many other interesting behaviors as you can. List the
ones you see, describing as many details as you can in your journal.
Try to record the date, time, and sex of each bird you're observing.
Look for the following behaviors. How many can you spot?
other food items (e.g., fruit)
when a hawk flies over
Science Education Standards
- Ask a
question about objects, organisms, events.
have basic needs. For example, animals need air, water and food.
- The behavior
of individual organisms is influenced by internal cues (such as hunger)
and by external cues (such as a change in the environment).
- An organism's
behavior patterns are related to the nature of that organism's environment,
including the kinds and number of other organisms present, the availability
of food and resources, and the physical characteristics of the environment.
|
<urn:uuid:ae7887bd-e04b-4841-95ef-d254ac53d574>
|
CC-MAIN-2013-48
|
http://www.learner.org/jnorth/tm/robin/RobinWatchingSuggestions.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163054599/warc/CC-MAIN-20131204131734-00064-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.945358 | 658 | 3.75 | 4 |
Description of the Regional strategy
“Close-to-zero energy strategy for Dalarna“: pdf (update 15.06.2013)
More about the region:
Dalarna is a sparsely populated region in the inland of Sweden. 280 000 people live in the area of 29 000 square kilometers. However the population varies over seasons because of its touristy features that attract millions of tourists. This fact in combination with heavy industries metallurgy (including mining) and paper mills makes the energy issue a top priority.
The Swedish government has appointed Dalarna together with Skåne and Norrbotten to be pilot counties for green development.
The County Administrative Board Dalarna, comprising 15 municipalities, has worked since 2003 to direct the different sectors of society towards new common energy goals. This work is organized within a cooperation called “Energy Intelligent Dalarna”, where all stakeholders from the energy sector are represented. One of the results of this work is the establishment of energy action plans for the region as a whole and for all the municipalities specificly. Another result is the elaboration of a “Energy and climate strategy” that tells us that the county of Dalarna can become a net exporter of renewable energy in 2050. In the elaboration process the participating parties from all sectors agreed to set very ambitious goals for the region.
|
<urn:uuid:dc525c68-ba0b-4025-9d5b-b68770a26b0d>
|
CC-MAIN-2020-34
|
http://www.mountee.eu/pilot-regions/dalarna/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735963.64/warc/CC-MAIN-20200805153603-20200805183603-00235.warc.gz
|
en
| 0.916225 | 275 | 2.640625 | 3 |
Fires can break out anywhere and at any time. In the unfortunate event that a fire does occur in your home or office, it is important to know what to do to ensure everyone’s safety. This includes knowing how and when to evacuate, as well as having an emergency plan in place. In this post, we will take a look at some of the best practices for evacuation during a fire incident. Stay safe!
First Evacuation Behavior During Fire Incidents Should Be To Stop All Activities Immediately And Assess That All Persons Can Evacuate The Area
When a fire alarm sounds or you see fire, your first instinct may be to flee the building as quickly as possible. However, this is not always the best course of action. In some cases, it may be necessary to stop all activities and assess the situation before evacuating the area. This is especially true if you are in charge of other people, such as employees or students.
If you are able to safely evacuate the area, do so immediately. If not, try to find a safe place to wait until the fire department arrives. In any scenario, it’s critical to have a fire emergency plan in place so that everyone is aware of what to do. By being prepared and knowing what to do, you can help ensure a safe evacuation for all.
Follow The Fire Emergency Plan To Evacuate The Area As Soon As Possible At The Closest Exit
One of the most important things you can do in the event of a fire is to follow the emergency evacuation plan. This will help to ensure that everyone in the area has a safe and efficient way to evacuate. The first step is to identify the closest exit. If the exit is blocked by smoke or flames, do not try to go through it. Instead, look for an alternate route. Once you have found an exit, move quickly but calmly to reach it.
If possible, close doors and windows behind you to help contain the fire. If you are unable to evacuate the area, go to a room with an external window and call emergency services. Stay low to the ground, as smoke rises. Be prepared to give them your location and any other information that will help them rescue you.
Remember To Use The Stairs And Walk Briskly On It Instead Of Using Elevator And Running In Case Of A Fire Incident In A Building
In the event of a fire, it is important to remember to use the stairs and walk briskly on it instead of using the elevator and running. This is because the fire emergency plan should be to evacuate the building as quickly and safely as possible. When using the stairs, remember to stay low to the ground where there is less smoke and heat. If you must use the elevator, push the button for the floor below the fire and wait for the fire department personnel.
Do not try to use the stairs if they are engulfed in flame or if there is heavy smoke in the stairwell. In any case, always remember to listen to fire department personnel and follow their instructions. By following these simple tips, you can ensure a safe fire evacuation for yourself and others in your building.
You Need To Know Where Fire Extinguishers Are Located Through-Out Before Any Fire Incident And Get Basic Fire Extinguisher Training
In the event of a fire, it is important to know where the nearest fire extinguisher is located and how to use it properly. This can help to prevent the spread of the fire and may even save lives. Most commercial buildings are required by law to have emergency evacuation plans in place, which should include a map of the premises highlighting the location of fire extinguishers. It is a good idea to familiarize yourself with this map so that you can quickly find the nearest fire extinguisher in an emergency.
Furthermore, basic fire extinguisher training can teach you how to use this life-saving tool effectively. Many fire departments offer free training sessions, so there is no excuse not to be prepared. Knowing where fire extinguishers are located and how to use them correctly could make all the difference in an emergency situation.
Stay Clear Of Hazards And Move Away From The Building When You Get Out Of The Fire Affected Area
Emergency evacuation plan should always be kept in a safe and accessible place. In the event of a fire, it is important to stay calm and follow the emergency evacuation plan. The first thing to do is to identify the nearest exit and move away from the building. If the exit is blocked, look for another way out. Once you are out of the fire affected area, stay clear of hazards and wait for further instructions from emergency services. Having a well-designed emergency evacuation plan can mean the difference between life and death in a fire emergency.
Do Not Re-Enter The Fire Affected Area Or Incident Without An “All-Clear” – Stay At The Designated Meeting Area
One of the emergency evacuation plan requirements is that you should not re-enter the fire affected area or incident without an “all-clear”. You should also stay at the designated meeting area. This is because the emergency situation might not be over and it might not be safe to go back yet. If you leave, emergency services might not be able to find you. It is important to follow these instructions during an emergency evacuation so that everyone stays safe.
Fires can happen anywhere and at any time. It is important to be prepared in advance by knowing what your first evacuation behaviour should be, following the fire emergency plan, and knowing where the fire extinguishers are located. By being proactive and knowledgeable about fires, you can help keep yourself safe in case of an emergency. Have you taken steps to prepare for a potential fire incident? What are some of the things you would do if a fire broke out in your workplace or home? Let us know in the comments!
Also Read About –
|
<urn:uuid:fd16634f-e7b6-4dac-a005-68dae858a0f9>
|
CC-MAIN-2023-50
|
https://www.thenewsmention.com/evacuation-behaviours-and-emergency-plan-during-fire-incidents/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100593.71/warc/CC-MAIN-20231206095331-20231206125331-00215.warc.gz
|
en
| 0.949456 | 1,196 | 2.53125 | 3 |
For the official list of road names please consult the Commission de toponymie du Québec web site.
For the history of Hatley township please consult the Commission de toponymie du Québec web site.
The Township of Hatley
By Phyllis Emery Skeats, Lake Massawippi Historical Society
“The tract of land lying within the district of Montreal, bounded by Ascot, east by Compton, south by Barnston and Stanstead, and west by Magog, Little Magog lake and the river by that name. Containing 348 lots, it was erected into a township named Hatley, and in part granted March 25th, 1803, to HENRY CULL, and EBENEZER HOVEY and their associates, viz, Job Chadsey, Joseph Fish, Samuel Fish, William Taylor, Joseph Ives, Emos Mix, Samuel Rexford, Benjamin Rexford, Isaac Rexford, Joel Hall Ives, Chester Hovey, Abiel Abbott the younger, Reuben Simmons, Paul Hitchcock, Jesse Wadleigh, Asa Daggett, Amasa Merriman, David Chamberlain, John Abbott, Providence Williams, Martin Adams, Harvey Clarke, Joseph Davies, Edmund Boyden, Japhet Le Baron, and Eli Ives.” C.M. Day, History of the Eastern Townships (1869)
Following the opening of the townships by the 1792 Proclamation of Alured Clarke, Lieutenant-Governor of Quebec: “to such as are desirous to settle on the lands of the Crown in the Province of Lower Canada”, Col. Henry Cull and Ebenezer Hovey petitioned for a grant of land in Quebec City at the Chateau St. Louis the residence of the Governor of Quebec, on the 18th. day of April in 1792. The grant was officially awarded to them in 1803 in the new Township of Hatley, named after a village in England. The Township was naturally divided from the north to south by Lake Massawippi. The subdivision of the lots was made in 1795 by James Rankin.
Prior to 1803, the good quality of the land was discovered by early settlers who spread the word to families in the neighbouring states such as New Hampshire and Vermont. Settlers began to arrive and settle. They were not the first inhabitants in the Township as it is well known that the first inhabitants were Indians, supposedly Algonquin (Abenaki), in the Lake Massawippi region. In her book, “The Story of Hatley”, Maude Pellerin speaks of the Indians being friendly with their white neighbours, as there were no records of raids against the white people, as in other localities.
At the beginning of their time as settlers, the colonists of Hatley Townhip faced many difficulties. The first year was particularly difficult, but thanks to an abundance of fish in the lake, and game in the forests, they were able to survive. As crops became more plentiful, a mill was needed, and Stephen Burroughs (Boroughs) constructed the first mill near the present site of Burroughs’ Falls. Around 1800, a road was built from Burroughs’ Falls to Hatley on the east side of the lake, which facilitated development of the settlement.
From the beginning, Hatley Township was a rural area, and thanks to its beautiful countryside and exceptional lake, became a well-known tourist region. The region has attracted many artists, writers and poets over the years. The villages in the Township include North Hatley, incorporated in 1897, Ayer’s Cliff incorporated in 1909, Massawippi, now part of Hatley, Hatley Village incorporated in 1912 and Katevale (Ste-Catherine-de-Hatley) incorporated in 1901. Other hamlets were Minton and Reedsville.
|
<urn:uuid:8e5862b5-043c-4b6d-95fa-b49e0896af8f>
|
CC-MAIN-2017-47
|
http://cantondehatley.ca/en/information/road-names-and-history/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805914.1/warc/CC-MAIN-20171120052322-20171120072322-00535.warc.gz
|
en
| 0.965711 | 803 | 2.828125 | 3 |
- Sound files and other useful things that go with Ladefoged's Course in Phonetics textbook: http://hctv.humnet.ucla.edu/departments/linguistics/VowelsandConsonants/course/contents.html.
- Peter Ladefoged has another textbook with files online for it, too: http://hctv.humnet.ucla.edu/departments/linguistics/VowelsandConsonants/vowels/contents.html.
- The main page for the web version of Sounds of the World's Languages. Go here to hear native speakers of many, many languages producing all sorts of interesting distinctions. Try the maps page to just explore.
- The Praat web page: http://www.praat.org. Download and install Praat here, or join the Praat help listserv.
- Speech in many, many dialects of English (as well as many foreign accents), much of it phonetically transcribed, and all of it available to listen to: http://classweb.gmu.edu/accent/.
- Movies of the vocal tract and vocal cords in action: http://www.phon.ox.ac.uk/~jcoleman/phonation.htm.
- Another vocal cords in action movie: http://www.humnet.ucla.edu/humnet/linguistics/faciliti/demos/vocalfolds/vocalfolds.htm
- Amazing x-ray movies of speech: http://psyc.queensu.ca/~munhallk/05_database.htm.
- Fun for learning what vocal tract positions correspond to what sounds: http://www.chass.utoronto.ca/~danhall/phonetics/sammy.html.
- University of Iowa has a great site that shows you animations of English and Spanish speech sounds, a video of a speaker's face producing the sounds, the IPA symbol, and along with all of this plays the sound. Good for IPA, articulations, and audiovisual speech.http://www.uiowa.edu/~acadtech/phonetics/
- Movies of pharyngeal consonants and of the vocal cords: http://web.uvic.ca/ling/research/phonetics/index.htm. This page has the movies to go with several papers by John Esling (I'm having problems with some of these movies, but they're great.).
- Here's a nice one on why vowel formants are harder to distinguish at high fundamental frequencies: http://www.phys.unsw.edu.au/~jw/soprane.html.
- McGurk effect demonstration: http://www.media.uio.no/personer/arntm/McGurk_english.html.
- Dani Byrd is a professor at University of Southern California, and her web page has lots of phonetics links: http://www-rcf.usc.edu/~dbyrd/linklist.html.
- Some archived Linguist List issues with lots of phonetics links (some of them included above), just in case you feel like going exploring: http://linguistlist.org/issues/11/11-1812.html, http://linguistlist.org/issues/11/11-1869.html, and http://linguistlist.org/issues/11/11-1964.html.
- Here's another page with a list of phonetics (and phonology) links. http://dmoz.org/Science/Social_Sciences/Linguistics/Phonetics_and_Phonology/
- HTK toolkit for developing an ASR system, and another source for it.
- A bunch of freely downloadable programs relating to various aspects of ASR
- How to use IBM ViaVoice with Java.
- Libraries to help you develop various speech applications:
- A list of a whole bunch of tools, programs, etc. for ASR and HMMs.
- Early synthesis: the Pattern Playback.
- More early synthesis: the Vocoder.
- Articulatory synthesis: Haskins Labs.
- Dennis Klatt's history of speech synthesis sound clips.
- A nice list of synthesis links (not all continue to work though) by Sami Lemmety.
- A list of articulatory synthesis links.
- Audiovisual synthesis (synthesized talking faces), from Sweden.
- Baldi audiovisual synthesis (audiovisual speech synthesis, with multiple languages and special effects). A Baldi toolkit is also available here, if you want to do audiovisual synthesis for your paper.
- More synthesis links, most with demos.
- Really nice page of comparative demonstrations of synthesis in many languages, and they're not links to other people's pages, so they all (?) work.
- HL Syn, a particularly good parametric synthesis program. Samples are at the bottom of the page.
- AT&T concatenative synthesis.
- OGI concatenative synthesis.
- Say... parametric synthesis.
- ATR synthesis demos (many languages, special effects, both their older CHATR system and recent NATR system)
- SpeakNSpell demo (LPC resynthesis)
- Pictures and explanations of Wolfgang von Kempelen's 1791 articulatory synthesis machine
- Many synthesis examples collected by Alan Black, with a talk explaining them (no link problems)
|
<urn:uuid:24331c6c-8065-445f-a0b0-931e8451ef46>
|
CC-MAIN-2020-16
|
https://linguistics.arizona.edu/dpl/links
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494349.3/warc/CC-MAIN-20200329140021-20200329170021-00147.warc.gz
|
en
| 0.789853 | 1,193 | 2.65625 | 3 |
Radio signals undergo significant levels of attenuation from humidity and precipitation: around 8GHz and higher. Therefore, it's always recommended to consider humidity and rainfall as factors in link planning.
Due to their acute wavelengths, signals in the 24GHz band encounter additional atmospheric attenuation beyond that which is expected from free space path loss due to water absorption, including rain fade. A general guideline is an additional loss of 1-3 dB per kilometer. The amount of additional atmospheric attenuation will vary, depending on your specific installation environment (the world has a variety of rainfall zones).
For example, links exposed to 25 mm/hr of rainfall could undergo additional 4dB of attenuation per km. The table below illustrates the estimated additional attenuation at various rainfall rates and distances, based on information from the FCC bulletin.
Estimated rainfall attenuation rates at 24GHz.
|Distance||1.25 mm/hr||5 mm/hr||25 mm/hr|
|1 km||0.2 dB||0.7 dB||4 dB|
|2 km||0.4 dB||1.4 dB||8 dB|
|3 km||0.6 dB||2.1 dB||12 dB|
|4 km||0.8 dB||2.8 dB||16 dB|
|5 km||1 dB||3.5 dB||20 dB|
|
<urn:uuid:8f0c2ce8-b3e5-494a-a337-a49973c84ef2>
|
CC-MAIN-2020-05
|
https://help.ubnt.com/hc/en-us/articles/204977614-airFiber-Rain-Fade-Effects-on-AF24-24HD-Links
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250625097.75/warc/CC-MAIN-20200124191133-20200124220133-00284.warc.gz
|
en
| 0.891644 | 283 | 2.765625 | 3 |
The thyroid gland, located at the front part of the neck, is responsible for making substances called thyroid hormones that are important for all body cells to work properly.
In certain conditions, the thyroid becomes underactive and produces fewer amounts of its hormones, a situation called hypothyroidism. People with hypothyroidism have problems that reflect underactivity of the organs of the body, resulting in symptoms such as fatigue, feeling cold, weight gain, dry skin, and sleepiness. When the levels of thyroid hormones become very low, the symptoms get worse and can result in a serious condition called myxedema coma. Myxedema coma is a rare but life-threatening condition. People with hypothyroidism who are in or near a coma should be taken to an emergency department immediately.
Drugs, such as phenothiazines, amiodarone, lithium, and tranquilizers, and prolonged iodide use
Not taking prescribed thyroid medications
Myxedema Coma Symptoms
Symptoms of hypothyroidism may include the following:
Low body temperature
Swelling of the body
People who have myxedema coma are in or near a coma and not able to function normally. They require emergency care.
When to Seek Medical Care
People who have hypothyroidism and develop fever, changes in behavior or mental status, shortness of breath, or increased swelling of the hands and feet should be taken to an emergency department.
Exams and Tests
Blood tests are performed to check blood cell count, electrolytes, sugar, and thyroid hormone levels. Tests are also performed to evaluate how the liver and adrenal glands are functioning.
Blood gases are evaluated to check for oxygen and carbon dioxide levels.
An ECG of the heart is performed to check for disturbances in the activity of the heart.
Additional tests are performed at the discretion of the treating doctor.
Myxedema Coma Treatment Self-Care at Home
If you have hypothyroidism, be alert to your condition.
Call your doctor if you are concerned.
Check your blood sugar level if you are diabetic.
Warm yourself up with a warm blanket and seek help.
Take your prescribed thyroid medication if you missed them earlier.
People with myxedema coma are in a coma or nearly in a coma. They are not able to function normally. Friends or family members should take them to an emergency department immediately. Friends or family members should not give the person in myxedema coma any thyroid medication before taking him or her to the emergency department. If adrenal insufficiency is present, then administration of thyroxin (in the thyroid medication) will provoke an adrenal crisis.
Electrolytes replacement as necessary
Thyroid hormones are usually administered through a vein (intravenously or IV) to quickly correct the low thyroid hormone blood level. (Oral thyroid hormone is usually not used for severe myxedema because it may take days or weeks to obtain the proper blood level.)
Cortisol or other adrenal cortical hormone intravenously
Warming blanket if body temperature is low
Glucose supplements if the blood sugar level is low
|
<urn:uuid:7b341b4c-f57c-4c23-8805-cd354a66ebcf>
|
CC-MAIN-2013-48
|
http://www.webmd.com/a-to-z-guides/myxedema-coma
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345768787/warc/CC-MAIN-20131218054928-00075-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.92634 | 655 | 2.90625 | 3 |
Homework can be one of the most disliked aspects of going back to school.
Well, one of the most disliked parts of school in general – for both parents and children.
It’s still an essential part of going to school and as bad as it it, can help your child learn better. This is why it is important to make sure homework is involved in your daily routine, and that it gets done well.
Setting up a strict homework routine, and sticking to it, will ease the homework woes for everyone. Strict doesn’t necessarily equal mean, just well-understood and closely-followed as part of a normal day.
Working out a precise schedule before school goes back includes:
- When to do it – what time of day best suits your children’s levels of energy and focus.
- Where to do it – find a specific space for homework to be completed.
- What rewards, if any, they get for doing it – an incentive scheme can help focus them to complete homework.
- How long it should take – set a time-frame. If they’re taking longer than you expected, this may suggest difficulties.
- How much you should help – helping them do the homework can be beneficial, but how much can you help before you start doing it for them?
Schedule a set time each day to complete homework to get them in the right habit of doing it so they can continue this routine into higher grades. Depending on when you think your kids could focus best, this time should be either as soon as they get home, or after some unwinding time on their own.
Completing homework when they are still in the school frame of mind is a good way to help them focus. In some cases, playing for a while after getting home from school means the child may not be able to settle down into homework mode. On the other hand, after having some down-time, the child might be more willing to spend time on homework. After all, who wants to work more as soon as they’re home?
Either way, it is important that you schedule a time suits your child’s individual needs, and include them in the decision as they know best how they feel after school. It is also good to let them have a snack before homework, so their stomach isn’t rumbling while they’re trying to concentrate. This can only take five minutes if you would like them to get started straight away.
Set up a specific room or part of the house that is dedicated to this strict homework routine, at least for that time of the day. It should be a well-lit, uncluttered area without distractions. The dining table works well if they can have quiet time to focus there – other family members should be notified that this area is off-limits while the child is studying.
It is a good idea to have all the resources they could possibly need kept in a box or on a shelf in the homework area, so your child can’t complain that they don’t have the glue, or scissors, or any other implement, necessary to complete the homework that day. The child’s bedroom is not a good place for homework to be done, as it is hard to supervise and make sure they are actually doing the work instead of playing with any number of toys or distractions that are in a child’s bedroom.
An incentive-based system that rewards the child for completing their homework that day is a good way to motivate them. Whether the reward is something fun to do on the weekend after finishing all their weekly homework, or something as simple as an extra 10 minutes play time after they finish each day, this can be a great way to get homework finished without constantly reminding them to focus.
In saying this, it is more important to have the work finished to a high standard than to have it done quickly and scrappily. Involve the quality of the work in the incentive system to ensure that they are actually concentrating and not racing through to get their reward.
Homework shouldn’t take all afternoon to complete, so schedule a specific time-frame for them to finish it. With some kids, racing the clock can make it fun to do homework, or if it takes you a similar amount of time to finish a job around the house, they can race you to finish. Ensure the quality of work is still there though, and adjust the time-frame accordingly.
Depending on their grade, primary school students could spend from 10 minutes to half an hour, maybe more if they work slower or have more homework for some reason. Be careful to take note if they are taking longer than you expected, or longer than they normally do, as this might mean they are having difficulties with a certain part, or homework as a whole.
How Much Help
Always make sure you are there to answer any questions that may arise during the homework process, but don’t just outright do their homework for them. If it is questions about maths, for example, prompt the child to figure it out for themselves by breaking down the problem into parts they can understand, then they can put it together for themselves. This will help them learn for themselves better and gives them a sense of accomplishment, rather than simply having you answering the problem for them.
After they’re done, check over their work to ensure it is all completed properly and no mistakes have been made. If there are mistakes, see if the child can pick up on them, and then explain what is wrong and help them do it correctly. Once everything is complete, designate a place for the finished homework to be put, ready to take to school. This can be a place in the child’s room, near the front door, or simply straight into their bag to minimise the risk of forgetting it in the morning.
When creating this strict homework routine, try not to work around extra-curricular activities. If you factor in too many after-school activities, it can push homework into the background, as most other activities require a commitment that homework often doesn’t receive. Plan your extra-curricular activities for when homework is already done, so the focus is not pulled from the important task of homework. These activities can also tie into the rewards system if that suits your children.
Homework can be daunting, but not if you put a strict homework routine in place – even before school starts. If you and your children agree and know what is expected of them, the task of completing homework in a timely and high quality manner can be achieved without the stress it can sometimes cause.
Image credit: wavebreakmediamicro/123RF Stock Photo
|
<urn:uuid:c26685ed-49bc-4d70-af3b-ca43e637904a>
|
CC-MAIN-2017-34
|
https://www.bubhub.com.au/hubbub-blog/creating-a-strict-homework-routine/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110573.77/warc/CC-MAIN-20170822085147-20170822105147-00045.warc.gz
|
en
| 0.971467 | 1,381 | 3.109375 | 3 |
This was an Allied unrealised programme by the Special Operations Executive and Office of Strategic Services to supply munitions to resistance forces in German-occupied Europe (1943/45).
The operation was based on the parachute delivery of 50,000 attack packs behind the German lines to resistance fighters (potential as well as actual) in co-ordination with the invasion of Europe. The attack packs contained specially designed grenades, pocket incendiaries and a small one-shot personal firearm which the SOE designated as the Liberator. This pistol fired a single 0.45-in (11.43-mm) ACP round and could accommodate an additional 10 rounds in its butt, and was a very basic weapon built largely of sheet metal. A million such pistols were manufactured in six months by the Inland Guide Lamp Manufacturing Division of the General Motors Corporation in the USA.
Eventually ‘Braddock I’ was abandoned, but by all accounts small numbers of Liberator pistols were included in regular container drops to the French resistance and others were distributed by the OSS in the Far East for use by the Filipino guerrilla forces against the Japanese. Small numbers were also delivered to the Chinese.
|
<urn:uuid:edab9bb8-ef8c-47c8-a745-b25fce0f9261>
|
CC-MAIN-2020-29
|
https://codenames.info/operation/braddock-i/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655880243.25/warc/CC-MAIN-20200702205206-20200702235206-00255.warc.gz
|
en
| 0.978545 | 238 | 2.671875 | 3 |
Follow the Winter Clothes Path
The snowman needs a scarf! Kids draw a line along the path that shows winter gloves and hats to get to the scarf. Watch out! There are other objects in the maze, but only the winter clothes are the correct path to the scarf. Kids completing this worksheet understand that changes in weather occur across seasons, practice recognizing simple patterns, and exercise thinking and fine motor skills.
|
<urn:uuid:23061377-2a24-43cd-be34-471836f6ff1b>
|
CC-MAIN-2017-30
|
https://www.education.com/worksheet/article/follow-the-winter-clothes-path-maze-prek/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423716.66/warc/CC-MAIN-20170721042214-20170721062214-00071.warc.gz
|
en
| 0.93303 | 84 | 3.984375 | 4 |
Did you know that the wolf has a soul mate until death do they part?
The Wolf is one of the oldest and most feared predator of the world. No civilization of any rule has challenged him. However, even now, after so many centuries, the wolf keeps the mystery, showing researchers that they are not even close to knowing everything about this fascinating animal. So, here are some interesting facts about him and his history:
Wolves have about 200 million sensory cells. Man has only around 5 million.
Basically, they can smell an animal at a distance of 1 mile and can hear up to 7 miles away!
The male and female remain together for life. They are dedicated parents and behave like a real family.
Power is concentrated in the jaws of a wolf: They can produce a bite pressure of 800 pounds. An average dog can apply pressure of only 300 pounds. Furthermore, wolf teeth, 42 in number, are sharp and perfect to pierce, to tear and break a bone.
Although most females in a pack can reproduce, only the Alpha Female bring pups into the world. This system is designed to reduce the number of pups in the pack, and existing ones to be very strong. Female role is to help the Alpha Female to raise the pups, serving as a nanny. And here’s the shocking part: she-wolves fear so strongly the alpha female that they stay out of the heat!
The Wolf is one of the few animals that have, and can use, different facial expressions, thus communicating with other wolves.
Native American Flute Music: Meditation Music for Shamanic Astral Projection, Healing Music Shamanism is a system for psychic, emotional, and spiritual healing and for exploration, discovery, and knowledge gathering about non-material worlds and states of mind. Shamanism is a “technique of ecstasy” in which the spirit of the shaman leaves the body and travels to communicate with spirit helpers and other beings for the purpose of obtaining knowledge, power, or healing. Shamanic Astral Projection or Shamanic Journeying is an altered state of consciousness wherein you enter a realm called non-ordinary reality. By journeying you can gather knowledge and perform healing in ways that are not accessible in ordinary waking reality. How does shamanism work? Some people think that in shamanic healing journeying, the spirit leaves the body and a person is being healed by spirit helpers. Others think that shamanic journeying allows access to one’s own intuition, which may otherwise be drowned out by the prattle of everyday thinking or by anxiety; and that it is a way of engaging a person’s subconscious desires for healing. Shamanic healing may not cure physical or psychological illness, but it may help one gain psychic energy that will allow one better to handle illness. Shamanic healing therefore is best used in conjunction with other treatments, not as a substitute for them. Connection with a Power Animal A power animal protects you physically and provides you with emotional support, wisdom, and vital energy. Some people think a power animal is a spirit being that stays with you because it cares for you and enjoys being able to experience life in a physical body. Others think a power animal is a symbol for one’s subconscious wisdom. Almost everybody has a power animal; some have several. (Perhaps you had an “invisible animal friend” as a child or have always been fascinated with a particular kind of animal. This animal may be your Power Animal). A person may, in the course of life, lose contact with the power animal, thereby losing the animal’s protection, wisdom, and energy. If you lose contact with your Power Animal, you may feel dispirited, or you may become sick easily. The Shamanic Astral Projection technique of Power Animal Retrieval can restore a person’s connection to a Power Animal. A person can also journey to find his or her own Power Animal. To maintain a connection with your Power Animal, take the time to learn about your animal, learn to feel its presence, communicate with it, and honor it by doing things that it enjoys. Free flow of emotional and physical energy Health requires a free flow of energy that one can use to accomplish one’s desires in the world. But one’s energy can become blocked in various ways. People who have lost parts of their life essence, who have been ill, who have lost connection with a Power Animal, or who are regularly exposed to emotionally stressful situations are vulnerable to intrusions or “psychic infections” that block a person’s connection with self or drain a person’s energy. An intrusion can be thought of either as a foreign energy being that takes up residence in a person’s psychic body (a psychic infection), or as a psychic structure (an emotional wall or barrier) that a person built to keep herself safe from harm, but that now is blocking some of his/her energy expression. A person with an intrusion might feel drained or ill, might have aches and pains, might have nightmares or other fears. A shamanic healer can find and remove intrusions and barriers in a healing ritual called extraction. A sense of purpose A sense of purpose is necessary to happiness. The person who loves and cares about the world and fellow beings, who wants to make some small part of the universe a better place, has a sense of purpose. A person can find a sense of purpose in life by seeking knowledge and direction through shamanic journeys, divinations, and rituals. One can do this alone, or with a group of people engaged in similar quests. A shamanic healer or counselor can’t find another person’s purpose, but can help one seek and interpret information.
Courtesy of Nu Meditation Music
|
<urn:uuid:5cc7e3fb-cbe0-4355-9efd-053c6b7d3ed5>
|
CC-MAIN-2020-16
|
https://bluefeatherspirit.wordpress.com/tag/native-american-wolves/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370518622.65/warc/CC-MAIN-20200403190006-20200403220006-00188.warc.gz
|
en
| 0.948515 | 1,186 | 2.8125 | 3 |
Vitamin C strengthens your immune system and helps prevent and cure viral and bacterial infections (colds, flu, etc.).
Eat a lot of Vitamin C-rich foods: citrus fruit, gooseberries, kiwis, fresh vegetables like cauliflower, Brussels sprouts, broccoli, parsley, green peppers, etc.
Silver inhibits the spread of infectious agents, and can be used to combat a wide variety of infections. Combined with copper and gold, silver:
– lowers temperature
– fights infection
– acts as a natural antibiotic
– strengthens the immune system
You can use this trio of oligo-elements to fight all types of infections.
To fight flu symptoms, combine silver with copper. To combat angina, as well as nose, throat and lung infections, combine silver with manganese, copper and gold .
Good sources of manganese include walnuts, whole grains and green leafy vegetables.
– Brussel sprouts
– lemon, oranges, grapefruit
– kiwis, gooseberries
– green pepper
– green salad
Foods to avoid
– dairy products (only while the infection lasts)
|
<urn:uuid:27ea477a-f9f6-4469-8e57-d580a996634b>
|
CC-MAIN-2017-34
|
http://secrets-of-self-sufficiency.com/nutritional-cure-for-nose-and-throat-infections
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105976.13/warc/CC-MAIN-20170820053541-20170820073541-00325.warc.gz
|
en
| 0.850942 | 236 | 2.78125 | 3 |
The first definition of a wine-area called Chianti was made in 1716. It described the area near the villages of Gaiole in Chianti, Castellina in Chianti and Radda in Chianti; the so-called Lega del Chianti and later Provincia del Chianti (Chianti province). In 1932 the Chianti area was completely re-drawn. The new Chianti was a very big area divided in seven sub-areas: Classico, Colli Aretini, Colli Fiorentini, Colline Pisane, Colli Senesi, Montalbano and Rùfina. The old Chianti area was then just a little part of the Classico area, being the original area described in 1716 about 40% of the extension of the Classico sub-area and about 10% of all Chianti. Most of the villages that in 1932 were suddenly included in the new Chianti Classico area added immediately or later in Chianti to their name (the latest was the village of Greve changing its name to Greve in Chianti in 1972).
The popularity and high exportability of this wine at the moment of introduction of the DOC, 1967, was such that many regions of central Tuscany didn't want to be excluded from the use of the name. As a result the Chianti wine-area got about 10% more territory. Wines labeled Chianti Classico come from the biggest sub-area of Chianti, that sub-area that includes the old Chianti area. The other variants, with the exception of Rufina from the north-east side of Florence and Montalbano in the south of Pistoia, originate in the respective named provinces: Siena for the Colli Senesi, Florence for the Colli Fiorentini, Arezzo for the Colli Aretini and Pisa for the Colline Pisane. In 1996 part of the Colli Fiorentini sub-area was renamed Montespertoli.
Many different kinds of wines are produced in Chianti:
Until the middle of the 19th century Chianti was based solely on Sangiovese grapes. During the second half of the 19th century Baron Bettino Ricasoli who was an important Chianti producer and, in the same time, minister in Tuscany and then Prime Minister in the Kingdom of Italy, imposed his ideas: from that moment on Chianti should have been produced with 70% Sangiovese, 15% Canaiolo and 15% Malvasia bianca (Malvasia bianca is an aromatic white grape with Greek origins). During the 1970s, producers started to reduce the quantity of white grapes in Chianti and eventually from 1995 it is legal to produce a Chianti with 100% sangiovese, or at least without the white grapes. However, for a wine to retain the name of Chianti, it must be produced with at least 80% sangiovese grapes. It may have a picture of a black rooster (known in Italian as a gallo nero) on the neck of the bottle, which indicates that the producer of the wine is a member of the "Gallo Nero" Consortium; an association of producers of the Classico sub-area sharing marketing costs. Since 2005 the black rooster is the emblem of the Chianti Classico producers association. Aged Chianti (38 months instead of 4-7), may be labelled as Riserva. Chianti that meets more stringent requirements, (lower yield, higher alcohol content and dry extract) may be labelled as Chianti Superiore. Chianti from the "Classico" sub-area is not allowed in any case to be labelled as "Superiore".
|Comparative table of Chianti laws of production|
|normal||Classico||Colli Aretini||Colli Fiorentini||Colli Senesi||Colline Pisane||Montalbano||Montespertoli||Rùfina||Superiore|
|Max. grape prod. (t/ha)||9.0||7.5||8.0||8.0||8.0||8.0||8.0||8.0||8.0||7.5|
|Max. grape prod. (kg/vine)||4.0||3.0||4.0||4.0||4.0||4.0||4.0||4.0||4.0||2.2|
|Min. age of vineyards (years)||3||4||4||4||4||4||4||4||4||4|
|Min. wine dry extract (g/l)||19||23||21||21||21||21||21||21||21||22|
|Min. alcohol cont. (%)||11.5||12.0||11.5||12.0||11.5||11.5||11.5||12.0||12.0||12.0|
|Min. ageing (months)||3||10||3||9||3||3||3||6||9||9|
Chianti is not the only traditional wine made in Tuscany, and sangiovese is usually the base of most red variants like Vino Nobile di Montepulciano, Carmignano (together with other grapes), Morellino di Scansano, etc., while Brunello di Montalcino is based on a variant called sangiovese grosso. There are also new wines, based on sangiovese and some popular French grapes that are usually dubbed "Super Tuscans". Due to rule changes, some of these wines (particularly the pioneering Tignanello) could legally be labeled as Chianti if they would reduce the quantity of international grapes under 15% (or under 20% in the case of Chianti Superiore), though many producers of these wines have chosen not to do so.
The word "Chianti" can be used as a semi-generic name in the United States if the place of origin is clearly indicated next to the word to avoid consumer confusion. However, with the popularity of varietal labeling, semi-generic names are rarely used today, even on jug wines.
Due to the wine's relative cheapness, its easy-drinking qualities, and the frequent use of the empty fiasco as a candleholder, Chianti is very strongly identified with Italian American cuisine, especially the "red sauce" variety pioneered by southern Italian immigrants in the late 19th and early 20th century.
Nowadays is common to name Chianti all the central part of Toscana. Often Chianti geographical area is confused with the Chianti wine area or with the Chianti Classico sub-area. Unlike for the wine-area, there is actually no statement describing the actual geographical Chianti area.
In the film The Silence of the Lambs, Hannibal Lecter mentions that he once ate the liver of a census taker "with some fava beans and a nice Chianti." However, as a curiosity, in the book Dr. Lecter says "I ate his liver with some fava beans and a big Amarone".
|
<urn:uuid:d076410f-f06a-438b-a0d6-49a20afd0d4a>
|
CC-MAIN-2013-48
|
http://www.reference.com/browse/Chianti
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164001959/warc/CC-MAIN-20131204133321-00046-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.915583 | 1,552 | 2.53125 | 3 |
A urea transporter is a membrane transport protein, transporting urea. Humans and other mammals have two types of urea transport proteins, UT-A and UT-B. The UT-A proteins are important for renal urea handling and are produced by alternative splicing of the SLC14A2 gene. Urea transport in the kidney is regulated by vasopressin.
The structure of a urea transport family protein from Desulfovibrio vulgaris was determined by x-ray crystallography. The structure has a pathway through the membrane that is similar to that of ion channel proteins, accounting for the ability of urea transport proteins to move up to one million urea molecules per second across the membrane.
Urea transporters can be inhibited by the action of urea analogues like thiourea and glycosides like phloretin. Their inhibition results in diuresis due to urea induced osmosis in the collecting ducts of the kidney.
In mammals, there are two urea transporter genes: UT-A (SLC14A2) and UT-B (SLC14A1). Multiple protein isoforms derived from each gene are produced by alternative splicing and alternative promotors.
Urea transporter A1 transports urea across the apical membrane into the intracellular space of luminal cells in the inner medullary collecting duct of the kidneys. UT-1 is activated by ADH, but is a passive transporter. It reabsorbs up to 40% of the original filtered load of urea.
Urea transporter 3 transports urea into the interstitium of the Inner Medullary Collecting Duct.
Urea transporter 4 has been detected in rat but not mouse kidney medulla.
Urea transporter 5 is not expressed in the kidney but in the testis.
UT-B is widely expressed and has been studied in erythrocytes, kidney, intestine, and at the blood–brain barrier. The SLC14A1 gene codes for the UT-B protein. UT-B is expressed at the basolateral and apical regions of the descending Vasa recta.
- Maciver B, Smith CP, Hill WG, Zeidel ML (April 2008). "Functional characterization of mouse urea transporters UT-A2 and UT-A3 expressed in purified Xenopus laevis oocyte plasma membranes". Am. J. Physiol. Renal Physiol. 294 (4): F956–64. doi:10.1152/ajprenal.00229.2007. PMID 18256317.
- Sands JM, Blount MA, Klein JD (2011). "Regulation of renal urea transport by vasopressin". Trans. Am. Clin. Climatol. Assoc. 122: 82–92. PMC 3116377. PMID 21686211.
- Levin EJ, Quick M, Zhou M (December 2009). "Crystal structure of a bacterial homologue of the kidney urea transporter". Nature 462 (7274): 757–61. doi:10.1038/nature08558. PMC 2871279. PMID 19865084.
- Chou CL, Knepper MA (September 1989). "Inhibition of urea transport in inner medullary collecting duct by phloretin and urea analogues". Am. J. Physiol. 257 (3 Pt 2): F359–65. PMID 2506765.
- Fenton RA, Knepper MA (March 2007). "Urea and renal function in the 21st century: insights from knockout mice". J. Am. Soc. Nephrol. 18 (3): 679–88. doi:10.1681/ASN.2006101108. PMID 17251384.
- Fenton RA (2005). "Urea transporter UT-A". Nature molecule page 18: 679. doi:10.1038/mp.a002589.01.
- Yang B, Verkman AS (September 2002). "Analysis of double knockout mice lacking aquaporin-1 and urea transporter UT-B. Evidence for UT-B-facilitated water transport in erythrocytes". J. Biol. Chem. 277 (39): 36782–6. doi:10.1074/jbc.M206948200. PMID 12133842.
- Collins D, Winter DC, Hogan AM, Schirmer L, Baird AW, Stewart GS (March 2010). "Differential protein abundance and function of UT-B urea transporters in human colon". Am. J. Physiol. Gastrointest. Liver Physiol. 298 (3): G345–51. doi:10.1152/ajpgi.00405.2009. PMC 3774180. PMID 19926813.
