text
stringlengths
198
621k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
15
1.73k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
49
160k
score
float64
2.52
5.03
int_score
int64
3
5
One of the central unified field theories of quantum gravity is string theory or superstring theory, where spacetime is conceived of as an ambiguous ecology. In string theory, the known universe is thought to be part of a larger wilderness of universes, the multiverse, which is comprised of multiple and perhaps infinite dimensions of space and time that are created by collisions between subatomic, vibrating membranes of energy known as open and closed strings. The theory defines the evolution of space and matter from the connections between these vibrating membranes of energy. String theorists aim to reconcile quantum mechanics and relativity into a single description of physical reality that is often referred to in contemporary physics as a Theory of Everything. Upon reading Christine Wertheim’s mUtter-bAbel (Counterpath Books, 2014), where Wertheim tells the “story of language and some bodies of the word made flesh in a child’s imagination” through visual poems often highlighting the letter “o” that sonically treat words as “vocal organs,” I thought about the open and closed strings in string theory and wondered if the author was—consciously or without intent—responding to the colliding, subatomic, vibrating membranes of energy that string theorists think create the multiple dimensions of the multiverse. The author and her book, after all, are a part of the ecology of the multiverse, so it makes sense that they might be responding to their environment; eco-poetics, in the context of the multiverse, includes everything, and what we mean by nature is just a matter of scale. In mUtter-bAbel, the letter “o” is positioned as a visual and semantic analysis of breaths, openings, orgasms, nothings, somethings, tongues, noises, mothers, words, modernity, holes, howls, mouths, and more. An image I took of a page from Christine Wertheim’s mUtter-bAbel. The overtly political sections of mUtter-bAbel address, among other issues, the human movement across the U.S.-Mexican border through visual and semantic depictions of outrage for conditions endured by the poor in Mexico. Here I am reminded of the way that universes in string theory are bordered by branes, the points upon which open and closed strings are situated. Or is that brain? Does the multiverse express homophones of the body and the body politic simultaneously at conceptual and physical scales? Poetry can bring the attention of its readers and writers to multidimensionality in not only ethical but physical reality, and it is through the latter that I consider derek beaulieu’s visual poem, “Flatland: A Romance of Many Dimensions,” anthologized in Against Expression (eds. Craig Dworkin and Kenneth Goldsmith, Northwestern University Press, 2011) and presented in his selected poems, Please, No More Poetry: The Poetry of derek beaulieu (Wilifred Laurier University Press, 2013). “Flatland: A Romance of Many Dimensions” procedurally uses Edwin Abbott Abbott’s novel, Flatland: A Romance of Many Dimensions, where characters are geometric shapes in a two-dimensional world, to make a visual poem that enacts the vast variability of spacetime. A page from derek beaulieu’s “Flatland: A Romance in Many Dimensions,” courtesy of derek beaulieu. In Against Expression, beaulieu explains his process: I began by photocopying each page…I then identified each unique letter on the first line of each page, and traced a line—using a light-table, ink and a rule—from the first occurrence of each letter on the first line through the first appearance of each of those same letters on each subsequent line….By reducing reading and language into paragrammatical statistical analysis, content is subsumed into graphical representation of how language covers a page. If one thinks of the page as a two-dimensional representation of the universe and a poem on a page as a three-dimensional representation of the multiverse, beaulieu’s “Flatland: A Romance of Many Dimensions,” with its process taken into account, is a geographical representation of hyperdimensions. The poem demonstrates how poetry can exist as a quantum superposition of distinct versions of spacetime from the two to four dimensional world of Abbott’s novel to the physically reduced but theoretically expanded dimensions of beaulieu’s visual and statistical translation, creating a post-fourth dimension forged by poetic procedure. The editors of Against Expression touch on this: By peeling back the letterist layer of the page, Beaulieu reveals another dimension of the life of a text, mirroring Abbot[t]’s wish to make visible the fourth dimension in his own work. In physics, the fourth dimension is where the three dimensions of space meet time, but in string theory, at least eleven dimensions are possible, and spacetime itself is reconceived. How dimensions beyond four operate in physics is a question of string theory, and, while the fourth dimension has been a subject of or catalyst for literature, I am especially interested in, within this contemporary moment where string theorists like Brian Greene are talking about scientists mapping hundreds of dimensions, poems that engage in post-fourth dimensional expressions of spacetime such as beaulieu’s “Flatland: A Romance of Many Dimensions.” From the vantage of quantum poetics, poems like beaulieu’s suggest to me that we are not in a post or double-post postmodernism but something else entirely where chronological markers such as post and pre, like history and linear time itself, have no meaning. In a multiverse of multiple and perhaps infinite dimensions of spacetime—where in some dimensions literature, language, and humans exist—the very notion of linearity, which relies on the outdated idea that time moves like an arrow through a past, present, and future, is as one dimensional as one of the drawn lines in beaulieu’s multidimensional poem. Aspects of string theory are being tested by contemporary physicists in high-energy particle accelerators such as the Large Hadron Collider at CERN in Switzerland, built in an underground tunnel spanning 17 miles. Jennifer K. Dick’s book-in-progress, CERN 200, humorously and philosophically explores science. This is “CERN 43,” where the meta “subsubatomic” is at play, courtesy of Cordite Poetry Review: I dreamt the firewall debate only engendered slews of new language until the O.E.D. could no longer keep up with the scientific lingo being born daily, hourly, by the minute and second. Subsubatomic particles beyond Leptons, neutrinos, the Higgs Bosons, Cherenkov detectors and particulates of spooky matter meant to be quantum post-post pre-octanic subor or postorganic space rooting in the rayites of bits of bundles of blotchers needing names for whatever that green goo was or could be a line crossing an advanced version of a nuclear electroinstascope—but then even those words were brought into doubts by SoupCanning Maldacena theories of particulate redirections. Translators, linguists and theorists alike were collapsing from exhaustion, servers and backup generators were being fried, bundles of wires in and out of cerebral cortexes were called into question until there was nothing left to do but unplug it all, go dark, pause, wait, sleep. I see these poems by Wertheim, beaulieu, and Dick as examples of U+F+O+L+A+N+G+U+A+G+E, unidentified flying objects that are traveling through initially unfamiliar territory, objects that travel as ships in the mind—and the mind is part of the physical ecology of spacetime in the multiverse—by way of warp drive where it is not the objects that move but the spacetime around the objects. As seen in Maria Damon’s textile poems, where she weaves and cross-stitches visual poems by opening and closing strings of yarn, these objects can take any form. And as suggested by Damon’s new visual textile poem, “Poetics as a Theory of Everything,” which Damon made to serve as the cover image for Ira Livingston’s forthcoming book of the same name on poetry, complexity, systems theory, and emergence, what poetics and everything means is the question.
<urn:uuid:d01cea63-8dea-4760-9e4b-57608ff29580>
CC-MAIN-2016-44
http://jacket2.org/commentary/ufolanguage
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00378-ip-10-171-6-4.ec2.internal.warc.gz
en
0.936033
1,793
2.640625
3
By Megan Gross, Colorado State University Cooperative Extension, Horticulture A nuisance aphid has been covering the leaves of aspen, cottonwood, and willow trees with honeydew this summer. The culprit is the clear winged aspen aphid Chairophorus populifoliae. It tends to peak from late summer through early fall. While this aphid usually doesn't impact the overall health of the tree, the honeydew certainly can be annoying. Clear winged aspen aphids Chairophorus over winters as eggs on its summer host plants, which include various species of aspen, cottonwood and willow. These eggs hatch in the spring and, if environmental conditions are favorable for the aphids (low predator populations, adequate moisture and moderate temperature), they will re-infest the foliage of aspen and cottonwood. To knock down the over-wintering egg population, you can apply an insecticide in late winter or early spring on a day when the temperature is above freezing. A commonly used product is "dormant oil," available at most garden centers and hardware stores. The oil blocks air holes through which insects breathe, causing death by asphyxiation. Oils pose few risks to people or most desirable species, including beneficial natural enemies of aphids, such as lady bugs and green lacewings. This type of oil is applied when plants are dormant during February or March on a day when temperatures are above freezing. Because oils act on contact, adequate coverage is essential for good control. Spray thoroughly from the branch tips back about 18 inches. This is where aphids overwinter. Always read and follow label instructions, where you will find more detailed information about how to apply the product. Another oil based insecticide, horticulture oil, can be applied during the growing season on aphids that are out in the open, not curled up in leaves. Photographs courtesy of Megan Gross. © CSU/Denver County Extension Master Gardener 2010 888 E. Iliff Avenue, Denver, CO 80210 Date last revised: 01/05/2010
<urn:uuid:49399f19-d56f-47bd-b527-a6030dd4fe3b>
CC-MAIN-2016-44
http://www.colostate.edu/Depts/CoopExt/4DMG/Pests/aspenaph.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718309.70/warc/CC-MAIN-20161020183838-00064-ip-10-171-6-4.ec2.internal.warc.gz
en
0.915054
434
2.609375
3
FRIDAY, July 17, 2015 (HealthDay News) -- Facial wrinkles -- such as so-called "laugh lines" or "crow's feet" -- are the bane of many aging adults. Now, new research on cadavers may offer some insight into why some skin creases are more pronounced than others. Differences in oil-secreting glands just below the skin may help explain why forehead wrinkles are shallower than wrinkles around the outer eye, according to a research team led by Yuichi Tamatsu, of Kagoshima University Graduate School of Medical and Dental Sciences in Japan. Sebaceous glands are "microscopic glands that secrete sebum, an oily or waxy material, which lubricates the skin and protects it from water damage," said Dr. Nitin Chauhan, a facial plastic and reconstructive surgeon and otolaryngologist at the University of Toronto. Chauhan, who was not part of the new research, said that based on the study findings, it appears that wrinkles in the face tend to be deeper where sebaceous glands are less concentrated -- namely, the outer corners of the eyes. Chauhan also said evidence of a gland-wrinkle skin connection appeared to be confined to the top half of the face. The study results were published in the July 1 online edition of Clinical Anatomy. To explore factors related to facial wrinkling, the researchers examined wrinkle depth, gland density, and dermal skin density in forehead and eye region skin samples from 58 Japanese cadavers. The ages represented ranged from 20s to 90s. The research team concluded that the more sebaceous glands present under the forehead-region skin, the shallower the wrinkles. A lack of sebaceous glands around the outer corners of the eyes could explain why wrinkles in that area tend to be deeper than forehead creases, the researchers said. The investigators also observed that greater gland density was associated with a thicker dermal skin layer -- the second layer of skin, which lies below the sweat glands and hair follicles contained in the outer epidermis. While the researchers said they hoped their work might ultimately pave the way for anti-wrinkle treatment development, they acknowledged that many factors in addition to gland density probably play a role in wrinkle-depth variations. Also, the study authors cautioned that because their effort focused exclusively on Japanese skin, "it remains unknown whether lighter or darker types of skin would show similar tendencies." Ashani Weeraratna, an assistant professor in the molecular and cellular oncogenesis program at the Wistar Institute in Philadelphia, agreed with that reservation. While "extremely interesting," the study focuses only on tissue from embalmed cadavers "from one race of people," she said. "There is a wide range of wrinkling seen among races, where certain races generally have less wrinkling than others, so it is hard to imagine that [gland] differences can fully account for that," Weeraratna said. Chauhan, meanwhile, suggested that while the study findings do not break any new ground in the science behind skin health, they were generally "in keeping with expectations based on facial aging patterns." But for the time-being, he said, those genuinely interested in reducing wrinkle-risk should focus their energies on improving lifestyle habits. "Hydration is key," he said. Drinking plenty of fluids "is critical to skin metabolism, toxin processing, nutrient delivery and maintaining skin [elasticity]." Chauhan also said that sun protection, a healthy diet, regular exercise and good sleep are all "important components in ensuring optimal skin metabolism, which manifests in attractive skin." The American Academy of Dermatology has more about healthy skin care habits.
<urn:uuid:a0813fe7-f231-4963-a112-d14e869df0df>
CC-MAIN-2020-05
https://consumer.healthday.com/senior-citizen-information-31/misc-aging-news-10/why-skin-wrinkles-more-around-the-eyes-701333.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593937.27/warc/CC-MAIN-20200118193018-20200118221018-00000.warc.gz
en
0.951762
779
2.5625
3
Did YOU know sweetcorn could be making you gain weight? It's a time-old tale that eating fruit and vegetables is good for you - it can help boost your immune system and stave off cravings for fatty foods. But who knew some fruit and veg can actually stop you losing weight? A study by the Harvard School of Public Health has revealed the truth behind handful of 'healthy foods'. Talk about a wolf in sheep's clothing, it would seem sweetcorn is the worst offenders - with people who added an extra portion of the golden kernels to their diet gaining, on average, 2.4lbs. Next on the hit list is everyone's favourite Sunday dinner accompaniment: peas. The little green treats made testers gain a whopping 1.13lbs when added to their diet every day, it's been claimed. Cauliflowers are one of the worst vegetables for making you gain weight We all know potatoes are starchy carbohydrates - and should probably be looked at as a treat - and Harvard's study backs this up. Cabbage, onions and peaches made up the next on the list to avoid eating too regularly. The Harvard School of Public Health analysis detailed the dietary information provided by more than 130,000 American men and women to come to these conclusions. Every four year - for up to a whopping 24 years - the subjects answered questions about how often they ate 131 different foods, were weighed regularly and handed over information about smoking, exercise, TV watching and other aspects of their lifestyle. Cabbage, onions and peaches are all on the list of 'bad' fruit and veg At the other end of the scale we have some incredibly hard-working fruit and vege, not only good for you but helping to shift those pounds. Blueberries are the best of the best, with Harvard claiming those who added them to their diet lost on average 1.38lbs. Next up Cauliflower then prunes and finally pears - all great for health, fitness and weight loss. Next time you're pushing a trolley down the fruit and vegetable isle of your local supermarket, it might be worth keeping this study in mind.
<urn:uuid:c3083f40-18ac-4e43-a648-8689383d73f1>
CC-MAIN-2019-09
https://www.express.co.uk/life-style/diets/607586/Fruit-vegetables-fat-body-calories-potatoes-sweetcorn
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247499009.48/warc/CC-MAIN-20190221031117-20190221053117-00444.warc.gz
en
0.964243
448
2.5625
3
Catiline (ca. 108-62 B.C.), or Lucius Sergius Catilina, was a Roman politician and revolutionary. Cicero blocked his attempt to overthrow the government in 63 B.C. Although Catiline traced his patrician lineage to Sergestus, a companion of Aeneas, no member of the family had held the consulship in Rome for several generations. His early life and career are shrouded in obscurity and misrepresentation. He may have served as military tribune in the Social War in 89 B.C. When Sulla returned to Rome in 83, Catiline joined him. Catiline held the praetorship in 68 B.C. For the next 2 years he served as governor of Africa. When he returned to Rome in 66, he attempted to run for the consulship, but his candidacy was refused because he was under indictment for extortion in his province. Acquitted of extortion in 65 and of the charge of murder during the proscriptions in 64, Catiline ran for the consulship of 63 with financial support from M. Licinius Crassus. But senatorial leaders rallied behind Cicero, and Catiline lost. He campaigned again in 63, making a broad appeal on a platform of cancellation of debts. Again he failed because of the opposition of Cicero and heavy bribery by his senatorial competitors. Disappointed and disgruntled, Catiline turned to revolution. With a small group of senatorial backbenchers and equestrians, he made plans to recruit an army in Etruria, march on Rome, and take control of the state after murdering Cicero and other leading senators. Cicero learned of the plot from one of the conspirators and obtained concrete evidence of it from Crassus. On Oct. 21, 63 B.C., Cicero exposed Catiline's plans in the Senate, which declared a state of emergency and voted Cicero full power to deal with the conspiracy; his defensive measures in Rome and elsewhere in Italy foiled Catiline's plans on October 27. On November 7 Cicero denounced Catiline in the Senate in the first of his four Catilinarian orations. Catiline promptly left Rome to join his troops in Etruria. Early in December, Cicero arrested four of the conspirators left in Rome, and they were put to death on his orders. This action broke the back of the conspiracy. In January 62 B.C., two senatorial armies trapped Catiline at Pistoria in northern Etruria as he tried to flee to Gaul, and he died fighting at the head of his troops. Though ambitious for power, Catiline saw himself as the champion of the poor and oppressed against an entrenched and unresponsive oligarchy. His economic program attracted small landholders in many parts of Italy, especially Etruria, who had been ruined in the Sullan confiscations. Further Reading on Catiline Ancient sources on Catiline include Cicero, Plutarch, and Sallust. E.G. Hardy, The Catiline Conspiracy in Its Context (1924), and Arthur Kaplan, Catiline: The Man and His Role in the Roman Revolution (1968), offer good analyses of the problems connected with the conspiracy. Lester Hutchinson, The Conspiracy of Catiline (1966), is a well-written but uncritical account of Catiline's life. Additional Biography Sources Beesly, Edward Spencer, Catiline, Clodius, and Tiberius, Tustin, Calif.: American Reprint Service, 1985. Zullino, Pietro, Catilina, Milano: Rizzoli, 1985.
<urn:uuid:7a3a0724-51f6-43c3-81cf-989f1ba4c080>
CC-MAIN-2017-09
http://biography.yourdictionary.com/catiline
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172404.62/warc/CC-MAIN-20170219104612-00046-ip-10-171-10-108.ec2.internal.warc.gz
en
0.966809
769
3.203125
3
The holidays are here…and, with them, the festive dishes that we enjoy. But while holiday meals are something to savor, they also pose a special risk for food contamination. Your unfamiliarity with preparing a turkey might cause you to undercook the meat. Or you might make Christmas dinner with extended family members…who have lower food safety standards than you. When it comes to surviving food contamination this holiday season, knowledge is power. Keep on reading for 7 must-know facts on food contamination… 1. Food Contamination Affects Millions Each Year The first step to avoiding food contamination is recognizing the danger. According to the FDA, each year, there’s an estimated 48 million instances of foodborne illnesses…and an estimated 128,000 hospitalizations and 3,000 deaths. Statistics like these reveal that food poisoning isn’t a third-world problem. It’s a widespread American reality. It’s also important to understand that contamination issues are related to poor farming practices. To avoid these issues, try to eat locally grown food and buy your meat (and other groceries) from farmers in your geographic region. Bottom line: when it comes to the safety of your family, take food contamination seriously. 2. Meat Is a Carrier of Food Contaminants Food contamination happens with both vegetables and animal products. However, for this article, we’re looking at the dangers associated with meats. To see how common it is for meat to pose a risk, just consider news from the last few months… - On November 8, 2018, the CDC stated that a multidrug-resistant Salmonella had ties to raw turkey. - On November 7, 2018, the Minnesota Department of Agriculture released a statement saying that the MDA had discovered Ruck’s Meat Processing had “processed in a manner that could result in possible Listeria contamination.” - On October 30, 2018, the New Mexico Department of Health released information on a ground-beef-related Salmonella outbreak. 3. Many Minimum Internal Temperatures Exceed 145℉ Rare steaks and juicy pork chops might sound appealing. But, while undercooking your meats might increase their flavor, it will also increase your risk of food contamination. And the last thing you want is watching your Christmas guests spend a miserable holiday in bed…or in the hospital. According to Foodsafety.gov, many minimum internal temperatures for meats are 145℉ or more. Here are a few examples: - Cook a whole turkey to 165℉. - Cook fresh pork to 145℉. - Cook ground pork to 160℉. - Cook steaks to 145℉. You can view Foodsafety.gov’s entire minimum internal temperature chart here. 4. Cross-Contamination Can Defeat the Goal of Proper Cooking As you can see, a big goal of properly cooking your meat is avoiding food contamination. But, if you cross-contaminate your food, you might undo all your careful efforts. The reality is, cross-contaminating pathogens from meat to the rest of your kitchen is far too easy. Here are some ways this might happen: - You use a knife to cut raw meat…then you put that knife on your clean counter. - You prepare raw turkey…then you turn on your oven without washing your hands. - You place raw meat in the sink to wash it…then you place your vegetables in the same spot without sanitizing the surface first. This holiday season, wash your hands and any surfaces after they touch any raw meat—each and every time. 5. Some Meats Require a Rest Time Foodsafety.gov indicates that some meats require a rest time after the initial cooking—including steaks, veal roasts, fresh ham, and more. The organization explains that… “During the rest time, [a meat’s] temperature remains constant or continues to rise, which destroys harmful germs.” All that to say, do your research on the meat you’ll prepare. And, if needed, allow extra time for the meat to rest—no matter how busy your holiday preparations get. 6. Don’t Leave Meat Out for an Extended Time Long conversations around the dinner table. Outdoor family football games. An impromptu decision to go for a holiday drive. When the holidays are in full swing, it’s easy to get distracted. While it’s fine to enjoy this time with friends and family, don’t forget about your meat. According to Foodsafety.gov, you should refrigerate your meat within two hours. Otherwise, you’ll risk illnesses from food contamination. 7. If Food Sat Out Too Long, Throw It Away Heat kills germs. But if your food sat out too long, don’t depend on boiling that soup or making that turkey sizzle to avoid food contamination. The Washington State Department of Health states that it’s a myth to think that reheating food (that was left unrefrigerated for more than two hours) is acceptable. As the Department explains… “Some bacteria, such as staphylococcus (staph) and Bacillus cereus, produce toxins not destroyed by high cooking temperatures.” Play it safe, and dispose of the food. It’s simply not worth a trip to the hospital or days of sickness. While food contamination is a real danger for the holidays, it’s not your only risk. Cold and flu viruses can also place a damper on your festivities.
