text
stringlengths
263
344k
id
stringlengths
47
47
dump
stringclasses
23 values
url
stringlengths
16
862
file_path
stringlengths
125
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
81.9k
score
float64
2.52
4.78
int_score
int64
3
5
This book tells the story of a society reversing deeply held worldviews and revolutionizing its demography. In parts of eighteenth-century Japan, couples raised only two or three children. As villages shrank and domain headcounts dwindled, posters of child-murdering she-devils began to appear, and governments offered to pay their subjects to have more children. In these pages, the long conflict over the meaning of infanticide comes to life once again. Those who killed babies saw themselves as responsible parents to their chosen children. Those who opposed infanticide redrew the boundaries of humanity so as to encompass newborn infants and exclude those who would not raise them. In Eastern Japan, the focus of this book, population growth resumed in the nineteenth century. According to its village registers, more and more parents reared all their children. Others persisted in the old ways, leaving traces of hundreds of thousands of infanticides in the statistics of the modern Japanese state. Nonetheless, by 1925, total fertility rates approached six children per women in the very lands where raising four had once been considered profligate. This reverse fertility transition suggests that the demographic history of the world is more interesting than paradigms of unidirectional change would have us believe, and that the future of fertility and population growth may yet hold many surprises. List of Illustrations A Note on Conventions 1. Introduction: Contested Worldviews and a Demographic Revolution PART I. THE CULTURE OF LOW FERTILITY, CA. 1660–1790 2. Three Cultures of Family Planning 3. Humans, Animals, and Newborn Children 4. Infanticide and Immortality: The Logic of the Stem Household 5. The Material and Moral Economy of Infanticide 6. The Logic of Infant Selection 7. The Ghosts of Missing Children: Four Approaches to Estimating the Rate of Infanticide PART II. REDEFINING REPRODUCTION: THE LONG RETREAT OF INFANTICIDE, CA. 1790–1950 8. Infanticide and Extinction 9. “Inferior Even to Animals”: Moral Suasion and the Boundaries of Humanity 10. Subsidies and Surveillance 11. Even a Strong Castle Cannot be Defended without Soldiers: Infanticide and National Security 12. Infanticide and the Geography of Civilization 13. Epilogue: Infanticide in the Shadows of the Modern State Appendix 1. The Own-Children Method and Its Mortality Assumptions Appendix 2. Sampling Biases, Sources of Error, and the Characteristics of the Ten Provinces Dataset Appendix 3. The Villages of the Ten Provinces Dataset Appendix 4. Total Fertility Rates in the Districts of the Ten Provinces Appendix 5. Infanticide Reputations Appendix 6. Scrolls and Votive Tablets with Infanticide Scenes Appendix 7. Childrearing Subsidies and Pregnancy Surveillance by Domain Fabian Drixler teaches Japanese history at Yale University. "Mabiki shows how reproductive choices are embedded in dynamic cultural, social, and economic contexts. Marshaling evidence as diverse as religious artifacts and computer simulations, Fabian Drixler offers a compelling account of changes in the culture of infanticide over three centuries of Japanese history."—George Alter, Inter-university Consortium for Political and Social Research, University of Michigan "International work in Japanese studies is intellectually vibrant and booming in a way that most outsiders to the field probably don't realize. Among this excellent work, Drixler's Mabiki is one of the most important books to appear in any field of Japanese studies in many years. It is also a book that will disturb many readers and certainly be widely read, discussed and debated."—Mark Metzler, University of Texas at Austin "This book removes any question that infanticide was a widespread practice in eastern Japan, as well as a handful of other regions -- not only throughout the Edo period but well into the twentieth century. Drixler's analysis will force future scholars who are thinking about demography, family, gender, social policy, ethnography, and other topics to include infanticide in their analyses. The implications are broad, especially for discussions regarding the forces that slowed Edo-period population growth." —William Johnston, Wesleyan University Add source code 14W0162 to get your discount at checkout. Cannot be combined with any other offers. Members receive 20-40% discounts on book purchases. Find out more
<urn:uuid:4f7a99d0-29c8-442c-838f-7369ae2349ff>
CC-MAIN-2013-48
http://www.ucpress.edu/book.php?isbn=9780520272439
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163844441/warc/CC-MAIN-20131204133044-00021-ip-10-33-133-15.ec2.internal.warc.gz
en
0.915747
961
3.234375
3
is a zoo located south of downtown Dallas in the Oak Cliff area of Dallas ). The zoo was originally founded in 1888 and now covers , making it the largest zoological park in Texas. The Dallas Zoo is home to 406 species and 1,800 animals (6,800 counting invertebrates). There are another 375 species of marine and freshwater animals in The Dallas Aquarium at Fair Park, which it also manages. The zoo is divided into three major regions: ZooNorth, Wilds of Africa, and Giants of the Savanna. ZooNorth is home to most of the traditional zoo animals, including tigers, a black rhino, and many large bird species. Within recent years, the Dallas Zoo has added several new exhibits to ZooNorth including the Otter Outpost, Galápagos tortoises , and Bug U! (a collection of Texas invertebrates). Wings of Wonder, home to birds of prey and vultures, has been remodeled and expanded. The kangaroo and wallaby exhibit also was redesigned. The ExxonMobil Endangered Tiger Habitat is a large habitat that resembles a forest that is in the process of regrowth after logging. Opposite the tiger exhibit, Primate Place features many frisky monkeys with species from Africa and South America. The Lacerte Family Children’s Zoo in ZooNorth features a new interactive playscape for children. The children’s zoo also is home to the Nature Exchange , the JC Penney Discovery House, the UnderZone, a petting zoo, and... Read More
<urn:uuid:8402e07f-c270-4821-bc2f-af49c47674ff>
CC-MAIN-2014-15
http://pages.rediff.com/dallas-zoo/568585
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223205137.4/warc/CC-MAIN-20140423032005-00661-ip-10-147-4-33.ec2.internal.warc.gz
en
0.945146
326
3.296875
3
MU Extension events calendar Professional development events Understanding Good Agricultural Practices (GAPS) and Writing a Farm Food Safety Plan (Session 2 of 5) Wednesday, Nov. 6, 2013, 8:30 a.m. to 3:15 p.m. Webb City Public Library 101 South Liberty, Webb City MO map... Food safety training is quickly becoming a serious issue for farmers across the United States. GAP's (Good Agricultural Practices)is a comprehensive food safety approach that can be applied to any farm. With a food safety plan in place, both the consumer and farmer are at less of a risk for a food borne illness outbreak. This workshop, led by national experts on Farm Food Safety, is for small and medium-sized farms. How to Write a Farm Food Safety Plan There is no charge to attend the workshops, but registration is required at the link below. more...
<urn:uuid:6ee4d3de-e41b-417b-816a-a2f3cd5eb022>
CC-MAIN-2014-35
http://extension.missouri.edu/calendar/DisplaySingleEvent.aspx?R=C&E=229553&S=2
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500831174.98/warc/CC-MAIN-20140820021351-00342-ip-10-180-136-8.ec2.internal.warc.gz
en
0.893881
187
2.59375
3
Design learning is the creation of learning tools that are fun, engaging, and effective. Products that fall under design learning include massive open online courses (better known as MOOCs) and college textbooks, corporate training and informal learning, classroom learning for young and pre-literate students and older learners looking to refresh or update a degree. It also includes airline videos on how to fasten your seatbelt, public service announcements, and anything that you need to remember. What do these very different end products have in common, and how can good design help facilitate the learning process across these contexts? The list below outlines some important differences between design learning and other types of design, and provides examples of best practices that learning designers use—and that you can use as well—to ensure that your designs are that holy trinity of fun: engaging and effective. Problem: Some learners, like other types of users, may choose to participate in a given learning experience. Participation is typically motivated by the student’s own interest in the subject—think of specialized user forums, MIT’s Open CourseWare, or even a cooking class at the local adult education Learning Annex. Other learners, however, are forced to participate in a learning experience, perhaps as a required course in a degree program, a company’s semi-annual sexual harassment workshop, or as state-mandated attendance in school until a specific age. Many of these learners grit their teeth and wearily make their way through the experience. Many more simply tune out and send texts to their similarly miserable friends. Solution: Like death and taxes, some classes just cannot be avoided. The path to becoming a surgeon or a pilot is littered with courses (elective or otherwise) the aspirants could probably not care less about, such as “Female Novelists of the 19th Century” or “The Wit and Wisdom of Aristotle.” In addition, the course that one person gravitates towards is someone else’s Kryptonite. In the absence of authentic motivation (and you can be certain there will always be someone who is just not that into the course/training/instructions/what have you) materials can employ a variety of techniques to either cultivate some measure of interest or remind the learner why he or she is suffering through this content in the first place (organic chemistry, I am looking at you). A popular fix these days is gamification, or manipulating an otherwise static task into one that more resembles a game. If done well, gamification can help turn dry content into a more interesting and meaningful experience. Too often however, gamification techniques veer too far into the realm of behavioral modification. Students are also good at detecting what is known in the industry as “chocolate-covered broccoli” or attempts to sweeten otherwise unpalatable content. Another approach that works well for degree programs is to design the course of study in a more holistic sense and remind students where they are in their progression; in other words why this particular course is necessary, and how it is significant to that degree they are working towards. Range of Users Problem: Learners include senior citizens starting a new drug regimen, beginning readers, airplane passengers, and everyone in between (in short, every human being). It includes those with learning disabilities such as dyslexia, dyscalculia, ADHD, and emotional and behavioral challenges. Younger learners—those not yet able to read and write, unaccustomed to sitting still, focusing, controlling emotions, and adapting to protocols outside of the home—are one of the most challenging user groups to successfully engage. Solution: Different cohorts of users (novice and expert, literate and non-literate, adult and child) require different approaches. With younger learners, design approaches need to take developmental circumstances into account. Smaller (and older) hands may have difficulty manipulating a mouse or understanding written directions without supporting graphics. Sometimes identifying the cohort you’re addressing is straightforward, such as grade school materials for teachers and students. Sometimes the users are more heterogeneous, as with airplane passengers. Rather than designing for the average user, good learning design aims to accommodate the spectrum of needs of the anticipated audience with a focus on the extremes on either end. For example, airplane safety instructions take into account the wide ranges of ages and literacy levels with simple illustrations, text in more than one language, and a visual demonstration. Much progress in design, including learning design, has been the result of accommodations for the disabled. Universal Design for Learning (UDL) started as a set of design strategies for disabled learners but has since been recognized as useful for all learners. At the heart of UDL is a commitment to providing different modes of representing information, expressing information, and promoting engagement. Providing different pathways for learning allows students to learn in a way that makes the most sense to them, and also subtly affirms that different learning styles are legitimate. Problem: Learning is about mastering new information, which typically takes a lot of effort, energy, and neurons. It requires a measure of personal comfort a few steps above worrying about food and physical safety. It may entail lots of practice and call for un-learning what you thought you’d already mastered. Learning, in short, is hard. Although renowned user experience author Steve Krug implores designers to not make the user think, part of the challenge of educational design is to facilitate and support thinking. Expending effort is what learning demands, and it is this effort that increases our ability to grow and understand over time. Solution: The most effective, thoughtful learning products are based on prior knowledge. If the course is part of a series, completion of an earlier course may constitute sufficient prior knowledge to proceed. Smart learning products start off with a diagnostic assessment of what the learner knows regardless of the established learning sequence. Well-designed diagnostic assessments can be fun to take and since they do not count towards a final grade there’s less pressure on the learner. It’s less about demonstrating mastery at this point than determining what actually needs to be mastered. Other more progressive learning approaches such as Khan Academy and MOOCs often require the learner to self-assess their level of mastery either through a lucky guess…or trying (and failing). As I mentioned before, learning is hard. The best learning design materials present information in a methodical manner, allow the learner to review content and test her understanding informally until mastery has been achieved, and provide additional support—for instance online chat forums, instructor intervention, and supporting information—on an as-needed basis. The hot trend in course design is not MOOCs, but competency-based learning (CBL). Long a staple of nursing education, CBL has been expanding to other disciplines and even degree programs. A typical CBL program assesses the learner at the start of his course of study and tailors course content based on those strengths and weaknesses. CBL programs allow learners with more real-world experience to leverage their knowledge and skip over course content that they have already mastered (and likely save money in the process). Problem: When was the last time you were tested on how well you mastered the fundamentals of, say, Amazon’s Shopping Cart feature? What if you could not actually purchase what you wanted until you demonstrated that you had in fact made a well-researched choice? At the heart of learning is the demonstration that you have learned the given information. More often than not, some type of test provides that evidence. And tests are the Rubicon a learner has to cross to demonstrate proficiency (and advance to the next level.) A learner who doesn’t pass the tests doesn’t pass the course, doesn’t earn the degree, and doesn’t score that coveted job as a fighter pilot. Bummer. Solution: There are a few different types of educational assessment, including the diagnostic assessment mentioned in the Difficulty challenge, as well as the summative assessment that is the “important exam that counts towards the grade.” But there is another type of assessment, known as the formative assessment, which is an informal check-in that assesses how well the learner understands the materials but does not count towards the grade. Formative assessments can be essay questions, multiple choice questions, a real-world project, a mini-game, or anything that is based on the information at hand and allows the learner to engage with it to check understanding. Students typically appreciate formative assessments because they provide valuable feedback on how well information is understood in a low-stakes environment. Perhaps the learner thinks that she has Circuits 101 down cold; a simple online game that requires the successful completion of a circuit will test her understanding and let her know if she is on target or off-base before that summative assessment comes her way. Problem: What if you had to not only deeply study Amazon’s “Recommended for You” list, but you had to remember it next year and the year after that? It’s all well and good to pass those pesky summative assessments; it’s another thing to retain that knowledge and apply it in novel contexts in the next course. Those hard-working neurons not only need to understand the basics, but store it into long-term memory so it can be retrieved, manipulated, and augmented in the future. Solution: I’ve said it once, and I’ll say it again: well-designed learning materials can help to facilitate the cognitive tasks of the learner. Retention can be facilitated by repetition, to be sure, but better to take prior knowledge and explicitly reference it in a new lesson. History instruction does this naturally; it sure helps to understand that World War I was a precursor to World War II, for instance. But prior knowledge does not have to be executed in such a linear fashion. For online learning, it helps to include links directly in instruction that refer back to earlier lessons. Also, assessments can build on prior learning and not just the explicit learning of a given course. An unfortunate trend in learning is to break down lessons or chapters into actionable learning objectives. While there is nothing wrong per se in clearly identifying goals for a given lesson, it has the unintended consequence of chopping understanding into small, bite-sized, short-term nuggets at the expense of prior knowledge and a more holistic understanding of the topic. If there’s one takeaway to this list, it’s that learning, is indeed hard. Learning is often a required task…not an elective. It takes effort and it is dependent on the learner’s individual interest and capabilities. And a lot is riding on succeeding at these learning tasks. Good learning design can help the intrepid learner by providing scaffolding or learning supports throughout, reinforcing prior knowledge, offering plentiful formative assessments, and never forgetting why the learner is there in the first place. Universal Design for Learning ( http://www.udlcenter.org/ ) Retrieved from http://uxpamagazine.org/good-learning-design/ Comments are closed.
<urn:uuid:c5de7527-6679-4114-8fe5-c1d6227ac99d>
CC-MAIN-2020-16
http://uxpamagazine.org/good-learning-design/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371620338.63/warc/CC-MAIN-20200406070848-20200406101348-00530.warc.gz
en
0.955495
2,302
3.15625
3
Wonder Nuts: Walnuts Walnuts are part of the tree nut family whose other members are Brazil nuts, cashews, hazelnuts (filberts), macadamia nuts, pecans, pine nuts, and pistachios. These wonder nuts are parceled such by nature, that they are loaded with many essential nutrients, fiber, fats, and proteins. Owing to their excellent nutrient composition, these tree nuts provide you with plethora of health benefits. Dietitians, nutritionists, and the USDA (U.S. Dept. of Agriculture) recommend that nuts should be included as part of the daily diet to derive health benefits. "Supportive, but not conclusive research shows that eating 1.5 ounces of walnuts per day, as part of a low saturated fat and low cholesterol diet and not resulting in increased caloric intake, may reduce the risk of coronary heart disease." U.S. Food and Drug Administration The nuts are rich source of energy and contain health benefiting nutrients, minerals, antioxidants, and vitamins that are essential for optimum health. A handful of walnuts contain almost twice as much antioxidants as an equivalent amount of any other commonly consumed nut. But unfortunately, people don't eat a lot of them. Go through the health benefits these wonder nuts provide and make them a part of your healthy diet. Walnuts for a Healthy Heart Walnuts are a rich source of “heart-healthy” monounsaturated fats and an excellent source of omega-3 fatty acids. Research has shown that they are helpful to keep your heart healthy and also keep the cholesterol levels in check. These are also helpful in the prevention of coronary heart disease and stroke. Rich in Antioxidants Antioxidants help to protect from certain chronic diseases of aging, including cardiovascular, neurological, and anti carcinogenic ailments due to their ability to control free radicals. Walnuts contain high levels of antioxidants. In a 2006 study, 1113 different foods were tested and walnuts ranked second only to blackberries in terms of antioxidant content (see graph below). Good for Skin Walnuts are an excellent source of vitamin E. Vitamin E is a powerful lipid soluble antioxidant, which protects the skin from harmful oxygen-free radicals. Given the wide variety antioxidant and anti-inflammatory nutrients found in walnuts, it's not surprising to see research on this tree nut showing measurable anti-cancer benefits. Some studies show that these nuts can provide protection against certain types of cancer, such as breast and prostate cancer. A recommended daily serving of walnuts is one ounce, which equals to about one quarter cup or 12-14 walnut halves. How to Eat Them Walnuts are a delicious way to add extra nutrition, delicious flavor, and crunch to a meal. Like most nuts, they can easily be added to your diet quite effortlessly. A Few Quick Serving Ideas - Just chop and add to your favorite salad, vegetable dish, fruit, or dessert. - You can also mix crushed walnuts into plain yogurt and top with maple syrup. - Add walnuts to your favorite cookies, pies, and cakes. - Add them up to your bowl of whole grain cereal, and have it as a healthy breakfast every morning. - Roast them, or fry using a small amount of healthy cooking oil and enjoy them as a delicious snack. Tips for Eating Walnuts As is the case with fruits and vegetables, even walnuts deliver the best health benefits when consumed with their skin. Some people might not even notice that there is a walnut skin. The skin is the outermost flaky part of the walnut which can be seen easily when the nut is out of its shell. The skin contains about 90 percent of the phenolic acids, tannins, and flavonoids, which provide important benefits for health. How to Select and Store - Walnuts are easily available in grocery stores and supermarkets all year around. Many varieties and different forms of these nuts are there in the market; unshelled (without the shell), shelled, salted, sweetened, or ground, etc. Buy whole “unshelled” nuts instead of processed ones. - While buying, choose walnuts that are bright brown in color, compact, uniform in size and feel heavy in hand. They should be free from cracks, mold, and spots and rancid smell. - Unshelled walnuts can be placed in cool dry place for many months, whereas shelled (without the outer shell) kernels should be placed inside airtight container and kept in the refrigerator to avoid them turn rancid. Now, that you are updated with the benefits of these wonder nuts, what are you waiting for? Go nuts for walnuts!
<urn:uuid:0c1d9c10-b5cc-4228-bd7c-3b60fecbf581>
CC-MAIN-2017-43
http://icontrolmyhealth.org/health-and-lifestyle/super-food/wonder-nuts
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825227.80/warc/CC-MAIN-20171022113105-20171022133105-00622.warc.gz
en
0.940068
976
3.015625
3
Discover more from The Classical Futurist Ancient Models of Citizenship and Migration Turning to ancient citizenship for solutions Different people have been led by different causes to leave their homes, but this at least is clear: nothing has stayed where it came into being. The human race is constantly running this way and that, in a world so vast something changes every day. Approximately 1 million people immigrate to America a year. The number of immigrants here illegally is around 10 million. The inflow of migrants to Europe hovers around the same range with 2.7 million moving in 2019. If there were fewer legal barriers to immigration, these numbers would be much higher. On the order of hundreds of millions of potential migrants say they would like to come to the US if there were open borders. Revealed preferences and logistics deflate that number, but it’s likely that relaxed restrictions in the states could result in a 2-10x increase in the rate of immigration. There are compelling reasons to allow more immigration. It’s good for those migrating – they're given the shot at a better, safer, and prosperous life. It’s often beneficial for those in the destination countries, enriching their markets and culture. Immigrating carries cultural, economic, and, in some cases, physical risks. Despite the costs, moving is worth it for many. And so they move, legally or illegally. There are also drawbacks. Increased migration may be economically beneficial for some, but not all natives. The cultural changes triggered by an influx of newcomers will not all be positive. Incoming peoples arriving from illiberal and less developed countries can have negative political ramifications. Finally, even if you’re generally disposed to being pro-immigration, there are limits to what those of the opposite persuasion can bear. Unpopular immigration policies may trigger a serious backlash, well-reasoned or not, which renders life in destination countries worse off for all. Movement into a better state offers not just immediate benefits, but also the chance of citizenship. With citizenship, the economic, political, and cultural benefits are largely assured. Of course, debates over migration and citizenship are not new. Today, we debate non-violent movement into nation-states. In the past, many movements of people were to destinations with less political capacity – not nation-states. And those who migrated, settled, colonized or conquered. The shape of immigration has changed. But struggle over the meaning of citizenship remains central to any state, past or present. In the 90s BC, the Italian allies demanded citizenship from Rome. Citizenship carried with it economic, political, and legal benefits. A Roman citizen was able to attain significantly better standing in Roman courts, a political voice, lower taxes, freedom of movement within the empire, and, perhaps most importantly, the status of being a Roman. Romans were understandably protective of the benefits of citizenship. The demand of the allies was not met. One of their champions, Marcus Livius Drusus, proposed extending citizenship to cover the allies in 91 BC. Political opponents, likely the Roman elite, had him assassinated. And so there was war – another episode of Roman against near Roman that defined the 1st century BC. The Social War ended 87 years later. Rome granted citizenship to allies who did not join in the rebel Italians' cause. This was followed by a general grant of citizenship to all Italians – though political maneuvers rendered the Italian’s vote effectively useless, they gained the other advantages of citizenship. The pattern of slowly expanding Roman citizenship continued for the life of the Roman empire, with variations. The Roman empire subsumed provincials as second-class (or third-class) citizens. Eventually, they received the benefits of citizenship. The process reached its peak in 212 AD when Caracalla made a general grant of citizenship across the empire. Up to that point, there were explicit and indefinite legal differences between Roman citizens and classes of non-citizen provincials. This contrasts with liberal nation-states, which contain a body of citizens, those on the track to becoming citizens, an assortment of people with temporary visas, and the class of undocumented. There is no notion of a legally recognized, indefinite class of migrants. This offers an underexplored alternative to the immigration issue. Instead of offering full citizenship to all that come, offer partial citizenship. To ease the anxiety of natives, create another class of people without a different, smaller bundle of political and economic rights. This is inegalitarian. Yet it could also bring about a more free and prosperous future. I. Opening Borders Let’s start from the beginning. What, if anything, makes it permissible to restrict immigration today? Of course, some cases of restriction are obviously justified. The issue at hand isn’t border security. Even the strongest pro-immigration views don’t advocate strict open borders – we should not embrace criminals and terrorists with open arms. It’s possible to lock down one’s border with a highly resourced security regime – and take ten times the number of immigrants as a state does currently. Put differently, walls can have gates. Cosmopolitanism provides one reason to be partial to open borders. Developed by the Stoics, the thought is that we share our human nature with others. In America, there’s free movement between states. We are all American citizens. In the Schengen Area in Europe, there’s free movement between countries – they are all Europeans. The cosmopolitan wants to treat the world in this manner – we are all citizens of the world. Borders may be useful constructs and promote safety – but they shouldn’t be more than a necessary inconvenience. The argument is compelling but incomplete. It depends on how seriously one takes cosmopolitanism. The best case for immigration is simpler. Consider the following premises: (i) immigration restrictions are coercive, (ii) one shouldn’t be coercive unless there’s a good reason, and (iii) there’s no such reason. The first premise is straightforward. Nation-states enforce immigration restrictions with force and threats of force. That’s coercive. The second premise is a common-sense ethical judgment. In general, one shouldn’t go around coercing people. Violence and threats of violence require justification. There’s no good reason for the state to coerce its own citizens from moving across state borders on Sunday, so they shouldn’t do it. There’s no good reason for the state to enforce a ban on Virgil, so they shouldn’t do it. The third premise is the most controversial. Immigration restrictions limit freedom of movement and free markets. In general, that makes for poor policy. But of course, anyone who defends immigration restrictions well thinks there are good reasons to justify coercion. This section started with one such reason – one can force terrorists and criminals from entering one’s borders to prevent further violence. So, the question here is, are there good reasons to limit migration in ordinary cases? There is a smorgasbord of reasons given. Usually, they refer to the harms of immigration. Immigration can harm natives – perhaps by lowering their wages or increasing crime. It can harm the state, as immigrants underpay taxes and over-consume social services. Finally, it can damage the politics and culture of the destination state, as immigrants move from illiberal and less developed countries. In Open Borders, the economist Bryan Caplan goes through the empirics of each of these arguments and finds them wanting. Immigrants probably don’t lower the wages of natives – and even if they do, it’s a small subset of natives. The idea that immigrants increase crime isn’t compelling, at least in America. The math of immigrants underpaying taxes either doesn’t work out or comes out to tiny numbers (less than a Netflix subscription). Finally, immigrants tend to adopt the norms of their host countries within a few generations. The political philosopher Michael Huemer notes that even if the empirics of these claims were true, most immigration restrictions are still not justified. Why? It’s not permissible to stop my neighbors from applying for a job, even if they’re willing to risk working for less. The fact that someone’s action will cause wage depression wages, doesn’t remove their prima facie right against coercion. This is true even if the state has a special obligation towards its citizens – after all, it wouldn’t be permissible for me to force my neighbors from applying for a job if they were threatening my children’s wages. The state doesn’t have more powerful obligations to its citizens than a parent does to their children. The anti-immigration argument from crime rates is, at best, a reason to stop particular immigrants (likely younger men) from immigrating, not all potential immigrants. Likewise, if immigrants over-consume social services, the right thing to do is not give them social services – not stop them from immigrating entirely. Finally, the fact that cultural change will occur due to someone’s movement isn’t typically seen as a justifying reason for restricting movement. I can’t stop an influx of Buddhists, Hungarians, or Liberals from moving into my neighborhood, whatever I think of their culture. That’s a quick tour of what I think is the strongest case for being open to more immigration. I don’t expect it to convince those who have the opposite leaning and it’s admittedly America-centric. But it should motivate people to take the case seriously and be open to compromise. II. Immigration Skepticism What’s the best argument against radically increasing open borders? From my view, it’s the thought that doing so carries with it significant cultural and political risks. Even gradual increases in the rate of immigration will result in cultural change. The political views of many immigrants moving to the states are not as liberal, economically, or capable as the typical American citizen. There’s a non-trivial risk that the expression of those views will damage the state's politics and culture. It may be true that when we’re reasoning about ordinary ethical cases, like the example of someone moving into my neighborhood, cultural change isn’t a sufficient reason for restrictions. But political judgments shape countries for decades. Ordinary intuitions may not be sufficient here. If the states had a growth rate that was 1% less over the last century, it would be as well off as Mexico is today. The political views of the citizenry play a non-trivial role in determining growth rates. Small differences make for large differences in the long run. Even if one is skeptical that rising immigration poses a cultural and political risk, there’s backlash. Many natives feel a sense of injustice when reflecting on migrants taking advantage of the political and economic benefits of their new countries. The trend to extend welfare to cover the needs of immigrants fuels this reaction. States like California are on a trajectory to grant nearly every government benefit to immigrants, documented or not. For better or worse, California is a contender for cultural leadership, so it may indicate the direction for the rest of the states. The perceived rise of immigration has likely contributed to the actual rise of populism across the states and Europe. Whatever one thinks of populism, it’s likely less good for immigrants than the alternatives. So, there’s a pro-immigration case for being cautious when removing immigration restrictions. Moving too quickly may result in political decisions that harm the long-term prospects of approaching a just immigration regime. III. Tiered Citizenship As The Solution Who, among this people, were the citizens? Technically, those who had been born or adopted into one of the three original tribes of Rome. In practice this meant all males above fifteen years of age who were neither slaves nor aliens, and all aliens who had received a grant of Roman citizenship. Never before or since has citizenship been so jealously guarded or so highly prized. Returning to Rome, the idea of tiered citizenship addresses the fears of the immigration skeptic. If one is worried about political change from immigrants – don’t let them vote. If one is concerned about the cost of welfare – don’t let them consume benefits. If one is concerned about antiliberal backlash, reduce the intensity of the reaction by decreasing the number of migrants’ rights. In Capitalism, Alone, Branko Milanovic writes: The native population is more likely to accept migrants the less likely the migrants are to permanently remain in the country and use all the benefits of citizenship. This proposition introduces a negative relationship between (i) willingness to accept migrants and (ii) extension of migrants’ rights. The idea is that there’s a curve between the two variables. Full extension of the rights of the citizenry will result in low willingness to accept migrants. This can trigger a backlash, increase the probability that assimilation fails, or worse. Instead, of granting full rights to all immigrants, slowly expand these services on a generational basis. One way to implement this would be to issue an additional card, a slower-acting green card for non-citizens. This green card would not carry the same political, welfare, or economic benefits as ordinary citizenship. For the pro-immigration side, this may feel harsh. The immigrant is explicitly treated as a second-class citizen. The symbolism of this is unfortunate. It seems to run up against the idea that all are created equal and American egalitarianism. A strict cosmopolitan may not be happy with it. Does this proposal violate the human rights of migrants? If they’re here, then perhaps the state owes them a package of economic, health, and political rights. Newcomers won’t receive a full set of rights from partial citizenship. On this view, even though they may be better off by immigrating, the government enforcing second-class citizenship is unjust. After all, one can violate rights while making someone better off. One problem with this view is that, for many rights under discussion, it’s not clear that anyone possesses them, let alone immigrants. The primary issue however is that it’s not clear why merely moving to a country and minimally integrating with it generates rights. Given the political and economic reach of countries like America, immigrants are already subject to the impact of American decisions. Does that generate political rights, like the right to vote in American elections? Or economic benefits, like a social safety net? There are defenders of every position, and the idea that foreigners should vote is a position, so it has its adherents. Nonetheless, that idea will strike most as being too generous. Given that would-be migrants are already impacted by American politics, that can’t be what justifies rights. Similar remarks apply to cultural or economic factors. Working with or for Americans doesn’t bring the rights of full citizenship into existence. Assimilating into American culture from afar has no relevance. All this suggests that granting partial citizenship is permissible. Yet egalitarians may still feel uncomfortable with the idea. It appears to contradict the idea that all are created equal. Respecting that is an aspirational goal of liberalism. Second-class citizenship locks in inegalitarianism, transforming the dispensation of justice into a hereditary matter. This discomfort fails to take into account the fact that the administration of global justice is de facto hereditary. No one controls where they are born. Making inegalitarianism more explicit and obvious is worth it when it makes people better off. Hiding the unfairness of the world may sanitize it for those who can’t see it, but doesn’t make it any less real. And what of the immigration skeptics? They may still worry that radically increasing the number of citizens, even if second-class and done slowly, will shift culture. But tiered citizenship removes much of the cultural and political risks. Without significant political and economic power, there will be less negative change from migration. The ancient Romans invoked tiered citizenship with romanization – both were crucial. The data around migrants adopting the norms of liberal countries suggests that liberalization will play a similar role. Leaving aside cases of political strategy, cultural cohesion was an explicit requirement for Roman citizenship. We do not need to lose sight of that requirement today. Consider Robert Bloom and co, A more crucial test of Roman purpose and vision came when the issue arose of citizenship for the provincials. They were not distant kinsmen nor did they share the same peninsula. During the last two centuries of the republic, citizenship was granted to provincials on a very selective basis. Augustus made no basic change in this policy, He and his immediate successors believed that it should be given only in instances where it was especially deserved. For example, non-citizens in the army were made citizens upon the completion of their long term of service. In a world filled with anti-foreign bias and uncertainty surrounding the impact of open borders, partial citizenship may be the best way forward. Think of it as a form of policy trade. Some people want more immigration – others have concerns. A fine trade would be to grant freedom of movement and restrict the benefits of moving. Over time, the composition of the state will change. The states can let in many more millions of immigrants in. Each will have a chance at living more prosperous and safe lives. Over time, perhaps, their descendants will rise to become citizens. The present may have the appearance of egalitarianism. But that’s only because the inegalitarianism of today is largely hidden. Second-class citizens are undocumented. Would-be immigrants are restricted to their native states – and relegated to a life of less prosperity. The future should be better.
<urn:uuid:87bdebb2-ebeb-49b1-bd4d-c4035b66af80>
CC-MAIN-2023-50
https://www.classicalfuturist.com/p/ancient-models-of-citizenship-and-migration
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100540.62/warc/CC-MAIN-20231205010358-20231205040358-00210.warc.gz
en
0.953293
3,702
2.765625
3
Germ Cell Tumors Article Translations: (Spanish) What Are Germ Cells? Germ cells are the reproductive cells in an unborn baby. In boys, the cells make sperm and in girls, they make eggs. Before they settle into the reproductive organs, germ cells develop along the baby's "midline." This is the area where the stomach and other internal organs will lie. What Are Germ Cell Tumors? Germ cells that grow in an unusual way can become a tumor . Often, these tumors form in the ovaries or testes. Because the germ cells travel along the midline to reach the reproductive organs as a fetus grows, they can sometimes settle in other places. The most common sites for germ cell tumors outside of the reproductive organs are: - in part of the chest between the breastplate and spine - the tailbone - abdomen (belly) Sometimes, a tumor can develop in the middle part of the brain. What Are the Types of Germ Cell Tumors? Like tumors that form in other places in the body, germ cell tumors can be benign (not cancerous) or malignant (cancerous). The most common types of germ cell tumors include: Teratomas. These tumors are benign, but can become malignant. Teratomas are the most common type of germ cell tumor to develop in extragonadal (not in the ovary or testes) areas. Doctors usually treat teratomas with surgery because chemotherapy doesn't work in a benign tumor. Germinomas. These malignant tumors are also called dysgerminomas when they're in the ovary, or seminomas when they're in the testes. They also can be in the middle part of the brain. Yolk sac tumor (also called endodermal sinus tumor). These malignant tumors most often develop in the ovaries, testes, or tailbone. Embryonal carcinoma. These malignant tumors usually form in the testicle of an adolescent boy, but can spread ( metastasize ) to other places in the body. Choriocarcinoma. This malignant tumor usually forms in the placenta during pregnancy and can affect both the mother and child. What Causes Germ Cell Tumors? The cause of most germ cell tumors isn't always known. Doctors do know that some medical conditions can make children more likely to develop them. These include: - birth defects that involve the central nervous system, genitals, urinary tract, and spine - genetic conditions that cause missing or extra sex chromosomes Boys with undescended testicles (testes that stay up inside the pelvis) also seem to be at a higher risk for a germ cell tumor. What Are the Signs & Symptoms of Germ Cell Tumors? Early on, a child with a benign or malignant germ cell tumor might have few symptoms or none at all. As the tumor grows, a mass (lump) may be felt. It also might cause symptoms as it presses against organs in the body. Depending on where the tumor is, it can cause symptoms like: - constipation or trouble holding pee if the tumor is in the pelvis - leg weakness if the tumor presses on the nerves at the bottom of the spine - a testicle of an unusual shape or size How Are Germ Cell Tumors Diagnosed? If a doctor thinks that a child might have a tumor, he or she will do a physical exam and order these tests: Imaging studies. These might include a CT scan, MRI, X-ray, ultrasound, and a bone scan. These tests help doctors see the size of the tumor and where it is. They can also help show if cancer has spread to other parts of the body. Biopsy. In a biopsy, doctors take a small piece of tissue for examination in a lab. This closer look by a pathologist helps the oncologist (cancer doctor) make a diagnosis and choose the right treatment. Biopsies often can be done through a laparoscope using a small incision (cut) and a camera to guide the doctor. A more complicated surgery might be needed based on the tumor's location. Blood tests. Tests such as a blood count, kidney test, and liver test measure minerals in the blood. The results show how well the liver and other organs are working. Alpha-fetoprotein (AFP) and beta-human chorionic gonadotropin (β-HCG) tests look for higher than normal levels of these proteins (called tumor markers). Higher levels can suggest a germ cell tumor. These tests also can show how the cancer treatment is working and, after treatment, whether the tumor has come back. Doctors might order genetic tests if a tumor could be related to a genetic condition. How Are Germ Cell Tumors Treated? Children with benign germ cell tumors will have surgery to remove the tumor. Those with malignant tumors will first go through a process called staging. Staging is a classification system that helps doctors figure out how far the cancer has progressed. It looks at things like: - the size of the tumor (or tumors) - how deep the tumor is in an organ - whether the tumor has spread to nearby or distant lymph nodes or organs This information, as well as a child's age and overall health, helps doctors form treatment plans. The plans may include these options, used together or alone: Surgery. Children with malignant tumors may have surgery to remove as many of the cancerous cells as possible. Chemotherapy. Chemotherapy works to treat cancer throughout the body. Chemo is also the most important therapy to treat microscopic (very tiny) cells that can hide in other parts of the body but aren't seen on a scan or felt on exam. Often, doctors combine several chemotherapy drugs to attack the cancer cells in different ways. Radiation therapy. This treatment uses high-energy radiation from X-rays, gamma rays, or fast-moving subatomic particles (called particle or proton beam therapy) to target and destroy cancer cells. Radiation usually isn't needed to treat germ cell tumors because most are very sensitive to chemotherapy. When your child needs treatment for any type of tumor, it can feel overwhelming. But you're not alone. To find support, talk to your child's doctor or a hospital social worker. Many resources are available to help you and your child get through this difficult time. Note: All information is for educational purposes only. For specific medical advice, diagnoses, and treatment, consult your doctor. © 1995-2020 KidsHealth ® All rights reserved. Images provided by iStock, Getty Images, Corbis, Veer, Science Photo Library, Science Source Images, Shutterstock, and Clipart.com
<urn:uuid:34dd65d0-7fbd-4149-8885-24f3d374d2c9>
CC-MAIN-2020-29
https://www.childrensmn.org/educationmaterials/parents/article/12299/germ-cell-tumors/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657129257.81/warc/CC-MAIN-20200711224142-20200712014142-00135.warc.gz
en
0.929946
1,411
4
4
Our editors will review what you’ve submitted and determine whether to revise the article. - August 19, 1830 Germany - Notable Works: - “Die Modernen Theorien der Chemie” - Subjects Of Study: - atomic weight periodic table Lothar Meyer, (born Aug. 19, 1830, Varel, Oldenburg [Germany]—died April 11, 1895, Tübingen), German chemist who, independently of Dmitry Mendeleyev, developed a periodic classification of the chemical elements. Though originally educated as a physician, he was chiefly interested in chemistry and physics. In 1859 Meyer began his career as a science educator, holding various appointments before serving as professor of chemistry at the University of Tübingen (1876–95). His book Die modernen Theorien der Chemie (1864; “Modern Chemical Theory”), a lucid treatise on the fundamental principles of chemical science, contained a preliminary scheme for the arrangement of elements by atomic weight and discussed the relation between the atomic weights and the properties of the elements. This influential work was often enlarged and went into many editions. In about 1868 Meyer prepared an expanded table, similar in many ways to Mendeleyev’s table published in 1869. It was not until 1870, however, that Meyer published his own table, a graph relating atomic volume and atomic number and clearly showing the periodic relationships of the elements. He did not claim priority for his achievement, and he admitted that he had been reluctant to predict the existence of undiscovered elements as Mendeleyev had done. Meyer worked in several areas of chemistry, but much of his activity grew out of his preoccupation with the classification of the elements. He worked on recalculating a number of atomic weights and made use of the periodic table for predicting and studying related elements’ chemical properties.
<urn:uuid:5ec49117-181e-4b22-9349-cc99cabac2fd>
CC-MAIN-2023-14
https://www.britannica.com/biography/Lothar-Meyer
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948900.50/warc/CC-MAIN-20230328232645-20230329022645-00697.warc.gz
en
0.961412
402
3.5
4
|Microarrays reveal differences among types of primary pulmonary hypertension| May 14, 2001 A gene microarray analysis of lung tissue from patients with primary pulmonary hypertension (PPH) suggests that there is more than one way to develop the rare, often fatal disease. Researchers found that expression levels of key genes differed between patients with inherited and sporadic PPH. The latter cases appeared to involve a more tumor-like process. The genes identified should help clarify what causes PPH, a disorder in which blood vessels feeding the lungs become severely damaged. The investigators evaluated lung samples of two patients with inherited PPH and four patients thought to have sporadic PPH. One of the four, an orphan, had a genetic signature more like the inherited cases of PPH. Control tissue was obtained from six patients with normal lungs. Using RNA from the tissue samples, the researchers compared the activity of several thousand genes. A difference in the expression pattern of 307 genes existed between the control and PPH samples. The results support the theory that genes involved in cell growth and cell death play a role in PPH. The study is reported in a recent issue of Circulation Research. In addition, the investigators identified a dozen or so genes whose expression differed markedly between the known inherited and sporadic cases of the lung disease. The gene expression pattern of inherited PPH looked more like that of normal tissue than sporadic PPH. And the genetic features of sporadic cases resembled the poorly regulated cell growth associated with tumors. The findings call into question a theory that defects in a single gene underlie PPH, such as the recently identified gene for the type II bone morphogenetic protein receptor (BMPR2). The BMPR2 gene has been linked to 6 percent of inherited cases and more than a third of sporadic cases of the disease. In PPH, muscle cells that encircle arteries in the lung plump up, and endothelial cells lining the vessels' inside surface begin growing out of control. These changes block blood flow through the arteries, raising blood pressure and making it harder for the heart to pump blood to the lungs. Heart failure frequently results within a few years. . . .
<urn:uuid:3f12c42f-39ad-422c-9c56-b984b321334d>
CC-MAIN-2023-23
https://www.genomenewsnetwork.org/articles/05_01/Microarrays_pulmonary.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649193.79/warc/CC-MAIN-20230603101032-20230603131032-00328.warc.gz
en
0.941055
458
2.828125
3
Here where the monument stands, unknown SS men took twelve American prisoners and three local civilians and murdered them in cold blood. Later, as the battle wound to a close, local villagers searching for the missing civilians discovered the bodies. The GIs lay where the monument now stands and the civilians across the trail where a wooden bench marks the spot. The murdered soldiers were men of Company A, 27th Armored Infantry Battalion of the 9th Armored Division. This unit would earn itself a place in history a few months later when, under Captain Karl Timmermann, it jptured the Ludendorf Bridge over the Rhine River at Remagen. Note the swedish flag and name. ArdennesBattle for the BulgeNormandiePeiperStavelotVadVarVem
<urn:uuid:f10ab32a-0f51-4526-b9b7-b7d8f74d2635>
CC-MAIN-2017-39
http://www.e-pic.se/History/Land/Peipers-Route-at-the-battle/i-4vQ94N7/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689411.82/warc/CC-MAIN-20170922235700-20170923015700-00472.warc.gz
en
0.925541
162
2.6875
3
Stretching an impressive 20km, Khe Ry Cave in Quang Binh province’s Phong Nha – Ke Bang complex has been officially declared the world’s longest river cave. The announcement was made on May 26 by Howard Limbert who has led experts from the British Caving Association on a study project lasting several years. Surrounded by the huge limestone walls, Khe Ry Cave was discovered in 1997. At that time, Limbert’s team only discovered a 13.5km part of the cave. In subsequent years, the expedition continued exploration and mapping of the cave, concluding that the total length reaches over 20km. The cave ceiling is 120m high, allowing boats to pass comfortably through several stages. The experts described Khe Ry as a world of colourful stalactites in many different shapes and sizes. The first water source of Khe Ry River is a stream trickling into the cave at an altitude of 1,300m. This forms the long river, which runs to En Cave before diving down into Son Doong Cave and feeding into the Phong Nha water system. Khe Ry is a huge and significant cave both in terms of its appearance and ecological system. Due to the darkness inside, the cave is home to species such as bats, blind scorpions, fish and amphibians. Scientists said it would take many years to categorise the fauna because many species had never been found before.