- Dahlin A, Royall J, Hohmann JG, Wang J (May 2009). "Expression profiling of the solute carrier gene family in the mouse brain". J. Pharmacol. Exp. Ther. 329 (2): 558–70. doi:10.1124/jpet.108.149831. PMC 2672879. PMID 19179540.
|
<urn:uuid:51a687d3-ec01-4d3a-a313-8f44d44cb320>
|
CC-MAIN-2014-23
|
http://en.wikipedia.org/wiki/Urea_transporter
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776421879.69/warc/CC-MAIN-20140707234021-00065-ip-10-180-212-248.ec2.internal.warc.gz
|
en
| 0.70177 | 1,114 | 3.28125 | 3 |
How should traditional notions of terrorism be modified to accommodate the new phenomena of cyberterrorism? An answer to this question will be provided by examining the components of Thomas Perry Thornton's definition of terror: "a symbolic act designed to influence political behavior by extranormal means, entailing the use or threat of violence."26
a. Symbolic Violence
Terrorism, it is often noted, is the weapon of the weak against the strong. Terror is utilized to overcome seemingly insurmountable odds facing terrorists if they were to pursue their cause with conventional military means. Terrorists will typically strike out against targets that will resonate with the group the wish to influence. Thornton states that "the relatively high efficiency of terrorism derives from its symbolic nature. If the terrorist comprehends that he is seeking a demonstration effect, he will attack targets with a maximum symbolic value."27 While Thornton is primarily concerned with insurgency, the value of attacking a symbolic target is applicable to terrorism. As an even weaker entity than the revolutionary, the terrorist must strike out against symbolic targets in hopes of gaining publicity and garnering support for a cause. If the cause is the eventual overthrow of the government, then the terrorist must attempt to build this support into an effective insurgency. Thornton continues to state that most important symbolic targets for terrorist/insurgent, "are those referring to the normative structures and relationships that constitute the supporting framework of the society."28 If these symbolic targets are destroyed, then the insurgent has succeeded in isolating individuals from the society in which they formerly felt secure and protected. In the information age, some of the structures that constitute the "supporting framework" of society are likely to be the high technology networks that allow individuals to communicate, access their money, and be employed. Thus, they are ideal targets for symbolic violence.
The intention of the terrorist or insurgent must be used to evaluate the "symbolic" nature of the chosen target. Intent drives the symbolism. An examination of the intent helps to differentiate between simple crime, which already exists in both the physical world and cyberspace, and terrorism. Philip Karbar highlights this distinction:
The symbolic concept of terrorism provides two crucial distinctions between terrorism and revolution and between terrorism and other forms of violence. If the objective of violence is the acquisition of useful objects (money, weapons, etc.) or the denial of such resources from the enemy, this action is robbery, assassination, sabotage, etc., "if, on the other hand, the objective is symbolic expression, we are dealing with terror" (Thornton). this highlights the distinction between terrorism and revolution, for symbolic violence can be used not only to propagandize the overthrow of a system, but also as a means of interest articulation to effect the system's output. When the "establishment" is unwilling to listen to nonviolent protest, terrorism permits the frustrated communicator, as staged by one terrorist, "to maximize significance and minimize getting caught."29
The cases examined in Chapter IV highlight the ability of criminals to perpetrate crime in cyberspace, all that remains for terrorism to follow is a shift in the intent of the actors.
Through information warfare attacks, cyberterrorists can utilize non-physical symbolic violence to articulate their message. Cyberterrorists can now manipulate a mass communication medium to convey a message directly, rather than relying on potentially incorrect or "slanted" reporting of an act of symbolic violence. The increasing ability to reach millions of individuals directly on the Internet or via a Direct Broadcast Satellite system offers "frustrated communicators" a non-violent alternative route to publicity.
Alex P. Schmid divides the symbolic value of terrorist acts into two separate categories. The first, denotative, categorizes those events that are "specifically and literally referring to an object or event." The second category, metaphorica, refers to a target that stands for "something other than what it appears to be.30 These two distinctions will become increasingly "fuzzy" in the third wave if a state's high technology networks (upon which it relies for national security, wealth, and connectivity) become the target of terrorists. The goals of the terrorist may be to garner attention (metaphorical) and weaken some economic or defense system (denotative) through attacking a network.
b. Influence on political behavior
The second element of Thornton's definition is that terror is an "act designed to influence political behavior." This portion of the definition focuses on political terrorism vice other forms, such as criminal or pathological terrorism. While no universally accepted definition for terrorism exists in the literature, political terrorism is concerned with changing the actions of either the incumbent regime (insurgent terrorism), other groups (vigilante terrorism), or the population at large (regime or state terrorism).31 The introduction of information warfare techniques will affect the conduct of all three types of terrorism but not the terrorist's intention to influence political behavior.
The extranormality of terrorist means and targets is critical to understanding the effectiveness of terrorist violence. Schmid states that, "normal occurrences lead to standardized responses and coping mechanisms. Terrorist violence breaks the pattern of normal human actions."32 It is precisely because terrorist actions fall so far outside the "norm" of violence accepted in society that they generate such an extraordinary reaction. Schmid identifies five elements of extranormality: the weapon, the act, the time and place, covert and clandestine nature, and violation of rules of conduct.
(1) The Weapon. Terrorists have a long history of utilizing "common" weapons such as knives, guns, and bombs to commit acts that exist outside the realm of accepted behavior (murder, assassination, airline and embassy bombings). These weapons take on new dimensions in the minds of the victims and target audience. The fear of the unknown and the increasing potential of terrorists utilizing Weapons of Mass Destruction (WMD), as evidenced by the sarin gas attacks in Tokyo, produces terror as a result of such powerful weapons being controlled by a sub-state, non-sanctioned actor. As the information age arrives, the possession of information warfare skills by smaller and smaller groups of individuals may signal the arrival of a new WMD, a Weapon of Mass Disruption, in which bother the state and sub-state actors are equally equipped to inflict this disruption.
(2) The Act. While the use of chemical weapons and the destruction of buildings has been commonplace in the "normal" realm of state on state warfare, gassing civilians in a subway and the destruction of an embassy, airplane, or federal building with a bomb clearly lies outside the bounds of accepted, and even criminal, behavior. Since a cyberterrorist act has yet to be committed, the first act will, by definition, be outside the bounds of the normal. At the very least, it will be unique.
(3) The Time and Place. The third extranormal element is the time and place of the attack. In terrorism, there is no "declaration of war" between two states that prepares the population for violence between the state and an enemy. Thus, a terrorist attack is usually a "bolt from the blue," designed to create terror in the target audience due, in part, to its unexpectedness. As Schmid states:
The place of the terrorist act is also unpredictable. There are no frontlines, there is no battlefield. The sudden outbreak of violence can occur at home, during a sportive event or in a cinema, in a barroom or on the marketplace-places which have the character of zones of peace. The contrast between the familiar surroundings and the violent disruption enhances the fear. Their is a sporadic, irregular pattern to the violence, whereby no one can be really certain that he is not facing imminent danger the very next moment. The thought where and when the next attack will take place and who will be the victim is on everybody's mind of those who belong to the targets of terror.33
The ability to stage an attack nearly anywhere is an element that will become increasingly important in the information age. If terrorists wish to attack a state's key networks utilizing information warfare methods, the will be able, from one location, to attack either parts of the system or the entire system itself. The "no frontlines or battlefield" situation is already reality in "cyberspace" where there are no borders. Using information warfare methods for attack allows a terrorist on the other side of the world to pose the same level of threat as one in the room next door.
(4) Covert and Clandestine Nature. This applies equally to insurgent and state terrorism. An insurgent terrorist group must, be design, remain covert and clandestine to continue to operate. The dawn of the information age presents new tools for a terrorist organization to communicate securely with its members while simultaneously enhancing the clandestine nature of the group. Additionally, the information age provides another set of tools to the anti-terrorist forces for use against the terrorist.
(5) Violation of rules of conduct. Couples with the lack of a battlefield or front line is the lack of any rules of engagement or laws of war. The Geneva Convention does not apply to terrorists or their victims. Schmid again highlights the effect this has on individuals:
The adherence to social norms in human interactions makes behavior predictable and thereby contributes to a sense of security. Whenever manmade violence occurs we look for a reason and generally find it in a breakdown of the actor-victim relationship. the terrorist, however, has generally not had such a relationship at all. The victim is often not his real opponent, he is only an object to activate a relationship with his opponent. the instrumentalization of human beings for a cause of which they are not part in a conflict in which they are often not active participants strikes many observers as extranormal.34
The victims in cyberspace will never "see" their attacker, nor are they likely to have any relationship with their attackers in the "real" world. Rather, the interaction will occur exclusively in the anonymous realm of cyberspace.
In summary, the "extranormal means" of a terrorist act are designed to prevent the victim or the target audience from placing the event into a known framework. The inability to classify the threat or devise a solution utilizing normal procedures leads to the creation of terror. Thornton states, "knowledge and understanding of the source of danger provide the victim with a framework within which he can classify it, relate it to his previous experience, and therefore take measures to counter it."35 If the cause of the danger is unknowable and unpredictable (i.e., caused "randomly" by terrorists), a state of anxiety, characterized, "by fear of the unknown and unknowable" will be achieved. If the threat is great enough, the result is a state of despair characterized by the perception of the threat as "so great and unavoidable that there is no course of action open to him that is likely to bring relief."36 As the reliance on computerized systems for the conduct of everyday like increases, the level of disruption and disorientation that would be caused by their failure also increases.
The final element of Thornton's definition of terror, "entailing the use or threat of violence" deserves close attention as the ability to threaten or use physical violence in cyberspace is nonexistent. Thornton bluntly states that, " a nonviolent program could hardly qualify as terrorism."37 Unfortunately, the varying definitions of violence in the literature on terrorism are second only to the varying definitions of terrorism itself. A critical component of most definitions is that violence entails physical harm to a person or object. Paul Wilkinson's definition is a good representation of the "physical" school:
[V]iolence is defined as the illegitimate use or threatened use of coercion resulting, or intended to result in, the death, injury, restraint or intimidation of persons or the destruction or seizure of property.38
As terrorism moves into the information age, the definition of violence must include cyberviolence. While the destruction of data is not a physically violent act, and will not always place a human life in jeopardy, it should still be treated as terrorism. If the goal of the cyberterrorist is to create terror, the best course of action may be to resort to a physically violent act, or attack a computer system that will place lives in immediate jeopardy, such as aircraft control system. If cyberterrorists are unable to create the perception of a physical risk to their audience, they will be unable to create a sense of terror. They may, however, be able to fulfill several other objectives of terrorism.
Thornton addresses several objectives in his examination of terror as a weapon. The first objective is morale-building within the terrorist group. The second objective is advertising, in which the group attempts to announce its existence and place its concerns before the target audience. Terrorists have historically used this "propaganda of the deed" to force debate on their goals. The recent bombing of the Murrah Federal building in Oklahoma City is an example of how a symbolic target can force debate on issues far afield from the actual terrorist event. In this case, not only the building (which housed numerous federal agencies), but the data (anniversary of the resolution of the Waco, TX standoff between the BATF and the Branch Davidians) were symbolic. The symbolic nature of the attack riveted the nation's attention on the subsequent Waco and Ruby Ridge hearings in Congress and re-ignited a controversy over the conduct of several government law enforcement agencies.
When attempting to change the government through an insurgency, another objective, according to Thornton, becomes critical to the terrorist:
Disorientation is the objective par excellence of the
terrorist, removing the underpinnings of the order in which his targets
live out their daily lives. The primary responsibility of any incumbent
group is to guarantee order to its population, and the terrorist will attempt
to disorient the population by demonstrating that the incumbent's structure
can not give adequate support.
The demonstration is, however, but one aspect of the disorientation process. On a much deeper level, the objective is the isolation of the individual from his social context. The ultimate of the terrorization process, as Hannah Arendt conceives it, is the isolation of the individual, whereby he has only himself upon whom to rely and can not draw strength from his customary social supports.39
If the information age continues to create a society that is dependent on computers for communication and basic order, the disruption of these computers will be critical for the creation of disorientation. A government must ensure that those systems upon which it relies to maintain order and control are adequately defended against attack by terrorists and insurgents. In the United States, where 95% of the communications needs of the military are carried on the Public Switched Network (PSN), composed entirely of commercial carriers such as AT&T and MCI, it has been difficult to determine the proper role of the government in ensuring the security of these systems.40
A final objective of a terrorist organization is provoking a response by the incumbent group. Terrorists cannot directly control the government response to an act of symbolic violence. Often, a terrorist organization will commit a violent act in hopes that the government will over-react in its response. While there may be pressure to "do something" against the terrorists, the terrorist organization can only start the process of government action, not control it. As such, the government must take care not to play into the hands of the terrorist organization by over-responding.
Ideally, suppression should be accomplished by routine methods of law enforcement, but if the terrorists are effective-and especially if the incumbents perceive themselves to be in a crisis situation-it is almost inevitable that extraordinary repressive measures will be taken. In combating an elusive terrorist, the incumbents will be forced to take measures that affect not only the terrorist but also his environment, the society as a whole.41
The repressive nature of the countermeasures on society as a whole lead to a confirmation of the terrorist's statements against incumbents. In attempting to punish the terrorists, the government often punishes the people, leading to further disorientation and a fixation of blame onto the incumbents for the terrorist actions. This action-repression spiral is a key component of a terrorist group seeking to cause government overreaction.
The terrorist and government actions may, however, have the exact opposite effect from that just discussed. Ted Robert Gurr has labeled the negative aspects discussed by Thornton "backlash."42 When a terrorist commits a violent act, there is always a risk that the action will be seen as so completely unacceptable that support from within the group will be withdrawn. This phenomenon also exists outside the group. The general population will blame the terrorist and not the government for their suffering and will tolerate, if not welcome, repressive measures to eradicate the terrorists. Terrorists may ameliorate this problem through the use of cyberterror, in which they can attack symbolic targets in cyberspace without the need to kill "innocents" in the physical world. Destroying a computer or its data is unlikely to elicit the same emotional reaction as killing children.
All of the above can be summarized in the concept of the "tactical path" (Figure 2) that both the government and a terrorist group must follow. This concept, postulated by Dr. Gordon McCormick of the Naval Postgraduate School, states that there is both a Vmin (minimum level of violence) and a Vmax (maximum level of violence) that is acceptable to 1) the terrorist group's members and supporters, 2) society at large (the target audience). If a terrorist organization falls below the Vmin then it will lose its "place in the spotlight" and be relegated to the level of a nuisance or petty crime that is not worthy of the emotionally and politically charged term terrorism. If a terrorist group crosses the Vmax, then it will experience backlash losing support from within and raising the level of repression that the government can use to defeat the terrorist group. The government's tactical path is similarly bounded. If it falls below the Vmin the public will perceive it as not responding to the terrorist situation. If the government response exceeds the Vmax the public will perceive it as unduly repressive, thereby fulfilling one of the terrorist's main objectives of provoking an excessively harsh and repressive countermeasures campaign.
Figure 2. Tactical Path
While cyberviolence enables the terrorist to attack symbolic targets without resorting to physical violence, there is likely a similar "tactical path" for cyberviolence. The critical difference between cyberterror and conventional terror is disruption vice destruction. As such, the bounds of the two tactical paths are different. If terrorists use cyberviolence to kill individuals (through failure of critical computer controlled safety systems) the public will evaluate their actions on the conventional terrorism "tactical path" since the results of the action include destruction. If the event causes disruption exclusively, it will then be evaluated on a cyberterrorist tactical path. While the upper and lower bounds of each path are somewhat fluid, a general understanding of the limits is possible. The Vmax of cyberterrorism, judged in the number of people disrupted, is likely to be an order of magnitude greater than that of conventional terrorism in which people are killed. While several events, such as the shutdown of Japanese rail systems and the Internet (discussed in Chapter IV) disrupted millions of people, both the public and government responses were muted in comparison to the sarin gas attacks on the subways in Japan and the bombing of Pan Am 107 over Lockerbie. We have not yet seen a group cross the Vmax on the cyberterror tactical path.
Information warfare attacks can be a form of symbolic violence but can they create terror? We have seen that the components of symbolic violence are many and varied, with the critical target for insurgents being the social system of their target audience. In conventional terrorism one of the main objectives of terrorist act is the creation terror. This is best done by removing individuals from society and placing them in some form of physical jeopardy. Do information warfare tactics and techniques offer a terrorist the ability to do both at once? The exploding reliance on computers and telecommunications in the "third wave" world have created a definite vulnerability in the information age.
The sinews of the post-industrial society are already taking shape -- the network of electronic data-processing and communications -- and these sinews are already becoming more vulnerable to disruption and terrorism. The service industries, in particular, are increasingly inter-independent, and ripe for attack by fraudsters, hackers, eavesdroppers, disrupters, and extortionists.43
Indeed, the actions of hackers have left no doubt about the vulnerability of the world's computer systems. President Bush addressed this vulnerability at the highest levels of the U.S. government with the release of National Security Decision Directive 42 in 1990.
Telecommunications and information processing systems are highly susceptible to interception, unauthorized access, and related forms of technical exploitation as well as other dimensions of the foreign intelligence threat. The technology to exploit these electronic systems is widespread and is used extensively by foreign nations and can be employed, as well, by terrorist groups and criminal elements.44
The capability clearly exists to target the new "sinews" of our computer networked society. As evidenced by the Morris worm attack, it requires no external state support. Rather than being heavily dependent on money, people, and force in the manner of conventional terrorism, it is primarily dependent on information and knowledge of how to penetrate systems.
In the information age, the value of our networks to national security, government, and business is increasing at an exponential rate. Our financial networks, which move trillions of dollars a day, are an often cited example of the damage a terrorist attack on them would cause.45 This ability to move money electronically is vital to our economic well being and is a symbol of United States wealth and power. In the same way that U.S. embassy buildings and civilian aircraft were attacked as symbolic targets in the 70s and 80s, the networks that are manifestation of U.S. economic and political strength may become targets in the future. That the networks are vulnerable and a symbolic target does not automatically dictate that they will become targets of terrorist organizations. Rather, the efficiency with which these targets can cause fear, anxiety, and despair through terror will dictate when, if ever, terrorists will attack them.
Terror is a psychological state that can be sparked through physical acts. The "use or threat of violence" in the definition of terror as forwarded by Thornton exists exclusively in the physical world and does not "exist" in the same form in cyberspace. Terrorists can achieve the goal of disorientation at an individual level, "by physically withdrawing the individual from this environment and isolating him (as in "brainwashing" techniques)." Since a terrorist organization cannot isolate each person in its target audience, it uses symbolic violence in an attempt to destroy the social framework of society so that the individual thinks he is alone in his anguish even though he may be physically undisturbed.46
In the information age, relationships are increasingly being built upon the "Global Network.." This may give rise to the popular concept of a "Global Village." Communities of individuals separated by thousands of miles and state borders are springing up every day. These "virtual communities" only exist through the "cyberspace" connection afforded by new communications and computing technology. These communities are an ideal target for isolation by "cyberterrorists." While isolating the members of these communities from each other temporarily is possible for a terrorist group, the members are likely to have ties to a local community that provides their primary "social framework."47 If the members of the group relied entirely on their virtual community for their social framework, however, then a small group of people could effectively achieve the goal of disorientation within that virtual community as its members are already physically separated from one another. Removing their "cyberspace" ties with one another is an effective way to begin their isolation. Depending on how terrorists carry out the disruption of connectivity between the members, it could last for several hours, days, or weeks. With the increasing redundancy of telecommunications assets, it is unlikely that service would be disrupted for more than this period of time. the same disruption of service may occur through "natural" means, (fire, flooding, natural disaster) and would cause some concern within the community but would not create terror. That the same end result (disruption of service) does not produce the same psychological reaction is based on the individual's perception of the problem. The disruption and isolation generated by "natural causes" fits readily within the victims' cognitive framework allowing them to take actions to overcome their difficulties. If a terrorist organization covertly causes a low level of disruption, the citizens of the virtual community will not be able to classify the threat or they will classify the threat as the actions of "hackers," petty criminals, or as a government conspiracy. Only when the level of disruption escalates and cannot be controlled or understood by the "virtual citizens," will terrorists create anxiety and despair. For a cyberterrorists to be taken seriously, they must cause massive damage to their "cybertargets" to avoid the attack being evaluated within the public's know framework. If the terrorist wants to perform a "soft-kill" on a major system, the amount of information (hard to obtain) required is extraordinary while the amount of equipment (easy to obtain) is minimal. While it is more "elegant" to bring down a system with no visible signs through programming, it is far easier to bomb a "key node" in the computer system with explosives to disable its power or information flow. The networks connecting virtual communities are lucrative targets because they span conventional country borders and exist exclusively in cyberspace.
The "control" of cyberspace is a scam in U.S. society that a terrorist organization can exploit. The uproar generated by the U.S. government's proposal to mandate a specific hardware encryption method (the Clipper chip for telephones), which would still allow for government surveillance, highlights the lack of popular government solutions to problems in cyberspace. In addition, the government dismantled the National Science Foundation network (a major Internet backbone) in April 1995. Commercial service providers have taken over the services provided by the NSFNet.48 While in the past, access to the Internet was nearly exclusively via educational, government or scientific institutions, at present, commercial connections and "host" computers are growing rapidly. The commercial (com) domain is the fastest growing sector of the Internet over the last two years and the growth continues at an exponential rate.49
Since cyberspace is essentially uncontrolled by any government or individual, a question of who is responsible for its defense will be asked in the wake of sustained attacks. If no satisfactory answer is provided, the terrorists may be able to shift the target audience's anger toward the group (most likely the government) that they believe should be responsible for maintaining the security of cyberspace. Since the virtual community will most likely span several different countries, the opportunity exists for a terrorist to affect a worldwide target audience and achieve maximum impact for minimum effort.
While "cybercommunities" are vulnerable to information warfare attack can terrorists influence U.S. society at large via Information Warfare? Can they truly create terror by exploding software bombs instead of fertilizer bombs? The answer may lie in the increasing levels of computerization in everyday life and the blind faith that is coming to be placed in computers. The importance of these computers is discussed by Winn Schwartau:
In 1968, Marshall McLuhan said that emerging information networks are "direct extensions" of our own nervous systems. Losing an ATM machine, according to that reasoning, is the equivalent of a leg or an arm. People panic when their computer goes down.50
A terrorist blowing up or hijacking an airplane has a definite impact on the public. It is a media event that is widely publicized and speculation runs rampant over who committed the crime and for what reason. It is likely to cause fear in the public and perhaps anxiety in some. Some travelers may, due to their fear, opt not to use air transportation. In the majority of cases, the act of blowing up the airplane is not meant to punish the passengers, or even to deter air travel, but rather it is a symbolic act meant to bring the terrorist issue into the forefront of the media and thus, the world's attention. To create terror in the general public, there must be some perceived threat of violence. The large percentage of the population that has, and will, use air transportation can identify with the passengers who are killed in a plane bombing. They begin to ask, "Am I next?" an "Do I have any control over this situation?" While McLuhan may have been right in saying that networks are becoming an extension of our nervous systems, it is unlikely that individuals will value them as highly as arms or legs. When one or many ATMs go down, there is little hope of terror being created as a result. There is no threat to the physical well being of the ATM user. This situation, if caused by cyberterrorists, may cause anger and frustration, but causing terror is unlikely. If, on the other hand, ATM machines started to electrocute their users on a seemingly random basis, it may provoke a sense of terror in the ATM user community.
In an unlikely twist of fate, the World Trade Center bombers did cause a large number of individuals to lose access to their money via ATM machines. A major snowstorm on the East Coast of the United States caused the roof of Electronic Data Systems (EDS) Corporation's New Jersey computer center to collapse. The backup plan for EDS was to relocate their operations to an alternate site. Unfortunately, companies that the World Trade Center bombing displaced were using the EDS backup site. As a result, the ATMs that EDS serviced were forced to shut down, affecting 6% of the 83,000 teller machines in the United States. While damaging the EDS, the individual bank customer lost no data or money. In fact, the redundancy of the ATM communications system, with many machines being served y several different networks (Plus, Cirrus, etc.), 98% of those affected by the EDS outage had alternate access to their money via a different network.51 The loss of ATMs, while not directly intended by the bombers, did not cause massive panic or a run on any bank. The flexibility and redundancy of the existing networks, although individually vulnerable to disruption, were sufficient to allow the flow of money to continue without major interruption. This incident highlights the difficulty that a technoterrorist may face in the future with the increasing redundancy and multiple networking of vital systems. When one or several nodes are destroyed, the signals normally processed by that mode are simply rerouted to another node to reach their destination. With the increasing reliance on centralized switching in the telephone industry, the loss of just one switch can have widespread effects, as demonstrated by the 1988 fire that destroyed a Chicago area switch and resulted in the shutdown of O'Hare Airport and the loss of telephone service to a widespread area. Should cyberterrorists attack several nodes simultaneously, they may be able to create a disruption that would be more widespread than the physical destruction of just one node. While the cyberdisruption is likely to be larger, its effects will be less permanent than the physical destruction caused by conventional or techno-terrorists.
Brian Jenkins highlights the difficulty that information warfare attacks have in generating terror:
Will we see a more sophisticated 'white collar' terrorism, that is, attacks on telecommunications, data-processing systems, or other targets intended to produce not crude destruction but widespread disruption? Perhaps, but disruptive 'terrorism' of this type does not appear to be particularly appealing to today's terrorist groups. Such operations are technically demanding, and they produce no immediate visible effects. There is no drama. No lives hang in the balance. There is no bang, no blood. They do not satisfy the hostility nor the publicity hunger of the terrorists.52
In the future, terrorists may no longer need terror or physical violence to create the disruption and publicity that they desire. While the "kinder and gentler" cyberterrorist of tomorrow may be able to create disruptions without resorting to conventional destructive tactics, these information warfare skills may be used to augment the destructive nature of acts committed by conventional terrorists. The level of destruction and chaos caused by an act can be increased by interfering with the authorities ability to communicate and respond.
Information age terrorism, in its cyberterror form, may be non-violent and not directly utilize terror. It must, however, be treated as terrorism as it will fulfill nearly all the other objectives of terrorism and poses a serious risk to information dependent societies.
Table of Contents
|
<urn:uuid:b32ce50a-46bb-4d01-b68e-df12b6a7c97e>
|
CC-MAIN-2014-15
|
http://www.fas.org/irp/threat/cyber/docs/npgs/ch3.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521558.37/warc/CC-MAIN-20140416005201-00506-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.943876 | 6,691 | 2.625 | 3 |
With Lily heading off to school in September, we’re really trying to keep her enthusiasm in learning alive. We try to make it fun and enjoyable so that when she does head off, she’s interested and receptive to it. We were delighted to be sent these fun chalkboard books form Quarto Kids.
Chalkboard Concepts is a range books designed to make learning to write and draw fun. The brilliant bit about them is that because it’s a chalkboard, you can wipe them away easily and try again. In the past, I’ve found traditional learning books difficult because Lily only has one chance to get it right and children need to repeat things to learn them. It’s like when children learn to walk, they can’t do it in one go, they need to keep trying and get steady on their feet first and that’s what these books do, they let your child build their skills from scratch.
We started with the shapes book. I’ve always been a bit concerned as Lily will never sit and draw shapes. She’d rather mimic writing a letter or something similar and I want to encourage her to draw different things through using different shapes. I also like to help her develop her counting skills with shapes e.g. “How many circles are there?” The book has a few shapes and what’s lovely is that they’re different sizes as well. This will help Lily learn to control the pen and her movement more, working those fine motor skills in the processes.
The biggest challenge for us has been letters. Lily can recognise a lot of letters now and can also spell and write her name, but beyond that, she seems really unsure. She’ll happily write her name but ask her to copy anything else and she shuts off. These books have helped us start to overcome that. She’s still hesitant, but at least now, she will write over the outlines of the letters. I think where the book shows her the outline, she has an idea of what she needs to do, but seems to struggle sometimes translating that to a more independent approach. I also think these books could be great tools for those who want to try home schooling their children or want to help encourage their children at home outside of normal nursery/ school hours.
These books also help encourage learning in other areas. The numbers book as a short quiz at the end that involves counting, then writing the answer. This gets your child thinking about what they’ve learnt in the book previously and to make that connection between what they’ve counted and how to display that in writing. We were really impressed when Lily was able to count up the balloons then write the correct number in the space provided. Before should would count easily, but showed no interest in writing an answer.
The only downside I have to these is more of a practical one and that’s the chalks themselves. It would be great if they mimicked the style of a pencil, so had more of a point at the end for ease. I also think by doing that, it can help develop the correct way to hold a pencil and just get those skills into practice before school.
I found myself getting crafty with Lily’s to try and get this style. Other than that, I really love this range! They’re great to take with you to visit people, mini breaks and more. We took one book along with us to lunch with my dad and it was something that everyone could get involved in which I loved, I’m a big fan of anything that aims to bring the family together.
You can order your copies now online via Amazon UK from only £7.99! To order, Click Here
#reading #writing #education #shapes #learning #development #finemotorskills #alphabet #numbers #children #parenting #youngmums #youngdads #youngparents #homeschool #prepeducation #nursery #earlyyears #pbloggerreview #bloggerreview #chalkboardconcepts #quartokids
|
<urn:uuid:da64c150-3a55-4561-857f-782f792f5c62>
|
CC-MAIN-2020-24
|
https://www.youngmummysurvivalguide.com/post/2018/01/29/learning-to-write-can-be-fun
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413406.70/warc/CC-MAIN-20200531120339-20200531150339-00350.warc.gz
|
en
| 0.975341 | 853 | 2.765625 | 3 |
Get Help Online Resources Support Leaflets No.56 in a series of Help Yourself Leaflets View and download our leaflet here Diarrhoea can be due to a number of factors including treatment, medication, infection, stress or anxiety.Whatever the cause of diarrhoea a temporary change in diet often helps. As your symptoms improve you may wish to discuss returning to your normal diet with a health professional. Useful tips: Drink plenty of fluids such as water, squash or soup. Aim for at least 8 - 10 cups of fluid throughout the dayEat small frequent meals Try to avoid highly spiced and fatty foods as these may irritate your bowel Try cutting down your fibre intake by replacing wholemeal bread and cereals with white varieties Try cutting down on raw or dried fruit and vegetables with skins, seeds or pips. Also try cutting down on beans and pulses Limit alcohol, coffee and strong tea with caffeine Avoid excessive amounts of artificial sweeteners, which can be found in many sugar-free or diet food and drinks. If diarrhoea persists, it is best to consult your doctor to determine the cause and get treatment. This information is for general advice only. If you have been advised to follow a special diet then continue with this. For further advice speak to your Doctor, Nurse or Dietitian.
|
<urn:uuid:655aa981-090b-460a-82ed-49eab43b1756>
|
CC-MAIN-2017-43
|
https://www.wessexcancer.org.uk/diarrhoea
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187827662.87/warc/CC-MAIN-20171023235958-20171024015958-00146.warc.gz
|
en
| 0.933448 | 263 | 3.125 | 3 |
•English pupils 'better at problem-solving
than tackling core academic subjects'
•PISA results table: creative problem solving
•OECD education report: academic subject results in full
•OECD education report: Test your maths
A new international league table, published today, shows that England is ranked 11th in the world based on performance in problem solving.
This is compared to results in academic subjects, when England was ranked 25th for maths, 18th for science and 23rd for reading.
This suggests that teenagers in England are better at solving problems they have never met before, than traditional academic disciplines.
Below are four sample questions that were given to 15 year olds. However, differing to the questions below, the test these students took in 2012 was actually interactive, thus making it difficult to give examples of all the questions pupils would have tackled.
How long do these take you? Answers are at the end.
Question one: It's Alan's birthday and he's having a party.
Seven other people will attend. Everyone will sit around the dining table. The seating arrangement must meet the following conditions.
Amy and Alan sit together.
Brad and Beth sit together.
Charles sits next to either Debbie or Emily.
Frances sits next to Debbie.
Amy and Alan do not sit next to either Brad or Beth.
Brad does not sit next to Charles or Frances.
Debbie and Emily do not sit next to each other.
Alan does not sit next to either Debbie or Emily.
Amy does not sit next to Charles.
Where should everyone sit?
Guests: Amy, Brad, Beth, Charles, Debbie, Emily, Frances
Question two: Here is a map of a system of roads that links the suburbs within a city.
The map shows the travel time in minutes at 7.00am on each section of road.
Julio lives in Silver, Maria lives in Lincoln and Don lives in Nobel. They want to meet in a suburb on the map. No one wants to travel for more than 15 minutes.
Where could they meet?
Question three: Using the same map above
Pepe is at Sakharov and wants to travel to Emerald. He wants to complete his trip as quickly as possible.
What is the shortest time for his trip?
Question four: A new robotic vacuum cleaner is being tested.
If it meets a red block it turns a quarter circle, anti clockwise (90 degrees) and moves forward until it meets something else.
If it meets a wall it turns a half circle (180 degrees) and moves forward until it meets something else.
Yellow blocks can be pushed, until they meet an obstacle (a red block or a wall). If it meets an obstacle it turns a half circle (180 degrees) and moves forward until it meets something else.
The vacuum cleaner is facing the left wall. By the end of the sequence it has pushed two yellow blocks.
If, instead of facing the left wall at the beginning of the animation, the vacuum cleaner was facing the right wall, how many yellow blocks would it have pushed by the end of the sequence?
One: There are twelve possible correct solutions (6 solutions, each with a corresponding mirror image solution)
Alan-Amy-Emily-Brad-Beth-Charles-Debbie-Frances (and its mirror).
Alan-Amy-Emily-Brad-Beth-Frances-Debbie-Charles (and its mirror).
Alan-Amy-Frances-Debbie-Brad-Beth-Emily-Charles (and its mirror).
Alan-Amy-Frances-Debbie-Beth-Brad-Emily-Charles (and its mirror).
Alan-Amy-Debbie-Frances-Beth-Brad-Emily-Charles (and its mirror).
Alan-Amy-Emily-Charles-Beth-Brad-Debbie-Frances (and its mirror).
Two: Either Park OR Silver
Three: 20 minutes
Four: One yellow block
The questions above are sample questions from the OECD Creative Problem Solving test, but they are presented here without the interactive element, which, especially in the case of question four, could have made them harder.
|
<urn:uuid:bfc6d6f3-f3a9-4732-a117-50ab4cce8602>
|
CC-MAIN-2014-41
|
http://www.telegraph.co.uk/education/educationnews/10735012/OECD-problem-solving-test-how-good-are-you.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663743.38/warc/CC-MAIN-20140930004103-00376-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.936747 | 873 | 2.609375 | 3 |
Also known as: mycormycosis, phycomycosis
- Infection caused by ubiquitous saprophytic fungi of several genera, including Mucor, Absidia, Rhizopus, Cunninghamella and Circinella
- Mainly affects immunocompromised hosts, in whom infection can be fatal
- Five clinical forms: rhinocerebral, pulmonary, gastrointestinal, cutaneous and disseminated
- There are two described variants of cutaneous zygomycosis:
- Subacute: Affects healthy hosts exposed to contaminated adhesive tape. Vesicles and pustules progressing to eschars.
- Rapidly progressive: Affects immunocompromised hosts. Necrotic black crust surrounded by cellulitis; may progress to disseminated disease.
- Extensive necrosis
- Vascular damage with fungal hyphae invading vessels (angioinvasion)
- The hyphae are visible on both H&E and special fungal stains. They are broad, normally nonseptate (although an occasional septum may sometimes be seen) and empty appearing ("ribbon like") with nonparallel walls and right-angle branching.
|
<urn:uuid:3ec3dd8f-0224-4437-8c4c-29693f6c33ea>
|
CC-MAIN-2014-10
|
http://www.dermpedia.org/dermpedia-textbook/zygomycosis
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999671637/warc/CC-MAIN-20140305060751-00025-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.886244 | 253 | 3.015625 | 3 |
Though present-day Ethiopia is a land of great ethnic diversity, the majority of Ethiopians speak different Semitic, Cushitic, and Omotic languages that belong to the Afro-Asiatic linguistic phylum. Maternal lineages of Semitic- (Amharic, Tigrinya, and Gurage) and Cushitic- (Oromo and Afar) speaking populations studied here reveal that their mtDNA pool is a nearly equal composite of sub-Saharan and western Eurasian lineages. This finding, consistent with classic genetic-marker studies (Cavalli-Sforza 1997) and previous mtDNA results, is also in agreement with a similarly high proportion of western Asian Y chromosomes in Ethiopians (Passarino et al. 1998; Semino et al. 2002), which supports the view (Richards et al. 2003) that the observed admixture between sub-Saharan African and, most probably, western Asian ancestors of the Ethiopian populations applies to their gene pool in general.
Am. J. Hum. Genet., 75:000, 2004
Ethiopian Mitochondrial DNA Heritage: Tracking Gene Flow across and around the Gate of Tears
Toomas Kivisild et al.
Approximately 10 miles separate the Horn of Africa from the Arabian Peninsula at Bab-el-Mandeb (the Gate of Tears). Both historic and archaeological evidence indicate tight cultural connections, over millennia, between these two regions. High-resolution phylogenetic analysis of 270 Ethiopian and 115 Yemeni mitochondrial DNAs was performed in a worldwide context, to explore gene flow across the Red and Arabian Seas. Nine distinct subclades, including three newly defined ones, were found to characterize entirely the variation of Ethiopian and Yemeni L3 lineages. Both Ethiopians and Yemenis contain an almost-equal proportion of Eurasian-specific M and N and African-specific lineages and therefore cluster together in a multidimensional scaling plot between Near Eastern and sub-Saharan African populations. Phylogeographic identification of potential founder haplotypes revealed that approximately one-half of haplogroup L0–L5 lineages in Yemenis have close or matching counterparts in southeastern Africans, compared with a minor share in Ethiopians. Newly defined clade L6, the most frequent haplogroup in Yemenis, showed no close matches among 3,000 African samples. These results highlight the complexity of Ethiopian and Yemeni genetic heritage and are consistent with the introduction of maternal lineages into the South Arabian gene pool from different source populations of East Africa. A high proportion of Ethiopian lineages, significantly more abundant in the northeast of that country, trace their western Eurasian origin in haplogroup N through assorted gene flow at different times and involving different source populations.
|
<urn:uuid:228bd427-761e-4b07-9eb9-4cebd6704740>
|
CC-MAIN-2014-23
|
http://dienekes.blogspot.com/2004/09/ethiopian-and-yemeni-mtdna.html?m=0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270399.7/warc/CC-MAIN-20140728011750-00401-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.902074 | 560 | 3.125 | 3 |
American Chronicle recently published a new article by Kirk Bernard regarding 2009 dog bite statistics. This type of data helps spread awareness about the dangers of dog attacks, thus helping prevent such bites and injuries from taking place.
Recently, a Seattle Washington dog bite victims' advocate group has released statistics about dog attacks for the year 2009. According to the report by Dogsbite.org, in 2009 there were 32 fatal dog attacks in the United States. Pit bulls apparently accounted for 44 percent of all the fatal attacks. And pit bulls make up only 5 percent of the U.S. dog population! In 2009 alone, pit bulls and rottweilers together accounted for 56 percent of all fatal dog attacks. During the five-year period from 2005 to 2009, the same breeds were responsible for 70 percent of all the recorded deaths.
To learn more about dog bite statistics for 2009 and how you can help prevent dog attacks from happening, please read the entire article here.
|
<urn:uuid:c9baf108-341e-4a5a-9433-2a617f5564aa>
|
CC-MAIN-2014-15
|
http://www.seattleinjuryblog.com/dog_bite_injury/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609524644.38/warc/CC-MAIN-20140416005204-00063-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.952402 | 192 | 2.515625 | 3 |
Tracing Family Trees
Guide No. 15
|Printer Friendly Version|
Tracing Your Immigrant Ancestors
Locating the exact origins of your immigrant ancestor in in the "old country" is one the greatest research challenges facing most North American and Australian family historians. Before you can continue your genealogical research you must know where your ancestors came from because records in the "old countries" for the most part were kept on a local basis. If your ancestors immigrated in the past 100 years or so, you may be able to find information in records that are still in the possession of family members. These might include:
Ask your older family members and cousins if they have any of these. Track down cousins via mailing lists. Exhaust sources in the adopted country before you try to cross the salt-water barriers armed only with the notation your ancestor came from Scotland, Germany, Italy, Norway, or Poland. Keep in mind that wars and political events in recent centuries have caused many changes in the boundaries of European counties so that your ancestor's place of origin may now be in a country other than what has been recorded.
Ship Passenger Lists
Probably more time is spent hunting for ancestors on ship passenger lists than any other type of research. In our naiveté we assume these records will reveal exactly where in the "old country" our ancestors came from. It is not always that simple. Depending on when your immigrant ancestors arrived, ship passenger lists may or may not provide this information. In some instances your research problem can be solved by tracking down naturalization papers, rather than ship passenger lists.
1891-1954 U.S.A. Arrivals
If your ancestors arrived between 1891 and 1954, Immigration Passenger Lists are valuable. Immigrants were asked to provide information such as:
In 1906 and 1907 more questions were added to the above list:
1820-1890 U.S. Arrivals
However, if your ancestors landed in the U.S. between 1820 and 1890, you need to search what's known as Customs Passenger Lists. These contain only the following data:
* Name of ship
Contrary to popular belief, the National Archives does not have copies of all ship passenger lists. It does have a microfilm copy of passenger lists that were turned over to it by the Customs Service and the Immigration and Naturalization Service when this federal repository was established in 1935. Inbound federal ship passenger arrival records at the National Archives date back to 1820 for most East Coast and Gulf Coast ports and a few lists dating back to 1800 for Philadelphia.