<urn:uuid:c3a0538e-2fab-4fa9-9dc4-ae5988af973d>
CC-MAIN-2021-43
https://carolinasnaturalhealth.com/food-contamination-surviving-holidays/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588113.25/warc/CC-MAIN-20211027084718-20211027114718-00555.warc.gz
en
0.914774
1,194
3.25
3
Jakabfalva (Iacobeni, Iacășdorf, Jakobsdorf bei Agnetheln, Saxon: Giukesdref) is a very nice village in Transylvania, Romania. It is halfway between Nagyszeben (Sibiu) and Segesvár (Sighisoara), in the valley of the River Hortobágy. The Saxon priest called Miklós of Jakabfalva was mentioned in a document in 1309 but the first church had most likely been there a hundred years before that in the 12th century when the Saxons settled there. We can see a few remains of this early church in the southern wall: a tabernacle, a stone threshold, and some parts of the chancel’s arches. Priest Miklós is presumed to have built the new church on the place of the earlier one and consecrated it to Saint Jakab (Jacob). It was a towerless church in Gothic style, with a flat ceiling and an ogival triumphal arch, and a multi-angled cross-vaulting covered shrine. A late-Gothic-style net of the vault was built above the nave at the end of the 15th century. The church was fortified around the first years of the 16th century, a great tower was built for defensive purposes on the western side. Further towers and walls were built with ramparts and loopholes. In addition to it, a square-shaped castle wall surrounds the church with double loopholes. The walls can boast a gate tower on the northern side and with another tower in the south-eastern corner. The latter’s paint has remained in good condition on the outside and we can read the number “1547” written on it. There is a reinforced building on the north-western side of the fortified church which served as a storage house for food. It had two levels, with loopholes. There was one more tower standing in the south-eastern corner but it was pulled down. The tower gate used to be defended by a set of draw-bars and an extra fore-yard was created before it which was also defended by a wall. According to a document from 1488, Jakabfalva, named after its patron saint, was the second-largest village beside Szentágota in the District of Nagysink. This list says there were 75 families owning a house and 3 families were called poor people; there were a mill and a school as well as four “deserted” households. Until the 1930s more than half of the inhabitants had been Saxons. Many of them left the place around 1990 and according to the data of 2002, there were 2,100 Romanian, 505 Roma (Gipsy), and 52 German people. You can watch this video and enjoy it about the village and the church if you can speak German: If you like my writings, please feel free to support me with a coffee here: This article contains Amazon ads. By purchasing through these links, you can help my work at no added cost to you. Thank you! My work can also be followed and supported on Patreon: Here are more pictures of Jakabfalva:The gallery was not found!
<urn:uuid:a716651c-ace7-417a-b2a0-6424c93e0512>
CC-MAIN-2021-43
https://www.hungarianottomanwars.com/transylvania/jakabfalva/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585322.63/warc/CC-MAIN-20211020152307-20211020182307-00008.warc.gz
en
0.982994
688
2.703125
3
|Subject Area||World History / Advanced World History| |Week #||April 13-17 2020| |Unit of Instruction||Ancient Rome| SS.6.W.3.9- Explain the impact of the Punic Wars on the development of the Roman SS.6.W.3.8- Determine the impact of significant figures associated with ancient Rome. |Learning Targets and Learning Criteria| Students will work in their interactive notebooks and complete from Republic to Empire- Chapter 34 (Lesson 34 in Interactive Notebooks will be completed) Students will watch video clips, complete important notes and work with partners to understand why the Punic Wars took place and how they led to the Roman Empire. Interactive Notebook Lesson 33 ALL IEP and ESOL accommodations will be provided daily. When a student is absent, it is their responsibility to check the absent files in class and copy notes from a peer. Students will have the number of days absent to complete missing work. If you need any assignments emailed, please contact me at [email protected]. Please check remind for weekly updates @6hisivhawn
<urn:uuid:95de1639-1912-4c05-9fe8-0504f2eae19a>
CC-MAIN-2020-10
http://ivyhawnschool.org/classroom-connect/sixth-grade/smith-k/q4-w5-2019/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141653.66/warc/CC-MAIN-20200217030027-20200217060027-00542.warc.gz
en
0.837777
245
3.859375
4
The benefits of reading stories to our children at nighttime have been shared countless times over, and for good reason. Reading improves literacy skills. Why is it that we don't do math with our children before bed? Math Before Bed is a collection of prompts that can inspire mathematical discussions that you and your children can have before bed, at dinner, or anytime. Each page in this book shows you and your child a perplexing problem. Sometimes there is one right answer and sometimes there are many right answers The purpose of each question is to generate a discussion about HOW you determined an answer. If you find one answer, try to find another.You could complete one page a night, or many pages. Visit MathBeforeBed.com to learn more.
<urn:uuid:415859a2-4a2a-4208-ac8b-7e6dbd1d0672>
CC-MAIN-2017-51
http://mrorr-isageek.com/math-before-bed/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948530668.28/warc/CC-MAIN-20171213182224-20171213202224-00204.warc.gz
en
0.958153
151
3.640625
4
Well, it seems that most people reading this blog cannot wait to get out into the Solar System and further out into Space - as quick as we can. Being of very much of the same frame of mind, I find it hard to think of reasons why we don't go - but I'll get to that. First I'd like to start with the sunny side of the equation. Why should we boldly venture forth? Going out into nearby space, say the Moon and Mars, can teach us so much about our own planet, or even the origins of life. Understanding why Mars has a thin atmosphere and is relatively cold, as apposed to why Venus has enough atmospheric pressure to crack stainless steel nuts and has pretty raindrops composed of super-heated sulphuric acid could tell us a lot about how to manage our own world. Then there is the technology. Without the moonrace we would probably still be using slide rules. The integrated circuit - among dozens of other critical technologies - were spin-offs from that rapid technological advancement. How much of our current economy depends on these new innovations and discoveries? What about survival of the species? How long before we get the one-in-one-hundred-million year asteroid that wipes the ecological slate back to little scurrying creatures? Do we really want the descendants of the cockroaches to fill all the ecological niches? No fair! Come on! We have to get off this rock! Exploration has always had tremendous benefits for society: accessing new resources, opening up new horizons. Even giving persecuted minorities the chance to carve out their own future. At one time modern democracy was a political experiment created in the heady atmosphere of a new frontier. What new cultural experiments might be possible in the vast frontiers of Space? Don't we owe it to future generations to be the ones who start the glorious second Age of Exploration? OK. Now for the other side. . . Can we really justify spending billions of dollars to hurl a few hundred kilograms out of orbit when the world is falling apart? What about the Great Ape? The White Rhino? The Dwindling Rainforests? The rapid heating of the atmosphere? How can we ignore what is happening right here on Earth: the starving millions, the failing ecosystems? How long can we go on before the lights go out right where we live? Is retrieving a few kilograms of rock from some cranny on Mars at the cost of half a billion dollars really worth the death of one starving child? Do we really need to know the composition of lunar regolith? Can't people see that this is nothing more than a distraction perpetrated by the political elite to take people's attention from the real issues by dangling shiny new toys? What about providing clean drinking water and education for the other three-quarters of the planet instead? Don't we owe it to our descendants to get our own house in order before we start building new ones in orbit? Won't reaching for the stars now just perpetuate the same imbalance and inequality somewhere else? OK. So what do you think? If there is anyone reading who thinks we should not go? Please tell us why. Who thinks the moon landing was a hoax? PS: Anyone looking for a laugh could also cast an eye over the 10 movie reasons not to go into space. Featuring everything from energy-sucking space vampires to the ever-present threat of the astronaut's wife getting some sort of automaton back from orbit that is under the control of an evil many-tentacled space-entity:)
<urn:uuid:6fc4b579-db42-4086-92dc-a401c462dd12>
CC-MAIN-2016-50
http://madgeniusclub.blogspot.com/2010/11/flying-coop.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542686.84/warc/CC-MAIN-20161202170902-00225-ip-10-31-129-80.ec2.internal.warc.gz
en
0.94681
733
2.671875
3
Forum : “Are we prepared for Natural Disasters ? The Department of Geography organized a Forum on “Are We Prepared for Natural Disasters ?” on 14th June 2016, at the M. B. Ariyapala Auditorium, Faculty of Arts, from 1.00 pm to 4.30 pm, in collaboration with the Land Division of the Ministry of Environment. The theme of this Forum was “Are the professionals ready to face the challenges that emerge from the Disasters in Sri Lanka”. The main objective of this forum was to find an answer for the question raised by the general public. What is the role and the solutions University Academics, Professionals, and Planners can propose for such phenomenon ? |Mr. R.M.S. Bandara, Head, Landslide Research and Risk Management Division, National Building Research Organization||Landslides; where we are? and where to go?| |Mr. S. Premalal, Director, Research Training and Development, Meteorology Department||Climate change and extreme events| |Sri Lanka Land Reclamation and Development Corporation||Colombo catchment; today and tomorrow| was followed by a Panel Discussion. - University of Colombo - Environment Ministry - National Building Research Organization - Meteorology Department - Urban Development Authority - Land Use Policy Planning Department - Disaster Management Center
<urn:uuid:a7efe55f-da52-4afd-a44d-60a01ef1815e>
CC-MAIN-2020-40
https://cmb.ac.lk/forum-prepared-natural-disasters/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400202418.22/warc/CC-MAIN-20200929154729-20200929184729-00219.warc.gz
en
0.881204
293
2.515625
3
GRAND RAPIDS, Mich. — President Barack Obama wants to limit the number of students expelled every year from high schools. He believes the rates of suspensions and expulsions are racially biased, arbitrary and ineffective. “Although African-American students represent 15 percent of students in the CRDC, they make up 35 percent of students suspended once, 44 percent of those suspended more than once, and 36 percent of students expelled,” writes the Education Department. “Further, over 50 percent of students who were involved in school-related arrests or referred to law enforcement are Hispanic or African-American.” So the administration sent to educational leaders a Dear Colleague guidance letter on civil rights and discipline. To close the racial gap, he said, go easy with the zero-tolerance policies. Predictably, the ed-reform types, rending their garments and gnashing their teeth, see this is as a disastrous stripping of school autonomy. The guidance “would certainly compromise the operation of schools,” according to Richard Epstein, professor of law at New York University. Some critics argue that schools need to sweat the small things — uniform violations, smoking, tardiness and singing — if they want to create a positive school culture in which students and teachers are focused on learning. For the sake of those who are focused on learning, those who aren’t ready must be forced to leave. Epstein adds that schools with zero-tolerance policies offer “no taint of any purported civil-rights violation.” And he’s right when he says, “Disproportionate rates should not be regarded as unjustified merely because they reflect higher rates of improper behavior by minority students than by white students.” Expulsions are easily justified and aren’t inherently racist. More importantly, they can be a very effective way to increase learning outcomes. In fact, the complainers are right: Obama’s plan has a major flaw. But curbing the option to expel students is not it. The trouble is his rationale. The real reason to stop expulsions is that, in the noble cause of closing the black-white achievement gap, schools are insidiously giving up on black children by expelling those who are considered not ready to learn. Although zero-tolerance expulsions myopically help the school and the majority of students in it, they destroy the student — and, ultimately, the community, too. Zero-tolerance policies have many allies. Parents are often the most ardent supporters. (If a kid injured your son or daughter, you’d want expulsion, too.) Moreover, teachers and principals will tell you that ridding the school of disruptive behaviors accelerates achievement for the overwhelming majority of its students. Educational leaders embrace no-tolerance policies on the ground that they provide the greatest good for the greatest number. The trouble is that when students are out of school, they’re still learning — just not the things society wants them to. Many districts don’t require that suspended and expelled students receive homework support or tutoring, so they fall further behind their peers. In addition, expelled students abandon activities that lead to college and take up activities that lead to prison. Expulsion also correlates with court involvement. (A modest proposal: Whenever a young person sees a judge, he or she should be accompanied by the principal of the last school attended.) This is why a suspension for infractions such as chewing gum, not wearing a uniform correctly or even fighting hurts the larger goal of meeting the child’s needs. And what happens to expelled children can have large consequences on the entire community. Schools are contributing to the explosion of young adults who are not working or in school in major cities. New Orleans, where I worked, provides an example of a city already in a bad way. According to “Building an Inclusive, High-Skill Workforce for New Orleans’ Next Economy,” a report from the Greater New Orleans Data Center, 14,000 youths ages 16 to 24 in the New Orleans metro are neither enrolled in school nor employed. This is a terrible enough social trend that we should fight in every way we can to reverse, rather than letting schools exacerbate it. Here’s some perspective for that number: 14,000 exceeds the number of registered students at Tulane or the University of New Orleans. It’s a greater number than the combined enrollments of Loyola, Dillard and Xavier universities. Fourteen thousand youths is about one-third the number of students who attend public schools in Orleans Parish. The number is about 4,000 seats shy of a full house at a Pelicans game. If a company hired 14,000 youths, it would be the largest employer in the city. Although expulsion isn’t the only cause of these numbers, it certainly doesn’t help. At some point, institutions must do the very hard work of educating children with extraordinary challenges. The goal has to be to keep children in school. Kudos to the Recovery School District of New Orleans for being proactive in creating a uniform expulsion policy that is in line with Obama’s goal but for also recognizing the community need for curbing expulsions. That doesn’t mean Obama’s conceit is flawless. It is important for schools to be able to credibly threaten reprisals for the malcontents. Some behaviors do warrant out-of-school time: Weapons and schools don’t mix. Fighting may require separating a child from the school to assess and calm a situation. But schools are great places to instill character, critical thinking and ethical decision making. They may be the best places to safely resolve conflicts. Obama is right to want to keep kids in school. The policy addresses a significant systemic problem — the fact that schools abdicate the responsibility to educate the most challenging students, handing that power instead to the streets, the criminal justice system or parents who we should assume are not good educators or disciplinarians. The problem with the guidance is that the data the administration puts forth about discrimination and disparate impact neither support the charge nor address the deeper issues head on. Then again, neither do Obama’s critics. The achievement gap for black children is not a sufficient reason to push underperformers out. (It’s no better, and no less preposterous, than another path to close the gap: stop educating white people.) If schools don’t have everything they need to instill positive behaviors in their toughest kids, then let’s find the resources and staff for them to do it. Instead of lobbying for more disciplinary autonomy for schools, let’s petition for wrap-around services, restructured in-school suspensions, conflict mediation, restorative justice programs, parenting courses, out-of school behavioral services or a host of other interventions that address the problem. Just as long as we keep the kids in school. Andre Perry is the founding dean of urban education at Davenport University in Grand Rapids, Mich. He is the author of “The Garden Path: The Miseducation of a City.”