<urn:uuid:ccf95f4c-1ba3-4f24-841b-51a7a178abab>
CC-MAIN-2017-43
http://phongnhadiscovery.com/en/hang-khe-ry-worlds-longest-river-cave/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823153.58/warc/CC-MAIN-20171018214541-20171018234541-00422.warc.gz
en
0.966185
295
3.234375
3
An AI has learned to tackle one of the toughest Atari video games by taking instructions in plain English. The system, developed by a team at Stanford University in California, learned to play the game Montezuma’s Revenge, in which players scour an Aztec temple for treasure. The game is challenging for AI to learn because it offers sparse rewards, requiring players to make several moves before earning any points. Most video-game-playing AIs use reinforcement learning to develop a strategy, relying on feedback like game points to tell them when they are playing well. To help their AI pick up game tactics quicker, the Stanford team gave their reinforcement learning system a helping hand in the form of natural language instructions, for example advising it to “climb up the ladder” or “get the key”. “Imagine teaching a kid to play tennis by handing them a racket and leaving them in front of a ball machine for 10 years. That’s basically how we teach AI right now,” says team member Russell Kaplan. “It turns out kids learn a lot faster with a coach.” Teaching an AI in this way could have far-reaching applications, because using natural language means anyone could advise the AI, not just computer programmers. Playing by numbers The group first trained the AI to associate instructions with screenshots of the same action being carried out in the game. They then let it practise playing the game with a list of instructions for each room the game character passes through, rewarding it for completing commands and for progressing through the game. To show it was developing a general understanding of commands like “climb up the ladder”, the researchers ran another experiment in which they removed training data for the second room. The system was still able to follow instructions for that room despite not having seen them before, says Kaplan, which suggests it is not just learning by rote. Instead, it may be generalising from previous instructions. It also learned to ignore instructions when it found a better strategy. The system scored 3500 points on the game, smashing the top score of 2500 on OpenAI Gym, an online platform for testing AIs in virtual environments. A Google DeepMind AI has scored up to 6600 on the game, but it was trained for nearly twice as long. It combined reinforcement learning with an approach called intrinsic motivation, which rewards the AI for being curious and exploring its environment. Kaplan says Google’s approach is more advanced, but he believes the two methods are complementary and wants to try combining them. The group also plans to reduce the number of instructions as the AI progresses through the game to see how quickly it learns from what it’s been told and stops being dependent on such guidance. Devendra Chaplot at Carnegie Mellon University says using natural language guidance is an interesting approach. “This is extremely useful as it provides a natural way for humans to guide AI systems,” he says. Translating it to the real world could be a challenge, though. “The project uses a fixed set of instructions, but understanding free-form natural language instructions is a very challenging open problem,” says Chaplot. Kaplan says one thing in their favour is the variety of rich datasets linking real-world images with natural language descriptions, which could be used to help train such an AI. Journal reference: arXiv, DOI: 1704.05539 More on these topics:
<urn:uuid:bf030c7b-f366-4857-b734-1cb233ac284f>
CC-MAIN-2020-10
https://www.newscientist.com/article/2128575-ai-learns-to-play-video-game-from-instructions-in-plain-english/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875142603.80/warc/CC-MAIN-20200217145609-20200217175609-00545.warc.gz
en
0.958581
714
3.421875
3
Subnational Governments in OECD countries: Key Data The OECD gathers and publishes annually updated data on subnational governments in 35 OECD member countries, including: Subnational Governments around the World: Structure and Finance The OECD, in partnership with United Cities and Local Governments (UCLG), gathers and publishes data on subnational governments from 101 countries. A pilot study was publishin in October 2016 and includes: The pilot study formed the basis for the World Observatory on Subnational Government Finance and Investment, officially launched in November 2017 when the Steering Committee first met in Paris. The World Observatory is multi-stakeholder initiative dedicated to collecting comparable data and information on subnational finance and territorial organisation from over 130 countries. Subnational governments are key economic and policy actors across OECD countries. Int the OECD area, they represent, on average, 40% of public expenditure, 63% of total public staff expenditure, 59% of public investment, 32% of public tax revenue and 20% of public debt. However, there are huge disparities across the OECD countries regarding the importance of subnational governments as economic and policy actors in regional development. The share of subnational governments in the general government sector Source: OECD (2017), Subnational Governments in OECD Countries - Key Data, OECD Publishing, Paris Subnational government expenditure by economic function Source: OECD/UCLG (2016), Subnational Governments Around the World - Structure and Finance
<urn:uuid:9cedec6c-15d5-4879-bb38-86ab81d5e6f3>
CC-MAIN-2020-24
http://www.oecd.org/governance/regional-policy/subnational-finance.htm
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347387219.0/warc/CC-MAIN-20200525032636-20200525062636-00152.warc.gz
en
0.905134
291
2.515625
3
Which map shows administrative units in the form of different countries or states? Political maps are designed to show governmental boundaries of countries, states, and counties, the location of major cities, and they usually include significant bodies of water. Which country has the most subdivisions? Russia’s Sakha Republic is the eighth largest territory on earth….The World’s Largest Country Subdivisions. |Area (Km Squared)||3,103,200| What country has the least provinces? I will mention that the country of least area in the ISO 3166-1 standard is Vatican City, with a territory of 0.44 km….Q. What are the least densely populated states and provinces in the world? What is the biggest division of the world? List of the 50 largest country subdivisions by area |1||Sakha Republic (Yakutia)||Russia| |2||State of Western Australia||Australia| |4||Greenland||Kingdom of Denmark| How many divisions are there? There are 102 divisions in India. The states of Andhra Pradesh, Goa, Gujarat, Kerala, Manipur, Mizoram, Sikkim, Tamil Nadu, Telangana, and Tripura as well as five of the union territories are not divided into divisions. Which country started with Z? Countries that start with “Z” What are the 2 Division of countries in our world today? The concept of Global North and Global South (or North–South divide in a global context) is used to describe a grouping of countries along socio-economic and political characteristics. Who are administrative officers? An Administrative Officer, or Admin Officer, is responsible for providing administrative support to an organization. Their duties include organizing company records, overseeing department budgets and maintaining inventory of office supplies. Build a Job Description. How many districts are in division? The four provinces, capital territory and two autonomous territories of Pakistan are subdivided into 37 administrative “divisions”, which are further subdivided into districts, tehsils and finally union councils…. |Divisions of Pakistan| |Subdivisions||Districts, Tehsils, Union Council|
<urn:uuid:f76593a8-f81f-40cc-8035-9a9cd4fc00fc>
CC-MAIN-2023-23
https://www.fdotstokes.com/2022/09/07/which-map-shows-administrative-units-in-the-form-of-different-countries-or-states/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00552.warc.gz
en
0.883354
608
3.453125
3
Carpenter ants and termites are the two pests that cause the most damage by burrowing into wood. When a carpenter ant infestation occurs in your home or business, the ants will literally chew through your wood, potentially causing major structural damage. Here are some signs to look for and how to handle it. 1. Sawdust or Frass Frass is the term for the wood particles that carpenter ants discard around their nests. It looks like finely ground up sawdust. The ants will leave frass deposits in small mounds at the entrances to their nests. Carpenter ants don’t actually eat wood; they just chop it up in their mandibles and remove it from their tunnels. It has to go somewhere, so they drop it from their nesting hole entrances. This is the most easily recognizable sign of a carpenter ant infestation. 2. Winged Ants Another critical sign is large winged ants coming from walls, vents, ceilings, or other crevices around your house. This means the ants are getting ready to swarm and breed, which is a sure sign that carpenter ants have invaded your home. 3. Large Ants Everyone is familiar with the tiny red and black ants that infiltrate kitchens to look for food. But if you are finding an increasing number of large ants, carpenter ants may have made a nest. Small black ants won’t be more than about 6 millimeters in length, while carpenter ants will reach up to 12 millimeters in length, with queens reaching 20 millimeters. Granted, one or two of these larger ants do not mean your home has been invaded—they might just be workers looking for food. However, if you begin finding them often, the chances are that they have made a nest inside of the woodwork of your structure. 4. Rustling Noises Rustling noises in your beams or studs are generally a sign that you have a carpenter ant problem. The sound will not be easy to detect, but you can hear it by putting your ear up to a suspected piece of wood and listening carefully. The best way to handle a carpenter ant problem is to prevent the ants from entering your home or business. Carpenter ants generally use bridges, like overhanging branches or bushes, to explore new territory for a nest. If you cut these back, they will be less likely to make it into your structure. Sealing off cracks and crevices will also keep carpenter ants at bay. Use a good silicon caulk to fill in holes around windows, doors, water valves, and electric cable entries. By removing the entry points, you will deter carpenter ants. The Professional Way If carpenter ants invade your space, the best solution is to call a professional exterminator. Granted, there are many aftermarket ant baits and other ways to exterminate the colony, but they are unreliable and may not rid your business or home of the ants. The only effective solution is to get professional help. A professional exterminator will eliminate your carpenter ant problem, and you’ll have peace of mind. If you have any questions about carpenter ants, their signs, what to look for, and solutions to the problem, contact Bain Pest Control Service. For four generations, Bain has been New England’s pest control company of choice.
<urn:uuid:11397aba-78fb-4da5-85d9-8c20b58ab29b>
CC-MAIN-2020-29
https://bainpestcontrol.com/blog/4-signs-of-a-carpenter-ant-infestation-and-how-to-handle-it/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886095.7/warc/CC-MAIN-20200704073244-20200704103244-00084.warc.gz
en
0.943115
693
2.75
3
This weekend sees the celebration of Europe Day which is the day all Europeans celebrate as citizens of the EU. Over the next week, we’ll be publishing work from our contributors on what it means for them to European. We begin with an inspired piece from Divine Gonsalves who gives us a quick recap on how the EU was formed as well as a message about living in the EU. On the 9th of May 1950, then foreign minister of France, Robert Schuman, proposed during a speech that a new political form of cooperation that would prevent war; in fact, it would ensure that there would be no more wars in Europe. This speech came to be known as the Schuman Declaration. This declaration is the reason that the EU exists. That speech was made five years after World War II and during this time, Europe was recovering from the destruction of the conflict. This Declaration meant that Europe would share its resources like coal and steel instead of nations competing with each other, especially France and Germany which were rivals, would prevent further wars. This also meant that the standard of living was raised and Europe would be a more unified continent. Finally, on the 1st of January 1958, the European Economic Community (EEC), otherwise known as the common market, came into existence. France, Germany, Italy, the Netherlands, Belgium, and Luxembourg were the founding members. Over time, these member states also allowed other European countries to join them – in 1973, Denmark, Ireland, and the United Kingdom joined, followed by Greece in 1981. Portugal and Spain were next to follow in 1986. A big moment happened in 1993, when the EEC became the European Union. Austria, Finland, and Sweden joined in 1995. and a total of ten countries joined in 2004. They were Cyprus, Czech Republic, Estonia, Hungary, Latvia, Lithuania, Malta, Poland, Slovakia, and Slovenia. 2007 saw Bulgaria and Romania become members and finally, in 2013, Croatia became the twenty-eighth country to join. Waiting to be members are Albania, Macedonia, Montenegro, Serbia, and Turkey. Possible countries that could become candidates are Bosnia and Herzegovina and Kosovo. Europe Day is a day to commemorate Europe’s unification, the reason for peace and stability among European countries. Europe Day is a day to celebrate the integration of Europeans and to celebrate their diversity. So this Europe Day, celebrate your national day. Celebrate that you, a European, are living “United in Diversity” and celebrating the multicultural bloc that has provided so many benefits to its citizens. Happy Europe Day, fellow Europeans.
<urn:uuid:e351a396-5585-419c-a15b-95aa557339e9>
CC-MAIN-2023-40
https://theeuropeannetwork.eu/significance-of-europe-day/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.96/warc/CC-MAIN-20230924223409-20230925013409-00843.warc.gz
en
0.978591
533
3.171875
3
Year 5 students' available and accessible knowledge of decimal number numeration Baturo, Annette R. (1998) Year 5 students' available and accessible knowledge of decimal number numeration. In Kanes, Clive, Goos, Merrilyn, & Warren, Elizabeth (Eds.) 21st Annual Conference of the Mathematics Education Research Group of Australasia: Teaching Mathematics in New Times, July 5-8, 1998, Gold Coast, Australia. This paper reports on a study of the decimal-number numeration knowledge held by 112 Year 5 students who had completed formal instruction in tenths and hundredths. It explores the interaction between available and accessible place-value and regrouping knowledge. Available knowledge was elicited through diagnostic test items; accessible knowledge was elicited through an error analysis of the students' numeration procedures used in addition and subtraction algorithms. The results showed that performance varied markedly between classes (indicating an instructional effect), that regrouping was more difficult than place value, and that there was generally a direct relationship between available and accessible knowledge (although there were many instances of high-available and low-accessible knowledge) Impact and interest: Citation countsare sourced monthly fromand citation databases. These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards. Citations counts from theindexing service can be viewed at the linked Google Scholar™ search. Full-text downloadsdisplays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one. Repository Staff Only: item control page
<urn:uuid:c81d3e84-ef55-43a2-b10e-37c3a17a8021>
CC-MAIN-2014-35
http://eprints.qut.edu.au/14888/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917463.1/warc/CC-MAIN-20140901014517-00201-ip-10-180-136-8.ec2.internal.warc.gz
en
0.915426
402
2.640625
3
Water Hardness Test Kit Total hardness is a total of Calcium & Magnesium salts present in water. Hard water creates operational difficulties with Boilers, Cooling plants Heat exchangers or in domestic use of water. Also Hardness in process water is a critical parameter in many chemical processes. Whenever heat transfer takes place, with water as medium, hard water creates scaling on heating surfaces making heat-transfer progressively inefficient. Daily monitoring & control of water hardness at such places is important, as it can cause inefficient operation/failure of such equipment. Indian standard IS 10500 specifies following limits for drinking water Desirable limit ( max. ) : 300 ppm Permissible limit ( max. ) : 600 ppm Measures Total Hardness as CaCO3. - Type : Titration - Sensitivity : 1 & 5ppm. - Range : 0-1000ppm. - No.of tests/Pack : 200nos Chlorides occur in all natural water in widely varying concentrations. It is important to monitor Chloride contents in industrial water as high Chloride content can cause corrosion in boiler & Cooling Plants etc. In domestic waters, Chloride contents of more than 250 ppm. gives bad taste to drinking water.Indian standard IS 10500 specifies following limits for drinking water. - Desirable limit ( max. ) : 250 ppm - Permissible limit ( max. ) : 1000 ppm Measures Total Chlorides as CI. - Type : Titration - Sensitivity : 5 & 25 ppm. - Range : 0 - 1000 ppm. - No.of Tests/Pack : 100 nos. - Water hardness test kit - Silica test kit - Chlorine test kit - Alkalinity test kit - Chloride test kit - Arsenic test kit - iron test kit - phosphates test kit - free chlorine test kit - nitrates test kit - hydragine test kit - flourides test kit - dissolved oxygen test kit - calcium test kit - sulphite test kit - sulphate test kit - COD test kit - PH test kit - Al test kit - Zink test kit - Ammonia test kit - copper test kit - acidity test kit - sulphides test kit - salinity test kit - manganese test kit Puredrop Hardness Kit Minimum Order Quantity: 20 Piece |Usage/Application||To measure degree of hardness (ppm) in water which might be causing scaling issue,skin dryness etc| |Testing Type||Water Hardness Testing| |Frequency Range||0 to 30 gpg CaCO3| |Number Of Tests||100-500| |Capacity||Number Of Tests 100-500| |Quantity Per Pack||Test kit comes with 30 mL buffer solution,10 mL calmagite indicator,75 mL EDTA solution(2)| |Sensitivity||1 drop = 2,5,or 10 ppm CaCO3| |Size||235x175x115 mm (9.2x6.9x4.5")| |Weight||457 g (16.1 oz)| |Ph Value||0 - 14| |Total Hardness||0 to 30 gpg CaCO3| |Ph Range||2000 ppm| |Product Code||HS Code 38220090| |Measuring Range||0 to 30 gpg CaCO3| |Calcium Hardness||1 gpg| |Pack Contain||Test kit comes with 30 mL buffer solution,10 mL calmagite indicator,75 mL EDTA solution(2)| |Kit Size||235x175x115 mm (9.2x6.9x4.5")| |Storage||Test kit comes with 30 mL buffer solution,10 mL calmagite indicator,75 mL EDTA solution(2),20ml| |I Deal In||New Only| |Country of Origin||Made in India| |Desirable Limit||45 ppm| Owing to our expertise in this domain, we have been able to offer a wide assortment of Water Hardness Testing Kits. These kits are widely used to test the hardness of water. Moreover, the kits offered by us have the equipment, which helps accurately detecting the hardness of water. Due to their featured attributes like easy usage, portability and cost effectiveness, these kits are widely demanded by the customers. These kits can also be customised in compliance with the specifications provided by the customers. - Brand: Puredrop - Chemical Method: EDTA - Form: Liquid - Item Code: PHK - Delivery Time: Within 24 Hours - Packaging Details: 235x175x115 mm (9.2x6.9x4.5") 457 g (16.1 Oz)
<urn:uuid:65ea9344-782b-4aae-9c3c-4752ebe2629c>
CC-MAIN-2023-40
https://www.puredrop.in/water-hardness-test-kit.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510208.72/warc/CC-MAIN-20230926111439-20230926141439-00803.warc.gz
en
0.698277
1,149
2.921875
3
The tabbed layout allows you to divide a section of the page into up to 10 tabs, so that content can be divided into handy subsections. How to make - Make an inline table that is two rows deep and has as many columns as you want tabs. - Choose the table style 'tabbedlayout'. - Enter the titles of the tabs in the first row and set their style to 'nostyle'. - Enter text and pictures as normal in the second row. You can still float pictures inside the columns using 'image left' and 'image right'. Important things to note - You need to place a level 2 heading above the text within each tab (in addition to the title you place in the first row of the table). This ensures that your web page is well structured for all visitors. - Don't create more than five or six tabs, and keep the tab titles short but meaningful. Too many tabs or tabs with very long titles may not display correctly. Extending the use If you want to create more interesting layout effects, for example by having a 'picturelist' inside a tab, then use embedded text objects. In the same way that you can insert pictures into your text, did you know you can also insert other pieces of text into your text? It's easy, simply choose Insert > Text from the menu options and follow the onscreen prompts. As the text you insert is separate from the current text, it can have its own styles and formatting. This can also make it easier to load and edit large pages, simply by making them up out of separate text objects. Linking to a specific tab on a different page To link to an individual tab on another web page: - Hover over the tab you want to link to and see what the address is and make a note of what follows the # symbol. It'll look something like: #section45874-1 - Then, in the other page, make your link to the page containing the tabs. In the link properties, under url parameter, paste the reference as above. This makes a link that will open the correct tab.
<urn:uuid:fcc6c1b5-2804-49d9-a832-42f8fa78e4f6>
CC-MAIN-2014-35
http://www3.hants.gov.uk/yp/itschools/itschools-services/internet-services/sws/swsuserguide/swschapter18/swschapter18-tabbedlayout.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500825010.41/warc/CC-MAIN-20140820021345-00218-ip-10-180-136-8.ec2.internal.warc.gz
en
0.878597
444
2.515625
3
Learn XQuery in 10 Minutes: An XQuery Tutorial By: Dr. Michael Kay UPDATE - This article has been updated since its original publication. You can find the updated version here. This XQuery tutorial is for all those people who really want to know what XQuery is, but don't have the time to find out. We all know the problem: so many exciting new technologies, so little time to research them. To be honest, I hope that you'll spend more than ten minutes on this XQuery tutorial — but if you really have to leave that soon, I hope you'll learn something useful anyway. What is XQuery For? XQuery was devised primarily as a query language for data stored in XML form. So its main role is to get information out of XML databases — this includes relational databases that store XML data, or that present an XML view of the data they hold. Some people are also using XQuery for manipulating free-standing XML documents, for example, for transforming messages passing between applications. In that role XQuery competes directly with XSLT, and which language you choose is largely a matter of personal preference. In fact, some people like XQuery so much that they are even using it for rendering XML into HTML for presentation. That's not really the job XQuery was designed for, and I wouldn't recommend people to do that, but once you get to know a tool, you tend to find new ways of using it. Playing with XQuery The best way to learn about anything is to try it out. Two ways you can try out the XQuery examples in this article are: (Between you and me, if you've only got ten minutes, you're not going to have time to install any new software, so just keep reading ...) Your First XQuery If you want to know how to do Hello World! in XQuery, here it is: and this is the result: This is how it works in Stylus Studio®: Game for something more interesting? Try: and be amazed by the answer: Finally, just to check that things are working properly, enter: and you'll see how much time you have left to read the rest of this article: For that one, of course, mileage may vary. The precision of the time value (fractions of a second) depends on the XQuery processor you are using, and the timezone (5 hours before GMT in this case) depends on how your system is configured. None of these is a very useful query on its own, of course, and what they demonstrate isn't exactly rocket science. But within a query language, you need to be able to do little calculations, and XQuery has this covered. Further, XQuery is designed so that expressions are fully nestable — any expression can be used within any other expression, provided it delivers a value of the right type — and this means that expressions that are primarily intended for selecting data within a Accessing XML Documents with XQuery Though it's capable of handling mundane tasks like those described in the previous section, XQuery is designed to access XML data. So let's look at some simple queries that require an XML document as their input. The source document we'll use is called There's also a copy of this example file on the Web. XQuery allows you to access the file directly from either of these locations, using a suitable URL as an argument to its The same function can be used to get the copy from the Web: (This will only work if you are online, of course; and if you're behind a corporate firewall you may have to do some tweaking of your Java configuration to make it work.) Those URLs are a bit unwieldy, but there are shortcuts you can use: The file contains a number of sections. One of them is an This produces the result: That was our first "real" query. If you're familiar with XPath, you might recognize that all the queries so far have been valid XPath expressions. We've used a couple of functions — This means we can also write more complex XPath expressions like this one: which gives the output: Different systems might display this output in different ways. Technically, the result of this query is a sequence of two element nodes in a tree representation of the source XML document, and there are many ways a system might choose to display such a sequence on the screen. Stylus Studio® gives you the choice of a text view and a tree view: you use the buttons next to the Preview window to switch from one to the other. Here's what the text view looks like: This example used another function — XPath is capable of doing some pretty powerful selections, and before we move on to XQuery proper, let's look at a more complex example. Let's suppose we want to find the titles of all the videos featuring an actor whose first name is Lisa. Each video in the file is represented by a video element like this one: We can write the required query like this: Again, this is pure XPath (and therefore a valid XQuery). You can read it from left-to-right as: The result is: Many people find that at this level of complexity, XPath syntax gets rather mind-boggling. In fact, this example is just about stretching XPath to its limits. For this kind of query, and for anything more complicated, XQuery syntax comes into its own. But it's worth remembering that there are many simple things you can do with XPath alone, and that every valid XPath expression is also valid in XQuery. Note that Stylus Studio® also provides a built-in XPath analyzer for visually editing and testing complex XPath expressions, and it supports both version 1.0 and 2.0. XQuery FLWOR Expressions If you've used SQL, then you will have recognized the last example as a join between two tables, the videos table and the actors table. It's not quite the same in XML, because the data is hierarchic rather than tabular, but XQuery allows you to write join queries in a similar way to the familiar SQL approach. Its equivalent of SQL's SELECT expression is called the FLWOR expression, named after its five clauses: for, let, where, order by, return. Here's the last example, rewritten this time as a FLWOR expression: And of course, we get the same result. Let's take apart this FLWOR expression: If you've been following very closely, you might have noticed one little XPath trick that we've retained in this query. Most videos will feature more than one actor (though this particular database doesn't attempt to catalog the bit-part players). This time I've used a different equality operator, What about the O in FLWOR? That's there so you can get the results in sorted order. Suppose you want the videos in order of their release date. Here's the revised query: And if you're wondering why it isn't a LFWOR expression: the Generating XML Output with XQuery So far all the queries we've written have selected nodes in the source document. I've shown the results as if the system copies the nodes to create some kind of result document, and if you run Saxon from the command line that's exactly what happens; but that's simply a default mode of execution. In a real application you want control over the form of the output document, which might well be the input to another application — perhaps the input to an XSLT transformation or even another query. XQuery allows the structure of the result document to be defined using an XML-like notation. Here's an example that fleshes out our previous query with some XML markup: I've also changed the query so that the actor's first name is now a parameter. This makes the query reusable. The way parameters are supplied varies from one XQuery processor to another. In Stylus Studio®, select XQuery > Scenario Properties; click the Parameter Values tab, and you'll see a space to enter the parameter value. Enter "Lisa", in quotes (Stylus Studio® expects an expression, so if you leave out the quotes, this value would be taken as a reference to an element named If instead you're running Saxon from the command line, you can enter: This is how the output looks now: (Not a very well-designed query, since the two videos feature different actresses both named Lisa; but if your ten minutes aren't up yet, perhaps you can improve it yourself.) Show Me the Database! I started by saying that the main purpose of XQuery is to extract data from XML databases, but all my examples have used a single XML document as input. People sometimes squeeze a large data set (for example, a corporate phone directory) into a single XML document, and process it as a file without the benefit of any database system. It's not something I'd particularly recommend, but if the data volumes don't go above a few megabytes and the transaction rate is modest, then it's perfectly feasible. So the examples in this introduction aren't totally unrealistic. If you've got a real database, however, the form of the queries won't need to change all that much from these examples. Instead of using the There's a lot more to databases than doing queries, of course. Each product has its own ways of setting up the database, defining schemas, loading documents, and performing maintenance operations such as backup and recovery. XQuery currently handles only one small part of the job. In the future it's also likely to have an update capability, but in the meantime each vendor is defining his own. One particularly nice feature of XQuery is that it has the potential to combine data from multiple databases (and freestanding XML documents). If that's something you're interested in, take a look at DataDirect XQuery, which supports access to Oracle, DB2, SQL Server and Sybase. Congratulations on finishing XQuery in 10 Minutes. As you might have suspected, there's more to XQuery than we had time to present in this brief XQuery primer. But this XQuery tutorial is just the first in a series of upcoming technical XQuery articles that we plan to make available through the Stylus Studio® newsletter, the Stylus Scoop. So if you're interested in learning more, sign up for the Stylus Scoop. We'll feature new XQuery articles each month, for example, this new FLWOR tutorial, as well as information on other topics of interest to the XML-curious, too! Can't wait that long? Then check out the XQuery tutorial written by Jonathan Robie of DataDirect Technologies, the first chapter of the book XQuery from the Experts, which provides an in-depth understanding of the design behind the XQuery language. The book also contains a chapter by the author of this article, Michael Kay, about the relationship of XQuery to XSLT. It's a great way to get your feet wet with this powerful new XML technology. If you want to get your hands dirty right away, Stylus Studio® provides a ton of XQuery tools, including an XQuery editor, an XQuery Debugger with integrated support for the Saxon XQuery Processor, an XQuery Mapper for visually developing XQuery projects, and an XQuery Profiler for benchmarking and optimizing XQuery expressions. Best of all, Stylus Studio® provides several online video demonstrations to get you aquainted with these and other tools, and you can try out Stylus Studio® for free. Finally, if you're more academically inclined, you can find the XQuery specification itself at http://www.w3.org/TR/XQuery. As standards documents go, it's actually quite readable, and it has lots of examples. The specification is part of a raft of documents on XQuery, which are all listed in its References section, but the one you're likely to find especially useful is the Functions and Operators specification at http://www.w3.org/TR/xpath-functions. This document lists all the functions in the XQuery library, but a word of warning — only those prefixed PURCHASE STYLUS STUDIO ONLINE TODAY!! Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced! Try Stylus Powerful XQuery IDE Download a free trial of our award-winning IDE for XQuery today! What's New for X15? New XQuery & Web Services Tools, Support for MySQL, PostgreSQL, HL7 EDI, Microsoft .NET Code Generation and much more!
<urn:uuid:e3298663-8933-47e5-a452-3385bfdf247a>
CC-MAIN-2014-41
http://www.stylusstudio.com/xquery_primer.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663167.8/warc/CC-MAIN-20140930004103-00363-ip-10-234-18-248.ec2.internal.warc.gz
en
0.926823
2,678
3.046875
3
By The Rev. Torey Lightcap March 28, 2013 St. Thomas Episcopal Church “Maundy” Thursday. What in the world is a Maundy, anyway? We first see that word appear in the year 1440. The word “maundy” creeps out of the language we call Old French: Maunde, derived from the Latin: Mandatum, as in “mandate,” as in “commandment.” As in, something that must be done. It’s something we have already heard and will continue to hear quite a lot tonight. After washing the disciples’ feet, Jesus says, by way of commandment, “If I, your Lord and Teacher, have washed your feet, You also ought to wash one another’s feet. For I have set you an example, That you also should do as I have done to you.” Or in the institution of what we call the Holy Eucharist, We hear it again, in this same night in the upper room: This, my body … This, my blood … Take them … Do this and remember me. Then, if we still haven’t gotten the point, we hear it again in the garden In the challenges that Jesus issues to his followers: Stay with me, remain here, watch and pray, put away the sword. Mandates. There’s an old joke in The Episcopal Church: “We follow four commandments and six suggestions.” But the footwashing, and the meal: these are clear commandments, not suggestions. If you are here tonight, you are fortunate, Because Maundy Thursday is all about instructions – Getting clear, direct instructions and following them. Being told, in a very plain way, to Do This, And then doing it. But. The way of Jesus-followers has been frustrated at times By an impulse to emphasize the opposite of “Do This,” And Christians have become world famous for what they would rather others not do, Or, you may say, what you shouldn’t do. Do Not Do This. Do Not Do That. Fairly or unfairly, Christians are painted as the scolds of the world – Those who shake their heads and warn: ah-ah-AAh. I wouldn’t do that if I were you. In our political and sexual ethics, In matters of taste and art, In how we train each other up to see and engage the world, Even in how we read our own holy scriptures: Christians have come to be defined So much more by what they Do Not Do than by What They Actually Accomplish. In the minds of many, we seem have come to expect the name Christian To be equated with prudish finger-wagging. Certainly Jesus places prohibitions on things In the course of his life and ministry and teaching, And we are meant to heed those prohibitions: … Do not store up for yourselves treasures on earth … Let the little children come to me, and do not hinder them … Do not look upon others with lust in your hearts … Do not resist an evildoer. But all this, you see, is really just splitting hairs. Jesus’ life and his work and his ministry are all crescendoing into this moment – These three days into which we have already entered – And those three days, Together with what is already and what is still to come, Are all saying the same thing: In whatever you do … in whatever you choose not to do, Make life and share your stuff and tell the truth and love God and love each other, And do the things that make for lasting peace. May I suggest that the list of things to do Strongly outweighs the list of things not to do. What is this desire we have to phrase things in the negative? If we could somehow pray and work our way into a vision of what we need to do, To do better and to do more of, And spent less time focusing on what has been prohibited, Wouldn’t we get further along? So we have these new commandments tonight placed upon us as joyful burden: That is, things we must do. Things that Jesus-followers do, to be redundant, because they are the followers of Jesus. Otherwise, … ? He said do them; so we do them. We do them without a perfect comprehension of what they are or what they mean, Even though we must strive to understand, Because simply to strive is a form of praise to God. We do them even though they are difficult or make us uncomfortable. Is staying up half the night in prayer my idea of a good time? Even though you know me as your priest? Not really, no. I’d rather get my rest and feel like a more effective person of prayer. Yet there’s Jesus, asking me to perform one more inconvenient act on his behalf. Is our coming here night after night, Thursday-Friday-Saturday, And then Sunday morning when it seems to be all over with, a form of hilarious fun? For most of us, no. But it’s the commandment. To keep the community intact and worshipping. If we can, at all, we should. Is walking the dangerous path of the cross of Christ on a Friday afternoon More fun than going to a movie or a long lunch with my friends? No. But if I don’t give God a chance to show me something in that cross About how God wants to love me Or about how I’m supposed to live my life, Then something essential will have been lost on me. Is my constantly taking in the Body and Blood of Jesus Or committing myself to prayer and solitude Or contemplating the depths of human depravity and bloodlust on the cross – Is any of this convenient, or fun? No. Frankly it’s a little terrifying. It’s also what it takes to get it through my thick skull. So we follow the commandments, the mandates. In the same way, then: Is taking off my shoes and socks and letting someone wash my feet And then turning around and doing the same for someone else my idea of a good time? No, not really. Not on the surface. It’s an idea that quite honestly makes me pretty squeamish. But I do it anyway; because, well, it’s “maundy.” It’s a commandment. I’ve been told to do it, so I do it. And here is what I have found in the times I have done this in my life. At first, in all truth, I really am a little put off by it. But God clears out a space where transformation is possible. And then something happens. I guess what happens is … the world I live in gets bigger. I am reminded in footwashing that I am not the center of the universe. Taking another person’s foot in my hands, It may as well be someone’s very heart. There is something in it That makes me feel responsible somehow for the other person’s welfare. There’s a lifeline that runs between me and the other person: Silent, unspoken, but it’s there. I can only just try to be present to it. And then when it is my turn to receive this gift, I have felt God speaking through it, Saying: See? Maybe the world isn’t such a terrible place after all. Maybe there are still ways we can care for each other And not have to feel defensive, or perfect, or jaded, or cynical, Or never feel that we really have time to spare for each other. Maybe the world is safer, and saner than I go around thinking Because someone really could carry out this commandment of Christ. And not really even on my behalf, but on behalf of Jesus, Because he was the first one who said to Do This. It’s a teaching I can’t get to in my head; I have to engage my whole body and stoop down for the sake of another human being And then receive the same gift, on my crummy old feet, And then I get it. I know it in my heart. Somehow … That’s goodness. That’s beauty. Shining out of this little church tonight. To our tired-out, busted-up old world. See, most of the time we keep our guard up, And we find ourselves wondering if there are any other people in this world Who really do care and who really can show love. We know that in our family lives and with people we’re really close to, We can do that. It’s easy. But there is such hunger in people To know that they really are loved. And I guess that’s really all Jesus is showing us: How to feed that hunger in this simple way. To show them that they are capable of receiving love and care, And to give them love. To place an image of Jesus right before them, And then receive the very same thing from someone else.
<urn:uuid:a5374593-c70e-4eb7-b7e1-595a69a8b097>
CC-MAIN-2017-34
http://irreducibleminimums.blogspot.com/2013/03/commanded.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106996.2/warc/CC-MAIN-20170820223702-20170821003702-00210.warc.gz
en
0.944214
2,036
2.515625
3
San Francisco’s Global Climate Action Summit ended on 14 September with non-state actors sending a call to action to governments ahead of the crucial COP24 in December, while highlighting their pivotal role in reducing emissions and reaching climate targets. In July 1995, Chicago experienced the deadliest weather event in the city’s history: a sustained heat wave that included a heat index—a measure of the heat experienced by a typical individual—of 120 degrees Fahrenheit. It’s a bit late, but the second-ever Quadrennial Diplomacy and Development Review (QDDR) is finally here. And it’s a good thing – it’d be a shame if this effort to present a coherent strategic narrative of U.S. As the United States assumes the Chairmanship of the Arctic Council, it is more important than ever that we have a coordinated national effort that takes advantage of our combined expertise and efforts in the Arctic region to promote our shared values and priorities. Eroding beaches and the seawater that laps onto the Embarcadero waterfront during high tide—not to mention severe storm flooding—were sending a clear message to a city surrounded by water on three sides. A series of executive orders signed by President Obama since his first year in office requires all federal agencies to begin planning for climate change and produce an updated adaptation plan by May of this year. Experts in Ethiopia, Nepal, Jamaica and Uganda explain how they are preparing for future global warming impacts. Ask a meeting of 50 climate change specialists what they mean by “resilience” and you’re likely to get 50 different answers. Cities are at the epicenter of climate change, responsible for as much as 80 percent of heat-trapping emissions and enduring the brunt of climate change’s effects. For the first time, India’s Prime Minister Narendra Modi backs a successful conclusion to the new global climate treaty scheduled to be signed in Paris next year and agrees to strengthen cooperation with the US. September 3-5 marked the most recent NATO summit in Cardiff, Wales. As Congress remains gridlocked on more than 200 bills related to climate change, U.S. Pacific Command is forging strategies with partner nations in the region to mitigate the security effects of global warming. Fear is a potent force in American politics. It is the force that sustains the War on Terror, the latest calls for further military interventions in Iraqi and Syrian civil wars, and Obama's use of drones on multiple continents. What if the U.S. Navy’s main base in Norfolk, Virginia sinks? It could happen. And it’s not an isolated problem, as climate change alters coastlines all over the world. The Senate Appropriations Subcommittee on Defense met on May 21st, 2014 to receive testimony from several Department of Defense officials on the Department’s Operational Energy programs and the incorporation of climate change into strategic planning. Military leaders should be very concerned about climate change – that’s the message of a new report released this week by the CNA Corporation’s Military Advisory Board.
<urn:uuid:35c20837-d90c-488c-ac4e-1cb572d4b9ba>
CC-MAIN-2020-16
https://library.ecc-platform.org/database-articles-publications?f%5B0%5D=field_region_topics%3A844&f%5B1%5D=type%3Anews&f%5B2%5D=field_topic%3A796
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370507738.45/warc/CC-MAIN-20200402173940-20200402203940-00127.warc.gz
en
0.927731
641
2.515625
3
Broken Thermometers, Fluorescent Bulbs & CFLs Mercury spills can be very hazardous and should be cleaned up as soon as possible. Mercury will vaporize slowly over time and can expose your family to toxic fumes for a very long time if not thoroughly cleaned up. Loudoun County does offer Household Hazardous Waste collection events eight times per year. The zip-top bag of recovered mercury, the cleanup tools and contaminated material should be taken to a Household Hazardous Waste collection event. If you break a mercury-containing thermometer or a fluorescent bulb, including CFLs, (compact fluorescent lamps) in your home; please visit the Environmental Protection Agency website for guidelines for clean-up. Some general response and clean-up tips are: - Never use a household vacuum cleaner (even one with a HEPA filter), broom or any type of towel to try to wipe or blot up the spill since it will only scatter and spread the mercury. - Keep children, pets and other persons out of the room where the spill occurred. - The affected room should be isolated from other rooms in the house by closing connecting doors. - Turn off the heat and any circulation systems in the house and open all windows in the affected room to ventilate it to the outdoors. - Never use household cleaning products to clean the spill, particularly products that contain ammonia or chlorine. These chemicals will react violently with mercury, releasing a toxic gas. - Remove all jewelry before beginning cleanup as the mercury will bind to gold and silver. - Prior to cleaning up the spill, put on old clothes or disposable coveralls, old shoes or disposable booties, and disposable rubber, latex, or nitrile gloves. These items may need to be disposed of after you have completed cleanup of the spill. Place clean clothes, shoes, and a trash bag just outside the room where the mercury spill occurred. - After cleaning up the spill, carefully remove your gloves by grasping them at the wrist and pulling them off inside-out. Place the gloves in the trash bag for disposal. If you were wearing disposable coveralls and booties, carefully remove these items and place them in the trash bag for disposal. - Any clothing or shoes that came in direct contact with the mercury should be placed in the trash bag. Clothing and shoes that did not come into direct contact with the mercury should be placed outdoors to air out. Once thoroughly aired out, they can be laundered as normal. - The tools used to clean up the spill (index cards, tape, eyedropper) should also be placed in the trash bag and the trash bag double wrapped in another trash bag.
<urn:uuid:49da62a8-36e0-44f8-a792-91bec87009a4>
CC-MAIN-2020-10
https://sheriff.loudoun.gov/345/Broken-Thermometers-Fluorescent-Bulbs-CF
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145529.37/warc/CC-MAIN-20200221111140-20200221141140-00446.warc.gz
en
0.912034
547
2.609375
3
2. Aflatoxins Affect African Food Exports, Experts Say Aflatoxin, a poisonous and cancer-causing chemicals produced by certain molds which grow in grains, is a barrier to food exports from Africa and threat to human health, according to a senior East African Community (EAC) official. This is mainly due to stringent regulations on Aflatoxin regulation, which limits how much produce enters the global market. “The entire African continent is susceptible to Aflatoxin contamination and that its high incidence continues to pose threat to human and animal health”, the EAC deputy secretary general in charge of Economic and Social Sectors, Ms Jesca Eriyo, said in a speech availed to The Citizen. She gave the warning in her keynote address to the Second Partnership for Aflatoxin Control in Africa (Paca) Platform meeting currently underway in Entebbe, Uganda. She quoted latest report by experts, who estimate that losses from Aflatoxin in Africa have escalated to the tune of $450 million each year due to stringent standards by the European Union (EU) alone. Ms Eriyo further warned that the poisonous chemical was one of the challenges that the African continent need to address in order to achieve global developmental aspirations such as the African Union (AU) Agenda 2063. The toxic material is regularly found in improperly stored staple commodities such as cassava, chili peppers, corn, cotton seed, millet, peanuts, rice, sorghum, sunflower seeds, tree nuts, wheat, and a variety of spices. Other development goals for the continent that may be affected by the toxic material include Sustainable Development Goals (SDGs), and the continental goals and targets contained in the 2014 African Union Heads of State Malabo Declaration on Accelerated Agricultural Growth and Transformation for Shared Prosperity and Improved Livelihoods. “EAC is also committed to the implementation of the Malabo Declaration. The overarching commitments in the Malabo Declaration include ‘Commitment to Ending Hunger in Africa by 2025’ and the Commitment to Boosting Intra-African Trade in Agricultural commodities and services. These commitments are pertinent to and of great relevance to the EAC integration process,” she said. Ms Eriyo, nevertheless, informed the conference participants that the EAC Aflatoxin Prevention and Control Initiative was launched in March 2014, with the overall focus of mitigating the adverse impacts of Aflatoxin along the food and feed value chains in the region.
<urn:uuid:a56bb287-7159-4018-89b3-ee390269a845>
CC-MAIN-2023-40
https://truhealthonline.com/aflatoxins-affect-african-food-exports-experts-say/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510730.6/warc/CC-MAIN-20230930213821-20231001003821-00844.warc.gz
en
0.943733
504
3.046875
3
A barcode is a series of parallel black bars and white spaces, both of varying widths. Each combination or sequence of bars and spaces is a code representing information such as product type, size, manufacturer, or origin of shipment. The barcode structure is shown in Fig. 1. Barcodes usually come in different sizes. The smaller the size of the barcode, the less the number of characters it can encode. 1D barcode, also called linear barcode, can hold around 8 to 25 characters. The bar patterns representing the data (numerical characters, alphabet, etc) are arranged from left to right. The barcode length defines the total length including the right and left quiet zones. The barcode height recommended is as high as the printer permits. It is recommended to keep the height greater than 15 percent of the barcode length. A barcode scanner uses an LED or laser as light source to capture the image of the barcode, and the decoder decodes and passes it on to a computer in traditional data format. A study has found that rapid fluctuations in light source seriously interfere with the barcode scanner, thereby degrading the reading performance. The interference typically generated in the LED driver by a switched mode power supply (SMPS) has frequencies up to several MHz that can seriously affect the barcode reading performance. However, so far there is no clear evidence or study that supports the external radio frequency signals affecting the performance of a barcode scanner.
<urn:uuid:ee807ae5-3f51-4efd-b12d-c23eb437e9e2>
CC-MAIN-2023-40
https://www.electronicsforu.com/technology-trends/learn-electronics/barcode-scanner-affected-light-radio-frequency-waves
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00104.warc.gz
en
0.929389
302
3.484375
3
On a normal day it would be another quiet morning in the sleepy north Romanian city of Comănești, but not today. Since sunrise, the calm has been broken by the deafening drumbeats of the band warming up, as they prepare for the big show. The show is called Ursul, The Bear Dance Festival, and is a ritual that symbolizes the death and rebirth of time. A tradition, preserved since ancient times that is still kept alive today. It is annual tradition which takes place every winter when New Year is approaching,in the rural area of the north-eastern Trotus Valley. Men and women of all ages dress in bear skins and dance to the rhythm of flutes and percussion to drive away evil spirits and welcome the New Year. The origins of Romania’s bear dance date back to the pre-Christian times when gypsies, who had originally migrated from India, would descend from the forests bringing with them bears which would dance to entertain the crowds. They would also visit every house to bring luck and protection in exchange for scraps of food and liquor. While this tradition is still observed in many villages, in cities like Comanesti it also takes the form of a parade. Hundreds of spectators approach and position themselves on the side of the roads waiting for the parade. Children blow colorful horns, others immerse their faces in enormous pink cotton candy. They are heralding the arrival of the people who spent the night preparing their costumes and are now ready to parade these through the town. Here they are. It is a thrilling moment. Groups of enormous bears pour out from the back of old vans. It is only a matter of minutes and the City Hall square is filled with them. They quickly line up one after another in order from smallest to largest. In front of them, in red uniform and black leather boots, the tamers start to lead the procession down the village streets. The bears march and dance following his commands with precise movements set by the rhythm of pan flutes and hypnotizing large tambourines. They roar loudly mimicking the sound of a bear,swinging the enormous head, imitating their gait and movements. The two blood-red tassels pinned to each shoulder sway from sideto side, but it is not at all as easy as it seems. In fact, the furs can weigh over 40 kilos and to give the idea of a natural and graceful movement, the dancers have to make a superhuman effort. Even though they have been practicing for months before today’s ceremony, people are sweating and straining inside those skins. During the ceremony, several acts are played. At the beginning the bear tamers hit the bears with whips made from horse hair. In the central act the bears pretend to roll over and die before they are miraculously resurrected in a symbolic dramatization of nature rebirth. In the final act, one of the bears is lifted on a stick by two other characters. The last parade group are the noisiest. Characters dressed as women, wearing colorful and fluorescent dresses with bells all over them. Their clothes are impregnated by the smell of the acetylene from the homemade plastic guttering carbide cannons that they carry around. As soon as they fire them, the explosion stuns you and your whole body is rocked by the noise. If you don’t manage to cover your ears in time, you can be sure that you will be left with a whistle, such is the strength of the blast. The noise is incredibly loud and it never stops. Sometimes a strong smell of alcohol hits me. It is the smell of Țuică de prune that comes out of plastic bottles hidden inside the brown fur. Another kind of spirit of which people are not scared of. We are all directed towards Parcul Central, the main square in the center. Each troupe there, will perform on the stage and a group of judges are going to vote on the best performance. They will judge on the quality of their skins, their costumes and the dancing. The most beautiful scenery will also be rewarded. Wearing these skins may seem like a sadistic act against such a rare andprecious being but people really respect and love this creatures. Bears aresacred creatures in Romanian mythology and it is believed that the life cycleof these animals are responsible for the changes of the seasons due to theiralmost mystic ability to reappear after winter and their hibernation. It is an ancient ritual that bringstogether the whole community, as they gather to watch the performance. Tradition holds it close to theirhearts.
<urn:uuid:f9fb5df6-690c-4029-8e83-188b05fbdada>
CC-MAIN-2023-23
https://www.maurodebettio.com/chasing-spirits
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657169.98/warc/CC-MAIN-20230610095459-20230610125459-00549.warc.gz
en
0.96734
962
2.8125
3
Soil has a vital position in life on this planet. All living things are closely associated with earth as they are necessary for meals and growth. However, each and every garden soil is not really replenished much like the earth from the crazy, which happens to be rich in nutrition as a result of many years of plant decay and animal excreta. Imagine you happen to be planning for a garden. A nutrient garden soil is actually a base because of it. Your roadside garden soil will not be enough to help make plant life grow. Therefore, get a large sack of soil (storsäck jord) if you plan your backyard within your yard. Before buying the dirt, comprehend the nutrients and vitamins needed and discover the perfect 1 for your personal backyard. Nutrients and vitamins necessary for the garden soil Hummus and Manure Organic matter is essential to the dirt because it fixes numerous excellent harmful bacteria and nutrition. It is actually either created in the wilderness with several years of decay of rotten foliage and old pets or homemade as garden compost. Phosphorous Potassium and Nitrogen They are the vital trio for vegetation rise in any dirt. That is why one can use them maximum in fertilizers. Nitrogen is essential to herb expansion and enhances healthy proteins content inside the grow. Phosphorus will help exchange energy from sun light to plants and flowers and helps in maturity. As well, potassium enhances the immune system and illness opposition of the plant. Other vitamins, for example calcium supplements, magnesium, sulfur, iron, and so on., may also be necessary in mini amounts. The pH in the Earth This really is important to retain the infertility of your dirt. The earth pH must ideally maintain all the different 6 to 7, which is neither alkaline nor acid. In the event the pH is not really well balanced, you might have to work with several substances so it will be natural. Garden soil is definitely the vital element of vegetation lifestyle. Healthful vegetation expand in source of nourishment-rich garden soil. As a result, purchase sacks of nutrient-rich garden soil, put them to the peak level of the backyard and then make the soil ready for plants and flowers.
