text
stringlengths
198
621k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
15
1.73k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
49
160k
score
float64
2.52
5.03
int_score
int64
3
5
The Asynchronous dual port devices allow simultaneous access of the memory locations. Such simultaneous accesses may lead to memory access collisions. In such cases, if one of the ports is writing and the other port is reading, data coherence is not guaranteed, i.e. the port performing a read could receive new data or old data. Hence, collision detection circuitry is incorporated into the dual port devices to ensure data coherence. The circuitry detects such simultaneous accesses to the same memory location, arbitrates to picks a winner and also notifies the loser of the arbitration. The /BUSY signal is the notification to the losing port (writing or reading) which indicates that either the write has failed or the value read is stale. The waveform below shows the left port attempting a read on a location which is being written by the right port. The /BUSYL signal is driven low to indicate that the left port lost the arbitration. Once this signal is deactivated, valid data is read from the same location. If the losing port was attempting a write to the memory location – the dual port will block the write until the /BUSY signal is de-activated.
<urn:uuid:b9cdc6e3-83d9-4746-8949-2bff2b257921>
CC-MAIN-2018-43
https://community.cypress.com/docs/DOC-11173
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514443.85/warc/CC-MAIN-20181022005000-20181022030500-00312.warc.gz
en
0.936353
239
2.859375
3
They are no phantom menace; the cattle in Queensland are now under attack from drones in a robot round up. With cattle properties 1.5 million hectares in size, which can take three months to muster, graziers are turning to technology to locate and move their herds in outback Queensland. “We believe this new technology is going to bring more efficiency. As the technology gets better we think we'll be able to send the drones out to go and get cattle,” says drone operator and pilot Cameron Parker. Helicopters have long been used in beef production in Queensland because of the vast areas that need to be covered, but now the much cheaper option of a remote pilot aircraft is taking off with farmers. Cameron says, “The way we handle cattle has been passed down through generations. My children are starting to fly drones now. But the most important thing we are passing on is how to handle cattle properly.” The cattle themselves seem a little perplexed being wrangled by this new flying foe and need to be trained themselves. “Because they're prey animals their natural instinct is to run away, so when you first introduce them to this drone you have to do it in a spot where they can't run away because their natural instinct is to run away,” says Cameron as he demonstrates drone mustering to a group of onlookers. Drones have even been fitted with thermal cameras to locate stock in the remote far reaches of properties, so farmers can direct helicopters and stockman to an exact location, taking the guesswork out of mustering. “I think not only for mustering and cattle handling it'll go out and check fences and troughs things like that. So I think we'll be able to use them for those types of things to save driving around.” While they haven't superseded the trusty working dog or steed yet, when these workhorses get tired, all their owners need to do is replace the batteries. One of the first countries to regulate the commercial operation of drones in the world, mustering pilots must have an operators certificate and meet a number of conditions set out by the Civil Aviation Safety Authority.
<urn:uuid:a9535c9e-3df5-47f2-aeae-08b4fabbbf04>
CC-MAIN-2017-13
http://traveloscopy.blogspot.com/2015/05/drone-cattle-mustering-in-queensland.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188773.10/warc/CC-MAIN-20170322212948-00527-ip-10-233-31-227.ec2.internal.warc.gz
en
0.962195
451
2.53125
3
Asthma is a chronic disease involving the airways in the lungs. Asthma is characterized by reversible obstruction of these airways. When something triggers your symptoms, the airways become even more swollen and the muscles around the airways can tighten. This makes it difficult for air to move in and out of the lungs, causing symptoms such as coughing, wheezing, shortness of breath, and chest tightness. People with a family history of allergies or asthma are more prone to developing asthma. Many people with asthma also have allergies. This is called allergic asthma. Occupational asthma is caused by inhaling fumes, gases, dust or other potentially harmful substances while on the job. Childhood asthma impacts millions of children and their families. In fact, the majority of children who develop asthma do so before the age of five. There is no cure for asthma, but once it is properly diagnosed and a treatment plan is in place you will be able to manage your condition, and your quality of life will improve. An Allergist & Immunologist is the best qualified physician in diagnosing and treating asthma. With the help of your allergist, you can take control of your condition and participate in normal activities.
<urn:uuid:925c0f3a-55ca-493b-9ebe-b63cab223752>
CC-MAIN-2024-10
https://asifrafimd.com/allergy-immunology/respiratory/asthma-allergic-and-non-allergic/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475711.57/warc/CC-MAIN-20240301225031-20240302015031-00038.warc.gz
en
0.958536
248
3.703125
4
Objective Individuals with serious mental illnesses are more likely to have Objective Individuals with serious mental illnesses are more likely to have substance-related problems than those without mental health problems. including through formal treatment, self-help groups or peer support, natural recovery (without the help of others), and continued but controlled use of alcohol. We found three overarching themes in participants experiences of recovering from serious mental illnesses and substance-related problems: Learning about the effects of alcohol and drugs provided motivation and a foundation for sobriety; achieving sobriety 362003-83-6 IC50 helped people to initiate their mental health recovery Mouse monoclonal to CD11b.4AM216 reacts with CD11b, a member of the integrin a chain family with 165 kDa MW. which is expressed on NK cells, monocytes, granulocytes and subsets of T and B cells. It associates with CD18 to form CD11b/CD18 complex.The cellular function of CD11b is on neutrophil and monocyte interactions with stimulated endothelium; Phagocytosis of iC3b or IgG coated particles as a receptor; Chemotaxis and apoptosis processes; and achieving and maintaining sobriety built self-efficacy, self-confidence, improved functioning and a sense of personal growth. Non-judgmental support from clinicians adopting chronic disease approaches also facilitated recovery. Conclusions Irrespective of how people achieved sobriety, quitting or severely limiting use of substances was important to initiating and continuing mental health recovery processes. Substance abuse 362003-83-6 IC50 treatment approaches 362003-83-6 IC50 that are flexible, reduce barriers to engagement, support learning about effects of substances on mental health and quality of life, and adopt a chronic disease model of dependency may increase engagement and success. Peer-based support like Alcoholics or Narcotics 362003-83-6 IC50 Anonymous can be helpful for people with serious mental illnesses, particularly when programs accept use of mental health medications. = 112) of participants spontaneously volunteered information about drugs and alcohol in response to interview questions about general mental health recovery. At the first follow-up interview (at 12 months) we asked the questions included in Physique 1. Physique 1 Questions from interview guideline addressing use of alcohol and other drugs and mental health recovery. All information addressing alcohol or drug use, whether in response to these questions or in response to other parts of the interviews, was coded as related to alcohol or drug use and analyzed by study staff to identify and describe themes in participants responses. Thus themes derived from this analysis were emergent and not a result of systematic query (e.g., not everyone was asked about every theme, so no denominator was available). For this reason, we do not present data around the prevalence of each theme, because to do so would systematically underrepresent endorsement of the themes and lead to misinterpretations of the results. A majority of participants transcripts included codeable information about alcohol or drug use and mental health, however. At baseline, 63% (= 112) of participants spontaneously offered answers that resolved alcohol or other drugs as part of their recovery process. At follow-up, when asked directly about material use, 97% (= 171) provided codeable answers. Thus, nearly all participants provided information useable for analyses. Quotes presented here were chosen because they were deemed to be particularly illuminating, or because they clearly illustrated identified themes. RESULTS Study participants (= 177) had diagnoses of schizophrenia or schizoaffective disorder (= 75, 42%), bipolar I or II disorder (= 84, 48%), or affective psychosis (= 18, 10%). Fifty-two percent 362003-83-6 IC50 of participants were women (= 92), and age ranged from 16C84 years (= 48.8 years, = 14.8). The majority were white (= 167, 94%), 54% (= 93, overall = 173) were married or living with a partner, and 40% (= 69, = 173) reported being employed. In a self-report questionnaire, nearly half (= 77, = 170 45% of the sample reported using alcohol or street drugs to help manage their mental health symptoms in the past, while 8% (= 14, = 170) reported doing so currently. About one-third (= 59, = 173) reported drinking alcohol in the past month, 15% (= 26, = 171) reported that drug or alcohol use had been a problem in the past four weeks, and 29% (= 51, = 173) were current smokers. We identified three overarching themes regarding.
<urn:uuid:be659887-f1c1-4cc2-bb79-0019ca8e7e12>
CC-MAIN-2018-05
http://www.bostonscienceandengineeringlectures.com/2017/08/11/objective-individuals-with-serious-mental-illnesses-are-more-likely-to-have/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889473.61/warc/CC-MAIN-20180120063253-20180120083253-00624.warc.gz
en
0.945321
929
2.5625
3
- Born to a wealthy family on the 23 March 1900 in Alexandria, Egypt. - He moved to Cairo with his family when he was eight years old, and settled in Helwan. - He was talented in drawing which was to stand him in good stead when he joined the King Fuad I University (presently Cairo University) to study architecture. - In 1930 he was appointed as instructor at the Faculty of Fine Arts where he remained until 1946. In 1953 he became Head of the Architecture Department. - He was appointed Director of the Educational Buildings Department of the Ministry of Education between 1949 and 1952. - Amongst his awards are : The Aga Khan Award for Architecture Chairman’s Award (1980), Balzan Prize for Architecture and Urban Planning (1980), Right Livelihood Award (1980) - Fathy recognized that architecture is for human beings. He believed that architecture must be shaped by factors like the wind, sun, nature and the individuality and culture of the people involved. - He rejected architecture that was not indigenous rooted in the location and the culture of the area, which in his mind found its truest expression in the vernacular architecture of a society. - His rejection was of internationalism itself as a homogenizing concept that stripped human beings of their individuality - “You must start right from the beginning, letting your buildings grow from the daily lives of the people who live in them, shaping the houses to the measure of the peoples songs, weaving the patterns of a village as if on the village looms, mindful of the trees and the crops that will grow there, respectful to the skyline and humble before the seasons. - There must be neither faked tradition nor faked modernity, but an architecture that will be the visible and permanent expression of the character of the community. - But this would mean nothing less than a whole new architecture.” Sadat Rest House , Garf Hoseyn, Egypt: Intended as a resthouse to be used on official trips to the isolated area around Lake Nasser in Nubia, the residence is actually made up of three separate buildings sequentially organized according to the status of each. In overall the complex is composed of four different blocks: - Guest House - Rest house - Security Building
<urn:uuid:75551884-5b36-4c5f-a594-8c8357376cee>
CC-MAIN-2018-13
https://thearchiblog.wordpress.com/2011/01/01/hassan-fathy-sadat-rest-house/
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257646914.32/warc/CC-MAIN-20180319120712-20180319140712-00014.warc.gz
en
0.970863
469
2.734375
3
"The first Sunday in March, 1965, we marched across the Edmund Pettus Bridge in Selma, Alabama for the right to vote. That movement to change America came because young people came alive," recalled Jesse Jackson in a speech last week at Free the Children's We Day youth rally in Montreal, noting that in 1960 he had been jailed with classmates for simply using a public library. "We marched for the right to vote -- we won -- because young people came alive." But this week, Alabama streets are again filling with civil rights activists. Rev. Al Shapton's National Action Network is leading a six-day re-enactment of the Selma to Montgomery Voting Rights marches -- which began with what became known as "Bloody Sunday" after segregationist governor George Wallace sicked baton-wielding riot police on 600 peaceful protestors, a shocking display of violence that sparked the 1965 Voting Rights Act. Thousands, including 19 members of congress, 30 Kennedys and Martin Luther King Jr.'s son, kicked off the protests Sunday, March 4 which will culminate in a March 9 rally at MLK Jr.'s old Baptist church in the state capital. Though not yet the 50th anniversary, activists are (back) up in arms over election year attempts to pass what they see as racially-motivated voter ID laws, early voting restrictions and voting bans for ex-felons in regions where minorities make up a disproportionate percentage of the prison population. Across the south -- from racially-charged redistricting in Texas, to voter-registration suppression in Florida, to a lawsuit against the Obama administration for rejecting its Voter ID law as discriminatory in South Carolina -- the Voting Rights Act is being attacked under the banner of states' rights, the same argument they've been making since Reconstruction. "States' Rights mean the states have the sovereign right to impose tyranny of the majority on the minority," Jackson, the South Carolina-born civil rights icon, told The Huffington Post backstage at Montreal's Theatre St-Denis. The Brennan Center for Justice reports that over the past year, 15 states have enacted restrictions making it "significantly harder for more than five million eligible voters to cast ballots in 2012." This is despite the fact that, as the "Colbert Report" memorably mocked last week, voter fraud rates are as low as 0.00004%. (As well, The New York Times noted in a piece titled 'The Myth of Voter Fraud,' over 21 million Americans lack government ID cards, and "many of them are poor, or elderly, or Black and Hispanic.") States' Rights is about ideology, Jackson said. "That's why this is more the Fort Sumter Tea Party not the Boston Tea party," he added, referencing the historic site that saw the first shots fired after the South seceded. In April 1861, South Carolina troops began bombarding the federal garrison near Charleston, which quickly fell, helping to spark the bloody civil war. "Let's distinguish the two," Jackson continued. "The Boston Tea Party was fighting to overthrow colonialism and to end oppression. The Fort Sumter Tea Party is working to overthrow the federal government to maintain state power." This isn't the first time Jackson has used the racially-charged event in reference to the Tea Party. Tea Party politicians and the Republicans they've influenced have couched their message in terms of economics. But some, such as Salon writer Michael Lind, who coined the Fort Sumter epithet during last summer's debt ceiling debate, beg to differ. Lind described the Tea Party as "merely the latest of a series of attacks on American democracy by the white Southern minority, which for more than two centuries has not hesitated to paralyze, sabotage or, in the case of the Civil War, destroy American democracy in order to get their way." Jackson clearly agrees. "If your issue is about the economic order and not about the [racial] Trojan horse, then if Barack brings the troops out of Iraq, that should affect your vote. If he stops 800,000 jobs a month from leaving, that should affect your vote. The auto industry was about to go out of business and now it's back number one in the world again. If it's about economics, there are enough economic indicators to cause a shift -- except economics is not the issue," Jackson said. "The Fort Sumter Tea Party has an agenda that is different than just economics; it has an ideology deeply rooted in the Confederate ideology. That's why people like [Newt] Gingrich and [Rick] Perry so freely use the issue of the tenth amendment and states' rights. "This is an attempt to re-fight the civil war. It's not about money." Abraham Lincoln, of course, was a Republican. This made the south an electoral bastion for Democrats for about a century until President Lyndon Johnson, pushed by the actions of Jackson's mentor, Martin Luther King Jr., implemented the 1964 Civil Rights Act and sent the south into the arms of the Republicans But after the so-called 'Compromise of 1877' -- which ended the Reconstruction Era along with federal enforcement of racial equality laws in the South -- the segregationist states cited the tenth amendment in their fight to maintain institutional racism, saying that such laws were a matter of states' rights. That amendment has come up again repeatedly during this electoral season thanks to Tea Party-tied conservatives like Newt Gingrich, who just last week, according to the LA Times, "opened his final one-week dash to the crucial Georgia primary on Wednesday with a states' rights appeal laden with racial symbolism." Said Gingrich, who was accused earlier in the campaign of using food stamps as a racial dog whistle, "I want to return power back home to an extraordinary degree." Amid all this, affirmative action has also come under attack. The Supreme Court has agreed to hear the case of a young white woman who claims she was discriminated against by University of Texas, which takes race into account when conducting admissions. Depending on how the Court rules, it risks setting precedent that could weaken or even overturn affirmative action laws. "Race is the central moral flaw of our culture, it is the lynchpin between justice and injustice, equality and inequality," said Jackson. "[Republicans have] never stopped trying to remove race as a factor in access to schools, jobs and contracts -- and if this Supreme Court wipes it out as a factor, among many other factors, it would be a radical throwback to 1964. "That is the real aim of this right-wing Fort Sumter Tea Party -- their mission is to turn back the clock a half-century." PHOTOS: FROM SELMA TO MONTGOMERY
<urn:uuid:b4298407-c4db-4eb5-ab5c-546487c15537>
CC-MAIN-2017-26
http://www.huffingtonpost.ca/2012/03/05/jesse-jackson-tea-party-republicans_n_1321447.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323808.56/warc/CC-MAIN-20170629000723-20170629020723-00479.warc.gz
en
0.961394
1,372
2.546875
3
Definition of Design Factor The design factor is the ratio of the minimum breaking strength to the permissible working load. It is always greater than 1. Other terms frequently used for design factor are safety factor and factor or safety. Breaking strength is the rigging material or hardware's tensile strength in lifting and pulling operations. It could also be the bearing strength or compressive strength of rigging hardware in certain other situations. So How Is This Formula Helpful? If the required design factor is known and the minimum breaking strength of a rigging component is known, then the safe working load can be determined by rearranging the formula to look like, What Determines The Design Factor In general, the appropriate value for the design factor depends upon a number of considerations. Among these are: - The extent of danger to human life and property - The dependability of the rigging material ◦ The age and condition of the rigging material - The load conditions: static, varying, shock loads? - The degree of knowledge of the load's weight Practically, OSHA spells out minimum values for design factors at 29 CFR 1926.1431(g)(3): “All hardware used for rigging must be able to support five times the maximum intended load applied to or transmitted to that component. Additionally, slings using rotation resistant rope must have a safety factor of ten.” Safe Working Load Stated As A Percentage To make things confusing, sometimes design factors are indicated by percentages of minimum breaking strength. To convert percentages to whole number design factor values, simply divide the percentage value into 100% to arrive at a whole design safety factor. For example, a piece of rigging equipment that is rated at 20% of ultimate strength has a design factor of: Suppose that your project has a 12 strand 1⁄2 inch synthetic rope for which the manufacturer has stated a 12,500 pound minimum strength. Using the mandated design factor of 5 and the formula for permissible working load, the safe working load can be seen to be, This value would be for a new rope. A much higher value for the design factor may be warranted for a sling that has been used or is in less than perfect condition. The proper design factor for any rigging component demands consideration of all loads; acceleration; deceleration; lift speed; attachments; the number, size, and arrangement of sheaves and drums; conditions producing corrosion and abrasion; length of lift, and so forth. The best source of information for design factors would come from the manufacturer of the rigging equipment.
<urn:uuid:df0a82b3-063f-4063-aada-c12dd8f8a361>
CC-MAIN-2018-05
http://rigger.com/understanding-rigging-design-factors.php
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887973.50/warc/CC-MAIN-20180119105358-20180119125358-00785.warc.gz
en
0.907833
524
3.25
3
How can we help? You can also find more resources in our Select a category Something is confusing Something is broken I have a suggestion What is your email? What is 1 + 3? the paragraphs of a memo or SS within and ______ between. The subject in a memo should be keyed in ____ _____. Side margins in a memo are ________. Reference initials are keyed in ______ _____ letters. Because of the ease of creating and the speed of sending, _______ have partially replaced the memo and the lettter in business today. The format used for email is very _________ to the format used for a memo. An e-mail heading includes a ____ line if a copy of the message has been sent to another person. _______ is not included int he memo heading ________ is the standard top margin for a memo _______ is the standard bottom margin for memo __________ notations are keyed a DS below the reference initials if the memo has a document stapled or paper clipped to the memo then it is considered an ___________. if the memo has a document included with the memo in an envelope but not attached then it is considered an __________. If someone other than the orginator of the memo keys it, his/her _______ are keyed in lowercase letters at the left margin, a DS below the body. a Bcc: line or ________means a copy of hte message was sent to someone without the original receiver knowing. Receiver's e-mail address When sending a e-mail, what should be keyed in the Send To: box? Date, Time, and Sender when you key an email these are automatically included Written messages used by employees within an organization ot communicate with one another are called interoffice _______. The paragraphs of an email message all begin at the ____ margin and are SS with a DS between paragraphs. The term e-mail is short for _________ mail.
<urn:uuid:709b82ee-73ee-4b6f-8e75-7939a747287e>
CC-MAIN-2017-13
https://quizlet.com/1350525/memoemail-review-flash-cards/
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218194601.22/warc/CC-MAIN-20170322212954-00526-ip-10-233-31-227.ec2.internal.warc.gz
en
0.87394
428
2.875
3
What is the HITECH Act? An Introduction for the Layperson Money to convert from paper to electronic People who ask, “What is the HITECH Act?” should understand how the Act stimulates the use of electronic health records and promotes patient safety and privacy. EHRs also improve patient record access and ongoing interoperability among healthcare providers and their patients’ data. In simple terms, the HITECH Act stimulates the economy with a specific focus on healthcare. It creates stimulus through monetary incentives to stop using paper for patient records and start using an E.H.R. Stop saying EMR and Start Saying EHR. Above all, let’s get some acronyms straight. I recommend that you stop saying “E.M.R.” or electronic medical record and start saying “electronic health record” or “E.H.R.” Why is that? Because the ARRA HITECH Act defines a “Certified Electronic Health Record” or “C.E.H.R.T.” A CEHRT has to meet rigorous defined federal standards. There is no Standard definition for EMR, only an EHR. A healthcare provider must prove using a certified electronic health record system to get the stimulus funds. Installation compliance is an extensive task requiring that several ‘measures’ be met for patient safety, quality, and security and providing patients access to their health records via electronic means. What is the History of the HITECH Act? - The HITECH Act is formally known as “The American Reinvestment & Recovery Act (ARRA)” Health Information Technology for Economic and Clinical Health (HITECH) Act.” President Obama signed HITECH into law on February 17, 2009, as part of an economic stimulus bill. - The HITECH Act created economic incentives to implement electronic health records. The stimuli were available to hospitals (“Eligible Hospitals” or “E.H.s” and physicians “Eligible Professionals” or “E.P.s”) – meaningful use [EHR-MU], an effort led by Centers for Medicare & Medicaid Services C.M.S..), and the Office of the National Coordinator (O.N.C.) for HealthI.TT. The HITECH Act encourages nationwide meaningful use of interoperable electronic health records. As a result of the HITECH Act - HITECH provides over $35 billion in stimulus funds to eligible hospitals and physicians. C electronic health record technology (CEHRT) had to be purchased and used in a meaningful way (defined by precise “Meaningful Use” criteria in the HITECH Act). - These criteria include many compulsory and optional requirements, including privacy Safeguards. In the gold rush to access some of the stimulus funds, E.H.R. companies were required to obtain certification from ATCBs (Authorized Testing and Certification Bodies) to become a CEHRT - Regional extension centers sprung up that provided training, and other services advised physicians and hospitals on U.S. H.H.S., C.M.S., and Office of the National Coordinator (O.N.C.) guidelines. - In turn, providers licensed CEHRT and attest to be a meaningful user. Installation and meaningful use required configuration and clinical use of an E.H.R., with policies and procedures prescribed by the HITECH act. - The attestation entitles an E.H. or an E.P. to receive stimulus funds. - Making false statements to the Government carries a penalty under the False Claims Act. - Key provisions of the HITECH Act for hospitals and critical access hospitals (C.A.H.s) can be found at 42 C.F.R. § 495.22 – Meaningful use objectives and measures for E.P.s, eligible hospitals, and C.A.H.s for 2015 through 2018 - Providers are required to meet 42 C.F.R. § 495.40 – Demonstration of meaningful use criteria. - Certification of electronic health record technology (CEHRT) for 2014 Stage 2 measures can be found 42 CFR 495.6(j)-(m) Stage 2 Objectives and Measures. There are core (required) measures and optional (menu) measures, of which certain minimum number(s) of menu measures were required What is the significance for the Regulatory Risk and Compliance? False Claims Act To get the stimulus funds, a healthcare provider files an attestation with the U.S. Government (via C.M.S.) or state Medicaid that it had complied and requested funds. If the provider’s claims were not accurate, the provider could be subject to penalties under the False Claims Act. Medical Malpractice Defense Strategy Electronic health records now provide tamper-resistant measures that enable a skilled forensic expert in electronic health records to audit the log files and patient records, using the HITECH Act Standards for compliance. These strategies are useful in medical malpractice personal injury cases, fraud determinations, and medical billing and coding, among other types of cases. Lasting Challenges of on the Healthcare Industry Today? Moreover, now that E.H.R.s are in the majority of hospitals and providers in the U.S., some challenges have developed: - Privacy– When there are privacy breaches by hospitals or physicians (a.k.a. a ‘HIPAA Breach”), it can be indicative of a failure to correctly or ‘meaningfully use’ the CEHRT, or in the policies, procedures, and training of staff that use the CEHRT. - Patient safety alerts and medical decision making– One of the requirements of using an E.H.R. under Meaningful use is use of clinical decision support (CDS). CDS ensures patient safety mechanisms alert clinicians. The alerts should integrate with the workflow of a physician. As a result, some hospitals and physicians have turned these alerts off. This can lead, in my experience to unfortunate events. Some medical malpractice cases start clinical decision-making errors, resulting in injury or death of a patient. This is both a failure to meet the Meaningful Use Standard and improper for ensuring patient safety. - Audit trails to ensure accuracy of record-keeping – To explain, audit logs provide a complete history of all access to a patient’s record, medication orders, and other orders as well as progress notes be physicians. Like the preceding example, this is both a failure to meet the Meaningful Use Standard and improper for ensuring patient safety. It has the additional effect of calling the health care provider’s integrity into question whether they are maintaining accurate records. - Physician productivity– Physicians that I interview complain of up to a 20% reduction in patient volume. The reason they say this is because of increased documentation and data entry requirements. We believe E.H.R.s can provide productivity benefits, but programmers need to improve usability testing with the intended clinical users. Interoperability between different E.H.R.s, physicians, hospitals, and clinics, and paper transmitted via fax - During the initial Meaningful Use adoption period for E.H.R.s, if two providers were not both are not using the same E.HR., sharing patient data was challenging. Recent improvements between disparate E.H.R.s solved part of the problem. - Today, new legislation such as the 21st Century CURES Act section 4003 defines’ interoperability,’ for Health I.T. as follows: - “Enables the secure exchange of electronic health information with, and use of electronic health information from, other health information technology without special effort on the part of the user; - Allows for complete access, exchange, and use of all electronically accessible health information for authorized use under applicable State or Federal law; and - Does not constitute information blocking as defined in section 3022(a).” - Interoperability problems between old and new systems and methods can cause patient safety errors. For example, patent identification errors can occur outside the reference laboratory. This risk increases for a non-integrated Lab Information System (LIS) and the hospital’s E.H.R. A fax of the lab results might be sent from the lab to the hospital. The faxed document enters the hospitals’ system, is reviewed by a human who adds the image of the fax to the E.H.R. and the enters discrete data regarding the result of the lab into the hospital E.H.R. Human distraction such as having more than one chart open, or fatigue are known ‘sentinel’ or ‘never’ events can happen. What New Health I.T. Legislation Since the HITECH Act 2009 Modifies or Changes Priorities for Healthcare? Since 2009, several new initiatives modify or extend the importance of the HITECH Act. Electronic health records form a foundation for the ACA, FDASIA, HIPAA, MACRA and the CURES Act. Affordable Care Act of 2010 - The Affordable Care Act of 2010 established comprehensive health care insurance reforms. The A.C.A. instantiated Federal regulations that sometimes-confounded state insurance regulations. To explain, concepts such as Minimum Essential Coverage (M.E.C.) and Essential Health Benefits (E.H.B.) were new terms. Medically necessary care must be documented in the patient chart, which is now generally electronic due to the HITECH Act. The A.C.A. also provided more stringent sentencing guidelines for fraud. FDASIA – 2012 - FDASIA (Section 618 of the Food and Drug Administration Safety and Innovation Act of 2012) is focused on a risk-based regulatory framework for health I.T., including mobile medical applications. The Act also focuses on: - FD.A. authority to collect user fees from industry to fund reviews of innovator drugs, medical devices, generic drugs, and biosimilar biological products; - Promoting innovation to speed patient access to safe and effective products; (note: the breakthrough therapy provision is discussed specifically with respect to COVID. - Increasing stakeholder involvement in F.D.A. processes; and - Enhancing the safety of the drug supply chain. HIPAA Omnibus Rule of 2013 To clarify, the HIPAA Omnibus Rule of 2013 provided increased, tiered civil money penalty structures of the HITECH Act. The Omnibus Rule adopted the HITECH Act’s prohibition against marketing, fundraising, and PHI (protected health information) sale without authorization. Cybersecurity Act of 2015 The Cybersecurity Act of 2015 is designed to promote awareness via a portal that reports security threats. It also encourage leverage of existing frameworks using recognized security practices. The term “recognized security practices” is used in the HITECH Act Amendment (see bel0w), meaning “the standards, guidelines, best practices, methodologies, procedures, and processes developed under section 2(c)(15) of the National Institute of Standards and Technology (NIST) Act, the approaches promulgated under Section 405(d): Aligning Health Care Industry Security Approaches MACRA – 2015 To elaborate, the Medicare Access and CHIP Reauthorization Act of 2015 (MACRA). Two key provisions of MACRA are Quality Payment Program tracks: - Advanced Alternative Payment Models (A.P.M.s) or - The Merit-based Incentive Payment System (MIPS) 21st Century Cures Act of 2016 - The 21st Century Cures Act of 2016 is designed to speed up medical product development and create new innovations and advancements to patients. It has these key initiatives: - 4001: Health I.T. Usability - 4002(a): Conditions of Certification - 4003(b): Trusted Exchange Framework and Common Agreement - 4003(c): Health Information Technology Advisory Committee - 4004: Identifying reasonable and necessary activities that do not constitute information blocking - Intra-Federal agency coordination between : - H.H.S. Office of Civil Rights, - H.H.S. Office of the Inspector General (OIG), - Agency for Healthcare Research and Quality (AHRQ), - National Institute for Standards and Technology (NIST). - The CURES Act also modifies 42 C.F.R. Part 2 with respect to privacy and disclosure of substance use disorder and behavioral health records. - Regenerative medicine Advanced Therapy or RMAT focused on biologics - Breakthrough Devices program - Oncology center of Excellence HITECH Act Amendment of 2021 The HITECH Amendment provides that “recognized security practices” (“RSPs”) include: (i) standards, guidelines, best practices, methodologies, procedures, and processes developed under section 2(c)(15) of the National Institute of Standards and Technology (“NIST”) Act; (ii) the approaches promulgated under section 405(d) of the Cybersecurity Act of 2015
<urn:uuid:c093f4ae-642c-4821-afd3-bdb85aca0825>
CC-MAIN-2023-50
https://noworldborders.com/2020/09/22/what-is-the-hitech-act/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.15/warc/CC-MAIN-20231130000127-20231130030127-00055.warc.gz
en
0.899737
2,751
2.796875
3
You brush, you floss, you see your dentist, but do you eat with your oral health in mind? "We all know excellent nutrition helps build an excellent body," says Paula Shannon Jones, DDS, spokesperson for the Academy of General Dentistry. "So it follows that whatever you eat affects your teeth and gums, too." When it comes to nutrition and oral health, it's not just the usual suspects like sugar that may be harmful. Some surprising—even healthy—foods can cause cavities, while others can help protect you from decay, gum disease, and even bad breath. Here are great tips for nutrition and oral health, and how you can tailor your diet for optimal dental health, dental care, and healthy teeth: Eat carbs at mealtimes A handful of potato chips or even a whole wheat roll can be just as damaging to your teeth and gums as a chocolate chip cookie. All carbohydrates break down into simple sugars, which are ultimately converted by bacteria in the mouth into plaque, a sticky residue that is the primary cause of gum disease and cavities. Carb-based foods such as breads and crackers tend to have "a chewy, adhesive texture," making it easier for them to get caught between teeth or under the gum line, where bacteria can then accumulate, says Christine Gerbstadt, MD, RD, a spokesperson for the American Dietetic Association. Have carbs at mealtimes rather than as a snack: When you eat a larger amount of food, you produce more saliva, which helps wash food particles away. Black and green teas contain polyphenols, antioxidant plant compounds that prevent plaque from adhering to your teeth and help reduce your chances of developing cavities and gum disease. "Tea also has potential for reducing bad breath because it inhibits the growth of the bacteria that cause the odor," explains Christine D. Wu, PhD, associate dean for research at the University of Illinois at Chicago College of Dentistry, who has conducted several studies on tea and oral health and dental care. Many teas also contain fluoride (from the leaves and the water it's steeped in), which helps protect tooth enamel from decay and promotes healthy teeth. Sip with a straw Most sodas, sports drinks, and juices contain acids, such as citric and phosphoric, that can erode dental enamel—even if they're diet or sugar-free versions. Sipping acidic drinks through a straw positioned toward the back of your mouth limits their contact with your teeth and helps preserve the enamel, says a study in the British Dental Journal. Increase your C intake "Vitamin C is the cement that holds all of your cells together, so just as it's vital for your skin, it's important for the health of your gum tissue," says Jones. People who consumed less than 60 mg per day of C (8 ounces of orange juice or one orange contains more than 80 mg) were 25% more likely to have gum disease than people who took in 180 mg or more, according to a study of over 12,000 US adults conducted at the State University of New York University at Buffalo. Eat 800 mg of calcium a day People who do are less likely to develop severe gum disease, says a recent study by the Buffalo researchers. The reason: About 99% of the calcium in your body is in your bones and teeth. Dietary calcium—available in foods like cheese, milk, and yogurt—strengthens the alveolar bone in the jaw, which helps hold your teeth in place. The recommended amount is 1,000 mg per day for women younger than 50 and 1,200 mg for those older. More from Prevention: Your Total Beauty Detox
<urn:uuid:0a153700-87d2-4707-adc2-fe2a0d735b9b>
CC-MAIN-2019-09
https://www.prevention.com/health/a20428223/5-strategies-for-healthy-teeth/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247499009.48/warc/CC-MAIN-20190221031117-20190221053117-00314.warc.gz
en
0.955398
763
3.25
3
Vail Ranch Restoration Association (Now merged into the Temecula Valley Historical Society) "The Magnificent Seven" - photograph by Sam Hicks circa 1947 The History of Vail Headquarters By Rebecca Marshall Farnbach A long time ago this area was home to Native American people who lived in family groups who traveled to where there was water and food. Padres from the San Luis Rey Mission discovered the Temecula Valley in 1897. They claimed the land and started growing grain here. Visitors passed through the area on the only road from the 1840s through the 1860s, a road known by several names: The Southern Emigrant Trail, the Fort Yuma Road and eventually the Butterfield Trail. The reason the road was located there is because it forded the river at that location, one of only three places where the Temecula Creek could be crossed without the danger of quicksand. In the 1840s the Mexican government who controlled the Temecula Valley, gave numerous land grants to prominent citizens throughout California. There were four grants in the Temecula Valley: The Little Temecula Rancho, the Temecula Rancho, Rancho Pauba and the Santa Rosa Rancho. The Little Temecula Rancho was granted to Pablo Apis, a Native American man who was from Rancho Guajome in the Oceanside area. As travelers came along the Southern Emigrant Trail, some stayed to make Temecula their home. One such visitor was Louis Wolf, who eventually controlled the 2,200-acre Little Temecula Rancho. Wolf bought out a previous storekeeper Julius Zubinski in 1867. Since then, the adobe building been called the Wolf Store. The adobe general store also housed the Temecula post office and had hotel rooms along the south side for travelers. The Wolfs built a house next door that became the central portion for the present-day Cookhouse and we have found evidence that he also had a one-room schoolhouse that was later moved from behind the Wolf Store to adjoin the Wolf home. Louis Wolf, a Jewish German, and his wife Ramona, who was half-Indian, gave lodging to the author Helen Hunt Jackson (HHJ)who was on assignment by the US Congress to investigate the treatment of Native people in the southwest region of the US. This assignment produced her book A Century of Dishonor. When HHJ later wrote her fictional account, the book Ramona, she opened with sheep shearing time in Temecula, and featured a store run by a burly German and his half-Indian wife named Ramona very close to an Indian cemetery. There is an Indian cemetery within walking distance of the Wolf Store. Although Ramona is a book of fiction and a composite of people, places and events, there is undeniable reference to Hunt's experiences in Wolf's Temecula. For anyone who does not know, the location now called the Vail Headquarters was the town of Temecula prior to what we now call Old Town Temecula. The Temecula of the Wolf family began in the 1860s while the New Town of Temecula, now called Old Town began in 1882 when the rail lines were put through at the base of the western hills 2.5 miles from the Wolf Store. Before we move to more recent history, I want to mention two more hugely important connections to the property. The Mormon Battalion was a volunteer army that marched overland from Council Bluffs, Iowa to assist with the Mexican-American War in 1846-47. It was the longest ever military march on the continental US. As the Mormon Battalion approached Temecula they came upon the aftermath of a Native vs. Native battle. The story goes that the battalion stood guard as the Temecula Indians carried away their dead and buried them. The cemetery is now behind unmarked walls in the shopping center behind Corner Bakery Café in south Temecula. The next era of importance was the Vail era. There were short-term owners and renters of the ranchland surrounding the Wolf Store in the late 1800s and going into the early 1900s. A notable one rancher was Jacob Ludy. From 1904 to 1964 the Vail Company owned the land. They bought up 87,500 acres for grazing cattle that they fattened and shipped to market. Roughly, the Vail Company owned everything from Temecula Parkway to Clinton Keith Road, from Camp Pendleton to past Vail Lake with the exceptions of Old Town Temecula, Historic Downtown Murrieta and ranches the Murrieta Creek. This included nearly all the acreage of the four Mexican land grants in the Temecula Valley. The Vail Headquarters Site was often called the Pauba Ranch at that time. Company business took place there. In the 1910s they built a bunkhouse, cookhouse, barns, an office, a foreman's house and a meteorology building. The meteorology building was need to study rainfall and the volume of water in the Temecula Creek to comply with a water lawsuit that the owners of the future Camp Pendleton waged against the Vail Company. The Wolf Store was used for storage during the years the Vail Company owned the property. The Vail Company sold their holdings in 1964 for $23 million to Kaiser Aetna to design the planned community of Rancho California. Not a bad price for 87,500 acres. Kaiser Aetna drafted subdivisions designating where each agricultural product would be grown (avocados, grapes, citrus) and designating business areas and housing areas, and horse ranch properties. Glen Oaks properties would be 10 acres, Los Ranchitos 5 acres and Meadowview 1.5 acre lots. In 1989 Temecula voted for cityhood and selected the historical name Temecula. It was at first assumed that Murrieta would be incorporated as part of the City of Temecula, but soon leaders in Murrieta decided to incorporate their distinctively different city. Murrieta incorporated in 1990. The Vail HQ sat empty and unused after the Vail Company sold the property in 1964. Renters lived onsite to protect it from vandalism. Pam Malnar lived there, and more recently, Mary Jo Costilow lived in the foreman's house. In April, 1997 some concerned residents raised a vocal alarm over the rundown conditions of the building and the ranch site. They learned that the new owner of the site, MDC Vail, had designs to remove all the historical buildings except the Wolf Store. Although Jerry Swanger and Jerry Morris of MDC Vail had been told by the County of Riverside in 1989 that were required to preserve the historical buildings, they said they would only restore the Wolf Store and tear down the others. Things came to the Farnbachs' attention in June 1997 when we read a letter to the editor in The Californian stating that all the deteriorating buildings on the Vail HQ site should be removed. The reason stated was they were filled with mice, disease and probable Hanta virus. We wrote a response that appeared in The California five days later explaining why the buildings and site should be saved. In rereading our letter to the editor today, we see we had a lot of our facts wrong, but our hearts were in the right place. "It would make a wonderful heritage park to augment the tourist-friendly vineyards and Old Town Temecula and to provide students with a firsthand look at the history of this valley. "Under no circumstances should these history-rich buildings be destroyed. If some government or private agency will provide the funding for renovation, we volunteer to help clean it up and to provide docent tours." Well, after that went to print our lives were never the same! Shortly after our letter to the editor was printed, we received an invitation to meet with the group of concerned citizens in the private room at the back of the Pechanga Buffet when they only had a tent for a casino. The group had met three times before we attended. There were about 12 people at the meeting and we discussed various ideas for how the Vail HQ property could ideally be used. We wanted a 30 to 40-acre historic park, but when we asked the city, county and state, no one had interest in it. We consulted with the City of Temecula, although the property was not in city limits until an annexation of the area a few years later. Things came to a head in April 1998 when we learned that MDC Vail wanted to bulldoze an adobe portion of the foreman's house. We called Jerry Swanger who said it was not historical, that it was built in 1958. I called Walter Vail's grandson who said it was constructed in 1926. Swanger laughed at me when I gave him the information and within a couple of days a hole was dug and the adobe portion of the foreman's house was no more. Out of concern for the rest of the structures so we filed a lawsuit against MDC Vail for the demolition and against the County of Riverside for issuing permits that allowed the demolition. There were four of us who committed ourselves to the suit: Dick Diamond, Rita Gentry, and Darell and Rebecca Farnbach. Rita, an archeologist, was the only one experienced with lawsuits against modern development. She still owns the adobe house of her great-grandfather Harry Hind, a Murrieta pioneer. Dick, a Temecula resident, taught high school history in Riverside. Darell was a hairdresser and I was a medical tech and surgical assistant. We decided Darell & Dick would be the plaintiffs. They had the most time. We decided Rita's name on the case would possibly be a negative since she was known to be anti-development. We had a pro bono lawyer for about two weeks, but we parted ways when we saw that he was protesting development and did not capture our vision for preservation. The four of compiled evidence of the significant importance of the site. We met every Sunday afternoon in our home from March through November 1998, even on Easter, Mother's Day, and Father's Day. We asked for 30 acres to be saved, no further demolition, and renovation to be done according to the US Dept. of Interior standards so the site would continue to be eligible for nomination as a National Historic Site. It was our belief that if it could not be a park run by a governmental agency, then it should be patterned after Old Town San Diego, with retail businesses to pay for the upkeep of the property. Our case, all the historical documentation to justify our position, filled a banker's box. The County had attorneys from Sacramento defend them against us. We were banned from the property. Their other building projects had to be halted until our case was settled. Finally, a settlement was offered for only four acres and Rita Gentry declined to participate, but the two plaintiffs and I agreed to the terms. Rita left our case. The implement barn and machinery barn were dismantled with the materials saved. The foreman's house was moved to fit onto the four acres. We were told if there was a countersuit within the next year that the plaintiffs would have to fund the County's and MDC Vail's defense. The settlement designated that all future events and renovations on the property must be approved by the plaintiffs, with the newly formed Vail Ranch Restoration Association as their successors. Shortly after the settlement agreement was signed, Dick Diamond requested that the Country require the surrounding retail to have barn or ranch type architecture and facades, which you will notice all the way on Temecula Parkway from Interstate 15 to Butterfield Stage Road. You will notice Famous Footwear and Panda Express have barn facades and there are motifs of trellis work and corrugated tin throughout the shopping centers. Kohls did not change their architecture but agreed to place a billboard with a historical photo of our choosing, the Magnificent Seven, a photograph of seven of the Vail cowboys who posed for the famous author Erle Stanley Gardner in 1947. At the time of our lawsuit, we did not know MDC Vail was anxious to settle. They owned back taxes and were required to build the Redhawk Bridge. All did not go well after the settlement with MDC Vail. They did the bare minimum to make the buildings watertight to prevent demolition by neglect. They sold the Vail HQ property a few months later to Price Legacy who sold to Excel Legacy who sold to Kimco. In 2005 we protested to Kimco that none of the settlement requirements had been met. They contacted Jerry Tessier of Arteco Partners who does historic renovations and he accepted the challenge. Unfortunately, he acquired the property just as the economic downturn of 2008 occurred and he could not get funding. The County had made a tax district of the neighboring retail stores to collect and hold the first $3 million dollars in tax revenue in a fund for the renovation of the Vail HQ. It was a $9 million project, so Jerry had to finance it all and then receive reimbursement for it. Jerry will manage the property and collect rent from the businesses leasing the buildings for 30 years with an option to renew it for 10 more years. The property ownership then reverts to the county. Jerry has a great eye for details, and we are thrilled with the outcome. The ribbon cutting to open the property was on July 15, 2016 with nearly all of the retail spaces are leased. The motivation for our involvement has been to tell the stories of the Vail HQ and to keep it from vanishing. Someone had to raise their hands to save it. We are delighted with the outcome of the project and it pleases us to give tours to about 300 third grade students each year. I was working in our nonprofit group's antique store during a Friday Starlight Bazaar when Darell stepped in to take my hand. "Come look at this," he said. Under the stars young families were strolling with wonder in their eyes appreciating the special place where they can come to relax and be with other good people to enjoy food, drink, and music. One Sunday afternoon in 2019 Jerry Morris from MDC Vail stopped by to see us. "You made us do the right thing." It is our hope that in saving the landscape and the structures that the people, events and activities of the past will be long remembered. We are sometimes asked if VaRRA has accomplished our goals. We give an emphatic "Yes". We have accomplished everything so far except for seeing the site accepted as a National Historic site. In January of 2022 we will be sending paperwork to initiate the process. Our main focus was education and activism. We have watched over the site through the years, tending to plants and trees, repairing vandalized fixtures and with the help of the County we have put in a museum in the red barn on the other side of the Kohls building where we can educate people as to the significance of the historic property. With Arteco Partners we have placed informative plaques throughout the historical property and have a few museum areas to view, including an old hotel room and two bunkrooms, and a blacksmith shop. We assist and advise Arteco Partners. All events on the property are sponsored by our historical group. The property has become a self-sustaining retail center that embraces the history past. The entire property is landscaped for enjoyment of the community. There are plaques placed on historic granite throughout the property to answer the questions about the past. The present and future will be celebrated with live music and vendors and miniature train rides on the pathways. We hope the site will be the background for many happy gatherings. Now, with VaRRA merging with the Temecula Valley Historical Society effective September 1, 2019, we have a lot more volunteers and dreamers to create new programs for the Vail HQ site. Vail Headquarters buildings Diamond, Dick Diamond, Rick Busenkell, Debbie Busenkell, Rebecca Farnbach, Darell Farnbach, Rhine Helzer, Sandy Helzer, a volunteer Photo by Mike McNeff - 1999 - at the first Vail Ranch celebration Farnbach, Malcolm Barnett, Loretta Barnett, Bonnie Martland, Sandy Helzer, Duane Preimsberger, Rhine Helzer, Dick Fox Photo by Rebecca Farnbach - 2014
<urn:uuid:a5736380-166e-4a85-a352-7f8264860d87>
CC-MAIN-2020-24
http://temeculahistoricalsociety.org/html1/VaRRA_History.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348517506.81/warc/CC-MAIN-20200606155701-20200606185701-00091.warc.gz
en
0.972984
3,405
3.328125
3
Co-pyrolysis of coal, corn stalks and their blends was studied ultimate analysis of coal pdf a thermobalance. Kinetic parameters are calculated through the DAEM method. The experimental values are compared with the values calculated via the additive model. The devolatilization index presents inhibitory effects between coal and corn stalks during co-pyrolysis. The results reveal that the thermochemical reactivity of CS is higher than that of coal. The devolatilization indexes for blends are lower than the values calculated from the additive model, indicating that the addition of CS may discourage the volatile release of the blends. MS analysis of tars from the pyrolysis of coal, biomass and their blends has been performed. No PAHs having more than a five aromatic rings were identified. Benzopyrene, cyclopentapyrene and benzofluoranthene were the largest PAHs identified. Compared to temperature, the biomass ratio of the fuel has a lower influence on tar composition. The analysis shows that naphthalene content is the maximum in all the tar samples irrespective of biomass and coal blend proportion. Samples with high percentages of coal as well as experiments conducted at 1773 K showed the highest concentration of aromatic compounds. Aliphatic hydrocarbons as well as oxygenated hydrocarbons were mostly found in samples containing high percentages of biomass or in experiments conducted at 1573 K. C ratio decreases with pyrolysis temperature. C ratio reduces as the temperature increases. C ratio of the tars only at lower temperatures. C ratio of the resulting tars. C ratio of the tar. For both switchgrass and pine sawdust, the biomass content of the fuel seems to have no influence on the nitrogen content of the tars. The distribution of sulfur in the tar is inversely proportional to the biomass percentage in the fuel. Check if you have access through your login credentials or your institution. Moisture is an important property of coal, as all coals are mined wet. Total moisture is analysed by loss of mass between an untreated sample and the sample once analysed. Methods 1 and 2 are suitable with low-rank coals, but method 3 is only suitable for high-rank coals as free air drying low-rank coals may promote oxidation. Inherent moisture is analysed similarly, though it may be done in a vacuum.