<urn:uuid:8901e5d4-8097-41b9-a644-6da04f0551af>
CC-MAIN-2015-35
http://www2.tbo.com/list/news-opinion-commentary/zero-tolerance-policies-are-destroying-the-lives-of-black-children-20140713/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645167576.40/warc/CC-MAIN-20150827031247-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.953624
1,479
2.921875
3
Joined: Nov. 2006 |Quote (Patrick Caldon @ July 28 2007,05:48)| European grey wolves are grey (hence the "grey" in the name). Thylacines (tasmanian tigers) were brown with stripes (hence the "tiger"). Those stripes on marsupial wolfs are another puzzle. The same stripes has African Zebra druiker living in Africa. See here: Now the explanation is that they inhabit "similar types of habitat". I would say that black and white swans also inhabit the same types of habitat (they are the one species) but in this case the habitat excercises different selective pressure to coloration. In the first case the same habitat led to almost same stripe patterns on thylacine/druiker, in the second case the same habitat led to white or black coloration of swans. Trust me, having been to been to both Europe and Australia that the climates, flora and fauna, and geography are quite different in both regions. For instance, it snows in a goodly portion of the white swan's European range, which was covered in glaciers 10,000 years ago. It does not snow in much of Australia, and we don't have glaciers. But swans need liquid water to live on. Maybe you would like introduce arctic habitat where white coloration may have a cryptic function. Another explanation is that in Europe is/was warmer weather than in Australia and white color has advantage to be not overheated (we know a lot of white mushrooms and I hit on such explanation). So explanation can be different, due winter or hot sun and it is only a matter of belief if you accept such natural selection explanation or not. Obviously phantasy plays in conceiving such explanations greater role than the reality itself. I'll repeat, I have no idea why they have the colors they do; that does not imply "god did it". It's a several year research project to work out why white swans are white. If you want to fund the study I'm sure I can find someone to do it for you. According Adolf Potmann coloration of species is self-representation "die Selbstdarstellung" of species. If true your research couldn't prove ToE as explanation of coloration in predominant cases of animal coloration. I could not answer, but should maintain my ground.-
<urn:uuid:980a62c5-d517-4005-b2c2-6a420967a408>
CC-MAIN-2016-22
http://www.antievolution.org/cgi-bin/ikonboard/ikonboard.cgi?act=SP;f=14;t=5096;p=69273
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051114647.95/warc/CC-MAIN-20160524005154-00179-ip-10-185-217-139.ec2.internal.warc.gz
en
0.940004
500
3
3
An enzyme called telomerase plays a significant role in aging and most cancers, but until recently many aspects of the enzyme’s structure could not be clearly seen. Now, scientists from UCLA and UC Berkeley have produced images of telomerase in much higher resolution than ever before, giving them major new insights about the enzyme. Their findings, published online today by the journal Science, could ultimately lead to new directions for treating cancer and preventing premature aging. “Many details we could only guess at before, we can now see unambiguously, and we now have an understanding of where the different components of telomerase interact,” said Juli Feigon, a professor of chemistry and biochemistry in the UCLA College and a senior author of the study. “If telomerase were a cat, before we could see its general outline and the location of the limbs, but now we can see the eyes, the whiskers, the tail and the toes.” The research brought together experts in structural biology, biochemistry and biophysics, and a wide range of cutting-edge research techniques. Telomerase’s primary job is to maintain the DNA in telomeres, the structures at the ends of our chromosomes that act like the plastic tips at the ends of shoelaces. When telomerase isn’t active, each time our cells divide, the telomeres get shorter. When that happens, the telomeres eventually become so short that the cells stop dividing or die. On the other hand, cells with abnormally active telomerase can constantly rebuild their protective chromosomal caps and become immortal. Making cells immortal might sound like a promising prospect, but it actually is harmful because DNA errors accumulate over time, which damages cells, said Feigon, who also is a researcher at UCLA’s Molecular Biology Institute and an associate member of the UCLA–Department of Energy Institute of Genomics and Proteomics. Telomerase is particularly active in cancer cells, which helps make them immortal and enables cancer to grow and spread. Scientists believe that controlling the length of telomeres in cancer cells could be a way to prevent them from multiplying. When Feigon began her research on telomerase slightly more than a decade ago, she merely wanted to learn how telomerase works; fighting cancer and slowing the aging process were not even in the back of her mind. “Our research may make those things achievable, even though they were not our goals,” she said. “You never know where basic research will go. When telomerase and telomeres were discovered, no one had any idea what the impact of that research would be. The question was, ‘How are the ends of our chromosomes maintained?’ We knew there had to be some activity in the cell that does that.” Earlier research led by UC San Francisco professor Elizabeth Blackburn revealed that telomerase was responsible for this activity, but the study didn’t connect telomerase to cancer and it provided little information about its structural biology. The research was conducted using tiny, single-celled microorganisms called Tetrahymena thermophila that are commonly found in freshwater ponds. Blackburn won a Nobel Prize in 2009 for the finding. Since then, Feigon and her colleagues have been filling in pieces of the telomerase puzzle, also using Tetrahymena. Their latest study found that the microorganism’s telomerase is more analogous to human telomerase than previously thought. “This is the first time that a whole telomerase directly isolated from its natural workplace has been visualized at a sub-nanometer resolution and all components are identified in the structure,” said Jiansen Jiang, the study’s co-lead author and a UCLA postdoctoral scholar. (A nanometer is equivalent to one billionth of a meter.) Among the new insights the team reported: - Scientists had thought telomerase contains eight sub-units: seven proteins and an RNA. But Feigon and her colleagues discovered two additional proteins, Teb2 and Teb3, that increase telomerase’s activity. “Knowing we were the first people in the world who knew about these new proteins was amazing,” she said. “Days like that are what scientific discovery is all about, and it’s exhilarating.” - Feigon’s research team knew that the RNA strand interacts with the proteins, but not exactly where it interacted. The new study found that within the enzyme’s “catalytic core,” which is formed by the RNA and its partner proteins TERT and p65, the RNA forms a ring around the donut-shaped TERT protein. - Scientists previously knew that telomerase contains three proteins, p75, p45 and p19, but their structures and functions were poorly understood. The new research identified the proteins’ structures and revealed that they are similar to proteins found at human telomeres. - The researchers showed that a key protein called p50 interacts with several components of telomerase, including TERT, Teb1 and p75, and this network of interactions has important implications for telomerase’s function. Feigon knew that the Tetrahymena enzyme’s catalytic core, where the majority of the telomerase activity occurs, was a close analogue to the catalytic core in the human enzyme, but she did not previously know whether the other proteins had human counterparts. “It turns out that nearly all, if not all, of the telomerase proteins in Tetrahymena have similar proteins in humans,” Feigon said. “Now we can use our model system to learn more about how telomerase interacts at the telomeres.” Feigon and her colleagues are working to fill in even more details of the telomerase puzzle. Their research could lead to the development of pharmaceuticals that target specific sub-units of telomerase and disrupt interactions between proteins. “There is so much potential for treating disease if we understand deeply how telomerase works,” Feigon said. Among the technologies the researchers used to produce the groundbreaking images were UCLA’s cryoelectron microscopes, which are housed in the laboratory of Z. Hong Zhou, director of the Electron Imaging Center for Nanomachines at the California NanoSystems Institute at UCLA and a co-author of the paper. The researchers also used nuclear magnetic resonance spectroscopy, X-ray crystallography, mass spectrometry and biochemical methods. Henry Chan, a UCLA graduate student, was a co-lead author of the paper. Other UCLA co-authors were postdoctoral scholar Darian Cash, former postdoctoral scholar Edward Miracco, staff scientist Rachel Ogorzalek Loo, senior staff scientist Duilio Cascio and graduate student Reid O’Brien Johnson, all of UCLA; and UC Berkeley graduate student Heather Upton. Senior authors were Zhou, UCLA biochemistry professor Joseph Loo and UC Berkeley professor Kathleen Collins. The research was funded by the National Institutes of Health (grants GM048123, GM071940, GM103479, R01GM054198) and the National Science Foundation (grant MCB1022379). - Stuart Wolpert
<urn:uuid:ba1e9c6d-656a-476a-af31-fd332d733b40>
CC-MAIN-2018-13
https://www.healthcanal.com/cancers/67873-scientists-produce-clearest-ever-images-of-enzyme-that-plays-key-roles-in-aging-cancer.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645310.34/warc/CC-MAIN-20180317194447-20180317214447-00166.warc.gz
en
0.951399
1,536
3.4375
3
Where to Start - Polish Letter Writing Guide - This guide is for researchers who do not speak Polish but must write to Poland for genealogical records. It includes a list of sentences you would use in a letter about genealogical records and Polish translations of these sentences. - Jewish Records Indexing-Poland - Searchable database of indices to 19th century Jewish vital records from current and former territories of Poland. - Genealogy & Poland - A guide for researching your family's history dating back to different times and places in contemporary Poland. - Debica (Dembitsa), Poland, The Shtetl - A memorial monument for the Jews who lived and died in the Shtetl Debica (Dembica-Dembitz) near Krakow, Poland. - PolishRoots - PolishRoots covers all areas that were historically part of the Polish Commonwealth, from the 16th through the 18th centuries, throughout the years of partitions by Prussia, Russia, and Austria, through its rebirth in 1918, subsequent domination during World War II and post-War occupation, to its present freedom and struggle for independence through the latter 20th Century.
<urn:uuid:d7d9cbe0-cb1a-4519-91d6-327d9f0e1b51>
CC-MAIN-2014-42
http://www.werelate.org/wiki/Poland_Research_Guide
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119650193.38/warc/CC-MAIN-20141024030050-00315-ip-10-16-133-185.ec2.internal.warc.gz
en
0.934335
240
2.90625
3
Concept testing is the process of evaluating likely customer response to a product idea prior to its introduction into the market. Seen through a jobs-to-be-done lens, the goal of the concept testing process is to validate that a product concept is better than competing solutions at helping customers get a job done. To make this determination, we must know what metrics the customers use to measure the successful execution of the job-to-be-done. Our methods work because they are built around these customer metrics. It is the only concept testing method to use this approach and is an integral step in our innovation process, Outcome-Driven Innovation (ODI). Conjoint analysis, choice modeling, and other concept testing techniques ask customers to make trade-offs between product features or attributes, often in relation to price. They assume that the goal is to reveal the most desirable feature set. This thinking is the cause of many problems and is the myth that misleads. Concept testing is the process of validating that a concept (that has already been conceived) is significantly better at helping customers get a job done. It is not the process of creating the concept: that is ideation. Conjoint analysis and other methods attempt to do both, but they are not effective at either. To validate that a product concept is better than competing solutions, companies must know what metrics its customers use to measure the successful execution of the job-to-be-done. In addition, they must find out how customers evaluate the new concept, using these metrics. Most concept testing methods are not designed to make these determinations. They don’t even include these metrics in the evaluation. Instead, the test involves asking customers to make a series of trade-offs between a small number of features or other attributes to reveal the relative importance of the concept’s component attributes. This thinking is fraught with risk. One risk is that the features being ranked do not address the customers’ top unmet needs. If that’s the case, the test will reveal the winning feature set, but those winning features will still fail to help customers get the job done better, and customers will not value the product or service. Another risk is that the customer will fail to make the connection between their unmet needs and the features being tested, leading to highly inaccurate results. In either case, bad investment decisions will result. We have discovered that customers use between 50 and 150 metrics (desired outcomes) to evaluate how well a product helps them get a job done. These metrics are the customers’ needs. In addition, they use numerous other metrics to evaluate the execution of the related consumption chain jobs, which include acquiring, setting up, learning to use, interfacing with, maintaining, repairing, and replacing the product. Traditional concept testing methods do not provide a qualitative means for capturing these metrics or a quantitative means for ascertaining their relative importance. Our approach does both. Without these insights, accurate concept testing results cannot be achieved. Well before concept testing, we use these same metrics to determine which customer needs are unmet and construct the solution that best addresses them. As a result, this becomes a much simpler task because it requires only that we validate with customers that the proposed solution addresses the unmet needs (customer metrics) as well as we had envisioned. This is a test we are almost certain to pass because our concept has already been designed to be the product or service the customers want. Learn more about our growth strategy consulting services. Turn Customer Input into Innovation In this timeless 2002 Harvard Business Review article, Tony Ulwick first introduces the concept of Outcome-Driven Innovation and the opportunity algorithm to HBR readers. He explains how Cordis Corporation (now a division of Johnson & Johnson) used ODI to create and concept-test ideas that ultimately increased its angioplasty balloon market share from 1 percent to 20 percent. The Customer-Centered Innovation Map In this groundbreaking 2008 Harvard Business Review article, Tony Ulwick and Lance Bettencourt reveal an important discovery they made while turning the jobs-to-be-done innovation theory into practice: job mapping. A job map breaks down the job the customer wants to get done into specific process steps, making it easier to discover the metrics customers use to measure success and bringing superior concept testing within reach. Giving Customers a Fair Hearing In this provocative article in MIT Sloan Management Review, Tony Ulwick reveals how a customer need must be defined within the jobs-to-be-done framework to become a useful input into your innovation process. This article introduces timeless standards for understanding the types of customer needs that exist, how we use them to generate a big idea that creates value for customers, and how to validate the concept with new concept-testing methods. Download the article Ideas-First or Needs-First: What Would Edison Say? In just over 30 years, Thomas Edison, one of the world’s greatest innovators, pioneered six industries that today have a cumulative market value of more than $1 trillion. How did he come up with these big ideas? Learn the answer, and how outcome-driven thinking can help your company grow, from Sarah Miller Caldicott. Download the white paper Silence the Voice of the Customer This white paper by Strategyn founder Tony Ulwick highlights the business advantages of using our ODI methods to capture and prioritize customer needs. It explains why traditional voice-of-the-customer (VOC) practices continue to fail and makes a solid case for retiring VOC both for understanding customer needs and for driving the concept-testing process. Download the white paper What is Outcome-Driven Innovation? Outcome-Driven Innovation (ODI) is the most effective innovation process in existence today. This white paper by Strategyn founder and ODI inventor Tony Ulwick explains why innovation has historically been an ineffective process, the discoveries he made that led to ODI, and how it enables us to come up with the big ideas and validate them through new concept-testing methods. Download the white paper A New Perspective on Strategy The goal of business strategy formulation is to create a unique and valued competitive position. This white paper by Strategyn founder Tony Ulwick offers a different perspective on strategy, explaining why customer needs (not company activities) are the basic unit of competitive analysis. Ulwick also introduces innovation strategies we use to drive company growth and beat competition. Download the white paper What Customers Want What Customers Want, the best seller by innovation thought leader Tony Ulwick, explains what Outcome-Driven Innovation (ODI) is and why it works. Ulwick, who pioneered jobs-to-be-done thinking and invented ODI, details how ODI transforms jobs-to-be-done theory into a practical method for ideation and concept testing that drives big ideas and company growth. Choose from a dozen case studies of companies such as Microsoft, Ingersoll Rand, Bosch, and others, and learn how we apply our ODI methodology to generate big ideas, validate them through new concept testing methods, and help companies grow. 1550 Larimer St, #877 Denver, CO 80202 Copyright ©2022 Strategyn LLC. All Rights Reserved. | XML Sitemap | HTML Sitemap
<urn:uuid:28085ad9-f49b-4734-a47c-c68c2cfa3ab2>
CC-MAIN-2023-14
https://strategyn.com/outcome-driven-innovation-process/concept-testing/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00495.warc.gz
en
0.930758
1,526
2.90625
3
Department, Georgia Southern University Issues of Interest: Georgia salt marshes. Biology of the local sand dollar Mellita isometra and the East coast sea urchin Lytechinus variegatus. Environmental effects, such as effect of fluctuating salinity, algal diet on population structure and reproduction of sand dollars, sea urchins and sea stars. The use of artificial diets for edible sea urchins. Fatty acid composition of the diet and echinoderm larvae. - The effect of salinity and algal diet on larval growth and development of Lytechinus variegatus (East coast species, Pisaster ochraceus, Dendraster excentricus, Dermasterias imbricata, Evasterias troschelii and other seastars (West coast species) - Population structure and distribution of the periwinkle Littoraria irrorata and the use of shells by juvenile fiddler crabs in Georgia’s salt marshes. - Refuges and juvenile fiddler crab size frequency distribution in Georgia’s salt marshes. - Collaborative activities (Brown University and Georgia Southern University) Salt marsh at Tybee Island Georgia, and coastal intertidal areas in Georgia and the Puget Sound region)
<urn:uuid:4ade75f8-9123-4bdc-9701-7d50572cfea8>
CC-MAIN-2014-41
http://www.gcrc.uga.edu/Affiliates/george_sophie.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657129407.88/warc/CC-MAIN-20140914011209-00013-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.78651
266
2.9375
3
Updated on 3 September 2014 Daily consumption of fruit reduced overall mortality rates by 32 percent Singapore: Scientists at the Oxford University, UK, presented a study at the European Society of Cardiology (ESC) Congress, highlighting that daily fruit consumption reduced the risk of heart attacks by 40 percent. The study involved 4,51,681 participants covering 10 areas of China, who were not taking any medication for hypertension. Researchers recorded fruit consumption habits of the participants as never, monthly, 1-3 days per week, 4-6 days per week or daily. The team found that about 18 percent of participants consumed fruits daily and 6.3 percent never consumed any fruits. The average daily fruit consumption was recorded to be 1.5 portions, about 150 g. The findings indicated that the risk of cardiovascular diseases was reduced to 40 percent, in people who recorded daily consumption of fruit. Researchers said that daily consumption of fruit was associated with a 3.4 mm Hg lower systolic blood pressure and a 4.1 mm Hg lower diastolic blood pressure in comparison to fruit abstainers. Researchers also indicated that daily consumption of fruit reduced overall mortality rates by 32 percent.
<urn:uuid:3a65777a-1f02-4eb0-9644-fb595fa092b3>
CC-MAIN-2017-04
http://www.biospectrumasia.com/biospectrum/news/218821/a-fruit-day-heart-attack-away
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282935.68/warc/CC-MAIN-20170116095122-00056-ip-10-171-10-70.ec2.internal.warc.gz
en
0.955844
241
2.671875
3
A 3-year-old lives in the center of a “me” universe, and most of the time it’s pretty darn cute. But if she acts the same way at 23, her “me-centered” outlook might be related to her Facebook behavior — and narcissism is usually not cute. A 2012 study out of Western Illinois University investigated the relationship between two aspects of narcissism — grandiose exhibitionism and entitlement/exploitativeness — and Facebook behavior. Both aspects indicate a person who probably doesn’t work well with others. Those who scored high on a test for grandiose exhibitionism tended to use Facebook for self-promotion, such as frequently updating statuses and posting photos. Those who showed high levels of entitlement/exploitativeness were more likely to react angrily to critical comments and fail to support their friends. In other words, they exhibit antisocial Facebook behaviors. A similar problem involving attention span emerged in a 2013 study from the University of Massachusetts Amherst, which surveyed 6.7 million internet users. Researchers found that viewers tend to abandon online videos if they take more than 2 seconds to load, indicating that as technology moves faster, our patience grows thinner. Effects on the brain It’s not hard to find examples of how technology is negatively affecting millennials, the most digitally connected population in history. Their constant connection to smartphones, laptops, and tablets may cause both short- and long-term health problems. The U.S. Census Bureau says there are now 83.1 million people between the ages of 18 and 34 in the nation. At least one study concluded the average millennial spends up to 18 total hours per day using digital media. Some of that usage is simultaneous. In addition, 90 percent of young adults use social media. That’s up from 12 percent in 2005, the Pew Research Center reports. What does that mean in the long term? Many of the generation’s young minds are still developing. Scientists at the National Institute of Mental Health say the human brain continues to mature until age 25. Although research in brain development among millennials is still new, some medical experts say the brains of people in this generation are physically developing differently because of their almost constant interaction with technology. These changes could have an impact on millennials’ communication skills. Technology use can affect the parts of the brain that control the core of a person’s personality, from how they work in a team down to hand gestures and expressions, according to a story on publicsource.org. “I think it’s very possible” that technology alters the brain, Kirk Erickson, Ph.D., principal investigator of the Brain Aging & Cognition Health Lab at the University of Pittsburgh in Pennsylvania, told Public Source. “But we haven’t yet directly linked these things.” Brain development is not a one-size-fits-all proposition. Texting and surfing the web use different parts of the brain than reading or speaking. Some neuroscientists have targeted which parts of the developing brain are affected by technology use. Researchers at the Chinese Academy of Sciences in Beijing say there are changes in the ways the prefrontal cortex, cerebellum, and parietal lobe mature. The prefrontal cortex, which resides in the frontal lobe, controls personality, cognition, and social behavior. The cerebellum coordinates and regulates muscular activity, including those linked to language. The parietal lobe deals with interpreting language and words. Excessive use of technology, according to leading scientific publications, atrophies the frontal lobe, breaking down ties between different parts of the brain. Too much technology use also shrinks the outermost part of the brain, making it more difficult to process information. Erickson told Public Source this can affect the way people interact. “You might see changes in your ability to regulate emotions, your ability to remember certain events, your ability to pay attention to different things,” he said. “These things all together will certainly affect how you communicate with people.” “Many of the millennials who are either college age or in the workforce are looking at screens constantly,” Dr. Mark Jacquot, vice president, clinical director, and vision care operations at LensCrafters, told Healthline. “Of course, we’re all glued to our phones right now.” Physical wear and tear The long-term effects of heavy technology use are unknown, but millennials are already showing signs of digital wear and tear. Health problems such as neck and back pain, nearsightedness, and difficulty with offline relationships are increasingly common in this generation. According to a study by The Vision Council, which represents the manufacturers and suppliers of the optical industry, more than 60 percent of adults spend five or more hours on electronic devices each day. Nearly 4 in 10 millennials, though, log at least nine hours of screen time every day. “Tech neck” is one of the most noticeable effects of using a cell phone or smartphone for long periods of time. Over time this poor posture can increase wear and tear on the spine. More severe cases could require corrective surgery down the road. Health professionals blame the rise in back problems among young people on the amount of time they spend sitting at a desk — often in front of a computer screen — and not exercising. This kind of sedentary lifestyle can lead to other physical problems as well. “The obvious one is weight gain. You have a lot of increase in weight related to inactivity,” licensed clinical psychologist Lisa Strohman, J.D., Ph.D., founder and director of the Technology Wellness Center, told Healthline. Research has found that internet addiction — such as playing online games for 10 to 12 hours a day — may rewire certain brain structures, as well as cause brain matter to shrink. “There are issues around the amount and intensity of how they’re reacting to things — their emotional regulation,” said Strohman. “That’s something that I see in my 20- or 30-year-olds [clients] now that I had never seen before.” Part of the problem is that over time our moods can become dependent on technology. Playing a game on your smartphone gives you a rush by stimulating the pleasure centers of your brain. But it can easily go the other way, leading to excessive aggression or a loss of interest in your offline life. It’s not all bad Not everybody is aboard the gloom-and-doom express. Heavy technology use might actually help with communication, S. Shyam Sundar, Ph.D., a professor in the Penn State College of Communications, and co-director of the Media Effects Research Laboratory, told Public Source. Sundar said the idea that millennials are bad at picking up emotional cues and can’t talk face-to-face is dated. “I think we’ve come a long way from that,” he said. “In [a] sense, we are actually able to communicate more richly.” Technology lets people constantly keep in touch, he said, regardless of age or geography. “They feel like they’re in the same frequency because of constant communication,” Sundar said. Communication norms may even change with this new generation. Although face-to-face interaction seems to be the “gold standard” among older generations, he said it might not be viable in the future. “Millennials might not even think about face-to-face as the ideal,” Sundar said. “Face-to-face might almost be an inconvenience and somewhat pointless.” This story was originally published on May 4, 2015, and was updated on August 23, 2016.