<urn:uuid:929f4687-5596-4b2f-955f-b13d9204c47d>
CC-MAIN-2023-40
https://www.maria-ghinea.com/the-nutrients-needed-in-soil/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511424.48/warc/CC-MAIN-20231004220037-20231005010037-00135.warc.gz
en
0.930732
454
2.75
3
Morton’s neuroma is a condition that affects one of the nerves that run between the long bones (metatarsals) in the foot. The exact cause is not certain. Symptoms include pain, burning, numbness and tingling between two of the toes of the foot. About a quarter of people just need simple treatments including modification of their footwear. Sometimes surgery is needed for long-standing (chronic) symptoms. Some say that this condition should not be called Morton’s neuroma as, in fact, it is not actually a neuroma. A neuroma is a non-cancerous (benign) tumour that grows from the fibrous coverings of a nerve. There is no tumour formation in Morton’s neuroma. The anatomy of the bones of the foot is also thought to contribute to the development of Morton’s neuroma. For example, the space between the long bones (metatarsals) in the foot is narrower between the second and third, and between the third and fourth metatarsals. This means that the nerves that run between these metatarsals are more likely to be compressed and irritated. Wearing narrow shoes can make this compression worse. Pain is usually increased by forefoot weight bearing activities (such as running), with narrow-fitting footwear, or with high heeled shoes. It is usually painful to firmly touch the affected region and, in chronic cases, pain and sometimes an audible click, may be heard when squeezing the foot and toes together with the hand. Often a localized area of swelling may be evident at the site of injury. The exact cause of Mortons neuroma can often vary between patients. An accurate diagnosis must be carefully made by the podiatrist through thorough history taking and direct questioning to ensure all possible causes are addressed. The podiatrist will also gather further information about the cause through a hands on assessment where they will try to reproduce your symptoms. A biomechanical and gait analysis will also be performed to assess whether poor foot alignment and function has contributed to your neuroma. Non Surgical Treatment In most cases, initial treatment for this condition consists of padding and taping to disperse weight away from the neuroma. If the patient has flatfeet, an arch support is incorporated into footwear. The patient is instructed to wear shoes with wide toe boxes and avoid shoes with high heels. An injection of local anesthetic to relieve pain and a corticosteroid to reduce inflammation may be administered. The patient is advised to return in a week or 2 to monitor progress. If the pain has been relieved, the neuroma is probably small and caused by the structure of the patient’s foot and the type of shoes the patient wears. It can be relieved by a custom-fitted orthotic that helps maintain the foot in a better position. Another type of therapy that may be used is alcohol sclerosing injections. In this treatment, the doctor injects a small amount of alcohol in the area of the neuroma area to help harden (sclerose) the nerve and relieve the pain. Injections are given every 7-10 days and, in many cases, 4-7 injections are needed for maximum relief. Please ask your physician for more information regarding this type of treatment. If pain persists with conservative care, surgery may be an appropriate option. The common digitial nerve is cut and the Mortons neuroma removed. This will result is numbness along the inside of the toes affected, and there is a small chance the end of the nerve will form a Stump Neuroma. Approximately 75% of people receive symptom resolution for Mortons Neuroma with conservative care. To help reduce your chance of developing Morton’s neuroma avoid wearing tight and/or high-heeled shoes. Maintain or achieve ideal body weight. If you play sports, wear roomy, properly fitting athletic footwear.
<urn:uuid:e14af62a-a0f2-4f4a-86cf-903c19ccb31a>
CC-MAIN-2017-43
https://tandrafoston.wordpress.com/2017/06/06/mortons-neuroma-treatments/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823214.37/warc/CC-MAIN-20171019012514-20171019032514-00260.warc.gz
en
0.938735
801
2.984375
3
Well-being is a multidimensional concept, for countries as well as for individuals. Thus, in the recent OECD report "How's Life 2015: Measuring Well-Being," the emphasis goes well beyond basic one-dimensional measures of well-being like per capita GDP and offers comparisons across a range of measures of well being for the countries that are members of the OECD. The OECD membership includes 34 countries. It includes the US and Canada, many countries across western and eastern Europe, Japan and Australia, and a few others additions like Korea, Israel, Mexico, and Chile. Thus, it would be fair to say that it includes mostly the high-income countries of the world. The OECD is a combination think-tank and forum: it collects a wide range of data and publishes reports, but it has no power beyond its own reputation for accuracy and even-handedness. In the calculations shown here, each measure of well-being is expressed in "standard deviations," which in case your statistics is a little rusty, can be used to look at how far a value is from the average. If you plot each of these statistics for the 34 countries of the OECD, most of the countries will tend to bunch fairly near the average value, while a few countries will be higher or lower. The OECD notes that for these statistics, about two-thirds of 34 countries will be between -1 and +1 standard deviations of the mean value. Thus, about five countries will be above +1 and another five will be below -1. So when you read these charts for various countries, they are basically telling you if a country is pretty close to the average for the high-income countries of the world, or whether it really stands out from the average. Here's what the US looks like in this framework.. For household income and financial wealth, the US is an extreme outlier in comparison to the OECD peer group with values above 2. The US also stands out in earnings, rooms per person, housing affordability, educational attainment, and perceived health. However, the US stands out in a negative way in categories like time off, adult skills, and deaths due to assault. The chart for France made me smile. Overall France is even closer to the OECD average on most of these measures that Germany. France stands out a bit on household income, voter turnout, and life expectancy. But by these measures, the most striking difference for France is the large amount of time off!
<urn:uuid:59d8df1d-8f82-41a9-93ff-5a4550fe2ddb>
CC-MAIN-2020-10
http://conversableeconomist.blogspot.com/2015/11/snapshots-of-well-being-across-high.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144722.77/warc/CC-MAIN-20200220100914-20200220130914-00270.warc.gz
en
0.956831
502
2.984375
3
Experimental investigations of lip motion in brass instrument playing Stevenson, Samuel D. F. MetadataShow full item record The precise nature of the motion of the lips of the musician is critically important to the sound of the brass wind instrument. The player must match the oscillation of the lips to the acoustical properties of the instrument and it can take many years of practice to master the techniques involved. Visualisation techniques for capturing the motion of the lips during performance are described and the behaviour of the lips quantitatively analysed using digital image analysis. The concept of an artificial mouth for the sounding of brass wind instruments is discussed and the motion of the artificial lips is compared to that of human musicians. When a brass instrument is played loudly the energy of the higher harmonics increases, creating a distinctive ‘brassy’ timbre. It has been suggested that saturation or constraint of the lips of the musician during extremely loud playing is responsible for this change in sound. Measurements of the motion of the lips of a number of different musicians on different instruments suggest that the lips are not significantly constrained at any playing dynamic, and that it is the phenomena of nonlinear propagation and shockwave generation that is responsible for the increase in energy of the higher harmonics. It is widely accepted that the starting transient of a musical instrument is of great importance to both listener and musician. Previous studies of brass instruments have focused on the steady-state behaviour of the lip-instrument interaction. Measurements of the motion of the lips have been synchronised with the pressure in the mouthpiece of the instrument and the sound radiated from the bell in order to investigate the transient behaviour of the system during both the starting transient and slurs between notes. Thiswork has been extended to include measurements of the pressure in the mouth of the player during the starting transient, and this information used to recreate realistic transients using an artificial mouth. The transient behaviour of the system is clearly affected by the time delay between the start of the note and the acoustical feedback from the instrument beginning. The information obtained can be used to aid in the creation of accurate computational and physical models of brass wind instruments.
<urn:uuid:def9819c-b9d9-434f-a4b7-0dd7cbe1af7d>
CC-MAIN-2017-30
https://www.era.lib.ed.ac.uk/handle/1842/4349
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424088.27/warc/CC-MAIN-20170722162708-20170722182708-00633.warc.gz
en
0.939305
435
3.140625
3
Intel Corporation (commonly known as Intel) is an American multinational corporation and technology company headquartered in Santa Clara, California. It is one of the world's largest semiconductor chip manufacturer by revenue, and is one of the developers of the x86 series of instruction sets found in most personal computers (PCs). Incorporated in Delaware,Intel ranked No. 45 in the 2020 Fortune 500 list of the largest United States corporations by total revenue for nearly a decade, from 2007 to 2016 fiscal years. Intel supplies microprocessors for computer system manufacturers such as Acer, Lenovo, HP, and Dell. Intel also manufactures motherboard chipsets, network interface controllers and integrated circuits, flash memory, graphics chips, embedded processors and other devices related to communications and computing. Intel (integrated and electronics) was founded on July 18, 1968, by semiconductor pioneers Gordon Moore (of Moore's law) and Robert Noyce (1927–1990), and is associated with the executive leadership and vision of Andrew Grove. Intel was a key component of the rise of Silicon Valley as a high-tech center. Noyce was a key inventor of the integrated circuit (microchip). Intel was an early developer of SRAM and DRAM memory chips, which represented the majority of its business until 1981. Although Intel created the world's first commercial microprocessor chip in 1971, it was not until the success of the personal computer (PC) that this became its primary business.
<urn:uuid:325ab275-2812-42d0-9523-a6e8b3661971>
CC-MAIN-2023-40
https://www.rblt.com/company/intel
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511055.59/warc/CC-MAIN-20231003060619-20231003090619-00659.warc.gz
en
0.960963
298
2.5625
3
Archaeological evidence of continuous occupation of the Southwest Maputo Province, Mozambique Décio Muianga, an archaeologist from Mozambique, visited the University of Mpumalanga in Mbombela, South Africa, as a PAGES Inter Africa Mobility (IAM) Research Fellow. From 1 March to 3 April 2023, he analyzed lithic stone tools recovered from the excavation at Daimane site in southern Mozambique and compared these with stone tool collections from Mpumalanga province to better understand the technocomplexes, and dietary and subsistence changes that occurred during the Middle- and Late Stone Age. Stone Age archaeological background in Mozambique Mozambique is located in southeastern Africa and lies between two geographical areas, southern and eastern Africa, where the major developments of human evolution occurred during the Pleistocene and Holocene (Lombard et al. 2012; Mitchell 2012). Evidence of these cultural changes can be found at different sites throughout the country, particularly in southern Mozambique, which is rich in locations with lithics and ceramic remains (Kohtamäki and Badenhorst 2017; Menezes 1999; Muianga 2020; Saetersdal 2004). However, detailed and systematic studies of sequences with well-preserved deposits have not yet been performed. Thus, the Daimane site (Kohtamäki 2014) is a large and intact archaeological sequence that has not been systematically investigated and compared with many open-air sites from diverse chronological periods scattered across the landscape. Aims of the project The main objective of the lithic analysis at the University of Mpumalanga was to decipher the rich archaeological record of stone tools and artifacts, contributing to a deeper understanding of human prehistory in the region, and its relevance to the broader narrative of human evolution. The specific research questions whilst at the University of Mpumalanga were: - What are the key lithic industries and typologies associated with the Middle Stone Age and Late Stone Age in the Lower Lebombo range in southern Mozambique? - How can the archaeological sequence of the Stone Age deposits of the Daimane shelter, and the association with the surrounding open-air sites, contribute to the chronology of occupation in the area? Answers to these questions will provide a better understanding of the different early inhabitants of the southeastern tip of Africa, and how the environment influenced the production and changes of the archaeological data recovered from excavations. They will also provide more evidence of lithic development analysis in southern Africa. Research activities at University of Mpumalanga The lithic analysis (including typological analysis and microscopic residue identification) of some of the stone artifacts recovered from the excavations in the Daimane II rock shelter was performed at the of University of Mpumalanga laboratory, and supervised by Dr Tim Forssman. These analyses, and comparisons of Stone Age tools (from Mozambique and South Africa), showed some similar typological features, as well as differences, in raw material selection by past hominids. The typological features, and the different technological complexes, were also documented with formal (stone tools used by hominids such as blades, scrapers, segments, etc) and informal (stone debris discarded during the production of formal instruments) tools identified, which correspond to different chronological periods of lithic production by hominids (Fig. 1). Besides the study of the artifacts described above, several sites in rock shelters in the Mpumalanga province were also visited, and large collections of lithics and rock paintings were analyzed for comparative purposes. Figure 1: Two lithic tools made out of jasper using the bipolar technique. Photo credit: Décio Muianga. Conclusions, outcomes and future plans The PAGES-IAM Research Fellowship enabled the analyses of parts of the lithic collections from the Daimane II. Lithic analysis has revealed a progressive increase in technological complexity over time, from the Middle Stone Age to the Late Stone Age. This is evident in the development of more refined tool forms, improved raw material procurement strategies, and enhanced manufacturing techniques. Another aspect the analysis revealed is the diversity of geological raw materials identified, not only in the excavated materials corresponding to the Middle-to-Late Stone Age transition, but also during the period of economy based on hunting and gathering, which continued until the 1800s in Mozambique and South Africa. Four publications about different aspects of the current research are currently in preparation, and they will be submitted to peer review journals. The evidence of this complex process of occupation is well preserved in the archaeological deposits of the Daimane rock shelter. Thus, more chronological dating (e.g. radiocarbon, phytoliths, optically stimulated luminescence) and mineralogical analysis of the ceramics, and faunal remains analysis are underway. These results will bring forth a key contribution to understanding the long sequence of the Daimane site. Many thanks to Dr. Tim Forssman and to all the staff members and students who made my stay enjoyable during the four weeks in the laboratory, and while visiting the sites in Mpumalanga. 1Department of Archaeology and Anthropology, University Eduardo Mondlane, Maputo, Mozambique 2Department of Archaeology and Ancient History, Uppsala University, Sweden 3Kaleidoscopio, Maputo, Mozambique
<urn:uuid:4b712d77-6643-43bb-8f78-44c3cf2f08c7>
CC-MAIN-2023-50
https://pastglobalchanges.org/publications/pages-magazines/pages-magazine/137447
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00682.warc.gz
en
0.932157
1,126
2.796875
3
Many civilizations have transferred their capital, erected new, back in the old, many were lost in time and covered with oblivion. Such a fate has befallen Ayutthaya, the ancient capital of Siam a beautiful state. Today, the ancient city is protected by UNESCO and included in the World Heritage List, making last-minute trips to Thailand are very popular in any season. In its heyday the population of Ayutthaya was about one million inhabitants. The city had three royal palace, more than 400 different churches, fortified walls and forts. Ayutthaya was founded in 1350, King Rama Thibodeau first. The city has experienced wars and cataclysms, and finally fell only under pressure from Burmese invaders. City-museum visit, while in Thailand, be sure to. Preserved temples, the Grand Palace, the statue of the reclining Buddha, will leave a lasting impression. Many buildings within the retained their unique decoration mysterious aura of the time through which, of course, is to pass. The city has preserved many legends and stories, one of which one cannot tell. Longtime enemies of the Thais, Burmese, Siamese erected on the throne of his protege, and his young son as a hostage was taken to Burma. In Burma hostage – Naresuan was the name of the boy met a Burmese prince. The boys became good friends, and regarded themselves as blood brothers. As time passes, Naresuan returned to his homeland, where just a rebellion broke out against the Burmese. Former hostage, led a revolt, and was nicknamed “The Black Prince” because of his fearlessness and valor. The main battle friends converged on the battlefield, and Naresuan killed his friend. Bitterly he mourned his act “Black Prince”, but he had chosen his people and his homeland. But this act is still not able to influence the course of the history of Ayutthaya. Within just 20 years, the city finally fell to the Burmese people, and this time for good.
<urn:uuid:d3dd2db8-dd56-4bcd-86db-0b83f88c71a5>
CC-MAIN-2020-29
http://tusharshuvro.com/ayutthaya-ancient-capital-thailand/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655908294.32/warc/CC-MAIN-20200710113143-20200710143143-00270.warc.gz
en
0.98014
439
3.109375
3
Oral health can be an additional, modifiable risk factor for high risk COVID-19 patients. The correlation between poor oral health and COVID-19 severity, as well as the correlation between oral health and delayed recovery, demonstrates a potential need to consider oral health an additional risk factor for cardiac patients who may contract COVID-19. The new sub-study, examining Egyptian cardiac patients, will be presented at ACC Middle East 2021, a hybrid meeting held in partnership by the American College of Cardiology, Egyptian Society of Cardiology, and the ACC Egypt Chapter on October 14-15, 2021. The oral cavity is a potential reservoir for respiratory pathogens. Previous trials have linked poor oral hygiene with increased inflammation and cardiovascular disease. According to the researchers, COVID-19 severity has also been linked to an inflammatory response. The researchers hypothesized that increased COVID-19 severity may be linked to poor oral health status, especially in patients with cardiovascular diseases. According to the study authors, the study assessed oral health status, severity of COVID-19 symptoms, C-reactive protein (CRP) levels and duration of recovery. “Oral tissues could act as a reservoir for SARS-CoV-2, developing a high viral load in the oral cavity. Therefore, we recommended maintenance of oral health and improving oral hygiene measures, especially during COVID-19 infection,” said Ahmed Mustafa Basuoni, MD, cardiology consultant at Cairo University and lead author of the study. “Simple measures like practicing proper oral hygiene, raising awareness of oral health importance either in relation to COVID-19 infection or systemic diseases by using media and community medicine, regular dental visits, especially in patients with CVD, and using [antimicrobial] mouthwashes [could help in] preventing or decreasing the severity of COVID-19 disease.” The study included 86 Egyptian heart disease patients with a confirmed COVID-19 PCR test. Using a questionnaire, researchers from Cairo University assessed oral health and COVID-19 severity. An oral health score was used to determine the effect of oral health on COVID-19. Data on CRP levels and COVID-19 PCR tests were collected via the questionnaire and confirmed via medical records. CRP levels are used to determine when there is inflammation in the body. According to the researchers, the correlation between oral health and COVID-19 severity showed a significant inverse relationship, as did the correlation between oral health with recovery period and CRP values. Poor oral health was correlated to increased values of CRP and delayed recovery, especially in patients with cardiac diseases. “Oral health should be a part of routine history taking and examination in cardiac patients,” Basuoni said. “Lifestyle measures should be instructed to all cardiac patients regarding good oral hygiene with regular dental visits. We need to give more space in research for these risk factors which can be easily modified.” Meeting: American College of Cardiology Middle East 2021 Sᴛᴀʀᴛ ᴡᴏʀᴋɪɴɢ ғʀᴏᴍ ʜᴏᴍᴇ! Gʀᴇᴀᴛ ᴊᴏʙ ғᴏʀ Ever, sᴛᴀʏ-ᴀᴛ-ʜᴏᴍᴇ ᴍᴏᴍs ᴏʀ ᴀɴʏᴏɴᴇ ɴᴇᴇᴅɪɴɢ ᴀɴ ᴇxᴛʀᴀ ɪɴᴄᴏᴍᴇ… Yᴏᴜ ᴏɴʟʏ ɴᴇᴇᴅ ᴀ ᴄᴏᴍᴘᴜᴛᴇʀ ᴀɴᴅ ᴀ ʀᴇʟɪᴀʙʟᴇ ɪɴᴛᴇʀɴᴇᴛ ᴄᴏɴɴᴇᴄᴛɪᴏɴ… Mᴀᴋᴇ $100 ʜᴏᴜʀʟʏ ᴀɴᴅ ᴜᴘ ᴛᴏ $13000 ᴀ ᴍᴏɴᴛʜ ʙʏ ғᴏʟʟᴏᴡɪɴɢ connection ᴀᴛ ᴛʜᴇ ʙᴏᴛᴛᴏᴍ .Yᴏᴜ ᴄᴀɴ ʜᴀᴠᴇ ʏᴏᴜʀ ғɪʀsᴛ ᴄʜᴇᴄᴋ ʙʏ ᴛʜᴇ ᴇɴᴅ ᴏғ ᴛʜɪs ᴡᴇᴇᴋ…► 𝐖𝐰𝐰.𝐄𝐱𝐭𝐫𝐚𝐑𝐢𝐜𝐡𝟏.𝐜𝐨𝐦
<urn:uuid:2aecf784-4da2-4212-9273-93c2660702c9>
CC-MAIN-2023-14
https://scitechdaily.com/poor-oral-health-may-impact-covid-19-severity-especially-for-heart-patients/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949181.44/warc/CC-MAIN-20230330101355-20230330131355-00385.warc.gz
en
0.92438
1,234
2.609375
3
From University of Wisconsin-Madison Gender differences possible root of sleeping disorder MADISON -- Gender hormones may be a key factor in the onset of a common human disorder called sleep apnea, suggest findings from a new study by researchers at the University of Wisconsin-Madison's School of Veterinary Medicine. Sleep apnea, which typically occurs when the tongue blocks the airway during sleep, affects more than 18 million Americans, a majority of whom are middle-aged men. UW-Madison scientists Andrea Zabka and Mary Behan studied how age affects a female rat's response to hypoxia, or oxygen deprivation, and compared the results to those from a previous study focusing on male rats' responses. The gender-specific responses, they found, are completely different. In the earlier study published last summer, the researchers deprived male rats of oxygen for brief periods and then monitored nerve activity from the brain to the tongue and diaphragm, two major muscles involved in respiration. The results showed that young and middle-aged rats reacted differently to hypoxia. "A normal, young male rat will respond to episodic hypoxia by actually increasing its output of neuronal activity to the muscles," says Behan. The increased activity, which leads to deeper and more frequent breaths, can protect the body from future episodes of hypoxia. But, as the results showed, only young male rats had a hyped-up protective response. "The older male rats didn't respond in the same way," says Behan. "Their neuronal activity was the same as before hypoxia." Zabka and Behan, wondering if age would affect the respiratory control of female rats in a similar way, started a new study, the results of which are published in the December issue of the Journal of Applied Physiology. Now, the researchers compared the respiratory long-term facilitation -- plasticity in each rat's neuronal response to episodic hypoxia -- of young female rats to middle-aged ones. Additionally, they monitored LTF in female rats during two stages of their estrus cycle. "Looking at male and female rats side-by-side, they're totally different," Behan notes. "With aging, the female rats, unlike the males, had an increased response to episodic hypoxia," Zabka adds. In other words, older female rats had an improved protective reaction to oxygen deprivation. Plus, female rats during one stage of their reproductive cycle had an even better response. This result, says Zabka, suggests that female gender hormones definitely play a role in the female's response to hypoxia. "This raises the possibility that male gender hormones might also be playing a role in the male's response," she adds. Behan says, "When you see a difference between males and females, the first thing you need to consider is hormones." Hormones, particularly the female gender hormone estrogen, influence serotonin, a chemical in the brain that transmits nerve signals. "We know from the literature," says Behan, "that serotonin levels change during the estrus cycle." When estrogen levels are higher, so too are serotonin levels. To confirm this, Zabka and Behan removed the ovaries from rats, thus depleting estrogen levels and mimicking the effects of menopause. When the researchers measured the amount of the chemical found in the region of the brain controlling the tongue, they found less serotonin. Less serotonin, says Zabka, directly impacted how well the rats responded to hypoxia. "We now have data to support that gender hormones influence the neurocontrol of breathing in female rats," Behan adds. That gender hormones control something as fundamental as breathing is a new idea. "When you think of the benefits of estrogen, you think of protecting the body against osteoporosis, Alzheimer's disease and depression," Zabka explains. "No one thinks of breathing." But, as the latest research shows, female rats with greater levels of estrogen have better responses to LTF, possibly protecting them against future episodes of hypoxia. These findings help explain the common human disorder called obstructive sleep apnea. Potentially fatal, this sleeping disorder occurs when air doesn't flow into a person's airway, usually because the tongue or other muscles near the airway relax and block it. Apnea's side effects -- heavy snoring, brief periods of hypoxia (up to 60 per hour) and frequent awakenings -- can lead to high blood pressure, daytime sleepiness, poor concentration and sexual dysfunction. Epidemiological evidence shows that middle-aged men are more likely than middle-aged women to develop sleep apnea. Such evidence also shows that the incidence in women increases after they reach menopause, a period marked by lower levels of estrogen. Post-menopausal women on hormone replacement therapy, however, are less likely to have sleep apnea. "The data in humans is very compelling," says Behan. "And the similarities between our findings and the evidence of sleep apnea in humans are striking." Though the research by Zabka and Behan did not directly investigate obstructive sleep apnea, it does point to gender hormones as a possible cause. "We are investigating the underlying mechanisms of respiratory control," says Zabka, "that will give us better insight into the underlying mechanisms of breathing disorders that have a distinct gender and age pattern." In a study already underway, Zabka and Behan turn their attention back to male rats to examine the role of testosterone in respiratory control. Their research is funded by a five-year, $1.25 million grant from the National Institute of Aging, part of the National Institutes of Health. ADDITIONAL CONTACTS: Mary Behan (608) 263-9833, email@example.com; Emily Carlson (608) 262-9772, firstname.lastname@example.org
<urn:uuid:284a40cc-5b77-4a68-aec8-1f46216f0a63>
CC-MAIN-2014-15
http://www3.scienceblog.com/community/older/2001/E/200115748.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223210034.18/warc/CC-MAIN-20140423032010-00355-ip-10-147-4-33.ec2.internal.warc.gz
en
0.950242
1,231
2.875
3
The Chicago Blackhawks are the first vitamin D team in modern professional sports history. According to my sources, the Chicago Blackhawk team physicians began diagnosing and treating vitamin D deficiency in all Blackhawk players about 18 months ago. Apparently, most players are on 5,000 IU per day. After many losing seasons, last year the Blackhawks came out of nowhere to get to the Western conference finals. This year they are playing even better. According to my sources, improved athletic performance is only one of the benefits for the Blackhawk players. The other is a reduction in the number and severity of colds and flu and a reduction in the number and severity of repetitive use injuries. Six months ago, Runner’s World published a story on vitamin D and physical performance. A year ago, the flagship journal of the American College of Sports Medicine was the first journal to publish the theory that vitamin D would improve athletic performance. However, readers of this newsletter first learned about it in the March 2007 edition of our Vitamin D Newsletter, entitled Peak Athletic Performance and Vitamin D. I can only hope that, if the Blackhawks win the Stanley Cup this year, other teams, from high school to professional, may start paying attention to the vitamin D status of their players. That would be a big boost to the Council’s goal of educating the world about the importance of vitamin D.
<urn:uuid:00b6e23f-1839-4898-a8da-4322f556ce56>
CC-MAIN-2014-41
http://www.vitamindcouncil.org/newsletter/newsletter-vitamin-d-and-the-chicago-blackhawks/
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657133564.63/warc/CC-MAIN-20140914011213-00241-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.942683
281
2.546875
3
Switching Between Displaying Formulas and Their Values on a Worksheet When building a worksheet, you can create complex formulas up to 8,192 characters in length. Even if your formulas are far shorter, you may prefer not to see them so that you can focus on the data in your worksheet. You can press “Windows” and the "`" or grave accent key -- to the left of the "1" on your keyboard -- to toggle formulas on and off, but you also have the option to prevent others from doing this by protecting cells and hiding their formulas. Protect and Hide Formulas Open an Excel worksheet that has formulas you would like to protect and hide. "Press "Alt-A" and right-click any cell. Click "Format Cells" and then click the "Protection" tab that appears in the Format Cells dialog window. Remove the check mark from the "Locked" check box and click "OK." Select the cells whose formulas you wish to hide and right-click one of the cells. Select "Format Cells" to reopen the Format Cells dialog window. Click “Protection” and add a check mark to the “Locked” and “Hidden” check boxes. Click “OK | Review | Protect Sheet.” Click to insert a check mark in the box next to "Protect Worksheet and Contents of Locked Cells." Type a password in the "Password to Unprotect Sheet" text box if you want to prevent others from protecting the worksheet without supplying that password. Click "OK" to save the changes. Unhide Formulas and Turn Off Protection Click "Review" and select "Unprotect Sheet." Enter the password you created if you used one to protect the worksheet. Select the cells you want to unhide, right-click one of the cells, and then click "Format Cells." Remove the check mark from the "Hidden" check box and click "OK." - When you create a password to protect your worksheet's formulas, Excel always prompts you for that password whenever you edit the worksheet. - You also can toggle unprotected formulas on and off by clicking "Formulas" and then clicking the "Show Formulas" button. - Creatas Images/Creatas/Getty Images
<urn:uuid:fe57e60e-b58a-4330-a0b7-a234adadcb3b>
CC-MAIN-2017-26
http://yourbusiness.azcentral.com/switching-between-displaying-formulas-values-worksheet-26769.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320865.14/warc/CC-MAIN-20170626203042-20170626223042-00236.warc.gz
en
0.862582
479
3.359375
3
Code of Courtesy OMC is committed to teaching the whole child. This means that in addition to our focus on academics, students are taught to be responsible members of society. We are a strong academic school, but it is just as important that we teach students how to be good human beings. This commitment is embodied by the Code of Courtesy. The Code of Courtesy was created by OMC teachers over 10 years ago to help students develop ever increasing levels of respect for one’s self and others. The goal is to promote responsibility in the educational process and an understanding of the value of putting forth one’s best effort in all things. The Code of Courtesy has three themes: - Be Respectful - Be Responsible - Do Your Best As with their schoolwork, the expectations of behavior addressed in the Code of Courtesy becomes more encompassing with each new grade. Students learn principles related to each theme beginning in kindergarten, and then add new ones every year. Each classroom displays a chart dedicated to the three themes, and a list of age-appropriate principles that apply to implementing each theme. There are just a few principles in Kindergarten. As a child progresses, new principles are added until eighth grade where there is an extensive list. Every trimester four students in each grade are awarded a pin for best exemplifying the Code of Courtesy themes (one pin for each of the three themes plus a fourth award for overall leadership). Students wear the pins on their uniforms for the next term so they can be recognized for this special achievement.
<urn:uuid:e7a351e3-c2e2-4a21-a1c9-600ce078f92e>
CC-MAIN-2017-43
http://school.omcparish.com/school-section-1/code-of-courtesy/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823229.49/warc/CC-MAIN-20171019050401-20171019070401-00429.warc.gz
en
0.961382
318
2.953125
3
|Minimum Order Quantity||1 piece| |Capacity (KLD/MLD)||2 KLD - 1 MLD| |Application Industry||Pharmaceutical & Chemicals| |Inlet Flow Rate(m3/day or m3/hr)||1000 m3/day| |Treatment Technology||Mixed Bed Bio Reactor(MBBR)| |Material Of Construction||Stainless Steel| |Water Source||Industrial Effluent| |Deliver Type||PAN India| |Treatment Stages||Secondary Treatment, Primary Treatment| |I Deal In||New Only| |Installation Type||Containerized Plug & Play| |Country of Origin||Made in India| The working principle of the Effluent Treatment plant(ETP) is undertaken to be one of the most effective principles used in an Effluent Treatment plant(ETP) where a large amount of human-friendly chemicals is used that is applied to the water to make it free from all the factors that might be harmful to human and aquatic life. This is an important part of ETP that can be highlighted that helps to highlight that the working principles vary in several ways, furthermore, with the service of etp plant. Effluent Treatment plant(ETP) is a wastewater treatment process (WWTP) that is used to treat wastewater. It's mostly used in industries like pharmaceuticals, textiles and chemicals where extreme water contamination is a possibility. Hydro Flux Engineering provides effluent treatment solutions for various types of industrial and domestic waste water discharges. The effluent treatment plant falls under this category as their common name etp plant, etp, effluent sewage treatment plants, common effluent treatment plant, Effluent Treatment Plant of Dairy, Effluent wastewater treatment plant, effluent treatment plant. Effluent treatment plant are called in this way as their common name effluent treatment system, etp,etp plant, Effluent wastewater treatment plant, mbr etp plant, effluent treatment plant for textile industry, effluent treatment plant system, Effluent Treatment For Rice Mills, effluent sewage treatment plants, common effluent treatment plant, Effluent Treatment Plant of Dairy Wastewater, Wastewater Treatment in Dairy Processing, effluent treatment system, effluent treatment plant , etp water plant, effluent treatment, etp manufacturer, best etp plant, best effluent treatment plant, common etp, effluent treatment system plant, industrial Effluent treatment, industrial Effluent treatment system, industrial Effluent treatment plant, textile effluent treatment system, manufacturing of etp, effluent water treatment plant
<urn:uuid:a435904c-4458-4a70-a435-afa99e5a565d>
CC-MAIN-2023-14
https://www.hydrofluxengineering.com/industrial-effluent-treatment-plant.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00314.warc.gz
en
0.796626
566
2.875
3
This will change the way you teach flowcharts! We all know that planning a program before coding is a sign of mastery and is a skill rewarded by marking schemes on NEA projects and exams. It is a sure sign of a non-confident coder when the first thing they do upon receiving a problem is open up their IDE and start writing lines of code. Unless the problem is extremely similar to something they have recently done, it’s a way to frustration. It is much faster to create a plan, think through the steps and change them if needed, rather than attempt to write the code, your thinking process interrupted by trying to remember the syntax, then not get the desired results and wonder if it’s the syntax or the logical error. You can see the person at this stage trying to randomly change/append the code hoping that something sticks. This is not helpful for the exam practice and very wasteful with 20 hours given for the current assessment cycle. Enter planning, either in pseudocode or flowcharts. We will concentrate on the interactive flowcharting tool called Flowgorithm which then has an amazing feature of generating decent pseudocode, or in fact, actual code for a number of the most popular languages. You can get a portable version here (requires no installation and works off the memory stick or a network shared area), or a full installation here. [UPDATE, here is a link to a newer version of the Portable Flowgorithm]. While it does have a few help pages but we thought we would add a summary that makes it more accessible to GCSE (and KS3) pupils. It is Windows only, however, some success has been reported running it under Wine (Windows emulator for Mac, see information on Wine here). A compact version of Flowgorithm manual can be downloaded here. Note, that Flowgorithm can’t be used in NEA sessions or installed to NEA accounts, due to its ability to generate code. First, let’s look at this video that sets up a basic programming problem and shows how to plan it with the help of Flowgorithm. Then we will leave you with a comprehensive set of exercises and tasks making use of Flowgorithm, although you don't have to use it this way. You can do the traditional pen-and-paper flowcharting and use these for guidance. And you can then use our flowchart making template PowerPoint file.
<urn:uuid:45f2b9b5-073d-47fe-be34-6c1c13f8faf9>
CC-MAIN-2020-29
https://www.totecs.co.uk/resources-blog/an-easy-way-to-teach-flowcharts-and-pseudocode
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886865.30/warc/CC-MAIN-20200705023910-20200705053910-00029.warc.gz
en
0.934262
497
3.84375
4
Tuesday, May 5, 2015 [Pri20150504WNR] Emma and Francis’ Stickers This is another one of those primary school mathematics problems whose underlying algebraic structure is equivalent to that of a pair of simultaneous linear equations. However, the primary school pupils are taught only simple algebra. A very popular method is the use of bar diagrams a.k.a. “the model method”. It is a useful tool to help pupils visualise the quantities involved. However, some people are not comfortable with this method. One needs to cut the bars into the correct number of sub-parts. If the diagram is drawn wrongly, one would need to erase the diagram and redraw it. Remember: the “model method” is just one of the many ways of drawing diagrams, which is only one of the many heuristics for solving mathematical is worth the ship, but do not worship the “model method”. If it works for you, go ahead. If not, do not force it. Try another method. Do not cut your feet to fit the shoes (削足适履). Singapore Once again, I demonstrate my Distinguished Ratio Units (DRU) method as an alternative. Let us say that a pupil who uses DRU actually drew the diagram in his/her mind, in a way. Instead of drawing various sized multiple units, we now use numbers surrounded by different shapes to represent the different types units. It is easy to read the passage sentence by sentence and translate them directly into the diagram without having to worry about whether the unit is drawn to the correct relative length. To illustrate the facility of use, I shall actually present two ways to attack the problem using DRU. Solution 1 (Unifying units via LCM) I use one “circle” unit each for what Emma and Francis had at first. Later on, after adding two “circle” units, Emma has 3 “circle” units. After subtracting 8, Francis ends up with, say, one “square” unit. Emma has four times as much, so Emma has 4 “square” units, which is equal to 3 “circle” units. Now since the LCM of 3 and 4 is 12, we can make Emma’s later holdings for stickers to be 12 “triangle” units, say. We can express every of the original units in terms of this common “triangle” unit. Just multiply the numbers in every “circle” unit by 4, and multiply the numbers in every “square” unit by 12. This is what we would get:- From here, we easily see that the transition from 4 “triangle” units to 3 “triangle” units is a subtraction by 8. Hence 1 “triangle” unit is 8 and therefore 4 “triangle” units (which represents Francis’ original number of stickers) represents 32. So Francis had 32 stickers at first. Solution 2 (Stepping stone) We model the situation in a way similar to the above solution, except that we reverse the arrow connecting 1 “circle” unit to 1 “square” unit and replace the “+8” with “–8”. We have not changed the meaning by doing this. Now, multiply everything in Francis’ column by 4 so as to obtain 4 square units. This is the same as imagining what would have happened if Francis’ had 4 times his original number of stickers and he had given away 4 times (i.e. 32) the number of stickers. Obviously, he would have 4 times the number left, as represented by 4 “square” units. If we added 32 to the 4 “square” units, we would get 4 “circle” units. Notice that the 4 “square” units now serve as a stepping stone to connect the 3 “circle” units to 4 “circle” units, as highlighted in green. Hence we can see straightway that 1 “circle” unit is the same as 32. But this is the answer we want, because Francis had the equivalent of 1 “circle” unit at the beginning! In the first method, I just use two different types of units. Then I use the idea of Lowest Common Multiple (LCM) and then change all the quantities to a common type of unit. In the second method, I multiply a relation by a certain number so that one type of units matches exactly and this serves as a stepping stone to find a link that solves the other unit. I hope you like my Distinguished Ratio Units method. H02. Use a diagram / model H04. Look for pattern(s) H05. Work backwards H06. Use before-after concept H09. Restate the problem in another way * Primary School Mathematics * other syllabuses that involve whole numbers and ratios
<urn:uuid:fd7e268a-4217-4cb9-b016-dd834958ab6d>
CC-MAIN-2017-30
http://genuinesingaporemaths.blogspot.com/2015/05/pri20150504wnr-emma-and-francis-stickers.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426169.17/warc/CC-MAIN-20170726142211-20170726162211-00383.warc.gz
en
0.942215
1,070
3.921875
4
Plume from Suwanose-jima May 14, 2013 The Suwanose-jima Volcano, part of Japan’s Ryukyu Islands in the East China Sea, released a continuous plume of ash and steam in late October 2008. The Moderate Resolution Imaging Spectroradiometer (MODIS) on NASA’s Aqua satellite captured this image of the region on October 19, 2008. In this image, the plume forms a rippling pattern as it blows away from the volcano toward the west-southwest. The plume differs from the nearby clouds in both its slightly darker color and more diffuse shape. Near the volcano summit, the plume appears beige, hinting at its ash content. Suwanose-jima is a stratovolcano composed of alternating layers of hardened lava, solidified ash, and rocks ejected by previous eruptions. The 8-kilometer- (5-mile-) long island has two summit craters that have been active in historical times, and the volcano is one of Japan’s most frequently active. Credit: NASA image courtesy MODIS Rapid Response, NASA Goddard Space Flight Center. Caption by Michon Scott. Topics: Environment, Stratovolcanoes, Volcanology, Geology, Disaster Accident, Eruptions of Eyjafjallajökull, Moderate-Resolution Imaging Spectroradiometer, Volcanic ash, Volcano, Japan
<urn:uuid:14c7cc5c-9b3c-4996-86d3-c320a4b6a43f>
CC-MAIN-2013-48
http://www.redorbit.com/images/pic/77217/suwan_amo_2008293_lrg/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163049486/warc/CC-MAIN-20131204131729-00072-ip-10-33-133-15.ec2.internal.warc.gz
en
0.891083
298
3.21875
3
Cricket Mating Season Driving You Crazy? [AUDIO] After the ‘Cricket from Hell’ woke me up at 4am chirping so loud I couldn’t get back to sleep, I decided to find out what’s up with all of this horrid noise permeating my home. Is it mating season or what? Well, I found out that crickets mate anywhere from April through July. When you hear the chirping, that’s what is happening. ‘Bingo,’ that explains my agony and sleepless hours before dawn. Crickets are members of the Orthopteran family, related to grasshoppers and katydids. They are considered to bring good luck when found inside your home. The mating song they chirp out by rubbing their wings and legs together is greeted as music by some and noise by others. And let me tell you it’s all noise to me! A cricket’s chirp is created when the cricket rubs his wings or legs together during mating season. Oh great! His song is a call to the female to let her know that he is available to mate. It can also be a call to other males to let them know he is staking out his turf. When you hear a cricket chirp, it is almost always a male, although female crickets have been known to respond to the chirp of a male cricket with their own unique response chirp. Here’s another cool cricket factoid; crickets chirp at different rates of speed depending on the temperature outdoors. It’s actually possible to calculate the temperature in Fahrenheit by counting the number of times a U.S. Snowy Tree Cricket chirps within 15 seconds and then adding the number 40. This formula is called “Dolbear’s Law.”
<urn:uuid:f91ba5de-4d7d-4858-baa7-2664616f44a6>
CC-MAIN-2014-23
http://999ktdy.com/cricket-mating-season-driving-you-crazy/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510275463.39/warc/CC-MAIN-20140728011755-00063-ip-10-146-231-18.ec2.internal.warc.gz
en
0.969404
397
2.546875
3
If I could give just one piece of advice to my math students, this would be it: Keep up with the class. I’ll say it another way: Don’t fall behind. “Getting behind is academic suicide.” To an extent that’s true in any field, of course, but it’s particularly true in your math courses. More than any other field, math is relentlessly cumulative. Almost every class depends on what came in the immediately preceding classes. If you don’t quite get the material in one class, you need to learn it yourself right away or you can pretty much expect to be lost in the next class. Since it takes a huge effort to catch up once you fall behind, your best strategy is not to let yourself fall behind. If you don’t understand something, deal with it right away. (Very few things magically become clear over time.) In class, ask a question. Don’t wait: your brain will be nibbling at the thing you didn’t understand and that will distract you from the rest of the lecture. Outside class, you have a little more time, but still make sure to get all your questions answered by the start of the next class. Start by reviewing your textbook. If you need to, come see Glenn on most Wednesday mornings before school, or at the very least, send him an email. Talk to your friends who might be able to help. Or your Parents, Tutors or any other older person who knows something about math. If you have to give one course short shrift because you don’t have enough time one week for all your classes, don’t slight the math class. I say this not because math is better or more important than any other class, but because the penalties for falling behind are more severe. In most classes you can usually understand most of one lecture if you didn’t understand the previous one; in math that’s very often not true. What if you do fall behind? It can happen even to good students. In this case, my advice is to put in extra effort and work through the missed material in order. Since the concepts are sequential, it will be pretty inefficient to try to study what the class is studying if you haven’t mastered the previous week’s work. Stick with the same order that the class followed, but put in the extra effort to catch up as quickly as you can while still learning everything. Be sure to let me know what happened; I may be able to give you specific advice or help to use your time most effectively. If I know you had a problem but you’re trying to catch up, I will probably be willing to work with you, possibly even to cut you some slack about quizzes if the problem was beyond your control.
<urn:uuid:29d51e93-5d04-4e63-b591-2bf252844ec2>
CC-MAIN-2017-47
http://offthehypotenuse.blogspot.com/2009/11/keep-up-ask-questions-you-can-do-it.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806609.33/warc/CC-MAIN-20171122141600-20171122161600-00403.warc.gz
en
0.958416
589
2.71875
3
Workers stop up leaking radiation Limits established for seafood TOKYO – Workers at Japan’s tsunami-damaged nuclear power plant today finally stemmed a tide of radiation that was pouring into the Pacific and exacerbating concerns over the safety of seafood, the operator said. High levels of contamination have been measured at the shoreline of the Fukushima Dai-ichi complex in recent days, prompting the government to set limits for the first time on the amount of radiation permitted in fish. While officials have said the crack in a maintenance pit plugged early today was the only one found, they have not explicitly ruled out that radioactive water is leaking into the sea from another point. “Right now, just because the leak has stopped, we are not relieved yet,” said Chief Cabinet Secretary Yukio Edano. “We are checking whether the leak has completely stopped, or whether there may be other leaks.” Authorities insisted the radioactive water would dissipate and posed no immediate threat to sea creatures or people who might eat them. Most experts agreed. Still, Japanese officials adopted the new standards as a precaution. And the mere suggestion that seafood from the country that gave the world sushi could be at any risk stirred worries throughout the fishing industry. “Even if the government says the fish is safe, people won’t want to buy seafood from Fukushima,” says Ichiro Yamagata, a fisherman who lived in the shadow of the power plant. “We probably can’t fish there for several years.” Fukushima is not a major fishing region, and no fishing is allowed in the direct vicinity of the plant. But experts estimate the coastal areas hit by the massive wave last month account for about a fifth of Japan’s annual catch. © Copyright 2011 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
<urn:uuid:0ed3df5a-8947-418a-977a-8f6c8b6d7f00>
CC-MAIN-2014-41
http://www.spokesman.com/stories/2011/apr/06/workers-stop-up-leaking-radiation/
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137145.1/warc/CC-MAIN-20140914011217-00162-ip-10-234-18-248.ec2.internal.warc.gz
en
0.944454
393
2.5625
3
Chicken Meal is the dry rendered product from a combination of clean chicken flesh and skin with or without accompanying bone, derived from whole carcasses of chicken, exclusive of feathers, heads, feet and entrails. - Chicken meal is mainly used in pet foods. Its protein content is much higher than regular chicken because most of the water has been removed. - It is considered as a protein-rich additive to pet’s food. - Unknown. Please consult a nutritionist. - Not known. Source: Wikipedia, https://en.wikipedia.org/wiki/Chicken_meal
<urn:uuid:c754689e-1eb3-41f6-b481-73ef300d5c78>
CC-MAIN-2023-40
https://nutrawiki.org/chicken-meal/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00543.warc.gz
en
0.944348
129
2.671875
3
Quality is defined as a degree of excellence; a distinctive attribute or characteristic of a product or process or service or program. It largely depends on the amount of testing it undergoes. One of principal advantages of testing is the credibility it provides to a product; hence Quality assurance is an important part of most of the industries. When it comes to Software industry, what does testing or quality assurance mean? In simple terms, Testing is a process of finding defect(s) (deviation from expected behavior) in a software application, so as to define the application functions according to the accepted requirements. Much detailed look into software testing will give us more insights. A software product is designed and developed according to the requirements of the end user. Testing as a process, helps to identify if the product is usable, meets the requirements, achieves the expected results. This involves various checks to find, if the product responds correctly to all kinds of acceptable inputs, performs its functions within an acceptable time, etc., Testing can also check if the product can be installed and run in various combinations of intended environments. When any of such a thing is missed, it is called a defect/bug/error. To proceed further, it is very important to know the difference of these. DEFECT: A defect commonly refers to several issues/unexpected behaviors/problems associated with functional or performance aspects of a software. ERROR: An unexpected outcome of an action is defined an error. When a product functions not as expected, it leads to error. BUG: A bug is an error found in the development environment before the product is released. It is a malfunction of product. The process of fixing the bug is hence termed debugging. FAILURE: A failure is also the inability of a software or product to perform its required functions. This is a defect, which is not identified in the development environment and slips to the end customer. Software testing can be broadly classified in to 2 categories, - Non- functional Functional tests are performed to check if the application functions as expected. This tests if the application works against the set of requirements. The various types of functional testing, includes but not limited to - Unit testing - Integration testing - System Testing - Acceptance Testing Non-functional tests are performed to done to verify the behavior of the system requirements like Performance, Usability etc. There are various types of non-functional testing, that includes but not limited to - Performance testing - Load Testing - Stress testing - Volume testing - Security testing - Installation testing These tests can be done manually or can be automated. Manual testing is done by a designated quality assurance engineer, by manually clicking and entering data through the application and interacting with the software and APIs with the appropriate tools and technologies. Automated tests, are performed by a tool that executes an automated test script, which mimics the actions performed in a manual test.