<urn:uuid:18aac4ef-64d3-4984-9e11-e23ce480db5d>
CC-MAIN-2018-30
http://pushkarfair.eu/ultimate-analysis-of-coal-pdf/
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591296.46/warc/CC-MAIN-20180719203515-20180719223515-00120.warc.gz
en
0.959503
488
2.578125
3
- 1 What will robots do in ten years? - 2 How will robots be used in the future? - 3 What will robots do in 2030? - 4 Will we have robots in 2030? - 5 What jobs will disappear by 2030? - 6 What will robots be like in 2050? - 7 Can robots replace humans? - 8 What are the disadvantages of robots? - 9 What jobs can robots do that humans Cannot? - 10 Has a robot ever killed a human? - 11 Will robots reduce human employment? - 12 Are robots taking over our job? - 13 Can AI take over? - 14 What will happen in the year 2050? - 15 Can robots have feelings? What will robots do in ten years? Robots could replace human workers in up to four million jobs in Britain over the next decade, according to research conducted by UK market research firm YouGov on behalf of the Royal Academy of the Arts. This accounts for 15 percent of the workforce in the country’s private sector. How will robots be used in the future? In future, robots or drones will precisely remove weeds or target them with pesticide, helping reduce chemical use by up to 90%, while tiny sensors could monitor crop growth and alert farmers to problems, or let them know the best time to harvest. What will robots do in 2030? The rise of robots and automation is projected to lead to the displacement of 20 million manufacturing jobs by 2030. A report from Oxford Economics estimates that about 8.5% of the global manufacturing workforce stands to be replaced by robots, with about 14 million manufacturing jobs lost in China alone. Will we have robots in 2030? Step out of that time machine and you’ll see 2030 looks a lot different from 2020 or even 2025. Work has been reshaped by 4IR technologies including artificial intelligence (AI), machine learning (ML), Internet of Things (IoT) and robotics all working in concert. What jobs will disappear by 2030? 5 jobs that will disappear by 2030 - Travel agent. It amazes me that a travel agent is still a job in 2020. - Taxi drivers. - Store cashiers. - Fast food cooks. - Administrative legal jobs. - HR roles. What will robots be like in 2050? Robots will be commonplace in our homes by 2050 – with ‘ android rights ‘ such as being treated with respect, an expert has predicted. The machines may even have to be PAID for their services, as artificial intelligence (AI) becomes increasingly advanced, Dr Ian Pearson says. Can robots replace humans? Yes, robots will replace humans for many jobs, just as innovative farming equipment replaced humans and horses during the industrial revolution. Factory floors deploy robots that are increasingly driven by machine learning algorithms such that they can adjust to people working alongside them. What are the disadvantages of robots? The Disadvantages of Robots - They Lead Humans to Lose Their Jobs. - They Need Constant Power. - They’re Restricted to their Programming. - The Perform Relatively Few Tasks. - They Have No Emotions. - They Impacts Human Interaction. - They Require Expertise to Set Them Up. - They’re Expensive to Install and Run. What jobs can robots do that humans Cannot? Today, factories of all kinds use robots to perform tasks such as welding, assembly, sealing and operating dangerous tools. The other advantage to robots is the fact that, as mechanical apparatuses, they never tire; so they can perform their jobs nonstop, turning manufacturing and industry into 24-hour facilities. Has a robot ever killed a human? Robert Williams (May 2, 1953 – January 25, 1979) was an American factory worker who was the first known human to be killed by a robot. While working at the Ford Motor Company Flat Rock Casting Plant, Williams was killed by an industrial robot arm on January 25, 1979. Will robots reduce human employment? Robots will eventually reduce human employment, but the robotics industry will also generate jobs. According to a recent report, between 2017 and 2037, robots will replace around 7 million people at work. Therefore, according to the same report, robots will also generate 7.2 million jobs. Are robots taking over our job? Robots could take over 20 million manufacturing jobs around the world by 2030, economists claimed Wednesday. Economists analyzed long-term trends around the uptake of automation in the workplace, noting that the number of robots in use worldwide increased threefold over the past two decades to 2.25 million. Can AI take over? In yet another warning against artificial intelligence, Elon Musk said that AI is likely to overtake humans in the next five years. He said that artificial intelligence will be vastly smarter than humans and would overtake the human race by 2025. “But that doesn’t mean that everything goes to hell in five years. What will happen in the year 2050? By 2050, the global population is projected to rise to 9.7 billion, which is more than two billion more people to feed than today. When crops fail and starvation threatens, people are forced to fight or flee. So will the decline of mountain ice, which is a source of meltwater for a quarter of the world’s population. Can robots have feelings? Charming and cute as they are, the capabilities and intelligence of “emotional” robots are still very limited. They don’t have feelings and are simply programmed to detect emotions and respond accordingly. But things are set to change very rapidly. To feel emotion, you need to be conscious and self-aware.
<urn:uuid:513b92b9-c3ea-47f5-b10c-dfecbc4a895d>
CC-MAIN-2021-49
https://www.ieee-icm2017.org/robotics/readers-ask-how-will-robotics-come-into-play-in-ten-years.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359976.94/warc/CC-MAIN-20211201083001-20211201113001-00619.warc.gz
en
0.9391
1,197
2.96875
3
What can be done to diversify our clean energy technology options? In recent years we have seen a number of seemingly “old” technologies undergo a reassessment, and a reinvention. Geothermal power, once assessed as “an excellent source of baseload energy, but likely limited in commercially exploitable capacity” has undergone a renaissance. Here’s the new view in the latest IPCC Special Report on Renewable Energy Sources: In 2008, global geothermal energy use represented only about 0.1 percent of the global primary energy supply. However, by 2050, geothermal could meet roughly 3 percent of the global electricity demand and 5 percent of the global demand for heating and cooling. That dramatic expansion of scope – a factor of 15 on a global scale – is a function of new technology options and forecasts for higher fossil fuel prices. But it is only one example. Another technology undergoing a dramatic expansion of options is that of hydropower. Conventional dams, large and small, use either a natural, or more commonly, an artificial “head” or drop to harness energy. Thus, the energy available is increased with higher dam, and thus a larger flooded reservoir for conventional dams. Therein lies the problem of big dams that inundate ecosystems, displacing people and wildlife, and in some cases – ironically — generating large amounts of greenhouse gas emissions from the decomposition of flooded, submerged, biomass. (Related: “Two Rivers: The Chance to Export Power Divides Southeast Asia” and map: “Exploiting a Land of Plenty“) Some dams have even caused earthquakes. Enter so called “hydrokinetic” energy technologies. Conventional dams alter the river, creating artificial lakes. In hydrokinetic power plants, the energy does not come from falling water, but by extracting the kinetic (movement) energy from the water. This is very exciting because new turbines, nozzles and indeed innovations in everything from jet engines to ocean craft to the design of pipes can come into play to extract energy from flowing water. Hydrokinetic systems are applicable in both river and ocean currents, and can reduce the need for reservoirs and disruption of waterways dramatically, because no- or minimal- storage of water is needed. The array of hydrokinetic options is dizzying, and is a wonderful and promising field of innovation. A recent survey published in Applied Energy noted no fewer than ten promising options: - Axial (Horizontal): Rotational axis of rotor is parallel to the incoming water stream (employing lift or drag type blades) - Vertical: Rotational axis of rotor is vertical to the water surface and also orthogonal to the incoming water stream (employing lift or drag type blades) - Cross-flow: Rotational axis of rotor is parallel to the water surface but orthogonal to the incoming water stream (employing lift or drag type blades) - Venturi: Accelerated water resulting from a choke system (that creates pressure gradient) is used to run an in-built or on-shore turbine - Gravitational vortex: Artificially induced vortex (via funnels) effect is used in driving a vertical turbine - Flutter Vane: Systems that are based on the principle of power generation from hydroelastic resonance (‘flutter’) in free-flowing water - Piezoelectric: Piezo-property (charge accumulation or current generation in response to mechanical force in some specific materials) of polymers is utilized for electricity generation when a sheet of such material is placed in the water stream - Vortex induced vibration: Employs vibrations resulting from vortices forming and shedding on the downstream side of a bluff body in a current - Oscillating hydrofoil: Vertical oscillation of hydrofoils can be utilized in generating pressurized fluids and subsequent turbine operation. - Sails: Employs drag motion of linearly/circularly moving sheets of foils placed in a water stream There is a still a great deal to do in terms of technological reliability, cost, and how to scale these to be megawatt, or tens of megawatts, or more. Large conventional dams can be anything up to many giga-watts in scale. In an earlier blog (“Building a New Nation and New Energy in South Sudan”) I described the Fula Rapids on the White Nile, a location as powerful as it is beautiful, where energy production and river conservation may be a great candidate for this technology. It is nice to see evolving technology, particularly one thought of by many as mature and unchanging, up for a wave of innovation. Daniel Kammen is the World Bank’s chief technical specialist for renewable energy and energy efficiency. He is an adviser to National Geographic’s Great Energy Challenge initiative.
<urn:uuid:6312b7d7-7684-4b51-9305-d22f83824103>
CC-MAIN-2013-48
http://energyblog.nationalgeographic.com/2011/10/25/sustainable-hydropower-technology/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164645800/warc/CC-MAIN-20131204134405-00080-ip-10-33-133-15.ec2.internal.warc.gz
en
0.9149
1,001
3.546875
4
Georgia Museum of Art University of Georgia "His Horne Made": Engraved Powder Horns from the Collection of James E. Routh, Jr. The Georgia Museum of Art will present "His Horne Made": Engraved Powder Horns from the Collection of James E. Routh, Jr., from December 18, 1999, through March 26, 2000, in the Martha and Eugene Odum Gallery of Decorative Arts. This exhibition of eighteenth-century powder horns includes nine horns from the collection of James E. Routh, a Southern artist best known for his prints of the 1930s. (left: works from the exhibition) The tradition of carving powder horns developed in the eighteenth-century by early settlers of America. The horns, carried by soldiers and hunters, were used for storing and dispensing gunpowder. The engraving of these horns may have become necessary for identification purposes; however, it quickly became a decorative art, as well as a folk practice. By the end of King George's War in 1748, the tradition was well established among American men, so much so that, at the beginning of the French and Indian Wars in 1756, the engraved powder horn was considered a fashionable accouterment for men. Men would include their names, dates and places visited on their horns. In addition many would add geometric figures and decorations, rhymes, tales of travel, or the type of game they hunted. Many of the horns were inscribed with the owner's name and the words "his horne made" followed by the date of its carving. Many of the carvings were done by the owner of the horn, but, some men saved their money to have a professional engraver decorate their horns. Each inscribed horn thus represented the owner's individuality and uniqueness. Curated by William U. Eiland, director of the Georgia Museum of Art, the exhibition is made possible at the Georgia Museum of Art through partial funding generously provided by Director's Circle members J.P. Huskins and Helen P. McConnell. "His Home Made"will be accompanied by an illustrated brochure published by the Georgia Museum of Art, which will feature an essay by William Guthman, a recognized authority on carved horns. Read more about the Georgia Museum of Art in Resource Library Magazine Search for more articles and essays on American art in Resource Library. See America's Distinguished Artists for biographical information on historic artists. This page was originally published in 1999 in Resource Library Magazine. Please see Resource Library's Overview section for more information. Copyright 2012 Traditional Fine Arts Organization, Inc., an Arizona nonprofit corporation. All rights reserved.
<urn:uuid:7db64d5f-9722-49dd-9d5f-050d6cac8811>
CC-MAIN-2015-18
http://tfaoi.org/newsm1/n1m617.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246658904.34/warc/CC-MAIN-20150417045738-00035-ip-10-235-10-82.ec2.internal.warc.gz
en
0.965129
540
2.84375
3
Every year I look through seed catalogs trying to find the best fruit and vegetable varieties for our climate and needs. One of my favorite vegetables to choose are carrots. There are so many fun varieties and home grown carrots taste absolutely fantastic! There are five basic types of Carrots. - Chantenay develop stocky roots that become sweeter as the soil cools in the fall. - Danvers make great juice and the sturdy roots store well. - Imperator are long and need deep, sandy soil to thrive. - Iniature have small, shallow roots that are often quite sweet and are good for heavy clay soil. - Nantes are fast and easy to grow, and adapt to a range of climates and soils. This spring I am going to plant three different varieties from Baker Creek. Cosmic Purple – 80 days germination. These Carrots have bright purple skin and flesh that comes in shades of yellow and orange. This is a spicy and sweet-tasting root. These carrots are not only pretty, but purple carrots also are higher in antioxidants than orange carrots and they contain anti-inflammatory properties. Danver Half Long – 70 days germination. The original Danvers Half Long dates back to the 1870s. This is the old standard American carrot that is adaptable, dependable, and productive. Thick 7” roots have good flavor. I grow this carrot for its smaller size and ability to grow in harder soil. St. Valery – 70 days germination. The Vilmorins of France mentioned this variety in 1885 and said it had been grown a “long time.”A large carrot with bright red-orange roots that are sweet and tender. St. Valery is smooth, 10”-12” long, and 2”-3” in diameter. This is a rare variety and will be a new Heirloom for us this year. It is a traditional carrot that receives great reviews. We live in Zone 6a where carrots can be grown in the spring and fall. Using a greenhouse or hoop house will mean a third crop can be harvested though the winter. To plant, begin sowing seeds directly in the garden three weeks before the last expected frost; plant again every 2 to 3 weeks after that. Most cultivars take 70 to 80 days to mature, so sow the last planting 2 to 3 months before the first expected fall frost. Sow seeds about a quarter inch deep and 2 inches apart, in rows spaced at least 10 inches apart; carrots do well in double or triple rows. Thin seedlings to 4 to 6 inches apart, depending on the variety’s mature size. Carrot seeds are very small so they can take some time to plant. They also take longer to germinate than other vegetables so do not worry if they take awhile to come up. For Zone 6a, the frost free date is April 14th so you should plant carrot seeds around March 24th.The reality is that in our area, there is usually a frost right before Mother’s Day. I do not put out any of my starts until after Mother’s Day for that reason. However, because carrots are stared from seed and are quite cold hearty, I feel comfortable planting these in late March is ok.
<urn:uuid:e314f66e-0d3a-49eb-a147-bad22b3eb824>
CC-MAIN-2017-17
http://woodhavenpl.com/2015/10/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122992.88/warc/CC-MAIN-20170423031202-00629-ip-10-145-167-34.ec2.internal.warc.gz
en
0.939746
678
2.71875
3
The church of St Michael was built in the second quarter of the thirteenth century, in the village of Veľká Tŕňa, which was first mentioned in written sources in 1220 (record referred to the territorial dispute between the owner of Třňa, Absalom from the Ratha family, and the vassal from the royal castle Zemplín). In the fifteenth century church underwent a Gothic reconstruction, which mainly affected the chancel. During the Reformation, the church began to be used by the Calvinists. In 1936 a thorough reconstruction of the temple took place, during which the entire chancel was pulled down and a small porch was erected in front of the southern portal. The first archaeological research, that explained the original form of the building, took place in the years 2003-2004. The Romanesque church was built at an elevated position above the eastern edge of the village, on the slope of the Zemplín hills. It was built as a single-nave building with a semicircular apse on the east side and a four-sided slender tower over the west facade. Thin bricks were used in its construction, used everywhere, even to create architectural details, except for the gallery heads and portals: southern and western. The external facades were richly decorated with friezes and lesenes, with the frieze having a slightly different form on each side of the church. Two Romanesque portals led in: southern and western. The southern one was characterized by a stepped jamb and a tympanum depicting a half figure of the Virgin Mary with the Child, accompanied by two angels on the sides. Inside the Romanesque church on the west side of the nave, a gallery was erected along its entire width. It was separated from the nave by a full wall, which on both levels was pierced by three openings with arcades. The three lower arcades were supported by massive cylindrical columns in the middle and half-pillars on the sides, which were a continuation of the moulding of the arcades recess. The space under the gallery was crowned with a transverse barrel vault. The upper part of the arcade was in the middle based on pillars with faults in the corners and abacuses, i.e. four-sided stone slabs which were the highest part of the column heads. The original Romanesque entrance to the gallery led along the northern wall of the nave, somewhere near the chancel arch. Later, a Gothic staircase led along the southern wall of the nave directly to the stairs in the thickness of the wall of the eastern wall of the gallery. The walls of the church were originally covered with colorful polychromes, while the floor consisted of square tiles made of bricks. In the 15th century, the apse was removed and replaced by a long, late-Gothic presbytery with a three-side ending in the east. Its walls from the outside were strengthened with late Gothic buttresses. In the southern wall of the nave, two Romanesque windows were also replaced with new, tall, Gothic windows. The Romanesque nave and the tower have survived to this day. Unfortunately, the eastern part of the church did not survive, neither the original Romanesque apse nor the late Gothic presbytery. During the last renovation, most medieval architectural details were reconstructed and supplemented: pilaster strips, friezes, two-light windows of the tower and partly the southern portal (the original western portal has not survived). The most characteristic element of the church today is its restored Romanesque gallery. Mencl V., Stredoveká architektúra na Slovensku, Praha 1937. Tajkov P., Sakrálna architektúra 11 – 13 storočia na juhovýchodnom Slovensku, Košice 2012. Website apsida.sk, Veľká Tŕňa.
<urn:uuid:14929ea5-5c9a-4ae0-9707-5e0c4da3d5cc>
CC-MAIN-2021-31
https://medievalheritage.eu/en/main-page/heritage/slovakia/velka-trna-st-michaels-church/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154457.66/warc/CC-MAIN-20210803092648-20210803122648-00359.warc.gz
en
0.970357
839
3.015625
3
The present paper focus on the requirement of online education for school students during the Coronavirus pandemic which has shut all schools in India. With the purpose to continue imparting education, the educators and teachers have been using e-learning approach to teach remotely on digital platforms as a source to bring the classroom to home. But it is important to highlight the challenges of online learning, how students without reliable internet access and technology struggle to participate in digital learning, whether the use of technology is proved less economical or it has improved the quality of the education and what are the impacts of online education on students. There are also few suggestions to overcome challenges of online education and the means to make online education a success in near future in the country like India. Cite this article: Meghna Kantharia. Online School Education in India during Coronavirus Pandemic: Benefits and Challenges. Res. J. Humanities and Social Sciences. 2020; 11(2):99-103. doi: 10.5958/2321-5828.2020.00017.0 Meghna Kantharia. Online School Education in India during Coronavirus Pandemic: Benefits and Challenges. Res. J. Humanities and Social Sciences. 2020; 11(2):99-103. doi: 10.5958/2321-5828.2020.00017.0 Available on: https://www.rjhssonline.com/AbstractView.aspx?PID=2020-11-2-1 1. Bedi, Aneesha. “No gadgets, no studies: What online classes mean for 16 lakh poor students in Delhi schools.” The Print, Printline Media Pvt. Ltd., 22 Apr 2020, https://theprint.in/india/education/no-gadgets-no-studies-what-online-classes-mean-for-16-lakh-poor-students-in-delhi-schools/406837/?amp. 2. Bhat, Sana. “How To Make Online Learning More Engaging During The Coronavirus Lockdown.” eLearning Industry, 30 Apr 2020, https://elearningindustry.com/make-onlinelearning-engaging-during-coronavirus-lockdown/amp. 3. Bhatnagar, Gaurav Vivek. “Without the Right Tools, Students With Disabilities Struggle in Online Classes: Activists.” The Wire, Readwhere CMS, 15 May 2020, https://m.thewire.in/article/rights/students-with-disabilities-online-classes/amp. 4. Chanda, Avik, and Atanu Ghosh. “Online Learning: A solution to disruption in education?” Economic Times, Bennett, Coleman and Co. Ltd., 28 Apr 2020, https://m.economictimes.com/industry/services/education/online-learning-a-solution-todisruption-in-education/amp_articleshow/75426199.cms. 5. Lakshmanan, Remya. “How is COVID-19 impacting online education?” Invest India, 9 Apr 2020, https://www.investindia.gov.in/team-india-blogs/how-covid-19-impacting-online-education. 6. Nanjappa, Vicky. “The lockdown challenge and how the poor need to cope with education.” One India, One.in Digitech Media Pvt. Ltd., 8 May 2020, https://www.oneindia.com/amphtml/india/the-lockdown-challenge-and-how-the-poorneed-to-cope-with-education-3085007.html. 7. Punit, Itika Sharma. "For many of India’s teachers, online classes amid lockdown have been an awful experience." Scroll.in, 13 May 2020, https://amp.scroll.in/article/961738/for-many-of-indias-teachers-online-classes-amidlockdown-have-been-an-awful-experience. 8. Sharma, Kritika. “Why online classes may not be such a good idea after all, especially for kids.” The Print, Printline Media Pvt. Ltd., 23 Apr 2020, https://theprint.in/india/education/why-online-classes-may-not-be-such-a-good-idea-afterall-especially-for-kids/406979/?amp.
<urn:uuid:bff375ed-f2ab-49ef-b229-e8fcb0054199>
CC-MAIN-2023-06
https://www.rjhssonline.com/AbstractView.aspx?PID=2020-11-2-1
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499758.83/warc/CC-MAIN-20230129180008-20230129210008-00762.warc.gz
en
0.859054
1,003
3.3125
3
Shifts in exchange patterns provide a new perspective on the fall of inland Maya centers in Mesoamerica approximately 1,000 years ago. This major historical process, sometimes referred to as the "Maya collapse" has puzzled archaeologists, history buffs, and the news media for decades. The new research was published online May 23 in the journal Antiquity. "Our research strongly suggests that changing patterns of trade were instrumental in prompting the 'Maya collapse,'" said Gary Feinman, curator of anthropology at The Field Museum, which collaborated with the University of Illinois at Chicago on the study. The new research casts doubt on the idea that climate change was the sole or principal cause, Feinman said, noting that some Maya centers, which flourished after the collapse, were located in the driest parts of the Maya region. Feinman said that climate change, along with breakdowns in leadership, warfare, and other factors, contributed to the collapse, but the shifting exchange networks may have been a key factor. For the Maya, who did not have metal tools, obsidian (or volcanic glass) was highly valued because of its sharp edges for use as cutting instruments. Maya lords and other elites derived power from controlling access to obsidian, which could be traded for important goods or sent as gifts to foster important relationships with other Mayan leaders. The Field Museum researchers found that prior to the fall of the Maya inland centers, obsidian tended to flow along inland riverine networks. But over time, this material began to be transported through coastal trade networks instead, with a corresponding increase in coastal centers' prominence as inland centers declined. The shift in trade might have involved more than obsidian. Field researcher Mark Golitko said, "The implication is that other valuable goods important to these inland centers were also slowly being cut off." Golitko led the Social Network Analysis that graphically depicts the change in trade patterns. Researchers compiled information on obsidian collected at Maya sites, and used chemical analysis to identify the source(s) that produced obsidian found through archaeological studies at each location. Obsidian from three sources in Guatemala and several sources in central Mexico and Honduras were identified. The researchers generated data for each of four time periods: Classic (approximately 250-800 AD), Terminal classic (approximately 800-1050 AD), Early Postclassic (approximately 1050-1300 AD), and Late Postclassic (approximately 1300-1520AD). Using Social Network Analysis (SNA) software, the researchers developed maps illustrating which sites had the same or similar percentages of each type of obsidian, in each of the four time periods. These percentages were then utilized to infer the likely network structure through which obsidian was transported A comparison of the resulting SNA maps show that Classic period networks were located in inland, lowland areas along rivers, mostly in what is today the northern part of Guatemala, the Mexican state of Chiapas, the southern Yucatan, and western Belize. However, maps bearing data from later time periods show that inland networks diminished in importance and coastal networks were thriving, in what today is the northern Yucatan and coastal Belize. The SNA data "is a very visual way to let us infer the general layout of the networks that transported obsidian, and the likely paths it took," Golitko said. Feinman termed the study results significant. "The use of SNA to display and analyze the obsidian data graphically gives us a new perspective on these data, some of which has been present for years." The study did not explore the question of why the transport networks began to shift. Feinman said there may have been military animosities that made the inland, river routes less safe or easy to use, and added that during this period the seagoing transport may have become more efficient with larger canoes. He noted that scientists simply don't have the definitive answers to some of these questions. Does this study provide lessons for modern-day civilizations? Not directly, Golitko said. However, he believes it does suggest that major impacts follow when large-scale social and economic networks or communication channels break down. The consequences of the breakdown of obsidian supply to parts of the Maya region, he said, is a lesson for the increasingly connected world in which we live today. Cite This Page:
<urn:uuid:cbe526b6-f421-42a1-8411-c973a88b13e5>
CC-MAIN-2016-36
https://www.sciencedaily.com/releases/2012/05/120523135538.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292697.31/warc/CC-MAIN-20160823195812-00086-ip-10-153-172-175.ec2.internal.warc.gz
en
0.963786
887
3.53125
4
By the eighteenth century, the world had made great advances in science and technology. Yet no one had a scientific way of calculating the exact position of a ship at sea, a problem which resulted in thousands of deaths in shipwrecks around the world. Desperate to prevent future tragedies like the Royal Navy shipwreck off the Scilly Islands in 1707, British Parliament offered a £20,000 prize (roughly equivalent to £3 million or $4.8 million today!) to anyone who devised an accurate way of measuring longitude at sea. The world’s finest astronomers rose to the challenge, but a quick-tempered village carpenter and clockmaker set his mind to the task, as well, and created an invention that would revolutionize ocean travel for years to come. Readers who are interested in ships, sea-faring stories, or inventors should definitely check out this fascinating non-fiction book which uses a blend of history, science, and biography to tell the story of John Harrison’s amazing clocks and his race against all odds to win the longitude prize. I would recommend The Longitude Prize especially to readers in grades 4-8.
<urn:uuid:6c6f17a7-92cf-4a3f-bd47-fa8aa9496623>
CC-MAIN-2021-10
https://susanthelibrarian.com/2012/12/05/the-longitude-prize-by-joan-dash/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385389.83/warc/CC-MAIN-20210308174330-20210308204330-00030.warc.gz
en
0.950033
240
3.8125
4
When combined with the polyester microfiber in just the right combination, a cloth results with the advantages of both synthetics. Too much nylon will result in a cloth that will scratch fine or delicate surfaces like coated optics or fine wood or paint finishes. Too little nylon and the cloth will not last or clean rough surfaces like guitar strings without rapid deterioration. It is this perfect combination of microfiber and nylon that make Googalies the wonder it is. Many of you may find it interesting to more completely explore the evolution of man-made or synthetic fibers so we have provided below and brief yet comprehensive history of these wonderful inventions below. Historically, the use of fiber was limited to those fibers available in the natural world. However, cotton and linen wrinkled from wear and washings; Silk required delicate handling; Wool shrank, and was irritating to the touch. Only a century ago, rayon - the first manufactured fiber - was developed. Fiber chemistry for endless application began. Manufactured (man-made) fibers are now found in modern apparel, home furnishings, medicine, aeronautics, energy, industry, and more. Fiber engineers can combine, modify and tailor fibers in ways far beyond the performance limits of fiber drawn from natural sources such as the silkworm cocoon that is grown in the fields, or spun from the fleece of animals. The table below illustrates the evolution of man-made fibers. First Commercial U.S. The first patent for "artificial silk" was granted in England in 1855 to a Swiss chemist named Audemars. He dissolved the fibrous inner bark of a mulberry tree, chemically modifying it to produce cellulose. He formed threads by dipping needles into this solution and drawing them out - but it never occurred to him to emulate the silkworm by extruding the cellulosic liquid through a small hole. In the early 1880's, Sir Joseph W. Swan, an English chemist and electrician, was spurred to action by Thomas Edison's new incandescent electric lamp. He experimented with forcing a liquid similar to Audemars solution through fine holes into a coagulating bath. His fibers worked like carbon filament, and they found early use in Edison's invention. It also occurred to Swan that his filament could be used to make textiles. In 1885, he exhibited in London some fabrics crocheted by his wife from his new fiber. First Commercial Production The first commercial scale production of a manufactured fiber was achieved by French chemist Count Hilaire de Chardonnet. In 1889, his fabrics of "artificial silk" caused a sensation at the Paris Exhibition. Two years later, he built the first commercial rayon plant at Besancon, France, and secured his fame as the "father of the rayon industry." Several attempts to produce "artificial silk" in the United States were made during the early 1900's, but none were commercially successful until the American Viscose Company, formed by Samuel Courtaulds and Co., Ltd., began its production of rayon in 1910. In 1893, Arthur D. Little of Boston, invented yet another cellulosic product - acetate - and developed it as a film. By 1910, Camille and Henry Dreyfus were making acetate motion picture film and toilet articles in Basel, Switzerland. During World War I, they built a plant in England to produce cellulose acetate dope for airplane wings and other commercial products. Upon entering the War, the United States government invited the Dreyfus brothers to build a plant in Maryland to make the product for American warplanes. The first commercial textile uses for acetate in fiber form were developed by the Celanese Company in 1924. In the meantime, U.S. rayon production was growing to meet increasing demand. By the mid-1920's, textile manufacturers could purchase the fiber for half the price of raw silk. So began manufactured fibers' gradual conquest of the American fiber market. This modest start in the 1920's grew to nearly 70% of the national market for fiber by the last decade of the century. Nylon - The In September 1931, American chemist Wallace Carothers reported on research carried out in the laboratories of the DuPont Company on "giant" molecules called polymers. He focused his work on a fiber referred to simply as "66", a number derived from its molecular structure. Nylon, the "miracle fiber," was born. The Chemical Heritage Foundation is currently featuring an exhibit on the history of nylon. By 1938, Paul Schlack of the I.G. Farben Company in Germany, polymerized caprolactam and created a different form of the polymer, identified simply as nylon "6." Nylon's advent created a revolution in the fiber industry. Rayon and acetate had been derived from plant cellulose, but nylon was synthesized completely from petrochemicals. It established the basis for the ensuing discovery of an entire new world of manufactured fibers. An American Romance DuPont began commercial production of nylon in 1939. The first experimental testing used nylon as sewing thread in parachute fabric, and in women's hosiery. Nylon stockings were shown in February 1939 at the San Francisco Exposition - and the most exciting fashion innovation of the age was American women had only a sampling of the beauty and durability of their first pairs of nylon hose when their romance with the new fabric was cut short. The United States entered World War II in December 1941 and the War Production Board allocated all production of nylon for military use. Nylon hose, which sold for $1.25 a pair before the War, moved in the black market at $10. Wartime pin-ups and movie stars, like Betty Grable, auctioned nylon hose for as much as $40,000 a pair in war-effort drives. During the War, nylon replaced Asian silk in parachutes. It also found use in tires, tents, ropes, ponchos, and other military supplies, and even was used in the production of a high-grade paper for U.S. currency. At the outset of the War, cotton was king of fibers, accounting for more than 80% of all fibers used. Manufactured and wool fibers shared the remaining 20%. By the end of the War in August 1945, cotton stood at 75% of the fiber market. Manufactured fibers had risen to 15%. The Post-War Industry After the war, GI's came home, families were reunited, industrial America gathered its peacetime forces, and economic growth surged. The conversion of nylon production to civilian uses started and when the first small quantities of postwar nylon stockings were advertised, thousands of frenzied women lined up at New York department stores to buy. In the immediate post-war period, most nylon production was used to satisfy this enormous pent up demand for hosiery. But by the end of the 1940's, it was also being used in carpeting and automobile upholstery. At the same time, three new generic manufactured fibers started production. Dow Badische Company (today, BASF Corporation) introduced metalized fibers; Union Carbide Corporation developed modacrylic fiber; and Hercules, Inc. added olefin fiber. Manufactured fibers continued their steady march. By the 1950's, the industry was supplying more than 20% of the fiber needs of textile mills. A new fiber, ""acrylic,"" was added to the list of generic names, as DuPont began production of this wool-like product. Meanwhile, polyester, first examined as part of the Wallace Carothers early research, was attracting new interest at the Calico Printers Association in Great Britain. There, J. T. Dickson and J. R. Whinfield produced a polyester fiber by condensation polymerization of ethylene glycol with terephthalic acid. DuPont subsequently acquired the patent rights for the United States and Imperial Chemical Industries for the rest of the world. A host of other producers soon A Wash and Wear Revolution In the summer of 1952, "wash and wear" was coined to describe a new blend of cotton and acrylic. The term eventually was applied to a wide variety of manufactured fiber blends. Commercial production of polyester fiber transformed the "wash and wear" novelty into a revolution in textile product performance. in 1953 was accompanied by the introduction of triacetate. The majority of the 20th century's basic manufactured fibers now had been discovered, and the industry's engineers turned to refining their chemical and physical properties to extend their use across the In the 1960's and 1970's consumers bought more and more clothing made with polyester. Clotheslines were replaced by electric dryers, and the "wash and wear" garments they dried emerged wrinkle free. Ironing began to shrink away on the daily list of household chores. Fabrics became more durable and color more permanent. New dyeing effects were being achieved and shape-retaining knits offered new comfort and style. In the 1960's, manufactured fiber production accelerated as it was spurred on by continuous fiber innovation. The revolutionary new fibers were modified to offer greater comfort, provide flame resistance, reduce clinging, release soil, achieve greater whiteness, special dullness or luster, easier dyeability, and better blending qualities. New fiber shapes and thicknesses were introduced to meet special needs. Spandex, a stretchable fiber; aramid, a high-temperature-resistant polyamide; and para-aramid, with outstanding strength-to-weight properties, were introduced into the marketplace. In the early 1960's, manufactured fiber accounted for nearly 30% of American textile mill consumption. By 1965, the manufactured fiber industry was providing over 40% of the nation's fiber needs. One dramatic new set of uses for manufactured fibers came with the establishment of the U.S. space program. The industry provided special fiber for uses ranging from clothing for the astronauts to spaceship nose cones. When Neil Armstrong took "One small step for man, one giant leap for mankind," on the moon on July 20, 1969, his lunar space suit included multi-layers of nylon and aramid fabrics. The flag he planted was made of nylon. Today, the exhaust nozzles of the two large booster rockets that lift the space shuttle into orbit contain 30,000 pounds of carbonized rayon. Carbon fiber composites are used in as structural components in the latest commercial aircraft, adding strength and lowering weight and fuel costs. Safety and Energy The early 1970's saw a wave of consumer protection demands, most notably one for a mandated Federal flammability standard for children's sleepwear. The manufactured fiber industry spent $20 million on flammability research and development in 1972 and 1973, and manufactured fiber fabrics became predominant in this market. Flammability standards were also issued for carpet and other products. In the U.S. carpet market, 99% of all surface fibers are now manufactured In late 1973, when the Nation was struck by a severe energy crisis, the manufactured fiber industry reduced the energy required to produce a pound of fiber by 26%. By then, the industry was using but 1% of the Nation's petroleum supply to provide two-thirds of all fibers used by American textile Innovation is the hallmark of the manufactured fiber industry. Fibers more numerous and diverse than any found in nature are now routinely created in the industry's laboratories. Nylon variants, polyester, and olefin are used to produce carpets that easily can be rinsed clean even 24 hours after they've been stained. Stretchable spandex and machine-washable, silk-like polyesters occupy solid places in the U.S. apparel market. The finest microfiber is remaking the world of fashion. For industrial uses, manufactured fibers relentlessly replace traditional materials in applications from super-absorbent diapers, to artificial organs, to construction materials for moon-based space stations. Engineered non-woven products of manufactured fibers are found in applications from surgical gowns and apparel interfacing to roofing materials, road bed stabilizers, and floppy disk envelopes and liners. Non-woven fabrics, stiff as paper or as soft and comfortable as limp cloth, are made without knitting or weaving.
<urn:uuid:36059b13-c050-42c4-bb7f-7b3ef399a66b>
CC-MAIN-2018-22
http://googalies.com/microfsa.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865830.35/warc/CC-MAIN-20180523215608-20180523235608-00232.warc.gz
en
0.945031
2,707
3.1875
3
Chile stretches over half the South American continent – from the driest desert in the world to the glaciers of Tierra del Fuego. And with Rapa Nui (Easter Island), it calls one of the most isolated and mystic islands to its territory (left). Chuquicamata in northern Chile is the biggest copper mine in the world. Since the pollution of the mine was getting too heavy for the nearby city, its inhabitants were moved to another newly built residential zone (right). The Atacama Desert is the driest place on earth with an average rainfall of only 15 millimeters a year. The lakes filled up with glacier water dry up quickly under the burning sun at an altitude of 2‘500m and leave back a salty crust where flamingos flock. The cones of the volcanos close to the desert range up to 6‘000 meters in height. On an area of 23‘000 sqkm (the size of half of Switzerland) reside only about 5‘600 people. Even though its length, the width of Chile measures only around 180 km on average. Which means the Pacific Ocean is never far - not even from the desert. In the south of Chile the Andes and the so called „volcano belt“ end in the „Land of the Fire“, named after Magellan who observed from his ship the many camp fires of the native Yaghan. The weather in Tierra del Fuego is almost unpredictable and can change drastically within hours. The trade with seal fur and the rush for gold led to a genocide of the native groups in the area. They had disappeared almost completely by the end of the 19th century. With snowy mountains and glacier lakes the southern tip of Chile reminds us that the next land masses to the south is the Antarctic. As the diversity of mainland Chile wouldn't be enough Rapa Nui counts to its territory as well. About 3‘500 km away from the coast this isolated island with its hundreds of Moai (monolithic stone figures) is a mystical experience for its own. Project: During a month I had the chance to travel through Chile from top to bottom and to experience the incredible landscapes of this magnificent country.