<urn:uuid:29a2aa32-c31a-44af-a7ca-66b04bd9418e>
CC-MAIN-2018-51
https://www.healthline.com/health-news/is-technology-causing-a-lifetime-of-pain-for-millennials-050415
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828056.99/warc/CC-MAIN-20181217020710-20181217042710-00442.warc.gz
en
0.943199
1,644
3.265625
3
The probability of a safe arrest time is dependent upon the patient’s temperature. At 37C, if CPR or extracorporeal support is not started within 5 minutes, there is a very high probably that resuscitation will not be successful or, if successful, not without significant brain damage. Cooling the patient can greatly increase the probability of safely restoring the patient. Perfusion Theory is an educational platform for the Oxygen Pressure Field Theory (OPFT). August Krogh’s theoretical concept of the oxygen pressure field is explained and then applied to clinical applications in perfusion practice.
<urn:uuid:cad6328e-4c26-43c6-9932-861b85dc3ece>
CC-MAIN-2020-05
https://perfusiontheory.com/oxygen-pressure-field-theory/session-4-breaking-the-reperfusion-barrier-perfusions-21st-century-challenge/22/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251705142.94/warc/CC-MAIN-20200127174507-20200127204507-00403.warc.gz
en
0.891063
121
2.921875
3
We live in a country that throws away 40% of its food, but for many children growing up in low-income households, school meals are their most nutritious and reliable food source. According to a brief from the Food Research and Action Center, “The many reports from teachers and child care providers about the trepidation students feel about going home at the end of the week to empty cupboards and how ravenous they are on Monday morning … suggest that the official data may well understate the depth of childhood food insecurity.” Summer is the worst time for kids who don’t get enough to eat at home. With schools closed, USDA-funded summer programs only feed about one in five poor children. Judy Pasternak, writing for AOL News, says, “The children caught in the gap will likely spend the next few months cadging leftovers from neighbors, chowing down on cheap junk, lining up with their families at food banks that are already overmatched, or simply learning to live with a constant headache, growling stomach and chronic fatigue. When school rolls around again in the fall, they will be less healthy and less ready to learn than their peers.” On July 15th, the House Education and Labor Committee passed the Improving Nutrition for America’s Children Act. In addition to tasking the Department of Agriculture with the development of strict nutrition standards for food in school vending machines and cafeterias, the bill increases the number of children eligible for free or subsidized meals. The bill, which allocates $8 billion over 10 years, still has to get through the House and Senate. Until then, all of us who get enough to eat have a golden opportunity to practice responsibility, caring, and citizenship. What you can do: Find your local food bank here to learn about volunteer opportunities, donation needs, and how you might organize a food drive or volunteer field trip in your area. It may be too late to organize for this summer, but hunger isn’t just a summer problem. You can organize food drives for winter and spring vacations too. You might also consider integrating volunteer and donation work into your curriculum or current service learning programs. For 1st-6th graders: Click here for a craft project in which kids design and hang mobiles that will raise awareness and add some pizzazz to your food drive. For high school students: Check out this video campaign highlighting the issue of food deserts (the lack of fresh, healthy food in urban neighborhoods). These videos were made by teens in Los Angeles, and they might inspire a similar project for high school kids in your area. (For more info on how these students “greened” their food desert, click here.) For the super-energetic and motivated: There’s always the school garden project. School gardens can grow edible food, but they can also help kids develop healthier relationships with food and a greater appreciation of their connection to the Earth and its resources. If you don’t know where to start, check out this site from the horticultural experts at Texas A&M and this one from the Chicago Botanic Garden.
<urn:uuid:189a819f-007b-40b5-a98f-093efa2db4a6>
CC-MAIN-2015-14
http://blog.charactercounts.org/2010/07/27/sixteen-million-american-children-will-go-hungry-this-summer/
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299339.12/warc/CC-MAIN-20150323172139-00227-ip-10-168-14-71.ec2.internal.warc.gz
en
0.954111
649
2.640625
3
Why can’t we feed the ducks and geese any more? The more we study animals, the more we learn. The seemingly harmless, age-old practice of feeding the ducks and geese (usually old bread) has been scientifically proven to be harmful, for many reasons: Human food, especially white bread, is not part of the waterfowls’ natural diet. They eat a variety of grasses and water plants which ensures that they get the nutrients that they need. By filling up on less nutritious food, young goslings are especially vulnerable developmental problems such as malformed wings, which leave them unable to fly. However, even feeding them cracked corn or ground poultry feed causes other problems. Excess food that is left to decay, as well as the increased feces production brought about by overcrowding, causes quite a bit of pollution. In addition to increasing the spread of disease, both to the birds and to humans, nutrient overload in the ponds causes noxious algal blooms, which decrease oxygen content in the water. This can cause large fish kills and also affects other aquatic plants and animals. Many urban ponds have enough space and food for only small populations of waterfowl. Food handouts cause them to gather in numbers larger than the habitat can sustain, which leaves them competing for very limited resources. The overcrowding, competition, and stress of less nutritious food leaves them more vulnerable to diseases such as avian cholera, duck plague, and avian botulism. One infected bird can contaminate the entire water supply and wipe out large portions of the population. Spread of Disease One goose can eat up to 3 pounds of grass each day, with half of that being deposited as feces. Goose feces have been found to carry several human pathogens, including E. coli, campylobacter, Salmonella, and Listeria. When waterfowl make stops along their migration route and discover that there is easy food to be had, they will often delay their migration, or even forego it altogether. Waterfowl that grow accustomed to being fed can become increasingly aggressive towards humans, especially during breeding season. They also lose their fear of dangers that they would normally be wary of, such as cars and airplanes. Keep Wildlife Wild! If you really care about waterfowl, stop feeding them. They don’t understand why feeding is a problem, but you do. You can help out by telling others what you have learned! For more information, see what US Fish and Wildlife has to say about feeding waterfowl. Back to FAQ
<urn:uuid:3e302be4-7418-434c-a8a7-c1e1e2390c1e>
CC-MAIN-2018-09
http://dobbsparknc.weebly.com/geese.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813571.24/warc/CC-MAIN-20180221063956-20180221083956-00556.warc.gz
en
0.964641
535
3.203125
3
Another month has passed in L7 and things have continued to go well. In Spelling we have worked on learning how to spell words that change from a verb to a noun by adding the suffix –ion, focused on words with the prefixes that can add a negative meaning to a word, and looked at different spellings of words with unstressed syllables. Students have then worked both individually and in pairs to complete activities that concrete their understanding of the meaning, usage, and spelling of the words. In Grammar, we’ve been focusing on adverbs and how we can use adverbs to make our writing and speaking more exciting and deep. Students started off by defining what an adverb is, and moved from there to participate in adverb matching activities, successfully practicing how to make adverbs from their adjective counterparts. Students have also participated in activities that required them to create their own sentences or stories using adverbs in a correct manner, paying attention to where the adverb was placed and what verb it described. In Science students have started the unit “Looking at the Universe”. After researching the different planets in our solar system students learned about gravity and our solar system star, the Sun. Students participated in a gravity experiment and looked at how air resistance affects the speed at which items fall to the ground. To solidify this, students watched a video about an experiment where a hammer and a feather were dropped in a vacuum with no atmosphere, observing that they landed on the floor at the exact same time. Students then learned about how Earth moves both in its rotation and revolution, and why this means that we have seasons. Students then looked at the different phases of the Moon and created a moon phase poster together as a class. Lastly students learned about other stars and how they form constellations, moving eventually to look at galaxies and the universe. Students hypothesized over tough questions like whether or not there is other life in the universe and if they think it feasible or not for humans to colonize another planet like Mars. In Social Studies students looked at the varied and complicated factors that caused the outbreak of the American Revolution such as the Sugar and Currency Act and the Stamp Act. They were able to take on both the perspective of the colonists and the British by looking at historical documents from the time such as newspapers and letters. They were then introduced to the Committees of Congress that were set up by the colonists as a way to communicate between the colonies on issues such as the oppression that they felt from the British and what they thought was appropriate to do in response. Again students looked at historical sources like different pamphlets and transcripts of speeches given by people in the Committees of Congress. By engaging with these primary sources students were able to more fully theorize and discuss what each side probably felt and thus understand why these things lead to the eventual American Revolutionary War, leading to the creation of the United States of America. In Reading class students have read an informational text about ecology and how paying attention and showing care to ecology we can improve the preservation of our natural world. Students then read a historical fiction about a woman stagecoach driver who dressed up like a man in the 1800s to continue with her dream of being a stagecoach driver. Students read about the struggles she faced and discussed the importance of trying your hardest and not giving up so as to accomplish your goals. In Writing students embarked on a perspective writing piece, writing about a day in which they had suddenly turned into an ant, describing how they felt, the things that they did, and what they learned. Students worked to incorporate what they’ve been learning in grammar class, adding in adjectives and adverbs to more fully describe their plot and character. In Research class students finished with their Socratic debates, having discussed tough questions like what beauty is, if other people can fully understand someone else’s feelings, and if it’s ever ok to be violent. Students have just started to learn about Hercules in Greek culture, starting with his characteristics and then moving into the twelve trials that he faced to gain god status. Overall things have been going well over the past month. I cannot believe we are in our last month of class and I look forward to what this will bring us as a class!
<urn:uuid:c9b1da28-67a5-465d-99ca-723d31afd452>
CC-MAIN-2018-43
http://www.alexacademy.com.tw/archives/110242
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514708.24/warc/CC-MAIN-20181022050544-20181022072044-00295.warc.gz
en
0.975686
869
3.78125
4
Bay Saint Louis Mississippi, United States Bay Saint Louis, city, seat (1860) of Hancock county, southern Mississippi, U.S. It lies along Mississippi Sound (an embayment of the Gulf of Mexico) at the entrance to St. Louis Bay, 58 miles (93 km) northeast of New Orleans, Louisiana. The site was part of a 1789 Spanish land grant to Thomas Shields. The village soon became a resort for wealthy planters and, later, for tourists who arrived after the New Orleans, Mobile and Chattanooga Railroad was completed in 1869. The town was incorporated as Shieldsborough in 1818 and as the city of Bay Saint Louis in 1882. During the War of 1812, the bay (named in 1699 for Louis IX of France) was the scene (1814) of the naval engagement against the British known as the Battle of Pass Christian. In the late 20th century, casino gambling fueled the growth of the city, significantly increasing tourism’s importance to the local economy. Bay Saint Louis, along with most of Hancock county, sustained severe storm damage in 2005 from Hurricane Katrina; the neighbouring city of Waveland was virtually razed. The John C. Stennis Space Center of the National Aeronautics and Space Administration (NASA) is about 15 miles (24 km) west. Buccaneer State Park is to the south near Waveland. Pop. (2000) 8,209; (2010) 9,260. Learn More in these related articles: constituent state of the United States of America. Its name derives from a Native American word meaning “great waters” or “father of waters.” Mississippi became the 20th state of the union in 1817. Jackson is the state capital. partially landlocked body of water on the southeastern periphery of the North American continent. It is connected to the Atlantic Ocean by the Straits of Florida, running between the peninsula of Florida and the island of Cuba, and to the Caribbean Sea by the Yucatán Channel, which runs... city, southeastern Louisiana, U.S. Unquestionably one of the most distinctive cities of the New World, New Orleans was established at great cost in an environment of conflict. Its strategic position, commanding the mouth of the great Mississippi-Missouri river system, which drains the rich interior...
<urn:uuid:2b05a713-fc55-4efa-822a-c7a42d85d0be>
CC-MAIN-2016-36
https://www.britannica.com/place/Bay-Saint-Louis
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982948216.97/warc/CC-MAIN-20160823200908-00155-ip-10-153-172-175.ec2.internal.warc.gz
en
0.946593
487
3.25
3
|Title of work|| Show and Tell This dance is based on Australian Sign Language which has been "Stretched" to bring out the importance of the way in which the gestures are performed. The dance message "Showing" is made progressively more visable than the verbal message "Telling" contained in the movement. The text which forms the basis of the movement material is: "I saw this movement recently and my immediate thought was that I should try and use it to make a dance. The movement itself was the only motivation. It seemed a strange way to begin because I didn't know what it was going to be about. All I knew was that this movement would form its basis. When deaf people sign, they are talking, not dancing. There was something in the movement which seemed to lend itself to development in an interesting way. It's a language in its own right. The meaning of each sign effects signs on either side, and is also dependent on other accompanying gestures. The actions stand for concepts, and meaning is found in the recognition of form and sequence. The movements of signing are understood if they are recognised as standing for something else. The movements of dance simply point to themselves to be understood." Dancers in Remounts: Catherine O'Brien Costumes conceived by choreographer Main season in 1986 and 1987
<urn:uuid:157a0a65-b6eb-4ada-b344-c8052102fd20>
CC-MAIN-2014-42
http://www.tasdancearchive.com.au/show-and-tell/
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119660038.53/warc/CC-MAIN-20141024030100-00194-ip-10-16-133-185.ec2.internal.warc.gz
en
0.978062
272
2.953125
3
“Sticks and stones may break your bones, But words will never hurt you.” I still remember very clearly the first time I heard those words. I had come running in from the bus stop where the bigger kids had been teasing me and calling me names. With tears streaming down my face, my dad had stooped down, pulled me into his arms, and shared that little poem with me. But he was wrong. Those words did hurt. “Sticks and stones” is a mantra handed down from generation to generation, helping children deal with the sting of the big, cruel world and the nasty people they’ll inevitably encounter in it. Our hearts are in the right place in trying to help kids rationalize their hurt feelings, but the logic isn’t. Words do hurt. In fact, according to some research; emotional pain is processed in the same part of the brain as physical pain. And that emotional pain can result in something much worse than a broken bone. You see, broken bones mend themselves, sometimes growing stronger than they were before the break, but harmful words can result in lifelong injury. They break our hearts, scratch our spirits, and dent our self-esteem, all of which is damage that may never fully heal. Clearly, words matter. And what matters most is how we use them. Do we use them like sticks and stones, to tear down, to destruct, and destroy? Or, do we use them to build up, encourage, and affirm? Remember, what you say could make all the difference.
<urn:uuid:2eba6108-3f4f-41bb-af70-8276be68ef23>
CC-MAIN-2021-39
https://blog.daveweber.com/?p=103
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057558.23/warc/CC-MAIN-20210924140738-20210924170738-00507.warc.gz
en
0.972761
329
2.765625
3
Please boost your Plan to download papers Planning on research on Inclusive Education Pages 10 (2510 words) Inclusive education can be defined as education that is all encompassing. It does not discriminate whether children have disabilities or not. This kind of education shifts from previous methods of handling children with special needs that put them in separate institutions from other normal children… Inclusive education can include a number of strategies. Most of the research on this topic focuses on; global movements, laws on inclusive education within and without a given country, resources, deconstruction of special schools, sources of funding for inclusive schools and other ideas that may boost the development of Inclusive education. There are various global movements that have worked towards the inclusion of the pupils with special educational needs. Schooling of these pupils with special educational needs has changed from neglect previously to integration presently. Global movement is taking part in the African countries, the Asian countries the European countries and also in the South American countries. In the United Kingdom there is a very strong policy framework which is based on the inclusive principles and values together with additional funding. Similarly the movements have allowed the pupils with the special educational disabilities to understand their needs well and this has enabled them learn to live in a world that is full of differences. This movement has a global dimension whereby there is a connection between the various countries globally and this has spurred a commitment by various countries to set their national targets for the pupils with special educational needs. (Norwich, 1994) Special schools have been in place since the days of old. ... Not exactly what you need?
<urn:uuid:137abc9c-b521-4889-ae93-b86629bac027>
CC-MAIN-2017-04
https://studentshare.net/miscellaneous/275795-planning-on-research-on-inclusive-education
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280319.10/warc/CC-MAIN-20170116095120-00172-ip-10-171-10-70.ec2.internal.warc.gz
en
0.967363
323
4.15625
4
Kagan's Articles - FREE Kagan Articles Articles by Dr. Spencer Kagan A Miracle of Active Engagement* In this article, we contrast a conventional classroom lesson and its environment with a classroom where Kagan Structures are brought in. We discuss the benefits of the Structures and explain why this alternative approach to classroom organization works much better and has a long-term learning effect. Then, we present six of our favorite Kagan Structures that are particularly suitable for the language-learning context, and we offer you an overview and the support to apply them in your daily teaching routines. For an in-depth presentation of the Structures and our approach to cooperative learning, you can read Kagan Cooperative Learning (2009). Traditional Instructional Strategies vs. Kagan’s Cooperative Structures Let’s compare a typical traditional English lesson to an English lesson using Kagan Structures. For example, we might want to teach direction vocabulary with prepositions of place and direction: next to, down, into, out, up, above, below. In a traditional classroom, the teacher may provide some direct instruction, then do a wholeclass question-and-answer session. During the question-and-answer session, the teacher usually asks questions, then has students raise their hands to volunteer answers. Alternatively, the teacher may ask a question, and nominate a student to respond. Finally, the teacher may assign an activity for individual work and have the students independently practice the new skill. Sound familiar? Traditional learning is either whole-class, with the teacher leading the class, or independent practice work. As we’ll see below, traditional learning lacks a high level of active engagement, creates a more intimidating learning environment, and often fails to establish an effective communicative context for natural language acquisition. Cooperative learning offers a powerful alternative for language teaching—interaction! Many teachers believe Kagan Structures are instructional strategies designed to promote cooperation and communication in the classroom, boost students’ confidence and retain their interest in classroom interaction. The Structures work in all teaching contexts—regardless of subject, age group, and number of students in class—and are a particularly powerful tool for teaching a foreign language. They are doing cooperative learning by introducing pair and group work. However, unstructured pair and group work lacks the basic principles of effective cooperative learning, and therefore, does not produce the gains of true cooperative learning. There is a vast difference between Kagan Structures and conventional pair or group work. Kagan Structures carefully engineer student interaction to maximize cooperation, communication, and active engagement by all. The teacher who is fluent with a number of Kagan Structures would teach the same lesson quite differently. She would likely still provide some direct instruction, but skip the whole-class question-and-answer session, and not do the individual exercise. Instead, she would choose a Kagan Structure that will involve everyone, and encourage sharing and cooperation. On the subject of directions, the teacher might have the students do a RallyCoach— students work in pairs and take turns answering the activity questions. Or, Match Mine would be another productive structure for this lesson. In Match Mine, partners sit on opposite sides of a barrier. One partner, the “Sender,” places items in an arrangement. The other student, the “Receiver,” tries to match the sender’s arrangement, using only the sender’s verbal directions. Students use the direction vocabulary in a functional way: Place the square next to the triangle. Place the circle below the triangle. Choosing a cooperative learning structure over traditional methods creates a dramatic positive difference in English language learning. We now know that there are many styles of learning and multiple intelligences. What works for some, may not work well for everyone. Therefore, we need a variety of strategies to reach and teach our students with different learning styles and intelligences. If we always use lectures and independent exercises, we may inadvertently create barriers to English learning for many students. If, instead, we use a variety of structures as we teach, we engage the different learning styles and students’ multiple intelligences. The variety creates greater novelty, increases motivation, and maintains attention. Kagan Structures also create greater engagement, lower anxiety, and promote natural language acquisition. Let’s see how. Cooperative Learning Increases Engagement for Everyone One attribute that sets cooperative structures apart from traditional instruction is that structures don’t call for voluntary participation. In the traditional classroom, the teacher asks students a question, and only those who know the answer, or who are daring enough to respond, raise their hands. The rest of the class can opt out. When students have the option of nonparticipation, many don’t participate. This is especially true for shy students, lower achievers, and early language learners. The result: They don’t learn as much or as quickly. With Kagan Structures, participation is not voluntary. Participation is required by the Structure. In RallyCoach, students take turns. Both partners have a very specific role and they cannot accomplish the task without working together. It is the same with Match Mine. Students must communicate accurately to complete the task. In the traditional classroom, the structure does not require participation from every student. It is the same with Match Mine with pair work or group work. If pair or group work is not structured properly, one student can simply do the work, while the others watch, or even tune out. In contrast, the Structures hold every student individually accountable for participating. There is a direct connection between student participation, engagement, communication, and subsequent language learning. In the traditional classroom, when one student answers at a time, the ratio of active engagement is quite low. What’s more, the rest of the class sits quietly and there is very little involvement. During our cooperative learning practice, the class is divided into pairs, and at least half of the class is generating language at any time and the other half is directly receiving comprehensible input and practicing active listening. This radically increases the opportunity to decode and produce language.
