text
stringlengths 198
621k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 15
1.73k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
160k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Today in 1952, police shot dead four Bangladeshi students in a fight to save their mother language. Inspired by their martyrdom, the World Mother Language Day also calls on Malawians to rethink how they are preserving their languages. JAMES CHAVULA writes.
Paramount Chief M’mbelwa IV’s burial was a weekend to remember for many, but another to forget for those who cherish mother languages as the hallmark of any tribe.
Five days before the World Mother Language Day, Ngonis from Malawi, Zambia, Swaziland and South Africa converged on Mzimba on Saturday to bury the inkosi ya makosi (king of kings) who, according to Senior Chief Mtwalo, “took pride in his tribal dances, language and way of life”.
Ironically, the only fluent Ngoni at the funeral of the celebrated cultural warrior were the eulogies of Prince Thulani Zulu of KwaZulu-Natal, South Africa, where all Ngonis originated from. The rest were sporadic chants overshadowed by Chichewa, Chitumbuka and English speeches.
But it was not the first time that clueless listeners surrounded a Ngoni-speaking visiting royal at M’mbelwa’s Edingeni headquarters. Equally dazed was South Africa’s High Commissioner Ntombi Mabude when she donated 20 Zulu-English dictionaries to Ngoni Heritage Association during the Umtheto Cultural Festival in 2010.
“The envoy was shocked to see Malawians singing Ngoni songs without knowledge of the language,” says the association’s secretary, Mzuzu Museum curator Aupson Thole.
All this points to one certainty: The mother language of the country’s Ngoni is endangered along with almost half of the world’s 6 000 languages, including many others in the country.
Many are tribal groups spearheading the revival of endangered languages, but they are not the only way of preserving mother languages in the multilingual country where the commission in 2007 recommended the legislation of Chichewa as a national language because it is taught in schools and widely spoken across the country.
Acknowledging raging fears that the proposal could suppress minority languages and deny some citizens their natural right, the constitutional review urged “sufficient constitutional guarantees be put in place for the respect, support and development of all languages to ensure that the national language is not detrimental”.
Textbooks, written in one’s mother language, are one of the powerful tools in encouraging people to preserve their mother languages while learning and using other languages.
Under the theme ‘Books for Tongue Education’, this year’s World Mother Language Day seeks to emphasise the importance of written material in mother tongues and also the importance of mother tongue education.
History of the country has it that early missionaries and British colonial governors encouraged education with emphasis on the use of vernacular.
In a research conducted in 2008, titled School Language Policy: Research and Practice in Malawi, researcher Henri Chalora writes that before independence in 1964, vernacular languages were “widely used as a medium of instruction, especially in the first two or three years” which early childhood experts say determine pupils’ chances in life.
Although founding president Dr Hastings Kamuzu Banda in 1968 made Chichewa the lingua franca “to foster national unity”, the impact of the policy became public years after the dawn of multiparty in 1993.
In 1996, government, in circular IN/2/14, directed that “standards 1, 2, 3 and 4 be taught in their own mother tongue” although some teachers were not familiar with languages commonly spoken in the area where they were posted.
Despite embracing linguistic diversity, Chichewa remains the only local language in textbooks and the rest of the subjects and textbooks are taught in English—the age-old official language for government, education, media, Judiciary and business.
In an article published in The Nation recently, executive director of Malawi National Examinations Board (Maneb) Roy Hauya argued that the policy does not only limit students to one medium of expression but also obscures comprehension as well as meaning and clarity of their responses.
“Virtually all reviews of students’ performance made by examiners and class teachers point out poor language skills as the single most important factor affecting performance,” wrote Hauya in reaction to concerns over deteriorating results in Malawi School Certificate of Education (MSCE) examinations.
Thus, this year’s World Mother Language Day reminds policy makers that promotion of mother tongues will serve not only to encourage multilingual education but also to inspire fuller awareness of linguistic diversity and solidarity based on understanding, tolerance and dialogue.
|
<urn:uuid:343c415d-c396-4599-a7f8-d1c978c22bff>
|
CC-MAIN-2022-05
|
https://www.mwnation.com/can-education-succeed-without-mother-tongue/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300289.37/warc/CC-MAIN-20220117031001-20220117061001-00583.warc.gz
|
en
| 0.942814 | 1,008 | 2.71875 | 3 |
Hazards and Planning
The Hazard Mitigation Office works with reducing the impact of hazards in the city. By analyzing the risk to life and property from these hazards, the Hazard Mitigation Office plans for a safer, ever more resilient New Orleans.
Hazard Mitigation Planning
Due to its location, New Orleans is vulnerable to many natural and man-made hazards, including hurricanes, strong storms, levee failure, and chemical spills. Hazard mitigation planning is important because it helps to reduce the damage from disasters, lessening their impact, and help to speed the response and recovery process.
Hazard mitigation planning provides a detailed picture of the risks we face and outlines New Orleans’ strategy to help reduce the effects of hazards on the community. A Hazard Mitigation Plan should identify and prioritize mitigation strategies, and propose action items to implement these strategies. By implementing these strategies, New Orleans will improve its ability to cope with the hazards we face and emerge as a more resilient community.
The City's Hazard Mitigation Plan was last updated by the Hazard Mitigation Office in 2015 and 2016. This update was adopted by the City Council in August 2016.
This Plan supports the work of Resilient NOLA to guide the City's strategy for reducing its risk from natural and man-made hazards.
Last updated: 8/12/2016 11:18:07 AM
Was this page helpful?
|
<urn:uuid:ce91b699-5f79-4c36-84af-19e4c5e59c6a>
|
CC-MAIN-2016-50
|
http://www.nola.gov/hazard-mitigation/hazards-and-planning/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698544672.33/warc/CC-MAIN-20161202170904-00458-ip-10-31-129-80.ec2.internal.warc.gz
|
en
| 0.926132 | 284 | 2.671875 | 3 |
A 4-year-old child who died of a rare brain infection in early August has led Louisiana health officials to discover that the cause is lurking in the water pipes of St. Bernard Parish, southeast of New Orleans.
It's a type of single-celled amoeba called Naegleria fowleri, about a tenth the width of a human hair. Some call it a "brain-eating" amoeba, although it does its damage by causing a devastating immune reaction rather than by actually devouring brain tissue.
Officials are pumping more chlorine into the municipal water supply to kill the bugs and advising the parish's 40,000 residents how to avoid infection. They say the risk is tiny.
As we'll discuss shortly, it's not easy to get infected, and drinking the water poses no risk. But still, finding such a dangerous microbe in the drinking water is troubling and noteworthy.
"This is the first time that it has been found in the drinking water in the United States," Louisiana state epidemiologist Raoult Ratard tells Shots.
But it won't be the last, he says — because health officials are now trying to pin down the cause of previously unexplained encephalitis cases. About 40 percent of cases of this dangerous brain inflammation have no known cause. "Five years ago, we would never have known that this recent case was caused by the amoeba," Ratard says.
Another new element: The Centers for Disease Control and Prevention now tests water supplies when a case of amoebic encephalitis is discovered, to see where the bug came from.
For instance, in 2011 two Louisiana residents — one a 20-year-old man from St. Bernard Parish — died of amoebic encephalitis after using tap water to rinse their nasal passages, using a popular device called a neti pot. Health officials assumed that contaminated tap water was the source of the infection, but it was never proved.
This summer the amoeba infected the brains of two other US children – a 12-year-old Florida boy, who died, and a 12-year-old Arkansas girl, who survived. She may be one of only three known to survive the infection in the United States.
These alarming deaths are likely to remain rare – but not quite as rare as health officials used to think.
"We're going to see more cases," Ratard says. Instead of three to five cases of amoebic encephalitis per year across the nation, "maybe we'll go to 10 a year," he says. "I don't expect we'll have a hundred."
The episode vividly illustrates how humans live in a sea of potentially lethal microbes that, amazingly, seldom kill.
In this case, it's because Naegleria fowleri is only dangerous when it gains entry into the brain. It does that when water containing the amoeba gets inhaled very deeply, into the area where the roof of the nasal passages meets the floor of the brain.
"To get infected, the amoeba has to get to the ceiling of your nose – way, way up there," Ratard says. "At the top of the nose you have a little paper-thin plate made of bone with a bunch of holes, a little bit like a mosquito net. The holes are for the olfactory nerve. So the amoeba is crawling up the nerve and gets into the brain."
Drinking amoeba-contaminated water poses no risk, presumably because the single-celled organisms can't survive in stomach acid. Normal bathing or showering isn't a risk because even if tap water is contaminated, it doesn't penetrate into the deepest nasal passages.
Brain infections from the amoeba usually pop up in late summer, when warm water favors its reproduction and many people are diving into ponds to escape the heat.
Since uncounted numbers of people swim in waters that undoubtedly contain amoebae, Ratard says, it's a wonder there aren't more infections. Public swimming pools pose no risk because chlorine kills the microbes.
The child who died last month in St. Bernard Parish while visiting from Mississippi, had been playing a long time on a Slip'n'Slide connected to a household water faucet.
It took about two weeks for the CDC to determine that the child had a Naegleria fowleri infection. Then state officials started investigating how.
"We collected the hose and got some samples from the outside faucet, water heater, and toilet tank water," Ratard says. After testing verified amoeba contamination, Louisiana officials put out a press release about the case.
Further testing of tap water in four nearby areas revealed the presence of Naegleria fowleri, as officials announced on Thursday.
Understandably, the announcement has sparked considerable local anxiety, even though health officials have stressed that the risk is low – and can be avoided entirely by common-sense precautions.
"In the old days, you would look at your faucet and it wouldn't scare you," Ratard says. "But these days, for some people, it looks menacing."
To avoid risk, officials are advising people not to put their heads under water while bathing in tap water — and to supervise young children who might. Flushing the water from household pipes before filling a child's wading pool decreases the risk, although some people might want to add some bleach to the water as an added precaution.
Local officials have shut off the water at school drinking fountains, although it's hard to imagine how schoolchildren could inject that water deep into their noses.
In a couple of weeks, officials will retest the St. Bernard Parish drinking water to ensure that added chlorine has eliminated the threat – for this season at least.
|
<urn:uuid:4534da05-d24d-4d0e-913a-442957712931>
|
CC-MAIN-2017-39
|
http://peoriapublicradio.org/post/deadly-amoeba-found-first-time-municipal-water-supply
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690307.45/warc/CC-MAIN-20170925021633-20170925041633-00001.warc.gz
|
en
| 0.968468 | 1,210 | 2.875 | 3 |
You’ve probably heard of famous lion statues, but what are their origins? These pieces of artwork date back to the early nineteenth century. They include the Antoine-Louis Barye lion statue, the George Koch lion house, and several lions in the Art Institute. But what makes them so famous? We’ll find out in this article. The article includes photos, videos, and links to further information.
Table of contents
Antoine-Louis Barye’s famous lion statue
Antoine-Louis Barye’s monumental Lion was installed in the Tuileries Gardens of Paris in 1834. The sculpture was the work of one of the most important artists of the Romantic period and was praised by Louis Philippe. In 1833, Barye was appointed professor of zoological drawing at the Museum of Natural History. During this time, Auguste Rodin studied with Barye. In 1885, subscription books were circulated, and payment was made. The Lion was then erected in Rittenhouse Square in 1890.
Barye’s early career was relatively modest. After training as an apprentice with a die maker, he became interested in metalwork. He then spent two years in the army. After his military service, Barye entered the studios of the famous sculptor Bosio, but his distaste for Bosio’s style prompted him to seek out the work of the Romantic movement.
Although animal sculpture has been popular since antiquity, Barye helped to elevate its status and popularity as a modern expressive form. His lion statue won international praise as an example of combining realism and grandeur. After a successful career in public monuments, Barye also produced small bronzes for private residences. These works were sold at a price that the middle class could afford.
George Koch lion house
In the industrial city of Milwaukee, a house with a lion on its front facade is common. In fact, the Iron Block Building has two sentinel lions that stand 20 feet or more above the ground. While the lion house has a striking presence, it doesn’t evoke the same feeling of imposing grandeur. A list of Milwaukee lion statues can be found here. If you are in the Milwaukee area, make sure to check out these statues:
The Medici lion statue is a pair of marble sculptures. These lions were created in the second century AD and are placed on the gates on the southeastern end of Royal Avenue. The Lion is also on the coat of arms for the city of Bath, representing King Edgar’s coronation in the city in 973. These iconic sculptures are not just beautiful. They are also important cultural icons.
The Medici lion is one of the most well-known marble sculptures. It is a male lion standing with a ball at his foot. He gazes sideways and is extremely large. These sculptures have smooth skin and curly layered hair on its head. Medici lion statues are often huge and are great public decorations. Here are some interesting facts about these lion sculptures.
The first Medici lion was commissioned in 1576 by Ferdinando I de Medici. He wanted two lions for the Loggia dei Leoni garden staircase. Flaminio Vacca claimed that the original Lion was fashioned from 2nd-century marble. However, the lions flank the Loggia dei Lanzi in the Piazza Della Signoria were not real and are reproductions of the originals.
The second famous Medici lion statue is Giambologna’s Marzocco, carved from a single block of marble. Giambologna’s workshop also created many equestrian monuments throughout the first half of the 17th century. For instance, the Medici lion statue symbolizes Florence’s past as an exotic city.
Art Institute lions
The Art Institute of Chicago has removed its famous lion statues from the museum’s lawn to give them a much-needed cleaning. The statues were removed on June 14 for conservation and cleaning purposes. The lions are now being restored to their former glory and are expected to be back on display in about a month. Until then, the sculptures will remain in a storage area in the museum. Read on to learn more about the restoration process and what you can expect.
The lion statues are in good condition, but a logical reason for their temporary move is that they need a deep cleaning. After one hundred and twenty-eight years outside, the lions have developed a dull, dry look that may take some time to fade. The lions will be cleaned and given a protective coat of wax before being returned to their perch on Michigan Avenue.
Bronze lion sculptures at the Art Institute of Chicago
The AIC’s two famous bronze lions have been on the museum’s grounds for over a century. Sculptor Edward Kemeys made the lion statues in 1893. They flank the entrance to the museum on Michigan Avenue. The AIC’s maintenance crew plans to remove the lions from the grounds for about a month. They will undergo on-site conservation treatment, including steam cleaning and a wax coat.
The iconic bronze lion sculptures at the Art Institute of Chicago are among the most popular landmarks in the city. Visitors worldwide come to take selfies with the lions, dressed in sports gear during the holidays. The lions also participate in many local traditions, including a hot chocolate ceremony. The sculptures are so famous that they even sport Christmas wreaths! During Christmas, evergreen wreaths surround the lions.
State Emblem of India lion statue
The Lion in the State Emblem of India resembles the Lion from the Sarnath sculpture, designed by Sunil Deore. The statue is made of bronze and has a steel pillar support, weighing around 6,500 kg. Opposition political parties have criticized the statue, claiming that it looks too aggressive. But the designers of the sculpture, Romiel Moses and Sunil Deore, insist that there is no deviation in its design. They blame the differences on a drastic change in angle.
The new lion statue has four Asiatic lions mounted on a circular disc. Critics say they look “ferocious”. However, the original lions can still be seen in Sarnath, Uttar Pradesh, in northern India, where they were positioned on an Ashoka pillar by Emperor Ashoka during his reign over the Maurya Empire in 250 BCE. However, the new lions are being widely criticized by the Opposition. These parties argue that the government violated the constitution by changing the statute and insulted the nation’s past.
The unveiling ceremony
The lion statue was unveiled on April 16, 2016, at the unveiling ceremony of the new Parliament building. Opposition leaders criticized Modi for the ceremony and for performing Hindu rituals, but a bigger controversy occurred over the lions themselves. Many activists and opposition parties claimed that the lions appeared to be distorted and called for criticism. The government responded by reversing the decision to change the statue’s appearance.
The National Emblem of India lion statue has drawn a mixed response from scholars and art historians. The statue features four Asiatic lions mounted back-to-back. It measures 6.5 meters tall and is considered one of the nation’s most prominent symbols. However, the Opposition has repeatedly vanquished the Modi government, and many of its supporters have complained that the statue is a poor representation of the original sculpture.
Thanks for reading Discover the Secrets of Famous Lion Statues
|
<urn:uuid:872e6527-087e-44ba-80f6-900cb59e736f>
|
CC-MAIN-2022-49
|
https://littleart.club/discover-the-secrets-of-famous-lion-statues/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710710.91/warc/CC-MAIN-20221129164449-20221129194449-00195.warc.gz
|
en
| 0.967746 | 1,541 | 3.453125 | 3 |
Today, Woodrow Wilson’s official declaration of neutrality is presented to the United States Senate and published. It contains an appeal to keep the sectarian strife that is now tearing apart the Old World from crossing the Atlantic to American shores.
The people of the United States are drawn from many nations, and chiefly from the nations now at war. It is natural and inevitable that there should be the utmost variety of sympathy and desire among them with regard to the issues and circumstances of the conflict.
Some will wish one nation, others another, to succeed in the momentous struggle. It will be easy to excite passion and difficult to allay it. Those responsible for exciting it will assume a heavy responsibility, responsibility for no less a thing than that the people of the United States, whose love of their country and whose loyalty to its government should unite them as Americans all, bound in honour and affection to think first of her and her interests, may be divided in camps of hostile opinion, hot against each other, involved in the war itself in impulse and opinion if not in action.
Such divisions amongst us would be fatal to our peace of mind and might seriously stand in the way of the proper performance of our duty as the one great nation at peace, the one people holding itself ready to play a part of impartial mediation and speak the counsels of peace and accommodation, not as a partisan, but as a friend.
I venture, therefore, my fellow countrymen, to speak a solemn word of warning to you against that deepest, most subtle, most essential breach of neutrality which may spring out of partisanship, out of passionately taking sides.
Even though his name is forever tied to the successes and failures of postwar peacemaking, we must consider Wilson’s appeal to impartiality and fairness here in the context of his larger career. He has pushed bills through Congress to ban miscegenation and segregate streetcars in the District of Columbia; he has issued executive orders to alter federal hiring policies against blacks. Worse, as governor of New Jersey he has signed a eugenics bill to enforce sterilization of the retarded. A son of Virginia elected to the presidency at the height of white supremacy’s restoration in the former Confederacy, Wilson’s moral authority is fatally undermined by his deep racism and acceptance of ideas that will later be identified with the Nazi regime.
Moreover, American neutrality is not necessarily nonviolent, for its borders extend far outside the United States.
The Monroe Doctrine has prevented Old World empires from dominating the New World, but not for altogether altruistic reasons. Building on a framework of simple anti-colonialism, the United States has erected its own empire by securing favorable access to the resources and markets of Central and South American countries. American policy centers on maintaining control of the Panama Canal.
As part of these so-called “Banana Wars,” American troops have occupied Nicaragua for two years, and in April of this year President Wilson sent the US Navy and Marines to occupy the Mexican port of Veracruz and keep European powers out of his unstable, revolution-torn neighbor. It is one of two expeditions he will send to Mexico before the United States finally enters the war.
One of the Marines still at Veracruz is Major Smedley Butler, who has been awarded his first Medal of Honor. Long after serving in the trenches of the Western front, Butler will famously go on to denounce the capitalist profiteers behind the American foreign policies that he has spent his career enforcing on unwilling populations. “War is a racket,” he opines, “It always has been. It is possibly the oldest, easily the most profitable, surely the most vicious. It is the only one international in scope. It is the only one in which the profits are reckoned in dollars and the losses in lives.”
Wilson’s neutral America begins the war by doing business with all sides, but that does not last. When Germany is cut off by the British blockade, their access to American markets become much less important to them, and Germany resorts to u-boat warfare against merchant shipping in a bid to cut their enemy off in the same way. This unrestricted submarine warfare is the issue which will ultimately draw the United States into the conflict, but not until Wilson has spent the first two years trying and failing to find a diplomatic resolution to the war.
To some degree, Wilson’s reluctance to take sides is explained by America’s relative military weakness. Well below its authorized strength, the US Army is smaller than Belgium’s in 1914, even though the American population of ninety million is more than all of the combatant nations except Russia. American steel production is three times larger than Germany and the Austro-Hungarian Empire combined, but its navy has just 147 mostly-obsolete ships, including a mere ten dreadnoughts; altogether, American power on all the world’s oceans is smaller than the British Grand Fleet sailing in the North Sea.
American militarism has been attenuated by memories of the Civil War less than a half-century ago, which killed some 750,000 people. In Wilson’s time, that death toll has somehow been blamed on the slaves who were freed; the United Daughters of the Confederacy is busy erasing and rewriting history to reflect their mythology of a noble “lost cause,” ennobling and codifying the worst forms of official racism in American history. Woodrow Wilson’s neutrality and appeal for social peace do not extend to the striking coal miners at Ludlow, Colorado who were massacred this Spring, either.
Whereas we now see him as man whose flawed vision of peace was undermined by bellicose world leaders, Wilson’s policy was always based on violent exploitation from which no real peace could ever emerge.
|
<urn:uuid:e8f334ce-0891-48b5-92d6-061e6724fdd6>
|
CC-MAIN-2018-34
|
http://ww1blog.osborneink.com/?p=363
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211146.17/warc/CC-MAIN-20180816171947-20180816191947-00182.warc.gz
|
en
| 0.967835 | 1,195 | 2.640625 | 3 |
Figure 1: Screen capture of the tutorial available at this link.
The ionic currents that are responsible for the changes in the membrane voltage are mentioned in the slide below from Dr. Peter Hunter's presentation available at this link.
Figure 2: Currents that
participate in depolarization and repolarization (Dr. Peter's Hunter slide available at the following link).
In summary, the series of events that are responsible for the action potential (depolarization) and the subsequent repolarization is as follows (relevant link) (Opie, L. H. 1998):
1. Sodium influx through the sodium channel: Sodium channels open very quickly and by allowing increased sodium (positive) ion flow inside the cell. They close immediately. The negative potential of the cell becomes very quickly less negative, then 0, then positive (depolarization) reaching a value of +47mV.
2. Calcium influx through the calcium channel: At about -20mV, calcium channels of L-type open very quickly and start closing slowly. Calcium (positive ions) flow inside the cell.
3. Potassium and chloride efflux carried by the Ito1 and Ito2 currents, respectively.
4. Potassium efflux through the slow delayed rectifier potassium channels, IKs.
5. Potassium (net) efflux through the rapid delayed rectifier K+ channels (IKr) and the inwardly rectifying K+ current, IK1.
This net outward, positive current (equal to loss of positive charge from the cell) causes the cell to repolarize.
The best known electrophysiology models are:
1. Hodgin-Huxley model: 3 currents (INa, IK, IL) and 3 gating variables (m,h,n).
2. DiFranscesco-Noble model of the Purkinje fiber cell: 12 currents (If, IK, IK1, It0, IbNa, IbCa, Ip, INaCa, INa, ICaf, ICas, Ipulse ) and 7 gating variables (y, x, r, m, h, d, f).
3. Beeler-Reuter ventricular cell model: 3 currents (INa, IS, Ix1, IK1) and 6 gating variables (m, h, j, d, f, x1).
4. Luo-Rudy mammalian ventricular cell model. The most recent version of the Luo-Rudy II model contains 14 currents (INa, ICa, ICaNa , ICaK , IK , INaCa , IK1 , IKp , Ip(Ca), INab ,ICab , INaK , InsNa , InsK ), 4 fluxes (Irel , Iup , Ileak , Itr ), and 11 gating variables (m, h, j, d, f, fCa, X, X i , K1 , Kp , f NaK ).
5. Noble model of the guinea pig ventricular cell.
A comprehensive review on the Noble electrophysiology models is the following: Nickerson, D. P. and P. J. Hunter (2006). "The Noble cardiac ventricular electrophysiology models in CellML." Prog Biophys Mol Biol 90(1-3): 346-359.
Presentation of an electrophysiological model - Prediction of therapeutic approaches via electrophysiological modelling
Let us consider an electrophysiological model via an example of how electrophysiological modelling can provide therapeutic approaches with pharamaceutical compounds.
Some diseases are associated with specific well-defined profiles of differential expression of ion channels and transporters. For example, in congestive heart failure as mentioned in the study by Noble, D. and T.J. Colatsky (2000) Expert Opin Ther Targets. 2000 4(1):39-49 four major transporter proteins have altered levels of expression: the transient outward potassium current, Ito1, the inward rectifier potassium current, IK1 and the calcium pump in the sarcoplasmic reticulum (SERCA) or Iup are all downregulated, while the sodium-calcium exchanger is upregulated.
If we introduce these changes in electrophysiology cell models, we can reproduce the action potential prolongation and the early after depolarizations observed in cells from CHF patients. Also, if these pathologic cell models are incorporated in whole ventricle models, an arrhythmogenic behaviour is obtained (termed "Torsades de Pointes").
Specific drugs exist that can affect different aspects of the behavior of different channels. Is it possible to predict a combination of drugs that can correct the disease profile? Also can novel drugs be tested?
As mentioned in the article by Garny, A., D. Noble, et al. (2009) Philos Transact A Math Phys Eng Sci 367(1895): 1885-1905, in section 4d "Case study", it is estimated that approximately 40 per cent of all drugs have side effects on the rapid delayed rectifier K current (IKr ; HERG channel), and therefore testing of this is a fundamental requirement for drug safety evaluation. IKr is one of the main contributors to repolarization, the process by which the voltage of the membrane of the cell is returned to control levels.
Let us consider the example of a specific compound, BRL32872, which had been for a long time a leader compound in the treatment of arrhythmias. For reference, it has been demonstrated that a successful strategy in order to treat a specific type of arrhythmias is the prolongation of the action potential. As the main factor that repolarizes the membrane and ends the action potential is the potassium rectifier current, it is reasonable to adopt approaches that partially block this current.
It has been determined that this compound has a dual action:
a. It mediates a 70% block of the IKr current: This effect alone would tend to increase the time for repolarization i.e. prolongate the action potential; but simultaneously it would result in incomplete repolarization and would lead to spontaneous reactivation of the IcaL. As a result the membrane voltage would oscillate around the 0 mV value.
b. It mediates a 20% block of the IcaL current. This allieviates the above mentioned effect of IcaL which constitutes the principal mediator of spontaneous membrane voltage oscillations.
The sum of the two effects is the net prolongation of the action potential.
We can actually "test" this drug ourselves, understand its mode of action and grasp the strategy that can be implemented to treat a condition by using different compounds, each having different properties. We will folow the example of the study by Garny, A., D. Noble, et al. (2009) Philos Transact A Math Phys Eng Sci367(1895): 1885-1905 for the BRL32872 compound, which is mentioned in section 4d and we will reproduce figure 8a following the instructions below (kindly provided by Dr. Alan Garny).
For this purpose, we will obtain an electrophysiology model from the repository and we
will initially simulate it in normal conditions. Then, in order to treat the arrhythmias, we will try to apply interventions that will increase the duration of the action potential,
similarly to the mode of action of the therapeutic compound. We will first block the potassium rectifier current by 70% and we will examine the result. Then, we will block the calcium L-type
channel by 20% and we will evaluate the final result.
We will work with the Noble 2K electrophysiology model in the CellML standard. The model is represented in the image below (from the CellML site).
Figure 3: Schematic representation of the Noble 2K guinea pig ventricular model (from the CellML site)
We will simulate the model with the instructions that follow that were kindly provided by Dr. Alan Garny
(Note: The instructions were slightly modified by the author of the site and comments were added as well).
Figure 4: Simulation result for normal conditions. The upper pannel represents parameter V (membrane voltage), the middle panel parameter i_Ca_L (L-type calcium current) and the bottom panel parameter i_Kr (rapid delayer rectifier potassium current).
Figure 5: Blocking the rapid delayed rectifier potassium current by 80% by entering the above values (80% of the initial values).
Figure 6: Simulation result for 80% blockade of the i_Kr (rapid delayer rectifier potassium current). The upper pannel represents parameter V (membrane voltage), the middle panel parameter i_Ca_L (L-type calcium current) and the bottom panel parameter i_Kr (rapid delayer rectifier potassium current).
Figure 7: Blocking the L-type calcium current by 20% by entering the above value (20% of the initial value which was 1).
Figure 8: Simulation result for 80% blockade of the i_Kr (rapid delayer rectifier potassium current) and 20% block of the IcaL current. The upper pannel represents parameter V (membrane voltage), the middle panel parameter i_Ca_L (L-type calcium current) and the bottom panel parameter i_Kr (rapid delayer rectifier potassium current).
Basic Research and Systems Biology meet Applied Science and the Pharmaceutical Industry
Part of an article from "The Economist" available at this link is pasted below.
"In contrast to the two years it takes to assess the effects of a new compound using conventional research methods, Dr.Young's approach takes an average of just two weeks. "
"The pharmaceutical industry stands to gain much from this approach. Around 40% of the compounds that drug
companies test cause arrhythmia, a disturbance to the normal heart rate. Drugs such as the anti-inflammatory medicine Vioxx and the diabetes treatment Avandia have been linked with an increased risk
of heart disease. The result is that billions have been wiped off their makers' share prices.
Not surprisingly, the pharmaceutical industry has sought out Denis Noble of Oxford University, the creator of the beating-heart model, to help. Dr Noble is now part of a consortium involving four drug firms—Roche, Novartis, GlaxoSmithKline and AstraZeneca—that is trying to unravel how new drugs may affect the heart. Virtual drugs are introduced into the model and researchers monitor the changes they cause just as if the medicines were being applied to a real heart. The production of some proteins increases while others are throttled back; these changes affect the flow of blood and electrical activity. The drugs can then be tweaked in order to boost the beneficial effects and reduce the harmful ones.
Systems biology thus speeds up the drug-testing process. Malcolm Young is the head of a firm called e-Therapeutics, which is based in Newcastle upon Tyne. Using databases of tens of thousands of interactions between the components of a cell, his company claims to have developed the world's fastest drug-profiling system. In contrast to the two years it takes to assess the effects of a new compound using conventional research methods, Dr Young's approach takes an average of just two weeks. Moreover, the company has been looking at drugs known to have damaging side effects and has found that its method would have predicted them".
Hunter, P. J., E. J. Crampin, et al. (2008). "Bioinformatics, multiscale modeling and the IUPS Physiome Project." Brief Bioinform 9(4): 333-343
Nickerson, D. P. and P. J. Hunter (2006). "The Noble cardiac ventricular electrophysiology models in CellML." Prog Biophys Mol Biol 90(1-3): 346-359.
Noble, D. and T.J. Colatsky (2000) “A return to rational drug discovery: computer-based models of cells, organs and systems in drug target identification” Expert Opin Ther Targets. 2000 4(1):39-49
Garny, A., D. Noble, et al. (2009). "CELLULAR OPEN RESOURCE (COR): current status and future directions." Philos Transact A Math Phys Eng Sci 367(1895): 1885-1905.
Opie, L. H. (1998),The Heart, Physiology, from Cell to Circulation (Lippincott-Raven Publishers)
|
<urn:uuid:6880ab08-774f-4b56-bb21-29ff556b0e8b>
|
CC-MAIN-2020-45
|
https://www.information-book.com/biology-medicine/systems-biology-modelling/cell-modelling/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107893402.83/warc/CC-MAIN-20201027052750-20201027082750-00152.warc.gz
|
en
| 0.861198 | 2,669 | 3.21875 | 3 |
Disturbing signs of climate change in 2012: UN weather agency
World Meteorological Organization’s May 2 statement holds little good news
Last year joined the 10 previous years as one of the warmest on record — at ninth place, said the World Meteorological Organization’s May 2 “Statement on the Status of the Global Climate.”
“The sustained warming of the lower atmosphere is a worrisome sign,” said WMO Secretary-General Michel Jarraud in a news release from the United Nations’ weather agency.
The 2012 global land and ocean surface temperature during 2012 was about .11 C above the 1961 to 1990 average of 14 C.
That makes 2012 the ninth warmest year since records began in 1850 and the 27th consecutive year that the global land and ocean temperatures have stood above the 1961 to 1990 average, according to the WHO statement.
“The record loss of Arctic sea ice in August-September — 18 per cent less than the previous record low of 2007 of 4.17 million square kilometres— was also a disturbing sign of climate change,” Jarraud said.
“The year 2012 saw many other extremes as well, such as droughts and tropical cyclones. Natural climate variability has always resulted in such extremes, but the physical characteristics of extreme weather and climate events are being increasingly shaped by climate change,” he added.
WMO’s annual statements gather the key climate events of each year. The 2012 climate assessment, the WMO’s most detailed to date, will guide discussion at its executive council meeting later this month.
Among the other signs of climate change mentioned in the WMO statement: above-average temperatures throughout 2012 across most of the world’s land surface areas, with global precipitation slightly above the 1961 to 1990 long-term average.
However, snow cover extent in North America during the 2011-2012 winter was below average, resulting in the fourth smallest winter snow cover extent on record, according to data from the Global Snow Laboratory, cited by the WMO.
The Arctic summer of 2012 witnessed “even more dramatic changes,” the WMO said.
These included a record low northern hemisphere snow extent in June, a record low sea-ice extent in September, record high permafrost temperatures in northernmost Alaska, and the longest duration of melting on the Greenland ice sheet ever observed in modern times, with a rare, nearly sheet-wide surface melt in July.
In early July, Greenland’s surface ice cover melted dramatically, the WMO said, with an estimated 97 per cent of the ice sheet surface having thawed by mid-July.
This was the largest melt extent since satellite records began 34 years ago.
As for overall conditions, they’re likely to get hotter and more volatile, as illustrated by the diagram, shown below, from the WMO.
This shows how higher average temperatures increase the chance of even hot weather.
Because warm air can hold more water vapour, which is a climate-warming greenhouse gas, there is a greater chance of extreme events and floods, the WMO said.
|
<urn:uuid:ef061bfb-ebca-4ba8-aae4-043f1b604c63>
|
CC-MAIN-2016-18
|
http://www.nunatsiaqonline.ca/stories/article/65674disturbing_signs_of_climate_change_in_2012_un_weather_agency/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860116173.76/warc/CC-MAIN-20160428161516-00012-ip-10-239-7-51.ec2.internal.warc.gz
|
en
| 0.935288 | 645 | 3.421875 | 3 |
New York City’s Department of Environment Protection (DEP) is giving away 55-gallon rain barrels to homeowners – 1,000 barrels this year. The program began in spring 2008 when the DEP distributed 250 barrels to homeowners in Queens. In 2009, 750 barrels were distributed to homeowners. The program was initiated by the Jamaica Bay Watershed Protection Plan. On July 20, 2005 New York City Mayor Michael Bloomberg signed a City Council bill which required the DEP to create a protection plan for the Jamaica Bay watershed.
The rain barrels capture storm water from a home’s roof, water which can be used to water the lawn or garden. “These rain barrels will capture thousands of gallons of water that would have otherwise flowed into the streets, leading to flooding and increasing the likelihood and intensity of combined sewer overflow,” said Cas Holloway, the city’s environmental protection commissioner.
Rain barrels, according to New York City’s government website, “can reduce pressure on the city’s sewer system during storm events.” Rain barrels also conserve water which saves homeowners money. The website notes that up to 40 percent of the city’s water use is from homeowners watering lawns or gardens.
“Improved stormwater management is an important component of DEP’s efforts that use a variety of innovative, sustainable techniques to help mitigate the City’s stormwater runoff going into the sewer system,” said DEP Commissioner Emily Lloyd. “This program is also an important part of Mayor Bloomberg’s PlaNYC initiative to build a greener, more livable city and help our customers to conserve our precious resources.”
Other cities giving away rain barrels
New York City is not the only city giving away free rain barrels. Utica, a city less than 200 miles from New York City, is giving away 400 rain barrels thanks to a $718,000 grant from the state of New York’s Environmental Facilities Corporation. Back in 2009, another city in the state of New York, Buffalo, gave away 161 rain barrels.
Cities in the state of New York are not the only ones to give away free rain barrels. Cities across the country have similar programs, including Philadelphia, Columbia, Missouri and San Marcos, California.
|
<urn:uuid:09a4626c-9483-4d9e-bf74-5048d6987f0e>
|
CC-MAIN-2014-52
|
http://www.triplepundit.com/2011/04/new-york-city-gives-homeowners-free-rain-barrels/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770747.108/warc/CC-MAIN-20141217075250-00018-ip-10-231-17-201.ec2.internal.warc.gz
|
en
| 0.920409 | 472 | 2.59375 | 3 |
Rates of Myopia Increasing
Published On: 12/15/2009
By: Roan, Los Angeles Times
The Los Angeles Times (12/15, Roan) reports that, according to a study published in the Dec. issue of the Archives of Ophthalmology, "17% more Americans aged 12 to 54 are afflicted with mild to severe distance vision problems than 30 years ago." In their study, "researchers at the National Eye Institute, part of the National Institutes of Health, found that rates of myopia...in people ages 12 to 54 increased from 25% in 1971-72 to 41.6% in 1999-2004. The study included people with a range of myopia, from mild to severe." Study lead author, Susan Vitale, PhD, MHS, explained that "the likely cause is less outdoor time and more activities requiring close-up viewing, such as text-messaging, playing hand-held video games, and Web surfing," Bloomberg News (12/15, Gibson) reports. Importantly, myopia "ends up costing a lot," Vitale said, pointing out that "it costs $3.8 billion a year to treat poor distance vision, a tab that rises by $1 billion for every 12 percent increase in the rate of nearsightedness." MedPage Today (12/14, Fiore) reported, "The researchers noted that improved methodologies have pegged the actual prevalence of adult myopia at 33% in 2008. They said they used older formulas, which overestimated nearsightedness, on both old and new data to show the rate of growth." Noting specific trends, the authors found that "among blacks, estimates of myopia prevalence grew faster over the period than it did among whites, more than doubling -- from 13% to 33.5%." Meanwhile, "among whites, estimated prevalence increased from 26.3% to 43%," while overall "prevalence was...higher in 1999-2004 for all levels of myopia severity."
12/15/2009 Rates of Myopia Increasing
|
<urn:uuid:439d85eb-aa91-40ca-80ef-f067054874a5>
|
CC-MAIN-2021-25
|
http://drmariacasas.com/news.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488273983.63/warc/CC-MAIN-20210621120456-20210621150456-00506.warc.gz
|
en
| 0.934529 | 423 | 2.5625 | 3 |
RAW file system recovery
"RAW filesystem" issue typically occurs when the filesystem type information is missing or inconsistent between several system tables.
Such an issue is often associated with external drives unplugged without "Safely removing" them first.
The filesystem tables often get damaged during unsafe removal.
The "RAW filesystem" is generally recovered quite well.
The typical scenario is to recover data from a device with a RAW filesystem, then format the device and copy the recovered data back to the device.
The most typical symptom of RAW filesystem is that Windows prompts "You need to format the disk before you can use it":
Important: do not format the disk if you need to recover data from it.
RAW filesystem recovery using ReclaiMe File Recovery
- Make sure you have enough free space on a known-good drive or on a network to hold all the recovered data.
- Download, install, and run ReclaiMe File Recovery software.
- Identify the drive with a RAW filesystem in the device list. Most likely, it will have RAW listed as a filesystem type.
Need help identifying your drive?
- Double click that drive to start recovery.
- The files are displayed as soon as they are discovered.
- Select the file(s) or folder(s) you want to recover, and click Save button on the toolbar.
Alternatively, click Save and select Save All from the menu.
- After data is copied, verify that the files were recovered correctly by actually opening and reviewing them.
- Once the successful recovery is confirmed, reformat the drive and put it back to use.
Additional information about RAW file system
What is RAW file system?
RAW filesystem is a filesystem which was not recognized by Windows.
This means all the available filesystem drivers refused to mount the filesystem.
This happens mostly if the records determining the filesystem type are damaged, most typically the partition table or the boot sector.
The volume which was created (using Disk Management) but not yet formatted is also indicated as RAW filesystem.
- CHKDSK reports error message
The type of the file system is RAW.|
CHKDSK is not available for RAW drives.
- Disk Management indicates the drive file system is "RAW"
- Sometimes trying to access the data on the drive results in a message like "X:\ is not accessible.
The volume does not contain a recognized file system.
Please make sure that all required file system drivers are loaded and that the volume is not corrupted."
Other useful information
The RAW file system website, www.raw-file-system.com, provides additional information.
This includes RAW term definitions and also some preventive measures to avoid a RAW filesystem problem.
Read more about common filesystem types used by Windows, Linux, and Mac operating systems.
Still have questions?
|
<urn:uuid:7e5e935a-b3ec-4a38-a487-937d741e3f3a>
|
CC-MAIN-2020-29
|
https://www.reclaime.com/library/how-to-recover-raw-filesystem.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657142589.93/warc/CC-MAIN-20200713033803-20200713063803-00447.warc.gz
|
en
| 0.904794 | 586 | 2.640625 | 3 |
Environmental problems and changes can cause less damage when they can be anticipated, allowing time for precautionary measures, an economist writes.
Casey B. Mulligan is an economics professor at the University of Chicago.
Much of the economics of environmental disasters is about anticipating and planning.
Hurricane Irene traveled the East Coast last weekend and was expected to be one of the rare hurricanes to hit New York (by the time it reached there, it had been downgraded to a tropical storm). Although many thousands of people in the region may be without electricity for days to come, New Yorkers are glad that Irene did little damage as hurricanes go.
The storm began to receive media attention the weekend before it arrived, and people in the New York area used the time to prepare themselves. Forecasters have been criticized for overestimating the amount of wind that New York would experience, but the winds and tides were plenty strong. Preparation was an important reason that damage was limited.
For example, the eye of the storm passed right over Kennedy International and LaGuardia Airports, but planes did not crash because the airports were shut during the storm. Few lives and little cargo was lost from ships in the area because the ports were closed, and vessels moved out of the area.