<urn:uuid:78d1fd27-e776-4318-8eda-f6bb6262d31d>
CC-MAIN-2017-30
http://www.marcterrysommer.com/from-desert-to-glaciers/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500550977093.96/warc/CC-MAIN-20170728183650-20170728203650-00102.warc.gz
en
0.958339
460
2.84375
3
You are hereHome › Now showing results 1-3 of 3 In this online interactive, learners will explore how scientists learn about the composition of an asteroid by studying energy and neutrons that emanate from it. Includes audio (and transcription) explaining the diagram. This interactive, online activity provides a method for generating waves using a computer. Students can select the energy they want the waves to have, observe how the waves appear on the screen, and then measure the frequency and wavelength of the... (View More) observed waves. Upon completion of this activity, students will have uncovered the relationship among frequency, wavelength, and energy. Students may complete this activity independently or in small groups. Detailed teacher pages, identified as Teaching Tips on the title page of the activity, provide science background information, lesson plan ideas, related resources, and alignment with national education standards. This activity is part of the online exploration "Star Light, Star Bright" that focuses on the electromagnetic spectrum and that is available on the Amazing Space website. (View Less) In this assessment activity, students generate a data sample from either the Hubble Deep Field-North or Hubble Deep Field-South images, and compare the sample to data from the unselected field. This provides students with a real-life example of how... (View More) statistics can be used by scientists. After completing this activity students will be able to compare sample data with the population parameter to determine accuracy of sampling techniques and use statistical data to make conjectures about the universe. This interactive online activity is part of the online exploration “Galaxy Hunter”. Detailed teacher pages, identified as Teaching Tips on the title pages of the activity, provide science background information, lesson plan ideas, related resources, and alignment with national education standards. (View Less)
<urn:uuid:38d3b645-f062-4ddc-bbb5-542b39e8d319>
CC-MAIN-2016-40
http://www.nasawavelength.org/resource-search?qq=&facetSort=1&educationalLevel=High+school&resourceType=Instructional+materials%3AInteractive+simulation&learningTime=10+to+30+minutes
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661910.62/warc/CC-MAIN-20160924173741-00281-ip-10-143-35-109.ec2.internal.warc.gz
en
0.891733
364
4.0625
4
What is Glaucoma? Glaucoma is a group of diseases that damage the optic nerve at the back of the eye. The optic nerve transmits visual information from your eye to the brain. When the optic nerve suffers damage, it can no longer send signals to the brain for the vision process to occur. Most glaucoma occurs because of high intraocular pressure (IOP). The disease can occur with normal or low pressure as well. Many patients do not have symptoms of vision loss in the early stage of glaucoma. For many patients, by the time they realize vision loss has occurred, the damage has already begun. If left untreated, glaucoma can result in a serious loss of vision and blindness. Is Everyone At Risk For Glaucoma? It is estimated that glaucoma affects nearly three million Americans. Although everyone, young and old, can be at risk, some groups of people are more likely to develop the condition, including: - African Americans - People of a Hispanic/Latino background - Adults over 60 years old - Those with a family history of glaucoma - People with diabetes and high blood pressure People in these risk groups need to have frequent comprehensive eye examinations to check for the early stages of glaucoma. What Are The Types Of Glaucoma? Open-Angle Glaucoma is the most common form of glaucoma. With this type of disease, the eye’s fluid drainage canals become clogged over time. Most people do not notice early symptoms because glaucoma attacks peripheral vision before affecting central vision. Angle-Closure Glaucoma is less common but far more dangerous. A rapid increase in eye pressure occurs suddenly because the fluid in the eye cannot drain. There are usually no warning signs before this happens. The symptoms include severe eye or head pain, sudden loss of vision, blurry vision, and nausea. Patients with these symptoms should call their eye doctor right away. Angle-closure glaucoma is a medical emergency and requires immediate medical treatment to avoid severe vision loss. Prompt laser treatment and medications can usually clear the fluid blockage and lower the eye pressure. Low or Normal-Tension Glaucoma occurs when people experience damage to the optic nerve or side vision loss even if they have normal eye pressure. Congenital Glaucoma is a condition that occurs when children are born with a defect in the angle of the eye that interferes with fluid drainage. Secondary Glaucoma is caused by other diseases or treatments, such as high blood pressure, diabetes, complications of cataract surgery, uveitis inflammation, and steroid medications. Is Glaucoma Preventable? Most types of glaucoma aren’t preventable. However, early detection and treatment can usually control the disease before severe vision loss occurs. Many patients do not notice that their vision has changed because glaucoma typically affects side vision first. Ophthalmologists recommend that everyone over the age of 40 have an annual comprehensive eye examination. Besides checking your eye pressure, your doctor will dilate your pupils with eye drops to check the condition of your optic nerve. How Is Glaucoma Treated? There is no cure for glaucoma, but its effects are controllable. Every type of treatment has risks and benefits. Your doctor at Joshi Eye Institute can explain the most appropriate options for you. Glaucoma is commonly treated by lowering or regulating the pressure in the eye. High intraocular pressure is usually caused by fluid in the eye not draining properly. Doctors use three different methods to lower pressure: Eye drops or pills are almost always the first treatment that eye doctors try when treating glaucoma. There are a wide variety of drugs that lower eye pressure effectively. Some reduce the amount of fluid the eye produces, and others help fluid drain from the eye. Treating glaucoma using medication is only effective when patients use their eye drops as prescribed. This means taking them every day. If you experience side effects such as eye redness and stinging, there are many other drug options that your doctor can try. Selective Laser Trabeculoplasty (SLT) is used for patients with open-angle glaucoma when eye drops don’t lower eye pressure enough. With this painless office procedure, your doctor uses a special lens. Then, they’ll apply an intense beam of light to the drainage system of the eye, which improves function. Micro-Invasive Glaucoma Surgery (MIGS) A variety of new micro-invasive surgical treatments have been developed in the last ten years. These procedures can be effective in reducing intraocular pressure (IOP) with lower risks than traditional surgery. Trabeculectomy surgery has been performed for many years when medical and laser treatments have failed. With this procedure, the surgeon creates a new channel for the fluid to drain from the eye. While usually effective, there is a high risk of complications. If you have questions or concerns about glaucoma, schedule an appointment at Joshi Eye Institute in Boynton Beach, FL!
<urn:uuid:b2db8b8a-4c3b-4445-9ec1-b9b6e1b6c95f>
CC-MAIN-2023-06
https://joshieye.com/glaucoma-boynton-beach/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501066.53/warc/CC-MAIN-20230209014102-20230209044102-00658.warc.gz
en
0.92084
1,133
3.625
4
(Note the reviewer, Dr. S. Goldin-Meadow is widely known for her research on use of sign language and gestures by young children.) Goldin-Meadow, S. (1996). Book review of Kanzi: The ape at the brink of the human mind by Savage-Rumbaugh, S. & Lewin, R. International Journal of Primatology, 17, 145-148. Kanzi: The Ape at the Brink of the Human Mind By Sue Savage-Rumbaugh and Roger Lewin, John Wiley and Sons, New York, 1994, xvii +299 pp., $24.95 (hardback). What if a chimpanzee were raised with all the comforts and artifacts of a human society? Would that chimp learn language as a human child does? At one point in the history of the teaching-language-to-chimps studies (when Washoe, Nim, and Sara, the best-known of the language-learning chimps, were young), the answer would have been a confident "yes." Then came the 1980's when criticisms from many quarters led to a reevaluation of that "yes." The critiques came from linguists who claimed that the accomplishments of the chimps fell far short of human language, from ape-language researchers who claimed that even these minimal accomplishments were more apparent than real (reflecting the way that the humans structured interactions for the chimps rather than the chimps' own communicative abilities), but also from the author of Kanzi, Sue Savage-Rumbaugh, who calmly pointed out that the evidence that the chimps were using their signs as symbols was thin. Since then, when the vehement criticisms from the first two camps had all but destroyed public support for, and interest in, teaching language to chimps, Savage-Rumbaugh has methodically gone about trying to convince herself (and, in the process, others) that the chimpanzee can use symbols to communicate. Kanzi: The ape at the brink of the human mind is convincing, up to a point. Written for the layperson, the book is not a research report of the many excellent studies Savage-Rumbaugh has done (they are mentioned in the text and references are given) but rather a well-written story of how she has attempted to break down the wall that exists between human and chimp (on one side of the wall we have humans who are proficient language-users, on the other side chimps who are said to be language-less). In conjunction with Roger Lewin, a science writer, Savage-Rumbaugh recounts how she became interested in the chimp projects first at Oklahoma and later at Yerkes, and the inroads she has made in teaching the chimp about language. One of the most interesting chapters is the account of how Sherman and Austin, two common chimps who were originally both incapable of generalizing a "word" beyond the situation in which it was taught, subsequently learned how to spontaneously communicate requests to each other using words (actually a point at an arbitrary symbol standing for an object). The chapter not only provides evidence that these words had begun to function as symbols rather than mere associations for Sherman and Austin, but it also lays out the kind of laborious training needed to get the chimps to this point. This effortful training stands in contrast to Kanzi's education. Kanzi is the star of the book and is a bonobo (pygmy) chimp raised from birth in an environment where spoken words and the language board (arbitrary symbols to which one can point to convey an object or action) were spontaneously used to communicate with him. In response, Kanzi began to use the language board to communicate with his human companions. Kanzi's accomplishments are impressive and, given Savage-Rumbaugh's sensitivity to criticisms raised about the earlier chimp work and caution in making claims in the past, are not likely to be figments of the human observer's imagination. Understandably given that Savage-Rumbaugh felt herself under seige from all camps, the book focuses only on what Kanzi can do and does not dwell on what he can't (or at least, doesn't) do. Nevertheless, it is important to keep in mind that there are differences between Kanzi and a language-learning child. For example, many of the illustrations of Kanzi's communications presented in the book are comments on aspects of his world. However, what we learn from the research publications (e.g., Greenfield & Savage-Rumbaugh, 1991) is that comments account for only 4% of Kanzi's communications. In other words, almost all of his communications come about because he wants something done, not because he wants to chat. Although undoubtedly real, these few comments do not appear to be the norm for the chimp, and their strikingly low frequency stands in contrast to young human language-learners who use their language at least as often to make conversation as to make requests. Another of the significant differences between child and chimpanzee (even a bonobo) is that, while chimps appear to require a great deal of linguistic input to develop language, human children, even if lacking a model for language altogether, will actually invent a language to communicate with those around them. Deaf children, whose hearing losses prevent them from acquiring speech and whose hearing parents have not yet exposed them to a sign language, use gestures to make requests as well as to comment on the past, present, and future and even on their own gestures. Moreover, the children's gestures are structured at both the word/gesture and sentence levels and have grammatical categories, similar to the early sentences of child language Goldin-Meadow & Mylander, 1990). This difference between child and chimp is particularly important when making an evolutionary argument, since it is the ability to invent a system (and not just learn it) that is critical for such an argument to go through. Thus, while the wall between chimp and human language may be permeable, Kanzi is not equivalent to a human child in terms of either language-learning or language-creating abilities. Savage-Rumbaugh herself is undoubtedly well aware of the differences between child and chimp, but the book pays them little mind -- an unfortunate omission particularly since these differences take on new interest in light of the fact that there do appear to be some similarities between child and chimp language. Indeed, one is tempted to ask why chimps (particularly those provided with many of the artifacts of human culture) do not invent language given that they seem to be able to learn at least its rudimentary aspects. One possibility is that they do and have and that we haven't looked in the right place. The book does, at times, mention the natural communications that chimps use in the wild, arguing that we may well be underestimating the structure of such systems. Another place we may be underestimating the chimp is in his use of gesture. Throughout the book, Kanzi's gestures are frequently mentioned in passing but no systematic attention is paid to them (aside from the pointing gesture he uses to indicate the desired agent in requests). Indeed, over the course of her studies (and the book), Savage-Rumbaugh begins to concentrate solely on Kanzi's ability to understand human speech and on his attempts to produce it. This focus on speech (as opposed to nonverbal symbols like gesture which can have language-like properties) is perhaps excessively narrow, particularly in the origins of language chapter, given that humans are completely equipotential when it comes to learning a spoken language vs. a gestural language such as American Sign Language. Why should speech be the most important yardstick against which the chimp's accomplishments are measured? What then do we learn from successfully teaching a bit of language to a chimpanzee? One fascinating outcome that is mentioned in the book is what we can learn about the relationship between language and thought. For example, language-competent chimpanzees are able to learn to use a joystick on a computer through simple observation while language-naive apes must be trained to do so bit by bit. By comparing chimps who are language-users with chimps who are not, we can begin to get a sense of which tasks are facilitated by knowing symbols (and which are not). Kanzi's story is well-told. The book captures Savage-Rumbaugh's extensive knowledge of apes, as well as her deep respect and affection for them, and it does so in a very readable way. Moreover, the book paves a path away from the fruitless question of whether chimps do or don't (have language) toward more interesting questions, such as which aspects of human language are within the chimp's capabilities (and which are not), and which artifacts of human culture must be in place before those abilities can be tapped. Department of Psychology 5730 South Woodlawn Avenue The University of Chicago Chicago, IL 60637 Goldin-Meadow, S. & Mylander, C. Beyond the input given: The child's role in the acquisition of language. Language, 1990, 66(2), 323-355. Greenfield, P. M., Savage-Rumbaugh, E. S. Imitation, grammatical development, and the invention of protogrammar by an ape. (1991). In N. A. Krasnegor, D. M. Rumbaugh, R. L. Schiefelbusch, & M. Studdert-Kennedy (eds.), Biological and behavioral determinants of language development (pp. 235-258). Hillsdale, N.J.: Lawrence Erlbaum Associates.
<urn:uuid:f2018a18-66ef-4605-9ce8-ed071c19776e>
CC-MAIN-2015-32
http://pubpages.unh.edu/~jel/SGMonKanzi.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042987135.9/warc/CC-MAIN-20150728002307-00189-ip-10-236-191-2.ec2.internal.warc.gz
en
0.959996
2,005
2.78125
3
Monday, May 12, 2008 Battle of Devil's Backbone, Part One The Devil's Backbone is a unique mountain ridge that stretches across the horizon south of the city of Fort Smith, Arkansas. Part of the Ouachita (pronounced Wah-she-tah) Mountains, it is a major feature of both Sebastian County, Arkansas and LeFlore County, Oklahoma. At the time of the Civil War, the Backbone was more than just a beautiful mountain ridge. It served as a natural barrier to military forces operating in the area. The Confederates were the first to put the ridge to use for military purposes. Facing a disastrous disintegration of his force as the stronger Union Army of the Frontier approached Fort Smith from the west in August of 1863, Brig. Gen. W.L. Cabell tried to decide on a strategy that might give him a chance for success against the Federals. The night of August 31, 1863, found the two sides arrayed along the Poteau River in the Choctaw Nation (today's LeFlore County, Oklahoma) just west of Fort Smith. Although the Federals expected to fight the battle for Fort Smith along the Poteau the next morning, Cabell knew he was outnumbered by an enemy that also had superior artillery on the field. In addition, he was worried about the morale of his army. Desertion had become epidemic and he feared his men might break and run unless he put them in a strong position. Consequently, Cabell developed a plan to pull his force back from the Poteau in the night, move his supply train across the Backbone to Waldron, Arkansas, and then position his force in a strong position along the ridge. He would then use some of his cavalry to fight a delaying action with the oncoming Union force and hopefully draw it into an ambush at the base of the mountain. It was a risky strategy that would result in the evacuation of Fort Smith by the Confederates, but short of a complete retreat, it was the only reasonable option available to the Southern general. Our series on the Battle of Devil's Backbone will continue.
<urn:uuid:5298c458-2352-497e-aeaa-0d3c0c3b907c>
CC-MAIN-2023-40
https://civilwararkansas.blogspot.com/2008/05/battle-of-devils-backbone-part-one.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510941.58/warc/CC-MAIN-20231001205332-20231001235332-00638.warc.gz
en
0.974769
443
3.625
4
Cypress trees are evergreen trees with needles that remain with color year-round. The foliage on cypress trees varies from deep emerald green to blue and they turn fiery colors like deep oranges and russet browns in fall. Grown in a wide range of shapes and sizes, cypress trees typically have an upright, pyramidal shape that makes for a showy display in the landscape. Bald cypress (Taxodium distichum) is a deciduous cypress tree variety with a moderate growth rate and fine texture. Growing 50 to 100 feet tall and 20 to 30 feet wide, bald cypress trees create a commanding landscape presence. Adaptable, bald cypress trees are heat- and drought-tolerant, making for the ideal tree to grow in arid climates. The cones on bald cypress trees grow 1 to 2 inches long and the small leaves are sage green and turn a soft brown to orange in fall. The red to brown bark is fibrous and "knees" are produced when planted in or near water. Bald cypress trees require full sun and grow in a wide range of soil varieties including wet, compacted and dry soils. Plant bald cypress in U.S. Department of Agriculture (USDA) hardiness zones 4 to 9. Italian cypress (Cupressus sempervirens) is an evergreen conifer that has a moderate growth rate and medium to fine texture. Growing 20 to 30 feet tall and 3 to 5 feet wide, Italian cypress trees have dark green to blue foliage that remains vibrant all year long, including winter, and when crushed, are aromatic. The upright, slender columnar shape of Italian cypress trees makes for a striking accent plant lining an entrance or walkway. Italian cypress trees require full sun and grow in a wide range of soil types. Plant in USDA zones 7 to 9. Leyland cypress (x Cupressocyparis leylandii) is an evergreen tree with a rapid growth rate and blue to green needles that make up the flattened sprays. The slender branches of Leyland cypress hold the dark brown cones that grow 3/4 inches wide. Growing 60 to 90 feet tall and 12 to 15 feet wide, Leyland cypress has an upright, pyramidal shape. Leyland cypress trees are an ideal screening plant for their height and width and are an easy cypress tree variety to transplant. Salt-tolerant, Leyland cypress requires full sun and well-drained soils to thrive. Plant in USDA zones 6 to 10.
<urn:uuid:f53928f7-51d4-42e0-b3ed-8b955479e287>
CC-MAIN-2017-17
http://www.gardenguides.com/115923-kinds-cypress-trees.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124297.82/warc/CC-MAIN-20170423031204-00200-ip-10-145-167-34.ec2.internal.warc.gz
en
0.913222
534
3.546875
4
Alcohol-related health problems have reached record levels, with the number of hospital admissions running at double the number they were 10 years ago. Government figures released yesterday showed deaths from alcoholic liver disease had also risen by 39 per cent in the past five years. Charities said rising numbers of people from all age groups were drinking to excess and said the Government needed to do more to reduce alcohol consumption. Figures from the Office for National Statistics, which was compiled for the NHS, found that 35,400 people were admitted to hospital with a diagnosis of alcoholic liver disease last year compared with a total of 14,400 admissions in 1995. More than 4,000 people died as a result of excessive drinking last year. More than 126,000 were also admitted for in-patient care for mental health problems linked to excess drinking, a 75 per cent increase in 10 years. A further 21,700 people were admitted to hospital with alcoholic poisoning as a result of binge-drinking, the report found. Professor Denise Lievesley, chief executive of the government-run Information Centre which released the report, said: "This report shows that we cannot underestimate the effect of alcohol on health. "By presenting this data we hope that health professionals will be better equipped to put their work in context and to raise awareness of the dangers of alcohol misuse." The average Briton drinks 10.39 litres of pure alcohol a year, putting the UK near the middle of a European Union league table on drink consumption. But alcohol misuse starts early in Britain, the report warned. Almost one in four children aged between 11 and 15 have admitted to having an alcoholic drink in the week before the survey. Among those youngsters who had a drink, the average consumption was 10 units - double the amount children were drinking 10 years ago. Alcohol misuse among all age groups is estimated to cost the NHS £1.7bn a year. A spokeswoman for the charity Alcohol Concern said: "The publication of this latest set of statistics on alcohol presents compelling evidence of the devastating impact of excess drinking on the nation's health. "In 2004, the Government laid out a national strategy for tackling alcohol misuse. These statistics underline the need for a major push for the Government to meet the targets it set itself." A spokeswoman for the Department of Health said yesterday: "We know that alcohol misuse has a devastating effect on millions of lives each year and that is why we are working with the drinks industry, police and health professionals to increase awareness of the dangers of excessive drinking and make the sensible drinking message easier to understand. "We will also be launching a joint campaign with the Home Office later this year to promote sensible drinking amongst young people." She said the Government was spending more than £200m a year on treating people with alcohol problems.Reuse content
<urn:uuid:f36ee98f-d4f9-4ba0-866c-281d9f23a720>
CC-MAIN-2016-50
http://www.independent.co.uk/life-style/health-and-families/health-news/alcohol-related-illnesses-reach-a-record-high-6096679.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541783.81/warc/CC-MAIN-20161202170901-00442-ip-10-31-129-80.ec2.internal.warc.gz
en
0.966597
576
2.609375
3
Can Low Testosterone Cause Hair Loss On Legs Low testosterone (male hypogonadism) is a condition in which your testicles do not generate adequate testosterone. It has numerous possible causes, consisting of problems or injuries influencing your testicles, pituitary gland or hypothalamus. It’s treatable with testosterone replacement therapy. What is low testosterone (male hypogonadism)? Low testosterone (male hypogonadism) is a condition in which your testicles don’t produce enough testosterone (the male sex hormonal agent). Testicles are the gonads (sex organs) in people designated male at birth (AMAB). A lot more especially, the Leydig cells in your testicles make testosterone. Low testosterone triggers different symptoms at different ages. Testosterone degrees in grownups AMAB normally decrease as they age. This consists of cisgender guys, non-binary individuals AMAB and also transgender ladies that aren’t going through feminizing hormone therapy. Various other names for low testosterone as well as male hypogonadism include: Testosterone deficiency syndrome. What does testosterone do? Testosterone is the main androgen. It stimulates the growth of male qualities and is essential for sperm manufacturing (spermatogenesis). Degrees of testosterone are normally a lot higher in individuals assigned AMAB than in people designated female at birth (AFAB). In people designated AMAB, testosterone aids create and also keep : Sex body organs and also genitalia. Adequate levels of red blood cells. Feeling of wellness. Reproductive and sex-related function. Your body usually firmly controls the levels of testosterone in your blood. Degrees are typically highest possible in the early morning and also decrease via the day. Your hypothalamus and also pituitary gland generally manage the quantity of testosterone your testicles release and produce . Your hypothalamus launches gonadotropin-releasing hormone (GnRH), which triggers your pituitary gland to launch luteinizing hormone (LH). LH after that travels to your gonads ( ovaries or testicles ) and stimulates the production and release of testosterone. Your pituitary additionally launches follicle-stimulating hormonal agent (FSH) to create sperm manufacturing. Any kind of concern with your testicles, hypothalamus or pituitary gland can cause low testosterone (male hypogonadism). What is a low testosterone degree? The American Urology Association (AUA) considers reduced blood testosterone to be less than 300 nanograms per deciliter (ng/dL) for grownups. However, some scientists and also doctor differ with this as well as really feel that degrees below 250 ng/dL are reduced. When identifying low testosterone, service providers likewise take signs and symptoms into consideration. That does low testosterone (male hypogonadism) influence? Male hypogonadism is a clinical condition that can affect people with testicles at any kind of age from birth via adulthood. Low testosterone is most likely to influence individuals that: Have actually poorly handled Type 2 diabetes mellitus. Have obstructive sleep apnea. Have persistent medical problems, such as kidney disorder or cirrhosis of the liver. Just how common is low testosterone? It’s hard for scientists to approximate exactly how common low testosterone is since various studies have different definitions for low testosterone. Information suggest that about 2% of people AMAB may have low testosterone. As well as other research studies have actually estimated that greater than 8% of individuals AMAB aged 50 to 79 years have low testosterone. What are the symptoms of low testosterone? Signs of low testosterone can vary significantly, particularly by age. Signs and symptoms that extremely recommend low testosterone in grownups appointed male at birth include: Lowered libido. Can Low Testosterone Cause Hair Loss On Legs Loss of armpit and pubic hair. Low or absolutely no sperm matter (azoospermia), which creates male the inability to conceive. Various other signs and symptoms of low testosterone in adults AMAB consist of: Clinically depressed state of mind. Troubles with concentration as well as memory. Raised body fat. Bigger male bust cells (gynecomastia). Reduction in muscular tissue toughness as well as mass. Decline in endurance. Signs of low testosterone in youngsters Low testosterone prior to or throughout the age of puberty for children designated man at birth can lead to: Reduced growth in elevation, however their legs and also arms may continue to grow out of proportion with the rest of their body. Reduced growth of pubic hair. Lowered development of their penis and testicles. Much less voice strengthening. Lower-than-normal toughness and also endurance. What causes low testosterone? There are several possible reasons for low testosterone. The two sorts of male hypogonadism are: Primary hypogonadism (testicular condition). Secondary hypogonadism (pituitary/hypothalamus disorder). Causes of key and secondary hypogonadism are additionally split right into either congenital (at birth) or acquired ( created later in childhood years or their adult years). Reasons for key male hypogonadism When something is wrong with your testicles that doesn’t permit them to make regular levels of testosterone, primary hypogonadism takes place. In this type, your pituitary gland produces even more luteinizing hormonal agent (LH) and also follicle-stimulating hormonal agent (FSH) ( understood as gonadotropins) in action to low testosterone levels. The high degrees of these hormones would typically inform your testicles to create even more testosterone as well as sperm. Exactly how is low testosterone treated? Healthcare providers treat low testosterone (male hypogonadism) with testosterone replacement treatment. Testosterone substitute treatment has several various forms, including: There’s no single repair for low testosterone. Nonetheless, regular hormone substitute therapy aids boost libido, simplicity symptoms of anxiety as well as boost energy levels for many individuals assigned male at birth (AMAB) experiencing low testosterone. Can Low Testosterone Cause Hair Loss On Legs
<urn:uuid:7be02ae1-deb4-4683-9ebc-5e3fda75a0bf>
CC-MAIN-2023-50
https://testerol-o.com/can-low-testosterone-cause-hair-loss-on-legs.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00587.warc.gz
en
0.913574
1,317
2.546875
3
Oxidative stress in farm animals – the performance decreaser What is oxidative stress in farm animals? What makes antioxidants special? What are reactive oxygen species? And what do phytogenics have to do with it? Find all the answers to your questions here… Due to the global warming it gets hotter and hotter – not only we feel this, but also livestock animals. Due to heat stress, behavior and major physiological reactions in the organism of human and animal change:Thus, shady places are visited, sweat production or panting increases, water absorption is enhanced, and exercise is kept to a minimum. Moreover, feed intake drops, and growth performance of animals is reduced, resulting in substantial economic losses for the farmer. Do you know about oxidative stress in farm animals and its consequences? Let’s have a look: After reading the article you will know: - Why oxidative stress in farm animals occurs during heat stress - What ATP has to do with energy - What happens during lipid peroxidation - The mode of action of antioxidants - How selected phytogenics can offer antioxidative effects ATP – the cells energizer Energy can have many states: Light energy, thermal energy, electrical energy or chemical energy. Living organisms need chemical energy to maintain their vital functions. This is stored in form of different (bio)chemical compounds and can be retrieved when there is a demand for conversion into other energy forms (movement, breathing, heart rate). The most important (bio)chemical energy store of living beings is ATP (adenosine triphosphate). The Energy, released from metabolic processes, is bound in ATP. ATP consists of the nitrogen-containing base adenine, linked to ribose (5-carbon sugar). Three inorganic phosphate groups (P) are attached to ribose. If ATP reacts with water, one phosphate group is split off. ADP (adenosine diphosphate) and phosphate are formed. During this reaction, energy is released. Cooling requires energy Under hot and humid climate conditions, panting or sweat production to cool the organism requires energy. In animals and humans use of these cooling mechanisms is linked to an increased cellular energy expenditure. To produce sufficient amounts of energy – or adenosine triphosphate (ATP) – for essential cellular processes such as Na+-K+-ATPase activity, the capacity of mitochondria – the power plants of cells – is up-regulated. However, this upregulation of ATP-production comes along with an intensive production of reactive oxygen species. But what are reactive oxygen species? So-called reactive oxygen species (ROS) – also known as “free radicals” – are oxygen-containing molecules which are characterized by their high reactivity and chemical aggressiveness due to a free unpaired electron. ROS are formed in the mitochondria as a by-product of cellular respiration or by immune cells to fight bacteria or viruses. But what are these “free radicals” doing? Have you ever forgot a piece of butter in the fridge, which turns rancid after a while? This rancidity of animal and vegetable derived fatty acids is caused by so-called lipid peroxidation: Let’s illustrate the activity of “free radicals” in the example of lipid peroxidation (Fig.1). Lipid peroxidation is a chain reaction and takes place in three steps: Initiation, propagation and termination. The “free radical”, in this case OH–, has an unpaired electron and therefore “seeks” for positive charge. In the initiation reaction, a nucleophilic attack occurs: the free radical OH–“steals” or splits off a positively charged H-atom from a polyunsaturated fatty acid moiety and is subsequently turned to H2O.The result is a carbon-centered lipid radical (alkyl radical), which also lacks a proton. In the propagation step, the resulting alkyl radical reacts with oxygen (O2). Consequently, a lipid peroxyl radical is formed. The resulting fatty acid peroxyl radical can now transfer its radical function by abstracting a hydrogen to other unsaturated fatty acids. Those in turn, add O2 to keep the chain reaction going or react with an antioxidant. In the latter case, the chain reaction is interrupted. This process not only takes place in your refrigerator – but also in the body of humans and animals and means enormous stress for the structures: so-called oxidative stress. In a healthy body, normally reductive and oxidative processes are in an equilibrium and the body has sufficient defense mechanisms to counteract excess ROS. However, energy-consuming stressors such as heat, relocation or high aerial ammonia concentrations lead to an overproduction of ROS: Thus, the body’s own protective systems, such as endogenous antioxidants, are overwhelmed and need help. Antioxidant. What a magic word Well, there is less magic behind antioxidants – it’s more biochemistry. Now we come to the third phase of lipid peroxidation: termination. This means that the chain reaction of the ROS is interrupted: α- Tocopherol, the most biologically active and abundant form of vitamin E, donates its phenolic hydrogen atom to a peroxyl-radical, which in turn is converted to a hydroperoxide (Fig.2). The tocopheroxyl-radical resulting from this reaction is sufficiently stable to interrupt the chain reaction. Subsequently, the tocopheroxyl-radical is reduced, forming an ascorbate radical. The ascorbate radical is regenerated with the help of glutathione (GSH). Furthermore, the tocopheroxyl- radical reacts with another peroxyl radical leading to the formation of an inactive, non-radical product. The lack of a sufficient quantity of antioxidants to eliminate ROS can lead to oxidative damage and inflammation. If inflammation occurs, cytokines and chemokines are brought to the site of inflammation – this – and the repair of the damaged tissue – however, again means energy expenditure for the host. As a result, more and more ROS develop, and the inflammation progresses. This is how oxidative stress in farm animals increases. Plant derived antioxidants to the rescue! Similar to vitamin E, numerous terpenes of aromatic plants from the Labiatae family, such as thymol or carvacrol from thyme or oregano, have proven antioxidant properties that increase the body’s resistance to oxidative stress. Selected phytogenic substances are thus able to strengthen cell defense, improve the supply of nutrients to cells and minimize damage caused by bacteria or oxidative stress in farm animals. As a result, even in periods of increased heat stress, supplementing these plant extracts to the animals feed can lead to an improved resistance to oxidative stress, which results in maintained resilience.Thus, the overall health and welfare of the animals is supported, and energy expenditure can be used for performance parameters – not for immune response. What makes antioxidants special? The antioxidant activity of selected phytogenics depends mainly on their molecular structure. Principally phytogenics have two different ways to unroll antioxidant effects: either directly by capturing reactive oxygen species (ROS), or indirectly by stimulating the production of the host’s antioxidant enzymes. For example, superoxidase dismutase (SOD) or glutathione peroxidase (GSH-PX) are two key antioxidant enzymes that inactivate ROS. For both it was shown, that their production can be stimulated by certain essential oils like thyme oil, turmeric or rosemary oil (Franz et al., 2010). As an excess of ROS can lead to cell damage especially in intestinal epithelia, scavenging of those reactive molecules reduces inflammatory processes in the intestine. This results in an increased integrity of the epithelial cell wall and an improved performance via an enhanced nutrient digestibility. Placha et al. (2014) showed that thyme oil reduces the MDA content in the enterocytes and thus improves the antioxidant status and intestinal integrity. In experiments with broilers, feed additive containing essential oils, herbs, spices and saponins that stimulated the antioxidant machinery had a positive effect on intestinal morphology and significantly increased nutrient digestibility. Finally, Yesilbag et al. (2011) demonstrated that an increased antioxidant status in broiler chicken meat prolonged the quality and shelf life of the meat by feeding diets supplemented with rosemary or its essential oils. Thus, plant derived direct or indirect antioxidants have beneficial effects on animal health and finally on product quality: they may improve the dietary nutrient value and contribute to a better stability and longer shelf-life of fat, meat and eggs. Due to the proven positive properties – especially in terms of strengthening antioxidant capacity – phytogenic feed additives have the potential to develop into a new generation of feed additives for innovative animal nutrition and welfare. They will be a key tool in supporting livestock under heat stress conditions in the future and can therefore contribute to profitable animal production. References upon request You have further questions about antioxidative effects of PFAs? We will be happy to answer them! Anne has always been fascinated by the unknown, the diversity and beauty of nature. Her love for nature brought her to Delacon in 2018 after studying agricultural sciences, where she worked as Technical Communications Manager and later as Product Manager Aquaculture. Since February 2021, she has been taking a new, natural career path outside of Delacon.
<urn:uuid:6338da95-8d10-4560-94de-ffa51d01ce2b>
CC-MAIN-2021-31
https://www.phytogenius.com/oxidative-stress-in-farm-animals-the-performance-decreaser
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150264.90/warc/CC-MAIN-20210724094631-20210724124631-00441.warc.gz
en
0.921647
1,964
3.390625
3
Synod of the Oak In the year 402, Theophilus had been summoned by the emperor to Constantinople to apologize before a synod, over which Chrysostom would preside, on account of several charges which were brought against him by certain Egyptian monks, especially by the so-called four "Tall Brothers". Theophilus, their former friend, had suddenly turned against them, and had them persecuted as Origenists. Placing himself at the head of soldiers and armed servants Theophilus marched against the monks, burned their dwellings, and ill-treated those whom he captured. When these monks fled to Constantinople to appeal to Patriarch John, Theophilus wrote to St. Epiphanius of Cyprus, requesting him to go to and prevail upon Chrysostom to condemn the Origenists. Epiphanius went, but when he realized that Theophilus was merely using him for his own purposes, he left the capital, dying on his return in 403. At this time Chrysostom delivered a sermon against the vain luxury of women. It was reported to the empress as though Chrysostom had been referring to her personally, which only embittered her more against the Patriarch. Theophilus at last appeared at Constantinople in June, 403, not alone, as he had been commanded, but with twenty-nine of his suffragan bishops, and, as Palladius tells us, with a good deal of money and all sorts of gifts. His nephew and successor Cyril also accompanied him to the synod. Theophilus took his lodgings in one of the imperial palaces, and held conferences with all the adversaries of Chrysostom. Then he retired with his suffragans and seven other bishops to a villa near Constantinople, called Epi Dryn. A long list of unfounded accusations was drawn up against Chrysostom. The synod now consisted of forty-two archbishops and bishops, many of whom were Syrian and Egyptian bishops inimical to him brought by Theophilus. So now the synod, assembled to judge Theophilus in accordance with the orders of the emperor, now summoned Chrysostom to present himself and apologize. Severian, Bishop of Gabala in Syria, whom Chrysostom had previously ordered to leave Constantinople because of his involvement in a plot against the patriarch, served as prosecutor. Chrysostom naturally refused to recognize the legality of a synod in which his open enemies were judges. After the third summons Chrysostom, with the consent of the emperor, was declared to be deposed. In order to avoid useless bloodshed, he surrendered himself on the third day to the soldiers who awaited him. But the threats of the excited people, and a sudden accident in the imperial palace, frightened the empress. She feared some punishment from heaven for Chrysostom's exile, and immediately ordered his recall. After some hesitation, Chrysostom re-entered the capital amid the great rejoicing of the people. Theophilus and his party saved themselves by fleeing from Constantinople. Chrysostom's enemies, though, did not rest, and soon succeeded in having him deposed and exiled a second time, on 24 June 404. Saint John Chrysostom's last words, delivered as he lay dying on the road to exile, were "Glory be to God for all things!" - Palladius, Dialogus, xvi; Socrates Scholasticus, Ecclesiastical History, VI, 7; Sozomen, Ecclesiastical History, VIII, 12. - Palladius, vii; Socrates, op. cit. For Jerome's congratulations to Theophilus see Jerome, Epistle lxxxvi. - Chrysostom Baur (1912), "Theophilus, The Catholic Encyclopedia, Vol. XIV (New York: Robert Appleton Company) - Palladius, op. cit., ch. viii - Ubaldi, La Synodo ad Quercum, Turin, 1902 - Photius, Bibliotheca, 59, in Migne, Patrologia Graecae, CIII, 105-113 - Palladius, Dialogus, ix - Chrysostom Baur (1910), "St. John Chrysostom", The Catholic Encyclopedia, Vol. VIII (New York: Robert Appleton Company) - Episcopal Conspirators chapter from Gathering Clouds: A Tale of the Days of St. Chrysostom by Frederic William Farrar
<urn:uuid:4d48fb60-dd10-4cb2-8702-ea9922ccc056>
CC-MAIN-2017-47
https://en.wikipedia.org/wiki/Synod_of_the_Oak
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804610.37/warc/CC-MAIN-20171118040756-20171118060756-00557.warc.gz
en
0.964987
928
2.875
3
Compute the following limits using either algebra or your calculator. Homework Help ✎ when f(x) = 3x − 4. when g(x) = . Substitute 3 in for x. You can do that because you do not have division by zero. Do NOT substitute 2 in for 'x' yet or you will have division by zero problem. Factor first, eliminating this problem. Then substitute 2 in for 'x'.
<urn:uuid:fbb3ee08-6683-4cff-877b-050e171a477c>
CC-MAIN-2020-10
https://homework.cpm.org/category/CCI_CT/textbook/pc/chapter/9/lesson/9.1.4/problem/9-56
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145282.57/warc/CC-MAIN-20200220193228-20200220223228-00144.warc.gz
en
0.855486
94
2.5625
3
The initial Laptop or computer networks had been devoted Particular-objective devices for example SABRE (an airline reservation process) and AUTODIN I (a protection command-and-Command process), equally designed and implemented from the late nineteen fifties and early sixties. By the early sixties Laptop or computer manufacturers experienced started to employ semiconductor engineering in industrial items, and equally common batch-processing and time-sharing devices had been set up in lots of large, technologically Innovative corporations. Time-sharing devices allowed a computer’s methods to generally be shared in rapid succession with several users, biking throughout the queue of users so swiftly that the computer appeared devoted to Just about every consumer’s tasks Regardless of the existence of numerous others accessing the process “at the same time.” This led to your Idea of sharing Laptop or computer methods (identified as host desktops or just hosts) above a complete network. Host-to-host interactions had been envisioned, in addition to access to specialized methods (for example supercomputers and mass storage devices) and interactive accessibility by distant users to your computational powers of your time-sharing devices Found elsewhere. These Suggestions had been first realized in ARPANET, which established the initial host-to-host network connection on October 29, 1969. It was made via the Advanced Research Initiatives Agency (ARPA) on the U.S. Department of Defense. ARPANET was on the list of first typical-objective Laptop or computer networks. It connected time-sharing desktops at authorities-supported study web pages, principally universities in The us, and it quickly became a crucial piece of infrastructure for the computer science study Local community in The us. Equipment and apps—such as the easy mail transfer protocol (SMTP, commonly known as e-mail), for sending small messages, as well as the file transfer protocol (FTP), for lengthier transmissions—swiftly emerged. To be able to realize cost-effective interactive communications amongst desktops, which typically talk In a nutshell bursts of data, ARPANET utilized The brand new engineering of packet switching. Packet switching can take large messages (or chunks of Laptop or computer facts) and breaks them into lesser, manageable pieces (called packets) that could journey independently above any obtainable circuit to your concentrate on vacation spot, in which the pieces are reassembled. Consequently, in contrast to conventional voice communications, packet switching isn’t going to need a one devoted circuit amongst Just about every set of users. Professional packet networks had been launched from the nineteen seventies, but these had been designed principally to offer efficient access to distant desktops by devoted terminals. Briefly, they replaced lengthy-distance modem connections by a lot less-expensive “Digital” circuits above packet networks. In The us, Telenet and Tymnet had been two these kinds of packet networks. Neither supported host-to-host communications; from the nineteen seventies this was nonetheless the province on the study networks, and it might stay so for quite some time. DARPA (Defense Advanced Research Initiatives Agency; formerly ARPA) supported initiatives for floor-centered and satellite-centered packet networks. The ground-centered packet radio process provided cellular access to computing methods, even though the packet satellite network connected The us with quite a few European international locations and enabled connections with extensively dispersed and distant locations. With the introduction of packet radio, connecting a cellular terminal to a computer network became possible. Nonetheless, time-sharing devices had been then nonetheless much too large, unwieldy, and dear to generally be cellular or perhaps to exist outdoors a local climate-managed computing surroundings. A strong drive As a result existed to attach the packet radio network to ARPANET in order to allow for cellular users with easy terminals to accessibility the time-sharing devices for which that they had authorization. In the same way, the packet satellite network was employed by DARPA to backlink The us with satellite terminals serving the United Kingdom, Norway, Germany, and Italy. These terminals, on the other hand, needed to be linked to other networks in European international locations in order to get to the conclusion users. Consequently arose the necessity to link the packet satellite Web, and also the packet radio Web, with other networks. Foundation of the web The online world resulted from the trouble to attach a variety of study networks in The us and Europe. 1st, DARPA established a method to analyze the interconnection of “heterogeneous networks.” This method, identified as Internetting, was based upon the freshly launched principle of open architecture networking, wherein networks with defined standard interfaces might be interconnected by “gateways.” A Doing work demonstration on the principle was planned. To ensure that the principle to operate, a brand new protocol needed to be designed and made; without a doubt, a process architecture was also needed. In 1974 Vinton Cerf, then at Stanford University in California, which creator, then at DARPA, collaborated on the paper that first explained this type of protocol and process architecture—namely, the transmission Command protocol (TCP), which enabled differing kinds of devices on networks everywhere in the environment to route and assemble facts packets. TCP, which initially integrated the web protocol (IP), a worldwide addressing mechanism that allowed routers for getting facts packets to their best vacation spot, formed the TCP/IP standard, which was adopted via the U.S. Department of Defense in 1980. By the early 1980s the “open architecture” on the TCP/IP technique was adopted and endorsed by many other researchers and inevitably by technologists and businessmen world wide. By the 1980s other U.S. governmental bodies had been closely involved with networking, such as the Countrywide Science Foundation (NSF), the Department of Electrical power, as well as the Countrywide Aeronautics and Room Administration (NASA). Whilst DARPA experienced played a seminal position in creating a smaller-scale Model of the web amid its researchers, NSF worked with DARPA to develop access to your entire scientific and educational Local community and for making TCP/IP the standard in all federally supported study networks. In 1985–86 NSF funded the initial five supercomputing centres—at Princeton University, the University of Pittsburgh, the University of California, San Diego, the University of Illinois, and Cornell University. In the 1980s NSF also funded the event and operation on the NSFNET, a countrywide “backbone” network to attach these centres. By the late 1980s the network was running at countless bits for every next. NSF also funded a variety of nonprofit nearby and regional networks to attach other users to your NSFNET. A number of industrial networks also started from the late 1980s; these had been quickly joined by others, as well as the Professional World-wide-web Exchange (CIX) was formed to allow transit website traffic amongst industrial networks that otherwise wouldn’t happen to be allowed over the NSFNET backbone. In 1995, right after in depth evaluation of the situation, NSF made the decision that assist on the NSFNET infrastructure was not needed, due to the fact numerous industrial vendors had been now keen and capable to satisfy the desires on the study Local community, and its assist was withdrawn. Meanwhile, NSF experienced fostered a aggressive assortment of economic World-wide-web backbones linked to each other through so-identified as network accessibility details (NAPs).