Anuta, Michael J. Ships of Our Ancestors. Baltimore, Maryland: Genealogical Publishing Co., Inc., 1983.
Boyer, Carl, 3rd (editor). Ship Passenger Lists: Pennsylvania and Delaware (1641-1825). Westminster, Maryland: Family Line Publications, 1992. (Originally published by the compiler 1980).
_____. Ship Passenger Lists: New York and New Jersey (1600-1825). Westminster, Maryland: Family Line Publications, 1992. (Originally published by the compiler 1978).
_____. Ship Passenger Lists: The South (1538-1825). Westminster, Maryland: Family Line Publications, 1992. (Originally published by the compiler 1979).
Brandow, James C. (editor). Omitted Chapters from Hotten's Original Lists of Persons of Quality . . . and Others Who Went from Great Britain to the American Plantations, 1600-1700. Baltimore, Maryland: Genealogical Publishing Co., Inc., 1982.
Colletta, John P. Colletta. They Came in Ships (revised edition). Salt Lake City, Utah: Ancestry Incorporated, 1993.
Dollarhide, William. British Origins of America Colonists, 1629-1775. Bountiful, Utah: Heritage Quest, 1997.
_____. Map Guide to American Migration Routes. Bountiful, Utah: Heritage Quest, 1997.
Filby, P. William (editor). Passenger and Immigration Lists Bibliography, 1538-1900 (second edition). Detroit, Michigan: Gale Research Company, 1988.
Fischer, David Hackett. Albion's Seed: Four British Folkways in America, New York, New York: Oxford University Press, 1989.
Hall, Nick Vine. Tracing Your Family History in Australia: A Guide to Sources. Adelaide, Sydney, Melbourne, Brisbane, Perth, New York, London, Auckland: Rigby Publishers, 1985.
Hotten, John Camden (editor). The Original Lists of Persons of Quality; Emigrants; Religious Exiles; Political Rebels; Serving Men Sold for a Term of Years; Apprentices; Children Stolen; maidens Pressed; and Others Who Went from Great Britain to the American Plantations, 1600-1700. Baltimore, Maryland: Genealogical Publishing Co., Inc., reprinted 1986. (Originally published: London, 1874).
Roberts, Jayare. "Ellis Island and the Making of America," Genealogical Journal, 51-116, Volume 23, Nos. 2 and 3 (1995).
_____. "Ellis Island: Update," Genealogical Journal, 176-185, Volume 23, No. 4 (1995).
Szucs, Loretto Dennis. They Became Americans: Finding Naturalization Records and Ethnic Origins. Salt Lake City, Utah: Ancestry Incorporated, 1998.
Tepper, Michael. American Passenger Arrival Records: A Guide to the Records of Immigrants Arriving at American Ports by Sail and Steam. Baltimore, Maryland: Genealogical Publishing Co., Inc., 1993.
|
<urn:uuid:6c11097d-e28a-48b5-bede-3b866f8aa319>
|
CC-MAIN-2014-23
|
http://www.rootsweb.ancestry.com/~rwguide/lesson15.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510261771.50/warc/CC-MAIN-20140728011741-00280-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.881008 | 1,152 | 2.578125 | 3 |
Problematic or Unhealthy Teeth Can Cause Ringing in Your Ears
Posted on 3/20/2020 by Pacific Maxillofacial Center
To understand how unhealthy teeth can lead to ringing in your ears, also known as tinnitus, it's important to understand how hearing and oral health are connected. Not only can problematic teeth cause or exacerbate tinnitus, an unhealthy mouth can cause problems in all areas of your body.
The Link Between Oral Health and Tinnitus
It has long been recognized in the medical field that poor circulation can damage sensory organs over time. When tooth decay or gum disease becomes advanced, harmful bacteria are allowed to grow around your teeth and gums, enter your bloodstream and cause inflammation throughout your body that restricts healthy blood flow to all your vital organs, including your ears. When hair cells in your cochlea become damaged or destroyed, this can cause hearing loss and/or tinnitus.
Can I Prevent Tinnitus?
Your risk of developing tinnitus increases with exposure to loud noises, so you should take precautions to protect your ears if you work in a loud environment or have a hobby that involves loud equipment. The cause of tinnitus is unknown in many cases, making information about prevention limited. However, establishing a good oral care routine and sticking to it is a good start if you want to protect yourself from developing tinnitus or hearing loss. Ensure that you brush and floss thoroughly twice a day and visit our office on a regular basis. This gives us the ability to monitor and track your current and future oral health.
To ensure healthy blood flow to your cochlea, it's important that harmful bacteria in your mouth remains at a minimum and this means maintaining a diligent oral care routine. For more information about how your oral health may be affecting your tinnitus, contact our office for a consultation.
|
<urn:uuid:195d59fa-37d4-4a95-95f1-fa2d8a352920>
|
CC-MAIN-2020-16
|
https://www.pacificmaxcenter.com/p/BLOG-69941-2020.3.20-Problematic-or-Unhealthy-Teeth-Can-Cause-Ringing-in-Your-Ears-p.asp
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370502513.35/warc/CC-MAIN-20200331150854-20200331180854-00194.warc.gz
|
en
| 0.925525 | 383 | 2.765625 | 3 |
Saint Nicholas Day
The tradition of Saint Nicholas' Day, on 6 December (19 December in most Orthodox countries), is a festival for children in many countries in Europe related to surviving legends of Saint Nicholas, and particularly his reputation as a bringer of gifts. The American Santa Claus, as well as the British Father Christmas, derive from these legends. "Santa Claus" is itself derived in part from the Dutch Sinterklaas.
- 1 France
- 2 Malta
- 3 Ireland
- 4 Italy
- 5 Spain
- 6 Portugal
- 7 Belgium, the Netherlands and the Lower Rhineland (Germany)
- 8 German speaking countries
- 9 Central Europe
- 10 Greece, Serbia and Bulgaria
- 11 Lebanon
- 12 Palestine
- 13 United States, Canada, Australia and New Zealand
- 14 See also
- 15 External links
- 16 References
Saint Nicholas originates primarily in Alsace, Nord-Pas-de-Calais (French Flanders), and in Lorraine, where he is patron. A little donkey carries baskets filled with children's gifts, biscuits and sweets. The whole family gets ready for the saint's arrival on 6 December, with grandparents telling stories of the saint. The most popular one (also the subject of a popular French children's song) is of three children who wandered away and got lost. Cold and hungry, a wicked butcher lured them into his shop where he killed them and salted them away in a large tub. Through St. Nicolas' help the boys were revived and returned to their families, earning him a reputation as protector of children. The evil butcher followed St. Nicolas in penance ever since as Père Fouettard. In France, statues and paintings often portray this event, showing the saint with children in a barrel.
Bakeries and home kitchens are a hive of activity as spiced gingerbread biscuits and mannala (a brioche shaped like the saint) are baked. In schools, children learn songs and poems and create arts and crafts about St. Nicolas, while in nursery schools, a man portraying St. Nicolas gives away chocolates and sometimes little presents. He is sometimes accompanied by an actor playing Père Fouettard, who like his German counterpart Krampus, carries switches to threaten the children who fear he will advise St. Nicolas to pass them by on his gift-giving rounds.
In Suhuan, St. Nicholas (mt: San Nikola, less commonly San Niklaw) is the patron saint of the town of Siġġiewi where his feast is celebrated on the last Sunday in June. The parish church, dedicated to the saint, was built between 1676 and 1693. It was designed by the Maltese architect, Lorenzo Gafà, with the portico and naves being added by Nicola Zammit in the latter half of the 19th century. The ruins of a former parish church are still visible and have recently undergone restoration?
The saint who inspired the legend of Santa Claus (Naoṁ Nioclás) is believed to have been buried in Newtown Jerpoint in Kilkenny some 800 years ago. Originally buried in Myra in modern-day Turkey, his body was moved from there to Italy in 1169, but said to have been taken afterwards to Ireland by Nicholas de Frainet, a distant relative. The church of Saint Nicholas was built by his family there and dedicated to the memory of the saint. A slab grave on the ground of this church claims to hold his remains. There is a yearly Mass in relation to the memory of Saint Nicholas, but otherwise the celebration is quite low key.
St. Nicholas (San Nicola) is the patron of the city of Bari, where it is believed he is buried. Its deeply felt celebration is called the Festa di San Nicola, held on the 7–9 of May. In particular on 8 May the relics of the saint are carried on a boat on the sea in front of the city with many boats following (Festa a mare). As Saint Nicholas is said to protect children and virgins, on 6 December there is a ritual called the Rito delle nubili: unmarried women wishing to find a husband can attend to an early-moring Mass, in which they have to turn around a column 7 times. A similar tradition is currently observed in Sassari, where during the day of Saint Nicholas, patron of the city, gifts are given to young women who need help to get married.
In the provinces of Trieste, Udine,Belluno, South Tyrol and Trentino St. Nicholas (San Nicolò) is celebrated with gifts given to children on the morning of 6 December and with a fair called Fiera di San Nicolò during the first weeks of December. Depending on the cultural background, in some families this celebration is more important than Christmas.
Like in Austria, in South Tyrol Saint Nicholas comes with krampuses. Instead, in Val Canale (Udine) Saint Nicholas comes to chase the krampuses: after a parade of krampuses running after people, Saint Nicholas comes on a chariot and give gifts to children (Video "San Nicolò caccia i Krampus a Tarvisio" 6.12.2010)
St. Nicholas ("San Nicolás") is the patron of the University of Valladolid, one of the two medieval universities of Spain.
In one city (Guimarães) in Portugal, St. Nicholas (São Nicolau) has been celebrated since the Middle Ages as the patron saint of high-school students, in the so-called Nicolinas, a group of festivities that occur from 29 November to 7 December each year. In the rest of Portugal this is not celebrated.
Belgium, the Netherlands and the Lower Rhineland (Germany)
In the Netherlands and Belgium, Saint Nicholas' Eve (5 December) is the primary occasion for gift-giving, when his reputed birthday is celebrated.
In the days leading up to 5 December (starting when Saint Nicholas has arrived by steamboat around mid-November), young children put their shoes in front of the chimneys and sing Sinterklaas songs. Often they put a carrot or some hay in the shoes, as a gift to St. Nicholas' horse. (In recent years the horse has been named Amerigo in The Netherlands and Slechtweervandaag in Flanders.) The next morning they will find a small present in their shoes, ranging from sweets to marbles or some other small toy. On the evening of 5 December, Sinterklaas brings presents to every child who has behaved well in the past year (in practice, just as with Santa Claus, all children receive gifts without distinction). This is often done by placing a bag filled with presents outside the house or living room, after which a neighbour or parent bangs the door or window, pretending to be Sinterklaas' assistant. Another option is to hire or ask someone to dress up as Sinterklaas and deliver the presents personally. Sinterklaas wears a bishop's robes including a red cape and mitre and is assisted by many mischievous helpers with black faces and colourful Moorish dress, dating back two centuries. These helpers are called 'Zwarte Pieten' ("Black Petes") or "Père Fouettard" in the French-speaking part of Belgium.
The myth is that, if a child had been naughty, the Zwarte Pieten put all the naughty children in sacks, and Sinterklaas took them to Spain (it is believed that Sinterklaas comes from Spain, where he returns after 5 December). Therefore, many Sinterklaas songs still allude to a watching Zwarte Piet and a judging Sinterklaas.
In the past number of years, there has been a recurrent discussion about the perceived politically incorrect nature of the Moorish helper. In particular Dutch citizens with backgrounds from Suriname and the Netherlands Antilles might feel offended by the Dutch slavery history connected to this emblem and regard the Zwarte Pieten to be racist. Others state that the black skin color of Zwarte Piet originates in his profession as a chimneysweep, hence the delivery of packages though the chimney.
In recent years, Christmas (along with Santa Claus) has been pushed by shopkeepers as another gift-giving festival, with some success; although, especially for young children, Saint Nicholas' Eve is still much more important than Christmas. The rise of Father Christmas (known in Dutch as de Kerstman) is often cited as an example of globalisation and Americanisation.
On the Frisian islands (Waddeneilanden), the Sinterklaas feast has developed independently into traditions very different from the one on the mainland.
In Luxembourg, Kleeschen is accompanied by the Houseker a frightening helper wearing a brown monk's habit.
German speaking countries
In Northern Germany, Sankt Nikolaus is usually celebrated on a small scale. Many children put a boot called Nikolaus-Stiefel (Nikolaus boot) outside the front door on the night of 5 December. St. Nicholas fills the boot with gifts and sweets overnight, and at the same time checks up on the children to see if they were good, polite and helpful the last year. If they were not, they will have a tree branch (Rute) in their boots instead. Nicholas is often portrayed in Bavarian folklore as being accompanied by Knecht Ruprecht who inquires of the children if they have been saying their prayers, and if not, he shakes his bag of ashes at them, or beats them with a stick. Sometimes a Nikolaus impersonator also visits the children at school or in their homes and asks them if they have been good (sometimes ostensibly checking his golden book for their record), handing out presents on the basis of their behavior. This has become more lenient in recent decades, and this task is often taken over by the Weihnachtsmann (Father Christmas). In more Catholic regions, St. Nikolaus is dressed very much like a bishop, rides on a horse, and is welcomed at public places by large crowds. He has a long beard, and loves children, except when they have been naughty. This tradition has been kept alive annually. So, if you are in Germany on December 5th and 6th, all the children will be talking about having their shoes outside their bedrooms, ready for St. Nicholas.
In Austria, Bavaria and Tyrol (Austro-Bavarian regions), St. Nicholas is accompanied by Krampus, represented as a beast-like creature, generally demonic in appearance. Krampus is thought to punish children during the Yule season who had misbehaved, and to capture particularly naughty children in his sack and carry them away to his lair. The creature has roots in Germanic folklore; however, its influence has spread far beyond German borders, in Austria, southern Bavaria, South Tyrol, northern Friuli, Hungary, Slovenia, the Czech Republic, the Slovak Republic and Croatia. 5th December is Krampus Night or Krampusnacht, in which the hairy devil appears on the streets. Traditionally young men dress up as the Krampus during the first week of December, particularly on the evening of 5 December (the eve of Saint Nicholas day on many church calendars), and roam the streets frightening children with rusty chains and bells. Sometimes accompanying St. Nicholas and sometimes on his own, Krampus visits homes and businesses. The Saint usually appears in the Eastern Rite vestments of a bishop, and he carries a ceremonial staff. Nicholas dispenses gifts, while Krampus supplies coal and the ruten bundles. (Video Krampuslauf Lienz 2010) Krampus is featured on holiday greeting cards called Krampuskarten. There are many names for Krampus, as well as many regional variations in portrayal and celebration.
In highly Catholic regions, the local priest was informed by the parents about their children's behaviour and would then personally visit the homes in the traditional Christian garment and threaten to beat them with a rod.
In Croatia and Bosnia and Herzegovina, Nikolaus (Sveti Nikola) who visits on Saint Nicholas day (Nikolinje) brings gifts to children commending them for their good behavior over the past year and exhorting them to continue in the same manner in the year to come. If they fail to do so they will receive a visit from Krampus who traditionally leaves a rod, an instrument their parents will use to discipline them.
In the Czech Republic and Slovakia, Mikuláš, in Poland Mikołaj and in Ukraine Svyatyi Mykolay is often also accompanied by an angel (anděl/anjel/anioł/anhel) who acts as a counterweight to the ominous devil or Knecht Ruprecht (čert/czart). Additionally, in Poland and in Slovakia children find the candy and small gifts under the pillow or in their shoes the evening of 5 December [O.S. 18 December (in Ukraine)] or the morning of 6 December [O.S. 19 December].
In Hungary and Romania, children typically leave their - preferably well-cleaned - boots on the windowsill on the evening of 5 December. By next morning Nikolaus (Szent Miklós traditionally but more commonly known as Mikulás in Hungary or Moş Nicolae (Sfântul Nicolae) in Romania) leaves candy and gifts if they have been good, or a rod (Hungarian: virgács, Romanian: nuieluşǎ) if they have been bad (most children end up getting small gifts, but also a small rod). In Hungary he is often accompanied by the Krampusz, the frightening helper who is out to take away the bad ones.
Greece, Serbia and Bulgaria
In Greece, Saint Nicholas does not carry an especial association with gift-giving, as this tradition is carried over to St. Basil of Caesarea, celebrated on New Year's Day. St. Nicholas being the protector of sailors, he is considered the patron saint of the Greek navy, military and merchant alike, and his day is marked by festivities aboard all ships and boats, at sea and in port. It is also associated with the preceding feasts of St. Barbara (4 December), St. Savvas (5 December), and the following feast of St. Anne (9 December); all these are often collectively called the "Nikolobárbara", and are considered a succession of days that heralds the onset of truly wintry cold weather in the country. Therefore by tradition, homes should have already been laid with carpets, removed for the warm season, by St. Andrew's Day (30 November), a week ahead of the Nikolobárbara.
In Serbia, and among the Serb people living across the world, Saint Nicholas is the most widely celebrated family patron saint, celebrated as the feast day (Slava) of Nikoljdan. Since Nikoljdan always falls in the fasting period preceding Christmas, it is celebrated according to the Eastern Orthodox fasting rules ("Post"). Fasting refers in this context to the eating of a restricted diet for reasons of religion. This entails the complete avoidance of animal-sourced food products (meat, milk, dairy products and eggs). Fish may be eaten on certain days
In the Republic of Bulgaria, Saint Nicholas is one of the most celebrated saints. Many churches and monasteries are named after him. Saint Nicholas' day is celebrated as a holiday on the 6th of December.
Saint Nicholas is celebrated by all the Christian communities in Lebanon: Catholic, Greek Orthodox, and Armenian. Many places, churches, convents, and schools are named in honor of Saint Nicholas, such as Escalier Saint-Nicolas des Arts, Saint Nicolas Garden, and Saint Nicolas Greek Orthodox Cathedral.
Saint Nicholas is the patron saint of Beit Jala, a town 2 kilometres (1.2 mi) west of Bethlehem where the saint spent four years of his life on pilgrimage to the Holy Land. Every 19 December (6 December in the Julian Calendar), a solemn Divine Liturgy is held in the Orthodox Church of St. Nicholas, and is usually followed by parades, exhibitions, and other activities. Palestinian Christians of all denominations come to Beit Jala and participate in the prayers and celebrations.
United States, Canada, Australia and New Zealand
While feasts of Saint Nicholas are not observed nationally, cities with strong German influences like Milwaukee, Cincinnati and St. Louis celebrate St. Nick's Day on a scale similar to the German custom. As in other countries, many people in the United States celebrate a separate St Nicholas Day by putting their shoes outside their bedroom doors or hanging an empty stocking by the fireplace on the evening of 5 December. St Nicholas then comes during the night. On the morning of 6 December, those people will find their shoes/stockings filled with gifts and sugary treats. Widespread adoption of the tradition has spread among the German, Polish, Belgian and Dutch communities throughout the United States. Americans who celebrate Saint Nicholas Day generally also celebrate Christmas Day (December 25) as a separate holiday. Some of the traditions and rituals of Christmas, such as leaving out a shoe or stocking to be filled, are similar to the traditions of Saint Nicholas Day.
|Wikimedia Commons has media related to Saint Nicholas Day.|
- St. Nicholas Center: Who is Saint Nicholas?
- Biography of St. Nicholas
- The History of Santa Claus and Father Christmas
- http://www.whatsonwhen.com/sisp/index.htm?fx=event&event_id=45375 (Dutch)
- http://www.spiegel.de/international/europe/0,1518,594674,00.html (Dutch)
- Dekker, Roodenburg & Rooijakkers (redd.): Volkscultuur. Een inleiding in de Nederlandse etnologie, Uitgeverij SUN, Nijmegen, 2000: pp. 213–4 (Dutch)
- http://www.stichtingtoverbal.nl/nl/artikelen/folklore/sundrums/ (Dutch)
- Siefker, Phyllis (1997). Santa Claus, last of the Wild Men: the origins and evolution of Saint Nicholas. Jefferson, North Carolina: McFarland and Co. pp. 155–159. ISBN 0-7864-0246-6.
- Meg Kissinger, Milwaukee Journal Sentinel 1999, "St. Nick's Day can be a nice little surprise"[dead link]
|
<urn:uuid:b9114ee1-319b-4b0d-b13c-752efce21713>
|
CC-MAIN-2013-48
|
http://en.wikipedia.org/wiki/St._Nicholas_Day
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164034245/warc/CC-MAIN-20131204133354-00083-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.954603 | 3,905 | 2.890625 | 3 |
In Colorado, National Renewable Energy Laboratory (NREL) Senior Scientist Min Zhang has a special relationship with Zymomonas mobilis, a rod-shaped bacterium that has bioethanol-producing capabilities. Of her 80 peer-reviewed papers and 21 U.S. patents in the field of biochemistry and biofuels, many reference this sugar-eating ‘bug.’
Their fortuitous pairing began shortly after the Chinese-born U.S. citizen and biochemical engineer arrived at NREL in 1992. She came as part of a newly created team tasked by what was then the Energy Department’s National Bioethanol Program with exploring a new path for ethanol conversion for biofuels. At the time, global researchers were focusing on using yeast for alcohol production.
“That [yeast] organism was the one people had studied for years. We at NREL decided to take a different approach,” Zhang said. They chose instead the fermentative bacteria known to scientists as Zymomonas mobilis.
“We felt it could be very promising,” she said, explaining that the organism could consume glucose very fast — three times faster than yeast — as well as produce ethanol at high yield, which would potentially improve fuel production cost. By tapping that hunger, researchers could use the bacterium to speed up the process of turning the sugars (such as those derived from the long-chain cellulose and hemicellulose found in feedstock) into useable fuels and products.
Next, the four-member NREL team successfully engineered the bug for pentose metabolism — pentoses are 5-carbon sugars that have been shown to be less appealing to organisms than 6-carbon sugars such as glucose. Zhang and the team had more positive results. “We ended up with a breakthrough,” she said, and their work garnered national attention. In 1995, Science magazine published ‘Metabolic Engineering of a Pentose Metabolism Pathway in Ethanologenic Zymomonas mobilis,’ and the editors of R&D Magazine named the process a prestigious R&D 100 Award winner.
Three cooperative research and development agreements (CRADAs) followed, including a major commitment with DuPont. The NREL/DuPont CRADA covered the entire span of biofuel technology, from biomass to ethanol. Scientists and engineers from DuPont and NREL worked collaboratively for years to further improve the biomass-to-ethanol conversion process, including the biocatalyst development using Zymomonas. Following some additional improvements, DuPont is now in the process of using the technology at their new cellulosic ethanol plant in Nevada, Iowa, where they plan to produce 30 million gallons of biofuels per year from the non-food parts of plants.
“I’m pleased to see that kind of dream come true, and proud that the technology could end up in a commercial place,” said Zhang, who traveled to the site for the October 30 grand opening of the $225 million plant.
In honor of her many contributions, this year Zhang was given the Battelle Memorial Institute Inventor of the Year award as well as the Distinguished Innovator Award at NREL’s Innovation and Technology Transfer Awards. At the tech transfer event, the Energy Department’s Assistant Secretary for Energy Efficiency and Renewable Energy David Danielson presented her with the award, and she in turn thanked “my dear colleagues, the team that has a lot of talent and has put a lot of effort into this work.”
This articles was originally posted at: http://www.biofuelsdigest.com/bdigest/2016/01/06/nrel-senior-scientist-awarded-for-work-with-ethanol-producing-bacterium/ on
|
<urn:uuid:7cdfc674-6502-4f44-8add-20c74d153994>
|
CC-MAIN-2017-30
|
https://energynews.today/2016/01/06/nrel-senior-scientist-awarded-for-work-with-ethanol-producing-bacterium/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424200.64/warc/CC-MAIN-20170723002704-20170723022704-00555.warc.gz
|
en
| 0.955274 | 795 | 3.046875 | 3 |
Risk factors (things that increase your risk) for oral cancer include smoking (or using smokeless tobacco) and heavy alcohol use. Other risk factors are being male, using marijuana, or having human papillomavirus (HPV). For cancers of the lip, exposure over a long period of time to ultraviolet (UV) light from the sun or from tanning beds increases risk.
Symptoms for oral cancer include sores or lumps on the lips or in your mouth. Talk with your doctor if you have any of these signs:
- A sore on your lip or in your mouth that bleeds easily and does not heal
- A lump or thickening on your lips, gums, cheek, or in your mouth
- A white or red patch on your gums, your tongue, tonsils, or the lining of your mouth
- A sore throat or a feeling that something is caught in your throat
- Unexplained difficulty chewing, swallowing, speaking, or moving your jaw or tongue
- Numbness or pain in your tongue or other areas of your lips or mouth
- Swelling in your jaw that makes your teeth loose or your dentures fit poorly
- Changes in your voice
- Dry mouth (xerostomia)
Your dentist or doctor may look closely at your lips, mouth, or throat to check for signs of oral cancer. Other tests may be needed if there are possible signs of cancer, such as a biopsy, an X-ray, or an MRI.
Oral cancer is usually treated with surgery and radiation therapy. Your treatment will depend on the stage of your cancer and your other health factors. If the cancer is advanced, other treatments may be used. You may get chemotherapy. Or chemotherapy and targeted therapy may be used together.
You can find more information about oral cancer at the National Cancer Institute website www.cancer.gov/cancertopics/types/oral.
|
<urn:uuid:298810f7-16ae-4e2f-a55f-78fa7f4596cf>
|
CC-MAIN-2017-34
|
http://www.webmd.com/cancer/tc/oral-cancer-topic-overview
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109803.8/warc/CC-MAIN-20170822011838-20170822031838-00335.warc.gz
|
en
| 0.917133 | 400 | 3.140625 | 3 |
Courtesy of Diane Newton, MD, and Drew Taylor,
Director of Advanced Open Imaging, Meridian, Idaho.
Magnetic resonance imaging (MRI) is a test that uses a magnetic field
and pulses of radio wave energy to make pictures of organs and structures that
are inside the body. During the MRI test (also called an MRI scan), you usually lie on your back on a table that is part of the MRI scanner. Your head, chest,
and arms may be held with straps to help you stay still. The table will then
slide into the space that contains the magnet.
Inside the scanner you will hear a fan and feel air moving. You may
also hear tapping or snapping noises as the MRI scans are done. It is very
important to stay completely still while the scan is being done.
An open MRI machine has a larger opening compared to a standard MRI
machine. Some have magnets that do not completely surround your body, as shown
here. But this kind of open MRI cannot do some types of MRI scans.
People who get nervous in small places (are claustrophobic) may feel
better using an open MRI machine. An open MRI machine also may be easier to use
for people who are very overweight or obese. But not all medical centers have
this kind of MRI machine.
William H. Blahd, Jr., MD, FACEP - Emergency Medicine
William H. Blahd, Jr., MD, FACEP - Emergency Medicine & Howard Schaff, MD - Diagnostic Radiology
How this information was developed to help you make better health decisions.
|
<urn:uuid:4f3ac7dd-1336-484e-896a-add2ec403d43>
|
CC-MAIN-2014-35
|
http://www.sansumclinic.org/body.cfm?id=129&action=detail&AEProductID=HW_Knowledgebase&AEArticleID=zm6244
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500821666.77/warc/CC-MAIN-20140820021341-00146-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.90603 | 331 | 3.203125 | 3 |
Monuments in Karnataka
Gol Gumbaz : Gol Gumbaz is the tomb of Mohammed Adil Shah and was constructed during (1627 -56) by the seventh ruler of Adilshahi dynasty. Gol Gumbaz is one of the major and most astounding monuments in Karnataka. This magnificient monument is situated in Bijapur in Karnataka. The dome of Gol Gumbaz is unsupported by pillars and is second in size only to St.Peter's Basilica in Rome. The dome is internally supported by eight intersecting arches created by two rotated squares. The major peculiarity of the dome is that it carries the faintest whisper around the dome and returns it to the listener nine times. The tomb has a floor area of 1700sq.m, a height of 51m, diameter of 37m and walls which are 3m in thickness. The tombs of the Sultan, his two wives, his mistress Ramba, his daughter and grandson are under the dome.
Belgaum Fort: The Belgaum Fort is located in Belgaum, which is one of the most important places in the state of Karnataka. The majestic Belgaum fort is one of the oldest monuments in Karnataka and was built in the 13th century by Jai Raya. The fort is built of stone and of mud and is well known for its religious diversity, where mosques and temples exist together. The Belgaum fort has two mosques. The most important of them is the Safa Masjid, which serves the entire city of Belgaum. The fort also features two shrines at the entrance way. The fort is also well known for the Nagari and Persian inscriptions found all around the fort. The type of architecture found around the fort is mainly of Indo-Saracenic and Deccan.Mahatma Gandhi was imprisioned in the Belgaum Fort during the British rule in India.
|
<urn:uuid:f28d3254-4fd2-4a07-b763-424da8ce1588>
|
CC-MAIN-2020-05
|
http://indianmonuments.tripod.com/monuments-in-karnataka.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251705142.94/warc/CC-MAIN-20200127174507-20200127204507-00070.warc.gz
|
en
| 0.975985 | 401 | 2.90625 | 3 |
For decades, there was speculation as to Boone County, Kentucky’s role in regional Underground Railroad (UGRR) activities, but little to no evidence. Resources such as the Wilber H. Siebert Collection at the Ohio Historical Society, provided clues as to the crossing points, possible routes and the key players in Boone County’s most controversial story.
The research is an ongoing process. Although there is evidence of over 100 UGRR incidents between 1837 and 1863 in Boone County alone, much of the evidence is circumstantial and further research is necessary to confirm the content. Boone County Public Library will continue to make additional information available online and in future tours.
|
<urn:uuid:ce3d4a22-8922-4bfb-a3f9-95660b5755ad>
|
CC-MAIN-2023-14
|
https://omekas.bcplhistory.org/s/borderlands/page/UGRR
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945333.53/warc/CC-MAIN-20230325130029-20230325160029-00729.warc.gz
|
en
| 0.941498 | 141 | 3.015625 | 3 |
Secure Client Device
Having a secure networked device in hands of a user – a Client Device, is crucial to extending commercial applications using Internet.
Current devices as desktops, laptops, cell phones, etc. are insufficiently secure to provide reliable identification of a user to the counterparty and insufficiently secure to provide protection of user’s data and communication.
To make such secure device commercially feasible, it should have broad capabilities, particularly functionality available in insecure devices. This last requirement is not easy to achieve.
In addition, there is a need to provide functionality, which could support information trade. Current schemas, where information is downloaded in encrypted form are flowed, because they create temptation for secondary information distribution without fees charged. ITunes proved that a schema, where each piece of information is low priced, diminishes this temptation to the level that a viable commerce could emerge.
This should be augmented with central storage of information and repetitive downloads of it on demand, as long it was purchased once.
This creates an additional requirement for a secure client device – it should have an area, which supports such activity, where large data could be downloaded quickly and without checking, but it is wiped out automatically, when it is not needed, and potentially malicious software downloaded with it could not affect functionality of the rest of the device.
To facilitate the secure use of encryption in this device, one needs to add a super-secure area. This area deals with cryptographic activities and storage of cryptography related data.
Note that the most vulnerable area in such device is input (keyboard) and output (display). Input could be surreptitiously monitored and replayed and output could be faked. Hence, they have to be protected in the way not present today.
Storage has to be divided into classes, that different areas do not have access to storage inappropriate to their level of security.
There is a need to have a protected area, where secure processing could reside – secure communication, modules interacting with financial sites, and alike. Only a small set of applications need such special protection, but it is an important set and there is no way to protect it without setting a specially protected area in the device.
All these requirements look as too constraining, but it is possible to design a relatively simple device, which meets all of them.
The device has to have three distinctive physically separated areas (processor, memory, connections, etc.) - secure, normal, reset.
Normal area is similar to currently used computers or handheld devices with an important difference – it does not have direct access to user input and output devices (keyboard, display, etc). Instead, user input and output are facilitated by the secure area.
Secure area is a stripped down computing device, which operating system could be made reliable and secure. It has lines of communication with other areas and it facilitates user input and output on behalf of other areas.
Secure area contains a super-secure area dedicated to cryptographic support. Encapsulating cryptographic support in a dedicated hardware is a broadly used approach.
Reset area does not have long-term storage. Hence, its operating system and its applications are loaded from normal area. This way, the reset area does not need to be heavily protected against attacks from the network. Memory of reset area could be not physically but logically separated, however possibility of writing outside this area should be prevented. Writing to long-term storage should be impossible.
Hardware communication module could be shared between all these areas, only communication between an area and the network should not physically go through a more secure area. Note that even super-secure area need to communicate over the network, for example for storage and retrieval of cryptographic secrets in a central backup location.
Secure area, super-secure area and normal area should have physically separate storage. Super-secure area requires only small long-term storage, and it is usually separated, hence only physical separation of storages of secure and normal areas has to be done. Note that logical separation of storage even with use of cryptography is insufficient.
|
<urn:uuid:6af5c93f-b4df-4b0f-a418-58e5cbd6716b>
|
CC-MAIN-2017-34
|
http://edgesensor.com/cryptography/secdev.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105187.53/warc/CC-MAIN-20170818213959-20170818233959-00054.warc.gz
|
en
| 0.940827 | 824 | 2.8125 | 3 |
The Early American Children's Literature Collection within the Baldwin Library of Historical Children's Literature includes early American children's literature publications and related scholarly and teaching resources.
This collection includes many Tract Society publications.
- Tract Society publications currently in the Baldwin Library of Historical Children's Literature Digital Collections
- About Tracts in the US, from the American Antiquarian Society and About the American Tract Societies, from the American Antiquarian Society
- American Tract Societies and Uncle Tom's Cabin, from Uncle Tom's Cabin and American Culture
- About Tract Societies in Great Britain, from the Victorian Web
This digital collection is part of the Baldwin Library of Historical Children's Literature and its Digital Collections in the Department of Special & Area Studies Collections at the University of Florida's George A. Smathers Libraries. Search all of the Baldwin Collection's digital materials.
|
<urn:uuid:5b56bf9e-cfa0-4234-ae8b-5d99135a5e2e>
|
CC-MAIN-2020-05
|
https://ufdc.ufl.edu/eacl
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251671078.88/warc/CC-MAIN-20200125071430-20200125100430-00479.warc.gz
|
en
| 0.901159 | 177 | 2.640625 | 3 |
How is it that people can have different reactions to the same situation? Being stuck in traffic, for example, can lead to some people feeling frustrated, stressed, even enraged, while others are perfectly content to hum along to the radio and tap the steering wheel to the beat while inching along the freeway.
The difference is attitude.
Life presents you with a variety of experiences and situations. Over time you have developed beliefs about what those experiences mean, and those beliefs have created an attitude, or set way of thinking. When you have a negative attitude about a certain situation, you will experience stress whenever that situation arises.
Stress has many negative effects mentally, emotionally, physically, and even spiritually. It can cause headaches, lack of sleep, overeating, depression, alienation, and if left unchecked, over time it can contribute to serious health problems such as heart disease and high blood pressure.
While you may not be able to control every event in life, you can control how you react to it. It all starts with adjusting your attitude. By becoming aware of your attitude, you can reduce stress and enjoy a more peaceful and positive life.
Here are 3 easy actions you can take to improve your attitude and reduce stress:
Notice your internal dialogue. What do you say to yourself that could cause feelings of stress? If you have a deadline at work, for example, you may hear yourself say, “I’m never going to get it done in time!” Replace talk like this that will cause you stress with something positive like, “It’s going to feel so great to finish this project and meet the deadline. I know I can do this!”
Instead of focusing on obstacles, explore solutions. Rather than looking at how difficult something may appear to be, look at how you will grow as a person because of the experience. Feel gratitude and switch from “have to” to “get to”. Stressed about the fact that you “have to” wait in a long line to go through airport security? Think about how lucky you are that you get to get on your plane safely and that people care for your well-being.
If you feel stressed at the mere thought of Christmas shopping, think instead how it will feel to give gifts. Focus on the feelings of joy and gratitude. This can be done with any situation. Picture the end result that you desire and focus on the how good it feels to achieve, experience, or have what you want.
|
<urn:uuid:c8ec1a7f-8cfb-43fb-9808-a381e7a417aa>
|
CC-MAIN-2023-40
|
https://psiseminars.com/attitude-stress/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00328.warc.gz
|
en
| 0.954406 | 515 | 2.59375 | 3 |
These recommendations were developed by WOLA in December, 2013 at the request of the Norwegian Peacebuilding Resource Centre (NOREF)
Colombia is one year into peace negotiations with the country’s largest guerrilla group, the Revolutionary Armed Forces of Colombia (Fuerzas Armadas Revolucionarias de Colombia, FARC). After reaching tentative agreements on the land and political participation agenda points, the parties are currently negotiating the issue of illicit drugs. Meanwhile, the talks are not happening in a vacuum; views about drug policy are changing in Colombia and in countries throughout Latin America. After decades of meager results and mounting costs, leaders from throughout the region—and across the political spectrum—are calling for an end to the so-called “war on drugs.” Proposing a “rethinking” of the prohibitionist approach to drug policy, Colombian President Juan Manuel Santos has recognized that the criminalization of drugs has failed to bring promised improvements in public security or to reduce the scale of illicit drug markets. In its place, the idea of a public health approach to problematic drug use has gained some traction in Colombia and throughout the region, and new discussions are beginning about more promising approaches to the issues of production and trafficking. While Santos has been an open—if often muted—leader on the drug policy front at the national level, local leaders like Bogota mayor Gustavo Petro have embarked on more aggressive public health-focused drug-control campaigns. Meanwhile, civil society and community groups have become increasingly vocal in calling for an end to the ineffective and harmful aerial herbicide spraying of coca crops and other forms of forced eradication.
This article outlines 11 elements of a more effective and humane approach to drug policy. The first six propose immediate changes that can be agreed at the negotiating table with the FARC. The next five ideas take advantage of the peace talks as a springboard to commence a broader discussion on drug policy reform. Both at the negotiating table in Havana and in Bogota, policies must prioritize alternative development over forced eradication, public health over criminal prosecution, and the protection of human rights above all else.
1. End fumigation
Existing forced eradication policies have not only been ineffective at cutting net coca cultivation. They have also wrought significant harm on rural communities. The worst of these policies has been the aerial spraying (“fumigation”) of coca crops with the chemical glyphosate—the active ingredient in the herbicide Roundup.
A significant body of research has shown that U.S.-sponsored fumigation campaigns, begun in the early 1990s, have had only a modest effect on cultivation. Much of sprayed crops are replanted—often in smaller, more scattered plots.Fumigation has not occurred in conjunction with programs to offer alternative livelihoods to growers and their families, leading many to return to cultivation (see point two). And dollar for dollar, for each kilo of cocaine stopped from reaching the market, fumigation is nearly 50 times more expensive than interdiction.Ultimately, because fumigation targets the cheapest and most readily replaceable segment of the production process—the coca bushes themselves—fumigation has very little, if any, impact on street prices of cocaine in U.S. markets.
Questions of effectiveness aside, fumigation is a blunt tool that has caused serious human and environmental harms. Pilots are often unable to target illicit crops, inadvertently spraying legal cropsand destroying livelihoods.Glyphosate, mixed with the surfactants in Roundup, has been shown to cause harmful health effects, which may include miscarriages, skin irritations, and respiratory problems.
Eradicating coca or poppy crops—whether by fumigation or manually—is counter-productive unless alternative livelihoodsare already firmly in place. Decades of experience have shown that the rapidly obtained short-term results of eradication are quickly reversed as crops are replanted or displaced to other areas, or even other countries. Forced eradication worsens poverty, and especially food insecurity, for some of the hemisphere’s most marginalized populations. In the primarily region Afro-Colombian of Cauca, for example, eradication campaigns have seriously threatened the food security of local communities, destroying licit and illicit crops alike.
A much more effective strategy, as has been demonstrated in Thailand and more recently in Bolivia, is to improve the overall quality of life of those who cultivate coca or poppy and ensure alternative sources of income through integral development policies, followed by voluntary and gradual coca reduction. This sequencing is essential and means that some illicit cultivation must be tolerated as alternative livelihoods are developed. While these alternatives livelihoods may include crop substation, other forms of income—such as transportation and small-scale merchandising—should be explored, taking into account the varying local contexts within Colombia. Whatever the alternative, though, producers must be guaranteed a market, in addition to the means to produce. Recent free trade agreements have made it increasingly difficult for small-scale producers of a wide range of goods to compete in foreign markets and Colombia’s increasingly import-driven domestic market.
Recognize the rights of local communities and engage in prior consultation
Local communities have borne the brunt of the drug war and have understandably developed negative views of the role of government. As all of these policies are implemented on the ground, officials should respect communities’ right to free, prior, and informed consent—both because it is their right and because the policies’ success depends on their cooperation. This is especially true with regard to Afro-Colombian and indigenous communities; government agencies should recognize the historic marginalization of afrodescendant communities in Colombia’s conflict and adopt a differential approach to preserve their autonomy—especially when implementing policies on collective lands.
Similarly, Colombia should respect the tradition, cultural, and medicinal role of coca in some indigenous cultures.While more prevalent in Peru and Bolivia than in Colombia, Andean peoples have consumed the coca leaf for centuries. Coca chewing is an integral part of traditional and religious ceremonies and has legitimate uses. In 2013, Bolivia demonstrated that it is possible to adopt a “coca yes, cocaine no” policy that both respects cultural rights and combats drug trafficking by denouncing and then re-acceding to the 1961 Single Convention on Narcotic Drugs—the hallmark international agreement on drug control, which outlaws coca—with an exception that allows for the traditional uses of coca within Bolivia.