<urn:uuid:e0e6e565-2cd6-48a7-88e5-e217e4c68f32>
CC-MAIN-2015-48
http://www.kaganonline.com/free_articles/dr_spencer_kagan/ASK41.php
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398471441.74/warc/CC-MAIN-20151124205431-00253-ip-10-71-132-137.ec2.internal.warc.gz
en
0.933945
1,257
3.90625
4
This picture of Triton is a mosaic of the highest resolution images taken by Voyager 2 on Aug. 25, 1989 from a distance of about 40,000 kilometers (24,800 miles). The mosaic is superimposed on the lower resolution mapping images taken about 2 hours earlier in order to fill in gaps between high resolution images. The smallest features that can be seen on the images are about 0.8 kilometers (0.5 miles) across. The terminator (line separating day and night) is at the top of the picture and is centered at about 30 degrees north latitude and 330 degrees longitude. These highest resolution images were targeted for the terminator region to show details of the topography by the shadows it casts. Near the center of the picture is a depression filled with smooth plains that are probably ices which were once erupted in a fluid state. The depth of the depression is about 300 meters (900 feet) and the prominent fresh impact crater on its floor is about 20 kilometers (12 miles) in diameter and about 1 kilometer (0.6 mile) deep. On the right is an elongate crater with adjacent dark deposits above it. This feature may be an explosive eruption vent formed by gaps within the ice. The linear structure on the left is probably a fracture along which fresh ice has been extruded. The Voyager Mission is conducted by JPL for NASA's Office of Space Science and Applications.
<urn:uuid:b43a5124-32ce-453b-91dc-2d335b087bbd>
CC-MAIN-2018-43
https://www.jpl.nasa.gov/spaceimages/details.php?id=PIA02235
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512501.27/warc/CC-MAIN-20181020013721-20181020035221-00521.warc.gz
en
0.950042
285
3.6875
4
Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole. Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages. Do not use for reproduction, copying, pasting, or reading; exclusively for search engines. OCR for page 5 5 cross section. Specific guidelines on how to determine the developed in this early code have influenced the development number and spacing of interior diaphragms are not provided. of the current Canadian Standards Association (CSA) design Colorado has standards for curved U girders with a cast- specifications (2000) and the updated version of the OHBDC in-place deck that they have used with good success. These (1998). Although curved box-girders are not specifically bridges often consist of several precast segments spliced addressed in these codes, many of the analysis techniques together to form a span. Colorado projects that they will use identified for box-girders, such as the orthotropic plate anal- this form more often in the future. It has the advantage of ogy and the grillage analogy methods may be applicable to potentially eliminating falsework over traffic curved structures. A similar U section, although straight, was developed by In Europe, most countries and most designers base their NRV for use by a contractor on a bridge originally designed designs on the first principles of structural analysis and de- as a cast-in-place multi-cell box. The original design required sign. Although design codes are used, they are generally brief building the superstructure on falsework set above final and bridge designers rely on traditional text books such as grade, lowering it to its final grade position, and then casting those by Menn (1990), Schlaich and Scheef (1982), or Strasky a monolithic bent cap to connect the bridge to the column. (2001); specific course work published by their professors at This approach overcame falsework clearance problems but their university (Leonhardt, Menn, Strasky, etc.); or personal presented some challenges for the contractor. In the con- experience. tractor redesign, precast prestressed U sections set at final In Switzerland, the structural code is split into separate grade spanned the required falsework opening. Cast-in-place booklets. One each for loadings, concrete and prestressed bottom soffit and stem pours were made on either end on concrete, steel, wood, and so forth. The two most applicable to the U girders. The cast-in-place pours were monolithic with NCHRP Project 12-71 (Loadings, and Concrete and Pre- the columns. A cast-in-place deck was then poured and stressed Concrete) are relatively brief documents compared continuity prestressing used to tie the entire structure together. with the current AASHTO LRFD. In general the Concrete This approach has some advantages and, as in Colorado, and Prestressed Concrete booklet does not or only deals could be used on curved structures. briefly with special structural configurations such as hori- The Oyster Point Off-ramp in California also had a span zontal curvature. Instead, students at the two Universities, in consisting of curved precast girders made continuous with a Zurich and Lausanne, study structural design in a practical cast-in-place multi-cell box section. This span crossed railroad manner, preparing them for the professional situation in tracks where falsework was not allowed. As a cost-savings their own country. The textbook discussed above (Menn, measure, the contractor chose to use curved precast beams 1990) is very similar to what students will encounter when at rather than straight beams with a curved cast-in-place deck. the university. Menn, who was a professor for many years, Girder erection required pick points to be located so that the provides some general guidance on the design of horizontally girders would not "roll" and a temporary tie down system at curved beams and skewed bridges. the ends of the girders during the deck pour. Swiss bridges on a curved alignment with a large radius are Despite these examples, curved box-beams appear to be often designed without considering the curvature, except for relatively rare. the bearing design. Many design firms use methods they have developed over the years involving graphs and influ- ence surfaces. Foreign Practice U.S. engineers with experience designing bridges in France Concrete box-girder bridges are used around the world. have been contacted. It is our current understanding that Many of these are on horizontally curved alignments. A par- the French favor precast segmental construction. Typically, tial survey of recently constructed curved concrete box-girder these structures use external tendons with deviator blocks. bridges outside the United States was conducted by reviewing As in most European countries, their design specifications material published in engineering magazines and trade jour- are less prescriptive than those in the United States and de- nals and from personal experience. Many of these bridges were signers rely on their own experience as well as other published built using segmental construction techniques. Although material to analyze and design these bridges. the survey was not exhaustive, its results are indicative of the Germany has been a leader in the design of concrete box- bridges being built today. girder bridges, and engineers like Fritz Leonhardt have been Canada has been very active in developing design specifi- considered pioneers for this type of construction. Germans cations that address the behavior of concrete box-girder tend to favor cast-in-place construction. They have their own bridges. The Ontario Highway Bridge Design Code (OHBDC) DIN code, but, as is typical of most European practice, they (1983) was an early attempt to codify design and analysis re- rely on the engineer to apply first principles in selecting quirements for these types of bridges. Many of the provisions analysis techniques and design details.
<urn:uuid:5b2e09a3-5a4b-4a87-b0db-acc64899744c>
CC-MAIN-2014-41
http://www.nap.edu/openbook.php?record_id=14186&page=5
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657125113.78/warc/CC-MAIN-20140914011205-00311-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.955162
1,286
2.546875
3
In class today we made two loaves of bread. We made them in a breadmaker and followed a recipe. Both loaves were exactly the same except the second loaf had no yeast. We have been learning all about yeast and know that yeast feeds on sugar and produces carbon dioxide. We have done experiments in bottles but wanted to see the effect that yeast has on dough. These photos show the difference. The loaf with yeast rose to about 13cm and it was light and airy and tasted delicious! The second loaf was heavy, it rose to only 5cm and looked and tasted more like dough. Even though it didn’t taste much like bread we all gobbled it up anyway!
<urn:uuid:7cb3ac25-a7a1-4886-bba6-1946e1855160>
CC-MAIN-2018-13
http://year5rc.edublogs.org/2010/06/23/year-5-rise-to-the-challenge/
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648207.96/warc/CC-MAIN-20180323102828-20180323122828-00111.warc.gz
en
0.988536
141
2.546875
3
The Story Of Wild Animals: Story Of The Shrew Story Of The Tenrec Story Of The Rabbit Story Of The Chamois Story Of The Duckbill Story Of The Peccary Story Of The Linsang Story Of The Aard-vark Story Of The Gorilla Story Of The Weasel Read More Articles About: The Story Of Wild Animals Story Of The Tenrec ( Originally Published Early 1900's ) There lives in Madagascar an insect-eating animal which has many of the characteristics of the hedgehog. The name tenrec is given the group, which comprises several species. They are defended with spines, arid can roll themselves into a ball as the hedgehog does. I have watched the creature defend itself against the attack of a dog and do it so successfully that the dog retired howling with pain. These animals are a great pest to the agriculturists of Madagascar, owing to the damage they inflict on the rice crops by burrowing in the earth beneath the young plants in search of worms and insects. They pass one-half of the year is a state of torpidity. About May or June they dig themselves holes, in which' they sleep until December, with their heads comfortably tucked away between the hind legs. Their burrows are generally betrayed by the presence of a small heap of earth or moss thrown up at the entrance. The animals at this time are very fat, and are regarded as great delicacies by the natives of Madagascar. The inhabitants hunt the tenrecs with dogs, trained expressly for the purpose. They live chiefly in the mountains, in places covered with mosses, ferns and bushes. Their food consists principally of earthworms, which they rout out by means of their feet and pointed snouts, using the latter after the fashion of a pig. Insects also, form a part of their diet ; and like the hedgehogs, they feed upon certain fruits and roots. In captivity they will eat raw meat, and are also said to be fond of bananas. They sleep nearly all the day, and come forth in full activity only at night. The true tenrecs have a body much longer than the hedge-hogs, and their bristles are less rigid, the spines being-covered with soft, silky hair. The head is shaped like that of the pouched animals. It is found not only in Madagascar, but also in the-islands of Bourbon and Maurice, but it was probably carried to the latter island by the colonists. It is tailless, about twelve inches long, and of a fawn color. The second species has rather strong prickles, and is of a grayish-black color. The spines of the tenrec are like stiff pointed bristles, and are by no means so strong as those of the hedgehog.
<urn:uuid:c9104c27-5ccd-4f27-9b50-2e7ba0e059e1>
CC-MAIN-2017-39
http://www.oldandsold.com/articles35/animals-82.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689411.82/warc/CC-MAIN-20170922235700-20170923015700-00400.warc.gz
en
0.96133
590
2.96875
3
If content doesn't load automatically, please click an image below. Prior to production the design department produce the patterns for the last (the wooden form on which the shoes are made). From the pattern a prototype sample is made and test fitted. After any necessary adjustments to the patterns, a final sample pair is produced. It is crucial to ensure that the patterns fit correctly before starting on bulk production. In the Clicking Department at the 1st stage of production, the shoe uppers and linings are cut. The ‘Clicker’ is a highly skilled operative; named after the ‘click’ sound which the hand cutting knife makes as it is removed from the leather. The Clicker is responsible for examining the leather for any defects, scars or growth marks before each pair is cut by hand. A good clicker needs to be knowledgeable about the nature of leather, in order to maximise the usage whilst retaining the upmost quality. At the next stage of production the uppers are ‘closed’. Closing involves many different operations such as, punching holes for brogue styles, edge staining, hand sewing, machine stitching prepared sections together to form the shoe upper and fitting eyelets. The Closing Room machinists are highly skilled requiring excellent hand and eye coordination. This is the preparation of the ‘bottom’ part of the shoes. The insoles and soles are cut from leather bends or rubber sheets using large heavy presses. The leather insoles are prepared for ‘Lasting’ by attaching the material rib, to which the welt will eventually be stitched. The heels are built in-house with leather or rubber lifts and top pieces. At this stage the appropriate lasts are selected to be matched with the closed uppers. The lasting process is where the shoe begins to take shape. The upper of the shoe is tacked to the back of the last to ensure the back height is correct. It is then pulled over at the toe by the lasting machine, before being side lasted by hand. It is vital for the toe laster to ensure that the shoe upper is fitted accurately to the last. An important process in this department is ‘Welt Sewing’ where the operative stitches the welt (a strip of leather) to the rib on the insoles. The welt is a key element in the Goodyear Welted process. The bottoms of the shoes are filled with cork and wooden shanks are inserted to provide support beneath the insoles. The soles are then stitched to the welt. This method allows for the soles to be removed for repair without affecting the uppers. After the soles have been attached the shoes undergo a process of ‘Bottom Levelling’ which rounds the soles to the shape of the last. In the Finishing Department the heels are attached, trimmed and then scoured with emery paper for a smooth finish. Edge trimming is a highly skilled and physical process, whereby the sole edges are trimmed to the specific shape of the last. This is done ‘free hand’ like many other operations in Goodyear Welted shoe making. The soles and heels are then stained and hot wax is applied to the edges to provide a waterproof seal and a good shine. Various decorative finishes are applied to the soles such as, wheeling and crowing before a final polish. In the Shoe Room the uppers of the shoes are hand polished to create the rich depth of colour in the leather. We call this ‘antiquing’ and ‘burnishing’. For some leathers this has to be repeated multiple times with the shoes being ‘mopped’ in between each coat of antique. The lasts are then removed from the shoes, the leather soles are stamped with the Crockett & Jones brand and in-socks are fitted. Finally the shoes undergo a scrutinised check for quality before they can be passed for lacing and boxing. Crockett & Jones Production Film The video opposite presents an insight into the manufacturing process of Crockett & Jones shoes. Alternatively, you can click on the thumbnails below to view photos and descriptions of each department. Crockett & Jones shoes are made using the traditional Goodyear Welted construction. Through 8 stages of production, each pair of shoes undergoes over 200 individual operations. This process takes about 8 weeks.
<urn:uuid:0d50792d-d586-4611-b4f3-a09866bbe512>
CC-MAIN-2015-35
http://www.crockettandjones.com/InTheMaking
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645348533.67/warc/CC-MAIN-20150827031548-00049-ip-10-171-96-226.ec2.internal.warc.gz
en
0.935877
911
2.625
3
Scientists aren't all that fond of secrecy. They like to share what they've discovered: HOMELAND SECURITY SECRECY While values of openness and accountability are tentatively taking root in some improbable corners of the world, they are steadily being eroded in the United States."About $8 billion in homeland security funds has been doled out to states since the Sept. 11, 2001, terrorist attacks,but the public has little chance of knowing how all of that money is being spent," according to Congressional Quarterly. See "Billions in States' Homeland Purchases Kept in the Dark"by Eileen Sullivan, CQ Homeland Security, June 22: http://www.cq.com/public/20050622A_homeland.html While one can imagine various details of homeland security-related expenditures that might properly be kept confidential, the tide of secrecy has swept away far more than such details. Records of environmental pollution due to animal waste are exempt from public disclosure in Delaware, for example, as the result of a 2000 amendment to that state's freedom of information laws, along with many other categories of official records, a recent news story reports. See "Citizens often kept from public data" by Jeff Montgomeryand Molly Murray, Delaware News Journal, June 19 (thanks toJC): http://tinyurl.com/88tbc GPO POLICY ON WITHDRAWING PUBLIC INFORMATION The Government Printing Office (GPO) has updated its policy for responding to government agency requests to withdraw previously disclosed records from public access."The GPO takes very seriously any Federal agency's request to restrict access to Government information that has been made public. However, the GPO cooperates with Federal agencies in the appropriate distribution of the official information they publish," the policy states. Potential justifications for withdrawing records from public access include the presence of classified information or sensitive but unclassified information. See "Withdrawal of Federal Information Products from GPO's Information Dissemination Programs," Government PrintingOffice Information Dissemination Policy 72, June 21, 2005: http://www.fas.org/sgp/othergov/id72.pdf SELECTED CRS REPORTS Recent reports of the Congressional Research Service obtained by Secrecy News include the following:"'Bunker Busters': Robust Nuclear Earth Penetrator Issues, FY2005 and FY 2006," updated June 23, 2005: http://www.fas.org/sgp/crs/nuke/RL32347.pdf" Homeland Security Department: FY2006 Appropriations," updated June 13, 2005: http://www.fas.org/sgp/crs/homesec/RL32863.pdf" Federal Protection for Human Research Subjects: An Analysis of the Common Rule and Its Interactions with FDA Regulations and the HIPAA Privacy Rule," updated June 2, 2005: http://www.fas.org/sgp/crs/misc/RL32909.pdf" Parliament and Congress: A Brief Comparison of the BritishHouse of Commons and the U.S. House of Representatives,"updated May 19, 2005: http://www.fas.org/sgp/crs/misc/RL32206.pdf Secrecy News is written by Steven Aftergood and published by theFederation of American Scientists. Good thing somebody is paying attention to at least a few of the secrets this admin prefers to continue to hide.
<urn:uuid:2acd1a8c-be8e-4431-a862-b3fade6cf83d>
CC-MAIN-2014-15
http://aggravated.blogspot.com/2005/06/ahsecrets.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537804.4/warc/CC-MAIN-20140416005217-00149-ip-10-147-4-33.ec2.internal.warc.gz
en
0.915465
712
2.546875
3
Ear surgery is a common term for otoplasty; a plastic surgery procedure that can improve the size or proportion of the ear. While ear reshaping can be performed on patients of any age, it is generally done on patients between 7 and 14 years of age. Specifically, ear surgery can treat: - Defects in the ear structure - Excessive ear cartilage - The position of the ear - The proportion of the ear The condition of prominent ears is present at birth and results from the failure of the ear cartilage to fold properly, especially in the upper half of the ear. Prominence can also be due to an excess of cartilage in the “bowl” of the ear. Many people want to have this condition fixed to prevent the social stigma of having “big ears”. Best Candidates for the procedure Good Otoplasty candidates: - Have larger, protruding ears - Are 7 years of age or older - Are in good physical shape, moderately fit and close to their ideal body weight - Have realistic expectation for their outcome - Do not have a life-threatening condition or illnesses that can impair healing - Are Non-Smokers The best time to correct prominent ears is when the child becomes aware of the teasing from other children that, unfortunately, happens often. Surgery is usually performed anytime after the age of seven, and ideally before the child is fully grown, as the cartilage is easier to bend. Despite this, adults can still undergo the surgery with good results. Dr. Doezie will meet with the patient to answer questions and concerns as well as exam the area to be treated. An office consultation with Dr. Doezie will allow him to determine if surgical correction will result in more aesthetically appealing ears. A quote will be given before the end of the appointment. During the procedure, incisions are made inside the rim of the ear, the deepest concavity of the external ear and or the back surface of the ear. The placement of the incision lines are designed to be concealed by the natural structure of the ears, so that the casual observer cannot tell that you have had surgery. Internal sutures are used to create the new shape of the ear and then external sutures are used to close the incisions. Dr. Doezie will determine the suture technique that is right for you. Surgical correction is done in the operating room under general anesthesia. Most surgeries are performed at an outpatient surgery center and no overnight stay is required. Most patients do not experience much pain after the surgery, though pain is experienced and interpreted differently from person to person. Immediately following surgery you will be placed in a compression garment to minimize swelling. The postoperative dressing consists of a complete head dressing that will be removed a week later. During this time, it is important to keep the dressing dry. Following this, a headband or hat, which covers the ears, will need to be worn for an additional two weeks. It is especially important to wear this at night. This protects the ears from inadvertent forces that can pull or move the ear and potentially break the stitches that keep it folded. Most prominent ear surgery patients see their results immediately, and over the following weeks the ear will settle into its new position closer to the head. Surgical scars are hidden behind the ears and will become less visible over time. Otoplasty costs can vary based on a number of different factors. Dr. Doezie will determine your exact quote at the time of your consultation. Visit our photo gallery to see before and after pictures of Dr. Doezie’s otoplasty patients. Learn more about ear surgery and schedule a consultation with Dr. Doezie at Mission Plastic Surgery.