<urn:uuid:d3835725-0033-450c-b438-8f5145d02053>
CC-MAIN-2022-49
https://elektrik-elektronik.name.tr/enpatika-adress/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710916.70/warc/CC-MAIN-20221202215443-20221203005443-00465.warc.gz
en
0.952996
1,681
3.140625
3
Enzymes are catalysts that speed up chemical reactions in living organisms and control many cellular biological processes by converting a molecule, or substrate, into a product used by the cell. For scientists, understanding details of how enzymes work is essential to the discovery of drugs to cure diseases and treat disorders. A multi-institutional research team led by Chris Dealwis from Case Western Reserve Univ. has used the new IMAGINE instrument at Oak Ridge National Laboratory (ORNL)’s High Flux Isotope Reactor (HFIR) to map an enzyme that could play an important role in anti-cancer drug development. Using neutron crystallography, the team unequivocally mapped the active site of the enzyme dihydrofolate reductase (DHFR), an enzyme necessary for nucleotide biosynthesis and a classical drug target. The team has been working toward unraveling the catalytic mechanism of DHFR for at least 15 years. The current research, published in the Proceedings of the National Academy of Sciences of the United States of America Early Edition, illustrates the pivotal role of neutron diffraction in unlocking the inner details of enzyme function by revealing protons in the enzyme-substrate, or Michaelis complex. “We were able to detect protonation states at select sites in the enzyme to resolve mechanisms concerning acid-base catalysis,” said Andrey Kovalevsky of ORNL, a co-author on the study and a scientist on the IMAGINE beam line at HFIR. The team essentially watched the enzyme work its magic, binding its substrate and preparing the active site for catalysis by protonating specific atoms and correctly orienting water molecules. Using neutron diffraction, the team found that in a complex that closely resembles the reactive state, DHFR stabilizes a particular substrate’s structure and likely elevates the basicity of the substrate atom that is to be protonated. This protonation is proposed to occur directly via water, with the proton’s access to the substrate regulated by the structural fluctuation of the enzyme. Because water, with its two hydrogen atoms, plays an important role in the chemical reactions catalyzed by enzymes, locating hydrogen atoms is necessary to map out the complete details of the enzymes’ catalytic mechanisms. Hydrogen atom positions within an enzyme are difficult to pinpoint because they are hard to observe with traditional structural techniques; therefore, their positions are often inferred by those of nearby atoms. “With neutrons, unlike other techniques like x-ray diffraction, we can truly see the hydrogen atoms and the orientation of the water molecules,” said Kovalevsky. “Mapping enzymatic mechanisms is fundamental for our understanding of how nature works.” The enzyme DHFR is an anti-cancer target and is considered a model for understanding proton (H+) and hydride (H−) transfer reactions in biological systems. Given its role in biosynthesis, DHFR is a target for anticancer, antimicrobial and rheumatoid arthritis drugs, such as methotrexate and trimethoprim. This is the first user publication from the quasi-Laue diffractometer instrument IMAGINE at HFIR, beam line CG-4D. IMAGINE is a state-of-the-art neutron single crystal diffractometer using image-plate technology. It provides atomic resolution information on chemical, organic, metallo-organic and protein single crystals that will enable their chemical, physical and biological structure and function to be understood. “We need more experiments and different samples to figure out how powerful the instrument is—how small its samples can be, how large the crystal unit cells we can resolve,” said Kovalevsky. “But this result shows the instrument is performing to its specifications, which is exciting.” For future experiments, the IMAGINE team plans to introduce a low-temperature sample environment to collect data at cryogenic temperatures. Kovalevsky explains that they sometimes need crystals to be very cold to trap short-lived intermediates of enzymatic reactions, and to improve diffraction quality so that smaller crystals can be used for data collection. Source: Oak Ridge National Laboratory
<urn:uuid:fdc54fa5-bcd3-4252-9910-0d01fc1f448a>
CC-MAIN-2022-27
https://www.rdworldonline.com/seeing-hydrogen-atoms-to-unveil-enzyme-catalysis/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104512702.80/warc/CC-MAIN-20220705022909-20220705052909-00733.warc.gz
en
0.924074
870
3.703125
4
866. Which chemical is used for the preservation of a biological specimen? 867. What are the constituent elements of sugar? Carbon, Hydrogen and Oxygen 868. Which type of glass can cut off ultraviolet rays? 869. Which process is used in dairies to seperate cream from milk? 870. What colour phenolphthalein turns in the presence of bases? 871. What colour is shown by a neutral solution in the universal indicator? 872. Which chemical acts as the chief agent in attracting mosquitoes to humans? 873. Which chemical has the nickname of the Salt of Hartshorn’? 874. Which element is industrially produced through the Claus Process? 875. What is known as ‘the Magic Metal of Life’? 876. Which organism can travel in accordance with the magnetic field of the earth? 877. Bessemer process is associated with the production of —————– 878. What is the unit of potential difference? 879. What is known as ‘the Metal of the Future’ 880.The Electromotive force (emf) of a voltaic cell: 881. The instrument used to measure the thick¬ness of ozone: 882. The metal present in chloroplast: 883. The whitest compound is ever known: 884. Rigid Stiffening of muscles shortly after death is called 885. Rings around the sun is due to 886. Sal ammoniac 887. The scientist who discovered that the body of the animal is made up of cells – Theodor Schwann 888. The scientist who discovered that the body of the plant is made up of cells – M.J. Schleiden 889. Sclerometer is used to measure the – hardness of materials. 890. ………….. is used to coat the photocopying drum of the Xerox machine. 891. Skating on ice is possible due to the phenomenon of : 892. The skeletal system of the cell – – Endoplasmic Reticulum 893. ………………… is used as a preservative to prevent spoilage of squashes and jams. – Sodium Benzoate 894……………….. is the time of the year when the difference between the length of days and length of nights is the longest. 895. The spherical shape of raindrops is due to – Surface Tension 896. Spondylitis affects – spinal cord. 897. Star appears to be twinkling due to 898. Stress hormone in the plant is – Abscisic acid 899. Study of cells 900. The substance which is known as ‘Supercooled liquid’ is
<urn:uuid:37e4a96e-a486-423c-ba62-6375fab5399c>
CC-MAIN-2023-50
https://www.theknowledgelibrary.in/general-science-questions-and-answers-part-27/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00743.warc.gz
en
0.879228
590
2.921875
3
SALT & SODIUM Your body does need some sodium--to maintain the right balance of fluids, transmit nerve impulses, and contract and relax your muscles--but only about 500 mg per day. When you eat far more than that, your brain chemistry is altered. Research shows that consuming salt triggers the release of dopamine, the neurotransmitter associated with the brain's pleasure center, making salty foods as addictive as nicotine and alcohol. Therefore, as with any addiction, eating salty foods makes you crave more. Know the Common Culprits The salty six are six common foods that are the most likely culprits for hidden salt - Bread and rolls - Cold cuts and cured meats More to Consider Than the Salt Shaker A recent CDC study found that more than 90 percent of adults consume more sodium than they need. Sodium is found in high quantities in foods, such as canned vegetables and soups, frozen dinners, and instant flavored rice and cereal. In this podcast, Janelle Peralez-Gunn discusses the importance of reducing the sodium in your diet. We are a salt obsessed culture. Most Americans consume too much sodium in their daily diet. - On average Americans eat more than 3,300mg of sodium a day. According to the CDC, the sodium recommendation for adults should not exceed 2,300mg a day. - The recommendation for children less than 9 is 1,500mg -1,900mg per day. Where Is Salt Hiding? 71% of all food consumed comes from already processed foods and eating out. Too Much Sodium This podcast is based on the February 2012 CDC Vital Signs report. Ninety percent of Americans age two and older eat too much sodium which can increase your risk for high blood pressure and often leads to heart disease and stroke, two leading causes of death in the US. Learn several small steps you can take to reduce the amount of sodium in your diet. Baking Soda's High Sodium Content Potassium Grocery List Feeling like your brain is in a fog, your heart is skipping beats or your muscles are cramping could be signs that you're not getting enough potassium. But never fear – this important mineral can be found in some of nature's most delicious foods. The next time you visit the store, keep this potassium-packed grocery list in mind to help get your brain, heart and muscles working smoothly again in short order. The first new blood pressure guidelines in 14 years will likely bring a major change in treatment. Eleven medical groups including the American Heart Association are redefining the danger zone: the bar for systolic blood pressure is lowered from 140 points to 130. This means an estimated 31 million more people could be diagnosed with high blood pressure. Cardiologist Dr. Tara Narula joins “CBS This Morning” to discuss the impact of the new guidelines. Watch the Video!
<urn:uuid:75d2b991-16cb-4b99-aab2-1cc7d73129b5>
CC-MAIN-2019-51
http://lowsaltkitchen.com/salty-facts/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541157498.50/warc/CC-MAIN-20191214122253-20191214150253-00211.warc.gz
en
0.927783
588
2.953125
3
Whistleblowing is the act of drawing the public’s attention to corruption or any other lawlessness that took place, usually within a company. The term is referred to colloquially as ‘informa’ but the standard name for them is known as a whistleblower. Publicly shunning a whistleblower is a cultural practice that seems to continue for generations, where the backlash that follows is sometimes more severe than the crime. This is not a good practice as oftentimes, it is to the demise of a person’s life and property. This is evident in the recent scandal surrounding Facebook, where user information was passed on to data research firm Cambridge Analytics and misused to lobby persons to vote for Donald Trump. The whistleblower that revealed this information, had the public’s interest at heart, wanting others to be aware and cautious when using or providing information on this social media platform. As a result, shares in Facebook have plummeted, reflecting that investors have lost confidence in the company. Whether temporary or not, Facebook Inc has taken a hit. In 2012 a Protection Act was implemented in Jamaica to encourage a culture of whistleblowing. This would allow employees to disclose information about their employers or colleagues, if they have any reason to believe that misconduct occurred or will occur. Here, the identity of the person will be withheld, and the process sped up to allow for quick turnaround time. This therefore shows that the company must have efficient systems that allow for this culture to be adopted and staff members that are able to keep information among those who should know. Jamaica has even implemented an anonymous tip hotline, Crime Stop, that secures the user’s phone number, to disclose any information about anyone they have suspected or know has conducted illegal activities. Companies can discuss adding incentives for those persons who have spoken out about wrong doings and caused action to be taken, as a way of encouragement. Stop the informa culture! Let us get in the habit of speaking up for the betterment of our people, companies and country! If you want to start investing with SSL but don’t have the time to monitor the market or to conduct the trades yourself then you can choose one of SSL’s managed Financial Planning products. We offer a variety of products for every type of investor and if you are interested in managing online trades yourself and having complete control over your investment portfolio then you can try SSL’s Brokerage account.
<urn:uuid:c67dc14e-ec5c-4287-9e67-6ece641b8e74>
CC-MAIN-2021-17
https://sslinvest.com/2018/05/28/who-is-a-whistleblower/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039594808.94/warc/CC-MAIN-20210423131042-20210423161042-00320.warc.gz
en
0.958242
502
2.609375
3
Cool games, weather forecasts, space simulations, and graphic visualizations all use supercomputing systems or techniques. Behind the supercomputing curtain or under the supercomputing hood are the 10,000 or more scientists, mathematicians, and engineers who attended SC11, the Supercomputing Conference 2011 in Seattle November 12-18. Dr. Greg Newby, the director of Arctic Region Supercomputing Center in Fairbanks Alaska explains the synergy of this annual event in this Super Computing Conference 2011 video by Frontier Scientists. The supercomputer has evolved from when Seymour Cray, considered the Father of the Supercomputer, invented the fastest machine of it’s kind back in the 1960’s (Seymour Cray video by Cray Research). A lot of research and development, time and dollars were spent manufacturing a variety of super systems. Surprisingly, today inspiration to build the super computer processors has been advanced by video game computers and their innovative use of cell processors—for example the Playstation 3. Supercomputers are integrating some of these commodity parts into their systems. This means faster development for the supercomputers and mainstream use in consumer systems like laptops, tablets, and even in consumer software. Effectively using multi-core/many-core CPUs and making more efficient use of power, are major challenges for advancement of supercomputing: to make these computers even faster. These new technologies are “proving not quite revolutionary, but very much a force for the technology– requiring the reconsideration of at least the computational science, and in many cases the science, that underlies the technology.” says Newby. Stay tuned to FrontierScientists.com as we talk to computational scientists who work using supercomputers in this multicore, many core heterogeneous computation system environments. As Dr. Newby says, “So, it’s exciting but scary at the same time.” Liz O’Connell 2011 Frontier Scientists: presenting scientific discovery in the Arctic and beyond
<urn:uuid:18a52444-3df5-4ae1-873b-3400a928f743>
CC-MAIN-2019-22
https://frontierscientists.com/2011/11/whats-so-super-about-supercomputing/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255536.6/warc/CC-MAIN-20190520021654-20190520043654-00291.warc.gz
en
0.909407
412
3.234375
3
Connectivity, graph minors, and subgraph multiplicity - Author(s): Eppstein, David - et al. It is well known that any planar graph contains at most O(n) complete subgraphs. We extend this to an exact characterization: G occurs O(n) times as a subgraph of any planar graph, if and only if G is three-connected. Even more generally, G occurs O(n) times as a subgraph of the K_b,c free graphs, b >/= c, if and only if G is c-connected; G occurs O(n) times as a subgraph of the K_a-free graphs if and only if G is (a - 1)-connected. Our results use a simple Ramsey-theoretic lemma that may be of independent interest.
<urn:uuid:61c757fd-4993-4bcc-a06e-49feab0f00d1>
CC-MAIN-2021-17
https://escholarship.org/uc/item/0kf203r3
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038088731.42/warc/CC-MAIN-20210416065116-20210416095116-00434.warc.gz
en
0.928879
176
2.546875
3
Diet plays an important duty in personal wellness it can be described as a pattern of eating as well balanced diet regimen that provides nutrients that are thought about required to preserve our health and wellness. Researches have actually revealed that diet regimen is just one of the resources whereby illness such as cancer, coronary heart problem, birth defects, and cataracts can be stopped. . We can also reduce weight by readjusting a few of our diet plan plans as well as consuming behaviors. Wellness is far better than wealth. Much better health is taken into consideration important for human happiness and health. Individuals that are physically and also psychologically healthy and balanced also play an extremely important role in the economic development of their nation as they are much more life as well as productive longer. Pointed out below are some diet plan pointers to reduce weight while staying healthy: Consume fresh as well as organic foods. The current study, as well as studies, have actually disclosed that chemicals, herbicides, and other chemicals used on food and vegetables are one significant cause of obesity and weight gain. Bite slowly and also chew it. This idea is really helpful as your mind gets the message that you are eating greater than you really are. One must utilize smaller sized plates and bowls for consuming as it also one way to fool your brain right into believing that you have actually consumed more. Being healthy is considered a dynamic process as our health and wellness adjustments with the training course of time. When we feel healthy and balanced as well as fit and then we have times when we feel sick and weak, every one of us has time. There are lots of food items that are recommended by physicians and specialists that are taken into consideration healthy and balanced as well as must be consisted of in every dish. Several of these food things are green tea, oats, curd, olive oil, salad, etc Water is a very vital essential element of the human’s body. One must consume at least 8-10 glass of water each day. Throughout a glass of water 15 mins prior to having your meal as it makes you feel fuller without consuming any type of kind of food. Do not consume soft drinks, Pepsi; cola, and so on as they are full of chemicals as well as sugar. One bottle of Pepsi has a minimum of 20 tablespoons of sugar so there is no factor in drinking any of these. Various other points that can help you to reduce weight without shedding your wellness are: 1- Eat your favorite meal when every 15 days it will certainly assist you in starting anew for your forthcoming days and also you will not feel robbed. 2- Include salads and vegetables in your every meal. 3- Exercise every day and also consistently. , if you work out with gaps it will lead you to no place. Instead, you will certainly really feel irritated. Eating healthy and balanced is important nevertheless one ought to not neglect the specific definition of the declaration. Consuming to remain healthy and balanced does not mean suppressing your appetite; it suggests to consume “wisely”. An appropriate, as well balanced diet plan, can also aid you to minimize your weight without shedding your health. Health is much better than wealth. Much better health and wellness are taken into consideration important for human joy as well as well-being. One ought to utilize smaller sized plates and bowls for consuming as it likewise one means to fool your brain right into believing that you have eaten extra. Eating healthy is vital nonetheless one needs to not forget the specific meaning of the statement. An appropriate and also balanced diet regimen strategy can additionally help you to lower your weight without shedding your health. I am is a 30-year-old former tea maker who enjoys walking, drinking coffee, and duck herding. I am inspiring and giving, but can also be very stingy and a bit unstable. I am addicted to coffee, something which my friend Krystal Andrea Newton pointed out when I was 16. The problem intensified in 2010. I Have lost two jobs as a result of my addiction, specifically: gym assistant and tea maker
<urn:uuid:7287e858-6222-4904-841b-0d07ea466c45>
CC-MAIN-2020-45
https://www.myltcplan.com/ways-to-find-healthy-diet/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107869785.9/warc/CC-MAIN-20201020021700-20201020051700-00155.warc.gz
en
0.980881
836
2.546875
3
Government mandated nutrition labels were critical to improving the transparency of information as to what is in food. We are proposing a similar level of transparency for serviceable items. A Common Sense Proposal After spending some time researching the topic of service-ability of parts, I learned that items are in more cases than not becoming less serviceable, and that most companies are hiding their reliability information (See these posts for background information)… Clearly what is happening is many companies are not placing sufficient emphasis on serviceability. Other issues such as the marketability and consumer design priorities are increasingly taking precedence in design decisions. Furthermore, without some increase in transparency, this misallocation of resources and continuation of manufacturing items with little concern for service-ability will continue. Interestingly, in the environmental discussion, what is more often that not left out is how service-able products are. More serviceable products means longer product lifespans, less energy spend in making and transporting new products to stores and customers, and less space taken up in landfills. Because of this I am proposing a labeling system for serviceable products. This label would state the following: - The amount of time to initially setup an item - The amount of time required to service an item through the item’s lifespan - The total estimated time = item 1 + item 2 above This could be printed as a large number with an identify-able label.This could be placed on all product packaging for items that require assembly or service. This label would not be on all products, but some likely candidates would be the following: - Computers and sub-components - Automotive Parts - Housing items such as lights fans, furniture - Industrial products How the Estimates Would be Generated The estimation of the time required would come from a government testing body, this would be very similar to Underwriters Labratories (electric items come with a UL sticked in the US, and can not be sold without testing for safety). Testing would be performed by using laypeople — not experts in maintenance, to assemble and repair items. Sufficient quantity of people would be necessary to ensure that the times developed had statistical relevancy. The testers would only be provided with the manuals and instructional materials that came with the product, thus the test could also test the manufacturer’s instructional material. What Would the Label Look Like The label would be very simple. It should be large and easily recognizable and only needs to provide a three numbers. Here is a mockup. The Industry Response Business would fight this initiative as being too expensive and invasive. However, there is nothing new here. Business has fought every single initiative that has improved consumer health and safety. Areas they have fought in the past include: - Safety belts - Air bags - Food labeling - Cigarette warnings - Drug testing At the time these concepts were deemed by industry as unnecessary and onerous, however, now they are simply part of how we live. Who can now imagine a world without drug testing or seat belts? Progress is made by deciding what type of system is desirable within the larger context, and then pushing for it. Where Will The Money Come From? There is plenty of money is the US to do this. There are trillions of dollars to give to corrupt banks, so there is plenty of money for a small program like this. We have spent around a hundred billion to develop a military fighter jet that is so delicate and specialized, it can not even be used by the military in combat (the F-22), and is considered completely unnecessary by independent military experts. So there is certainly plenty of money to setup a lab to perform laboratory testing for service and maintenance. The expense of doing this would not be all that onerous. Products could be tested quickly, and would only have to be tested when a new product comes out or a change is made to an existing product by the manufacturer. If not every item could be tested, the most widely sold items could be tested, resulting in the highest common good per dollar spent. How Would This Change Things? The result would be a significant change in how companies build their products which would make them more durable, and easier to service. Right now companies are banking on the fact that consumers will never know the long term service time and costs of items. Therefore, new product development produces items that have great packaging, compete well on price, but have very little invested in them in terms of ease of assembly, maintenance and service. By placing the Service Label right on product packaging, and on product website, companies will no longer be able to ignore this issue, and consumers will be able to make informed decisions. It will punish companies that release poorly designed and difficult to service items onto the marketplace. Service to Business While this would be opposed by many OEMs and their suppliers, not every business would oppose this. Service organizations of business would be in favor of this government testing center as it would allow them to know the lifelong service effort of different items that they buy and maintain. Thus the government testing center would offer a service not only to consumers, but to businesses also.
<urn:uuid:e0807bef-bd51-44c9-ad3b-83286aa88011>
CC-MAIN-2019-35
https://spplan.wordpress.com/tag/oem/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317113.27/warc/CC-MAIN-20190822110215-20190822132215-00152.warc.gz
en
0.964983
1,054
2.890625
3
Pomacanthus chrysurus also known as the Ear Spot Angelfish and referred to as the Goldtail Angelfish or Chrysurus Angelfish. It is a striking and somewhat rare angel fish in the aquarium trade. Found from the southern end of the Red Sea, down Africa's east coast to South Africa they inhabits coral-rich reefs. The Ear Spot Angelfish has an overall mottled-brown body with vertical white stripes. There are several bright sapphire-blue stripes on the head, and the tail is a dull yellow rimmed in the same sapphire-blue. As other angelfish, it is hermaphroditic, and there are no distinguishing characteristics to differentiate males and females. Not a good reef dweller, the Ear Spot Angelfish is prone to nip at stony and soft corals (sessile invertebrates) and clam mantles, but may be kept with small-polyped stony corals and somewhat noxious soft corals. When stressed, the Ear Spot Angelfish makes an unusual clicking sound. Pomacanthus chrysurus is best kept individually as they may be aggressive towards their own species as well as bother other Angels, more passive tankmates, and newly introduced fish. It is difficult to keep as it feeds in the wild primarily on sponges, but also tunicates, algae, zooantharians, gorgonians, hydroids, bryozoans, and seagrasses. Holacanthus chrysurus Cuvier, 1831 Pomacanthodes chrysurus (Cuvier, 1831) Pomacanthodes rodriquesi von Bonde, 1934
<urn:uuid:f0443b3a-bb3e-4b92-9dc5-04091c05634b>
CC-MAIN-2021-25
https://it.reeflex.net/tiere/326_Pomacanthus_chrysurus.htm
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487626008.14/warc/CC-MAIN-20210616190205-20210616220205-00553.warc.gz
en
0.920269
357
2.578125
3
Elvis Aaron Presley (January 8, 1935 – August 16, 1977), also known as The King of Rock and Roll, or as just simply The King, was an American singer who had an immeasurable effect on world culture. He started his career under the name The Hillbilly Cat and was soon nicknamed Elvis the Pelvis because of his sexually suggestive performance style. Birth & Childhood Presley was born in a one-room house in Tupelo, Mississippi, to Vernon Elvis Presley and Gladys Love Smith Presley. He was raised both in Tupelo and later in Memphis, Tennessee, where his family moved when he was 13. He had a twin brother (Jesse Garon Presley) who died at birth. The young Elvis took up guitar at 11 and, after high school, worked at Precision Tool Company and then drove a truck for the Crown Electric Company. Scottish author Allan Morrison claims that Elvis was of Scottish descent. In an as-yet-unpublished book, Morrison claims to have found that his ancestors lived in Lonmay , Aberdeenshire in the 1700s. According to Morrison, records show that Andrew Presley married Elspeth Leg in Lonmay in 1713. Their son, also called Andrew, went to the English colonies in 1745. In the summer of 1953 he paid $4 to record the first of two double-sided demo acetates at Sun Studios. The demo consisted of "My Happiness" and "That's When Your Heartaches Begin," popular ballads of the time. While Presley claimed to have recorded the demo as a birthday present for his mother, this is probably untrue, since Gladys Presley's birthday was in April and he recorded the acetate in July. Sun Records founder Sam Phillips and assistant Marion Keisker heard the discs and, recognizing Presley's nascent talent, called him in June 1954 to fill in for a missing ballad singer. Although the session did not prove fruitful, Sam put Elvis together with local musicians Scotty Moore and Bill Black to see what might develop. During a rehearsal break on July 5, 1954, Elvis started fooling around with a song called "That's All Right" and Sam hit the record button, thinking Elvis may have found his niche. The resulting single, backed with Elvis' hopped-up version of the country song "Blue Moon Of Kentucky", was a huge local hit in Memphis after WHBQ aired it two days later, and regular touring started to expand his fame beyond Tennessee. Elvis published five singles while under contract with Sun, all credited to Elvis Presley - "That's All Right" / "Blue Moon Of Kentucky" - Sun 209, released on July 19, 1954 - "Good Rockin' Tonight " / "I Don't Care if the Sun Don't Shine" - Sun 210, released on September 25, 1954 - "Milkcow Blues Boogie" / "You're A Heartbreaker" - Sun 215, released on December 28, 1954 - "Baby Let's Play House" / "I'm Left, You're Right, She's Gone" - Sun 217, released April 10, 1955 - "Mystery Train" / "I Forgot To Remember To Forget" - Sun 223, released on August 6, 1955 Most of these were energetic covers of rhythm and blues or country and western hits. The labels state: "Elvis Presley, Scotty & Bill". Shortest of these ten: 1.55", the longest is: 2.38". These singles garnered Elvis increasing attention both for his music and for the rioting girls that were becoming a staple of his live performances. The last of the Sun singles, "I Forgot To Remember To Forget" b/w "Mystery Train", went to #1 on the Country music Singles chart. During this period Elvis toured incessantly throughout the south and southwest, also appearing 50 times on the regional show Louisiana Hayride (his first appearance was on March 3, 1955). Hayride founder and producer Horace Logan had shrewdly signed Elvis to weekly appearances after noting the audience reaction to the then-unknown singer. It was during Elvis' last appearance on the Hayride that Logan announced, "Elvis has left the building", desperate to quell the screaming teenagers trying to reach Elvis as he exited the stage. The phrase has been popularized and is commonly used in joking reference to many, often unimportant, events being over as if they were as popular as an Elvis concert. On August 18, 1955 his parents signed a contract with Colonel Parker, thereby ending the relationship with Sun Studio. Elvis signed with RCA Records on November 21, 1955. On January 27, 1956 the single "Heartbreak Hotel" / "I Was the One" was released. It was the sixth single of his career. Unlike the previous singles, this one did chart, reaching #1 in April 1956. Over the next twenty-one years, until his death in 1977, Elvis had 146 Hot 100 hits, 112 top 40 hits, 72 top 20 hits and 40 top 10 hits; all of these are the most anyone has yet achieved. "Don't Be Cruel" and "Hound Dog" topped the pop, black and country charts in 1956. A string of hit records followed as the public's desire for his product seemed insatiable. The 1960s saw the quality of Presley's recorded output drop, although he was still capable of creating records equal to his best and did so on the infrequent occasions where he was presented with decent material at his movie recording sessions. With this drop-off, and in the face of the social upheaval of the 1960s and the British Invasion spearheaded by The Beatles, Presley's star faded slightly before a triumphant TV comeback special on NBC (aired on December 3, 1968) that saw him return to his rock and roll roots. His 1969 return to live performances, first in Las Vegas and then across the country, was noted for the constant stream of sold-out shows, with many setting attendance records in the venues where he performed. His most successful concert was the Elvis Aloha Concert in Hawaii, which was broadcast worldwide via satellite in January 1973. It was a milestone for Presley's career and his biggest audience to date. Presley was deeply religious, raised in the Pentecostal faith. He recorded several gospel albums. His three Grammy awards are all for gospel music. In his later years, his live stage performances almost always included a rendition of "How Great Thou Art ." Film & Television Elvis on TV On January 28, 1956 Presley made his national television debut by appearing on The Dorsey Brothers Stage Show , beginning his transition to teen idol. Now recording for RCA, and under the management of (honorary) Colonel Tom Parker, Elvis entered the Billboard Hot 100 chart for the first time on February 22 with "Heartbreak Hotel" and on April 21 that year the same song hit number one. His June 5, 1956 introduction of his next single, "Hound Dog", on The Milton Berle Show, scandalized the audience with his suggestive hip movements. After a string of other TV appearances, he made his first appearance on the top-rated Ed Sullivan Show on September 9, earning the show a record 52–60 million viewers (82.6% of viewership that night). Presley had dyed his sandy blond hair jet black by the time of his second Sullivan performance on October 28 of the same year. On his third and final Sullivan appearance (January 6, 1957) Sullivan bowed to pressure from "moralists" and ordered Presley to be filmed only from the waist up due to his customary suggestive hip movements. In late 1955, Presley made his earliest known film appearance in a documentary entitled The Pied Piper of Cleveland , a look at the career of disk jockey Bill Randle . The film, which reportedly included performance footage of Elvis as well as Bill Haley and His Comets and other acts, was shown in its entirety only once (in Cleveland) and was never released commercially. The film is currently considered "misplaced" and some Presley researchers maintain it never existed, although there is ample evidence to suggest it did. Beginning with Love Me Tender (opened on November 15, 1956), Presley starred in 31 motion pictures, having signed to multiple long-term contracts on the advice of his manager. These were usually musicals based around Presley performances, and marked the beginning of his transition from rebellious rock and roller to all-round family entertainer. Elvis was praised by all his directors, including the highly respected Michael Curtiz, as unfailingly polite and extremely hardworking. The movies Jailhouse Rock (1957), King Creole (1958), and Flaming Star (1960) are widely regarded as his best among film critics. Among fans, Blue Hawaii (1961) and Viva Las Vegas (1964) are highly praised. Between 1956 and 1969, Presley starred in 31 films. For details, see the List of Elvis Presley films. On January 20, 1958 Presley received a draft notice for a 2-year duty with the United States Army. He received no special treatment and served in Germany as an ordinary soldier and was honorably discharged on March 5, 1960. Many have since wondered why an only child – by then the sole support of his parents and grandmother – was drafted during peacetime, since his services were clearly not critical for the defense of his country. It has long been suspected that Elvis' draft notice was either politically instigated to shunt his "dangerous", "race-mixing" influence, or encouraged by his manager in order to keep the increasingly world-wise Southern lad under his thumb. While in the army, he received a black belt in karate and the rank of Sergeant. While in the army, Elvis became sick. He was taken to an army hospital and diagnosed with tonsillitis. However, no doctor would perform the necessary tonsillectomy, fearing that they would, in some way, be responsible for ruining his voice. His tonsils were left in, and he eventually grew better nevertheless. From the beginning of his career, Elvis was a sex symbol who sent legions of women swooning. He had a string of girlfriends, before and after he became famous, including celebrities such as Mamie Van Doren, Natalie Wood, Tuesday Weld, Cybill Shepherd and Ann-Margret. On May 1, 1967 he married Priscilla Anne Beaulieu at the Aladdin Hotel in Las Vegas. Priscilla had been the step-daughter of Presley's commanding officer in Germany during his Army stint. Incredibly, Elvis managed to talk Priscilla's mother and step-father into allowing the underaged girl to live with him at Graceland. In her autobiography, Priscilla recounted how Elvis would stay up all night and sleep most of the day; if he wanted to go out, he'd rent out the venue so no fans would bother him. Although he would spend hours alone with her in her bedroom, Priscilla wrote that Elvis never made any advances toward her. Indeed, their wedding night was the first time they were intimate; their daughter, Lisa Marie, was born exactly nine months later on February 1, 1968. After their divorce in 1973, Lisa lived with Priscilla. After seven years off the top of the charts, Presley's song "Suspicious Minds" hit No. 1 on the Billboard music charts on November 1, 1969. This was the last time any song by Presley hit #1 while he was still alive, although "Burning Love" got as high as #2 in September 1972. The mid-1970s saw Elvis becoming increasingly isolated, battling an addiction to prescription drugs and the resulting toll on his appearance, health and performances. Elvis made his last live concert appearance in Indianapolis, Indiana at the Market Square Arena on June 26, 1977. Death and burial He died at his home Graceland in Memphis, Tennessee on August 16 , 1977 and is now buried on its grounds. He was only 42 years old. Originally buried at Forest Hill Cemetery, his tomb was eventually moved to Graceland after an attempted theft of his body. He was found on the floor of his bathroom by his girlfriend in the early afternoon and pronounced dead at 3.30pm. According to several sources a book about astrology or religion was found by his side. Numerous examinations of his death by medical personnel have resulted in a final public cause of death; the cause was, in fact, a heart attack, possibly due to lifestyle and excessive drug use. According to popular legend, however, Elvis did not die in 1977, and may continue to be alive (see Elvis sightings). His international influence Elvis Presley spawned rock and roll interest in Europe; his name was even known by people behind the then-Iron Curtain. Presley paved the way for other American rockers whose records sold in Europe and who began to tour there. Teenagers around the world began copying his "Ducktail" hair style, and the demand for transistor radios exploded so much so that Sony went from a small Japanese telecommunications company making radios to a giant global conglomerate. And, through his new look with black slacks and loose open-necked shirts, he created a huge demand for new lines of clothing. Presley's influence created a generation of teenagers who, for the first time, became an economic powerhouse through their spending capacity. Also, there are a number of Elvis impersonators worldwide. In 1977 President Carter was quoted to say "Elvis Presley's death deprives our country of a part of itself. He was unique and irreplaceable. His music and his personality, fusing the styles of white country and black rhythm and blues, permanently changed the face of American popular culture. His following was immense and he was a symbol to people the world over, of the vitality, rebelliousness, and good humor of his country. Or as James Brown once put it, 'he taught white America to get down.'" Now, more than 25 years after his death, Presley remains a foremost pop icon of the 20th century. His image, especially his trademark forelock, is instantly recognizable. He is still the gold standard against which modern notions of fame are measured. At least one modern recording artist, Elvis Costello, borrowed Presley's first name to help his fledgling career. But all too often Elvis Presley's kitsch appeal and the industry which has grown up around it, chronicling his dietary and chemical predilections and the trappings of his celebrity, have tended to obscure the vibrant and vital music he made as a young man, the vocally-influential recordings of his later career, and the lasting influence both he and his music had on popular culture. Connected with this is a continuing urban myth that Elvis is still alive. "Elvis sightings", in which Presley is reported to have been located (frequently in mundane and out-of-the-way places, such as a supermarket in South Dakota), are common events, and one of the staples of supermarket tabloids. However, interest in his music returned during the buildup to the 2002 World Cup, when Nike used a Junkie XL remixed version of his "A Little Less Conversation" (credited as Elvis Vs JXL) as the background music to a series of TV commercials featuring international soccer stars. The remix hit Number 1 in over 20 countries, including the United States, the United Kingdom and Australia (it was also his first top 10 hit in the UK for nearly 22 years, and his first #1 there for nearly 25 years). At about the same time, a compilation of Presley's US Number 1 hits, ELV1S: 30 #1 Hits, was being prepared for release. "A Little Less Conversation" (remix version) was quickly added as the album's 31st track just before its release in October 2002. Nearly 50 years after Presley made his first hit record and 25 years after his death, ELV1S: 30 #1 Hits reached number 1 on the charts in the US, the UK, Australia and many other countries. A re-release from the album, "Burning Love" (not a remix) also made the Australian top 40 later in the year. His renewed fame continued with another remix in 2003 (this time by Paul Oakenfold) of "Rubberneckin'", which made the top 3 in Australia and top 5 in the UK. This was followed by another album called 2nd to None, a collection of his hits that just missed out on the number 1 spot, including the "Rubberneckin'" remix. In mid-2004, to commemorate the 50th anniversary of Presley's first professional recording, "That's All Right", the recording in question was re-released, and made the charts around the world, including top 3 in the UK and top 40 in Australia. In early 2005 in the United Kingdom, RCA began to re-issue his 18 UK #1 singles as CD-singles in the order they were originally released, one of them a week. The first of these re-issues, "All Shook Up", was ineligible due to its being sold together with a collector's box which holds all 18 singles in it (it actually sold enough to be #2). The second of these re-releases, "Jailhouse Rock", was the number one in the first chart of 2005, and "One Night "/"I Got Stung ", the third re-release in the series, replaced it on the January 16 chart (and thus becoming the 1000th UK number one). So far, all of these have reached top 5 in the offical charts, with three number 1s, seven number 2s, three number 3s, one number 4, and one number 5 so far. These re-releases are breaking many chart records there, making Elvis the only artist so far to spend at least 1000 weeks in the top 40 (coincidently, he broke this record on the week he held the 1000th UK #1 song), and also having the most songs in the top 40, but they have also made him break the record for the biggest drops from the top 5 positions ever. One more Elvis single is due for re-release. Among his many accomplishments, Elvis Presley is only one of two singers (Roy Orbison being the other) to ever have two Top 5 albums on the charts simultaneously. He has been inducted into the Rock and Roll Hall of Fame (1986), the Country Music Hall of Fame (1998), and the Gospel Music Hall of Fame (2001). In 1993, Presley's image appeared on a United States postage stamp. Note: The Presley family, including Elvis, spelled his middle name "Aron" throughout his life, although Elvis is said to have considered changing it to "Aaron". His birth certificate and tombstone both read "Aaron". During his lifetime, Elvis Presley: - recorded 104 singles that hit the Top 40 of the Billboard pop chart. - had 18 number 1 Billboard hits, including four singles in 1956 that occupied the top of the charts for a cumulative total of 25 weeks. The total (18) is surpassed only by The Beatles, who had 20 number 1 hits. - had 38 Top 10 Billboard hits. This total is currently unchallenged; the closest competitor, Madonna, has 35. (The Beatles had 34 Top 10 hits during their career.) Until the record was broken by Boyz II Men's "End of the Road" in November 1992, Elvis Presley's double-side "Don't Be Cruel/Hound Dog" was the undisputed champion of singles in terms of weeks spent at number one. The record spent 11 weeks at the top starting on August 18, 1956. These are other records set by Presley's recordings: - From March 1956 to November 1959, every week there was at least one Elvis song on the singles chart. - From 1956 to 1962 Elvis set the record with 24 consecutive top 5 hit singles (singles listed with B-side songs and original U.S.A. release dates): - "Heartbreak Hotel" / "I Was the One" - released 1/27/56 - "I Want You, I Need You, I Love You" / "My Baby Left Me" - 5/4/56 - "Don't Be Cruel" / "Hound Dog" - 7/13/56 - "Love Me Tender" / "Any Way You Want Me" - 9/28/56 - "Too Much" / "Playing For Keeps" - 1/4/57 - "All Shook Up" / "That's When Your Heartaches Begin" - 3/22/57 - "Teddy Bear" / "Loving You" - 6/11/57 - "Jailhouse Rock" / "Treat Me Nice" - 9/24/57 - "Don't" / "I Beg Of You" - 1/7/58 - Elvis also charted 9 consecutive #1 singles: - "Wear My Ring Around Your Neck" / "Doncha' Think It's Time" - 4/1/58 (the first single to debut on the chart in the top 10) - "Hard Headed Woman" / "Don't Ask Me Why" - 6/10/58 - "One Night" / "I Got Stung" - 10/21/58 - "A Fool Such As I" / "I Need Your Love Tonight" - 3/10/59 - "A Big Hunk O' Love" / "My Wish Came True" - 6/23/59 - "Stuck On You" / "Fame And Fortune" - 3/23/60 - "It's Now Or Never" / "A Mess Of Blues" - 7/5/60 - "Are You Lonesome Tonight" / "I Gotta Know" - 11/1/60 - "Surrender" / "Lonely Man" - 2/7/61 - "I Feel So Bad" / "Wild In The Country" - 5/2/61 - "His Latest Flame" / "Little Sister" - 8/8/61 - "Can't Help Falling In Love" / "Rock-A-Hula Baby" - 11/22/61 - "Good Luck Charm" / "Anything That's Part Of You" - 2/27/62 - "She's Not You" / "Just Tell Her Jim Said Hello" - 7/14/62 - "Return To Sender" / "Where Do You Come From" - 10/2/62 All the above 24 singles also sold over 1 million copies each as well. That is another record yet to be broken. Since 1962, the closest anyone has come to matching this was Madonna in the late 1980s and early 1990s, with 19 consecutive top 5 hits. Also, on the official United Kingdom Top 40 chart, "It's Now Or Never" reached number one in the week of Sunday, January 30, 2005, 27 years after Presley's death. Helen Kolaoke (2002) criticizes Elvis' music saying that, "for black people, Elvis, more than any other performer, epitomises the theft of their music and dance." Others argue that Elvis' music is not an appropriation but a proliferation of black music. (Frith 2004, p.21). It also must be stated that most of Elvis's number ones were written for Elvis or not previously recorded by any other artist. "The Book Of Rock Lists" also argues that his music owes just as much, if not more to white Country music, than Black blues music. For a detailed discography, see: Elvis Presley discography See also Elvis Presley hit singles Some notable compilation albums - Elvis' Golden Records Vol.1 (1958) - Elvis' Golden Records Vol.2 (1960) - Elvis' Golden Records Vol.3 (1964) - Worldwide Hits (1970) - A Legendary Performer (1974) - 40 Greatest (1975) - The Sun Collection (1975) - Elvis Presley - Greatest Hits (1975 - 5 Album Box Set) - Elvis In Demand (1977) - Hits of the '70s (1977) - Love Songs (1979) - Ballads (1985) - All Time Greatest Hits (1987) - The Essential Collection (1993) - Elv1s : 30 #1 Hits (2002) Elvis Presley made only one television commercial, an ad for Southern Maid Doughnuts that ran in 1954. Elvis Presley made famous a version of the peanut butter sandwich with banana (either mashed or whole) that was grilled or fried, and may have contained bacon. - Elvis: Aloha from Hawaii (1973) (TV) $450,000 - Elvis: That's the Way It Is (1970) $500,000 + 60% of profits - Paradise, Hawaiian Style (1966) $225,000 + 50% of profits - Tickle Me (1965) $750,000 - Girl Happy (1965) $500,000 + 50% of profits - Viva Las Vegas (1964) $500,000 + 50% of profits - Fun in Acapulco (1963) $500,000 + 50% of profits - It Happened at the World's Fair (1963) $500,000 + 50% of profits - Follow That Dream (1962) $500,000 + 50% of profits - Blue Hawaii (1961) $175,000 - G.I. Blues (1960) $175,000 + % of gross - Frank Sinatra's Welcome Home Party for Elvis Presley (1960) (TV) $125,000 - Jailhouse Rock (1957) $250,000 - Loving You (1957) $150,000 - Love Me Tender (1956) $100,000 - Don't blame it on Elvis, for shakin' his pelvis Shakin' the pelvis been in style way back since the River Nile The Fabulous McClevertys , calypso singers, 1957 Before Elvis, there was nothing When I first heard Elvis' voice, I just knew that I wasn't going to work for anybody, and nobody was going to be my boss. He is the deity supreme of rock and roll religion as it exists in today's form. Hearing him for the first time was like busting out of jail.---I thank God for Elvis Presley." Before Elvis, everything was in black and white. Then came Elvis. Zoom, glorious Technicolor. - Washburne, Christopher J. and Derno, Maiken (eds.) (2004). Bad Music: The Music We Love to Hate. New York: Routledge. ISBN 0415943663. - Frith, Simon. "What is Bad Music".