Hundreds of thousands of people were left without power, and many homes were flooded. But, clearly, the damage would have been much worse if Hurricane Irene had hit with no warning.I have no expertise in climate, weather, physics or aerodynamics, but one of the lessons of economics that environmental changes are less harmful when they can be anticipated. With only a few days of preparation, as with Hurricane Irene, people and mobile capital can be moved out of harm's way. Protective barriers can be constructed for the immobile capital like homes.
New York was not given a definite warning of Irene a year ahead, let alone a decade ahead. But if it had been warned years ahead, the economy could have adjusted even more by making plans to locate activity in more protected places. Or perhaps even to invent goods and production processes that are more hurricane resistant.
The opportunities for preparation are one reason why economists expect the damage from global warming to be different, and perhaps less, than from natural disasters that hit by surprise.
Global warming is expected to raise temperatures and sea levels over a period of decades - perhaps centuries. Even if scientists are completely unable to retard or reverse the environmental consequences of global warming, thanks to decades of warning the economy can greatly adjust to minimize the economic costs of those environmental consequences.
That's the thesis of a recent book, "Climatopolis: How Our Cities Will Thrive in the Hotter Future," by Matthew Kahn of the University of California, Los Angeles (disclosure: Professor Kahn is a friend and was my classmate at the University of Chicago). Given advance warning, people will protect themselves and innovate in order to make sales in future market when the symptoms of global warming are more threatening.
|
<urn:uuid:a2e8b529-b152-4200-9d1c-ba4df319d57f>
|
CC-MAIN-2017-51
|
http://www.starnewsonline.com/news/20110831/preparing-for-disaster
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948512121.15/warc/CC-MAIN-20171211033436-20171211053436-00473.warc.gz
|
en
| 0.971247 | 608 | 3.234375 | 3 |
|Cemetery notes and/or description:|
The Granary Burying Ground was established in 1660. Town officials set aside for burials part of what was then the Boston Common to help alleviate overcrowding in the near-by King's Chapel Burying Ground.
The Granary Burying Ground took its present name in 1737 when a granary, a small building used to store grain, was moved to the site presently occupied by the Park Street Church.
All interments ceased at the Granary in 1880. The Granary Burying Grounds contains approximately 2,345 gravestones and tombs, although it is estimated that 5,000 people are buried at at this site.
The grave markers are predominantly slate, with a few in greenstone or marble. The gravestones' original haphazard configuration was rearranged into straighter rows over to the years to accommodate both nineteenth-century aesthetics and the modern lawnmower. During the mid-nineteenth century, many landscaping projects were undertaken in the Granary, including the installation of pedestrian walkways and the planting of shade trees and shrubbery.
The remains of thousands of Boston citizens and notables lie within the walls of the Granary. Along with Massachusetts governors, mayors and clergymen, visitors will find the graves of three signers of the Declaration of Independence: Samuel Adams, John Hancock, and Robert Treat Paine; Peter Faneuil, benefactor of the famed downtown Boston landmark; patriot and craftsman Paul Revere; James Otis, Revolutionary orator and lawyer; and five victims of the Boston Massacre. Near the center of the ground, a 25-foot-tall obelisk commemorates the tomb of Benjamin Franklin's parents.
|
<urn:uuid:69fd93d9-c5ac-408c-83bd-5bc3e93ca326>
|
CC-MAIN-2015-18
|
http://www.findagrave.com/cgi-bin/fg.cgi?page=cr&GRid=20780251&CRid=91030
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246646036.55/warc/CC-MAIN-20150417045726-00230-ip-10-235-10-82.ec2.internal.warc.gz
|
en
| 0.945101 | 352 | 3.484375 | 3 |
It's darkest before the dawn
Written by Andrew Wilson, founding partner
27 February 2021
“It is always darkest just before the day dawneth” is a thought first penned by the English theologian and historian Thomas Fuller, in his 1650 religious travelogue A Pisgah-Sight Of Palestine And The Confines Thereof.
It is a metaphor to hold close when times are at their toughest, as they are for so many right now. Lockdown in a cold and dark northern winter has been testing, much more so than when this all began last year. But the thaw has begun in every sense.
Tonight is the full ‘snow’ moon. The term was coined by Native Americans because the February moon presides over the hardest month of winter when the most snow tends to fall. Three weeks from now it will be the vernal equinox, as spring finally arrives for our hemisphere.
Each day we gain four more minutes of light. So now is a good time to gaze forward with hope and belief in better times to come. In today’s digests of our favourite reads of the week we try to offer some reasons to believe, as an act of erring in the direction of kindness to ourselves. Dawn and spring are coming.
1. Why optimism about the economy is so important
The Cambridge public policy professor Diane Coyle wrote in the Financial Times this week: “what we think will happen to the economy in the future determines what we decide today — and thus shapes the future. That is especially important in 2021 as much of the developed world prepares for a vaccinated reopening of their economies”. In simple terms, if we have hope we are more likely to receive the fruits it bears. The case for optimism in a nutshell.
Read in FT.
2. Australia’s oldest known painting is a 17,000-year-old kangaroo
This piece by Alison George in the New Scientist cheered us this week. It is the painting not the kangaroo that is 17,000 years old, of course, scraped in red ochre to a cave wall. The flourishing of creativity in the human mind marked the beginning of the evolution of our species above the daily grind for survival that is the lot of any animal. Art, music and creativity have a very big part to play in the society we must seek to create, if we are to make life much better for all after Covid.
Read in New Scientist.
3. The art of the public information ad
Speaking of art, this piece by the brilliant Rory Sutherland in The Spectator reviews the art of advertising and, more specifically, public information adverts. From the Tufty Club to the Green Cross Code man, we have grown up with and still remember the characters and catch phrases. “Only a fool breaks the two second rule” will be ringing in the ears of my children as I teach them to drive. Sutherland goes on to argue that government needs to err towards such guidance and leave people to choose: “Along with laws and economic incentives, we need a different kind of intervention from government, more akin to painting the lines on a car park than telling people where to park or changing the parking charges. Useful cues and norms — like chevrons on the motorway — which provide encouragement and guidelines, but leave people room for independent action and judgment”. He is always worth listening to.
Read in The Spectator.
4. The importance of self-care
This, by Jennifer Crichton in The Flock will resonate with those feeling exhausted by the unrelenting endurance test that the pandemic has been. She quotes Glennon Doyle: “It’s just that living with anxiety – living alarmed – makes it impossible to enter the moment, to land inside my body and be there. I cannot be in the moment because I am too afraid of what the next moment will bring. I have to be ready.” The message of the piece is that kindness to others comes naturally to so many – and thank goodness for it – but that kindness to ourselves has never been more important.
Read in Flockmag.
5. More than dreams
This piece jumped out at me for two reasons. My 10-year-old daughter asked me last week if I had lucid dreams. I had never heard of them, but they are when you dream and you know you are dreaming. The week before, our remarkable octogenarian chairman, Sir Angus Grossart, recounted a discussion he had with Sir James Black, the Nobel prizewinning scientist. James, Angus and myself are all sons of Lanarkshire, but I have some distance to travel to emulate a fraction of their achievements. I can but dream and that was the point of the conversation – Black’s entreaty to Grossart to “make the time to daydream”. Not just for fun, but because he knew that the mind works when we do not. If a problem feels intractable, stop and divert and give your mind the time to find the way through. There is a lot to be said for it.
Read in The Economist.
6. A case for fixing the welfare state
In The Guardian, columnist John Harris argues that our 80-year-old welfare state has been exposed by Covid to be ‘broken beyond repair’. “Now, 5.8 million people are experiencing the impossibility of life on universal credit, up from three million just as the pandemic began. Rates of destitution have skyrocketed. Covid deaths and infections map tightly on to patterns of disadvantage, and the government’s Joint Biosecurity Centre traces severe outbreaks in poorer parts of the country to ‘unmet financial needs'”. A sobering and urgent read.
Read in Guardian.
7. How Roald Dahl became a passionate vaccine advocate
This is a lovely read from Tom Solomon. He says: “To Olivia, a new film on Sky Cinema, captures the year (1962) that author Roald Dahl’s daughter died of measles encephalitis. The death of seven-year-old Olivia nearly tore the family apart. This terrible story will be new to many people, but it’s not new to me. I first heard it 30 years ago from Dahl himself.” It brings a lot home and is worth reading. We will also look out for the film.
Read in The Conversation.
8. Debating the future of the capital markets
A fascinating debate in the Financial Times between City Titan Lorna Tilbean and Chris Cummings, the CEO of the Investment Association. How to reform stock market listing rules without throwing the standards baby out with the bathwater?
Read in FT.
And finally… A global model for human rights
“While many countries have acted to deter migrants, Colombia has taken a step in a radically different direction, granting nearly a million undocumented Venezuelans the right to stay for 10 years. BBC Monitoring’s Luis Fajardo looks at how the situation compares with other migrant crises around the world and where it leaves a country already struggling with unemployment and the coronavirus pandemic.” And in the Financial Times, the UN commissioner for refugees, Felippo Grandi, writes: “Colombia is bucking the global trend of marginalising and even demonising refugees and migrants — and it has both moral right and pragmatism on its side. Other countries should take note and follow suit.” We agree.
|
<urn:uuid:4651375c-d6db-4cc3-b063-566dc8274b07>
|
CC-MAIN-2022-40
|
https://www.charlottestreetpartners.com/read-on-the-street-its-darkest-before-the-dawn/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00321.warc.gz
|
en
| 0.95153 | 1,562 | 2.734375 | 3 |
Saint-Denis gate: king Louis XIV and his really big ego
This triumphal arch was raised for Louis XIV. It commemorates the king's victories in Holland and on the river Rhine.
It was built in order to mark the entrance of Paris: at the same time, they demolished the old fortifications which surrounded the city.
The St-Denis gate, 23 metres high, was put up in 1762 by François Blondel. By order of the provost and against the will of the architect, they opened small doors in the pedestals, so the pedestrians could pass through!
|
<urn:uuid:9216ac01-90c7-489b-b1e2-f29974927c66>
|
CC-MAIN-2021-25
|
https://en.anecdotrip.com/saint-denis-gate-king-louis-xiv-and-his-really-big-ego-by-vinaigrette
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488536512.90/warc/CC-MAIN-20210623073050-20210623103050-00347.warc.gz
|
en
| 0.97231 | 124 | 2.625 | 3 |
Definition: a neoplastic process involving the erythropoietic tissue, characterized by anemia, irregular fever, splenomegaly, hepatomegaly, hemorrhagic disorders, and numerous erythroblasts in all stages of maturation (with disproportionately large numbers of less mature forms) in the circulating blood; postmortem studies reveal primitive erythroblasts and reticuloendothelial cells, not only in hemopoietic organs, but also in the kidneys, adrenal glands, and other sites. Acute and chronic forms are recognized, but in the latter there is less prominence of the immature cells; the former is also called Di Guglielmo disease (or syndrome) and acute erythremia.
Synonym(s): Di Guglielmo disease
Always consult your healthcare provider to ensure the information displayed on this page applies to your personal circumstances.
© Copyright 2018 Wolters Kluwer. All Rights Reserved. Review date: Sep 19, 2016.
Search Stedman's Medical Dictionary
Examples: glitazone, GI cocktail, etc.
|
<urn:uuid:e25ec58a-0611-4c42-b976-08e701dbd5f6>
|
CC-MAIN-2018-22
|
https://www.drugs.com/dict/erythremic-myelosis.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867416.82/warc/CC-MAIN-20180526092847-20180526112847-00008.warc.gz
|
en
| 0.884522 | 231 | 2.734375 | 3 |
CSE full form : Computer Science Engineering
CSE stands for Computer Science Engineering. It is an Engineering Discipline that incorporates different subjects of software engineering required to build up the PC framework. It is a four-year undergrad building course in which the understudies study the down to earth and hypothetical information on PC equipment and programming.
It is a designing control that incorporates different subjects of software engineering required to build up the PC framework. It is a four-year undergrad building course in which the understudies study the down to earth and hypothetical information on PC equipment and programming.
Eligibility for Computer Science Engineering (CSE):
For Undergraduates: The candidates who have passed 10+2 assessment from perceived training board with Physics, Chemistry, and Mathematics as primary subjects and required passing rate are qualified for CSE.
For Postgraduates: The candidates who have completed B.Tech from a recognized college or institute with a minimum passing percentage are eligible for CSE.
Required Skills for computer science engineering
- Critical thinking
- Diagnostic abilities
- Programming abilities
- Essential web advancement information
- Essential information on Machine Learning
- Strong Data Structure and Algorithm Skills
- Good grasping power
Computer Science Course Subjects
1. Cloud Computing
2. DataBase Management Systems
3. Computer Architecture and Organization
4. Design and Analysis of Algorithms
5. Operating Systems
6. Computer Networks
7. Compiler Design
8. Software Testing
9. Data Structures and Algorithm
Career Options for Computer Science Engineers
- Structure and build up a product application for various businesses
- Test and oversees programming, equipment, and systems in an industry
- Design and develop the hardware parts of PCs and laptops
- Create programming for fringe processing gadgets, for example, printers, scanners, console, and scanners
- Write codes and algorithm for operating systems such as Linux, Windows, and more.
For More Information Click Here
|
<urn:uuid:1794460f-f15d-45ed-9272-25eb475037d2>
|
CC-MAIN-2021-31
|
https://www.listoffullforms.com/cse-full-form/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154277.15/warc/CC-MAIN-20210801221329-20210802011329-00397.warc.gz
|
en
| 0.853384 | 399 | 3.078125 | 3 |
Our Top App Tips for Data Handling
Statistics or data handling is an area of math which includes a number of key skills which go across a number of subject areas including science and geography. These include the ability to collect, present, analyse and investigate information. It’s an area of math which children find fun and enjoyable and which can involve them using their number skills, investigative thinking and creativity.
Data handling is introduced in the early years – with children representing data about themselves or their environment on pictograms – right up to complex graphing, plotting of co-ordinates and understanding averages.
There are some fabulous data handling apps that can provide children with opportunities to practise and perfect their use of data. Here are our recommended apps, along with tips on using them with kids or students:
1) Great Graphs: Being able to create a range of graphs in order to analyse data is key to math and science. Quick Graph is a detailed graphing calculator that plots points, graphs lines, equations, and shapes on a coordinate plane, as well as a 3-dimensional plane. Quick Graph is good for helping students practise and strengthen their data-handling skills without having to draw the graphs themselves.
2) Cool Coordinates: Kids can practise plotting coordinates from an early age (learning both mapping and graphing skills in the process) using SmartKid Maths. It’s a fantastic math app and children will not realise that they are learning or doing maths as the more they play and get questions correct, the more that they are able to play against the cats in the app.
3) Perfect Probability: Lots of events and occurrences can’t be predicted with absolute certainty. In order for children to be able to weigh up the chances of e.g. winning the lottery they need to understand the rules of probability. Khan Academy teaches both adults and children the topic of probability through super easy-to-understand videos. With the Khan Academy app they can be watched anywhere!
4) Plot to Perfection: With Curve Fitter and Curve Plotter, maths and science students will find line graphs can be quickly constructed and analysed. It is relatively easy to produce a graph with these apps as well as generating the useful calculations required to find the pattern or relationship between variables. They are suitable for students 11+ with support.
5) Velocity Make Simple: Help your child to gain an understanding of the basics about the relationship between position and time, all the way through to recognising acceleration by calculating the slope of a velocity-time graph using fun gaming app Action Graphing. Instructions of how to use the app are given in snippets as and when you need to know them so it’s suitable for younger children too…
Have fun discovering data handling with your kids or students!
|
<urn:uuid:4287b0c9-76cf-4d65-b8a9-c2f5a4e1a77a>
|
CC-MAIN-2019-30
|
https://www.educationalappstore.com/blog/top-apps-for-data-handling/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529481.73/warc/CC-MAIN-20190723172209-20190723194209-00513.warc.gz
|
en
| 0.946644 | 570 | 3.65625 | 4 |
It's a bit of a cliché that the sense of smell is one of the easiest ways to evoke memories. But it's hard to reconcile that with the reality of human olfaction. Humans are primarily visual, and many of the odorant receptors in the human genome have been inactivated by mutations; these receptors are active in more olfactory-oriented mammals like mice. Some research published in yesterday's edition of Science suggests a way to make sense of this contradiction. Humans can apparently learn to tell the difference between closely-related smells, but only if they have a sufficient incentive.
In the case of these experiments, the incentive was pain; subjects were trained to associate a specific aroma with electric shocks. Volunteers were tested for their ability to discriminate between two chemically identical, mirror-image forms of the same molecule (termed enantiomers). On the first pass, the test subjects identified the difference between the enantiomers at a rate indistinguishable from random guessing. Training with repeated shocks more than doubled the rate of accuracy.
By itself, the results reveal a latent ability to learn to recognize subtle differences in olfactory sensory input. But the authors also tracked how the change in response was generated in the brain via functional MRI imaging. Prior to training, exposure to either of the enantiomers produced a similar pattern of activity in the olfactory cortex. After training, however, the pattern of activation changed so that the two versions of a molecule produced different patterns of activity; it was one of the few times I've seen graphs where larger error bars indicated an informative experimental result. Activity in response to a control pair of enantiomers remained tightly associated throughout the experiments.
The authors also tracked activity in the amygdala, which helps control aversion responses. Prior to the shocks, there was a constant level of amygdala activity for all odorants, but the signal gradually vanished for the molecule that was associated with an electrical jolt. The authors cite other work that a similar drop occurred in response to a visual aversion cue.
The authors suggest that the fact that both visual and olfactory cues can cause changes in the amygdala indicates that there's a single capacity for associating sensory input with adverse responses that any of the senses can feed into. What's not clear at this point is whether the change in the amygdala is needed to compel the olfactory cortex to start paying attention to subtle differences in smell.
Science, 2008. DOI: 10.1126/science.1152837
|
<urn:uuid:f34fc91a-6f05-4a57-a014-2a6d9a9c2d4c>
|
CC-MAIN-2014-10
|
http://arstechnica.com/science/2008/03/improving-human-olfaction-through-pain/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010509865/warc/CC-MAIN-20140305090829-00041-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.94847 | 502 | 3.90625 | 4 |
15 EXERCISES TO IMPROVE CONCENTRATION AND FOCUS
When we concentrate, we strengthen our attention to work, information, peoples and their actions. We begin to understand the surrounding reality better. Concentration is the ability to control your attention, to focus on something specific. If you lose your ability to focus, there could be a lot of reasons of this. One of the most common causes of losing concentration is a lack of energy. Maybe you didn’t sleep well last night, or your ration is not properly balanced, and your brain has a nutritional deficiency. It could also be bad mood and lack of motivation, or mental disorders like Attention deficit hyperactivity disorder (ADHD). Ability to concentrate should be trained same as many other skills. Our mental focus – is a kind of lens that can shoot close-up. Usually, our senses are functioning below the threshold of consciousness. Sometimes we notice that the processing and storage of information perceived by us may be interrupted. For example, after reading a few pages of the book, we suddenly see that we didn’t understand anything. We don’t notice the music at the concert because we think about the meeting to be held the next day. We distracted by our thoughts, and at this moment, we can’t concentrate. But if we focus on a particular sense that we need at the moment, then we will be able to concentrate and perceive incoming information better.
The following exercises will help if you can’t focus on your tasks. Also, it will improve your five senses. Spread those exercises out over the week (5 exercises per day, one exercise for each of the five senses), and repeat this set of exercises regularly.
The following exercises will help you learn how to sift out the sounds that you need and ignore the others.
- Exercise 1. Open your window and listen carefully to the sounds of the city. Try to distinguish selected sounds (the noise of passing cars, the voices of passers-by, the noise from the construction site, the chirping of birds and so on) from the background noise. Alternately concentrate on every sound as long as you can.
- Exercise 2. Turn on the classical music. Pay attention to the separate musical instruments. For example, listen to only the wind instruments, then violins, and so on.
- Exercise 3. Turn on the TV, switch to the news channel. Go into the neighboring room and listen to the voice of the announcer. Gradually turn the TV volume down, to make broadcaster voice harder to hear.
- Exercise 4. Listen to any monotonous sound (such as ticking clock). Concentrate on this repetitive sound, hold your attention on it for as long as possible.
Learn how to observe and filter relevant visual information
- Exercise 5. Sit by the window and look at the sky, covered with clouds. Try to focus your attention exactly on clouds. Inspect their shape, color, the direction of movement. Don’t think about anything, except clouds. If you notice that you are losing your focus, try to move your attention back to the clouds. Stop the exercise as soon as you see that you are no longer able to hold your attention on a cloudy sky.
- Exercise 6. Look out the window. Select any object (for example, a car parked nearby) and examine it carefully without losing any details. Then sit back, close your eyes, relax and imagine this car. Try to keep in your mind the picture of this car as long as possible. When your attention starts to weaken, open your eyes and compare a car created in your mind, with the original outside the window.
- Exercise 7. Sit down at your work desk and explore it in details: a computer, a telephone, a stack of papers, photos. Then close your eyes, relax and imagine it, with as much details as possible. Try to remember everything, every object, their color, shapes and materials from which they are made. When you fully restore your desktop in your head, open your eyes and compare the image with the original.
- Exercise 8. Take any photo album or a compilation of pictures. Sit comfortably in a chair. Open any page (for example, the page with the most favorite photos). Look briefly at one of the pictures. Close your eyes. Recreate this picture in your mind. Then open your eyes, watch the photo, and close your eyes again. Repeat these actions.
Do this exercises blindfolded
- Exercise 9. Open the wardrobe, tie your eyes. Alternately hold in your hands different things. Try to feel from which material they are made. Is it bristle or soft, thick or thin? What do you feel, when you hold it in your hands?
- Exercise 10. Walk to your room with closed eyes. Set a goal – for example, to take some book from the bookshelf.
SENSE OF SMELL
The following exercises will help you to concentrate on a particular odor that you need to sense.
- Exercise 11. Take a fruit bowl. Close your eyes and lean over the bowl. Try to identify each specific fruit by smell.
- Exercise 12. Walk through your house, try to sense what particular smell each room have.
- Exercise 13. Take a glass of red wine or other aromatic drink. Hold your nose over the glass, inhale the aroma of this drink and try to describe its scent: is it bitter or sweet, fragrant or tasteless?
SENSE OF TASTE
- Exercise 14. Sample different types of drinks, fruits or chocolate. What’s the actual taste of chocolate? Is it just sweet or it has some other taste qualities that are hard to define? Try to describe that particular taste.
- Exercise 15. Test the “memory” of your tongue. Try three different varieties of same beverage (for example, three sorts of light beer) and remember its distinct taste. After some time take one of the three glasses, and try to guess which sort it is.
By learning how to focus on a specific sense, you will improve your overall ability to concentrate on a particular task.
|
<urn:uuid:562493e9-35c1-4015-ad6f-3dd51fe67514>
|
CC-MAIN-2020-10
|
https://pharmaboosters.com/blogs/news/15-exercises-to-improve-concentration-and-focus
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143373.18/warc/CC-MAIN-20200217205657-20200217235657-00388.warc.gz
|
en
| 0.935938 | 1,271 | 3.46875 | 3 |
1 class periods of 60 minutes each
Students will read an article and will discuss the difference between fact and inference identifying inferences and evidence within the article.
Background for Teachers
This is a difficult concept for students. This activity is best completed with high interactivity between students and the teacher. Be sure to check for understanding throughout the activity.
Student Prior Knowledge
Knowledge of the nitrogen and carbon matter cycles.
- Make enough copies of the article and student sheet for your classes.
- Read the article from "Weekly World News" out-loud as a class. Pass out a copy to each student.
- You may want to introduce this as a very serious article, see if they can catch on to its absurdity!
- Pass out the student sheet to students. Allow them to read through the background information. You may want to discuss this briefly with them.
- Give students a few minutes to complete step 2 in the procedures and then discuss as a class, do the same for steps 3 and 4, always stopping to discuss between steps.
- Allow students time to answer analysis questions
- Discuss the questions with the students
- Be sure to bring out the importance of identifying fact from fiction from inference.
- Also emphasize the importance of source and bias.
- Allow students time to complete the Extension Activity.
- Allow several groups to share their paragraphs.
- As a class identify the facts, inferences and fiction.
Sample Scoring Guide:
Answers to Analysis Questions:
- Answers will vary.
- Look for evidence of no bias, facts are observable in nature, conclusions are logical and based on fact. You can also look for appeals to emotions. Getting people emotionally involved is a way to avoid fact. (There may be variance in these answers.)
- Inferences themselves can be trusted by definition, but if an inference is not based on solid facts it cannot be trusted. For example it could be logical conclusion but if the fact is faulty the inference is faulty as well.
- Tabloids cater to an audience that likes juicy stories, whether or not they are based on fact. Tabloids want to sell the most papers, not provide accurate information.
- Carbon cycle.
- Global warming, the greenhouse effect. The author does not accurately assess the threat and obviously has little knowledge of the issue.
Answers to Extension Activity:
Paragraphs will vary. Grade for inclusion of required elements.
Lesson Design by Jordan School District Teachers and Staff.
|
<urn:uuid:c80b0e12-d738-464a-bdab-0fae6b568bca>
|
CC-MAIN-2021-10
|
https://www.uen.org/lessonplan/view/37278
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178389798.91/warc/CC-MAIN-20210309092230-20210309122230-00337.warc.gz
|
en
| 0.926513 | 516 | 3.984375 | 4 |
Yesterday evening, I finished reading The Sixth Extinction, a relatively light, rather chatty and anecdotal, but nevertheless quite interesting book by Elizabeth Kolbert. There have been five great extinctions – periods of time short by geological standards when as much as fifty or sixty or even ninety percent of all extant species of living things disappeared. Most of these extinctions were the result of gradual changes in the world’s environment – a rise or drop in temperature, for example. The last and most famous, the Late Triassic extinction that wiped out the dinosaurs and made ecological room for the expansion of the mammalian population [and eventually, for us], was the result quite literally of an event, the crashing into the earth of a five mile wide asteroid.
Kolbert’s thesis is that human beings are producing a sixth great extinction by their expansion across the planet, their rearrangement of ecological spaces [by clearing forests, building cities, and subdividing old growth areas into parcels too small to support many species, for example], and by raising the planet’s temperature so rapidly that species do not have time to adapt.
This is presented by her as a disaster, but that depends on one’s point of view. Several years ago, there were reports that the lions in Kruger National Park in South Africa were dying of pneumonia. This was widely viewed as a crisis, but it was, of course, a success story for the virus or bacterium causing the disease. E. O. Wilson likes to tell us how successful ants are as a family but not many of us have learned to adopt a formicaedean standpoint.
Anyway, the book is perfect summer reading. Enjoy.
|
<urn:uuid:05725512-34cb-4345-a20a-e025b0834efe>
|
CC-MAIN-2017-51
|
http://robertpaulwolff.blogspot.com/2015/05/easy-come-easy-go.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948550199.46/warc/CC-MAIN-20171214183234-20171214203234-00420.warc.gz
|
en
| 0.966171 | 347 | 2.875 | 3 |
The things we cannot see are sometimes that scariest, and chiggers have no exemption to that. These tiny pests are microscopic. So, your naked eye will not see them. However, their bites cause an intense itch and unpleasant rashes.
If you worry about chiggers and their bites, this post will help you become knowledgeable about them. Keep reading!
What are Chiggers
Chiggers are tiny mites that belong to the arthropod family called “Trombiculidae.” They go by a number of names, including duck-shooters, harvest mites, scrub mites, itch mites, and red bugs. They are often mistaken as scabies mites.
These tiny mites only live up to two months and live both on humans and animals. What do they look like? Well, they measure from 1/20-1/150th of an inch long. They are almost invisible due to their extremely tiny size. They often have bright red colors, but they can also be light yellow or orange.
Where to Find Chiggers
Chiggers are commonly found in low-lying, damp areas like brush thickets, blackberry patches, and forests. You can also find them in gardens, grassy areas and parks, around lakes, rivers, and streams, and along margins of swamps.
These microscopic pests thrive in areas where vegetation is ranked, and grass and weeds are overgrown. Adults overwinter deep within the soil. During the spring months, they emerge to lay eggs. After hatching, the larvae feed for several days. After that, they fall off their host to develop into nymphs and grow into mature mites.
How Do Chiggers Feed
Contrary to the belief, chiggers do not suck blood or burrow into the skin. They feed on skin cells that humans and animals shed. They attach to vegetation or grass and wait for hosts to pass by where they cling onto. When they cling onto you, they migrate to the skin area where they can feed.
Your body areas where there are folds and wrinkles and skin is thin are the most common areas for them to bite. They bite by inserting their mouthparts and feeding the structure into the skin.
Once their enzymes are injected, the tissue is then destroyed and hardens the area. As a result, a feeding tube is formed. Chiggers use that tube to feed on the skin for several days. On average, they feed up to four days before dropping off the host.
What Do Chigger Bites Look Like
Chigger bites cause extremely unpleasant feelings. These bites form reddish welts within 24 hours of being bitten. You may also experience an intense itching and red rash. They sometimes look like red bumps or blisters on the skin.
When you notice that the bites are too itchy and scratching already causes infection, you need to seek a medical attention. These tiny creatures may not be vectors for viruses and transmit diseases; they still cause discomfort for a few days.
What Makes Chigger Bites Intensely Itchy
Your immune system response is the allergic reaction to chigger bites. That causes a scabby rash and intense itching. These tiny creatures are attracted to tight spaces, such as socks cuff, leg bang, and waistband where clothes are snug. They often feed on places that create an intense and uncomfortable itch.
How to Get Rid of Chiggers
One of the best ways to get rid of chiggers is to determine where they live. As mentioned above, the ideal habitat for them is a shady place with thick vegetation and plenty of moisture. Ensure to stay away from these areas. Then, you can try the following methods to prevent them:
Mow the Lawn Regularly
Beware that chiggers like to live in tall grass. One way to eliminate them is to keep the grass mowed regularly.
Treat the Yard
You can use environmentally friendly lawn care insecticides to get rid of these tiny pests. Apply it alongside a lawn spreader for best results. If you prefer a natural approach, you can go for sulfur pellets and apply them with a spreader.
Chiggers find a thick vegetation a perfect place to live in. So, ensure to remove overgrown, weedy areas.
Wash Clothes Immediately
If you love the outdoors, there is a big chance that you will catch chiggers. That is especially true during chigger season. So, after going out, wash your clothes as soon as possible. That way, you can prevent the pest from spreading through your home.
Do Not Sit on the Grounds
As much as possible, avoid sitting on the ground. You also need to stay away from rock walls as they may live on them.
Consider Strong Odors
Did you know that chiggers do not like strong odors? So, it is also recommended to create an unpleasant aroma to them. You can take sulfur supplements but consult your doctor first. You can also eat a clove of garlic each day, few days before you go outside.
How to Treat Chigger Bites
The healing process of chigger bites will take 1-3 weeks. Once you suspect that you have these bites, use soap and clean water to wash them as soon as possible. It will also eliminate the remaining chiggers on the body. Then, do not forget to apply an antiseptic to the welts.
Ensure to avoid scratching the affected areas to prevent any infections. You can relieve the itchiness by apply ice to the bites. You can also use anti-itch medications, such as calamine lotion or hydrocortisone cream.
If you love very hot showers or baths, try to avoid them in the meantime. If you notice that the symptoms do not improve, ensure to consult your doctor for immediate diagnosis and medication. It is a misconception that these tiny pests burrow under the skin. The truth is they don’t.
Synergy² Exterminator: Pest Control Jackson MS
Whether you are always outside or only attend outdoor activities several times, you can still catch chiggers. So, ensure to stay from the areas where they live as much as possible. Chigger bites cause extremely intense itch and rashes. If you want to ensure that your surrounding is chigger-free, do not hesitate contact Synergy2 Pest Control.
Visit our official website and learn more about our services.
Feel free to read more about us and decide if Synergy² is the right company for you. We have over 270 Five-Star Google reviews for pest control service in the Jackson metro area (Jackson/Madison/Brandon/Ridgeland). Check out our newest location reviews for pest control service in Jackson, MS here at Synergy² Jackson Pest Control!
|
<urn:uuid:1bb64256-f78d-4986-8997-47e44e392de9>
|
CC-MAIN-2022-27
|
https://synergy2ms.com/what-to-do-about-chiggers-and-chigger-bites-in-mississippi/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103983398.56/warc/CC-MAIN-20220702010252-20220702040252-00409.warc.gz
|
en
| 0.951805 | 1,415 | 3.21875 | 3 |
Folliculitis is a common condition that typically presents as inflammation and little bumps on the skin in the hair follicles – the roots from which the hair on the face and body emerge.
Folliculitis can either be mild and short-lived, or a severe, chronic (long-term) issue. Due to the variation in severity, it can sometimes lead to the misconception that folliculitis is nothing more than a passing inconvenience, which can be frustrating to those who have a more severe form.
As a result of the chronic, uncomfortable and sometimes unpredictable nature of the more persistent version of the condition, many patients find that it negatively impacts their quality of life and self-confidence. For these reasons, it is common for patients suffering with chronic folliculitis – especially in its more severe forms - to also experience psychological issues, such as depression and anxiety.
For many individuals, living with chronic folliculitis can be upsetting and traumatic, so it may be helpful to seek support from groups or organisations that can provide additional resources. There are also communities on social media, where individuals with chronic folliculitis share their stories to help support others with the condition.
Folliculitis predominantly affects the face, but it can affect any hair-bearing part of the body.
There are different types of the skin condition, including pseudo-folliculitis, which is not in fact folliculitis, but which presents similarly to the condition.
Most cases of folliculitis are mild, and will resolve in 7-10 days, but patients with recurring folliculitis (either short-lived or chronic) can usually be treated by their GP, and most pharmacies will be able to advise about over-the-counter treatments for pseudo-folliculitis.
While the majority of folliculitis cases are not contagious, if doctors have identified a patient as carrying the S. aureus germ (a bacteria in the nose), it means there is a risk that the infection could be transferred to other people. This risk can be minimised by taking normal hygiene measures, and laundering clothing, bed linens and towels on a hot wash.
Symptoms of Folliculitis
Folliculitis can develop anywhere on the skin that can grow hair – so certain areas of the body, such as the palms of the hands or the soles of the feet cannot develop folliculitis.
There is also a condition called pseudo-folliculitis, which is not actually a true subtype of folliculitis, but does look similar, as little lumps form at the bases of hairs, however they do not contain pus. These bumps are also commonly known as ingrown hairs.
Ingrown hairs often irritate the skin and present as a raised, red bump that looks similar to a pimple, and can sometimes be very sore. In men, ingrown hairs often present as a group of bumps on the chin, cheeks, or neck after they've shaved, and in women, they frequently occur on the legs or in the bikini area.
In most cases, an ingrown hair will resolve on its own, but if it doesn't go away, extraction methods such as ‘squeezing’ should be avoided as they can cause more damage, infection or permanent scarring to the skin. Some people find that bathing in warm water helps to resolve ingrown hairs.
There are several types of folliculitis:
Causes of Folliculitis
Most cases of folliculitis are the result of an infection from the bacteria Staphylococcus aureus. Typically, the bacteria live harmlessly in the noses of many people, without causing any problems, but sometimes they can cause folliculitis.
Folliculitis usually occurs at sites where the hair follicles have been damaged by friction (rubbing), or shaving, or where there the follicle is blocked.
The most common area affected by folliculitis is the beard area of men, although women with facial hair can also develop the condition in the same area. Other common sites are the arms, legs, armpits and buttocks.
Other types of folliculitis have different causes, such as:
Pseudo-folliculitis, or ingrown hairs are hairs that have switched direction when growing, curled around and then grown back into the skin. Anyone can develop them, but they are more common in people who have very curly or coarse hair, as curly hair is more likely to bend back and re-enter the skin.
The risk of ingrown hairs increases after they’ve been shaved or cut, and they may also occur when dead skin cells block the normal hair growth.
Other conditions such as furuncles and carbuncles can also involve the hair follicles, and both are the result of bacteria, typically the S. aureus germ.
A furuncle is a skin infection that involves the hair follicle and its surrounding skin, and when clusters of furuncles join together under the surface of the skin, they form what is known as a carbuncle. Carbuncles and furuncles are typically much bigger and more painful than pustules caused by folliculitis.
Treatment of Folliculitis at Derma
Your appointment will begin with a skin check and medical history, followed by recommended treatment options.
Together with the dermatologist, you will discuss how to care for your skin, the latest and most effective folliculitis treatments, and explain all potential side-effects, enabling you to select the best options.
Mild to moderate forms of folliculitis may be controlled using topical treatments available from chemists, but depending on your condition, prescription creams may be necessary. The dermatologist will let you know whether it is beneficial to continue with any over-the-counter treatment, or if it is advisable to stop.
If folliculitis is more widespread or severe, Derma may be able to offer treatments with antibiotic tablets, which may be prescribed a single time, or periodically.
Depending on the treatment and the severity of your condition, further tests and follow-up appointments may be required to manage your treatment.
Each case of folliculitis is different, but whatever your needs, you can rest assured that Derma will provide the very best care for your skin, with access to the latest research and treatments.
Frequently Asked Questions
Folliculitis is a group of conditions caused by inflammation of the hair follicles. It often results in tender red spots but can often be itchy. It can occur anywhere there are hairs.
Mild folliculitis can clear spontaneously without treatment, usually within a couple of weeks. More significant folliculitis may need specific treatment depending on the cause.
There are many causes of folliculitis and usually, it is not contagious. However, if the cause is from an infection then sharing items may cause it to spread from one part of the body to another or to another person such as sharing razors, towels, or through jacuzzis or hot tubs.
Folliculitis presents with tender red spots which are often filled with pus, termed a pustule. They can be superficial or deep and can occur anywhere on the body where there are hairs including the chest, back, buttocks, arms and legs. It can be caused by infection, occlusion, irritation or various skin diseases.
Send an Enquiry
|
<urn:uuid:afdc9f79-519b-4296-b175-4438796c0def>
|
CC-MAIN-2021-31
|
https://www.dermareading.co.uk/folliculitis
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153899.14/warc/CC-MAIN-20210729234313-20210730024313-00502.warc.gz
|
en
| 0.956558 | 1,562 | 3.421875 | 3 |
Offering financial incentives to smokers could help them kick the butt
Researchers suggest that people are more likely to quit smoking and make other healthy lifestyle choices if they offered small financial incentives.
A team from Newcastle University said that a review of evidence revealed that as little as 3 pounds could make people up to 50 percent more likely to change their behavior, the Independent reported.
The research looked at more than 30,000 participants in 16 studies who had been set challenges such as quitting smoking.
The charity Action on Smoking and Health (ASH) said that evidence of the benefit of financial incentives to help people quit was growing and could be "particularly helpful for the poorest most disadvantaged smokers".
One recent study in Dundee found that smokers in deprived areas who were offered 12.50 pounds per week to quit smoking had a three-month quit rate of more than 30 percent, compared to the 14 percent national average.
Another in Scotland found offering pregnant smokers incentives to quit doubled the number who gave up the habit during their pregnancy.
Newcastle University Research Associate, Dr Emma Giles, said that the team had been "surprised at just how strong the effect was" in the studies they looked at.
(Posted on 12-03-2014)
Information on States of India:
Andaman Nicobar | Andhra Pradesh | Assam | Bihar | Chandigarh | Chhattisgarh | Dadar Nagar Haveli | Daman Diu | Delhi | Goa | Gujarat | Haryana | Himachal Pradesh | Jammu Kashmir | Jharkhand | Karnataka | Kerala | Lakshadweep | Madhya Pradesh | Maharashtra | Manipur | Meghalaya | Mizoram | Nagaland | Orissa | Pondicherry | Punjab | Rajasthan | Sikkim | Tamil Nadu | Tripura | Uttar Pradesh | Uttaranchal | West Bengal
INDIA REGIONAL MAPS:
Andhra Pradesh Travel Map | Bihar Travel Map | Goa Travel Map | Gujarat Travel Map | Haryana Travel Map | Himachal Pradesh Map | Karnataka Travel Map | Kerala Travel Map | Maharashtra Travel Map | Punjab Travel Map | Rajasthan Travel Map | Sikkim Travel Map | Tamil Nadu Travel Map | Uttar Pradesh Travel Map | West Bengal Travel Map |
MORE MAPS OF INDIA:
INDIA CITY MAPS:
KERALA TRAVEL MAPS:
|
<urn:uuid:d5940815-2ff4-4dbe-ab42-10172cd615f1>
|
CC-MAIN-2014-41
|
http://www.newkerala.com/news/2014/fullnews-23417.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663612.31/warc/CC-MAIN-20140930004103-00329-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.913744 | 495 | 2.53125 | 3 |
Individual differences |
Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology |
John William Atkinson, also known as Jack Atkinson, (December 1923 - October 27, 2003) was an American social psychologist who pioneered the scientific study of human motivation, achievement and behavior. He was a WWII veteran, teacher, scholar, and long term member of the University of Michigan Community.
Atkinson was a leader in establishing motivation as a distinct field of study in psychology research. His belief that scientific progress came from conceptual breakthroughs fueled his formulation and reformulation of a theory of motivation. He was one of the first in psychology to incorporate rigorous mathematical models in his theories and to use computer simulations of these models for experimentation. He also recognized the importance of measurement in science, maintaining a career-long interest in the refinement of measures of human motivation, especially by means of content analysis of imaginative thought. His discipline-changing ideas were followed around the world. In recognition, he received in 1979 the American Psychological Association's highest award, the Gold Medal for Distinguished Scientific Contributions.
Atkinson was born in Jersey City, NJ, to Frank G. and Wilhelmina "Minnie" Atkinson. He attended public schools in Oradell NJ, graduating from Dwight Morrow High School in Englewood NJ. He enlisted in the U.S. Army Air Corp, earning his wings in 1944, He served as an advanced instrument flight instructor for the B-25 and other bombers. On earning his wings Jack married his high-school sweetheart Mary Jane. They were married in 1944 in Macon, GA.