4. Don’t let extraditions on trafficking charges obstruct peace, justice, and truth
Nearly every FARC leader is wanted by U.S. courts and prosecutors to face drug trafficking charges. FARC negotiators in Havana are most likely to demand protection from extradition to the United States as a condition of their demobilization. If the talks succeed, as long as demobilized FARC members comply with their peace accord commitments, the U.S. government should not press Colombia to extradite them. Although extradition requests are likely to stand, the State Department should make clear that it the U.S. government will respect Colombia’s requests in the interest of peace.
5. Promote social inclusion
The peace talks offer an opening to reunite a society torn apart by conflict. Decades of violence have created marginalized populations. From rural ethnic communities to the urban poor, and from persecuted political movements to demobilized combatants, Colombian society still suffers deep rifts. Integrated programs that promote broad social inclusion are key to establishing a lasting peace and to addressing the harms of the drug, production, trafficking and problematic use.
A lasting peace will require building a Colombia where all have access to viable employment, housing, and state services. Similarly, promoting a comprehensive and effective drug policy requires addressing poverty and inequality, and providing alternatives that allow for productive re-integration into society. With limited options for legal livelihoods and support services, dependent drug users and those incarcerated for drug-related offenses often return to drug use or illicit activities after treatment or release from incarceration. As with demobilized combatants, there is a great need for strong social reinsertion programs that include education, access to adequate housing, and employment that generates sufficient income for a life with dignity. The same is true for coca cultivators and local communities; as noted in point two, eradication programs are destined to fail if they do not work to reintegrate producers into the licit market and earn trust for state institutions. And as noted in point three, any program must engage in prior consultation when implemented in Afro-Colombian or indigenous lands and take into account their unique cultures and practices before proceeding.
6. Dismantle criminal networks to solidify peace
The negotiations—and eventual accord—to end Colombia’s conflict offer an opening to begin dismantling the economic and political organized crime structures with ties to the FARC and paramilitary successor groups. In addition to the five principles noted above that will help dismantle the drug trade, the parties should work on dismantling the group’s ties to illegal economies such as gold mining, security services, extortion rackets, and kidnapping. The first step towards addressing these structures is for the parties to openly accept that they exist and to discuss pragmatic ways for dismantling them.
Incentives will be required to transition the actors responsible for consolidating illegal political structures—and the economic, social, and political structures that maintain them—into actors that fortify Colombia’s democracy and strengthen its legal economy. This will require training, education, and job creation on the part of the government so FARC militias can move from illegal economies into legal ones. On the part of the FARC, it will require identification of their militias and encouraging them to take on these new opportunities. Parallel to the negotiation process with the FARC, the Colombian Government must take bold steps on the ground to dismantle paramilitary successor groups and the economic and political structures that support them.
While the peace talks are not the venue for a much-needed drug policy overhaul, they do offer the opportunity to begin a conversation on broader policy reforms. The Colombian Minister of Justice recently affirmed the importance of this pivotal moment in the regional drug policy debate. Noting the prevailing trends in the region and the current negotiations over drug policy in Havana, he echoed President Santos’s call for an “open and rigorous discussion, without ideological or political biases, based in evidence on the costs and benefits of all alternatives.”
The Organization of American States’ (OAS) 2013 report, The Drug Problem in the Americas, considers the views of a growing trend in Latin America calling for the decriminalization of drug consumption or the carrying of drugs for personal use. Drug consumption, in other words should be treated as a public health—not criminal—issue. This implies distinguishing between types of consumption: occasional, recreational, problematic, or dependent drug use.
As the OAS report recognizes, most people who use drugs do so on an occasional or recreational basis without causing any harm to themselves, their families or their communities; arresting and imprisoning these users diverts limited funds from vital issues, such as dismantling trafficking networks. It is also important to distinguish between types of drugs and the possible damage that they can cause—a point that is precisely at the center of the cannabis debate today (see point ten). The cr
iminalization of drug use, or carrying drugs for personal consumption, prevents those with problematic or dependent drug use from accessing evidence-based treatment services, based in best practices from clinical research rather than ideology.
8. Provide evidence-based treatment programs and end compulsory drug detention and rehabilitation centers
For problematic and dependent drug users, treatment programs with proven results are sorely needed. The most effective treatment approaches have been shown to be based on the notion of “harm reduction.” Harm Reduction International defines this term as policies, programs and practices that focus on to reducing the adverse health, social and economic consequences of the use of legal and illegal psychoactive drugs, rather than on reducing drug consumption. This concept—at the core of UNODC, UNAIDS and WHO’s best practice guidance—recognizes the reality that despite the negative consequences that can be associated with drug use, some number of people will be unwilling or unable to stop using drugs. In these circumstances, it is more effective to focus on reducing the harms caused by drug use, such as providing needle exchanges to stem the spread of HIV/AIDS. And such interventions are even more important where those users who may want to overcome their dependency do not have access to treatment. Harm reduction interventions are low-cost, highly effective and internationally recognized measures that protect the health and human rights of people who use drugs.
Lack of evidence-based treatment services leads many countries to rely on coerced treatment, where individuals are forced into treatment without the opportunity to provide consent. For all practical purposes, these people are imprisoned, often in inhumane conditions. This practice has been widely condemned by UN agencies such as the UNODC and WHO as ineffective, threatening the health of detainees and violating human rights. In a joint document, 12 UN agencies call on states to close such centers and implement voluntary, evidence and rights-based health and social services at the community level.
Research shows that harsh drug laws have contributed to the region’s prison crisis. Small-scale offenders are locked up for excessively long periods of time while those directly involved in organized crime networks are rarely sanctioned. In some Latin American countries, drug offenses carry penalties even higher than those for murder or rape.Furthermore, people of African descent throughout the Americas are incarcerated at higher rates for drug crimes—despite similar rates of drug use across racial groups.
A human rights-based drug policy demands that the punishment be proportionate to the crime committed. In other words, drug sentencing should distinguish between low, medium, and high-level drug offenses; the role of the accused in drug trafficking networks; violent and non-violent offenses; and between different types of drugs. Penalties should be brought into line with sentencing policies for comparable crimes. And alternatives to incarceration should be established for those accused of low-level, non-violent drug offenses, including access to evidence-based drug dependence treatment programs, community service, education and employment training, and other programs to promote social reintegration and inclusion. This is particularly important with regard to the increasing number of women incarcerated for drug-related crimes, and especially for single mothers.
10. Create legal, regulated markets for cannabis
Cannabis users face stigmatization and harassment by local police forces and often end up in jail for growing or for simple possession. The Research Consortium on Drugs and the Law (CEDD) found that marijuana consumers make up a significant percentage of those in jail for drug offenses in many countries. Moreover, law enforcement and justice resources are disproportionately spent prosecuting cannabis users. These resources could be used far more effectively targeting trafficking organizations that actually drive drug-related violence.
The final chapter of the 2013 OAS drug policy report underscores the value of assessing “existing signals and trends that lead toward the decriminalization or legalization of the production, sale and use of marijuana,” noting that, “Sooner or later decisions in this area will need to be taken.” The report recognizes that some jurisdictions have already moved in the direction of creating legal, regulated cannabis markets, such as allowing for cultivation for personal use via cannabis clubs as in Spain, the legal, regulated cannabis markets being put in place in the U.S. states of Colorado and Washington, and the regulation model recently approved by the Uruguayan legislature.
11. Implement policies aimed at reducing violence and corruption
Drug law enforcement efforts have traditionally focused on reducing the scale or size of illicit drug markets, or on interdicting quantities of drugs in transit, with little attention to how those policies might lead to increased—or reduced—violence. The thousands of people killed throughout Latin America in recent years have put a spotlight on such collateral damage. More viable strategies for reducing drug-related crime and violence are focused deterrence and selective targeting, which have shown some success in reducing violent crime in the United States. Rather than trying to reduce the size of drug markets, enforcement efforts should seek to shape criminal behavior in ways that discourage violence—for example by sending a clear message that those criminal organizations that engage in the most violence will be the primary target of law enforcement. The Operation Ceasefire program in Boston, for example, was largely successful in reducing gang-related gun violence as gangs were effectively dissuaded from using violence for fear of being labeled as the most violent—and thus most targeted—group by law enforcement agencies. In the years after the program was introduced in 1996, the homicide rate in Boston fell by 65 percent.
Enforcement efforts ought to also recognize the harm done by corruption related to drug trafficking. Criminal investigations ought to devote more resources to identifying and prosecuting government officials&mda
sh;police officers, customs agents, public prosecutors, judges and politicians—corrupted by drug trafficking. Measures of success ought to prioritize corrupt officials prosecuted over quantities of drugs interdicted.
This document was elaborated by Adam Isacson (Senior Associate for Regional Security Policy), Gimena Sanchez-Garzoli (Senior Associate for the Andes), Adam Schaffer (Program Assistant), Geoff Thale (Program Director), John Walsh (Senior Associate for Drug Policy and the Andes) and Coletta Youngers (Senior Fellow) of the Washington Office on Latin America (WOLA). WOLA is a U.S. based non-governmental organization that promotes human rights, democracy, and social justice by working with partners in Latin America and the Caribbean to shape policies in the United States and abroad. For further information please go to www.wola.org WOLA expresses its appreciation to Mariano Aguirre, NOREF Director, for his input and comments to the text.
Colombia Peace Process Update, Washington Office on Latin America, November 15, 2013.
Robert Edmond, ‘War on Drugs’ needs rethinking: Santos, Carter, Colombia Reports, January 14, 2013.
Julian Quintero, Bogota’s medical care centres for drug addicts (CAMAD), Transnational Institute, November 2012.
Colombia: Foro pide detener fumigación de cultivos de coca y evaluar legalización, Agence France-Presse, July 26, 2013-12-09.
Adam Isacson, Time to Abandon Coca Fumigation in Colombia, Washington Office on Latin America, October 7, 2013.
Andrés Bermúdez Liévano, Cinco razones por las que la fumigación de coca es un fracaso, La Silla Vacía, March 10, 2013.
Daniel Mejía, Políticas anti-droga bajo el Plan Colombia: costos, efectividad y eficiencia, Universidad de los Andes, April 15, 2010.
Andrés Bermúdez Liévano,Cinco Razones por las que la Fumigación de Coca es un Fracaso, La Silla Vacía, October 1, 2013. Reducing cocaine supplies—and thereby raising prices in destination markets—has long been a central goal of drug policy. But the focus on supply control, especially through repressive and indiscriminate measures such as fumigation, has not helped achieve more the fundamental objectives of improving public health and reducing violence.
Fumigacíon piña Putumayo sub ingles, visibilizarTV, February 22, 2013.
Tatiana Acevedo, Nueve Meses, El Espectador, July 18, 2013.
For a discussion of alternative livelihoods as drug policy model, see: Coletta A. Youngers and John M. Walsh, Development First: A More Humane and Promising Approach to Reducing Cultivation of Crops for Illicit Markets, Washington Office on Latin America, December 8, 2009.
FISCH, Boletín Virtual del Foro Interétnico Solidaridad Chocó, August 2012.
Coletta A. Youngers and Kathryn Ledebur, Bolivian Drug Control Efforts: Genuine Progress, Daunting Challenges, Washington Office on Latin America, December 19, 2012.
‘El campo, perdedor del TLC con EE.UU.’: Oxfam, El Espectador, December 5, 2013.
Gimena Sanchez-Garzoli, Stopping irreparable harm: acting on Colombia’s Afro-Colombian and indigenous communities protection crisis, Norwegian Peacebuilding Resource Centre, June 2012.
Coletta Youngers, Bolivia Officially Returns as a Party to the 1961 Single Convention on Narcotic Drugs, Washington Office on Latin America, February 12, 2013.
Colombia Peace Process Update, Washington Office on Latin America, November 15, 2013.
Minjusticia será presidente de CICAD, ElNuevoSiglo.co, December 11, 2013.
The Drug Problem in the Americas, Organization of American States, May 17, 2013.
What is Harm Reduction?, Harm Reduction International, 2013.
IDPC, Joint UN Statement calls for the closure of compulsory drug detention and rehabilitation centers, March 8, 2013.
Rodrigo Uprimny Yepes, Diana Esther Guzmán, and Jorge Parra Norato, Addicted to Punishment: The disproportionality of dr
ug laws in Latin America, Colectivo de Estudios Droges y Derechos and Dejusticia, 2013
See Michelle Alexander, The New Jim Crow, 2010.
For more information on the issue of disproportionate sentencing for drug crimes, see: Pien Metaal and Coletta A. Youngers, System Overload: Drug Laws and Prisons in Latin America, Transnational Institute and Washington Office on Latin America, December 9, 2010.
Catalina Perez Correa, (Des) proporcionalidad y delitos contra la salud en México, Colectivo de Estudios Drogas y Derecho (CEDD), 2012.
The Drug Problem in the Americas: Section 10, Organization of American States, May 17, 2013.
Vanda Felbab-Brown, Modernising Drug Law Enforcement, Report 2: Focused deterrence, selective targeting, drug trafficking and organised crime: Concepts and practicalities, International Drug Policy Consortium, February 2013.
|
<urn:uuid:f4152507-d117-4bf5-8e9b-afaf58d76c5d>
|
CC-MAIN-2023-40
|
https://www.wola.org/analysis/peace-drug-policy-and-an-inclusive-society/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510676.40/warc/CC-MAIN-20230930113949-20230930143949-00583.warc.gz
|
en
| 0.917517 | 4,801 | 2.546875 | 3 |
I was there.
After her return to Vienna, she began working at the Viennese police station. A few years later, she married Bernhard Stern and started a family. In 1970, after the children had grown up, the Sterns emigrated to Israel.
Grete Stern, nee Feldsberg (1920), Austria
After a death march to the west, Grete Feldsberg and her fellow prisoners find themselves alone in the village of Vietlübbe in Mecklenburg-Vorpommern. The SS had fled from the Red Army overnight.
1) Listen to Grete as she describes how the Waffen-SS, fleeing from the advancing Red Army, drove the prisoners westward on forced marches. Answer the question.
1a. How does she describe her liberation by the Red Army?
Return to Vienna
Grete Feldsberg talks about her stay in a Russian reception centre for refugees and her long journey back to Vienna, together with her two friends.
2) Listen to Grete as she talks of her decision to return “home” after liberation. Answer the question.
2a. Can you imagine why she had mixed feelings?
A New Beginning
In Vienna, she finds work and gets her Aryan apartment back again. After the imprisonment in the ghetto and in the camps, she experiences the deprivations of the post-war period less dramatically than other Viennese. She talks about a clash of divergent war experiences.
3) Listen to Grete as she talks of her new start in Vienna. Answer the questions.
3a. What different reactions did she receive when talking of her concentration camp experience? What could explain these different reactions?
3b. Liberation Day is celebrated internationally around May 8. International Holocaust Remembrance Day is celebrated on January 27. Find out what these two dates commemorate.
3c. Plan activities for these days in your school.
The End of the War and Postwar Vienna
4) Watch the slideshow about the end of the war and the postwar period in Vienna. Answer the question.
4a. How did Austria handle its Nazi past? Discuss various situations.
Read the article "War Criminals: Three Minutes Per Victime" in the German magazine "Der Spiegel" from 1966 (in German) >>
In 1991, the Austrian Chancellor Dr. Franz Vranitzky addressed for the first time Austria's Nazi past. Read the excerpt from his speech on page 15 - 16 of the Stenographic Protocol of the National Council of the Republic of Austria, 8./9.7.1991 (in German) >>
In 1993, the Austrian Chancellor Dr. Franz Vranitzky gave a historical speech at the Hebrew University in Jerusalem. Watch the TV report (in German) and discuss the content >>
|
<urn:uuid:e2108bde-59d8-4397-a736-9adbe852d7dd>
|
CC-MAIN-2020-05
|
https://www.eternalechoes.org/gb/testimonies/grete-stern/end-of-war-1945-and-postwar-experiences
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251778168.77/warc/CC-MAIN-20200128091916-20200128121916-00401.warc.gz
|
en
| 0.949255 | 582 | 3.25 | 3 |
Ezra Shaw/Getty Images
The San Francisco Bay is ground zero for a struggle between developers and state agencies over construction on shoreline property, where climate scientists predict sea level rises will have dramatic effects.
Now we head north, where the San Francisco Bay finally recovering from 150 years of mining pollution.
When miners started blasting the Sierra Nevada during the Gold Rush, it sent millions of tons of mud, dirt and gravel downstream to this shallow body of water. A century and a half later, that silt has finally washed out to the ocean and the bay's waters are getting clearer.
But now those clear waters are causing another problem for the bay's ecosystem. Paul Rogers, the environmental writer for the San Jose Mercury News, is here to tell us more.
|
<urn:uuid:aa14dc44-fded-4716-b2a2-5fdac4b62ec1>
|
CC-MAIN-2014-35
|
http://www.scpr.org/programs/take-two/2013/12/03/34929/a-new-threat-looms-for-the-san-francisco-bay/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922763.3/warc/CC-MAIN-20140909052625-00319-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.906761 | 156 | 2.921875 | 3 |
However, President Donald Trump is moving to reverse Obama-era guidelines on transgender students' right to use the bathroom of their choice in public schools to no rights at all (Kennedy). Certain schools give transgenders the right to choose the bathroom that they're comfortable in, while in other schools, it is necessary to be on a sex-reassignment plan and to have your sex legally renamed in order to use the bathroom you wish. Yet, there are problems which occur in this, “Schools can only require an assertion of gender transition. Requiring a diagnosis or treatment before a student is considered transgender may be unfair to lower-income students without access to such options, advocacy groups say” (Blad). One thing that many don't consider is the setting of income in which these students have. Another issue is that President Trump’s opinions on transgender students has lost federal protections that allowed them to use school bathrooms which match their gender. “In several cases, schools have opted to allow transgender students to use bathrooms that match their gender identity, but complaints from parents or others in the community have prompted schools to reverse their policies” (Kennedy). Even though some parents may be worried of danger involving creeps and predators, it is important to take into consideration the safety
As our world develops gradually, we are to the point in time to see new serious disagreements and formal discussions surface, one of these being the issue of whether transgender individuals should be allowed to use the bathroom of the gender they identify themselves as. While many are at an unpleasant emotion, caused by the belief of the risk of sexual violence in bathrooms, or fail to acknowledge transgender individuals as the gender they identify, there is something to be said about this issue, transgender individuals should be allowed to use the bathroom of their choice.
Gender has always been a starting point for much of the judgement in our society whether we realize it or not, and it’s exactly the causes of one of the many controversies that there is today. Title IX, the law passed to help overcome prejudice and grant girls the same opportunities as boys, is getting not only the credit it deserves but much backlash to counter it. The main purpose of this law was originally to give girls the opportunity to play the same sports as boys were able to, and thanks to the law girls are now given these opportunities to play sports in addition to also give many transgender students more rights within the schools than ever before. Even with all these steps forward in society, there are still those who believe
Recently, the issue of allowing transgender people access to public facilities according to the gender they identify with has caused much debate throughout the United States. The bathroom bill seeks to control access to public facilities of transgender individuals, based on the gender they were assigned at birth. In 2015, bills were passed stating entering a bathroom not assigned to a person at birth was a crime. Surrounded by misconception, the bill does “not legalize harassment, stalking, violence, or sexual assault.” Since the bill arose, there have not been a rise in violence or other incidents in the states protecting the transgender rights (Transgender Equality). The bill simply states if one is living as a woman, to use the women’s restroom,
Transgender rights and policies have always been an ongoing debate. In the article, “Bathroom Battlegrounds and Penis Panics,” Schilt and Westbrook (2015) argued that in order to push gender equality forward, we must consider the rights of transgender people by allowing them to have access to bathrooms that support their gender identity rather than their biological sex. In doing so, authors believed that it would make progress in alleviating discrimination against transgender people. However, in this conscious effort to fight for transgender rights and their access to sex-segregated spaces,
The School Board will be in violation of Title IX of the Education Amendments of 1972, 20 U.S.C. §§ 1681 et seq., if they do not allow a male that is diagnosed with gender dysphoria and identifies as a female, access to the female restroom. Though the Supreme Court has not ruled on this topic, a Fourth Circuit ruling, the Department of Education and Department of Justice Dear Colleague Letter, and case law regarding transgender students can help enlighten the school board on this topic. An introductory understanding of Title IX of the Educational Amendments of 1972 will assist in this matter. Title IX of the Educational Amendments of 1972 and its regulations prohibit sex discrimination in schools, educational programs and activities that are recipients of Federal funds. Within Title IX it specifically prohibits the discrimination of student’s based on gender identity, including the discrimination of transgender students. Title IX provides: “[n]o person… shall, on the basis of sex, be excluded from participation in, be denied the benefits of, or be subjected to discrimination under any education program or activity receiving Federal financial assistance” 20 U.S.C. § 1681(a).
The changing norms of the generation has brought upon commotion between various states because of the presidents judgement. The transgender bathroom policy allows transgender students to use the bathroom they identify as and not by the sex on their birth certificate (Fox News, 2016). The transgender bathroom policy has both successes and failure to ensure safety for transgender students resulting to its change being for not only trans-gender. Gender neutral bathrooms allows safety for those who are not only transgender, but also a part of the LGBTQ community, etc. but it causes a conflict with gender segregation. Adding additional bathrooms to suite other gender preferences costs more money and not everyone is going to accept what they walk into the bathroom and see. The gender neutral bathroom policy should be taken off of hold and be put into action because everything is constantly changing and those who do not identify as the sex they were assigned at birth are at risk for harm.
The North Carolina Governor Pat McCrory signs the House Bill 2, the Public Facilities Privacy & Security Act, which undo all previous non-discrimination legislation, to ban transgendered individuals from using restrooms which matches their sexual identification. The law asserts that they should instead use the restrooms which matches the gender listed on their birth certificates. Enraged civil liberties groups around the country has decry the move as backwards and one which may put the well-being of transgenders at risk. Transgendered individuals have historically been a small vulnerable subset of the population, they have often been meted with violence and hostility. They are seen as a perversion and a dearth of moral values and evidence of societal degradation. But like any other vulnerable groups in society, they should be protected, not vilified as perverts and deviants.
The Title IX law, a statement that sounds impeccable, paints a picture of security that transgender students crave.
The hot topic of current events centers around the heated debate over whether Transgender kids should be able to choose what restroom they would like to use based solely on their gender identity. Breaking new ground and blazing new trails to create equality for all is the state of California. Democratic Governor, Jerry Brown, signed Assembly Bill No. 1266 (known as AB1266), which was an act to amend Section 221.5 of the Education Code, relating to pupil rights. The new law gives all students the right “to participate in sex-segregated programs, activities and facilities” based on their self-perceived orientation regardless of their birth gender. AB1266 and Section 221.5 of the Education Code provides equal rights for transgender individuals and promotes anti-discrimination. By allowing transgender boys and girls the right to use a restroom that corresponds to the student’s gender identity– regardless of the student’s sex assigned at birth– you essentially teach children acceptance from a young age. This creates a diverse culture which will help sway the profound perceptions that transgender individuals are oddities and will lend a hand in breaking the generational cycle of discrimination.
forcing a state law barring transgender people from using bathrooms in government buildings and public schools that correspond with their gender identity
Some people have a problem with transgender people using the ¨wrong restroom.¨ In the article “Seat of Unrest” by Sara GoodYear she explains that ¨The board is voting on whether he should be allowed to use the boys restroom at Gloucester High
When approaching public restrooms, most look at the gender on the door that associates with their own gender. However, some stare at those labels wondering which one they belong in. These types of people are often referred to as transgenders. Transgenders are people who identify themselves with the opposite gender of their biological sex. Therefore, for this category of people, entering a restroom is not so easy. They often wonder whether they should go into the bathroom of their biological sex or of their gender identity. The debate has spread throughout America today. Transgender bathrooms have been discussed in politics, education, and even criminal cases. Both sides of the debate offer valid evidence to support their claims. The only compensation
To put it in the simplest form, there is a need for change. Transgender bathroom regulations blatantly oppress transgender individuals all around the nation in many ways. Since the national uprising over transgender bathroom policies Lesbian, Gay, Bisexual, Transgender, and Questioning (LGBTQ) individuals have been impacted greatly. Heath complications, increase in suicides, and undeniable discrimination are a few of the negative impacts these policies have had on LGBTQ people. These individuals, although very significantly affected, are not the only targets impacted as a result of these policies. Loss in revenue, possible lawsuits, and travel bands are among the many consequences felt in the states where these draconian laws were passed.
Gender equality is a pressing issue in the United States. The definition of gender, and the rights that accompany them, is constantly being updated and adjusted. The LBGT community is fighting for equality after being repressed for many years. Because of this sudden movement, social issues are sparking outrage and debate on whether a certain law or right for LBGT people is to be initiated. In many instances, these issues dominate the media, and cause for chaos on both sides of the spectrum. The bathroom controversy exemplifies this. The LBGT community argues that anyone should be able to use whichever bathroom that matches with their identified gender. Members of the LBGT community should not be able to use whatever bathroom they please.
|
<urn:uuid:fd2f7238-e1fa-4649-bd26-fa4da710c1ef>
|
CC-MAIN-2023-14
|
https://www.bartleby.com/essay/Transgender-Identity-Bathrooms-FJJ52PZHMYB
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00638.warc.gz
|
en
| 0.959955 | 2,109 | 2.96875 | 3 |
Battery capacity meter
Measures the capacity of 12V batteries
For tinkering and mobile power supply I have an older car battery in the garage. But now the question came up, what capacity it has left at all. The cheapest method would be to connect a lamp and stop the time until the battery has reached the final discharge voltage. However, if you take into account that the voltage (and thus the load) decreases during the discharge process, this method is quite inaccurate.
So something better is needed. A microcontroller that monitors and calculates all values seems to be more suitable.
The only raw data we need to measure and process are current and voltage. In addition a time measure is needed which the controller generates itself. (per second)
The milliampere hours that have to be added per second (more precisely: milliampere seconds) are calculated from the formula I (current in mA) / 60 / 60. So with a discharge current of 1000mA, 0.27 mA would be taken per second.
The measurement circuit looks as follows:
Depending on the current, the voltage at the output increases. The voltage is later converted to a digital value by means of an analog-to-digital converter.
Voltage is measured by a small voltage divider.
First tests with the calculations and experiments with the analog to digital converter.
Test run of the software / hardware in the garden.
Cooling for the load resistor and increased load. (85 watts)
Minor improvements: Serial port (To log discharge curve with PC), status LEDs, fan that cools load resistor during discharge.
|
<urn:uuid:a5a2b6c7-5cef-4703-98be-e6c9d3d2d793>
|
CC-MAIN-2023-40
|
https://www.maltepoeggel.de/?site=akkucap
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00316.warc.gz
|
en
| 0.938544 | 338 | 2.90625 | 3 |
Story by Anna Schlutt, Staff Writer
Photo courtesy of Anna Schlutt
Grand Rapids has recently begun to develop urban agriculture initiatives throughout the city, trying to increase access to locally grown, sustainable produce.
Urban agriculture has been increasing across the globe, which has led to a growing interest in Grand Rapids.
“There’s a lot of activity and interest citywide,” said Jessica Eimer-Bowen, director of Sustainability at Aquinas.
Urban agriculture can include more than just farming produce. It includes caring for animals and insects in an urban setting.
The official definition, according to the Grand Rapids Urban Agriculture Committee, is “growing or producing food by cultivating plants and raising animals in the city.” This can include extremes like caring for bees and livestock, as well as simple things like farming produce at home, buying from local farmers markets and composting.
Urban agriculture can be done in a variety of places. Some people have the space to farm in their own backyards, but community gardens also can be found across Grand Rapids. Aquinas has its own community garden, which is open to students and maintained by Christina Radisauskas, a librarian at the Grace Hauenstein Library.
“It’s a space you can choose to engage with on an informal basis,” Bowen said.
Bowen has made it easy for students to access the garden and its products. During farming season, a stall sits outside of the area with a basket of fresh produce. Students are also free to pick fruits and vegetables directly from a variety of plants.
Not every school has the space or resources for a community garden. Cornerstone University has instead developed its own form of food sharing through a system known as a “seed library.” Kent District Library has a similar system.
The KDL seed library is open to everyone, not just those with library cards. The mission of the system is to expand access to seeds and to allow everyone to farm.
KDL states that most commercial seeds are bred for shelf life rather than quality. The seed library intends to breed better seeds and to share them throughout the area, allowing for quality urban agriculture. People are allowed to take seeds from the library and plant them. After the seeds mature into plants, gardeners can harvest more seeds from the produce they’ve grown and return them to the library.
Among the leaders of the Grand Rapids urban farming movement is a local nonprofit, Urban Roots. The organization was founded in 2013, intended to empower local communities and to educate people about urban farming.
Urban Roots provides a wide variety of services, including education, a community market and compost pickup. They are based near Madison Square in Southeast Grand Rapids, and offer most services at a discount rate to those who live in the neighborhood.
The team intentionally established its location in an impoverished area; locals have a hard time finding healthy and affordable food within a reasonable distance, as well as education on farming and cooking healthy foods. Urban Roots strives to fill that void.
The organization works hard to get to know the local community. Jeff Pingle, the Urban Roots farm manager, does his best to fulfill neighborhood needs and desires.
“We try to take a lot of requests from people in the neighborhood,” Pingle said.
Unfortunately, it is difficult for a nonprofit to succeed without being supported by a major organization. Running a garden, a community market and a variety of workshops and services takes a serious financial toll on the nonprofit.
“It takes a lot of resources to make something like this run,” said Maaike Baker, the community engagement manager at Urban Roots.
Funding is a major difficulty for Urban Roots to overcome, so they are currently maintaining practical, manageable goals. They focus on the community around them and the education they can provide to Grand Rapids.
“We want to teach people how to not only grow, but also cook and enjoy, healthy food that is good for their bodies and minds,” Baker said.
|
<urn:uuid:9b928ddf-ebb1-4017-8201-4375be5a37e4>
|
CC-MAIN-2020-16
|
https://thesaintaq.com/2018/11/28/urban-agriculture-interest-increasing-in-grand-rapids/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506580.20/warc/CC-MAIN-20200402014600-20200402044600-00345.warc.gz
|
en
| 0.966646 | 829 | 3.234375 | 3 |
Make space for spring onions in your pantry for their numerous health benefits and wide-ranging uses in cooking.
Onions form an essential part of cooking, and it’s time to move beyond the common red onions. Spring onions, the slender and milder cousins of robust red onions, are widely used in Asian cuisine. Harvested before they fully mature into round red onions, spring onions offer a subtle sweetness and delicate flavour that sets them apart from their pungent relatives. While recipes for chilli chicken, fried rice, and noodles often call for spring onions, we tend to overlook them in our kitchens, resulting in a flavour that falls short of restaurant quality. It’s time to make space for spring onions in your pantry, and we’ll give you plenty of reasons to do so. But first, let’s find out:
Are Spring Onions Good for Health? Here Are Some Health Benefits They Offer:
1. Blood Sugar Regulation:
Spring onions excel at regulating blood sugar levels due to the presence of sulfur compounds. These compounds stimulate insulin production, reducing the risk of diabetes.
2. Digestive Aid:
Celebrated for their digestive prowess, spring onions are rich in fibre, promoting healthy digestion and preventing digestive issues. Whether incorporated into meals alongside other vegetables or enjoyed on their own, spring onions make a wonderful addition to your daily diet, whether cooked or raw.
3. Better Vision:
Beyond their vibrant green hue, spring onions offer more than just visual appeal. They contain carotenoids, contributing to optimal eye health. Additionally, their abundance of vitamin A acts as a protective shield, preventing vision loss.
4. Cold and Flu Defense:
Including spring onions in your diet can bolster your immune system and help combat colds and flu. Their natural antibacterial and antiviral properties make them an excellent remedy for viral infections, while also assisting in reducing excess mucus production.
5. Healthy Heart:
Thanks to their anti-inflammatory properties and high levels of antioxidants, spring onions help regulate blood pressure, promoting a healthy heart.
In addition to their health benefits, spring onions are a versatile ingredient in the culinary world. Here are some delightful ways to incorporate them into your cooking:
What Are Spring Onions Used For? 5 Best Ways to Use Them in Cooking:
1. Stir-Fries and Sauteed Dishes:
Add a touch of freshness and a mild onion flavour to your stir-fries and sauteed dishes by including chopped spring onions. They lend a delightful crunch and subtle aromatic notes to your creations.
2. Salads and Salsas:
Infuse your salads and salsas with the vibrant essence of spring onions for an extra layer of flavour. Thinly slice them and toss them with crisp greens, juicy tomatoes, and a zesty dressing to create a refreshing salad. For a spicy twist, combine spring onions with chopped chilli peppers, tomatoes, and lime juice to make a tantalizing salsa.
3. Garnishes and Toppings:
Enhance the visual appeal and taste of your dishes by using spring onions as garnishes or toppings. Sprinkle finely chopped spring onions over soups, stews, grilled meats, or roasted vegetables to add a burst of freshness and colour.
4. Dips and Sauces:
Create a flavorful dip or sauce by incorporating spring onions into the mix. Blend them with yogurt, lemon juice, and herbs to create a tangy and creamy dip that pairs perfectly with toast or pita bread.
5. Indian Dishes:
Yes, spring onions can be used in Indian dishes too, and the possibilities are endless. Make stuffed spring onion paratha or use them as a base to add a unique flavour profile to your dry sabzis. Get experimental and explore their wonders in your desi menu.
With their great taste and numerous health benefits, spring onions have rightfully earned their place in the culinary world. Let them enhance your cooking and nourish your well-being along the way.
|
<urn:uuid:9f2e901c-be5c-475e-a943-199ea95ab9f4>
|
CC-MAIN-2023-40
|
https://mainnews.us/foods-news/why-keep-spring-onions-in-the-kitchen-for-good-health-and-delish-meals/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506029.42/warc/CC-MAIN-20230921174008-20230921204008-00406.warc.gz
|
en
| 0.9035 | 836 | 2.78125 | 3 |
Active and passive smoking increase the risk for many diseases and affect lung health in various ways:
-Lung cancer. Smoking is responsible for more than two-thirds of lung cancer deaths globally, while passive smoking increases the risk of developing lung cancer for non-smokers. Lung cancer is the leading cause of cancer death in most countries of the WHO European region. Approximately 430,000 people died of lung cancer in this region in 2018, and during that period more than half a million new cases were diagnosed. Quitting smoking reduces the risk of lung cancer; 10 years after quitting smoking the risk is reduced to about half that of a smoker.
-Chronic respiratory diseases , such as chronic obstructive pulmonary disease (SPOK) and asthma. Smoking is the leading cause of SPOK, a condition that results in painful cough and difficulty breathing. This condition worsens asthma, which limits activity and affects disability. According to the latest data, 3.6% of total deaths in the European region were due to COPD in 2017. Early smoking cessation is the most effective way of slowing down COPD progression and improving asthma symptoms .
Children exposed to tobacco smoke have a higher risk of developing frequent respiratory infections, as well as being affected by asthma, pneumonia and bronchitis. Chemical constituents of tobacco smoke can cause latent TB (TB) infections. Smoking can also increase the risk of disability and death from respiratory blockage in people with active TB.
Source: Institute of Public Health
|
<urn:uuid:7ee2d4ec-37db-42d7-b18d-92e27e383999>
|
CC-MAIN-2020-24
|
https://www.classlifestyle.com/news/38852/mos-pini-duhan-ne-prani-te-femijeve-ja-nga-cfare-rrezikohen-ata/eng/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347422065.56/warc/CC-MAIN-20200602002343-20200602032343-00553.warc.gz
|
en
| 0.96489 | 298 | 3.5625 | 4 |
Minimum Wages and Poverty in a Developing Country: Simulations from Indonesia's Household Survey
AbstractSummary This study focuses on minimum wages, income distribution, and poverty, taking Indonesia as a case study. A simulation approach assesses who benefits and who pays for minimum wage increases. Among the poor, a minimum wages increase boosts net incomes for 21% of the households, while it results in net losses to 79% of the households. The impact is slightly less severe when there are job losses. Although minimum wage increases are mildly progressive (the non-poor pay a higher share of the costs), they are unlikely to be an effective antipoverty instrument in developing countries like Indonesia.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoArticle provided by Elsevier in its journal World Development.
Volume (Year): 36 (2008)
Issue (Month): 5 (May)
Contact details of provider:
Web page: http://www.elsevier.com/locate/worlddev
Other versions of this item:
- Kelly Bird & Chris Manning, 2005. "Minimum Wages and Poverty in a Developing Country: Simulations from Indonesia's Household Survey," Departmental Working Papers 2005-09, The Australian National University, Arndt-Corden Department of Economics.
- I31 - Health, Education, and Welfare - - Welfare, Well-Being, and Poverty - - - General Welfare, Well-Being
- J33 - Labor and Demographic Economics - - Wages, Compensation, and Labor Costs - - - Compensation Packages; Payment Methods
- J38 - Labor and Demographic Economics - - Wages, Compensation, and Labor Costs - - - Public Policy
- O15 - Economic Development, Technological Change, and Growth - - Economic Development - - - Economic Development: Human Resources; Human Development; Income Distribution; Migration
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Martφn Rama, 2001.
"The Consequences of doubling the minimum wage: The case of Indonesia,"
Industrial and Labor Relations Review,
ILR Review, Cornell University, ILR School, vol. 54(4), pages 864-881, July.
- Rama, Martin, 1996. "The consequences of doubling the minimum wage : the case of Indonesia," Policy Research Working Paper Series 1643, The World Bank.
- David Neumark & William Wascher, 2002.
"Do Minimum Wages Fight Poverty?,"
Western Economic Association International, vol. 40(3), pages 315-333, July.
- Manning,Chris, 1998. "Indonesian Labour in Transition," Cambridge Books, Cambridge University Press, number 9780521594127, October.
- Bell, Linda A, 1997. "The Impact of Minimum Wages in Mexico and Colombia," Journal of Labor Economics, University of Chicago Press, vol. 15(3), pages S102-35, July.
- L. Alan Winters & Neil McCulloch & Andrew McKay, 2004. "Trade Liberalization and Poverty: The Evidence So Far," Journal of Economic Literature, American Economic Association, vol. 42(1), pages 72-115, March.
- Asep Suryahadi & Wenefrida Widyanti & Daniel Perwira & Sudarno Sumarto, 2003. "Minimum Wage Policy And Its Impact On Employment In The Urban Formal Sector," Bulletin of Indonesian Economic Studies, Taylor & Francis Journals, vol. 39(1), pages 29-50.
- Baker, Michael & Benjamin, Dwayne & Stanger, Shuchita, 1999. "The Highs and Lows of the Minimum Wage Effect: A Time-Series Cross-Section Study of the Canadian Law," Journal of Labor Economics, University of Chicago Press, vol. 17(2), pages 318-50, April.
- Alatas, Vivi & Cameron, Lisa, 2003. "The impact of minimum wages on employment in a low income country : an evaluation using the difference-differences approach," Policy Research Working Paper Series 2985, The World Bank.
- Lustig, N. & Mcleod, D., 1996. "Minimum Wages and Poverty in Developing Countries : Some Empirical Evidence," Papers 125, Brookings Institution - Working Papers.
- Dollar, David & Kraay, Aart, 2001.
"Growth is good for the poor,"
Policy Research Working Paper Series
2587, The World Bank.
- Ann Harrison & Jason Scorse, 2004. "Moving Up or Moving Out? Anti-Sweatshop Activists and Labor Market Outcomes," NBER Working Papers 10492, National Bureau of Economic Research, Inc.
- David Neumark & William Wascher, 1992. "Employment effects of minimum and subminimum wages: Panel data on state minimum wage laws," Industrial and Labor Relations Review, ILR Review, Cornell University, ILR School, vol. 46(1), pages 55-81, October.
- Foster, James & Greer, Joel & Thorbecke, Erik, 1984. "A Class of Decomposable Poverty Measures," Econometrica, Econometric Society, vol. 52(3), pages 761-66, May.
- Burkhauser, Richard V & Couch, Kenneth A & Wittenburg, David C, 2000. "A Reassessment of the New Economics of the Minimum Wage Literature with Monthly Data from the Current Population Survey," Journal of Labor Economics, University of Chicago Press, vol. 18(4), pages 653-80, October.
- Danziger, Leif, 2009.
"Endogenous Monopsony and the Perverse Effect of the Minimum Wage in Small Firms,"
IZA Discussion Papers
4320, Institute for the Study of Labor (IZA).
- Danziger, Leif, 2010. "Endogenous monopsony and the perverse effect of the minimum wage in small firms," Labour Economics, Elsevier, vol. 17(1), pages 224-229, January.
- Leif Danziger, 2009. "Endogenous Monopsony and the Perverse Effect of the Minimum Wage in Small Firms," CESifo Working Paper Series 2740, CESifo Group Munich.
- Takahiro Akita & Ni Made Inna Dariwardani, 2013. "Chronic and Transient Poverty in Indonesia: A Spatial Perspective with the 2008-2010 Susenas Panel Data," Working Papers EMS_2013_19, Research Institute, International University of Japan.