<urn:uuid:33adbfe0-b249-493e-810c-ff299083dcee>
CC-MAIN-2021-43
https://www.fact-archive.com/encyclopedia/Elvis_Presley
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585321.65/warc/CC-MAIN-20211020121220-20211020151220-00367.warc.gz
en
0.974377
5,631
2.546875
3
|This article needs additional citations for verification. (November 2010)| |Part of the Politics series| |Basic forms of government| Representative democracy (also indirect democracy or psephocracy) is a variety of democracy founded on the principle of elected officials representing a group of people, as opposed to direct democracy. All modern Western-style democracies are types of representative democracies; for example, the United Kingdom is a constitutional monarchy and Germany is a parliamentary republic. It is an element of both the parliamentary system or presidential system of government and is typically used in a lower chamber such as the House of Commons (UK) or Bundestag (Germany), and may be curtailed by constitutional constraints such as an upper chamber. It has been described by some political theorists as Polyarchy. In it the power is in the hands of the elected representatives who are elected by the people in elections. Powers of representatives Representatives are elected by the public, as in national elections for the national legislature. Elected representatives may hold the power to select other representatives, presidents, or other officers of government or of the legislature, as the Prime Minister in the latter case. (indirect representation). - An independent judiciary, which may have the power to declare legislative acts unconstitutional (e.g. constitutional court, supreme court) - The constitution may also provide for some deliberative democracy (e.g., Royal Commissions) or direct popular measures (e.g., initiative, referendum, recall elections). However, these are not always binding and usually require some legislative action—legal power usually remains firmly with representatives[where?]. - In some cases, a bicameral legislature may have an "upper house" that is not directly elected, such as the Canadian Senate, which was in turn modeled on the British House of Lords. Theorists such as Edmund Burke believe that part of the duty of a representative was not simply to communicate the wishes of the electorate but also to use their own judgement in the exercise of their powers, even if their views are not reflective of those of a majority of voters: ...it ought to be the happiness and glory of a representative to live in the strictest union, the closest correspondence, and the most unreserved communication with his constituents. Their wishes ought to have great weight with him; their opinion, high respect; their business, unremitted attention. It is his duty to sacrifice his repose, his pleasures, his satisfactions, to theirs; and above all, ever, and in all cases, to prefer their interest to his own. But his unbiassed opinion, his mature judgment, his enlightened conscience, he ought not to sacrifice to you, to any man, or to any set of men living. These he does not derive from your pleasure; no, nor from the law and the constitution. They are a trust from Providence, for the abuse of which he is deeply answerable. Your representative owes you, not his industry only, but his judgment; and he betrays, instead of serving you, if he sacrifices it to your opinion. The Roman Republic was the first government in the western world to have a representative government, despite taking the form of a direct government in the Roman assemblies. The Roman model of governance inspired many political thinkers over the centuries, and today's modern representative democracies imitate more the Roman than the Greek models because it was a state in which supreme power was held by the people and their elected representatives, and which had an elected or nominated leader. Representative democracy is a form of democracy in which people vote for representatives who then vote on policy initiatives as opposed to a direct democracy, a form of democracy in which people vote on policy initiatives directly. A European medieval tradition of selecting representatives from the various estates (classes, but not as we know them today) to advise/control monarchs led to relatively wide familiarity with representative systems inspired by Roman systems. Representative democracy came into particular general favour in post-industrial revolution nation states where large numbers of subjects or (latterly) citizens evinced interest in politics, but where technology and population figures remained unsuited to direct democracy. As noted above, Edmund Burke in his speech to the electors of Bristol classically analysed their operation in Britain and the rights and duties of an elected representative. Globally, a majority of the world's people live in representative democracies including constitutional monarchies with strong representative branches. Research on Representation Per Se Separate but related, and very large, bodies of research in political philosophy and social science investigate how and how well elected representatives, such as legislators, represent the interests or preferences of one another constituency. Some of the particular lines of such research and the findings therein are described under the topic Representation. In his book Political Parties, written in 1911, Robert Michels argues that most representative systems deteriorate towards an oligarchy or particracy. This is known as the "Iron Law of Oligarchy." Representative democracies which are stable have been analysed by Adolf Gasser and compared to the unstable representative democracies in his book "Gemeindefreiheit als Rettung Europas" which was published in 1943 (first edition in German) and a second edition in 1947 (in German). Adolf Gasser stated the following requirements for a representative democracy in order to remain stable, unaffected by the "Iron Law of Oligarchy": - Society has to be built up from bottom to top. As a consequence, society is built up by people, who are free and have the power to defend themselves with weapons. - These free people join or form local communities. These local communities are independent, which includes financial independence, and they are free to determine their own rules. - Local communities join together into a higher unit e.g. a canton. - There is no hierarchical bureaucracy. - There is competition between these local communities e.g. on services delivered or on taxes. A drawback to this type of government is that elected officials are not required to fulfill promises made before their election. The system of stochocracy has been proposed as an improved system compared to the system of representative democracy, where representatives are elected. Stochocracy aims to at least reduce this degradation by having all representatives appointed by lottery instead of by voting. Therefore, this system is also called lottocracy. The system was proposed by the writer Roger de Sizif in 1998 in his book La Stochocratie. Choosing officeholders by lot was also the standard practice in ancient Athenian democracy. The rationale behind this practice was to avoid lobbying and electioneering by economic oligarchs. - Direct democracy - Delegative democracy - History of citizenship - Non-partisan democracy - Representation (politics) - Stochocracy or ("Lottocracy") - Totalitarian democracy - Freedom in The World 2015 (PDF) - "Victorian Electronic Democracy, Final Report – Glossary". 28 July 2005. Archived from the original on 13 December 2007. Retrieved 14 December 2007. - The Works of the Right Honourable Edmund Burke. Volume I. London: Henry G. Bohn. 1854. pp. 446–8. - Livy, 2002, p. 34 - Watson, 2005, p. 271 - Budge, Ian (2001). "Direct democracy". In Clarke, Paul A.B. & Foweraker, Joe. Encyclopedia of Political Thought. Taylor & Francis. ISBN 978-0-415-19396-2. - Zur Soziologie des Parteiwesens in der modernen Demokratie. Untersuchungen über die oligarchischen Tendenzen des Gruppenlebens (1911, 1925; 1970). Translated as Sociologia del partito politico nella democrazia moderna : studi sulle tendenze oligarchiche degli aggregati politici, from the German original by Dr. Alfredo Polledro, revised and expanded (1912). Translated, from the Italian, by Eden and Cedar Paul as Political Parties: A Sociological Study of the Oligarchical Tendencies of Modern Democracy (Hearst's International Library Co., 1915; Free Press, 1949; Dover Publications, 1959); republished with an introduction by Seymour Martin Lipset (Crowell-Collier, 1962; Transaction Publishers, 1999, ISBN 0-7658-0469-7); translated in French by S. Jankélévitch, Les partis politiques. Essai sur les tendances oligarchiques des démocraties, Brussels, Editions de l'Université de Bruxelles, 2009 (ISBN 978-2-8004-1443-0). - Gemeindefreiheit als Rettung Europas. Grundlinien einer ethischen Geschichtsauffassung. Verlag Bücherfreunde, Basel 1947. In 1983 republished under: "Gemeindefreiheit – kommunale Selbstverwaltung" (Adolf Gasser/Franz-Ludwig Knemeyer), in de reeks "Studien zur Soziologie", Nymphenburger, München, 1983. - "1,5". Origins of Democracy in Ancient Greece. Josiah Ober , Robert Wallace , Paul Cartledge , Cynthia Farrar (1st ed.). 15 October 2008. pp. 17,105. ISBN 978-0520258099. |Look up representative democracy in Wiktionary, the free dictionary.| |Wikiquote has quotations related to: Representation| |Wikimedia Commons has media related to Democracy.| |Wikisource has original works on the topic: Democracy|
<urn:uuid:b6c4cd40-f078-43ca-baf5-317b6fda7e03>
CC-MAIN-2015-32
https://en.wikipedia.org/wiki/Representative_government
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988930.94/warc/CC-MAIN-20150728002308-00209-ip-10-236-191-2.ec2.internal.warc.gz
en
0.929177
2,032
4.1875
4
Percentage calculation on population Shortcut Tricks Shortcut Tricks are very important things in competitive exam. Time is the main factor in competitive exams. If you know how to manage time then you will surely do great in your exam. Most of us miss this thing. Here in this page we give few examples on Percentage calculation on population shortcut tricks. These shortcut tricks cover all sorts of tricks on Percentage calculation on population. Visitors please read carefully all shortcut examples. These examples here will help you to better understand shortcut tricks on percentage calculation on population. First of all do a practice set on math of any exam. Then find out twenty math problems related to this topic and write those on a paper. Do first ten maths using basic formula of this math topic. You also need to keep track of timing. Write down the time taken by you to solve those questions. Now go through our page for percentage calculation on population shortcut trick. After finishing this do remaining questions using Percentage calculation on population shortcut tricks. Again keep track of Timing. The timing will be surely improved this time. But this is not all you need. You need to practice more to improve your timing more. We all know that the most important thing in competitive exams is Mathematics. It doesn’t mean that other topics are not so important. But only math portion can leads you to a good score. Only practice and practice can give you a good score. You should do your math problems within time with correctness, and only shortcut tricks can give you that success. But it doesn’t mean that without using shortcut tricks you can’t do any math problems. You may do math problems within time without using any shortcut tricks. You may have that potential. But so many other people may not do the same. Here we prepared percentage calculation on population shortcut tricks for those people. Here in this page we try to put all types of shortcut tricks on Percentage calculation on population. But we may miss few of them. If you know anything else rather than this please do share with us. Your help will help others. Percentage is a very important chapter and it uses most chapters for calculation.Shortcut Tricks is based on, to find the population of a particular town,city in increased and decreased order that is obtain in this type of questions. we go through the shortcut tricks. This type of problem are given in Quantitative Aptitude which is a very essential paper in banking exam.Under below given some more example for your better practice. when we say 100 percent in mathematical notation we write 100% so, 35 % means 35 per 100 and 65% means 65 per 100 it is a proportion per hundred and it is used to find marks percentage of a student, profit percent or loss percent of a particular product. It is also used in find out the depreciation at the rate percent per annul or population of a particular city or town where due to some reason rate of population increases or decreases. we can expressed ration number as percent, Here is some different percent related problems are given with shortcut tricks below. Example 1: The population of a village is 2500. It decreases by 4% in the first year and increases by 3% in the second year. What is the population at the end of two years ? Answer : decreases by first year is 4% = 2500 x 96 /100 = 2400 increases by second year is 2400 x 103 / 100 = 2472 Example 2: The population of a city is 175000. In the first year it decreases by 6% and in the second year it increases by 8%. What would be the population of the city at end of the years ? Answer : 175000 x 94 x 108 / 100 x 100 = 177660. Example 3: The population of a town has rapidly increases by 20% every year. If the population of the town in 2011 was 6,00,000 than, What would be its population in 2014 ? Answer: Population in that town in 2014 600000 x 120 x 120 x 120 / 100 x 100 x 100 = 1036800. In a town has present population 52500 and If it is decreased by 20% per annul. What would be the population its 2 years hence. Population after n year = P(1+R/100)n So, Here we P = 52500 R=20% ( decreased ) n = 2 years. Population after 2 years Short Tricks : = 52500 x 80/100 x 80/100 The population of a city was 2 years ago 24000, population decreases every year at the rate of 5 %. Find the present population of the city. population was decreases at a particular rate so Present population of that city is =24000 x ( 1 – 5 %)2 =24000 x ( 1 – 5 / 100)2 =24000 x ( 19 / 20 x 19 / 20 ) The population in pune city was 1,50,000 three years ago. If it increased by 4%, 5% and 6% respectively in the last three years , then Find the present population of the pune city. Here population increased by continuous three years respectively, So Present population is the city is =150000 x (1 + 4 / 100 )( 1 + 5 / 100 )( 1 + 6 / 100 ) = 150000 x 104 / 100 x 105 / 100 x 106 / 100 = 150000 x 52 x 21 x 106 / 50 x 20 x 100 Example 7: the population of a town increased by annually 6%. If its population in 2014 is 1,65,325 than, what would be its population in 2015 ? Answer : 1,65,325 x 106 / 100 = 175244.5. 60% of the population of a city are men and 15% are women. If the number of children are 20000, then the number of men will be of that city ? 25% = 20000 60% = 20000 x 60 / 25 = 48000 . The total population of a village is 6000. The number of males and females increases by 10% and 20% respectively and consequently the population of the village becomes 7500. What was the number of males in the village ? The total % increased population = 7500 – 6000 x 100 / 6000 = 1500 x 100 / 6000 = 25% By allegation method Male population before increment = 6000 x 5 / 20 = 1500 Example 10: The population of a town is 56600. If in a 1st year it is decreased by 10% and 2nd year it is increased by 20%. What would be the population of that city after 2 years? Shortcut tricks : 56600 x 90 x 120 / 100 x 100 = 61128 So, after 2 years the population of that city is 61128. The population of a city increases by 10% annually. If its population in 2010 was 12000 then, What it was in 2007 ? We need to find the population of city 3 years back, and also the population of a city increases by 10% annually. So, the population of city was in 2007 =12000 / (1 + 10%)3 =12000 x ( 22 / 20 x 22 / 20 x 22 / 20 ) Example 12: If in a city every year population is decreased by 6%, What would be after 2 years of this towns population while its present population has 65000. Answer: 65000 x 94 x 94 / 100 x 100 = 57434. Example 13: The population of a city has increased continually from 1,71,000 to 2,56,500 in a decades. Find the average percentage increases of that city yearly. Answer : ( 2,56,500 – 1,71,000 ) = 85,500. % = 85,500 x 100 / 1,71,000 = 50%. Average is (50 / 10)% = 5% Percentage calculation on population Shortcut Tricks - Percentage Type1 Shortcut Tricks - Percentage Type2 Shortcut Tricks - Percentage Type3 Shortcut Tricks - Percentage Shortcut Tricks 4 - Percentage shortcut tricks 5 - Percentage calculation Shortcut Tricks - << Go back to Percentage shortcut Tricks main page If You Have any question regarding this topic then please do comment on below section. You can also send us message on facebook.
<urn:uuid:993897bc-291d-4ba0-bc7a-e25f5ca4f30e>
CC-MAIN-2017-30
http://www.math-shortcut-tricks.com/percentage-calculation-on-population-shortcut-tricks/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424910.80/warc/CC-MAIN-20170724202315-20170724222315-00415.warc.gz
en
0.912862
1,748
2.78125
3
Today, virtually everyone knows of someone who has battled for their life against antibiotic-resistant bacteria. Two well-known examples are MRSA and C. difficile. They have become almost epidemic. It can happen in the blink of an eye, and the life-threatening havoc they wreak knows no bounds. Hospitals are no exception. At Rhode Island Hospital, Dr. Eleftherios Mylonakis and Dr. Louis B. Rice are collaborating to find a solution to this growing problem. Mylonakis is chief of infectious diseases at Rhode Island Hospital and The Miriam Hospital, and the Dean’s Professor of Medical Science at The Warren Alpert Medical School of Brown University. Rice is physician-in-chief of medicine at Rhode Island Hospital and The Miriam Hospital, and chairman of medicine and Joukowsky Family Professor of Medicine at Alpert Medical School. In this resistant bacteria research project, Mylonakis and his team are looking to find compounds that can weaken or wipe out these resistant bacteria. And then Rice and his team will do further testing in his lab to determine why they are effective. Although antibiotic drug discovery takes many years, they are making headway in defining the problem and redefining the approach to battling it successfully. In addition to threatening the lives of patients, antibiotic-resistant bacteria are threatening the very essence of how physicians practice medicine and how patients benefit from health care. Without effective antibiotics, the whole face of medicine changes, as elective procedures and minor illness can become life-threatening when a patient is infected with resistant bacteria. For instance, the growing prevalence of resistant bacteria increases the risk for lifesaving procedures such as chemotherapy, cardiac bypasses and organ transplants and even for life-enhancing surgeries such as joint replacements and other elective surgeries. Going to a rehabilitation facility poses the same challenges, along with nursing homes. Anywhere there is a preponderance of ill people, antibiotic resistant bacteria have the opportunity to flourish. This complex problem can be categorized into three areas of inquiry. How do bacteria become resistant? How does this resistance impact treatment? And what makes these particular bacteria able to cause disease while they are simultaneously fighting the antibiotic? Typically, researchers look at only one of these questions or study them in isolation. Mylonakis and his team are researching all three questions simultaneously. They can do this because they have changed the battlefield, thanks to an incredible worm—Caenorhabditis elegans. “About half of the C. elegans worm genes are similar to human genes. There are 20 cells in the intestinal track, and they have microvilli as humans do and their innate immunity has interesting similarities to human immunity,” Mylonakis says. Since this worm shares many important characteristics with humans, the investigators can test thousands of compounds on a whole organism host rather than in a test tube. By screening the compound in a host, they are simulating the actual infection and immune response process more closely. “We are screening thousands of compounds a week in our lab. We are trying to find a compound that helps the worms survive longer. The C. elegans worm plays an integral role in our research because it is much harder to develop the immune response in a test tube,” says Mylonakis. They test the compound by infecting the 1-mm adult worm and then placing it in a tray with the compound. The worms are transparent, so they can be examined with a special microscope to study the compound’s impact. They are looking to do one of three things: inhibit virulence (the strength of the bacteria), weaken the resistance of the bacteria, or strengthen the immune response. Using precise standards and protocols, the Mylonakis group in close collaboration with the Ausubel group at Harvard University average about five “hits” per thousand compounds tested—that is, about five potential compounds that may warrant further testing and could save lives. This collaboration between the two labs is critical to the project. Mylonakis and his team can determine that a compound is having an impact, but the “why” and the “how” are crucial to success. That’s where Rice and his team come in. “We can test 4,000 compounds per week per person working on the project, and there are three scientists from our group that work on this project full-time. That is significantly more than you could do in mouse models,” says Mylonakis. Once they identify promising compounds, they collaborate with the Rice lab for further testing to determine how it is working. “Most of the naturally occurring products that make antibiotics have been exhausted. We need to find other compounds,” Rice says. “We need to get more sophisticated beyond kill and inhibit. We need to understand how they are working—the mode of action.” Partnerships are another vital piece helping to solve the puzzle, according to the two researchers. This project is funded by the National Institutes of Health, as well as the pharmaceutical industry, and is part of a larger collaboration between several top laboratories in the area that are working in antimicrobial drug discovery. This kind of collaboration between academics, government and the pharmaceutical industry is important for the future. To keep our patients safe, healthy and infection-free, Lifespan hospitals are engaged in many programs, procedures and research projects in infection prevention and control, including an aggressive hand hygiene program, special antiseptics for bathing patients, and software for tracking infections in the hospital. Mylonakis and Rice know there is a long road ahead before their research could help a patient, but that doesn't deter either of them. “This research has beautiful crossover from basic lab concepts into the beds where the patients are in the next building,” says Rice. “I can look at a lab report and say, ‘I know how it’s doing that…and that…but how’s it doing that?’ I take it to the lab and figure it out." Mylonakis adds, “The degree of difficulty motivates me. We are trying to make a difference in patients’ lives, create high-paying jobs in our area, and outsmart nature. How could you find anything more challenging than that?"
<urn:uuid:f1a581e5-670c-4ad5-998c-f1e79c09a6a5>
CC-MAIN-2015-18
http://www.lifespan.org/Caenorhabditis_elegans-Game_Changer.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246653426.7/warc/CC-MAIN-20150417045733-00163-ip-10-235-10-82.ec2.internal.warc.gz
en
0.956404
1,327
3.28125
3
Due to scheduled maintenance, some ADHS online services may be unavailable Thursday, 12/19 for a short period of time between 6pm and 10pm. Please note that Medical Marijuana-related online services will not be affected. Thank you for your patience. Profiles for Health Care Workers (Fact Sheets) - "B" Agents - Health Care Providers: If you suspect a patient has been exposed to a biological or chemical agent please call the Office of Infectious Disease Services at (602) 364-4562 On-call staff are available 24 hours a day, 7 days a week. Brucellosis | Cholera | (Epsilon Toxin of) Clostridium Perfringens | Cryptosporidiosis | Eastern Equine Encephalitis Escherichia Coli O157:H7 | Glanders | Melioidosis | Psittacosis | Q Fever | Ricin | Salmonellosis Shigellosis | Staphyloccal Enterotoxin B | Tricothecene Mycotoxins (T-2 Mycotoxins) Typhus Fever | Venezuelan Equine Encephalitis | Western Equine Encephalitis Typhus fever is a rickettsial disease caused by the organism Rickettsia prowazekii, a Gram negative, obligate intracellular bacterium. Routes of Exposure: Humans are exposed to epidemic typhus through arthropod vectors, primarily the human body louse. Infective Dose & Infectivity: The infective dose is unknown. All people are considered susceptible, though older adults may be more severely affected. Incubation Period: The incubation period ranges from 1 to 2 weeks, but is usually 12 days. Illness usually starts suddenly with headache, chills, prostration, fever, and generalized body aches. A macular eruption appears in four to seven days, initially on the upper trunk, followed by spread to the entire body, but usually not to the face, palms, or soles. The rash starts as maculopapular, becomes petechial or hemorrhagic, then develops into brownish-pigmented areas. The rash may be more concentrated in the axillae. Changes in mental status are common with delirium or coma. Toxemia is usually pronounced. Myocardial and renal failure can occur when the disease is severe. When untreated, the fever and illness last for 2 weeks. The death rate for untreated epidemic typhus increases with age and varies from 10% to 40%. Typhus fever is transmitted from person to person by the body louse, which feeds on the blood of humans. Infected lice excrete rickettsiae in their feces and usually defecate at the time of feeding. People are infected when they rub feces or crush lice in the bite, superficial abrasions, or mucous membranes. Inhalation of infective louse feces in dust may account for some infections. Transmission has also been associated with contact with infected flying squirrels in the United States, their nests, or their ectoparasites. Primary contaminations & Methods of Dissemination: As a bioterrorism weapon, R. prowazekii would most likely be delivered via aerosolization. Secondary Contamination & Persistence of organism: Direct person-to-person spread of the disease does not occur in the absence of the vector. Rickettsia can remain viable in a dead louse for weeks. Decontamination & Isolation: - Patients – Standard precautions should be practiced with patients with typhus. Louse-infected people should be treated with pediculocides containing pyrethrins (0.16-33%), piperonyl butoxide (2-4%), crotamiton (10%), or lindane (1%). Several applications may be needed because lice eggs are resistant to most insecticides. - Equipment, clothing & other objects - Washing clothes in hot water kills lice and eggs. Insecticides dusted onto clothing has been effective in epidemics. Culture isolation of R. prowazekii is rarely attempted. The preferred serology for acute and convalescent antibodies is the IFA test, although ELISA, microagglutination and latex agglutination are also available. Antibody tests usually become positive in the second week. Rickettsiae an be detected in tissue biopsies by PCR or immunohistochemical assays. Doxycycline is the treatment of choice for epidemic louseborne typhus fever. Therapy should be administered until the patient is afebrile for at least 3 days and clinical improvement is documented; the usual duration of therapy is 7 to 10 days. Severe disease can require a longer course of treatment. Despite concerns regarding dental staining after use of a tetracycline-class antimicrobial agent in children 8 years of age or younger, doxycycline provides superior therapy for this potentially life-threatening disease. In people who are intolerant of tetracyclines, intravenous chloramphenicol or fluoroquinolones can be considered. Fluoroquinolones are not recommended for people younger than 18 years of age. When faced with a seriously ill patient with possible typhus, suitable therapy should be started without waiting for laboratory confirmation. Vaccine is no longer available in the United States and post-exposure chemoprophylaxis is not indicated. Apply residual insecticide to those who are subject to risk. The differential diagnoses should includes febrile illnesses such as anthrax, dengue fever, infectious mononucleosis, leptospirosis, malaria, meningitis, meningococcemia, relapsing fever, Rocky Mountain spotted fever, syphilis, toxic shock syndrome, tularemia, typhoid fever, rubella, measles, and other rickettsial diseases. - Chin J. Control of Communicable Diseases Manual, Seventeenth Edition, American Public Health Association; 2000. - American Academy of Pediatrics. Epidemic Typhus. In: Pickering LK, ed. Red Book: 2003 Report of the Committee on Infectious Diseases. Elk Grove Village, IL: American Academy of Pediatrics; 2003: 669-670. - Center for Food Security and Public Health. Typhus Fever – Rickettsia prowazekii, Iowa State University College of Veterinary Medicine Find the PDF version of this Fact Sheet in the Zebra Manual.
<urn:uuid:a264f71b-35bb-4ccc-a817-b209a332b2f4>
CC-MAIN-2013-48
http://azdhs.gov/phs/emergency-preparedness/bioterrorism/fact-sheets/b-agents/index.php?pg=typhus-fever
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345758566/warc/CC-MAIN-20131218054918-00020-ip-10-33-133-15.ec2.internal.warc.gz
en
0.865454
1,371
2.78125
3
I note that Pluto is a planetary mass object (PMO), or planemo. A planetary-mass object (PMO), planemo, or planetary body is a celestial object with a mass that falls within the range of the definition of a planet: massive enough to achieve hydrostatic equilibrium (to be rounded under its own gravity), but not enough to sustain core fusion like a star. By definition, all planets are planetary-mass objects, but the purpose of this term is to refer to objects that do not conform to typical expectations for a planet. These include dwarf planets, which are rounded by their own gravity but not massive enough to clear their own orbit, planetary-mass moons, and free-floating planemos, which may have been ejected from a system (rogue planets) or formed through cloud-collapse rather than accretion (sometimes called sub-brown dwarfs). At the pressent time the planetary mass oobjects in the solar system includes eight objects classified as planets (including four terrestrial planets, two gas giants, and two ice giants), five classified as dwarf planets (including one asteroid and four trans Neptunian objects or TNOs), and nineteeen natural satellites or moons. And there are some candidates for classification as dwarf planets among TNOs. And I think that most professional astronomers, amateur astronomers, and science fiction fans can list most of those planetary mass objects from memory. So if I was an astronomy student studying for an astronomy career around 2006 I might be a little annoyed by the redefiniton of a planet. I might take the objection to increasing the number of recognzied planets in the Solar System and the redefinition of planet to avoid that as insulting to my ability to remember the names and data of a large number of objects. Since the old definition of a planet left out the nineteen planetary mass natural satellites, continuing to use it would result in astronomy students and school children having to remember the names of only fourteen planets so far, with another five presently considered strong contenders to be classified as dwarf planets or planetary mass object, and the hypothetical and as yet unconfirmed Planet Nine. So by 2021 there would be at most 20 objects listed as planets. And possibly the largest trans Neptunian objects, the ones of planetary mass, could have been classified as a category of trans Neptunian planets, in a separate category from terrestrial planets, gas giants, and ice giants. I also note that the dwarf planet and asteroid 1 Ceres, discovered in 1801, and the other three first asteroids to be discovered, were originally listed as planets. So after Neptune was discovered in 1846, there were usually at least twelve planets listed in astronomy books. Actually the fifth asteroid to be discovered, 5 Astrea, was discovered in 1845, and at least one asteroid was discovered each year afterwards, and those newer asteroids were aleo often listed as planets. All the asteroids dicovered up to 15 Eunomia, discovered in 1851, were sometiems considered planets, until they were reclassifed as minor planets or asteroids in the 1850s. So for a short period after 15 Eunomia was discovered, there were 23 recognized planets in the Solar System. I also note that many science ficiton fans are familiar with many fictional planets, and that many astronomers who search for exoplanets around other stars may be familiar with many of the over four thousand exoplents which have been discoverd so far.
<urn:uuid:a5afeb74-6cb8-4ba7-880c-e1d99af30dfe>
CC-MAIN-2021-43
https://astronomy.meta.stackexchange.com/questions/672/why-do-we-care-if-pluto-is-classified-as-a-planet?noredirect=1
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583423.96/warc/CC-MAIN-20211016043926-20211016073926-00463.warc.gz
en
0.962782
712
2.875
3
In today’s globalized world, a corporation might have a retail store in one country, a factory in another, and financial services provider in yet a third. Corporate interconnectedness has brought investment and growth, to be sure, but it has also added complexity to the work of tax authorities. Increasingly, developing-economy governments come face-to-face with corporations that employ sophisticated strategies with the aim of paying fewer taxes. With our recently published handbook, "Transfer Pricing and Developing Economies: A Handbook for Policy Makers and Practitioners,” we hope to support efforts to protect countries’ corporate tax bases. This will not be easy. To capture revenues from multinational corporations, tax authorities must master rule-making, enforcement, and auditing around a technical accounting practice called “transfer pricing.” This practice is important because it is how corporations that work in multiple countries determine where their profits are made. Essentially, a corporation sets the prices for transactions between its subsidiaries – say the price for a tee-shirt made in a factory in Honduras and sold to a retail store in Germany. This, in turn, determines the corporation’s tax liability in those countries – if the tee-shirt is more expensive, the factory makes more profit; if it’s cheaper, the retail store does. Transfer pricing is necessary to determine profits, losses, and taxes. Problems arise when a corporation intentionally manipulates transfer prices to its advantage, depriving countries and their citizens of millions of dollars. Abusive transfer mispricing is among the most urgent problems in international tax planning confronting tax officials around the world. Take the ongoing dispute – with several billion dollars at stake – over the appropriate valuation of Facebook’s intellectual property, which was transferred to Ireland in 2010. Valuation challenges are equally relevant in developing economies, which tend to rely more on revenue from corporate tax. At the same time, if governments are too aggressive or careless, they can subject corporations to double taxation, which risks undermining investor confidence. Multinational corporations frequently cite transfer pricing as one of their most important tax concerns, and one that may affect investment decisions. Tax authorities need to balance revenue goals with the desire to maintain a fair and predictable investment climate. In practice, developing economies often have basic legal provisions around transfer pricing principles. But only a small number operate effective transfer pricing regimes that incorporate a thorough legal framework and credible enforcement capabilities. Drawing on our experience with tax authorities around the world, the handbook summarizes approaches that have been successful and unsuccessful. Our aim is to present lessons learned and to provide a range of examples in building and implementing more effective transfer pricing regimes. We also discuss strategies to encourage taxpayer compliance and help to prevent and resolve disputes. To be clear, the handbook is a technical read. It gets into the details, and provides nuance for tax policy makers. We are trying to reach those who can make the day-to-day changes in the governments that need it most. We also recognize that transfer pricing is only one of many priorities confronting tax administrators. So we emphasize the need to identify the transfer mispricing risks that are specific to individual countries – is there a certain sector that is more vulnerable? Does that sector have the potential to provide much more public revenue? And we recommend that any government properly assess the costs and benefits of investing in transfer pricing capacity. Tailoring is critical – the approach taken by a country with few large multinationals in a small number of priority sectors will differ from the approach of a country with a large number of active foreign affiliates. In our experience, strengthening measures against corporate base erosion, such as building robust transfer pricing regimes, tends to yield good returns on investment. In initial pilot programs delivered by the World Bank, OECD and EU, additional revenue collection from transfer pricing adjustments in Colombia, Kenya, Vietnam and Zambia have been encouraging. Similarly, aggregate analysis using firm-level information, and very recent work done at the OECD suggest that requiring firms to provide more robust documentation of their transfer pricing practices and introducing related anti-avoidance rules may reduce profit-shifting by multinationals. We hope that this handbook will help inform policy makers in evaluating different policy options and in implementing effective transfer pricing regimes. We hope it will help make the rules a little bit clearer for everyone, from government to taxpayer.
<urn:uuid:82119ded-64d9-4e14-9cb2-a6de6935347c>
CC-MAIN-2019-04
http://blogs.worldbank.org/governance/little-handbook-could-help-bring-big-results-revenues-and-investor-certainty
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657510.42/warc/CC-MAIN-20190116134421-20190116160421-00145.warc.gz
en
0.944361
889
2.609375
3
Such whorled or verticillate bracts generally remain separate (polyphyllous), but may be united by cohesion (gamophyllous), as in many species of Bupleurum and in Lavatera. They are magnificent evergreen trees, with apparently whorled branches, and stiff, flattened, pointed leaves, found in Brazil and Chile, Polynesia and Australia. The Ulvaceae, the thallus of which consists of external form as an expanded Coprinus, Neomeris simulates the laminae, one or more cells thick, or hollow tubes, probably represent fertile shoot of Equisetum with its densely packed whorled branches, a still more advanced stage in the passage of a colony into a multiand in Microdictyon, Anadyomene, Struvea and Boodlea the branches, cellular plant. Attached to the bottom of pools series of the Confervales, the thallus consists of filaments branched by means of rhizoids, the thallus of Characeae grows upwards by or unbranched, attached at one extremity, and growing almost means of an apical cell, giving off whorled appendages at regular wholly at the free end. The fructification consists of long, lax spikes, with whorled sporophylls; indications of megaspores have been detected in the sporangia. An Equisetaceous plant, which Brongniart named Phyllotheca in 1828, is another member of the same flora; this type bears a close resemblance to Equisetum in the long internodes and the whorled leaves encircling the nodes, but differs in the looser leaf-sheaths and in the long spreading filiform leaf-segments, as also in the structure of the cones.
<urn:uuid:c0b8749e-1e10-4c64-bd39-2724052508c4>
CC-MAIN-2017-22
https://www.all-dictionary.com/sentences-with-the-word-whorled
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463610342.84/warc/CC-MAIN-20170528162023-20170528182023-00263.warc.gz
en
0.922241
385
2.953125
3
NASA just released this incredible hypercolor map of Mercury, the first full map of the planet: Mercury is the closest planet to the sun. NASA's Messenger probe flew by the planet on it's way through the solar system. An earlier shot of the planet was released on March 6, but it wasn't hypercolored. From the description: On March 18, 2011, NASA's MESSENGER spacecraft entered orbit around Mercury, becoming the first spacecraft ever to do so. Among the many instruments on this pioneering probe is a wide-angle camera capable of generating high-resolution images of the planet's surface. By stitching thousands of these images together, scientists created the first complete map of Mercury. The result isn't just a pretty picture. The map's enhanced colors, produced by special filters fitted on the camera, tell a story about the chemical, mineralogical and geological history of the innermost planet in our solar system. Young craters, for example, appear light blue or white. Tan regions mark plains formed by lava flows. Dark blue represents areas rich in a dark mineral. Watch the visualization for a tour of this colorful new view of Mercury. NASA also created a video, but the music is distracting, so we made a GIF:
<urn:uuid:1eba8495-f58d-42c1-bc6f-83f717f41880>
CC-MAIN-2019-04
https://www.businessinsider.com/the-first-full-map-of-mercury-gif-2013-3
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659056.44/warc/CC-MAIN-20190117163938-20190117185938-00598.warc.gz
en
0.917574
256
3.859375
4
As a mom of two young adults, I never thought Internet safety would affect my family. We had always been cautious with what they played and viewed on their phones and electronics but I was so wrong! In this day and age of high tech, most kids have a Nintendo™, PlayStation™, tablet, laptop computer, or smart phone. But do they know how to be cyber safe with them? I thought mine did. I recently found videos on my 20-year-old son’s phone that were shocking—he swears he didn’t download them. My son is on the autism spectrum and does not fully understand what has been sent to his phone or how or when to delete it. It is reported every year that thousands of children and young adults become victims of cyber abuse and do not realize it until it’s too late. Cyber abuse can be anything from being bullied through Instagram, web chats, Facebook, Twitter, texting, or emails, to receiving pictures (regular and animated) that are graphic in nature or pornographic. Many times this can leave our kids open for unwanted contact from older people or not so nice friends. So what can you do to protect your child or young adult? The following are several ideas on cyber safety: Most of all, explain the reason something is inappropriate or unsafe for them and how to get away from it. Children and young adults with disabilities many times are unaware of the underlying danger that can await them. It’s our jobs as parents to prepare them. To learn more about what to do if your child is bullied, go to Bullying Children with Disabilities. Just when I thought maybe the “autism thing” was calming down. And that maybe I had a few months to catch my breath before researching everything I needed to know about guardianship before my son turns 18. Wham–another big change brought us back to reality.
<urn:uuid:7fdb3bb0-3949-4478-baa9-b6d109363233>
CC-MAIN-2019-39
https://www.navigatelifetexas.org/en/blog/article/tips-on-keeping-your-child-cyber-safe
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572934.73/warc/CC-MAIN-20190916200355-20190916222355-00079.warc.gz
en
0.977345
395
3.03125
3
Rural School Days: Kansas in 1920 Guided tour — Kansas Museum of History, Topeka Grades — 4th-5th (4 hour program); 1st-6th (1 hour program) Located in Jackson County, Kansas, the one-room Stach School was restored to its 1910-1920 appearance and moved to the grounds of the State Historical Society in the early 1980s. It is representative of thousands of country schools that dotted the landscape generations ago. A scenic quarter-mile nature trail through tall-grass prairie connects the school to the Museum of History. The full program in this authentic one-room school offers fourth and fifth grade students a unique opportunity to experience history. This four-hour program is a living history activity. The Stach school teacher meets the students at the Museum of History and walks the class to the historic Stach School. The schoolteacher then leads simultaneous lessons in recitations, arithmetic, geography, reading, and orthography. Students act as "pupils" of seventy years ago, sit at wooden desks, practice their penmanship using pen and ink, participate in a spelling bee, and maybe even get in a game or two of "Drop the Handkerchief." Each child receives a copybook and certificate. We hope students will enjoy this program that was designed to provide them with an understanding and appreciation of our rural school heritage. Kansas History, Government, and Social Studies Standards Standard #4: Societies experience continuity and change over time - Benchmark 4.1: The student will recognize and evaluate continuity and change over time and its impact on individuals, institutions, communities, states, and nations. Cost: $5 per student (One adult enters free for every 10 students. Additional adults pay the student rate.) This fee does not include Museum admission. Length of tour: four hours Number of students in a group: minimum of 10, maximum of 25. Hours: 9:30 a.m. - 1:30 p.m. Registration and scheduling: Rural School Days can only be given Tuesday - Friday. Register online, or contact 785-272-8681, ext. 414; email [email protected]. Tours must be scheduled at least two weeks in advance. Length of tour: one hour Number of students in a group: minimum of 10, maximum of 25 Hours: 9:30 a.m., 11:30 a.m., 1 p.m. Cost: $2 per student. (One adult enters free for every 10 students. Additional adults pay the student rate.) This fee does not include Museum admission. Registration and scheduling: Rural School Days can only be given Tuesday - Friday. Register online, or contact Education and Outreach at 785-272-8681, ext. 414; e-mail [email protected]. Tours must be scheduled at least two weeks in advance. Remember to make your reservation early for either of the Rural School Days programs because demand is higher in April and May. Tours of the Stach Schoolhouse are given on an "as requested" basis.
<urn:uuid:34780d92-3f0f-47ea-986c-c9d71863515a>
CC-MAIN-2015-27
http://kshs.org/p/rural-school-days-kansas-in-1920-kansas-museum-of-history/14939/
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375097710.32/warc/CC-MAIN-20150627031817-00018-ip-10-179-60-89.ec2.internal.warc.gz
en
0.927677
645
2.6875
3
Launching a new vehicle in the market, or upgrading an existing model, requires considerable research and effort. Automakers are required to ensure that all safety components, systems, and measures have been followed, and the final vehicle is compliant to various regulations and norms. That’s exactly where automotive testing comes in, and things like vehicle safety compliance testing are a part of the process. What exactly is automotive testing? Here is an overview for customers and automakers. Simply put, automotive testing refers to a series of tests, which are done to test final vehicles, prototypes, individual components and systems. These tests are done through lab tests, simulating real world situations, and other virtual tests. There are many companies that specialize in automotive testing, and they can ensure that specific tests are done for compliance and to verify the claims of the automaker. Reports of tests done on individual components are also provided, including other tests, like emission testing. The results of different tests are corroborated and checked, to come up with new suggestions. Compliance and beyond A big part of automotive testing is about testing. Automakers must ensure that their vehicle is compliant to the basic rules and regulations, and at the same time, the safety and other features that are new are tested, before claims are made. For car makers, the idea is to remain safe from possible lawsuits, which may occur if automotive testing is not done ahead of the launch. Compliance and regulation requirements also change from time to time, and to keep up with these aspects, outsourcing automotive testing is a wise thing to do. Companies that specialize in automotive testing often offer a wide range of tests, including component testing and testing specific systems. Outsourcing allows automakers to get an unbiased third-party view of their products, and the results and reports can be considered concrete backing for their claims. Also, many automakers simply do not have the entire setup for automotive testing, which is an expensive and extensive process, depending on the number of tests being done. Outsourcing also helps research work, and companies can expect to make their vehicles better for the masses, specifically for their target audience. Check online now to find more on automotive testing, and find a company that has extensive experience, market knowledge and a fair idea of compliance requirements, so that all testing needs can be followed as needed.
<urn:uuid:04fe0f52-69f7-4fb9-8978-c420210b9d1f>
CC-MAIN-2021-31
https://apautollc.com/learning-more-automotive-testing-and-compliance/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152112.54/warc/CC-MAIN-20210806020121-20210806050121-00521.warc.gz
en
0.966132
470
2.6875
3
FIRESIDE FOLKLORE: Sycamore Lore In my childhood memories of trips from Canton, Ohio to Webster Springs, WV, I remember many things. Clutched hands at my stomach from the occasional motion sickness. Ears popping as we climbed the mountain roads thru Braxton County then descending into Webster County. I also remember the beauty of the autumn colors and the starkness of the mountains dressed in winter white shades when we ventured late in the year. The trees always seemed to welcome me in a familiar way, and the mountains beckoned to me like a warm hug from Grandma Brake. One odd thing about this barren winter landscape always struck me as a bit creepy. Some of the trees I would see from the car appeared as if they were ghost like with mottled bark and gnarly limbs looking as if they belonged on the Wizard of Oz set before the flying monkeys swooped down. I soon learned these stark looking trees were the great American Sycamores. Platanus Occidentalis is the scientific name for the variety we are all familiar with. These mammoth trees can sometimes reach heights of over 100 feet tall and the trunks are often hollow in the giant specimens. The most well known Sycamore trees in West Virginia history would be the Big Sycamore tree on the Back Fork of Elk River in Webster County (which toppled in 2010) and the Pringle Tree near Buckhannon in Upshur County which housed the Pringle brothers for several years from 1761-1764. What makes these trees stand out from other trees at this time of year? The bark of the tree flakes off in irregular masses leaving the surface speckled in white, gray and greenish brown colors causing an almost camouflage look to appear. As the tree grows, the bark splits and becomes almost ghostly in its color. No wonder there would be so many legends about this spooky looking species! The Native American Indians called these trees the Ghosts of the Forest. Probably the most notable Sycamore Indian lore stems from along the Little Kanawha River valley near Freeport. The Wyandotte’s spoke of twin Sycamore trees that stood along the old Indian trail near the Hughes River. As legends states, the great chief of the Evil Spirits became angry at two of his followers and cast them out along the water. These two evil spirits that had been cast across the water ended up colliding against two stately sycamore trees. All at once, the evilness spread into the trees causing them to become deformed with the limbs becoming grotesque. The Indians always believed these two trees were inhabited by the evil spirits and would be very careful when passing by. When settlers arrived and heard these tales, they would often laugh. That is until one of the settlers was found dead under one of the trees with the horrified look of having been scared to death frozen upon his face. Occasionally a defiant settler would scoff at the “haunted” trees and brag that he would cut them down for firewood. Usually after these threats were made…ill misfortune would occur to the unlucky boaster. One of the last known attempts to cut the evil trees down was made in 1840. This gentleman grabbed an axe to hack into one of the vexed trees and missed. The axe glanced off the tree and ended up lodged inside his leg. An artery was struck causing blood to spew at the base of the trunk where he promptly bled to death. Legends such as these are embedded in West Virginia’s frontier history. As you travel along the highways and back roads, look out your window and see if you can spot the spooky limbs of the Sycamore. They do look unusual! Sherri Brake lives in Muddlety, WV, is a published author and paranormal investigator. Visit http://www.sherribrake.blogspot.com or Email [email protected]. Are you interested in Ghost Hunting? Learn how to hunt ghosts here. Did you enjoy this article? Consider subscribing to our digital edition to access all the great features of our print edition! When you are as short as I am clothes never fit right. I am constantly hemming pants, shirts, jackets, skirts and dresses. Sometimes I
<urn:uuid:42824a98-bfd9-4e00-8425-dc072f43aaf9>
CC-MAIN-2015-06
http://www.twolanelivin.com/fireside-folklore-sycamore-lore/
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122047499.45/warc/CC-MAIN-20150124175407-00095-ip-10-180-212-252.ec2.internal.warc.gz
en
0.970039
880
2.578125
3
by Deborah Jeanne Sergeant Reducing methane emissions offers manifold benefits beyond environmental reasons. Dr. Chaouki Benchaar with Sherbrooke Research and Development Centre, Agricultura and Agri-Food in Sherbrook, Quebec, recently presented “Dietary Options to Reduce Enteric Methane Emissions from Dairy Cows” as a recent webinar. “Mitigating methane from ruminants is a hot topic because it’s part of the conversation about climate change,” Benchaar said. The 2018 Special Report on Global Warming from the Intergovernmental Panel on Climate Change states that “limiting warming to 1.5º Celsius implies reaching net zero carbon emissions globally around 2050 and concurrent deep reductions in emissions… particularly methane.” Sources of greenhouse gas (GHG) emissions from agriculture include enteric fermentations (methane), manure management (nitrous oxide – N2O – and methane), N2O and carbon dioxide (CO2) from the soil and N2O from indirect emissions. “Methane is mainly from enteric fermentation and manure management, and carbon dioxide emission from fossil fuel use,” Benchaar said. GHG emissions from livestock, their manure and feet equal 7.5 gigatons of CO2 annually, representing 14.5% of human-induced GHG emissions. “Dairy and beef are the main contributors to emissions,” he said. Raising beef cattle represents 35% of global GHGs by species, followed by dairy cattle at 30%. “Pigs, buffalo, chickens and small ruminants are much smaller contributors,” he added. Benchaar said ruminant animals are important for food security. “The ruminant animal has the unique ability to efficiently convert the forages from grasslands into high-quality animal products,” he said. Ruminants represent 51% of all sources of protein from the livestock sector, with 33% of that as meat and 67% as milk. Cattle provide 81% of protein sources of ruminants, buffalo 11%, sheep 5% and goats 4%. “For many populations, livestock is a primary source of nutrition, not just of calories,” Benchaar said. Methane emission from cattle are 90% from enteric fermentation and 10% from manure storage. More than an environmental concern, “methane production means loss of productive energy,” Benchaar said. “In general, in ruminants between 2% and 23% of gross energy intake is lost to methane.” In dairy cows on a forage-based diet, it’s 4% to 7% gross energy intake lost and in feedlot cattle on a high grain diet, 3% to 4%. Methane production happens in the rumen. Carbohydrates in the feed start the process, as they go into the rumen and are broken down into volatile fatty acids – sources of energy, CO2 and hydrogen. Methane is formed as a reaction among these outputs. Each day, lactating dairy cows emit 700 liters of methane, followed by dry cows on hay (200 liters), beef cattle (100 to 200 liters) and sheep (50 liters). In dairy cows, 87% of the methane produced is from the cow’s rumen and 13% is from the hindgut. The release of enteric methane is only 1% through the rectum. “Methane is not released through flatulence,” Benchaar said. The mouth and nostrils release 99% of enteric methane. Enteric methane represents 50% of the carbon footprint. Mitigating enteric methane production from dairy cows can both reduce a potent GHG and loss of energy to animals. “It has both long-term environmental and short-term economic benefits,” Benchaar said. “It also represents a loss of energy to the animal so it is a nutritional issue.” Approaches to reduce GHG intensity of milk production are measured by the carbon produced per kilogram of milk. Benchaar said that research from 155 countries indicates reducing GHGs in dairying can also enhance animal productivity, as obtaining more nutrition from their feed can increase the amount of milk given per animal. “As milk production increases, methane emission increases but it’s not a 1:1 relationship,” Benchaar said. “As the production of milk increases, the greenhouse gases per kilogram of milk decreases. With low productivity systems, the emission intensity is high. Therefore, the focus needs to be on increasing animal productivity, better nutrition, genetics, health and management.” Research also indicates that enteric methane increases as dry matter intake increases. A high forage diet fed to beeves appeared to reduce methane emissions by 60%; however, “this is not consistent,” Benchaar said. That finding is also “not consistent with the role of ruminants of converting fibrous feeds to edible products, milk and meat.” “It has been demonstrated that feeding legumes versus grass produces less methane,” Benchaar said. Their lower fiber content and higher passage rates from the rumen means less methane per the amount of milk or meat the animals produce. Benchaar cautioned that plant maturity at harvest can affect this. Enhancing forage quality “is not easy to achieve,” he added. “For example, harvesting at optimal stage or early maturity means higher dry matter intake and digestibility and less methane.” Lipids also affect methane production, including “reduction of the amount of organic matter fermented in the rumen,” Benchaar said. This is because fat is replacing carbs. Benchaar said lipids decrease the extent of organic matter (fiber) fermentation in the rumen via toxic effects on ciliate protozoa and methanogens and to a lesser extent, through the biohydrogenation of unsaturated fatty acids. Researchers found a 5.6% reduction of methane with each 1% addition of supplemental fat to dry matter. Replacing alfalfa with corn silage reduces methane in stored manure by up to 10%; adding fat such as linseed oil can offer up to 25% reduction. These changes take place because of depressed fiber degredation and increased volatile solids in manure. “It’s not all about methane only,” Benchaar said. “It is important to conduct a whole farm lifecycle assessment.” He also spoke about adding canola meal instead of soybean meal to improve efficiency and sustainability to a dairy farm based on his recnet research. “Canola meal shifts nitrogen excretion from urine to feces, which means less potential emissions of ammonia and nitrogen,” Benchaar said. Canola can also reduce methane, increase milk production and reduce methane intensity. “Canola meal improves the environmental footprint of milk production,” Benchaar concluded. The switch decreased GHG intensity by 3%. “Further studies are needed but through the studies, using canola meal rather than soybean meal in the diet of lactating dairy cows can be a greenhouse gas mitigation strategy, depending upon where it is produced,” Benchaar said. “Globally, the carbon footprint is lower with canola meal.”