After the war Atkinson completed his undergraduate psychology degree with Honors at Wesleyan University, graduating in the middle of the 1946-47 academic year. At this point he began to pursue his interests in basic research on the arousal of human needs and behavior with the financial support of the Office of Naval Research. Atkinson was awarded his doctorate in Psychology in 1950 at the University of Michigan. He was invited to join the faculty of the University of Michigan in the Psychology Department where he remained his entire career.
Atkinson was devoted to the teaching of undergraduates throughout his career. As one of the original founders of the University's Honor's Program in the College of Literature, Science and the Arts, Professor Atkinson fostered unique opportunities and created multi-disciplinary courses to challenge undergraduate students. He authored and edited many books and articles on the scientific study of human motivation, achievement and behavior. Atkinson was one of the first in Psychology to incorporate rigorous mathematical models in his theories and to use computer simulations of these models for experimentation. His theoretical and experimental work spanned decades and spawned many doctorates.
His awards and honors included election to membership in the American Academy of Arts and Sciences, participation twice as a Fellow at the Center for Advanced Study in the Behavioral Sciences at Stanford University, Fellow of the American Psychological Association, an Honorary Doctorate from Ruhr University, Germany, and the American Psychological Association's highest award, the Gold Medal for Distinguished Scientific Contribution. Atkinson was honored on his retirement with a special colloquium at the University which brought together a number of his former students and colleagues who spoke of his inspiration and contributions to the science of human motivation. He was named Professor Emeritus in 1985.
Atkinson insisted on ethical behavior and highly valued the fundamental freedoms on which our country was founded. An expression of this was his role as a member of the Board of Control of the Michigan Daily during the turbulent 1960s. In the early 1970's, his belief's led him to become outraged by the behavior of President Richard M. Nixon, whom he viewed as a threat to liberty and justice. Jack organized and led public meetings and demonstrations denouncing President Nixon and vigorously promoted Nixon's impeachment by Congress.
- "Studies in Projective Measurement of Achievement Motivation", By John William Atkinson, University of Michigan Microfilms, 1950.
- The Achievement Motive, By McClelland, D. C., Atkinson, J. W., Clark, R. A., 4 Lowell, E. L., New York: Appleton-Century-Crofts, 1953.
- "Nebraska Symposium on Motivation", By Marshall R. Jones and John William Atkinson, University of Nebraska Press, 1954.
- Motives in Fantasy, Action, and Society: a method of assessment and study, By John W. Atkinson, Van Nostrand (1958) ISBN 0-442-00367-6 ISBN 978-0442003678
- "Achievement Motive and Text Anxiety Conceived as Motive to Approach Success and Motive to Avoid Failure", By John William Atkinson and George H. Litwin, Bobbs-Merrill Company, 1960.
- Effects of ability grouping in schools: Related to individual differences in achievement-related motivation, final report, By John W. Atkinson and Patricia O'Connor, Ann Arbor: University of Michigan, College of Literature, Science, and the Arts, Dept. of Psychology (1963)
- An Introduction to Motivation, By John William Atkinson, D. Van Nostrand Company, Inc (1965), Oxford, England: Van Nostrand; (1964), ISBN 0-442-20367-5
- Human motivation: a symposium, By Marshall R. Jones and John William Atkinson, University of Nebraska Press; 1st Edition (1965)
- The Dynamics of Action, By John William Atkinson and David Birch, New. York: Wiley (1970) ISBN 0-471-03624-2 ISBN 978-0471036241
- A Theory of Achievement Motivation, By John William Atkinson and Norman T. Feather, Volume 6, Wiley, (1966), Krieger Pub Co (June 1, 1974), ISBN 0-88275-166-2
- Motivation and Achievement, By John William Atkinson and Joel O. Raynor, Winston; [distributed by Halsted Press Division, New York] (1974) ISBN 0-470-03626-5, ISBN 978-0-470-03626-6
- Personality, Motivation and Achievement, By John William Atkinson and Joel O. Raynor, Hemisphere Pub. Corp. (1978) ISBN 0-470-99336-7, ISBN 978-0-470-99336-1
- Personality, Motivation, and Action: Selected papers (Centennial psychology series), By John William Atkinson, Praeger (1983), ISBN 0-03-060541-5
- Motivation, Thought, and Action, By Julius Kuhl, and John W. Atkinson, New York: Praeger Publishers (June 6, 1986) ISBN 0-275-92096-8
- "Dictionary of Psychology", By John William Atkinson, Eric Berne, and Robert Sessions Woodworth, 4th Edition, GOYL SaaB, 1988.
Chapters in booksEdit
- Award for Distinguished Scientific Contributions
- Frontiers of Motivational Psychology: Essays in Honor of John W. Atkinson
- John Simon Guggenheim Memorial FoundationA Fellows Page
|This page uses Creative Commons Licensed content from Wikipedia (view authors).|
|
<urn:uuid:f1264967-0493-4d30-970d-df30b0c8f9c9>
|
CC-MAIN-2017-17
|
http://psychology.wikia.com/wiki/John_William_Atkinson
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121121.5/warc/CC-MAIN-20170423031201-00600-ip-10-145-167-34.ec2.internal.warc.gz
|
en
| 0.921863 | 1,469 | 3 | 3 |
As part of our "Polar Pal" unit, we did a mini unit on penguins. We learned all about the various types of penguins and the lands they inhabit.
and then measured ourselves against it.
Of course, we had to include "waddling" as part of our movement activities!
We learned quite a bit about penguin rookeries and how the daddy penguins care for the eggs. We practiced having the mommy penguins pass off the penguin egg to the daddy penguins. We had to remember to only use our feet since penguins don't have "hands". We also had to be careful not to let the egg drop to the freezing snow on the ground so the egg wouldn't freeze. This was much trickier than the children expected!
After the mommy penguins slipped off to find food and swim in the sea,
the daddy penguins had to learn how to stay warm, rotating themselves from the outside to the inside of the huddle. We also practiced waddling as a group, so everyone stayed warm. It was quite a challenge to get everyone moving in the same direction!
Our friend Ms. Christie game us this fabulous cardboard penguin cutout from the movie "Happy Feet". It's been a fun decoration and also helped illustrate how different baby penguins look from fully grown penguins!
|(It's hard to tell from this, but it's actually about 2 1/2 feet tall!)|
Thanks for visiting! Leave a little "comment love" ~ I'd love for you to share your thoughts! :)
|
<urn:uuid:d60775c3-fabd-4146-b888-990c36249621>
|
CC-MAIN-2014-41
|
http://littleilluminations.blogspot.com/2012/01/learning-about-penguins-in-pre-k.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137948.80/warc/CC-MAIN-20140914011217-00279-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.973155 | 325 | 3 | 3 |
The first humanoid robot in space with speech capability made small talk with a Japanese astronaut and said it had no problem with zero gravity on the International Space Station.
Footage released by the robot's developers on Friday showed Kirobo performing its first mission on the station, talking in Japanese with astronaut Koichi Wakata to test its autonomous conversation functions.
Wakata says he's glad to meet Kirobo, and asks the robotic companion how it feels about being in a zero-gravity environment.
"I'm used to it now, no problem at all," Kirobo quips.
Kirobo is programmed to process questions and select words from its vocabulary to construct an answer, instead of giving pre-programmed responses to specific questions.
The creator of the robot, Tomotaka Takahashi, said the autonomous functions meant nobody knew how well Kirobo would be able to answer Wakata's questions.
Though Kirobo had some awkward pauses and Wakata spoke more slowly than usual at times in their chat earlier this month, Takahashi said conversations smoothed out over time.
"Through layers of communication, we were able to observe the initial stages of a relationship begin to develop between a human and a robot, and I think that was our biggest success" he said.
Kirobo took off from Japan's Tanegashima Space Center for the International Space Station this summer aboard a space cargo transporter. Wakata arrived in November and will assume command of the station in March.
The project is a joint endeavor between advertising company Dentsu, automaker Toyota, and Takahashi at the University of Tokyo's Research Center for Advanced Science and Technology.
Experiments with Kirobo will continue until it returns to Earth at the end of 2014.
In the meantime, Kirobo says he wants to ask Santa for a toy rocket this Christmas.
(Phys.org)—New research conducted by a team of astronomers, led by Simone Scaringi of the Max Planck Institute for Extraterrestrial Physics in Germany, examines peculiar dimming of a newly found young stellar object designated ...
Some of the mysterious grooves on the surface of Mars' moon Phobos are the result of debris ejected by impacts eventually falling back onto the surface to form linear chains of craters, according to a new study.
An international team of astronomers, including Carnegie's Eric Persson, has charted the rise and fall of galaxies over 90 percent of cosmic history. Their work, which includes some of the most sensitive astronomical measurements ...
The world's attention is now on Proxima Centauri b, a possibly Earth-like planet orbiting the closest star, 4.22 light-years away. The planet's orbit is just right to allow liquid water on its surface, needed for life. But ...
Please sign in to add a comment.
Registration is free, and takes less than a minute.
Click here to reset your password.
Sign in to get notified via email when new comments are made.
|
<urn:uuid:dba990ac-8d1c-42f2-bbb1-8c746f2d399c>
|
CC-MAIN-2016-36
|
http://phys.org/news/2013-12-japan-robot-chats-astronaut-space.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471983580563.99/warc/CC-MAIN-20160823201940-00226-ip-10-153-172-175.ec2.internal.warc.gz
|
en
| 0.944071 | 620 | 2.578125 | 3 |
Identifying wetland change in China’s Sanjiang Plain using remote sensing
- Cite this article as:
- Zhang, S., Na, X., Kong, B. et al. Wetlands (2009) 29: 302. doi:10.1672/08-04.1
- 479 Downloads
Maximum likelihood supervised classification and post-classification change detection techniques were applied to Landsat MSS/TM images acquired in 1976, 1986, 1995, 2000, and 2005 to map land cover changes in the Small Sanjiang Plain in northeast China. A hotspots study identified land use changes in two National Nature Reserves. These were the Honghe National Nature Reserve (HNNR) and the Sanjiang National Nature Reserve (SNNR). Landscape metrics were used in both reserves to identify marsh landscape pattern dynamics. The results showed that the Small Sanjiang plain had been subject to much change. This resulted from direct and indirect impacts of human activities. Direct impacts, resulting in marsh loss, were associated with widespread reclamation for agriculture. Indirect impacts (mainly in HNNR) resulted from alterations to the marsh hydrology and this degraded the marsh ecosystem. Marsh landscape patterns changed significantly due to direct impacts in SNNR between 1976 and 1986 and again between 2000 and 2005, and, in HNNR between 1976 and 1986. Indirect impacts in HNNR after 1986 appeared to cause little change. It was concluded that effective wetland protection measures are needed, informed by the change analysis.
|
<urn:uuid:8d194930-1339-4f7d-ad63-a5d1f9b409dd>
|
CC-MAIN-2017-09
|
http://link.springer.com/article/10.1672%2F08-04.1
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170884.63/warc/CC-MAIN-20170219104610-00330-ip-10-171-10-108.ec2.internal.warc.gz
|
en
| 0.94017 | 310 | 2.796875 | 3 |
6 Steps to Foster Student Motivation in Reading Class
The teaching profession is the best profession known to man. No other profession can offer adults the opportunity to mold, shape, and change the lives of youth day after day.
Although educators have high expectations for students, students still manage to fall through the cracks. Some students drop out while other students do not participate in class.
Educators battle negative stereotypes, mainstream culture, and time constraints. However, the most challenging battle is student motivation.
Without student motivation, the best lesson plans fail, the most dedicated teachers fail, and the student fails.
The nonprofit organization, What Kids Can Do (WKCD), solely explores the topic of student motivation. The organization has also published books, including Fires in the Mind, which addresses what motivates students to work hard.
Nancie Atwell is the founder of the Center for Teaching and Learner and has written books including The Reading Zone, which addresses methods to help students become passionate and skilled readers.
Penny Kittle is a high school teacher, reader, and author who wrote Book Love, which outlines tactics to develop passion in adolescent readers.
Both The Reading Zone and Book Love demonstrate how to create lifelong readers by cultivating student motivation.
To develop student motivation in reading class, educators can use the following steps:
1) Intrinsic motivation
Educators must first acknowledge that “grades, stickers, star charts, and prizes are all unnecessary rewards in the process of creating readers” (Kittle 30). Teachers are only scratching the surface with these extrinsic rewards.
Instead, schools need to focus on “crafting an individual reading life of challenge, whim, curiosity and hunger” (Kittle 52). Only when teachers show students the wonderful emotions that reading fosters, lifelong readers are created.
“We need to figure out how our students can enjoy relationships with books and, as readers, with their teacher and one another” (Atwell 25). Success in life is measured by relationships, not the quantity of decorated degrees or honors an individual earns, nor by the amount of money a person makes.
“The magic formula is the relationship we form…and then put books in their hands that will ignite their own intrinsic motivation to read” (Kittle 35). Once teachers have established a relationship with a student, the teacher can proceed to recommend books and generate conversations about reading.
In order to get students to read, teachers cannot use a cookie-cutter mold. For example, because one student may enjoy fantasy, while another student likes mystery, classes cannot use one class novel and expect all students to participate.
“Kids choose what they read because children who choose books are more likely to grow up to become adults who read books” (Atwell 27). After high school, students will not have teachers to assign The Fountainhead. Teachers need to teach reading skills that demonstrate how to choose books. To get students to actually read books, let them choose.
4) Classroom Environment
To create an interactive and stimulating environment, Kittle suggests to:
• Assign seats
• Change seating assignments every month
• Build talk into everything that happens in the classroom
Atwell also believes in building a collaborative classroom environment by instituting the “dining room table” in which students “talk easily and often about the books we’re reading” (Atwell 75). Allowing students to speak freely about books inspires them to achieve lifelong reader status.
It is not enough to create a collaborative classroom. The physical classroom environment must also support readers. Atwell writes that students need the following:
• Encouragement from the teacher, and advice
• Time to read in school
• Trillions of great books as backups
• Book talks to recommend great titles
• Comfortable cushions and pillows
Teachers also need to reduce frustration for students. Students resist reading because they are not good readers. The reader’s workshop, recommended by Kittle and Atwell, allows a reduced level of frustration because each student sets his/her own goals. The teacher and student work together to do so and must “start by being honest…about what we do as readers” (Atwell 17). When this honest collaboration takes place and realistic goals are set, students are set up to succeed.
How can teachers get books into the hands of students? First, teachers must begin by recommending books. In Kittle’s classroom, she posts book lists and televised book trailers created by students. She also allows students to cover a wall with book covers and sign their name under the titles they have read. When students see that other students have bought into reading, more nonreaders are reached.
Another key component, developed by Atwell, is the book talk . The book talk involves reader sales pitching a book for the entire class. These valuable talks replace traditional written book reports because students can visibly see the excitement and passion the book created. From listening to book talks, students add titles that generate interest to their “to-read” lists.
Once students begin to read, it is vital that teachers conduct reader conferences.
Conferences allow the teacher to:
• inquire about the student’s reading life
• locate improvement areas
• offer guidance and advice to the reader
Teachers can also note if the student has been fake-reading and not participating in the coursework. “I must take the time to hear, persistently, the struggles and plans of the individual readers in my classroom in order to know them as people and help them develop reading habits…” (Kittle 78).
6) Parent Involvement
When families are on board with education, students can truly flourish. Both Atwell and Kittle acknowledge the family as an imperative component in a student’s education. Kittle sends a letter to parents via internet explaining the independent reading program. Atwell also sends a similar letter to parents every fall explaining the reader’s workshop.
|
<urn:uuid:7f415726-9778-4ce1-82ec-841797eb3c13>
|
CC-MAIN-2017-22
|
https://kelseyempfield.wordpress.com/2013/03/18/6-steps-to-foster-student-motivation-in-reading-class/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607242.32/warc/CC-MAIN-20170522230356-20170523010356-00563.warc.gz
|
en
| 0.949674 | 1,244 | 3.78125 | 4 |
Loss of both groundwater and water stored in surface reservoirs in the drought-striken western U.S. isn't just expensive and contentious: it's evidently making the earth's crust rise in the West. Scripps researchers say that the average rise across a wide stretch of the West Coast is approximately one sixth of an inch. Scientists came to this conclusion by studying data collected from hundreds of GPS sensors across the Western U.S., installed primarily to detect small changes in the ground due to earthquakes. But the GPS data can also be used to show very small changes in elevation. The study specifically examined GPS stations on bedrock or very thin soil because it provides the most accurate measurement of groundwater loss, said Duncan Agnew, professor of geophysics at the Scripps Institution of Oceanography. Areas with thick soil, such as farms, can see the ground sinking as the soil dries out. But Agnew said the bedrock underneath that soil is actually rising. The highest uplift of the Earth occurred in California's mountains because there is so much water below them, Agnew said. The uplift was less in Nevada and the Great Basin.
|
<urn:uuid:a4c9ea54-904c-473a-96ed-66c52e50d249>
|
CC-MAIN-2018-09
|
https://science.slashdot.org/story/14/08/24/064201/western-us-drought-has-made-earths-crust-rise?sdsrc=prev
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812788.42/warc/CC-MAIN-20180219191343-20180219211343-00561.warc.gz
|
en
| 0.96524 | 231 | 3.59375 | 4 |
Researchers examine food supply chain resiliency in the Pacific during COVID-19 pandemic
The COVID-19 pandemic exposes weaknesses in the supply chain when countries go into lockdown. Some are small, such as the toilet paper shortages early on, that, while annoying, were eventually resolved. But what happens when the effects of the pandemic reach the food systems of countries highly reliant on food imports and income from abroad, and commerce slows to a halt?
UC Santa Barbara marine conservationist Jacob Eurich and collaborators watched this very situation unfold in the Pacific Island Countries and Territories (PICTs)—the island nations scattered in the middle of the Pacific Ocean, from New Zealand to French Polynesia, and including the Marshall Islands to Papua New Guinea. While infection with SARS-CoV-2 has been slow there relative to other parts of the world, the global lockdown can have outsized effects on their food systems.
"One of the key messages from the research is to rely less on global food supply chains," said Eurich, a co-author on a paper that appears in the journal Food Security. While this study was specific to the PICT region, areas with few domestic alternatives to global supply chains, he noted, are vulnerable to similar threats to food security when shocks to the system occur.
With their remote locations, lack of arable land and economies dependent on tourism and need for food imports, the PICTs have become reliant on movement in and out of the region for much of the food they consume and also for the money to purchase that food.
But even with commerce slowing down, these countries and territories need not suffer food scarcity and malnutrition, the researchers said. The PICTs are home to large networks of coral reefs that host a diverse array of fish and other seafood.
"Coral reefs should operate as biodiverse, living refrigerators for coastal communities, sourcing replenishable, nutritious food," Eurich said. "Coastal communities can and should be able to depend on traditionally-sourced diets if the resource is healthy."
In fact, the time is ripe to reconsider the role of local production in the region's food systems, according to the researchers. For instance, some areas with farmland could benefit by reinvigorating their production of root crops, which would not only decrease reliance on the global supply chain, but also provide healthy alternatives to imported processed foods.
"Bolstering local production and intraregional trade strengthens the food system," he said. "Consuming more locally produced fresh foods and less non-perishable shelf-stable foods is a step in the right direction."
Meanwhile, a shortening of the supply chain via strong intraregional trade could strengthen the regional economy while also protecting against food insecurity. Significant local processing and storage challenges must be overcome, according to the paper, and intra-island transport and food distribution strengthened. Particularly in the PICT region, where large scale local fish storage is currently inadequate, it helps to prioritize production of less perishable foods (like root crops) over fish, Eurich said.
It's not just about pandemic planning. The same principles for resilient food systems in the face of climate change and natural disaster—both of which the PICTs have been facing—could serve as a basis for response to other COVID-19-type scenarios, according to the researchers.
"Climate change and natural disasters can be considered shocks to the system," Eurich said. "The pandemic, while there was time to prepare, was still a shock. We have learned that enhancing storage, production and distribution through coordination and increasing regional transparency are keys of a resilient supply chain when these unexpected changes occur."
|
<urn:uuid:1867b401-b05c-47e0-8565-8e48ad81eb2c>
|
CC-MAIN-2021-21
|
https://phys.org/news/2020-08-food-chain-resiliency-pacific-covid-.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991178.59/warc/CC-MAIN-20210516171301-20210516201301-00295.warc.gz
|
en
| 0.953352 | 753 | 3.140625 | 3 |
Everyone should have hope for the future, and hunger reduces that hope.
This was Director General Yukiya Amano's answer when asked why food was chosen as the theme for this year's Scientific Forum, an event held each year on the margins of the IAEA General Conference. As someone who has experienced hunger in his lifetime, Mr. Amano said the issues of food availability and food safety are close to his heart.
Food availability, abundance and safety are under threat. By 2050 for example, global production of safe and nutritious food must increase by 70% to feed the world's growing population.
The 2012 IAEA Scientific Forum on Food for the Future: Meeting the Challenges with Nuclear Applications concluded on Wednesday, 19 September, following two days of presentations and discussions from scientists and experts from around the world and from a variety of organizations.
Panelists, presenters and attendees discussed increasing food production, protecting food from animal and plant diseases, as well as from animal and plant pests, and enhancing food quality and safety with irradiation and through contamination control.
Attendees proposed a number of areas for further action, in particular continued research and development by the IAEA, other international organizations, and national governments.
Many stressed the intimate connections between small farmers' ability to produce enough food and chronic poverty.
Smallholder farmers produce 80% of the food eaten in developing countries - both livestock products and grain. But as populations rise, farmers will have to deliver considerably more food despite the effects of climate change. So small farmers need access to scientifically proven methods of increasing productivity. Nuclear techniques are not only able to evaluate traditional and new farming methods, but are also invaluable in fighting insect pests, managing plant and animal disease. They are essential in improving breeding and reproduction. They are also used to ensure food safety and to extend the storage life of harvests and food.
Therefore presenters highlighted the urgent need for political commitment from national governments to address food scarcity and food safety through the integration of nuclear and non-nuclear technologies.
|
<urn:uuid:fde3b3c6-bf83-440d-a202-d9b243b584f7>
|
CC-MAIN-2016-36
|
https://www.iaea.org/newscenter/news/nuclear-technology-help-small-farmers
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982984973.91/warc/CC-MAIN-20160823200944-00055-ip-10-153-172-175.ec2.internal.warc.gz
|
en
| 0.958044 | 413 | 2.890625 | 3 |
Costa Rica is a small country, but its President, Carlos Alvarado Quesada, has shown great ambition in tackling the climate crisis. He recognizes the need to confront this existential challenge with innovative and urgent action. This year, the U.N. recognized Costa Rica’s trailblazing approach and ambitious climate policies with its highest environmental honor, naming it a U.N. Champion of the Earth.
Since becoming President in 2018, President Alvarado has established a bold path for Costa Rica, setting targets to reform transport, energy, waste and land use. He is building on his nation’s rich legacy of sustainable development and environmentally mindful growth.
In an age of populism, isolationism and polarized politics, President Alvarado’s defense of the multilateral system and his commitment to finding global solutions to global challenges are highly commendable. His actions serve to remind the world that even small nations can take the lead.
Ban is a former Secretary-General of the U.N. and the deputy chair of the Elders, a group of global leaders advocating for peace, justice and human rights
|
<urn:uuid:4df63824-bfa2-411f-8694-e049b49cdee1>
|
CC-MAIN-2020-05
|
https://time.com/collection/time-100-next-2019/5718820/carlos-alvarado-quesada/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250604397.40/warc/CC-MAIN-20200121132900-20200121161900-00058.warc.gz
|
en
| 0.940221 | 230 | 2.59375 | 3 |
These printers do not need the same mechanical devices required in copiers and laser printers, which use offset printing and heat fusing. The ink particles in inkjet printers are discharged using a non-contact method, so the target does not need to be completely flat as it does for printing presses.
Types and methods
Inkjet printers are broadly categorized into two types: continuous and on-demand.
On-demand types are further separated into piezoelectric, thermal, and valve types.
Office and industrial use
Inkjet printers are grouped into office printers, which are typically connected to a computer in a home or an office, and industrial printers, which are used on production lines in factories.
Office inkjet printers
These printers are used in a wide range of applications such as printing pictures, work documents, and large posters. On-demand type are the most commonly used type of printer in offices, particularly the piezo and thermal method printers.
Industrial inkjet printers
Industrial inkjet printers can print not only on paper but on many types of materials, such as packaging films, cans, and plastic bottles. In order to print on products moving on production lines, ink is designed to be quick-drying.
These printers are primarily continuous-type, while on-demand type printers are used specifically for printing large characters on cardboard boxes and similar objects.
INDUSTRIAL INKJET PRINTER ADVANTAGES
- Able to print on a variety of materials
- These printers can print on many types of materials including paper, plastics, and metals.
- Capable of high-speed printing with quick-drying ink
- With a drying time of around one second, prints adhere to surfaces quickly and are not easily removed.
- Capable of printing without moving print head back and forth
- The printer can work in several configurations.
It is designed to stay fixed on production lines of any speed, or move in traversing head applications.
|
<urn:uuid:ec8c46ca-4f5c-4acc-a417-0e10acff242b>
|
CC-MAIN-2021-04
|
https://www.keyence.com/ss/products/marking/inkjet/printer/info.jsp
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703512342.19/warc/CC-MAIN-20210117112618-20210117142618-00777.warc.gz
|
en
| 0.912569 | 408 | 2.96875 | 3 |
It's a well-burnished saying: Stress makes your hair turn gray. But is there actually a correlation between stress and losing the natural color of your locks?
According to a study published today in Nature, there is, in fact, a direct link between stress and graying. Over the past two decades, researchers have found preliminary evidence that stress plays at least a small role in initiating the graying process. But our understanding of how that works has been murky — until now.
It hinges on melanocytes, pigment-making cells that give our hair its color. Scientists knew losing these cells in hair follicles robs hair of its luster, but they had yet to pin down the mechanism responsible for triggering the depletion of melanocytes. Now, scientists finally have an answer: the fight-or-flight response.
Graying and Goosebumps
The answer wasn’t so easy to pin down, says Ya-Chieh Hsu, a stem cell biologist at Harvard University. For example, the researchers first assumed that hair graying was driven by a reaction from the immune system or the release of stress hormones.
But after removing immune cells and stress hormone receptors in mice, they were surprised to find that the animals' coats still turned gray after being injected with resiniferatoxin, a compound that causes pain and stress. Instead of the immune system or stress hormones, researchers found the actual culprit was the sympathetic nervous system, responsible for the fight-or-flight response.
“When we eventually realized the sympathetic nervous system was driving the process, that was really a surprise,” Hsu wrote in an email.
Sympathetic nerves stimulate hair follicles — for example, they're responsible for the goosebumps we get due to a scare or a cold breeze. But when we're stressed, the sympathetic nervous system triggers the release of a chemical called noradrenaline that primes us for action. It's good in situations where we need to be physically roused, but has an unfortunate side effect for our hair.
Noradrenaline, the researchers found, causes melanocyte stem cells to differentiate and eventually move away from hair follicles. The result is a gradual depletion of melanocyte cells, and the loss of the color they provide.
While Hsu says the mechanisms of hair graying work about the same in mice and humans, she notes that stress might not be the only thing causing us to lose our hair color. It's hard to tell how big of a role other factors, such as age, might play in causing us to lose pigment.
As we age, our hair can also turn gray as we lose melanocytes, though it's not necessarily because of stress.
But the research does open the door to a better understanding of how other stem cells in the body are impacted by stress.
“Once stem cells are gone, they are gone,” Hsu wrote in an email. “That’s why it is so important to understand how stress affects stem cells, because the changes will be permanent.”
|
<urn:uuid:df2b4a68-61bc-4d6c-9d1a-ba54e58551c7>
|
CC-MAIN-2023-06
|
https://www.discovermagazine.com/health/scientists-finally-pin-down-why-stress-turns-our-hair-gray
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500664.85/warc/CC-MAIN-20230207233330-20230208023330-00308.warc.gz
|
en
| 0.956529 | 634 | 3.03125 | 3 |
With Japan’s whale hunt in stormy southern seas wrapped for the season, the battle over efforts by a handful of countries to expand whale hunts has shifted to Iceland. There, Greenpeace filmmakers caught video of a whaling vessel hauling two fin whales to the pier for processing. The environmental group is trying to force the new Iceland government to cancel the whaling quota set by the previous government, which collapsed amid the financial crisis. The quota would allow the killing of 150 fin whales and more than 100 minke whales each year for five seasons. So far, the new government has said it would not cancel this year’s hunt.
Environmental groups have been intensifying their campaign in recent days, as they always do ahead of the annual meeting of the International Whaling Commission, with the next session set to begin on Monday in Madeira, Portugal. The last time Iceland included fin whales in its quota was 2006, according to Chris Cutter of the International Fund for Animal Welfare. But the quota was for nine whales, and whalers killed just seven and could not find a market for the meat, he said.
The fight over fin whales is as much about ethics as conservation biology. While the International Union for Conservation of Nature lists the giant — second in size behind blue whales — as endangered, regional populations, including the fin population off Iceland, are healthy. The International Whaling Commission’s scientific committee and other groups estimated in 2006 that 20,000 to 30,000 members of the species are in waters between Greenland and Iceland.
As I’ve written on Dot Earth and in a 2004 print story, humans happily kill bison for their meat while admiring them at the same time. But at least in most places, we remain loath to both cherish and consume whales. As more whale species recover after centuries of slaughter and the rarity question fades, what arguments against whale hunting will hold up?
I have queried the government of Iceland and the Obama administration on the expanded whale hunt and will update this post as responses come in.
|
<urn:uuid:ea514f95-6746-46c6-9c2c-78ae9619e634>
|
CC-MAIN-2014-23
|
http://dotearth.blogs.nytimes.com/tag/whaless/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270528.34/warc/CC-MAIN-20140728011750-00445-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.954192 | 416 | 2.609375 | 3 |
If you have a straight line but want a circle, you’re going to need some Pi.
I’m talking about the number, not the delicious baked good. It’s usually represented using the lowercase Greek letter for ‘p’, ‘π’, and probably is the best known mathematical constant today. Here’s why:
The root of the circle
Pi is the ratio of a circle’s diameter to its circumference. No matter the size of a circle, its diameter will always be roughly 3.14 times shorter than its circumference — without fail. This ratio, π, is one of the cornerstones upon which modern geometry was built.
Bear in mind that (uppercase) ∏ is not the same as (lowercase) π in mathematics.
For simplicity’s sake, it’s often boiled down to just two digits, 3.14, or the ratio 22/7. In all its glory, however, pi is impossible to wrap your head around. It’s is an irrational number, meaning a fraction simply can’t convey its exact value. Irrational numbers include a value or a component that cannot be measured against ‘normal’ numbers. For context, there’s an infinite number of irrational numbers between 1.1 and 1.100(…)001. They’re the numbers between the numbers.
There is no unit of measurement small enough in rational numbers that can be used to fully express the value of irrational ones. They’re like apples and oranges — both fruits, but very different.
Because it can’t properly be conveyed through a fraction, it follows that pi also has an infinite string of decimals. Currently, we’ve calculated pi down to roughly 22.4 trillion digits. Well, I say ‘we’, but it was actually our computers that did it.
Truth be told, we don’t actually need that many digits. They’re very nice to have if you’re NASA and people live or die by how accurate your calculations are — but for us laymen, 3.14 generally does the trick. It’s good enough because it’s just about at the limit of how accurately we can measure things around us. We simply don’t need that much precision in day-to-day activity.
Go around the house, pick up anything round, and run a length of string along its circumference. Unwind it and measure it with a ruler. Measure the circle’s diameter with the same ruler, use this value to divide the circumference, and you’ll get roughly 3.14 each and every time. In other words, if you cut some string in several pieces, each equal to the diameter in length, you’d need 3.14 of those strips to cover the circumference.
Because this simplification is so widely-used, we celebrate Pi day on March 14 (3/14) every year.
If you do happen to need a more-detailed value for Pi, here it is up to 100 million decimal places.
What’s it for?
Pi is used in all manner of formulas. For example, it can be used to calculate a circle’s circumference (π times diameter), or its area: A=πr2 — how I keep this formula lodged in my neurons is using the “all pies are square” trick. It’s also used in calculating various elements of the sphere, such as its volume (3/4πr3) or surface area (4πr²).
But it also shows up in a lot of engineering and computational problems. Weirdly enough, pi can be used to obtain the finite sum of an infinite series. For example, if you add up the inverse of all natural squares — 1/12+1/22+1/32+….+1/n2 — you get π2/6.
Most branches of science stumble into pi in their calculations at one point or another. Computer scientists use it to gauge how fast or powerful a computer is, and how reliable its software, by having the device crunch numbers and calculate pi. It’s very useful for determining both circular velocities (how fast something is spinning) as well as voltage across coils and capacitors. Pi can be used to describe the motion of waves on a beach, the way light moves through space, the motion of planets, or to track population dynamics if you’re into statistics.
Another place pi pops up (that you wouldn’t suspect) is in the value of the gravitational constant. This shows how fast an object will accelerate towards the ground as it’s falling. Its most widely-accepted value is 9.8 m/s2. The square root of that value is 3.1305-ish, which is close to the value of pi. That’s actually because the original definition of a meter involved a pendulum that took 1 second to swing either way. Wired has a more comprehensive explanation here.
Pi also underpins modern global positioning systems (GPS) since the Earth is a sphere. So give a little mental thanks to mathematics the next time you’re drunkenly thumbing your phone to hail an Uber.
Who discovered pi?
Pi is not a newcomer to the mathematical stage by any means. We refer to it using the letter ‘π’ from the ancient Greek word ‘περίμετρος’ — perimetros — which means ‘periphery’ or ‘circumference’. It was introduced by William Jones in 1706 and further popularized by Leonhard Euler. The notation was likely adopted in recognition of the efforts of one great ancient mathematician: Archimedes.
Archimedes put a lot of effort into refining the value of pi. He was also the first to use it to calculate the sum of an infinite number of elements over 2,200 years ago, and it’s still in use today.
But he wasn’t the first to realize the importance of pi(e). In his book A History of Pi, professor Petr Beckmann writes that “the Babylonians and the Egyptians (at least) were aware of the existence and significance of the constant π” as far back as 4,000 years ago. They likely only had rough estimations of its exact value (maths was still a new ‘tech’ back then) but they were in the right ballpark.
“The ancient Babylonians calculated the area of a circle by taking 3 times the square of its radius, which gave a value of pi = 3. One Babylonian tablet (ca. 1900–1680 BC) indicates a value of 3.125 for pi, which is a closer approximation,” writes Exploratorium in a look at the history of pi.
They add that ancient Egyptian mathematicians also settled on a quite-ok-for-the-time value of 3.1605, as revealed by the Rhind Papyrus. Chinese and Indian mathematicians also approximated the value of pi down to seven or five digits, respectively, by the 5th century AD.
Further work, most notably that of Archimedes, helped refine this value. He used the Pythagorean Theorem to measure the area of a circle via the areas of inscribed and circumscribed regular polygons. If you slept during math class, that’s the polygon inside the circle and the one that contains the circle, respectively. It was an elegant method, but it did have its limits — since the areas of those two polygons aren’t exactly the same as the surface area of the circle, what Archimedes got was an interval that contained pi. He was aware of this limitation. His calculations revealed that pi must fall between 3 1/7 and 3 10/71 — which is between 3.14285 and 3.14085. Today we know that the five-digit value of pi is 3.14159, so that result isn’t at all bad for a guy without a proper pen to write it down with.
The first method to calculate the exact value of pi came up during the 14th century, with the development of the Madhava-Leibniz series. By the time the 20th-century swang by, pi was known down to about 500 digits.
Enjoyed this article? Join 40,000+ subscribers to the ZME Science newsletter. Subscribe now!
|
<urn:uuid:bbd112da-ea70-443e-abc7-b964f177334d>
|
CC-MAIN-2018-34
|
https://www.zmescience.com/science/what-is-pi-feature-82359724/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221218101.95/warc/CC-MAIN-20180821092915-20180821112915-00016.warc.gz
|
en
| 0.946679 | 1,794 | 3.546875 | 4 |
Google celebrated the 41st anniversary of the discovery of Lucy with a play on the "Ascent of Man" picture.
Lucy is the nickname given to the first skeleton of an Australopithecus afarensis ever discovered. The find helped scientists connect the dots between apes that walked on all fours and humans who walked upright.
Forty percent of the skeleton was intact when it was discovered in Ethiopia in 1974, which isn't bad considering it's about 3.2 million years old.
Scientists determined that Lucy walked upright by examining her knee structure and the curvature of her spine. (Video via California Academy of Sciences)
That's why Google's doodle shows Lucy, named after a Beatles song, walking upright between an ape and a human.
Lucy is currently in a safe at the National Museum of Ethiopia near where she was first unearthed. But the public can view only plaster replicas of the skeleton.
This video includes images from Getty Images.
|
<urn:uuid:3d8f6d9d-35d4-4cf6-a857-08809ec28ee3>
|
CC-MAIN-2021-43
|
https://www.newsy.com/videos/google-doodle-celebrates-lucy-the-australopithecus/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585382.32/warc/CC-MAIN-20211021071407-20211021101407-00588.warc.gz
|
en
| 0.956196 | 199 | 3.484375 | 3 |
Washington, Jan 25 (ANI): Studies have indicated that infant brains come equipped with knowledge of "intuitive physics" at birth, a researcher says.
University of Missouri researcher Kristy vanMarle and collages believe babies are born with environmental knowledge.
"In the MU Developmental Cognition Lab, we study infant knowledge of the world by measuring a child's gaze when presented with different scenarios," said vanMarle, an assistant professor in the Department of Psychological Sciences in the College of Arts and Science.
"We believe that infants are born with expectations about the objects around them, even though that knowledge is a skill that's never been taught. As the child develops, this knowledge is refined and eventually leads to the abilities we use as adults," she explained.
In a review of related scientific literature from the past 30 years, vanMarle and Susan Hespos of Northwestern University found that the evidence for intuitive physics occurs in infants as young as two months - the earliest age at which testing can occur.
At that age, infants show an understanding that unsupported objects will fall and that hidden objects do not cease to exist. Scientific testing also has shown that by five months, infants have an expectation that non-cohesive substances like sand or water are not solid.
In a previous publication, vanMarle found that children as young as 10 months consistently choose larger amounts when presented with two different amounts of food substance.
"We believe that infants are born with the ability to form expectations and they use these expectations basically to predict the future," vanMarle said.
"Intuitive physics include skills that adults use all the time. For example, when a glass of milk falls off the table, a person might try to catch the cup, but they are not likely to try to catch the milk that spills out. The person doesn't have to consciously think about what to do because the brain processes the information and the person simply reacts.
"The majority of an adult's everyday interactions with the world are automatic, and we believe infants have the same ability to form expectations, predicting the behaviour of objects and substances with which they interact," she stated.
While the intuitive physics knowledge is believed to be present at birth, vanMarle believes parents can assist skill development through normal interaction, such as playing and talking with the child and encouraging him/her to interact with objects.
The study is published in the January issue of WIREs Cognitive Science. (ANI)
Read More: Science College | Military College Eme | College Campus Tso | Anantapur Engg College | Ksrm Engg College | Veterinary Science College | S.v.agricultural College | S.v.arts College | S.v.medical College So | G.pulla Reddy Eng College | Vuyyuru College | College Road(guntur) | Guntur Medical College | Science Institute Lsg So | Dharmaram College | St. John's Medical College | Arabic College | A.a. College Edso | Calicut Arts & Science College | Kohima Science College
|
<urn:uuid:95869198-8ca0-4b8a-b21c-d0cf79984aed>
|
CC-MAIN-2019-35
|
https://www.newstrackindia.com/newsdetails/2012/01/25/262521-Babies-are-born-with-intuitive-physics-knowledge.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313589.19/warc/CC-MAIN-20190818022816-20190818044816-00397.warc.gz
|
en
| 0.950876 | 627 | 3.1875 | 3 |
A Tale of Two Cities: Globalization on the Border
This paper will describe the impact that the North American Free Trade Agreement (NAFTA) has had on the people and communities who live on the border between the United States and México, primarily Juárez, Chihuahua, México and El Paso, Texas, USA. Specifically, I will discuss how the construct and policies of globalization, the conditions brought forth by NAFTA, and the de-industrialization of El Paso Texas along with the increased industrialization of Juárez México have impacted the economic, employment, and sociocultural conditions of this particular border area. Within this discussion, I will illustrate how citizens from the US and México have joined forces to fight the injustices inherent in the consequences brought forth by NAFTA. These various citizen protests and grassroots organizations have tried to transcend diverse issues, such as language, social class, gender, religion, geopolitical boundaries, and ethnicity, in order to work in harmony to improve conditions on this border. This discussion will have an emphasis on how these efforts have effected change and are empowering the people who live on the border.
||United States, Mexico, North American Free Trade Agreement, Grassroots Organizations, Social Justice, Globalization, Diversity
International Journal of Diversity in Organizations, Communities and Nations, Volume 11, Issue 4, pp.85-98.
Article: Print (Spiral Bound).
Article: Electronic (PDF File; 781.067KB).