<urn:uuid:64239bd6-f46f-4b9d-955e-2681b57d61bb>
CC-MAIN-2020-05
https://javabydeveloper.com/quality-assurance/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250599789.45/warc/CC-MAIN-20200120195035-20200120224035-00171.warc.gz
en
0.940851
598
3.21875
3
This is what the world looks like if we pass the crucial 1.5-degree climate threshold There's one number heard more than any other from the podiums at the United Nations climate summit in Glasgow, Scotland: 1.5 degrees Celsius. That's the global climate change goal world leaders agreed to strive for. By limiting the planet's warming to 1.5 degrees Celsius, or 2.7 degrees Fahrenheit, by 2100, the hope is to stave off severe climate disruptions that could exacerbate hunger, conflict and drought worldwide. The 1.5 degree target has long been championed by developing nations, where millions of people are among the most vulnerable to climate change. At the 2015 Paris climate negotiations, they pushed industrialized countries to improve on the 2 degree Celsius goal held at the time, since wealthier nations are responsible for most greenhouse gas emissions since the Industrial Revolution. At the climate negotiations now underway, nations are touting new commitments to cut their heat-trapping emissions by switching to clean energy and reducing deforestation. India is pledging, for the first time, to be carbon neutral by 2070. More than 100 countries, including the United States, joined a global pact to cut methane, a potent greenhouse gas. Still, added together, the recent pledges don't go far enough. Even with more ambitious emissions cuts from some countries, warming is still on track for more than 2 degrees Celsius (or 3.6 Fahrenheit) by the end of the century. The Earth is already 1.1 degrees Celsius hotter than it was 150 years ago. Though a half-degree Celsius difference in temperature increase might seem inconsequential, the difference for life on Earth could be huge. Here's what scientists expect, if average global temperatures exceed 1.5 degree Celsius warming by 2100. Coral reefs face almost complete die-off Off the coast of Australia, the Great Barrier Reef is known for being large enough to be seen from space. It's the size of Germany — a biodiversity hotspot that was once thought to be too big to fail. But over the last few decades, marine biologists like Ove Hoegh-Guldberg of the University of Queensland have watched its rapid decline. "My career is one of going from a period of when it was wonderful and abundant to now, staring down the barrel," Hoegh-Guldberg says. "We're staring down the barrel of something really horrific." Oceans are warming along with the atmosphere, since they absorb much of the excess heat from climate change. Repeated marine heat waves over the last five years have turned much of the Great Barrier Reef a ghostly white color. When temperatures rise, corals expel the microscopic algae inside them, losing their food source in the process. Sometimes the corals can recover, but increasingly, they're dying off. "Something around 50% of the shallow water corals were killed literally over a couple of months, in some cases over a couple of weeks," Hoegh-Guldberg says. "If you extend that out into the future, we'll get to a point where the damage overwhelms the ability of corals to bounce back." Marine heat waves have already doubled in number since 1980 and are expected to become more intense as temperatures rise. At 1.5 degrees Celsius, it's likely that 70 to 90% of coral reefs will die off worldwide. At 2 degrees Celsius of warming, 99% are lost. "If we delay even a year or two more, we really are going down a pathway where there will be no return," Hoegh-Guldberg says. "We need to act and we need to act decisively, without question and solve this problem." 'Unheard-of' storms become more common Water has taken a heavy toll in 2021, all over the world. In September, the remnants of Hurricane Ida swept into the Northeast, killing more than 50 people in New Jersey, New York and other states. Many drowned in cars and basement apartments, overwhelmed by rushing water. In August, two dozen people died when heavy rains caused flash flooding in Tennessee. Scientists warn that a hotter atmosphere is a wetter atmosphere. Warmer air can hold more water, helping produce more intense rainfall and stronger storms. With ocean temperatures higher in the Gulf of Mexico, hurricanes are intensifying at a more rapid rate. As the climate warms, storms once thought to be extremely rare are expected to become more frequent. And the chances don't just go up a little bit. "When we think about the odds, it's not simply that twice the warming gives you twice the odds," says Gabriel Vecchi, professor of geosciences at Princeton University. "If we go on a path to 3 degree warming, more and more things that are unheard of or have been unheard of will become relatively commonplace." Extreme heat waves follow the same pattern, where a small shift in average temperature leads to a big increase in the number of extreme events. Whether it's heat or floods, infrastructure like buildings, roads and storm drains were designed to handle the climate of the past. They may not survive the climate of the future. Melting ice leads to flooded cities For coastal cities around the world, the future of millions of people depends in large part on the vast volumes of ice sitting on Greenland and Antarctica. Already, in the last 16 years, Antarctica and Greenland have lost enough ice to fill Lake Michigan, according to NASA. That ice melt is raising the level of the oceans, along with melting glaciers and the expansion of the ocean water itself, which happens as it gets hotter. The rise is also accelerating. Sea levels could rise an additional 1 to 3 feet by 2100, according to the latest report from the Intergovernmental Panel on Climate Change, the U.N.'s climate research group. The scenario could be much worse if Antarctic ice sheets disintegrate at a faster pace than scientists expect. Limiting temperature increases to 1.5 degrees Celsius could halve the amount of sea level rise that happens by the end of the century, compared with what's expected. More than 4 million people in the U.S. are at risk along coastlines, where higher sea levels would cause bigger storm surges and higher high tides. As the ocean rises, many small island nations around the world are at risk of becoming uninhabitable. Still, even at 1.5 degree Celsius of warming, scientists warn that storms, heat waves and droughts will be more extreme. And they caution that 1.5 degrees Celsius of warming isn't a tipping point. For every tenth of a degree the planet gets hotter, the impacts get worse. But on the flip side, every tenth of a degree that's prevented can be crucial in limiting the extent of future damage. "There are feasible pathways forward," Vecchi says. "It is not an inevitable future. There are reasons for hope, and despair, I think, is counterproductive." Copyright 2021 NPR. To see more, visit https://www.npr.org.
<urn:uuid:591a7f37-7e4c-4e58-9673-f72abde92552>
CC-MAIN-2023-14
https://www.whqr.org/2021-11-08/this-is-what-the-world-looks-like-if-we-pass-the-crucial-1-5-degree-climate-threshold
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943625.81/warc/CC-MAIN-20230321033306-20230321063306-00442.warc.gz
en
0.944408
1,439
3.359375
3
The Sandoval surname has a rich history and holds significant meaning to those who bear it. In this article, we will explore the ancestral roots and historical significance of the Sandoval last name, from its origins in Spain to its presence among Native American communities in the United States. We will delve into the meaning of Sandoval and its importance in the context of surnames historically. Join us on this journey of discovery as we uncover the fascinating story behind this beloved surname. Origin of the Sandoval Surname The rich and captivating chronicles of the Sandoval family name extend back centuries. An intriguing component of this ancestor’s lineage is its origin. Sandoval is derived from the place name of Burgos, Spain, a region characterized by woodsy areas and plush woods. The Latin words saltus, meaning grove or forest, and novalis, signifying a newly cleared land, are the two words that make up the name Sandoval. This is to say, the family name symbolizes a newly cleared land in the forest. This backstory elucidates the lifestyle and environment of the first people to embrace the surname. The Sandoval name is not exclusive to Spain, however. It is also found among Native American societies in the USA, particularly among the Navajo. This speaks to the far-reaching impact of the Sandoval family name throughout history. The surname was utilized not only to identify people according to their vocation or physical qualities but also to indicate their origins and clan associations. As a result, the Sandoval name has become a symbol of legacy and identity for many individuals around the world. Investigating the source of the Sandoval surname offers a glimpse into the past and culture of those who bear this exclusive last name. Meaning of the Sandoval Surname Tracing back its roots, the Sandoval last name can be attributed to Latin words saltus and novalis. Combining these two concepts, the Sandoval moniker translates to someone who resided near a recently-cleared wood or grove. This definition provides a glimpse into the original bearers of the name and their way of life. For centuries, the Sandoval surname has been used to identify individuals based on their heritage. While some surnames can signify a profession or physical trait, the Sandoval name speaks to the geographical area it originated from. This indicates that the original holders of the name were likely tied to the land and lived close to newly-cleared forests. This understanding of the meaning behind the name can provide a stronger connection to one’s ancestors. Exploring the origin of the Sandoval last name can be a powerful journey into the past. Its meaning speaks to the relationship between humans and nature and the manner in which our predecessors interacted with their surroundings. Though the name is deeply rooted in Spanish soil, its significance is universal in scope. Sandoval Surname in Native American Communities The Sandoval surname is not exclusive to Spain, but is also found in numerous Native American cultures located in the United States. The Navajo tribe, in particular, boasts a sizeable population of individuals who bear this name. It is thought that the surname was first introduced to Native American communities through Spanish colonization and intermarriage. This has added a layer of complexity to understanding the ancestral roots and historical importance of the surname. Investigations and analyses have revealed that the Sandoval surname has evolved in Native American communities, taking on various variations in spelling and pronunciation. For example, the Navajo tribe call it Tsinajinnie, which translates to black streak running through the water. This illustrates the complexity of cultural exchange and the adaptation of identities in the face of colonialization. This presence of the Sandoval surname among Native American communities is a reminder of the intricate, interconnected histories that have fashioned our modern world. Historical Significance of the Sandoval Surname The legacy of the Sandoval family stretches back centuries, with a history of resilience, perseverance and ambition. Their pivotal roles in world history, from military to political, artistic to athletic, have had a lasting impact across the globe, particularly in Spain and the Americas. The Sandoval family is deeply entwined in the colonial history of Spain, having held influential positions in the governing and administering of their settlements. Members of their clan were also integral to the Spanish military campaigns, both in Europe and the New World. It is even said that the famous Conquistador Hernán Cortés married a woman named Catalina Sandoval. The Sandoval name is also linked to the Catholic Church, with multiple members having served as influential clergy members, including bishops and priests. Diego de Sandoval y Rojas, the Archbishop of Toledo during the seventeenth century, is particularly remembered for his contribution to the Church and society at large. The surname carries a cultural and artistic significance as well, exemplified by the famous painting of poet Luis de Góngora by Spanish artist Diego de Silva y Velázquez. Góngora was a member of the Sandoval family, and the painting is considered a masterpiece, a testament to the cultural importance of this surname. Popularity of the Sandoval Last Name The Sandoval appellation has seen a gradual rise in prominence over the years. Recent statistics place the name at #233 among the most prevalent surnames in America, implying that there is a significant population bearing this family name living in the US. The popularity of the Sandoval name is rooted in its rich historical roots. It is believed to have been derived from Spanish colonization, while some people can even trace their ancestry to Native American communities which also adopted the name. Further to this, its phonetic simplicity renders it an easy and memorable choice for those seeking an individualistic surname. This is further compounded by the prestige associated with its cultural relevance. Moreover, the Sandoval name has been exposed to a greater degree of visibility due to its appearance in popular culture. Notable figures, such as musicians, actors, and athletes, have all been seen to bear the Sandoval last name, boosting its familiarity within the wider public. In conclusion, the growing popularity of the Sandoval family name is a testament to its age-old history and its cultural relevance. It is an easily recognisable, prestigious name which has been bolstered by its presence in the public eye. Comparison to Other Common Surnames When it comes to family names, the Sandoval appellation is relatively widespread in the United States, ranking at #233. Nonetheless, it is not the only surname of Hispanic origin that has become popular in America. Other widespread Hispanic surnames include Garcia, Martinez, Rodriguez, and Hernandez. The Sandoval name is derived from a place called Sandoval in Burgos, Spain. In contrast, the Garcia surname is derived from the Basque word gaztea, which translates to young. The Martinez moniker comes from Martin, meaning warrior, while the Rodriguez name is derived from Rodrigo, meaning illustrious ruler. It is captivating to compare the origins of these family names and explore how they have changed over time. Apart from Hispanic surnames, there are numerous other popular surnames in America that possess distinct origins and meanings. For instance, the Smith surname is of English origin and was originally a job title for a metalworker. Similarly, the Johnson name is of English origin and means son of John. Other well-known American surnames include Williams, Brown, Jones, and Davis. While these last names may not have the same cultural significance as the Sandoval name, they are still a fundamental part of America’s varied heritage. By investigating the meanings and beginnings of different surnames, we can develop a greater appreciation for the complexity and diversity of our society. In conclusion, the Sandoval surname carries a rich history and cultural significance that spans across continents and centuries. From its origins in Spain to its presence among Native American communities in the United States, the Sandoval name has been shaped by cultural, social, and historical factors. While surnames have been used to categorize people based on occupation, origin, and physical traits, the Sandoval name represents a unique blend of these factors. As one of the most common surnames in America, the Sandoval name continues to be a source of pride and identity for millions of people. The exploration of the Sandoval surname sheds light on the complex and diverse nature of human history and identity.
<urn:uuid:3593278e-1f80-405d-9126-9e8200e14e2b>
CC-MAIN-2023-40
https://ancestrosgroup.com/en/sandoval-last-name-unveiling-the-ancestral-roots-and-historical-significance-of-the-name/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510498.88/warc/CC-MAIN-20230929054611-20230929084611-00068.warc.gz
en
0.95281
1,718
3
3
By David Adam Whole species disappear from the wild as millions of animals are illegally exported round the world in a business with profit margins that rival the drugs trade. Countries across south-east Asia are being systematically drained of wildlife to meet a booming demand for exotic pets in Europe and Japan and traditional medicine in China – posing a greater threat to many species than habitat loss or global warming. More than 35 million animals were legally exported from the region over the past decade, official figures show, and hundreds of millions more could have been taken illegally. Almost half of those traded were seahorses and more than 17 million were reptiles. About 1 million birds and 400,000 mammals were traded, along with 18 million pieces of coral. The situation is so serious that experts have invented a new term – empty forest syndrome – to describe the gaping holes in biodiversity left behind. "There's lots of forest where there are just no big animals left," says Chris Shepherd of Traffic, the wildlife trade monitoring network. "There are some forests where you don't even hear birds." Seahorses, butterflies, turtles, lizards, snakes, macaques, birds and corals are among the most common species exported from countries such as Malaysia, Indonesia and Vietnam. Much of the business is controlled by criminal gangs, Shepherd says, and many of the animals end up in Europe as pets. The rarer the species, the greater the demand and the higher the price. Collectors will happily pay several thousand pounds for a single live turtle. Vincent Nijman, a researcher at Oxford Brookes University who has investigated the trade, said: "We see species that are in fashion traded in great numbers until they are wiped out and people can't get them any more. So another one comes in, and then that is wiped out, and then another comes in." More....
<urn:uuid:79294708-6e87-4bde-8470-f52b441d776f>
CC-MAIN-2020-34
http://www.noanimalpoaching.org/animal-poaching-news-2009-2013/monkeys-butterflies-turtles-how-the-pet-trades-greed-is-emptying-south-east-asias-forests
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737168.97/warc/CC-MAIN-20200810175614-20200810205614-00002.warc.gz
en
0.967919
379
2.71875
3
You have come to the right place if you are looking for fun, engaging and exciting Safety themed activities to do with toddlers, preschoolers and kindergartners. Our activities are widely used by teachers, moms, dads, child care providers and more! All our activities are available at no cost and are free to print and share. Select below to get started. Safety Arts and Crafts Flame Paints with Marbles Materials: Yellow and red tempera paint in small cups or bowls; marbles; box lid and manila paper. Let children lay a piece of manila paper in the box lid. Spoon out one to three small blobs of pint on the paper and place one or more marbles in the lid. By tilting the lid slightly the marbles will roll around through the paint and make “flame” designs. Add more spoonfuls of paint if desired to increase the color blending. Precut circular and rectangular shapes from construction paper. Have the children glue the precut shapes on to a piece of construction paper to resemble a fire truck. They may add yarn or string for the fire hose and use straws to make a ladder. Using colors associated with fire (red, orange) squirt or draw thick lines on the paper and add a few drops of black paint here and there. Press clear plastic wrap onto the paper and squeegee the paint around. Pull plastic off of the paper using a strong vertical pulling action. (This will cause the paint to look like fire.) When paint is dry have the children glue a black cutout of a house (windows cut out) and/or a black cutout of a fire truck. What I Want To Be Materials: large white butcher paper, tracing crayon, crayons or paints, scissors Have each child lie on a large piece of butcher paper and outline the body. When complete, have the children “dress” themselves in appropriate attire for what they want to be when they grow up. A firefighter? They will need a red suit, heavy black boots, and a firefighter’s hat. Cut out the life-size pictures and mount them for display. Fire Fighter Clothing Make fire hats out of red construction paper. Make jackets out of paper bags. Make stop and go lights out of shoeboxes. Tape the lid to the bottom of the box. Cover with black construction paper and have children place green, yellow and red circles in correct order on the box. Red circles on top, yellow middle, green on bottom. Make officer’s badges out of paper, cover with tin foil. First Aid Collage Materials: First Aid Supplies. Create a collage of first aid supplies using bandages of assorted sizes, gauze, tongue depressors, swabs, and cotton balls. First Aid Kit Materials: white construction paper, red construction paper, glue, shoebox, rope and first aid items such as band-aids, cotton balls, etc. Cover the shoebox with white paper. Decorate with a red cross out of the red paper. Tape one side of the lid to the box so that it creates a hinge. Add a rope handle. Put cotton balls, band-aids, and whatever else you would find in a doctor bag that the kids could play with. Safety Games and Activities Walk around the house/school with the kids and count how many safety items they can find. (first aid kit, fire extinguisher, etc.) On the reverse side, you could have the kids point out all the unsafe items (open cupboard doors where someone could bump their heads, toys on the floor where they could trip,etc.) Have all the kids wear sweatshirts and place orange felt *flames* on them. Then they demonstrate how to Cover, Stop, Drop, and Roll on the carpet, to put the flames out. (I added *cover*, to teach them to cover their face with their hands while rolling.)(I don’t tell them they have to be on carpet. Heaven forbid they are on fire and running around trying to find carpet to roll on, but it does work better to get the felt off.) Fire Fighter Equipment If you know a fire fighter, you might let him/her know that you are very interested in fire safety. Let them know that you would be very interested in obtaining some old used equipment (a real hat, a nozzle and short portion of hose, a jacket, etc.) for your drama area. Invite the children to set up a firehouse. Allow the riding toys to be the fire engines, ambulances and the fire chief’s car. Set up a sleeping area, boots with pants can be set up next to the bed. Give the children a bell to sound the alarm and let their imaginations run wild! Fire Escape Practice Ideas · Pin sheets up around the room, about 2 ft from the floor, and practice crawling, low, under the “smoke.” · Turn out the lights to practice getting out in the dark. Hot and Cold I get tiny red and blue dot stickers from an office supply store and bring some things into the daycare for the kids to use with them. We put the red dots on hot things, and blue dots on cold things. Red Light, Green Light Have the children run around and someone yells out, “red light” and the children have to stop what they are doing until they hear “green light.” 911 For Toddlers For those that don’t yet recognize their numbers, put a red dot sticker on the number nine and a green dot sticker on the number one. They will remember easier in case of emergency press “red, green, green” Have a few phones in the class, and go over with the children what to say when the phone rings and the child answers. Teach them the proper and safe things to do, like: not giving their name, telling the person on the phone where they live, or if they are alone. You can even have each child come up to the phone , as you pretend to ring the phone & be the stranger. This is also a good time to go over dialing 911 in case of an emergency. Safety Recipes and Snacks We made graham cracker fire trucks for snack! Use 1 whole (double square) cracker for the body and 1/2 (1 square) for the cab. Use “ritz bitz” for the wheels, pretzel sticks for the ladders, licorice laces for the hoses, and a cherry for the red light. Use frosting for glue! 8 sided crackers, peanut butter and jelly on the cracker Triangle crackers and yellow cheese Firemen need to be very strong. Prepare a healthy milkshake for your little fire boys and girls. 1 cup strawberries 2 tsp. honey 4 large scoops vanilla ice cream 1 1/2 cups milk In a blender or food processor, puree berries with honey, add ice cream and milk. Pour into glasses and serve. Materials: measuring spoons, cup, raisins, peanut butter, honey, apple and oatmeal Procedure: Give each child a cup and mix the following together: 1 Tbs. peanut butter, 1/2 tsp. honey, 1 Tbs. raisins, 1 tsp. chopped apple, 1 Tbs. raw oatmeal. Wash hands. Then each child stirs the mixture and rolls it into balls. The mixture may be chilled for a while or eaten immediately. Firefighters need to have high energy. Safety Songs, Poems and Finger Plays (sung to “Eensy Weensy Spider”) The firefighter helps us learn our safety rules. Playing with matches is only for fools. If you see a fire, “help, you’ll scream and shout!” Dial 911. The firefighter will put it out Twinkle twinkle traffic light (sung to “Twinkle Little Star”) Twinkle twinkle traffic light Standing on the corner bright When its green its time to go When its red its stop you know Twinkle twinkle traffic light Standing on the corner bright Do you know the police officer (sung to “Muffin Man”) Oh do you know the police officer the police officer the police officer Oh do you know the police officer who helps me cross the street (fill in other verses here…….helps me when I am lost or who helps once cross the street etc) Four Busy Firefighters Four busy firefighters could not retire Because they might have to put out a fire. The first one rang a big brass bell. The second one said, ‘It’s the Grand Hotel!’ The third one said, ‘Down the pole we’ll slide.’ The fourth one said, ‘Get ready to ride.’ The siren said, ‘Get out of the way!’ ‘We have to put out a fire today!’ The red fire truck sped on to the fire, As the big yellow flames grew higher and higher. Swish went the water from the fire-hose spout And in no time at all the fire was out. I Am A Fireman (sung to “I’m A Little Teapot”) I am a fireman dressed in red. With my fire hat on my head. I can drive the firetruck, fight fire too, And help make things safe for you. Ten Little Firemen Ten little firemen Sleeping in a row Ding-dong goes the bell And down the pole they go Off on the engine oh! oh! oh! Using the big hose so, so, so When the fire is out, home sooo slow Back to bed all in a row. Five Little Firefighters Five little firefighters sit very still. ( Hold up five fingers ) Until they saw a fire on top of a hill. Number one rings the bell, ding dong. (Bend down thumb) Number two pulls his big boots on. ( bend down pointer finger ) Number three climbs on the truck right away. ( bend down middle finger.) Number four joins him–no one can wait. ( bend down ring finger ) Number five drives the truck to the fire. ( bend down little finger ) The big yellow flames go higher and higher. ( spread arms ) WHOOO–OO! Whooo–oo! Hear the fire truck say ( Imitate siren ) As all the cars get out of the way. Shhhh! goes the water from the fire hose spout. ( Rub palms together ) And quicker than a wink the fire is out ! ( Clap hands.) The Firemen Song (sung to “The Farmer In The Dell”) The firemen are brave. The firemen are brave. Heigh-ho what do you know, The firefighters are brave. Stop, Look and Listen Stop, Look and listen, Before you cross the street. First use your eyes and ears Then use your feet! The red light means stop The green light means go The yellow light means caution This you should know. This firefighter rings the bell. (thumb) This firefighter hold the hose so well. (index) This firefighter slides down the pole. (middle) This firefighter chops a hole. (ring) This firefighter climbs higher and higher. (pinky) And all the firefighters put out the fire! We are safe (sung to “Mulberry Bush”) This is the way that we are safe we are safe we are safe This is the way that we are safe every day of the year This is the way we cross the street look left then right left the right This is the way we cross the street look left the right for safety t This is the way we ride in the car sit up straight buckle your belt This is the way we ride in the car buckle your belt for safety (sung to “Frere Jacques”) Never, never, play with matches If you do, if you do You might burn your fingers, you might burn your fingers That won’t do, that won’t do. Never, never, play with matches (or fire) If you do, if you do, You might burn your house down, you might burn your house down, That won’t do, that won’t do. (you might burn the forest is another verse) Clang, Clang goes the fire truck, when it is racing about. The firemen will work very hard to put the fire out. With their hoses and their ladders, they answer to fire call. When the fireman fights the fires, They really help us all. Fireman Number 8 Fireman, fireman number eight (2 circles on top of each other with hands) Bumped his head upon the gate (touch head and slap hands palms together) The gate swung in (swing prayer hands one way) The gate swung out (other way) That’s the way they put the fire out (back and forth both ways) Emergency, emergency 9-1-1 (marching, say this 3 times getting faster and faster) Firefighter Finger Play Five brave firefighters, Sleeping so, (hold up a hand with fingers flatacross palm) The fire bell rings, Down the pole they go, (open the hand and make a downward motion) Jump in the fire truck, Hurry down the street. Climb up the ladder, (make he fingers climb) Feel the fire’s heat. (wipe sweat from your brow) Five brave firefighters, (hold up five fingers) Put the fire out. (make a wiping motion) Hip! Hip! Hooray! All the people shout! (shout) (sung to “I’m A Little Teapot”) I’m a firefighter; my name is John. I put my boots and helmet on I hurry to the fire and give a shout. With a burst of water, the fire is out (sung to “Pop Goes The Weasel”) Down the street the engine goes The Firemen fight the fire Up the ladder with their hose Out goes the fire. What Happens If There Is A Fire (sung to “Bingo”) What happens if there is a fire ? Do you know what to do ? Oh ! GET OUT ! QUICK , GET OUT ! get out ! Quick ,get out ! get out ! QUICK, get out ! Stay very low and go. GO ! What happens if there is a fire ? Do you know what to do ? Oh! STAY OUT ! DON’T GO BACK ! stay out ! Don’t go back ! stay out ! Don’t go back ! Don’t go back in the house. No ! What happens if there is a fire? Do you know what to do ? Oh ! GET HELP ! CALL FOR HELP ! get help ! call for help ! get help ! call for help ! call 911 for help ! oh! Additional Safety Resources Recommended Books on Safety (most under $5.00, click the titles for more info) Nicky Visits the Fire Station A Visit to the Sesame Street Firehouse Child Safety Made Easy Baby Proofing Basics Parents Book of Child Safety Stranger Danger – How to Keep Your Children Safe Aware and Alert (My Community the Police Officer) Barney & B.J. : Go to the Fire Station (Barney Go to Series) The Berenstain Bears Learn About Strangers (First Time Book) Dinosaurs, Beware! : A Safety Guide Food Safety (True Book) I’m Safe in the Water (I’m Safe Series) Impatient Pamela Says : Learn How to Call 9-1-1 Here’s some info from the United State Fire Administration: Use the following fire safety and prevention information to lead discussions. Control kids’ access to fire: *Keep all matches and lighters out of the hands of children. If possible, keep these sources of fire in locked drawers. Consider buying only “child-proof” lighters — but be aware that no product is completely child-proof. *Children as young as two years old can strike matches and start fires. *Never leave children unattended near operating stoves or burning candles, even for a short time. *Teach children not to pick up matches or lighters they may find. Instead, they should tell an adult immediately. Fire safety at home: *Smoke detectors should be installed on every floor of the home, especially near sleeping areas. *Smoke detectors should be kept clean of dust by regularly vacuuming over and around them. *Replace batteries in smoke detectors at least once a year. And replace the entire unit after ten years of service, or as the manufacturer recommends. *Families should plan and practice two escape routes from each room of their home. *Regularly inspect the home for fire hazards. *If there are adults in the home who smoke, they should use heavy safety ashtrays — and discard ashes and butts in metal, sealed containers or the toilet. *If there is a fireplace in the home, the entire opening should be covered by a heavy safety screen. The chimney should be professionally inspected and cleaned annually. Warning Signs Kids may be experimenting with fire – if you notice: *Evidence of fire play, such as burnt matches, clothes, paper, toys, etc., or if you smell smoke in hair or clothes. *Inappropriate interest in firefighters and/or fire trucks, such as frequent, improper calls to the fire department or 9-1-1. *Child asks or tries to light cigarettes or candles for you or other adults. *Matches or lighters in their pockets or rooms. Channel Curiosity Turn kids’ interest into safe outcomes: *Talk to your child or students in a calm, assured manner about fire safety. *Consider visiting a fire station if children are very interested in fire fighting and/or fire trucks (call for an appointment first). Have the firefighter talk about his/her job and the dangers of fire. *For parents: Create opportunities for learning about fire safety at home. For example, when you cook, let your child get the pot holder for you; when you use the fireplace, let your child bring you the wood or tools; and if you use candles, let the child check to make sure the candle holder fits snugly. What to do if you suspect your student/child is playing with fire: *Talk to the child about his or her actions. Explain again that fire is a tool for use only by adults, and that it is very dangerous for children. *Many schools and fire departments have programs for children who are inappropriately interested in fire or who have set fires. *Many police stations have programs for children who show signs of becoming juvenile fire setters. NOTE: Visit the United State Fire Administration site and look at the quizzes, parent/teacher guide, lists of available materials to download or order, links to other Fire Safety sites. http://www.usfa.fema.gov/prevention/outreach/children.html National Fire Prevention Week Ideas · Arrange for a fire truck come to school with an ambulance. · Read stories about fire trucks and fire drills. · We are having a police officer come in to talk about stranger danger. · We are going to learn how to use a seat beat correctly. · We are going to play street sign bingo as the kids will be able to learn about the signs and “read” them) Bike Safety Checklist · Take a bike safety course from your local school or community service group. · Use appropriate sized bike since a bike that is too small or big can contribute to loss or control of bike. · Always were safety equipment while riding such as: helmet, knee and elbow pads. · Restrain any loose items such as purse on a bike rack or inside back pack worn on back to prevent items falling and catching in the spokes of a wheel causing bike to flip. · Restrain loose pant bottoms with an elastic band or tucked inside sock to prevent getting caught in bike chain. · Check bike before riding for possible maintenance requirements such as malfunctioning breaks, loose chain or flat tires. · Use bike when traveling near traffic on bike paths or along side of the road going with the flow of traffic. · Observe traffic sign and lights rules. · Be alert to pedestrians. They always have the right of way · Use hand signals to indicate when you plan on turning or stopping to alert vehicles coming behind you. · Always watch where you are going and what is going on behind and around you. Check out our Bike Helmet Safety page Chemical Safety Checklist There are many chemical dangers within the household and daycare setting. The following are ways to keep your families safety in mind. · Store all cleaning products out of reach of children and animals · Store all lawn and gardening pesticides and herbicides out of the reach of children/animals in a well ventilated area. · Store all paint and paint cleaning solutions out of the reach of children and animals. · Store antifreeze away from children and pets since it can taste like cool aide. · Store all batteries out of the reach of children and pets. · Store all windshield wiper fluid out of the reach of children and animals. · When needing to discard a chemical or its container call the number provided on container to determine if there are special procedures to be followed. Keep this in mind for batteries as well as used oil. · If a child ingests a chemical or gets it in their eye or experiences a chemical skin burn call the poison control center to determine what emergency procedures should be taken. · In general a chemical splashed into the eyes can be rinsed out with cool water. But always call poison control before responding to ingestion of a chemical with drinking of water. This may cause a serious reaction with some chemicals. In all cases go to the emergency room for treatment. · Post your local poison control center phone number near each phone in your home and dc. · Alert all families involved of the chemical emergency when help has been contacted. · Follow the instructions for each chemical that is used to help ensure safety including wearing protective gear such as: eye protection, gloves or both within a well ventilated area. Stranger Danger Checklist · A stranger is anyone you don’t know. You can’t tell the good guys from the bad guys by how they look. You are responsible for keeping yourself safe when you’re by yourself. · You are responsible for taking care of yourself. You are not responsible for taking care of grownups. Adults who need help should go to another adult. · Instinct is nature’s way of talking to you – listen to that inner voice. · Have a “password” that is not shared with ANYONE outside your family. When someone, even somebody well known, asks or tells the child that they are to go with them because “Your Mom or Dad said…” ask for the password. DON’T GO unless they know the password. The Learn Not to Burn Preschool Program National Fire Protection Association One Batterymarch Park Quincy, MA 92269-9101 1-800-344-3555 Teacher’s Guide and materials for 8 Key Firesafety Behaviors for Preschool Children (reproducibles included in teacher’s guide) *Suggestion: check with your local fire department to see if they have any educational materials available for you to have or borrow. You might also check with your State Fire Marshall regarding materials. Clip magazine pictures of a variety of people. Take photographs of students and staff members — to be photocopied or scanned into a computer and printed. Have children sort the pictures into two groups: “people we know” and “people we don’t know”. Write each of these headings on a separate piece of construction paper. Students glue pictures under appropriate headings. All About Me cards height, weight, color of hair, eyes, make fingerprint….write child’s signature….or they can if they know how (Do like on a post card or something like that) Little Red Riding Hood We use the story of Little Red Riding Hood to help teach stranger danger. We change the story because we have the children act it out. The wolf locks Grannie in the closet. Wolf chases Red around a table. Woodsman hears, enters and chases wolf away. Props: a red hooded cape for Red (made out of a red bathrobe), Grannie: nite-cap and shaw, wolf: wolf-hat (took a wolf bedroom slipper, cut and hot glued onto a baseball cap), woodsman: flannel shirt. Dear Reader: You can help us make this theme even better! All of our theme ideas have come from our imagination and from reader submissions. Please use this form to contact us if you have crafts, activities, games, recipes, songs or poems that you would like us to add to this theme.
<urn:uuid:7176f1a2-7823-4434-93ea-b152aea44f1a>
CC-MAIN-2017-39
http://www.childfun.com/themes/misc/safety/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686034.31/warc/CC-MAIN-20170919202211-20170919222211-00334.warc.gz
en
0.905789
5,443
3.15625
3
THE MAGIC OF SILHOUETTE PHOTOGRAPHY… Like we know, Silhouette refers to the outline or dark shape of something or someone visible in confined light against a very bright background, hence, silhouette photography captures the shadow casted by a darker object or person compared to that of a relatively brighter background. The greatest way to do this is to shoot during the beginning or end of the day when the sun is beneath the horizon or just on the verge of rising/setting. Photography by Dylan M Howell. The best ways to photograph silhouettes are: - Choosing a strong subject – Almost all subjects can be made into a silhouette, however something strong and having a recognizable shape must be chosen which will be appealing enough in its dimensional form to hold the interest of those viewing your captured image. Since silhouettes cannot recognize colors, tones, textures and proximity of the subject, the shape of the chosen object ought to be vivid. - Turning off the flash – Turning off the flash is very important as flashes ruin the quality of the silhouette, all you require is a little light on the front of your subject thereby, removing the flash. - Getting the light correctly – When lighting of the subject is considered, you need to exclude certain principles of usual photography and think out of the box because in silhouette photography, you need a shining background and thus, avoid the foreground brightness. Therefore, the ideal place for shooting your pictures is during sunrise or sunset. - Framing the image – Framing your shot is equally necessary as you are shooting it in a nice plain or surface with a bright background. It is best recommended to position the brightest source of light behind your subject so that they hide it or remains somewhere in the background. - Making silhouetted shapes distinct – Try to separate your images if you intend to capture silhouettes of them simultaneously, also during framing you will definitely want to photograph silhouettes of people instead of looking straight on thereby, making their facial features outlined and recognizable. - Auto Mode – Since modern cameras sense quickly how to expose a photograph in order to check that everything is well lit, they will light up your subject rather than underexposing it. Thus, it is essential to point your camera at the brightest portion of your picture and then press the shutter half way down without letting it go, and then by moving your camera to frame the shot along with the subject, the image gets captured. - Manual Mode – In case this technique is inefficient and your camera has enough control over manual exposure, you might try new settings; the beauty of digital is that it keeps experimenting till the end of all shoots to your heart’s content. The most convenient way to start using manual mode is to observe the shutter speed and aperture that it recommends in automatic mode. - Focusing – Maximizing the depth of field by use of aperture enhances the quality and focusing power of silhouette images. The beauty of silhouettes is unique, happy capturing!
<urn:uuid:55b53a34-761f-4704-b026-43c73742956a>
CC-MAIN-2017-47
http://thomas-ciszewski-photography.net/tag/silhouette/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806736.55/warc/CC-MAIN-20171123050243-20171123070243-00428.warc.gz
en
0.914452
608
2.53125
3
Epigenetic alterations consisting mainly of DNA methylation alterations and histone modification alterations are frequently observed in cancers associated with chronic inflammation and/or persistent infection with viruses or other pathogenic microorganisms, or with cigarette smoking. Accumulating evidence suggests that alterations of DNA methylation are involved even in the early and precancerous stages. On the other hand, in patients with cancers, aberrant DNA methylation is frequently associated with tumor aggressiveness and poor patient outcome. Recently, epigenome alterations have been attracting a great deal of attention from researchers who are focusing on not only cancers but also neuronal, immune and metabolic disorders. In order to accurately identify disease-specific epigenome profiles that could be potentially applicable for disease prevention, diagnosis and therapy, strict comparison with standard epigenome profiles of normal tissues is indispensable. However, epigenome mechanisms show heterogeneity among tissues and cell lineages. Therefore, it is not easy to obtain a comprehensive picture of standard epigenome profiles of normal tissues. In 2010, the International Human Epigenome Consortium (IHEC) was established to coordinate the production of reference maps of human epigenomes for key cellular states. In order to gain substantial coverage of the human epigenome, the IHEC has set an ambitious goal to decipher at least 1000 epigenomes within the next 7-10 years. We consider that pathway analysis using genes showing multilayer-omics abnormalities, including genome, epigenome, transcriptome, proteome and metabolome abnormalities, may be useful for elucidating the molecular background of pathogenesis and for exploring possible therapeutic targets for each disease. - DNA methylation - International Human Epigenome Consortium (IHEC) - Multilayer/integrated disease omics analyses ASJC Scopus subject areas - Molecular Medicine
<urn:uuid:6cb1eea1-68f4-4a8e-9956-0dc4d92082bb>
CC-MAIN-2020-34
https://keio.pure.elsevier.com/en/publications/multilayer-omics-analyses-of-human-cancers-exploration-of-biomark
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740423.36/warc/CC-MAIN-20200815005453-20200815035453-00358.warc.gz
en
0.904442
360
2.65625
3
More and more of us Britons are getting less than 6 hours of sleep per night and experts believe that most adults require between six and nine hours of sleep per night to feel refreshed and to function better both mentally and physically. March is National Bed Month and with it comes ‘The Great British Bedtime Report’ by the Sleep Council – a survey which has uncovered some interesting facts about the sleeping habits of some 5000 Britons: - A third of the population (33%) get by on just five to six hours of sleep per night. 70% of Britons sleep for seven hours or less. - Almost half of us feel we are kept awake at night by stress or worry, as the economic downturn takes its grip. - Alcohol is increasingly used to help people drift off to sleep. As many as 7.9 million Britons have consumed alcohol before bed in an attempt to fall asleep, while 6.8 million of us self-medicate with over the counter remedies. - High earners (£65,000 – £75,000) get the best sleep of all, while low income earners sleep the worst. “Research suggests that mental and physical problems become more pronounced in those sleeping for less than six hours” says Jessica Alexander – a spokesperson for the Sleep Council. “Just one bad night’s sleep affects our mood, concentration and alertness while long term sleep deprivation has far more serious consequences: it’s been linked to a number of serious health problems such as heart disease, diabetes and stroke.” The Sleep Council would like to see a public information campaign to encourage Britons to understand how crucial sleeping well is for our health and wellbeing just as existing government campaigns highlight and encourage us to eat ‘Five a Day’, ‘Live Well’ or ‘Change4Life’. National Bed Month offers a great opportunity to purchase the right bed for you with the following questions you should ask yourself before you purchase. The right bed is essential towards achieving quality sleep night after night: - What size of bed do you need? Is the bed for one or two people? It is recommended that you should be able to lie side by side with your arms behind your head and elbows out, without touching. If your bedroom allows it, it is recommended you buy as big a bed as possible. - Are you looking for a divan set, bedstead or mattress? And do you need storage? - What’s your budget? - What comfort/feel do you like? - Do you have a tendency to get too hot in bed? - Do you have health problems – do you suffer from back or shoulder pain or do you find it difficult to get out of bed? - Do you have allergies that affect your sleep? (E.g. dust mite allergies) or do you suffer from allergic conditions such as asthma, rhinitis or eczema? - Could it be difficult to get your new bed into the intended room – does it have to travel up small or tight stairways or into tight loft conversion spaces? The Sleep Council highlights that we spend over 20,000 hours on our beds over a seven year time span and so it is essential to make the right choice at the beginning.
<urn:uuid:cee8f77f-8f5b-46a4-b025-0fc9d2181cdc>
CC-MAIN-2017-39
https://slumberslumber.wordpress.com/2013/03/08/240/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689779.81/warc/CC-MAIN-20170923213057-20170923233057-00570.warc.gz
en
0.937485
672
2.640625
3
Grow… Understanding: Common Plant Misconceptions This week, we are celebrating GROW, as part of our Little Green Thumbs charter ‘Plant, Grow, Eat and Share’. There are countless opportunities to grow understanding as we explore our classroom gardens. As we grow a school garden, we explore the relationships between our environment, our community, our food and ourselves. As we encourage our students to grow their understanding, we must be ready to dispel common misconceptions about plants and the natural world. We know that our students do not arrive in our classrooms as blank slates. Students have explored and reflected on the world around them and may have created their own explanations for how the world works. We want to encourage a student’s innate curiosity, prompting students to ask questions, seek answers and make sense of the world around them. However, students will sometimes generate inaccurate ideas about plants. Sometimes these misconceptions are formed from interpretation of their own experience, from oversimplification or generalization from educators, or even through errors printed in teaching literature. A student’s limited classification knowledge may lead to errors or even their tendency to give plants human characteristics. Many of these incorrect ideas can persist into adulthood, and education researchers have stated difficulty in eradicating misconceptions once established. In recognition of our GROW week, we’ve compiled our top 5 misconceptions about food and plants. The best way to stop these common plan misconceptions may very well be to recognize them and squash them before they take root! 1. Soil is an inert substance, acting only to hold plants roots in place. Not true: soil is alive! A handful of soil has more microorganisms in it than there are people on the planet. Soil is a complex habitat of mineral particles, decomposing organic matter, air, water and living organisms. The living organisms include plant roots, bacteria, fungi and larger animals like earthworms or insects. Many ecologists consider soil to be one of the most important pieces of earth’s ecosystems. Plants, microorganisms, water, all come together in the soil, and what happens in the soil can dictate what happens in the ecosystem. Check out the FREE k-12 resources from the Soil Science Society of America to dive deeper into a soil exploration. 2. Plants get their nutrients and energy from ‘plant food’ It’s common for students to attribute animal or human characteristics to plants, but this can lead to confusion. Plants don’t ‘eat’ like humans do! Humans and animals get their nutrients AND their energy from the food they eat. Nutrients absorbed through plant roots in the soil or fertilizer are essential to plant health, but students might think that plants get all of their energy from the soil or fertilizer too. This misconception is further enforced by the reference to fertilizer as ‘plant food’. Plants do receive essential nutrients and vitamins from soil and fertilizer, but this is not a plant’s main source of energy.Remind students that plants synthesize their own fuel through photosynthesis and that fertilizer and soil provide many other elements and nutrients important for plant health and growth. The source of energy for photosynthesis is the sun (or artificial light). Being mindful of our language can help to avoid misconceptions. 3. Plants obtain their energy DIRECTLY from the sun. To further the misconceptions from above, students might think that plants get their energy directly from the sun, or that they ‘eat’ the sun. Plants use light energy to combine carbon dioxide and water to form glucose and oxygen. They then use this glucose for fuel. Again, plants don’t ‘eat’ the same way that humans and animals do: they make their own fuel through photosynthesis! Photosynthesis means making things from light: photo (which means ‘light’) and synthesis (which means ‘to put together’). 4. A plant’s leaves main function is to catch and take in water. The truth is that leaves main function is photosynthesis, and the roots have the function of the intake of water. This is with the rare exception of Tillandsia plant species (epiphytes or air plants), which do not require soil to grow. Water and nutrients are absorbed through their leaves and roots are used to anchor the plants. Oftentimes elementary students do not recognize the roots as a structure of the plant. It is a great idea to grow plants in clear containers to allow students to observe the root structure. Check out this Root Viewer and Root Observation kit from Nature Watch. 5. Plants breath like humans do. Respiration is a function of plants, but it is not the same biological process as animals or humans breathing. In respiration, plants use oxygen to convert the sugar produced in photosynthesis back into energy to use for their growth. We often like to think of this as plants `breathing in carbon dioxide and `breathing out oxygen. Though this simplification can be tempting to help students to conceptualize, words like ‘breathing’ refer to how animals take air into their lungs. Plants do not breathe. They absorb air through the stomata (pores) in their leaves. Some misconceptions probably already exist in your classroom! Formative assessment can help teachers be aware of student thinking and mindful of their own understanding and explanations of concepts. Once we’ve identified misconceptions, we know that simply telling the student the correct answer does not always lead to lasting change. Research has found that children are capable of holding parallel explanations for scientific events – one explanation for the classroom and a second for the ‘real world’. Students must be given time and the opportunity for hands-on experiences for conceptual change to occur!