<urn:uuid:e9d14a0a-fa6e-4d50-8eda-e98f2d18cf6e>
CC-MAIN-2023-50
https://countryfolks.com/diet-can-reduce-methane-in-dairy-cows/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100146.5/warc/CC-MAIN-20231129204528-20231129234528-00646.warc.gz
en
0.935609
1,558
3.453125
3
Thai decision leaves NASA plan up in the air The Thai Government has delayed a decision to let US space agency NASA use a military air base for climate study. It follows opposition warnings that the NASA aircraft could be used for espionage, in line with US plans to strengthen its presence in the Asia-Pacific. NASA wants to use the U-Tapao air base in southeast Thailand, which was built and used by the US during the Vietnam War. The planned project would use satellites, aircraft and ground missions to study how monsoons affect the climate and air quality in the region. But Thailand's main opposition party says allowing the move would be a surrender of national sovereignty. They also claim the government has agreed to the deal in return for the US granting a visa to exiled former Thai Prime Minister Thaksin Shinawatra, brother of current premier Yingluck Shinawatra. The US denies any such agreement. "NASA will have to call off the program this year, which is a shame for weather monitoring technology in Thailand," Prime Minister Yingluck said. Mr Thaksin was toppled by the military in 2006 and has chosen to live in exile in Dubai rather than return home to serve a two-year jail term for abuse of power. The opposition is fighting various moves by the government to amend the constitution and pass amnesty measures that it sees as devices to let Mr Thaksin return home.
<urn:uuid:16665135-67b9-4ec7-872c-cb5b0ebd8317>
CC-MAIN-2014-42
http://www.abc.net.au/news/2012-06-27/an-thai-cabinet-decision-leaves-nasa-plan-up-in-the-air/4094990
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646351.12/warc/CC-MAIN-20141024030046-00131-ip-10-16-133-185.ec2.internal.warc.gz
en
0.965545
289
2.53125
3
In short, the meaning of the Precautionary principle may be described as “better safe than sorry”. Since chemicals are so infinitely difficult to assess and the potential hazard may be so severe, a precautionary perspective is essential. By eliminating hazardous substances you are also eliminating the risk for them to do any harm.The guiding principle in this approach is called the Precautionary principle. . In 1992, the United Nations adopted the following definition of the principle: “where there are threats of serious or irreversible damage to the environment, lack of full scientific certainty should not be used as a reason for postponing cost-effective measures to prevent environmental degradation”. This defintion gives the general direction, albeit it mainly deals with criteria for stopping destructive practices that are already in place. An effective precaution also needs to be pre-emptive, aiming to stop damage before it happens. There are many cases where precaution has been used to stop production and use of hazardous substances. In many countries, the use of PCB was banned without conclusive scientific evidence showing that the substance was causing harm. Similarly the use of ozone-depleting substances was banned prior to conclusive evidence was at hand. If these bans had been postponed until there was such evidence, the damage would have been infinitely bigger before the substances had been phased out. But even though the substances were banned in a precautionary way, they had been used for a long time and have caused immense damages to human health and the environment as well as huge costs for society. These disasters were possible in the first place because politicians relied on risk assessments. Pre-emptive precaution and a focus on hazard would have prevented them. The main basis for a sustainable chemicals policy must be elimination of hazardous substances through a pre-emptive precautionary approach. Ban those that exist and stop new ones before they are introduced to the market.
<urn:uuid:91f9b44b-c967-40e6-aed7-d237bce5371c>
CC-MAIN-2018-39
http://list.chemsec.org/about-us/guiding-principles/precaution/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155676.21/warc/CC-MAIN-20180918185612-20180918205612-00416.warc.gz
en
0.976052
382
4.15625
4
Page created: June 2003 Latest revision or update: 1 May 2017 Bristol Jewish Cemetery Records (to 5 June 2003) Bristol is one of the oldest provincial Jewish communities in the United Kingdom. There are details of a Jewish community in the city dating back to pre-expulsion times in the 12th and 13th centuries. Over the last 250 years at least three Jewish cemeteries are known to have been established in Bristol: - Barton Road, St Phillips Great Gardens (Temple), Rose Street Ridgway (Fishponds), Eastville Barton Road Cemetery, St Phillips The Barton Road Cemetery in St. Philips is believed to be the first in Bristol following the resettlement of Jews in England following their expulsion in 1290. (There had been a medieval Jewish cemetery in Bristol in use some time from 1177 until is documentary evidence to suggest that it was first established between 1740 - 1750, although the earliest identified tombstone dates from 1762. Because of the restrictions on Jews owning land it was leased for a number of years, finally being acquired by the Bristol Jewish Community on 8th August 1859. It continued in use until the early 1900s with the final burial taking place there in 1944. A fire in an adjoining building in 1901 resulted in one the Cemetery walls being demolished by firemen to gain access to the blazing building. As a consequence, a number of tombstones were toppled and graves flattened. The stones were subsequently removed from where they had fallen and laid against the boundary wall without any record of their original location. There are approximately 160 burials at this cemetery included in the Database. Great Gardens (Temple) Cemetery, Rose Street In 1811 Lazarus Jacobs, an eminent glass maker, set aside part of his Great Gardens dwelling in Rose Street for use as a private burial ground. This burial ground was purchased from Isaac Jacobs by Moses Abraham in 1830 and, during the mid to late 1800s, was used for a relatively small number of burials, the majority of burials during that period being in the St Philips Cemetery. The Great Gardens site was compulsorily purchased by the Great Western Railway in 1913 to extend the Goods Yard at Temple Meads but it was not until September 1924 that 27 graves and tombstones were removed from there to be re-interred in the Ridgway (Fishponds) Cemetery (see below) under the supervision of Mr. M. Nathan. Only about 50% of these tombstones remain partially Ridgway (Fishponds) Cemetery, Eastville The Ridgway Cemetery was purchased in several stages, the first section being acquired in the late 1890s (the first burial was in 1898). The second section was purchased in the late 1920s with the present prayer house being dedicated in 1933. In 1924, the 27 graves and tombstones were removed from the Great Garden Cemetery to be re-interred in the Ridgway Cemetery. The present prayer house was dedicated in 1933. This cemetery continues in use today. There are approximately 640 burials at this cemetery included in the Database until 2003. Those buried at this cemetery include: - Joseph Abraham - First Jewish Mayor of Bristol in 1865 - Helen (Strimer) Bloom - First Jewish Lord Mayor of Bristol in 1971 The Bristol Cemeteries' Database Project The Bristol Jewish Cemetery Project was undertaken by volunteers from of the local Jewish Genealogy Group with the dual aims of providing the Jewish Burial Society (Chevrah Chadisha) with a comprehensive set of records (index and photographs) for its Cemeteries and submitting this information to the Jewish Cemetery Project. The work was carried out initially during the summer and autumn of 1997 by Sheila and Alan Tobias, Judith Samuel, Michael Hill, Audrey Greenwood, Marlene Sutton, Sam Silverman, Sam Nirenberg and Rabbi Hillel Simon. Information from the tombstones was supplemented from the following sources: the Bristol Chevrah Chadisha Register of Births and Deaths 1829 - 1894 covering the St. Philips and Rose St. Cemeteries; a listing of the inscriptions from the tombstones in the St Philips Cemetery compiled in 1990 - 1992 by Judith Samuel and the late Rev. Dr. Bernard Susser (original research by David and Simon Jacobs and Lynne Edwards, 1984); the index produced by the Bristol Chevrah Chadisha for the newer sections of the Fishponds Cemetery; a pre-1950 notebook covering the older (original) sections of the Fishponds Cemetery; the Bristol Chevrah Chadisha's holding of Death Certificates. In a number of cases, tombstones were identified by matching the Hebrew names and/or dates given on them with those recorded in the death register. Also, the Samuel-Susser listing proved invaluable in verifying the detail and location of a number of fallen or eroded tombstones in the St Philips cemetery. Wherever possible, details of both date of death and age have been extracted from Bristol Chevrah Chadisha's holding of Death Certificates as these were considered to be the more accurate information source. Details of all burials are available on this database, together with images of all legible and partially legible tombstones as well as most of the 20th century Burial Certificates. Required information for any individual may be displayed by first selecting a cemetery and then highlighting the required name from the drop-down list given below. To obtain an enlarged display of a tombstone, click on its image. To view the Burial Certificate, click on the 'Y' if given in the Cert box. Burial Certificates may also be viewed in a separate database by selecting the required name form the drop down list. The information provided in the database gives for each individual: Date of death Age (where known) Additional data source - Death Certificate (c) or Death Register (r) Notes on state of the tombstone, etc. Grave location within cemetery Hebrew name (St. Philips cemetery only) Some of the records have no surname (illegible, or only Hebrew given names). These can be searched by using UNKNOWN as the surname. Images of legible tombstones may be viewed and downloaded by clicking on the forename of the individual (if highlighted). SEARCH SOLELY IN THE BRISTOL CEMETERIES DATABASE This database, together with the tombstone images, are provided with the permission of the Bristol Jewish Burial Society (Chevrah Chadisha).
<urn:uuid:cada7503-a987-4157-99b7-c2ee9b7f6a7e>
CC-MAIN-2018-34
https://www.jewishgen.org/jcr-uk/Community/bri1/Cemeteries/Cemetery_menu.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221208750.9/warc/CC-MAIN-20180814081835-20180814101835-00046.warc.gz
en
0.932466
1,413
2.96875
3
What was up with those mormon crickets? the roads around these parts were red and stinky, they were on an unstoppable march, Except for the ones that got squished on the roads! - Anonymous1 decade agoFavorite Answer The Mormon cricket (Anabrus simplex) is a shieldbacked katydid, and not a cricket at all. They are large insects that can grow to almost three inches in length. Mormon crickets live throughout western North America in rangelands dominated by sagebrush and forbs. It is flightless, but capable of traveling up to two kilometers a day in its swarming phase. In its swarming phase it is a serious agricultural pest.Appearance Mormon crickets have variable coloration. The overall color may be black, brown, red, purple or green. The "shield" (actually vestigial wings) behind the head may have colored markings. The abdomen may appear to be striped. Females have a long ovipositor, which may be mistaken for a stinger. Both sexes have long antennae. Mormon crickets may undergo morphological changes triggered by high population densities, similar to those seen in locusts. The best-attested change is coloration: solitary individuals typically have drab coloration while swarming individuals are often brightly colored. Oct. '05 UtahMormon cricket eggs mostly hatch the spring after they are laid, although in some high-elevation areas eggs may take two years to hatch. Hatching begins when soil temperatures reach 40 F (4 C). The nymphs pass through seven instars before reaching the adult stage, typically taking 60 to 90 days. Breeding begins within 10 to 14 days of reaching the adult stage. The male passes a large spermatophore to the female, which can be up to 27% of his body weight. The spermatophore is mostly food for the female to consume but also contains sperm to fertilize her eggs. The value of this nuptial gift is such that swarming-phase females compete for males. This sexual role-reversal is not seen in solitary-phase females. The female lays her eggs by thrusting her ovipositor deep into the soil. Females lay about one hundred eggs. Summer 06 NevadaThe Mormon cricket exists in populations of relatively low density throughout most of its range. However at certain times and places population explosions or infestations occur in which large numbers of the cricket form roving bands. These bands may include millions of individuals and have a population density of up to 100 individuals per square meter. These infestations may last years or even decades, and are characterized by a gradual increase and then decrease in population. The factors that trigger these infestations are poorly understood, but are thought to be weather related. When a large band crosses a road it can cause a safety hazard by causing distracted revulsion on the part of the driver, by covering windshields in sticky splatter or even by causing the road surface to become slick with their fluids. Mormon crickets eating another Mormon cricketThe Mormon cricket prefers to eat forbs, especially cultivated crops such as alfalfa, and vegetables. Grasses and shrubs such as sagebrush are also eaten. Insects, notably other Mormon crickets, are also eaten, especially individuals that have been killed or injured by automobiles or insecticides. A recent study has suggested that the migration of swarms may be a strategy to avoid predation by other Mormon crickets. During an infestation Mormon crickets can cause significant damage to crops and gardens, however they have not been shown to decrease the livestock forage value of rangeland. Mormon crickets are preyed upon by a wide variety of birds and mammals. These predators include California Gulls, crows, coyotes and various rodents. They were also eaten by Native Americans. There are no predators that specialize on Mormon crickets, which may be explained by the cricket's migratory habits and large population fluctuations. The most common chemical control method used is carbaryl (typically sold as "Sevin") bait. This bait kills both the Mormon crickets that eat the bait, and the crickets that eat the crickets that eat the bait. Insecticides applied directly to crops may kill the insects, but due to the large size of swarms this method usually does not save the crop from being destroyed. As Mormon crickets are flightless, physical barriers may be effective. Barriers should be at least two feet high and made of a smooth material. According to American folklore, the first Mormon settlement in Utah was saved from famine by gulls eating hordes of Mormon crickets that had been destroying their first wheat crop; hence the name of the insect. California Gulls are known to relocate to desert areas to feed on Mormon cricket swarms, although their effectiveness in controlling infestations is thought to be minimal. - 1 decade ago Sounds like riky has covered all the bases ...... cuz I dunno Jack! Give Ricky the best answer not much more any body can say ..... IS THERE? - Anonymous1 decade ago Hmmm, i dont know what got into them!!!Source(s): I have no clue! What i am sayin!
<urn:uuid:53756434-00df-48f0-956e-e21dae1f2f91>
CC-MAIN-2020-50
https://answers.yahoo.com/question/index?qid=20060816223132AAg9EmF
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141204453.65/warc/CC-MAIN-20201130004748-20201130034748-00588.warc.gz
en
0.958584
1,088
2.78125
3
Articles: Harappa Town Planning by Dr S.Srikanta Sastri in November 1961 An artist's illustration of the Harappan Town A Typical Harappan Granary unearthed in one of the Archaeological expeditions Dr S.SRIKANTA SASTRI Among the great civilizations of the ancient world, India may be said to possess the only surviving Heritage from the remote past as a living force even today. The history of India was supposed by earlier historians to begin only with the alleged aryan invasion in the middle of the second millennium B.C. But the almost accidental discovery of the Harappa civilization, definitely assignable to the fourth millennium B.C., if not earlier, compelled the historians to acknowledge that India took its rank as one of the oldest civilised countries in the world. Recent explorations and excavations have revealed the wide diffusion of this Proto-Indic culture. From Rupar and the foothills of the Himalayas to Lothal and the Narmada Valley in the south, from Assam in the east to the borders of Persia in the west, a single homogenous culture prevailed for at least two thousand years continuously. From the supposed affinity with the Sumerian civilization, it was at first styled as Indo-Sumerian. Others called it “The Indus Valley Culture”, the “Indo-Mediterranean Culture”, etc., but now it is called Proto-Indic or Harappa Culture. The two most important sites almost fully excavated are at Harappa in the Punjab and Mohenjo-Daro in Sindh at a distance of about 350 miles from each other. The Indus river and its tributaries and its fluctuations brought about the destruction of the cities. But the sites were reoccupied and new cities were constructed on identical plans. Harappa is chronologically earlier and lasted longer than the southern city of Mohenjo-Daro. In spite of the long duration there is absolute uniformity of culture. The earlier stages of this culture may be traced in some of the outlying sites like Rana Ghundai, Amri and Nal, but the chronology is disputed. Similarly, the end of Harappa culture is undefined. Probably in 2000 B.C. the Harappa Culture was displaced in some places by Jhukar Culture and still later by Jhangar culture. The absolute and almost monotonous uniformity of Harappa culture compels us to postulate at least a millennium of development before 3000 B.C. Further, the Harappa civilization did not vanish without leaving a trace, for a good deal in the spiritual and religious heritage of Hinduism today can be traced to Harappa civilization. TANTRIK AND AGAMIC PHASE The civilization of Harappa was the product of various racial factors. A cosmopolitan population composed of Proto-Austroloid, Alpine, Nordic, Mediterranean and Mongoloid elements has been proved from the evidence of the skeletal remains. Some scholars have tried to assert that the predominating element was the so-called Mediterranean race having affinities with Sumerians. Page 1 of 4 365.1 Kb file
<urn:uuid:9f886f20-9366-4649-8459-546c4c08938e>
CC-MAIN-2021-31
http://srikanta-sastri.kk5.org/harappa-town-planning/4570840460
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154500.32/warc/CC-MAIN-20210804013942-20210804043942-00586.warc.gz
en
0.947259
658
3.40625
3
1221 S.W. 4th, Room 240, Portland, OR 97204 Spring is officially here. The weather is warmer, the sun is out, and most flowers are in full bloom – including invasive weeds. The Japanese butterbur is an invasive weed that is slowly spreading through Portland’s natural areas. It looks like a tropical plant, with large, thick green leaves that can reach up to four feet wide. The leaves’ underside is fuzzy, and the weed can grow to be six feet tall. Invasive species damage forests, streams, rivers, and personal gardens. Controlling invasive weeds (and fixing the damage they cause) costs Oregonians $125 million each year. It’s important to catch invasive weeds before they become dangerous infestations. If you find Japanese butterbur, please contact Dominic Maze ([email protected]) at the Bureau of Environmental Services to discuss control options. Check out the Bureau of Environmental Services’ website to learn more.
<urn:uuid:140f609b-f4e0-4ced-ab3d-423dc7168706>
CC-MAIN-2018-13
https://www.portlandoregon.gov/fish/article/531799
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647146.41/warc/CC-MAIN-20180319194922-20180319214922-00572.warc.gz
en
0.898153
213
2.640625
3
In 1872, a group of soldiers from Silver City, New Mexico, lead by Captain Chase were seeking renegade Apaches, in the group were Jim and Bob Metcalf. While passing through the canyon the Metcalfs noticed rich copper deposits in the walls close to the present day town of Clifton and Morenci. The troops never found the Apaches and returned to Silver City. The Metcalf brother later returned to prospect and staked a claim where they located rich copper deposits. The remoteness of the area and the ever present threat of Indian attacks meant that developing these resources would require large sums of money. Henry Lesinsky, a successful Jewish merchant of Las Cruces and Silver City, New Mexico, decided to invest as a partner of Robert Metcalf, one of the original prospectors of the Longfellow claim. Lesinsky recruited miners from Mexico to do the smelting of copper ore in this new enterprise. Thus, was born the Longfellow Copper Mining Company. After several rather unsuccessful attempts, a crude, but workable smelter (three mud and rock furnaces fired by mesquite charcoal and hand bellows) was built between the confluence of Chase Creek and the San Francisco River. A small settlement of miners developed near the city (a state census record for 1874 shows a population of 132). From that day to the present, the vast majority of people from Clifton, Morenci and Duncan have depended on the mining industry for their livelihood. Three large copper mining companies, Arizona Copper Mining Company, Detroit Copper Mining Company (Phelps Dodge) and Shannon Copper Mining Companies were all operating at once. James Colquhoun, an engineer and General Manager of the Arizona Copper Company (the A.C. Company had bought Lesinsky's property in 1882). Mr. Colquhoun pioneered a plan for concentrating low grade copper and developed the principles of leaching that led to the profitable use of low grade ores. Clifton has been under the jurisdiction of several counties. In 1872 they were recorded in Prescott, the county seat of Yavapai County. Later the territory was placed under the jurisdiction of Apache County. In 1881 Graham County was created from parts of Apache and Pima counties. Clifton was in the part of Apache County that was ceded to Graham County. The people were glad because now their county seat was only 45 miles away at Solomonville. Being a wild mining town, Clifton was not interested in government or they would have fought for the county seat, because Clifton had far more population than Solomonville. By the turn of the century the people of Clifton began to fight for the establishment of a new county. Clifton and Morenci had a combined population of 10,000 while Safford and Solomonville had about half that number. The people of Clifton-Morenci felt that it was the old story of taxation without representation since most of the county officers were chosen by the political machine at Safford. The Clifton and Morenci mines were paying most of the county's taxes. In the early 1900's the fight for county division was renewed. The managers of the three mining companies had taken up the fight. The Arizona Copper Company wished to name the county after Mr. Colquhoun, who was the head of the company. The leaders in Morenci wanted the name to be Douglas in honor of Dr. James Douglas, superintendent of the Detroit Copper Company of Morenci. This proposal caused the Clifton leaders to give up their proposed name of Colquhoun and substitute Lincoln instead. They sent John R. Hampton a young, able lawyer who worked for the Shannon Copper Company, to the state legislature. He organized the fight at the territorial capital, which led to the establishment of Greenlee County. The mining companies decided to send a large delegation of local men to Phoenix to lobby for division. In Safford and Solomonville a fight was led by Charles Solomon, a banker, against the county division. When the bill was introduced before the legislature, many farmers and townspeople from Graham County made the trip to Phoenix to lobby against it. The bill was introduced on February 25, 1909 as council bill 94. It passed by a majority of 10 to 1. The bill went to the house where it was passed with an amendment to change the name from Lincoln to Greenlee. This was done to delay the final passage of the bill, the amendment lost by a vote of 5 to 4. Mr. Mills, General Manager of the Detroit Copper Company made a trade with the Safford opponents where the final division would be delayed for two years. This agreement and the assumption of all Graham county debts, which were $146,000, by the new county appeased the Safford delegation. Nearly all opposition ceased and the bill passed the next day by a vote of seven to two in the Council. The bill to create a new county was approved March 10, 1909 by Governor Joseph H. Kibbey. It was one of the smaller counties, being only 120 miles long and 20 miles wide containing 1,037,713 acres. With only four populated towns the new county had a population of about 12,000 to 13,000 people. Both Clifton and Duncan fought to become the county seat. The citizens of Duncan argued that since Duncan was the county's outlet to the rest of the world, and more accessible to the rest of the world, it should become the County's seat. Clifton argued that it was nearer the geographical center of the county and nearer to the population centers of Morenci and Metcalf. Clifton won the fight and the seat was located there. Besides the Copper Mines of the Clifton-Morenci-Metcalf area, there are mines in the Duncan District of the Gila Valley. Precious metals have been produced at Ash Peak and from the mines in the mountains east of Duncan. Duncan is considered a farming and ranching area. Ranching on Blue River, Eagle Creek, and the "Frisco" River has added to the County economy since the 1870's. One of the three largest cattle company to operate in Arizona was the Double Circle with ranch headquarters on Eagle Creek.
<urn:uuid:b98e57e3-fd3a-4ca9-816e-440434a0a695>
CC-MAIN-2023-40
https://greenlee.az.gov/history/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510219.5/warc/CC-MAIN-20230926175325-20230926205325-00144.warc.gz
en
0.978188
1,291
2.921875
3
With more than a third of all medicines left unused, according to the Alliance for Aging Research*, there is a good chance most seniors have unwanted and expired medications in their homes. If left on counter tops or nightstands, or disposed of improperly, those drugs – including over-the-counter medications – can pose a serious risk to children, pets, and young adults. The website Safe Kids Worldwide reports that three out of every four emergency room visits for medicine poisoning are caused by young children getting into an adult’s medicine. And 38 percent of the time, that medicine belonged to a grandparent. So how does one safely dispose of unwanted or outdated medications? Before tossing drugs in the trash or flushing them down the toilet, review the guidelines below. Using a Medicine Collection Site According to the Food and Drug Administration (FDA), the best way to dispose of most types of unused, unwanted, or expired medicines (both prescription and over the counter) is to drop off the medicines at an authorized collection site in your area. To locate year-round drug collection sites or disposal boxes near your home, use these search tools: - The Drug Enforcement Administration’s Public Disposal Locations Search Utility - The Safe.Pharmacy Drug Disposal Locator Tool You can also check with your pharmacist to see what options are available in your community to safely dispose of unused medicines. Disposing of Medicines at Home If taking your unwanted medicines to a collection or disposal site is not an option, the FDA recommends the following approach to safely dispose of them at home. This includes prescription and over-the-counter drugs in any form, such as pills, liquids, drops, patches, and creams. First, check the medicine label or accompanying patient information for disposal instructions, and follow the recommended instructions for each medicine. Inhalers, for example, which are used by people who have asthma or other breathing problems, should be disposed of in an environmentally safe manner. If no disposal information is available, check to see if the medicine is listed on the FDA flush list. Medicines on the flush list are potentially dangerous if used by someone other than the person for whom they were prescribed. An example of such a drug is a fentanyl patch, which is an opioid. The FDA strongly recommends immediately flushing these types of medicines down the toilet to ensure children, pets, and other individuals do not accidentally ingest, touch, or misuse these products. In general, if immediate flushing is not recommended, medicines can be safely discarded in the household trash in the following manner: - Remove the drugs from their original containers and mix them with something undesirable, such as dirt, used coffee grounds, or cat litter. This makes the medicine less appealing to children and pets and unrecognizable to someone who might intentionally go through the trash looking for drugs. Do not crush tablets or capsules. - Put the mixture in a sealable container (such as a plastic storage bag, empty can, or plastic container) to prevent the drug from leaking or spilling out. - Throw the container in the garbage. - Scratch out or remove any personal information from empty medicine bottles or packaging to protect your identity and privacy. Throw the bottles or packaging away or recycle, if possible. If you have any questions about your medicine, ask your health care provider or pharmacist. Frequently asked questions Should I still use my expired medications? While opinions vary about the effectiveness of expired medications, the FDA position is clear: If your medicine has expired, do not use it. “The medicine expiration date is a critical part of deciding if the product is safe to use and will work as intended,” says FDA Deputy Director Ilisa Bernstein. Expired medicines can be less effective due to a decrease in strength and changes in chemical composition. Some expired medications, such as eyedrops, are at risk for bacterial growth, and expired antibiotics may fail to treat infections. “Once the expiration date has passed, there is no guarantee that the medicine will be safe and effective,” says Bernstein. Will flushing a medication down the toilet hurt the environment? In some cases, the recommended way to dispose of a medication is by flushing. An FDA study concluded that the environmental impact of these flushed medications is negligible. “The main way drug residues enter water systems is by people taking medicines and then naturally passing them through their bodies,” says Raanan Bloom, an environmental assessment expert at the FDA. However, if flushing is not recommended, medications should be disposed of at an authorized collection site or by following the instructions above for safe disposal at home. How do I properly dispose of sharps (needles and syringes)? The FDA recommends that used needles and other sharps be placed in FDA-cleared sharps disposal containers. Such containers may be obtained through pharmacies, medical supply companies, and health care providers. If an approved container is not available, a heavy-duty plastic household container can serve as an alternative. The container should be leak-resistant, remain upright during use and have a tight fitting, puncture-resistant lid, such as a plastic laundry detergent container. Note that rules and regulations for disposing of sharps vary by state and locale. One helpful resource to find disposal sites in your area is the SafeNeedleDisposal.org website. Keep those around you safe: Dispose of your medications properly Safe medicine disposal (Alliance for Aging Research) * The website Alliance for Aging Research reports that 40 percent of all medications go unused. Another study published in 2015 found that approximately two out of three prescription medications were reported unused (Research in Social and Administrative Pharmacy).
<urn:uuid:18562fb1-a4ed-4f6c-bede-650a63e9aecc>
CC-MAIN-2021-21
https://www.seniordaily.com/how-to-dispose-of-old-meds
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988882.94/warc/CC-MAIN-20210508151721-20210508181721-00346.warc.gz
en
0.917046
1,176
2.875
3
Dr. Christopher Bowman is dedicated to the prevention of tooth decay, which is the foundation for a healthy and beautiful smile. Preventative dentistry – brushing, flossing, and regular dental cleanings with a dental hygienist – are crucial for keeping your smile bright and free of tooth decay. There are some places, however, where enamel damage can occur even with dedicated oral hygiene. The very back of the mouth, where the premolars and molars are, is the most problematic area to brush and floss. Deep pits in molars and spaces between teeth are the perfect environment for cavities to flourish. Food and bacteria that is lodged in pits of molars and spaces between teeth create acid that has direct contact with tooth enamel and immediately goes to work. While brushing frequently is important, an additional safeguard against tooth decay is the application of dental sealants. Dental sealants are a plastic barrier that Dr. Bowman can apply. The sealants are placed over the top of each tooth, to prevent bacteria and plaque having direct contact with the tooth. Many Charlotte parents obtain sealants for their children and teens, and many adults in the Dilworth area are having them applied to help fight tooth decay and protect enamel. After sealants are applied, they will be examined at each visit and reapplied as necessary. Are they cost effective? Sealants are relatively inexpensive initially and downright cheap when you consider the cost of filling cavities and restorative procedures that may be necessary in the future. Sealants may be the best investment you ever make in your child’s smile. To keep a healthy smile, follow these essential steps: Brush with a soft-bristled toothbrush that is replaced every few months Brush with ADA-accepted fluoride toothpaste after each meal Eat a diet with plenty of fruit, vegetables, legumes, whole grains, and low fat protein sources. Limit or avoid sugary foods and drinks, especially soda and hard or chewy candy Visit Dr. Bowman at least once a year and have your teeth cleaned and examined Consider having sealants to help protect the enamel in the hard-to-clean places People all over the Dilworth area trust Advanced Dentistry of Charlotte – Dr. Christopher A. Bowman in Charlotte for their family’s dental care. Dr. Bowman, DDS, specializes in smile makeovers, restorative dentistry and dental implants. Call today for an appointment at 704-337-8070 and trust the friendly team at Advanced Dentistry of Charlotte – Dr. Christopher A. Bowman to help keep you smiling. Contact Advanced Dentistry of Charlotte – Dr. Christopher A. Bowman: Location (Tap to open in Google Maps):
<urn:uuid:6cab8e1d-d9f9-4fbc-83fc-784103e59e0f>
CC-MAIN-2023-50
https://www.smilesatisfaction.com/blog/protect-those-nooks-and-crannies/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00609.warc.gz
en
0.931372
563
2.5625
3
Ornithology is a branch of zoology that focuses on the study of birds. Field Ornithology takes that observation of birds outdoors, and can be a fun and challenging hobby for anyone. Phinizy Center Education Department offers Field Ornithology courses meant to introduce the fascinating world of birds, and provide the tools and techniques required for each person to become a comfortable independent birder. Our current ornithology classes take place on Wednesdays. Class times in the spring and fall are from 8am until noon and 9am until 1pm in the winter. Attendees are introduced to different birding areas here in the CSRA, and are asked to meet at or carpool to these locations throughout the course. Each class includes field lecture time, field study, discussion, and home-reading suggestions. No matter your skill level, these courses are a great opportunity to get out and enjoy nature and birding with others. Registration fees include reference books and a class notebook with handouts. Binoculars and field guides are available for use during field trips. Participation for each course is limited: register early to ensure your space! Call the Education office at 706-796-7707 for more information. Field Ornithology Basics When: Wednesday’s, August 30th – November 30th, 8:00 AM – 12:00 PM Cost: $275 per person – includes a class notebook, and you will become an Individual Friend of Phinizy . Already a Friend of Phinizy? Cost is $240. Are you a returning participant? Your cost is $225. This 12 week course takes place in the fall and serves as an introductory course to many topics involved in field ornithology, including optics, field guides, birding ethics, bird groups, field identification marks and more. The perfect course for beginning birders! Trifold flyer 2017 fall Ornithology Online Registration Closed – call 706-796-7707 for more information Field Ornithology: Spring Breeding This 8 week course takes place in the spring, from March to May. The course introduces participants to the fascinating world of breeding bird behavior while enhancing skills needed for quick field identification. Participants will gain a better appreciation and understanding of bird behavior, song, habitats, nesting, parental care, and much more. Great course for all experience levels! Field Ornithology: Waterfowl This 6 week course takes place in the winter, in January and February. The course focuses on the wintering waterfowl, and participants will travel to some of the best places in the CSRA to find them. The last field trip will include an all-day trip to the coast. This is a great course for all birding levels!
<urn:uuid:0a916b24-f575-45d9-b05c-e72dd30041fb>
CC-MAIN-2017-39
http://phinizycenter.org/field-ornithology/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693459.95/warc/CC-MAIN-20170925220350-20170926000350-00042.warc.gz
en
0.922902
567
2.53125
3
A clothes moth, a nocturnal butterfly, is called Tineola bisselliella. This moth has a length of 6 to 9 millimeters and is colored in between glossy yellow and dark brown. The clothes moth prefers quiet living and storage rooms. The female places between 100 and 250 white eggs on woolen cloths, coats and upholstered furniture. About two weeks later light yellow caterpillars eclose. The main flight time between May and September is the most dangerous time for moth attacks. To increase, the grubs need a protein called Keratin, which is available in animal hair. The grubs also eat strictly herbal and synthetical cloths but these cannot be stomached. Therefore mixed cloths with a high woolen percentage are in danger. The moth’s meal/grub causes holes and bald spots in textiles. - Woolen articles should be stored in closed plastic bags or in closed boxes. - Hygiene factors such as a regularly suction, cleaning of the bottom and the scares of the storage shelves are important and help to decrease moth attacks. - Moth grubs are in need of darkness and silence for their development, therefore the woolen articles should be moved from time to time. - As a natural moth defense put some cedar, arolla pine or neem oil on a small cloth or a wooden stick. A small bag filled with lavender is also helpful. - Ichneumons flies can be used as a biological defense. Their eggs are less than 1 mm and are laid down on the moths eggs. After a short while the hatched Larvae kill the moths eggs and larvae. This method can be used in form of small papers which are settled with Ichneumons colonies (to be found under www.nuetzlinge.de). The dimension of these useful animals is only 0,3 – 0,4 mm and therefore they can hardly be noticed with the naked eye. - Attractants with an effectiveness of about 3 months can be bought in specialist shops. These attract the males by means of pheromones. They are proper to proof a moths attack, but they can only reduce the population. - Moths-ridden articles and articles suspected of an attack should be packed in a foil and placed in the freezer for 4-6 days. The moth’s eggs and larvae will parish by cold and die off.
<urn:uuid:f1ab8746-3281-4f22-8e27-4af6e34b9ba8>
CC-MAIN-2018-43
https://www.disana.de/en/service-area/faser-und-warenkunde/motten/
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516480.46/warc/CC-MAIN-20181023153446-20181023174946-00452.warc.gz
en
0.961397
500
3.140625
3
The Protocol on Water and Health stipulates that "equitable access to water, adequate in terms both of quantity and of quality, should be provided for all members of the population, especially those who suffer a disadvantage or social exclusion". In 2010, the United Nations General Assembly and the Human Rights Council recognized access to water and sanitation as human rights. The 2030 Agenda for Sustainable Development adopted in 2015 makes explicit reference to human rights, equality, and non-discrimination principles and the Sustainable Development Goals framework includes a dedicated goal (SDG 6) for water and sanitation: "ensure availability and sustainable management of water and sanitation for all". The work on equitable access under the Protocol, co-led by France and Hungary and supported by UNECE, aims at enhancing access to water and sanitation for all, including poor, vulnerable and socially excluded people. It includes: - The development of guidance documents and tools to better understand, assess and address the challenges to ensure equitable access to water and sanitation; - Support to projects in countries to assess the situation of equitable access to water and sanitation and improve the equity of access; - Exchange of experiences at the regional level. The publication “No One Left Behind: Good practices to ensure equitable access to water and sanitation in the pan-European region” presents good practices and lessons learnt from throughout the pan-European region on the policies and measures to be enacted to provide equitable access to water and sanitation. It distinguishes three key dimensions of equitable access: - geographical disparities, - specific barriers faced by vulnerable and marginalized groups, - affordability concerns. It presents a range of available policy options to fight inequities. One of the main messages of the publication No One Left Behind is that current governance frameworks are often "equity blind". Ensuring equitable access requires a results-oriented action plan, building on country situation analysis and context specific indicators. The publication The Equitable Access Score-card: supporting policy processes to achieve the human right to water and sanitation contains recommendations on how to plan for the self-assessment and provides concrete examples of the benefits of using the Score-card. These various guidance tools contribute to improve the governance and policy framework needed to develop an inclusive and effective response to epidemics crisis such as the COVID-19 crisis. More information on the importance and relevance of these tools for preparedness and response to the COVID19 is available here. The publication The Human rights to water and sanitation in practice: Findings and lessons learned from the work on equitable access to water and sanitation under the Protocol on Water and Health in the pan-European region capitalizes on he experiences of the region, and particularly of eleven countries, which have committed to improving equitable access. The publication maps out the lessons learnt from the Equitable Access Score-card based assessments, presents concrete technical and policy actions taken by these countries and examines national experiences with the development of Equitable Access Action Plans, considering the practical steps that can be taken to improve the planning and financing of specific action plans. Projects were carried out in eleven countries to develop situation analysis of the equity of access to water and sanitation services, on the basis of the Score-card. |Country||Scale of assessment||Project period||Lead organizations||Country report||Country highlights| |France||Greater Paris Urban area||December 2012 - March 2013||Eau de Paris, SEDIF, SIAAP, OBUSASS, Ministry of Social Affairs and Health||PDF (pilot)| |Portugal||National||September 2012 - April 2013||ERSAR, National Commission for Human Rights||PDF (pilot)| |Ukraine||National + city of Sebastopol||January - May 2013||State Sanitary and Epidemiological Service, NGO MAMA-86, Ministry of Ecology and Natural Resources||PDF (pilot)| |Republic of Moldova||National||April - December 2014||NGO Solidarity Water Europe in Moldova, Ministry of Environment| |Armenia||National||November 2015 - October 2016||State Committee on Water Economy of the Ministry of Agriculture and NGO AWHHE| |Hungary||National||October 2014 - End 2016||National Public Health Center and Office of the Commissioner of Fundamental Rights| |Azerbaijan||National||October 2015 - July 2018||Republican Hygiene and Epidemiology Centre under the Ministry of Health, Ministry of Ecology and Natural Resources||-| |North Macedonia||3 districts (Skopje, Veles and Kumanovo)||April 2015 - February 2016||Institute for Public Health and NGO Journalist for Human Rights| |Spain||Municipality of Castelló de la Plana||April - May 2016||Polytechnic University of Catalonia, Jaume I University and City council of Castelló de la Plana| Region of Sumadija and Pomoravlje |July - December 2017||Ministry of Environmental Protection, Regional Economic Development Agency for Sumadija and Pomoravlje| |Bulgaria||Regional level||January-July 2018||Ministry of Healthcare, NGO EarthForever| |Belarus||Regional level||June 2019 - on-going||Ministry of Health||ENG Three countries have developed Equitable Access Action Plans: - in Armenia: a national Action plan for 2018-2020 to ensure equitable access to water and sanitation has been officially approved in August 2017 by the State Committee of Water Economy of the Ministry of Energy Infrastructures and Natural Resources; - in North Macedonia: three local action plans to ensure equitable access to water and sanitation have been developed; - in Serbia, an Action plan (with national and local measures) for 2019-2022 to ensure equitable access to water and sanitation in the region of Sumadija and Pomoravlje has been endorsed by the inter-ministerial Joint Body in charge of the implementation of the Protocol on Water and Health in February 2019. Activities on equitable access to water and sanitation in the 2017-2019 programme of work of the Protocol on Water and Health focus on: - Enhancing knowledge of the situation of equitable access to water and sanitation through assessments and awareness-raising; - Fostering the adoption of measures to ensure equitable access to water and sanitation. Exchange of experiences at the regional level Several activities have facilitated the exchange of experiences related to equitable access to water and sanitation: Sixth meeting of the Expert Group on Equitable Access to Water and Sanitation (Virtual, 24-25 March 2021) Fifth meeting of the Expert Group on Equitable Access to Water and Sanitation (Paris, 26-27 June 2018) Fourth meeting of the Expert Group on Equitable Access to Water and Sanitation (Budapest, 13 - 14 September 2017) Regional Workshop on achieving equitable access to water and sanitation: from assessment to action (Geneva, 21 - 22 March 2016) Third meeting of the Expert Group on Equitable Access to Water and Sanitation (Paris, 11-12 May 2015) Second meeting of the Expert Group for the development of an equitable access score card (Paris, 15-16 May 2013) First meeting of the Expert Group for the development of an equitable access score card (Paris, 27-28 September 2012) Workshop on Equitable Access to Water and Sanitation - Challenges, good practices and lessons learned (Geneva, 4-5 July 2011).
<urn:uuid:c38f2220-2d80-49f4-97f9-58dc64cd15fe>
CC-MAIN-2021-39
https://unece.org/environment-policy/water/areas-work-protocol/equitable-access-water-and-sanitation
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055808.78/warc/CC-MAIN-20210917212307-20210918002307-00382.warc.gz
en
0.887465
1,525
3.578125
4
Plant seedlings with root clods or directly to the regular spot. It grows at above 5 °C (41 °F), optimum temperatures for growth and development being around 18 °C (64 °F). In hot days, provide shading for the seedlings or transplanted plants. Cut a part of the leaves of the seedlings without the root clod. Don’t cover with garden fabric until night temperatures don’t fall under 0 °C (32 °F). Distance between plants At least 40 cm (15 in) between rows and at least 40 cm (15 in) between plants in a row. Two to four plants per person in one planting. Time of planting Fertilize with home compost and wood ash, and water occasionally with comfrey or algae brew. It needs regular watering to make the leaves softer. Endive’s good neighbors Broccoli, zucchini, beans, peas, Chinese cabbage, kohlrabi, leek, cabbage, dill. Endive’s bad neighbors Diseases and pests Wireworms, root lice, fungal diseases. Cut regularly when needed. It can survive as low temperatures as -5 °C (23 °F). To store, pull the whole plant out, clean the roots (don’t wash with water), wrap into newspaper and hang with roots up. Use fresh leaves. Boiled can be used as well in some dishes. They contain vitamins, minerals and quite a lot of fiber. Keep the soil soft. There are two main varieties, escarole endive and curly endive, the second being more resistant to disease, drought and excessive moisture. It is sensitive to the length of the day and should be sown in early spring and June (to use in fall). It is a near relative of radicchio, but is often called lettuce mistakenly.
<urn:uuid:55e986ac-23cd-4db2-9e5c-b89f68c3c966>
CC-MAIN-2021-31
http://blog.tomappo.com/vegetables-a-z-endive/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152168.38/warc/CC-MAIN-20210727010203-20210727040203-00399.warc.gz
en
0.912631
397
2.96875
3
A Miocene perspective on the evolution of the Amazonian biota Between c. 23 and 8 Ma, western Amazonia was occupied by the vast Pebas long-lived lake/wetland system. The Pebas system had a variety of influences over the evolution of Miocene and modern Amazonian biota; it formed a barrier for the exchange of terrestrial biota, a pathway for the transition of marine biota into freshwater Amazonian environments, and formed the stage of remarkable radiations of endemic molluscs and ostracods. The lithological variation of the Pebas Formation has furthermore enhanced edaphic heterogeneity in western Amazonia, sustaining present-day high terrestrial diversity in the region. |Keywords||Miocene, Amazonia, biogeography, biodiversity, Mollusca| |Rights||Released under the CC-BY 4.0 ("Attribution") License| Wesselingh, F.P, & Salo, J.A. (2006). A Miocene perspective on the evolution of the Amazonian biota. Scripta Geologica, 133, 439–458.