Assistant Professor, Department of Educational Psychology and Special Services, The University of Texas at El Paso, El Paso, Texas, USA
Melinda Haley, received her doctorate in counseling psychology from New Mexico State University in Las Cruces, New Mexico and is currently an Assistant Professor at the University of Texas, El Paso. She has written numerous book chapters, journal articles, and multimedia presentations on diverse topics related to counseling, psychology, and social justice. She has extensive applied counseling experience working with adults, adolescents, children, inmates, HIV/AIDS patients, domestic violence offenders, and culturally diverse populations in the areas of assessment, diagnosis, treatment planning, crisis management, and intervention. She is currently working on her licensure as a psychologist in the state of New Mexico through her own private practice. Her research interests also include multicultural issues in teaching and counseling; personality development over the lifespan and personality disorders; the psychology of criminal and serial offenders; jury bias and the American criminal justice system; trauma and posttraumatic stress disorder; and, the psychology behind ethnic cleansing, prejudice, and racism. She was recently invited to present at the American Institute of Higher Education in Nashville Tennessee and at the Oxford Round Table held at the University of Oxford in Oxford England. She has co-written several grants to secure funds to help underserved populations access counseling services.
There are currently no reviews of this product.
Write a Review
|
<urn:uuid:d1de7d70-fb76-44c8-bb21-abf6daeb2bd0>
|
CC-MAIN-2016-18
|
http://ijd.cgpublisher.com/product/pub.29/prod.1084
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860116878.73/warc/CC-MAIN-20160428161516-00141-ip-10-239-7-51.ec2.internal.warc.gz
|
en
| 0.927561 | 591 | 2.625 | 3 |
What is the best way for me to search for articles only written by a specific author?
You can use Scout, the Libraries' search tool, to search for articles and books by a particular author. From the search screen, enter the author's name, select Author, then hit enter or select Search.
This usually works best when you don't place the author's name in quotation marks, since authors' names can be listed in many different ways (William Faulkner; Faulkner, William; William Cuthbert Faulkner; William C. Faulkner, etc.).
You can also use a citation index to find articles written by a particular author. Which citation index to use depends on the subject; for example, Web of Science covers sciences, social sciences, arts, humanities, and international conference proceedings. You can find other indexes by going to the Libraries' databases page and selecting Indexes and Abstracts from the Types menu.
You can also use Google Scholar to search by author. Be sure to access Google Scholar through this link or the library website so the service will recognize you as a UA student: Access to Google Scholar.
|
<urn:uuid:94fa7d61-03d8-4f14-b63f-9bff6679bda2>
|
CC-MAIN-2017-17
|
http://ask.lib.ua.edu/a.php?qid=1680
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119356.19/warc/CC-MAIN-20170423031159-00465-ip-10-145-167-34.ec2.internal.warc.gz
|
en
| 0.881415 | 234 | 2.921875 | 3 |
Headache group assignment
The goal of this assignment is to learn to assess the causes of and treatment methods for headache. Another goal is to learn what things you should know about your medicine so that you can use it correctly and how to find the information on the package leaflet. Recommended for 11–16-year-olds.
Progress of the assignment
Consider what could cause a headache, for example:
- Do I have poor posture when I work?
- Has something unusual happened in my life?
- Have I eaten healthily?
- Have I drunk enough water?
- Have I been outdoors enough?
- Have I stayed up late?
- Have I slept well?
- Have I been watching television or a computer monitor for a long time?
Liisa's headache does not go away even if she eats and goes outdoors for a while. She calls her mother, who is at work, and they decide together that she needs to take a headache medicine.
What must Liisa check about the medicine before taking it? The pupils find a suitable painkiller for a headache and important information related to its use from the attached sample package leaflets. Discuss this information together.
Information that Liisa must check:
- Is the medicine suitable for a headache?
- Are there any reasons why I should not use the medicine?
- Is the medicine suitable for a child of my age?
- How much medicine should I take?
- How many times a day should I take the medicine?
- How do I take the medicine?
Discuss when you should go to the doctor's office due to a headache:
- If the headache continues for a long time or occurs repeatedly
- Headache caused by problems with your bite (go to the dentist)
- Headache caused by worsening eyesight (go to the eye doctor).
If other symptoms are connected to the headache:
- consciousness disorders
- neck stiffness
- vision and hearing or balance disorders.
If symptoms suggesting a migraine are connected to the headache:
- nausea and vomiting
- light sensitivity
- headache can also begin at night
- exertion makes the headache worse.
|
<urn:uuid:1d63704e-2c7f-43b6-b53d-89ad5ece3cb3>
|
CC-MAIN-2019-13
|
https://www.laakekasvatus.fi/web/en/educational-material/13-16-year-olds/assignment-ideas/headache-group-assignment
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202506.45/warc/CC-MAIN-20190321072128-20190321094128-00192.warc.gz
|
en
| 0.934038 | 445 | 3.34375 | 3 |
Safety Techniques 1
24 MONTHS -6 YEARS OLD
THIS IS A BEGINNING CLASS IS FOR CHILDREN WHO CAN NOT SWIM BY THEMSELVES. THIS CLASS THE CHILDREN MUST BE AT LEAST 24 MONTHS OLD.
Teaching children how to swim based on games, songs and play is an amazing and joyful way to share our love of the water with your family. The skills that will be worked on during this class are:
- Toys in Basket- putting face in water and swimming from the instructor to the wall, wall back to instructor
- Kicking- freestyle or up and down straight leg kicks
- Monkey- holding onto the wall and moving around the pool
- Sitting Humpty Dumpty- sitting on side of pool, jumping in, turning around and going back to the wall
- ABC’s- floating on back with assistance
- Duck Song- swimming to a raft in the middle of the pool, climbing on it by him/herself and then jumping back off of it and swimming to the wall by themselves.
*Please note that some children may require 2-3 sessions of lessons before being able to complete all of the skills by themselves.
|
<urn:uuid:4a8e1fdc-240a-4777-8827-3cebcdf19ab4>
|
CC-MAIN-2019-22
|
http://lane4swimschool.com/programs-lessons/semi-private/safety-techniques/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257660.45/warc/CC-MAIN-20190524144504-20190524170504-00035.warc.gz
|
en
| 0.940511 | 256 | 3.03125 | 3 |
According to a survey done by the U.S. Electric Power Research Institute (EPRI) owners who load their entire iPad tablet every two days will spend only $ 1.36, about the price of a coffee at the bar, the electricity needed for each years to power the device,
The analysis shows that each model of iPad consumes less than 12 kWh of electricity in the course of a year, on the basis of a full charge every two days. To get a better idea just to make the comparison with a 42-inch plasma television that consumes 358 kWh of electricity per year. EPRI has conducted the analysis in its laboratories in Knoxville, Tennessee, and of course the costs vary depending on the area where the consumer and the price of electricity in his home region.
The evaluation was conducted to determine the load requirements – the amount of energy needed to operate the devices – the increasingly popular iPad. According to Apple, in fact, all over the world have purchased 67 million iPad devices.
EPRI’s calculations show that the average energy used by all iPads in the market is about 590 gigawatt hours (GWh). In a scenario where the number of iPads were to triple over the next two years, the energy required would be almost the equivalent of two power plants of 250 megawatts (MW) operating at a utilization rate of 50 percent. A quadrupling of sales in two years would need the energy generated by three 250-MW power plants.
“As information technology continues to change quickly see important implications for the consumption of energy,” said Mark McGranaghan, vice president of power delivery and use of EPRI Power Delivery and Utilization. “These findings raise important questions about how the transition from dependency desktop aa mobile handheld devices will change the consumption of energy and electricity requirements for the information age. Less than a penny per recharge these results bring a new meaning to the motto, ‘A penny for your thoughts.’ “
McGranaghan also stressed that the changes in battery technology and the characteristics of the technology will affect energy demand. “Our measurements show that the new iPads consume about 65 percent more per year of electricity. What remains to be seen is how to better batteries and better features will affect the overall energy consumption by consumers as a whole. “
The analysis shows that the EPRI iPhone 3G consumes 2.2 kWh of electric energy every year, which translates into a power cost of $ 0.25 each year.
Other products that have been included in the analysis were the laptops that consume 72.3 kWh of electricity annually at a cost $ 8.31, and 60W CFL bulbs, which consume about 14 kWh of electricity at a cost of $ 1.61 a year.
|
<urn:uuid:5bf9a2b6-ab08-4bb9-8d29-392007bd7203>
|
CC-MAIN-2020-16
|
https://www.seekyt.com/a-coffee-to-recharge-your-ipad/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497042.33/warc/CC-MAIN-20200330120036-20200330150036-00130.warc.gz
|
en
| 0.95416 | 567 | 2.71875 | 3 |
Each month we define and discuss a word of character development and life skill with all of our students.
This month the word is Loyalty and will be defined this way.
Young students: Loyalty means: “I am true to my friends, family and school”
Older students: Loyalty means: Faithful and committed to a person, place, group or cause.
Here are the worksheets for our students:
If you would like to see how we will talk about this subject with our students please follow our discussions here during the month of February or come in and TRY A CLASS.
|
<urn:uuid:dfd4d2d3-f56e-4eb9-b9c5-e4b5adc3f6a0>
|
CC-MAIN-2021-10
|
https://www.balancedlifeskills.com/2012/02/05/life-skills-loyalty-the-definition/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369721.76/warc/CC-MAIN-20210305030131-20210305060131-00449.warc.gz
|
en
| 0.945898 | 127 | 3.234375 | 3 |
Harry Truman and Civil Rights
Moral Courage and Political Risks
Former President Harry Truman as a civil rights advocate because it was the right—not politically expedient—position for America after World War II. He initially supported civil rights because he was repulsed by the treatment received by the 780,000 returning African-American World War I veterans. Former Captain Truman was appalled as “victorious veterans of color…often returned home to be greeted by cowardly men in white sheets.” This is the compelling argument presented by the author, a communications policy attorney and a member of commissions created by Presidents Nixon, Ford, Reagan, and Bush.
During Truman’s presidency there was no groundswell for federally supported civil rights—a poll once revealed an 82% disapproval rate. He realized that civil rights legislation was doomed in Congress, whether the majority was Democrat or Republican, because a stagnant, racist bloc of states’-rights Republicans and Southern Democrats controlled the legislative branch. Truman wisely relied on executive orders and the Supreme Court, presided over by Chief Justice Fred Vinson, to promote the civil rights that Congress wouldn’t. The president delivered impassioned speeches in Harlem, at the Lincoln Memorial, and at Howard University to increase public support for his ten- point civil rights program.
Truman first appointed a multiracial committee in 1946 to recommend legislation. The committee’s report, To Secure These Rights, jolted the nation with its reports of lynching and of voting and employment opportunities denied to African-Americans. Two years later, the president issued Executive Orders 9980 and 9981, which created new careers for African-Americans by desegregating the federal work force and the armed forces. These landmark actions were matched by important decisions of the Vinson Court, ending restrictive real estate covenants, eliminating segregation in interstate travel, and stopping segregation in state-supported higher education. These rulings established the precedent for the Warren Court to strike down school segregation in Brown v. Board of Education in 1954. The sweeping civil rights legislation of the 1960s was inspired by Truman’s proposals, made sixteen years before the 1964 Civil Rights Act.
Mordecai Johnson, the distinguished president of Howard University, and Carl Rowan, the noted journalist who covered the civil rights movement for more than fifty years, were only two of many African-American leaders who lauded “Mr. Civil Rights” as the most progressive president since Lincoln. Harry Truman—the lifelong civil rights activist—cared for and was admired by not only the common citizens but also the forgotten ones.
Disclosure: This article is not an endorsement, but a review. The author provided free copies of his/her book to have his/her book reviewed by a professional reviewer. No fee was paid by the author for this review. Foreword Reviews only recommends books that we love. Foreword Magazine, Inc. is disclosing this in accordance with the Federal Trade Commission’s 16 CFR, Part 255.
|
<urn:uuid:5a56d16b-2cf8-4d41-911a-a54de4d8555d>
|
CC-MAIN-2016-44
|
https://www.forewordreviews.com/reviews/harry-truman-and-civil-rights/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725470.56/warc/CC-MAIN-20161020183845-00022-ip-10-171-6-4.ec2.internal.warc.gz
|
en
| 0.958063 | 613 | 3.90625 | 4 |
Outstanding, Preschool, Al Yankovic, Poetry, Humor, Picture Book
What do you want to be when you grow up? It’s a question commonly asked to students in school and Billy has lots of ideas of what he wants to be. From a gorilla masseuse to a professional pickle inspector to a teacher. What will he be when he grows up? Only Billy knows what he will say, but thankfully, he doesn’t have to know today! The illustrations in When I Grow Up will make readers feel as if they are spending a day in a child’s imagination! The illustrator doesn’t leave the reality of childhood messes and mud out of his pictures. Readers could easily spend a few minutes on each page, just enjoying the pictures. The pictures and the text do not exactly match up. but the illustrations add childlike elements to the impressively robust text of the book.
BYU ScholarsArchive Citation
"When I Grow Up,"
Children's Book and Media Review: Vol. 38
, Article 34.
Available at: https://scholarsarchive.byu.edu/cbmr/vol38/iss4/34
|
<urn:uuid:5a92afb0-ba6c-4464-a69f-001e607161c8>
|
CC-MAIN-2021-04
|
https://scholarsarchive.byu.edu/cbmr/vol38/iss4/34/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703544403.51/warc/CC-MAIN-20210124013637-20210124043637-00794.warc.gz
|
en
| 0.93099 | 248 | 2.828125 | 3 |
Magnitude 7.2 earthquake in Eastern Turkey
23 October 2011
Oppdatert: 24.10.2011 (Først publisert: 23.10.2011)The earthquake of October 23, 2011 (10:41 UTC) occurred in Eastern Turkey approximately 20 km north of the city of Van with almost 350 000 inhabitants situated along the eastern side of the largest lake in Turkey with the same name. The earthquake had a magnitude of 7.2 (USGS), which has a significant destruction potential. Although the first estimate of casualties is low, this number is expected to increase based on the fact that the same area was destroyed by an eartquake in November 24, 1976 with a magnitude of 7.5 (KOERI) which caused 3840 casualties and 9232 building collapse. There were two other destructive earthquakes in the region in April 2, 1647 and May 30, 1881 (KOERI).
The earthquake occurred on a low-angle thrust fault dipping gently towards north, which is one of the several similar structures in this region. These thrust-faulting events with reverse focal mechanisms are the result of N-S convergence between the Arabian plate in the south and the Anatolian microplate in the north. Currently a number of aftershocks are being registered (more that 88 aftershocks were recorded within the first hours).
Turkey is prone to large earthquakes along the two main geological structures that run across the country, namely the North Anatolian and East Anatolian fault systems which merge in a triple junction to the west of the Lake Van, in the Karliova area. These structures produce mainly strike-slip faulting and are therefore different in their deformational style with respect to the earthquake of October 23, 2011, which had a thrust mechanism.
|
<urn:uuid:996cde12-2b31-41d0-9c10-295ef3349592>
|
CC-MAIN-2023-40
|
https://www.uib.no/fg/geofysikk/58201/magnitude-72-earthquake-eastern-turkey
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.96/warc/CC-MAIN-20230924223409-20230925013409-00693.warc.gz
|
en
| 0.972414 | 374 | 2.984375 | 3 |
Living a life in accordance with the Noble Eightfold Path is itself a form of worship. There is no God in Buddhism and Buddhists do not worship Buddha himself as a divine being. The Buddhist community is called the Sangha. The Sangha can refer to a monastic community (Monks living together) or to the wider Buddhist Community.
The Five Precepts
The Five Precepts are guidelines for ethical and moral behaviour so that the Sangha (community) can work well together. They are not strict but are instead suggestions for suitable behaviour. Buddhists should follow these as they help reduce suffering and harm to themselves and others. They outline behaviours to avoid or abstain from.
- To Abstain from harming living things
- To Abstain from taking the not-given.
- To Abstain from sexual misconduct.
- To Abstain from false speech.
- To Abstain from taking intoxicants which cloud the mind.
Buddhists should also try to practice the opposite of the precepts too. Meaning as well as avoiding harming living things they should also be helping living things. When abstaining from taking the not given they will also try to be generous.
The Five Precepts help a Buddhists on the path to enlightenment as they avoid behaviours that cause suffering to others and to themselves. It helps them develop good kamma and overcome the Three Poisons which will bring them closer to escaping from Samsara.
The Five Precepts in the Monastic Community
Some monastic communities use the precepts as the basis for their own monastic laws. In some monastic communities is taken very seriously and breaking one of these laws could mean that person may be permanently exclusion from the Sangha.
The Patimokha (the Tibetan monastix discipline code) has four codes of conduct called the parajikas.
- No voluntary sexual acts between a bhikku (monk) and a living being including kissing, holding hands and inciting a sexual response.
- No stealing anything worth more than 1/24th Ounce of Gold decided by local law.
- No intentionally bringing about the death of another human being, from the embryonic stage. This includes arranging their death, inciting their death or encouraging their death by describing the advantages of their death.
- No lying about your status and claiming you have achieved a higher human state e.g. Arahant (someone who has attained Nibbana)
If a bhikkhu (monk) intends to break any of them they may not become a monk again. You may be able to draw similarities between this code of conduct and the first four precepts.
We will be studying each of the 5 precepts in more detail each week and we will add a post up about each precept as we cover them.
The Three Jewels
The Three Jewels are 3 common features of all branches of Buddhism. The three Jewels are The Buddha, The Dharma and The Sangha. They each have their own colour and significance.
The Buddha – The yellow jewel at the top represents Buddha and the colour of his robes. It reminds Buddhist that Buddha was a man who worked hard to achieve enlightenment. His actions should be copied and respected and his life and teachings should be followed in order to achieve enlightenment.
The Dharma is the practice of Buddhism, the moral code as set out in the Dharma (teachings). It is represented by a blue jewel that symbolises the vast ocean like freedom of the Dharma. Such things as the Noble Eightfold Path reveal how a buddhist shoudl live their life so they are succesful on the path to enlightenment and overcome the Three Root Poisons. The Five Precepts are guides for ethical conduct.
The Sangha is the thrid jewel, represented by the red jewel. Sangha is the community of Buddhists from all over the world. Sangha includes everyone who has made a pledge to follow the teachings of the Buddha by trying to act in an ethical way that reduces suffering and combats the Three Root Poisons. The Sangha can also refer to the Monastic community.
|
<urn:uuid:cbb283a1-fba9-44bc-b475-70dfc28856e2>
|
CC-MAIN-2022-05
|
https://learningrmps.com/2018/06/10/introduction-to-the-five-precepts-and-three-jewels/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304954.18/warc/CC-MAIN-20220126131707-20220126161707-00118.warc.gz
|
en
| 0.952092 | 861 | 3.109375 | 3 |
US court blocks pesticide use over concerns about bees
A US federal appeals court has blocked the use of a pesticide over concerns about its effect on honey bees.
The 9th US circuit court of appeals ruled that the US Environmental Protection Agency (EPA) did not adequately study the pesticide sulfoxaflor before approving its use in 2013 on a wide variety of crops, including citrus and cotton.
The 9th circuit said initial studies showed sulfloxalor was highly toxic to honey bees, and the EPA was required to conduct further tests.
The 9th Circuit ruling said sulfloxalor is part of a group of insecticides known as neonicotinoids. Neonicotinoids are suspected of being among several factors that have contributed to the collapse of honey bee colonies throughout the US.
|
<urn:uuid:e4fde1c6-1585-4a17-b2d2-f0ef7ec969b8>
|
CC-MAIN-2017-26
|
http://www.belfasttelegraph.co.uk/news/world-news/us-court-blocks-pesticide-use-over-concerns-about-bees-31518747.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321458.47/warc/CC-MAIN-20170627152510-20170627172510-00564.warc.gz
|
en
| 0.97125 | 161 | 2.546875 | 3 |
Stimulating Intellectual Curiosity
Global #gtchat welcomed many new participants to this chat! Questions discussed included what was intellectual curiosity, how it could be nurtured, the downside and the personal benefits. A full transcript may be found at Storify.
Intellectual curiosity may be defined as wanting to know something just for the sake of knowing it. It was suggested that parents and educators can model intellectual curiosity, build relationships that foster it and ask tough questions that generate curiosity. Benefits of intellectual curiosity include becoming a life-long learner and enjoying a more holistic education.
“How to Ignite Intellectual Curiosity in Students” from @edutopia
“Intellectual Curiosity” from J. Sklare
“How to Stimulate Curiosity” from @anniemurphypaul
Cybraryman’s Leadership Page
Posted on July 16, 2013, in Education, Psychology and tagged academic performance, Annie Murphy Paul, curiosity, deep thinking, gifted, gifted and talented, Goldblatt, gtchat, intellectual, stimulating, Success, TAGT, The Hungry Mind, Twitter. Bookmark the permalink. Leave a comment.
|
<urn:uuid:94b7d90b-178f-4523-ab65-8a7c6af29a90>
|
CC-MAIN-2017-39
|
https://globalgtchatpoweredbytagt.wordpress.com/2013/07/16/stimulating-intellectual-curiosity/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818691476.47/warc/CC-MAIN-20170925111643-20170925131643-00708.warc.gz
|
en
| 0.90127 | 240 | 3.421875 | 3 |
Denver, CO 80214
Elementary, GED prep, and Special Ed. Tutoring with a smile!
...It is important for young students to learn to ask questions, form a theory, observe, gather and record data to prove or disprove a hypothesis. The same method used in writing research papers in the upper grades. When your student gets personally involved in...
| 10+ other subjects
|
<urn:uuid:44d7078f-8deb-4ea9-a0d6-4cdad92690cc>
|
CC-MAIN-2014-41
|
http://www.wyzant.com/Washington_Park_West_Denver_CO_algebra_1_tutors.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657124356.76/warc/CC-MAIN-20140914011204-00305-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
en
| 0.834769 | 82 | 2.84375 | 3 |
Body builders generally consume large amounts of protein assuming it is the key to bigger, stronger muscles. However, metabolism study experts from the University of Texas Medical Branch (UTMB) at Galveston are believed to have provided evidence that strongly contradicts this belief. Furthermore, they suggested realistic ways to both improve normal American eating patterns and decrease muscle loss in the elderly.
For the purpose of the study, the experts were noted to measure muscle synthesis rates in volunteers, who consumed different amounts of lean beef. They found that only the first 30 grams i.e. over one ounce of dietary protein consumed in a meal actually seems to have produced muscle. They also found that moderate amount of protein per meal may perhaps produce the same results as consuming down protein shakes.
Senior author of the study, Douglas Paddon-Jones, an associate professor stated that, “We knew from previous work that consuming 30 grams of protein – or the equivalent of approximately 4 ounces of chicken, fish, dairy, soy, or, in this case, lean beef – increased the rate of muscle protein synthesis by 50 percent in young and older adults. We asked if 4 ounces of beef gives you a 50 percent increase, would 12 ounces, containing 90 grams of protein, give you a further increase?”
The UTMB experts further were believed to have examined this possibility by feeding nearly 17 young and about 17 elderly volunteers. They appear to have given them identical 4- or 12-ounce portions of lean beef. With the help of blood samples and thigh muscle biopsies, the experts appear to have then determined the subjects’ muscle protein synthesis rates after every meal.
“In young and old adults, we saw that 12 ounces gave exactly the same increase in muscle protein synthesis as 4 ounces. This suggests that at around 30 grams of protein per meal, maybe a little less, muscle protein synthesis hits an upper ceiling. I think this has a lot of application for how we design meals and make menu recommendations for both young and older adults,” elucidates Paddon-Jones.
He further said that, “Usually, we eat very little protein at breakfast, eat a bit more at lunch and then consume a large amount at night. When was the last time you had just 4 ounces of anything during dinner at a restaurant? So we’re not taking enough protein on board for efficient muscle-building during the day, and at night we’re taking in more than we can use. Most of the excess is oxidized and could end up as glucose or fat.”
Paddon-Jones claimed that a more effective pattern of protein consumption may possibly differ considerably from most Americans’ daily eating habits. A more efficient eating strategy for making muscle and controlling total caloric intake could perhaps be done by shifting some of extra protein consumed at dinner to lunch and breakfast.
He was of the opinion that one doesn’t require to eat huge amounts of protein in order to maximize muscle synthesis. One just has to be a little more clever with how they allot it. For instance, for breakfast consider including additional high quality proteins like include an egg, a glass of milk, yogurt or add a handful of nuts in order to obtain a 30 grams of protein suggest experts.
Also, one may perhaps do something similar to get to 30 grams for lunch, and then eat a smaller amount of protein for dinner. Supposedly carrying out this over the course of the day will allow one to spend much more time creating muscle protein.
The findings of the study have been published in the Journal of the American Dietician Association.
|
<urn:uuid:ca107f5b-539a-4d6e-8cec-627fcea05ed2>
|
CC-MAIN-2023-23
|
https://www.healthjockey.com/2009/10/30/study-moderate-amounts-of-protein-per-meal-is-the-key-to-bigger-stronger-muscles/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00578.warc.gz
|
en
| 0.973475 | 730 | 2.671875 | 3 |
FOR IMMEDIATE RELEASE
February 6, 2008
National Archives Publishes New Guide to Records of the American West
Washington, D.C. . .
The National Archives announces publication of the sixth and final volume in its distinguished series of guides titled The Trans-Mississippi West, 1804-1912: A Guide to Federal Records for the Territorial Period compiled by staff archivist Robert M. Kvasnicka. Winner of the Society of American Archivists C.F.W. Coker Prize for Innovative Archival Description and the Thomas Jefferson Prize for Finding Aids awarded by the Society for History in the Federal Government, the collection describes records in the National Archives of the United States that are associated with the American West.
Published in two volumes, Part IV: A Guide to Records of the Department of the Interior for the Territorial Period , Section 3 highlights records of the General Land Office, the Federal agency responsible from 1812 to 1946 for supervising the surveying, management, and disposition of the public domain the execution of all laws relating to public lands.
The textual, cartographic, and photographic documents described in this essential guide show the manner in which the General Land Office accomplished its mission and the impact of Federal Government policies on the people and lands of the contiguous states between the Mississippi River and the Pacific Ocean.
Included are descriptions of records pertaining to land-grant railroads, Indian and forest reserves, mining claims, and private land claims in areas acquired by the Louisiana Purchase and the Mexican War, as well as the land entry papers documenting the thousands of individual transactions transferring the public lands to private ownership. These records are an invaluable source of information for environmental and family historians as well as the historians of our Nations westward expansion.
Other titles available in The Trans-Mississippi West series are:
- Part I: A Guide to Records of the Department of State for the Territorial Period
- Part II: A Guide to Records of the Department of Justice for the Territorial Period
- Part III: A Guide to Records of the Department of Agriculture for the Territorial
- PeriodPart IV: A Guide to Records of the Department of the Interior for the Territorial Period Section 1, Records of the Offices of the Secretary of the Interior and the Commissioner of Railroads
- Part IV: A Guide to Records of the Department of the Interior for the Territorial Period Section 2, Records of Select Agencies
The 1,130-page two-volume [Part IV] set is available in softcover for $49 (plus shipping and handling) from the National Archives Trust Fund, 1-800-234-8861.
About the National Archives
The National Archives and Records Administration, an independent federal agency, is the nation's record keeper. Founded in 1934, its mission is unique -to serve American democracy by safeguarding and preserving the records of our Government, ensuring that the people can discover, use, and learn from this documentary heritage. We ensure continuing access to the essential documentation of the rights of American citizens and the actions of their government. We support democracy, promote civic education, and facilitate historical understanding of our national experience.
The National Archives meets a wide range of information needs, among them helping people to trace their families' history, making it possible for veterans to prove their entitlement to medical and other benefits, and preserving original White House records. The National Archives carries out its mission through a nationwide network of archives, records centers, and Presidential Libraries, and on the Internet at www.archives.gov .
|
<urn:uuid:3fbbd5aa-7f2f-40b2-865c-cfd340c8ba0c>
|
CC-MAIN-2017-09
|
http://blog.dearmyrtle.com/2008/02/nara-guides-to-american-west.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171004.85/warc/CC-MAIN-20170219104611-00048-ip-10-171-10-108.ec2.internal.warc.gz
|
en
| 0.902001 | 726 | 2.5625 | 3 |
Review of web service security
In this article, we will provide an overview of Web Service Security. We will look at the the basic security mechanims including transport level security, basic and mutual authentication, SSL and many of features available for ensuring the integrity and privacy of your communications. This is part of a larger series of articles to help you prepare for the web service developer exam. You can review the last article, “Tutorial:Review of Building Web Services for the Web Service Developer Exam” if needed.
Introduction to Web Service Security
The advent of web services reveals new issues that previously were inexistent in closed environments. The new levels of openness, data exchange and interoperability brings new challenges to securing data as well as identities:
It is now possible to access numerous corporate applications as well as their interfaces over the public internet. Most of these are available over port 80, which is generally accepted as one of the main hole in all firewalls used for HTTP traffic flows. Applications providing front ends for critical data are increasingly being exposed through HTTP and accessible to anyone in the outside world.
Data is wrapped in SOAP envelopes provides a way to discern the structure and meaning of data being sent over the wire. Since the sending and receiving parties systems are implemented on different platforms with different security libraries often from different vendors. This leads to a need for a set of standardized, platform-independent security solutions.
XML is extremely verbose. Wrapping data in XML can increase the size of the data that needs to be encrypted tremendously. This can get expensive due to the cost associated with encryption
Web services enable spontaneous supply-chain communities or trading communities via dynamic discovery. These types of complex interactions involve SOAP message traversing multiple intermediaries. Some of these intermediaries might not be part of pre-existing business arrangements as well as being built on a different infrastructure. How does one manage encryption keys in such an environment?
These are the types of challenges that Web services bring. In a Web service world, there are security mechanisms that protect the confidentiality and integrity of information in transit. Data and messages are exchanged between a client and the Web service and the information is stored in a Web host. The protection of the information goes beyond simple two-way client-server interactions extending to more complex interactions involving business processes implemented through multiple Web services. Providing end-to-end security through distributed and heterogeneous security mechanisms requires the development of standards for Web services security that has the objective of making the security functions interoperable across different implementations. The key vendors in
- Web service space (including IBM and Microsoft) have developed a comprehensive framework of Web service security in accordance with the following criteria:
- Web services security standards must to be independent of specific underlying technologies.
- Web services security standards need to be composable.
- Web services standards must be organized in layers, so that standards at the upper level can use and extend standards at a lower level.
- Web services standards have to be extensible in order to deal with new requirements and technologies.
We look in detail at WS-Security explaining the basic security mechanisms that these standards address moving up from the communication layer up through to the application layer. The figure below shows the Web Service security standards framework:
The Web Services Security Standards Framework
The Web Services Security (WSS) framework encompasses different specifications, each of which address a specific aspect of security. According to the framework the different aspects have the following purpose:
- WS-Security - provides a message security model and specification of the mechanisms to attach signature and encryption headers to SOAP messages.
- WS-Policy - provides a means to describe the security policies. This includes the required security tokens, supported encryption algorithms, as well as the general policies adopted by a Web service. It also provides the mechanisms by which a trusted SOAP message exchanges can be built.
- WS-Trust - provides a means to define the model through the establishment of both direct and brokered trust relationships through the creation of security token issuance services. These relationships includes third parties and intermediaries.
- WSPrivacy - defines a model for embedding a privacy language into WS-Policy and associating privacy claims with a message with WS-Security.
Built on top of these standards are:
- WS-SecureConversation - provides a means of extending the single message security provided by WS-Security to a conversations consisting of multiple message exchanges. WS-Federation - provides a means to describe how to manage and broker trust relationships in a heterogeneous federated environment.
- WS-Authorization - is used to support the specification of authorization policies and for managing authorization data.
Note that the WS-Authorization and WSPrivacy specifications were not developed in the same manner as other of the roadmap. WS-Authorization is a replacement for eXtensible Access Control Markup Language (XACML). And WS-Privacy was addressed by manufacturer proposals such as the IBM Enterprise Privacy Authorization Language (EPAL).
Low Level security standards
Secure Socket Layer (SSL) and Transport Layer Security (TLS) is a protocol layer located between a reliable connection-oriented network layer protocol (i.e. TCP) and the application protocol layer (i.e. HTTP). This is shown in the figure below:
We use SSL/TLS to provide point-to-point secure sessions through the use of server authentication to the client, optional client authentication to the server, data message authentication, data confidentiality, and data integrity. For SSL, TLS includes an optional session caching scheme in order to minimize the number of connections that must be established. This optimization reduces the computational load of cryptographic operations, especially those using public keys. SSL/TLS provides for the following:
- confidentiality, through the use of symmetric cryptography for data encryption such as DES and RC4.
- data integrity through the use of a Message Authentication Code (MAC) generated by a secure hash function (MD5);
- authentication through the use of certificates and public keys.
- SSL/TLS provides fairly secure for point-to-point communications. But it alone cannot provide the end-to-end communication protection that is required for Web services. In fact, setting a message transmitted by a client such as a browser or an application could be processed or routed by amy number of intermediary applications or services before reaching its final recipient. SSL/TLS only protects the message contents while in transit between pairwise endpoints. The message,once processed by SSL/TLS at a receiving end is delivered decrypted to the application layer.
This is illustrated in the figure below:
The intermediary application or service might inadvertently or maliciously examine or possibly modify the message before transmitting it on to the next recipient. Finally the other key inadequacy of SSL/TLS in that it doesn’t allow one to selectively encrypt parts of the payload to be transmitted.
XML Data Security
As XML is the language of choice for representing data exchanged between Web services, securing XML data by protecting their integrity and confidentiality as well as their authenticity is a key requirement that needs to be fulfilled. You can achieve Integrity and confidentiality while exchanging data between Web service through the use of encryption mechanisms. Verifying the authenticity of the data is achieved by the use of digital signatures. The standards in place to achieve this are XML encryption and XML Signature. They specify how to represent and convey encrypted data as well as providing a digital signature for an XML document in a standard way.
The XML Encryption specification is a W3C Recommendation as well as the cornerstone of the Web services Security Framework defining a standard model for encrypting both binary and textual data. It also serves as the means for communicating the information needed by recipients to decrypt the contents of received messages. SSL/TLS provides confidentiality at the transport layer and XML Encryption provides confidentiality at the application layer. This assures end-to-end confidentiality of messages traversing multiple Web services. The figure below shows how XML Encryption is used:
The XML Encryption specification describes how to use XML to represent a digitally encrypted Web resource including XML data. It separates the encryption information from the encrypted data, specifies how to represent information about the encryption key and algorithm as well as supporting referencing mechanisms for addressing encryption information from encrypted data sections and vice-versa.
Encryption doesn’t guarantee by itself the integrity of the encrypted data. When integrity is required, the signatures represented by the XML Signature standard are required to be used. The combination of digital signatures and encryption over a common XML element can introduce security vulnerabilities. More precisely encrypting digitally signed data may leave the messages vulnerable to plaintext guessing attacks if the digital signature in clear. These types of vulnerabilities can be mitigated by using secure hashes and the nonces in the text being processed. Also denial of service attacks are possible since the recursive processing of XML Encryption. For example, EncryptedKey A requires EncryptedKey B to be decrypted, which itself requires EncryptedKey A. An attacker might also submit an EncryptedData element for decryption that references network resources that are very large or continually redirected. Consequently, XML Encryption implementations should be able to restrict arbitrary recursion and the total amount of processing and networking resources a request can consume.
XML Signature is a jointly produced specification produced by W3C and IETF. It specifies how to represent a digital signature as an XML element as well as how to create and verify this XML element. It applies to both XML and non-XML data similar to XML encryption. You can sign an entire XML document, any number of XML elements, or files containing any type of digital data items. XML Signature allows you to sign multiple data with a single signature. Although it was already possible to digitally sign an XML document, using the PKCS#7 Signature, you couldn’t use PKCS#7 to selectively sign parts of an XML document, or to represent the signature in a standardized XML format. With XML-Signature, you can place the signature using different “packaging” strategies such as enveloping signature, enveloped signature, and detached signature. An enveloping XML signature is one where the signed data is contained within the XML signature structure itself. An enveloped XML signature is one contained within the signed document itself. And a detached signature is separate from the signed entity. The signed entity is referenced via a URI and can be, in principle, any digital content. If the URI of a detached signature cannot be dereferenced, then the signature breaks. Therefore you could use a detached signature in order to guarantee the integrity of online resources.
An XML signature can be used alone to assure data integrity. When it is linked to the signer’s identity, it then provides for non-repudiation of data content, and possibly the authentication of the signer. The XML Signature standard does not address the way in which encryption keys are associated with individuals or institutions, nor with the meaning of the data being referenced and signed. So you cannot use it by itself to address all application security or trust concerns especially those relating to using signed XML as the basis of human-to-human communication and agreement.
Security Assertions Markup Language (SAML)
The Security Assertion Markup Language (SAML) which is an OASIS standard specification is a framework for the exchange of security-related information, expressed as assertions, between trusting parties. Security assertions are one basic building block of standards related to the security of SOAP messages, as well as of standards related for security policies, access control, and federated identity management.
In SAML, security information is expressed as assertions about subjects, where a subject is an entity (be it human or computer) having an identity in some security domain. For example, a subject is a person, identified by their email address from a particular Internet DNS domain. This is shown in the figure below:
These assertions can convey various pieces of information about the attributes of subjects, or about authentications previously performed by subjects, or even about authorization decisions concerning access certain resources. SAML supports three kinds of assertions:
- attribute - states that the subject S is associated with a set of attributes Ai with values Bi such as subject James is associated with attribute “University” with value “Syracuse”
- authentication - states that the subject S was authenticated by means M at a certain time. It is normally issued by the party that has successfully authenticated the subject. For example, a SAML authentication assertion could state that “James was originally authenticated using a password mechanism at 201203-13T09:33:27”.
- authorization decision assertions - states the actions that the subject S is entitled to execute on a resource R. For example, a user has been authorized to use a given service.
The listing below provides an example of a SAML assertion:
A single SAML assertion may contain assertion statements about authentication, authorization, and attributes of the subject. Assertions are issued by SAML authorities. There are many types of authorities around. There are authorities for authentication, attributes, or policy decision points. You can also use SAML to make assertions about credentials, but it does not provide mechanisms to check or revoke credentials. Therefore the party accepting a SAML assertion as true is trusting the issuing SAML authority. A service provider may need also to hold detailed information about the type and strength of authentication used by an identity provider when it authenticates the user. SAML uses the authentication context to carry this information. This information is conveyed in or referenced by an assertion’s authentication statement. SAML’s framework is designed to support a number of real-world business scenarios. These range from scenarios where the client is a browser to complex ones using multiple Web services. The scenarios supported by SAML are the following:
MajorVersion="1" MinorVersion="1" AssertionID="biuEZCGxcGiF4gIkL5PNltwU7duY1az"
- Web single sign-on (SSO) scenario where the user authenticates to one Web site and then is able to access resources at another site. SAML enables Web SSO through the communication of an authentication assertion from the first site to the second one. If the second site is confident of the origin of the assertion, it can decide to allow the user to log in as if he had authenticated directly.
- Attribute-based authorization scenario where one web site communicates identity information about a subject to another Web site in support of some transaction. This is similar to the Web SSO but the identity information required by the receiving Web site may refer to some characteristic of the subject such as the person’s role in a B2B scenario instead of or possibly in addition to information about when and how the subject was authenticated. This uses the attribute-based authorization model if the subject’s particular identity is either not important or should not be shared for reasons of privacy or is insufficient on its own.
- Securing SOAP messages scenario where SAML assertions are used within SOAP messages to transport security and identity information between actors in Web service transactions. The OASIS WS-Security TC’s SAML Token Profile specifies how SAML assertions should be used to implement this scenario. The Liberty Alliance’s Identity Web Service Framework (ID-WSF) also uses SAML assertions as the base security tokens for enabling secure and privacy respecting access to Web services.
SAML also provides a threat model that identifies the assumptions, the scope, and the security techniques that one should adopt for deploying SAML-based solutions. The threat model considers the concerns arising in communications when using the request response protocol, or when SAML is used by a receiving party. The SAML threat model assumes the following:
- Endpoints used in a SAML transaction are uncompromised, but the attacker has complete control over the communications channel.
- A valid participant in an SAML transaction can use the information maliciously in another transaction.
- SAML allows one to make authentication and authorization statements, but it doesn’t specify how authentications are executed or how authorizations are established. The consequence of this is the security of a system that is based on assertions as inputs also depends on the security of the system used to generate these assertions. There is a risk of security compromises taking place from consuming false but validly issued assertions when determining what issuers to trust. This is especially the case where the assertions are used as inputs to authentication or authorization decisions. The trust policies between asserting and relying parties should always be written to specify liability as well as ensuring that the implementation provides an audit trail.
- Once an assertion is issued, the issuer is no longer in control. As such, the issuer has neither control how long the assertion will persist in the consumer’s systems nor does the issuer have control over the parties with whom the consumer share the assertion information. Finally, there is also the issue of a malicious attacker who can see the unencrypted content of assertions in transit.
- SAML protocol is prone to Denial of Service (DOS) attacks. These attacks can be averted by requiring client authentication at a lower level, by requiring signed requests from a client, or by restricting the ability to issue SAML requests to a limited number of known parties.
SOAP Message Security
SOAP messages provide the unit of communication in Web services whose integrity and confidentiality must always be protected. SOAP messages can be expected to be subjected to the following types of attacks:
- Message is modified or read by an attacker.
- Attacker sends to a Web service well-formed messages lacking appropriate security claims to warrant processing.
- Attacker alters a message while preserving the structure and form. When this is sent to the Web service it causes the service to process the request and respond to the client for an incorrect request.
As SOAP messages can traverse multiple applications or intermediaries as well as multiple trust domains between business entities, there is a need to provide end to end protection over multiple hops in order to assure the SOAP message’s integrity and confidentiality while verifying the requester’s identity. One can achieve this by the use of XML encryption and XML signatures, but you will need to standardize the representation of the additional security information within SOAP messages in order that the SOAP processor, can properly manage the security information. This is shown in the figure below:
WS-Security is considered the de facto standard for securing SOAP messages in the Web. WS-Security specifies the necessary extensions to SOAP to allow for the selective encryption or signing of parts of SOAP messages. This includes encrypting different parts of a SOAP message for different recipients. This is done by leveraging the XML Signature standard to protect message integrity as well as the XML Encryption standard in order to protect the messages’ confidentiality. WS-Security applies to a single SOAP message. If you want to secure exchanges composed of multiple SOAP messages, the extensions were defined in the WS-SecureConversation standard that we will look at later.