<urn:uuid:45dbe306-6adb-4e22-9c8b-b900915af2db>
CC-MAIN-2020-45
https://www.missionplasticsurgery.com/procedures/prominent-ear-surgery/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107911792.65/warc/CC-MAIN-20201030212708-20201031002708-00085.warc.gz
en
0.949833
779
2.953125
3
Pek et al. describe how a stable, intron-derived RNA regulates the expression of its host gene during Drosophila embryogenesis. Once they are spliced out of nascent mRNAs, noncoding intron sequences are usually degraded rapidly. At least in Xenopus eggs and human cell lines, however, some intronic RNAs persist for long periods, although the function of these stable intronic sequence (sis) RNAs remains unknown. Pek et al. used deep sequencing to look for sisRNAs in newly fertilized Drosophila embryos, whose initial development depends on a pool of stable RNA generated several hours earlier during oogenesis. The researchers identified over 30 candidate sisRNAs, including one, dubbed sisR-1, that was derived from the fourth intron of a gene called rga. After being spliced out of the rga pre-mRNA, sisR-1 was processed into longer and shorter versions that localized to the nucleus and cytoplasm, respectively. Structural predictions suggested that the 3′ region of nuclear sisR-1 is exposed and available to base pair with an antisense transcript, named ASTR, that is also produced from the rga locus. Pek et al. discovered that ASTR promoted transcription of the rga gene in early embryos, causing sisR-1 to gradually accumulate until, later in development, it was able to suppress ASTR and shut down rga expression. Knocking down sisR-1 delayed the down-regulation of ASTR and rga, but otherwise embryogenesis proceeded normally. Senior author Jun Wei Pek now wants to investigate how sisR-1 is stabilized, and whether its knockdown affects fly development in sensitized genetic backgrounds. Text by Ben Short
<urn:uuid:1af1f985-ae05-4f33-8b3b-e55df7581774>
CC-MAIN-2020-10
https://rupress.org/jcb/article/211/2/206/38591/sisRNAs-engage-with-their-hosts
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144708.87/warc/CC-MAIN-20200220070221-20200220100221-00539.warc.gz
en
0.943501
372
2.984375
3
What is a climate model? A climate model represents the earth's atmosphere, oceans, ice, land surface, and vegetation as they interact and respond to changes in the sun, volcanos, land use, and atmospheric chemistry. Climate models are an important tool for understanding the implications of societal emissions of greenhouse gases (such as carbon dioxide, CO2) that trap energy in our climate, raising global temperatures, shifting weather patterns, and altering the likelihood of extreme events. Climate models are based on atmospheric physics and chemistry, simulating daily weather and long term climate shifts using some of the most powerful computers in the world. Why are climate models different? There is strong agreement in the global climate response to greenhouse gas emissions (such as carbon dioxide, CO2), however different levels of complexity and resolution cause unique regional patterns of climate changes that are important to agriculture. Climate models simulate weather patterns and climate shifts over the whole globe, however they cannot represent every process and local effect in the climate system. Each model has its own way of representing established atmospheric physics and chemistry, which can lead to subtle differences in how climate change drives global and regional impacts. Climate models operate on global grids (the size of an individual grid box varies from model to model -- typically 50-200 km across), and differ in the way that they represent climate processes that are smaller than a grid box. Models also vary in their representation of the upper atmosphere, ocean circulation, and land and ice processes. How was climate historical climate data assembled? Historical meteorological station observations form the gold standard for historical weather and climate information used in the AgMIP Regional Integrated Assessments. We work with national environmental and meteorological agencies to locate weather stations in our agricultural zones, then examine the data to identify any spurious values or gaps in the data. These we replace with data from the NASA AgMERRA historical climate forcing dataset, adjusting for any monthly biases identified in a comparison between the available historical observations and AgMERRA. The result is a daily time series of rainfall, maximum and minimum temperatures, solar radiation, wind speed, and humidity from 1980-2010 that may be used to drive crop and livestock models. How were climate scenarios selected? We cannot precisely predict the way that society, industry, and technology will develop in the coming decades, and thus we cannot precisely predict the amount of greenhouse gas emissions that will drive climate change (such as carbon dioxide, CO2). Scientists therefore use climate models to project different scenarios of greenhouse gas levels in the atmosphere, exploring the regional temperature and rainfall impacts that affect agriculture and food security. Regional climate scenarios produced for the AgMIP Regional Integrated Assessments were designed to sample the most important aspects of regional climate change for the local agricultural sector. We first sampled regional projections of growing season temperature and precipitation changes from a set of 29 global climate models, then selected 5 models for analysis that best represented the types of climate changes seen in the full set. Specifically, a climate model was selected to represent the middle temperature and rainfall change projections for each region, and then four were selected to represent relatively hot and dry, hot and wet, cool and dry, and cool and wet projections compared to this middle scenario. Note that "relatively cool" scenarios are still warmer than today as climate model projections for the 2050s are all warmer than present conditions, however these models do not project as great a regional warming and are therefore cooler than most other models. The combination of relatively cool/wet, cool/dry, middle, hot/wet, and hot/dry models allow us to explore how a broad range of plausible climate projections affect regional agriculture, and we can also track how many of the full 29 climate model set projects similar regional climate changes in order to understand the probability of a given risk. How were climate scenarios generated? For each selected climate scenario we compare the climate model projection of the 2040-2069 period (referred to as the "2050s" given the central decade) against the same climate model's 1980-2009 period. We calculate monthly changes in rainfall, maximum and minimum temperatures, the number of rainy days, and the standard deviation of maximum and minimum temperatures. These quantities then allow us to alter the distribution of temperature and rainfall for each month according to the climate model projections. To do this, we adjust the original observational time series impose new mean temperatures and rainfall totals, shift the number of rainy days, and alter the frequency of extreme temperatures within the growing season. The result is a time series that retains many of the day-to-day characteristics of the observed climate from 1980-2010 but also reflects the new averages and distribution that result from projected climate changes. What is a crop model? Crop models are computer programs that predict daily growth and development of crops in response to daily weather, soil conditions, crop management, and variety traits, through to the point of final yield and biomass. The crop models are not regression models, but rather simulate daily processes such as photosynthesis, leaf area growth, and grain growth, with a daily time-step. The models are written in various programming languages, and are coded and parameterized with relationships describing the sensitivities of processes to solar radiation, temperature, water stress, and N supply. The models require inputs of crop management, crop variety traits, soil water and N supplying traits, as well as daily weather. The model outputs include daily growth, crop evapotranspiration, N uptake, etc., as well as final yield and yield components. Why are crop models different? Crop models have been developed by many different teams throughout the world, and the structure and theories used in those models differ according to the concepts of the model developers-authors. Thus the models have different coding and parameterization for sensitivities of growth processes to solar radiation, temperature, water, and N supply. The models often have different temperatures sensitivities (base and optimum temperatures) for simulating various processes such as photosynthesis, leaf area expansion, and grain growth rates (in part based on how the model developers interpreted sparse published literature). This can cause different model responses to temperature (and we have seen this for APSIM compared to DSSAT maize models). Models may have different parameterization for the photosynthesis and transpiration sensitivity to elevated carbon dioxide, thus resulting in differences among models in response to elevated CO2. While the weather and management inputs should be the same, the models typically have different ways of interpreting how the crop predicts soil water balance and evapotranspiration, how the soil organic C pools are available for mineralization of N, and how the crops handle N uptake for growth. This can cause variation among models in their sensitivity to rainfall, water supply, and N fertilization.
<urn:uuid:69df48e0-378e-40c2-8f9f-79dc4ae5c534>
CC-MAIN-2023-14
https://agmip-ie.wenr.wur.nl/web/guest/methodology_modelling
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00275.warc.gz
en
0.929675
1,373
3.90625
4
National Alliance on Mental Illness page printed from http://www2.nami.org/ (800) 950-NAMI; [email protected] Binge Eating Disorder What is binge eating disorder? Individuals with binge eating disorder (BED) experience episodes of rapid food consumption: periods in which they “lose control” of the ability to stop eating. They may eat until after they are already full or at times when they were not hungry to begin with. People with BED will often eat alone or in secret because they are embarrassed by their behaviors. For some people, binging can cause a sense of relief or fulfillment initially. This feeling fades as the episode progresses and leads to feelings of disgust, guilt, worthlessness or depression after the episode is over. Binge eating disorder is not a mental illness that is formally characterized in the DSM-IV-TR (the system used by many mental health professionals in America). However, it is a recognized clinical syndrome that has been diagnosed and treated for over 50 years. During this time, BED has been called by other names—compulsive overeating, emotional eating or food addiction—but the core symptom of dysfunctional binge eating episodes remains the same. There is no specific test (e.g., blood test or x-ray) that can diagnose a person with binge eating disorder. Instead, a diagnosis of BED is made by a mental health professional based on a clinical assessment that includes a formal history and collateral information. Any person newly diagnosed with BED should have a physical exam and performed by their primary care physician (or pediatrician) in order to screen for complications of this illness that can include obesity, high cholesterol and heart disease. Who develops binge eating disorder? Binge eating disorder is the most prevalent eating disorder in America. Approximately 3.5 percent of females and 2 percent of males will experience this illness at some point in their life. In obese individuals, the prevalence of BED is even higher and may be up to 20 percent. The average age of onset for BED is in young adulthood, although binge eating in children is likely increasing. People with BED are more likely to be diagnosed with anxiety disorders (e.g., phobias, posttraumatic stress disorder), mood disorders (e.g., depression), and substance abuse disorders. BED has been shown to run in families and it is believed to be influenced by both genetic and environmental factors. Although no specific genes have been identified, scientists are actively researching a number of genes that affect both the brain and the digestive system. People who have developed unhealthy patterns of eating may be at increased risk of developing BED. Individuals who have experienced stressful life events (e.g., bullying or trauma) may also be at increased risk of developing this condition. What are the medical complications of binge eating disorder? People with BED are at increased risk of experiencing weight gain and obesity which place them at risk for a wide variety of medical complications. These can include high cholesterol, Type II Diabetes (e.g., non-insulin-dependent diabetes mellitus), high blood pressure and heart disease. In some cases of severe weight gain, people may be at risk of developing arthritis, obstructive sleep apnea or other weight-related illnesses. What is the treatment of binge eating disorder? Treatment of binge eating disorder targets both the elimination of binge eating and the development and maintenance of a healthy weight. Most people with BED will benefit from psychotherapy and some may benefit from medications. Usually an inpatient psychiatric hospitalization is not required; however an inpatient eating disorders treatment program may be helpful in stopping severe binge eating behaviors. Cognitive behavioral therapy (CBT), either in a group setting or individual therapy session, is one of the most studied forms of treatment for BED. CBT is often referred to as the first-line treatment for this condition. This treatment focuses on self-monitoring of eating behaviors, identifying binge eating triggers, and changing distorted thinking patterns about food and self-image. CBT can help reduce binge frequency and promote binge abstinence. Most people who try CBT can expect a 50 percent or greater decrease in their symptoms. In some cases, certain people may find that medications are useful in helping to control their symptoms. Some antidepressants from the selective-serotonin reuptake inhibitor class (SSRIs)—including citalopram (Celexa), fluoxetine (Prozac), and sertraline (Zoloft)—have been shown to be helpful in decreasing the symptoms of BED. The use of other medications—including topiramate (Topamax)—is beyond the scope of this review. It is important to note that no medications are currently indicated by the FDA for the treatment of binge eating disorder. Furthermore, all treatment decisions should be discussed with one’s physicians as the risks and benefits for each individual may vary. Comprehensive treatments usually involve a variety of treatment providers that can include mental health professionals, primary care physicians and nutritionists or dieticians. As the importance of family support cannot be understated, many individuals and their loved ones will find family therapy to be quite helpful in the treatment process. With thorough treatment and the support of their loved ones, most people with binge eating disorder can expect to see a significant decrease in their symptoms and to live healthy lives in absence of serious medical complications. Family members and friends can be most helpful in providing nonjudgmental support of their loved one and by encouraging their loved one to seek treatment for this serious condition. Reviewed by Ken Duckworth, M.D., and Jacob L. Freedman, M.D., January 2013
<urn:uuid:832be4de-7869-4caa-9ede-77decc31bb64>
CC-MAIN-2016-07
http://www2.nami.org/PrinterTemplate.cfm?Section=By_Illness&Template=/ContentManagement/ContentDisplay.cfm&ContentID=149467
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701146302.25/warc/CC-MAIN-20160205193906-00002-ip-10-236-182-209.ec2.internal.warc.gz
en
0.961352
1,168
3.78125
4
State wildlife biologists Trina Morris and Nikki Castleberry are a quarter-mile beneath untold tons of rock, smeared with gray mud and chilled to the bone from spending hours thigh-deep in a subterranean mountain stream. Welcome to Georgia’s frontline against white-nose syndrome, where the work is sometimes miserable but ever vital. The good news? “We haven’t found bats in Georgia that look like they’re impacted by white-nose,” Morris says. The bad: They won’t be surprised if they do. The disease that has killed an estimated 5.7 million to 6.7 million cave-dwelling bats from New England to the Midwest and Canada, wiping out some hibernacula or overwintering sites of these airborne insect terminators, has been documented in Tennessee and North Carolina. Morris and Castleberry, both of the Georgia Department of Natural Resources’ Nongame Conservation Section, completed winter checks for white-nose with a recent trek deep into Sitton’s Cave on Cloudland Canyon State Park near Rising Fawn. Helped by veteran caver Jerry Wallace, Morris and Castleberry counted 1,740 bats and swabbed samples from 20. They found none of the tell-tale signs: white, mold-like fuzz on the muzzle and wings, and ragged wing membranes. Most of the bats in Sitton’s were tri-colored bats, clinging no bigger than a hen’s egg to the dimpled cave roof, jagged cracks and fantastical formations called draperies that droop shimmering folds of rock from the ceiling. The group also found federally endangered gray bats and a few big brown bats. Castleberry took the samples by rubbing long-handled cotton swabs on the bats’ muzzles and forearms, and on the rock beneath each bat. All will be analyzed as part of a national white-nose research project. The samples will be tested later to confirm the fungus is absent from the site. With funding from the federal State Wildlife Grants program, DNR has increased surveys to better assess bat populations, while also checking three bat-rich caves once each winter and following up on reports of suspicious bats from cavers and caving clubs. Geomyces destructans, the fungus that causes white-nose, thrives in cold, humid conditions. It takes its toll in winter, awakening bats from hibernation or less intense torpor for futile feeding trips that burn fat reserves, leading to death by starvation and cold. Bat-to-bat contact is likely the most common way that white-nose spreads. Affected sites generally track migration routes. While Georgia has no extremely large hibernacula, the state has mostly tri-colored bats, plus “a handful of gray bats using our habitat,” Castleberry says. Both cave-dwelling species have tested positive for white-nose in other states. Aware that the fungus can also be transmitted by people – including on their gear – Castleberry, Morris and Walker carefully follow decontamination protocols after leaving Sitton’s. The state’s white-nose response plan encourages disinfecting between sites and limiting trips into caves, particularly in winter. White-nose is not considered a threat to people, livestock or pets. But state and federal white-nose response efforts stress raising awareness of how people might accidentally spread the disease. Sitton’s was the last cave check this winter. Morris and Castleberry found more bats than expected; the total bumped the popular state park cave to second on the list of those monitored. But the lack of white-nose doesn’t mean Sitton’s, or the state, is out of the woods. DNR biologists will be underground again next winter, searching, sometimes miserable, ever hopeful they don’t find what they’re looking for. Georgians can help conserve bats and other animals not hunted, fished for or trapped, as well as native plants and habitats, through donating to the Georgia Wildlife Conservation Fund state income tax checkoff. Fill in any amount more than $1 on line 26 of the long state income tax form (Form 500) or line 10 of the short form (Form 500-EZ). Contributions can be deducted from refunds or added to payments. Also support wildlife conservation in Georgia by purchasing or renewing a bald eagle or a ruby-throated hummingbird license plate. These license plates and the Wildlife Conservation Fund income tax checkoff are vital to the DNR’s Nongame Conservation Section, which receives no state general funds. Visit www.georgiawildlife.com for more information, or call Nongame Conservation offices in Social Circle (770-761-3035), Forsyth (478-994-1438) or Brunswick (912-264-7218). On the Web - White-nose, www.georgiawildlife.com/WNSFAQ or www.fws.gov/WhiteNoseSyndrome - Decontamination protocols, www.fws.gov/WhiteNoseSyndrome/cavers.html - Reporting bats or signs of white-nose syndrome, www.georgiawildlife.com/WNSMonitoring
<urn:uuid:dbad1404-da7c-453f-98ad-9cac3079ea54>
CC-MAIN-2015-27
http://www.georgiawildlife.com/node/2899
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375097757.36/warc/CC-MAIN-20150627031817-00185-ip-10-179-60-89.ec2.internal.warc.gz
en
0.917838
1,113
3.125
3
Citizen-centric Municipal Governance Scorecard is an innovation for improving local good governance. The main objective is furthering local good governance through transforming good governance principles into practical, measurable processes and actions. The model consisted of 227 indicators for the seven principles along decision-making, resource allocation, service delivery and institutional capacity stages. The data collection is geared for citizen use, based on digitally available information. The Municipality Governance Scorecard (MGS) is an innovative tool with its design and content. The lack of good governance culture at local level cause multiple issues such as non-inclusive policy making, ineffective and inefficient use of resources, lack of participation and partnership. At the root of these issues are not enough openness, transparency and accountability. Also, citizen-centric public sector culture is not widespread. The MGS is an integrated tool for mapping and measuring the local good governance habitat and practices. The principles are turned into everyday practices for different policy stages and aspects of public governance. Thereby, it measures but also guides good governance mechanisms and practices. Furthermore, the best governance practices are identified and shared for peer-learning. The methodology, scorecards, best practices and indicators are shared in a Guide and also available at a website. What Makes Your Project Innovative? 1- It is innovative in terms of integrating good governance principles, open government agenda, integrated thinking and continuous learning in one design which is citizen centric. 2- Usable in an increasingly digitalizing world. 3- The Model is generic and can be applicable at different subnational levels across the countries. 4- The Model acts as a trigger for self-learning for multiple actors to develop their approaches and practices for cross-sector engagement. 5- Continuous learning based on measurable indicators and peer-learning incentivized through best practice promotion. What is the current status of your innovation? The Model was applied for 37 district municipalities of Istanbul and the results were published for public attention. The data collected allowed common positive and negative aspects for evaluation. The overall grades were between 30-65% which gave a fairly good picture of the whole but also each municipality scorecard identified the individual positions. All the data is available online for the municipalities which also increased the credibility of the model, its findings and scores as well. Relying on the findings, certain recommendations were made to citizens, NGOs, the central government, municipalities, academia and media for the improvement of local governance culture at the municipalities. The learned lessons were communicated at different part of the country through workshops. Currently, two new municipal scorecards are being prepared in partnership with two other NGOs; one on social gender equality and another one for green municipality. This proved its strength and usability. Collaborations & Partnerships As Argüden Governance Academy, we partnered with Sabancı University for exercising the right to information exercise, neighborhood chiefs federation (TUMFED) for survey and training and the Union of Marmara Municipality for the diffusion workshops. Each actor contributed to the process and gained important experience from the implementation of the model. Users, Stakeholders & Beneficiaries Citizens: each resident can look up the governance performance of their respective municipality with the backing information, which are negative and positive. Also, they can use the indicators to initiate civic action for achieving transparency, accountability, participation and advocacy. Government officials: both local and central government officials are able to understand and identify the good governance practices in each district municipality. They can enforce, fund or improve development actions. Results, Outcomes & Impacts The findings, their communication and workshops gave indisputable picture of the current situation. The good governance agenda turned into practical use among the different stakeholders. The media and municipalities started to use the scorecards for self-promotion or criticism for improvement. The Union of Municipalities in three different regions carried out workshop in partnership with the Academy for their member municipalities to benefit from the lessons and model. The central government institutions wish to do new projects, training and activities with the Academy for improving local good governance. Two NGOs initiated scorecard method for gender and ecology issues with our assistance. The UN, OECD and the World Bank invited to different events for experience sharing. Challenges and Failures The main challenge was difficulty of understanding the difference between government and governance concepts. The public tended to understand the scorecards as performance for government whereas they indicated the measurement of good governance culture and practices. In response, at each occasion we communicated about the difference and highlighted the close linkage between the two concepts and their practical relevancy. Conditions for Success The main factor for improving good governance in the municipalities depend on the leadership and guidance. If the main decision makers understand and adopt the MSC approach, they will own the process and enforce its implementation at the different departments along the value chain. Although the legislation foresees certain practices of good governance, it is by the ownership of the leaders and their consistent efforts that improvement will occur. There are two different NGOs in Türkiye which we cooperate in developing Gender Equality Governance Scorecard and Green Municipality Governance Scorecard. The partnerships were formed with the request of two different NGOs to use the model of the MSC. Hence, it has proven its value and diffusion capacity for further applications in different aspects of local governance. Furthermore, the Council of Europe and the World Bank already accepted it as a best practice which indicates its international relevancy. The most important lesson was that local governments and NGOs would accept and use such innovations if they find relevant and useful for their benefit. Hence, the efforts should be put on creating narratives for better understanding with the backing of resources and feasibility of such claims. - Identifying or Discovering Problems or Opportunities - learning where and how an innovative response is needed - Developing Proposals - turning ideas into business cases that can be assessed and acted on - Implementation - making the innovation happen - Evaluation - understanding whether the innovative initiative has delivered what was needed - Diffusing Lessons - using what was learnt to inform other projects and understanding how the innovation can be applied in other ways 20 May 2019
<urn:uuid:592e309d-b3d4-47d9-ba64-caf710f1c756>
CC-MAIN-2022-40
https://oecd-opsi.org/innovations/municipality-governance-scorecard/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335444.58/warc/CC-MAIN-20220930051717-20220930081717-00676.warc.gz
en
0.94173
1,301
2.65625
3
Chimpanzee Physical Characteristics and Locomotion Written By: Dani Sarusi, Coordinator, Community Engagement, JGI Canada Category: Great Apes How well do you know your closest living relative? Chimpanzees and humans are more alike than different, sharing 99% of our DNA. Baby chimps spend the first five years in a close bond with their mothers, and family bonds endure throughout lifetimes. Chimpanzees can be afflicted with diseases that affect humans. Like us, they have a sense of humour, and will laugh when tickled. Check out these other chimpanzee facts. Chimpanzees have black hair, not fur. Sometimes they have white whiskers on their chin. Like humans, chimps have flat faces. Their forward-facing eyes and small noses mean they rely more on their sense of sight than on their sense of smell. They have bare skin on their palms, hands, and soles of their feet. They have longer arms than legs which is why they walk on the soles of their feet and knuckles of their hands. Their opposable thumbs and big toes which enable a precision grip on branches.