<urn:uuid:d478e1d7-5f12-4c3b-86d2-967a3f89911d>
CC-MAIN-2020-40
https://repository.naturalis.nl/pub/209738
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400241093.64/warc/CC-MAIN-20200926102645-20200926132645-00661.warc.gz
en
0.813682
232
2.875
3
Start Your Visit WithHistorical Timelines General Interest Maps The word Sioux is the shortened version of Nadouessioux, the buffalo-dependent Plains Indian peoples of Siouan linguistic stock. An alternative word is Lakota. Sioux warriors assisted the British during the War for Independence as well as the War of 1812. Nevertheless, in 1815, the bands in the East inked peace treaties with the infant country. An additional agreement in 1825 assured the Sioux control of a vast region that encompassed much of what is today Missouri, Iowa, Wyoming, the Dakotas*, Minnesota and Wisconsin. In 1837, the United States purchased from the Sioux all their possessions east of the Mississippi River, followed by more land acquisition in 1851. Attacks and counterattacks ensued, then increased when white settlers encroached westward upon Sioux lands. The year 1854 saw the first significant incident in Wyoming, not far from Fort Laramie. Nineteen U.S. soldiers were killed by Sioux fighters. The next year, U.S. soldiers took revenge and annihilated approximately 100 Sioux in their Nebraska camp; their chief was taken prisoner. In 1862, Chief Little Crow launched an insurrection in Minnesota. The warriors slaughtered hundreds of settlers in the New Ulm area before U.S. Army soldiers defeated them. Many surviving Sioux linked up with others of their nation farther west. Throughout the 1860s, Red Cloud and other strong leaders held the whites at bay and out of Sioux lands. A one-year conflict dubbed Red Cloud’s War (1866-1867), concluded with a treaty that guaranteed the Sioux permanent possession of the Black Hills of present-day South Dakota. The covenant, however, was not observed by the United States. Prospectors and miners itching for gold inundated the territory in the 1870s. In the ensuing hostilities, Brigadier General George Crook commanded the Sioux to move onto a reservation. Sitting Bull and Crazy Horse refused to comply and move their people. Infuriated by unjust assaults, Sitting Bull gave notice: "We are an island of Indians in a lake of whites... These soldiers want war. All right, we'll give it to them!" On June 17, 1876, a war party of Sioux and Cheyenne took Crook's soldiers by surprise in southern Montana and routed them in the Battle of the Rosebud. General George A. Custer then led a force against the Indians. On June 25, he and his men ran into a Sioux war party on the Little Bighorn River. Not a single soldier in Custer's immediate command of some 300 men survived "Custer's Last Stand." The Sioux then separated into bands to get away more easily. The army caught some, and others surrendered. A few, including Sitting Bull's band, escaped to Canada. The final Sioux insurrection took place in 1890. Fearing another broader conflict, Brigidier General Nelson A. Miles ordered the apprehension of Sitting Bull, who was living in South Dakota on the Standing Rock Reservation. When the chief resisted, Indian policemen slayed him. Then Big Foot took command of the last band of fighting Sioux. In December these Indians were trapped by the U.S. Army on Wounded Knee Creek in South Dakota, and annihilated. - - - Books You May Like Include: ---- Black Elk Speaks: Being the Life Story of a Holy Man of the Oglala Sioux by John G. Neihardt. The most important aspect of this book is upon the contemporary generation of young Indians who have been aggressively searching for roots of their ow... Crazy Horse and Custer by Stephen E. Ambrose. On the sparkling morning of June 25, 1876, 611 men of the United States 7th Cavalry rode toward the banks of the Little Bighorn in the Montana Territo... The Last Stand: Custer, Sitting Bull, and the Battle of the Little Bighorn by Nathaniel Philbrick. Little BIghorn and Custer are names synonymous in the American imagination with unmatched bravery and spectacular defeat. Mythologized as Custer's Las... Empire of the Summer Moon: Quanah Parker and the Rise and Fall of the Comanches, the Most Powerful Indian Tribe in American History by S.C. Gwynne. In the tradition of Bury My Heart at Wounded Knee, a stunningly vivid historical account of the forty-year battle between Comanche Indians and white s... The Killing of Crazy Horse by Thomas Powers. He was the most feared and loathed Indian of his time, earning his reputation in surprise victories against the troops of Generals Crook and Custer at... Crazy Horse by Larry McMurtry. In writing his superb life of Crazy Horse, Larry McMurtry faced the same obstacle as every previous biographer of the Oglala Sioux icon: a notable pau... The Lance and the Shield: The Life and Times of Sitting Bull by Robert M. Utley. "His narrative is griping....Mr. Utley transforms Sitting Bull, the abstract, romanticized icon and symbol, into a flesh-and-blood person with a down-...
<urn:uuid:dea21a48-6fe2-46c5-9401-83e5541602ee>
CC-MAIN-2013-20
http://www.u-s-history.com/pages/h1187.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00095-ip-10-60-113-184.ec2.internal.warc.gz
en
0.945672
1,076
3.984375
4
Vaccinations: Not just for kids, flu When most people hear the word “vaccination” they probably think of one of two kinds: The slew of vaccinations children receive (now into their teens), or the annual influenza vaccination that health officials advocate annually around this time of the year. But just because you are an adult, and get a flu shot every year, doesn’t mean that’s all there is to consider for your vaccinations. Dr. Joshua Meyerson, medical director for the Health Department of Northwest Michigan, said there has been renewed interest in adult vaccinations in community health circles in recent months stemming from an outbreak of hepatitis A in parts of southeast Michigan. The outbreak has become serious enough in those parts of the state that on Nov. 1, state officials activated the State Emergency Operations Center to coordinate Michigan’s response to the hepatitis A outbreak. The Community Health Emergency Coordination Center also was activated by the Michigan Department of Health and Human Services to direct the response and provide guidance to multiple local public health jurisdictions in the prevention and investigation of cases. State officials noted that since August 1, 2016, there have been 457 confirmed cases of hepatitis A, including 18 fatalities, associated with this outbreak in the City of Detroit and Huron, Ingham, Lapeer, Livingston, Macomb, Monroe, Oakland, Sanilac, St. Clair, Washtenaw and Wayne counties reported. Meyerson said hepatitis A is usually food borne, often in a restaurant setting, but in these cases cropping up downstate, it appears to be spreading also from person-to-person contact, much of it among people with substance abuse issues who are sharing drugs, and other paraphernalia — or others who may not be in a position to use good personal hygiene. The disease can then spread to people who work with those populations, Meyerson said. He said a vaccine is available for hepatitis A and people who work in environments where they could be at risk to exposure should be immunized against it. Aside from the recent hepatitis A outbreak downstate, Meyerson said there is a lot of room for improvement for vaccinations — including boosters — among adults. “Most people think it’s (vaccinations) something babies get,” Meyeson said. “But there are a lot of vaccinations that could help adults.” His first piece of advice is one well known to most people, “Everybody should get a flu vaccine every year. Most insurance covers it. It’s available everywhere. We’ve pretty much eliminated the cost factor.” The next most important one, as anyone who has gone to seek medical care with a deep wound can attest, is tetanus. He said not only does the tetanus vaccine need to be updated at least once every 10 years, but its also important that adults have at least one dose among those tetanus shots that is a TDAP dose — tetanus, diphtheria and pertussis (also known as whooping cough). He said the pertussis vaccine is especially important for anyone who might be around babies or small children, who can be particularly vulnerable to the disease. Another two vaccines that are highly recommended for older populations in addition to annual flu vaccines are those for pneumococcal pneumonia and shingles. Everyone age 65 and older should get the pneumonia Pneumovax vaccine, or now the newer Prevnar vaccine. He said people who have complicating conditions such as asthma or who are smokers should consider getting the vaccine sooner. Shingles is a re-activation of the virus that causes chicken pox. Meryson said after a person has chicken pox, the virus is thought to remain dormant in the person central nervous system, and can be re-activited by some condition that lowers the person’s immune system. The disease can cause painful rashes and blisters and a very painful symptom known as post-herpetic neuralgia that can last for many months. He said the vaccine for shingles essentially serves as a re-invigoration of a person’s immune system against the virus. He said the current vaccine is expected to reduce a person’s chances of getting shingles by about 50 percent. A new vaccine that is expected to be available in the coming months is expected to improve those numbers to about 90 percent. Meyerson said there are a number of other vaccines that people may want to consider in consultation with their doctors. He said many of them are specific to the type of risks a person is exposed to in his or her work. Also, he noted some may be a good idea for people who are traveling to certain parts of the world. For more information on vaccines, visit www.www.nwhealth.org. For a document that offers further suggestions on more vaccines, visit www.petoskeynews.com.
<urn:uuid:b83ea76d-c9d4-494e-9a03-8f1a344f870b>
CC-MAIN-2021-49
https://www.petoskeynews.com/story/news/local/2017/11/13/accinations-not-just-for-kids-flu/45115001/
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363157.32/warc/CC-MAIN-20211205100135-20211205130135-00619.warc.gz
en
0.967529
1,021
2.953125
3
Hibernate – Bag Mapping For a multi-national company, usually, selections are happened based on technical questions/aptitude questions. If we refer to a question, each will have a set of a minimum of 4 options i.e each question will have N solutions. So we can represent that by means of “HAS A” relationship i.e. 1 question has 4 solutions. Via Bag Mapping, in Hibernate, we can implement that. Let us see that Let us create MYSQL tables first --Main table where each question is identified by qId and it is unique create table Questions( qId int auto_increment, questionName varchar(50), Primary key (qId) ); --For each question, we will have several choices. It is denoted as below create table Choices( questionId int, answer varchar(100) ); In mapping file, we have to represent the table relationship via a bag name. It is like one to many relationship only but via bag name we are representing that. Important hibernate configuration to hold the hbm file Let us see the pojo class Let us do the ways to store the question and choices now here Execution of the project and output As we have followed bag mapping, when the program runs it has inserted the respective records in both the tables Let us see them. Its respective choices can be seen as follows From the inserted data, we can come to a conclusion that Bag mapping helps to insert data as one to many concept. Instead of list, using bag mapping, relationship is happening. In this tutorial, we have seen the concept of bag mapping. Please Login to comment...
<urn:uuid:70048c7a-f56f-4ad4-8f7e-7d9d7d45c69d>
CC-MAIN-2023-23
https://www.geeksforgeeks.org/hibernate-bag-mapping/?type=article&id=818177
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647409.17/warc/CC-MAIN-20230531182033-20230531212033-00276.warc.gz
en
0.904326
405
2.53125
3
Mrs Pam Carmichael (Principal Teacher) Mrs Sarah King Mr Neil MacGregor Mrs Kathleen Marshall Mr Sam Todd Dr Greg Campbell “Read in order to live” Gustave Flaubert Being literate lies at the heart of all learning. For pupils to access all curricular areas they need to be able to read, write, talk and listen. These are the key skills of the English Course at Charleston Academy. Pupils will develop their ability to contribute and communicate effectively in a range of contexts. Studying English will provide pupils with skills that will not only serve them well at school but also in the world beyond. We aim to foster a love of reading, which is initiated with the Power Readers programme in S1 and S2. In class pupils will read prose, poetry, drama and media texts. At all levels of the curriculum Close Reading is a key skill where pupils develop their techniques in analysis and evaluation. Pupils also respond to texts by writing Critical Essays. They are also given opportunities to develop their own texts, both written and spoken encouraging them to develop language skills through producing creative, discursive and transactional responses. The media plays an increasing role in our society and it plays an increasing emphasis in our course structures. Pupils are actively encouraged to use mobile phones in class to access downloaded dictionaries and thesauruses. In S1-S3 we offer a CfE Broad General Education. In S3 pupils will engage in a Bridging the Gap course as launch pad to either National 4 or 5. Beyond S4 pupils study Higher and Advanced Higher. We also offer an alternative curriculum in S5: Communication 3 and a Skills for Work Programme. We aim to recognise the wider achievement of pupils and will offer a Scottish Studies Award. The department is actively involved with the Debating Club, the Creative Writing Club and several national writing competitions that celebrate pupils’ achievements beyond the classroom. For more information please see our English Blog on the right.“Today a Reader, Tomorrow a Leader”
<urn:uuid:484743a7-3115-4216-b0ba-3e86f30fcdcc>
CC-MAIN-2018-22
http://www.charlestonacademy.co.uk/subjects/english/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864572.13/warc/CC-MAIN-20180521235548-20180522015548-00503.warc.gz
en
0.92745
424
2.9375
3
COMPANIES discriminate. They discriminate against black people, poor people, gay people and fat people—oh yes they do. Using callback studies, in which fictitious CVs for identically qualified candidates are sent to employers, economists have become quite good at measuring the penalty paid for being a woman, a racial minority or lower-class. Identical résumés under Asian-sounding names are 30% less likely to get call-backs from employers; for black-sounding names the penalty is 50%. Unfortunately there appears to be little improvement over time. Estimates of racial discrimination in hiring blacks in America look as bad now as they did in 1990. Since Lyndon Johnson signed the Civil Rights Act in 1964, employment discrimination on the basis of race, sex and national origin has been illegal. Johnson also began government programmes of affirmative action—what he called “the more profound stage of the battle for civil rights”, which sought “not just equality as a right and a theory but equality as a fact and equality as a result.” In a lesser-known executive order, signed one year later, Johnson ordered government contractors not only to use affirmative action but also to append a non-discrimination statement to their advertisements. For more than 50 years, such “equal-opportunity statements” have been dutifully bolted onto job adverts from American employers, including private-sector firms that do so voluntarily. A recent working paper published by two economists, Andreas Leibbrandt of Monash University and John A. List of the University of Chicago, suggests they are actually failing to prevent discrimination and foster diversity. In their study, the two economists posted advertisements for an administrative assistant job in ten large American cities. Of the 2,300 applicants who expressed interest, half were given a standard job description and the other half were given a description with an equal-opportunity statement promising that “all qualified applicants will receive consideration for employment without regard to sex, colour, age or any other protected characteristics”. For racial minorities, those who received the pro-diversity statement were 30% less likely to apply for the job—and the effect appeared to be worse in cities with white majorities (see chart). In a follow-up survey, the prospective applicants said the statement prompted worries that they would be token diversity hires. A single study rarely provides enough evidence to change public policy. Despite their ubiquity, equal-opportunity statements have received almost no scholarly attention. “The little evidence we have got is not encouraging,” says Iris Bohnet, an economist at Harvard who studies gender disparities in the workplace. A study published in 2016 from Sonia Kang and colleagues found that “whitened” CVs—where black and Asian candidates stripped racial cues from their applications—were twice as likely to get call-backs. Although firms with diversity statements in their ads attracted fewer whitened résumés from minority applicants, they were actually no less discriminatory than other firms. An examination of mid-size and large American firms by Frank Dobbin, a Harvard sociologist, and Alexandra Kalev, a sociologist at Tel Aviv University, found that five years after setting up the most common types of diversity programmes—mandatory training, job tests and grievance systems for biased managers—the share of racial minorities in managerial positions had actually declined. That does not mean that the entire enterprise is doomed. Although the coercive methods studied by Mr Dobbin and Ms Kalev backfired, their research also found that other initiatives, such as mentoring programmes and dedicated college recruitment teams, seemed to work. Another working paper by Mr Leibbrandt and others finds that when firms show the importance of diversity more convincingly, by including a human-sounding statement from the CEO rather than affixing a perfunctory, legalistic equal-opportunity statement, minority applications increase. Despite all the racial progress American society has made since the civil-rights era, economic disparities remain stubborn. Some, like the white-black gap in hourly wages, are even getting worse. In 1979 the average black man earned 80% as much as the typical white man. In 2016 that had slipped to 70%. Unemployment gaps look similarly intractable. Undoing these disparities requires firms to surmount their frequently demonstrated tendencies to discriminate, often unconsciously. Equal-opportunity statements are among the easiest, oldest and most frequently used tactics. Unfortunately, they may be doing more harm than good.
<urn:uuid:11e35680-610c-459e-b162-1ccbdfdd0ce0>
CC-MAIN-2021-31
https://news-flow.top/anti-discrimination-statements-by-employers-diversity-implosion/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153223.30/warc/CC-MAIN-20210727072531-20210727102531-00452.warc.gz
en
0.96442
914
2.546875
3
TWO WAYS TO MAKE SAFER NURSING HOMES Obviously, there are a number of safety issues with any nursing home. However, here are two simple but important areas not to be overlooked: 1. Ask the Director of Nursing or Administrator if the staff receives annual flu shots. Vaccinating employees of nursing homes against influenza helps protect residents, even those residents who have also had the shots. Influenza is a significant cause of illness and death among older people, spreading quickly and often leading to other complications. Read the report on a recent study conducted by the London Centre for Infectious Disease at Bloomberg.com. Also, read what the Center for Disease Control (CDC) has to say about flu shots. 2. Ask the Administrator if his/her nursing home is equipped with a fire alarm and suppression system. In Virginia, all licensed and certified nursing homes were required to have such systems as of 1990 (Virginia Code 36-99.9). Not all states have such requirements, or if the requirements are on the books they are not enforced. In 2003, 31 residents died in two nursing home fires in Connecticut and Tennessee. Federal fire safety standards did not require either facility to have fire suppression sprinkler systems. The Government Accountability Office (GAO) investigated this problem and you may read its report here.
<urn:uuid:b21acf2f-9a38-449a-98ec-311a6315e987>
CC-MAIN-2018-39
https://frithlawfirm.com/blog/nursing/nursing-home-negligence/two-ways-to-make-safer-nursing-homes/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267164925.98/warc/CC-MAIN-20180926121205-20180926141605-00183.warc.gz
en
0.965146
268
2.53125
3
Brain power is not inevitably lost as we get older, according to the latest research on aging. Researchers at the Rotman Research Institute at Baycrest Centre for Geriatric Care in Toronto found that older brains can compensate for cognitive decline by routing tasks away from weak areas of the brain toward other, stronger brain circuits. "This suggests that the aging brain does show some resilience or ability to reorganize itself," said Randy McIntosh, a scientist at Rotman and assistant psychology professor at the University of Toronto. McIntosh, along with researchers at the University of Toronto and Brandeis University in Waltham, Massachusetts, published the findings in the 25 October issue of Current Biology. If the brain is capable of retraining itself, perhaps elderly people with cognitive problems could be rehabilitated by retraining their brains, McIntosh said. "Theoretically, we could use a simple task and build up from there – work with what they can do and train the brain to work up." "This research is pretty consistent with one line of thinking: that we don't lose brain power as we get older, we think differently," said Dr. Cynthia Napier Rosenberg, chief of geriatrics and executive director of senior health services at the Western Pennsylvania Hospital in Pittsburgh. Researchers are increasingly questioning the idea that cognitive decline is an inevitable result of aging. "Some people think this is part of something called a 'wisdom component,'" Rosenberg said. "We think that a person who is a healthy older person with no dementia or Alzheimer's disease can bring into play their experience, and make associations that give depth to their thinking that a younger person might not have." For the study, 10 adults in their 20s and nine adults between 60 and 80 took the same visual, short-term memory tests while their brain activity was measured by positron emission tomography (PET). Participants looked at pairs of vertical grid patterns on a computer screen and were asked to select which one had the higher spatial frequency. Researchers measured the skill of the subjects at half-second and four-second intervals. While the subjects were being tested, PET measured blood flow in regions of their brains and marked which brain areas were used during the memory task. The study found that all of the participants performed the memory tasks equally well, but the PET showed that the pathways used to perform the tasks were different between the young and old. The younger subjects used mainly the occipital, temporal, and inferior prefrontal cortices during the test. The older individuals showed weaker neural communication in those areas. To compensate, the elderly brains recruited the hippocampus and dorsal prefrontal cortices. The hippocampus is often used for more complicated tasks, such as memorizing the lines of a Shakespeare play, or navigating around a convention center. But since the elderly brains recruited the hippocampus for simple tasks during the test, that leaves the hippocampus unavailable for more complicated cognitive functions. "If the hippocampus is being recruited for simpler functions, then for harder tasks the resources are not available because the hippocampus is already engaged," McIntosh said. "This could be a cause of the age-related changes we see in memory." Researchers say the study paints a brighter picture of the golden years. "This is a whole new way of looking at the aging brain," Rosenberg said. "It's really very good news because the standard teaching has been that as you get older it's a lose/lose world. The newer studies are showing that's probably not true."
<urn:uuid:e5ced36e-24e9-4266-aa2f-f023b2cd47de>
CC-MAIN-2019-51
https://www.wired.com/1999/10/good-news-gramps/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540506459.47/warc/CC-MAIN-20191208044407-20191208072407-00558.warc.gz
en
0.969474
710
3.453125
3
Hadrian's Wall is a 73-mile (118-kilometer) stone-and-earthen structure in northern England that was constructed under the reign of the Roman Emperor Hadrian in the year 122 as a defensive mechanism against the people occupying what is today Scotland. Snaking west to east, the wall, a UNESCO World Heritage Site, includes Roman forts; milecastles, or small fortlets; temples and archaeological sites [source: Visit Northumberland]. What better place to set up camp for the winter? Some of the best-preserved, most striking portions of Hadrian's Wall lie in Northumberland, and there are plenty of campsites in the area -- and near the wall -- that make a great vacation spot. Not only is this part of the country scenic, with green, rolling hills, but you have easy access to Hadrian's Wall, which includes a National Trail Path offering innumerable hiking options. At the small, secluded Hadrian's Wall Camping and Caravan Site, campers have access to a centrally heated bunk barn with a common room and cooking facilities if the weather gets a bit testy. If you wish to walk the wall, the owners will also arrange transportation to and from wherever you intend to strike out [source: Hadrian's Wall Camping]. At Roman Wall Lodges, you can sleep in tents you rent on-site, or rent a cozy cabin instead. Hadrian's Wall is just 400 yards (366 meters) away [source: Roman Wall Lodges].
<urn:uuid:b4a47fd0-e26f-474e-894f-bc1380a18bb2>
CC-MAIN-2018-17
https://adventure.howstuffworks.com/outdoor-activities/hiking/10-places-to-camp-in-winter7.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947033.92/warc/CC-MAIN-20180424174351-20180424194351-00380.warc.gz
en
0.923433
312
3.015625
3
A milestone has been reached on the road to developing advanced biofuels that can replace gasoline, diesel and jet fuels with a domestically-produced clean, green, renewable alternative. Researchers with the U.S. Department of Energy (DOE)'s Joint BioEnergy Institute (JBEI) have engineered the first strains of Escherichia colibacteria that can digest switchgrass biomass and synthesize its sugars into all three of those transportation fuels. What's more, the microbes are able to do this without any help from enzyme additives. "This work shows that we can reduce one of the most expensive parts of the biofuel production process, the addition of enzymes to depolymerize cellulose and hemicellulose into fermentable sugars," says Jay Keasling, CEO of JBEI and leader of this research. "This will enable us to reduce fuel production costs by consolidating two steps -- depolymerizing cellulose and hemicellulose into sugars, and fermenting the sugars into fuels -- into a single step or one pot operation." Keasling, who also holds appointments with the Lawrence Berkeley National Laboratory (Berkeley Lab) and the University of California (UC) Berkley, is the corresponding author of a paper in the Proceedings of the National Academy of Sciences (PNAS) that describes this work. The paper is titled "Synthesis of three advanced biofuels from ionic liquid-pretreated switchgrass using engineered Escherichia coli." Advanced biofuels made from the lignocellulosic biomass of non-food crops and agricultural waste are widely believed to represent the best source of renewable liquid transportation fuels. Unlike ethanol, which in this country is produced from corn starch, these advanced biofuels can replace gasoline on a gallon-for-gallon basis, and they can be used in today's engines and infrastructures. The biggest roadblock to an advanced biofuels highway is bringing the cost of producing these fuels down so that they are economically competitive. Unlike the simple sugars in corn grain, the cellulose and hemicellulose in plant biomass are difficult to extract in part because they are embedded in a tough woody material called lignin. Once extracted, these complex sugars must first be converted or hydrolyzed into simple sugars and then synthesized into fuels. At JBEI, a DOE Bioenergy Research Center led by Berkeley Lab, one approach has been to pre-treat the biomass with an ionic liquid (molten salt) to dissolve it, then engineer a single microorganism that can both digest the dissolved biomass and produce hydrocarbons that have the properties of petrochemical fuels. "Our goal has been to put as much chemistry as we can into microbes," Keasling says. "For advanced biofuels this requires a microbe with pathways for hydrocarbon production and the biomass-degrading capacity to secrete enzymes that efficiently hydrolyze cellulose and hemicellulose. We've now been able to engineer strains of Escherichia coli that can utilize both the cellulose and hemicellulose fractions of switchgrass that's been pre-treated with ionic liquids." E. coli bacteria normally cannot grow on switchgrass, but JBEI researchers engineered strains of the bacteria to express several enzymes that enable them to digest cellulose and hemicellulose and use one or the other for growth. These cellulolytic and hemicellulolytic strains of E. coli, which can be combined as co-cultures on a sample of switchgrass, were further engineered with three metabolic pathways that enabled the E. coli to produce fuel substitute or precursor molecules suitable for gasoline, diesel and jet engines. While this is not the first demonstration of E. coli producing gasoline and diesel from sugars, it is the first demonstration of E. coli producing all three forms of transportation fuels. Furthermore, it was done using switchgrass, which is among the most highly touted of the potential feedstocks for advanced biofuels. Gregory Bokinsky, a post-doctoral researcher with JBEI's synthetic biology group and lead author of the PNAS paper, explains that the pre-treatment of the switchgrass with ionic liquids was essential to this demonstration. "The magic is in the ionic liquid pre-treatment," Bokinsky says. "If properly optimized, I suspect you could use ionic liquid pre-treatment on any plant biomass and make it readily digestible by microbes. For us it was the combination of biomass from the ionic liquid pretreatment with the engineered E. coli that enabled our success." The JBEI researchers also attribute the success of this work to the "unparalleled genetic and metabolic tractability" of E. coli, which over the years has been engineered to produce a wide range of chemical products. However, the researchers believe that the techniques used in this demonstration should also be readily adapted to other microbes. This would open the door to the production of advanced biofuels from lignocellulosic feedstocks that are ecologically and economically appropriate to grow and harvest anywhere in the world. For the JBEI researchers, however, the next step is to increase the yields of the fuels they can synthesize from switchgrass. "We already have hydrocarbon fuel production pathways that give far better yields than what we obtained with this demonstration," says Bokinsky. "And these other pathways are very likely to be compatible with the biomass-consumption pathways we've engineered into our E. coli. However, we need to find enzymes that can both digest more of the ionic liquid pre-treated biomass and be secreted by E coli. We also need to work on optimizing the ionic liquid pre-treatment steps to yield biomass that is even easier for the microbes to digest." Co-authoring the PNAS paper with Keasling and Bokinsky were Pamela Peralta-Yahya, Anthe George, Bradley Holmes, Eric Steen, Jeffrey Dietrich, Taek Soon Lee, Danielle Tullman-Ercek, Christopher Voigt and Blake Simmons. This research was supported in part by the DOE Office of Science and a UC Discovery Grant. - Gregory Bokinsky, Pamela P. Peralta-Yahya, Anthe George, Bradley M. Holmes, Eric J. Steen, Jeffrey Dietrich, Taek Soon Lee, Danielle Tullman-Ercek, Christopher A. Voigt, Blake A. Simmons, Jay D. Keasling. Synthesis of three advanced biofuels from ionic liquid-pretreated switchgrass using engineered Escherichia coli. Proceedings of the National Academy of Sciences, 2011; DOI: 10.1073/pnas.1106958108 Cite This Page:
<urn:uuid:9e153802-f92c-4c26-8685-8b4bb5cf5299>
CC-MAIN-2014-42
http://www.sciencedaily.com/releases/2011/11/111129123307.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646944.14/warc/CC-MAIN-20141024030046-00004-ip-10-16-133-185.ec2.internal.warc.gz
en
0.937593
1,403
3.34375
3
Enhanced flotation and control Leader: Professor Jan Cilliers Froth flotation is one of the most important processes for separating valuable minerals from ore. At Rio Tinto, we use flotation for separating copper bearing minerals and the Centre’s flotation project is aiming to improve the recovery levels as far as possible. The flotation process takes place in a tank, or cell, where crushed ore is mixed with water and foaming agents, then air is injected to create a froth. The process relies on the principle that the valuable minerals stick to the surface of the bubbles and float to the top of the cell. They can then be separated, while the other minerals in the ore exit through the underflow. Jan Cilliers, an expert in froth flotation processes, holding a three dimensional "print out" of a froth structure. Using mathematical modelling, the Centre’s flotation team (led by Jan Cilliers) has improved its understanding of the processes that happen in flotation tanks, and how foams behave. This has enabled them to predict optimum flotation conditions, and from this, to understand how to design better flotation cells and improve mineral recovery. The team is also hoping to develop flotation methods that can be used with coarser particles, meaning less energy is needed to crush the ore. There have been two exciting developments from the flotation project. The first has been the use of “positron emission particle tracking” (PEPT) for observing particle behaviour in flotation cells. A single particle is radioactively tagged and emits gamma rays used to track its position. For the first time the particle’s complete behaviour has been observed, opening new avenues for flotation cell design. A similar technique is used in medicine and known as positron emission tomography (PET). Imperial College has donated the world’s most sensitive medical PET scanner to the University of Cape Town, where a collaborative PEPT facility is being established at the iThemba Laboratory for Accelerator Based Sciences. This will allow much smaller particles to be radiated and tracked with greater accuracy, and will facilitate an even better understanding of flotation behaviour. The second breakthrough development by the flotation team has been a new, patented method for determining the optimal volume of air to be added to flotation cells, and its distribution. Laboratory scale overflowing froth (with the overflowing height being measured). In late 2008, the research team from Imperial College went to Rio Tinto Kennecott (Kennecott) to look at ways of improving copper yield using the control systems they had developed in London.Kennecott gave the systems a very positive response, and trials are now being prepared based on the team’s work. “In the field of flotation froths, we have the finest science in the world at Imperial College,” said Jan. “This project has made huge strides very quickly and is very close to implementation. We have taken on some very tough problems and we have broken the back of some big ones. We’re working with very smart people in Rio Tinto’s Improving performance together team at Kennecott – they are taking our work and running with it. I believe that we will be delivering added value to Rio Tinto on this within the next five years.”
<urn:uuid:a64e8fa4-6a55-4a68-96cc-3952d2c7b173>
CC-MAIN-2019-39
http://www.imperial.ac.uk/earth-science/research/research-groups/rio-tinto-centre/projects/enhanced-flotation-and-control/
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573465.18/warc/CC-MAIN-20190919081032-20190919103032-00300.warc.gz
en
0.9364
695
3.234375
3
Rahoza, Mykhailo [Рагоза, Михайло; or Rohoza], b 1540 in Volhynia, d 1599 in Navahrudak, Belarus. Metropolitan of Kyiv. In 1576 he entered a monastery in Minsk and in 1579 became its archimandrite. He was appointed metropolitan of Kyiv by the king of Poland and was consecrated by Patriarch Jeremiah II of Constantinople in August 1589 in Vilnius. He supported the Church Union of Berestia; he dispatched Bishops Ipatii Potii and Kyrylo Terletsky to Rome to complete the negotiations, and he signed the act of union in 1596. For this he was opposed by the Orthodox brotherhoods and some of the Orthodox clergy and nobility, led by Prince Kostiantyn Vasyl Ostrozky. [This article originally appeared in the Encyclopedia of Ukraine, vol. 4 (1993).]
<urn:uuid:b2f290ce-055a-4595-bd8b-9585c6e84c1c>
CC-MAIN-2021-39
http://www.encyclopediaofukraine.com/display.asp?linkpath=pages%5CR%5CA%5CRahozaMykhailo.htm
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057424.99/warc/CC-MAIN-20210923135058-20210923165058-00679.warc.gz
en
0.956549
209
2.546875
3
The U.S. Fish and Wildlife Service has begun the process to consider whether to classify the lesser prairie chicken as “threatened” under the Endangered Species Act. A Fish and Wildlife Service news release blamed habitat loss for the long-term decline in lesser prairie chickens over their historic range, which covers parts of Kansas, Colorado, New Mexico, Oklahoma and Texas, although others say the birds are doing well. If the species is officially listed, some land-use practices could come under federal scrutiny, and hunting for lesser prairie chickens would likely stop. Jim Pitman, Kansas small game coordinator, said the birds are doing well in Kansas, where their range runs roughly from Greensburg west and south of I-70. “Since the mid-’90s we’ve about tripled what was then their known range in Kansas,” Pitman said. “Last spring it was estimated there were 37,000 lesser (rangewide), and Kansas probably has 30,000 of those.” But some think that’s too few. Two years ago the Kansas Ornithological Society tried — but failed — to get lesser prairie chickens on Kansas’ threatened species list. Fish and Wildlife will take public comments about the species and management programs for about 90 days. A decision might not come until September. Fish and Wildlife officials will also review plans by state wildlife, agricultural, energy and conservation groups hoping to bolster lesser prairie chicken numbers.
<urn:uuid:180204e5-a132-4ab7-9eaa-11701000337a>
CC-MAIN-2017-51
http://www.kansascity.com/news/local/article311740/Wildlife-officials-will-decide-whether-prairie-chicken-needs-more-protection.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948515309.5/warc/CC-MAIN-20171212060515-20171212080515-00618.warc.gz
en
0.953816
309
2.65625
3
Articles of Incorporation for a Business Many businesses decide to incorporate - that is, to form the business as a corporation. In order to begin the process of incorporating, the business must file a form with the state in which does business. This form is called the Articles of Incorporation. In some states, these articles may be called something else. The document may be called a Certificate of Incorporation (as in Delaware) or a Corporate Charter (another general term). A corporation is a specific type of business that is formed in the state where the company is doing business. To form a corporation, there are specific steps that must be taken and some decisions that must be made. One of the most import steps in incorporating a business in a state is to create Articles of incorporation. The form of these articles depends on the laws of the state. To find out the requirements for articles of incorporation in your state, go to the website of your state's secretary of state and the business division. What Is the Purpose of Articles of Incorporation? The Articles of Incorporation provide the basic information needed to form the business and register the business in the state. The state needs to know the name of the business, its purpose, and the people who will be in charge. For a corporation, the state also needs to know about any stock the business will be selling. What Information Is Needed for Articles of Incorporation? The specific articles included in this document vary by state, but the following articles are typically included: - The name of the corporation: Each state has different requirements for the corporation's name, but in most cases, it must include the term "Inc." or "Incorporated" to specifically designate this business as a corporation. - The name and address of the registered agent: People need to have someone who can receive important documents and legal papers on behalf of the corporation, so the registered agent needs to be someone who is available all the time during regular business hours. Many businesses hire a registered agent service., but you can be your own registered agent. - The specific type of corporation: (stock corporation, non-stock corporation, non-profit corporation, etc.) For a stock corporation, the authority of the corporation for an initial issue of a specific number of shares of stock and the price of those shares. You may also want to designate a certain class of shares (Class A, for example). - The purpose(s) for which the corporation was formed: What is the corporation selling? What type of business is it in? Each state has different requirements and levels of detail for this section. - The names and addresses of the initial directors: You will need to form a board of directors, and you may have to list the board members or the corporate officers (president, vice president, secretary, treasurer) on the Articles of Incorporation. - The name and address of the incorporator: (the person preparing the incorporation documents). An incorporator is a person in charge of setting up a corporation. The incorporator files the Articles of Incorporation with the state in which the corporation is registering and filing any other corporate documents needed until the corporation is formally registered and recognized by the state. Other duties of the incorporator might include selecting members of the board of directors or organizing an initial meeting of the board. An incorporator can be but does not necessarily have to be, an attorney. The person designated as the incorporator is listed on the Articles of Incorporation so he or she may be contacted by the state, if necessary. The incorporator has no formal duties once the corporation has been registered with the state. - The duration of the corporation: either perpetual or for a fixed period of time. Most corporations are set up as perpetual organizations. How Do I File Articles of Incorporation? The Articles of Incorporation are filed with the office of the Secretary of State for your state. Then get the help of an attorney to construct the document. Forming a corporation is complicated. While many states allow you to file the articles of incorporation online, it is a good idea to get an attorney to help you with the process of forming a corporation, so you don't miss anything critical. Is There a General Template for Articles of Incorporation? Some sections (those described below) are commonly required by most states. But there are many other sections and definitions that may be required by your state. Depending on where you file your articles of incorporation (in which state), you may see different sections. Here's a list of the most common sections: - Pre-emptive Rights: Initial or current shareholders may have the right to purchase shares in any offering before non-shareholders can purchase. In other words, they can pre-empt others and buy these shares. - Amending or Repealing Bylaws: The bylaws are the operating procedures for a corporation. They are created as part of the process of incorporation. Procedures for amending or repealing bylaws may be included in the articles of incorporation. - Fiscal year-end: A company's fiscal year is its financial year. The year-end determines when annual reports are due and when taxes must be paid. - Indemnification of Officers, Directors, Employees, and Agents: To indemnify means to hold harmless. An indemnity agreement attempts to state that those individuals who make decisions and act on behalf of the corporation should be held harmless from liability. - Limitation of Liability: This clause is similar to the indemnity clause above. It's sometimes called an "errors and omissions" clause because it states that responsible parties should not be liable for general errors or omissions in their ordinary work.
<urn:uuid:2c1e0045-c779-4211-84bd-9c3ed4bf584f>
CC-MAIN-2020-05
https://www.thebalancesmb.com/articles-of-incorporation-for-a-business-398875
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250625097.75/warc/CC-MAIN-20200124191133-20200124220133-00315.warc.gz
en
0.94818
1,174
3.203125
3
June 9, 2014 By: William Coleman The U.S. Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) jointly proposed new language related to critical habitat designation under the Endangered Species Act (ESA). The new approach is intended to increase the predictability and transparency of critical habitat decision making and set the stage for addressing current and future habitat conservation needs. This is especially significant because the agencies appear to be connecting climate change adaptation with ecological risk management for the first time. Under the ESA, the FWS and NMFS ensure that federal agency actions don’t result in the “destruction or adverse modification” of designated critical habitat. Among other changes, the proposed language: What does this mean? For land holders and developers, these changes would remove existing limitations on the designation of unoccupied habitat even if these land areas currently have no physical or biological features supporting listed species. As a result land only needs to have the “potential” to contribute to species recovery to qualify for critical habitat designation. The proposed changes expand the agencies scope, increasing their ability to make broad-scale designations of critical habitat. Furthermore, the number of “adverse modification” determinations will likely increase (because potential habitat is being so broadly defined), impacting project costs associated with changes due to the location of critical habitat. Every state in the U.S. has at least one species, if not significantly more, included in these review categories. Further, of the 1,527 species listed by both FWS and NMFS within the U.S., only 688 species presently have critical habitat designations. The potential number of new critical habitat designations within the next three to four years could exceed 150 species made under the newly proposed rules and draft policy. However, the presence of rare species or critical habitat on private property does not necessarily lead to restriction as to how the property may be developed or utilized. In fact, incentive programs have been established to reward property owners for conserving properties with the potential to support rare species. This includes market-based programs supported by FWS and NMFS-supported conservation banks and easements. Landowners will want to pay careful attention to developments in their states that could represent opportunities for generating significant long term revenues from these incentive based programs. Great Ecology works with large industrial and commercial land holders as well as private landowners to realize market-based conservation value from underutilized properties supporting rare species and habitats. For more information about these market-based incentive programs and how the proposed language may impact your projects contact us today. The proposed language is currently in the public comment period but ends July 11, 2014. Sorry, the comment form is closed at this time.
<urn:uuid:2da322d0-392a-43b0-8bd2-51e565e58dff>
CC-MAIN-2018-43
http://greatecology.com/habitat-dynamic-change-focus-proposed-endangered-species-act-rules/
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514005.65/warc/CC-MAIN-20181021115035-20181021140535-00187.warc.gz
en
0.935977
563
2.609375
3
In memory of the 7 crew members who perished on the space shuttle Challenger 25 years ago today (28 January 1986). Referring to picture: STS-51-L crew (front row) Michael J. Smith, Dick Scobee, Ronald McNair; (back row) Ellison Onizuka, Christa McAuliffe, Gregory Jarvis, Judith Resnik. What's it for? The US Air Force’s X-37B mini-spaceplane, launched on 22 April 2010, has recently returned autonomously from orbit. The purpose of this vehicle is shrouded in mystery – is there anyone out there who knows the spaceplane’s mission objective, and might wish to share with the rest of us? It is well known that ‘green house gases’, such as CO2 and methane, cause warming in the lowest layer (the ‘troposphere’) of the Earth’s atmosphere. However, it is less well-known that these same gases produce a cooling mechanism in the outermost layer (the ‘thermosphere’) where satellites orbit. It is believed that this cooling has the effect of steadily reducing the atmosphere’s density high up in the thermosphere, but is this happening, and if so what difference does it make? I have been collaborating with colleagues, in particular Dr Hugh Lewis and a graduate student Arrun Saunders, at the University of Southampton over the last few years to attempt to answer these questions. Arrun’s hard work, as part of a PhD programme, has recently confirmed the findings of other researchers in the field, suggesting that indeed the density in the upper atmosphere is declining by a few percent per decade. Why is this relevant? Well, the drag on orbiting satellites is directly dependent on the atmospheric density, so as the density decreases, then so does the drag. This in turn means that the orbital lifetime of satellites increase, which results in an increasing number of space debris objects on orbit. The international space-faring community need to wake up to this density trend in the high atmosphere where satellites (and space junk) orbit. If not taken account of in the development of debris mitigation guidelines, then the effectiveness of such guidelines will be compromised. Perhaps more importantly, as the community begins to consider the necessity of actively removing debris objects from orbit to stabilise the debris environment, the neglect of this trend in the operational planning will have a significant negative impact in achieving a beneficial outcome. With the cancellation of the Ares 1 launcher (the space shuttle replacement), and the move to engage private industry in the establishment of the next generation of ‘man-rated’ launch vehicles, is it time for a step function in launcher technology? One private enterprise with an interesting proposal is Alan Bond’s Reaction Engines. The Skylon launcher is Alan’s brainchild, and is effectively a single-stage-to-orbit vehicle with aircraft-like operations (see picture gallery). Adopting such a vehicle as the shuttle replacement would be a very bold step, but it would certainly get us out of the rut of the multi-stage expendable configurations that have been with us for decades. Maybe it is time for such a bold solution to future access to orbit, but this particular promising initiative would probably suffer from the ‘not invented here’ syndrome in the USA. Wow … the UK media have just picked up what they think is hot news – the US space shuttle is about to retire, throwing the US human spaceflight programme into disarray. Oh well, a good story but one that’s been around for about a couple of years now! In about 2008, when the shuttle retirement became more of a reality, the news was not all bad as it forced a rethink of the US human spaceflight programme. This radical appraisal led to the birth of the Constellation programme, the development of the Ares launch vehicles, and a long-term vision of US leadership in human spaceflight towards a return to the moon and a crewed landing on Mars. However, with the incoming Obama administration, the whole vision has been sacrificed, with the cancellation of the Ares programme (see picture gallery), and an extension of the ISS in low Earth orbit to 2020. So now we have the bizarre situation of the US astronauts being dependent upon the Russians for access to orbit (and ISS in particular), and no long-term vision for human exploration of the moon and Mars. How did we get here?! It could be argued that spending huge sums on human space exploration at times of such financial stringency is foolish. However, as always, these things are not straightforward. Space programmes are not just about (apparently) wasting resources with little benefit to the man on the street – there are obviously financial and political dimensions. It’s all about jobs, and maintaining a trained, high-tech work force, to say nothing of the political objective of preserving US leadership in space. What will be the mood in the USA in a few years time when the next foot prints on the moon are Chinese? Book goes 'soft' ... ‘How Spacecraft Fly’ is now available in paperback! The supply of hardcover editions is drying up, particularly in Europe. Springer intends to print the softcover edition ‘on demand’, to ensure that the book remains available. ESA comes of age ... The European Space Agency comet-rendezvous spacecraft Rosetta has recently captured some lovely images of an asteroid (see picture gallery). The detailed characteristics of the asteroid Lutetia, which is an irregularly-shaped object with a maximum dimension of the order of 130 km (80 miles), were little-known until the close approach on 10 July 2010. The spacecraft's closest approach distance was around 3160 km (1960 miles), when the relative speed was 15 km/sec (9.3 miles/sec). Well done to the Rosetta operations team at ESOC! Another achievement that emphasises that ESA has (over the last decade or so) come of age! Graham Swinerd - I hope to use this page to highlight current major events in space and spacececraft.