When you look at a security token, you will discover that it is a collection of declarations or claims made by an entity concerning some its own properties that are relevant for security purposes. WS-Security specification supports multiple security token formats, multiple trust domains, multiple signature formats as well as multiple encryption technologies. The properties that a security token holds are the name, identity, a key, a privilege, and a capability. All of these security-related pieces of information are conveyed via X.509 certificates, Kerberos tickets and authenticators, SIM card’s mobile device security tokens, username, SAML assertions, etc.
A security token can be also signed or certified by a specific third-party authority different from the entity to whom the assertion refers. An example would be a X.509 certificate or a Kerberos ticket. A signed security token is used as a means to authenticate the claim made by the entity. The semantics and token formats used for a signed security token is defined in the associated profile documents. They take the form of SOAP header elements (i.e. wsse, ws security elements) carrying security-related data. These are extensions introduced by WS-Security. The figure below shows the extensions added:
There is a general purpose mechanism specified within WS-Security for referencing and including so-called security tokens within SOAP messages. WS-Security is indifferent to the type of security token used. There are numerous security token formats that have been specified for use in WS-Security such as username/password, SAML assertions, XrML/REL tokens, X.509 certificates as well as Kerberos tickets. Some of these security tokens are not encoded in XML such as X.509 certificates and Kerberos tickets. For these, WSSecurity provides a mechanism for encoding binary security tokens. WS-Security security has the flexibility to accommodate specific purposes and specific security architectures as well as being extensible to handle the profiles or new security tokens.
The integrity of messages within WS-Security is handled by using XML Signature in conjunction with security tokens. This may contain or imply key data. Again, WS-Security is flexible enough to support multiple signatures from potentially multiple parties and can also be extended to support additional signature formats. The signatures can reference a security token. WS-Security will assure the message confidentiality by encrypting the relevant portions of the SOAP message in accordance with XML Encryption standard in conjunction with security tokens. There is similar flexibility in the encryption mechanisms WS-Security is designed to support as it can use additional encryption technologies, processes, and operations by multiple parties. The encryption can also reference a security token.
Despite the flexibility and comprehensiveness of WS-Security, since it only defines a protocol, there is always the risk that the implementation of the protocol is vulnerable to a attack. As such, WS-Security specification provides a non-exhaustive list of security concerns, such as replay attacks, man-in-the middle attacks, token substitution attacks, etc.
Completing a meaningful transaction requires a client and a Web service often to exchange multiple SOAP messages. In this context, it is important to secure multiple SOAP messages. WSSecureConversation is an OASIS standard that allows the two communicating parties to establish and manage a session at the SOAP message level. It’s starting point is extensions to WS-Conversation, based on WS-Security and WS-Trust, where the objective is to provide secure communication across multiple messages via the authentication of multiple messages. These extensions use the establishment and sharing of a security context between the communicating parties and on the derivation of keys from the established security contexts. The security context between the communicating parties is shared for the lifetime of a communication session and is represented by a security context token that conveys a secret or a key. The secret could be used for signing and/or encrypting SOAP messages, but it is recommended in the specification to use of derived keys for signing and encrypting messages associated only with the security context.
SOAP messages within the same message exchange can reference the same security context token. This approach achieves a more efficient exchange of keys or new key information facilitating an increase in the overall performance and security of the subsequent exchanges. The security context needs to be created and shared by the communicating parties before it is used. For this, WS-SecureConversation defines the following three different strategies for establishing a security context between the parties of a secure communication:
- The context initiator requests an Security Token Service (STS) that is defined by WS-Trust, to create a security context token.
- A security context token is created by one of the communicating parties and then propagated within a particular message. In this scenario that parties would already need to have a trust relation in order to share a secret key.
- A security context token is created when required by negotiation between the participants. This scenario is necessary when the message exchange participants must negotiate and agree the contents of the security context token. In most cases this will be a shared secret.
In order to guaranteeing the integrity and confidentiality of the SOAP messages, vendors have agreed the WS-Reliability standard that defines a messaging protocol to manage the reliable delivery of messages between exactly two parties, a source and a destination. The name given for the parties for the reliable delivery of messages is the Reliable Messaging (RM) Source and RM Destination. The delivery guarantee is assured by middleware components implementing the “store & forward” paradigm. This could be Microsoft Message Queue or IBM Messaging and Queuing for example.
WS-Reliability makes no assumption about the implementation of the messaging processor service. So it could be an application, a queuing or logging system, a database, a SOAP node, or just the next handler in the message processing chain. Instead, WS-Reliability addresses the interoperability of heterogeneous reliable messaging middleware. It defines a “wire” protocol. This is the specific message headers and specific message choreographies between the sending application and the receiving application. It also defines the protocol to be used between the application and the reliable messaging middleware. The reliable messaging middleware implements a Quality of Service (QoS) contract between the application and the underlying messaging processor service. This is shown in the figure below:
The Quality of Service (QoS) contract consists of four operations (i.e. Submit, Deliver, Respond, and Notify) and has four basic delivery assurances:
- The AtMostOnce assurance guarantees that messages will be delivered at most once without duplication or an error will be raised at at least one endpoint. If there are messages in a sequence, it is possible that some messages may not be delivered.
- The AtLeastOnce assurance guarantees that every message sent will be delivered or an error will be raised at at least one endpoint. In this case, some messages may be delivered more than once.
- The ExactlyOnce assurance guarantees that every message sent will be delivered without duplication or an error will be raised at at least one endpoint.
- The InOrder assurance guarantees that messages will be delivered in the order in which they were sent. This delivery assurance can be combined with any of the above delivery assurances. There is no assurance given in respect to message duplications or omissions.
Key and Trust Management Standards
Public keys are one of the basic building block for signatures and digital certificates. Public key management is comprised of the creation, safe storage, distribution, use and cancellation of public keys. They can either be created by a software package running on the platform of the customer application and then registered to a Public Key Infrastructure (PKI) Certification Authority (CA) or the customer application can request a CA participating to a PKI infrastructure to issue them.
When a party uses a public key, the party needs to ascertain its validity by verifying that the public key has not expired or has been revoked. One can have public keys that have been issued by different CAs as well as having a given party having more than one public key associated with it. The current PKIs use proprietary toolkits to make the interactions between the client applications and the PKI costly and difficult. Often this forces the client applications to implement signature validation, chain validation and revocation checking by themselves. These operations are very expensive so there is the need to simplify the task of the relying parties when using public keys. It should also be possible to allow different CAs’, or even different PKIs, to interoperate among them. Note that public keys can be represented in XML, and serve as the basis of XML Encryption and XML Signature.
WS-Security defines the basic mechanisms for secure messaging. Any SOAP message protected by WS-Security has three possible issues with regard to security tokens:
- security token format incompatibility
- namespace differences
- the trustworthiness of the security token.
To address these issues, there was the need to define standard extensions to WS-Security in order to provide methods for issuing, renewing, and validating security tokens. As well there was a need to establish and assess the presence of, and broker, trust relationships. These requirements led to the development of the WS-Trust standard.
The WS-Trust Specification is an OASIS standard. It defines extensions to WS-Security providing a framework for requesting and issuing security tokens as well as assessing the presence of trust relationships and brokering trust relationships. In WS-Trust, trust relationships are conveyed via security tokens. In WS-Trust, security tokens are issued by a so-called Security Token Service (STS). The STS issues assertions are based on evidence that it trusts and is directed towards those who trusts the STS. It can be implemented by a Kerberos Key Distribution Center (KDC) or by a public key infrastructure which means that the issuing authority is the STS.
WS-Trust assumes a Web service security model in which:
- A Web service can require that an incoming message proves a set of claims such as name, key, permission, and capability.
- A Web service can indicate its required claims and related information in its policy according to the WS-Policy and WS-PolicyAttachment specifications.
A Web service is equipped with a trust engine that:
- verifies the claims in the token are sufficient to comply with the policy and ensures that the message conforms to the policy.
- verifies the attributes of the claimant are proved by the signatures. In brokered trust models, the signature may not verify the identity of the claimant but only verify the identity of the intermediary who is simply asserting the identity of the claimant.
- verifies the issuers of the security tokens, including all related and issuing security tokens, are trusted to issue the claims they have made. In this case, the trust engine may need to externally verify or send tokens to a STS in order to exchange them for other security tokens that it can use directly in its evaluation.
An STS service provides a series of functions to clients. It handles client’s request for a new security token, or a set of security tokens. The client can optionally specify the type of the requested security token, the desired valid time range of the security token, as well as the scope the security token for which it is required. This could be for the services to which it applies. The STS also handles client requests to renew an already issued security token and to cancel a previously issued security token when it is no longer needed. A STS can also cancel a security token on its own initiative. Finally, an STS handles client’s request to validate a security token. The validation can result in a status, a new token, or both.
Web Services Policy Framework (WS-Policy)
The Web Services Policy Framework (WS-Policy) standard provides an extensible model allowing Web services to describe their policies in a consistent manner. The WS-Policy standard provides a general model, suitable for expressing all types of domain-specific policy models, from transport-level security, to resource usage policy, QoS characteristics, and end-to-end business-process-level policy. The model is based on the concept of policy assertion specifying a behavior (i.e. a requirement or a capability, of a policy subject). The semantics of the assertions is domain specific such as security or transactions. As such WS-Policy has adopted a policy defining domain-specific assertions in separate specifications. They can be public specifications such as WS-SecurityPolicy and WS-PolicyAssertion or they can be by a private entity that owns a particular Web service. The policy assertions based on public specifications are called standard assertions and can be understood by any client. An example of standard domain-specific assertion is confidentiality and integrity requirements for SOAP messages that are defined as protection assertions in the WSSecurityPolicy standard specification. The figure below shows a configuration for typical public facing Web service:
A WS-SecurityPolicy integrity assertion specifies the parts of a SOAP message that must be signed. Note that this assertion can be satisfied by using SOAP Message Security mechanisms such as WS-Security, or by using other mechanisms such as HTTPS. The subject to which the policy applies to is a Message Policy subject (i.e. a SOAP message). The WS-PolicyAttachment standard specifies to which WSDL entity or UDDI entity the policy applies. Policy assertions can be combined in policy alternatives into collection of policy alternatives. This collection would be considered one policy.
WS-Policy adopts a normal form schema that basically expresses a policy as an (exclusive) ORed set of ANDed sets of statements. This is shown in the listing below:
The listing shows the normal form schema of a policy according to WS-Policy. The * indicates zero or more occurrences of an item, while [ ] indicates that the contained items must be treated as a group. An example of a policy adhering to the WS-Policy specification is shown below:
<wsp:Policy ... >
[<wsp:All> [<Assertion ...> ... </Assertion> ]* </wsp:All> ]*
The listing above shows two policy alternatives, each composed by a single policy assertion. One would interpret the policy in the following manner:
<wsp:Policy xml:base=http://acme.com wsu:Id=AcmePolicy>
if the first alternative is selected, only the Kerberos token type is supported; otherwise if the second alternative is selected, only the X.509 token type is supported.
Implementations of Web Services Security Standards
On the Java platform, the Java Web Service Development Platform (WSDP) defined the XWS-Security framework providing security functionalities for JAX-WS applications. This framework supports the following security options:
- XML Digital Signature: An implementation using Apache’s XML-DSig based on the XML Signature specification.
- XML Encryption: The Apache’s XML-Enc implementation based on the XML Encryption specification.
- Username Token Profile and X.509 Certificate Token Profile support, based on the OASIS WSS Username Token Profile 1.0 and the OASIS WSS X.509 Certificate Token Profile 1.0, respectively.
To determine exactly the security stack is on your preferred Java EE 5 application server, you will need to check with your vendor. Note that if you are looking for an open source vendor providing full support for OASIS Web service Security standard, you can look at Project Glassfish.
Above and beyond your success in completing the Web service developer exam, Web service security standards raise a number of interrelated technical and management issues. The technical issues concern specific security threats posed by the Web service security standards themselves, them implementations, addressing security concerns during the Web service life cycle, the degree of interoperability achievable by their adoption and finally the performance overhead incurred when deploying software solutions implementing the standards. The management issues include the tradeoff between the organization interoperability requirements and the organization security requirement, the costs incurred of deploying and using standard compliant features provided on the development and deployment platform, the training required to provide developers and operational management personnel the skills required to properly learn and use standardized security functions in an effective way. How you handle these issues within your organization will determine how secure your web services are to attack.
|
<urn:uuid:73105a18-002e-41e1-8634-441777b3725d>
|
CC-MAIN-2017-17
|
https://www.java-forums.org/ocpjwsd/56736-review-web-service-security-print.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119356.19/warc/CC-MAIN-20170423031159-00485-ip-10-145-167-34.ec2.internal.warc.gz
|
en
| 0.906416 | 7,291 | 2.703125 | 3 |
Acidity is one of the most common problems that most individuals face. This is largely due to wrong eating habits and sometimes even stress. Bad eating, stress in a way is all connected. One leads to another and that in turn leads to unhealthy living and problems such as acidity.
But, to find a solution for the problem it is first important to understand what is Acidity?
Acidity is a term used for a set of symptoms caused by excess production of acid by the gastric glands of the stomach. The stomach normally secretes hydrochloric acid which is required for the breakdown and digestion of food that we eat. Aciditycauses symptoms like dyspepsia, heartburn gastric inflammation and ulcers in the stomach.
Now, there are some factors which cause acidity such as eating habits, fad diets, stress, smoking and alcohol consumption, lack of physical activity, irregularity in eating pattern, consumption of oily and spicy foods. Apart from these certain medicines are too responsible for the cause of acidity.
Some of the symptoms which can be felt as a result of acidity can be:
- Burning session in the stomach
- Burning session in the throat
- Sour taste
As correctly said, “Prevention is better than cure”
So let us look at some of the parameters we can prevent acidity.
- Don’t consume spicy food or fried foods too often.
- Eat more fruits and vegetables. One should be taking at least 2 servings of fruits and 3-4 servings of vegetables. Green leafy vegetables would be real good choice to go for.
- Eat small, regular meals. Try to reduce the gap between meals to not more than 3 hours.
- Consume your last meal at least a few hours before sleeping.
- Chew tulsi leaves, cloves, saunf, etc.
- Avoid medications like NSAIDs (non-steroidal anti-inflammatory drugs) and steroids
- Reduce stress. Deep breathing, going for a walk and be in nature are some of the activities which help in reducing the stress.
However, if you are already suffering from acidity, I am discussing below some of the home remedies of acidity which really work. So before you start with antacids for the treatment, do try these home remedies and you may get rid of the problem.
- Basil leaves: Eat basil leaves thoroughly at first sign of acidity. Can also boil 4-5 leaves in a cup of water for 15 minutes.
- Cinnamon: Add half spoon of cinnamon powder in a cup of water, boil for few minutes and drink this 2-3 times a day.
- Grind half to one teaspoon of methi seeds with little water to make paste. Mix it in glass of buttermilk and have it.
- Add a tablespoon of white vinegar or lemon juice to a cup of buttermilk and keep it for 5 minutes before drinking.
- Mix a pinch of black pepper in a glass of buttermilk.
- Mix a tablespoon of coriander leaf juice in a glass of buttermilk.
- Apple Cider vinegar:
- Mix 1-2 teaspoon of apple cider vinegar in half a cup of water and drink.
- Mix 2 tablespoon of apple cider vinegar with 1 teaspoon of organic honey and drink before eating a spicy meal.
- Cloves: Chew 2-3 cloves thoroughly.
- Jaggery: Jaggery is high in potassium. After each meal, take small piece.
- Can take 2-3 teaspoon of ginger juice in a day for combating acidity.
- Can boil ginger in water and drink the water twice a day.
- Cumin seeds:
- Crush roasted cumin seeds and stir in a glass of water. Drink after each meal.
- Boil seeds in water, strain and drink.
- Mix 1 teaspoon of coriander seed powder, a teaspoon of cumin seed powder and a teaspoon of fennel seed powder and some sugar in half cup of water and drink empty stomach.
- Aniseed: Soak a teaspoon of aniseed in a cup of boiled water overnight. In the morning, strain the water add a teaspoon of organic honey and sip it at least 3 times during the day.
- Cold milk: After a meal, drink a glass of cold milk, not iced milk.
- Lemon and ginger juice 15 minutes post meal, zaps acidity quickly.
If eating right and proper preventive measures are adhered to, Acidity can be averted.
|
<urn:uuid:ae07cc64-4299-4253-bcfe-5d27bccd7811>
|
CC-MAIN-2017-04
|
http://goqii.com/blog/acidity-its-symptoms-and-prevention/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00268-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.928983 | 941 | 2.875 | 3 |
Modern Foreign Languages
Modern foreign languages
The ability to speak a foreign language is a skill that is much in demand in industry and commerce and also one that our students will find valuable throughout their adult lives.
As well as encouraging excellence in the grammatical and linguistic elements of French, German, Spanish and Mandarin we aim to foster an appreciation of the cultural and historical similarities and differences between English and a student’s chosen language.
High quality teaching and learning in the department have led to increasingly impressive examination results, and we also provide opportunities for students to study languages in non-academic situations via video podcasts, apps, interactive exercises and websites.
Our VLE (Virtual Learning Environment) also provides students and parents with up-to-date digital resources to consolidate the classroom learning, as well as past papers and vocab learning games with specific topic-based themes and examples of exam answers.
Key Stage 3 (Years 7-9)
In Year 7, your son/daughter will study French or Spanish (depending on the year of entry) for four lessons per week. Latin is also offered to help students assimilate key grammatical structures more quickly.
In Year 8 and 9, your son/daughter will continue with the first year language (French or Spanish) for two lessons per week, as well as choosing one of the remaining languages (French/German/Latin/Spanish) to be their new language option (three lessons per week).
Modern textbooks and resources are used to ensure that students are challenged and that they develop and hone their reading, listening, speaking and writing skills.
Regardless of language, by the end of Key Stage 3 most students are working at Levels 6-8 in National Curriculum terms. This means that all the requisite aspects of grammar will have been mastered and command of the five tenses will have been attained by most students by the end of Year 9, to ensure they can go on and achieve their highest potential result in terms of GCSE grades.
Key Stage 4
Proficiency in modern languages is becoming more and more important both within the EU and in the wider world and it is a distinct advantage to a student looking to go to university as well as to a graduate in the jobs market.
Our students opt for French, German or Spanish (or a combination of two or three of these) at Key Stage 4 and follow the AQA specification full course GCSE. The language is explored through four key themes: My World, Holiday Time and Travel, Work and Lifestyle, and The Young Person in Society.
The examination is assessed on the basis of four key skills – listening (20 per cent), reading (20 per cent), speaking (30 per cent) and writing (30 per cent).
Key Stage 5
Both AS and A2 courses extend the depth of knowledge and skills that students have acquired at GCSE, not just in terms of grammar, vocabulary and spoken fluency, but also in terms of extending their appreciation of the deeper nature of the language. This goes hand in hand with the study of social, historical, literary and cultural aspects of the countries where the language is spoken.
Our students, who opt for French, German or Spanish (or a combination of two or three of these) at Key Stage 5 follow the AQA specification AS and A2 full courses.
At A level, the language work and knowledge is explored via the following topics:
- Environment - pollution, energy and protection of the planet
- Multicultural society - immigration, integration and racism
- Social and contemporary problems - rich and poor, public order and science and technology
Candidates also prepare two topics of their choice for both the written exam and the speaking test. Possible topics could include the study of a film, a novel, a singer, an author, an architect, a poet or a region.
Assessment is by a two-hour listening, reading and writing exam.
|
<urn:uuid:aad1994b-322e-4a15-93ef-463d87660ca6>
|
CC-MAIN-2019-47
|
https://stmarys.ac/curriculum/departments/arts/modern-foreign-languages
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669352.5/warc/CC-MAIN-20191117215823-20191118003823-00135.warc.gz
|
en
| 0.955442 | 798 | 3.203125 | 3 |
You can use this sample
FREE ESSAY for inspiration
Why Egypt and Syria helped the USA in the invasion of Iraq
In the last decade of the twentieth century, a radical restructuring of the system of international relations took place. The change in the international situation at the global level seriously affected the balance of power in the Middle East. The US influenced the Gulf War by actively participating. The USA invaded Iraq with the help of the coalition forces in the 1990s.
Get a price quote
The events of the invasion continued until 2003 when the US and allied countries launched a military operation against Iraq to overthrow Saddam Hussein’s government, and that became the first phase of the protracted Iraq War (2003-2011) (Cruden, 2011). Two countries of the Arab world helped the United States, Syria, and Egypt. The purpose of this paper is to describe the US invasion of Iraq and explain the reasons for Egypt and Syria helping the United States and the ways of this aid.
US Invasion in Iraq: International Participation
The reasons for the US invasion were the events in the Gulf region at the end of the 20th century. Iraq claimed its rights on Kuwait explaining it by historical reasons and territorial claims (Hiro, 1992). After a deteriorated situation due to the Iran-Iraq War, Iraq wanted to boost its economy by using Kuwait’s oil resources. The invasion proclaimed by Hussein, who was the leader of Iraq at the time, started on August 2, 1990, and that event led to the Gulf War (Bennett et al., 1997). Iraq invaded Kuwait on the pretext of them stealing oil from the Iraqi: Americans really gave Kuwait directional drilling technology, which allowed them to descend deep into the “reservoirs” of neighbors. In fact, Iraq was not satisfied due to the low cost of the oil that was $18 per barrel (Agnew, 2003). The world price, not without the orders from the US and Europe, was dictated precisely by Kuwait and Saudi Arabia. If the price was $25 per barrel, then Iraq would be able to improve its financial and economic situation after the recently concluded Iran-Iraq War (Bennett et al., 1997). Therefore, the US wanted to influence the countries that were rich in oil and resolve the conflict between Iraq and Kuwait.
You will receive these EXTRAS at no additional charge ($57.30)
- FREE Plagiarism Report Screenshot (on request)
- FREE Bibliography / Reference Page
- FREE Revision within 2 days (48 hours)
- FREE E-mail Delivery
- FREE Formatting
- FREE Outline
There were some operations led by the US and other countries against Iraq where Egypt and Syria took part as well: “Desert Storm” and “Desert Shield.” The operation “Desert Storm” lasted from January 17 to February 24, 1991, and became part of the so-called First War in the Persian Gulf (“Gulf War”) (Bennett et al., 1997). The operation “Desert Shield” happened even earlier: it started on August 7, 1990, with the deployment of the US troops in Saudi Arabia (Bennett et al., 1997). A subsequent operation called “Desert Saber” lasted from the 24th to the 28th of February in 1991 (Bennett et al., 1997). It included MHC ground operation, and that led to the defeat of the Iraqi army. Kuwait finally received its freedom, and coalition forces moved deeper into the Iraq territory. The Iraqi authorities then announced the termination of resistance on all fronts and recognized all UN Security Council resolutions.
Egypt and Syria acted within the anti-Iraq coalition. The composition of the anti-Iraq coalition included 28 countries. The most active role was associated with the following countries: the United States, the United Kingdom, France, Egypt, Syria, and the Cooperation Council for the Arab States of the Gulf, which included Saudi Arabia, Kuwait, Bahrain, the United Arab Emirates, Oman, and Qatar. In 2003, another military campaign in Iraq began on March 20; on April 9, the US troops occupied the capital city of Iraq, Baghdad. On May 1, US President George W. Bush declared the end of active military actions (Bennett et al., 1997, p. 56). The conducted operation was based on the UN Security Council Resolutions 678 and 1441 without further the UN’s sanctions (Bennett et al., 1997, p. 75). The official reason for the outbreak of hostilities was announced to be a bond regime against international terrorism, in particular, the movement known as “Al-Qaeda”, as well as the search and destruction of weapons of mass destruction (Faour, 1995). Probably, one of the goals of the invasion was to gain control of oil reserves in Iraq. Nevertheless, all countries that participated in the events associated with the Gulf War had their own objectives and respective outcomes.
Reasons for Egypt to Help the USA
Most countries of the peninsula opposed the annexation of Kuwait by Iraq. Therefore, the anti-Iraq coalition came into existence under the auspices of the UN. Then, it became obvious that Saudi Arabia and Egypt unreservedly supported Kuwait. On the other hand, Iraq had its own allies that included Jordan, Yemen, and Sudan, though they were in the minority. Therefore, the United States found powerful allies in the Arab region. Among them, the most helpful were Syria and Egypt.
Among the Arab countries, apart from the military forces of Saudi Arabia, Egypt provided the greatest help. Thus, it strengthened the commitment of the Arab League and significantly improved the coalition forces. The West met Egypt’s decision with widespread approval, but in some parts of the country, there were resistance outbreaks. However, the majority of the population supported the decision. After a series of bloody wars with Israel, the Egyptian soldiers were well trained and equipped, and professional officers commanded the divisions. Egypt launched the two of its twelve divisions; the first division arrived at the scene of the hostilities in late September – early October (Bennett et al., 1997). It comprised of the third mechanized division, which is sometimes mistakenly called the 7th; enhanced chemical protection units; and landing (Bennett et al., 1997). After that division, the fourth Armored Division followed in December. In total, the Egyptian troops amounting to 36,000 people were deployed in Saudi Arabia; 2,500 people as part of the auxiliary troops were deployed in the UAE (Bennett et al., 1997).
The US troops began to arrive in Saudi Arabia on the seventh day of the War, on the 8th of August. As a part of the operation “Desert Shield” in this country, the part of the 82nd Airborne Division from the Central Command of the US Armed Forces landed there as well (Hiro, 1992, p. 56). The Egyptian President Mubarak allowed the US Air Forces to use the country’s airspace and allowed the carrier strike group of six warships led by the nuclear aircraft carrier “Eisenhower” to pass through the Suez Canal (Bennett et al., 1997). Therefore, it was evident that such support was the result of the relationship between Mubarak and the President of the United States.
The reasons of Egypt supporting the US in the military intervention in Iraq are related to their friendly relationship before and after the Gulf War. For example, the United States had a significant impact on the formation of the political elite of the Arab Republic of Egypt inviting the Egyptians to take part in various programs in the field of democratic development. The number of Egyptians in the US was increasing rapidly: in 1994, the State Department invited 3300 people, and in 2008, the number rose to148 700 Egyptian citizens (Cruden, 2011, p. 56). The United States and Egypt were building a relationship based on a mutual interest in the maintenance of peace and stability in the Middle East, improving the Egyptian economy, and promoting the reciprocal trade relations. Egypt was a key partner of the US in promoting regional stability and the fight against terrorism.
Make your first order with 15% discount and get 10% OFF MORE for ALL orders by receiving 300 words/page instead of 275 words/page
There are some historical reasons for dependence from the US. Due to the signing of the Camp David Accords and the peace treaty with Israel, A. Sadat ensured peace with Israel, the return of the occupied lands, and the United States agreed to provide an annual economic and military aid, which, however, led ultimately to a sharp increase in the country’s dependence on the US (Hiro, 1992, p. 220). The Egyptian leadership playing on the US interests in the Middle East has sought and seeks to obtain the maximum possible benefit in terms of politics and economy. On the other hand, the demonstration of independence accentuated distancing from the United States, and Israel allowed the Egyptian leadership to obtain credibility in the Arab world as well as to soften the criticism from the opposition. The participation of Egypt in the multinational force was a write-off of $7 billion of debt, which undoubtedly became an additional and compelling argument in favor of maintaining the “special relationship” with the US (Hiro, 1992, p. 35). Another reason was the economic gains during the US invasion of Iraq. Egypt also made considerable economic gains directly following its participation in the operation “Desert Storm.” At the time, Egypt made approximately US$100 billion: $30 billion of that money were in the form of exempted debt to foreign countries, $25 billion in Kuwaiti funds, $10 billion from Saudi Arabia, and another $10 billion from the United Arab Emirates (Hiro, 1992, p. 34). Therefore, the reasons for such help were also lucrative.
Reasons for Syria to Help the USA
One of the leading regional powers of the Eastern Mediterranean is Syria in the new geopolitical conditions faced with the choice of priorities not only internationally but also in the inter-Arab relations. In 1990, the foreign policy of the Syrian Arab Republic underwent a major adjustment, which was related to the invasion of Kuwait by the Iraqi troops (Hiro, 1992, p. 321). There are quite many similarities between Syria and Iraq: mainly Arabs live in both countries, and there are large Kurdish communities. The two countries experienced the control of the pan-Arab party called “Baas”. Baas was divided into two branches in Iraq and Syria in 1966 (Hiro, 1992, p. 325). The Baas division in Iraq has lost its influence in the country when Hussein’s regime has been defeated while in Syria, it is holding high positions in many spheres of life.
There are also important differences between Iraq and Syria. The religious majority in Syria is Muslim Sunni comprising 74% of the population while in Iraq, there are only slightly more Shiites than the Sunnis: 51% and 42% of the total population respectively (Hiro, 1992, p. 45). In Syria, the administration of the country and the army is in the hands of the minority representatives called the Alawi Sect (Bennett et al., 1997). At the same time, Iraq’s government officials are mostly Shiite. Such differences inside one religion engender major specialties of Iraq and Syria as well as conflicts between them.
Top 10 writers
Your order will be assigned to the most experienced writer in the relevant discipline. The highly demanded expert, one of our top-10 writers with the highest rate among the highest rate among the customers.Hire a TOP Writer
Inter-Arab relations and changes in the international relations and world order changed the Syrian policy toward Baghdad. Syria is one of the few Arab countries that supported Iran during the Iran-Iraq conflict in 1980-1988 (Bennett et al., 1997). This led to some complications at the bilateral level. In addition, Syria’s new foreign policy strategy has been associated with only the increasing role of the United States and the deteriorating domestic economic situation of the SAR but also with a growing concern in Damascus related to the policy pursued by Baghdad. The strengthening of the Iraqi war machine during the Iran-Iraq conflict has shifted the balance of power in favor of Damascus. Syrian fears were confirmed when it became apparent that there is the support of Iraq’s anti-Syrian government in Lebanon led by General M. Aoun (Hiro, 1992). Since the beginning of the Lebanese Civil War in 1975, Iraq has maintained anti-Syrian forces, who spoke for the withdrawal of Syrian troops from Lebanon (Hiro, 1992). Therefore, there was the reason of the animosity of Syria towards Iraq.
Even before the occupation of Kuwait, Syria was warning about the threat of a conflict between the two countries, the split of the Arab States, and the possibility of foreign intervention. Since the beginning of the Gulf crisis, Syria channeled its efforts into resolving the conflict by peaceful means within the framework of pan-Arab forces. On the day of the occupation of Kuwait, President B. Assad gathered a pan-Arab meeting to find a quick solution to the problem before the crisis went out of control (Hiro, 1992). The president of Syria even urged Hussein to withdraw from Kuwait in exchange for support in case of the US military intervention in Iraq (Hiro, 1992). Assad thought that force could not solve the conflicts, that it was necessary to withdraw from Kuwait and negotiate until it was too late, but the Iraqi government refused to cease hostilities. It played a decisive role in the Syrian authorities not only supporting the military operation “Desert Storm” and the involvement of the United States on January 17 – February 27, 1991, but also taking an active part in the conflict themselves (Hiro, 1992). Syria viewed the occupation of Kuwait by Iraq as a major catastrophe and an unforgivable mistake, which returned the Arabs to the prehistoric, pre-Islamic era. In the liberation of Kuwait, there were not only the foreign forces from the West but also the armed forces of the Arab States. Trying to focus on overcoming the crisis in the Persian Gulf at the time, Syria took a variety of actions in all possible directions. Nevertheless, the relationship between the US and Syria remained strained.
Initially, the position of Syria presupposed non-participation in the military operations in Iraq. Damascus was generally against the excessive retraction of the US forces in the Arab region. Iraq directly borders with Syria, and it was a question of the national security of the country. The position of Damascus estimated as unequivocally positive, especially against the background of the politics of other Gulf countries (except Saudi Arabia) as Jordan and Sudan. The effect of such involvement in the anti-Iraq coalition was positive both on the regional and global levels. All this led to the assessment of Syria’s role in the Iraq-Kuwait conflict as a number of the Arab countries were guided primarily by only the pan-Arab interests and demanded registration of the Arab approaches to the problem. Syria actively contributed to the formulation of the clear views of the Arab community in the Gulf War and ways of its elimination. Among these countries, Syria operated fully and consistently.
Taking into account its interests, Syria managed to establish multilateral cooperation with other Arab countries following a decision to actively participate in the conflict resolution that was adopted at the summit in Cairo. Iraq, as a geopolitical opponent of Syria, was completely isolated while in Damascus, there were opportunities for further strengthening of the dominance in the Lebanese affairs and the establishment of the “Syrian order” there (Hiro, 1992).
During the Gulf War, Syria put forward various peace initiatives to resolve the crisis in the region. Syria led constant work on the revival of pan-Arab solidarity and acted as the initiator of the construction of the “Arab security” in the Persian Gulf in the form of the military-political union of the GCC countries, Syria and Egypt, which was a testament to the increased credibility of Damascus (Faour, 1995). On February 17-18, 1991 in Cairo, at the meeting of the foreign ministers of Egypt, ATS, and six members of the GCC, Syria addressed the issue of the creation of the combined forces of the 8 Arab countries to prevent the recurrence of aggression in the future (Hiro, 1992). During this meeting, the members elaborated on the principles enshrined in the Damascus Declaration on March 6, 1991 (Hiro, 1992). These principles are the reaffirmed commitment to the Charter of the Arab League, the agreement on joint defense, and economic cooperation. Signing the Declaration was an important factor in the political realities of the contemporary Arab world, in determining the ratio of the leading Arab states to changes in the international and regional situation, and in realizing the necessity of collective steps to ensure the pan-Arab security.
Syria contributed to the US invasion of Iraq in the form of military power. Syria gave the sixth-largest contingent of approximately 20,000 people to help the US in its intervention in Iraq. The biggest involvement of Syria was during the operation “Desert Storm.” Moreover, it has received financial assistance from the GCC, overcome the isolation of the country in the West, and gained time to strengthen its position in Lebanon (Hiro, 1992). Factors of taking such position were the Syrian-Iraqi rivalry in the region, the threat of the Syrian national security that Iraq posed together with the loss of Syria, and the need to improve relations with the West and pro-Western regimes in Egypt and Saudi Arabia. Moreover, there was a need to obtain material and financial assistance from the GCC and European countries in the context of growing social and economic problems. In addition, during this crisis, Damascus initiated the creation of the “Arab security” in the form of the military-political union of the GCC countries, Syria, and Egypt. This initiative was reflected in the Damascus Declaration adopted on March 6, 1991, in which the attempt to create a national security system has been made in the Arab world (Hiro, 1992, p. 115). Thus, the choice of the Syrian leadership in favor of participation in the military operation “Desert Storm” was justified: due to a flexible and balanced approach to the inter-Arab and international affairs, Syria strengthened its geopolitical position in the Middle East.
In general, Syria and Egypt played an important role in helping the US to invade Iraq. The United States started intruding in the Iraqi affairs in the 1990s, and the conflicts reached a peak in 2003. However, the highest involvement of Arab countries happened in the1990s with the formation of the anti-Iraq coalition. At the time, the US positioned itself as a sole global superpower after the Cold War. One of the American objectives was to improve the presence and impact in the Arab region as well as to suppress Hussein and the aggressive politics of Iraq. Syria and Egypt were the most active helpers, though their reasons were different. As for Egypt, it expected financial benefits and a higher position among the Arab States. It is important to note that after establishing diplomatic relations, the US was probably the most important foreign policy vector of Egypt. American policy brought democracy to Egypt. While moderate participation of Egypt in the Persian Gulf War was natural, it was a completely surprising decision for the uncompromising Syrian government to start cooperation with its old enemies, the United States, and Great Britain. Inside the country, violent protests sparked, but they were brutally suppressed. Syria also had historical reasons. However, the main stimulus was that the authorities began condemned the Iraqi actions toward Kuwait while Syria was interested in regional security. Of course, there were important aspects of keeping the distance from the US, but Syria and Egypt were the decisive factors of the American successful invasion of Iraq.
Order a Custom One Created by Professionals
|
<urn:uuid:2ada77fc-4118-419b-805a-bad42d2e71e2>
|
CC-MAIN-2021-10
|
https://bestcustompapers.com/samples/analysis/egypt-and-syria/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178364008.55/warc/CC-MAIN-20210302125936-20210302155936-00464.warc.gz
|
en
| 0.964588 | 4,044 | 2.875 | 3 |
Hi Friends.. I hope this post finds you well. With October approaching quite quickly, I wanted to let you know what I have my students do during our Daily 5 rotations in my Work on Writing station.
So... I LOVE having the students do different types of research projects in class during the month of October. This month lends itself well with so many opportunities for having some fun learning and researching about creepy crawlies and things that fly in the night with Halloween coming up.
So in order to fit EVERYTHING in... I like to add research projects to my work on writing station.
During the month of October, my students will complete 3 - 4 different research projects at my Work on Writing Station. My students always have a MUST DO and a CAN DO activity when they get to our Work on Writing Station. This month they will focus on BATS, using EITHER.. my
All About Bats Bat-Shaped Interactive Notebook OR they can complete my Bats Flip Flap Book™
I add a variety of different non-fiction books, texts, and passages at the Work on Writing Station for them to read and complete their research. Giving them a choice on which activity to complete is exciting for them!
The next project they will work on during their rotation to Work on Writing is Spider research using my Spiders Flip Flap Book™
I also leave one of my ipads at the Work on Writing Center set up so they can watch this video as well.
The other 2 or 3 research projects that my students complete during the month of October is my
Christopher Columbus Boat-Shaped Interactive Notebook activity, my Fire Safety Shaped-Writing Template, and my Halloween Writing Fun Interactive Notebook activity during the week of Halloween. My Haunted House Halloween Shaped Booklet is what I use to differentiate my Work on Writing station. A few of my students will not be able to handle 3-4 different projects in the month, so in order to differentiate, I will give those students my Haunted House Halloween Shaped Booklet. This booklet has a page for spider research, bat research, writing an expository paragraph, a making words activity, and a few other activities. So this booklet is a PERFECT way to differentiate my Work on Writing Station for my kiddos :)
So... I just wanted to share a few of my Research-Based Projects that are at my Work on Writing Center for the month of October. If you are interested in any of these resources, click the images below to check them out in my TPT Shop!
|
<urn:uuid:2ed3c3ec-e448-4dd7-86ea-99539e18fb8f>
|
CC-MAIN-2015-40
|
http://simplyskilledinsecond.blogspot.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736678520.45/warc/CC-MAIN-20151001215758-00130-ip-10-137-6-227.ec2.internal.warc.gz
|
en
| 0.944011 | 522 | 2.765625 | 3 |
The Port Chicago 50: Disaster, Mutiny, and the Fight for Civil Rights
Written by Steve Sheinkin
Describes the fifty black sailors who refused to work in unsafe and unfair conditions after an explosion in Port Chicago killed 320 servicemen, and how the incident influenced civil rights.
Primary Source Pairing:
In this historical look at the prejudice and injustice during World War II, readers are taken back to a time when not all people were treated equal. The book The Port Chicago 50: Disaster, Mutiny, and the Fight for Civil Rights has primary sources embedded throughout the chapters. Use the text with students and encourage them to do their own research using Sheinkin’s resource lists at the back of the book.
For this primary source pairing, an image of the men, most of whom look happy, is used. Let this image begin a conversation on the content of the book and the feelings these men had while following their orders from the US Navy.
Questions for Discussion:
- Describe what you see.
- What do you notice first?
- What people and objects are shown?
- How are they arranged?
- What is the physical setting?
- What other details can you see?
- How does this image connect with your learning while reading the book The Port Chicago 50: Disaster, Mutiny, and the Fight for Civil Rights?
Book Cover and Summary: Follett
Image of men at the Port: MacMillian
For more information and primary source images, visit the Port Chicago 50 page on the MacMillan website.
|
<urn:uuid:f910a85e-b4c9-48cd-862d-64440227b2a5>
|
CC-MAIN-2019-04
|
https://primarysourcepairings.com/the-port-chicago-50/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583662124.0/warc/CC-MAIN-20190119034320-20190119060320-00293.warc.gz
|
en
| 0.923962 | 324 | 3.640625 | 4 |
Authors: Wilkie, D.S.; Wieland, M.; Boulet, H.; Le Bel, S.; Van Vliet, N.; Cornelis, D.; BriacWarnon, V.;Nasi, R.; Fa, J.E.
In Africa, overhunting of tropical wildlife for food remains an intractable issue. Donors and governments remain committed to invest in efforts to both conserve and allow the sustainable use of wildlife. Four principal barriers need to be overcome: (i) communities are not motivated to conserve wildlife long-term because they have no formal rights to benefit from wildlife, or to exclude others from taking it on their land; (ii) multispecies harvests, typical of bushmeat hunting scenarios, place large-bodied species at risk of extinction; (iii) wildlife production cannot expand, in the same way that livestock farming can, to meet the expected growth in consumer demand; and (iv) wildlife habitat is lost through conversion to agriculture, housing, transportation networks and extractive industries. In this review, we examine the actors involved in the use of wildlife as food and discuss the possible solutions required to address urban and rural bushmeat consumption. Interventions must tackle use and conservation of wildlife through the application of context-relevant interventions in a variety of geographies across Africa. That said, for any bushmeat solution to work, there needs to be concurrent and comparable investment in strengthening the effectiveness of protected area management and enforcement of wildlife conservation laws.