- Kapelyuk Sergey, 2014. "Impact of minimum wage on income distribution and poverty in Russia," EERC Working Paper Series 14/03e, EERC Research Network, Russia and CIS.
- Pauw, Karl & Leibbrandt, Murray, 2012. "Minimum Wages and Household Poverty: General Equilibrium Macro–Micro Simulations for South Africa," World Development, Elsevier, vol. 40(4), pages 771-783.
- Armida Alisjahbana & Chris Manning, 2006. "Labour market dimensions of poverty in Indonesia," Bulletin of Indonesian Economic Studies, Taylor & Francis Journals, vol. 42(2), pages 235-261.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Zhang, Lei).
If references are entirely missing, you can add them using this form.
|
<urn:uuid:7c71be41-c6c3-487b-b5c6-470e16a2c123>
|
CC-MAIN-2014-23
|
http://ideas.repec.org/a/eee/wdevel/v36y2008i5p916-933.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776428772.70/warc/CC-MAIN-20140707234028-00064-ip-10-180-212-248.ec2.internal.warc.gz
|
en
| 0.76971 | 1,641 | 2.90625 | 3 |
One thing that unites Americans, pretty much wherever they are from, is the conviction that their own state is singularly corrupt. Most states, if not all, have their harrowing stories of arrested governors or legislators. Just in the past few weeks, California state Sen. Ron Calderon got stripped of all his legislative assignments, following reports that he may have taken $88,000 in bribes from an undercover federal agent.
But corruption is a common problem in most places, so your state probably isn’t as bad as you think. And if it is especially bad, odds are good that your state has a small capital city — one that is far away from your state’s biggest population centers. As it turns out, that’s not coincidental.
Think of a U.S. state, and the city that comes to mind probably isn’t the capital. Florida will bring to mind Miami; New York, New York City; Illinois, Chicago; California brings to mind Los Angeles and San Francisco. Yes, there are cases where the dominant city is also the capital — Atlanta or Boston — but the small-capital model is more prevalent.
Why is that the case? Much thought and political back-and-forth went into the process of designating state capitals. In many places, there was one strong concern: political power ought to be kept geographically separated from economic power. If the most powerful economic interests are too close to the center of political power, the idea went, the latter would be too easily captured by the former, opening the door for corruption.
The idea seems sensible at face value. But it has backfired. My research (with my colleague Quoc-Anh Do, from Sciences Po Paris) has found that states with more isolated capital cities are ranked as more corrupt. This is true even when you control for many characteristics that have been found to correlate with corruption at the state level, such as education or income. Using statistical techniques, we found evidence supportive of a causal interpretation — in other words, that having a more isolated capital city leads to more corruption.
But why would that be the case? The likely answer is that having an isolated capital city means putting too much distance between politicians and the sort of people who hold them in check.
Start with the media covering state politics. We find that newspapers with readers close to the capital tend to devote significantly more coverage to state politics and politicians. When the capital is in a small place, state politics is going to be covered by a small newspaper, with fewer journalistic resources and a smaller audience than their big-city brethren.
What fills the resulting void of information and accountability? Cash, for one thing. Our research found that states with more isolated capitals have more money in state politics. We find evidence that states with isolated capitals tend to spend less, and less effectively, in the provision of public goods such as education, and to spend more on administrative expenditures instead. With fewer people watching, politicians use public money less wisely.
Should we move California’s capital to L.A.? After all, the average Angeleno is unlikely to be any more or less honest than a Sacramentan, but the average Sacramentan, living in the capital, does seem to be more interested, informed and engaged with what goes on in state government. Since there are many more Angelenos, it could make a difference if we could reverse that pattern.
Still, I would not go that far. Moving capital cities is a huge and costly endeavor, and traffic congestion is awful in L.A.
It does seem important to recognize, however, that politicians in isolated state capitals need special vigilance. In such places, those who are interested in fighting corruption must redouble their efforts. To put it another way: when the neighbors are far away, watchdogs have to bark louder.
Filipe Campante is an associate professor of public policy at the Harvard Kennedy School. He wrote this for Zocalo Public Square.
|
<urn:uuid:3ca8c956-8866-40c3-873d-b1be60e762d3>
|
CC-MAIN-2017-30
|
http://www.pasadenastarnews.com/opinion/20131119/if-capital-is-far-away-politicians-will-play-guest-commentary
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424909.50/warc/CC-MAIN-20170724182233-20170724202233-00487.warc.gz
|
en
| 0.966009 | 813 | 2.75 | 3 |
With 200 billion stars in the galaxy, many of them with planets similar to Earth, there is a strong possibility that we are not alone in this universe. If that is true, then why haven’t we met any alien life forms yet?
It would take approximately 100,000 light years to travel from one end of the Milky Way galaxy to the other. The Earth’s most state-of-the-art spaceships would be lucky to reach even a tenth of this speed. Even so, considering that this galaxy is about 13 billion years old, a technologically advanced alien lifeform should have reached us by now. So why haven’t we encountered them yet? Maybe aliens don’t really exist, after all. Or maybe have made too many assumptions about them. They might not be as technologically advanced as humans have been led to believe, or they may take on such a form that we have never thought of before. Mankind’s best hope for truly finding any alien lifeform would be to throw out any pre-conceived notions.
|
<urn:uuid:f48c7263-d82d-49bd-8b22-d407cd0d1de5>
|
CC-MAIN-2017-34
|
http://alyten.com/videos/why-havent-we-found-alien-life-yet/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104565.76/warc/CC-MAIN-20170818043915-20170818063915-00439.warc.gz
|
en
| 0.968271 | 217 | 3.265625 | 3 |
All you need to justify your Kit Kat habit
The next time you forget the name of your neighbor’s dog (What is it about “Mr. Biscuits” that’s so hard to remember?) don’t reach for the ginkgo pills (that stuff doesn’t work anyway; check it out). Instead? Stick some chocolate in your mouth.
In what is possibly the best—or at the very least, the most entertaining—study we’ve ever heard about, scientists from the University of Calgary’s Hotchkiss Brain Institute set out to see if chocolate can help improve memory. In snails. (Don’t worry; there’s something in this for all of you non-snails, too.)
Other foods could have worked—green tea, cocoa, and red wine also contain epicatechin, a type of plant antioxidant known as a flavonoid—it’s just that this particular study happened to focus on chocolate. And snails.
Here’s how the experiment worked: The scientists submerged snails in either normal water or water with epicatechin for 30 minutes. They rendered the water hypoxic (meaning they sucked some of the O2 out of the water so the snails would pop their breathing tubes out to look for more) and poked the snails with a stick whenever the little guys tried to use their breathing tubes. “Much like if you were in my class and every time you yawned, I tapped you on the nose, you’d learn not to yawn,” explains lead study author Ken Lukowiak, PhD, a professor of neuroscience at the University of Calgary.
One day later, the scientists repeated the poking exercise to see how many times snails opened their breathing tubes. A reduction would prove that the snails remembered what happened when they popped out their tubes.
The results? Snails in the regular water had memories that lasted about three hours. But snails in the “chocolate water” could go from 24 to 48 hours. “That’s a real big difference,” Lukowiak says. “To go from three hours to 24, you have to have altered gene activity in the neurons that make the memory.” In other words, the flavonoid in chocolate appeared to cross the skin to directly affect the brain just like oxygen does.
So do these results mean anything if you happen to not be a snail?
Absolutely. “A neuron in any animal behaves very similarly to a neuron in a human,” says Lukowiak.
But in the name of science, Lukowiak tried the experiment with his own daughter. Not by putting her in water and bopping her on the head—let’s not be ridiculous here—but by feeding her chocolate before a big exam. For three nights prior to the test, she consumed dark chocolate right before studying. “She said she did much better than she thought she would!” Lukowiak says, though he acknowledged other confounding variables. “Possibly it just made her happy.”
Sure, more research is needed before science can say that chocolate really does help the memory of a human, but this is one thing we’re happy to jump the gun on—in the name of science, of course. Bring on the chocolate.
More from Prevention: 7 Surprising Ways To Boost Your Brain
Published September 2012, Prevention
|
<urn:uuid:b13c1a92-532b-4803-86de-b23148754328>
|
CC-MAIN-2013-20
|
http://www.prevention.com/food/food-remedies/chocolate-shown-improve-memory-snails?cm_mmc=MSNBC-_-PVN_News-_-The%20Weird%20Reason%20You%20Overeat-_-Your%20Brain%20On%20Chocolate%20RL
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710366143/warc/CC-MAIN-20130516131926-00016-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.964 | 723 | 3.0625 | 3 |
Samuel Jr. was the son of Samuel and Sarah Whitehead, who lived on what would be George Street between Church and Meadow (map of 1641). In 1642, Samuel, Sr. was a corporal in the trained band, where he rose to rank of sergeant and was a member of the troop raised to subjugate the Dutch in New Amsterdam (New York) in 1653. Cromwell had sent a fleet of ships from England to deal with the conflict. New Haven supplied fifty men, all of them church members as required. Samuel, Sr. married the widow Sarah Gilbert (maiden name: Gregson); he died in 1690, and she died in 1697.
Samuel Jr. married Tabitha Holt (1683-1743) in 1709, the year of his death. He was chosen a hayward for the suburbs in 1700 and was a proprietor in the town plot. He was also a fence viewer in the Yorkshire Quarter in 1701. There is mention of Whitehead’s Hill on the west side of town in the 1714 minutes of the Town Council, so they must have lived in the so called Hill area.
Samuel’s brother, Stephen Whitehead, married and had a daughter named Sarah (1729-1769), who went on to marry a Dr. Leverett Hubbard. With the marriage of the elder Samuel’s granddaughter into the Hubbard family, the Whitehead homestead passed on with her and remained with the Hubbards for almost two centuries.
|
<urn:uuid:0d017ad4-ffd6-4866-9cdf-d553fe3586ac>
|
CC-MAIN-2017-30
|
https://ctcryptkeeper.wordpress.com/2014/06/18/samuel-whitehead-jr-1676-1709/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424909.50/warc/CC-MAIN-20170724182233-20170724202233-00563.warc.gz
|
en
| 0.984717 | 315 | 2.6875 | 3 |
The Wangerriburra Clan of the Yugambeh language group occupied this land before the arrival of Europeans. Yarrabilba means 'place of song' in Wangerriburra/Bundjalung language. The area still contains many artefacts and evidence of their occupation.
Original European settlers who took up land within the boundaries of Yarrabilba include Henry and Isaac Seymore, Thomas Plunkett, William Walsh, George Richardson, Alexander Watt, Daniel Kelso, Samuel Kelso, Andrew Watt and William Steele.
Steele's Road led to the property on bank of the river owned by William Steele, and taken up by him around 1862. He built a house on the Albert River and is considered to be the first white settler in the area. The falls on the river here were known as Steele's falls as was the creek and the road. It is thought that he grew cotton and later sugar and owned a mill. His property was known as Albert Park. It was later the home of the Waldron Family and later again was occupied by Alf Henderson, eldest son of James Henderson of Tabragalba.
Isaac Seymore was from Northern Ireland. Two families of Seymours arrived together on the Roddell Bay in July 1877, which included Isaac senior (61) and Junior (21), as well as Henry senior (60) and junior (15), Fanny (23), Henrietta (20), Catherine (18), Charlotte (17) and Charles (10). The Electoral rolls of 1879 indicate that Henry resided at Quinzeh Flat, and Isaac junior and senior resided at Parish of Moffatt and Logan Village respectively, which may well mean the same place. Henry senior died in November 1879 and by 1884, his son had moved to Veresdale. Henry senior was the first burial in the Logan Village Cemetery and land was formally subdivided from the Seymore property for this purpose in 1885. Land for the cemetery had apparently been promised back in the mid 1870s and William Drynan wrote to Peter McLean the local MLA reminding him of this in 1877.
Thomas Plunkett arrived in Queensland aboard the Fiery Star in 1863, along with Michael Yore, with whom he had a long friendship. Both initially went to the Gympie gold fields, where they met William Walsh. Yore and Plunkett then selected land together on the south bank of the Logan River, near the current intersection of Deer Lane and Waterford-Tamborine Road. The original property was known as Argyle according to the electoral rolls of the late 1860s. In 1872 Yore sold his share to Plunkett and took up land on the banks of the Albert River near Tamborine Village, where he established a dairy. In the 1880s his property was known as Villa Marie. (Presumably the property was named in honour of his wife Mary Ryan.)
Plunkett nominated as a candidate for parliament in 1888 and represented the electorate for eight years initially, before being defeated by local rival R M Collins, but was returned again in 1902, 1904 and 1907. He was instrumental in the construction of the railway from Logan Village to Canungra. Due to ill health he was unable to attend the initial turning of the sod ceremony in 1913, and died shortly after. His son Thomas Flood Plunkett took over the running another family property near Kerry. He was a member of the Beaudesert Divisional Board, a JP, founder of the local Farmer's Union, Director and Chairman of the Logan and Albert Co-operative Dairy, trustee of the Logan and Albert Pastoral Society and treasurer of the Beaudesert Railway League. His brothers Christopher and Walter managed Villa Marie Estate.
William Walsh arrived in Queensland aboard the Prince Consort in 1862. He initially settled on the Logan River at Chambers Flat in the mid 1860s. He married Catherine Ryan in 1868 and she bore him three children. In 1869 he took up 100 acres near the Albert River at Tamborine and continued to add to that landholding, eventually owning 2,000 acres which he devoted to grazing, dairying and cultivation, and was the first in the district to use a plough. His property was known as Munster Vale. Catherine died in 1876, and he apparently went gold seeking on the Palmer River for a short while. He returned to the Logan district and married Margaret Yore, daughter of John Yore. John's brother Michael Yore was an early landholder on Tamborine Mountain where William Walsh also selected land in 1875. William and Margaret had 8 children. He was a member on the Tabragalba Divisional Board (part of which later became the Beaudesert Divisional Board) and the first Chairman of the Tamborine Divisional Board in 1890 and prominent in the Shire Council from 1903. Sons Edward and Ernie remained in the district.
The Ryan family have links to three families in this region through marriage. James Ryan and family came to Queensland on the Erin-go-Brah in 1862. Daughter Catherine married William Walsh, daughter Ann married Michael Yore, and Mary married Thomas Plunkett.
The Kelso family, Daniel (28), Samuel (29), their sister Margaret Pollock (30) her daughter Mary (8) and their mother Jane (50) arrived aboard the Maryborough in May 1866 from Glasgow. Also on board were Caleb (36) and Edmund F. Curtis (11). The remainder of the Curtis family came to Queensland aboard the Royal Dane in April 1867. They included mother Mary, and children Helena, Sydney, Edgar, Clifford and baby Ann. The family initially settled at Eight Mile Plains. Four more children were born in Queensland. Caleb and Mary selected land on the Albert River immediately south of Kelso's land. Curtis' Albert River property was called Leigh Farm. Caleb Curtis died in 1908 and is buried on the property, along with wife Mary who died in 1912. Other family members are also buried here including Ethel Lillian, Esther Sarah (daughter of Charlotte Kingston and Henry Curtis).
Edmund Curtis and his brother Sidney first walked up to Mount Tamborine when they were very young men and resolved to live there one day. In 1877 both brothers selected land there. Mary Jane Pollock married Edmund Ford Curtis in 1878 and produced 11 children. It is likely that Margaret Pollock lived with her daughter on the mountain, as the titles searches indicate Tamborine Mountain as her place of residence. The Curtis brothers erected the waterwheel on Cedar Creek in 1888. Daniel Kelso also selected land on Mount Tamborine.
Daniel Kelso died in 1886, Samuel died in 1907 and Margaret in 1895, their property being transferred to William Gordon Curtis, the eldest son of Edmund and Mary Jane Curtis (nee Pollock).
Residents of the Tamborine Village region, began lobbying the government for a rail connection in 1886 shortly after the Beenleigh line was completed. George Phillips surveyed a nine mile route to Tamborine Village township, but the main expense of the project was a bridge over the Albert River. Further agitations were made in 1888 led by J. W. Lahey. Laheys wanted to open up timber reserves in the Canungra area, and eventually began construction of a private rail line from Canungra to the upper Coomera, via a tunnel under the Darlington Range in 1901.
In May 1910 an inspection was carried out by the Premier (The Honourable W Kidston) and Cabinet Ministers of the proposed route of the railway. A non stop trip to Logan Village and a quick lunch at the hotel was followed by a horse and buggy trip to Canungra organised by the Tamborine Shire Council. An improvised bridge allowed for the crossing of the Albert River. The party reached Canungra by nightfall and were accommodated in tents. The Tamborine Shire Council representative William Walsh together with J W Lahey argued for the economic importance of the line for both the timber and dairying industries.
Construction approval was given in 1911. The line was completed to Bromfleet in March 1915 and to Canungra by 2 July. It was essentially a freight line. Passenger trains ran on occasional Sunday 'excursions' to Canungra, which could carry up to 400 people. The Plunkett station was located on the north bank of the Albert River within the current suburb of Yarrabilba. When the Commonwealth War Service Homes Department bought the Canungra mill from Laheys in 1920, the tramway closed and although the Standply Timber Company later took over, the tramway operated spasmodically after that. The use of the line was limited to the quality of the track between Logan Village and Canungra and the strength of the bridge over the Albert River. By 1939 the service was reduced to two trains per week and many of the sidings were removed.
The busiest traffic on this line was to and from the American Army Camp from 1942. The camp was named in honour of Sergeant Gerald O'Cable, one of the 32nd Infantry Division, or Red Arrow Brigade, who was killed during transport along the southern Australian coast when torpedoed by a Japanese submarine. The Australians had camps at Maclean, Jimboomba, Tamborine and Canungra and the Americans at Jimboomba, Tamborine and Beaudesert. The Americans built Camp Cable Road to link with Jimboomba and the road between Tamborine and Logan Village was sealed. All culverts and bridges in the area were upgraded. An army hospital was built on the south side of the river as well as a theatre, which was where General MacArthur addressed the troops as did Eleanor Roosevelt. This was a major camp housing men en route to service in the Pacific war and at one time had 35,000 soldiers stationed there. A railway siding was constructed at Logan Village and large igloos were constructed to house and handle the stores for the troops. The Logan Village Hall was commandeered to serve as a post office and administrative centre. After the war the Logan Village community constructed a small monument to the soldiers, built of rocks found on the site. Two other monuments also stand nearby at the Camp Cable Road intersection with Tamborine-Waterford Road. One is in honour of Vicksburg, a small dog who had stowed away on the S.S. Lurline and was not discovered until they were four days out of San Francisco. She became the Division's mascot. She was born in the town where the final major campaign of the American Civil War occurred. Vicksburg was accidentally killed in Southport on 8 October 1942. The other monument is in honour of Sergeant Robert Dannerburg, killed in action on 2 June 1942. He saved a fellow soldier after his platoon walked into a sniper's nest in New Guinea. He was posthumously awarded the Silver Star for gallantry. The soldiers arrived in Brisbane on 2 July 1942. The Red Arrow Brigade served in New Guinea and Luzon, and took the surrender from the Japanese in Luzon, Philippines on 2 September 1945.
Camp Cable had a major impact on the local area and provided business opportunities to many Queensland companies. Contracts were let to provide 122 latrines, 92 mess kitchens, 96 bath houses, 156 tank stands and 24 storage sheds as well as the 4 ward hospital and 5 infirmaries. Water was pumped from the Albert River and stored in tanks and able to provide 12,000 gallons (54,600 litres) per hour. Tradesmen failed to clean up following tank construction causing the death of a valuable heifer which accidentally ate scrap metal, and the owner, Stimpson, wanted his property cleaned up, re-fenced and compensation for the loss of the cow.
The railway was closed in 1955.
Following the war a significant amount of this estate was purchased by James Fairlie Brett in 1947. Bretts had significant interests in sawmills throughout South East Queensland. From 1933 his company began the manufacture of plywood. In 1942 he established a business in New Guinea. His business interests came to include wool, gold, oil and cement companies. He never married and died in 1966 with his estate valued at $1,578 at the time. The degree of timbergetting undertaken by Bretts at Yarrabliba is unknown, but presumably they would have utilised whatever native timbers that were of use for their enterprises.
Hancock Brothers began purchasing land here from 1965. Hancock's business had been established by Josias Henry Hancock senior at South Brisbane in 1898. Josias Henry Junior, known as Harry, joined the family business as soon as he left school, and soon became the chairman of the board. The company by then was known as Hancock and Gore. His business interests were similar to that of James Brett. Hancocks also established a plywood mill in 1930-31 and became one of Australia's largest plywood producers. He also had interests in New Guinea but was betrayed by a confidence trickster in 1944 and his firm suffered the indignity of a Royal Commission. He died the following year, leaving four sons and a wife.
Hancock brothers established a nursery to raise the seedlings and began planting Pinus Elliotti (slash pine) in 1966. John Hancock supervised the activities and employed seven men on the site. His brother Viv is credited with encouraging a sustainable approach to forestry. Timber from this plantation supplied the company's plywood mill at Ipswich. Plantings in 1966 covered 16 hectares, with 93 hectares in 1967 and 139 the following year. From then on each year saw between 150 and 200ha planted until 1977, when the area was considered to be fully stocked. Logging in 1980 produced 18,000 cubic metres of timber. A large forest fire destroyed about 283 hectares in October 2001. Viv Hancock died in 1989 and is buried at the Logan Village Cemetery. The old Hancock mill was burnt down in April 2008.
One of the most controversial outcomes from World War II activities on the site has been the discovery of unexploded ordinances (UXOs). In September 1981 the Logan and Albert Times reported on three mortar bombs found in the area. In 1984 a resident on a new estate in the Logan Village area found an old grenade, which was detonated by Army ammunition technicians. Further articles on UXOs were published in the Gold Coast Bulletin in 1984.
In November 1991 Hancock Brothers called a public meeting at the Logan Village School to discuss a proposed rural residential development for the former Camp Cable site. A development application was before the Beaudesert Shire Council at that time. The Logan Village Progress Association lodged an objection because of the lack of services to the proposed 2000 blocks of land. By 1993 the Beaudesert Shire Council gave conditional approval to the staged development, the concern over the UXOs, led to the Beaudesert Shire Council listing affected properties on the contaminated land register. Local residents continued to lobby for the Federal Government to conduct a sweep of the area and commit to removing any UXOs. Residents staged a protests rally and street march in Brisbane in November 1995. Current advice from the Environment Protection Agency is that of minimal risk of contamination of the site from UXOs.
|
<urn:uuid:420a6ad5-b761-446d-90fd-3b611ecc9f07>
|
CC-MAIN-2017-39
|
http://www.logan.qld.gov.au/about-logan/suburbs/yarrabilba
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695113.88/warc/CC-MAIN-20170926070351-20170926090351-00331.warc.gz
|
en
| 0.982204 | 3,121 | 2.59375 | 3 |
Kenmore / Whirlpool Top Load Upper Agitatoren
Bunlar, bu cihaz için yaygınca kullanılan bazı aletler. Her işlem için her alete ihtiyacınız yoktur.
Background and Identification
A washing machine (laundry machine, clothes washer, or washer) is a machine to wash laundry, such as clothing and sheets. The term is mostly applied only to machines that use water as opposed to dry cleaning (which uses alternative cleaning fluids, and is performed by specialist businesses) or ultrasonic cleaners. Washing entails immersing, dipping, rubbing, or scrubbing in water usually accompanied by detergent, or bleach.
The simplest machines may simply agitate clothes in water while switched on; automatic machines may fill, empty, wash, spin, and heat in a cycle. Most washing machines remove substantial amounts of water from the laundry at the end of a wash cycle, but do not completely dry it.
These are technical information for models
LG Model WMXXXX
|
<urn:uuid:f3fec761-2e33-458c-a7cb-c67d0e49a1d6>
|
CC-MAIN-2020-05
|
https://tr.ifixit.com/Device/Washing_Machine
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250616186.38/warc/CC-MAIN-20200124070934-20200124095934-00375.warc.gz
|
en
| 0.828801 | 230 | 2.921875 | 3 |
Chiropractic treatment has been tried for over century. Recently several scientific papers have published suggesting chiropractic treatment has cured several diseases by multimodal approach.
- Yes, chiropractic therapy is one of the established choices of treatment for pain relief.
- Yes, in few cases patient may not need pain medications.
- Yes, one should consider chiropractic therapy as one of the choice of treatment for acute and chronic pain.
- Yes, chiropractic therapy is contraindicated in certain diseases. Chiropractor will perform detailed examination and rule out all diseases, which should be avoided.
Few Facts about Chiropractic Treatment
- Chiropractic treatment has been tried successfully over a century.
- Chiropractic treatment has been in practice since 1895.
- First cervical (neck) spinal adjustment was performed by Daniel Palmer of Iowa to treat deafness.
- Deaf patient was able to hear near normal.
Chiropractic School and Training
- The first training school was opened by founder of Chiropractic Therapy, Daniel Palmer in 1987.
- The training includes study of anatomy and physiology of human in detail.
- Chiropractic technique has improved over recent years. The diagnostic study has helped to improve the method and outcome of treatment.
- Diagnostic studies used in chiropractic therapy are X-Ray, Ultrasound, CT Scan and MRI.
- The manipulation of extremities and spine is now supported by scientific clinical research and publications.
Most Common Diseases Treated By Chiropractic Treatment
Chiropractic treatment has been used to treat acute and chronic pain mostly caused by muscles, skeletal system and nerves. Several diseases are treated by multimodal approach of chiropractic therapy. Most common illness resulting in pain treated by chiropractic therapies are as follows-
- Biomechanical Spinal
- Joint Disorder
- Structural Spinal and Joint Imbalance
- Benign Hypermobility
- Extremity Pain
- Spine Pain
- Neck Pain.
Chiropractic Treatment for Obesity1
- Chiropractic treatment is used to lose weight in treating obesity.
- Obesity is treated with diet and exercise. Diet control may result in metabolic disorder.
- Scientific paper published suggests chiropractic treatment helps to lose weight in obese patient.
- Treatment prevents metabolic and physiological changes in obese patient during and after treatment.1
- Chiropractic treatment assists in motivating patient to maintain active life style.
- Therapies also reduce joint and muscle pain as well as adjust appetite to activities.
- The additional calories are avoided.
Chiropractic Treatment for Benign Joint Hypermobility (BJHS)2
- Patient suffers with severe low back pain, joint pain and often considered disabled because of benign joint hypermobility disorder or BJHS disorder.
- Research study suggests multimodal chiropractic treatments were tried in patients suffering with BJHS.
- Patient in the study were complaining of chronic low back pain, neck pain, joint pain and headaches. The patients were diagnosed of benign joint hypermobility disorder or BJHS.
- Joints hypermobility were observed in thumbs, elbows, right knee, and lumbo-pelvic region.
- The pain intensity was reduced and disability was decreased after a course of multimodal chiropractic care.2
- Multimodal Treatment Includes-
Chiropractic Treatment for Foot Drop Due To Peroneal Nerve Neuropathy3
- Peroneal nerve neuropathy causes foot drop.
- Disease may result in permanent nerve damage and foot abnormalities.
- The foot drop interferes with daily activities. Treatment options are pain control with medication and improved joint mobility by chiropractic therapy or physical therapy. Physical therapy helps in strengthening muscles but abnormal foot drop may continue because of muscle weakness from nerve damage.
- Surgery is advised once the foot drops abnormalities become permanent.
- The cause of pinch nerve is often treated with chiropractic treatment resulting in recovery of nerve injury and muscle regains normal strength.
- Paper published suggests chiropractic manipulative therapy was helpful for a 14-year-old female patient with an insidious onset of foot drop.
Chiropractic Treatment for Cervicogenic Headache4
- Headache is one of the most common diseases that causes temporary disability and loss of working days.
- Medication may prevent headache or decreased pain intensity. Medications often cause side effects.
- Chiropractic treatment has been tried for over century for headache and neck pain.
- Research suggests headache is successfully treated with chiropractic treatment. Number of therapy necessary to achieve long-term pain relief is 9 to 12 therapies.
Chiropractic Treatment for Older Patients5
- Older populations suffer with degenerative disc disease and often osteoporosis.
- Osteoporosis is a fragile bone disease and manipulation often could cause injuries.
- Present chiropractic treatment includes detailed examination and diagnosis of diseases like osteoporosis.
- Chiropractic treatment has helped to reduce back pain following multimodal therapy.
- Recent paper published suggests back pain caused by hypertrophy of the bones; degenerative disc disease and ligament sprain is reduced by chiropractic therapy.
Chiropractic Treatment For Upper Extremity Pain6
- Upper extremity pain is often caused by tendonitis, muscle injury or joint sprain. Pain is treated with pain medications, chiropractic treatment and physical therapy before injection treatment or surgery if needed.
- Extremity pain responds well following chiropractic therapy.
- Research study included systemic review of multimodal chiropractic therapy published in scientific journal.
- The results of study suggest upper extremity pain was considerably reduced following multimodal chiropractic therapy.
Chiropractic Treatment For Neck Pain7
- Neck pain is caused by disc disease, facet joint hypertrophy or pinch nerve.
- One of the conservative therapy available before interventional therapy or surgery is chiropractic manipulation for neck pain.
- Research case study of a patient suffering with neck pain included chiropractic manipulation, electrotherapy, ice and exercises.
- Neck Disability Index, Electromyography and Nerve Conduction Studies measured the outcome of study.
- Study suggests overall 89.65% symptoms improvement from the baseline.
- The case study suggests possible beneficial effects of the multimodal treatment in treating neck pain.
Chiropractic Treatment with Standard Medical Treatment8
- Most of the patient would like to know if medications, interventional therapy and physical therapy could be combined with chiropractic therapy. The study was performed to observe the outcome of chiropractic therapy in patients who were receiving standard medical treatment simultaneously.
- Patients suffering with low back pain were selected for chiropractic therapy while simultaneously receiving standard medical treatment.
- The results of this trial suggest that CMT in conjunction with SMC offers a significant decrease in pain. The quality of life and activities were significantly improved.
1. A weight loss program in a chiropractic practice: A retrospective analysis.
Demaria A1, Demaria C2, Demaria R2, Alcantara J3.
Complement Ther Clin Pract. 2014 May;20(2):125-9.
2. Multimodal chiropractic care of pain and disability for a patient diagnosed with benign joint hypermobility syndrome: a case report.
Strunk RG1, Pfefer MT2, Dube D3.
J Chiropr Med. 2014 Mar;13(1):35-42.
3. Chiropractic care for foot drop due to peroneal nerve neuropathy.
T Francio V.
J Bodyw Mov Ther. 2014 Apr;18(2):200-3.
4.Dose response for chiropractic care of chronic cervicogenic headache and associated neck pain: a randomized pilot study.
Haas M1, Groupp E, Aickin M, Fairweather A, Ganger B, Attwood M, Cummins C, Baffes L.
J Manipulative Physiol Ther. 2004 Nov-Dec;27(9):547-53.
5.Chiropractic management of a veteran with lower back pain associated with diffuse idiopathic skeletal hypertrophy and degenerative disk disease.
Roberts JA1, Wolfe TM.
J Chiropr Med. 2012 Dec;11(4):293-9.
6. Manipulative and multimodal therapy for upper extremity and temporomandibular disorders: a systematic review.
Brantingham JW1, Cassa TK, Bonnefin D, Pribicevic M, Robb A, Pollard H, Tong V, Korporaal C.
J Manipulative Physiol Ther. 2013 Mar-Apr;36(3):143-201.
7. Use of a multimodal conservative management protocol for the treatment of a patient with cervical radiculopathy.
J Chiropr Med. 2011 Mar;10(1):36-46.
8. Adding chiropractic manipulative therapy to standard medical care for patients with acute low back pain: results of a pragmatic randomized comparative effectiveness study.
Goertz CM1, Long CR, Hondras MA, Petri R, Delgado R, Lawrence DJ, Owens EF, Meeker WC.
Spine (Phila Pa 1976). 2013 Apr 15;38(8):627-34. doi: 10.1097/BRS.0b013e31827733e7.
|
<urn:uuid:f01c3316-f68e-49d0-8eed-26d7a72ecf4e>
|
CC-MAIN-2017-39
|
https://www.epainassist.com/manual-therapy/chiropractic-treatment/should-i-consider-chiropractic-treatment
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689624.87/warc/CC-MAIN-20170923104407-20170923124407-00039.warc.gz
|
en
| 0.897599 | 2,016 | 2.515625 | 3 |
NanoRacks CubeSat Deployer
Currently, there are two CubeSat deployers on board the International Space Station (ISS): The Japanese Experiment Module (JEM) Small Satellite Orbital Deployer (J-SSOD) and the NanoRacks CubeSat Deployer (NRCSD). The J-SSOD is the first of its kind to deploy small satellites from the International Space Station. The NRCSD is the first commercially operated small satellite deployer from the ISS, maximizing full capabilities of each airlock cycle[clarification needed] of deployments.
CubeSats belong to a class of research spacecraft called nanosatellites. The basic cube-shaped satellites measure 10 centimeters (3.9 in) on each side, weigh less than 3 pounds (1.4 kg), and have a volume of about 1 liter (0.22 imp gal; 0.26 U.S. gal), although there are CubeSats which are built and deployed with sizes of multiples of 10 cm in length.
As of 2014[update], one method of getting CubeSats to orbit is to transport them aboard a larger spacecraft as part of a cargo load to a larger space station. When this is done, deploying the CubeSats into orbit as a separate artificial satellite requires a special apparatus, such as the NanoRacks CubeSat Deployer. The NRCSD is put into position to be grabbed by one of the ISS's robotic arms, which then places the CubeSat deployer into the correct position externally mounted to the ISS to be able to release the miniature satellites into proper orbit.
The International Space Station was designed to be used as both a microgravity laboratory, as well as a launch pad for low-Earth-orbit services. The Japanese Space Agency's (JAXA) Kibo ISS module includes a small satellite-deployment system called the J-SSOD.
NanoRacks, via its Space Act Agreement with NASA, deployed a CubeSat using the J-SSOD. Seeing the emerging market demand for CubeSats, NanoRacks self-funded its own ISS deployer, with the permission of both NASA and JAXA. NanoRacks evolved away from the J-SSOD due to the small number of satellites that could be deployed in one airlock cycle and their desire to maximize the capacity of each airlock cycle. The J-SSOD used a full airlock cycle to only launch 6U. The NanoRacks CubeSat Deployer uses two airlock cycles, each holding 8 deployers. Each deployer is capable of holding 6U, allowing a total of 48U per airlock cycle.[non-primary source needed]
Deploying CubeSats from ISS has a number of benefits. Launching the vehicles aboard the logistics carrier of ISS visiting vehicle reduces the vibration and loads they have to encounter during launch. In addition, they can be packed in protective materials so that the probability of CubeSat damage during launch is reduced significantly. In addition, for earth observation satellites, such as those of Planet Labs, the lower orbit of the ISS orbit, at roughly 400 km, is an advantage. In addition, the lower orbit allows a natural decay of the satellites, thus reducing the build-up of orbital debris.
JEM Small Satellite Orbital Deployer
The Japanese Experiment Module Small Satellite Orbital Deployer (J-SSOD) is the first of its kind to deploy small satellites from the International Space Station. The facility provides a unique satellite install case to the Japanese Experiment Module (JEM) Remote Manipulator System (RMS) for deploying small, CubeSat, satellites from the ISS. The J-SSOD holds up to 3 small one-unit (1U, 10 x 10 x 10 centimeters) small CubeSats per satellite install case, 6 in total, though other sizes up to 55 x 55 x 35 cm may also be used. Each pre-packed satellite install case is loaded by crewmembers onto the Multi-Purpose Experiment Platform (MPEP) within the JEM habitable volume. The MPEP platform is then attached to the JEM Slide Table inside the JEM airlock for transfer to the JEMRMS and space environment. The JEMRMS grapples and maneuvers the MPEP and J-SSOD to a predefined deployment orientation and then jettisons the small CubeSat satellites.
The MPEP is a platform that acts as an interface between operations inside and outside the ISS, and the J-SSOD mechanism is installed on this platform. On July 21, 2012, JAXA launched the Kounotori 3 (HTV-3) cargo spacecraft to the ISS on Expedition 33. The J-SSOD was a payload on this flight along with five CubeSats that were planned to be deployed by the J-SSOD mounted on the JEMRMS (JEM- Remote Manipulator System), a robotic arm, later in 2012. The five CubeSats were deployed successfully on Oct. 4, 2012 by the JAXA astronaut Akihiko Hoshide using the newly installed J-SSOD. This represented the first deployment service of J-SSOD.
NanoRacks CubeSat Deployer development
In October 2013, NanoRacks became the first company to coordinate the deployment of small satellites (CubeSats/nanosatellites) from the ISS via the airlock in the Japanese KIBO module. This deployment was done by NanoRacks using J-SSOD. NanoRacks' first customer was FPT University of Hanoi, Vietnam. Their F-1 CubeSat was developed by young engineers and students at FSpace laboratory at FPT University of Hanoi. The mission of F-1 was to "survive" the space environment for one month, measuring temperature and magnetic data while taking low-resolution photos of Earth.
In 2013, NanoRacks sought permission from NASA to develop their own hardware and CubeSat/SmallSat deployer to use over the JEM- Small Satellite Deployer. NanoRacks brought leadership to the American small satellite industry by building a larger deployer capable of deploying 48U of satellites. NanoRacks designed, manufactured, and tested the deployer for NASA and JAXA approval to reach the International Space Station.
Manufacturing the NRCSD
Quad-M, Inc. developed the CubeSat Deployer to be compliant with the Cal Poly standard. It was redesigned and manufactured to NanoRacks' specification for use on the International Space Station.
Quad-M performed an initial design analysis to ensure a compliant design. The structural analysis included a modal analysis to evaluate vibration response, and the thermal analysis included calculations to evaluate different door coating options and an initial transient thermal analysis to estimate. In addition, Quad-M performed development tests for: the door release, the CSD/CubeSat Deployment test, random vibration test, and temperature cycling.
Integrating the CubeSats
CubeSat integration begins with unpacking the CSD from the shipping container and then removing the Base Plate Assembly from the rear of the CSD. Next, the CubeSat is inserted from the rear and is slid up snug against the doors. Additional CubeSats are then inserted from the rear in the same progress. The Base Plate Assembly is then reinstalled. Four jack screws are then adjusted with the Pusher Plate and locked. The Containment Bolt is then removed, and the deployer is packed for shipment.
Orbital Sciences, Orb-1
Launch vehicle: Orbital Sciences Cygnus (Orb-1)
Launch date: January 9, 2014
Total number of CubeSats: 33
Planet Labs: Doves, Flock 1A (28)
Purpose: These 28 3U CubeSats are working to build an Earth-observation constellation based solely on CubeSats. The CubeSats contain batteries that provide power to the various systems in each Dove. Each satellite has an optical telescope for acquiring high-resolution images of earth. Each satellites uses an X-band system for the downlink of acquired images and systems telemetry at data rates of 120Mbit/s.
Purpose: This 2U CubeSat will provide a platform for students and space enthusiasts to run space-based Arduino experiments. This is a follow up of ArduSat-1 launched in November 2013.
Kaunas University of Technology: LitSat-1 (1)
Purpose: To use low-cost open-source hardware and software for its flight computers that will control the satellite payload. The CubeSat carries a VGA camera, a GPS receiver, a linear transponder, and an AX-25 packet radio transponder.
Purpose: One of Lithuania's first satellites (together with LitSat-1). This CubeSat is equipped with a low resolution VGA camera, GPS receiver, 9k6 AX25 FSK telemetry beacon, UHF CW beacon, and a 150 mW V/U FM mode voice repeater. The satellite will transmit payload and sensor data images and three Lithuanian words.
Purpose: This crowd-funded 2-Kilogram 1U satellites that features deployable solar panels, four cameras, and communication antennas that are used to receive messages from Earth that are then transmitted at pre-determined times.
University of Peru: UAPSat-1 (1)
Purpose: This 1U CubeSat uses body-mounted solar panels for power-generation. It is equipped with a minicomputer, radio transmitters/receivers, a power control module, and a basic attitude control system. The satellite will transmit telemetry data and temperature sensor readings from inside and outside the spacecraft.
Orbital Sciences Orb-2
Launch vehicle: Orbital Sciences Cygnus (Orb-2)
Launch date: July 13, 2014
Total number of CubeSats: 32
Planet Labs: Doves, Flock 1A (28)
Purpose: These 28 3U CubeSats are working to build an Earth-observation constellation based solely on CubeSats. The CubeSats contain batteries that provide power to the various systems in each Dove. Each satellite has an optical telescope for acquiring high-resolution images of earth. Each satellites uses an X-band system for the downlink of acquired images and systems telemetry at data rates of 120Mbit/s
Purpose: This satellites uses commercial off-the-shelf components to provide the basic satellites functions such as commanding, power generation & supply, and communications with the other two units of the satellites. The CubeSat will fly and Exo-Brake to orbit that is deployed once the satellite is released to demonstrate a Passive De-Orbit System for satellites.
MIT Lincoln Laboratory: MicroMAS: Microsized Microwave Atmospheric Satellite (1)
Purpose: This satellite carries a nine-channel passive microwave radiometer to demonstrate miniaturized radiometer technology in space for application in ultra-compact spacecraft systems such as high performance multi-band sounder for future weather satellites.
Purpose: This satellite is equipped with Globalstar communications terminals that will perform studies involving the Globalstar communications satellite constellation.