<urn:uuid:57f67b3b-56b2-4983-8a03-c7602424825d>
CC-MAIN-2023-40
https://www.littlegreenthumbs.org/2018/05/07/grow-understanding-common-plant-misconceptions/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510297.25/warc/CC-MAIN-20230927103312-20230927133312-00476.warc.gz
en
0.93847
1,190
3.625
4
The marine world is incredibly rich in brilliant and intense colours. Photonic structures are found in many different species and provide extremely complex optical responses that cannot be achieved solely by pigments. In this study we examine the cuticular structure of the red alga Chondrus crispus (Irish Moss) using anatomical and optical approaches. We experimentally measure the optical response of the multilayer structure in the cuticle. Using finite-difference time-domain modelling, we demonstrate conclusively for the first time that the dimensions and organisation of lamellae are responsible for the blue structural colouration on the surface of the fronds. Comparison of material along the apical-basal axis of the frond demonstrates that structural colour is confined to the tips of the thalli and show definitively that a lack of structural colour elsewhere corresponds with a reduction in the number of lamellae and the regularity of their ordering. Moreover, by studying the optical response for different hydration conditions, we demonstrate that the cuticular structure is highly porous and that the presence of water plays a critical role in its ability to act as a structural light reflector. By nano-structuring materials on the order of the light wavelength, it is possible to obtain colouration, termed structural colour, which, in contrast with pigmented colour, depends on structural characteristics rather than the chemical composition of materials1. Structural colour is widespread in nature2,3,4,5,6,7,8,9,10 and has been observed in a range of organisms, where it is employed for functions including visual communication, mate attraction and camouflage11,12,13. Photonic structures responsible for structural colouration have been well documented in underwater organisms14,15,16,17,18, land animals, including insects and birds3,19,20,21,22,23 and recently in plants24,25, within leaves26,27,28, flowers29,30,31 and fruits32,33. The most common mechanism for structural colour production in nature is multilayer interference. Light propagating in such structures is reflected at interfaces between adjacent layers that differ in refractive index and can then constructively interfere1. Multilayer reflectors can be built from different materials including waxes and cellulose in plants28, chitin in insects3,34,35, keratin and melanin in bird feathers36,37,38 and guanine in fishes39. However, studies on taxa with structural colours that do not function in inter- or intraspecific visual communication significantly lag behind research on other structurally coloured taxa11. Few studies have researched structural colour in marine macroalgae and thus little is known about their structural mechanisms and functions. Red algae (Rhodophyta) are one of the largest groups of algae with ~14,000 species estimated40. Cell structure and organisation differ between algal groups, species and even individuals. Two different mechanisms have been documented as the source of structural colouration: multilayer structures41 and iridescent bodies42,43,44,45,46,47,48,49,50,51. Iridescent bodies have been suggested to produce variation in the refractive index of light in comparison with the surrounding environment52,53. Since then, the majority of studies have focused on Iridaea spp. (Sethell & N.L.Gardner) P.C. Silva54 and Chondrus crispus (Stackhouse)55, showing that iridescent fronds contain a multilayered cuticle in contrast with their non-iridescent counterparts41,56. The Chondrus crispus life history contains two isomorphic phases, the gametophyte phase (when tissues have a haploid chromosome complement) and the tetrasporophyte phase (when tissues have a diploid chromosome complement)57. Chondrus crispus is present in intertidal and shallow subtidal zones, which in turn gives rise to the idea that structural colour may provide an adaptation to deal with environmental stresses such as UV or heat stress. Studies focusing on Chondrus crispus found that structural colour only occurred in the gametophyte stage of the lifecycle (Fig. 1a) and was never observed in tetrasporophytes. Craigie et al.56 observed relatively few cuticular layers (lamellae) in sporophytes compared with gametophytes and showed that lamellae connect and fuse freely in sporophytes to form an irregular lamellae structure, potentially accounting for the lack of colouration in sporophytes. In all cases, colour was localised to 1.5 cm from the tip of the thalli58, although, the cause of this restricted distribution is not well understood. Gerwick and Lang41 were able to remove structural colouration by mechanically scraping off the cuticle layers, suggesting that the laminated cuticle could be involved in the production of colour. Taken together, these studies have identified structural features capable of producing colour, but lack both clear and quantitative elucidation of the mechanistic basis and an understanding of the biological purpose(s) of such colour. Here, the experimentally measured optical response of Chondrus crispus fronds (Fig. 1) is correlated with their morphological structure by extensive finite-difference time-domain (FDTD) calculations using ultrastructural images from transmission electron microscopy. Sections from the tip, middle and base of fronds (Fig. 1b) are examined in order to compare differences in the morphological structure along the axis of the thallus. Lastly, the optical response of the frond is measured during dehydration to demonstrate the structural origin. In all investigated fronds, structural colour was only observed in isolated patches at the tips of the thalli. The TEM images showed a significantly greater number of lamellae at the tip of the thalli (Fig. 2a) (M = 9.60, SE = 0.41, n = 30 (M, mean; SE, standard error; n, number of samples)) in comparison with the number of lamellae at the middle (Fig. 2b) (M = 2.6, SE = 0.26, n = 30; t(29) = 10.1, p < .0001), whereas at the base of the frond there was no evidence of a multi-layered structure (Fig. 2c). In addition, electron micrographs revealed that lamellae are more evenly deposited and consistently spaced at the tip of the thalli (Fig. 2a) in comparison with lamellae at sections from the middle of the thalli (Fig. 2b). Optical measurements at the tip and base of the thalli support the role of the multi-layered structure (Fig. 3). With the optical microscope, a strong blue colour was only observed at the tip of the thalli (Fig. 3a), whereas the base of the thalli showed a dull brown colour (Fig. 3b). Furthermore, a peak in the reflectance spectrum at ~400 nm was seen at the tip of the thalli but no reflectance in the blue parts of the spectrum was observed at the base of the thalli (Fig. 3c). We performed FDTD simulations based on the TEM images, including that of Fig. 2a, to gain optical insights. Results from these simulations showed that the reflectance spectra peak is in the blue, at ~460 nm and are similar to the measured reflectance spectrum of the thallus tip shown in Fig. 3c, supporting the structural basis of the observed blue colour (Fig. 4b). The narrow spatial distribution of reflected light upon illumination (inset of Fig. 4b) further confirms the structural basis of the observed optical effect. Analytical modelling showed that an ideal multilayer with stepwise layer thicknesses, approximating the frond section, has the same reflectance (gray line in Fig. 4c). A model with the (hydrated) dimensions of the middle section of the frond (red line in Fig. 4c) showed no prominent peak due to less ordering and less layering of the cuticle. Finally, in order to test the effect of hydration on the tissue we measured the reflectance spectra of Chondrus crispus thalli tips out of water, allowing the frond to dehydrate over time. As shown in Fig. 5, the presence of water in the system produced a peak in the reflectivity of UV – blue light (347–393 nm). However, as the tissue dried over time, a gradual loss in the intensity of the structural colouration was observed. For the first time, our observations demonstrate that the structural colouration visible at the tips of Chondrus crispus thalli is due to constructive interference of light reflected by a multilayered cuticle structure. Furthermore, electron micrographs and spectroscopy data suggest that structural colour in Chondrus crispus is determined by the ability to achieve hydrated tissue and produce a high number of uniformly deposited cuticular lamellae. A comparison of sections along the basal-apical axis of the frond reveals that the loss of structural colouration in older growth, at the base of a frond, results from a reduction in the number of lamellae as well as from degradation in the uniformity of layers. We suggest that the absence of cuticular layers in older growth is likely to be a result of a gradual degradation and shedding of layers without regeneration over time, rather than a lack of cuticular layer formation entirely in older growth. Our TEM images reveal a higher number of uniformly arranged lamellae at the tip of the thalli, in comparison with sections from the middle where only a double or triple layered structure is present and often not appropriately spaced for constructive interference to occur (Fig. 4c). Similarly, the optical response (Fig. 3) clearly demonstrates the intensity of reflected light confined to the tip of the frond. This structural colour, however, was not uniformly distributed, but varied locally between violet and green coloured patches (Figs 3a and 4b). This effect is most likely due to fine-scale heterogeneity of spacing in the multilayer structure (Figs 2a and 4b). Within Chondrus crispus, the layered structure consists of electron-dense lamellae separated by less electron-dense interlamellar regions. Differences in the refractive index between lamellae and interlamellar regions are likely to be minimal and therefore require the absorption of water to increase the contrast in refractive index between the cuticular layers (Fig. S1). Previous studies have documented the role of water in the modification of structural colour. For example, iridescent feathers of mourning doves Zenaida macroura increased in overall reflectance by almost 50% following the addition of water38. The cuticle of Chondrus crispus is likely to be very similar to that of the related red alga Iridaea which is mostly composed of protein (50%) and carbohydrates (40%). Cuticular lamallae are associated with protein-rich regions and the interlamellar spaces with regions rich in carbohydrates41. Within Chondus crispus, these carbohydrates are rich in sulphated polysaccharides, which can contribute towards the retention of water and cause swelling, accounting for the large size increase in interlamellar regions following hydration. This is supported by the total loss of structural colour observed in Chondrus crispus as a result of dehydration, highlighting the dependence of this species on water to create the necessary contrast in refractive index between interfaces. Similarly, an examination of the layered structure responsible for structural colour in juvenile Selaginella willdenowii leaves showed that the required refractive index variation between interfaces stemmed from a difference in hydration28. This suggests that the role of water is a critical component for the production of structural colour in some species. The reflectance of Chondrus crispus fronds is maximal in the ultraviolet to blue wavelength range, from ~320 to 430 nm (Fig. 5). Reflectance in these wavelengths may therefore function to protect against excessive levels of UV-blue light. Although individuals are likely to dehydrate and lose their structural colour within the intertidal zone, many individuals inhabit rock pools and thus remain hydrated with the potential to use structurally-based reflectance to reduce their overall levels of UV absorption. In contrast with phytoplankton that are capable of avoiding high exposure to light through vertical migration within the water column, marine macroalgae are mostly fixed and restricted to a single location. It is therefore likely that they have greater need for a mechanism capable of reducing excessive levels of UV radiation, especially in intertidal areas. In some brown algae (Phaeophyceae) it has been shown that there is a direct relationship between the level of UV exposure and the number and viability of spores59. Thus hypothetically, structural colour in Chondrus cripsus may function specifically in gametophytes, rather than tetrasporophytes, to limit DNA mutations. Since the algal samples used for this study were collected from the intertidal zone of the shore, it seems plausible that structural colour may function as a protective measure for shallow growing gametophytes exposed to UV radiation for extended periods of time. In conclusion, we have correlated the optical response of Chondrus crispus with a multilayered structure in the cuticle. By simulating the interaction of incident light with the multilayered structure, we demonstrate that cuticular lamellae are responsible for the structural colouration. Comparison of sections from the base, middle and tip of the thalli demonstrate that loss of the blue colour corresponds with reduction in the number of cuticle layers as well as degradation of their uniformity. In addition, we show that water is a critical component in the colour formation, providing the required contrast in refractive index between interfaces. Lastly, our results suggest an interesting hypothesis, that structural colour in Chondrus crispus functions to reduce the absorption of UV—blue radiation. This study furthers our understanding of structural colour in a poorly studied taxonomic group and paves the way for addressing questions of comparative evolution of iridescence in photosynthetic organisms, thus contributing towards an understanding of biological colouration as a whole. Samples of Chondrus crispus were collected from Peveril Point, Swanage, UK (50° 36’ 27.140” N, 1° 56’ 39.098” W) for Transmission Electron Microscopy (TEM) analysis. Structurally coloured gametophytic samples were randomly collected within the intertidal zone, ensuring that a representation of sections from the tip, middle and base of the thalli were obtained. Growth within the frond is apical, therefore the oldest tissue lies at the base and the youngest at the tip (Fig. 1b). Larger frond samples were also collected for spectroscopy analysis. The collected fronds were kept in a cooled environment (~12 °C) submerged in a distilled marine solution during transportation. TEM (Transmission Electron Microscopy) Collected frond pieces were fixed in a 2.5% glutaraldehyde and filtered seawater mix followed by post fixation in a 1% Osmium tetroxide solution. Dehydrated samples were then washed in a 0.1 M Sørensen’s phosphate buffer (pH 7.260) followed by dehydration in a graded ethanol:phosphate buffer series. Samples were taken through a graded ethanol:LR White Resin series before embedding and sectioning. Sections were cut from polymerised blocks using a Reichert-Jung Ultracut E ultramictrotome. Ultrathin sections (50–100 nm thick) were cut with a Diatome diamond knife. Sections were collected using Formvar coated copper mesh grids (Agar Scientific, UK). Sections were imaged on a Hitachi H-7650 TEM with integral AMT XR41 digital camera. A total of 258 images of cuticular lamellae were collected. Measurements of lamellae and cuticle thickness were obtained from 30 samples within each section of the thalli using the point to point measurement tool within the AMT Image Capture Engine v.600.355 software or ImageJ v.1.4761. Optical Imaging and Spectroscopy Optical imaging was performed with an Olympus BX-51 optical microscope equipped with a 20X objective (Olympus, MPLFLN-BD 20x, NA = 0.5). The Chondrus crispus frond specimen was submerged in water and spectra were obtained at normal incidence in the range of 250–850 nm from the surface of the frond. These collected spectra allowed full observation from within the ultraviolet range, to demonstrate any potential photoprotective function, to within the near-IR range, highlighting any potential photosynthetically-enhancing absorption. A total of 150 spectra were recorded every five seconds for a total of 750 seconds under normal ambient conditions. Spectra were collected with a bifurcated reflection probe (Ocean Optics, BIF200-UV-VIS), with the imaging fibre connected to a deuterium-halogen light source (Ocean Optics DH-2000, 215–2000 nm) and the collection fibre connected to a spectrometer (Ocean Optics QE65000, 200–880 nm). The collected reflectance spectra were standardized with respect to a white Lambertian reflectance standard (Lab-sphere Spectralon SRM-99) in the case of the double-ended probe measurements. For the spectra collected using the microscope (as explained in23), we normalised the signal with respect to a protected silver mirror (Thorlabs, reflectivity up to 99% in the region 400–700 nm) in the optical microscopy measurements. Finite-difference time-domain (FDTD) modelling Light scattering by the internal structure of the fronds was simulated using a three-dimensional finite-difference time-domain (FDTD) method for different ultrastructures obtained from TEM images. FDTD simulations can generally be used to calculate the light-matter interactions of arbitrary geometries. The use of FDTD modelling has a number of advantages over classic modelling methods, including allowing the input of measured TEM images with an assignment of a refractive index to each greyscale and calculating a spatial light scattering pattern reflected from that structure (see ref. 37). For the simulations we used Lumerical 8.7 (Lumerical Solutions Inc., Vancouver, Canada, http://www.lumerical.com/tcad-products/fdtd/), a commercial-grade simulator based on the FDTD method62. The structural chemistry of the cuticle is not well characterised, thus the refractive index values of the material components are unknown. We therefore assessed the average refractive index of the algal frond from dried material by measuring the ratio of reflected light, 4% and applying Fresnel’s formula, . The average refractive index thus derived is nave = 1.5. Assuming the non-stained material in TEM images to be composed of hydrated cellulose with a refractive index of nCellulose = 1.4663, the dark-staining material has an approximate refractive index value of ~1.55. In addition, cuticular lamellae in the algae frond change from the natural hydrated state when dehydrated for the TEM preparation. To model the optical response from the hydrated frond, we therefore have to rescale the dimensions of the TEM image. Gerwick and Lang41 suggest that the entire cuticle increases by 1.8 times its thickness when hydrated in water, specifically individual layers increase by 1.3 times in thickness and interlamellar regions increase by twice their thickness. We performed FDTD simulations based on the TEM image in Fig. 2a, which was rescaled (as above) due to expected dehydration effects that occur in the TEM preparation. The modelling volume surrounding the algae frond was filled with water (RI = 1.33) to simulate natural aqueous conditions. The incident light beam was assumed to be a plane-wave with a broad-band spectrum covering 300–800 nm. The reflectance is subsequently calculated by the ratio of the light flux incident onto the structure and the light flux reflected through the detector plane above the frond (blue line in Fig. 4a). The spatial far-field light scattering profile is calculated by performing a far-field projection of the calculated field intensity in the same plane. We then simulated the reflectance spectrum for non-polarized incident light from a binarized model of the lamellar structure at the thalli tip (Fig. 4). The reflectance of the multilayered structure in the algae frond was calculated by applying classical multilayer theory for dielectric media based on the transfer matrix approach using MatLAB64. For this, we simplified the frond ultrastructure of Fig. 2a into 16 equally spaced layers of 85 nm and 70 nm, with varying refractive index of 1.46 and 1.55 for the two repeating layers, respectively (see above). Water with a refractive index n = 1.33 surrounded the multilayer on both sides. To model the optical effect from the middle section of the frond, we calculated a layer profile with thickness 50 nm/140 nm/30 nm/90 nm/60 nm/600 nm with refractive indices 1.55/1.47/1.55/1.47/1.55/1.47, respectively. Student’s t-tests were performed to determine whether the variation between the mean number of cuticular layers was statistically significant between sections from the tip and middle of the thalli. Tests were conducted using the statistical software MINITAB, release 16 (Minitab Inc., State College, PA, USA). The p-value for statistical significance was set at 0.05. How to cite this article: Chandler, C. J. et al. Structural colour in Chondrus crispus. Sci. Rep. 5, 11645; doi: 10.1038/srep11645 (2015). Chapman, R. F. Visual signals: color and light production in The insects: structure and function (eds Vukusic P. & Chittka L. ) 793–823 (Cambridge University Press, 1998). Parker, A. R. 515 million years of structural colour. J. Opt. A: Pure Appl. Opt. 2, R15–R28, http://iopscience.iop.org/1464-4258/2/6/201 (2000). Seago, A. E., Brady, P., Vigneron, J.-P. & Schultz, T. D. Gold bugs and beyond: a review of iridescence and structural colour mechanisms in beetles (Coleoptera). J. R. Soc. Interface 6, S165–S184, 10.1098/rsif.2008.0354.focus (2009). Vukusic, P. & Sambles, J. R. Photonic structures in biology. Nature 424, 852–855, 10.1038/nature01941 (2003). Kinoshita, S. & Yoshioka, S. Structural colors in nature: the role of regularity and irregularity in the structure. ChemPhysChem 6, 1442–1459, 10.1002/cphc.200500007 (2005). Kinoshita, S., Yoshioka, S. & Miyazaki, J. Physics of structural colors. Rep. Prog. Phys. 71, 076401, 10.1088/0034-4885/71/7/076401 (2008). Meadows, M. G. et al. Iridescence: views from many angles. J. R. Soc. Interface 6, S107–S113, 10.1098/rsif.2009.0013.focus (2009). Parker, A. R. The diversity and implications of animal structural colours. J. Exp. Biol. 201, 2343–2347 (1998). Parker, A. R. A geological history of reflecting optics. J. R. Soc. Interface 2, 1–17, 10.1098/rsif.2004.0026 (2005). Vukusic, P. & Stavenga, D. Physical methods for investigating structural colours in biological systems. J. R. Soc. Interface 6, S133–S148, 10.1098/rsif.2008.0386.focus (2009). Doucet, S. M. & Meadows, M. G. Iridescence: a functional perspective. J. R. Soc. Interface 6, S115–S132, 10.1098/rsif.2008.0395.focus (2009). Stevens, M. & Merilaita, S. Animal camouflage: Function and mechanisms in Animal camouflage: Mechanisms and Function (eds. Stevens, M. & Merilaita, S ) 1–16 (Cambridge University Press, 2011). Cott, H. B. Adaptive coloration in animals. (Oxford University Press, 1940). Cooper, K. & Hanlon, R. T. Correlation of iridescence with changes in iridophore platelet ultrastructure in the squid Lolliguncula brevis. J. Exp. Biol. 121, 451–455 (1986). Liu, Y., Shigley, J. & Hurwit, K. Iridescent color of a shell of the mollusk Pinctada margaritifera caused by diffraction. Opt. Express 4, 177–182 (1999). Wardill, T. J., Gonzalez-Bellido, P. T., Crook, R. J. & Hanlon, R. T. Neural control of tuneable skin iridescence in squid. Proc. R. Soc. Lond. Biol. 279, 4243–4252, 10.1098/rspb.2012.1374 (2012). Yonge, C. M. Giant clams. Sci. Am. 232, 96–105 (1975). Mäthger, L. M., Denton, E. J., Marshall, N. J. & Hanlon, R. T. Mechanisms and behavioural functions of structural coloration in cephalopods. J. R. Soc. Interface 6, S149–S163, 10.1098/rsif.2008.0366.focus (2009). Sharma, V., Crne, M., Park, J. O. & Srinivasarao, M. Structural origin of circularly polarized iridescence in jeweled beetles. Science 325, 449–451, 10.1126/science.1172051 (2009). Osorio, D. & Ham, A. Spectral reflectance and directional properties of structural coloration in bird plumage. J. Exp. Biol. 205, 2017–2027 (2002). Prum, R. O. Anatomy, physics and evolution of structural colors in. Bird coloration: Mechanisms and Measurements vol. 1 (eds Hill, G. E. & McGraw, K. J. ) 295–353 (Harvard University Press, 2006). Prum, R. O. & Torres, R. H. Structural colouration of mammalian skin: convergent evolution of coherently scattering dermal collagen arrays. J. Exp. Biol. 207, 2157–2172, 10.1242/jeb.00989 (2004). Burresi, M. et al. Bright-White Beetle Scales Optimise Multiple Scattering of Light. Sci. Rep. 4, 6075, 10.1038/srep06075 (2014). Vignolini, S., Moyroud, E., Glover, B. J. & Steiner, U. Analysing photonic structures in plants. J. R. Soc. Interface 10, 20130394, http://dx.doi.org/10.1098/rsif.2013.0394 (2013). Glover, B. J. & Whitney, H. M. Structural colour and iridescence in plants: the poorly studied relations of pigment colour. Ann. Bot. 105, 505–511 (2010). Graham, R. M., Lee, D. W. & Norstog, K. Physical and ultrastructural basis of blue leaf iridescence in two neotropical ferns. Am. J. Bot. 80, 198–203, http://www.jstor.org/stable/2445040 (1993). Lee, D. W. & Lowry, J. B. Physical basis and ecological significance of iridescence in blue plants. Nature 254, 50–51 (1975). Thomas, K. R., Kolle, M., Whitney, H. M., Glover, B. J. & Steiner, U. Function of blue iridescence in tropical understorey plants. J. R. Soc. Interface 7, 1699–1707, 10.1098/rsif.2010.0201 (2010). Thomas, M. M., Rudall, P. J., Ellis, A. G., Savolainen, V. & Glover, B. J. Development of a complex floral trait: the pollinator-attracting petal spots of the beetle daisy, Gorteria diffusa (Asteraceae). Am. J. Bot. 96, 2184–2196, 10.3732/ajb.0900079 (2009). Whitney, H. M., Kolle, M., Alvarez-Fernandez, R., Steiner, U. & Glover, B. J. Contributions of iridescence to floral patterning. Commun. Integr. Biol. 2, 230–232, 10.1126/science.1166256 (2009). Whitney, H. M. et al. Floral iridescence, produced by diffractive optics, acts as a cue for animal pollinators. Science 323, 130–133, 10.1126/science.1166256 (2009). Vignolini, S. et al. The mirror crack’d: both pigment and structure contribute to the glossy blue appearance of the mirror orchid, Ophrys speculum. New Phytol. 196, 1038–1047, 10.1111/j.1469-8137.2012.04356.x (2012). Vignolini, S. et al. Pointillist structural color in Pollia fruit. Proc. Natl. Acad. Sci. USA 109, 15712–15715, 10.1073/pnas.1210105109 (2012). Stavenga, D. G., Wilts, B. D., Leertouwer, H. L. & Hariyama, T. Polarized iridescence of the multilayered elytra of the Japanese jewel beetle, Chrysochroa fulgidissima. Philos. Trans. R. Soc. B 366, 709–723 (2011). Land, M. F., Horwood, J., Lim, M. L. & Li, D. Optics of the ultraviolet reflecting scales of a jumping spider. Proc. R. Soc. B 274, 1583–1589 (2007). Doucet, S. M., Shawkey, M. D., Hill, G. E. & Montgomerie, R. Iridescent plumage in satin bowerbirds: structure, mechanisms and nanostructural predictors of individual variation in colour. J. Ex. Biol. 209, 380–390 (2006). Wilts, B. D., Michielsen, K., De Raedt, H. & Stavenga, D. G. Sparkling feather reflections of a bird-of-paradise explained by finite-difference time-domain modeling. Proc. Natl. Acad. Sci. USA 111, 4363–4368, 10.1073/pnas.1323611111 (2014). Shawkey, M. D. et al. Structural color change following hydration and dehydration of iridescent mourning dove (Zenaida macroura) feathers. Zoology 114, 59–68, 10.1016/j.zool.2010.11.001 (2011). Jordan, T., Partridge, J. & Roberts, N. Non-polarizing broadband multilayer reflectors in fish. Nature photonics 6, 759–763, doi:10.1038/nphoton.2012.260 (2012). Guiry, M. D. How many species of algae are there? J. Phycol. 48, 1057–1063 (2012). Gerwick, W. H. & Lang, N. J. Structural, chemical and ecological studies on iridescence in Iridaea (Rhodophyta). J. Phycol. 13, 121–127 (1977). Berkaloff, C. L’ultrastructure des globules iridescents de Dictyota dichotoma. J. Microscopie 1, 313–316 (1962). Feldmann, G. & Guglielmi, G. Les physodes et les corps irisants du Dictyota dichotoma (Hudson) Lamouroux. C. r. hebd. Séanc. Acad. Sci., Paris 275 D, 751–754 (1972). Gaillard, J. Iridescence chez deux Dictyotales, Dictyota dichotoma (Huds.) Lamouroux et Zonaria tournefortii (Lamour.) Montagne: Cytologie des cellules iridescentes. Botaniste 55, 72–79 (1972). Gaillard, J., L’Hardy-Halos, M. T. & Pellegrini, L. Morphogenese du Dictyota dichotoma (Huds.) Lamouroux (Phaeophyta). II. Ontogenese du thalle et cytologie ultrastructurale des differents types de cellules. Phycologia 25, 340–357 (1986). Katsaros, C. & Galatis, B. Ultrastructural studies on thallus development in Dictyota dichotoma (Phaeophyta, Dictyotales). Brit. Phycol. J. 20, 263–276 (1985). Mangenot, G. Sur les corps irisants de quelques Rhodophycées. C. r. hebd. Soc. Biol., 112, 659–664 (1933). Pellegrini, L. Ultrastructure et origine des corps iridescents de Cystoseira stricta Sauvageau (Phéophycée, Fucale). C. r. hebd, Séanc. Acad. Sci., 279 D, 481–484 (1973). Pellegrini, L. Variations ultrastructurales de l’appareil de Golgi chez la Cystoseira stricta Sauvageau (Phéophycée, Fucale). Protoplasma 90, 205–228 (1976). Feldmann, J. Recherches sur la végétation marine de la Méditerranée. La Côte des Albères. Thése, Université Paris (1937). Pellegrini, L. & Pellegrini, M. Iridescent bodies of Cystoseira stricta Sauvageau (Phaeophyta, Fucales): their fine structure, development and nature in vegetative cells. Phycologia 21, 34–46 (1982). Feldmann, G. Sur I’ultrastructure des corps irisants des Chondria (Rhodophycées). C. r. Séanc. Acad. Sci., 270, 945–950 (1970). Feldmann, G. Sur I’ultrastructure de I’appareil irisant du Gastroclonium clavatum (Roth.) Ardissonne (Rhodophyceae). C. r. Séanc. Acad. Sci., 270, 1244–1260 (1970). Stoloff, L. & Silva, P. An attempt to determine possible taxnomic significance of the properties of water extractable polysaccharides in red algae. Econ. Bot. 11, 327–330 (1957). Stackhouse, J. Nereis britannica; continens species omnes fucorum in insulis britannicis crescentium: descriptione latine et anglico, necnon iconibus ad vivum depictis. Fasc. 2. (eds Hazard, S & White, J. ) 31–70 (Bathoniae [Bath] & Londini: [London],, 1797). Craigie, J. S., Correa, J. A. & Gordon, M. E. Cuticles from Chondrus crispus (Rhodophyta). J. Phycol. 28, 777–786 (1992). Carrington, E., Grace, S. P. & Chopin, T. Life history phases and the biomechanical properties of the red alga Chondrus crispus (Rhodophyta). J. Phycol. 37, 699–704 (2001). Fournet, I., Deslandes, E. & Floc’h, J.-Y. Iridescence: a useful criterion to sort gametophytes from sporophytes in the red alga Chondrus crispus. J. Appl. Phycol. 5, 535–537 (1993). Wiencke, C. et al. Impact of UV-radiation on viability, photosynthetic characteristics and DNA of brown algal zoospores: implications for depth zonation. Mar. Ecol. Prog. Ser. 197, 217–229 (2000). Sørensen, S. “Enzymstudien II: Uber die Messung und die Bedeutung der Wasserstoffionenkonzantration bei enzymatishcen Prozessen”. Biochem. Zeit. 21, 131–200 (1909). Schneider, C. A., Rasband, W. S. & Eliceiri, K. W. NIH Image to ImageJ: 25 years of image analysis. Nat. Methods 9, 671–675 (2012). Yee, K. S. Numerical solution of initial boundary value problems involving Maxwell’s equations. IEEE Trans. Antennas Prop. 14, 302–307 (1966). Amar, K. M., Manjusri, M., Lawrence, T. D., Susan, E. S., Bruce, R. H. & Georg, H. Natural Fibers, Biopolymers and Biocomposites in Natural Fibers, Biopolymers and Biocomposites (eds. Amar, K. M., Manjusri, M & Lawrence, T. D ) 1–36 (CRC Press, 2005). Yeh, P. Optical waves in layered media. (Wiley,1988). We would like to thank Elisabeth Chen for her help in the preparation of samples for electron microscopy at the Royal Botanic Gardens, Kew; Filip Ruzicka for his help in the translation of documents and Chris Williamson for his assistance in the collection of algal samples. The research leading to these results has received funding from the BBSRC David Phillips fellowship (BBSRC David Phillips, BB/K014617/1). BJG thanks the Leverhulme Trust (grant F/09-741/G). RHW thanks the British Phycological Society for a Project Award (2012). The authors declare no competing financial interests. Electronic supplementary material Rights and permissions This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ About this article Cite this article Chandler, C., Wilts, B., Vignolini, S. et al. Structural colour in Chondrus crispus. Sci Rep 5, 11645 (2015). https://doi.org/10.1038/srep11645 By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.
<urn:uuid:68cc2d0b-83ca-4824-8b77-714f70c2ef4b>
CC-MAIN-2023-23
https://www.nature.com/articles/srep11645?error=cookies_not_supported&code=4b483088-e4e4-440d-a4ce-0a49010c6178
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00711.warc.gz
en
0.832855
8,810
3.1875
3
Liesje Mommer's keynote speech for the Mechanisms of Plant Competition symposium on using molecular techniques to look at below-ground plant competition and facilitation. For other journal-sponsored symposia and workshops from INTECOL, check out the playlist here. As part of our new Mechanisms of Plant Competition Special Feature, Susan Schwimming talks to Alan Knapp about plant competition in water-limited environments. Water is the primary factor limiting the growth and productivity of land plants, and fluctuations in plant-available water are ubiquitous in most terrestrial environments, due to variable and unpredictable rainfall. Evolution has produced numerous strategies of compromise between the conflicting goals of maximizing growth and reproduction when water is available and minimizing the risk of mortality when it is not. Because no species is able to pre-empt all opportunities for water and nutrient uptake, many plant species can coexist. However, the mechanisms responsible for making this stable, competitive coexistence possible are often hidden and difficult to study experimentally. Understanding and predicting how plant communities will respond to contemporary climate change remains a challenge to science, but one that can be guided by addressing the fundamental ways in which fluctuations in plant-available water interact with competition, between either adults or seedlings. Schwinning, S., Kelly, C. K. (2013), Plant competition, temporal niches and implications for productivity and adaptability to climate change in water-limited environments. Functional Ecology, 27: 886–897. doi: 10.1111/1365-2435.12115 Ken Thompson, senior editor for Functional Ecology, discusses Simon Pierce's new paper, "Implications for biodiversity conservation of the lack of consensus regarding the humped-back model of species richness and biomass production.quot; Pierce, S. (2013), Implications for biodiversity conservation of the lack of consensus regarding the humped-back model of species richness and biomass production. Functional Ecology. doi: 10.1111/1365-2435.12147. Understanding animal movements involves a complex association of factors. In addition to anatomical constraints and factors like the surrounding environment, more cryptic factors can play a role-- such as an animal's internal, physiological state, or navigational capacity. Complex movement models have been constructed in an attempt to infer an animal's internal state based on movement behaviours, but direct studies of the effect of an individual’s internal state on movement behaviour have been lacking. African elephants are known to alter their behaviour in response to their physiological state, with elevated stress hormone concentrations being associated with reclusive behaviour and aggression towards humans. A better understanding of the link between internal, physiological state and the use of space in relation to the proximity of environmental features and refugia is important in mitigating human-elephant conflict. Read the lay summary for more information, or read the article online: Jachowski, D. S., Montgomery, R. A., Slotow, R., Millspaugh, J. J. (2013), Unravelling complex associations between physiological state and movement of African elephants. Functional Ecology. doi: 10.1111/1365-2435.12118. Recent analysis of global datasets has shown that plants are constrained in how they allocate resources to their leaves, with trade-offs between building sturdy leaves with a long lifespan that are inefficient in capturing light or building flimsy leaves with a short lifespan and high efficiency. However, it is unknown whether similar patterns occur at more local scales, particularly when you consider the same plant species growing under different conditions. In this study, Justin P. Wright talks with Alan Knapp about the surprising results of examining the effects of varying nitrogen availability and water table depth on the form and function of leaves of over 20 species of wetland plants and what that means for ecologists looking to predict how the addition or subtraction of species will affect the way that ecosystems function. Read the lay summary for more information, read the article online:Wright, J. P., Sutton-Grier, A. (2012), Does the leaf economic spectrum hold within local species pools across varying environmental conditions?. Functional Ecology, 26: 1390–1398. doi: 10.1111/1365-2435.12001 Coping with stress: some species survive by breaking the rules, Lanna Desantis explains in this interview with Robbie Wilson. This podcast is part of the Special Feature: The Ecology of Stress . For more information, read the article online: Desantis, L. M., Delehanty, B., Weir, J. T., Boonstra, R. (2013), Mediating free glucocorticoid levels in the blood of vertebrates: are corticosteroid-binding proteins always necessary?. Functional Ecology, 27: 107–119. doi: 10.1111/1365-2435.12038 Alan Knapp interviews Brad Butterfield about his paper "A functional-comparative approach to facilitation between and its context-dependence", part of an upcoming Special Feature on Mechanisms of Plant Competition, and the importance of taking a trait-based approach to plant facilitation. A great deal of research has been conducted on the mechanisms and outcomes of plant competition, what traits help plants compete, but less well understood is how such traits affect the outcome of positive interactions among plants. In this latest podcast, Alan Knapp, Editor of Functional Ecology, interviews Ryan Sponseller and his co-authors on their paper 'Variation in monsoon precipitation drives spatial and temporal patterns of Larrea tridentata growth in the Sonoran Desert'. Julia Cooke is the Haldane Prize Winner for 2011. In this podcast, Alan Knapp, Editor, Functional Ecology interviews Julia Cooke about her paper: Silicon concentration and leaf longevity: is silicon a player in the leaf dry mass spectrum? Read the paper: Cooke, J., Leishman, M. R. (2011), Silicon concentration and leaf longevity: is silicon a player in the leaf dry mass spectrum? For more details about the journal's Haldane Prize, Julia Cooke and past winners visit the British Ecological Society's website. Alan Knapp interviews Amy Austin about her paper co-authored with Victoria Marchesini where they examined how a massive bamboo flowering event, which occurred in 2001 over 200,000 hectares in Patagonia, Argentina , impacted carbon and nutrient cycling in a native old-growth forest. Listen to the podcast at soundcloud and read the paper online: Austin, A. T. and Marchesini, V. A. (2011), Gregarious flowering and death of understorey bamboo slow litter decomposition and nitrogen turnover in a southern temperate forest in Patagonia, Argentina. Functional Ecology's First Podcast September 2011 In Functional Ecology's first podcast, Phil Hulme talks to Alan Knapp, about his study which is the first comparison testing for consistency in flowering phenology of species established in the wild in both their native Europe and as introduced aliens in North America. Read the paper: Hulme, P. E. (2011), Consistent flowering response to global warming by European plants introduced into North America. Functional Ecology, 25: 1189–1196. - Special Features - Virtual Issues - Perspective Papers - Lay Summaries - Top Papers - App Access - Early View Articles - Current Issue - Sample Issue
<urn:uuid:449162d1-c37b-479b-89cc-73f881a7edbc>
CC-MAIN-2014-15
http://www.functionalecology.org/view/0/videos/podcasts.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609530895.48/warc/CC-MAIN-20140416005210-00558-ip-10-147-4-33.ec2.internal.warc.gz
en
0.904916
1,520
2.890625
3
HOME ENERGY SCORE CERTIFIED ENERGY ASSESSOR To support the city of Portland’s ‘Climate Action Plan’ to reduce carbon emissions, all homes listed for sale in the city of Portland need to be scored by a Certified Energy Assessor. While the law does not require any upgrades or improvements, the scores must be made public during the sale. WHAT IS A HOME ENERGY SCORE? The Home Energy Score is a measurement of the energy efficiency of a home based on an onsite evaluation of the physical characteristics of the house. A Home Energy Score is not a measurement of the household's actual energy usage, which is influenced by occupant behavior. If your home scores a 5, it is expected to perform comparably to an average home in Portland in terms of energy use. If your home scores a 10, it ranks among the 10 percent of homes expected to use the least amount of energy. A home scoring a 1 is estimated to consume more energy each year than 85 percent of homes. Scoring a 1 does not mean your home is poorly built. A beautiful home with up-to-date equipment can still get a low score if the square footage is high or if there is insufficient insulation. A low score just means there is significant room for improvement to reduce a home’s energy use. Scoring a 10 does not mean your home cannot improve. Even a home that uses less energy than most of its peers may benefit from additional energy efficiency or renewable energy investments.
<urn:uuid:0f6fd4e4-a652-439f-bf6c-ae2d8d5eac6b>
CC-MAIN-2020-05
https://www.murphyinspect.com/energy-score
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250599718.13/warc/CC-MAIN-20200120165335-20200120194335-00403.warc.gz
en
0.9392
312
2.625
3
Authors: Sweaney, Nicole; Driscoll, Don A.; Lindenmayer, D. B.; Porch, Nicholas Source: BIOLOGICAL CONSERVATION, 186 1-11, JUN 2015 Brief summary of the paper: Following landscape change, species invasions and extinctions may lead to biotic homogenisation, resulting in increased taxonomic and functional similarity between previously distinct biotas. Biotic homogenisation is more likely to occur in landscapes where the matrix contrasts strongly with native vegetation patches. To test this, we examined the distribution of ground-active beetles in a landscape of remnant Eucalyptus open woodland patches where large areas of lower contrast matrix (farmland) are being transformed to high-contrast pine plantations in south-eastern Australia. We sampled beetles from 30 sites including six replicates of five categories; (1) remnants adjacent to farmland, (2) remnants adjacent to plantation, (3) farmland, (4) plantation, and, (5) remnants between pine plantation andfarmland. Community composition in the pine matrix was similar to native patches embedded in pine (ANOSIM, Global R = 0.49, P < 0.000), which we suggest is due to biotic homogenisation. Remnant patches with edges of both farmland and pine plantation did not represent an intermediate community composition between patches surrounded by either matrix type, but rather a unique habitat with unique species. Farmland supported the greatest number of individuals (F = 9.049, df = 25, P < 0.000) and species (F = 5.875, df = 25, P = 0.002), even compared to native remnant patches. Our results suggest that matrix transformations can reduce species richness and homogenise within-patch populations. This may increase the risk of species declines in fragmented landscapes where plantations are not only replacing native vegetation patches, but also other matrix types that may better support biodiversity. Our findings are particularly concerning given expanding plantation establishment worldwide.y concerning given expanding plantation establishment worldwide.
<urn:uuid:d675044e-252e-4c49-aa7c-a3d7c9eb33fa>
CC-MAIN-2017-47
https://cie-deakin.com/2015/06/30/cie-spotlight-plantations-not-farmlands-cause-biotic-homogenisation-of-ground-active-beetles-in-south-eastern-australia/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805809.59/warc/CC-MAIN-20171119210640-20171119230640-00242.warc.gz
en
0.91628
424
2.859375
3
Worth and Worthwhile: uses Worth can be followed by a noun phrase which describes the value of something. He died worth $20,000. That piano is worth a few hundred dollars. I don’t think their cakes are worth the money. ‘Shall I talk to Paul?’ ‘ It is not worth the trouble.’ In questions about the value of money what or how much can be used. What is that piano worth? OR How much is that piano worth? To talk about the value of an activity, we often use an -ing form with worth. Note that it is common to use it as a preparatory subject in these clauses. It was worth meeting the manager. (NOT Meeting the manager is worth.) It isn’t worth repairing that computer. It isn’t worth talking to Peter. Is it worth visiting Singapore? Note that ideas such as these can also be expressed by a structure in which the object of the -ing form is made the subject of the sentence. Peter is worth talking to. (= It is worth talking to Peter.) That computer isn’t worth repairing. (NOT That computer isn’t worth repairing it.) Is Singapore worth visiting? (NOT Is Singapore worth visiting it?) In structures with -ing forms ‘worthwhile’ is sometimes used instead of worth. Is it worthwhile visiting Singapore? (= Is it worth visiting Singapore?) Worth can be modified by well. The book is well worth reading. (NOT Reading the book is well worth.)
<urn:uuid:5a46b295-3dc0-45ad-9872-1a0629e27544>
CC-MAIN-2017-39
https://www.englishpractice.com/words/worth-worthwhile/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689752.21/warc/CC-MAIN-20170923160736-20170923180736-00303.warc.gz
en
0.965014
335
3.28125
3
Prolog's default search algorithm is depth-first search (DFS), which is sometimes not convenient: DFS doesn't always find the solution for all problems, and when it does, it might not find the optimal solution. Let's say we want to find the shortest path through a directed graph with nodes represented by symbols and arc by the predicate arc/2. Then we can easily implement iterative deepening search to find the shortest path: path(X, Z, Path) :- length(Path, _), path_r(X, Z, Path). path_r(Z, Z, ). path_r(X, Z, [X|Path]) :- arc(X, Y), path(Y, Z, Path). path/3 backtracks over paths, ordered by length, if at least one path exists. Let's try it out: ?- path(a, g, P). P = [a] ; P = [a, b, f] ; P = [a, c, d, f] ; P = [a, b, c, d, f] How this works: when length/2 is called with a variable first argument, it generates a list of the desired length containing fresh variables. When, in addition, the second argument is a variable, it backtracks over all possible lengths starting at zero and stepping by one. The helper predicate path_r is called each time with a fixed path length.
<urn:uuid:761d4373-3c30-49fc-ae01-b55b34d067b9>
CC-MAIN-2013-48
http://en.wikibooks.org/wiki/Prolog/Search_techniques
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163049340/warc/CC-MAIN-20131204131729-00022-ip-10-33-133-15.ec2.internal.warc.gz
en
0.900027
308
3.78125
4
Parents as teachers means parents helping children learn Parents as teachers means parents helping children learn. Busy parents and especially single parents raising children can easily incorporate these activities into the daily routine. As a parent, you are your child's first and best teacher. Your child's attitude toward learning and school in general comes from you. So does his/her work ethic, and both are important to your child's success - in school and out. Important issues of health and nutrition fall within your domain, issues which can be addressed only by you. An alarming number of children are simply not getting enough sleep for their brains to function properly. Lack of sleep may be responsible for most of the failure in schools today! Most parents are not aware of the general of school-aged children. Many parents send their children off to bed thinking they are going to sleep when, in fact, they are texting or using the computer to communicate with friends or browse the internet. Parents are wising up and learning to ask children to leave cell phones and mp3 players charging in another room at night. When deprived of sufficient sleep, the brain alternates periods of focus with periods of non-focus. The sleep-deprived child, then, is unable to focus or concentrate. The situation presents itself as ADD-ish behavior. THE OVER-PROGRAMMED CHILD Most parents as teachers want their children to be involved in as many activities as possible, and there's nothing wrong with that. In fact, we know that for younger children especially, the more experiences they have, the more dendrites their brains will grow. However, multiple sports opportunities and extra-curricular activities may be preventing children from getting the rest they need as many of them must stay up late doing the obligatory homework assignments after returning home from these activities. These sports and extra-curricular activities, though beneficial, may in large quantities be robbing out children of the sleep necessary for optimum brain function. It may also be preventing them from having the time to which is of critical importance to child development. Moderation is the key, and parents as teachers must achieve some sort of balance. Glucose is fuel for the brain, and a good breakfast really will help your child learn, especially if it includes orange juice not made from concentrate. Studies by Dr. Fritz Mengert, neuro-epistomologist and learning expert, indicate that 6 oz. of the juice delivered each morning may significantly improve performance of at-risk children. He also recommends low-fat snacks such as animal crackers and low-salt pretzels to boost glucose amounts at mid morning and in the afternoon to provide a steady amount of fuel for learning. So sending snacks to school with your child is a good way for you to help in your role as teacher. The brain is 97% water and heats up during learning so water must be replaced to keep it functioning properly. Sending your child to school with a water bottle and encouraging him/her to drink water regularly at home is very important. All liquids are not created equal! There is no substitute for water! Go to Focus Games from Parents as Teachers Go to Memory Improvement Exercises from Parents as Teachers
<urn:uuid:c75e9832-93a7-46bb-ab3d-974c13d1821d>
CC-MAIN-2017-43
http://www.teacher-support-force.com/parents-as-teachers.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822480.15/warc/CC-MAIN-20171017181947-20171017201947-00891.warc.gz
en
0.967172
663
2.96875
3
Stray Light Correction Stray Light Correction The signal of a given sample is polluted by stray light coming into the instrument from other samples by means of either specular reflections (ghost images) or scatter. Stray light may be an significant contributor to the measured signal, particularly in the infra-red for ocean pixels close to clouds or land covered by vegetation. The OLCI stray light correction algorithm is defined below. It uses characterisation of stray light contamination to estimate the degradation and correct it. Stray light contribution to signal is evaluated from the already contaminated signal on the assumption that since it is a small contribution, the fundamental signal structure is preserved and it can be considered as an epsilon (ε) in the approximation: Once estimated it can be corrected for. straylight contamination can be split into the following two steps - A first contamination taking place in the ground imager, i.e. the imaging part of the instrument optics, with mixing of energy from the whole field-of-view, including both spatial dimensions, but without spectral mixing. - A second contamination occurring inside the spectrometer, with one spatial dimension (the along track direction) filtered out by the spectrometer entrance slit but including spectral mixing through scattering and reflections during or after spectral dispersion. Therefore, stray light correction is implemented in two steps, following the instrument signal generation but in the backward direction. Since the output from radiometric scaling corresponds to the signal sensed at CCD surface, it includes both stray light contributions. It must therefore be corrected, firstly for the spectrometer contribution, and secondly for the ground imager contribution. The spectrometer stray light term can be expressed as a two-dimensional convolution of the two-dimensional weighted radiance field. Note that the spectral dimension of the CCD shall be reconstructed from the 21 available samples (the OLCI channels) using linear interpolation on normalised radiance, avoiding the use of saturated samples. The ground imager stray light contribution term can also be expressed as a two-dimensional convolution of the incoming radiance field, independently for each OLCI channel. It can be estimated from the radiance field corrected for the spectrometer contribution.