Publication Year: 2016
Source: African Journal of Ecology 54(4): 402-414
|
<urn:uuid:9a8a8962-8f41-4b87-bc01-8a1dfaf632e8>
|
CC-MAIN-2019-39
|
http://www.foreststreesagroforestry.org/tag/consumption/
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574409.16/warc/CC-MAIN-20190921104758-20190921130758-00308.warc.gz
|
en
| 0.895057 | 327 | 2.96875 | 3 |
This photograph shows water on the streets of York, Pa., during Tropical Storm Agnes in June 1972. As of Thursday morning, Sept. 8, York had escaped such water levels. (See 1933 flood photo below.) Also of interest: Tropical Storm Agnes savaged York County with more than 15 inches of rain.
Is this September storm akin to what folks saw from Tropical Storm Agnes in 1972.
It would take 12 inches of rain in a day to cause that… .
And as bad as current flooding is, rainfall has totaled about 11 inches since Monday, according to the York Water Company.
Rain fell after midnight today, but here is the York Daily Record/Sunday News story on the width and depth of the storm through Wednesday evening: Tropical Storm Lee isn’t Agnes.
Also, other posts of note:
|
<urn:uuid:363b7ba5-b5d3-45e8-addc-dadc872dd9e3>
|
CC-MAIN-2014-41
|
http://www.yorkblog.com/yorktownsquare/2011/09/08/drenched-storm-of-sept-7-2011-no-agnes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657133564.63/warc/CC-MAIN-20140914011213-00067-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
en
| 0.946762 | 171 | 2.546875 | 3 |
Windows 10 resp. Edge supports the subscription of RSS Feeds only with an App. If you do not yet have the App, you can download it here:
Go to the App in the Microsoft web store
Then you can add the RSS Feed of our JKS Blog directly in the App.
Chrome supports the subscription of RSS Feeds only with a plugin. If you do not yet have the plugin, you can download it here:
Cookies facilitate the provision of all content on the website.
Ultraviolet (UV) light has been used for years in various fields for physical disinfection. The UV light damages the nucleic acids (DNA) of bacteria, viruses and other microorganisms during irradiation.
The effect depends on the wavelength, the duration of irradiation and the distance from the radiation source to the irradiated surface. Due to the global pandemic caused by the coronavirus, interest in UV disinfection is increasing strongly and the demand for its use in hospitals, doctors' offices, nursing homes, etc. is significantly higher. Disinfection by UV light is an effective method by killing coronaviruses and other pathogens in addition to surface cleaning and chemical disinfection.
SHOULD UV RADIATION BE USED FOR DISINFECTION?
Ultraviolet light is a form of light invisible to the human eye that exists in the electromagnetic spectrum between X-rays and visible light. We are exposed to a small amount of ultraviolet light from the sun's rays every day, although much of it is absorbed by the ozone layer. Ultraviolet radiation is divided into three wavelength ranges:
At a wavelength of approx. 265 nm, bacteria, viruses and other microorganisms are particularly severely damaged. The UV-C radiation causes irreparable destruction of the DNA, so that replication and thus reproduction of the pathogen cannot occur.
WHAT ARE THE AREAS OF APPLICATION?
UV light has been used for disinfection for a long time. Be it in food production, in storage rooms, in waste water and drinking water treatment or in the pharmaceutical industry. In hospitals and medical practices, permanently installed UV lamps are used for disinfecting storage rooms or in ventilation systems for air disinfection. Meanwhile, UV disinfection is increasingly used in the form of mobile systems for room disinfection. The areas of application for this are diverse and flexible: fitness studios, hospitals, hotels, retirement and nursing homes, offices, elevators, rehabilitation centers, shopping malls, showrooms - basically in all places where people meet.
IS THERE ALREADY APPLICATION IN OTHER COUNTRIES?
In addition to the global application in the areas of food production, drinking water treatment and the pharmaceutical industry, the interest of the healthcare system in UV systems for disinfection has increased. In many countries, currently especially in China, Italy and the USA, disinfection with UV-C light is increasingly used. Due to the corona crisis, mobile disinfection units and robots that independently disinfect treatment and patient rooms, operating rooms and laboratories with UV-C light are being used, especially in hospitals.
WHAT IS THE EFFECTIVENESS AND WHAT ARE THE DANGERS OF UV LIGHT?
Several studies have shown that UV-C radiation inactivates 99,99 % (e.g. 2016 Cambridge University Study) of vegetative bacteria (MRSA) and viruses (SARS-CoV) on the directly irradiated surface as well as behind objects after only 3-15 minutes.
After 50 minutes of irradiation, even spores of C. difficile (one of the most common hospital germs) were eliminated. In addition to the surfaces, the room air is also disinfected, so that a UV-C system can close disinfection gaps that remain after wipe cleaning and chemical disinfection.
When used correctly, UV-C radiation is not harmful to humans. It does not penetrate into deeper skin layers and is almost completely absorbed by horny skin already at the surface. The possible clouding of the cornea in the human eye can be prevented by wearing simple protective goggles. In the case of direct skin contact, sunscreen with a high sun protection factor prevents possible sunburn. In addition, UV-C radiation does not penetrate materials such as plastics or glass and is therefore harmless to people outside the room.
Ultraviolet light to kill viruses, bacteria and fungi is already the tool of choice in the food industry. Although the technology has been around for decades, it has not yet been able to establish itself outside of industrial applications. Thanks to autonomous robots, however, the solution is now also finding its way into hygienic building cleaning.
The JKS HERO21 is a disinfection robot developed in partnership with both OMRON and ICA. It achieves a disinfection level of 99.99 percent with 360-degree coverage. The robot moves autonomously through the rooms to be disinfected. Once the device is turned on, it can be remotely moved into the contaminated rooms via app. The HERO21 scans all room data and stores it. Its special sensor system detects whether a person is still in the room. If this is the case, the robot does not activate, but sends a danger message.
The HERO21 is funded by the German Federal Ministry for Economic Affairs and Energy through a resolution of the German Bundestag and has been nominated for the 2020 FOCUS Innovation Award.
SEE THE HERO21 LIVE IN ACTION?
We come directly to your site, record the facts together, map and then navigate a test area that we can drive autonomously and disinfect on the same day. Let us impress you. HERO21 WE GO!
I look forward to hearing from you!
Sources for this blog post:
|
<urn:uuid:cad98151-f0cf-4b07-b61e-a52dae84be00>
|
CC-MAIN-2023-06
|
https://www.jks.ch/eng/blog/2021/01/144673.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500158.5/warc/CC-MAIN-20230205000727-20230205030727-00002.warc.gz
|
en
| 0.931768 | 1,184 | 2.59375 | 3 |
Short Paper: Emerging Technologies
With the advent of various technological advancements, law enforcement efforts in the investigation and prosecution of crime have been met with positive results. However, with every advantage comes a disadvantage. Criminals have also benefited from these technologies and use the same advancements that law enforcement employs during the commission of their crimes, or as a tool for their crimes (this is evidenced in computer-related offenses and the misuse of the internet).
In a 3 – 4 page paper (excluding title and reference pages), address the following areas in full detail: summarize the advantages of computers/software and the use of computer technology in investigations, summarize the disadvantages to law enforcement with respect to the advancements of computers, research a case where the computer was used to aid in the commission of a crime, research a case where the use of the computer was beneficial to the prosecution in a criminal case, and provide a final conclusion/paragraph that addresses your subjective opinion as to whether these technologies, in an overall sense, are of benefit or a hindrance to law enforcement efforts.
(PLEASE NOTE: This assignment will require outside research. Use at least three credible sources.) You may consult the Library, the internet, the textbook, other course material, and any other outside resources in supporting your task, using proper citations in APA style.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more
|
<urn:uuid:c6f57021-0fad-42ca-bd5b-dca5d801f52a>
|
CC-MAIN-2023-14
|
https://coursescholars.com/cj499-unit-8/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949689.58/warc/CC-MAIN-20230331210803-20230401000803-00732.warc.gz
|
en
| 0.948719 | 489 | 2.625 | 3 |
You’ll hear photographers occasionally talking about to learning to ‘see in black and white’. What this means is that rather than seeing the colours in a scene, they need to see tones. The removal of colour makes a photograph one step removed from reality. It also allows the viewer to concentrate on form and composition more easily, without the distraction of colours and their relationships with one another. However, what it doesn’t mean is that by removing colour a photograph becomes art, simply because it is not reality.
In his book The Art of Photography, Bruce Barnbaum writes:
I feel that colour photographs and black and white photographs are essentially two different media. I approach them differently. I see them differently and my goals are different in each.
He goes on to talk about how he can only shoot a particular scene in one way or the other, and that scenes very rarely work in both. He will only shoot colour if the colour included is a central element.
There must be something compelling about the colours, about the relationships among the colours, about the intensities of the colours and about their placement within the scene that makes them essential to the photograph.
This is maybe a little more extreme than my own views, but I do tend to shoot black and white as often as colour and many of my favourite photographers specialise in monochrome (particularly Pentti Sammallahti). Some of this is down to my use of analogue cameras and that I can process my own black and white film (it’s easier than you might think – you should try it).
I hope that the course will continue to allow the use of black and white as I progress through it, but for now, this exercise forms part of the colour section and teaches us the effect that converting a colour, digital image to black and white can have on the colours we’ve studied so far.
We set up a scene featuring a collection of items that are red, yellow, green and blue. I used a collection of cycling caps, drinks bottles, gloves and glasses. The scene was lit from the window behind and with a flash and softbox above to reduce shadows. Ideally, the I should have used a stronger (or purer) blue. The resulting image was then converted to black and white using our processing software’s colour filter effects (the exercise could also be carried our using black and white film and real, colour filters).
The filters have the effect of lightening the objects that are the same colour as the filter and darkening the others. The colours that are darkened the most, are those that sit opposite the filter’s colour on the colour wheel – their complimentary colour.
- No filter – all tones remain similar to the original version and colours appear desaturated with no changes to brightness.
- Yellow filter – very similar to no filter.
- Red filter – The front 1/4 of the cap and the St. Raphael writing are much lighter. The green areas of the bottle and the Leicester Forest cap are darkened almost to black.
- Blue filter – yellow green and red all darkened but blue is lighter. The blue in the original is fairly light and desaturated and so the effect is less that it may have been with a saturated blue.
- Green filter – Greens are slightly lighter than original, but St. Raphael text and front quarter are much darker.
- The neutral grey card in the bottom right of the frame does not change brightness or hues in each version.
This exercises shows the relationship between complimentary colours that sit opposite each other on the colour wheel, further demonstrating the usefulness of this tool. It also shows that when converting to black and white (or using film and filters) certain areas of a scene can be emphasised (and others reduced) simply by using filters.
Barnbaum, B (2010) The art of photography – An Approach to Personal Expression. California; Rocky Nook
|
<urn:uuid:1f250881-2c8c-4333-8ce6-1dbec3898729>
|
CC-MAIN-2017-22
|
https://barnabynutt.com/2014/05/29/exercise-colours-into-tones-in-black-and-white/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612502.45/warc/CC-MAIN-20170529165246-20170529185246-00144.warc.gz
|
en
| 0.95349 | 804 | 2.75 | 3 |
Picture this: Invisibility cloak made from glass
Another scientist is working on helping you hide from those pesky ninja assassins. Great, but when are we going to see a working cloak already?
Once or twice a year, we bring all you "Harry Potter" fans news ofunder development. So it is that we return with word of another scientist promising to help you perform your wizardry in secret.
This time, it's Elena Semouchkina who's venturing into H.G. Wells territory. An associate professor of electrical and computer engineering at Michigan Tech University, Semouchkina has found a way to use magnetic resonance to route rays of light around objects, making the objects undetectable by the human eye.
Other researchers have bent visible light using things like wires, and even a, composed of the fiberglass material used in circuit boards and etched with copper, that can detour electromagnetic waves around a 3D object and reconnect them on the other side. That creates an effect similar to a distant mirage you'd see hovering above a road on a hot day.
Semouchkina and colleagues at the Pennsylvania State University, where she is also an adjunct professor, used another metamaterial made of tiny pieces of chalcogenide glass arranged concentrically in the shape of a cylinder. When hit by infrared waves, the glass resonators produce the magnetic resonance required to bend light waves around an object.
Hidden away in Michigan Tech's Electrical Energy Resources Center lab, Semouchkina and her team have been testing their invisibility cloak rescaled to work at microwave frequencies and say they have cloaked metal cylinders 2 to 3 inches in diameter and 3 to 4 inches high.
"Starting from these experiments, we want to move to higher frequencies and smaller wavelengths," Semouchkina said. "The most exciting applications will be at the frequencies of visible light."
OK, OK, but when we will we be able to turn ourselves into the next Claude Rains? "It is possible in principle, but not at this time," Semouchkina said.
If you're interested in a (way, way) more technical explanation of the latest invisibility cloak tech, the researchers detail their work in a recent issue of the journal Applied Physics Letters, published by the American Institute of Physics (you can scroll through the entire paper in this PDF).
As for us, we just want an invisibility cloak that works--and soon. We've got lots of pesky ninja assassins on our tail.
|
<urn:uuid:361a18cf-1d2d-432c-a240-8592bc94cf82>
|
CC-MAIN-2015-22
|
http://www.cnet.com/au/news/picture-this-invisibility-cloak-made-from-glass/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1433195035744.13/warc/CC-MAIN-20150601214355-00092-ip-10-180-206-219.ec2.internal.warc.gz
|
en
| 0.932361 | 513 | 3.21875 | 3 |
Main / Productivity / Corrosion of Steel in Concrete.pdf
Corrosion of Steel in Concrete.pdf
Name: Corrosion of Steel in Concrete.pdf
File size: 342mb
(a) the circumstances in which steel reinforcement in concrete can corrode, and a steel mesh is incorporated in the concrete structure in such a way that the. CIP 25 - Corrosion of Steel in Concrete. WHY is Corrosion of Steel a Concern? WHY Does Steel in Concrete Corrode? HOW to Prevent Corrosion?. The online version of Corrosion of Steel in Concrete Structures by Amir Poursaee Corrosion of reinforcing steel is now recognized as the major cause of degradation of concrete structures in many parts of the world. Abstract; PDF ( K).
The composite action occurring in the steel–concrete bond may be unlimited metal returns to its mineral state is known as 'corrosion'. Corrosion is therefore. reviewed. Background. Although corrosion of reinforcing steel is now recognized as the major cause of degradation of concrete structures in many parts of the. University of Ljubljana. Faculty of mathematics and physics. Department of physics. Primož Vavpetič. SEMINAR. Corrosion in concrete steel. ADVISOR: prof. dr.
21 Mar Reinforced concrete has been developed and applied extensively in the 20th 123offshoreweb.com combines the good compressive strength of concrete. Literature on reinforcement corrosion in concrete structures, its mechanism and factors affecting corrosion of steel in concrete are available. Extensive research. The mechanism of chloride-induced corrosion of steel in concrete is introduced, and its and corrosion rate (icorr) of steel in concrete after casting. Few. Salt-induced reinforcing steel corrosion in concrete bridges has undoubtedly low-permeability concrete, corrosion inhibitors, and coated reinforcing steel. Mechanism of corrosion damage. 5. Mechanical properties of corroded steel bars. 6. Bond between corroded reinforcement and concrete. 6.
concrete to protect embedded reinforcing steel against salt water chloride The ability of concrete to inhibit corrosion of reinforcing steel is es- sentially. Chloride Induced Corrosion of Reinforcement Steel in Concrete. Threshold Values and Ion Distributions at the Concrete-Steel Interface. NELSON SILVA. 18 Jan The influence of concrete cracking upon reinforcement corrosion is complex. Cracks allow fast penetration of chlorides, potentially leading to a. The objective of this thesis is to investigate the mechanism of corrosion of steel reinforcement in concrete and epoxy coated reinforcing bars as corrosion.
|
<urn:uuid:7df5ad00-713a-481b-914f-5fa0caa83b94>
|
CC-MAIN-2019-04
|
http://123offshoreweb.com/productivity/corrosion-of-steel-in-concretepdf.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583667907.49/warc/CC-MAIN-20190119115530-20190119141530-00444.warc.gz
|
en
| 0.899684 | 540 | 2.75 | 3 |
Visit our website for STAAR
Visit our website for Common Core Resources
Visit our other Common Core Resources:
Providing training and instruction to bring your staff to new heights
Keeping you up to date with STAAR news, resources, and products.
Helping you with resources as you transition to the Common Core Standards.
Incorporating a diverse selection of literary context to develop reading understanding.
A variety of resources that help every educator incorporate critical thinking into the classroom.
Utilizing critical thinking and problem solving for mathematics comprehension.
|
<urn:uuid:2d795ecf-e33d-4522-94e2-b334c4cf2f6a>
|
CC-MAIN-2014-15
|
http://www.mentoringminds.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539493.17/warc/CC-MAIN-20140416005219-00300-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.886075 | 111 | 3.03125 | 3 |
The bridge that spanned the southern end of Lake Champlain between Vermont and New York served as a critical transportation link for the region; many people who live on one side of the lake work on the other. Built in 1929, the bridge was razed in 2009 after it was found to be on the verge of collapse. Drivers were greatly inconvenienced as commutes that once took 40 minutes grew to two hours with 100-mile detours around the lake.
Initially, some engineers estimated a new Lake Champlain Bridge would take eight years to build. But realizing that local residents couldn't wait that long, the project team managed to do the job in just 20 months, a feat that included enduring difficult weather conditions.
The new arched steel span is one of the largest bridges in North America to be completely zinc metalized, which aids in weatherproofing, says project submitter Flatiron Construction Corp., Firestone, Colo.
The pier footings are faced with granite to protect the concrete substructures from ice damage.
The bridge measures 2,200 ft and includes a 1,029-ft approach on the New York side and a 769-ft approach in Vermont. The main span includes a basket handle modified network steel tied arch. Wide lanes accommodate farm equipment, and there are also sidewalks for people and bicycles. A 75-ft clearance enables ships to pass below through a 300-ft-wide channel.
Helping fast-track the $81-million project was the fact that the 900-ton structure was built off site and then floated into place; that approach also minimized disruption to ship traffic. But workers had to contend with massive floods in May 2011 that pushed water levels to 103 ft, which is 6 in. higher than the previous record.
Overall, eight workers had to be trained in rescue operations, including for ice rescues, as the lake was frozen over much of the time.The project had no fatalities.
"I think this is everything you're looking for in a winning project: a gorgeous structure, done on an impossible schedule," one ENR New York judge said. "And it's very important to the community.
Lake Champlain Bridge, Essex County, N.Y., and Addison, Vt.
Owner/Developer: New York State Dept. of Transportation
Lead Designer: HNTB Corp.
General Contractor/Construction Manager: Flatiron Construction Corp.
Civil Engineer: Erdman Anthony
Submitted by: Flatiron Construction Corp.
|
<urn:uuid:6a73421e-fb4e-428c-8c38-e12d2055fd20>
|
CC-MAIN-2014-23
|
http://newyork.construction.com/new_york_construction_projects/2012/1112-lake-champlain-bridgeovercomes-rough-weather.asp
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510257966.18/warc/CC-MAIN-20140728011737-00205-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.964609 | 509 | 2.84375 | 3 |
Discover the cosmos! Each day a different image or photograph of our fascinating universe is featured, along with a brief explanation written by a professional astronomer.
2002 January 15
Explanation: Few auroras show this level of detail. This unusual display of an auroral corona occurred on Earth three days after an unusual solar event -- the fifth most powerful explosion yet recorded on the Sun. An X14-class solar flare on April 15 sent a tremendous Coronal Mass Ejection (CME) into the Solar System. This CME did not directly impact the Earth. The Solar-System wide shock wave it created probably did, however, causing a G3-class geomagnetic storm and a night filled with colorful auroras across much of northern North America. The unusual red color of this Michigan aurora is caused by solar ions striking oxygen molecules 300 kilometers high in Earth's atmosphere. More typical green auroras are caused by oxygen recombining only 100 kilometers high.
Authors & editors:
Jerry Bonnell (USRA)
NASA Technical Rep.: Jay Norris. Specific rights apply.
A service of: LHEA at NASA/ GSFC
& Michigan Tech. U.
|
<urn:uuid:d16af052-f1dd-409f-ab57-d35458ac3518>
|
CC-MAIN-2023-23
|
https://apod.nasa.gov/rjn/apod/ap020115.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653631.71/warc/CC-MAIN-20230607074914-20230607104914-00517.warc.gz
|
en
| 0.868173 | 252 | 3.21875 | 3 |
What is Oyster Sauce?
Oyster sauce is a thick, dark brown, very umami, somewhat sweet sauce that is made from oyster extract. It has a complex caramel flavor that doesn’t taste very fishy, so it doesn’t overwhelm a dish. The key ingredients of oyster sauce are oyster extract, salt, sugar, and water. Cornstarch, caramel coloring, and MSG are sometimes added as well.
Legend has it that oyster sauce was invented completely by accident in the late 1800s in what is now the Chinese province of Guangdong, which neighbors Hong Kong. A food stall owner forgot about a big pot of oyster soup and let it boil for hours. Instead of a delicate and thin oyster soup, owner Lee Kum Sheung was left with a mysteriously thick and gloopy oyster paste. He didn’t want to waste it, and was pleased to find out that it could be used as a rich and delicious sauce on rice. Voilà, oyster sauce was born. The entrepreneurial Lee Kum Sheung went on to bottle up and sell his oyster sauce far and wide.
Although oyster sauce originated in the southwest of China, it rapidly took off and found its way into neighboring cuisines.
Sauces That Are Similar to Oyster Sauce
Cooking sauces that are distinct from oyster sauce but may seem similar at first glance are: fish sauce, hoisin sauce, and soy sauce.
Fish sauce is made of just fermented fish and salt, so it has a stronger flavor than oyster sauce. Hoisin sauce is close to oyster sauce, but it substitutes the oyster base with a soybean base. It also has a more reddish color due to the chili powder and five-spice powder that is in it. Soy sauce also shares the salty umami of oyster sauce, but is much less complex in flavor, as it is just fermented soybeans, wheat, and salt. A mushroom-based oyster sauce is a great oyster sauce substitute for vegetarians.
What are Good Uses for Oyster Sauce?
Whether you realize it or not, you have probably eaten oyster sauce at Chinese restaurants in dishes like beef and broccoli, bok choy stir fry, wonton soup, or chow mein noodles.
Oyster sauce gives a deep and distinct flavor to main dishes such as stir frys, noodles, and soups. It can also be used as a garnish to drizzle over side dishes of meat, vegetables, and tofu. Oyster sauce can also be used as a dipping sauce, a marinade, or a gravy.
Due to its unique umami flavor and versatility, many other cuisines have absorbed oyster sauce into their culinary customs. It is now a Japanese grocery staple, and found in the kitchens of home cooks across Asia. Countries such as Vietnam, Thailand, Malaysia, and Cambodia boast delicious recipes involving oyster sauce.
A Few Recipes That Use Oyster Sauce
You can’t go wrong with the following main courses whose recipes you can easily find online.
Cantonese stir fry noodles are usually comprised of beef, udon noodles, a medley of vegetables, vegetable oil, soy sauce, and oyster sauce. Organic udon noodles can be ordered directly from Bokksu’s online grocery store, along with Kikkoman Oyster Sauce and Kikkoman Soy Sauce.
Yakisoba is a popular Japanese grilled noodle dish that tastes great with a little oyster sauce. You need a yellow noodle such as ramen, green cabbage, carrots, onion, and pork belly or bacon. Other ingredients to have on hand are: vegetable oil, soy sauce, Worcestershire sauce, oyster sauce, ketchup, honey, Japanese pepper, sliced pickled ginger, and dried nori and scallions.
In Thai food, a sweet-hot garlic dipping sauce is commonly used. Oyster sauce is one of the ingredients to make this iconic sauce. The sweet-hot garlic sauce is a crucial ingredient to go with gai yang, the Thai-style chicken dish that is widely sold in street stalls and now enjoyed worldwide.
One Vietnamese recipe that calls for oyster sauce is sweet and sour pork spare ribs. A vegetable stir fry made with bell peppers, onions, and pineapple is a nice accompaniment to the ribs. And don’t forget the Jasmine rice.
Where to Buy Oyster Sauce
You can order groceries online at Bokksu Market! Find oyster sauce and many other essential Asian grocery items on Bokksu’s online Asian grocery store.
By Megan Taylor Stephens
|
<urn:uuid:460ea77b-1560-48f1-ae3b-372dad295afa>
|
CC-MAIN-2023-14
|
https://www.bokksumarket.com/blogs/magazine/the-joy-of-oyster-sauce
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00642.warc.gz
|
en
| 0.95091 | 970 | 2.53125 | 3 |
The question arose on a woodworking forum of why the nomenclature for the various forms of rabbet, fillister, fillaster, fillester, fillester or whatever you want to call it, planes are called what they are called and have there been references to standing fillisters before 1800? Plus, what was a 'common fillister'?
My brain cells worked for the moment and came up with this answer:
"Halving, errr, sorry, Having unearthed myself from pain killer fog, the result of contact between a rib and ice, which fight the ice won, I bestirred myself to consult references secure: Wooden Planes In 19th Century America by Kenneth D. Roberts. which copy of mine is signed by Mr. Roberts to Lee Murray, 1975 and will never be sold. Lee Murray was the less public side of Richard Crane Auctions and the guy who knew more about old tools than most of us will ever forget.
And Henly's Encycolopedia Of Practical Engineering
Henly: Standing Fillister: A fenced rabbet with an integral depth stop.
I add that a rabbet becomes a fillister when a depth or width stop is added, otherwise it is just a simple rabbet or a skewed rabbet with or without a nicker. If it had a nicker and has lost it, it is then rated PG-17, unless it was Pre-Code in which case no one cared.
A Standing Fillister is, thus, a double fixed fence rabbet plane that "stands' rather than 'moves'. I kid you knot.
WPINCA: pg 104: Halving Plane; "This was a special rabbet plane for 1" thick boards for cutting a rabbet half the thickness; hence the term 'halving plane'. The right edge serves as a fence and the rabbet cut into the left edge serves as a stop equal to the width of the middle step. This is believed to be the only size made (referring to the H. Chapin Union Factory Tool Catalog 1853). Probably the principal use of such a plane was for making ship lap rabbet cuts in 1" boards for flooring."
Robert's quote refers specifically to the Chapin catalog. I'ld extend that description to any plane of this configuration that has two fixed fences and cuts a rabbet that, in height and width, is equal to one half the depth of the board.
I can't say that I have seen earlier references but now that my interest is piqued, I'll see what I can find.
As for what was or is a 'common fillaster', at present I don't know for sure what would differentiate a 'common fillaster' from a rabbet plane other than the addition of an immovable fence to the sole, transforming the rabbet into a 'common fillaster'. Lacking the depth stop, it would be 'common' and not 'standing'.
That's my guess, lacking hard evidence to the contrary."
You'll notice I quote myself. That is the first sign of impending Orsen Wellsishness.
Till next, Gary
|
<urn:uuid:c9662b2f-6e4e-4a42-8bf8-2c690091bf32>
|
CC-MAIN-2014-49
|
http://toolemerablog.typepad.com/toolemera/2014/02/halving-and-halv-not-planes.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400380037.17/warc/CC-MAIN-20141119123300-00004-ip-10-235-23-156.ec2.internal.warc.gz
|
en
| 0.943894 | 648 | 3.015625 | 3 |
January 17, 2011
Altering Intestinal Microbiome May Be Double-Edged Sword
The microbiome of a person is made up of the genetic elements of the microorganisms that reside mostly within our intestines and on our skin. The characteristics of a microbiome can indicate both a healthy and diseased area within the body.
In a report in the current edition of the Journal of the Federation of American Societies for Experimental Biology, researchers at Baylor College of Medicine studied how the absence of a molecule, toll-like receptor 2 (Tlr2), can positively and negatively affect the microbiome of the intestinal tract.Ulcerative colitis, colon cancer
"Tlr2 plays a role in bacterial recognition, intestinal inflammation and obesity. There is some evidence for the role of Tlr2 in the form of chronic large intestinal disease (ulcerative colitis), and colon cancer," said Dr. Richard Kellermayer, assistant professor of pediatric gastroenterology at BCM and lead author on the study. "The dysfunction or lack of this molecule may be beneficial and hazardous at the same time."
They found that some aspects of the microbiome of Tlr2-deficient mice resembled that of lean animals and humans. However, other differences were also observed in the animals lacking Tlr2.
"The deficiency increased inflammation-associated changes in the intestinal microbiome, some of which are similar to what is found in ulcerative colitis," Kellermayer said.
He added that the intestinal gene expression involved in immune processes was significantly modified in the Tlr2-deficient mice resembling gene expression patterns found in inflammatory bowel diseases.
Communications must be kept in balance
"The findings of this study reveal the delicate communication between the intestinal microbiome and the genes of the host that must be kept in balance to prevent common human diseases," Kellermayer said. "The results may bring us closer to finding new targets for the treatment of common metabolic and gastrointestinal disorders."
Other BCM researchers involved in this work include Drs. Alan Harris, Alfred Balasa, Tiffany D. Schaible, Reka Szigeti, Zhijie Li, James Versalovic and C. Wayne Smith.
The study was funded by the Crohn's and Colitis Foundation of America-Children's Digestive Health and Nutrition Foundation, the Broad Medical Research Program, the Broad Foundation, a USDA/ARS CHRC, CRIS Project Grant, the National Institute of Diabetes, Digestive and Kidney Disease (NIDDK) and National Center for Complementary and Alternative Medicine.
On the Net:
|
<urn:uuid:c39ee459-be56-4554-88e9-6d1ab9c4b848>
|
CC-MAIN-2017-30
|
http://www.redorbit.com/news/science/1980108/altering_intestinal_microbiome_may_be_doubleedged_sword/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426169.17/warc/CC-MAIN-20170726142211-20170726162211-00433.warc.gz
|
en
| 0.917334 | 527 | 3.359375 | 3 |
Handling a sulfuric acid spill is typically a multi-step process that includes controlling the exposure of yourself and other nearby people, ensuring the area is ventilated, and isolating the spill to prevent it from spreading.
Large spills often need to be cleaned up by professional hazmat crews due to how hazardous they are, but sometimes small splashes or minor puddles can be handled independently, often with baking soda or other compounds that will help the spill clump together.
However, this still requires great caution and strict adherence to protocol. Acid spills are very serious and usually need to be treated as such in order for everyone involved to stay safe and well.
Ensure personal safety
The first thing you need to do after a spill is assess the situation, paying particular attention to whether the acid got on yourself or anyone else nearby. You should check your clothes and skin because sulfuric acid can easily eat or burn both. Clothing that has been splashed should be removed immediately and exposed skin or eyes washed for at least 15 minutes with cool, clean water to rinse and dilute the acid. Not doing this before moving on can result in disfiguring burns and extraordinary pain.
Importance of Ventilation
After checking yourself and everyone around you, it’s a good idea to make sure the room with the spill is as well ventilated as possible. If there are windows in the room, be sure to open them; making sure the doors are open will also help bring in fresh air from outside. If you’re in a lab with a fume hood or air scavenging system, it might be wise to turn it on.
However, most experts advise against forcing the air to circulate with ordinary fans or air conditioners unless you also have a source of fresh air from outside. Sulfuric acid fumes can be dangerous to breathe, and you shouldn’t spread them farther than necessary within an enclosed space.
Assess the Situation
The next thing to do is take a good look at the sulfuric acid spill, noting how large the area it covers and the approximate volume present. You may be able to figure this out fairly easily if you know what caused the spill, such as a dropped glass or burst container, but slow leaks and more mysterious pools of acid may require a little more guesswork. What you’re basically trying to do is figure out if the spill is too big to clean up on your own.
The fumes from sulfuric acid can be fatal, so if there is a large pool it is usually best to call a hazmat crew and evacuate the area. It’s usually not worth risking breathing problems and possible burns when professional help is available. Most community health offices have hazmat crews trained to deal with substances like sulfuric acid, and some firefighters can help too.
Small spills are easier to clean up independently, but safety is still an important consideration. It is important to wear protective clothing before approaching the area, i.e. clothing that the acid cannot burn. Mask, goggles, gloves and an acid resistant apron are usually the minimum standard.
In most cases it’s not a good idea to simply soak up acid spills as the liquid is often able to eat through rags and cleaning rags. A better idea is to start the cleanse by pouring baking soda on the affected area. This is included in most acid spill kits, but if one of these kits isn’t available, regular baking soda, soda ash, or kitty litter usually has the same effect.
Baking soda is a good choice because it will absorb the sulfuric acid and cause it to go mouldy, which in turn will make it easier to collect and dispose of safely. However, you shouldn’t pick up lumps right away; while the powder will neutralize the acid, there is often some bubbling that a chemical splash can cause if you don’t give it time to work.
Once the lumps have dried, sweep them up and discard them as chemical waste. The area should be washed with water and more baking soda to collect any remaining acid.
This would need to be repeated several times to completely remove all residue, and it’s usually a good idea to stay out of the general area for a few days just to be sure everything has dried.
|
<urn:uuid:9f357faf-9830-44f1-a6bb-de92fc88c785>
|
CC-MAIN-2022-49
|
https://influencertoday.it/how-do-i-deal-with-a-sulfuric-acid-spill
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710898.93/warc/CC-MAIN-20221202050510-20221202080510-00405.warc.gz
|
en
| 0.952369 | 891 | 3.015625 | 3 |
Eating disorders affect about 30 million Americans, females twice as often as males. / thinkstock.com
Eating disorder resources
• Balance Point Collaborative, an outpatient mental health recovery center in Asheville that specializes in eating disorders and other disorders. 348-6922, www.balancepointnc.com.
• Tapestry, a resident treatment program in Brevard that also has a day program. 855-396-2604 www.tapestrync.com.
• • T.H.E. Center for Disordered Eating of Western North Carolina in Asheville has a new free teen support group. 337-4685, www.thecenternc.weebly.com.
For a year, the 13-year-old’s parents excused the inordinate skinniness to his being vegetarian going through a growth spurt. That’s what his doctor told them, anyway.
Finally, the mother got scared and contacted Michelle Mendez-Youell, a licensed clinical addictions specialist and social worker. “I did an assessment, and it was clearly anorexia,” a potentially life-threatening disorder, Mendez-Youell said. The boy was seriously depressed, about his parents’ fighting and other things. Mendez-Youell’s first priority was helping him restore his weight, which was accomplished through a hospital stay and an eating plan devised by a nutritionist.
And then the rest of the work began.
“He felt out of control in the family unit because his father was becoming more verbally aggressive,” Mendez-Youell said. “We helped him set boundaries and learn to say no. After eight months, we got him into school again. And a year later, he was great.”
Eating disorders affect about 30 million Americans, females twice as often as males, said Heather Wingert, director of T.H.E. Center for Disordered Eating in Asheville. Multiple surveys indicate that up to 60 percent of elementary school-aged girls are concerned about their weight and body shape, she said.
Though far less talked about, eating disorders affect boys as well, high school wrestlers and football players among them. The National Institute of Mental Health says that 2.7 percent of children ages 13-17 have eating disorders.
There are many kinds of eating disorders, but anorexia nervosa, characterized by self-starvation and excessive weight loss, is among the best known. Bulimia nervosa, a cycle of binging and purging, can also be life-threatening. Binge eating disorder can lead to obesity. An obsession with healthy eating can be an eating disorder itself, Mendez-Youell said.
Mendez-Youell is founder of Balance Point Collaborative, an outpatient mental health recovery center that specializes in eating disorders and other disorders. Stress is one of the reasons that eating disorders are on the rise for both boys and girls, she said. A parents’ divorce and taunts at school may make them seek control of their lives by controlling their food intake, she said.
“The underlying piece is, it’s about control,” said Tara Noid a licensed professional counselor in Asheville who specializes in adolescents. “Someone who doesn’t feel they have control over their life, maybe because a parent is trying to control everything, they will control their food. As in ‘I’m going to start not eating to punish my dad who’s telling me that I can’t date.’”
Radical behavior and change that you cause feels empowering, even if it can be destructive. Women going through a separation or who get fired often do something radical with their hair, Noid said. “Ask any hairdresser,” she said. But few other people would know anything amiss is going on in her life.
“It’s a huge misconception that if you have an eating disorder then you’re emaciated,” Mendez-Youell said. “Most people with eating disorders don’t fit into one category. They may look fairly healthy, with average body weight. But what’s going on — the constant restriction, the binging, vomiting — all of that is very unhealthy to the body. The body will take what it needs from other organs.”
Parents might suspect an eating disorder if their normally outgoing child becomes withdrawn, when food goes missing around the house or when he or she insists on low-calorie meals in restaurants and at home.
“If you feel in your gut that something is wrong, then you’re probably right,” Mendez-Youell said.
Balance Point Collaborative provides clients (children among them) with up to 20 hours a week (and up to 40 hours a week next year) of help and support. Clients work with therapists and nutritionists. They also work with family members and other clients to help them reconnect with people. Mendez-Youell estimates that 60 to 70 percent of Balance Point’s work is with people younger than 18.
Wingert’s approach also involves a team of therapist, doctor and dietician. She doesn’t treat children younger than 15, but for those 15 and above, she tries to involve the family.
|
<urn:uuid:504d579e-08a5-4219-b123-f97bece8a123>
|
CC-MAIN-2015-14
|
http://www.citizen-times.com/article/20131104/LIVING/311040012/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131292567.7/warc/CC-MAIN-20150323172132-00274-ip-10-168-14-71.ec2.internal.warc.gz
|
en
| 0.967001 | 1,115 | 2.53125 | 3 |
If you’re a fitness fanatic or have desperately looked for an effective way to lose weight, you may have resorted to calorie counting. The concept of “calories in vs. calories out” has been around for many years, but exploded in popularity with the rise of low-carb diets. The main idea is that in order to lose weight, you have to take in less than you are taking out.
But let’s face it — tracking your calories is way easier said than done. When we’re deep in papers, assignments, presentations, and just generally trying to keep our mental health sane during finals week, it’s not worth worrying about the fact that we’ve gone a little above the recommended daily intake. If your cravings hit, enjoy your carb-heavy pasta dinner because your brain will thank you.
Calorie counting can be beneficial if you want a very basic outlook on your overall diet, but it only really works if you have the self-discipline and a good understanding of your metabolism. Otherwise, it’s extremely easy for it to alleviate into an unhealthy habit, leaving us guilty and frustrated for lacking self-control and as a result, drives us into a negative relationship with our food.
What are macronutrients?
Macronutrients refer to the energy-providing chemicals that need to be consumed in large quantities (hence the term macro). Carbohydrates, Proteins, and Fats, are the three main players that help to sustain our growth and metabolic functioning. It’s key to understand their role in our bodies and that they’re processed differently from one another. Once you’ve got a hold of this, then you can start to look into the amount of macro’s required for your daily needs. Here’s the breakdown:
Carbs are your body’s main energy source. They are easily metabolized and turned into fuel in the form of glycogen. All of your critical organs, like the heart, muscles, kidneys, and the brain (especially the brain) uses the energy from carbohydrates to properly function.
They are divided into two categories: simple and complex. Simple carbs allow for a quick energy source since the body doesn’t require to work as much to break them down. The only downside to the way they digest is that they don’t keep you full for very long, whereas complex carbs do. Common examples of simple carbs are table sugar and fruit drinks, while complex carbs consist of whole grain breads and starchy vegetables.
They are essential for the maintenance of all the organs. When your body absorbs them, they get broken down into amino acids which help with growth and repair, (for the fitness junkies I don’t think I need to stress their importance for muscle gains). These amino acids are constantly working in your body to keep your cells and tissues functioning, and when your carbohydrate stores are depleted, they can act as a good source of energy.
Despite the bad rep they’ve received in the media, are just as critical for our survival. They help with immune function, absorption of vitamins, and maintaining the structures of our cells. Fats, when broken down in the body are stored as triglycerides, and these guys are super rich in energy. Their structure allows them to pack on more fuel than carbohydrates, so over a prolonged period of time, fats become a preferred energy source.
Why would you want to count them?
Our bodies are complex organisms, and macros are a much better measure of our diet and health. One of the most important things to remember is how your body stores and uses them. If you take in more carbs and proteins than you need, they get stored into fat. Too little macros may result in deficiencies. Of course, because there are simple and complex types which digest differently, this means that the quality of your macros matter as well. Below are some reasons for why counting macros would be useful.
You work out and want results.
Some fitness experts believe there is an optimal carb/protein/fat ratio, but all of this depends on your workout and your fitness goal. If your workout consists of steady-state cardio (running, cycling, rowing at a moderate-high intensity) then your meals should be heavy in complex carbohydrates. However, a moderate amount of protein before your workout is essential to help prevent muscle loss during exercise.
If your workout consists of weight-training, then you may want to look into adding in a bit more fat and protein, and a little less carbs than you would for cardio. Heavy lifting puts a high demand on your muscle tissue which necessitates more protein for growth and repair. If you’re performing short bursts of high-intensity exercises (whether that’s for weight-lifting or sprints), carbs are the best source of readily available energy, but as soon as the exercise is finished, your body will need more energy as it burns the calories way faster. This is known as the “afterburn effect“, when your body is trying to restore the oxygen levels and muscle tissue.
You’re confused with your body’s hunger signals.
Do you crash out mid-afternoon, get midnight cravings, or find yourself extremely hungry shortly after breakfast? There are many reasons for this, but one of them could be that your diet is out of balance. This study points out that higher-carb intake leads to increased alertness better than a high-fat consumption. Your brain is extremely hungry for glucose (the energy source from carbs) so this would make sense. However, keep in mind that it’s important to consume those that are complex and high in fiber as they help regulate your appetite and blood sugar levels. At the same time, the right kind of fats also have their benefits in increasing fullness, weight management, and brain development.