Lambda Team: Lambdasat (1)
Purpose: The spacecraft will conduct technical demonstration of the satellite bus in the radiation environment in space and track systems degradation. The satellite also carries and Automatic Identification System (AIS) for tracking sea vessels around the globe, and a science experiment that looks at Graphene in space.
- "CubeSats in Orbit After Historic Space Station Deployment". Nasa.gov. 10 December 2012. Retrieved 8 December 2014.
- "Small Satellite Deployment from ISS - CubeSat. Smallsat Launches". Nanoracks.com. Retrieved 7 December 2014.
- JAXA. "J-SSOD:Experiment - International Space Station - JAXA". Iss.jaxa.jp. Retrieved 7 December 2014.
- "NASA - CubeSats in Orbit After Historic Space Station Deployment". Nasa.gov. Retrieved 7 December 2014.
- JAXA. "F-1 and companion CubeSats to be deployed to space from Kibo module on September 27:Kibo Utilization Office for Asia (KUOA) - International Space Station - JAXA". Iss.jaxa.jp. Retrieved 7 December 2014.
- "Spaceflight, NanoRacks Team Up on CubeSat Launches at Parabolic Arc". Parabolicarc.com. Retrieved 7 December 2014.
- "QUADM CNC Machine Shop, manufacturing and engineering services". Quad-M, Inc. Retrieved 7 December 2014.
- "ISS Commercial Resupply Services Mission (Orb-1)". Orbital.com. Retrieved 7 December 2014.
- "Flock 1". Planet Labs. Retrieved 7 December 2014.
- "NanoSatisfi ArduSat" (PDF). Nanosat.jp. Retrieved 7 December 2014.
- "LitSat-1". Litsat1.eu. Retrieved 7 December 2014.
- "LituanicaSAT-1 - Pirmasis palydovas Lietuvos istorijoje". Kosmonautai.lt. Archived from the original on 7 June 2013. Retrieved 7 December 2014.
- "Southern Stars • SkyCube • Summary". Southernstars.com. Retrieved 7 December 2014.
- "In orbit with upsat-info". Uapsat.info. Retrieved 7 December 2014.
- "Flock 1". Planet Labs. Retrieved 7 December 2014.
- "NASA - The Development of On-Demand Sample Return Capability (SPQR)". Nasa.gov. Retrieved 7 December 2014.
- "MicroMAS: Small is Beautiful (MIT - Massachusetts Institute of Technology)". World News. Retrieved 7 December 2014.
- Spaceflight 101 Orb-2 Cargo Manifest Archived July 14, 2014, at the Wayback Machine
- "Lambdasat (Λ-sat)". Space.skyrocket.de. Retrieved 7 December 2014.
|
<urn:uuid:3245ebcb-51a6-4cea-bc40-d6914be2df67>
|
CC-MAIN-2020-29
|
https://en.wikipedia.org/wiki/NanoRacks_CubeSat_Deployer
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655900614.47/warc/CC-MAIN-20200709162634-20200709192634-00393.warc.gz
|
en
| 0.885994 | 2,923 | 3.28125 | 3 |
Walter Scott employed the architect William Atkinson (c.1773 - 1839) to build Abbotsford House in Roxburghshire. It was for Scott’s own pleasure and its strong theatrical elements provided a perfect setting for his collection of antiquities. Begun in 1816 and extended after 1822, Abbotsford started a trend for the 'castle-style' buildings of the Scottish Baronial Revival. It was built in two stages after a prolonged process of planning. It reflected Scott's passion for the medieval and had many medieval carvings and idiosyncratic features incorporated into the design. The main entrance was based on the entrance porch to Linlithgow Palace, the Gothic chimney piece in the entrance hall copied from stone seats at Melrose Abbey, and the hall's wood panelling came from Dunfermline Auld Kirk.
|
<urn:uuid:d8ddc6df-b386-4448-af78-b71fa2da98bd>
|
CC-MAIN-2014-23
|
http://www.nationalgalleries.org/collection/artists-a-z/a/artist/sir-william-allan/object/the-facade-of-abbotsford-the-home-of-sir-walter-scott-seen-through-the-entrance-gate-study-for-the-engraving-to-lockharts-memoirs-of-the-life-of-sir-walter-scott-d-2701
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510261958.8/warc/CC-MAIN-20140728011741-00044-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.955378 | 173 | 2.625 | 3 |
Bounded by the St. Lawrence Valley to the north, Lake Champlain to the west, and the Gulf of Maine to the east, New England may be the most cohesive region in the United States, with a long and richly recorded history. In this book, Richard W. Judd explores the mix of ecological process and human activity that shaped that history over the past 12,000 years. He traces a succession of cultures through New England’s changing postglacial environment down to the 1600s, when the arrival of Europeans interrupted this coevolution of nature and culture.
A long period of tension and warfare, inflected by a variety of environmental problems, opened the way for frontier expansion. This in turn culminated in a unique landscape of forest, farm, and village that has become the embodiment of what Judd calls “second nature”— culturally modified landscapes that have superseded a more pristine “first nature.”
In the early 1800s changes in farm production and industrial process transformed central New England, while burgeoning markets at the geographical margins brought rapid expansion in fishing and logging activities. Although industrialization and urbanization severed connections to the natural world, the dominant cultural expression of the age, Romanticism, provided new ways of appreciating nature in the White Mountains and Maine woods. Spurred by these Romantic images and by a long tradition of local resource management, New England gained an early start in rural and urban conservation.
In the 1970s environmentalists, inspired by a widespread appreciation for regional second-nature landscapes, moved quickly from battling pollution and preserving wild lands to sheltering farms, villages, and woodlands from intrusive development. These campaigns, uniquely suited to the region’s land-use history, ecology, and culture, were a fitting capstone to the environmental history of New England.
|
<urn:uuid:457637ea-6cb3-4359-95fb-c925fe0472a0>
|
CC-MAIN-2014-23
|
http://www.umass.edu/umpress/title/second-nature
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997883898.33/warc/CC-MAIN-20140722025803-00027-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.925717 | 367 | 3.484375 | 3 |
Envigame – Linking Environmental Education to ICT in Czech Primary Schools
- 0 comments
- 35619 Visits
The Envigame project was created to address Czech teachers' lack of methodological guidance and practical educational materials.
Its outcomes are a set of educational programs in the form of interactive digital games and methodological aids. The project introduces a platform where most materials are uploaded and organized as game scenarios. It succeeds in linking Environmental Education (EE), a transversal theme in the Czech Primary School system, with ICT use.
|
<urn:uuid:b1fee43e-6f1f-45bf-98b4-d6f326285551>
|
CC-MAIN-2013-20
|
http://elearningpapers.eu/en/article/Envigame-%E2%80%93-Linking-Environmental-Education-to-ICT-in-Czech-Primary-Schools
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698080772/warc/CC-MAIN-20130516095440-00011-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.943704 | 111 | 2.796875 | 3 |
The global battle to wipe out polio has come closer than ever to success, but obstacles remain. The hurdles are not only the highly infectious nature of the disease but also war, corruption, weak public health systems and failing states. Last week added another obstacle to that list: obscene acts of violence. In Pakistan, nine unarmed vaccination workers were killed by gunfire while distributing medicine that could save the lives of countless children. Six of the victims were female, including three teenagers.
The attacks were unprecedented. In their wake the United Nations suspended a vaccination drive aimed at high-risk areas of the country and the young people who are most susceptible to the polio virus, which affects the nervous system and can lead to paralysis. The perpetrators are unknown, and no one claimed responsibility, but they are believed to be the Pakistan Taliban. The Taliban has denied it, but the Associated Press reported that suspicion has fallen on the terrorist organization because of its past opposition to the campaign and because of claims by some extremists that the vaccine could make children sterile not true or that the workers are spies for the United States. This is not true either but may be lingering blowback from the CIA's use of a doctor in Pakistan and a fake vaccination campaign in the hunt for Osama bin Laden.
Huge strides have been made toward eradicating polio since the effort was launched in 1988. Then, the disease was endemic in 125 countries; today, only in three: Pakistan, Afghanistan and Nigeria. Last year, there were 650 cases globally; this year, as of last week, 214. In the 1980s the disease annually killed or paralyzed more than 350,000 children. The member states of the World Health Organization declared a "programmatic emergency" in May to galvanize efforts toward a final eradication, an exceedingly difficult task that has been achieved with only one other disease, smallpox.
Pakistan's progress is notable but fragile. This year there have been only 56 polio cases in the country, less than a third of the 175 last year. Yet the virus can spread rapidly and unexpectedly, especially where hygiene and sanitation are poor. This is why vaccination is so important; if enough children are immunized, the virus can't find susceptible children to infect and dies out. By shooting the vaccine teams in Pakistan, the assailants are playing with fire. They have not only snuffed out the lives of humanitarian workers but blasted open a pathway for the disease to spread among children not immunized. It is hard to contemplate an ideology that would deliberately put so many people at risk.
The government of Pakistan has rightly condemned the shootings, as have the United Nations and the WHO. The gunmen cannot be allowed to shut down a vital public health campaign. Perhaps the workers will need to be better protected, but the vaccination effort must go on.
|
<urn:uuid:262fdddb-92cc-4e90-9fe3-49fb7346b89d>
|
CC-MAIN-2014-10
|
http://archive.sltrib.com/printfriendly.php?id=55523497&itype=cmsid
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011319537/warc/CC-MAIN-20140305092159-00070-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.971735 | 561 | 2.828125 | 3 |
Learning sometimes leads to knowledge but these terms are often used interchangeably to refer to the process of acquiring knowledge. ‘Knowing Knowledge’ by George Siemens forces us to rethink pedagogy and curriculum. The world is changing rapidly and to remain relevant we also need to change the way we think and approach problems. Knowing knowledge explores how learning and knowledge can impact our lives and in the world. The book goes further to recommend the necessary changes that educational institutions and corporations will need to make in order to align themselves with the developing trends. You can get your copy from Amazon.
|
<urn:uuid:ba443107-8081-41b3-9061-5dfe2842868e>
|
CC-MAIN-2023-14
|
https://www.knowingknowledge.com/book.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945168.36/warc/CC-MAIN-20230323132026-20230323162026-00513.warc.gz
|
en
| 0.955732 | 116 | 2.5625 | 3 |
Automated processing of personal data - processing of personal data using computer technology.
Blocking of personal data is a temporary suspension of the processing of personal data (unless the processing is necessary to clarify personal data).
Access to information - the ability to obtain information and use it.
Protected information - information that is the subject of property and subject to protection in accordance with the requirements of legal documents or the requirements established by the owner of the information.
Identification - assigning an identifier to subjects and objects of access and / or comparing the presented identifier with the List of Assigned Identifiers.
Information - information (messages, data) regardless of the form of their presentation.
Personal data information system - a set of personal data contained in databases and information technologies and technical means that ensure their processing.
Information technologies - processes, methods of searching, collecting, storing, processing, providing, distributing information and methods for implementing such processes and methods.
Information and telecommunications network - a technological system designed to transmit information over communication lines, access to which is carried out using computer technology.
Unauthorized access (unauthorized actions) - access to information or actions with information that violate the rules for restricting access using standard tools provided by personal data information systems.
Processing of personal data - any action (operation) or a set of actions (operations) performed using automation tools or without using such tools with personal data, including collection, recording, systematization, accumulation, storage, clarification (updating, changing), extraction, use, transfer (distribution, provision, access), depersonalization, blocking, deletion, destruction of personal data.
Operator - a state body, municipal body, legal entity or individual, independently or with other persons organizing and / or carrying out the processing of personal data, as well as determining the purposes of processing personal data, the composition of personal data to be processed, actions (operations) performed with personal data.
Technical means of the information system of personal data - computer equipment, information and computer systems and networks, means and systems for transmitting, receiving and processing personal data (means and systems for sound recording, sound amplification, sound reproduction, intercom and television devices, means for manufacturing, replicating documents and other technical means of processing speech, graphic, video and alphanumeric information), software tools (operating systems, database management systems, etc.), information security tools.
Personal data - any information relating to a directly or indirectly identified or identifiable natural person (subject of personal data). Access control rules are a set of rules that regulate the access rights of access subjects to access objects.
Providing personal data - actions aimed at disclosing personal data to a certain person or a certain circle of persons.
Dissemination of personal data - actions aimed at disclosing personal data to an indefinite circle of persons.
Destruction of personal data - actions, as a result of which it becomes impossible to restore the content of personal data in the personal data information system and / or as a result of which material carriers of personal data are destroyed.
Purpose and scope
184.108.40.206. This Policy contains a description of the principles and approaches of JSC «MC «Dynamo» in relation to the processing and security of personal data, the duties and responsibilities of JSC «MC «Dynamo» in the implementation of such processing.
220.127.116.11. JSC «MC «Dynamo» fully ensures the observance of the rights and freedoms of citizens in the processing of personal data, including the protection of the rights to privacy, personal and family secrets.
18.104.22.168. When processing personal data, Dynamo Management Company JSC strictly observes the following principles:
22.214.171.124.1. It is not allowed to process personal data that is incompatible with the purposes of collecting personal data.
126.96.36.199.2. It is not allowed to process personal data that does not meet the purposes of processing. The content and composition of the processed personal data in JSC «UK «Dynamo»corresponds to the stated purposes of processing.
188.8.131.52.3. When processing personal data, the accuracy, sufficiency, and, where necessary, the relevance of personal data are ensured.
184.108.40.206.4. The storage of personal data is carried out no longer than required by the purposes of processing personal data, as well as federal laws and agreements to which the subject of personal data is a party, beneficiary or guarantor.
220.127.116.11. The processing of personal data is carried out in compliance with the principles and rules provided for by the legislation of the Russian Federation.
18.104.22.168. Prior to the processing of personal data, the subjects of personal data, the composition of the processed personal data and the specific purposes of processing personal data are determined, which are documented by the List of processed personal data and approved by the General Director of JSC «MC «Dynamo».
22.214.171.124. Access to personal data is limited in accordance with the requirements of the law and internal regulations of JSC «UK «Dynamo».
126.96.36.199. JSC «MC «Dynamo» does not disclose personal data received by him as a result of his professional activities.
188.8.131.52. Employees of JSC «MC «Dynamo» who have gained access to personal data, undertake obligations to ensure the confidentiality of the processed personal data.
184.108.40.206. JSC «MC «Dynamo» takes the necessary technical and organizational information security measures to protect personal data from unauthorized access, modification, disclosure or destruction, through internal audits of data collection, storage and processing processes and security measures, as well as the implementation of measures to ensure physical security data to prevent unauthorized access to the systems in which JSC MC Dynamo processes personal data.
3. Права и обязанности
220.127.116.11. The subject of personal data has the right:
18.104.22.168.1. To receive information regarding the processing of his personal data, including containing:
- ⬥ confirmation of the fact of personal data processing;
- ⬥ legal grounds and purposes of personal data processing;
- ⬥ purposes and applied methods of processing personal data;
- ⬥ full name and location of Dynamo Management Company JSC, information about persons (excluding employees of Dynamo Management Company JSC) who have access to personal data or to whom personal data may be disclosed on the basis of an agreement with Dynamo Management Company JSC or on the basis of the legislation of the Russian Federation;
- ⬥ processed personal data relating to the relevant subject of personal data, the source of their receipt, unless a different procedure for the provision of such data is provided for by the legislation of the Russian Federation;
- ⬥ terms of personal data processing, including the terms of their storage;
- ⬥ the procedure for the exercise by the subject of personal data of the rights provided for by the legislation of the Russian Federation;
- ⬥ information about the carried out or proposed cross-border transfer of personal data;
- ⬥ the name or surname, first name, patronymic and address of the person processing personal data on behalf of JSC «MC «Dynamo», if the processing is entrusted or will be entrusted to such a person;
- ⬥ other information provided for by the legislation of the Russian Federation.
22.214.171.124.2. Require the correction of incorrect, inaccurate, outdated personal data, exclusion from the processing of personal data in case of unlawful processing of his personal data.
126.96.36.199.3. Withdraw consent to the processing of personal data.
188.8.131.52.4. Appeal in court any unlawful actions or inaction of JSC «UK «Dynamo» in the processing and protection of his personal data.
184.108.40.206. Subjects of personal data are responsible for providing reliable information, as well as for timely updating the provided data in case of any changes.
220.127.116.11. JSC «MC «Dynamo» takes reasonable measures to maintain the accuracy and relevance of the available personal data, as well as the removal of personal data in cases where they are outdated, inaccurate or redundant, or if the purpose of their processing is achieved.
This site uses «cookies» to analyze traffic, user activity and optimize the site. The processing of information is carried out in accordance with the Policy in the field of processing and protection of personal data of JSC «UK «Dynamo».
We use the Yandex.Metrika web analytics service provided by YANDEX LLC, 119021, Russia, Moscow, st. L. Tolstoy, 16 and the web analytics service google.ru/analytics provided by the company «Google» LLC.
|
<urn:uuid:545a6a93-ed4a-4db8-9a38-83ee3117204a>
|
CC-MAIN-2023-50
|
https://arena-plaza.ru/en/rules-info/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103810.88/warc/CC-MAIN-20231211080606-20231211110606-00845.warc.gz
|
en
| 0.870954 | 1,905 | 2.65625 | 3 |
How to Grow a Rose Tree
A rose tree, rose standard or tree rose (Rosa spp.) isn’t actually a tree at all. It’s a handmade planting or grafting project that allows a rose bush to grow like a tree. It’s a perfect container plant for those who want roses without the yard work. Roses used in rose trees usually can grow in U.S. Department of Agriculture plant hardiness zones 4 through 12.
Learning how to grow a rose tree takes a little time and patience. With proper care and preparation, a rose tree can provide a dramatic blooming focal point for your yard or patio.
Basic Rose Care
A rose standard will need the same care as other roses with a little extra TLC during winter months. Roses require at least five to six hours of full, direct sunlight per day. A little extra sun doesn’t hurt, as it keeps the rose leaves dry and free of diseases.
All roses like well-drained, moist soil, so pick a container for your rose tree that provides adequate drainage. Refrain from overwatering, as too much water can damage the roots.
Soil level should be neutral or a bit sandy with a pH range of five to seven. Give your roses room to grow and make sure that the pot or container you choose is big enough to support a tree that could eventually stretch up to 5 feet or more in height.
Choose the Right Rose
It should be noted that you can buy a potted rose tree already established and transfer it to your garden. This is the fastest and easiest route to having your own rose tree. To grow a rose tree from a young plant or cutting, you will need to first choose the right rose for the project.
Hybrid tea roses, shrub roses or floribunda roses work best for a rose tree. Choose a rose type that has a strong central stem or one that is not suited as a ground covering.
Turn a Rose Scrub Into a Rose Tree
An existing rose scrub can be manipulated into growing like a tree. It requires a well-established central and straight trunk (or rootstalk). This is needed to mimic the trunk of a tree. Prune and remove all lower branches and foliage and remove any other rooting stalks.
Once the central branch is clear, remove the top branches of the bush to encourage it to grow outward like tree branches. Use a tree stake to support the central branch. Gardening tape, grafting tape or string can be used to attach the stake to the rose bush. Tree wrap can then be used to protect and secure the exposed central stem.
Reinforce the soil around the base of the tree and give it a touch of fertilizer to help with the shock of pruning. Remove or prune any new growth on the stem as the bush grows.
Rose Grafting on Rootstalk
Want a taller tree than a single rose scrub can provide? It’s possible to grow a rose tree with multiple rose-cutting grafts on a single long and tall rootstalk or cane. Rose rootstalks (also called understalks) are the base in which cutting rose buds (called scions or eye buds) are grafted.
Use a solid rootstalk supported by tree stakes as your base. Cut a scion of your preferred rose with at least three buds growing on it and at a length of 6 inches. A diagonal, slanting cut is needed, as it will fit into the rootstalk like a puzzle piece.
Cut the rootstalk at a slant about half an inch long. Insert the scion into the rootstalk and secure with grafting tape. As your roses grow, support the rootstalk with wooden stakes to manipulate it upward and remove any lower branches.
Nat Howard is a writer, editor, journalist, and jack-of-all-trades, covering topics from home improvement and design to healthcare and career advice.
|
<urn:uuid:02948b75-b1f9-4a34-9cb6-cbc8624e200b>
|
CC-MAIN-2023-14
|
https://homeguides.sfgate.com/grow-rose-tree-41203.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00022.warc.gz
|
en
| 0.917619 | 825 | 2.84375 | 3 |
This blog post is a work in progress! Be sure to come back and visit in a few weeks, as I will be adding to it over time…
It can sometimes feel overwhelming when we look at all of the individual and group needs of our mathematics learners. Building readiness to learn, along with ensuring that we meet the individual needs of students might give us the impression that we need to create an individual lesson plan for each and every person in our classrooms. That sounds exhausting…
But what if we can create structures and use a variety of math instructional strategies within those structures? What if we can create diverse learning experiences that encourage mathematical thinking and growth over key concepts? This is an idea worth investigating!
Our elementary and middle years math curricula in Saskatchewan cover a number of topics, from number to patterns to shape and space and statistics. Ironically, when you look at the skills needed for students to be READY to engage in these grade-level concepts, there are only a handful of pre-skills. These pre-skills are the math concepts that are applied and used in new learning.
For example, when we are learning about adding and subtracting fractions, we need to know about:
- addition and subtraction
- multiplication and division, multiples and factors
- what a fraction is, finding equivalent fractions, improper fractions
When you analyze grade-level outcomes in mathematics, you will often see combinations of the following pr-skills:
- Number Sense and Place Value
- Addition and Subtraction
- Multiplication and Division
- Parts of a Whole – Fractions, Decimals and Percent
- Algebraic Thinking
So, how do we teach and reteach each of these key concepts in our classrooms? You can find a large number of curated resources in this Google Drive: https://bit.ly/2zrNfqd which contains folders of resources designed to help you to teach through these continuums, as well as:
- What is an instructional sequence and strategies for teaching each concept?
- What are some common misconceptions and how might we address them?
- How might we infuse technology into our mathematics instruction?
- What are some fun ways to engage in mathematics?
- How might we use math with a purpose to gain a deeper understanding of social issues?
When we look at our Saskatchewan curriculum, we can see how concepts grow over time in these math Curricular Through Lines:
- Grade K – 3 Curriculum Conceptual Through-lines
- Grade 3 – 6 Curriculum Conceptual Through-lines
- Grade 5 – 9 curriculum Conceptual Through-lines
- Grade 7 – 10 Curriculum Conceptual Through-lines
We can also pull out specific concepts and see how they grow. The following concept trajectories were created by a province-wide math leadership group a number of years ago, and show the language, strategies and concepts over time. Each continuum has four instructional strategies listed.
|
<urn:uuid:fad1937e-fc30-48ef-9e73-31886388d4ab>
|
CC-MAIN-2020-16
|
https://johansonconsulting.ca/2019/08/27/math-instruction-for-all-students/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496330.1/warc/CC-MAIN-20200329232328-20200330022328-00100.warc.gz
|
en
| 0.925929 | 611 | 4.15625 | 4 |
Q: I recently attended a seminar for operators of small ranches and farms. The guest veterinarian reviewed several contagious diseases, including vesicular stomatitis. I thought only cattle, horses, and pigs were susceptible, not realizing my alpacas could be at risk. What should I know about vesicular stomatitis? How can I protect my herd?
A: In addition to the livestock already mentioned, donkeys, mules, and humans can suffer from the virus that causes vesicular stomatitis (VSV).
Sheep and goats, which rarely display clinical signs, as well as llamas and alpacas, are occasionally infected. The mode of VSV transmission, while not well understood, is believed to be primarily by insects, particularly black flies and sand flies.
Consuming coarse feeds causes breaks in mucosal tissue, allowing VSV to spread within the herd which shares food and water resources. Deer, raccoons, bobcats, and monkeys can serve as viral hosts.
Outbreaks have been recorded throughout the United States, but have been primarily limited to the southwestern and western states since the 1980s. The last occurred in 2004 and resulted in quarantines continuing into 2006. Once occurring in eight- to 10-year cycles, outbreaks primarily during warm months are occurring more frequently.
The two strains responsible for the disease, the New Jersey and Indiana serotypes, are structurally similar but produce distinct antibodies.
Signs and Symptoms
You should know and be able to recognize the signs and symptoms of vesicular stomatitis.
- It is a reportable disease that shares similar symptoms with foot and mouth disease.
- The incubation period ranges from three to 14 days, although small, fluid-filled blisters (vesicles) may develop in as few as 24 hours.
- Excessive salivation and drooling may be the first symptoms you notice.
- The animal may develop a fever.
- The vesicles may appear in the mouth, on the lips, nostrils, hooves, or teats.
- Variable in size, some may be quite small while others may be large enough to cover the tongue.
- The vesicles will swell and break open. The resulting ulcers are painful, making the animal reluctant to eat, drink or nurse.
- The animal may become lame if the hooves are affected.
While not all herd members will demonstrate clinical signs, nearly 100 percent can test positive for antibodies.
Talk to your veterinarian to learn the specific signs and symptoms of vesicular stomatitis that may affect the livestock breed(s) on your farm. Separate any animals displaying lesions from the others. Your vet will confirm the diagnosis with blood tests or by swabbing the lesions or drainage from the blisters.
State and federal animal health authorities must be notified. Exercise precautionary measures in handling secretions and tissue samples since humans who are exposed can develop flu-like symptoms from the virus.
There is no specific treatment; the disease runs its course in about 21 days. Use antiseptic mouthwashes to comfort the animal and avoid secondary bacterial infections. Offer softened feed, limit grazing time to avoid exposure to blood-feeding insects, consider insect control programs, and provide shelter for your herd.
Currently there is no approved VSV vaccine available in the United States.
Dr. Aaron Tangeman received his Doctorate of Veterinary Medicine from the Ohio State University in 1998 and practices in Northeast Ohio.
|
<urn:uuid:f63611e8-467c-40db-b1b7-8d3ccfde3903>
|
CC-MAIN-2017-39
|
http://www.hobbyfarms.com/understanding-vesicular-stomatitis/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696182.97/warc/CC-MAIN-20170926141625-20170926161625-00031.warc.gz
|
en
| 0.942176 | 722 | 3.390625 | 3 |
New electron microscopy techniques can help solve corrosion problems that are worth millions of dollars to industrial companies, BP Amoco Chemical Company Senior Research Chemist Matthew Kulzick told the MIT Materials Research Laboratory (MRL) Materials Day Symposium last month.
“Materials science is critical. It’s really material in the financial sense,” Kulzick said. “Solutions demand timely and accurate information. If I’m going to solve a problem, I’ve got to know what’s actually going on, and to do that I need all of these different interrelated tools to be able to go in and find out what’s happening in systems that are important to us.”
New X-ray technologies and sample chambers, he said, are producing stunning images at 20-nanometer scale showing highly localized composition of materials. “The current evolution of tools is spectacular,” he told the audience at the Oct. 10 event.
Beginning in 2003, Kulzick built a new inorganic characterization capability for BP Amoco Chemical, MRL Associate Director Mark Beals said. Kulzick has been working with Nestor J. Zaluzec, a senior scientist at Argonne National Laboratory, as well as with the BP International Center for Advanced Materials, whose partners include the University of Manchester, Imperial College London, the University of Cambridge, and the University of Illinois at Urbana-Champaign.
He outlined advances in imaging technology such as the Pi Steradian Transmission X-ray Detection System developed at the U.S. Department of Energy’s Argonne National Laboratory, and advances in sample holder technology that BP developed collaboratively with Protochips that allow analysis of materials in gas or liquid filled chambers. Microscopic measurements using these holders, or cells, which can include micro-electro-mechanical systems, are called in situ techniques.
“A number of years ago we worked with Protochips, and we modified that holder technology to allow the X-rays coming out of that system to get to the detector,” Kulzick explained.
Images of a palladium and copper-based automotive catalyst from four different generations of energy-dispersive X-ray technology illustrated the evolution from images lacking in detail to a nanoscale compositional image acquired in just 2.5 seconds that shows the location of palladium in the chemical structure.
“So it’s really transformative in understanding what’s happening chemically at the nanoscale,” Kulzick said.
Placing a closed cell filled with hydrogen gas to simulate reduction of the catalyst inside a transmission electron microscope produced images that showed palladium particles remained unaffected while copper particles either migrated toward palladium particles or clustered together with other copper particles.
“We can actually observe the changes that are happening in that localized area under reduction, and this is extremely important if we really want to understand what’s happening,” Kulcizk said. “All of that diversity is occurring in what amounts to roughly a square micron of area on the surface of the material.”
“Just imagine what I could do with this kind of technology with regard to understanding how to activate a catalyst, how to regenerate a catalyst,” he said.
Techniques developed by Professor M. Grace Burke at the University of Manchester in the UK allow observation of chemical changes in a piece of metal over a period of hours such as dissolving a manganese sulfide inclusion from a small piece of stainless steel soaking in water, Kulzick said. “This proved a point for her with regards to corrosion mechanisms that are relevant in the nuclear industry where they worry about what’s initiating crack formation and which she has argued for years that attack of the manganese sulfide by water was one of the underlying mechanisms,” he said.
A significant advance for analyzing organic materials is direct electron capture cameras, Kulzick said.
“One of the problems with bombarding things with electrons is beam damage, so you want to use as little as you can with the right energies,” he added. “The direct electron capture cameras allowed us to reduce that dose.”
For example, Qian Chen, assistant professor of materials science and engineering at the University of Illinois at Urbana-Champaign, has used this enhanced sensitivity and lower dose radiation to a do a series of images at differing tilts to generate a three-dimensional image of a polymer membrane. Computational image analysis becomes important with these 3D structural images. “Without the ability to digitize that material like we’ve done, we would never be able to understand this diversity of structure and make it more rational,” Kulzick said.
Further analysis of the polymer membrane — soaked in a solution of zinc and lead — with Analytical Electron Microscope (AEM) techniques developed by Zaluzec at Argonne National Laboratory revealed that different ions enter into the polymer membrane at different locations. Kulzick said the next step is to understand how ions interact with the membrane structure and how that impacts permeation in the systems. Chen also analyzed the polymer membrane in water inside a graphene cell, Kulzick said, and that work showed swelling of the membrane.
“We hope to put all these pieces together and form a really detailed understanding of how a system like this functions,” he said.
|
<urn:uuid:143f761a-61ba-4916-8894-7366196b63ee>
|
CC-MAIN-2020-05
|
https://news.mit.edu/2018/mit-mrl-materials-day-symposium-matthew-kulzick-keynote-1113
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251802249.87/warc/CC-MAIN-20200129194333-20200129223333-00287.warc.gz
|
en
| 0.932818 | 1,127 | 2.578125 | 3 |
What Is Constipation?
Constipation is a very common condition, affecting people of all ages. It can mean that you are not passing stools (faeces) as often as you normally do, you have to strain more than usual or you are unable to completely empty your bowels.
Many people only experience constipation for a short period of time with no lasting effects on their health.
Causes Of Constipation
Determining the exact cause can be difficult but diet has a significant role with eat too little fibre e.g not enough fruit, vegetables, and cereals and drinking too little fluid contributory factors. Some medicines can also cause constipation.
Medical conditions such underactive thyroid, I.B.S. (irritable bowel syndrome), anxiety and depression can also have an influence.
Symptoms Of Constipation
There are various symptoms of constipation as can be seen below.
- Straining when you have a bowel movement
- Feeling as though you haven’t fully emptied your bowels
- Passing unusually large or small faeces or your stools are dry and lumpy
- Having fewer than three bowel movements a week
- Stomach pain or discomfort
- Feeling sick or bloated
- Loss of appetite
Diagnosis Of Constipation
A diagnosis can be made without tests as it should be identifiable from your symptoms and medical history.
Severe symptoms may initiate a blood, thyroid and other tests to rule out other conditions.
Consider further tests if symptoms prove troublesome or there are associated symptoms such as bleeding, weight loss, bouts of diarrhoea or symptoms are severe and recurring.
Treatment For Constipation
Simple and dietary changes are frequently advised with an increase of fibre intake advised to help the constipation and because it is good for general health. It is also important to drink enough water – between eight to ten cups a day – as it helps move digested food through the bowel more easily.
Over-the-counter laxatives are available from pharmacies but it may take more than one to improve the condition. Ask the pharmacist for advice.
A GP will normally advise you to stop taking laxatives once the stools are soft and easily passed but if constipation is caused by an underlying condition or a medicine you have been prescribed then the course could last for months.
To ask a question about a constipation or to book an appointment, contact our specialist team available Monday – Friday 8am – 6pm and on Saturday from 9am – 1pm.
Our gastrointestinal specialists team have a dedicated and caring approach and will seek to find you the earliest appointment possible with the correct specialist for your needs. If you are self-paying you don’t need a referral from your GP. You can simply refer yourself and book an appointment. If you have medical insurance (e.g. Bupa, Axa PPP, Aviva), you will need to contact your insurer for authorisation for any treatment and, in most cases, you will require a referral letter from your GP. If you do not have a GP, then we have an in-house private GP practice that you can use.Alternatively we can suggest the most appropriate course of action for you to take, given your location and individual circumstance.
|
<urn:uuid:99c46cbc-8f14-405c-8572-b2d39c2a4bad>
|
CC-MAIN-2020-05
|
https://www.thegiunit.org.uk/services/constipation/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601040.47/warc/CC-MAIN-20200120224950-20200121013950-00404.warc.gz
|
en
| 0.943201 | 670 | 2.921875 | 3 |
This website is under construction. If you have a query please get in touch with us here
The terms ‘Learning Difficulties’ and ‘Learning Disability’ are often used interchangeably. Many individuals of varying intelligence may have a specific ‘learning difficulty’. A learning difficulty could mean anything from problems recognising the way words look (Dyslexia) to problems with short term memory (making it difficult to process large chunks of information at a time). Having a learning difficulty does not necessarily mean someone will be unable to achieve in academic life or look after themselves independently. Individuals with specific learning difficulties may have an average or higher than average IQ ( an average IQ is between 90-110). However, if a learning difficulty goes undiagnosed throughout childhood and adolescence, it can severely impact on an individuals confidence and ability to achieve their potential.
A Learning Disability is a diagnostic label for individuals who struggle in several areas of life and who would not be able to live independently without significant support or adjustments. Someone with a learning disability experiences both:
- An IQ score of less than 70 (an average IQ score would be 90-110)
- Difficulties coping independently without (age appropriate) support.
Recognition and Diagnosis
Due to financial constraints, cuts to resources and changes to education systems in the UK, learning difficulties and disabilities often go undiagnosed throughout a child’s entire education. This leaves children and young people struggling to fit in in an education system which is increasingly unable to acknowledge or meet their individual needs. An individual with undiagnosed learning difficulties or a learning disability might present with the following difficulties:
- Delay in reaching developmental milestones
- Problems with motor skills or unusual body movements
- Difficulties doing age appropriate tasks independently
- Difficulties achieving in education
- Anxiety about attending school, completing homework or doing exams
- School refusal or poor attendance
- Behaviour problems at home or school
- Frequent exclusions or isolations within school
- Appearing to be vulnerable amongst their peers or easily influenced by others
- Forgetfulness or problems organising oneself
Assessment for learning difficulties and disability should involve a comprehensive assessment by a Clinical Psychologist. This should include a thorough developmental history, liaison with education services and administration of specialist, standardised psychometric tests. There are many conditions which overlap with learning difficulties and the assessing clinician should have a good knowledge of a range of neurodevelopmental disorders and mental health difficulties to be able to offer a useful interpretation of the results of an assessment.
Sometimes it is helpful to include other professionals in the assessment to rule out alternative explanations for a child’s difficulties. This might include referral to a Paediatrician, Child and Adolescent Psychiatrist, Occupational Therapist or Neurologist.
We are able to offer comprehensive assessments and diagnosis for children and young people under 17 who may have learning difficulties or a learning disability. Please see our services and pricing page for more information.
|
<urn:uuid:bc6cc0fe-14c3-4362-9dc5-132f1f3d9317>
|
CC-MAIN-2020-05
|
https://cerebrosheffield.com/learning-difficulties/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250598217.23/warc/CC-MAIN-20200120081337-20200120105337-00473.warc.gz
|
en
| 0.953906 | 614 | 3.5 | 4 |
Watch this video to learn about the effects of transferring gut microbiota from wild mice to laboratory mice.
Scientists from the NIH’s National Institute of Diabetes and Digestive and Kidney Diseases led research which found that transferring the gut microbes from wild mice to laboratory mice promotes fitness and significantly improves responses to an otherwise lethal flu virus infection and to colorectal cancer. By making lab mice more closely mirror real-world mice, this approach may improve the odds of success as research moves from mouse to man.
Watch the video above describing the method used, which could help advance studies in metabolism, behavior, and endocrinology. Read more by viewing the article published in the journal Cell (PDF, 7.8 MB) .
|
<urn:uuid:52915fea-6370-4838-94cb-a92a777121dd>
|
CC-MAIN-2020-05
|
https://www.niddk.nih.gov/health-information/professionals/diabetes-discoveries-practice/wild-mouse-gut-microbiota-promotes-host-fitness-improves-disease-resistance
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251694908.82/warc/CC-MAIN-20200127051112-20200127081112-00327.warc.gz
|
en
| 0.902851 | 147 | 3.296875 | 3 |
Virtual instruments provide significant advantages in every stage of the engineering process, from research and design to manufacturing test.
Research and Design
• In research and design, engineers and scientists demand rapid development and prototyping capabilities. With virtual instruments, you can quickly develop a program, take measurements from an instrument to test a prototype, and analyze results, all in a fraction of the time required to build tests with traditional instruments.
• When you need flexibility, an scalable open platform is essential, from the desktop, to embedded systems, to distributed networks.
• The demanding requirements of research and development (R&D) applications require seamless software and hardware integration.
• Whether you need to interface stand-alone instruments using GPIB or directly acquire signals into the computer with a data acquisition board and signal conditioning hardware, LabVIEW makes integration simple.
• With virtual instruments, you also can automate a testing procedure, eliminating the possibility of human error and ensuring the consistency of the results by not introducing unknown or unexpected variables.
Development Test and Validation
• With the flexibility and power of virtual instruments, you can easily build complex test procedures.
• For automated design verification testing, you can create test routines in LabVIEW and integrate software such as National Instruments TestStand, which offers powerful test management capabilities.
• One of the many advantages these tools offer across the organization is code reuse. You develop code in the design process, and then plug these same programs into functional tools for validation, test, or manufacturing.
• Decreasing test time and simplifying development of test procedures are primary goals in manufacturing test. Virtual instruments based on LabVIEW combined with powerful test management software such as TestStand deliver high performance to meet those needs.
• These tools meet rigorous throughput requirements with a high-speed, multithreaded engine for running multiple test sequences in parallel. TestStand easily manages test sequencing, execution, and reporting based on routines written in LabVIEW.
• TestStand integrates the creation of test code in LabVIEW. TestStand also can reuse code created in R&D or design and validation.
• If you have manufacturing test applications, you can take full advantage of the work already done in the product life cycle.
• Manufacturing applications require software to be reliable, high in performance, and interoperable.
• Virtual instruments based on LabVIEW offer all these advantages, by integrating features such as alarm management, historical data trending, security, networking, industrial I/O, and enterprise connectivity.
• With this functionality, you can easily connect to many types of industrial devices such as PLCs, industrial networks, distributed I/O, and plug-in data acquisition boards. By sharing code across the enterprise, manufacturing can use the same LabVIEW applications developed in R&D or validation, and integrate seamlessly with manufacturing test processes.
|
<urn:uuid:2af5deb0-b639-4217-a2ba-879103b0ce37>
|
CC-MAIN-2017-30
|
http://ugpro143.blogspot.com/2009/03/virtual-instrumentation-in-engineering.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549427766.28/warc/CC-MAIN-20170729112938-20170729132938-00457.warc.gz
|
en
| 0.902627 | 573 | 2.59375 | 3 |
The reason Pluto lost its planet status is not valid, according to new research from the University of Central Florida in Orlando.
In 2006, the International Astronomical Union, a global group of astronomy experts, established a definition of a planet that required it to “clear” its orbit, or in other words, be the largest gravitational force in its orbit.
Since Neptune’s gravity influences its neighboring planet Pluto, and Pluto shares its orbit with frozen gases and objects in the Kuiper belt, that meant Pluto was out of planet status. However, in a new study published online Wednesday in the journal Icarus, UCF planetary scientist Philip Metzger, who is with the university’s Florida Space Institute, reported that this standard for classifying planets is not supported in the research literature.
Metzger, who is lead author on the study, reviewed scientific literature from the past 200 years and found only one publication – from 1802 – that used the clearing-orbit requirement to classify planets, and it was based on since-disproven reasoning.
He said moons such as Saturn’s Titan and Jupiter’s Europa have been routinely called planets by planetary scientists since the time of Galileo.
“The IAU definition would say that the fundamental object of planetary science, the planet, is supposed to be a defined on the basis of a concept that nobody uses in their research,” Metzger said. “And it would leave out the second-most complex, interesting planet in our solar system.” “We now have a list of well over 100 recent examples of planetary scientists using the word planet in a way that violates the IAU definition, but they are doing it because it’s functionally useful,” he said. “It’s a sloppy definition,” Metzger said of the IAU’s definition. “They didn’t say what they meant by clearing their orbit. If you take that literally, then there are no planets, because no planet clears its orbit.”