<urn:uuid:c05fa241-e8f7-493c-ba6d-11fdb10b8dfd>
CC-MAIN-2018-51
https://janegoodall.ca/our-stories/chimpanzee-physical-characteristics-locomotion/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827097.43/warc/CC-MAIN-20181215200626-20181215222626-00032.warc.gz
en
0.948505
243
3.5625
4
So there you are on Back-to-School Night being warm and enthusiastic in front of your students’ parents. You’re showing the parents that their children are in capable hands-you’re accessible, knowledgeable, and enthusiastic. In short, it’s going to be a good year in Spanish class. And then…the Ghosts of Spanish Teachers Past rear their heads. It starts with a comment like: “I had 2 years of high school Spanish and don’t remember a thing.” Or “I had a terrible time in Spanish class, barely passed it/flunked it.” Or “Never saw the use of taking 2 years of Spanish.” You might get this compliment: “You are so much nicer than my Spanish teacher-she was a Nazi in a dress (had bad breath, a hairy wart, terrible dandruff, or was just plain crazy)” In other words, don’t expect me to be able to do much to help my child with this class. Now the problem with these ghosts is that your students have heard these “ghost stories” before they walked into your class and these parents still occasionally are haunted by them. These ghosts have planted the seed of negativity. So what do you do? Time to be a Ghostbuster with a weed-whacker! We know that we need parents on our side, but it’s a challenge when the parent has had a negative experience. What we need to do is break down those obstacles and overcome those objections. In essence, that Back-to-School Night spiel is a sales pitch and a pep talk. We need to sell the benefits of learning another language and then show parents how they can help, whether they had a good, bad, or no experience in Spanish class. - REMIND parents that learning another language has a multitude of benefits from the personal to the professional. Study after study shows that learning another language reinforces skills in the first language, is an excellent brain exercise. It is a useful tool on a vacation to another country, and opens the world to us. Since Spanish is fast becoming a second language in this country, it is a useful and sometimes a vital skill for a number of professions. It could make the difference between getting and not getting a job. In the current state of economic affairs, monolingual is a liability. Whack that ghost! - HELP: Ok, so they understand that this is not just some fluff class. But what can they do to help? I used to suggest to parents that they ask their child to teach them Spanish. It’s good for both of them since it reinforces what the student did in class and the parent learns something or gets a refresher course from someone they love who definitely isn’t that Nazi in a dress. Another ghost gone. We know that there is a LOT of vocabulary to learn. Flashcards are a great way to review a lot of vocabulary in a short time. Here’s where the parents can help. - TEACH: Have them quiz their child using these homemade vocabulary cards. Depending on the creativity of the parent and child, there are some great games they can play using this tool. The student learns the vocabulary and spends some time with his/her parent. The whole family can get involved if they choose. Both students and parents can make learning Spanish fun. That sounds like a good thing on so many levels. Fly away, Ghost of Spanish Teachers Past! There are so many plans of attack to combat these ghosts and root out the negativity they have sown. What are some of your strategies to combat the ghosts of Spanish teachers past?
<urn:uuid:00c3bf3d-5690-4ba2-a9b7-46d6b3ab311e>
CC-MAIN-2023-50
https://vhlblog.vistahigherlearning.com/ghosts-of-spanish-teachers-past.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100705.19/warc/CC-MAIN-20231207221604-20231208011604-00865.warc.gz
en
0.96311
768
2.65625
3
HUMANITY is at risk from being completely wiped out by a colossal comet, a professor has warned. A leading expert recently cautioned that the Earth's defences are woefully inadequate to protect against enormous rocks hurtling through space. He pointed to the 2013 Chelyabinsk meteor in Russia as proof of how such a rock can “sneak up” and strike without warning. But Prof Joel Marks from the University of New Haven in the US state of Connecticut has said meteors and asteroids are not the only threat. Speaking exclusively to Sun Online, the professor said people were right to be concerned about the space rocks. But he claimed that comets pose a much greater threat to the earth’s inhabitants. DOOMSDAY SPACE ROCK FEARSGigantic asteroid shaped like a clenched FIST 'could pose threat to humanity' APOCALYPSE NOWNative American tribe predicts comet will destroy Earth soon... and their predictions are spookily accurate Prof Marks said: “The most dangerous impactor of all would be a long-period comet. “These objects are typically large enough to wipe us out entirely (like the one that probably wiped out the dinosaurs). “And they come with very little advance warning – typically 9 months – whereas a suitable defence could require decades of preparation.” Comets – as opposed to meteors and asteroids which are made up of rock and metal – are icy collections of dust and small, rocky particles. They can range in size from a few hundred feet to tens of miles in diameter – and the professor says when they approach they hurtle towards Earth much faster than their rocky cousins. Prof Marks is now calling for more to be done to develop an effective system to protect the planet from a possible devastating comet strike, claiming that “currently we are defenceless”. The revelation comes as Earth prepares to pass through the debris-strewn wake of the colossal 10mile-long Halley’s comet. Many watching the beautiful spectacle will be unaware it is an ominous reminder of the apparent peril the planet faces. We pay for your stories! Do you have a story for The Sun Online news team? Email us at [email protected] or call 0207 782 4368.
<urn:uuid:13fdb455-2920-48d0-87fc-eaa22e879dc0>
CC-MAIN-2018-05
https://www.thesun.co.uk/news/2015343/professor-reveals-threat-humanity-comets/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886397.2/warc/CC-MAIN-20180116090056-20180116110056-00310.warc.gz
en
0.943811
479
3
3
Simply begin typing or use the editing tools above to add to this article. Once you are finished and click submit, your modifications will be sent to our editors for review. use during Nürnberg Rally ...lengthy orations. Buildings were festooned with enormous flags and Nazi insignia. The climax of the rallies was the solemn consecration of the colours, in which new flags were touched to the Blutfahne (Blood Banner), a tattered standard said to have been steeped in the blood of those killed in Hitler’s abortive Beer Hall Putsch of November 8–9, 1923. What made you want to look up Blutfahne?
<urn:uuid:a6ea21ed-3f4e-4abb-8435-ca34437bfe94>
CC-MAIN-2014-42
http://www.britannica.com/EBchecked/topic/70603/Blutfahne
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507443062.21/warc/CC-MAIN-20141017005723-00282-ip-10-16-133-185.ec2.internal.warc.gz
en
0.954374
141
2.984375
3
A stroke may occur if an embolism travels from another part of the body and lodges within an artery in the brain. When an internal arterial wall becomes damaged, various types of emboli can form, such as one derived from platlets, thrombotic, cholesterol, or mixed. In this example, an embolism is formed in the internal carotid artery, breaks loose, travels towards the brain and lodges in a cerebral artery. The blocked artery deprives the brain of oxygen, damaging the surrounding brain tissue. The result is a stroke. Luc Jasmin, MD, PhD, Department of Neurosurgery at Cedars-Sinai Medical Center, Los Angeles, and Department of Anatomy at UCSF, San Francisco, CA. Review provided by VeriMed Healthcare Network. Also reviewed by David Zieve, MD, MHA, Medical Director, A.D.A.M. Health Solutions, Ebix, Inc.
<urn:uuid:70bff74a-75f6-4cfb-8c02-84ceefca8955>
CC-MAIN-2018-13
https://www.indiatoday.in/lifestyle/health/story/story/stroke/1/390298-299741-2014-09-24
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645405.20/warc/CC-MAIN-20180317233618-20180318013618-00276.warc.gz
en
0.920652
197
3.234375
3
The Fukushima Fifty are the brave individuals who have stayed behind at Japan's troubled Fukushima Daiichi Nuclear Power Plant, where, working in shifts of fifty, they are desperately trying to contain the situation in an attempt to avert a national disaster. By continuously exposing themselves to high levels of radiation, they are knowingly jeopardizing their health and lives. The Fukushima Fifty may feel they are just doing their jobs, but to everyone else they are already heroes. Japan has eighteen nuclear power plants, which together house a total of fifty four reactors. These plants generate about 29% of the country's electricity. The Fukushima Daiichi plant is situated on Japan’s east coast, near the town of Okuma. It is one of the twenty five biggest nuclear power stations worldwide and contains six reactors. REACTOR UNIT 1 There was an explosion in Unit 1 on Saturday, March 12. The blast tore off the wall and roof of the outer containment vessel, but reportedly left the reactor intact. Four people were injured in the blast and locals were subsequently ordered to leave the area. The reactor has since been filled with seawater to cool it down. REACTOR UNIT 2 Late Monday night, workers noted that the unit was unstable. They injected seawater to avoid further damage to the reactor, but it didn’t work: an explosion occurred the following morning at 6 a.m. The blast damaged the inner steel containment vessel and the cores of both reactors may have partially melted. It was then that Japanese officials acknowledged that radiation levels were becoming dangerous. The bulk of the plant’s staff were asked to leave, though a crew, now called the Fukushima Fifty, stayed back. Those workers were then asked to evacuate because of a spike in radiation levels. According to some sources, they have now returned. REACTOR UNIT 3 Right after the explosion at Unit 1, a hydrogen explosion occurred at the third reactor, tearing away the outer frame of the building. Currently, the third unit is under inspection and not operational. REACTOR UNIT 4 Reported to be offline at the time of the tsunami, Unit 4 caught fire on Tuesday morning. That occurred shortly after the explosion at Unit 2. The reactor erupted as a result of pressure build-up within the structure again on Wednesday, setting the outer walls ablaze. Fire and smoke can no longer be seen, but Japanese nuclear agency officials were unable to confirm if the fire has been put out. In order to contain the incident, they are spraying seawater and boric acid over the structure. REACTOR UNITS 5 & 6 Nothing has occurred at the fifth and sixth reactors. Both units were not operating when the earthquake hit. They are an anonymous band of lower and mid-level managers who are risking their lives at the very heart of Japan’s nuclear crisis. But as the stricken reactors at the Fukushima nuclear plant appears to stabilize, plant owners are still remaining tight-lipped about the so-called 'Fukushima Fifty' - the heroes fighting to save Japan from nuclear catastrophe. Fifty essential workers stayed behind to stop a catastrophic meltdown at the plant, as 750 of their colleagues were evacuated earlier this week when the over-heating seemed to be getting out of control. Five are now believed to have died, fifteen are injured and others have said they know the radiation will kill them as they battle to cool overheating reactors and spent fuel rods.
<urn:uuid:f3a414bc-be25-4793-8d04-fc80c32b65d8>
CC-MAIN-2017-30
http://heavencanwaitcardsandgifts.blogspot.com/2011/03/bodhisattvas-of-fukushima.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423808.34/warc/CC-MAIN-20170721182450-20170721202450-00528.warc.gz
en
0.978674
704
2.921875
3
Excessive hair loss is a severe indication of illness. Hair is an integral part of your appearance, and you should take good care of it. A lot of factors add on to your hair loss, be it vitamin deficiency, internal illness, water, pollution or simply due to how you maintain them. The primary factor you should consider is how frequently you are losing hair and in how much quantity!? Hair loss of around 50 to 100 strands every day is common. Winters tend to enhance your hair loss too, and that's normal. If you shed more than this amount, primary factors could be that you are recovering from an illness, going through any treatment, a lot of stress, or maybe just because you shower with hard water. If these aren't the case, then you should definitely consult a dermatologist. Hair loss is mostly due to iron or vitamin deficiency, or due to some genetic issues. Baldness is a nightmare for everyone. According to NHS (National Healthcare System), in the UK, 50% of men experience baldness at the age of 50. Male pattern baldness may show its effect in men as early as when they are around 20s, with a receding hairline, followed by thinning of hair around temples and crown. Women experience something similar, mostly after or when they are nearing menopause. Generally, hair loss is temporary, and soon, the follicles will regrow, and your locks will return. But sometimes, hair loss is one of the primary indications of a severe health problem. Let's discuss the three common severe conditions which you must be aware of: Also referred to as an underactive thyroid gland, this is a condition in which your thyroid gland doesn't produce enough hormones. The common symptoms are hair loss, weight gain, depression, and tiredness. According to NHS, it affects 15 in every 1000 women and 1 in every 1000 men. It is one of the dangerous health conditions anyone can have. Though hair loss is commonly a result of chemotherapy, certain hair loss conditions indicate a different type of cancer. For example, Hodgkin's lymphoma is one of the rarest deadly diseases that includes a lot of side-effects like fatigue, fever, swelling of lymph nodes around the neck, armpit, severe headaches along with hair loss. Hair loss is one of the first signs shown in people who have Lupus. It is an autoimmune disorder where the body attacks itself causing severe fatigue and joint pain. Hair sheds in patches for people who suffer from Lupus. It is not only responsible for hair loss on your head, but you may also experience hair thinning in your beard, eyebrows, eyelashes and other body hair. Prevention is always better than cure. Keep yourself protected from the harsh weather conditions and maintain a healthy lifestyle. Add a balanced diet and daily exercise in your routine to keep yourself fit and further away from any possible health issues. Hair loss can be treated with the right medication and diagnosis, only when you change your lifestyle for good.
<urn:uuid:11f13e57-9081-4c12-b0a3-de69ad6b3b9f>
CC-MAIN-2020-50
https://misters.in/en/blog/hair-loss-conditions-you-must-not-ignore/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141732696.67/warc/CC-MAIN-20201203190021-20201203220021-00423.warc.gz
en
0.964574
617
2.6875
3
With the Soviet Union gone, the veil of deterrence Trident was hiding behind vanished The UK's Trident missile system came into service in 1992, ostensibly as a 'deterrent' against the Cold War threat of the Soviet Union. The problem is that the Soviet Union was formally dissolved on December 26th 1991, taking with it the veil of deterrence that Trident had been hiding behind. In reality, Trident is a 'first strike' system, capable of destroying targets almost anywhere on earth. The Trident II D-5 was designed to hit a target 100m across, 50 per cent of the time. From their submarine launchpads, Trident II missiles can reach their targets in 10-15 minutes - in comparison, land-based intercontinental missiles take 30 minutes. The Trident D-5 has a range of 7,000km or a massive 11,000km if carrying less warheads. So nowhere is safe - a submarine in the Atlantic can attack the Middle East, Russia or China! Instead of it's apparent passive role as deterrent, Trident is instead a major factor in pressurising other nations to produce their own nuclear weapons, Iran being a perfect example. Even if Trident was honestly believed by both the UK government and public to be the perfect deterrent, its capabilities outstretched its stated role. The missile system could be used in a first strike against the Soviet Union, or against any potential aggressor, by destroying their missiles before launch. Trident put Soviet commanders in a 'use them or loose them' position - they would either be forced to launch, or risk loosing their missiles. This meant that a false radar warning could lead to nuclear war, as Soviet commanders might believe they had no time to check whether they really were under nuclear attack, or whether the warning was triggered by a computer glitch or a flock of geese. Since the collapse of the Soviet Union, Trident has been repositioned as essential for securing the UK's 'vital interests' such as overseas trade, investment and resources including oil. The 2002 UK New Chapter to the Strategic Defence Review declared Trident "the ultimate security of the UK" and "a means of deterring major military threats". However, the document goes further, suggesting that Trident may be used pre-emptively "in the face of an imminent attack". In 2003, UK Defence Secretary Geoff Hoon emphasised that the UK would use Trident in Iraq if chemical or biological weapons threatened British troops. This demonstration of the UK's new 'positioning' of Trident is in line with US military policy. The Bush administration, in the 2002 Nuclear Posture Review, suggested the use of nuclear weapons in a pre-emptive role, to the point - in a bizarre public relations spin - of re-classifying nuclear weapons as 'conventional' tools of warfare. During 2002 and 2003, the Bush administration formulated a greater need for pre-emption, prompting the US military to create a strike plan (known as CONPLAN 8022) which deals with the operational aspects of pre-emptive strikes. Trident is listed as a tool with major advantages: "no risk to crew, can be launched in international waters, has a short flight time, stealth and surprise can be achieved prior to launch, flexible targeting capability." Each of the four UK Trident submarines can carry 16 Trident missiles, each of which can carry 12 warheads - a potential of 192 warheads. Since 1998, UK Trident submarines carry just 48 warheads, or an average of three warheads per missile. However, because of potential sub-strategic use, some missiles carry just one warhead. To put this in perspective, each warhead can deliver a destructive blast eight times that of the Hiroshima bomb. Trident is not a 'UK' weapons system - this is another well-worn myth. Nearly all of the weapon parts are sourced or leased from the US, with few exceptions, such as the warhead, is manufactured in the UK based on the US W76 design. The software, targeting and weather data are all US-sourced. Even Aldermaston, the UK's development facility, is part-managed by Lockheed-Martin Corporation while Devonport, the UK naval base in Plymouth, is part-managed by controversial US corporation Halliburton. There is also extensive cooperation between Aldermaston and US nuclear laboratories like Los Alamos in New Mexico and both Sandia and Lawrence Livermore in California. Even UK testing was done in the US as the UK has no test zone for such manoeuvres. While the warhead was tested in Nevada in the early 1990s, the 'British' missiles themselves were test launched at Cape Canaveral under US supervision. The continued development of Trident threatens both the Nuclear Non Proliferation Treaty and world stability. It's time to take Trident off patrol.