<urn:uuid:37240138-e4b6-4ecb-a941-51d0d06b2ff8>
CC-MAIN-2023-23
https://sentinels.copernicus.eu/web/sentinel/technical-guides/sentinel-3-olci/level-1/stray-light-correction
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00054.warc.gz
en
0.912896
457
3.4375
3
Potatoes are a staple in many diets, and are a great addition to any garden. Planting potatoes can be a rewarding experience, but it is important to know the basics of planting and caring for potatoes. This article will answer questions such as: do potatoes grow better in pots or in the ground? What should potatoes not be planted by? Do potatoes grow back every year? How many potatoes should each plant produce? How often do you feed potatoes? How long can potatoes stay in the ground? Is coffee grounds good for potatoes? What do you add to soil before planting potatoes? What do I add to soil when planting potatoes? Do you bury the eyes when planting potatoes? Do potatoes grow better in pots or in the ground? It depends on the type of potato you are growing. Generally, potatoes grow better in the ground, as they require a lot of space for their root system and need to be planted deeply. However, potatoes can also be grown in pots, as long as the pot is large enough to accommodate the root system and the soil is well-draining. When growing potatoes in pots, it is important to use a potting mix that is specifically designed for potatoes, and water regularly. What should potatoes not be planted by? Potatoes should not be planted near other nightshade vegetables, such as tomatoes, peppers, and eggplants. Potatoes can be susceptible to the same diseases and pests that affect these other vegetables, and planting them too close together can lead to cross-contamination and spread of disease. Additionally, potatoes should not be planted near other root vegetables, such as carrots and onions, as these vegetables can compete for nutrients in the soil. Do potatoes grow back every year? Yes, potatoes do grow back every year. Potatoes are a type of tuber, which are an underground stem that store energy and nutrients. Tubers are perennials, meaning they come back year after year, and potatoes are no exception. Potatoes are planted in the spring and harvested in late summer or early fall. After harvest, the potatoes are stored in a cool, dark place until the following spring, when they are ready to be planted again. How many potatoes should each plant produce? The number of potatoes that each plant produces can vary greatly depending on the variety of potato, the soil, and the climate. Generally speaking, each potato plant can produce anywhere from 2-5 pounds of potatoes. However, some varieties can produce up to 10 pounds of potatoes per plant. It is important to note that the size of the potatoes can also vary depending on the variety, with some potatoes being much smaller than others. How often do you feed potatoes? Potatoes should be fed every two to three weeks during the growing season. Depending on the variety, the amount of fertilizer needed can vary. Generally, a balanced fertilizer should be applied at a rate of 1/2 to 1 pound per 100 square feet. This should be supplemented with additional applications of nitrogen fertilizer every four to six weeks. How long can potatoes stay in the ground? Potatoes can stay in the ground for a surprisingly long time. Depending on the variety, potatoes can remain in the ground for up to four months. The ideal time to harvest potatoes is when the plant begins to die back and the potatoes are fully mature. If you wait too long, the potatoes may become overgrown and more difficult to harvest. It is best to keep an eye on the plants and harvest the potatoes when they reach the ideal size. Is coffee grounds good for potatoes? Yes, coffee grounds can be beneficial for potatoes. Coffee grounds are high in nitrogen, which is an essential nutrient for potatoes. Adding coffee grounds to the soil can help to improve soil fertility and promote healthy potato growth. Additionally, coffee grounds can help to reduce the acidity of the soil, which can help to prevent potatoes from developing diseases. Coffee grounds can also act as a natural fertilizer, providing potatoes with additional nutrients. Finally, coffee grounds can help to keep weeds away from potatoes, making them easier to maintain and harvest. What do you add to soil before planting potatoes? Before planting potatoes, it is important to add some essential nutrients to the soil. This can be done by mixing in compost or aged manure to provide organic matter and essential nutrients. Additionally, a fertilizer that is high in phosphorus and potassium should be added to the soil to give the potatoes the nutrients they need to grow. It is also important to make sure the soil is well-draining and not too acidic, as potatoes do not grow well in acidic soil. What do I add to soil when planting potatoes? When planting potatoes, it is important to add the right nutrients to the soil. The soil should be rich in nitrogen and phosphorus, as these are essential for healthy potato growth. Additionally, the soil should be well-draining and slightly acidic, with a pH between 5.0 and 6.0. To ensure the best soil conditions, it is recommended to mix in compost, manure, or other organic matter. This will help to improve the soil structure and provide the necessary nutrients for your potatoes. Additionally, adding a layer of mulch to the soil can help to retain moisture and keep weeds at bay. Do you bury the eyes when planting potatoes? No, you do not need to bury the eyes when planting potatoes. Potatoes can be planted whole, or cut into pieces with at least two eyes per piece. Plant the potato pieces 1-2 inches deep in loose, well-drained soil. Make sure the pieces are spaced 8-12 inches apart in rows that are 24-36 inches apart. Cover the potato pieces with soil and water them well. If planting whole potatoes, plant them 4-6 inches deep and space them 12-18 inches apart. In conclusion, potatoes grow best in the ground, not in pots. Potatoes should not be planted near tomatoes, eggplants, peppers, or other nightshade plants. Potatoes will grow back every year if the conditions are right. Each plant can produce between 3 to 5 potatoes, depending on the variety. Potatoes should be fed every 4-6 weeks with a balanced fertilizer. Potatoes can stay in the ground for up to two months before harvesting. Coffee grounds are not good for potatoes, as they can make the soil too acidic. Before planting potatoes, you should add compost or manure to the soil to provide nutrients. When planting potatoes, you should bury the eyes about two inches deep.
<urn:uuid:212665b3-156a-4cc1-a765-a1c135b17f32>
CC-MAIN-2023-14
https://rightlivinn.com/do-potatoes-grow-better-in-pots-or-in-the-ground/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945472.93/warc/CC-MAIN-20230326111045-20230326141045-00398.warc.gz
en
0.951147
1,325
3.328125
3
2Learning Outcomes When the training is completed you will be Aware of legislation and national guidance relating to protecting and safeguarding children and young peopleUnderstand what children and young people want and need to feel safeBe aware of different forms of abuseBe aware of possible signs and indicators of abuse and neglectKnow when and how to pass on a concern to the senior designated professionalUnderstand the issues from both local and national Serious Case Reviews 3SensitivityWe each carry our own experiences of being a child – during the training it is expected our agreement with each other will be toRespect each other and our individual experiencesKeep any personal matter shared today private unless by doing so will be detrimental to a childBe sensitive talking about our professional experiences as the subject often raises personal as well as professional issues for ourselves and each other. 4Children Act 1989 Children in Need (s17) Have a duty to investigate where there is reasonable cause to suspect a child is suffering or likely to suffer significant harm (s47) 5Section 17 What does it cover? Impairment of health and development without the provision of servicesORThe child is disabledDuties of the Local AuthoritySafeguarding and promote the welfare of the childPromote up bringing with own familyProvide services appropriate to child’s needAssess and provide services to child whose health and development is not as expected in partnership with parents. 6Section 47 What does it cover? The legislation does not talk about child abuse – it conceptualises it in terms of the outcome of the abuse for the childSignificant harmDuties of the Local AuthorityTo make enquiries to enable them to decide whether they should take any action to safeguard and promote the welfare of the child.Have a duty to investigate where there is reasonable cause to suspect that a chid is suffering or at risk of suffering significant harm. 7Education Act 2002Section 175 (2) A governing body of a maintained school shall make arrangements for ensuring that the functions relating to the conduct of the school are exercised with a view to safeguarding and promoting the welfare of children who are pupils at the school. 8Safeguarding in Education First circulated to schools in September 2004Updated to include managing allegations of abuse against members of staff in June 2005Developed to include requirements for safer recruitment in November 2005 9Children Act 2004 Appointment of the children’s commissioner A duty to co-operate using the 5 outcomes as measuresLocal safeguarding children boardsInformation sharing protocolsDirector of children’s servicesInception of children’s trusts 10Victoria Climbie Died in February 2000 aged 8 years old Her ‘aunt’ and partner found guilty of murder and received life imprisonment in January 2001Inquiry into Victoria’s life and death set up in April 2001Inquiry chaired by Lord LamingReport published in April 2003. 11Findings Victoria was known to: 3 housing departments 4 social services departments2 GP’s2 hospitals2 police child protection teams1 NSPCC family centreAn unregistered child minderFaith based organisations‘The extent of the failure to protect Victoria was lamentable’Lord Laming 12J Children Serious Case Review Lack of information sharing Inappropriate response to DVMultiple services involvedPoor record keepingLack of understanding re ThresholdsLack of engagement with fatherNeglect???????? 13Background Lauren Wright 1994-2000 When Lauren died she had lost 4 stone and weighed only 2 stoneOften appeared with bruises, which were explained awayLauren was killed by her step motherHansard text 24 April 2002 14Lauren Wright‘Lots of times, often she was covered with lots of small bruises and with major bruises about once a month. These included black eyes, bruising to her face and scratches across her back’ Class teacher ‘Her physical deterioration had been apparent for at least 5 months before she died’ Head teacher 15What Went WrongLauren’s step mother was a member of staff in the school.The senior designated professional had left the school and the role had not been replaced.A governor had offered to take on the role of senior designated professionalLauren’s teacher had not received any child protection training.Lauren’s step mother had told a paediatrician that Lauren was being bullied at school.The school did not make a referral to children’s social care. 16North Somerset Serious Case Review 2011 Class teacher committed and was charged with 36 sexual offencesPolice uncovered 30,500 indecent photographs and 720 indecent moviesThe youngest victim was aged 6 17What Went Wrong?The Teacher had worked in the school for 15 years, however within his first year colleagues had a variety of concerns.30 incidents of inappropriate or unprofessional conduct were recorded in school but none were referred through the Local Authority Designated Officer (LADO) 18Everyone Has a Responsibility To: Protect from maltreatmentPrevent impairmentCreate opportunities to enable children to have optimum life chances in adulthoodWorking together 2006 19Safeguarding in School Child protectionAnti bullying policyStaff conductAttendanceCurriculumBehaviourSafer RecruitmentWhistle blowingAllegations against staff – LADOHealth and SafetyOur buildingeSafety 20Categories for Child Protection Plans PhysicalNeglectTypes of abuseEmotionalSexual 21Physical AbusePhysical abuse may involve hitting, shaking, throwing, poisoning, burning/scalding, drowning, suffocating, or otherwise causing physical harm to a child. Physical harm may also be caused when a parent fabricates the symptoms of or deliberately induces illness in a childWorking Together 2006 22Possible Signs of Physical Abuse Runs away or fears going homeAggressive behaviourReluctance to have parents contactedDepressionScaldsInjuries not treated or treated inadequatelyChild flinches when approachedInjuries to parts of the body where accidental injury is unlikelyBruising that reflects finger tops or hand marksReluctance to get changed for PEWanting arms and legs covered even in very hot weatherBroken bonesCigarette burnsBite marksEar injuries 23Sexual AbuseInvolves forcing or enticing a child or young person to take part in sexual activities, including prostitution, whether or not the child is aware of what is happening. It may involve physical contact, including penetrative or non penetrative acts. It may include non contact activities such as involving children in looking at, or in the production of pornographic material or watching sexual activities or encouraging children to behave sexually inappropriate ways. 24Possible Signs of Sexual Abuse Stomach pains when walking or sittingSudden unexpected changes in behaviourNightmaresBedwettingRunning away from homeFearful of someoneSelf-harmingRecurrent genital dischargeAny sexual transmitted diseaseSexual drawingsSexually inappropriate languageNot allowed to have friendsPain, itching or bleeding of the genital areas. 25Emotional AbuseIs the persistent emotional maltreatment of a child such as to cause severe and persistent adverse effects on the child’s emotional development It may involve conveying to the child that they are worthless or unloved, inadequate and valued in so far as they meet the needs of another person. It may feature age or developmentally inappropriate expectations being placed on the child. Working Together 2006 26Possible Signs of Emotional Abuse Racial or other forms of harassment that regularly undermine a child’s self esteemTelling a child you wish they were dead or hadn’t been bornPersistently being over protectiveConstantly shouting at, threatening or demeaning a childWith holding love and affectionRegularly humiliating a childFailure to thriveInability to cope with praisePoor self esteem 27Why Focus on Neglect?Neglect cases provide particular challenges for professionals working with children & young peopleNationally neglect cases represent the highest proportion of children on child protection plans. Doncaster is mirroring this trendUnderstanding of both the impact & the identification of neglect is severely lacking10% of abuse cases in Britain are due to neglect 28Definition of NeglectNeglect is the persistent failure to meet a child’s basic physical and / or psychological needs, likely to result in the serious impairment of the child’s health or development. Neglect may occur during pregnancy as a result of maternal substance abuse. Once a child is born, neglect may involve a parent or carer failing to:Provide adequate food, clothing and shelter (including exclusion from home or abandonment)Protect a child from physical and emotional harm or dangerEnsure adequate supervision (including the use of adequate care-givers)Ensure access to appropriate medical care or treatmentIt may also include neglect of, or unresponsiveness to, a child’s basic emotional needs 29In groups:Discuss a case that you believe neglect to be the main issue:Identify on flip chart paperWhy you believe this is the caseIndicators 30Deliberate Neglect or Lack of Understanding Using the eCAF brings services together to meet the needs of the child/childrenAllows for discussion about progress “when is enough, enough”Detailed referral if thresholds are met 31Factors Contributing to Neglect Poor parenting of care giversHistory of neglect / abused care giversCare givers experience of care system / prisonSubstance misuseMental illness / learning disabilityInability to nurturePremature babies / low birth weightLack of bondingPoor parenting skills 32Factors Contributing to Neglect Disorganisation / mismanagementDomestic abuseSocial isolationFrequent house movesFailure to engage in services – missed appointments 33Family Dynamics High stress levels Family violence Unrealistic expectations of the childParents needs firstScapegoatingLack of boundariesFinancial problems 34Impact on the Child Delayed development Lack of Stimulation Behavioural problemsAggressionPhysical injury / abuseSexual abuse / inhibited sexualityPoor hygieneHunger / feeding problems / inadequate dietFailure to thriveHealth problems / inappropriate medical requests 35Brain development in the first years of life Babies are born with 25 per cent of their brains developed, and there is then rapid periods of development so that by the age of 3 their brains are 80 per cent developed. 37Development doesn’t stop at age 3! However research indicates that the most damage is done in the first 3 years of life. 38Social and Economic benefits of intervening early Early intervention that promotes social and emotional development can significantly improve mental and physical health, educational attainment and employment opportunities.Early intervention can also help to prevent criminal (especially violent) behaviour, drug and alcohol misuse and teenage pregnancy 39Parents actions are more important than who they are: The right kind of parenting is a bigger influence on a child’s future than, wealth, class, education or any other common social factor. 40Social CapabilitiesA child will engage in give-and-take exchanges with an adult: will engage with other children: will demonstrate the ability to get along with others: will understand and respond to the emotions of others: will develop a sense of belonging to a larger community through social interactions and relationships, and will have an awareness of their relationship to others in a group; and will develop the ability to interact co-operatively with others. 41Emotional Capabilities A child has secure attachment; is able to experience recognise and express a variety of emotions, and to recognise and empathise with those emotions in others; will manage their internal states and feelings, as well as stimulation from the outside world; will develop strategies to control emotions and behaviours; will manage their behaviours; and will recognise their ability to do things. 42By building these capabilities we enable children to happily engage with others and with society, and to learn, to develop fully, to attain and to achieve. 43If the predominant early experience is fear and stress the neurochemical responses to those experiences become the primary architects of the brain.Trauma elevates stress hormones, such as control. One result is significantly fewer synapses (or connections) . Specialist viewing CAT scans show an area that looks like a black hole. 44House of horror in Clifton, York A mother and father who imprisoned their pre-school youngsters for months in a house of horror have been jailed for three years.A neighbour’s call for help finally enabled police to break through the wall of excuses made by the parents to prevent the authorities discovering the stinking, squalid conditions in which they had to live, York Crown Court heard.Jailing them, Judge Stephen Ashurst said the couple’s three young children were “not so much living, rather surviving in that dark, insanitary and squalid house”.He said: “All three of your children were dirty and unkempt. They had, variously, cradle cap, severe nappy rash and other areas of inflammation. The two older children including (the four-and-a-half year old) were still in nappies.“They were prisoners in their own home unable even to play in the garden.”...... 47NeglectGood practice when working with adolescents who have suffered neglect. 48Most of the research around what works with adolescents who have suffered neglect, identifies that cognitive behavioural interventions offered the most benefits. Also the holistic approach used within multi – systemic therapy (MST). This approach emphasises the importance of the CAF and a multi disciplinary approach. 49Resilience:Young people who are doing well despite adversityUsing risk and protective factorsUsing the ‘strengths’ already evident 50Neglect does challenge professional & personal values leading to an avoidance of making value judgements. TAC meetings assist in Multi-agency decisions 51Visit our website www.doncastersafeguardingchildren.co.uk For any policies and procedures including the neglect assessment tool please use the Policies book in the top right hand corner. 52Confidentiality when passing concerns to Designated Teachers The majority of cases we will deal with arise from out knowledge of the children and our observations. This enables us to build a picture over time that might constitute a child protection concern.Another aspect of our work is dealing with disclosures when children tell us about somethingWhat does confidentiality mean to you as an individual and what does it mean in your role in school? 53Allowing Children to Talk Helpful ideasTake what you are being told seriouslyListen carefully – do not interruptAcknowledge what you have been toldRemain calmReassure – tell them they have done the right thingTell them you will have to pass the information on and who you will be telling and whyPass to the Designated Person on the referral formWhat to avoidDo not investigateDo not look shocked or distastefulDo not probeDo not speculateDo not pass an opinion about the alleged perpetratorDo not make commentsDo not promise to keep a secretDo not display disbeliefNever delay getting help 54What Stops Children From Telling? Being blamedDirect threatsFear of what will happenNo one listeningLack of communication or vocabularyNot recognising an abusive situationLack of trustAbuse is not considered unusualFeeling responsible 55Children Talk About Their Concerns When… School feels a safe place to beChildren’s views and contributions are respectedAdults and children are respectful of each otherThere is a culture of openness, honesty and trustStaff allow children to be heardThere is space for privacySelf esteem is highSafeguarding in Education and Safer Recruitment 2007 56I Think I Should Act Now What will stop me? What if I’m wrong? I’m not very confidentI don’t know the child very wellI’ve reported before and had a bad experienceI don’t know who to talk toIt’s not my jobSomeone else will pass it onI will do it tomorrowI have not got the timeIt doesn’t happen to families hereWhy I will pass it on?At this school we take safeguarding seriouslyI know our school procedureI know who to pass it toI know what is expected of meIt is my responsibilityThis is serious and importantChildren spend more time in school than any other placeAfter parents, school staff are often the next adults a child will respond toThe indicators of abuse are presentAbuse investigations often highlight a failure to act 57What Does the Senior Designated Professional Need to Know Who is the child – full nameWhere were you in school when they disclosed to youWas anyone else with youWhat did they say – their words and descriptionsWhat did you do or sayDid they show you an injuryWere is it colour, size what does it look likeWas the disclosure of a sexual natureWhat else do you know about the child
<urn:uuid:e27183a3-39e3-463c-bec4-cce23ed31320>
CC-MAIN-2017-26
http://slideplayer.com/slide/3881063/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320386.71/warc/CC-MAIN-20170625013851-20170625033851-00521.warc.gz
en
0.938784
3,390
2.515625
3
Who should get tested for HIV? - HIV testing, part 2 This one-page handout with accompanying video and audio recording educates people about who should be tested for HIV. It explains that everyone 13 to 64 years old should be tested for HIV at least once. It identifies behaviors and health conditions that place a person at increased risk of HIV infection, and recommends HIV testing for those groups as well as pregnant women and those who have been sexually assaulted. The document advises new sexual partners to discuss their sexual and drug-use history, and consider getting tested for HIV before having sex. The English language resource was created or reviewed by a medical professional for quality and accuracy.
<urn:uuid:33904b41-ad19-441d-ae36-77b3ca16a69c>
CC-MAIN-2017-39
https://healthreach.nlm.nih.gov/document/833/Who-should-get-tested-for-HIV-HIV-testing-part-2
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687833.62/warc/CC-MAIN-20170921153438-20170921173438-00470.warc.gz
en
0.967885
136
3.28125
3
Solar Turbines manufactures industrial gas turbines that are used for electric power generation, gas compression, and pumping. They produce from a couple hundred to 350 units a year, but these units are extremely complex and customized to their specific use, and must be extremely reliable. They often operate in remote locations, like drilling platforms in the middle of the ocean. Time to market is important to their customers, so they must design, build, test, and deliver a complex custom device in six to 18 months. The goal: the paperless shop floor Currently, they take the engineering bill of materials (the eBOM, which defines the turbine as designed, including all items, parts, components, sub-assemblies and assemblies) and turn it a manufacturing bill of materials (mBOM, which includes details of how the product is put together, including things used in the assembly process but not part of the final product), with an increasing amount of process planning. Because of the complexity of their products, they have automated the allocation of the mBOM parts to the process plan in PTC Windchill MPMLink. Each of their products is unique, so they can only use each process plan once—in another business it might be used repeatedly. Despite its one-time-use nature, the process plan still gives a lot of value because of the up-front definition. When it comes time to service the turbine, perhaps ten years later, the process plan will allow for complete knowledge of that particular turbine. Field service can create and take the necessary custom part to a remote location, saving an immense amount of work and time. The goal is “design anywhere, build anywhere”, so that the most cost-effective facility can be chosen for each manufacturing operation, and engineering can also be located anywhere. Someone unaccustomed to a modern production facility may not appreciate how big a role paper plays in keeping things organized. For example, a simple bracket will have a stack of sheets with the operations on them, and the ERP routing means that the paper is associated with that part. If there are five brackets, there are five stacks, each one including the specific customer order—and giving that paper up creates a risk of installing the bracket into the wrong order. But, Solar is exploring ways to get paper out of the shop floor by delivering 2D, 3D, and augmented reality work instructions to operators. Moving toward MRP Soon Solar will be using process planning to run their manufacturing resource planning (MRP), which will automatically create the customer orders. Further out is the adoption of augmented reality (AR) and a manufacturing execution system (MES). Today, the Windchill instructions are on a flat screen at each work station as they put the parts together, with an image of the component, the assembly instructions, and all the parts. They can click through to examine each of the constituents. Eventually Solar wants to have a part list by operation, so they can get the necessary parts to the shop floor just in time. In response to the shop floor’s needs, they will send the operation label as part of the mBOM, so it is clear which part is associated with which operation. Transition to augmented reality Solar is testing an interim form of augmented reality, from Light Guide Systems. Two Digital Light Processing (DLP) projectors mounted over workstations shine locations of parts and assembly instructions. For example, it shows the stack of washers on a bolt in the correct order, because who can always remember whether the smooth, the locking, or the star washer goes next? This allows for an easy entry to augmented reality and its use on the shop floor. They are also using AR displays on tablets showing the eBOM, the mBOM, and the process plan in detail, and will eventually move to fixed flat screen displays at each station. Further changes: MES and factory redesign Solar used to do process planning and manufacturing execution in Excel. Over the next couple of years they are moving to an integrated manufacturing execution system (MES), with Solumina, which integrates with Windchilll and their current ERP. This new MES will allow for paperless documentation, a complete definition for the operator, fully illustrated work instructions, and control over operational flow. Even after years of operation, there can still be problems with the way work flows through the physical factory. The products are so big that there can be trouble moving a turbine of unique design completely through without partially disassembling it to clear plumbing, a new piece of equipment, or a structural element. They intend to scan the shop weekly with a laser scanner and completely incorporate each measurement before commencing assembly of a given design. The benefits of long-term planning Solar Turbines works continually to optimize, streamline, and improve their operations to provide a quality product more quickly, cheaply, and safely. Their shop floor has a strong voice, and will need to feel secure with a paperless process before it is implemented fully. Images courtesy of Solar Turbines
<urn:uuid:eef33da9-dd88-49b7-a2fa-51d4c4b4442b>
CC-MAIN-2020-16
https://www.ptc.com/en/product-lifecycle-report/solar-turbines-the-benefits-of-integrated-process-planning-and-production-execution
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371886991.92/warc/CC-MAIN-20200410043735-20200410074235-00232.warc.gz
en
0.945699
1,045
2.6875
3
Bottles of wine and liquor almost as old as America itself were recently discovered behind a wall at a museum in New Jersey. The Liberty Hall Museum in Union says it discovered almost three full cases of Madeira wine, a fortified wine, dating to 1796 while restoring its wine cellar. NJ.com reports the museum also found 42 demijohns large glass jugs sometimes used for holding spirits dating to the 1820s. The museum said the monetary value of the wine cannot be made public. The museum was once the home of New Jersey’s first governor, William Livingston.
<urn:uuid:f8a555ec-25b9-4608-8746-882893105b28>
CC-MAIN-2017-39
http://www.itnnews.lk/other/featured/colonial-era-wine-discovered-video/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689102.37/warc/CC-MAIN-20170922183303-20170922203303-00580.warc.gz
en
0.971882
118
2.84375
3
The works of Michael Foucault, Diana Taylor, and Carla Freccero’s thoughts on history share underlying similarities yet differ in their approaches to understand the past. The differences that are brought out by these historians are based on the traditional and contemporary definitions as well as the extent of study directed to history. Within these three arguments, there are correlations as well as deviations in ideologies and interpretations, generating contention and debate on the true meaning of history. Foucault (2011) describes history as a field that is composed of both proper thoughts and historical thoughts that generate similar problems while focusing more on the documented information than on the real issues that took place at the historical time. The arguments posed by Foulcault are based on formerly raised arguments that separated history into two forms, the proper history and the history of thought (Abercrombie, 1998). Foucault argues that the longstanding misconception has been on the separation of ideologies based on the documentations rather than focusing on the real issues that took place at that time. The interpretation by Foucault (2011) is that history entails the documentations as well as the activities that took place in history. The interpretation is that being a representation of the past, history should encompass the events as well as the people who took part in documenting the activities. Foucault (2011) therefore demonstrates that the interpretation of history should be a diverse and integrative issue rather than being a thing that separates the activities from the people who documented them. History should be interpreted in from of its elements and at no one time ... ... middle of paper ... ...l the entities rather than separating them as it has been commonly accepted. Taylor argues that history is part of the present and should therefore remain as such, while Carla states that history is identified based on the uniqueness of the past events. This means that despite the varying approaches used to define it, history remains the formal report of the past events. Abercrombie, T. A. (1998). Pathways of memory and power: Ethnography and history among an andean people. Madison, WI: University of Wisconsin Press Foucault, M. (2011). The Archaeology of Knowledge. Retrieved http://www.sparknotes.com/philosophy/arch/section1.rhtml Freccero, C. (2007). Queer Times. South Atlantic Quarterly Summer 106(3): 485-494. Taylor, D. (n.d). Staging Social Memory: Yuyachkani. Retrieved from http://hemi.nyu.edu/cuaderno/yuyachkani/DTaylor_Yuyachkani.html Need Writing Help? Get feedback on grammar, clarity, concision and logic instantly.Check your paper » - Relevancy of the Program Review The topic of my research is to find out why English Language Learners (ELLs) have struggle throughout most of their education with literature, language and shows that the two are closely related. This close relationship is obvious because from all indications, literature presupposes language. It is inconceivable to discuss literature without reference to language. But going by the traditional practice at the secondary school level in El Centro Elementary School District, there are indications that Literature and English Language are treated as two separate school subjects.... [tags: Vocabulary, Hispanic, Students] 1949 words (5.6 pages) - English Language and Literature in the Middle ages English Society of the Middle Ages saw many developments and new trends, but none so plainly as the developments witnessed in the Language and Literature of that time. It began with the Norman Conquest: eloquent french words substituted for the “harsh” saxon equivalents, primarily in the upper levels of society. Literature began to reflect these changes in the language, and continued to evolve throughout the Renissance. Together, these aspects helped define the Middle Ages.... [tags: essays papers] 651 words (1.9 pages) - ... After discussing the matter with the class, I concluded that I disagree with David, as even though Orwell does indeed employ a heavy use of rhetoric throughout his essays, emphasising the need to be clear, he states on numerous occasions that he is a “victim of these methods.” Yet, I find that in order for Orwell to clearly communicate to the masses and to encourage this lingual clarity, he must occasionally manifest the political writing style which he has been inadvertently opposing, as his audience live in a world indoctrinated with “prose that is like a window pane” smeared with politics, void of individual thought.... [tags: democracy, style, literary devices] 3702 words (10.6 pages) - Chaucer’s Claim to Fame: Entrepreneurial Skills Seen in Geoffrey Chaucer’s Life Chaucer is not some unknown literary author who is known only by a dozen people in the English field. Besides Shakespeare, Chaucer is probably one of the most well-known contributors to English literature, if not the most well-known. His name is instantly recognizable, and many a high school student learned of him through the oftentimes-painful reading of his most famous work, The Canterbury Tales. Chaucer’s work is an extremely important text in terms of the evolution of the English language; The Canterbury Tales set itself apart from other literary works at the time by being one of the first pieces of... [tags: literature, english language] 1049 words (3 pages) - English Composition II Composition is “the act or process of composing or a piece of writing” (Webster). English Composition is a form of writing that incorporates the English language in to a proper arrangement. The arrangement can come in the forms of essays, poems, stories, or other types of literature. The word English Composition gained popularity during the late eighteen hundreds due to higher education. English Composition should be the foundation of any education achieved. Most universities and colleges have two different levels of English Composition level one and level two.... [tags: English language, Writing, Literature] 1104 words (3.2 pages) - I am not a scholar of English or literature. I cannot give you much more than personal opinions on the English language and its variations in this country or others. I am a writer. And by that definition, I am someone who has always loved language. I am fascinated by language in daily life. I spend a great deal of my time thinking about the power of language — the way it can evoke an emotion, a visual image, a complex idea, or a simple truth. Language is the tool of my trade. And I use them all — all the Englishes I grew up with.... [tags: English language, Second language, United Kingdom] 2512 words (7.2 pages) - History of English Literature I. INTRODUCTION English literature, literature written in English since c.1450 by the inhabitants of the British Isles; it was during the 15th cent. that the English language acquired much of its modern form. II. The Tudors and the Elizabethan Age The beginning of the Tudor dynasty coincided with the first dissemination of printed matter. William Caxton's press was established in 1476, only nine years before the beginning of Henry VII's reign. Caxton's achievement encouraged writing of all kinds and also influenced the standardization of the English language.... [tags: Literature Language Plays Essays] 4592 words (13.1 pages) - Research Methods 5ed002 Answer the questions below in relation to your identified research area in as much detail as possible with the 1500 word limit What “area” have you chosen as the focus for your level 6 research project. The area the project intends to focus on for the level 6 research project is College/ University students, in which English is their second language. Identify three key texts briefly stating how they are relevant to your research. Using selected literature to support your answer explain why you have decided upon your proposed research questions.... [tags: data collection, literature, language, English] 1217 words (3.5 pages) - The perfection of a short story lies in the symbiosis between content and form. Stylistic devices - especially imagery - contribute to the effect of the story. 1 Introduction The perfection of a short story lies in the symbiosis between content and form. Stylistic devices - especially imagery - contribute to the effect of the story, and according to Joseph Conrad "it is only through complete, unswerving devotion to the perfect blending of form and substance; it is only through an unremitting never-discouraged care for the shape and ring of sentences that an approach can be made to plasticity, to colour, and that the light of magic suggestiveness may be brought to play for an evanescent in... [tags: English Literature Writing Language Essays] 3820 words (10.9 pages) - English Language Coursework - A Christmas Carol A Christmas Carol was written by Charles Dickens and published in 1843. This is based on the lives of poor people that in past was so hard to survive as they didn’t have enough money. They were treated as animals by the upper class people. They always did the hard work but never not get enough paid. They were unable to provide their families the certain expensive things like fresh food, clothes, and beautiful house with the best furniture. Christmas is acknowledged as a very particular day and instant of life for all Christians.... [tags: English Literature] 1439 words (4.1 pages)
<urn:uuid:1dd216f8-8e5d-43ff-ad7e-9c0a4c2336f5>
CC-MAIN-2020-16
https://www.123helpme.com/english-language-and-literature-preview.asp?id=225214
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371662966.69/warc/CC-MAIN-20200406231617-20200407022117-00309.warc.gz
en
0.947206
1,988
3.546875
4
The colour relationships section continues to talk about another kind of opposition of colours on the colour circle – those that appear cold (blue-green) and those that appear warm (orange-red). These are entirely perceptual – and down to obvious associations such as the blue of a body of water and the orange glow of fire. Looking at recent photos for this section, the ‘complimentary colour’ shots tend to mix both warm and cool colours, however I’ve picked out a couple of them which I think show ‘warm’ and ‘cool’. While the background is green, there is a slight yellow/orangeness to it which – together with the yellow in the foreground – make the image appear warm. In this one it’s the violet and green which appear cool – though there is a contrast with the yellow in the image. Setting cool against warm creates and obvious, strong contrast and being opposites on the colour circle they balance each other. This kind of contrast is common in colours of light – e.g. sun near the horizon creates a warming yellow-to-red cast. Meanwhile, a clear blue sky has a cooling effect on subjects in shade.
<urn:uuid:bfa33310-53d1-459c-86fc-18d81231a120>
CC-MAIN-2017-34
http://phillong.me.uk/category/photographs/nature/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102757.45/warc/CC-MAIN-20170816231829-20170817011829-00165.warc.gz
en
0.941969
248
2.8125
3
A method for marimba by Kai Stensgaard 100 pages, 1208 exercises and music examples, links to video instruction & text in english and español! I initially started developing this technique back in 1980 after a back pack trip to Guatemala and Chiapas. I wanted to study the origin of the marimba. Here I got the idea of playing with six mallets and my first six mallet piece was written in 1980 and is called Two Mayan dances. The last 40 years I have refined the technique and written works especially for this technique and I count myself as the first marimba player to play with six mallets on the modern marimba. I developed my grip based on the Stevens Grip. I have written many solo works for six mallets and today this is mainly the grip I do the most when playing marimba. In 2006, I performed in front of colleagues from around the world with this technique at Pasic 2006 in Austin, Texas, USA. Subsequently I have toured the world and taught master classes on this technique. In 2009 I published the method textbook The Six Mallet Grip in English and Spanish. Click here to join the group “Marimba with Six Mallets” on Facebook: Here you can find a list with works for six mallets – if you know about a piece that is not on the list, please let me know.
<urn:uuid:7eb116cd-ec0a-409a-8d93-113a854de447>
CC-MAIN-2023-23
https://www.shop.kaistensgaard.com/product/the-six-mallet-grip-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00319.warc.gz
en
0.954634
291
2.59375
3
(Redirected from MINORITY.) - 1. More than half of a given number or group; the greater part: applied to opinions. In their endeavor to find a Biblical basis for every principle of law the Rabbis interpreted Ex. xxiii. 2 so as to derive the majority principle from it (Sanh. 3b). But since this passage stands in connection with laws regulating the administration of justice, the principle was applied only where a definite number ( V08p269002.jpg) was concerned, as when a difference of opinion arose among the judges constituting a court of justice (see Acquittal); or as in the case, frequently quoted in the Talmud, where a piece of meat was found in a street that contained nine shops for kasher meat and one for ṭerefah, in which case it was held that the meat came from one of the kasher shops, since they were in the majority. Other Biblical passages and laws had to be employed in order to find a Mosaic basis for the majority principle where the numbers were not definite ( V08p269003.jpg V08p269004.jpg; Ḥul. 11a, b). The principle was followed in all legal and ritual enactments and gave rise to a number of maxims, by which the Rabbis were guided in the decision of various cases. For instance, the majority of women marry when they are virgins (Ket. 16a); most children are born after nine months of pregnancy (Yeb. 37a); most women give birth to healthy children (Yeb. 36a); the majority of idolaters are loose in their moral conduct (Ket. 13b); most of those engaged in the ritual slaughtering of animals are expert (Ḥul. 3b); most of the actions of minors are of no value (Ḥul. 86a); the majority of animals yield milk only after they have borne young (Bek. 20b); most sick people recover, while most of those who are dangerously sick ("goses") do not recover (Giṭ. 28a).These and many similar maxims scattered throughout the Talmud were valuable not only in the decision of a doubtful case (see Ḥazaḳah), but also in determining the state of an object. There were, however, some rabbis who would not be guided entirely by the majority principle, holding that the case under consideration might belong to the exceptional minority ( V08p269005.jpg). R. Meïr (Yeb. 61b) forbade a minor from performing the levirate rite or the ḥaliẓah, declaring that he might later be found to be impotent, although the majority ofpersons are not impotent. R. Jose (Yeb. 67a, b), R. Akiba (Bek. 20b), R. Ṭarfon (Mak. 7b; comp. Ḥul. 11b; Tos. Ḥul. 11b, s.v. "Laḥosh"), and many other tannaim and amoraim also, were careful to provide for the minority. But the consensus of opinion among the Rabbis was to follow the majority in all cases, even where capital punishment was involved (Sanh. 69a). The performance of the greater part of an act was sometimes counted, on the majority principle, as equivalent to the performance of the whole act. If, in slaughtering an animal, one cuts through the greater part only of the esophagus and the windpipe, although the Law requires that both these be severed, the animal is ritually fit for food (ḥul. 27a; see Sheḥiṭah). Similarly, after the greater part of a child's body protrudes from the womb, the child is considered as born (Nid. 29a). When the principle of majority conflicted with the principle of ḥazaḳah the former took precedence (Ḳid. 80a). The same is the case when it conflicts with the principle of proximity ("ḳarob"; B. B. 23b). The principle of majority does not apply to monetary cases (B. B. 92b; B. Ḳ. 27b; Tos. B. Ḳ. 27b s.v. "Ko."). While in the case of a disagreement among the judges the opinion of the majority is followed (see Acquittal), in the case of disagreeing witnesses majority is entirely disregarded. If a hundred witnesses testified to a certain fact and two witnesses refuted their testimony the testimony of none was believed (Mak. 5b; Maimonides, "Yad," 'Edut, xviii. 3; see Evidence). - Goitein, Kesef Nibḥar, s.v. V08p270001.jpg, Lemberg, 1895; - Hamburger, R. B. T. s.v. Mehrheit; - Yad Malaki, ii. 157, Berlin, 1857; - Jalish, Melo ha-Ro'im, s.v. V08p270002.jpg, Halberstadt, 1859. - 2. The age at which the law permits one to manage his own affairs; full age; maturity. No definite age of maturity is given in the Bible. To the army, only those above twenty years of age were admitted (Num. i. 3). This was also the age-limit for those who had to pay the half-shekel when the people were counted (Ex. xxx. 14). The Levites were admitted to service at the age of thirty (Num. iv. 23; comp. viii. 24, where twenty-five is given as the age-limit; in I Chron. xxiii. 27 and in Ezra iii. 8 the age-limit is put at twenty; comp. Ḥul. 24a), and were dismissed from service at the age of fifty (comp. ib.). In the case of vows to the sanctuary ("'arakin"), mention is made of various ages with regard to determining the assessment value of the individual (Lev. xxvii. 1-8; see Estimate; Vow). The Rabbis, however, reckoned the age of maturity from the time when the first signs of puberty appear (Nid. 52a), and estimated that these signs come, with women, about the beginning of the thirteenth year, and about the beginning of the fourteenth year with men. From this period one was regarded as an adult and as responsible for one's actions to the laws of the community. In the case of females, the rabbinic law recognized several distinct stages: those of the "ḳeṭannah," from the age of three to the age of twelve and one day; the "na'arah," the six months following that period; and the "bogeret," from the expiration of these six months. In the case of males, distinction was made in general only between the period preceding the age of thirteen and one day and that following it, although, as will be seen below, other stages were occasionally recognized. The attainment of the age of majority, however, did not of itself render one an adult; the prescribed age and the symptoms of puberty together were necessary to establish the majority of a person. If there were no signs of puberty at the age of majority (i.e., at the beginning of the thirteenth year in a female and at the beginning of the fourteenth in a male) the person retained the status of a minor until the age of twenty. If after that period signs of impotence developed, thus explaining the absence of the signs of puberty, the person was admitted to the status of an adult; if such signs did not develop, the person remained in the status of a minor until the age of thirty-five years and one day—the greater part of the time allotted to man on earth (comp. Ps. xc. 10). In the case of a woman, the bearing of children was regarded as sufficient to establish her majority (Yeb. 12b; Maimonides, "Yad," Ishut, ii. 9; comp. "Maggid Mishneh" and "Leḥem Mishneh" ad loc.; for the whole subject see Nid. v. 3-8; vi. 1, 11-12; "Yad," l.c. ch. ii.).Marriage of Minors. The ḳeṭannah might be given in marriage by her father, and the marriage was valid, necessitating a formal divorce if separation was desired. Her earnings and her findings, also, belonged to her father, and he could annul her vows and accept a divorce for her (Nid. 47a; Ket. 46b). In the absence of her father, her mother or her brothers might contract a marriage for her, but such a marriage might be annulled by her without any formality before she reached the age of maturity (see Mi'un). Illegitimate intercourse with her carried with it the regular punishment for the transgressor, although she could not be punished (Nid. 44b). The na'arah, however, although still under the control of her father (Ḳid. 41a), was considered a responsible person; her vows were valid (Nid. 45b). The bogeret was regarded as entirely independent of her father's will and was looked upon as an adult in all respects (Nid. 47a). The Rabbis recognized in males a stage similar to that of the ḳeṭannah. A boy nine years of age was regarded as being of a nubile age, so that if he had illegitimate intercourse with a woman forbidden to him she would be liable to punishment, although he could not be punished until he reached the age of maturity—thirteen years and one day (Nid. 44a). His marriage, however, was not valid (Ḳid. 50b; "Yad," l.c. iv. 7), although he could acquire a "yebamah" through intercourse (Nid. 45a; B. B. 156b). A stage similar to that of the na'arah was recognized by the Rabbis in the case of the rebellious son (Deut. xxi. 18-21). The period during which one might become liable to the punishment inflicted upon the rebellious son was extended to include the three months (six months in Yer. Sanh. viii. 1) immediately succeeding the age of maturity (Sanh. 69a). After a boy had reached the age of maturity he was regarded a responsible person in all ritualand criminal matters, and the court inflicted punishment upon him for any transgressions. The Rabbis entertained the belief that heavenly punishment was not visited for sins committed before the age of twenty (Shab. 89b; comp. B. B. 121b; Maḥzor vitry, ed. Hurwitz, p. 550; Ḥakam Ẓebi, Responsa, § 49; but comp. "Sefer Ḥasidim," ed. Wistinetski, § 16, where the opinion is expressed that the heavenly punishment does not depend on age but on the intelligence of the transgressor; see also Asher ben Jehiel, Responsa, xvi. 1).Business Transactions of Minors. According to the Mosaic law minors are unable to enter upon any business transaction. The Rabbis, however, provided that those who are above the age of six and manifest an appreciation of business dealings should be able to dispose of movable property (Giṭ. 59a, 65a). After they had reached the age of maturity they might dispose even of real property that came into their possession through gift or purchase, but they could not dispose of inherited immovable property until they reached the age of twenty (B. B. 155a, 156a; see Consent; Gifts; Infancy). The same principle was followed with regard to their testimony. After the age of thirteen and one day their testimony was admitted, though in general only when the disposition of movable property was involved. If, however, they showed signs of intelligence and of an appreciation of the value of their testimony, they might testify also in cases involving immovable property (B. B. 155b; "Yad," 'Edut, ix. 8). Minors were disqualified from testifying in any case, although the testimony of an adult with regard to incidents that he had witnessed in his minority was in some cases admitted into evidence (Ket. 28a; B. Ḳ. 88a; see Evidence). For the age at which one might become a judge see Judge in Rabbinical Literature. Although the minor was considered not responsible for any act of his and could not be summoned to court for any injury caused to another by him or by his property, still when one of his animals showed signs of viciousness (see Goring Ox) the court was obliged to appoint some one to take charge of the animal. There is a difference of opinion among the Rabbis as to what should be done if it caused damage after that, some thinking that the damage should be collected from the minor's property, and others that the trustee should pay the damages (B. Ḳ. 39a).Religious Majority. On arriving at the age of maturity the boy is obliged to observe all the commandments of Judaism (Ab. v. 21; comp. Maḥzor Vitry, l.c.; see Bar Miẓwah). From that time on he may be counted as one of the ten needed for public worship (Shulḥan 'Aruk, Oraḥ Ḥayyim, 55, 9), and he may even act as ḥazzan in case of emergency, although, as a rule, the ḥazzan is required to have a full beard (Ḥul. 24b; Shulḥan 'Aruk, l.c. 53, 6-8). While the minor is regarded in many respects as incapable of performing religious observances (Kil. xvii. 15; Ṭoh. viii. 6; Maksh. vi. 1) and is placed in the same category as the deaf-mute and the idiot (see Deaf and Dumb; Insanity) still parents are enjoined to train their children in the observance of religious duties and customs even before they reach the age of maturity. On the Day of Atonement children of nine years of age should be made to fast part of the day, and those who have reached the age of eleven and are healthy should fast the whole day (Yoma 78b, 82a). In all other religious observances, as in making the pilgrimage to Jerusalem on every festival (Ḥag. 2a, 6a), in attending the general assembly on Sukkot following the Sabbatical year (Ḥag. 3a; see Deut. xxxi. 12), and in wearing ẓiẓit or tefillin ('Ar. 2b), the father is expected to train his child during various stages of its minority. - Löw, Die Lebensalter in der Jüdischen Li-teratur, Szegedin, 1875; - Mayer, Die Rechte der Israeliten, Athener und Römer, ii. 126, Leipsic, 1866; - Mendelssohn, Ritualgesetze der Juden, pp. 83-85, Berlin, 1793; - Mielziner, Jewish Law of Marriage and Divorce, pp. 71-74, Cincinnati, 1884.