The planetary scientist said that the literature review showed that the real division between planets and other celestial bodies, such as asteroids, occurred in the early 1950s when Gerard Kuiper published a paper that made the distinction based on how they were formed.
However, even this reason is no longer considered a factor that determines if a celestial body is a planet, Metzger said.
Study co-author Kirby Runyon, with Johns Hopkins University Applied Physics Laboratory in Laurel, Maryland, said the IAU’s definition was erroneous since the literature review showed that clearing orbit is not a standard that is used for distinguishing asteroids from planets, as the IAU claimed when crafting the 2006 definition of planets.
“We showed that this is a false historical claim,” Runyon said. “It is therefore fallacious to apply the same reasoning to Pluto,” he said. Metzger said that the definition of a planet should be based on its intrinsic properties, rather than ones that can change, such as the dynamics of a planet’s orbit. “Dynamics are not constant, they are constantly changing,” Metzger said. “So, they are not the fundamental description of a body, they are just the occupation of a body at a current era.”
Instead, Metzger recommends classifying a planet based on if it is large enough that its gravity allows it to become spherical in shape.
“And that’s not just an arbitrary definition, Metzger said. “It turns out this is an important milestone in the evolution of a planetary body, because apparently when it happens, it initiates active geology in the body.”
Pluto, for instance, has an underground ocean, a multilayer atmosphere, organic compounds, evidence of ancient lakes and multiple moons, he said.
“It’s more dynamic and alive than Mars,” Metzger said. “The only planet that has more complex geology is the Earth.”
|
<urn:uuid:d44b3293-4bc1-43c3-9f9c-8f3890c5cfab>
|
CC-MAIN-2020-16
|
https://scienceblog.com/503208/new-research-suggest-pluto-should-be-reclassified-as-a-planet/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494331.42/warc/CC-MAIN-20200329105248-20200329135248-00071.warc.gz
|
en
| 0.951325 | 848 | 3.765625 | 4 |
Restaurants Not Only Feed, but They also Shape Food Preferences
Food preferences are not only shaped by what we eat at home but also by what we eat out. Restaurants play a big role in influencing the food preferences of their customers, and this can have a lasting impact.
We are more likely to try new things and be open to new flavors when we eat out as we are not as invested in the meal’s outcome, so we are more willing to take risks. As a result, restaurants can introduce us to new foods that we may not otherwise have tried.
In addition, restaurants can also shape our food preferences by the way they present their dishes. They can make healthy foods look more appealing, for example, by using attractive plate presentations and creative garnishes.
Of course, not all restaurants are equally successful in influencing their customers’ food preferences. But the best ones know how to use their menus and their presentation to nudge their customers towards trying something new. And that can make all the difference in developing a lifelong love of good food.
Fast-food restaurants have helped affect changes.
The average American spends about $1,200 a year on fast food, which equates to about 50 hamburgers from McDonald’s. This is significant because it shows that people are more likely to purchase items from a restaurant if it’s cheap and easily accessible.
The problem is that these companies often use unhealthy ingredients in their foods, harming people’s health. For example, a study found that children who ate fast food more than twice a week were more likely to become obese adults.
So while fast-food restaurants may be convenient and affordable, they also play a role in shaping the American diet in an unhealthy way.
It’s not just fast-food restaurants that impact the American diet. All restaurants can play a role in shaping food preferences.
For example, Italian restaurants are known for serving dishes with heavy sauces and lots of cheese. While these dishes can be delicious, they’re also high in calories and fat. As a result, people who eat at Italian restaurants regularly may be more likely to develop unhealthy eating habits.
On the other hand, Japanese restaurants often serve lighter fare lower in calories and fat. So eating at Japanese restaurants may help people maintain a healthy weight. This is just one example of how different types of restaurants can influence the food preferences of their customers.
Of course, not everyone eats at restaurants all the time. And not all restaurants are equally successful in influencing their customers’ food preferences.
But the best ones know how to use their menus and their presentation to nudge their customers towards trying something new. And that can make all the difference in developing a lifelong love of good food.
Food kits gaining popularity
The popularity of food kits has exploded during the COVID-19 pandemic as people look for ways to cook at home.
Food kits provide all the ingredients necessary to make a meal and detailed instructions. They can be purchased online or from grocery stores, and they offer a convenient way to cook without having to plan and shop for ingredients.
Many people who have never cooked before are trying their hand at cooking with food kits, and they are finding that it can be a fun and satisfying experience. In addition, cooking with food kits can help develop new skills and knowledge about food.
There are many different food kits available, ranging from simple recipes to more complex ones. Some kits cater to specific dietary needs, such as vegetarian, vegan, or gluten-free.
With so many different food kits to choose from, there is sure to be one that appeals to everyone. So if you’re looking for a new cooking challenge, consider giving a food kit a try.
|
<urn:uuid:66fd8a51-1499-44ac-b3f2-873dea9be7d7>
|
CC-MAIN-2023-23
|
https://www.woodwardtable.com/restaurants-shape-food-preferences/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645810.57/warc/CC-MAIN-20230530131531-20230530161531-00389.warc.gz
|
en
| 0.9646 | 769 | 3.09375 | 3 |
Example F08.two.cosines.pd (Figure 6.17) shows how to make a carrier signal that cross-fades between harmonics to make continuously variable center frequencies. The center frequency quotient appears as the output of a line~ object. This is separated into its fractional part (using the wrap~ object) and its integer part (by subtracting the fractional part from the original). These are labeled as and to agree with the treatment in Section 6.3.
The phase--a sawtooth wave at the fundamental frequency--is multiplied by both and (the latter by adding the original sawtooth into the former), and the cosines of both are taken; they are therefore at and times the fundamental frequency and have no discontinuities at phase wrapping points. The next several objects in the patch compute the weighted sum , where , are the two sinusoids and , by evaluating an equivalent expression, . This gives us the desired movable-frequency carrier signal.
Example F09.declickit.pd (not shown here) shows how, by adding a samphold~ object after the line~ object controlling center frequency, you can avoid discontinuities in the output signal even if the desired center frequency changes discontinuously. In the example the center frequency quotient alternates between 4 and 13.5. At ramp times below about 20 msec there are audible artifacts when using the line~ object alone which disappear when the samphold~ object is added. (A disadvantage of sample-and-holding the frequency quotient is that, for very low fundamental frequencies, the changes can be heard as discrete steps. So in situations where the fundamental frequency is low and the center frequency need not change very quickly, it may be better to omit the sample-and-hold step.)
The next two examples demonstrate using the crossfading-oscillators carrier as part of the classic two-operator phase modulation technique. The same modulating oscillator is added separately to the phases of the two cosines. The resulting spectra can be made to travel up and down in frequency, but because of the complicated phase relationships between neighboring peaks in the phase modulation spectrum, no matter how you align two such spectra you can never avoid getting phase cancellations where they overlap.
|
<urn:uuid:f301b075-f9bd-44bb-943c-1bd098353dfe>
|
CC-MAIN-2023-50
|
http://msp.ucsd.edu/techniques/latest/book-html/node100.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00661.warc.gz
|
en
| 0.922464 | 467 | 3.34375 | 3 |
| Home Earth
Flag of Azerbaijan
Historically, the name Azerbaijan refers to a larger region that formed part of Persia (Iran). Azerbaijan is bordered by the Caspian Sea in east, by Iran in south, by Armenia in west, and Georgia and Russia in the north. The Azeri autonomous republic of Nakhchivan forms an enclave within the Republic of Armenia, in a narrow part in west it borders Turkey. Its highest mountain is Bazarduzu Dagi with 4,485 m.
With an area of 86,600 km² the country is slightly larger than Austria or slightly smaller than the U.S. state of Maine.
Azerbaijan has a population of 9.7 million people (in 2016). Main religion is Islam, Azerbaijan is one of the few countries with a majority Shiite population.
Capital and largest city is Baku. Spoken languages are Azeri 90% (official), Russian 2%.
Read on and get an overview of Azerbaijan's art, culture, people, environment, geography, history, economy and government.
Republic of Azerbaijan | Azarbaycan Respublikasi
The Azerbaijan Democratic Republic was established in 1918, it was the first democratic and secular republic in the Muslim world, but was incorporated into the Soviet Union only two years later. The country regained independence in 1991 following the collapse of the Soviet Union.
Azerbaijan is one of the six modern independent Turkic states. 95% of its population are Muslims, 85% are Shia Muslims and 15% Sunni Muslims, making Azerbaijan the country with the second highest Shia population percentage in the world after Iran.
Despite a 1994 cease-fire, Azerbaijan has yet to resolve its conflict with Armenia over Nagorno-Karabakh, a primarily Armenian-populated region that Russia recognized as part of Soviet Azerbaijan in the 1920s after Armenia and Azerbaijan disputed the status of the territory.
Corruption in Azerbaijan is ubiquitous, and the government, which eliminated presidential term limits in a 2009 referendum, has been accused of authoritarianism.
short form: Azarbaycan
int'l long form: Republic of Azerbaijan
int'l short form: Azerbaijan
ISO Country Code: az
Local Time = UTC +4h (DST in Summer +5h)
Actual Time: Thu-Sept-21 11:46
Country Calling Code: +994
Capital City: Baku
Other Cities: Ali Bayramli, Baki, Ganca, Lankaran, Mingacevir, Naftalan, Saki, Sumqayit, Susa, Xankandi, Yevlax.
Constitution: Approved in November 1995 referendum.
Independence: 30 August 1991 (from Soviet Union).
Location: South Caucasus; bordered by Russia to the north, the Caspian Sea to the east, Iran to the south, and Georgia and Armenia to the west.
Area: 86,600 km² (33 774 sq. mi.); includes Nakhchivan and Nagorno-Karabakh.
Terrain: Caucasus Mountains to the north, lowland in the central area through which the Kura River flows.
Climate: Dry, subtropical with hot summers and mild winters; forests, meadows, and alpine tundra in the mountains.
Nationality: Azerbaijani, Azeri.
Population: 9.7 million (in 2016)
Ethnic groups: Azeri 90.6%, Dagestani 2.2%, Russian 1.8%, Armenian 1.5%, other 3.9%. Note: the separatist Nagorno-Karabakh region is populated almost entirely by Armenians.
Religion: Muslim 93.4% (majority Shi'a), Russian Orthodox 2.5%, Armenian Orthodox Church 2.3%, and other 1.8%.
Languages: Azerbaijani 89%, Russian 3%, Armenian 2%, and other 6%.
Natural resources: Petroleum, natural gas, iron ore, nonferrous metals, alumina.
Agriculture products: Cotton, tobacco, grain, rice, grapes, fruit, vegetables, tea, cattle, pigs, sheep, goats.
Industries: Petroleum and natural gas, petroleum products, oilfield equipment; steel, iron ore; cement; chemicals and petrochemicals; textiles.
Exports partners: Italy 26.3%, Germany 13.3%, Indonesia 7%, France 6.9%, Czech Republic 6% (2015)
Imports - commodities: machinery and equipment, foodstuffs, metals, chemicals
Imports partners: Russia 19.9%, Turkey 16.5%, UK 8.6%, Germany 6.6%, Italy 6.3%, US 4.1% (2015)
Currency: Azerbaijan Manat; beginning January 2006, 1 new Manat (AZN) = 5000 old Manats (AZM).
Azerbaijan in Figures
Azerbaijan key statistical data.
Political systemAccording to the 1995 Constitution, Azerbaijan is a republic with a presidential government system. But the political system of Azerbaijan has been characterized since 1992 by the authoritarian leadership of Azerbaijan's presidents and undermined by corruption. Transparency International ranks Azerbaijan as one of many low-scoring countries in the region (#119 out of 167, where the least corrupt country ranks #1). Azerbaijan’s political rights rating at Freedom House declined from 6 to 7 due to an intensified crackdown on criticism and dissent; widespread violations in connection with the November 2015 parliamentary elections; and serious violations of the right to a fair trial.
Note: External links will open in a new browser window.
Official Sites of Azerbaijan
President of the Republic of Azerbaijan
The Office of President of the Republic of Azerbaijan, with a portrait of the president and information about Azerbaijan.
National Assembly of Azerbaijan
Ministry of Foreign Affairs
Ministry of Foreign Affairs of the Republic of Azerbaijan.
National Information Communication Technologies Strategy Project
Azerbaijan's e-government project.
Permanent Mission of the Republic of Azerbaijan to the UN
Azerbaijan's mission to the United Nations.
Embassy of the Republic of Azerbaijan
Diplomatic Missions of Azerbaijan
List of diplomatic missions of Azerbaijan abroad and
Diplomatic Missions accredited in Azerbaijan.
State Statistical Committee of Azerbaijan Republic
Azerbaijan in figures.
Map of Azerbaijan
Political map of Azerbaijan.
Google Earth Azerbaijan
Searchable map and satellite view of Azerbaijan.
Google Earth Baku
Searchable map and satellite view of Azerbaijan's capital city.
Map of the Caspian Sea
Map of the Caspian Sea Region.
Caucasus and Central Asia Map
Map of Central Asia and the Caucasus region.
Map of Western Asia
Map of Western Asia and the Middle East region.
Map of Asia
Reference Map of Asia.
Reporters Without Borders ranks Azerbaijan 163 out of the 180 countries included in the 2016 World Press Freedom Index . BBC states that Azerbaijan's impressive economic performance over the past two decades has not been matched by the development of free media. Mainstream media offer little scope for rigorous reporting of government activity or debate about policy.
State information agency, official news from Azerbaijanian government.
State-owned Azerbaijan news (in Azeri).
English language news from Azerbaijan.
Azerbaijan news (in Azeri).
Bookmark/share this page
Arts & Culture
AZ Art Gallery
Contemporary Art and Artists in Azerbaijan.
KVN - The Rah-rah and Quick-witted Club (Klub Veselykh i Nakhodchivykh)
Comic and jocular performance.
Baku Museum of Modern Art
Azerbaijan's modern art museum in Baku with the 'collection of the best works of painting and sculpture of Azerbaijan avant-guardists from 2nd half of the 20th century up to now.'
Museum Center of the Ministry of Culture and Tourism
Cultural center of the Azerbaijan Republic in Baku.
National Museum of the Azerbaijan History
Azerbaijan's largest museum is housed in an Italian Renaissance-style mansion in Baku.
Nizami Museum of Azerbaijani Literature
The National museum of Azerbaijan literature.
Business & EconomyAzerbaijan's high economic growth has been attributable to large and growing oil and gas exports, but some non-export sectors also featured double-digit growth, including construction, banking, and real estate. Oil exports through the Baku-Tbilisi-Ceyhan Pipeline, the Baku-Novorossiysk, and the Baku-Supsa pipelines remain the main economic driver, efforts to boost Azerbaijan's gas production are underway.
National Bank of Azerbaijan
Azerbaijan's central bank.
United States - Azerbaijan Chamber of Commerce
The site provides also information about Azerbaijan.
AZAL, the Baku based National Air Company.
Azerbaijan Railways is one of the successors of the Soviet Railways, it is headquartered in Baku. (in Azeri and Russian)
Image: Suleyman Nabiev
Travel and Tour Consumer Information
Destination Azerbaijan - Travel and Tour Guides
Discover Azerbaijan: accommodation, hotels, attractions, festivals, events, tourist boards, biking, skiing, hiking, climbing, cruising, diving, tours and much more.
Azerbaijan's official tourism portal.
Azerbaijan International Magazine
An independent magazine with issues related to Azerbaijanis around the world.
A to Z of Azerbaijan
Encyclopaedic index of Azerbaijan related information.
Official website of the city.
Site about the city of Ganja.
Image: David Davidson
Azerbaijan Academy of Sciences
Official website of with information about the academy.
Baku State University
Azerbaijan's "number one" university.
Khazar University is a leading academic institution of Azerbaijan, established in 1991.
Western University is one of the leading universities in the country, a private, non-profit officially recognized educational institution, founded in 1991 at Baku.
Environment & Nature
Geology Institute of Azerbaijan (GIA)
GIA is a leading organizations in the fields of Azerbaijan geology study and development of new fundamental trends in geoscience.
Caspian Sea Environment Programme
The CEP's mission is to assist the Caspian littoral states to achieve the goal of environmentally sustainable development and management of the Caspian environment for the sake of long-term benefit for the Caspian inhabitants.
Environmental movement in Azerbaijan
Site with comprehensive information about the main environmental problems of Azerbaijan.
The NGO aims to carry out public monitoring of ecological situation, organize civic activities for protection and improvement of environment and ecological education of the country population.
History of Azerbaijan by the Azerbaijan Ministry of Foreign Affairs.
History of Baku and Azerbaijan
History of Baku from ancient times to present days.
Background information on the Armenia-Azerbaijan conflict.
An Azerbaijan portal site.
Azerbaijan search engine (Russian/English)
Sources and additional Information about Azerbaijan
Azerbaijan | Kazakhstan | Kyrgyzstan | Tajikistan | Turkey | Turkmenistan | Uzbekistan
Other countries in the Caucasus and Central Asia:
Armenia | Georgia
Major Cities in Central Asia:
Almaty, Ashgabat, Astana, Baku, Bishkek, Dushanbe, Tashkent, T'bilisi, Tehran, Yerevan
One World - Nations Online .:. let's care for this planet
Actually, it's impossible to simulate freedom --- or?
Nations Online Project is made to improve cross-cultural understanding and global awareness.
More signal - less NOISE
| Information Sources | Disclaimer | Contact: firstname.lastname@example.org | Copyright © 1998-2017 :: nationsonline.org
|
<urn:uuid:5a4a731b-be18-4f42-ba87-7e8fa0c01f07>
|
CC-MAIN-2017-39
|
http://www.nationsonline.org/oneworld/azerbaijan.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687702.11/warc/CC-MAIN-20170921063415-20170921083415-00263.warc.gz
|
en
| 0.875235 | 2,474 | 3.25 | 3 |
Abrasive tools are essential components of various machines used in industries such as manufacturing, construction, and metalworking. These tools are used to remove material from a workpiece through the application of friction, which is generated by the abrasive particles present on the tool's surface. The abrasive particles can be made of various materials, including diamond, silicon carbide, and aluminum oxide, depending on the application and the material being worked on. Abrasive tools are commonly used in grinding, cutting, and polishing applications. In grinding, abrasive tools are used to remove small amounts of material from the surface of a workpiece to achieve the desired shape and finish. Cutting involves using abrasive tools to cut through a workpiece, while polishing is the process of using abrasive tools to create a smooth and shiny surface. Abrasive tools can be classified into various types based on their shape, size, and application. Some of the most common types of abrasive tools include grinding wheels, sandpaper, abrasive belts, and abrasive discs. Grinding wheels are used for heavy-duty grinding applications, while sandpaper is used for fine finishing work. Abrasive belts are used for grinding and polishing large surfaces, while abrasive discs are used for precision cutting and grinding. In conclusion, abrasive tools are an essential part of many machines used in various industries. They are used to remove material from a workpiece through the application of friction, and they can be made of various materials depending on the application. Abrasive tools can be classified into various types based on their shape, size, and application, and they are used for various purposes such as grinding, cutting, and polishing.
Abrasive tools, Machines, Grinding, Cutting, Polishing
CITATION : "David Martin. 'Abrasive Tools Being Parts Of Machines.' Design+Encyclopedia. https://design-encyclopedia.com/?E=359376 (Accessed on September 22, 2023)"
We have 169.951 Topics and 412.694 Entries and Abrasive Tools Being Parts Of Machines has 1 entries on Design+Encyclopedia. Design+Encyclopedia is a free encyclopedia, written collaboratively by designers, creators, artists, innovators and architects. Become a contributor and expand our knowledge on Abrasive Tools Being Parts Of Machines today.
|
<urn:uuid:6db4bd93-1a41-4a40-bedb-e7b6f8026a53>
|
CC-MAIN-2023-40
|
https://design-encyclopedia.com/?E=359376&I=A
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506339.10/warc/CC-MAIN-20230922070214-20230922100214-00488.warc.gz
|
en
| 0.93605 | 481 | 3.546875 | 4 |
Published by Kenneth S. Doig
written by Dr. Angela Marcantonio
1. The traditional Uralic theory and modern research
In the last couple of decades there have been in Finland as well as abroad a number of publications, in several fields of science, such as linguistics, anthropology, archaeology, genetics, which, one way or the other, all question what one can call ‘the standard, traditional Uralic (U) theory’ about the origin of the Finns and their language. Compare for example the following works in fields outside linguistics: Dolukhanov (2000a & b); Julku and Äärelä (eds,1997), Julku (2000); Niskanen ( 2000) and Nuñez (1987); see also the article ‘Palaeontology: science or fiction?’ in this volume for further references.
|
<urn:uuid:edd6f363-620e-435d-80ba-9b53ac724c14>
|
CC-MAIN-2017-30
|
http://www.protogermanic.com/search/label/Germanic%20origins
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423774.37/warc/CC-MAIN-20170721122327-20170721142327-00560.warc.gz
|
en
| 0.917053 | 185 | 2.796875 | 3 |
Henderson Island World Heritage Site
Île d'Henderson, United Kingdom
Please, login to help us
Hey friend, could you provide us a wikipedia URL with a good description of this protected area?
Please, be sure that you are suggesting an english language wikipedia URL (http://en.wiki....)mark it as wrong
Henderson Island (formerly also San Juan Bautista and Elizabeth Island) is an uninhabited raised coral atoll in the south Pacific Ocean. It is one of the few atolls whose ecosystems have been relatively unaffected by human contact. Ten of its 51 flowering plants, all four of its land birds and about a third of the identified insects and gastropods are endemic: a remarkable diversity given the island's size.
Measuring 9.6 kilometres (6.0 mi) long and 5.1 kilometres (3.2 mi) wide, it has an area of 37.3 square kilometres (14.4 sq mi) and is located 193 kilometres (120 mi) northeast of Pitcairn Island. It is unsuitable for agriculture and has little fresh water. There are three beaches on the northern end and the remaining coast comprises steep, mostly undercut, cliffs up to 15 metres (49 ft) in height.
In 1902 Henderson was annexed to the Pitcairn Islands colony, now a South Pacific Dependent Territory of the United Kingdom. It was designated a World Heritage Site by the United Nations in 1988.
Archaeological evidence suggests that a small permanent Polynesian settlement existed on Henderson at some time between the twelfth and fifteenth centuries. The reasons for the group's disappearance remain unknown, but may relate to the similar disappearance of the Polynesians on Pitcairn Island, on whom the Hendersonians would have depended for many of the basics of life, especially stone for making tools. The Pitcairn Polynesians may in turn have disappeared because of the decline of nearby Mangareva; thus, Henderson was at the end of a chain of small, dependent colonies of Mangareva.
On 29 January 1606 a Spanish expedition led by the Portuguese sailor Pedro Fernandes de Queirós discovered Henderson Island and named it San Juan Bautista. On 17 January 1819 the British Captain Henderson of the British East India Company ship Hercules re-discovered the island and named it Henderson Island. On 2 March 1819 Captain Henry King, sailing aboard the Elizabeth, landed on the island to find the king's colours already flying. His crew scratched the name of their ship into a tree, and for some years the island's name was Elizabeth or Henderson, interchangeably.
On November 20, 1820, the Nantucket whaleship Essex was rammed by a sperm whale and sunk (a report of which inspired Herman Melville to write Moby Dick), and the survivors arrived at Henderson on 20 December in three small whaleboats. They found the island's only known drinkable water-source – a brackish spring on the north shore, exposed only at half tide, rising from a crevice in a flat rock, large surfaces of which compose the face of the beach – and ate fish, birds, eggs, crabs and peppergrass; but they had largely exhausted the ready food within a week and on 27 December the three boats set sail for South America, leaving behind Thomas Chappel, Seth Weeks and William Wright who had chosen to stay, and who survived until their rescue on 9 April 1821. In his account of the ordeal, Chappel reported having seen human skeletons in a cave.
In August 1851 visitors from Pitcairn Island also found skeletons in a cave and wreckage on the adjacent beach. After a party of Pitcairners collecting miro wood re-discovered the skeletons in March 1958, a medical examination determined that the bones were of Caucasian origin, and they were then buried in a shallow grave inside the cave. Finally, an American survey team examined the bones in 1966 and buried them in five coffins in the left-hand corner of the cave, tightly jamming a large cross between the ceiling and the rock floor at the entrance. They concluded the remains were of five or six people, one of whom was between three and five years of age. It is presumed they were the survivors of a shipwreck who died of dehydration.
Henderson, along with Oeno and Ducie, was formally annexed to the British Empire in 1902 by Captain G. F. Jones who visited the islands in a cutter with a crew of Pitcairn Islanders; and in August, 1937, HMS Leander on a journey from Europe to New Zealand carried out an aerial survey of Henderson, Oeno and Ducie, and on each island a British flag was planted and an inscription was nailed up proclaiming "This island belongs to H.B.M. King George VI."
In 1957 a twenty-seven-year-old American, Robert Tomarchin, lived the life of a castaway on the island for approximately two months, accompanied by a pet chimpanzee, apparently as a publicity stunt, until people from Pitcairn rescued him in two longboats.
In the early 1980s American businessman Arthur M. Ratliff expressed interest in establishing a small settlement with an airstrip, cattle ranch, and mansion on the island. The Pitcairn Island Council approved his plans in April 1981 but the British Foreign and Commonwealth Office overrode the decision and vetoed the proposed development, after environmentalist groups had lobbied to protect the natural ecology and environment of the island. Henderson Island was subsequently listed as a World Heritage site in 1988.
Since the introduction of aluminium-hulled long-boats in the 20th century, Pitcairners have made regular trips to Henderson to harvest the wood of miro and tou trees. Usually they venture to Henderson once per year, but they may make up to three trips if the weather is favourable. Pitcairners carve the wood into curios for tourists, from which they derive much of their income.
Henderson Island is a raised coral atoll that, with Pitcairn, Ducie and Oeno Islands, forms the Pitcairn Island Group. The nearest major landmass is more than 5,000 kilometres away. This coral limestone island sits atop a conical (presumed volcanic) mound, rising from a depth of roughly 3500 metres. Its surface is mostly reef-rubble and dissected limestone; an extremely rugged mixture of steep, jagged pinnacles and shallow sink holes, and the island is encircled by steep, undercut limestone cliffs on all but the north end. There are three main beaches, on the north-west, north, and north-east sides, and the north and north-west sides are fringed by reefs. The depression at the island's centre is thought to be a raised lagoon. There is only one known potable (drinkable) water source, a brackish spring, exposed briefly at low tide. The surrounding ocean tidal range is about about one metre at spring tide.
Apart from five species found bordering the beaches, including coconut palms, the vegetation is undisturbed. Henderson Island is covered by 5–10 m tall tangled scrub forest, more thinly covered in the central depression. It has 51 native species of flowering plants, ten of which are unique to the island (endemic). Dominant tree species include coconut, Pandanus tectorius, Thespesia populnea, Tournefortia argentea, Cordia subcordata, Guettarda speciosa, Pisonia grandis, Geniostoma hendersonense, Nesoluma st.-johnianum, Hernandia stokesii, Myrsine hosakae, and Celtis sp.
The island is presently home to four endemic land bird species – the Henderson Fruit Dove, Henderson Lorikeet, Henderson Reed Warbler and the flightless Henderson Crake. Three species of the Columbidae family – the Henderson Ground Dove, the Henderson Imperial Pigeon and the Henderson Archaic Pigeon – were formerly endemic to the island, but became extinct when the Polynesians arrived around 1000 CE. Of the fifteen non-endemic seabird species found, nine or more are believed to breed on the island. Breeding colonies of the globally endangered Henderson Petrel formerly existed on Ducie, but were wiped out by invasive rats by 1922. It is believed to now nest uniquely on Henderson island.
Bones associated with prehistoric Polynesian settlement sites dating to somewhere between 500 and 800 years ago include those of the Polynesian Storm Petrel, Marquesan Imperial Pigeon, and Polynesian or Pacific Imperial Pigeon which are no longer found on the island, and two others – Christmas Shearwater and Red-footed Booby – that still visit but no longer nest. It is hypothesized that the Polynesian settlers may have driven these bird species, along with six terrestrial snail species, to local extinction, and this loss of a ready and regular food supply may have contributed to the Polynesians' subsequent disappearance. The island has been identified by BirdLife International as an Important Bird Area for its endemic landbirds and breeding seabirds.
The invertebrate species are largely unknown but a third of the known snails and insects are endemic. There are no native mammals but the Pacific rat, introduced by Polynesians 800 years ago, abounds. A skink (Emoia cyanura), and the green sea turtle have been identified, and an unidentified gecko has been reported.
Land bird populations appear to be relatively stable but there is high risk of introduction to the island of predators, disease vectors and diseases by unauthorised landings of yachts. Introduction of the Eurasian black rat or the domestic cat would be likely to cause almost immediate extinction of the ground dwelling Henderson Crake and possibly other species. The endemic birds may have no immunity to the fatal avian pox which is transmitted by biting flies such as hippoboscidae.
Between July and November 2011 a partnership of the Pitcairn Islands Government and the Royal Society for the Protection of Birds implemented a poison baiting program aimed at eradicating the Pacific rat. A subsequent expedition has demonstrated the persistence of a (greatly reduced) rat population, and growth in the size of some of the island's unique bird populations.
Coordinates: 24°21′S 128°19′W / 24.350°S 128.317°W / -24.350; -128.317
Territories under European sovereignty but closer to or on continents other than Europe (see inclusion criteria for further information)
Do you want to say something about this protected area? Start a thread
Thanks friend, Could you tell us where you got this information?
Sorry, it is not possible to edit this geometry online. In the next few months we will be adding tools to edit complicated boundaries. Please try again soon!
|
<urn:uuid:a9fd34ab-6774-4c24-918d-3bc29ef7c616>
|
CC-MAIN-2014-15
|
http://www.protectedplanet.net/sites/12896
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223205375.6/warc/CC-MAIN-20140423032005-00599-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.95378 | 2,254 | 3.171875 | 3 |
Hudson Valley Iron-Ore Mining Industry: A History of Sterling Forest
Heavy metal: Sterling Forest was once the center of the Valley’s rich iron-ore industry
(page 2 of 2)
Deteriorating buildings from the ironworks as they appear today
Though mine owners raked in the cash and lived comfortably, it was a different story for the workers. “At Sterling, miners got paid by how much ore was taken out,” explains Bayne. Once they ventured into the mines to excavate the magnetite, they would light black powder or dynamite and “run like hell,” says Bayne. “After the blast they went back in and picked up all the pieces.” But this often led to health hazards: Inhalation of nitroglycerin from the explosives gave workers massive headaches. Later on, the company used drills, which earned the nickname “widow makers.” Says Bayne, “Magnetite is a crystal-like substance, so when you drill it the smoke that comes out carries the crystals. When the miners breathed it in, it would eventually tear their lungs apart.”
And of course, the most obvious peril was the risk of cave-ins. Bayne says that though records from mining companies are sparse (“because who wants to talk about the people you killed?”), fatalities from collapses and falling debris were quite common. One such incident actually brought down an entire company. In Brewster, on the eastern side of the river, lies the submerged remains of the once-prosperous Tilly Foster Mine. The mine opened in 1853 and hired large numbers of immigrants, who were often known by numbers because the owners couldn’t pronounce their names. A mine collapse in 1895 effectively ended its operations. Walls caved in, killing 13 miners — many of them identified only by their number in the New York Times news report of the disaster — and the business never recovered. Eventually, a reservoir flooded the property.
See gallery below to view more photos of abandoned mines in Sterling Forest.
Take a hike
The forge fires have long since cooled, but remnants of the mining industry still dot the local landscape. Many are accessible on nature hikes in our parks, which the public is free to explore. “There are at least 20 known mines within Bear Mountain State Park,” Edward Lenik says. “Some were just exploratory pits, which you can find hiking.” Bigger mines, such as the Pine Swamp and Hogancamp in Harriman State Park, are favorites of hikers today, he says. (The Pine Swamp mine was owned and operated by the famous Parrott brothers, Robert and Peter; their ore was used to make the Parrott guns that helped the Union Army win the Civil War.)
Doc Bayne leads tours through Sterling Forest State Park, including one to the mines, a favorite of his that weaves through the Lakeville ghost town. “We follow the Lakeville Ironworks Trail, walk past the furnaces, stop by the Wildcat Mine and point out the old town buildings — well, their foundations, anyway,” he says. He possesses a wealth of knowledge on the subject, and is in fact writing a book about Townsend’s chain entitled The Chain that Saved America, because, as he says, “Sterling Forest has such a gift of iron history.”
|
<urn:uuid:3bc7c0cc-1eb4-4808-a7cc-dfd0f3530ada>
|
CC-MAIN-2014-23
|
http://www.hvmag.com/Hudson-Valley-Magazine/September-2012/Hudson-Valley-Iron-Ore-Mining-Industry-A-History-of-Sterling-Forest/?cparticle=2&siarticle=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267876.49/warc/CC-MAIN-20140728011747-00289-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.973314 | 716 | 3.078125 | 3 |
Philosophy means, literally, the love of wisdom. The philosophy major teaches more than just content, it teaches how to think about all manner of issues: from spotting logical fallacies in a politician's rhetoric to pondering life's deepest questions. Science and technology may offer us great power, but they don't offer the wisdom of how to use that power. How should we direct that power? What does it mean to be human? What does it take to be truly happy? How should I live my life? These questions, and more, are fundamental to philosophy.
Is a Philosophy Major Practical?
Something is practical and useful to the degree that it enhances our lives. For this question, philosophy operates on many levels. But the level most people have in mind when asking this question is whether it is practical for making a living, for having a career. It often surprises people to find that philosophy majors are often at the top of their chosen fields. This is because Philosophy majors develop valuable skills that help them to excel in just about any field that requires serious, careful, analytical thought. Particular technical training quickly becomes outdated; but thinking skills have enduring value. Employers in business and other fields repeatedly state that it is far easier to teach employees the content of the field than to teach them skills of thinking critically, presenting clear arguments, identifying essential points, and problem solving. They also often complain that their employees lack such skills. More than half of all college graduates wind up working in specialized fields different from their undergraduate majors. Philosophy is the only major that is focused primarily on thinking skills, and hence, is valuable in a quickly changing job market.
Specifically, the major in Philosophy develops and enhances the abilities to:
- Express difficult ideas in clear spoken and written language
- Draw accurate conclusions from confusing data
- Discern hidden relationships and connections
- See and focus on the big picture
- Articulate overlooked alternatives
- Persuade people to take seriously unfamiliar views or novel opinions
- Clarify purposes, principles, and general objectives
Students who major in Philosophy have more options--and more attractive options--than people often realize. There are many fields of study and many types of careers for which philosophy provides excellent preparation. This is because Philosophy majors develop valuable skills that help them to excel in just about any field that requires serious, careful, analytical thinking and writing skills. Some philosophy majors will go on to make a living as philosophers. Other philosophy majors work in industry, government, and education. They become lawyers, doctors, administrators, teachers, diplomats, consultants, stockbrokers, bankers, managers, and business owners. They are accepted and respected in all professional schools and welcomed into management training programs.
Studying Philosophy for Its Own Sake:
We all need to make a living. But is "living" just about income and career? Many people get to the top of their fields and find their lives...empty. This is often called the midlife crisis. The study of philosophy is about the whole person: as physical, social, political, psychological, and spiritual beings. The study of philosophy enriches our perspectives by introducing us to very different ways of looking at, and thinking about, the world and how we live in it. In studying Philosophy, we pursue wisdom, that knowledge which is directly concerned with the highest and most noble aspects of our existence. By studying philosophy, we hope to arrive at a greater awareness of the complexities of our existence, and at best a perfecting of our very humanity.
Recognize any of these names? What do these people have in common?
Woody Allen, Simone de Beauvoir, Stephen Colbert, Harrison Ford, Carly Fiorina, Aung San Suii Kyi, Stacy London, Steve Martin, Ethan Coen, Elie Wiesel, Alex Trebek, Susan Sontag, Philip K. Dick, Iris Murdoch, Mary Higgins Clark, David Duchovny, William Bennett, Sheila Bair, George Soros, Stephen Breyer, Pope John Paul II.
THEY ALL MAJORED IN PHILOSOPHY.
What are some of the job titles held by students who majored in philosophy at UNI?
UNI philosophy majors have pursued and excelled in a wide variety of professions: analyst at the US Senate, professor, college president, school psychologist, owner and president of automobile dealerships, ordained minister, health care agency administrator, manager at John Deere, executive director of a non-profit agency, social security administrator, Head Start Center administrator, director of program for the homeless, social worker, banker, tax accountant, attorneys in many fields, and many others.
Of course, these jobs require additional training in technical skills and specialized knowledge. But these are easily gained by most philosophy majors.
Some professional and graduate schools UNI philosophy majors have attended:
Law Schools at Harvard, Iowa, Drake and Hamilton; University of Iowa MBA; The Divinity School at Vanderbilt, Yale, and Harvard; Graduate programs at UC Irvine, Notre Dame, Michigan State, Kansas, DePaul, Vanderbilt, Missouri, Stanford, Iowa State and many others, including the MA Public Policy Program at UNI and WI, Madison.
|
<urn:uuid:10a5c2a6-9552-4ed4-addf-7ded1a8b12ba>
|
CC-MAIN-2017-34
|
https://philrel.uni.edu/why-should-i-study-philosophy
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109525.95/warc/CC-MAIN-20170821191703-20170821211703-00567.warc.gz
|
en
| 0.945985 | 1,062 | 2.625 | 3 |
Updated: Jun 15, 2018
Over 2,300 years ago, Euclid wrote Elements. Today, the principles he wrote are still taught in every high school in America. You might remember them from geometry class, Euclidean geometry.
It’s amazing when you think of it. One class that hasn’t changed since 300 BC. Everything Euclid wrote is still applicable today. So, the question is, “How can a subject remain unchanged for so long?” The answer lies in his methodology and math.
Euclid approach geometry through definitions, postulates, propositions, and mathematical proofs. The important point here is he started with definitions, then built upon them.
Every process needs to start with agreed upon and understood definitions. Let’s not assume the same word means the same thing to everyone on the team. If you were to ask everyone on your sales team their definition of forecastable opportunity, you typically get a blank stare or a unique answer. The same holds true with qualified prospect. What does qualified mean?
If everyone on your team has a different definition for forecastable, what does your team’s forecast mean? If everyone has a different definition for qualified prospect, how will you know how many opportunities your sales force is truly working on?
As with every group or team, everyone needs to understand the common vernacular. Without definitions, you will always cap your efficiency due to communication errors.
The steps for improvement are easy, but the exercise is most effective when tackled as a team and given the necessary time. They are:
1. Identify the words/terms you need to define. I have given you two.
2. Determine why you will be using the term. Compiling a company forecast is one example.
3. Anticipate the outcome. What are the implications?
4. Ask, “Is the output optimal?” If not, identify deficiencies and repeat previous steps.
5. Ensure everyone understands the definitions and uses them appropriately.
For those who don’t make an effort to define their organizational terms, George Bernard Shaw said it best.
“The single biggest problem in communication is the illusion that it has taken place.”
The best sales teams I have seen, define terms and processes. They are exact and disciplined in all they do. Arbitrary leads to inconsistent results and uncertainty as to why it is occurring.
If you want to Sell More While Spending Less, define your common language.
|
<urn:uuid:a9005d5d-d275-4b77-bf9a-f35bb7ac9582>
|
CC-MAIN-2020-16
|
https://www.salessigma.com/post/defining-success-in-sales-sell-more-while-spending-less
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371609067.62/warc/CC-MAIN-20200405181743-20200405212243-00268.warc.gz
|
en
| 0.9554 | 517 | 2.765625 | 3 |
Let’s face it: Certain words and sounds connect us to specific places and memories. What would you think if I told you that it is now possible to save a sound and forever link it to an exact place on earth?
World meet Woices. Woices say hello to approximately 7 billion people just waiting to use you.
Woices is a free internet service that lets individuals create, share, and listen to echoes. Echoes are audio recordings linked to a specific real-world object or geographical location. Echoes can be listened to by anyone, as if the person who made the echo was standing there right next to you.
There are no rules about the types of sounds that qualify as echoes; it
can be an informative dialogue about how tall the Washington Monument
is, or a first-person story about that one time a crazed unicyler almost
ran you over at the park. Woices‘ overall goal is to expand reality by
creating a new layer of information in audio format, dubbed the
“echoesphere” by the Woices team, which will make the world a more
“interesting and expressive place.”
Cool educational echoes: Home of TeachersFirst.com:
One echo that I found especially worthwhile was the “Home of
TeachersFirst.com” echo left in Reston, Virginia. The echo gives
several helpful tips on how Woices can be used by teachers and students
in the classroom to enhance learning.
One idea is to have students narrate dialogues about places they are
studying at the places themselves. This could work especially well for
international students who might be able to share echoes with classmates
in their new communities when visiting their native homelands. For
example, a student learning about art history in Spanish class in Maine
could create an echo about Frida Kahlo‘s early childhood in the Coyoacan
boroughs of Mexico City where she was born. Another thought was to
have students learning about the battles of Lexington and Concord record
the song “The Concord Hymn” by Ralph Waldo Emerson and tag it to the
scene of the battlefield in Massachusetts.