<urn:uuid:18fa15d6-6a68-4b0f-ad86-67394043ab95>
CC-MAIN-2023-23
https://www.howspacecraftfly.com/authors-blog/archives/01-2011
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00104.warc.gz
en
0.935192
1,314
3.21875
3
REFERENCE : AMERICAN CANCER SOCIETY Since the most common form of cervical cancer starts with pre-cancerous changes, there are 2 ways to stop this disease from developing. One way is to find and treat pre-cancers before they become true cancers, and the other is to prevent the pre-cancers in the first place. Finding cervical pre-cancers A well-proven way to prevent cervix cancer is to have testing (screening) to find pre-cancers before they can turn into invasive cancer. The Pap test (sometimes called the Pap smear) and the HPV (human papilloma virus) test are used for this. If a pre-cancer is found, it can be treated, stopping cervical cancer before it really starts. Since no HPV vaccine provides complete protection against all of the HPV types that can cause cancer of the cervix, it cannot prevent all cases of cervical cancer. This is why it is very important that women continue to have cervical cancer screening even after they’ve been vaccinated. Most invasive cervical cancers are found in women who have not had regular screening. Things to do to prevent pre-cancers and cancers Avoid contact with the human papilloma virus (HPV) Since HPV is the main cause of cervical cancer and pre-cancer, avoiding exposure to HPV could help you prevent this disease. HPV is passed from one person to another during skin-to-skin contact with an infected area of the body. Although HPV can be spread during sex − including vaginal, anal, and oral sex − sex doesn't have to occur for the infection to spread. All that is needed is skin-to-skin contact with an area of the body infected with HPV. This means that the virus can be spread through genital-to-genital contact (without intercourse). It is even possible for a genital infection to spread through hand-to-genital contact. Also, HPV infection seems to be able to be spread from one part of the body to another. This means that an infection may start in the cervix and then spread to the vagina and vulva. It can be very hard not to be exposed to HPV. It may be possible to prevent genital HPV infection by not allowing others to have contact with your anal or genital area, but even then there might be other ways to become infected that aren’t yet clear. For example, a recent study found HPV on the surface of sex toys, so sharing sex toys might spread HPV. HPV infection in women: HPV infections occur mainly in younger women and are less common in women older than 30. The reason for this is not clear. Certain types of sexual behaviour increase a woman's risk of getting HPV infection, such as having sex at an early age and having many sex partners. Women who have had many sex partners are more likely to get infected with HPV, but a woman who has had only one sex partner can still get infected. This is more likely if she has a partner who has had many sex partners or if her partner is an uncircumcised male. Waiting to have sex until you are older can help you avoid HPV. It also helps to limit your number of sex partners and to avoid having sex with someone who has had many other sex partners. Although the virus most often spreads between a man and a woman, HPV infection and cervical cancer also are seen in women who have only had sex with other women. Remember that someone can have HPV for years and still have no symptoms − it does not always cause warts or other problems. Someone can have the virus and pass it on without knowing it. Still, since all that’s needed to pass HPV from one person to another is skin-to-skin contact with an area of the body infected with HPV, even never having sex doesn’t guarantee that you won’t ever get infected. It might be possible to prevent anal and genital HPV infection by never allowing another person to have contact with those areas of your body. HPV infection in men: For men, the main factors influencing the risk of genital HPV infection are circumcision and the number of sex partners. Men who are circumcised (have had the foreskin of the penis removed) have a lower chance of becoming and staying infected with HPV. Men who have not been circumcised are more likely to be infected with HPV and pass it on to their partners. The reasons for this are unclear. It may be that after circumcision the skin on the glans (of the penis) goes through changes that make it more resistant to HPV infection. Another theory is that the surface of the foreskin (which is removed by circumcision) is more easily infected by HPV. Still, circumcision does not completely protect against HPV infection − men who are circumcised can still get HPV and pass it on to their partners. The risk of being infected with HPV is also strongly linked to having many sexual partners (over a man's lifetime). Condoms (“rubbers”) provide some protection against HPV but they don’t completely prevent infection. Men who use condoms are less likely to be infected with HPV and to pass it on to their female partners. One study found that when condoms are used correctly every time sex occurs they can lower the HPV infection rate by about 70%. One reason that condoms cannot protect completely is because they don’t cover every possible HPV-infected area of the body, such as skin of the genital or anal area. Still, condoms provide some protection against HPV, and they also protect against HIV and some other sexually transmitted infections. Condoms (when used by the male partner) also seem to help the HPV infection and cervical pre-cancers go away faster. Female condoms fit inside the vagina and can help protect against pregnancy. They also can protect against sexually transmitted infections, including HPV and HIV, although for this they aren’t as effective as male condoms. Do not smoke Not smoking is another important way to reduce the risk of cervical pre-cancer and cancer. Vaccines are available that can protect against certain HPV infections. All of these vaccines protect against infection with HPV subtypes 16 and 18. Some can also protect against infections with other HPV subtypes, including some types that cause anal and genital warts. These vaccines only work to prevent HPV infection − they will not treat an infection that is already there. That is why, to be most effective, the HPV vaccines should be given before a person becomes exposed to HPV (such as through sexual activity). These vaccines help prevent pre-cancers and cancers of the cervix. Some HPV vaccines are also approved to help prevent other types of cancers and anal and genital warts. The vaccines require a series of injections (shots). Side effects are usually mild. The most common one is short-term redness, swelling, and soreness at the injection site. Rarely, a young woman will faint shortly after the vaccine injection. The American Cancer Society recommendations for HPV vaccine use are similar to those from the federal Advisory Committee on Immunization Practices (ACIP), and include the following: · Routine HPV vaccination for girls and boys should be started at age 11 or 12. The vaccination series can be started as early as age 9. · HPV vaccination is also recommended for females 13 to 26 years old and for males 13 to 21 years old who have not started the vaccines, or who have started but not completed the series. Males 22 to 26 years old may also be vaccinated. · HPV vaccination is also recommended through age 26 for men who have sex with men and for people with weakened immune systems (including people with HIV infection), if they have not previously been vaccinated. *For people 22 to 26 years old who have not started the vaccines, or who have started but not completed the series, it’s important to know that vaccination at older ages is less effective in lowering cancer risk. It’s important to realize that no vaccine provides complete protection against all cancer-causing types of HPV, so routine cervical cancer screening is still necessary.
<urn:uuid:189a3254-05c1-4762-a50e-b3e7b29cc359>
CC-MAIN-2020-16
http://jbgynaecologist.blogspot.com/2016/10/can-cervical-cancer-be-prevented.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506959.34/warc/CC-MAIN-20200402111815-20200402141815-00221.warc.gz
en
0.969922
1,657
3.03125
3
Sheikh Sabah Khaled praised the German ambassador works on strengethening biliteral relations between the two countries. Using the prisoner's constraint to divide the letters in the palindrome into A and B forms (short letters (aceimnorsuvwxz) are A form, tall letters (bdfghjklpqty) are B form), the palindrome converts to baaab aabaa aabaa baaab in Bacon's biliteral En segundo lugar, y derivado de lo anterior, porque es preciso interpretar que regionalismo y estrategia biliteral son dos posibilidades que estan lejos de ser excluyentes entre si. Moreover, Brazilian ratification of nuclear safeguards with the International Atomic Energy Agency boosted the confidence between the two nations, therefore, the then US Secretary of Defense William Perry called for closer biliteral cooperation between the two countries in the aerospace industry during his visit to Brazil in November, 1994. In conclusion we can say that immediately after the Cold War period, under the leadership of Cardoso Brazil made bright prospectus for the future development of much improved biliteral relationship between the US and Brazil with the assumption that no radical change in either country would call in to question the political and economic realities on which relationship was based. (18.) These nouns have also usually been excluded from past treatments of reduplicated nominal patterns and subsumed under other rubrics, such as noun formations from biliteral roots (e.g., Kienast 2001: [section]115), quadriliteral nouns (e.g.. One fascinating example is a large heterodox analysis of Hebrew, occasional pushing beyond biliteral roots towards uniliteral roots, by Fabre-d,Olivet, (22) which much impressed a young Benjamin Whorf, (23) who in turn influenced modern general linguistics in powerful (although also heterodox) ways. So when the Sanhedrin was seating behind the Temple, that was an ornament to the Temple." (10) In his Arabic Tafsir, Saadia consistently renders tsammah as [LANGUAGE NOT REPRODUCIBLE IN ASCII] ([LANGUAGE NOT REPRODUCIBLE IN ASCII] "veil",) (11) a choice of translation echoed among the early medieval lexicographers by Menahem ben Saruq, who offers the Hebrew synonym [LANGUAGE NOT REPRODUCIBLE IN ASCII] (under the root [LANGUAGE NOT REPRODUCIBLE IN ASCII], (12) and Jonah ibn Janah (1875: 612, lines 1-2), who also translates [LANGUAGE NOT REPRODUCIBLE INASCII] in Arabic as [LANGUAGE NOT REPRODUCIBLE INASCII] (under the "biliteral " root [LANGUAGE NOT REPRODUCIBLE INASCII]). Macdonald ("New Thoughts on a Biliteral Origin for the Semitic Verb," Annual of the Leeds University Oriental Society 5 [1963-1965]: 63-85) and Christopher Ehret ("The Origins of the Third Consonants in Semitic Roots," Journal of Afroasiatic Languages 1 : 109-202). Yet the use of many biliteral signs and groups to represent only their first consonant, which eventually became standard practice in Demotic (Vittman 1996: 446), seems not to have been standard in Late Egyptian.
<urn:uuid:73686a09-6362-4654-9d29-c64f7c2889f2>
CC-MAIN-2021-21
https://www.thefreedictionary.com/biliteral
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989766.27/warc/CC-MAIN-20210512162538-20210512192538-00088.warc.gz
en
0.889279
750
2.8125
3
Edmonton, Canada — A report commissioned by Greenpeace Canada analyses the significant role dirty oil from the Alberta tar sands plays in the global climate crisis. A new research paper from Global Forest Watch Canada provides for the first time important information on the significant lack of reporting of greenhouse gas emissions caused by boreal forest disturbance in the Alberta tar sands. Frequently asked questions about the Great Bear Rainforest and Greenpeace's campaign to protect it. Greenpeace, along with three other environmental groups, the logging industry, First Nations governments, communities and the Provincial and Federal governments established a blue ribbon science team to provide independent, multidisciplinary... Great Bear Rainforest agreements become reality. Greenpeace is calling on supermarkets to stop selling Redlist species, adopt a sustainable seafood procurement policy, use their influence to inform the industry on sustainability requirements, and ensure proper labeling of seafood products sold. The Boreal Forest is home to one of Canada’s most iconic animals: the woodland caribou. Unfortunately, logging and industrial development have been destroying this threatened species’ habitat for decades, and caribou are quickly disappearing. If... Canada’s Boreal Forest is inadequately protected. Almost half of the forest’s treed area is under licence to logging companies, mainly in the biologically diverse southern areas. Only 8.1 per cent of the intact areas of the forest are protected... Intact forest areas are vital parts of the forest that have not yet been fragmented by human activities like logging, road building or other types of infrastructure. It’s critical to protect intact areas that are still in their natural state. 111 - 120 of 343 results. © GREENPEACE 2015
<urn:uuid:01ea0d74-b781-4266-b65f-85f7235a2c7c>
CC-MAIN-2015-40
http://www.greenpeace.org/canada/en/documents-and-links/?page=12
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737922497.60/warc/CC-MAIN-20151001221842-00142-ip-10-137-6-227.ec2.internal.warc.gz
en
0.908041
346
3.328125
3
Cancer is the most deadly disease that causes the serious health problems, physical disabilities, mortalities,and morbidities around the world. It is the second leading cause of death all over the world. Although greatadvancement have been made in the treatment of cancer progression, still significant deficiencies and room forimprovement remain. Chemotherapy produced a number of undesired and toxic side effects. Natural therapies,such as the use of plant-derived products in the treatment of cancer, may reduce adverse and toxic side effects.However, many plants exist that have shown very promising anticancer activities in vitro and in vivo but theiractive anticancer principle have yet to be evaluated. Combined efforts of botanist, pharmacologist and chemistsare required to find new lead anticancer constituent to fight disease. This review will help researchers in thefinding of new bioactive molecules as it will focus on various plants evaluated for anticancer properties in vitroand in vivo.
<urn:uuid:9d53ebf9-e42e-4ced-b898-6adce0729111>
CC-MAIN-2022-27
http://journal.waocp.org/article_29255.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104514861.81/warc/CC-MAIN-20220705053147-20220705083147-00294.warc.gz
en
0.945247
195
2.921875
3
What is the ultimate success of a teacher or lecturer? Is merely to tick boxes that a certain number of students passed the exam at the end of the year? Or is it to create an engaging learning environment which keeps students involved and enthusiastic about their learning experience? I would argue it is the combination of the two. It is rewarding for teachers and lecturers to see a high pass mark but it is more rewarding to combine that with students who are engaged with the lessons that get them to that pass mark. A disorganised teacher is not going to get the full engagement of their pupils and ultimately will not achieve the pass rates of someone who is fully prepared. One way to ensure lessons are engaging is to create a full and well prepared Lesson Plan. This is key to any learning environment and determines the level of engagement from students and ultimately pass rates. This should include: - The Topic - Details on the learning objectives - The time involved to deliver those objectives - How these objectives will be presented - The structure of each lesson - What will the students respond best to which will determine delivery of the lesson: - A talk / lecture where they simply take notes - Show a film - Use props - Generate a discussion Anyone who has ever stood in front of a room to present on a topic will appreciate how daunting that can be and that the key to success is preparation. Winging it rarely works for anyone. The same can be said for teachers and lecturers. There is an expectation from the students that you will know your topic and that your delivery of said topic will not be disjointed or dare I say it – boring. Educators face the prospect of presenting different topics to different audiences on an almost hourly basis throughout the day and if they are not prepared, they will likely lose the interest of their students and pass rates will suffer, reflecting on them as a teacher. MindGenius is perfect for preparing lesson plans because you can start with your topic, break down all of the related information and plan how you will deliver that information to your pupils and the add in timeframes for delivery. You are able to set the objectives for each lesson and how your subject matter presentation will meet those objectives. As much as planning is key, it should also be remembered that getting students engaged may mean that discussions will veer off topic at points – you can prepare for that as well by adding in a time buffer for discussions as part of the overall plan.
<urn:uuid:7a824362-5fc7-4c72-bca7-56c2f95f5734>
CC-MAIN-2019-47
https://www.mindgenius.com/engage-your-students-to-maximise-attainment/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670559.66/warc/CC-MAIN-20191120134617-20191120162617-00217.warc.gz
en
0.96535
508
2.796875
3
Definitions for reflectrɪˈflɛkt This page provides all possible meanings and translations of the word reflect Random House Webster's College Dictionary to cast back (light, heat, sound, etc.) from a surface. to give back or show an image of; mirror. to serve to cast or bring (credit, discredit, etc.). to express; show: followers reflecting the views of the leader. (v.i.)to be turned or cast back, as light. to cast back light, heat, etc. to be reflected or mirrored. to give back or show an image. to think, ponder, or meditate: to reflect on one's faults. to serve or tend to bring reproach or discredit: His crimes reflected on the whole community. to serve to give a particular aspect or impression: The test reflects well on your abilities. Origin of reflect: 1350–1400; ME < L reflectere to bend back =re-re - +flectere to bend manifest or bring back "This action reflects his true beliefs" chew over, think over, meditate, ponder, excogitate, contemplate, muse, reflect, mull, mull over, ruminate, speculate(verb) reflect deeply on a subject "I mulled over the events of the afternoon"; "philosophers have speculated on the question of God for thousands of years"; "The scientist must stop to observe and start to excogitate" to throw or bend back (from a surface) "Sound is reflected well in this auditorium" be bright by reflecting or casting light "Drive carefully--the wet road reflects" show an image of "her sunglasses reflected his image" give evidence of a certain behavior "His lack of interest in the project reflects badly on him" give evidence of the quality of "The mess in his dorm room reflects on the student" Kernerman English Learner's Dictionary (of a mirror, water, etc.) to show an image on its surface the buildings were reflected in the harbor to redirect light, sound, heat, etc. from a surface a material that will reflect light to make the room brighter to think about sth time to reflect on the day's events to reveal or be a sign of sth The way you decorate your house reflects the kind of person you are. To bend back (light, etc.) from a surface. A mirror reflects the light that shines on it. To be bent back (light, etc.) from a surface. The moonlight reflected from the surface of water. To mirror, or show the image of something. The shop window reflected his image as he walked past. To be mirrored. His image reflected from the shop window as he walked past. To agree with; to closely follow. Entries in English dictionaries aim to reflect common usage. To give evidence of someone's or something's character etc. To think seriously; to ponder or consider. People do that sort of thing every day, without ever stopping to reflect on the consequences. to bend back; to give a backwa/d turn to; to throw back; especially, to cause to return after striking upon any surface; as, a mirror reflects rays of light; polished metals reflect heat to give back an image or likeness of; to mirror to throw back light, heat, or the like; to return rays or beams to be sent back; to rebound as from a surface; to revert; to return to throw or turn back the thoughts upon anything; to contemplate. Specifically: To attend earnestly to what passes within the mind; to attend to the facts or phenomena of consciousness; to use attention or earnest thought; to meditate; especially, to think in relation to moral truth or rules to cast reproach; to cause censure or dishonor British National Corpus Spoken Corpus Frequency Rank popularity for the word 'reflect' in Spoken Corpus Frequency: #2654 Written Corpus Frequency Rank popularity for the word 'reflect' in Written Corpus Frequency: #4045 Rank popularity for the word 'reflect' in Verbs Frequency: #202 Translations for reflect Kernerman English Multilingual Dictionary to send back (light, heat etc) The white sand reflected the sun's heat. - refletirPortuguese (BR) - reflektere; kaste tilbageDanish - αντανακλώ, αντικατοπτρίζωGreek - منعکس شدن یا کردنFarsi - renvoyer, refléterFrench - לְהַחֲזִיר אוֹר, קוֹלHebrew - प्रतिबिम्बित करनाHindi - odražavati, odbijati seCroatian - atspindėti, atmuštiLithuanian - kaste tilbake, reflektereNorwegian - منعکس شدن یا کردنPersian - بياخپرول (غږ، رڼا، حرارت اونور)، انعكاس كول، ښكاره كول، خپريدل، منعكس كول، ښكاره كيدل، فكر كولPashto - a reflectaRomanian - 反射Chinese (Trad.) - منعکس کرناUrdu - phản xạVietnamese - 反射Chinese (Simp.) Get even more translations for reflect » Find a translation for the reflect definition in other languages: Select another language:
<urn:uuid:e804cabd-b4f7-47cf-8c19-2880154aebab>
CC-MAIN-2014-35
http://www.definitions.net/definition/reflect
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00301-ip-10-180-136-8.ec2.internal.warc.gz
en
0.672962
1,367
3.09375
3
The United States produces about 4.2 PWh (1 petawatt is 1x10^15) of electricity every year. Per day, that is about 12 TWh. Let’s say we wanted to time shift 25% of that energy from one point of the day to another, twice per day. For example, your wind farm output might be sagging in the early morning, and your solar output isn’t expected to ramp for another 4 hours or so. And then again in the afternoon. That would require us to have 4 TWh of storage that went through two cycles each day. Tesla’s Gigafactory is currently producing about 20 GWh of cells every year. Each cell can deliver 100% discharge for about 500 cycles. If you only discharge from 90% to 40%, though, you can get a thousand or more cycles. But let’s say the batteries will get discharged to the point that will yield exactly 730 cycles (365 * 2) and that will still give us 20 GWh of storage. It’s optimistic, but good enough for now. To rely on cells to provide time-shifting for this 4 TWh of storage would require 200 Gigafactories, with 100% of their output making cells for the grid 24x7. And because the batteries would be used up after a year (700 cycles) you’d need to have those 200 factories making replacement batteries continuously. A single 19 WH 21700 cell is about 70g. This means we’d need about 200B cells made per year, and about 15B kg of finished goods. Mining has roughly a 50:1 return by weight (gold is 150K:1, copper is 10:1, coal is very close to 1:1), which means you’d need to mine about 700B kg, or 700M tons of earth, to begin the process of making these cells. Mining costs for ore in general are perhaps $10/ton. The US mining industry processed 1200M tons of coal last year .So, the mining effort for batteries would be on par with that of coal today. And just as we see train cars chugging across the midwest carrying and endless chain of coal, we’d see those same train cars carrying the other raw materials needed to make the cells. Non-stop. 24x7. If the mining cost is about $7B annually, the selling price of these cells at $100 kWh would be $400B/year. Thus the mining cost would be about 2% of the delivered cell cost. Very small. For comparison, hydro storage would be similarly challenging. Hoover Dam produces about 4 TWh of energy each year. We’d need 365 strategically located Hoover Dams to time-shift the energy target above. That has a much smaller chance of happening than a lot of Gigafactories. The summary is this: Time-shfiting energy would require a massive undertaking. It’s doable, but it’s not something that could be started anytime soon. Just the mining aspect alone would prompt decades of fights in the court. That battle has already begun. A final thought: The US drives about 3T miles per year. At 300 wh/mile, that’s another 900 TWh of electricity needed, or about 20% of our current consumption. In other words, the demand side will be going up a fair bit over the next decade or two.
<urn:uuid:7fac0e4c-e8a0-4320-9a0e-796739a8fb59>
CC-MAIN-2019-30
https://www.narrowband.org/blog/2019/7/13/the-cost-to-time-shift-energy
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528635.94/warc/CC-MAIN-20190723002417-20190723024417-00014.warc.gz
en
0.95489
723
3.296875
3
This a great visual activity for your Spanish classroom. This powerpoint is meant to be used during the middle of an adjectives unit. Show the students the pictures and ask them a question such as, "¿Esta abierto o cerrado?" Students can give a one word answer, or they can give a full sentence. You can also add more vocabulary by talking more about the picture using nouns and adjectives. Opposite words used: grande, pequeño, limpio, sucio, alto, bajo, abierto, cerrado, alegre, triste, nuevo y viejo. Students love silly pictures and will get a giggle from many of the slides, (for example the man wearing HUGE shoes, or the TALL stack of pancakes). *Note an example question is listed in the notes underneath each slide.
<urn:uuid:904d5e8a-0a81-417d-b659-c58caaf60489>
CC-MAIN-2017-51
https://www.teacherspayteachers.com/Product/Los-Opuestos-PowerPoint-Spanish-adjectives-powerpoint-811659
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948517181.32/warc/CC-MAIN-20171212134318-20171212154318-00701.warc.gz
en
0.798879
185
3.46875
3
Poliomyelitis and Cases of Paralysis and Death Poliomyelitis can be prevented by both the KILLED VACCINE(inactivated vaccine,IPV) and the LIVE,attenuated vaccine(oral vaccine,OPV). Both vaccines induces humoral antibodies,which neutralizes the virus entering the blood and hence prevent central nervous system diseases and infection. INACTIVATED VACCINE is preferred 4 the following reasons: 1:it’s current version is called ENHANCED POLIO VACCINE or eIPV.it has higher seroconversion rate and induces a higher titer of antibody than the previous IPV. 2:IT ALSO INDUCES SOME MUCOSAL IMMUNITY,IgA,making it capable of interrupting transmission….BUT…the amount of of secretory IgA induced by eIPV is less than the amount induced by OPV. HENCE,OPV is preferred for eradication efforts. LIVE VACCINE has some disadvantages; 1:rarely,but still it can cause reversion of the attenuated virus to virulent one and disease can ensue. 2:can cause disease in immunodeficient so not given to them prior to their T/M. 3:must be kept refrigerated .to prevent heat inactivation of the live virus. VACCINE-DERIVED PARALYTIC POLIO(VDPV): It occurs in those areas where the people are unimmunized,which is a common drawback of our community..so if vaccine given to such people it can cause some serious manifestations. People should be treated by immunizing them with the ORAL VACCINE that would interrupt the fecal-oral transmission. PASSIVE IMMUNIZATION with immune serum globulins is available for those unimmunized individuals who are known to be exposed. THE DURATION OF IMMUNITY IS LONGER WITH THE LIVE VACCINE THAN THE KILLED VACCINE,BUT STILL BOOSTER DOSE IS RECOMMENDED WITH BOTH. PLAN OF ADMINISTRATION OF THE VACCINE: 1:4 doses to be given at 2 months,4 months,6 to 18 months and upon entry to school at 4 to 6 yrs of age. NOW,why some individuals develop certain complication upon vaccine administration?? ANS:because while the vaccine is prepared..cell culture used may be not screened carefully to exclude the adventitious viruses,which when get access to the human body cause complications like strain of SV40 virus can be found in non-hodgkin’s lymphoma..but if the cell cultures used to prepare the vaccine are properly screened then the rate of such incident can be controlled. Special Thank to Kate Mil for Sharing this very first research 🙂 Poliomyelitis and cases of paralysis and death Vaccine Bombshell: Leaked Confidential Document Exposes 36 Infants Dead After This Vaccine by Christina England I welcome coming to your Country to penetrate this vaccine darkness with light, for one, and for all. Dr Andrew Moulden MD, PhD 17.) Do you believe that vaccinations have eradicated epidemic diseases? No, not at all. All we have done is translated “forest fires” for 1% of the population into chronic and acute “brush fires” for the entire population. Sanitation, nutrition, potable water, proper nutrition and hydration was eradicating epidemic disease. Virulent pathogens can be handles, we simply needed to control the “MASS” response in human physiology along with the electrostatics of blood flow. In this regard, there would have been no infantile paralysis or respiratory failure from wild polio, or death from Spanish flu, or H1N1 for that matter. We can handle the germs, all of them, we simply need to control the magnitude and nature of the immune system response to these virulent pathogens. The same pathological sequence has to be controlled, in human physiology, on an as-needed basis, irrespective of the pathogenic strain or virulence. Polio is now known as aseptic meningitis and a bunch of other names. It never went away. Then again, it was never polio, the virus, that was causing the paralysis and disease, these were ischemic strokes from “M.A.S.S.” All other pathological states flow from this generic common first step to disease. 18.) Have you encountered opposition, hassles, threats or obstacles to the publication of your work in the leading medical journals? Yes I have. including pulls of my talks as early as 2005 amongst other “pre-emptive” tactics that can be discussed at a later time. For now the issue is on the health and wellness of our fellow beings, my battles are irrelevant. Organized medicine has not been kind, although it would have been kind if I simply “played ball.” At the time of my initial discoveries and proof causation proven tools, I was on the boards of directors of two organized medicine bodies in Canada, resident editor, and about to be posted to the newly forming Federation of Specialty physician in Canada. I chose to represent the truth and science and humanity rather than line my own pockets or accept career advancement for “selling out.” This is what a physician takes their oaths to do. This is what a scientist is bound to be true to. This is what a human being does for fellow beings. It is not about being better than ones fellow being, it is about helping one’s fellow being become better. We all have a part to play. As it turns out, these medical discoveries are my small part and the knowledge belongs to humanity, not my pocket book, and not buried in some pharmaceutical firms “knowledge vaults.” My work frightens those in the know at the upper echelons, and now in the Federal courts. They will have to brand me a ‘quack’ and destroy my credibility, as they will not and cannot deny the evidence I now bring to bear. It is no longer a simple matter of “are vaccines safe?” The repercussions with my “MASS” discoveries is that the entire medical model collapses, the germs are NOT the cause of disease, in an of themselves, this was never the truth, it was just theory. 19.) What are your ‘opponents’ main viewpoints and claims? They have none. There are no other viewpoints anymore. The truth is self evident now, res ipsa loquitur. All they have to do is come and listen, come and look. ALL who take the time to learn and be educated with the evidence I can now show, are speechless, from pediatric neurologists to all medical and paramedical professionals alike. The vaccine courts have nothing to do with truth. We shall see what viewpoint emerges from that pit in time. In 2011 alone, the Bill and Melinda Gates’ polio vaccine campaign in India caused 47,500 cases of paralysis and death Untested vaccines causing new wave of polio-like paralysis across India The Bill and Melinda Gates Foundation is financially backing and publicly endorsing mass polio virus vaccinations in India. In case you didn’t hear him yourself, Bill Gates publicly announced that vaccines co Gates also proclaimed that every newborn should be registered for vaccinations immediately to assure the goal of 90% of the population getting vaccinated for his “century of the vaccination.” The Bill and Melinda Gates Foundation program in India was promoted as “The Last Mile: Eradicating polio in India.” The promotional video displayed numbers showing thousands of cases of polio in India decades ago, with the number of cases dropping to 42 by 2010. But it appears that wild polio virus stats have been traded for polio from vaccines and non-polio acute flaccid paralysis (NPAFP). In India, over 47,000 cases of NPAFP were reported in 2011. The paralysis symptoms of NPAFP are practically the same as what’s attributed to “eradicated” wild virus polio. Apparently, vaccine polio viruses also cause polio paralysis.
<urn:uuid:912d4587-2e40-4f52-870d-db6fd59e1f46>
CC-MAIN-2018-39
https://ahsanjehangir.wordpress.com/2012/11/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267165261.94/warc/CC-MAIN-20180926140948-20180926161348-00481.warc.gz
en
0.921945
1,726
3.265625
3
A Complete History Curriculum for One Year Don't just read about history—experience it! Color a picture of Captain Cook in Botany Bay, design an Ottoman pattern, play the Battle of Bunker Hill board game, and hunt for gold. This comprehensive activity book and curriculum guide contains all you need to make history come alive for your child. Along with the accompanying book The Story of the World; Volume 3: Early Modern Times, this Activity Book provides a complete history program. The Activity Book contains: - Cross-references to Kingfisher and Usborne history encyclopedias. - Comprehension questions and answers. - Sample narrations. - Maps and geography activities. - Coloring pages. - Suggestions for additional history readings. - Lists of literature readings. - Plenty of simple, hands-on activities. - Color-in review cards for each chapter. All resources and activities are specifically designed for grades 3-6. From Elizabeth to the Forty-Niners, the study of Early Modern Times will captivate your child. Story of the World 3 Activity Book Did you find this review helpful?
<urn:uuid:cd6bef17-32ad-4312-92ca-d8803b244d00>
CC-MAIN-2021-39
https://www.exodusbooks.com/story-of-the-world-volume-3-activity-book/bauer/75716/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060677.55/warc/CC-MAIN-20210928092646-20210928122646-00668.warc.gz
en
0.828285
242
3.609375
4
To support effective practices that develop ownership in the school/district’s beliefs, mission, vision and values as underpinnings for continuous improvement. Standards for Effective Data Use It’s clear that educators today need to develop data savvy. The Statewide Longitudinal Data System partners, comprised of educational leaders across 13 states, provide a set of Data Use Standards describing the knowledge, skills and behaviors needed for effective data use to inform instructional and programmatic decisions. It is recommended that school and district leadership teams reflect about their professional growth in data use knowledge, skills and professional behaviors. These standards provide a good beginning for such reflection as they detail “the essential knowledge, skills, and professional behaviors required by teachers and administrators to effectively use data to inform instructional and programmatic decisions.” The standards are divided into three subgroups, which are listed in the table below: Knowledge, Skills and Professional Behavior Standards for Data Use Rules and Regulations The purpose of this resource is to understand the importance and legal requirements of protecting student data privacy and assess the status of current practices. This resource is designed to be utilized collaboratively by district leadership teams and reinforced by school leadership teams. First, you will find guidance regarding policies, principles and protocols critical to protect student data. The checklist that follows is organized into eight items to assess and provide evidence regarding current status. Using the checklist, teams identify areas of need and plan actions to be taken to insure student privacy.
<urn:uuid:228fc18d-051d-4879-a21f-51853749b54c>
CC-MAIN-2021-49
https://wlresources.dpi.wi.gov/browse?f.keyword=readiness
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362589.37/warc/CC-MAIN-20211203030522-20211203060522-00247.warc.gz
en
0.902146
370
2.984375
3
The photographs used in this project have a dark history, originating from the S-21 prison in Cambodia. This prison was a notorious site where the Khmer Rouge regime interrogated, tortured, and executed countless prisoners between 1975 and 1979, during Pol Pot's reign. The prison, formerly a school, was repurposed by the Khmer Rouge and turned into a center for interrogation and torture, where prisoners were subjected to brutal and inhumane treatment. During the Khmer Rouge's reign, S-21 was one of the most infamous prisons in Cambodia. Its purpose was to extract confessions from individuals who were believed to be threats to the regime. The Khmer Rouge's tactics were brutal, and prisoners were subjected to electric shocks, waterboarding, and other forms of torture until they gave false confessions. The prison was also known for its execution of prisoners, which was carried out in secret, with many prisoners never leaving the prison alive. Today, the S-21 prison has been converted into a museum to serve as a reminder of the atrocities committed during the Khmer Rouge regime. The photographs used in this project are a chilling reminder of the horrors that took place in this prison, and they provide a glimpse into the lives of the prisoners who suffered there. Despite the passage of time, the impact of the Khmer Rouge regime and the legacy of S-21 continue to be felt in Cambodia, and these photographs serve as a poignant reminder of this dark period in the country's history.
<urn:uuid:51235953-3662-4f4f-95c4-aaee084abe2e>
CC-MAIN-2023-23
https://ashkanhonarvar.com/Numbers
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652959.43/warc/CC-MAIN-20230606150510-20230606180510-00463.warc.gz
en
0.98234
300
3.375
3
The Background of the Emergence of Direct Method The method appeared initially in language teaching is Grammar Translation Method (GTM). The focus of this method is text-based-comprehension. When foreign language teaching was enclosed in European school curriculum in the nineteenth century, most teachers used GTM in the classroom teaching learning process. In the last middle of the nineteenth century, as soon as the increasing interaction between countries in Europe, the attention to the more communicative language teaching was inevitable. GTM got many challenges and critics along with the emergence of new approaches in language teaching by the individual linguists such as C. Marcel, T. Prendergast, and F. Gouin. Marcel, for instance, emphasized the importance of meaningful learning and offered a rational method referring to the children language acquisition as the model of language learning. Then, T. Prendergast was one of many linguists who researched how children speak a language. The most influential linguist among them was F. Gouin who proposed that the need to oral skill is more important than any other skills e.g. reading and writing. He was also interested in the discourse how a child acquires a language. Unfortunately, as these works were done individually and the influence of GTM was still too strong, they failed to take people’s attention. However, what they strove was a steppingstone to the emergence of what is called Reform Movement. In the end of the nineteenth century, GTM got many critics from ‘Reform Movement’ linguists such as Henry Sweet (1845-1912), Wilhelm Vietor (1850-1918) dan Paul Passy. They argued that this method didn’t bring language teaching into the practical use of the target language, so it wasn’t sufficient enough to make students able to speak the target language. Richards, Jack C. and Theodore S. Rodgers (2001: 10) said that the reformers at least released these six beliefs: - the spoken language is primary and that this should be reflected in an oral-based methodology - the findings of phonetics should be applied to teaching and to teacher training - learners should hear the language first, before seeing it in written form - words should be presented in sentences, and sentences should be practiced in meaningful contexts and not to be taught as isolated, disconnected elements - the rules of grammar should be taught only after the students have practiced the grammar points in context – that is, grammar should be taught inductively - translation should be avoided, although the native language could be used in order to explain new words or to check comprehension The principles proposed by the reformists then produced the theoretical foundations for language teaching approaches based on scientific approach towards the study of language and language learning. It was a preliminary effort from the applied linguistics discipline which tried to give the scientific foundations for the study of the second and foreign languages. This study which was done systematically through a professional scientific organization then produced the naturalistic principle of language learning. This principle laid the foundation of the natural method or direct method. (Richards, Jack C. and Theodore S. Rodgers 2001: 11).
<urn:uuid:1556ea2a-d3ed-4351-a2cd-6da02c0e2c25>
CC-MAIN-2016-50
https://syahruzzaky.wordpress.com/2012/08/26/577/
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540804.14/warc/CC-MAIN-20161202170900-00076-ip-10-31-129-80.ec2.internal.warc.gz
en
0.961765
647
3.796875
4
2 monopolistic competition model • monopolistic competition exists when many sellers compete to sell a differentiated product in a market into which the entry of. Perfect competition is an the model of perfect competition has often been there is no sense in talking of a use of resources as if a perfect market. 65 model assumptions: monopolistic competition to that found in a model of perfect competition entry and exit assumption in a perfectly competitive market. Chapter 4: perfect competition there are no barriers to entry to or exit from a market in perfect competition this condition assures that no firm will. In the perfect competition long run in the perfect competition long run, the loss-making firms will exit the industry, and new firms will enter the market. So what is perfect competition the model of perfect competition rests on a number of a perfectly competitive market consists of a large number of participants. Perfect competition is probably the to make for the model of the perfectly to think of a perfect example of an industry, or market. 93 perfect competition in the we shall see in this section that the model of perfect competition predicts in a perfectly competitive market in long-run. The competitive market model as commonly described in textbooks includes a number of this variance with the ideal situation of perfect competition is rarely. Model 8 43 methodology 10 5 perfect competition, that which gives the adjective perfect its thrust, is the idea. Advertisements: features of a perfect market: a perfect market has the following conditions: 1 free and perfect competition: in a perfect market, there are no checks. Pure or perfect competition is a theoretical market structure in which a number of criteria such as perfect information and resource mobility are met. There are several features of ebay which make the market competitive – and perhaps close to the model of perfect competition many buyers – thousands of people. Assumptions: the model of perfect competition is based on the following assumptions 1 large numbers of sellers and buyers: the industry or market includes a large. Definition of perfect competition: also called perfect market or pure competition if you find yourself in perfect competition you must try to market your. Markets for commodities such as wheat are examples of market systems that approach the perfect competition model comstock/comstock/getty images. Start studying ch9 perfect competition model learn vocabulary, terms, and more with flashcards, games, and other study tools. Start studying microeconomics final practice b equals the market price in perfect competition firms in the model of perfect competition will. Perfect competition is a market structure where many firms offer a homogeneous product because there is freedom of entry and exit and perfect information, firms will. Anti-competitive regulation - it is assumed that a market of perfect competition shall provide the regulations and protections the perfect competition model. The main difference between pure competition and perfect competition is that in pure competition there is no examples of this model are stock market and. There are significant obstacles preventing perfect competition from into the model are so for a market to exhibit perfect competition and how. Full answer perfect competition is an economic market structure characterized by numerous small firms that have no individual control over price, no barriers to. Perfect competition describes a market structure whose assumptions are strong and therefore unlikely to exist in most real-world markets. Advantages of perfect competition economics essay perfect competition is a type of market in which there monopolistic competition is a market structure in. A summary of the essential features and differences among the 4 basic economic market models: perfect competition, monopolistic competition, oligopoly, and pure monopoly. Even though perfect competition is hard to come by, it’s a good starting point to understand market structures a deep understanding of how competitive markets. Oligopoly is a common market this could lead to an efficient outcome approaching perfect competition the cournot–nash model is the simplest oligopoly model. A competitive electricity market model summary the electricity market is moving towards greater reliance on competition changing technology, new entrants in the. 1/19 chapter 27: theory of the firm – perfect competition (15) assumptions of the perfectly competitive market model the firm as a price taker and short run. Porter's five forces is a model used to explore the and industry or a market segment moreover, the model can be used to compare or perfect competition.
<urn:uuid:8fb1f492-a1f0-477e-b556-807c57c2b9c2>
CC-MAIN-2018-26
http://mbpaperfhiv.paycheckadvance.us/perfect-competition-market-model.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865145.53/warc/CC-MAIN-20180623171526-20180623191526-00295.warc.gz
en
0.959121
854
3.1875
3
DRIVING ALONG Howard County's roads in the summer means encountering bicyclists, young and old. I'm not sure which I fear - or fear for - more. I've seen children of parents who should know better ride their bikes unhelmeted, dart out between parked cars or zoom down driveways without looking. I've also seen adults riding their bicycles stupidly. One mature cyclist was sighted recently driving against traffic - on U.S. 40 at St. Johns Lane. (Keep doing that, and soon the state's average IQ will increase, just a little.) But more on stupid-adult behavior in other columns. Summer is upon us, and so is the threat that your little ones might not make it to the next school year. Parents, see how you do on this quiz, and then read below for rules to help your children survive the summer. 1. When should a bike helmet be worn? a. Only when riding on the street. b. All the time. c. When it matches your outfit. 2. How many people may ride safely on a bicycle built for one? a. As many people as can fit. b. One person. c. Two people. 3. You should ride your bicycle: a. On the left side of the road against the flow of traffic so everyone can see your face. b. On the right side of the road going with the direction of traffic. c. In the middle of the road. 4. When riding your bike, you should: a. Hold up traffic while riding in the middle of the road. b. Follow all traffic laws. c. Sing "Born to Be Wild." If you selected any answer other than "b" for every question, you fail. Why am I ranting? Each year in the United States, nearly 1,000 people die in bicycle accidents involving a motor vehicle, and about half are children younger than 15. And nearly 1 million children receive medical treatment for biking-related injuries each year. Hello, parents. What are you doing to protect your precious darlings? Although most car-bike accidents involving adult cyclists are caused by motorists, most of those involving children are caused by children. Young children might not understand the rules of the road - and those who don't should not be riding on streets and roads, even supposedly quiet neighborhood streets. Many bike-related accidents can be avoided if you take time to teach your kids bike safety rules. Vigilantly supervising your kids would not hurt, either. Courtesy of the National Highway Traffic Safety Administration, here are some rules for bike safety: 1. Wear a helmet that fits properly. 2. Wear bright-colored clothing and shoes or sneakers - don't ride in bare feet or sandals. 3. Be cautious at driveways. Often drivers backing out forget to check whether someone is on the sidewalk, even though they've just checked to ensure that the street is clear. 4. Children younger than 9 should stay off streets and roads - even "safe" neighborhood streets. 5. Obey the rules of the road. These include traffic signs, signals and road markings. 6. Never ride out into a street without stopping first. Look both ways. 7. Obey stop signs and traffic lights. 8. Check behind you before swerving, turning or changing lanes. 9. Never follow another rider without applying the rules. 10. Only one person per bike, unless it's a bicycle built for two. The law of tonnage is stacked against cyclists. When a 50- pound child on a 15-pound bike comes up against a two-ton SUV, guess who wins? Adult cyclists could benefit from following these rules, by the way. I've seen well-outfitted adult cyclists sail through red lights, weave between cars slowing down for traffic lights, ride on the wrong side of the road. ... Oy! What haven't I seen? But I also know that motorists aren't angels, either. What have been your experiences along Howard County's highways and byways? Have you heard enough about those pesky highway roundabouts? If not, here's something you might be interested in. The Federal Highway Administration's Turner-Fairbank Highway Research Center is sending a team of research psychologists and transportation engineers to study how people drive through two-lane roundabouts. They are looking for about 100 driver volunteers, each of whom must be at least 18 years old and have a valid drivers license. The study will take place early next month. Two roundabouts have been chosen for the study: on Howard County's Route 216 at U.S. 29, and at Perry Parkway in Gaithersburg (Montgomery County). If increasing our understanding of how we drive these roundabouts is not enough to motivate you, here's this. The agency is willing to pay participants $30 an hour plus mileage. If you're interested, contact Vanessa Davis at 202-493-3386, or send e-mail to Steve Greene at Ste [email protected]. gov. See you there! What's your traffic trauma? Contact Jody K. Vilschick at [email protected]. Technophobes can mail letters to Traffic Talk, The Sun in Howard County, 5570 Sterrett Place, Suite 300, Columbia 21044, or send them via fax to 410-715- 2816.
<urn:uuid:73693101-0947-4dc3-9ac2-2a86d81e0b9f>
CC-MAIN-2017-09
http://articles.baltimoresun.com/2002-06-25/news/0206250043_1_bike-safety-streets-and-roads-ride-their-bikes
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00464-ip-10-171-10-108.ec2.internal.warc.gz
en
0.948899
1,138
2.609375
3