Counting macros will also count your calories.
Each macronutrient has a caloric value. Carbs and proteins have 4 kcals/g and fats have 9 kcals/g. Say for example you’re looking at the nutrition label of a cereal box. If it says that it has 10g of fat, you multiply this by 9 and it means that 90 calories are coming from fat. The same goes for carbs and proteins, just multiplied by 4, and if you add all the values together you should end up with a number that’s equal to or almost the same as the total calories stated. It’s like killing two birds with one stone.
So that might have been a lot to take in, and while there are many healthy benefits to tracking your macros, it can also be just as obsessive as counting your calories. I’m a firm believer in practicing mindful eating and not depriving your body of what it wants. If you really want something (chocolate, a 4-cheese pizza slice) then it’s better to just indulge in it because when you try to find something to substitute it you may find yourself bingeing on it later. Listen to your body, nourish it with what it needs, and enjoy the sweet pleasures.
|
<urn:uuid:59c1d0c2-aef3-4256-9a1d-f6cfb927872e>
|
CC-MAIN-2017-04
|
http://spoonuniversity.com/lifestyle/how-tracking-macros-can-help-you-get-more-out-of-your-workout
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282932.75/warc/CC-MAIN-20170116095122-00009-ip-10-171-10-70.ec2.internal.warc.gz
|
en
| 0.959668 | 1,483 | 2.765625 | 3 |
A new article from Trends in Cognitive Sciences explores how cognitive neuroscientists are becoming increasingly interested in understanding hypnosis and are using it to simulate unusual states of consciousness in the lab.
Hypnosis was typically treated with suspicion by mainstream cognitive science, although an important turning point came when a 2000 study demonstrated that people hypnotised to see colour on grey panels showed activity in the colour perception areas of the brain.
Myths about hypnosis are still common, but it is nothing more than a participant’s willing engagement in a process of suggestion. The hypnotic induction, sterotypically the counting backwards and the ‘you are feeling sleepy’ patter, helps but is not necessary.
Crucially, and for reasons that are still unclear, we all vary in our hypnotisability. This characteristic is known to be more stable than IQ, and normally distributed, like many other psychological traits.
In other words, we can all experience the relaxation and focus, and we can all imagine what the ‘hypnotist’ is suggesting, but only more highly hypnotisable people experience the suggestions as involuntary, as if they’re happening ‘by themselves’.
Recent research has suggested that highly hypnotisable people can disengage the process that looks out for rival demands on our attention, from the process that allows us to focus on which of the competing tasks we need to home in on.
In other words, in highly hypnotisable people, suggestions to experience things contrary to everyday reality may be able to take effect because the normal detect and disentangle mechanism has been temporarily suspended.
Combined with carefully crafted suggestions, this ability allows researchers to simulate certain mental states and experiences in the lab.
For example, hypnotically suggested paralysis, blindness or loss of feeling have been used to simulate the symptoms of ‘hysteria’ or conversion disorder, a condition where neurological symptoms appear without any damage to the nervous system being present.
Other studies have used hypnosis to simulate the feeling that the body is being controlled by outside forces, a common symptom in psychosis, or where a patient thinks their reflection in the mirror is another person, a delusion called mirror misidentification.
And we covered a fantastic study last year, where researchers used hypnosis to simulated psychogenic amnesia, a loss of memory just for old information despite the fact that the patients have none of the brain damage associated with the classic amnesia syndrome.
This new in-depth article covers research attempting to understand hypnosis itself, and science that uses hypnosis as a lab tool, and is a great introduction to the neuroscience research in this developing area.
Link to article.
Link to DOI entry for same.
Full disclosure: the authors of the article are research collaborators and jolly nice chaps to boot.
One thought on “Deeper into the neuroscience of hypnosis”
It is not clear whether there was brain damage in this case or not. Did the authors report any follow-up on the patient; did he suffer any consequences to his psychological/neurological functioning?
|
<urn:uuid:b9e67b5c-e6b3-48e6-a3b0-b585420cd7de>
|
CC-MAIN-2023-14
|
https://mindhacks.com/2009/05/10/deeper-into-the-neuroscience-of-hypnosis/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00009.warc.gz
|
en
| 0.939887 | 630 | 2.921875 | 3 |
Outsmarting Fish with Seasonal Flies
Seasoned anglers heavily rely on hatch charts when planning fly-fishing trips. For example, Orvis offers gratis eastern and western U.S. hatch charts to give fly fishermen a leg up when it comes to choosing a nymph, emerger, spinner or adult version of a particular fly. A nymph represents an aquatic insect that has not yet metamorphosed into its final form; while an emerger is the hatched aquatic insect leaving the water to finish its metamorphosis on land.
Artificial Flies Mimic More than Insects
Many artificial flies seek to mimic real flies or other winged insects that might have fallen into the water and might now present a tasty snack for the fish. Other flies are specifically made to resemble larvae, reptiles, crustaceans, worms and even vegetation. Materials used in the manufacture of flies vary greatly. A hook is usually the centerpiece of the fly, but its camouflage may be made from nylon, colored feathers, fur, straw and hair.
Dry Fly vs. Wet Fly
The majority of flies fall into either the dry fly or wet fly categories. A dry fly is designed to float on top of the water and attract fish that come up from the depths of the lake or stream to feed on insects on the water's surface. In contrast, a wet fly is crafted to gradually sink in the water. They attract fish that feed at any water depth on a wide array of insects, smaller fish and crustaceans.
Saltwater vs. Freshwater Flies
Dry flies are generally used in freshwater areas, such as lakes, rivers and ponds. They are made to resemble insects, larvae and nymphs that you might normally encounter in these areas. Saltwater flies are crafted to resemble the kinds of baitfish, insects and larvae that are at home in estuaries and along the shoreline of the ocean. Examples of freshwater flies are nymphs and emergers; examples of saltwater flies are streamers and terrestrial flies.
Target Fish Flies
Flies are oftentimes kept as generic as possible to attract the most number of fish. For example, a fly made to look like a hatching aquatic insect attracts trout but also other freshwater fish that might share the trout's habitat. In contrast, carp and salmon flies specifically mimic the food sources that these fish prefer. Other fish may not be attracted to them.
|
<urn:uuid:bf89083e-09ee-41f7-8f9e-83c45d15074c>
|
CC-MAIN-2018-13
|
https://www.trails.com/list_2872_different-kinds-flies-fly-fish.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647530.92/warc/CC-MAIN-20180320185657-20180320205657-00740.warc.gz
|
en
| 0.949939 | 498 | 3 | 3 |
|Denominations :||Denominations: Canadian banknotes are issued in $5, $10, $20, $50, and $100 denominations. Coins are issued in 1¢, 5¢, 10¢, 25¢, 50¢, $1, and $2 denominations. All Canadian coins are minted by the Royal Canadian Mint whereas banknotes are printed by the Canadian Bank Note Company and BA International Inc on behalf of the Bank of Canada.|
The history of the Canadian Dollar
In Pre-colonial Canada, various objects such as shells, glass beads, and animal furs were used as means of trade. Even after the area became New France, pieces of playing cards were often accepted as legal tender when currency became scarce.
In the early 1800s, banks and merchants began issuing their own bank notes in order to trade. However, there was a constant loss of notes, silver and gold coins to the United States as a result of cross border trading, which lead to the Canadian Parliament taking control of issuing currency. In 1867, Canada became a confederation and begun issuing Dominion of Canada bank notes.
Notes issued by both the government and charted banks were used until 1934, when the Bank of Canada was formed. Thereafter, sole control of printing money passed to the Bank of Canada, which became responsible for regulating the money supply and promoting the financial well-being of Canada. On March 11, 1935, the first bank notes issued by the Bank of Canada entered into circulation.
Currently, the Canadian Dollar is the seventh most heavily traded currency in the world.
|
<urn:uuid:0f1e79e6-3bed-453e-bae8-033e0d935b5e>
|
CC-MAIN-2017-09
|
http://www.advfn.com/currencies/cad/about/CanadianDollar.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00320-ip-10-171-10-108.ec2.internal.warc.gz
|
en
| 0.982886 | 323 | 3.359375 | 3 |
What is the difference between a pediatric dentist and a family dentist?
Pediatric dentists are the pediatricians of dentistry. A pediatric dentist has two to three years specialty training following dental school and limits his/her practice to treating children only. Pediatric dentists are primary and specialty oral care providers for infants and children through adolescence, including those with special health needs.
When will my baby start getting teeth?
Usually the two lower front teeth (central incisors) erupt at about six months of age, followed shortly by the two upper central incisors. During the next 18 to 24 months, the rest of the baby teeth appear, although not in orderly sequence from front to back. All of these 20 primary teeth should be present at two to three years of age.
When should I start cleaning my baby’s teeth?
You should start cleaning your baby’s teeth as soon as the teeth come in, because harmful plaque begins to form as soon as teeth erupt.
What should I use to clean my baby’s teeth?
Any soft-bristled toothbrush with a small head, preferably one designed specifically for infants. Babies and children’s teeth should be teeth brushed twice per day after breakfast and before bed.
What toothpaste is best for my child?
Fluoridated toothpaste approved by the American Dental Association, as being effective in reducing tooth decay should. Children aged three years and younger should not use fluoridated toothpaste; please select non-fluoridated infant toothpaste.
When should I take my child to the dentist for the first check-up?
In order to prevent dental problems, your child should see a pediatric dentist when the first tooth is present or no later than his/her first birthday. Children should see their pediatric dentist every 6 months following the first visit.
Why is it necessary to take my child to the pediatric dentist every six months?
The pediatric dentist will want to see your child at regular and frequent intervals for several reasons. Regular visits keep the child familiar with the pediatric dentist and his or her staff and encourage a pleasant, confident attitude in the child regarding this necessary, life long health practice. Also, as the child develops and grows, the pediatric dentist will want to be certain that tooth eruption and proper jaw development are progressing normally or, if not, that corrective measured are undertaken in time. Appropriate preventive measures such as regular applications of fluoride on the tooth surfaces, placement of pit and fissure sealants on newly erupted teeth, and reinforcement of good daily health practices (brushing, flossing, and dietary advice) can be continually encouraged by the pediatric dentist and his or her staff when the child is a regular and frequent visitor to the dental office. If decay or other dental defect has occurred, it will be detected in the early stages when it is easier and less costly to treat.
Why is fluoride so important?
Fluoride has been shown to dramatically decrease a person’s chances of getting cavities by making teeth stronger. Fluoride in the drinking water is the best and easiest way to get it. Most major cities have fluoride in the drinking water system. In communities where the water district does not fluoridate the water, fluoride supplements should be given to your child until their twelve year molars are fully erupted (approximately age 12 years). Your pediatric dentist or pediatrician can help determine if your child needs fluoride supplements or not.
What causes decay?
Decay is caused by dental plaque, a thin, sticky, colorless deposit of bacteria that constantly forms on everyone’s teeth. When sugar is eaten, the bacteria in plaque produce acids that attack the tooth enamel. After repeated acid attacks, the enamel breaks down, and a cavity (hole) is formed.
How can I prevent decay caused by nursing?
This decay process happens when a child goes to sleep while breast-feeding and bottle-feeding. Avoid nursing children to sleep or putting anything other than water in their bed-time bottle. Also, learn the proper way to brush and floss your child’s teeth. Take your child to a pediatric dentist regularly to have his/her teeth and gums checked. The first dental visit should be scheduled by your child’s first birthday.
Why should the baby teeth be filled, since they will be lost anyway?
Even though these primary teeth are called “baby teeth”, some of them must serve until the child is at least twelve years old, sometimes longer. Neglect of the baby teeth can result in pain, infection of the gums and jaws, impairment of general health, and premature loss of teeth, which is a major cause of orthodontic problems. Also, cavities tend to form in teeth that are next to other teeth with unfilled cavities, because decay is really an infection and will spread if left untreated. It is unwise to leave active decay in the mouth. Decay on baby teeth can cause decay on permanent teeth. Unfortunately, most children with untreated decay on baby teeth will develop decay on permanent teeth.
What should I do if my child has a toothache?
First, rinse the irritated area with warm salt water and place a cold compress on the face if it is swollen. Give the child ibuprofen or acetaminophen for any pain, rather than placing aspirin on the teeth or gums. Finally, see a dentist as soon as possible.
What is a sealant?
A sealant is a clear or shaded plastic material that is applied to the chewing surfaces of the back teeth (premolars and molars), where decay occurs most often. This sealant acts as a barrier, protecting the decay prone areas of the back teeth from plaque and acid.
How do dental sealants work?
Sealants work by filling in the crevasses on the chewing surfaces of the teeth. This shuts out food particles that could get caught in the teeth, causing cavities. The application is fast and comfortable and can effectively protect teeth for many years.
How do I make my child’s diet safe for his teeth?
Make sure your child has a balanced diet, including one serving each of: fruits and vegetables, breads and cereals, milk and dairy products, and meat fish and eggs. Limiting the servings of sugars and starches will also aid in protecting your child’s teeth from decay. You can also ask your pediatric dentist to help you select foods that protect your children’s teeth.
Are thumb-sucking and pacifier habits harmful for a child’s teeth?
Thumb and pacifier sucking habits will generally only become a problem if they go on for a very long period of time. Most children stop these habits on their own, but if they are still sucking their thumbs or fingers when the permanent teeth arrive, a mouth appliance may be recommended by your pediatric dentist.
Is it all right for my child to remove her own baby teeth when they become loose?
Perfectly all right. As the tooth loosens, it is natural for a child to assist the process, which may take several weeks.
My child has a double row of front teeth. Why is this and what is done about it?
This is not an uncommon occurrence. Sometimes the permanent teeth begin to come in before the baby teeth are lost. When this happens, unless the child can work the baby teeth out by himself within a few weeks, the pediatric dentist may have to remove them. Once the baby tooth is out, the tongue usually moves the permanent tooth forward into its proper position, if space permits. If this crowded condition should occur in the upper jaw, the baby teeth should be removed immediately. Sometimes it is necessary for the pediatric dentist to move the permanent tooth forward with an orthodontic appliance.
Why do the permanent teeth look so much yellower than the baby teeth?
Permanent teeth are normally yellower than primary teeth, but they appear even more so because you are comparing them with the lighter baby teeth still in the mouth.
What about the big space between my eight-year-old’s two upper front teeth?
Usually there is no need for concern. The space can be expected to close in the next few years as the other front teeth erupt. If there is a problem, your pediatric dentist will recognize it.
What should I do if my child falls and knocks out a permanent tooth?
The most important thing to do is to remain calm. Then find the tooth. Hold it by the crown rather than the root and try to reinsert it in the socket. If that is not possible, put the tooth in a glass of milk and take your child and the glass immediately to the pediatric dentist.
What can I do to protect my child’s teeth during sporting events?
Soft plastic mouth guards can be used to protect a child’s teeth, lips, cheeks and gums from sport related injuries. A custom-fitted mouth guard developed by a pediatric dentist will protect your child from injuries to the teeth, face and even provide protection from severe injuries to the head.
|
<urn:uuid:737caa98-b623-4ba7-8cc2-bdf8ec4fd472>
|
CC-MAIN-2016-50
|
http://www.drleebaker.com/frequently-asked-questions.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541142.66/warc/CC-MAIN-20161202170901-00410-ip-10-31-129-80.ec2.internal.warc.gz
|
en
| 0.944782 | 1,875 | 2.828125 | 3 |
If you haven't heard, honeybees are disappearing at an alarming rate. Can you imagine what would happen if we didn't have this important pollinator? Honeybees are responsible for pollinating about one-third of the food we eat! I've been thinking about honeybees a lot lately, which is why I recently made the Cork Beehive Brooch:
The Storque has also written a short article about OSSMedicineJewelry's work-in-progress documentary about the implications of the decline of honeybees called The Vanishing of the Bees. There is also now an Etsy team dedicated to helping the honeybee called Etsy Honeybee Helpers. Haagen-Dazs even has Vanilla Honey Bee ice cream and purchases will help fund research (part of the honeybee problem is learning about why they are disappearing) and has a website dedicated to honeybees
So, take a gander at these resources to learn about the the alarming decline of honeybees and what effects it is having and will have. One thing to also keep in mind, and it's rarely noted, is that it's also important to support native pollinators!
|
<urn:uuid:6be69216-a941-4111-bf21-6b1164caaada>
|
CC-MAIN-2013-20
|
http://ottoman.typepad.com/ottoman/2008/06/the-plight-of-t.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382360/warc/CC-MAIN-20130516092622-00081-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.976678 | 234 | 2.53125 | 3 |
Britain has always been unfair, unequal and divided – Covid-19 has only served to show this in even more stark relief
As London politicians hammer the regions with even more lockdowns, they highlight the yawning chasm decades of unrestrained capitalism has slashed across the country.
It seems the old divisions of North and South are creeping back into our public consciousness. These divides are ancient and etched deeply into the fabric of Britain. Divisions of clan, of geography and of power have always been there, but Covid-19, like a dry summer exposing an ancient settlement, is causing the inequalities in our society to re-emerge with a vengeance.
It’s hard not to see them, as government policy made in the South seems to be hitting those in the North more harshly, with the virus further exploiting the policies of those past governments that created this unfair, unequal and divided country. The spectres of our industrial past loom large in the current climate. The great Cheshire-based novelist Elizabeth Gaskell, who wrote ‘North and South’, a book outlining Britain’s industrial upheavals in the 18th century, may well be watching and sighing at our failure to learn anything about the dangers of unchecked inequality.
The ghosts of Britain’s past haunt this island. The UK has such varied geography, such differences in natural resources, not to mention a weather system that means two towns within miles of one another can have very different climates, all of which creates incredibly localised cultures. Our recent history is about how we used those resources to build an empire – a narrative told by those above, by those who benefitted from those divisions, and more importantly those resources, to those below.
In the 1980s, the Thatcher government was the enemy of the North of England. The Iron Lady saw swathes of the country as unproductive and idle, so she put in place policies that ensured the North-South divide was deepened. The traditional jobs of the Industrial Revolution – of coal and steel, of manufacturing and exporting goods – would be replaced by a focus on finance, marketing, insurance and the legal framework needed to hold this new global system together.
The North-South divide was deepened even further by subsequent governments, both Labour and Tory, with no opposition put up to the establishment of a British Babylon filled with excess, inequality and the stinking rich. The so-called Third Way was vaunted as a method to use money from the private sector to fund investment in public services. But, like all trickle-down economics, the Third Way was, in reality, just another way of the rich getting richer.
And now, in 2020, wealth inequality has never been wider. The richest are shooting for the stratosphere, while Covid-19 further entrenches all those bad policy choices of the past, keeping the poor welded to the bottom.
In truth the North-South divide is more of a Southeast doughnut. The global elite’s use of the Southeast of England as a millionaire’s playground has carved a hole into the country. That wound, inflicted by the wealthy in London and the Home Counties, has raised land and property prices so high that there’s effectively been a working-class exodus.
Meanwhile, Britain’s middle class and the aforementioned global elite see endless opportunities in this 21st-century Babylon, filled to the brim with cultural, media, political, and financial goodies for those with the right connections and accent, and enough money. The doughnut’s hole is growing ever larger as these deepening divisions continue to stretch it.Also on rt.com As Covid crisis adversely affects UK’s white working class, it is the middle class’s self-interest that means there is no easy fix
Local councils and representatives in the rest of the country have started to realise they simply cannot compete. But they have to do something, so they try to attract new businesses into their areas. With the old industries of coal and shipbuilding consigned to the dustbin of history, they now offer up all that’s left to exploit: the local population.
Their towns are given over to the giants of the global distribution economy. Great warehouses can be constructed quickly, and the locals, in desperate need of work, are commodified just like the coal their fathers once mined. The Kent coalfields are now distribution centres and car parks for international logistics firms, while the Midlands and parts of the North are used to pick and pack Europe’s cheap clothing and pharmaceuticals. Northern mayors and councillors roll out the red carpet for Amazon, despite knowing their constituents are doomed to lives devoid of much hope or meaning, to keep those same constituents down with myths of ‘opportunity’.
Our divisions of North and South are deep, and while it once may have been about clan, natural resources and geography are now created in town halls and Government. Britain has been carved into zones: the important, wealthy, cultural and creative areas are well fed and nurtured, while the zones of those whose ancestors toiled in the mines, mills, docks and shipyards exist solely to feed consumerist greed. They need jobs and global capitalism needs workers.Also on rt.com The Culture War is nothing but a bourgeois distraction from the only war that really matters – Class War
But now these places are no longer split only by geography, the poor of the South are just as exploited as those in the North. The division between them has been carved by the gerrymandering of wealth by the elite in Westminster and the City. While it may be romantic to think of a great North-South divide, it’s also no longer correct. Our social historical and economic geography is far more complex – and yet, at the same time, depressingly predictable.
In the past, the mill owners, the mine moguls and the shipyard entrepreneurs had family and ancestral homes all over the United Kingdom and townhouses in London – just as the bankers and brokers of today have their penthouses and countryside pied-à-terres. The booming voices of those with power have always been able to tell their own stories of success while moving freely around the country to have the best of all worlds. If you want to know where and how our country is divided, simply look to those who are unable to move and those you cannot hear.
Like this story? Share it with a friend!
The statements, views and opinions expressed in this column are solely those of the author and do not necessarily represent those of RT.
|
<urn:uuid:3fd93c4d-c20d-4a0a-8a80-0ecc6b742eb5>
|
CC-MAIN-2022-33
|
https://www.rt.com/op-ed/503476-north-south-divide-oppressed-britian/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00625.warc.gz
|
en
| 0.96255 | 1,353 | 2.578125 | 3 |
Japan has a wide variety of dishes that are well-loved by many people around the world. However, these foods come with common norms and customs which people should follow. Following local etiquette demonstrates manners and respect. These etiquettes are followed by using certain components, such as the proper way of sitting down, using chopsticks, and honoring the gestures in eating.
To prevent awkward situations from happening, top Japanese chefs taught certain tips and manners in eating special Japanese foods the proper way.
Sushi (寿司) is a well-known food around the world. It is delicately prepared and served during special celebrations or even normal occasions.
Eating it comes with unique table manners and rules which should be followed, especially if you’re eating in high-class restaurants. Most of these manners are not found outside of the country, but must be considered if you’re eating in a Japanese restaurant.
- It is said that if you visit a sushi restaurant, it is best not to wear any perfume as it could ruin the flavor for other guests.
- It is also advisable to turn off your cell phone in order not to bother other guests. Conversations should be quiet and polite as much as possible.
- It is also not good to make on-the-day cancellations, as sushi chefs prepare the day’s ingredients in the morning.
- Once you are in the restaurant, the chefs will ask you whether you will do the ordering (okonomi; お好み) or they will choose for you (omakase; おまかせ). You will also be asked whether you have any food allergies. Also, remember that if you’re going to order tuna, you’ll usually be given three types: lean, marbled and fatty.
- Once the sushi has been served, you have to eat it with chopsticks. First, flip the sushi sideways. Lift it with chopsticks, dip it in soy sauce and enjoy.
- You can also eat sushi with your hands. All you have to do is to hold the sushi between your thumb and two index fingers. Dip it in soy sauce and raise it to your mouth. Each shop has its own style. In some restaurants, sushi rolls are topped with soy sauce so there’s no need to dip it in.
- The aroma of seaweed is fuller when fresh, so sushi rolls are best eaten right after they are served. On the table, you can probably see ginger marinated in vinegar. It is kept dipped in soy sauce before slicing, and is eaten between sushi servings to cleanse and refresh the palate.
- Sushi is served in the sequence that chefs think are best. Sushi with nitsume sauce (煮詰め) is usually served towards the end. It is at this point that chefs ask their guest if they’d like to have more sushi. Of course, if you feel full anytime during the course, you can always let the chef know.
People often get mixed up between sukiyaki (すき焼き) shabu-shabu (しゃぶしゃぶ). They are actually two different types of Japanese dishes which are prepared and cooked at the tableside. They are similar in style as they both use thinly sliced meat and vegetables which are served with a dipping sauce. The main ingredient in sukiyaki is beef.
Usually, restaurants include the following ingredients: Chinese cabbage, potherb (水菜), onions, kudzu starch noodles (くずきり), grilled tofu (焼き豆腐), shiitake and enoki mushrooms. Ingredients vary by region and restaurant. Some restaurants use shaved burdock (ゴボウ) or crown daisy (春菊) rather than potherb. It is also the choice of the restaurant to choose whatever vegetables they like.
Here are some important things to remember if you eat at a sukiyaki restaurant.
- A waitress makes the sukiyaki at your table and serves it to you, so you don’t really need to do anything.
- At a self-serving sukiyaki restaurant, tori-bashi (long chopsticks; 取り箸) are used, as it is more polite than using chopsticks that touched your mouth.
- Sukiyaki is eaten with raw egg. You just have to mix the egg in a small bowl, then dip the beef in after it has been cooked. It is the warishita sauce (割り下) which makes the food salty. Many foreigners are reluctant to eat raw egg. You don’t need to worry as Japanese eggs are very fresh!
Shabu-shabu is a hotpot dish of meat and vegetables in konbu dashi (昆布だし) or stock made from kelp. The name “shabu-shabu” comes from the sound chopsticks make when stirring meat in the pot.
First, you have to dip the ingredients in ponzu (citrus soy sauce; ポン酢) or goma-dare (sesame sauce; ごまだれ) before eating. Placing thinly sliced beef in boiling konbu dashi removes excess oil and lightens the taste. Buri (yellowtail; ブリ), chicken or pork can be used in place of beef. In the past, hot charcoal was placed in the hole to heat the pot.
- An akutori (sieve-like long spoon; アク取り) is used to skim impurities from the broth that rise to the top from the meat and vegetables. Skimming them off keeps the flavor fresh and pure.
- Toribashi are used while cooking. These are long chopsticks which are used to place the meat and vegetables in the pot.
- First, you have to blanch the meat in the broth until it’s pink. Overcooking stiffens the meat. The pink color is an indicator that the food can be eaten.
- Since the meat is unseasoned, you have to dip it in ponzu or goma-dare. Rich goma-dare is delicious, but ponzu is really fresh. Try both, as they offer different but very delicious flavors.
- Don’t drink the shabu-shabu stock afterwards (like you might do with ramen).
Sticky white rice is a staple in Japan and is served as a side dish in a small chawan (bowl; 茶碗) with most meals. Rice has its own set of rules which you should master as soon as possible.
- Hold the bowl up near your chin, and pick up the rice with chopsticks. It is much more elegant than having the bowl on the table.
- Never dump sauce into your rice. It is meant to be eaten separately from other parts of your meal.
The abundance of delicious edibles in the Japanese land and sea has given rise to the country’s rich food culture. There are a few other varieties of dishes which require proper manner and etiquette when cooking and eating in the country. Some of these may not be obvious upon being served. A great tip is to observe how people around you are eating. If you’re still unsure, ask!
If you’re planning on staying in the country and would love to try these Japanese dishes, always remember the above tips so you won’t get funny looks from other people. With proper etiquette and peace of mind, you’ll get to enjoy Japanese food like a native!
|
<urn:uuid:222db964-ebcf-4354-a0d6-ebec50b19e10>
|
CC-MAIN-2018-39
|
http://jpninfo.com/68421
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155814.1/warc/CC-MAIN-20180919004724-20180919024724-00554.warc.gz
|
en
| 0.959765 | 1,624 | 2.53125 | 3 |
Using a diet journal is an excellent way to track calories (and exercise) for weight loss or weight gain, and it helps determine if you're getting a good balance of essential nutrients. You can reap numerous benefits from using a food journal, so it's useful to have a printable outline to help you get started.
Printable Diet Journal
To get started using a food diary, click on the image of the diary to the left and print it. Print additional pages for each week. If you need help, use this Guide for Adobe Printables.
Using the Journal
To use the journal, on a daily basis, record:
- Everything you eat for each meal
- Portion sizes
- Calories for each portion
Knowing how many calories you need daily helps you set daily calorie goals when using diet journals. The Dietary Guidelines for Americans 2015 suggest adult women need 1,600 to 2,400 calories daily, and men often require 2,000 to 3,000 calories (depending on age and activity level) per day to maintain healthy weights. For weight loss, women should aim for 1,200 to 1,500 calories and men should shoot for 1,500 to 1,800 calories daily, recommends the National Heart, Lung, and Blood Institute.
Determining Calories in Foods
There are several ways you can find out how many calories are in the food you're eating. The first is to read the food label, if there is one. On it, you'll see the number of calories present in one serving, or portion, of food, as well as what is considered a serving size. If you're eating out or the food doesn't come with a label, use the U.S. Department of Agriculture's Food Composite Database or Food Tracker to determine the number of calories in the food you're eating. Alternatively, try a calorie-tracking app, such as FitDay.
Journal for Health
Use this journal to keep track of your foods. Keeping a diet journal can help you to make healthier, more nutritious choices for the foods you eat.
|
<urn:uuid:ed96e747-a9d2-493f-9260-d6aa696ce169>
|
CC-MAIN-2018-26
|
https://diet.lovetoknow.com/diet-fitness/free-diet-journals
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863411.67/warc/CC-MAIN-20180620031000-20180620051000-00410.warc.gz
|
en
| 0.923245 | 421 | 2.828125 | 3 |
Ernest Orlando Lawrence founded his Berkeley laboratory in 1931, basing it on the concept of team science in which physicists, engineers and others pooled their expertise to develop and deploy unique experimental facilities. Computing Sciences staff carry on this heritage by working closely with scientists to understand their challenges, map future strategies and develop the applications and resources needed to meet those challenges. For example, staff from ESnet and NERSC meet regularly with scientists in each of the DOE Office of Science program offices to learn about future directions, determine the necessary resources and then develop long-range plans to deploy those resources in a timely manner.
In the Computational Research Division, teams of applied mathematicians and computer scientists work with domain scientists to develop algorithms for studying problems such as climate change, combustion, environmental remediation, understanding the size and age of the universe, and creating cleaner sources of energy. And just as these tools help advance scientific discovery, developing the methods also drives the advancement of applied mathematics and computer science.
|
<urn:uuid:7aefe9b9-7aa4-4b06-b60b-f6a3f73652e1>
|
CC-MAIN-2015-11
|
http://cs.lbl.gov/research/science-engagement/
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463444.94/warc/CC-MAIN-20150226074103-00325-ip-10-28-5-156.ec2.internal.warc.gz
|
en
| 0.937646 | 199 | 2.828125 | 3 |
You are here
You're on the Team: Shared-Decision Making for Providers
Treating a mental health condition is a partnership. Your patient depends on your empathy, knowledge and skill. You depend on your patient to give you complete and accurate information, work with you to develop a treatment plan and stay engaged and motivated. Shared decision-making is one technique for strengthening the partnership and providing better care.
In addition to its use in outpatient psychiatric treatment, which is the focus of this website, shared decision-making can be used in other kinds of mental health treatment, including hospital care, psychotherapy and case management. It can be used as well by providers and consumers of other mental health services.
Shared decision-making is a process that leads to a mutual decision by doctor and patient on what course of treatment to follow and what steps the patient needs to take to enact his or her plan.
There is no single, agreed-upon definition of shared decision-making. However, shared decision-making can be defined as "an interactive, collaborative process between providers and consumers that is used to make health care decisions, in which at least two individuals work together as partners with mutual expertise (professional and experiential) to exchange information and clarify values in relation to options and thereby arrive at a discrete decision."
As a process, shared decision-making begins with mutual education. The patient educates the doctor on symptoms, complaints, other health issues and their personal goals and preferences. The doctor educates the patient on diagnosis, treatment options and the risks and benefits of each option. Exploration follows: The patient discusses their reactions to the options offered and any concerns about them. The doctor provides additional information and recommendations based on the patient's input. Finally, doctor and patient arrive at a mutually agreed upon course of action by the patient and the next steps to be taken.
Shared decision-making recognizes that there are often several treatment approaches and options, that each one has potential risks and benefits, and that the patient's values, goals and preferences influence their choices. It also recognizes that patients are usually free to decide whether or not to follow a doctor's advice.
Shared decision-making has been described as model of medical care that falls between the traditional (paternalistic) model in which the doctor is the primary decider, and the informed choice model, in which the consumer actively controls the information exchange and decision-making.
Shared decision-making requires the willing participation of both doctor and patient. The doctor must be willing to involve the patient in decisions, consider their reservations and concerns and acknowledge their expertise about their own lives. The patient must want to take an active role in their own care and assume responsibility for choices. Thus, the process can place new and perhaps unaccustomed demands on both parties. It may not be appropriate or welcomed by all patients or by all physicians.
Shared decision-making should not be overwhelming. Exploring options, potential risks and benefits can happen over a series of visits as your patient learns more about their condition and treatment. Patients can educate themselves outside of appointment time through support groups, peer-run programs or the Internet.
Shared Decision-making in Mental Health Care: Overview and Current Status. Celia E. Wills, Melody Reifer, Carole Schauer, and Paolo del Vecchio. In Shared Decision-Making in Mental Health Care: Practice, Research and Future Directions, p. 47. Substance Abuse and Mental Health Services Administration, 2007
Ibid., p. 47.
Ibid., p. 49.
|
<urn:uuid:c64076fe-0f64-4efb-8f32-43b2ebaee455>
|
CC-MAIN-2018-09
|
http://www.mentalhealthamerica.net/youre-team-shared-decision-making-providers
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891807660.32/warc/CC-MAIN-20180217185905-20180217205905-00383.warc.gz
|
en
| 0.950084 | 726 | 3.453125 | 3 |
|The Simple English Wiktionary has a definition for: jihad.|
Jihad is an Arabic word meaning "to struggle". Muslims (believers in Islam) use this word to talk about defending the faith and protecting their family and nation, as well as defending innocent people. It can also mean fighting with yourself to become a better person. It is an official part of Shi'a Islam, but it is not an official part of Sunni Islam, though some call it the sixth pillar of Islam. In some cases, there have been 'Jihads' that have self immolated themselves, in order to get into heaven. There are suicide bombers, who blow themselves up, because they think that it is right and that they are cleaning the world's filth. This is, however, wrong in Islam. It is a major sin to commit suicide or homicide. Killing another human being in Islam is the equivalent of killing all of humanity. On the contrary, saving another human being's life is the equivalent of saving all of humanity.
|
<urn:uuid:0efacda8-51c0-4aad-b753-0468456ef2e8>
|
CC-MAIN-2017-30
|
https://simple.wikipedia.org/wiki/Jihad
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423222.65/warc/CC-MAIN-20170720141821-20170720161821-00011.warc.gz
|
en
| 0.972227 | 210 | 2.546875 | 3 |
Oxford Dictionaries announced 'nari shakti’ as its Hindi Word of the Year for 2018 yesterday. Derived from Sanskrit, 'nari’ means women’ and 'shakti’ means power’. Today the term is used to symbolize women taking charge of their own lives. The Hindi Word of the Year is a word or expression that has attracted a great deal of attention and reflects the ethos, mood, or preoccupations of the past year.
In 2018, there is no question that 'nari shakti’ has risen to effect change, working to enshrine women’s rights and ensure that all women across the Hindi-speaking world and beyond are empowered.
This is why 'Nari Shakti' has been chosen as Oxford’s Hindi Word of the Year.
How did 'nari shakti’ become highly used in India in 2018?
1. 'Nari shakti’ drew focused attention in 2018, largely thanks to efforts by the Government of India and Hindi speakers nationwide to realize aims for inclusive development.
2. This has led to new initiatives being established, existing laws being revised, and the championing of the #MeToo campaign which has helped facilitate women’s rights and empowerment across all areas of Indian society.
3.March 2018 recorded a large spike in the use of nari shakti’ as discussion arose around the Government of India’s Nari Shakti Puraskar (Women Power Award) held on the International Women’s Day.
Recognizing exceptional achievement by women who have broken stereotypes and chartered new paths in their contributions to society, the awards sent the tone for the rest of the year with the use of 'nari shakti’ gaining greater momentum.
5. Supreme Court decisions boosting the use of 'nari shakti’: Two major decisions taken by the Supreme Court also significantly contributed to the prominence of 'nari shakti’ in 2018 a ban on 'triple-talaq’, the controversial Islamic practice of instant divorce’, and the taking down of a rule that disallowed girls and women entry to the Sabarimala temple in Kerala.
6. Other impactful changes empowering women included:
- the lifting of the ban on women going to Haj without a Mehram or male companion
- women being accepted into inter-combat roles in the armed forces
- the expansion of the hugely successful government sponsored Beti Bachao, Beti Padhao (Save the girl child, Educate girl child) campaign
- the opening of 200 one-stop centres to help women facing violence across the country
- and the opening of a universal helpline dedicated to forming international alliances to tackle cybercrime and the online harassment of women head-on
Who were involved in selecting the Oxford Dictionaries Word of the Year 2018?
The Word of the Year was formally announced on Saturday, January 26, at the Jaipur Literature Festival where it was subject of a panel discussion with Saurabh Dwivedi, journalist, Editor-in-Chief of thelallantop.com and former Associate Editor at AajTak, Neelesh Misra, founder of Gaon Connection and former Deputy Executive Editor of the Hindustan Times, Geetanjali Sree, author and playwright, Rakshanda Jalil, award-winning translator, critic, and literary historian, Pravin Kumar, assistant professor of Hindi at the University of Delhi, and Akhil Katyal, teacher in creative writing at Ambedkar University, Delhi.
The Hindi Word of the Year was chosen by the Oxford Dictionaries team in India with the help of an advisory panel of language experts:
- Ashok Kumar Sharma is a Hindi Language Champion and Advisor at the Public Relation Society of India
- Kritika Agrawal is a Hindi Language Champion, Lawyer (Oxford), polyglot, and Indian language expert
- Namita Gokhale is writer, publisher and festival director. She is the author of 16 works of fiction and non-fiction, and co-founder and co-director of the Jaipur Literature Festival and Mountain Echoes, the Bhutan Literature Festival
- Randhir Thakur is Associate Commissioning Editor, Hindi, Oxford University Press India
- Saurabh Dwivedi is a Journalist, Editor in Chief of thelallantop.com and former Associate Editor AajTak
- Vijay Nandan is a Hindi Language Champion, freelancer, writer and translator
’Nari Shakti’ or women power is reflective of the renewed power of women that came to the fore in 2018, said Oxford Dictionaries Language Champion, Kritika Agrawal
It is representative of the courage that women derived and the feeling of sisterhood which was stronger than ever before. It is a sentiment, and that sentiment is being carried forward in 2019. Nari Shakti is a movement involving both men and women, and a reminder that we need to keep fighting the good fight, she added.
Word selection panellist, Namita Gokhale said: Nari Shakti’ encapsulates the spirit of our times, with all its struggles, challenges, and triumphs.
What is the Oxford Hindi Word of the Year?
Oxford Dictionaries: As part of our ongoing research into modern Hindi we are undertaking a search for an Oxford Dictionaries Hindi Word of the Year (HWOTY). The Hindi Word of the Year will be a word, phrase, or expression that has attracted a great deal of interest over the last 12 months. The word chosen should reflect the ethos, mood, or preoccupations of the year.
The HWOTY need not have been coined within the past twelve months and it does not have to be a word that will stick around for a good length of time: it is very difficult to predict accurately which new words will have staying power.
While the HWOTY has great resonance for the year in which it was chosen, it doesn’t mean that the word will automatically go into any Oxford dictionaries.
Why have you chosen Hindi, not other Indian languages?
OD: We’ve recently made our Hindi dictionary available online at hi.oxforddictionaries.com and so we have a large number of users who are able to help us with our search for a Hindi Word of the Year.
In future years, we might also look for a Word of the Year in other Indian languages.
How can Oxford decide what the Hindi Word of the Year should be?
OD: Oxford has been creating dictionaries for over 150 years and our dictionary editors in India and around the world have developed expertise in monitoring how language is used by real people.
To further supplement our research we’re both calling on Hindi speakers across India to send us their Word of the Year suggestions and consulting with a panel of experts from a range of backgrounds.
How were the advisory panellists chosen?
OD: The members of advisory panel were invited to be part of Hindi Word of the Year (a voluntary role) because they have knowledge and expertise that enables them to make a contribution to the selection process.
We’re delighted to have such an exceptional group of people involved with Oxford Word of the Year.
About Oxford Dictionaries
Oxford Dictionaries is part of Oxford University Press (OUP). Our mission is to provide reliable, evidence-based, up-to-date dictionaries. We are dedicated to improving communication through an understanding of, and a passion for, language.
We’ve been making dictionaries for more than 150 years and we continue to innovate, developing new tools and services as they are made possible by new technologies.
About Oxford University Press
Oxford University Press is a department of the University of Oxford. It furthers the University's objective of excellence in research, scholarship, and education by publishing worldwide.
Established in 1912, OUP India has grown to be one of the largest publishers in the region, with a strong presence in India and the neighbouring countries, including Nepal, Sri Lanka and Bangladesh. Headquartered in Delhi, it has regional offices in Delhi, Kolkata, Chennai and Mumbai.
|
<urn:uuid:cf190919-345d-46c5-8d30-9e45cc9adb09>
|
CC-MAIN-2020-10
|
https://www.indiatoday.in/education-today/grammar-vocabulary/story/-nari-shakti-or-women-power-is-the-oxford-dictionaries-hindi-word-of-the-year-2018-1440206-2019-01-27
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143805.13/warc/CC-MAIN-20200218180919-20200218210919-00420.warc.gz
|
en
| 0.946223 | 1,730 | 2.59375 | 3 |
The Ashurst vamping horn is one of only six to have survived in England.
It is more like a megaphone than a musical instrument. It was used in Ashurst church to lead the choir. Mrs W Dumbrell recalled in 1955 that her grandfather used to "play" the vamping horn to amplify his voice and lead the singing of hymns and psalms. The horn is made from tin plate. It is about 2ft 7ins long. About eight inches from the widest end there is a mesh of wires.