<urn:uuid:b12c2a73-9d27-494c-80db-b2394402c62b>
CC-MAIN-2014-41
http://www.jewishencyclopedia.com/articles/10861-minority
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663417.12/warc/CC-MAIN-20140930004103-00276-ip-10-234-18-248.ec2.internal.warc.gz
en
0.967769
3,322
3.203125
3
Share This article Advanced Micro Devices will add “strained silicon” to its microprocessor lineup this quarter to improve performance, a company spokesman confirmed Friday. AMD was expected to begin implementing strained silicon in its 90-nm chips, which the company has just begun producing from its fab in Dresden, Germany. The addition of the technology of the chips to its older 130-nm process is somewhat of a surprise, although a company representative said AMD tweaks its silicon process on a regular basis; last quarter, the chip company added five incremental improvements, he said. Strained silicon works by “straining” the lattice of electrical bonds that make up the inside of a chip, pulling them apart slightly. In this way, the amount of drive current needed to power the chip is reduced, allowing the chip to run faster. Intel Corp., which has targeted its strained silicon for its 90-nm process, has said that it can also prevent leakage with its strained silicon technique, which would waste power. “It’s a different approach to technology transitions,” said Rob Keosheyan, a spokesman for AMD in Austin. “In terms of transistor enhancements, we’re not waiting for major transitions but making subtle enhancements to transistors on average of about one a quarter.” Keosheyan said the company can roll out the transistor changes to its product lines through a technique called automated precision manufacturing, AMD’s version of the “Copy Exact” procedure that Intel uses to monitor output. AMD’s approach uses tiny sensors that dynamically monitor and tweak the silicon “recipe” used to create chips on a wafer lot-by-lot basis. AMD owns over 250 patents on the APM technology, Keosheyan said. With the addition of strained silicon, AMD’s 64-bit chips will include a combination of silicon-on-insulator (SOI) as well as strained silicon, improving performance further. Silicon-on-insulator places the transistor’s silicon junction area on top of an electrical insulator, reducing the capacitance and the “charging time” a transistor needs before it can fire. Combining the two process tweaks is much more difficult than simply including one, AMD executives have said. To date, IBM has been one of the proponents of strained silicon. AMD had previously worked with a company called AmberWave and silicon foundry United Microelectronics Corp. to develop strained silicon, but shifted to a partnership with IBM in 2003. Keosheyan declined to provide additional specifics about the company’s strained silicon plans. AMD’s use of strained silicon was reported by The Semiconductor Reporter.
<urn:uuid:a5ad2f1d-bd61-4b78-b646-6b97f231ddcf>
CC-MAIN-2014-10
http://www.extremetech.com/extreme/56926-amd-to-add-strained-silicon-to-processors
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654886/warc/CC-MAIN-20140305060734-00095-ip-10-183-142-35.ec2.internal.warc.gz
en
0.947384
561
2.515625
3
CHINESE DOG BREEDS Pug, thought to be from China Dog breeds indigenous to China include the chow chow, Pekingese and shar pei. Because China was closed to outsiders for such a long time, the outside world knew little of these dogs until relatively recently. This has also meant that their genes have not entered breeds that originated from Europe. Chinese breeds did not really appear outside of China until around 1780. Some were smuggled out of China by sailors in the 1800s. A few of these dogs were displayed at the London Zoo under the sign “Wild Dogs of China.” These dogs had been fed grains their whole life and had a hard time adapting to Western meat diets. Articles on PETS IN CHINA factsanddetails.com BrinGing Pets to China China.org question ; One-Dog Policy in China www.independent.co.uk ; Dog and Cat Meat Ban guardian.co.uk ; Dog Life Photos foreignpolicy.com ; Wikipedia article on Chinese Dog Breeds Wikipedia The Pekingese, according to American Kennel Club, “combines marked dignity with an exasperating stubbornness, which serves only to endear him the more to his owners, He is independent and regal in every gesture; it would be a great indignity to attempt to make a lap dog out of him. Calm and good-tempered, the Pekinese employs a condescending cordiality toward the world in general, but in the privacy of his family enjoys nothing better than a good romp. Although never aggressive, he fears not the devil himself and has never known to turn tail and run.” Pekingese were considered sacred in imperial times. The earliest known record of them is from the Tang Dynasty in the 8th century. Dog idols that resembled Pekinese were made of ivory, bronze, wood and other materials. Sometimes they were encrusted with jewels. For many years only the Chinese Imperial family was allowed to own them and the theft of one was a crime punishable by death. Names for Pekingese have included lion dog, a reference to its thick man, not its use in hunting lions; sun dog, an allusion to the brilliant, golden color of it coat; and sleeve dog, a reference to fact it was so small it could be fit in to the sleeve of Mandarin-style costume. Pekingese were first introduced to the West after the looting of the Summer Palace outside Beijing by the British in 1860. There were reports of many dead Pekingese found throughout the palace. Apparently their owners had preferred to see them dead than captured by the British. Four dogs found behind a curtain (their owner, an aunt of the Emperor, committed suicide) were given to Queen Victoria as a gift. Some other were taken by the Duke of Richmond who started breeding them The shar pei was once listed as the world's rarest breed by the Guinness Book of World records. Also known as the Chinese fighting dog, it has been praised for its courage and tenaciousness but is known today mostly for the loose folds of bristly skin all over its face and often all over its body. Shar pei is Cantonese for “sandy skin.” The breed originated in an area near Guangzhou (Canton) in Guangdong Province. Clay statues from the Han Dynasty (202 B.C. to A.D. 220) depict shar-pei-like dogs. They were not an imperial breed and were associated mostly with peasants who used them for a number purposes: herding livestock, hunting, protection. They have traditionally been big dogs. They were eaten and their skins provided clothing. Shar pei were originally not trained to fight, but were forced into the sport when dog fight fighting became popular around a hundred years ago. The loose skin was an advantage when it fought. A shar pei could still turn and bite when opponents grabbed the folds and opponents weren’t fond of biting the bristly folds any way. Shar pei were often not willing fighters. There were stories of them being fed alcohol, drugs and even gunpowder to make them fight better. They were no match for a pit bulls, bulldogs and other fighting dogs that were introduced to China from the West. When dogs were banned during the Mao era, the shar pei breed was kept alive by Hong Kong breeders and continued to survive in remote rural areas. Website: Hong Kong Shar Pei Club: www.sharpeiclubhk.com Shar Pei Characteristics The wrinkled folds are especially pronounced on shar pei puppies, who often have so many wrinkles they look like an animal trapped in a potato sack. These wrinkles diminish somewhat as the dog matures. Shar pei originally were not supposed to have wrinkled folds all over their body. One description of the breed’s goes: “Strong, compact, active and agile. The skin must be tough and rough while the coat must be short and bristly. Tight wrinkles over the body at puppy stage. In the adult dog, pronounced wrinkling only around the forehead and withers.” The frowning forehead wrinkles should resemble the shape of the Chinese character for longevity. Its tail is supposed to reach over the back like a “sickle” or a “double ring coin.” Like the chow chow, the shar pei has a blueish black tongue and mouth. The shar pei is generally quiet. When it does bark it make a throaty “chuffing” noise before all out barking. Shar pei also have small ears, a trait associated with many fighting dogs, and have a head that has been compared with that of a hippopotamus. They have curved teeth that create a locked bite that in fights was difficult for opponent’s to break. Many owners say that shar pei’s appearance is not what attracts them. They value the dog’s intelligence and loyalty and say they are great house and family dogs. Shar Pei Problems Shar pei puppies sell for around $1,000 in the United States and $700 in Britain. In Hong Kong and southern China they sell for only $300. Inbreeding and crossbreeding with chow chows, bulldogs and bull terriers has produced shar pei dogs with a number of health problems, The problems began in the 1970s when the American magazine Dog World urged dog lovers “to save the Chinese sher pei from extinction.,” giving the impression that only a few remained. Shei peis of all kinds were exported to the United States, where they became all the rage and sold for thousands of dollars. With greed as a primary motivation, they were bred no matter what their family history was and in some cases cross bred with bulldogs to increase their wrinkling. The general feeling was the wrinkles were cute and the more of them the better. The inbreeding caused genetic problems and the wrinkles turned shar peis into “walking skin problems.” The skins proved be an ideal breeding ground for bacteria and fungus. Many shar peis suffer from teh dkin disease mange dermatitis. Some animals have terrible itching and infection problems. They develop sores. The yeasty bacteria that grows in the folds gives them an unpleasant smell. Many shar pei suffer from entropion, a painful condition in which excessive folding around the eyes causes the eyelashes to turn inward and rub against the eyeball. If untreated it can cause blindness. The folds can also drop over the lips into the mouth — a condition sometimes called “meatmout”—and make eating difficult and painful. Face-lift-like surgery is sometimes necessary to correct the problems. In recent years, an effort has been made to track down pure breed shar peis in China and restore genetic diversity and restore the health of the breed. Shar-pei Genetic Mutations Shar-peis are an ancient Chinese dog breed characterized by two singular traits: thick, wrinkly skin and frequent bouts of fever. The wrinkles were a result of excess production of a substance called hyaluronic acid distributed throughout the dogs’ skin. That excess is likely caused by to the overactivation of a gene called hyaluronan synthase 2. [Source: New York Times, March 22, 2011] Researchers now say that the same gene mutation is responsible for both the wrinkles and the fever. “All shar-pei dogs have this mutation that causes the wrinkles, but the more copies they have, the higher the risk to have this fever,” Mia Olsson, a doctoral student at Uppsala University in Sweden who worked on the study, told the New York Times. The research appears in the journal PLoS Genetics. Dogs that carry multiple mutations of the gene seem predisposed to periodic fever, Ms. Olsson and her colleagues reported. Although the fever is short-lived, it can be intense and frequent, and cause inflammation. March 22, 2011 With more information, breeders might be able to avoid breeding shar-peis that have duplications of the gene mutation, Ms. Olsson said. The research was conducted with the help of breeders in the United States, Sweden and Spain. “Our highest priority right now is to see if there’s some way to create some kind of test or tool to reduce the number of dogs with the fevers,” she said. The fever closely resembles certain periodic fevers that humans inherit, and studying the mutation in the dogs could help human geneticists develop treatments. The most common periodic fever among humans is known as familial Mediterranean fever. It tends to affect people of Mediterranean and Middle Eastern descent, and there is no cure. Chow chows are the breed of dog perhaps most closely associated with China. They are big dogs, standing 20 inches or so at the shoulder, and weigh 45 to 70 pounds, They come in variety of colors and are known best for their long, thick coats of hair and mains, which makes them look a bit like lions. The breed’s name is thought to have been derived from the pidgin English term chow chow, a broad term used to describe anything novel. Others believe it comes rom the Chinese word “chou”, meaning edible. In China, the dog goes by various names, including “hei she-t’ou” (“black tongued”), “kwantung kous” (“Canton dog”), “lang kou” (“lion dog”) and “hsiun kou” (“bear dog”). Chow Chows are believed to be one of the oldest dog breeds. They seem to be relatives of Tibetan Mastiffs and Nordic Spitz dogs such as the Samoyed of northern Siberia. Some historians trace the dogs back to 11th century B.C. invasion of China by Mongol-like tribes. Reliefs from the Han Dynasty (202 B.C. to A.D. 220) depict Chowlike dogs engaged in hunting. An 8th century Tang emperor is said to have had 5,000 chows and an staff of 10,000 huntsmen. Chows were used as guard dogs and hunting dogs. Marco Polo described them being used to pull sledges. They were highly valued as a source of meat. The upperclass fed them an all grain diet and butchered them when they were young. Their long hair was used to make clothing. In the early 1900s chow chows were fairly plentiful. They were sold in markets as pets. During this period many chows found their way abroad. This was fortunate because the breed suffered in China under Communist rule, particularly during the Cultural Revolution. Chow Chow Characteristics Chow chows are strong and fast. They are still used in China to hunt Mongolian pheasants and a kind of Yunnan bird. They have massive heads and wrinkled faces that make them look as if they are scowling. Their long hair requires constant brushing and grooming and can make the dogs very uncomfortable in the summer. The standard of the breed description of the American Kennel Club goes: “A massive, cobby, powerful dog, active and alert, with strong muscular development, and perfect balance...head, broad and flat, with short, broad and deep muzzle, accentuated by a ruff; the whole supported by straight, strong legs. Clothed in a shining, offstanding coat, the Chow is a masterpiece of beauty, dignity and untouched naturalness.” Chow chows have blue-back tongues, lips and gums, which are also found on polar bears and a few Asiatic bear. This and the fact that chow chow puppies are little furballs that resemble teddy bears lead many Chinese to believe they descended from bears. Chow Chows have a reputation for being independent, suspicious, nasty to strangers, aloof, and rude. It is said they will protect their family and territory to the death. Dangerfield and Howell wrote in the International Encyclopedia of Dogs, “It has been said that the Chow will die for his master but not readily obey him; walk with him but not trot meekly to heel; honor him, but not fawn on his friends and relations.” Chow chows have been involved in some serous attacks on people in the United States. There were 44 percent less of them in the U.S. in 1994 than in 1990. Hairless Chinese Crested The Chinese crested is a hairless breed that some people regard as ugly and others view as charming. Sometimes referred to as “Treasure House Guardians,” they were bred by mandarins and members of the Han family and have a history in China that my go back hundreds of years. They were made famous in America by the flamboyant stripper Gypsy Rose Lee, who owned several of them and took them with her wherever she went. According to the book “A Celebration of Rare Breeds”, “The Chinese crested is a fine boned, small dog who is wonderfully graceful. His ears are erect and rather large. His almond shaped eyes are dark and radiate warmth...The Chinese crested has long and amazingly dexterous toes. Owners say they can curl their toes around your fingers. Males measure less than 13 inches at the shoulder, while females may not exceed 12 inches.” Like other hairless breeds, the Chinese crested is not completely hairless. It gets it name from the “crest” of hair on its head that is often tied into a topknot. They also have hair on their feet, which is often referred to as socks, and small plumes on their tail. The skin is very warm and some say it is has a satiny feel. Chinese crested dogs are a hairless species like the Mexican hairless and the Peruvian hairless. It was discovered in 2008 that a single gene, which scientists call FOX13, is responsible for the baldness. Many Tibetan cities and villages are filled with stray dogs. The killing of animals, especially dogs, is considered a sin in Tibetan Buddhism. Tibetan Buddhism holds that dogs are the last reincarnation before rebirth as human. Many dogs live in packs around temples, surviving off handouts by monks and tourists. Pet dogs are greatly valued and pampered. There is a dog sign and “year of the dog” on the Tibetan calendar as there is on the Chinese calendar. Dogs found in the Tibetan countryside can quite fierce. For protection against dogs Tibetans carry a heavy tapered metal rod with a leather chord known as a "goubang." Tibetan mastiffs used to own the streets of Lhasa at night. Now they are largely gone. One reason for this is a massive culling of dogs that took place in the early 2000s. The culling greatly angered Buddhists. Dog ownership is discouraged by the Chinese and for a while was banned but is now permitted within limits. There are four primary breeds native to Tibet: the Tibetan terrier, the Tibetan spaniel, the Tibetan mastiff and the Lhasa Apso. All these dogs have two common features: long heavy coats of hair to keep them warm in the Tibetan winters and tails that curl up over their backs. The KyiApos, or bearded sheepdog of Tibet, is a very rare breed. See Separate Article TIBETAN DOGS factsanddetails.com Image Sources: bulldog.com, Wikipedia, Amercican Tibetan Mastiff Association Text Sources: New York Times, Washington Post, Los Angeles Times, Times of London, National Geographic, The New Yorker, Time, Newsweek, Reuters, AP, Lonely Planet Guides, Compton’s Encyclopedia and various books and other publications. Last updated July 2011
<urn:uuid:5ebc165d-b1ee-4d15-97e1-9601808c406c>
CC-MAIN-2023-14
https://factsanddetails.com/china/cat12/sub81/item265.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.97/warc/CC-MAIN-20230322211955-20230323001955-00155.warc.gz
en
0.974499
3,548
2.78125
3
16 Free Online Maths Calculation Kids Games, Key Stage 2, Ages 7-11 Years. Math calculation, division, algebra and times tables interactive activities for Primary/Elementary kids. Use the teaching resources on an IWB for engaging whole class teaching or at home on a PC or Mac for math fun. Double Function Machine Two operation function machine with options to hide numbers and set all operations and numbers. Explore 2 step algebraic equations, hide and reveal elements in the expression. Also includes an assessment activity. Compare number size and place the greater or less than sign in the correct place. Three levels of numbers to 100, 1000 & 10000 Traditional frog jumping puzzle. Can you swap the green and blue fogs over? How few moves does it take? What if the number of frogs were to change? Can you reach the target number in as few clicks as possible? Makes use of doubling and halving strategies in working towards a target number. Similar to Crazy Counter but with different parameters. Makes use of doubling and halving strategies. Number Balance KS2 The KS 2 version of this activity for developing understanding of simple equations. Hide individual numbers or symbols as you wish. Uses the < and > symbols as well as =. Magic Number Cauldron Using a Macbeth style backdrop ingredients are added to the witches cauldron to make a number spell The activity needs supporting via teacher questioning but the basic objective is to work out the function of each ingredient. This is a two-step algebra equation quiz to support the understanding of algebraic expressions. 15 multiple choice questions with built in answer checking. Try to arrange the numbers so that the sides of the square add up to the target number. Add Like Mad Click on the number tiles so they add up to the value shown under the word "Number". Click on the number tiles so they subtract from 50 to reach the target value shown under the word "Number". Select two of the number tiles so that when they are multiplied together they equal the target value shown under the word "Number". Can you work out what the machine is doing to each number you put in? Read Sam's note and buy exactly what she asks for. Work out what is the best value to spend as little money as possible! Click on each child to find out their favourite hobby. Then type in the total for each hobby.
<urn:uuid:8265a38c-f308-4e3b-9ea3-670fbe5ffbc5>
CC-MAIN-2020-05
http://www.crickweb.co.uk/ks2numeracy-calculation.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251694908.82/warc/CC-MAIN-20200127051112-20200127081112-00554.warc.gz
en
0.875865
491
3.875
4
A Boston Micromachines Kilo-DM is being used in an adaptive optics system for the Optical Payload for Lasercomm Science (OPALS) project (see figure below) to improve data transmission rates on board the ISS. As the amount of data gathered by instruments on board the station has increased over the years the ability to trasmit the data has not kept pace. Without advancement in free space communications technology some of the data gathered may have to be tossed out or stored for long periods of time before it can be analyzed. Original figure from Nasa JPL website for OPALS. DM, magnification shapes, and supporting text added by Boston Micromachines. Adaptive optics is a key part of these systems as without it, the turbulence in the atmosphere would lead to increased noise causing high numbers of bit errors drastically slowing down the data transfer rate. Boston Micromachines deformable mirrors are fast enough to correct for atmospheric aberrations that corrupt the laser beam on its way back to the surface. You can find out more about this space based optical communications technology on NASA JPL's web page for OPALS. Or get a more in depth description of the system by reading the OSA article on OPALS. Our deformable mirror is mentioned in section 3.2. The project, as well as the Boston Micromachines Deformable Mirror being used, was mentioned recently in an article on the Sentinel Satellite, another space based instrument employing the use of optical data transmission technology. Missions like these show how practical the use of laser transmission systems is to drastically increase the bandwidth in communication channels sending information back to Earth. This technology is being considered for use on the ISS as well as deep space probes and Mars rovers.
<urn:uuid:4f624a4f-71ee-4214-83ec-d32344d79174>
CC-MAIN-2020-29
http://blog.bostonmicromachines.com/blog/the-opals-project-at-nasas-jpl-aims-to-increase-free-space-communication-data-rates-with-the-iss
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657129257.81/warc/CC-MAIN-20200711224142-20200712014142-00415.warc.gz
en
0.920835
353
3.203125
3
Are you a Right-Brain or Left-Brain Thinker? By Dr. John Robert Dew Originally published in Quality Progress Magazine, April 1996, pp. 91-93. One of the best ways … Chapter 1: Know Yourself — Socrates Lesson 5: Left-Brain/Right-Brain Unit 3: Foundations for Success 25 with injuries to the left side of the head lost You can observe students’ “ways” of thinking, behaving, speaking, and functioning to understand their natural learning preferences. Certain characteristics or ... Right Brain or Left Brain.pdf 1 Right Brain/Left Brain Dominance Are you a global thinker or an analytical thinker? Identify which of the following traits you possess to find out! The Convergence of Left and Right-Brain Approaches Two articles in 2002 characterized contemporary thinking about the dichotomy of analytical and intuitive approaches ... Chapter Fourteen of Prophets of PsychoHeresy II Gary Smalley and Dr. John Trent: Right-Brain/Left Brain Pseudoscience (The following is excerpted from the book ... Organization for Quality Education, December 1994 Left Brain, Right Brain: Fact and Fiction by Elizabeth Hampson, PhD The “left brain, right brain” concept of ... Left Brain/Right Brain Quiz . Directions: On a blank sheet of lined paper, write down the number of every description or characteristic below that applies to you. 2 2 Abstract Brain topographical studies of normal men have have shown that sexual excitation is asymmetric in the brain hemispheres. Group studies of patients with ...
<urn:uuid:11710b48-8d37-4aee-877f-eaceafc11d39>
CC-MAIN-2014-15
http://searchpdfebook.com/left-right-brain.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203422.8/warc/CC-MAIN-20140423032003-00395-ip-10-147-4-33.ec2.internal.warc.gz
en
0.788585
325
2.96875
3
If you are reading this, then you probably already know that centralized machine monitoring and automation of processes are two of today’s leading methods of optimization and thereby, ways of improving efficiency. However, machines in well-established production lines may be between 15 and 30 years old—although these machines can still perform their main functional tasks to a satisfactory level, they were not “born in the Cloud”. What can be done if they are not connected in the same way new devices, from the box tend to be these days? This is a problem that many manufacturers currently face. The issue, then, for these manufacturers is how to improve the productivity of existing production lines for feasible financial investment. Let’s look into the options available and how “digital” can be retrofitted in a cost-effective way. Integrating additional intelligent devices and sensor technology into a well-established production line of plastics injection molding machines (PIMMs), for example, can help to achieve these objectives. However, there are still challenges. For example, the machines and systems may not have the level of computing power, or memory capacity to record and store data satisfactorily, or the ability to communicate with their modern equivalents. In many cases, these machines use data formats and operating communication language protocols that are no longer used by today’s PLCs and industrial PCs. The production environment may also have mixed protocol legacy machines. In a lot of factories these machines still require individual programming by an operator, which can be very time consuming and potentially require input from multiple staff. An important route to Industry 4.0 is the ability to apply digitalization to the production environment by adding more intelligence into existing processes. Through a digital retrofit approach, it is possible to “smarten up” existing processes and deliver the tools for central machine monitoring and process optimization for minimal cost, on a short timeline, resulting in a fast return on investment and immediate productivity gains. Digital retrofit and thus keeping track of all manufacturing information in real time, and receiving up-to-the-minute data from robots, machine monitors and employees, consists of four different ways to improve production processes, increase cost savings and extend the lifetime of different types of machinery: Legacy machine protocol conversion; Condition monitoring / Energy measurement; Asset management; and Predictive maintenance. Although manufacturing execution systems used to operate as self-contained systems, they are increasingly being integrated with enterprise resource planning (ERP) software. Additional real-time condition monitoring of legacy machine key operating processes can help to reduce downtime and extend lifetime, thus achieving manufacturing productivity improvements. This can be accomplished by digitally retrofitting additional stand-alone MICA devices to store, analyze and process data from existing or extra retrofitted sensors. As a result, tasks such as status monitoring becomes easy, while, at the same time, allowing remote, centralized process control adjustment via the MES network. Going back to the PIMMs example, critical operating parts of such machines are subject to continuous wear. As wear increases, this can result in an increased number of rejected parts and expensive financial losses. This situation can be resolved, in this case, by monitoring the changes in the operating power curve characteristics of the screw pump and the pressure loading at the check valves. With retrofitting, a return-on-investment period of 6-12 months can be achieved. Machine process parameters can be remotely monitored and modified via centralized factory control stations, reducing downtime and enabling factory staff to be more effectively deployed. Machine operators can even monitor and affect the processes in the production line from off-site, via a smartphone or other suitable smart device, such as a tablet. By following a step-by-step digital retrofit approach, manufacturers can often implement their Industry 4.0 ambitions and improve OEE with a manageable, phased approach to making production machines cloud enabled, according to their available budget and labor resources.
<urn:uuid:7edf1921-5741-46d9-88fc-eb448e24a53c>
CC-MAIN-2023-50
http://operatorsystems.com/industry-4-0-how-oee-can-help-you-optimize/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00620.warc.gz
en
0.927826
801
2.515625
3
|Year||Population||Rank in US||Growth Rate| Based on the latest 2022 data from the US census, the current population of Ansted is 1,290. Ansted, West Virginia is the 9,268th largest city in the US. The peak population of Ansted was in 1990, when its population was 1,642. In 1990, Ansted was the 7,697th largest city in the US; now its fallen to the 9,268th largest city in the US. Ansted is currently 21.4% smaller than it was in 1990. Ansted has shrunk 17.9% since the year 2000. Ansted, West Virginia's growth is extremely below average. 89% of similarly sized cities are growing faster since 2000. |9264||North Charleroi, Pennsylvania||1,292||-8.1%| |9268||Ansted, West Virginia||1,290||-17.9%| |9269||Elbow Lake, Minnesota||1,290||1.4%| |9270||Broadway, North Carolina||1,289||22.8%| |9273||Mountain View, Wyoming||1,287||10.7%| |9274||St. Francis, Kansas||1,287||-13.7%| The total voting age population of Ansted, West Virginia, meaning US citizens 18 or older, is 1,099. The voting age population is 57.5% male and 42.5% female. According to the latest census statistics, 18.0% of the residents of Ansted are 65 or older. The racial demographics of Ansted are 99.6% White and 0.4% Black. Additionally, 0.4% of the population identifies as Hispanic. In Ansted, 26.4% of residents have an income below the poverty line, and the child poverty rate is 52.9%. On a per-household basis, 21.6% of families are below the poverty line in Ansted. Among those aged 16 and older, 54.1% of Ansted residents are in the labor force. Among the adult population 25 years old and over, 80.2% of Ansted residents have at least a high school degree or equivalent, 11.7% have a bachelor's degree and 1.0% have a graduate or professional degree. Among Ansted residents aged 5 and older, 0.0% of them speak a non-English language at home. Broken down by language: 0.0% of residents speak Spanish at home, 0.0% speak an Indo-European language, and 0.0% speak an Asian language. The unemployment rate in Ansted is 9.4%, which is calculated among residents aged 16 or older who are in the labor force. In Ansted, 21.9% of the residents in the non-military labor force are employed by the local, state and federal government. The median household income in Ansted is $35,197. In Ansted, 74.5% of housing units are occupied by their owners. Renters occupy 25.5% of housing units in Ansted. Of all the housing units in Ansted, 20.1% of them were build before 1940. In Ansted, 10.3% of the total housing units were built after the year 2000. The median gross monthly rent payment for renters in Ansted is $672. In Ansted, 74.5% of households have an active broadband internet connection.
<urn:uuid:c12f825d-9126-4750-bb97-be653e26e91d>
CC-MAIN-2023-14
https://www.biggestuscities.com/city/ansted-west-virginia
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949009.11/warc/CC-MAIN-20230329151629-20230329181629-00170.warc.gz
en
0.863067
1,284
2.84375
3
Several questions have come to the Cooperative Extension Center recently about pecan trees. They cover nut production and damage, diseases, and general maintenance. While pecan trees can survive tough conditions such as prolonged drought, they require careful management to produce the bounty of sweet nuts we all hope for. This article will address some practices to follow to improve our chances of enjoying sweet pecans in pies, delights, and other dishes throughout the year. Question: The husks on my pecan tree have black spots. What is wrong with them? Pecan tree scab is a common disease that causes brown to black lesions or spots first on the underside of leaves, then on upper leaves and on husks. In some cases, the entire husk may become black. Scab is caused by a fungus and is more likely to occur in wet areas with poor air circulation. When severe, scab can damage the tree and reduce nut production in the subsequent year. The first preventative step is to choose tree varieties with resistance to the disease. Remove debris such as dead leaves, shells, and limbs during the fall and winter. Itis possible to control the disease with chemicals, however, this typically requires special equipment to apply and may not be feasible or economical for homeowners. Powdery mildew is another fungal disease that causes white powdery appearance on leaves. This does not damage nuts, but it can stress the tree. There are several other diseases that may occur on pecan trees, but they are not as common in this area. Question: My pecan produced well but the nuts sometimes have black spots on them. What is causing the black spots? Are they safe to eat? Stink bugs can pierce through shells and suck out nutrients from nuts, causing black, bitter spots on the nuts. These spots can be cut out, and the rest of the nut is safe to eat. Question: My pecan tree has not produced much nuts in the last several years. We planted another pecan tree of a different variety close to the other and the new tree is bearing. Can we cut down the old tree? Pecan trees require a different variety of pecan tree to be planted within about 200 feet of the first for the flowers to be properly pollinated and produce nuts. Not only does it need to be a different variety, but it also needs to be a different mating type that releases pollen at a time when they female flowers on the neighboring tree are receptive. Cutting down the older tree may cause the young tree to stop bearing. The older tree may not bear because of environmental factors, variety, soil fertility, and insect damage. Late freezes during the pollination period can freeze flowers and reduce nut production. The foothills represent the cooler edge of where pecan trees will grow, so it is important to choose varieties that bloom later and to plant away from low-lying areas or frost pockets. It could be that later blooming varieties have been planted and will never bear in our climate. Some varieties are also “alternate-bearers”, meaning that they bear larger crops every other year. Fertilizing trees properly can reduce this phenomenon. Summer droughts can lead to nuts dropping prematurely or lack of fill. A dry fall can also lead to low production the following year. Pecans are native to river valleys with well-drained soils that also provide plenty of water. It is critical to supply adequate water to pecans- a rule to go by is about 2” rain per week. Do not neglect watering pecan trees if you want them to keep them productive. Pecans require adequate light for nut production, so avoid planting them in crowded areas in the landscape. Nutritional stresses or deficiencies can also lead to low nut production. It is a good practice to fertilize trees to support tree growth and nut production. Start with a soil test before planting or fertilizing any tree, but generally recommended rates for pecan trees are 1 lb. of 10-10-10 fertilizer per year of tree age, not to exceed 25 lb., for non-bearing trees, and 4 lb. per year per inch of trunk diameter, measured below the scaffold branches, for bearing trees. Evenly spread fertilizer under the tree canopy, in late winter or early spring. Do not fertilize young trees after June because new growth is especially susceptible to freeze damage. Zinc is a critical element for pecans, and pecan trees do not readily take up zinc from the soil. This can lead to distorted leaves or low nut production. Soil sampling around a pecan tree or before planting is a good way to tell if zinc is needed. Insect pests can also damage nuts, perhaps the most common in North Carolina being the pecan weevil. The pecan weevil causes two types of damage on nuts. Adult weevils, which are beetles, emerge from the soil during August and September, typically after 1” rain has fallen, and feed on shells before they harden, causing nuts to cease developing. The females lay eggs in the developing shells and larvae will hatch inside the shell and feed on the nut. When the larvae mature, they drill a circular hole in the shell, exit the nut, and move to the soil, where they stay for one to two years, emerging during August as adults. If you suspect pecan weevil or another insect is damaging your pecans, there are simple monitoring measures you can take to catch the insect when it is active and take timely control measures to reduce damage. There is an excellent publication on growing pecans in North Carolina that includes recommended varieties and more, accessible at: at: https://content.ces.ncsu.edu/growing-pecans-in-north-carolina. You can also pick one up at the Caldwell Cooperative Extension Center, 120 Hospital Ave NE, Lenoir NC. For specific questions about pecan trees or for other gardening information, contact Caldwell Cooperative Extension Center at 828-757-1290.
<urn:uuid:2dfe599a-e9c7-4c4f-b1d0-4dd3f0dabf63>
CC-MAIN-2020-34
https://caldwell.ces.ncsu.edu/2017/01/pecan-qa/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735867.94/warc/CC-MAIN-20200804131928-20200804161928-00321.warc.gz
en
0.951475
1,234
3.3125
3
Genesis 14:14 describes Abram’s rescue of Lot as follows: “When Abram heard that his kinsman had been taken captive, he led forth his trained men, born in his house, 318 of them, and went in pursuit as far as Dan.” Dan was the name given to a city in the northern-most territory in Canaan, occupied by the descendents of Dan, the son of Jakob. Given the fact that the descendents of Dan did not occupy this area until after the Conquest of Canaan, this could be pointed to as evidence that Genesis (or at least this periscope within Genesis) was not written until some time after the conquest of Canaan. Seeing that Moses died before the Israelites entered Canaan, he could not have written this account. There are at least two possible rebuttals. One would be to suggest that the identification of this area as “Dan” was due to a later updating of the text. On this view, Moses wrote this periscope and used the name of the city/region as it was called in his day. Later scribes, however, updated the text to reflect the modern names of the cities and regions Moses spoke of since modern readers would not be familiar with the ancient names.
<urn:uuid:15e22617-7ed4-49ae-96e6-4c64b7c9095a>
CC-MAIN-2014-35
http://theosophical.wordpress.com/category/theology/mosaic-law/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834258.45/warc/CC-MAIN-20140820021354-00172-ip-10-180-136-8.ec2.internal.warc.gz
en
0.990489
259
3.09375
3
A New Face at the Zoo Doug arrived at the Sacramento Zoo late one Thursday evening. He had company on his journey from Alabama and enjoyed some favorite foods on the plane. For Doug, the trip may have seemed somewhat bewildering, but for Sacramento Zoo staff, the long-awaited trip was cause for celebration. The 7-year-old male chimpanzee arrived after twelve months of thoughtful and extensive planning. The decision to add another chimp to the Sacramento Zoo was made by the Chimpanzee Species Survival Plan (SSP). This team of professionals assists 37 zoos across the United States by guiding the management of the chimpanzee population and providing the best possible environment for the animals. Why add a young male to the Zoo’s chimpanzee group of two males and three females? Unlike most other primates in the wild, it is the female chimps that leave their natal group. Therefore, the males are quite important to the fabric of the chimp social community. Very often, related males back each other up and support the leadership of the community. Chimpanzees are the most social of all the apes and live in highly fluid "fission-fusion" societies made up of shifting associations among individuals in communities of up to 120 chimps, often split into a number of subgroups.A male and his supporters make up the leadership of the main group. To allow for a successful chimpanzee society, it is important for zoo groups to contain mixed-age and mixed-sex social groups with multiple males, allowing room for sub-grouping, isolation and cooperation among members. The addition of a young male to the Sacramento Zoo chimpanzee population is important because it brings the group to an equal male/female ratio. “Doug, at age seven, is in a hero-worship phase with respect to older males. These youngsters tend to be very subordinate and very eager to hang on every vocalization and display from older males,” said Leslie Field, Animal Care Supervisor. “We hope Doug will add support to the leadership of the two older males (45 and 18 years old) in our current group,” Field added. Doug’s journey began long before he set foot in his travel crate. Every zoo animal transfer starts with a pre-shipment exam to make sure the animal is healthy enough to be moved. Once that is done, a health certificate is signed and the transportation arrangements are made. In this case, the California State Health Department had to issue a permit to allow the chimp across state lines. Another consideration was finding an airline which would transport a primate. Because chimps are genetically close to humans and some diseases can be transferred to and from humans, many airlines now shy away from shipping primates. Other zoos have successfully shipped apes with the larger cargo businesses, so after extensive checking, FedEx was selected. Leslie Field and primate keeper Janine Fong flew east to accompany Doug on his trip to Sacramento. Although chimps may be seen on television being led by the hand or walking through a crowded room, the reality is that zoo chimps are wild animals and keepers never pet or hold them. Chimps are approximately eight times stronger than people and Doug’s crate was retrofitted to ensure his safety and comfort. “We want chimps to act and socialize with other chimps—we are simply the caretakers, grocers, maid service and entertainment directors for them!” said Field. After arriving safely at the Sacramento Zoo, Doug moved into the veterinary hospital quarantine facility. Every animal that comes to the Zoo must go through a quarantine period to make sure the animal is healthy before moving in with the current resident population. Finally, Doug was introduced to his new home and chimp roommates. The introduction period lasted several weeks and consisted of daily monitoring while the chimpanzees gradually got to know each other. The get-acquainted process is step-by-step: first visually, then touching through a mesh barrier, graduating to a little one-on-one time with individual members of the resident group before joining the entire chimp gang. “Doug is doing well and we are pleased with his progress joining the group,” said Jim Schnormeier, Sacramento Zoo Curator. Welcome to California! back to top Round & Round and Up & Down If there was one overwhelming story this year, it was the state of the economy, with creative buyouts and bailouts being proposed at every turn. At the Sacramento Zoo, creative revenue-generating ideas are always being considered to allow us to continue the quality animal care that is our prime directive. Several years ago, we purchased a small “50-cent ride” dump truck to place near one of our construction sites. Not only is it a big hit with the kids who drive the truck daily, it turned out to be financially successful. The next big leap of faith was the trackless train. Following numerous discussions and meetings to be sure everyone was “all aboard” with this new addition, we are pleased to see that after three years, it is very popular with Zoo visitors and doing quite well. Following these successes, we sought something new for 2009. For several years, the idea of an exotic animal carousel was thrown around. A business loan was possible because of the revenue-generating potential, and the concept began to take shape. This coming spring, a hand-carved, specially-designed Conservation Carousel will join the train and truck at the Zoo. Providing an educational message to children and adults about the vanishing species in our animal world, we look forward to having guests float on a Sea turtle or fly on a Bald eagle. There will be an opportunity for donors to “adopt” the animal of their choice, and we anticipate years of smiles as visitors learn about their favorite endangered animals while visiting them at the Sacramento Zoo. back to top Ask the Vet What are some of the veterinary challenges and rewards when working with chimpanzees? Chimpanzees are incredibly strong and incredibly intelligent. These are the two biggest challenges and rewards in providing health care to these animals. You must always respect and plan for their strength when working with chimpanzees. Safety for the animal and the staff must always be on our minds. It is nearly impossible to keep any type of bandage or cast on an adult chimpanzee that does not want it on. They are so strong and so dexterous, that they can remove just about any bandage we apply, even fiberglass casts. We can make use of their intelligence to have the chimp help us provide health care. Many of our chimps will present to keepers and veterinarians various body parts for superficial examination through the enclosure mesh. By doing this we can observe and treat minor wounds without having to anesthetize the chimpanzee for every examination. Some of our chimpanzees will even allow us to give them injections! This greatly reduces the stress to the chimpanzee as well as to the staff. In the future, we hope that this will evolve to the point that the chimpanzees will allow voluntary blood samples to be drawn from their arms. At the Sacramento Zoo, our chimpanzees receive many of the same vaccinations that humans receive including a tetanus vaccine every 10 years. They generally receive complete physical exams every other year. One of the greatest rewards is helping these wonderful animals live long and happy lives. back to top Reptiles and Amphibians Look for new frogs in the reptile house. Panamanian golden frogs, Yellow-banded dart frogs, Whites tree frogs, and two Caeciliams have all joined our population of amphibians. The Panamanian golden frog is an endangered toad managed by a Species Servival Plan program in AZA accredited Zoos and the El Valle Conservation Center in Panama. These conservation efforts to breed the toads are the only chanve for survival. As recommended by the Lion Species Survival Plan®, our male lion, Luxor, has moved to the Peoria Zoo in Illinois. The breeding recommendation by the SSP was to bring Kamau, from the San DiegoWildAnimalPark, to breed with our current female lion. Kamau’s genes are highly desirable, as his parents’ genetics are underrepresented in the community. A fundamental conservation issue is the preservation of genetic diversity in the captive population, and new bloodlines brought into the breeding arena are essential. We are excited to welcome 2-year-old Kamau to our Zoo family and hope he will bring new additions to our family. A new male touraco, Lloyd, has joined the female on exhibit with plans for breeding. The Thick-billed parrot exhibit expanded the large group with the addition of two new young females, hatched and raised here at the Zoo. The female ostrich has adjusted well to her introduction into the zebra exhibit. The male ostrich has black feathers, whereas the female is a brownish-grey. back to top Education Bulletin: New Aviaries Providing a home for native wildlife here at the Zoo shines a spotlight on the rich biodiversity that exists all around us. The Mediterranean region of California is designated by Conservation International as a Biodiversity Hotspot (biodiversityhotspots.org). A biodiversity hotspot is an area with a large number of species that are only found locally and has lost over 70% of its original habitat. The CaliforniaFloristicProvince is home to the giant sequoia, the planet's largest living organism and holds a number of threatened endemic species. Two new aviaries are opening soon in The Zoo’s Backyard with native species, Burrowing owls and Yellow-billed magpies. Burrowing owls are funny little creatures with long legs and big eyes that prefer to stand around on the ground and hunt at dawn and dusk. The burrowing owl population is considered at risk in California because of habitat degradation and destruction. Yellow-billed magpies are a new species to the Zoo. You may be familiar with these charismatic, colorful, and noisy birds, but you may not know that they are only found in California. In fact, birders from around the world travel to California specifically to add these striking birds to their “life list.” Unfortunately, their isolation in California means they are vulnerable because, as our population grows and habitat becomes scarce, yellow-billed magpies will have no where else to go. It is our hope that being surrounded by the animals at our Zoo will inspire you to conserve and “live green” in your daily life. The next time you are here, pay special attention to the California natives who call the Zoo home because these are the animals that will experience the greatest direct impact from your daily choices. back to top This handcrafted wooden carousel will feature 32 lifelike animals; some are endangered, all are children's favorites. Carousel animals include an anteater, flamingo, jaguar, ladybug, snow leopard … even a peacock chariot designed to accommodate people with disabilities. Each carousel animal is carved from wood, then hand-painted to create a truly unique piece. Educational and conservation messages inspire visitors as they ride. The carousel is a part of the Zoo’s fundraising drive for education and conservation awareness. For a $5,000 contribution, your name will be proudly displayed on one of the carousel animals for five years. A $10,000 donation will allow you to adopt the animal for the life of the carousel. Your tax deductible donation of $5,000 or more includes: ۰ a plaque at the base of your adopted animal ۰ invitation to the private carousel preview party ۰ a framed picture of you and your carousel animal ۰ recognition in the Zoo quarterly newsletter and the AnnualReport to the Community A carousel animal adoption is a great gift for someone special in your life, or just to show your support for the Sacramento Zoo, education and conservation. Reservations for Conservation Carousel animals will be accepted beginning January 5, 2009. There is only one animal of each kind available, so don’t wait too long or someone else will adopt your favorite! For more information click here or call 916-808-5150 or 916-808-3713. back to top Important Member Bulletin: Renew Now and Save! Effective march 1, 2009, prices will change in two membership categories. New Membership Prices for 2009: Member FAMILY pack - $75 Member PLUS pack - $115 The benefits of the PLUS pack will change to include two children's tickts to our annual Ice Cream Safari in July and 10 Zoo ride ticktes instead of Funderland coupons. If you choose to renew before March 1st (regardless of when your current membership is due to expire), you will receive the current rate and benefits. Don't wait ... renew now! Call the Membership Office at 916-808-5888 or login to renew online. back to top Ways to Give and Things to Get Guilt-Free Shopping Guide Zoo Parent Packages start at just $25. From tall to small, you can sponsor any animal in the Zoo. The proceeds from the Zoo Parent program help feed and care for the animals! Sacramento Zoo Membership Looking for a gift that will keep giving all year long? Howabout treating your special someone to a Zoo membership? They will remember you every time they visit the Zoo! Shop for a cause at Amazon.com. A percentage of all your purchases will be donated to the Sacramento Zoo. Use the Amazon logo on the homepage to start shopping; it will automatically donate to the Zoo at check out – with no extra cost to you! Or get started here now. The 2009 Entertainment Bookis here and better than ever! There are hundreds of discount coupons for restaurants, shows, spas, golf, movies, shopping and more … all for $40! Pick up one or two at the Membership Office while supplies last. Pavers, Benches, Giraffe Plaques Make a lasting impression. Be a permanent part of the Sacramento Zoo with a recognition plaque at the new giraffe habitat, a paver at Big Cat Row or a bench under a shady tree! Permanent recognition provides a touching memorial gift or wonderful remembrance for holidays and birthdays. Gifts range from $150 to $2,000. Car Donation Program Turn cars into carrots, corn, or cantaloupe for the animals. Do you have an extra vehicle? Can you use another tax deduction? Why not donate your used car or boat to the Zoo? Call our toll free number 1-866-570-7318 and a Car Program representative will assist you. In-kind donations - Trinkets into Treasure Donations of used or new goods and services are not only tax-deductible, but can help the Zoo. back to top
<urn:uuid:8cc503fd-6e2f-409a-bfe0-60be4e4dfccd>
CC-MAIN-2014-35
http://www.saczoo.org/page.aspx?pid=512
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826259.53/warc/CC-MAIN-20140820021346-00346-ip-10-180-136-8.ec2.internal.warc.gz
en
0.946096
3,092
2.859375
3
Oyster Reef Restoration Targeting This project uses GIS to select sites within Virginia Chesapeake Bay bottom suitable for the construction of oyster reefs. The project supports ongoing Baywide oyster reef restoration activities. Protocols for selection include: suitable substrate composition, public grounds, appropriate salinity, and disease resistant waters. Final products include a series of maps delineating the suitable sites. Products are currently hardcopy only, but a website is planned. Shellfish TMDLs There were two important goals for this project, including the assembly and compilation of digital data for the Coastal Plain and tidal waters of Virginia, and the categorization of the Division of Shellfish Sanitation (DSS) shellfish growing areas to determine if some are similar enough for water quality models to be effectively transferred from the modeled growing areas to other areas. This report summarizes the data and statistical analyses and discusses the results. Historic Oyster Reef Mapping for Virginia Primary Tributaries Historic bathymetric charts dating back to the 1800s and including major tributaries in Virginia are being digitized using ArcInfo. Bathymetric soundings from the mid to late 1800s suggest that bathymetric highs within the rivers may represent historic oyster reefs. Using the triangular integrated network (TIN) model to develop three dimensional representations of these relief areas, the structures appears to be elongated, elliptical or dome shaped. Bottom sampling from the early 1970s reveal that many of these are associated with shell bottom providing some verification that they were oyster reefs. Today, these reefs are gone from Virginia’s tributaries. This ongoing project to reconstruct the distribution of reefs in history may assist in understanding the demise of these habitats and ensure the success of future restoration efforts. See final report at: http://ccrm.vims.edu/pubs/ReefRestRpt.pdf Shellfish Aquaculture Suitability Model Using GIS, a landscape model will be developed to delineate areas suitable for shellfish aquaculture. This model will consider physical and biological parameters associated with good shellfish growing areas, as well as upland land use considerations that can enhance or impede the success of an aquaculture operation. The model will be developed using GIS and final products will include an interactive mapping site to display the suitable areas. This project expands on earlier efforts to explore shallow water use conflicts in Virginia.