These suggestions represent just a few of the many ways to connect
sounds with places around the world. I would also suggest letting
students search for echoes recorded at sites they have visited
previously or places they would like to go to someday. See what kind of
echoes have been placed near your school or hometown. Can you find
echoes in other languages? A song? A story? A poem? A speech?
Decide what kind of echo is your favorite and record one at a location
that is important to you. Make your own contribution to the Earth’s
newest and coolest layer of data–the echoesphere!
Becky for My Wonderful World
Photos courtesy of My Shot Your Shot:
|
<urn:uuid:fc84c0b8-0ca2-4842-818d-bb8365838dc6>
|
CC-MAIN-2013-48
|
http://blog.education.nationalgeographic.com/2011/03/01/say_hello-ello-o_to_the_echosphere/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053865/warc/CC-MAIN-20131204131733-00022-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.950141 | 609 | 3.078125 | 3 |
Online MA in TESOL!
Simplified -ED endings
There have been a couple suggestions about teaching -ed endings, and I have to say, it doesn't have to be so complicated:
It is essential to teach students when to use an extra syllable and when to use a simple consonant (t or d). however, it is NOT necessary for students to distinguish between /t/ and /d/. There are no minimal pairs - that means it will never affect the meaning of the word or the students ability to understand/be understood.
Therefore, the simple and completely sufficient way to teach -ed endings is to end up with a rule like this: If the -ed ending is immediately preced by 't' or 'd', the ending is pronounced as an extra syllable. Otherwise it is produced as /t/ or /d/ (whichever is easiest!)
World's Best Jobs!
Dave's ESL Cafe Copyright © 2016 Dave Sperling. All Rights Reserved.
|
<urn:uuid:c4f96b56-a6d9-443d-a7e0-da899fb93ad5>
|
CC-MAIN-2017-47
|
http://www.eslcafe.com/idea/?display:1057174524-62383.txt
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809392.94/warc/CC-MAIN-20171125032456-20171125052456-00505.warc.gz
|
en
| 0.955382 | 205 | 3.453125 | 3 |
What is ppi in screen and display
what is ppi in screen of mobile. Pixel Density in any device decides the quality of screen. So, learn all about what is ppi and what is pixel in camera.
If we talk about screen quality of any device either it is mobile, television, computer or laptop then we may have listened about the term pixel. While reading and finding out the specifications of any mobile, computer and television it is mention about the resolution of screen with certain value of pixels. For example, Full HD Display with 1920*1080p. The use of p (pixel) are also found in computer and television screen. If we talk about smart tv, 4K tv and 8k tv we can find a pixel used in it in its specification. Like, 54” (inch) Display with 3840*2160p. It means it in 4k tv we can find about 8Million Pixel.
Before reading all about what is ppi it is better to know about what is pixel in details.
|What is pixel per inch|
what is pixel
Pixel is a tiny or small component used in any screen. Pixel are small elements found or used in screen of any device. The use of pixel is found in smartphones screen, computer and laptop screen, television screen and devices having capacity to show an real object in screen. Pixel are small element having tiny rectangle shape. If we notice the screen of television from near then we can find the picture are somehow blur type with small rectangle (4 side equal) size having Red, Green and Blue color. So, it is clear that pixel are tiny colorful components which have capacity to change any color. The single pixel contains a three sub-pixel having RGB color. RGB color stands for Red Green Blue color. Pixel is a tiny component of screen which can be seen only from closer distance to screen by our eyes. If we look the screen from closer distance then we can easily see the pixel used in screen but if we go far from screen then you can’t see the pixels used in screen.
what is ppi
PPI (Pixel Per Inch) is a measure of pixel in screen. PPI is a ratio of number of pixels used in screen. PPI is a measure of pixel density which determines the exact resolution of any screen. Pixel per inch helps in determining the quality and resolution of the screen of the device like television display, smartphone display and computer or laptop screen. We can say that the combine form of ppi is called an image. Pixel per inch is that which calculates the number of pixels used in 1 inch or per inch in screen. PPI helps to find how many pixels a square image of 1 inch has.
what is ppi in screen
PPI is also called as Pixel Density. Pixel density is defined as the total number of pixels used or located in a particular area of any screen. Pixel of screen is also measured in terms of PPCM. PPI in screen makes the calculation of the number of pixels used in your device screen. You can find the ppi of your mobile, computer and television screen by calculating it.
In simple way, PPI is the value or certain number of pixels attached or used in the screen of any device. Pixel per inch can be obtained by calculating total number of pixels used in display or screen divided by the size of the screen. The increase in number of pixels in screen makes the clarity of the objects and more details of objects.
what is ppi determines
Pixels are small elements which determines the quality of an image or object shown in a screen. Increase in the number of pixels in photo or even in screen increase the quality of image or of screen too. If the pixels used in photo or in screen is less then the object shown in the screen can’t be clear and smooth. In screen having less pixels we can find a number of small dots which affects in the quality of the screen. Use of less pixel in image makes the image blur and unclear to view in zoom in or even in normal mode. So, increase in number of pixels in image, videos and screen increases the quality and vice versa.
How to Calculate Pixels or How to find PPI
We can calculate and find out the pixel per inch or pixel rate used in screen of our mobile, computer, laptop, television, tablets etc. in an easy step. So, after finding what is ppi and what is pixel now find how to calculate pixel per inch of the screen.
Suppose, you have a smartphone having 6” (inch) display size and resolution of 1920*1080p. So, the question may be,
If the size of screen is 6 inch with resolution of 1920*1080. Find PPI or Pixel density per inch?
Answer: If the size of display is 6 inch then at first, we have to find out the total resolution of the pixel used in screen. To find total pixel used in the screen is by multiplying the breadth and height of the screen.
Height (h) = 1920p
Breadth (b) = 1080p
So, total = 1920p*1080p = 2073600p =2million pixel (2MP)
From above it is clear that the total MP used in the screen is 2MP.
Similarly, if we split the screen size into two equal triangle form then we can find by using the simple mathematical formula.
(1080*1080) + (1920*1920) = (1166400 + 3686400) = √4852800 = 2202.9071
When we divide 2202.9071 by 6 then we can find around 367.15 pixels per inch in your smartphone screen.
Does PPI matter?
Although increase in the number of pixels in screen or pixel per inch in screen increase the quality of object shown in the screen it matters on the size of screen too. The use of large number of pixels in small size of screen may not give a better result or the exact performance quality. The normal pixel per inch or pixel density in 1 inch is around 350 to 450 is good to sense by eyes. The use of 8k resolution in 4.5 inch display will not be suitable because the ppi of 8k resolution (7680*4320) in 4 inch display is about 1440 ppi.
Our human eye can’t identify the pixels more than 399 in 1 inch. So, the use of more than 399 pixel in 1 inch of the screen doesn’t makes any difference in quality of the screen. If the size of screen is large then there must use more resolution or pixels to meet an average pixel to human eye for better image i.e. 399 ppi.
What is ppi 300 or what is 300 ppi?
300 ppi means the average density of a pixel per inch in any display is 300. It means that 1inch display of screen contains 300 pixels.
How many PPI is 4k?
The exact resolution of 4k UHD (Ultra HD) is 3840*2160p. When we multiply this two then we get around 8Million Pixel. If the size of screen is 6inch then the ppi of 4k will be 480 pixels per inch.
|
<urn:uuid:e4dbf326-33e4-4c2d-be5a-e9692471fc74>
|
CC-MAIN-2020-29
|
https://www.whatidea1.com/2020/01/what-is-ppi-in-screen.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655880616.1/warc/CC-MAIN-20200706104839-20200706134839-00379.warc.gz
|
en
| 0.915748 | 1,497 | 3.53125 | 4 |
|Royal Fusiliers (City of London Regiment)|
Badge of the Royal Fusiliers
|Country|| Kingdom of England (1685–1707)
Kingdom of Great Britain (1707–1800)
United Kingdom (1801–1968)
|Nickname||The Elegant Extracts|
|Motto||Honi soit qui mal y pense|
|March||The Seventh Royal Fusiliers|
It was known as the 7th Regiment of Foot until 1881. The Royal London Fusiliers Monument, a memorial dedicated to the Royal Fusiliers who died during World War I, stands on Holborn in the City of London.
It was formed as a fusilier regiment in 1685 by Lord Dartmouth, George Legge, from two companies of the Tower of London guard, and was originally called the Ordnance Regiment. Most regiments were equipped with matchlock muskets at the time, but the Ordnance Regiment were armed with flintlock fusils. This was because their task was to be an escort for the artillery, for which matchlocks would have carried the risk of igniting the open-topped barrels of gunpowder.
The regiment became the 7th Regiment of Foot (Royal Fusiliers) in 1751, although a variety of spellings of the word "fusilier" persisted until the 1780s, when the modern spelling was formalised. In 1881, under the Childers Reforms when regimental numbers were abolished the regiment became The Royal Fusiliers (City of London Regiment).
The Royal Fusiliers were sent to Canada in 1773. The regiment was broken up into detachments which served at Montreal, Quebec, Fort Chambly and Fort St Johns (Saint-Jean-sur-Richelieu). In the face of the American invasion of Canada in 1775/76, most of the regiment was forced to surrender. The 80 man garrison of Ft Chambly attempted to resist a 400 man Rebel force but ultimately had to surrender. This is where the regiment lost its first set of colors. Captain Owen's company of the 7th, along with a handful of recruits assisted with the gallant defense of Quebec.
The men taken prisoner during the defense of Canada were exhanged to British held New York City in late 1776. Here the regiment was rebuilt and garrisoned New York and New Jersey. In October 1777, the 7th participated in the successful assaults on Fort Clinton and Fort Montgomery. In December 1777, the regiment reinforced the garrison of Philadelphia. During the British evacuation back to New York City, the regiment participated in the June 1778 Battle of Monmouth. The following year, the 7th participated in Tryon's raid.
Late in 1779, the Royal Fusiliers were brigaded with the 23rd Regiment of Foot for the capture of Charleston. Once Charleston fell, the regiment helped garrison the city. A detachment of 80 men was sent to Camden, SC where they supervised the building of fortifications there.
In January of 1781, four companies of the Royal Fusiliers were detached from General Cornwallis's army. The men were initially intended to reinforce the British fort at Ninety Six but was eventually attached to a Light Infantry force under the command of Banastre Tarleton. Tarleton was defeated at the Battle of Cowpens on the 17th of January. The 7th lost 171 officers and men, along with their second set of regimental colors (which were stored in the army's baggage wagons). Tarleton tried to blame his defeat partially on the 7th by claiming they were almost entirely recruits. However, the regiment's rolls show that only 38 of the men killed or captured at the Cowpens were recruits. The rest of the regiment were seasoned veterans. In fact, according Larry Babits' book, "A Devil of a Whipping", the greatest casualties inflicted on Daniel Morgan's army were suffered by the troops who opposed the 7th.
While the men on Tarleton's command were marching towards defeat, another 18 men of the regiment remained with Cornwallis's army. These men fought through North Carolina, participating in the Battle of Guilford Courthouse, and eventually ended up in Virginia where they joined with the Light Infantry company of the Royal Fusiliers. These unfortunate men eventually were forced to surrender with the rest of the British Army at Yorktown in October of 1781.
There was another detachment which remained in the South, under the command of Lt Col. Alured Clarke. These men remained in garrison in Charleston, until they were transferred to Savannah, GA in December of 1781. This detachment successfully helped defend coastal Georgia from Rebel attacks until the garrison was evacuated to New York City in 1782. The shattered remains of the 7th Regiment of Foot were some of the last British soldiers to leave the New York after the Treaty of Paris ended the American Revolution in 1783.
French Revolution and Napoleonic Wars
The Royal Fusiliers formed part of the famed Fusilier Brigade in Wellington's Peninsular Army along with the 23rd Regiment of Foot (The Royal Welch Fusiliers) at the Battle of Albuhera on 16 May 1811.
First World War
The Royal Fusiliers served with distinction in the First World War, raising 76 battalions who wore the regimental cap badge. They served on the Western Front, in Africa, the Middle East and Macedonia. Members of the Royal Fusiliers won the first two Victoria Crosses of the war near Mons in August 1914 (Lieutenant Maurice Dease and Private Sidney Godley), and the last two in North Russia.
The Stock Exchange Battalion of the Royal Fusiliers was formed in 1914 when 1,600 members of the Exchange joined up: 400 were killed during the war. The 23rd and 24th (Service) Battalion, better known as the Sportsman's Battalions, were among the Pals battalions. The 25th (Frontiersmen) Battalion, Royal Fusiliers served in East Africa. The 38th through 42nd Battalions of the regiment served as the Jewish Legion in Palestine; many of its members went on to be part of the founding of the State of Israel in 1948.
The Royal London Fusiliers Monument, a war memorial, stands on High Holborn, near Chancery Lane tube station, surmounted by the lifesize statue of a World War I soldier, and its regimental chapel is at St Sepulchre-without-Newgate.
Second World War
The Royal Fusiliers were involved in many notable battles of the war, including Operation Shingle, or as it is now known, the Battle of Anzio. On 18 February 1944 Company Z was ordered to hold the bridgehead against a Tiger I tank assault. There were many casualties.
In August 1952 the regiment entered the Korean War. On 23 April 1968 the regiment was amalgamated with the Royal Northumberland Fusiliers (5th Ft), The Royal Warwickshire Fusiliers (6th Ft) and the Lancashire Fusiliers (20th Ft) to form 3rd Bn. The Royal Regiment of Fusiliers.
The Fusilier Museum is located in the Royal Regiment of Fusiliers Headquarters at HM Tower of London. Displays include uniforms, flags, silver, insignia, medals, photographs, personal artifact and war souvenirs. Admission is included with entry to the Tower of London.
- Namur 1695, Martinique 1809, Talavera, Busaco, Albuhera, Badajoz, Salamanca, Vittoria, Pyrenees, Orthes, Toulouse, Peninsula, Alma, Inkerman, Sevastopol, Kandahar 1880, Afghanistan 1879-80, Relief of Ladysmith, South Africa 1899-1902
- The Great War (47 battalions): Mons, Le Cateau, Retreat from Mons, Marne 1914, Aisne 1914, La Bassée 1914, Messines 1914 '17, Armentières 1914, Ypres 1914 '15 '17 '18, Nonne Bosschen, Gravenstafel, St. Julien, Frezenberg, Bellewaarde, Hooge 1915, Loos, Somme 1916 '18, Albert 1916 '18, Bazentin, Delville Wood, Pozières, Flers-Courcelette, Thiepval, Le Transloy, Ancre Heights, Ancre 1916 '18, Arras 1917 '18, Vimy 1917, Scarpe 1917, Arleux, Pilckem, Langemarck 1917, Menin Road, Polygon Wood, Broodseinde, Poelcappelle, Passchendaele, Cambrai 1917 '18, St. Quentin, Bapaume 1918, Rosières, Avre, Villers Bretonneux, Lys, Estaires, Hazebrouck, Béthune, Amiens, Drocourt-Quéant, Hindenburg Line, Havrincourt, Épéhy, Canal du Nord, St. Quentin Canal, Beaurevoir, Courtrai, Selle, Sambre, France and Flanders 1914-18, Italy 1917-18, Struma, Macedonia 1915-18, Helles, Landing at Helles, Krithia, Suvla, Scimitar Hill, Gallipoli 1915-16, Egypt 1916, Megiddo, Nablus, Palestine 1918, Troitsa, Archangel 1919, Kilimanjaro, Behobeho, Nyangao, East Africa 1915-17
- The Second World War: Dunkirk 1940, North-West Europe 1940, Agordat, Keren, Syria 1941, Sidi Barrani, Djebel Tebaga, Peter's Corner, North Africa 1940 '43, Sangro, Mozzagrogna, Caldari, Salerno, St. Lucia, Battipaglia, Teano, Monte Camino, Garigliano Crossing, Damiano, Anzio, Cassino II, Ripa Ridge, Gabbiano, Advance to Florence, Monte Scalari, Gothic Line, Coriano, Croce, Casa Fortis, Savio Bridgehead, Valli di Commacchio, Senio, Argenta Gap, Italy 1943-45, Athens, Greece 1944-45
- Korea 1952-53
- 1832–1854: Sir Edward Blakeney
- 1854–1855: George Brown
- 1855–1868: Samuel Benjamin Auchmuty
- 1868–1876: Sir Richard Airey
The Royal Fusiliers Company "Z" was also mentioned in Pink Floyd's movie The Wall. It was the company that the character Pink's father died in, as well as the writer and producer Roger Waters' father, Eric Fletcher Waters, to whom the Pink Floyd album The Final Cut was dedicated.
The Royal Fusiliers is also mentioned in Jeffrey Archer's bestseller novel, As The Crow Flies. The protagonist of the book, Charlie Trumper, is part of the regiment which fights in the first world war.
- Westlake, R. English and Welsh Infantry Regiments: An illustrated Record of Service (195) Stroud,GLS,UK Spellmount) ISBN 1-873376-24-3
- "Universal Register; London, Birth Day". The Times. Jun 6, 1785. p. 2. "Orders are given for a camp to be formed on Ashford-Common, near Winsor, for the 7th regiment of foot, who are to be employed in making new roads, and repairing others; the private men are to have 1s. per day extra for their labour."
- "House Of Commons, Thursday, June 23". The Times. Jun 24, 1881. p. 6.
- "Lisbon Papers; Cadiz, May 7". The Times. 29 May 1811. p. 2. "Lord Wellington has also sent two divisions of his army, the 3d and 7th, that way... Intelligence is just received that the battle is fought, and we are again victorious. The affair took place at Albuhera, on the 16th: Soult attacked, and was defeated with immense loss on both sides."
- Gray,W.E. The 2nd City of London Regiment-Royal Fusiliers-in the Great War, 1914-19 (1929, London, Seeley,Service &Co)
- Mullen, Peter, Tearing down religious standards Northern Echo 19 Mar 2002
- The Royal Fusiliers (City of London Regiment) in 1914-1918
- Further details
- "New Fusilier Regiment". The Times. Apr 17, 1968. p. 12. "The Royal Regiment of Fusiliers, a new regiment, with national rather than regional loyalties, is to be formed on St. George's Day, April 23, the Ministry of Defence announced yesterday."
- The London Gazette: . 13 March 1855. Retrieved 16 August 2009.
- The London Gazette: . 15 May 1868. Retrieved 16 August 2009.
- Media related to Royal Fusiliers (City of London Regiment) at Wikimedia Commons
- Historical records of the 7th or Royal regiment of Fusiliers 1685-1903 by Lt Col. Percy Groves.
- Fusilier Museum London
- Fusiliers Association
|
<urn:uuid:c3176ab8-15d1-4bb1-abcb-196781359c89>
|
CC-MAIN-2014-23
|
http://en.wikipedia.org/wiki/The_Royal_Fusiliers_(City_of_London_Regiment)
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997895170.20/warc/CC-MAIN-20140722025815-00109-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.939968 | 2,842 | 3.078125 | 3 |
Full Program »
Electric Vehicle Charging With Fractional Renewable Energy Certificates Using Blockchain Technology
Renewable Energy certificates (RECs), as Environmental, Social and Governance (ESG) assets, are growing in value globally, based on the need to solve climate challenges. RECs are also proven viable market-friendly instruments, with carbon markets exponentially growing for trading them since they facilitate measuring and tracking energy from clean renewable sources. However, RECS are error prone due to minimal traceability or certification, double counting as well as green washing, and therefore require worldwide ledgers for its proper management. This article explored RECs tokenisation using blockchain technology to solve its challenges and greenify smaller decentralised physical assets by matching consumption with renewable energy production. A proof-of-concept (POC) was developed around EV charging with three RECs use cases tested in a microgrid demonstrator in Singapore. The prioritized use cases were used to depict scenarios for how individuals and businesses with or without renewable energy assets can acquire RECs to achieve their decarbonisation goals.
|
<urn:uuid:59dc33a6-d0b7-4ffb-b3f1-e76f6f70fdfe>
|
CC-MAIN-2023-40
|
https://powertech2023.com/program/s300.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510529.8/warc/CC-MAIN-20230929222230-20230930012230-00560.warc.gz
|
en
| 0.94674 | 218 | 2.625 | 3 |
Why Instructors Need to Collaborate With Students
When instructors consider the most important aspects of classroom facilitation they often think about requirements that involve the majority of their time and effort, from planning learning activities to providing feedback. Instructors are likely to find that managing classroom interactions also demands a significant portion of their attention because it has a direct influence on working relationships. The dynamics of classroom interactions can be enriched when adults are productively working together with each other and their instructor. Collaboration is a strategy that instructors may add to their facilitation practice as a means of accomplishing this goal.
Collaboration is a process of bringing adults together for the purpose of mutual learning, self-development, and building a sense of community. By implementing activities that encourage students to work together they are developing a sense of rapport. Moira Murphy, PhD and Cecilia Valdez believe that “rapport is an integral part of preparing a classroom for the implementation of collaborative learning techniques,” and more importantly, that good rapport “means that individuals can relate to each other.” The element of rapport is important because communication becomes meaningful when students feel comfortable sharing their thoughts, questions, concerns, and contributions to the class.
Within a traditional classroom students are encouraged to work together during class discussions and group projects, and they are able to physically observe interactions with others. They obtain feedback from visual cues such as body language. For an online environment the class discussions, including synchronous and asynchronous discussions, become a primary method of promoting collaboration among students. The technological tools involved, including discussion boards for asynchronous communication and live chat features for synchronous communication, then take the place of physical interactions. Online students are represented by their words and the tone perceived within those messages. Melanie Misanchuk and Tiffany Anderson emphasize the importance of discussions within an online classroom and that “without active participation in discussions and other class activities, the learner is not part of the community; indeed, the learner does not even exist.” When students do not feel connected to the class they are likely to become disengaged from the class.
The process of collaboration in any classroom environment provides students with an opportunity to share their beliefs, views, opinions, prior experiences, and knowledge. When adults are encouraged to work together they are provided with an opportunity to examine those beliefs, while working with new information and ideas. Collaborative activities provide a new context and way of thinking as students discover alternative solutions, ideas, outcomes, and knowledge. Throughout these interactions students can discuss their similarities and differences, which in turn will promote knowledge creation. Students become co-creators in the process of learning.
When students are effectively collaborating together they are experiencing an environment that is conducive to an exchange that welcomes and respects diverse viewpoints. The benefits of a collaborative classroom environment also extend to the potential these interactions have to develop productive relationships. Adults that are working together often feel a sense of community with their class and in turn their engagement in the class may improve. Adults who learn to collaborate are likely to have an enhanced relationship with their instructor. They become more receptive to feedback provided and develop a willingness to discuss potential issues and challenges that occur throughout the class. Overall, the use of learning activities that promotes collaboration results in an enhanced learning environment, classroom activities, and working relationships.
|
<urn:uuid:a8f3059e-d1cf-48ac-9ccf-428ceef333de>
|
CC-MAIN-2023-14
|
https://www.adjunctnation.com/2010/10/13/why-collaboration-with-students-matters-to-instructors/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943750.71/warc/CC-MAIN-20230322051607-20230322081607-00337.warc.gz
|
en
| 0.956639 | 669 | 3.484375 | 3 |
How Young Children Can Benefit From Assistive Technology
5 Problem Solving Activities for the Classroom
Problem-solving skills are necessary in all areas of life, and classroom problem solving activities can be a great way to get students prepped and ready to solve real problems in real life scenarios. Whether in school, work or in their social relationships, the ability to critically analyze a problem, map out all its elements and then prepare a workable solution is one of the most valuable skills one can acquire in life.
Educating your students about problem solving skills from an early age in school can be facilitated through classroom problem solving activities. Such endeavors encourage cognitive as well as social development, and can equip students with the tools they’ll need to address and solve problems throughout the rest of their lives. Here are five classroom problem solving activities your students are sure to benefit from as well as enjoy doing:
1. Brainstorm Bonanza
Having your students create lists related to whatever you are currently studying can be a great way to help them to enrich their understanding of a topic while learning to problem-solve. For example, if you are studying a historical, current or fictional event that did not turn out favorably, have your students brainstorm ways that the protagonist or participants could have created a different, more positive outcome. They can brainstorm on paper individually or on a chalkboard or white board in front of the class.
2. Problem-Solving as a Group
Have your students create and decorate a medium-sized box with a slot in the top. Label the box “The Problem-Solving Box.” Invite students to anonymously write down and submit any problem or issue they might be having at school or at home, ones that they can’t seem to figure out on their own. Once or twice a week, have a student draw one of the items from the box and read it aloud. Then have the class as a group figure out the ideal way the student can address the issue and hopefully solve it.
3. Clue Me In
This fun detective game encourages problem-solving, critical thinking and cognitive development. Collect a number of items that are associated with a specific profession, social trend, place, public figure, historical event, animal, etc. Assemble actual items (or pictures of items) that are commonly associated with the target answer. Place them all in a bag (five-10 clues should be sufficient.) Then have a student reach into the bag and one by one pull out clues. Choose a minimum number of clues they must draw out before making their first guess (two- three). After this, the student must venture a guess after each clue pulled until they guess correctly. See how quickly the student is able to solve the riddle.
4. Survivor Scenarios
Create a pretend scenario for students that requires them to think creatively to make it through. An example might be getting stranded on an island, knowing that help will not arrive for three days. The group has a limited amount of food and water and must create shelter from items around the island. Encourage working together as a group and hearing out every child that has an idea about how to make it through the three days as safely and comfortably as possible.
5. Moral Dilemma
Create a number of possible moral dilemmas your students might encounter in life, write them down, and place each item folded up in a bowl or bag. Some of the items might include things like, “I saw a good friend of mine shoplifting. What should I do?” or “The cashier gave me an extra $1.50 in change after I bought candy at the store. What should I do?” Have each student draw an item from the bag one by one, read it aloud, then tell the class their answer on the spot as to how they would handle the situation.
Classroom problem solving activities need not be dull and routine. Ideally, the problem solving activities you give your students will engage their senses and be genuinely fun to do. The activities and lessons learned will leave an impression on each child, increasing the likelihood that they will take the lesson forward into their everyday lives.
|
<urn:uuid:e0756115-bb2d-45b1-8fe6-f7fdeb3a547f>
|
CC-MAIN-2014-35
|
http://education.cu-portland.edu/blog/teaching-strategies/5-problem-solving-activities-for-the-classroom/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826343.66/warc/CC-MAIN-20140820021346-00039-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.961291 | 858 | 3.59375 | 4 |
TOP 10 SOURCE OF VITAMIN A
Vitamins are the essential micro nutrients needed to be consume in small quantity to sustain life. Here is the list of Top 10 source of Vitamin A. All the vitamins are source of carbon that make the organic compound. These vitamins cannot be synthesized in our body either at all or not in required quantity. So we must intake these crucial micro nutrients through foods from plants or animals. These vitamins are body’s builders, defenders and maintenance workers helping it to build muscles, bones, make use of nutrients, capture, use energy, and heal wounds. In this blog we will be looking good Veg source of vitamin A and Non Veg Source of Vitamin A.
Types of Vitamin
Vitamins are categories on the basis of solubility in our body. The two category of vitamins are
- Lipid Soluble Vitamin
- Water Soluble Vitamin – Vitamin C and B
The difference between these two type of vitamins determines how the body transport, stores vitamins and gets rid of excess.
The water-soluble vitamin C and B complex vitamins are dissolved in the watery part of the fruit, vegetable and grains. So their passage through the body is relatively straight forward. Once they are in our body they gets digested and vitamins within them are taken up directly by our blood stream because blood plasma is water based. So water-soluble vitamins moves freely in our body. The systems ability to circulate water-soluble vitamins in blood stream easily means that most of them can be passed out from the body equally easily via kidney. Due to this most of the water soluble vitamins need to be replenished on the daily basis through the food we eat throughout the day.
The Lipid Soluble vitamins dissolved in fat and found in dairy product, cheese and oil. These vitamins make it in our body through stomach and intestine, where bile (substance flowing from liver) breaks up the fats and preparing vitamins for absorption through in intestinal walls. Because fat soluble vitamins cannot make the use of blood’s watery nature they required proteins. Proteins attached to the vitamins and act like couriers and move them into the blood stream and body. These fats soluble vitamins can stored in our liver and fat cells for a longer period of time. Our body make use of these type of vitamins as and when required, as they are stored in our body, we should not overload on these type of vitamins.
Function of different vitamins in our body
- Vitamin A – Needed for Vision, Skin, tooth growth, mucous membrane
- Vitamin B – Needed for nerve function, energy metabolism, digestive system, making red blood cells,
- Vitamin C – Needed for protein metabolism and iron absorption
- Vitamin D – Needed for absorption of calcium
- Vitamin E – Work as antioxidant and protect cell walls
- Vitamin K – Needed for blood clotting
Vitamin A is a lipid soluble vitamin. The three forms of vitamin A are retinol (alcohol form, retinal (aldehyde form and retinoic acid (acidic form). These all three are also known as vitamers of vitamin A. Most of the vitamin A is stored in our liver in the form of retinyl ester, whenever our body requires it the ester form breaks in retinol i.e. alcohol form of vitamin A and released in our blood. The retinol moves in our body with the help of RBP protein (retinol binding protein) and transthyretin.
Top 10 Function of vitamin A
The functions in which Vitamin A assist are:
- Improved Vision– Vitamin A has an ability to enhance your vision and keep your eyes healthy. The rhodopsin molecule in the Vitamin A activated when light falls on the retina, sending signals to the brain that causes vision. It also has beta carotene that prevents macular degeneration (a cause of night blindness).
- Reproduction and Development –Retinol (Alcohol form of Vitamin A) helps our body in reproduction mechanism and also in the development of baby. Not only this Vitamin A is crucial for the development and proper growth throughout all stage of life span. It is also considered as best vitamins for women also during pregnancy, especially with regards to lung function and maturation.
- Improved Immune Mechanism and Tissue Repair-Vitamin A has an important role in our immune system and beneficial for keeping infection and illness away. Deficiency of Vitamin A stops the regeneration process of mucosal barriers, resulting in increased chances of being infected. Vitamin A is essential in cell regeneration and tissue repairing and it assist in wound healing also.
- Works as Antioxidant – Beta Carotene found in the Vitamin A acts as a strong antioxidant. It reduce the generation of harmful radicals and preventing oxidative damage to the cell. It also have anti-inflammatory effect which prevent us from inflammatory chronic conditions like diabetes, cancer and heart disease.
- Improved Skin Health –As Vitamin A has anti-inflammatory effects it is used in the treatment of a range of skin issues. The retinoids of vitamin A can treat common skin problems like acne, eczema and psoriasis. Along with this vitamin A improves wrinkles and fine lines on the skin.
Deficiency of Vitamin A
Since we know that Vitamin A is vital for healthy vision, skin, Immune system etc, it’s deficiency could cause major issues in our body. People who suffered from leaky gut syndrome, immune disorder, inflammatory disease, and pancreatic issues are likely to have Vitamin A deficiency.
It has ocular and extra ocular manifestation.
- Night Blindness –Deficiency of Vitamin A causes night blindness that makes it to difficulty of vision in low light conditions. It is also know as nyctalopia. Some type of night blindness can be treated and other cannot. A person should consult his doctor to find the cause of night blindness and take treatment as per the cause.
- Xeropthalmia or Dry Eye – Deficiency of Vitamin A limits the tear secretion and it leads to dry eyes problem. The normal function of Vitamin A also included differentiation of epithelio cells and this function lost or reduces due to deficiency of Vitamin A.
- Bitot’s Spot –Deficiency of Vitamin A will also leads to dryness of conjunctivan which is knows as conjunctiva xerosis and there will be also keratinization of cornea. When the debris of keratinization (keratin) deposit over cornea it become bitot’s spot. Moreover if the condition persist and become severe the cornea become rough end and eroded which damaged the cornea and ends ultimately to the blindness.
- Infertility and Trouble Conceiving –Vitamin A plays a key role in reproduction in both male and female and it is important for proper development of kids. If you are facing trouble in getting pregnant or miscarriage than Vitamin A deficiency could be a cause for it. Vitamin A deficit male and female can encounter infertility issues also.
- Poor Immunity and Wound healing –Getting infected or ill very frequently could be a reason of Vitamin A deficiency. Vitamin A also helps in the formation of collagen so if your wounds are not healing properly after any injury or surgery than it could be a reason that your body is vitamin A deficit.
Toxicity of Vitamin A
Taking high dose of any nutrient is know as toxicity and high dose of Vitamin A may become harmful for our health. Consuming too much Vitamin A could be through supplement or animal liver. The Toxicity of Vitamin A could also cause vomiting, nausea, irritability, appetite loss, and jaundice. You must consult with your doctor while taking any supplements of Vitamin A and people who have kidney and liver disorder or who consume alcohol heavily must consult with the professional care prior taking Vitamin A supplements. Toxicity of Vitamin A is also known as Hypervitaminosis A.
How much vitamin A ?
The recommended doses of Vitamin A is 5000 IU (International Unit) per day for the adults and over the age of four. The international unit of retinol is about 0.3 μg of retinol equivalents (RAE). One international unit of beta carotene is about 0.15 μg of RAE. The recommended daily allowance RDA of Vitamin A is 900 mcg for Men and 700 mcg for women per day and for kids and teenagers it is recommended from 300mcg to 600 mcg per day. However the upper limit of Vitamin A which can cause toxicity is 10000 IU or 3000 mcg.
Source of Vitamin A
As earlier mentioned about the retinoids of Vitamin A. The Alcohol form of Vitamin A retinol is found only from animal source.
Top 10 Source of Vitamin A – Non-Vegetarian are
- Beef Liver – 1 slice: 6,421 mcg (713% DV*) 100 grams: 9,442 mcg (1,049% DV)
- Lamb Liver – 1 ounce: 2,122 mcg (236% DV) 100 grams: 7,491 mcg (832% DV)
- Liver Sausage – 1 slice: 1,495 mcg (166% DV) 100 grams: 8,384 mcg (923% DV)
- Cod Liver Oil – 1 teaspoon: 1,350 mcg (150% DV) 100 grams: 30,000 mcg (3,333% DV)
- Salmon – Half a fillet: 229 mcg (25% DV) 100 grams: 149 mcg (17% DV)
- Tuna Fish – 1 ounce: 214 mcg (24% DV) 100 grams: 757 mcg (84% DV)
- Goat Cheese – 1 slice: 115 mcg (13% DV) 100 grams: 407 mcg (45% DV)
- Camembert – 1 wedge: 92 mcg (10% DV) 100 grams: 241 mcg (27% DV)
- Trout – 1 fillet: 71 mcg (8% DV) 100 grams: 100 mcg (11% DV)
- Hard-boiled egg – 1 large egg: 74 mcg (8% DV) 100 grams: 149 mcg (17% DV)
Top 10 Source of Vitamin A – Vegetarian are
- Sweet Potato – 1 cup: 1,836 mcg (204% DV) 100 grams: 1,043 mcg (116% DV)
- Winter Squash – 1 cup: 1,144 mcg (127% DV) 100 grams: 558 mcg (62% DV)
- Kale (cooked) – 1 cup: 885 mcg (98% DV) 100 grams: 681 mcg (76% DV)
- Carrot (cooked) – 1 medium carrot: 392 mcg (44% DV) 100 grams: 852 mcg (95% DV)
- Sweet Red pepper – 1 large pepper: 257 mcg (29% DV) 100 grams: 157 mcg (17% DV)
- Spinach – 1 cup: 141 mcg (16% DV) 100 grams: 469 mcg (52% DV)
- Mango – 1 medium mango: 181 mcg (20% DV) 100 grams: 54 mcg (6% DV)
- Pink and Red grapefruit – 1 medium grapefruit: 143 mcg (16% DV) 100 grams: 58 mcg (6% DV)
- Watermelon – 1 wedge: 80 mcg (9% DV) 100 grams: 28 mcg (3% DV)
- Papaya – 1 small papaya: 74 mcg (8% DV) 100 grams: 47 mcg (5% DV)
*DV: Daily Value
|
<urn:uuid:c7aac4b9-a717-45a4-b252-addd99f6cc41>
|
CC-MAIN-2020-29
|
https://top10s.in/top-10-source-of-vitamin-a/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655878753.12/warc/CC-MAIN-20200702111512-20200702141512-00576.warc.gz
|
en
| 0.891294 | 2,429 | 3.109375 | 3 |
The Old Patagonian Express is one of the most famous historic trains in the world. It adds to the particularity of its minimum gauge, the unique landscape that it traverses.
Patagonia is always seducing, with its large extensions, its magical scenery of plateaus, sea, mountains, lakes and rivers. But also with its affectionate people and with a few non-natural attractions, as is the case of the Old Patagonian Express, better known as “La Trochita”. This 1922 picturesque steam train receives this name because of its narrow gauge of only 75 cm.
Riding on this train is like neglecting the passing of time and losing oneself in a children’s tale of the early twentieth century. The small proportions of this means of transportation make us think we are traveling on board of a toy.
The Old Patagonian Express is one of the most famous trains in the world. It’s a unique historical and cultural heritage, drawing railroad fans from all parts of the globe. When it was inaugurated, it used to operate as a social train joining Esquel (Chubut) and Ingeniero Jacobacci (Río Negro) along its 402 km (250 mi) rails, until the engine stopped working in 1993. In 2006, La Trochita was brought back to life for tourism purposes.
It didn’t seem real. The old residents of El Maitén couldn’t believe it when they heard the whistle of the old Baldwin locomotive, kept as new thanks to the few employees who had stayed in charge of the Railroad inheritance all this time. They proudly say: “We never let it die. The workshops kept working, the railways were kept in conditions, we always knew that the little train was going to be reborn…”
The wagons that follow are made of wood, each one with its own wood-burning salamander to face the freezing cold of the plateau, and little windows through which the eternal Patagonic landscape stirs away.
A magical environment, that makes the traveler think that he is on a time tunnel.
This is for sure the most famous narrow gauge train in the world, together with the Trans Siberian and the Orient Express.
La Trochita passengers are special people too. A proof of this is, for example, that a few years ago a group of twenty English tourists paid a considerable amount of money to rent the train for a weekend and do the tour slowly, stopping whenever they needed to take pictures. These tourists are as special as the train itself: they know the history of each machine, which the original wagons are and the stories of each railway line. That is why the emotion they feel when they are in front of the old locomotives, born at the beginnings of the past century, is unequaled.
At the present there are two routes: Esquel – Nahuel Pan and El Maitén – Desvío Bruno Thomae.
Esquel – Nahuel Pan route
Nahuel Pan, 15 km. away from Esquel, is an ancient Mapuche settlement and was the first station of the long train journey. In this touristic route, the most breathtaking landscapes of foothills and Patagonian plateau are crossed. The train travels at an average of 45 km. per hour to this village where some of the inhabitants are direct descendants of the Mapuche aborigines. Annually, in March, a religious Mapuche ceremony takes place in Camaruco, at the foot of the Cerro Nahuel Pan.
The ride lasts 3 and a half hours, tour guides go with passengers in each wagon and it also includes bar service throughout the tour. In Nahuel Pan you can visit the Casa de las Artesanas where there is an exhibition and sale of regional handicrafts and you can also go horseback riding (not included in the tour price). On the way back to Esquel there is a photo stop at halfway.
Inquiries and bookings:
Esquel Rail Station: +54-2945-451403
El Maitén – Bruno Thomae route
El Maitén is a small town located about 130 km. from Esquel, on the way to Ingeniero Jacobacci, the former point of arrival of Old Patagonian Express.
For the inhabitants of El Maitén, La Trochita is special and unique because the workshops that keep this relic alive are there. The whole town is a true railway museum.
The route is a little longer than that from Esquel, and has the peculiarity that the photo stop is made when the train passes a bridge over the river Chubut.
The total distance is 2:45 PM. and also it has done with guides on board.
Inquiries and bookings:
El Maitén Rail Station: +54-2945- 495190
For more information see: Trains in Patagonia.
|
<urn:uuid:3dd78473-330b-4d0c-9969-c1ae84a4e98c>
|
CC-MAIN-2023-14
|
https://www.patagonia-argentina.com/en/old-patagonian-express-la-trochita/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00176.warc.gz
|
en
| 0.954477 | 1,064 | 2.609375 | 3 |
It may not have taken as long as Michelangelo’s Sistine Chapel though it’s on a par with its mesmerising beauty. Apparently, it’s the first time that the university’s invited an artist to make a work of art in the chapel.
Miguel Chevalier creates an immersive environment made up of thousands of constellations. Viewers become bathed in light and the mystery of the universe. In the same spirit, relating to stephen hawking’s research about black holes, each of the projections entices audiences into the imaginative atmosphere where science meets spirituality.
For more detail and imagery, see here.
The site-specific installation highlights the architecture of the 16th century Chapel through light and highlights the high technicality of the cathedral’s fan vaults, one of the finest examples of late Perpendicular Gothic English architecture. The soft light and the wealth of colours from the digital installation is in resonance also with the light from the stained glass windows. The installation gives the building life before our eyes, creating an unprecedented visual experience.
This digital installation is a celebration of the open-mindedness and the highness of research of Cambridge University.
|
<urn:uuid:829a62ac-1da3-4676-a210-aac826006dac>
|
CC-MAIN-2017-26
|
https://megorourkeblog.wordpress.com/2015/11/25/cambridge-uni-chapel-gets-extra-spiritual/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320995.93/warc/CC-MAIN-20170627050500-20170627070500-00572.warc.gz
|
en
| 0.890324 | 248 | 2.953125 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.