The vamping horn was invented in 1670 by Sir Samuel Moreland. He demonstrated it to King Charles II in the Mall, who heard him clearly at 850 yards. The King ordered some for his ships and three very large ones for his castle at Deal. Originally vamping horns were used as megaphones for communication at a distance over one mile and for public address such as fire alarm, parish events and the banns of marriage. Some were up to seven feet long. Vamping horns were adapted for use by church choirs but fell into disuse as organs were installed in village churches towards the end of the 19th Century.
The Ashurst vamping horn itself tells us "Palmer fecit, 1770" (Made by Palmer, 1770). The painting on the horn and the inscription "Praise him upon the strings and pipes" is 20th Century. It is on loan to Steyning Museum from the parish church of St James, Ashurst, where a replica is on display.
|
<urn:uuid:4901fa81-3077-4e49-b034-a460b8082228>
|
CC-MAIN-2014-23
|
http://steyningmuseum.org.uk/exhibits/exhibits10.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997891176.68/warc/CC-MAIN-20140722025811-00096-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.988804 | 317 | 3.546875 | 4 |
When you began French classes, you were enthusiastic. You spent time to read your vocabulary out loud and do your exercises. Time flew by and you began to spend less and less time on your French between classes. One day, you realized that the French class was particularly difficult and you began to think of giving up. You think you’re too busy to continue. You have your work, your family and other activities…
Stop thinking in this way. It’s the trap where most of the language students fall but YOU are different. You love the French language so you should find time to catch up and work on your lessons between the classes.
It’s important to know that most students think of giving up from time to time but it doesn’t mean that they really do it. It’s not by giving up that you will find satisfaction and reach your linguistic goals to make your dreams come true.
First, take your calendar and ask yourself the following questions:
- What time am I most available to study?
- What day could I study?
You just need to find one hour or two per week. The time that you need must be estimated according to your level and the amount you have to catch up.
To be really efficient, two separate hours are better. You study and learn a first time during the first hour and you check what you memorized and reinforce your learning during the second hour.
To make this study moment attractive, you can organize a setting for your French studies:
- French music as a background (not too loud, of course)
- If you study in the morning, bake some frozen croissants and drink a good coffee while studying.
- If you study in the evening, drink a glass of French wine (only one!) while you’re studying.
If other people in your group have problems to be motivated, get together once a week in a café or at somebody’s place to study together and help each other.
Don’t hesitate to speak about your problems with your teacher, he / she will guide you and help you get caught up and find pleasure in French again. It’s the job of a teacher to give you tips and organize his/ her class to review vocabulary and grammar. If you have problems, other students probably have problems too. Consequently, by speaking about your concerns, you can help other people!
Don’t think more, go to the supermarket and buy croissants and wine. Enjoy your French moments alone or with some other students from your group!
If you read this article until the end, you may be interested in this one:
|
<urn:uuid:76d810d8-ebec-4a79-b1e4-db28a63e7d18>
|
CC-MAIN-2018-17
|
http://califrenchlife.com/author/califr6_wp/page/2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945552.45/warc/CC-MAIN-20180422080558-20180422100558-00385.warc.gz
|
en
| 0.96884 | 549 | 2.515625 | 3 |
For each essay and review, these editorial notes consist of two parts: a headnote and annotationsthe purpose of each headnote is to designate the text of the essay or review upon which the present edition is based, to describe and discuss textual matters, and to provide a general context for the essay or review and the ensuing annotations. Issue 7 /february, 2017 chaucer, geoffrey 1992 canterbury tales outside of the national framework means for barclay that the films produced under the. Sfo spring 2014, author: adriana meet some deeply rooted needs of human society,” wrote peter berger in the canterbury tales — by geoffrey chaucer. Geoffrey chaucer (c 1340-1400 critical introduction by thomas humphry ward: that the framework of the canterbury tales was suggested by the decameron. The canterbury tales, by geoffrey chaucer the stories constitute a critique of english society one can deduce that they were put together using framework.
Geoffrey chaucer (1343 - 25 october these tales would help to shape english literature the canterbury tales contrasts with that the framework of the. The trait of pride reached a sort of thematic culmination in the old english framework serving as a halo canterbury tales by geoffrey chaucer and sir. Anthology of english literature the new chaucer society lord protector canterbury tales geoffrey chaucer hath a framework and to. Canterbury tales ~ geoffrey chaucer ~ part it was extremely important that chaucer wrote his tales in english, since the founding of the chaucer society in.
A survey of english literature chaps 1-8 intro and anglo-saxon literature and chaucer 20 v chaucer, general prologue to canterbury tales. Gre subject test: literature in english notes study canterbury tales chaucer and the philosophy of clothes poured forth in. Geoffrey chaucer ideals of the time it forms a complement to chaucer's canterbury tales great landmark in english poetry after chaucer,.The naked text: chaucer's legend of good women early english text society gp general prologue, canterbury tales hcq. Canterbury pilgrims chaucer devised the framework of a iii the canterbury tales geoffrey chaucer they are a microcosm of 14th-century english society. Drawing on feedback from thousands of educators around the world who have used the ubd framework since its geoffrey chaucer the canterbury tales. Fighting words: examining language and violence in and geoffrey chaucer’s the canterbury tales the social framework of a civilized society the english. Research paper the satire and humor in chaucer’s canterbury tales until geoffrey chaucer wrote the canterbury tales, as long as liquor was poured,. Скачать ^ laghamon's 'brut' thus it had come about that arthur, originally the national hero of the welsh, and the deadly foe of the english, was adopted, as a christian champion, not only for one of the medieval nine worthies of all history, but for the special glory of the english race itself. To chaucer's canterbury tales came to chaucer from france old english literature was the canterbury pilgrimage as a framework in which.
I felt this method was necessary because a western analytic framework could once again native english canterbury tales (geoffrey chaucer,. 01-geoffrey chaucer_英语考试_外语学习_教育专区。英国文学 geoffrey chaucer (c1340-1400) 0 general introduction geoffrey chaucer is by far the best-known poet of the english middle ages, and it is primarily in the canterbury tales that his fame rests his lifetime (c1340-1400. Free giants in fairy tales papers, essays, folktales, legends, they have been poured upon us from a seemingly inexhaustible horn of plenty since the days of the.
Geoffrey chaucer: the canterbury tales (prologue) 1 2 out of wantonness, to make his english soft upon his tongue and when a deal of wine he'd poured. Search expatica jobs for a selection of english speaking and multi language jobs in sales, it and other industries jobs are currently available in berlin,. People of the middle english period – geoffrey chaucer, canterbury tales” chaucer introduced a rhythmic of english literature 4 chaucer was by. Catholic encyclopedia (1913)/england the arms of the english sees of canterbury college into a catholic society among english catholics most.
Library catalog faith libraries good news bible: the bible in today's english version: oslc hans andersenís fairy tales. Geoffrey chaucer died in 1400 without bringing his had contributed their own additions to chaucer's canterbury tales, english society. Cambridge core - european studies which brought together a range of tales that either focused benoit sets up an elaborate framework for the process of.Download
|
<urn:uuid:69d7298b-3324-4f74-ae8f-0f0a15c501e1>
|
CC-MAIN-2018-39
|
http://fgcourseworkligj.northviewtech.us/the-framework-of-english-society-poured-in-the-canterbury-tales-by-geoffrey-chaucer.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160923.61/warc/CC-MAIN-20180925024239-20180925044639-00122.warc.gz
|
en
| 0.920248 | 1,086 | 2.84375 | 3 |
Step 1: Learn
There are many children who overcome the negative effects of experiencing domestic violence. As caring adults, we can use our words and actions to help children learn positive coping skills and inspire hope in their lives.
Here are some examples of ways you can inspire hope in the lives of children experiencing domestic violence:
- Remember children and teens have different strengths that foster their ability to succeed.
Experiencing negative events may bring out an inner strength and lead to positive growth for some children. Helping children and teens think and reflect on their experiences can help reshape their understanding of it and change the way they see themselves and others. You might say, “I understand and believe you. I am here to listen if you want to talk. I am sorry you’re going through this but you’re not alone. Many other children are going through the same thing. Remember it’s not your fault. Also, it’s not your job to stop the violence. You can’t control what is happening in your home, but you will be able to control what you do when you get older. You can choose a different path.”
- Focus on the positive by highlighting all the wonderful qualities of a child or teen.
For example, their academic or athletic achievements, their sense of humor, or their kind and caring personality. This may help boost their self-esteem. It also lets the children know that they do have qualities others see and appreciate. You might say, “You know, you are so smart and you’re great at math! I bet one day you will be a great engineer or architect. Keep up the great work!” or “I see your leadership qualities and you also have a gift for writing. You could become a great journalist someday. I encourage you to pursue these wonderful gifts.”
- Share the stories of President Bill Clinton, Halle Berry, and Christina Aguilera.
These stories help children and teens see that experiencing domestic violence does not have to define who they are. These stories can show children and teens that they can choose a different way of life. You might say, “Some very successful people, like former President Bill Clinton, Halle Berry, and Christina Aguilera went through what you’re going through when they were children. When they grew up, they chose to not use violence and anger but to be kind to others and went on to live wonderful, very successful lives.” Go to the Children of Domestic Violence website (cdv.org) to view President Clinton’s story and stories of other people who have experienced domestic violence as children and have risen above it to have successful and satisfying lives.
- Specific words of hope and encouragement.
“It isn’t your fault”
“You have had to overcome obstacles that other children never had to”
“A child is never responsible for the actions of an adult”
“I hear you”
“It’s not your job to stop it”
“I believe you”
“You’re not alone”
|
<urn:uuid:2ca3688c-0e4c-4bf3-9842-6b2f77190e40>
|
CC-MAIN-2022-33
|
https://cdv.org/step-4-help/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00072.warc.gz
|
en
| 0.962966 | 669 | 3.34375 | 3 |
The Importance of Physical Activity for All Americans
Dominique Dawes, Three-time Olympic gymnast, motivational speaker and Co-chair of the President’s Council on Fitness, Sports & Nutrition
Obesity impacts more than just the waistbands of Americans – life expectancy, health, medical spending, and productivity are all affected by the weight of the nation. If recent trends continue, experts predict all adults will be overweight or obese by 2048. The statistics are equally as startling when it comes to youth – one in every three youth are overweight or obese. Overweight adolescents have a 70 percent chance of becoming overweight or obese adults.
Without regular physical activity and good nutrition, these trends likely will not reverse. That is why the President’s Council on Fitness, Sports and Nutrition (PCFSN), within the U.S. Department of Health and Human Services, works every day to promote physical activity and healthier lifestyles among all Americans regardless of age, background or ability.
The benefits of physical activity include a lower risk of premature death, lower rates of disease – including heart disease, stroke, hypertension and cancers of the colon and breast – and improved cognitive capacity.
In fact, physical activity among children not only helps them stay healthy, but studies show that it can also enhance important skills like concentration and problem solving, which can improve their academic performance. PCFSN highlighted this important message in our recently released public service announcements targeting parents and caregivers, which featured President’s Council co-chair Drew Brees (NFL quarterback) and myself.
Other PCFSN programs promote physical activity for a wide range of audiences – from Joining Forces (service members and their families) to I Can Do It, You Can Do It! (persons with disabilities) to a collaboration with the President’s Challenge (Presidential Youth Fitness Program for students and the Presidential Active Lifestyle Award for all ages).
Visit the new home of PCFSN at Fitness.gov to learn more about its initiatives, including the physical activity initiative to inspire youth in your community to get active and tips for getting active at any age. For example, Council members highlight their own tips for staying physically active:
- “Make exercise a family affair. Physical activity is more than the gym and classes. Dancing, walking or ice skating with your family provides great physical activity opportunities, and is a great way to spend time with your loved ones.” –Cornell McClellan, trainer to the First Family
- “When it comes to fitness, you never have to go it alone. Grab a friend! I climbed Kilimanjaro with my daughter and exercise in the mornings with colleagues from work. By sharing time spent being active, we receive much-needed support that helps us reach our goals.” –Dr. Risa Lavizzo-Mourey, CEO of the Robert Wood Johnson Foundation
- “Find a way to build physical activity into your daily routine. I led the development of a 2,000 square foot employee wellness center in our district office, but we could not hire anyone to open it. I volunteer to open the wellness center at 6 a.m. so that my colleagues and I can in get our workouts before the workday starts.” –Dr. Jayne Greenberg, district director of physical education and health literacy for Miami-Dade County Public Schools (Fla.)
|
<urn:uuid:c3581e6c-f03c-4e3a-a86d-1d14cfca94f4>
|
CC-MAIN-2015-11
|
http://www.fitness.gov/blog-posts/importance_physical_activity_all_americans.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462313.6/warc/CC-MAIN-20150226074102-00167-ip-10-28-5-156.ec2.internal.warc.gz
|
en
| 0.938016 | 691 | 3.0625 | 3 |
Killwach is a name of ancient Anglo-Saxon
origin and comes from a family once having lived in Kilnwick or Kilnwick Percy in the East Riding of Yorkshire
. They are now found in Humberside, a new county formed after the reorganization of local
government in England
in 1974. The place-name is based on the Old English personal name
Cylla, and means "farm of a man named Cylla." CITATION[CLOSE]
Mills, A.D., Dictionary of English Place-Names. Oxford: Oxford University Press, 1991. Print. (ISBN 0-19-869156-4)
Kilnwick was recorded as Chileuuit CITATION[CLOSE]
Williams, Dr Ann. And G.H. Martin, Eds., Domesday Book A Complete Translation. London: Penguin, 1992. Print. (ISBN 0-141-00523-8)
in the Domesday Book
in 1086, and as Killingwic
in the 12th century. Kilnwick Percy was named Chelingewic
in 1086, as is recorded in the Domesday Book
. The surname means "of Kilnwick."
Early Origins of the Killwach family
The surname Killwach was first found in Yorkshire
at Kilnwick (or Kilnwick-on-the-Wolds), a village and parish in the Yorkshire
Wolds. "Many provincial dialects drop the final N of Kiln; and the W in the termination, as in War(w)ick, Nor(w)ich." CITATION[CLOSE]
Lowe, Mark Anthony, Patronymica Britannica, A Dictionary of Family Names of the United Kingdom. London: John Russel Smith, 1860. Print.
Early History of the Killwach family
This web page shows only a small excerpt of our Killwach research.Another 171 words (12 lines of text) are included under the topic Early Killwach History in all our PDF Extended History products and printed products wherever possible.
Killwach Spelling Variations
The English language only became standardized in the last few centuries; therefore, spelling variations
are common among early Anglo-Saxon
names. As the form of the English language changed, even the spelling of literate people's names evolved. Killwach has been recorded under many different variations, including Killick, Killwick, Killik, Killicke and others.
Early Notables of the Killwach family (pre 1700)
More information is included under the topic Early Killwach Notables in all our PDF Extended History products
and printed products wherever possible.
Migration of the Killwach family to the New World and Oceana
For many English families, the political and religious disarray that shrouded England
made the far away New World an attractive prospect. On cramped disease-ridden ships, thousands migrated to those British colonies that would eventually become Canada and the United States. Those hardy settlers that survived the journey often went on to make important contributions to the emerging nations in which they landed. Analysis of immigration records indicates that some of the first North American immigrants bore the name Killwach or a variant listed above: James Killicke settled in Virginia in 1648.
|
<urn:uuid:28230344-80c1-4ca3-a709-f59ffe4800c4>
|
CC-MAIN-2018-17
|
https://www.houseofnames.com/killwach-family-crest
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946165.56/warc/CC-MAIN-20180423184427-20180423204427-00586.warc.gz
|
en
| 0.903637 | 688 | 2.90625 | 3 |
What level of government holds powers over forests and decisions affecting forests in mainland Tanzania? Which powers and responsibilities are centralized, and which are decentralized? What role can citizens play?
This report reviews the statutory distribution of powers and responsibilities across levels and sectors with particular emphasis on those relevant to REDD+. It outlines the legal mandates held by multiple levels of government with regard to land use decision and policy arenas affecting forests, as well as community land use, tenure and management.
The introduction describes REDD+ institutions in Tanzania. The second section provides an overview of the decentralization process, including government powers, financial resources and mechanisms for public participation. The third section outlines financial resource distribution mechanisms such as forest fees and PES. The fourth section details the specific distribution of powers and arenas of responsibility related to land use planning, land titling and administration, protected areas and various types of concessions. The fifth section discusses laws pertaining to community lands, land claims and PFM. The final section summarizes the role of key ministries in land use decisions relevant to REDD+.
The study was commissioned under CIFORs Global Comparative Study on REDD+, as part of a research project on multilevel governance and carbon management at the landscape scale. It is intended as a reference for researchers and policy makers working on land and forest issues in Tanzania.
Topic: REDD+, land use, legal system, climate change
Series: CIFOR Occasional Paper no. 147
Publisher: Center for International Forestry Research (CIFOR), Bogor, Indonesia
Publication Year: 2015
ISBN: 978-602-387-023-3Creative Commons Attribution 4.0 International License.
|
<urn:uuid:8e2e83f8-0ce6-424d-a657-4a05a4481b73>
|
CC-MAIN-2018-09
|
https://www.cifor.org/library/5908/the-distribution-of-powers-and-responsibilities-affecting-forests-land-use-and-redd-across-levels-and-sectors-in-tanzania-a-legal-study/
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812306.16/warc/CC-MAIN-20180219012716-20180219032716-00781.warc.gz
|
en
| 0.889266 | 341 | 2.96875 | 3 |
If you are an avid fisherman, then you will enjoy the following article and will find it beneficial when learning more about fishing.
If you plan on fishing a lot, then you will need a very sharp hook. If you can slightly scratch a fingernail with it, is is sharp enough. If not, you should replace the hook or sharpen it for best results.
Fish who eat insects find a lot of food in these places, as they’re easier to find food in, you may yield a lot of bites. Just be sure to watch out for the grass and weeds!
Your hook must be very sharp to catch lots of fish. If you neglect to do this, the fish are less likely to bite.
Be aware of the weather forecast before you begin fishing in an area. Getting caught in a severe storm in open water can be dangerous. In order to have the best fishing experience possible, view the weather forecast.
When you go fishing it can help you to bring sunscreen, it is important to apply sunscreen in any type of weather.The sunscreen will help you avoid getting sunburned while you are in the sun on the water can burn your skin badly.
Bass are prevalent in most areas and can be picked up fairly quickly. The fight that a bass gives while reeling one in makes fishing exciting for everyone.
Fishing should always be done responsibly. Fishing responsibly includes protecting the environment when fishing. Remember not to litter if you bring snacks and drinks along. You should also learn more about regulations on fishing and the number and kind of fishes you are allowed to take home with you. You should also release fish that are too small to eat.
Keep your eyes open for birds as you are fishing. Birds eat fish by diving down and they dive into the water. You will have a successful fishing trip if you fish where the birds congregate.
Don’t forget your basic gear when you go on a fishing trip.These essentials are dependent upon your location. In general, these basic essentials will include sunscreen, hats, and sunglasses for sun protection. If your travels take you to a remote area or on a boat, also pack a wireless phone, compass and cell phone.
Wet your hands before pulling a fish out of the water. This will keep the fish’ skin moist. Wetting your hands is especially important for catch-and-release fishing, when you should take the most care in returning the fish safely to the water.
Always check the weather as you never know when it could spoil your fishing trip. You do not want to be stuck in bad weather.
Do not choose a windy day for fly fish when it is too windy. You won’t cast accurately if it’s very windy outside.
Take care to know and adhere to any legal requirements for fishing in your chosen location. You might not be able to use certain bait within some areas, while other laws might prohibit fishing in certain bodies of water. Make sure to talk to local government officials, if you are not sure.
It is a terrible feeling to be stuck in the open water with no escape for many hours feeling nauseous. If you bring along a bit of medicine, such as carrying medicine or wrist bands, it’s much more likely that you’ll have an enjoyable trip.
Stay calm if you have a large fish. The fish will probably fight, but attempting to reel it in can break the rod.Set your drag to allow the fish to tire itself out so that you can reel it in with gentle ease.
Sea sickness pills are a must for any deep sea fisherman. Nothing can ruin a fishing trip faster than becoming nauseous and green. Your fishing experience will be more enjoyable if you bring your sea sickness medicine with you.
Bring a catching net along to every fishing trips. A net makes bringing in the bigger fish simple and struggling as you reel it in. This helps reduce the chance that your fish escapes from you into the water.
Pay attention to a fish you are fighting to catch.The jumps will become less energetic until your fish rolls over on its side. This is a sign that proves the fish is tired and ready to be pulled in.
Before angling in your chosen spot, make sure to obtain any licenses that are requires for fishing there. Each state has different licensing requirements, and you may choose from a license that is good for a year or for a shorter period.
Time of day and temperature are very important variables when it comes to fishing. Larger bass tend to come out just before sunrise and dusk. Just be certain the water temperature is higher than 50 degrees if you are fishing at these times.
Night fishing can provide a great way to change up the experience.The fish you can catch at night are a lot more different than the ones you would catch during the day.
Small-mouth bass and walleye may be rather picky when it comes to bait. Have a diverse arsenal by including leeches in your toolbox, as well. They will stay alive through the night in a Styrofoam container if you add a little water in the bottom.
Do not buy costly equipment when you are just learning how to fish.You shouldn’t buy an expensive rod when you’re a novice and end up losing or breaking it.
Don’t get discouraged if you don’t catch fish right away; stick with it. Patience is the most important part of good fishing.Stay for at least 30 minutes in any area before giving up on it.Many things can have an impact on the quality of fishing in a given area, and that includes the time of day when the fishing takes place, as well as the amount of activity in the area, etc.
Keep cool when you hook a big fish. Of course, it will try to escape! That’s to be expected. Do not reel in your fish as it tries to swim away. Sit back and let your reel’s drag do the work for you. Once the fish has been hooked, set your drag. Place your rod at a 45-degree angle relative to the water as you aim it at the fish.
For some people, the only thing that beats a day out on the water fishing, is spending an evening cooking your catch! With luck, you have gotten some good ideas about fishing from this article. The next time you cast your line, have this information in your mind.
|
<urn:uuid:efc0f71e-5a20-4902-80de-d2fd352d29b4>
|
CC-MAIN-2021-31
|
https://coybase.com/fishing-tips-and-tricks-for-the-novice-fisherman-4/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153392.43/warc/CC-MAIN-20210727135323-20210727165323-00455.warc.gz
|
en
| 0.950888 | 1,328 | 2.625 | 3 |
Maagh Maas 2020.
Maagh month is from 11th January to 9th February 2020 ,considered sacred and fortunate there are some ‘tithies’ which are of special significance. Makar Sankranti which generally falls in the month of Maagh is one of the very important period when various rituals are performed by the saints and Kalpwasis. The name itself suggests the transit of sun from Sagittarius to Capricorn.
1. Sankashta Har Ganpati Vrat which falls on the fourth day of the Krushna Paksh of the Maagh month of Lord Ganesh as Maaghi Chauth.
2. Ekadashi of this fortnight is also considered significant for fasting, prayers and offerings.
3 One of the most important event of the Maagh month is Mauni Amavasya in which bathing, offerings, prayers and fasting are all considered important on this day as it is believed that the gods and goddesses descend to take a holy dip at the confluence of Ganga, Yamuna and mythical Saraswati the PRAYAG TRIVENI SANGAM.
The other important day of ritual bath is Sampad Gauri Vrat Snan which falls on the first day of the Shukl Paksh of Maagh. It is done for happiness and fortune.
Similarly, on the third day Goddess Durga is specially prayed and invoked. It is also sometimes referred to as Lalit Vrat or Harkali Vrat where Lord Shiva is worshiped with Goddess Gauri together, it is also referred as Hartritiya Vrat.
On the fourth day Til Chaturthi even Uma Chaturthi is observed. The fifth day is meant to worship Lord Vishnu with Goddess Lakshmi. It is believed that the Goddess descended on earth on this day as per the desire of Lord Vishnu announcing beginning of the spring season and known as Basant Panchami.
Sixth and Seventh day are also important for fasting and ritual bath as Surya Saptami.
The Maagh month finally concludes on Purnima when sun enters the Shravan Nakshaktra. On this day Kalpwasis observe fast and perform rituals marking its conclusion.
|
<urn:uuid:cf1bff14-a489-4c79-997e-b89d178a2ec7>
|
CC-MAIN-2022-49
|
https://v5.shrinathdham.com/tithi-tyohar/maagh-maas-2020/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711200.6/warc/CC-MAIN-20221207153419-20221207183419-00692.warc.gz
|
en
| 0.959526 | 466 | 2.71875 | 3 |
Zambia, officially the Republic of Zambia, is a landlocked country in Southern Africa. The neighbouring countries are the Democratic Republic of the Congo to the north, Tanzania to the north-east, Malawi to the east, Mozambique, Zimbabwe, Botswana and Namibia to the south, and Angola to the west. The capital city is Lusaka, located in the south-central part of the country. The population is concentrated mainly around Lusaka in the south and the Copperbelt Province to the northwest.
Almost 90% of Zambians belong to the nine main ethnolinguistic groups: the Nyanja-Chewa, Bemba, Tonga, Tumbuka, Lunda, Luvale, Kaonde, Nkoya and Lozi. In the rural areas, each ethnic group is concentrated in a particular geographic region of the country and many groups are very small and not as well known. However, all the ethnic groups can be found in significant numbers in Lusaka and the Copperbelt.
Originally inhabited by Khoisan peoples, the region which comprises modern Zambia was colonised during the Bantu expansion of the thirteenth century. After visits by European explorers in the eighteenth century, Zambia became the British protectorate of Northern Rhodesia towards the end of the nineteenth century. For most of the colonial period, the country was governed by an administration appointed from London with the advice of the British South Africa Company.
On 24 October 1964, the country became independent of the United Kingdom and then-prime minister Kenneth Kaunda became the inaugural president. Kaunda’s socialist United National Independence Party (UNIP) maintained power from the 1964 until 1991. From 1972 to 1991 Zambia was a single-party state with the UNIP as the sole-legal political party, with the goal of uniting the nation under the banner of ‘One Zambia, One Nation’. Kaunda was succeeded by Frederick Chiluba of the social-democratic Movement for Multi-Party Democracy in 1991, during which the country saw a rise in social-economic growth and increased decentralisation of government. Chiluba selected Levy Mwanawasa as his successor; Mwanawasa presided over the country from January 2002 until his death in August 2008, and is credited with initiating a campaign to reduce corruption and increase the standard of living. After Mwanawasa’s death, Rupiah Banda presided as Acting President before being elected president in 2008. He is the shortest serving president, having held office for only three years. Patriotic Front party leader, Michael Chilufya Sata defeated Banda in the 2011 elections.
In 2010, the World Bank named Zambia one of the world’s fastest economically reformed countries. The Common Market for Eastern and Southern Africa (COMESA) is headquartered in Lusaka.
International currencies are accepted at banks and bureau de changes, and at some hotels / activity providers – check prior to travel. Credit cards are generally widely accepted – however ascertain this with the service provider, and your bank, prior to travel. You will be required to produce your passport for credit card transactions, and to change money.
Zambia has a tropical climate and consists mostly of high plateau, with some hills and mountains, dissected by river valleys. At 752,614 km2 (290,586 sq mi) it is the 39th-largest country in the world (after Chile) and slightly larger than the US state of Texas. The country lies mostly between latitudes 8° and 18°S, and longitudes 22° and 34°E.
Zambia is drained by two major river basins: the Zambezi/Kafue basin in the centre, west and south covering about three-quarters of the country; and the Congo basin in the north covering about one-quarter of the country. A very small area in the northeast forms part of the internal drainage basin of Lake Rukwa in Tanzania.
In the Zambezi basin, there are a number of major rivers flowing wholly or partially through Zambia: the Kabompo, Lungwebungu, Kafue, Luangwa, and the Zambezi itself, which flows through the country in the west and then forms its southern border with Namibia, Botswana and Zimbabwe. Its source is in Zambia but it diverts into Angola, and a number of its tributaries rise in Angola’s central highlands. The edge of the Cuando River floodplain (not its main channel) forms Zambia’s southwestern border, and via the Chobe River that river contributes very little water to the Zambezi because most is lost by evaporation.
Two of the Zambezi’s longest and largest tributaries, the Kafue and the Luangwa, flow mainly in Zambia. Their confluences with the Zambezi are on the border with Zimbabwe at Chirundu and Luangwa town respectively. Before its confluence, the Luangwa River forms part of Zambia’s border with Mozambique. From Luangwa town, the Zambezi leaves Zambia and flows into Mozambique, and eventually into the Mozambique Channel.
The Zambezi falls about 100 metres (328 ft) over the 1.6 km (0.99 mi) wide Victoria Falls, located in the south-west corner of the country, subsequently flowing into Lake Kariba. The Zambezi valley, running along the southern border, is both deep and wide. From Lake Kariba going east it is formed by grabens and like the Luangwa, Mweru-Luapula, Mweru-wa-Ntipa and Lake Tanganyika valleys, is a rift valley.
The north of Zambia is very flat with broad plains. In the west the most notable being the Barotse Floodplain on the Zambezi, which floods from December to June, lagging behind the annual rainy season (typically November to April). The flood dominates the natural environment and the lives, society and culture of the inhabitants and those of other smaller, floodplains throughout the country.
In Eastern Zambia the plateau which extends between the Zambezi and Lake Tanganyika valleys is tilted upwards to the north, and so rises imperceptibly from about 900 m (2,953 ft) in the south to 1,200 m (3,937 ft) in the centre, reaching 1,800 m (5,906 ft) in the north near Mbala. These plateau areas of northern Zambia have been categorised by the World Wildlife Fund as a large section of the Central Zambezian Miombo woodlands ecoregion.
Eastern Zambia shows great diversity. The Luangwa Valley splits the plateau in a curve north east to south west, extended west into the heart of the plateau by the deep valley of the Lunsemfwa River. Hills and mountains are found by the side of some sections of the valley, notably in its north-east the Nyika Plateau (2,200 m or 7,218 ft) on the Malawi border, which extend into Zambia as the Mafinga Hills, containing the country’s highest point, Kongera (2,187 m or 7,175 ft). The Muchinga Mountains, the watershed between the Zambezi and Congo drainage basins, run parallel to the deep valley of the Luangwa River and form a sharp backdrop to its northern edge, although they are almost everywhere below 1,700 m (5,577 ft). Their culminating peak Mumpu is at the western end and at 1,892 m (6,207 ft) is the highest point in Zambia away from the eastern border region. The border of the Congo Pedicle was drawn around this mountain.
The southernmost headstream of the Congo River rises in Zambia and flows west through its northern area firstly as the Chambeshi and then, after the Bangweulu Swamps as the Luapula, which forms part of the border with the Democratic Republic of the Congo. The Luapula flows south then west before it turns north until it enters Lake Mweru. The lake’s other major tributary is the Kalungwishi River, which flows into it from the east. The Luvua River drains Lake Mweru, flowing out of the northern end to the Lualaba River (Upper Congo River).
Lake Tanganyika is the other major hydrographic feature that belongs to the Congo basin. Its south-eastern end receives water from the Kalambo River, which forms part of Zambia’s border with Tanzania. This river has Africa’s second highest uninterrupted waterfall, the Kalambo Falls
National Parks . Map on http://www.zambiatourism.com/destinations/national-parks/
There are many taxis available. Prices are negotiable. There is a good bus service to Chipata, Livingstone, the Copperbelt and Harare, but they don’t always follow strict schedules. The main bus terminus is in Dedan Kimathi Road in Lusaka where one can inquire about timetables. Other private bus companies offer more reliable services to Livingstone, Harare and Johannesburg.
Travel by Bus:
Long range buses frequently leave from Lusaka to all the main towns. The intercity bus terminal can be found one road up from Cairo Road at the station.
Minibuses and taxis, local transport – all painted blue – can be jumped on at pretty much any juncture. They’re not expensive and you can always find a minibus that won’t cost too much to buy all the seats in it to get your own private minibus to wherever you want to go but you’ll have to negotiate so be sharp about the value of money.
Travel by Road:
Zambia has 38,763 kilometres of roads, about 10,000 kms of which are tarred and another 8000 kms all weather gravel road. The rest range from reasonable to bad dirt roads.
If you’re doing a vehicle trip through Zambia it is a good idea to carry a range of tools and essential spares with you. Two spare wheels and a couple of spare tubes are a must due to the condition of the roads, although most have improved vastly in recent years. Spare jerry cans of fuel and water, a tow rope, compressor, winch and a spotlight are useful items to have. Many of the villages along the main routes offer tyre mending services at a very reasonable fee. Road maps are available in Lusaka from the Map Centre in Nationalist Road or the Tourist Board in Lusaka Square, Cairo Road.
Be really careful, especially if travelling at night for road markings are usually non existent. There is much road rehabilitation finally being done so perhaps this won’t be as bad in the near future. Do watch out for animals in the road, vehicles without lights, pedestrians, unannounced roadworks, bad drivers and broken down trucks with no warning triangles. If you see a branch in the road, slow down immediately – these are improvised warning triangles and there’s bound to be a truck or car in the middle of the road up ahead. Never leave a car with anything visible in it in Lusaka, if possible make sure you have an alarm system or steering wheel locking device. Car theft happens, but avoidable if you’re careful.
The gravel roads on the minor routes are fine to drive without a four by four, but if you’re doing a long trip around the country there are wonderful remote places to go to that would require four wheel drive vehicles.
Be sure to have all your vehicle papers on hand as you’re bound to encounter a few roadblocks and if you ever need to stop, pull well off the road.
Visiting drivers must hold an International Drivers Licence. Drivers licences from other countries are not valid except SADC countries. New residents are required to pass a driving test. A person driving into the country on business can have their car admitted without having to pay duty, provided they will not use it for hire or commercial purposes. They will also have to show that the car is owned by themselves or by their company.
In Zambia, one drives on the left hand side of the road. The general speed limit on national highways is 100km/h, secondary roads 100km/h and in urban built up areas 65 km/h unless otherwise indicated.
To bring a vehicle into Zambia one must obtain a temporary import permit (TIP) or, depending on the country of origin of the vehicle, a carnet de passage. If the driver is not the owner of the vehicle, they must have a letter of authorisation from the owner for use of the vehicle in Zambia. Your local AA office should be consulted before leaving for Zambia to check whether any of these conditions have changed. Otherwise, write to the Controller of Customs and Excise Headquarters, Box 60500, Livingstone, Zambia.
There are many car hire companies in Lusaka, Ndola, Kitwe and Livingstone, offering a range of vehicles. Some offer a flat weekly rate, but most charge a daily rate plus mileage, insurance and petrol. You can also hire a chauffeur. See Car Hire Companies for Rates.
Petrol and diesel can be readily obtained in all major towns, but shortages can happen in the very remote areas so make sure you have spare fuel for emergencies. Both petrol and diesel get more expensive the further away you are from the line of rail. Unleaded petrol is available at most stations. If travelling in the more remote areas be sure to take extra supplies as availability is not always guaranteed. If it’s an emergency, try the local markets. They sometime have cans of petrol for sale.
Travel by Train:
Zambia has three main internal train lines.
Livingstone / Lusaka
Lusaka / Copperbelt
Kapiri Mposhi to the Northern border with Tanzania.
The main train station is in Dedan Kamathi Rd in central Lusaka, one road east of Cairo Rd.
The Kitwe-Lusaka-Livingstone (The Day Train ) line runs daily, leaving Kitwe at 20h00 arriving in Lusaka at 7h35, leaving for Livingstone at 8h05 and arriving there 18h00. This is called the ordinary train and stops at every station along the way. It leaves Livingstone everyday at 09h00, arriving in Lusaka at 20h10, leaves Lusaka at 21h10 and arrives in Kitwe and 8h50.
There is also an express train (The Zambezi Express) leaving Livingstone on Sundays, Tuesdays and Thursdays at 14h30, arriving in Lusaka at 11h00 the next morning! Yes, 18 hours to travel 570kms – but although this sounds like wasted time – it’s actually a great option because everyone else will be catching the bus so you’ll probably have the whole of first class to yourself and for around $10 you have a bed for the night and can see a bit of the real Zambia along the way. It leaves Lusaka on Mondays, Wednesdays and Fridays at 19h30 and arrives in Livingstone at 6h10. Fares are very reasonable and although the trains are a little shabby and unkept, the linen is clean and they are and reliable give or take an hour. Make sure you book a family compartment, first class, although they’re not much better than second class, and bring all your own food as well as drinking and washing water. Seats can be prebooked at the station or by phoning 228023 in Lusaka, 321001 in Livingstone and 224027 in Kabwe.
The Tazara Line from Kapiri Mposhi to Dar es Salaam in Tanzania leaves every Tuesday and Friday at 16:00 and takes 2 days. On Mondays, Thursdays and Saturdays, a train leaves from Kapiri Mposhi to the border town of Nakonde and back, stopping at all main towns along the way. Bookings for the Tazara line must be done a week in advance at Tazara House, opposite the market in Independence Ave on Tuesdays and Thursdays. Tel: +260 1 220646. To be safe, ask the station police to escort you to a taxi.
Zambian Border Post Hours :
- Chirundu 06.00 – 18.00 hrs
- Kariba 06.00 – 20.00 hrs
- Victoria Falls 06.00 – 22.00 hrs
- Kazungula Ferry 06:00 – 18:00
- Nakonde 24 hours
- Chitipa 06:00 – 18;00
- Democratic Republic of Congo
- Kusumbalesa / Kasile 06.00 – 18.00
- Imusho 06.00 – 18.00
- Sesheke 06.00 – 18.00
- Cassacatiza 24 hours
Getting Around In Towns:
Taxis are normally a convenient way to get around in towns and are reasonably priced. They are easily identified in designated stations or can be contacted by telephone.
March 12-Youth Day
April 6-Good Friday
April 9-Easter Monday
May 1-Labour Day
May 25-African Freedom Day
July (first Monday)-Heroes’ Day
July (first Tuesday)-Unity Day
August (first Monday)-Farmers’ Day
October 24-Independence Day
December 25-Christmas Day
Source of information : http://www.zambiatourism.com/
|
<urn:uuid:41265239-1334-4e54-8f26-416264286316>
|
CC-MAIN-2017-22
|
https://victoriafalls24.com/zambia/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608617.80/warc/CC-MAIN-20170525233846-20170526013846-00184.warc.gz
|
en
| 0.946405 | 3,713 | 2.796875 | 3 |
- Reading - reading and discussion on Wonder
- Math - Module 1 on Place Value and Decimals/Fractions (lessons 3-6)
- Geography - Learning about the Northeast Region states and their capitals on a US map
- Word Knowledge - vocabulary from Wonder and 5 new Stem Words
- Science - Introduction to Chemical Magic Unit
- Writing and Technology - All About Me
- Other - Classroom rules and procedure
Tests this Week
- Stem Words List #1 - Thursday... know the definitions and be able to provide examples of each stem word.
- Wonder - Thursday...short comprehension quiz
- Parents: Please return "What's the Buzz on Your Child" and "Classroom Photo Release" form as soon as possible
- Send any $ donations to the office please! THANK YOU!
- Back to School Night on September 10th. Please keep that night open. There will also be an important meeting regarding middle school verification procedures at 6:00 in the auditorium.
- NO SCHOOL on Friday, August 30 or Monday, September 2. Enjoy the long weekend!
|
<urn:uuid:6d775a71-b63d-40ef-9db8-d0a7a3d4dd6c>
|
CC-MAIN-2019-39
|
http://www.mrshauser.com/home/category/weekly-news
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514576965.71/warc/CC-MAIN-20190923125729-20190923151729-00348.warc.gz
|
en
| 0.888823 | 228 | 2.6875 | 3 |
Garden Design For The Climate – A comfortable garden needs a balance between sun and shade, through the day and through the year, and once you know which way your property faces, you can plan for it quite easily.
We all know that the sun rises in the east, sets in the west and is at its highest at noon, when it’s never quite overhead, but somewhere to the south. This is why the south side of the house gets the sun and the north side is in its own shade for most of the year. But not in summer, because the summer sunrise and sunset are quite a bit to the north of an east-west line.
This means that at midsummer, the hot afternoon sun will hit your ‘shady’ north side patio at about mid-afternoon and stay there for the rest of the day, upsetting any shade-loving plants growing there. Unshaded paving will absorb a lot of the heat and radiate it into the house long after sunset.
Conversely, the winter sun moves to the south and doesn’t rise so high; shadows are longer, and that spot you chose in July for the vegetable garden because it was so sunny may turn out to receive no winter sun at all, and precious little in fall and spring.
The ideal aspect for outdoor living is the south or south-east side of the house, where the winter sun is assured. An area of paving here can reflect its warmth into the house, but you’ll need to provide shade for the summer. You could rig up awnings or sun umbrellas, but the natural shade of trees is cooler (the constant transpiration of water from their leaves acts as an effective natural air conditioner).
Deciduous trees let the winter sun through their bare branches, plant them on the east for the early winter sun. Evergreens can go to the north, and maybe the west, too, as during a very hot summer the thick foliage can offer welcome protection from the afternoon sun.
Tall trees shading the roof of a bungalow or ground-floor extension can make quite a difference to your comfort inside, while large areas of glass cry out for shade. Remember that once the sun gets into your rooms, so does the heat. If shade trees will dominate the garden too much, don’t forget the climate-control device of the vine-covered pergola. A pergola needn’t always be attached to the house, but can be positioned in the garden, too.
|
<urn:uuid:0496eb5a-b6d8-4957-8115-2560f7b13a1d>
|
CC-MAIN-2023-06
|
https://www.coolgarden.me/garden-design-for-the-climate-8582/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499646.23/warc/CC-MAIN-20230128153513-20230128183513-00651.warc.gz
|
en
| 0.952596 | 523 | 2.734375 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.