<urn:uuid:2939b2e1-50ac-4251-ae98-854e24e07b50>
CC-MAIN-2017-47
http://ccrm.vims.edu/publications/catalog/aquaculture.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806419.21/warc/CC-MAIN-20171121151133-20171121171133-00409.warc.gz
en
0.913808
492
3.265625
3
From 2010 to 2017, use of the HIV-1/HIV-2 differentiation test increased, but the number of HIV-2 diagnoses remained very low, according to research published in the Jan. 24 issue of the U.S. Centers for Disease Control and Prevention Morbidity and Mortality Weekly Report. Anne H. Peruski, Ph.D., from the CDC in Atlanta, and colleagues analyzed 2010 to 2017 data from the CDC National HIV Surveillance System (NHSS) to describe the percentage of diagnoses for which an HIV-1/HIV-2 differentiation test result was reported; the authors then categorized HIV type based on laboratory test results. The researchers observed a substantial increase in the number of HIV-1/HIV-2 differentiation test results reported to the NHSS during 2010 to 2017, consistent with implementation of the HIV laboratory-based testing algorithm in 2014. In the United States, >99.9 percent of all HIV infections identified were categorized as HIV-1, while <0.03 percent of all HIV infections were HIV-2 diagnoses. There was an increase in the number of false-positive HIV-2 test results produced by HIV-1/HIV-2 differentiation. “CDC continues to recommend that laboratories follow the laboratory-based algorithm with the HIV-1/HIV-2 differentiation test as the second step,” the authors write. “Updates to the laboratory-based testing algorithm merit consideration in the United States. This could include development of new U.S. Food and Drug Association-approved tests to reduce the time to HIV diagnosis and treatment, primarily for HIV-1, but in rare cases, for HIV-2.” Source: Read Full Article
<urn:uuid:7ec2e560-deb2-454a-b847-885dbe58ca4f>
CC-MAIN-2023-40
https://chatsaudicam.com/health-news/cdc-hiv-1-hiv-2-differentiation-test-increasingly-used-in-u-s/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510149.21/warc/CC-MAIN-20230926043538-20230926073538-00340.warc.gz
en
0.932945
353
2.53125
3
A new study of brain activity in patients with hoarding disorder has found they exhibit abnormal activity in regions of their brain when deciding whether to keep or discard things. The study findings, which are reported in the August issue of Archives of General Psychiatry, also provide support for the argument that hoarding be regarded as being separate from other psychiatric disorders such as obsessive-compulsive disorder (OCD), with different treatments applied. “We wanted to see whether the brain activity of people who hoard is different from that of people with OCD, and whether it is different from that of healthy people,” said David Tolin, founder and Director of the Anxiety Disorders Center at Chicago’s Institute of Living Hoarding disorder is defined as the excessive collection of objects and an inability to discard them. The Institute of Living study included 107 adults, and compared neural activity among 43 patients with hoarding disorder, 31 patients with OCD, and a group of 33 healthy individuals. Compared with patients who had OCD and the healthy individuals, researchers found that patients with hoarding disorder exhibited abnormal activity in the anterior cingulate cortex and insula. When deciding about items that did not belong to them, patients with hoarding disorder showed relatively lower activity in those brain regions. However, when deciding about items that did belong to them, these regions showed “excessive functional magnetic resonance imaging signals” compared with the other two groups, according to study results. “These findings further suggest that hoarding should be considered separate from OCD, and that it deserves recognition as a unique psychiatric disorder,” Dr Tolin said. “It also shows us that people who hoard have a hard time processing information normally, and that when they have to make a decision, their brain goes into overdrive - specifically, those parts that are involved with identifying the relative importance or significance of things.” A separate classification category for hoarding disorder, which has previously been treated as a sub-type of obsessive compulsive disorder, will be included in the 2013 Diagnostic and Statistical Manual of Mental Disorders (DSM), published by the American Psychiatric Association. “I think it’s fantastic because it actually forces mental health services to start looking at hoarding disorder as a separate problem,” said Michael Kyrios, Professor of Clinical Psychology and Director of the Brain & Psychological Sciences Research Centre at Swinburne University of Technology. Professor Kyrios said the Institute of Living study is very credible because it looks at people with just hoarding disorder and no other significant OCD symptoms. “It looks at phenomena that are specific problems for people with hoarding disorder such as discarding your own possessions as opposed to discarding somebody else’s possessions,” Professor Kyrios said. As knowledge on hoarding disorder grows, and the separate DSM classification is delivered Professor Kyrios agreed it’s likely the number of people being diagnosed with hoarding disorder will increase. “As soon as you describe something people start looking for it and soon as you start looking for it you’ll find that the incidence will go up,” Professor Kyrios said. “However, if the problem exists in the community, it’s better that we have accurate prevalence rates so we can better plan relevant responses and policies. ” Dr Tolin said the Institute of Living now wants to explore whether cognitive-behavioural therapy for hoarding can reverse these problems of brain function. In advance of the DSM classification for hoarding disorder, Professor Kyrios said state authorities in NSW, Victoria and Queensland are already developing policies on how to respond to hoarding problems in the community. Professor Kyrios has also helped develop cognitive behaviour therapy treatments in Australia, which he said are seeing very promising results. “The focus of the treatment for hoarding is not to throw away things, it’s to find areas of the house that aren’t being used for their intended purpose and to help find ways of clearing away those spaces so that people can use those spaces in a more positive and more constructive way. "There are no medications specifically for hoarding, there are no medications that can teach you to sort or organise in a systematic manner.”
<urn:uuid:1a2a5ab6-13ae-46b6-94a8-ccb39b8e9b20>
CC-MAIN-2017-43
http://theconversation.com/what-does-a-hoarders-brain-look-like-study-calls-for-rethink-on-treatment-8705
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825308.77/warc/CC-MAIN-20171022150946-20171022170946-00103.warc.gz
en
0.95472
879
3.171875
3
EXAMPLES FROM THE WEB FOR DUCT Into this duct the ranks of cells around it pour out the peptic juice. I heard a muffled clank; then a hum began, echoing up the duct. I reached the top of the duct and pushed against the slot cover. And there was that hazard here, for every duct looked like every other one. The operator then carefully examines the duct preparatory to cutting it. The penultimate section, in which the Mllerian duct is seen. Openings of ureters in Wolffian duct in the female (fig. 3). This gland is the pancreas, and the duct is the pancreatic duct. Ventrally it is closed in by the dorsal wall of the Wolffian duct. At this period the formation of the Mllerian duct takes place.
<urn:uuid:31e27cd6-a9c5-436d-bf27-81811c69841e>
CC-MAIN-2020-29
https://www.thesaurus.com/browse/duct/3
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655924908.55/warc/CC-MAIN-20200711064158-20200711094158-00154.warc.gz
en
0.941624
183
2.546875
3
Healthy communities start with healthy kids! The Center’s TEACH program is a weekly program for 4th – 8th grade students that uses a variety of age-appropriate activities to equip students with alternatives to violent behavior in order to build a healthier foundation for intimate relationships later in life. TEACH not only educates students who engage in peer abuse (bullying), it fosters a culture of active bystanders and assertive behavior to help students learn the power of standing up for others and for themselves. The Center is dedicated to ending sexual assault and domestic violence in our community. To that end we have educational programs that are available to the public. We will come to your school, club or business and give presentations tailored to suit your needs. - Violence Prevention Presentations - Healthy Relationships Presentations - Dating Violence Prevention Presentations - Professional trainings and in-services on a variety of topics For more information on please contact Cathy at CathyB@TheCenterNow.org or (530) 626-1450.
<urn:uuid:23dd94e6-4616-4f35-8531-f7ee4cccef04>
CC-MAIN-2020-29
https://www.thecenternow.org/healthy-communities/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890092.28/warc/CC-MAIN-20200706011013-20200706041013-00442.warc.gz
en
0.929158
212
2.6875
3
Brinjal is a rather small plant growing up to 1.5 m high. Brinjal is classified as a herb because of its non-woody stem. The simple leaves are oblong to oval, slightly lobed, and have an undersurface that is a paler green than the upper surface. Both leaves and stem are covered with fine hairs. The flowers sprout singly or in small clusters from the leaf axils. Individual flowers are star-shaped, light purple in colour and have short stalks. There are 5 stamens attached to the corolla tube and a single superior ovary. Its root system is fibrous. The fruits are berries with many seeds. Fruits are either long or round and vary in colour according to the variety: white, orange, green, purple or black. It is a perennial with fruits growing all year round.
<urn:uuid:07488f97-8332-4606-935d-e800cdb06d17>
CC-MAIN-2017-34
http://swamisiddhi.tradeindia.com/brinjal-small-2921526.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117519.92/warc/CC-MAIN-20170823035753-20170823055753-00515.warc.gz
en
0.963813
180
2.703125
3
Study of Winston Churchill's famous "Never give in" speech of 1941 to the students at Harrow School, as a lesson in speech writing, public speaking, and history. Key words: World War II, Germany, adversity, school song, "Never give up", air attacks, format, vision, mission, politics, imagery, emotional appeal, Ron Kurtus, School for Champions. Copyright © Restrictions Winston Churchill's "Never Give In" Speech of 1941 by Ron Kurtus (revised 26 July 2012) On October 29, 1941, United Kingdom (Great Britain) Prime Minister Winston Churchill visited Harrow School to to hear the traditional songs he had sung there as a youth, as well as to speak to the students. This became one of his most quoted speeches, due to distortions that evolved about what he actually said. The myth is that Churchill stood before the students and said, "Never, ever, ever, ever, ever, ever, ever, give in. Never give in. Never give in. Never give in." Then he sat down. In reality, he made a complete speech that included words similar to what are often quoted. Also, some believe he said, "Never give up." That too is incorrect. Questions you may have include: - How can I use this speech to improve my writing skills? - How can I use this address to improve my speaking skills? - What is its historical significance? This lesson will answer those questions. Learning from speech Read this address to gain insight on improving your speech writing, public speaking, and historical knowledge. Perform the exercises below, in your area of interest. Things to note when studying the speech are: - The length of the sentences and the number of commas. Short phrases make for effective delivery. - The logical flow of the speech. - The use of imagery and emotional appeal Outline the the speech to show where new ideas are presented and grouped. Point out where effective imagery, examples, or emotional appeal is used. Read the speech aloud—perhaps to a small audience or to yourself in a mirror. Pause at the commas and periods to allow for better understanding by the audience. Vary your pitch, rate and emotional level as you see fit. Churchill gave a number of inspirational speeches during World War II. However, events leading up to the speech gave a hint of optimism, concerning the outcome of the war. For one thing, the United States started supplying vast amounts of war materiel to the UK-Lend-Lease program in March 1941. Also, since Nazi Germany had invaded Yugoslavia and Greece earlier in the year and invaded the Soviet Union in June of 1941, it appeared that Britain was no longer the target for the main efforts of Germany. (Thanks to David Bell of the UK for adding some historical background.) Before speaking, Churchill discovered that the students had added a verse to one of the school songs: "Not less we praise in darker days The leader of our nation, And Churchill's name shall win acclaim From each new generation. For you have power in danger's hour Our freedom to defend, Sir! Though long the fight we know that right Will triumph in the end, Sir!" This fact was noted in the speech, which may have been primarily an unrehearsed or extemporaneous speech. Audio of address You can hear an audio of Winston Churchill's speech to read along. Note that it is not Churchill's voice but a slightly mechanical computerized voice. Unfortunately, it does not contain the inflection and emphasis of a true orator. Note: If you want to hear the text being read, click the Play button. It takes a few seconds for the sound to start. The voices are somewhat mechanical for computer use. Length of speech = 4 min. 12 sec. Text of address Prime Minister Winston Churchill: Almost a year has passed since I came down here at your Head Master's kind invitation in order to cheer myself and cheer the hearts of a few of my friends by singing some of our own songs. Body of speech The ten months that have passed have seen very terrible catastrophic events in the world—ups and downs, misfortunes— but can anyone sitting here this afternoon, this October afternoon, not feel deeply thankful for what has happened in the time that has passed and for the very great improvement in the position of our country and of our home? Why, when I was here last time we were quite alone, desperately alone, and we had been so for five or six months. We were poorly armed. We are not so poorly armed today; but then we were very poorly armed. We had the unmeasured menace of the enemy and their air attack still beating upon us, and you yourselves had had experience of this attack; and I expect you are beginning to feel impatient that there has been this long lull with nothing particular turning up! But we must learn to be equally good at what is short and sharp and what is long and tough. It is generally said that the British are often better at the last. They do not expect to move from crisis to crisis; they do not always expect that each day will bring up some noble chance of war; but when they very slowly make up their minds that the thing has to be done and the job put through and finished, then, even if it takes months—if it takes years—they do it. Another lesson I think we may take, just throwing our minds back to our meeting here ten months ago and now, is that appearances are often very deceptive, and as Kipling well says, we must "...meet with Triumph and Disaster. And treat those two impostors just the same." You cannot tell from appearances how things will go. Sometimes imagination makes things out far worse than they are; yet without imagination not much can be done. Those people who are imaginative see many more dangers than perhaps exist; certainly many more than will happen; but then they must also pray to be given that extra courage to carry this far-reaching imagination. But for everyone, surely, what we have gone through in this period—I am addressing myself to the School—surely from this period of ten months, this is the lesson: Never give in. Never give in. Never, never, never, never—in nothing, great or small, large or petty—never give in, except to convictions of honour and good sense. Never yield to force. Never yield to the apparently overwhelming might of the enemy. We stood all alone a year ago, and to many countries it seemed that our account was closed, we were finished. All this tradition of ours, our songs, our School history, this part of the history of this country, were gone and finished and liquidated. Very different is the mood today. Britain, other nations thought, had drawn a sponge across her slate. But instead our country stood in the gap. There was no flinching and no thought of giving in; and by what seemed almost a miracle to those outside these Islands, though we ourselves never doubted it, we now find ourselves in a position where I say that we can be sure that we have only to persevere to conquer. You sang here a verse of a School Song: you sang that extra verse written in my honor, which I was very greatly complimented by and which you have repeated today. But there is one word in it I want to alter—I wanted to do so last year, but I did not venture to. It is the line: "Not less we praise in darker days." I have obtained the Head Master's permission to alter darker to sterner. "Not less we praise in sterner days." Do not let us speak of darker days: let us speak rather of sterner days. These are not dark days; these are great days—the greatest days our country has ever lived; and we must all thank God that we have been allowed, each of us according to our stations, to play a part in making these days memorable in the history of our race. Use Churchill's speech to the students to improve your own skills in speech writing, public speaking, or history. Rise to the occasion Resources and references Churchill's "Never Give In" Speech - Recording in RealAudio (you need the player to hear the speech) Questions and comments Do you have any questions, comments, or opinions on this subject? If so, send an email with your feedback. I will try to get back to you as soon as possible. Click on a button to bookmark or share this page through Twitter, Facebook, email, or other services: Students and researchers The Web address of this page is: Please include it as a reference in your report, document, or thesis. Where are you now? Winston Churchill's "Never Give In" Speech of 1941
<urn:uuid:7ef9e239-e7fa-4862-a44a-d470d19dff3c>
CC-MAIN-2014-15
http://www.school-for-champions.com/speeches/churchill_never_give_in.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223207046.13/warc/CC-MAIN-20140423032007-00414-ip-10-147-4-33.ec2.internal.warc.gz
en
0.969345
1,846
3.015625
3
Predicting Climate Change: Resilience, Risk and… Revenue? Extreme weather events have caused significant economic damage over the past 24 months, with total economic losses from natural disasters in 2017 reaching $337 billion (source: Swiss Re). Wildfires in California, drought in Australia and storms across the U.S. and Asia have devastated communities, infrastructure and assets which are ill-equipped to deal with a changing environment. In response to these challenges, innovative solutions are addressing climate-related weather volatility. City and municipal planners are exploring innovative ways to build resiliency into new infrastructure. Jupiter Intelligence is one example of an innovator creating value from access to huge amounts of data and processing power to respond to climate change. Our conversation with the CEO provides insight into new services for interrelated customers. Building climate resiliency In the US, Europe and most major cities in Asia, infrastructure was designed and built decades ago, with the vast majority constructed for a less volatile environment. Today’s higher frequency extreme weather events are putting critical infrastructure – such as highways, water facilities and the power grid (an issue in the US more than Europe, according to a recent study) under growing pressure. Cities are adapting to these new conditions, building resiliency into their planning and construction of new infrastructure. For example, the Government of Malaysia commissioned a PPP construction project in Kuala Lumpur to develop smart storm water management systems for traffic tunnels in the event of extreme flooding. In the US, Miami Beach is introducing resiliency measures to combat climate-change related flooding, with a $400 million plan to upgrade infrastructure and raise roads along the ocean front. Cities can also adopt digital solutions for improving resiliency. For example, CrowdHydrology is a website which uses crowd-sourced data submitted by citizens for real-time flooding insights. Cloud-based climate monitoring: from macro- to micro-scope As well as building long-term resiliency into new infrastructure at a city/municipal level, improved data on the changing climate is allowing innovators to adapt and respond to change at much shorter time horizons than traditional methods. Models on climate change have been refined for decades, leading to sophisticated algorithms to understand historic weather patterns, and predict change in the future. This process has traditionally required supercomputers to run the programs – the UK Met Office’s three Cray XC40 supercomputers are capable of calculating 14,000 trillion calculations per second. More recent developments in computational processing speed and cloud-based infrastructure have allowed startups to access the tools needed for climate modelling, creating opportunities for innovators to delivering data insights to an audience beyond government and academia. Innovator Profile: Jupiter Intelligence Jupiter Intelligence is one of the innovators delivering climate insights to new sectors. The San Mateo-based company predicts risk from severe weather and climate change, focusing on specific perils such as flood, fire, extreme heat, wind and drought. Recently we spoke to Rich Sorkin, CEO of Jupiter, who highlighted the shift that we are seeing from low spatial-temporal resolution monitoring at a regional level, towards asset-specific monitoring at a much more detailed resolution (of up to 1 meter image resolution). Recent advances enable higher quality imagery from satellites (for more info, read my blogs on geospatial trends and opportunities), and cloud-based data repositories allow the ingestion of heterogenous datasets – which include cell phone data, IoT sensors, existing climate records, and network infrastructure records held by utilities – which can all be processed into data insights. In Jupiter’s case, experts and executives have been recruited from climate, weather, insurance, finance, utilities, AI, satellites, IoT, and cloud computing to focus on three specific target customer segments: - Physical asset owners – such as utilities and energy companies - Financial services companies – such as insurance providers - Public sector – such as government organizations and NGOs An important part of this go-to-market strategy is the synergy between these three customer sets. This approach reduces the risk of excessive opex expenditure of huge amounts of data expensively stored on AWS or Google Cloud (which add up quickly when the data is spread out over a large geographic space). This synergistic early customer set also allow Jupiter to focus on deepening relationships and market penetration in a smaller segment, before expanding to more sectors and geographies. On the O&M side, asset-level analytics allow a greater level of granularity in terms of understanding how complex systems work together, and which parts of a network are most threatened by extreme weather. Operationally, organizations can also use this data-driven asset-level risk data to make quicker decisions on how to develop resiliency and adaption plans. For service providers such as insurance, asset-level understanding of climate-risk can allow improved risk modeling for underwriting of insurance plans. This also translates into new forms of insurance that can be offered, to previously un-insurable parts of the market. Keep an eye on … WorldCover, a Y-Combinator graduate which is developing parametric insurance products based upon geospatial imagery of crop fields in emerging economies. By being able to understand climate-related risk at a micro-level scale (the asset, in this case, is a farmer’s field), WorldCover is able to pay out parametric insurance (an ex ante payment trigger when flood or drought occurs) to farmers. This creates a new insurance product, as well as providing a safety net to those most exposed to climate-related risks.
<urn:uuid:4f979441-a033-4635-9541-803315928455>
CC-MAIN-2023-50
https://www.cleantech.com/predicting-climate-change-resilience-risk-and-revenue/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100327.70/warc/CC-MAIN-20231202042052-20231202072052-00836.warc.gz
en
0.931793
1,148
2.828125
3
You May Be Surprised to Know Linux has within it several solutions for making documents, even large documents like books. Linux tools generally have a philosophy of re-usability. While some of the newer products, like Open Office, are made to deliver the complete environments that computer users are used to, most Linux tools follow a more modular For example, in word processing the most common fundamental unit is the Postscript files are read and written by most of the word and image processing utilities. Postscript is a handy medium because it is so Postscript -- The Underlying Standard Postscript files are ASCII files, an you can load them into a text processor and actually read and even manipulate some of the control statements (if you know what you are doing). Postscript can also embody bit maps, but even these appear as a sequence of seemingly meaningless characters. Products that directly output postscript files often use a vector type notation for characters, allowing the fonts to be re-written by a display or print utility to any size without distortion. Graphical information is usually Open Office, Koffice, and even Abiword, the WYSIWYG word processors in Linux can all produce postscript output. Tex and LaTex produce an intermediate file type called a dvi file, but the dvips utility converts these files into postscript. And Lout, another text markup language, outputs postscript Use this custom search engine to find document software for you system: Even Graphics Utilities Can Use Postscript Most graphics plotting packages in Linux, like Gri, pgplot, xmgrace, and gnuplot to name but a few, can all output postscript files. Xpaint, a Linux drawing program, and GIMP, an image rendering program can both import and export postscript files. The postscript utilities packages provides many programs for working directly with postscript files. Many printers have a mode specifically for handling postscript files efficiently. And the gv utility is a handy postscript rendering and printing program for use with files produced by any of the numerous postscript file Linux is Rich, Not Poor, In Document Processing Capability So if you thought a move to Linux would lead to a more limited capability for creating documents, you can rest at ease. Linux has at its disposal virtually all of the accumulated document handling products from the Unix world, as well as the newer WYSIWYG products more familiar to many users. Linux doesn't offer a reduced set of document tools, but a vastly expanded set. You just have to be willing to learn about them. Get A Witty Astronomy, Physics, Math, Or Linux T-Shirt, Mug, or Poster At Keen Designs
<urn:uuid:73746fa9-beab-45ad-a656-42eb47fed734>
CC-MAIN-2013-20
http://www.linuxgoodies.com/linux_wordprocessing.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00015-ip-10-60-113-184.ec2.internal.warc.gz
en
0.885727
588
2.90625
3
(T) Adversarial examples introduce small changes to an image that leads the model to misclassify the input image. Instead of recognizing a cat, the model will recognize a dog even if it was successfully trained to recognize cats. They can be implemented either by only accessing the input data of the model, or by accessing the trained model itself including the training data, model architecture, hyper-parameters, numbers of layers, activation functions, or model weights. Adversarial examples have been initially defined in a blog post from OpenAI: “Attacking Machine Learning with Adversarial Examples.” Adversarial examples can have serious consequences in particular for certain applications such as autonomous vehicles. Imagine what would happen if your Telsa misrecognizes a stop sign? But while adversarial examples can fool computer systems, they could also fool humans. In a recent paper “Adversarial Examples that Fool both Computer Vision and Time-Limited Humans“, Ian Goodfellow and other teams members of Googe Brain described the risks of adversarial examples to humans: “Adversarial examples provide one more way in which machine learning might plausibly be used to subtly manipulate humans. For instance, an ensemble of deep models might be trained on human ratings of face trustworthiness. It might then be possible to generate adversarial perturbations which enhance or reduce human impressions of trustworthiness, and those perturbed images might be used in news reports or political advertising.” “More speculative risks involve the possibility of crafting sensory stimuli that hack the brain into a more diverse set of ways, and with larger effect. As one example, many animals have been observed to be susceptible to supernormal stimuli. For instance, cuckoo chicks generate begging calls and an associated visual display that causes birds of other species to prefer to feed the cuckoo chick over their own offspring. Adversarial examples can be seen as a form of supernormal stimuli for neural networks. A worrying possibility is that supernormal stimuli designed to influence human behavior or emotions, rather than merely the perceived class label of an image, might also transfer from machines to humans.” Currently, the most effective approach to reduce a deep learning system’s vulnerability to adversarial examples is “adversarial training”, in which a system is trained on both clean images and adversarially perturbed ones. However, adversarial training is very time-consuming because it requires generating adversarial examples during training. It also typically only helps improve a network’s robustness to adversarial examples that are generated in a similar way to those on which the deep learning systems was trained. To deeper dive into adversarial examples and adversarial training, a lecture from Ian Goodfellow from Stanford University’s CS231n class: References: “The Beauty of Generative Models”, A Silicon Valley Insider Note: The picture above is Paul en Arlequin from Pablo Picasso. Copyright © 2005-2018 by Serge-Paul Carrasco. All rights reserved. Contact Us: asvinsider at gmail dot com. Categories: Artificial Intelligence, Machine Learning
<urn:uuid:b75880a4-1979-44d9-a649-2a01596c2a17>
CC-MAIN-2023-23
https://asiliconvalleyinsider.com/2018/09/08/fooling-humans-with-adversarial-examples/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649302.35/warc/CC-MAIN-20230603165228-20230603195228-00656.warc.gz
en
0.922019
653
3.265625
3
There was no change in the status of respect for religious freedom by the Government during the period covered by this report, and government policy continued to contribute to the generally free practice of religion. There were no reports of societal abuses or discrimination based on religious belief or practice, and prominent social leaders took positive steps to promote religious freedom; however, some members of the more traditional religious groups accused certain evangelical groups of practicing "witchcraft." The U.S. Government discusses religious freedom issues with the Government as part of its overall policy to promote human rights. It is also active in sponsoring efforts to promote dialogue and harmony among religious groups. Section I. Religious Demography The country has an area of 93,070 square miles and a population of 28.1 million. Christians constitute approximately 85 percent of the population and Muslims 12 percent. A variety of other religious groups, including indigenous religions, Hinduism, Baha'i, and Judaism, are practiced freely and combined represent an estimated 2 percent of the population. Among Christian groups, the Roman Catholic Church has the largest number of followers with 42 percent; the Anglican Church claim 36 percent. Evangelical and Pentecostal churches are active, and their membership is growing. Muslims are mainly Sunni, although there are Shi'a followers of the Aga Khan among the Asian community. Several branches of Hinduism also are represented among the Asian community. There are few atheists. In many areas, particularly in rural settings, some religious groups tended to be syncretistic. Deeply held indigenous beliefs were blended into or observed alongside the rites of other religions, particularly in areas that were predominantly Christian. Missionary groups of several traditions were active in the country. Section II. Status of Religious Freedom The Constitution provides for freedom of religion, and the Government generally respected this right in practice. The Government at all levels sought to protect this right in full and did not tolerate its abuse, either by governmental or private actors; however, in practice the local officials imposed minor restrictions on nighttime congregating to curb violence and noise, which indirectly impeded on the worship services of some religious groups. All new nongovernmental organizations (NGOs), including religious organizations, must register with the NGO Board, a division of the Ministry of Internal Affairs that regulates and oversees NGO services. On April 7, 2006, Parliament amended and passed the NGO Registration Amendment Bill. The amendments include updating fines imposed on violators and providing the NGO Board with discretion over the duration and conditions of the permit, as well as various regulatory laws effecting NGOs in the country. Although the law is in place, pending parliamentary approval of statuary regulations, it remains nonoperational. The process of registration takes at least six weeks. In practice, most religious organizations are granted permits; however, the NGO Board defers registration of some church groups for various reasons. Following incidents involving several religious branches and mass killings, local leaders have to recommend community churches in Kanungu District in order for them to gain registration by the NGO Board in Kampala. On December 8, 2006, the NGO Board deferred Isa Messial Congregations' application in Kampala in order to investigate alleged cult tendencies. The church was not registered during the reporting period. Community-based organizations that operate in only one subcounty are not required to register with the NGO Board. Instead, they must register with the local district government. Unlike in the previous reporting period, there were no reports that local governments closed down community churches for failure to register. Foreign missionary groups, like foreign NGOs, must register with the Government. There were no reports that the Government refused to grant registration to any foreign missionary groups. According to the Uganda Revenue Authority, the Uganda Revenue Authority Act amendment was revised in June 2006, and religious organizations are no longer required to pay taxes on any properties that earn income. Permits are necessary for the construction of facilities, including those of a religious nature. Private madrassahs and Christian schools are common in the country. In public schools religious instruction is optional, and the curriculum covers academic study of world religions rather than instruction in one particular faith. There are also many private schools sponsored by religious groups that offer religious instruction. These schools are open to students of other faiths, but they usually do not offer minority religious instruction. Prisoners are given the opportunity to pray on days devoted to their faith. Muslim prisoners usually are released from their work duties during the month of Ramadan. Religious holy days celebrated as national holidays include Eid al-Adha, Eid al-Fitr, Good Friday, Easter Monday, and Christmas. Restrictions on Religious Freedom Government policy and practice contributed to the generally free practice of religion; however, during the reporting period there were reports that local government institutions took actions to restrict operation of religious organizations for security reasons. These measures were not aimed at religious organization specifically, as bans were issued to curb criminal activity and for noise abatement reasons. National government policy did not include restrictions on religious freedom. On February 5, 2007, the NGO Board wrote to the district leaders in Mukono to advise them not to register the "Hornsleth Village Project"(HVP) group. The district leaders complied. In October 2006 the Government suspended the HVP in Mukono District due to fears that citizens were being enticed to join a religious cult. The initial 108 members of the project were required to adopt the founder's name, Kristian von Hornsleth, in order to formalize their registration and receive benefits such as livestock. The members entered a legal name change process and received new identity cards. On August 1, 2006, the Supreme Court in Kampala dismissed an appeal filed in March 2005 by members of the Seventh-day Adventist Church seeking a ban on weekend classes at Makerere University. The seven-member panel ruled that the university's policy of holding weekend classes was "rational, fair, and proportional." Abuses of Religious Freedom On September 21, 2005, a court acquitted Prophet Ssali Kilimba Mwaka on all charges of conducting an illegal society, practicing witchcraft, and being in possession of articles used in witchcraft. Mwaka had been apprehended by police in May 2005 in Mubende District; Mwaka was later released on bail. There is no specific law which prohibits the practice of witchcraft. In 2005 police in Gulu arrested Severino Lukoya, the father of former rebel leader Alice Lakwena, and three other pastors for operating the unregistered New Melta Jerusalem Church. Authorities stated they were arrested because of their connection with Lakwena. On February 28, 2005, police released the four pastors with a warning. During the reporting period, the Government refused to register the New Malta Jerusalem Church for security reasons. There were no reports of religious prisoners or detainees in the country. Forced Religious Conversion There were no reports of forced religious conversion, including of minor U.S. citizens who had been abducted or illegally removed from the United States, or of the refusal to allow such citizens to be returned to the United States. Section III. Societal Abuses and Discrimination There were reports of tension within the Pentecostal church over questionable conduct by individual churches. For example, Pastor Simeon Kayiwa, Head of Namirembe Christian Fellowship Church based in Kampala, was accused by other churches of using witchcraft while performing pastoral work. On September 22, 2006, police and the Association of Born Again Churches Committee exonerated and cleared Kayiwa of the allegations. As in the previous reporting period, several religious alliances, including the Acholi Religious Leaders Peace Initiative, Inter-Religious Council of Uganda, Religious Efforts for Teso and Karamoja, and the Uganda Joint Christian Council continued efforts to ease religious tensions and find lasting solutions to civil unrest and the insurgency in the northern part of the country. Section IV. U.S. Government Policy The U.S. Government discusses religious freedom issues with the Government as part of its overall policy to promote human rights; it is also active in sponsoring efforts to promote dialogue and harmony among religious groups. During the period covered by this report, the Ambassador and other U.S. embassy officials met with leaders of various religious institutions, including representatives from the Uganda Muslim Supreme Council, Uganda Muslim Education Association; the Church of Uganda, the Catholic Church, the National Fellowship of Born Again Churches of Uganda, the Inter-Religious Council of Uganda, and the Uganda Joint Christian Council. The promotion of religious freedoms was a specific goal of these meetings. The U.S. Embassy sponsored several events to promote interfaith dialogue, forge interfaith coalitions to support peace building in conflict areas, and allow the Muslim population to voice its opinions on matters of bilateral interest. International visitor grants allowed influential Muslim leaders to travel to the United States, where they shared their experiences with fellow Muslims. The U.S. Embassy sponsored representatives of the Muslim American community to foster dialogue and understanding with Muslim Ugandans and share experiences as Muslims living in a pluralistic society. The U.S. Government worked with and through faith-based organizations to promote peace and reconciliation in conflict areas of northern Uganda.
<urn:uuid:82c5a4d2-fe0f-4d3a-bc08-3db56756e10e>
CC-MAIN-2014-35
http://www.state.gov/j/drl/rls/irf/2007/90126.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922763.3/warc/CC-MAIN-20140909042130-00063-ip-10-180-136-8.ec2.internal.warc.gz
en
0.968216
1,879
2.703125
3
Students meditate on inequalities between the North and the South of the world and say something about it! How to sensitize young students to global problems to make them meditate about the links between our life, our every-day habits and those of the people of the whole world? How to get them used to the reasons of the inequalities between the North and the South? AMITIE enter the schools of Riga, Bucharest, Bologna, Andalusia and Umbria to answer to these questions. There, thanks to some social educators, it proposed expressive workshops in which the students have been consulted about these themes. During 2012, the students of a middle-school and two high-schools in Bologna have trained themselves to be communicators and to bring their message to their city. They actually identify in their consumptions the origins of some inequalities. The students of the “Aldini Valeriani Sirani” school of Bologna followed the way back a T-shirt production using a self-produced film clip and, thanks to that, they have been able to talk about migrations, denied rights, labor exploitation and other questions, which normally we are not used to talk about and analyze. Another class of the “Saffi” school in the area of San Donato, Bologna, produced a postcard which invites you to meditate about these themes, using a young slang. It starts from the use of an every-day language which identifies teenagers’ life style.
<urn:uuid:7feea258-62b4-453b-b88c-c780111e52d1>
CC-MAIN-2020-10
http://amitie-community.eu/blog/amitie-shelf/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146341.16/warc/CC-MAIN-20200226084902-20200226114902-00051.warc.gz
en
0.961793
317
2.65625
3
Money and risk management are very important aspect of the trading system. Financial operations on Forex are very risky, and often the higher the supposed profit the higher the risk. Following all rules of money and risk management helps reduce losses and increase profits. Money and risk management appeared in 18th century, when it was applied in gambling to raise the chances for winning. Mature players followed their own strategies, incurred losses to enjoy profits later. Working on financial markets is similar to gambling because both profits and losses are not predictable. That's why principles of money and risk managements started to be used in the financial sphere. It often happens that beginner traders do not take aspects of money and risk management seriously; but this mistake can lead to failure even with a good trade strategy. Not just sums of earned money are important in trading; amounts of losses during work add to success as well. That's why it's recommended to calculate the portion of risk-subjected capital for successful trading. MONEY MANAGEMENT- the process of managing money. It includes investment, budgeting, banking and taxes. It is also called investment management. Money management is a strategic technique employed at making money yield the highest of interest-yielding value for any amount of it spent. Spending money to provide answers to all cravings (regardless of whether they are justifiable or not to be included in budget basket) is a natural human phenomenon. The idea of money management techniques is developed to plummet the amount individual, firm and institutions spends on items that add no significant value to its living standard, long-term portfolios and asset-basins. Warren Buffett, in one of his documentaries, admonished prospective investors to embrace his highly-esteemed "frugality" ideology. This is the basis of every sound money management formulas. RISK MANAGEMENT- the identification, assessment, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives, whether positive or negative) followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities. Risks can come from uncertainty in financial markets, project failures, legal liabilities, credit risk, accidents, natural causes and disasters as well as deliberate attacks from an adversary. Traders and investors should be very aware of this aspects. These are the vital keys on trading and investing that they must take note of.
<urn:uuid:7598009e-e5c8-465b-b989-98ba30cd2b05>
CC-MAIN-2017-30
https://www.elitetrader.com/et/threads/what-is-money-and-risk-management.216511/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425381.3/warc/CC-MAIN-20170725202416-20170725222416-00643.warc.gz
en
0.957694
492
2.71875
3
Apocalypse of Abraham This Jewish apocryphal work survives only in a Slavonic version, translated from a lost Greek version dependent possibly on a Hebrew or Aramaic original. The extant form was edited by a Christian and has Christian editions. The original was composed in the period a.d. 70-130. Chapters 1-8 expound the conversion of Abraham from idolatry. The remaining chapters (9-32) contain the apocalypse proper, where God tells Abraham of the fall of man and of the idolatry of his seed which leads to the destruction of the Temple (a.d. 70). When, however, the present age, lasting twelve “hours,” is over, the End will come when the heathen will be destroyed, the apocalyptic trumpet will sound, and the people of God will be gathered together.
<urn:uuid:eb6ea25d-2b38-4fe7-b1e9-b179f7bdb1ad>
CC-MAIN-2023-14
https://www.biblicaltraining.org/library/apocalypse-of-abraham
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00078.warc.gz
en
0.934659
171
2.625
3
by Brooke Iseler, PT, DPT Have you ever experienced sharp pain in the front of your lower leg? Did it occur when you increased your activity level suddenly? If this has happened, you may have medial tibial stress syndrome, or what is commonly known as shin splints. This condition occurs when the muscles and tendons in the lower leg are overworked, causing increased stress on the tibia or shin bone in the leg. This usually leads to pain, tenderness, and soreness along the inner part of the front of the lower leg. Acute cases can be treated successfully with rest and ice, but long-term cases or more severe cases may require more rigorous treatment, such as physical therapy. There are multiple ways that physical therapy can help improve the symptoms associated with medial tibial stress syndrome. These include analyzing body mechanics and prescribing appropriate exercises, based on that analysis, to avoid over stressing the connective tissues in the leg. Examination of footwear and recommendation on best footwear for desired recreational activity. And structural evaluation of foot structure, to determine if benefit can be gained from use of a custom orthotic. If you feel you would benefit from any of these things, please contact our office to schedule a physical therapy evaluation. Below, are several stretches and exercises to help prevent shin splints and to help treat them if you are already experiencing symptoms. Calf Stretch with Rotation With your hands up on wall, bring one leg forward and rotate it from side to side, keeping your knee in line with your belly button. Rotate 20 times and then switch legs and repeat. Perform 2-3 sets on each leg. This will stretch the muscles in your calf. If you are not feeling a mild to moderate stretch move your stance leg back farther from the wall. Hip Flexor Stretch Begin with one foot on edge of chair or bench. Then, drive hips forward, keeping weight in back leg, going forward until you feel a stretch in the front of your hip. Return to starting position and repeat. Perform 15-20 times, 23 sets on each leg. This will stretch the lower extremities and improve hip mobility. Remember, safety first. If your balance is compromised, stand at edge of counter or at wall for upper extremity support. 3-way Reaching to the Floor, Standing on One Leg Standing on one leg, reach small weight or ball down to floor and touch, then return to starting position, standing back up fully each time. Tap in multiple directions, for example left, center, and right. If you need to put your other foot on the ground for balance, that is fine. Safety first! Perform 5 touches in each direction, for a total of 15 touches. Repeat 2-3 times on each leg. This will help strengthen the muscles in your leg and increase your balance and stability as well. Standing on one leg, cross your other leg in front of body and tap toe gently on ground, sticking your hip out to the side as far as you can. Move your arms in opposite direction as you do so. Return to start position, perform 15-20 touches, repeat 2-3 times on each leg. This will help increase strength and stability of both your lower extremity and core. As you are comfortable and confident, add a small weight overhead to increase difficulty. Remember, safety first, if your balance is compromised, use upper extremity support, such as a counter-top or wall.
<urn:uuid:3e84cf4c-5c4a-4b11-b06f-bc87fe1b77d1>
CC-MAIN-2023-14
https://functionalperformance.com/got-shin-splints-how-to-treat-them/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949355.52/warc/CC-MAIN-20230330163823-20230330193823-00152.warc.gz
en
0.923366
710
2.515625
3
You have a 3D printer, but you don’t want to drop an additional $1,000 on a 3D scanner to start creating digital models of real-life objects. What do you do? The camera in your phone actually makes for a decent scanner. Microsoft Research debuted an application for mobile phones this week that builds a digital 3D model from imagery gathered while you pan your phone around an object. “When people want to fabricate something, determining what kind of (tool to use) is a key problem,” Microsoft Research scientist Jiawei Gu said in a release. “If we can find an easy way for common users to create 3D content by themselves, we can imagine that, in the next five years, everybody will be able to create 3D content.” The scientists said that as 3D printing becomes more popular, people will not be satisfied working with existing designs that can be downloaded from sites like Thingiverse. Instead, they will look to recreate objects they already see around them. The software works by sending the object scan to the cloud, where it is constructed into a 3D shape. After about half a minute, it is sent back to the user’s phone, where they can then save it or send it to a 3D printer. “If you have scanned somebody’s face, you can print out a cup with the face, for yourself or as a gift for a friend,” Gu said in the release. “If you go to a furniture store and see something nice, you can use a mobile phone to scan the furniture and put it into your home environment to see if it would fit.” Microsoft hasn’t said if or when it will release the software to the public and what kinds of phones will be compatible. If they do release it, it would directly compete with Autodesk 123D Catch, an app that creates 3D models from photos snapped by the user. Microsoft has slowly been making a push into 3D printing with moves like printing compatibility built into Windows 8.1 and selling MakerBots in its stores.
<urn:uuid:b6a85822-a283-494e-8ae0-c13f29d9ea9d>
CC-MAIN-2014-15
http://gigaom.com/2013/10/31/microsoft-demos-3d-scanning-mobile-app-in-hopes-of-making-it-easier-to-3d-print/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206147.1/warc/CC-MAIN-20140423032006-00422-ip-10-147-4-33.ec2.internal.warc.gz
en
0.949261
440
2.84375
3
Silk is a natural fiber used extensively in the manufacture of clothing. Unlike other natural fibers which tend to be plant-based, silk is actually a protein fiber that is produced by many different insects from caterpillars to spiders. When it comes to clothing manufacturing the most prominent and widely used source of silk is the mulberry silkworm whose cocoons are harvested to obtain the raw fiber. The reason for this non diversified sourcing of silk has to do with the molecular composition of the silk fiber itself and the fact that not all insects produce silk that is viable for the manufacturing of clothing and, of course, men's neckties. It is estimated that silk was first used as a textile component in China around 6000 BC. At that time silk was wild harvested from naturally occurring insect cocoons. Although the first uses of silk can be traced back to China there is no denying the fact that silk is a worldwide phenomenon and almost every culture across the globe has created their own unique process for creating regional silk out of insect cocoons that are native to their region. Today most silk comes from farmed colonies rather than wild harvested cocoons. Farm raised silk is considered superior to wild harvested silk do to the fact that it accepts dyes more readily as well as the fact that farm harvested cocoons are generally undamaged which results in a stronger finished textile. Another important factor is the fact that by industrializing the production of silk the price of the raw product is significantly reduced therefore allowing more people access to silk clothing. Silk is extremely popular in the manufacturing of clothing due to its many desirable characteristics. Silk is known to be one of the strongest natural fibers yet has a desirable texture (unlike most other strong fibers). When properly treated silk accepts dyes readily and has a natural luster that reflect sunlight in a desirable way. Additionally, silk is incredibly light weight and soft on the skin. Despite all the positive characteristics of silk clothing there are some negatives associated with it. Silk has a tendency to shrink after its first washing, is prone to static cling and susceptible to insect damage if stored improperly or in dirty conditions. However despite these negative characteristics silk is one of the most highly desired fabrics on the planet. It has a long history of being used by the rich, powerful and famous before finally becoming affordable enough for the masses in recent history. Today, while it is more affordable than ever to purchase silk clothing, there are multitude of synthetic fibers that have been developed to replace silk and offer consumers an inexpensive alternative with many of the same desirable characteristics. Rayon is perhaps the most popular of these synthetic fibers though others exist. For additional reading you may also want to read: Necktie Fabrics as well as our article on How Silk is Made. « back to mens fashion a-z
<urn:uuid:8acb9f7d-6d75-41da-8798-ed36acd7cd88>
CC-MAIN-2014-41
http://www.ties-necktie.com/mens-fashion-a-z/S/Silk
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137841.57/warc/CC-MAIN-20140914011217-00053-ip-10-234-18-248.ec2.internal.warc.gz
en
0.968356
565
3.296875
3
‘Some teachers have ten years of experience, while others have experienced one year… repeated ten times.’ I’m sure we’ve all heard this refrain used as an example of a teacher trapped in a poor developmental environment. Well, Lindsay challenged the Notion that 10 X 1 years of teaching is even possible. Quoting Duncan Foord, he stated that it is in fact impossible, as you are a different person and a different teacher with each passing year. This led to him looking at the way he has evolved as a user of technology over time and to reflect on how this must inevitably have changed him as a teacher. Lindsay then charted the progression of the tools we use and reflected on the fact that the emergence of tools such as Facebook, twitter, Wikipedia and even google have entered his life and consequently influenced him as a person. He charted his progress from someone who downloaded worksheets in the early years of the twenty-first century, to someone who joined discussion groups in 2003, to doing his first online course, to later becoming fully involved in twitter and thinking about how Facebook could be used. He noted that these have seen him develop as a teacher, a writer and especially as a person. Lindsay finally introduced the idea of the ‘triangle’ to represent 1) the person, 2) the teacher and 3) the language expertise. Depending on which aspect was stronger the shape of the triangle would transform, noting the role of technology in shaping this teacher triangle. Adam Simpson for the roving reporter team
<urn:uuid:398ef169-d36b-4502-b233-834d051d6666>
CC-MAIN-2017-30
https://iatefleventsturkey.wordpress.com/2012/05/26/lindsay-clandfields-triangular-vision-of-the-contemporary-teacher/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423512.93/warc/CC-MAIN-20170720222017-20170721002017-00089.warc.gz
en
0.97865
320
2.953125
3