<urn:uuid:b0a33327-f6b1-4ead-9f79-4ac45add6ac5>
CC-MAIN-2016-26
http://www.greenpeace.org.uk/peace/trident-the-uks-nuclear-weapons-system
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00192-ip-10-164-35-72.ec2.internal.warc.gz
en
0.957813
975
3.0625
3
When a honey bee returns to the hive it gives out samples of the flower's nectar to its hivemates. Then it performs a dance that identifies the distance, direction, quality, and quantity of the food supply. The "round dance" indicates a food supply that is near the hive. The "waggle dance" indicates a food supply that is farther away.
<urn:uuid:65c99b6f-c9aa-44ca-a488-944fbed563ee>
CC-MAIN-2018-39
http://www.pbs.org/wgbh/nova/bees/dancesdark.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156311.20/warc/CC-MAIN-20180919220117-20180920000117-00463.warc.gz
en
0.927108
79
2.78125
3
Join County of San Luis Obispo Public Library and 16 other library systems for free documentary film viewing and a Day of Remembrance event with George Takei. Seventy-five years ago, Executive Order 9066 paved the way to the profound violation of constitutional rights that resulted in the forced removal and incarceration of 120,000 Japanese Americans. Free digital access to the documentary And Then They Came for Us for one week only, starting Friday, February 12th. Please sign up to watch the film here http://gooddocs.net/attcfu-ca-public-libraries. Link to program will be emailed to you. Live discussion with George Takei about the film on Friday, February 19th from 4-5pm. Please register here https://us02web.zoom.us/webinar/register/WN_Tvs8yzqJQ62B3VuEP8S8Jw. Link to program will be emailed to you. If you can't get into the zoom meeting you can listen along here: https://youtu.be/MK97nGj_DKw Bring your questions to the Q&A or send them to [email protected]. George Takei is the author of the award-winning graphic novel memoir, They Called Us Enemy, his firsthand account of his years behind the barbed wires of internment camps as a result of Executive Order 9066. Mr. Takei’s acting career has spanned five decades, with more than 40 feature films and hundreds of television guest-starring roles to his credit. He is best known for his portrayal of Mr. Sulu in the acclaimed television and film series Star Trek. Mr. Takei is also a social justice activist, social media mega-power, New York Times bestselling author, originated the role of Sam Kimura and Ojii-Chan in the Broadway musical Allegiance, and the subject of To Be Takei, a documentary on his life and career. And Then They Came for Us is an award-winning documentary directed by the Peabody Award winning team of Abby Ginzberg and Ken Schneider. Featuring George Takei and many others who were incarcerated, as well as newly rediscovered photographs by Dorothea Lange, And Then They Came for Us brings history into the present, retelling this difficult story and following Japanese American activists as they speak out against the Muslim registry and travel ban. Knowing our history is the first step to ensuring we do not repeat it. And Then They Came for Us is a cautionary and inspiring tale for these dark times.
<urn:uuid:5ad4ad5d-7452-43e6-a91a-c1b618a03dd5>
CC-MAIN-2021-10
http://slolibrary.evanced.info/signup/EventDetails?EventId=25001&backTo=Calendar&startDate=2021/02/01
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178367949.58/warc/CC-MAIN-20210303230849-20210304020849-00437.warc.gz
en
0.954264
537
2.65625
3
Sonography and ultrasonography are interchangeable terms that refer to using sound waves to view images inside the body. Because it is sometimes difficult to diagnose the problems occurring in areas of the body like soft tissue, doctors and technicians use this technology to figure out what is happening inside patients. Becoming a technician isn’t difficult, and on average, pays about $64,000 a year, according to the U.S. Bureau of Labor Statistics. The ultrasound or sonography program you enter will vary depending on your previous experience. If you want to get a simple, postsecondary certificate allowing you to work as an ultrasound technician, you must already have a degree. If you have no prior degree or experience, you will need to enter a program, usually at the associate level, certifying you to work in the field. Most programs also require a period of clinical work to gain experience. Learning from a professional already in the field is the way sonography and ultrasound technicians usually hone their craft after their schooling is done. Because the technology is used for much more than simply looking at fetuses, which many people associate them with, technicians must be familiar with most areas of the body, and how they look both when healthy and when unhealthy. Usually, students work with experts in their areas of specialty to learn about that specific part of the body and the procedures and equipment that go along with it. Because sonography and ultrasound technicians spend a lot of their time pushing and pulling heavy equipment around and moving patients, you must be able to consistently deal with weights of 50 pounds or more. You must also have the use of both hands, which are instrumental in the precision work required to view specific areas inside the body. Communication is another necessary skill, since you will often be required to relay information to patients or those accompanying them without the mediation of a doctor. Certifications and Examinations Before you may officially enter the world of sonography and ultrasounds, you must become certified in the field. The American Registry for Diagnostic Medical Sonography is responsible for certifying hopeful technicians through a variety of different examinations that test students’ proficiency with different parts of the body. Students may sign up for exams that cover diagnostic medical areas, such as the abdomen or breast; cardiac specialties, such as adult, fetal or pediatric cardiography; or proficiency in vascular or musculoskeletar systems. - Photodisc/Photodisc/Getty Images
<urn:uuid:fe04e76c-369b-4962-8e31-654920b90dba>
CC-MAIN-2018-26
https://classroom.synonym.com/requirements-sonography-ultrasound-tech-school-33840.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864795.68/warc/CC-MAIN-20180622201448-20180622221448-00285.warc.gz
en
0.94929
498
2.640625
3
Water Quality Monitoring at St. Joseph Bay Aquatic Preserve Management activities at St. Joseph Bay Aquatic Preserve have been discontinued as of July 1, 2011. This page describes one of the former ecosystem science programs which will be restarted should revenue streams improve. The water quality monitoring program utilized several methods to record the bay’s water characteristics. Over time, baseline data is used as a tool for managing the water quality in the bay. The preserve partnered with the University of Florida’s LakeWatch program to monitor nutrients in the bay and document: - total nitrogen and - algae content, and - water clarity. Results indicated the need to identify sources of pollution in specific areas of the bay. The preserve used dataloggers to monitor water quality. Two stations in the bay continuously monitored: - dissolved oxygen - water level A datalogger sited on a dock. This data was used to identify trends in water quality and allowed the preserve to track environmental changes in the ecosystem. Meteorological data was collected monthly by the weather station, and correlated with the water quality In 2005, due to the increased occurrence of red tide (Karenia brevis) in St. Joseph Bay, the preserve partnered with the Fish and Wildlife Research Institute to begin collecting water samples to measure concentrations of brevitoxins and domoic acid. The data was used to determine what time of year these numbers may escalate or be absent. More information on the Water Quality Monitoring Program at St. Joseph Bay Aquatic Preserve is available in the St. Joseph Bay Aquatic Preserve Management Plan. Water Quality Monitoring Stations Map December 13, 2012 3900 Commonwealth Boulevard M.S. 235 Tallahassee, Florida 32399 850-245-2094 (phone) / 850-245-2110 (fax) DEP Home | About DEP | Contact Us | Search |
<urn:uuid:a657bada-f5be-4939-bbff-0619708939f7>
CC-MAIN-2014-35
http://www.dep.state.fl.us/coastal/sites/stjoseph/science/water.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500815756.79/warc/CC-MAIN-20140820021335-00104-ip-10-180-136-8.ec2.internal.warc.gz
en
0.858677
416
2.828125
3
Both Java and C++ have references. Are they practically the same or are they significantly different? Java has no pointers. So are references in Java like pointers in C++? Are there code structures around references and pointers that are the same in the two languages but do different things? For a senior C++ programmer, the best way to explain java, or part of java, is to say: - All declarations of variables, parameters, attributes, etc. that are of type Object or that inherit from Object are always "pointers". - Objects never reside in the "stack" or in "global memory" they always reside in the java object heap. - The reason that the C++ pointer (the "*") in such declarations does not exist in java is that it is always 100% implicit and it is impossible to declare object variables that are not pointers (C++ style without "*") . I mean objects that do not reside in the "heap". - As all the declarations (variables etc) that inherit from Object are always pointers, and there is no possibility of anything else, they eliminated the "*", it is always implicit. - "new" is always used to create new instances. New object instances cannot be created without "new". (or use of JNI). - Objects cannot be "delete", it is the JVM that knows which objects are "alive" and which are not. The garbage collector looks at the "soup" of existing objects and from some "roots" it knows how to decide which one is alive (is accessible) and which one is no longer accessible from the "roots". - Java objects can change their memory address over time. But the programmer never sees what those addresses are (unlike C++), and the JVM always maintains the integrity of the "soup" of java objects on the heap. When you move an address object, all references from clients change properly. This is 100% transparent to the programmer/user. - Any variable, of type Object or inheriting from Object, can always be assigned null (ALL such declarations are pointers).
<urn:uuid:6cbafd76-bcf7-4afb-befd-b23c8e2e862e>
CC-MAIN-2023-50
https://yeahexp.com/what-are-the-differences-between-references-and-pointers-in-c-and-in-java-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100626.1/warc/CC-MAIN-20231206230347-20231207020347-00808.warc.gz
en
0.928373
439
2.953125
3
By Sarah A. of our food supply has reached a tipping point! We are at a crossroads in choosing if we will follow the European guidelines which prohibit Genetically Modified Foods (GMOs) into their own body and into their children’s mouth. On my homepage blog (dr-lobisco.com), I discussed all the negative health, environmental, economic, and societal consequences of consuming GMOs. These include: 1. Health Detrimental Effects: Animal studies link the consumption of GMOs to harm the reproductive system (including infertility), the digestive system, liver, and 2. Environmental Effects: The increase of the use of toxic pesticides, hormones, and mono-agriculture on our environment. 3. Economic Effects: The banning of our food products to certain countries due to their GMO content. 4. Political Effects:The political division and the controversy about the Monsanto Protection Act. weekend, Dr. Mercola reported on some very exciting news about our power to make a decision. Specifically, the tipping point in consumer spending for verified Non-GMO or GMO-free sales has leaped by 15-30 percent since the Prop. 37 campaign to label GMOs in California. What this means is that within the next few months, what consumers buy will ultimately determine our democratic voice to be heard by food producers, governmental organizations, and political So, what do moms, pets, and faith have to do with GMOs? These groups, based on love, facts, and belief have sparked this change to begin with! According to Dr. Mercola’s article: The Institute for Responsible Technology began a massive campaign this summer to drive the non-health conscious shopper – the Walmart and Safeway shopper – into the non-GMO product category by focusing on the following four categories: - Mothers. Moms may sometimes not switch their own diet for themselves but they’re dedicated when it comes to protecting their children, and there’s ample evidence showing that children are most at-risk from GE foods. An impressive 1.7 million people watched Jeffrey Smith’s film “Genetic Roulette” during free-showing weeks in 2012, and many of them were parents, who immediately acted on the information and saw the results for themselves. Says Smith: was speaking at MIT recently and someone from the audience said, “We saw the film. Before that, my six-and-a-half-year old was violent and out of control. They wanted to take him out of school and actually label him retarded. After changing his diet, a month later, I had a new child. All of those problems went away.” We’re getting that information out to the moms.” - The sick, and their doctors. Mounting research has linked GE foods to a number of diseases and disorders. Studies are also implicating two of the main toxins related to GE foods, Roundup and Bt toxin, to all sorts of diseases. go around the country and ask audiences, “How many of you have significantly removed GMOs from your diet? And then I say, “Okay, tell us all what improvements you’ve noticed.” We hear: allergies; headaches; fatigue; gastrointestinal disorders; kidney- and liver problems; diabetes; high blood pressure; skin problems; aggression; depression; infertility. Someone said, “My client couldn’t get pregnant for five years, switched to a non-GMO diet, and was pregnant three weeks later. Another woman said, “My four-year-old started talking.” We hear from parents of autistic kids -even from an autistic person directly – who told me when they switched to a non-GMO diet, the symptoms alleviated. An autistic man in his 60’s came up to me and said, “I would never be able to come to this meeting with you had I not changed my diet, because these symptoms were preventing me from this type of social interaction… A lot of people also lose weight when they get rid of GMOs. It’s another main feature that we have to highlight, which we haven’t done a good job at.” - Religious groups. The Institute is also talking to people of various religious faiths, whose scriptures tell them to respect the natural way of things. realize when they look inside this technology of mixing and matching across kingdoms and species and forcing DNA into new species that have never been there before, that it is against their faith. And then when they see the evidence showing that it’s actually causing health problems, it confirms what they believe. Many of them are getting onboard to direct their congregations to - Pet owners. Many pet owners will tell you, their animals are just as much part of the family as any child is. And, as with children, animals are also among the most at-risk. are finding – based on the experiences of veterinarians and pet-owners – that animals that eat the byproducts of the human food supply are suffering from the same diseases and disorders that humans are suffering from. We have veterinarians saying that animals and livestock – pets and horses – are all suffering from eating GMOs and improve when they get rid of GMOs,” Smith says. Mercola, J. How Genetically Engineered Foods Will Be Eradicated. Mercola.com. September 1, maternal nutrition prenatally could have lasting impact even before baby is born and have consequences on the health of our future generation. For this reason, I’d like to add pregnant moms as the fifth most influential group. According to these two highlighted studies below optimal maternal nutrition - A series of interventions — half of them involving micronutrients — could save close to 1 million lives every year among those suffering from a chronic lack of vitamins and minerals - Maternal multiple micronutrient supplementation, energy protein supplements, and calcium supplementation during pregnancy, along with salt iodization, are estimated to save 102,000 lives a year - Vitamin A and zinc supplementation for children are estimated to save 145,000 lives a year - Promotion of early and exclusive breastfeeding for 6 months, and continued breastfeeding for 24 months, is estimated to save 221,000 lives a year - In the US, many people are also suffering from unidentified nutritional deficiencies, often due to consuming an overly Vitamin Intervention Could Save a Million Lives Annually. Mercola.com. August Maternal and Child Nutrition: Executive Summary of Maternal and Child Nutrition Series. thelancet.com. Published June 6, 2013. Mom’s Diet and Child’s Risk of Cleft The use of the maternal Western diet increases the risk of offspring with a cleft lip or cleft palate approximately two fold. Therefore, dietary and lifestyle profiles should be included in preconception screening programs. Ocke MC, van der Spek PJ, Yazdanpanah N, Steegers EA, Steegers-Theunissen RP. Maternal Western dietary patterns and the risk of developing a cleft lip with or without a cleft palate. Obstet Gynecol. 2007 Aug;110(2 Pt 1):378-84. Prenatal Probiotics and Asthma Prevention Study Results Prenatal and/or early-life probiotic administration reduces the risk of atopic sensitization and decreases the total IgE level in children but may not reduce the risk of asthma/wheeze. Follow-up duration and strain significantly modified these effects. Future trials for by CouponDropDown”>asthma prevention should carefully select probiotic strain and consider longer follow-up. et al. Probiotic Administration in Early Life, Atopy, and Asthma: A Meta-analysis of Clinical Trials (abstract). Pediatrics. Published online August 19, 2013. (doi: SO, come with me, BREAKFREE of poor quality food with poor quality health results. Join the tipping point! Find out how on my
<urn:uuid:80d60296-e7c2-4cb3-88c9-5aea7ada2891>
CC-MAIN-2021-43
https://www.saratoga.com/living-well/2013/09/how-moms-pets-and-faith-can-save-the-health-of-future-generations/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585265.67/warc/CC-MAIN-20211019105138-20211019135138-00579.warc.gz
en
0.930705
1,768
2.515625
3
Real mode, also called real address mode, is an operating mode of 80286 and later x86-compatible CPUs. Real mode is characterized by a 20 bit segmented memory address space (giving exactly 1 MB of addressable memory) and unlimited direct software access to all memory and I/O addresses and peripheral hardware. Real mode provides no support for memory protection, multitasking, or code privilege levels. 80186 CPUs and earlier, back to the original 8086, have only one operational mode, which is equivalent to real mode in later chips. All x86 CPUs in the 80286 series and later start in real mode when reset. The 286 architecture introduced protected mode, allowing for (among other things) hardware-level memory protection. Using these new features, however, required a new operating system that was specifically designed for it. Since a primary design specification of x86 microprocessors is that they be fully backwards compatible with software written for all x86 chips before them, the 286 chip was made to start in 'real mode' — that is, in a mode which turned off the new memory protection features, so that it could run operating systems written for the 8086 and the 80186. To this day, even the newest x86 CPUs (including x86-64 CPUs) start in real mode at power-on and can run software written for any previous chip (with a few exceptions due to slight instruction set differences). The PC BIOS which IBM introduced operates in real mode, as do the DOS operating systems (MS-DOS, DR-DOS, etc.). Early versions of Microsoft Windows ran in real mode, until Windows 386, which ran in protected mode, and the more fully realized Windows 3.0, which could run in either real or protected mode. Windows 3.0 could actually run in two "flavours" of protected mode: "standard mode", which ran using protected mode, and "386-enhanced mode", which is a virtualized version of standard mode and thus would not run on a 286. Windows 3.1 removed support for real mode, and it was the first mainstream operating environment which required at least an 80286 processor. Almost all modern x86 operating systems (Unix, Linux, OS/2, Windows 95 and later, etc.) switch the CPU into protected mode at startup, but 64-bit operating systems will use this only as another stepping stone to get to long mode. It is worth noting that the protected mode of the 80286 is considerably more primitive than the improved protected mode introduced with the 80386; the latter is sometimes called 386 protected mode, and is the mode most modern 32-bit x86 operating systems run in. The 8086, 8088, and 80186 have a 20-bit address bus, but the unusual segmented addressing scheme Intel chose for these processors actually produces effective addresses which can have 21 significant bits. This scheme shifts a 16-bit segment number left four bits (making a 20-bit number with four least-significant zeros) before adding to it a 16-bit address offset; the maximum sum occurs when both the segment and offset are hexadecimal FFFF, yielding FFFF0h + FFFFh = 10FFEFh. (The small "h" on the end of each number denotes hexadecimal notation.) On the 8086, 8088, and 80186, the result of an effective address that overflows 20 bits is that the address "wraps around" to the zero end of the address range, i.e. it is taken modulo 2^20 (2^20 = 1048576 = 100000h). However, the 80286 has 24 address bits and computes effective addresses to 24 bits even in real mode. Therefore, for the segment FFFFh and offset greater than 000Fh, the 80286 would actually make an access into the beginning of the second binary megabyte of memory, whereas the 80186 and earlier would access an address equal to [offset]-10h ( = [offset]-16 decimal), which is at the beginning of the first megabyte. (Note that on the 80186 and earlier, the first 1 KB of the address space, starting at address 0, is the permanent, immovable location of the interrupt vector table.) So the actual amount of memory addressable by the 80286 and later x86 CPUs in real mode is 1 MB + 64 KB - 16B = 1114095 Bytes. Full article ▸
<urn:uuid:474ab9e4-eeb2-4173-a1a3-0c0c212e199e>
CC-MAIN-2013-48
http://www.princeton.edu/~achaney/tmve/wiki100k/docs/Real_mode.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163049615/warc/CC-MAIN-20131204131729-00006-ip-10-33-133-15.ec2.internal.warc.gz
en
0.925382
923
3.515625
4
On the last weekend of October, my niece was visiting Washington D.C. in the middle of what she called a huge anti-war demonstration. As tens of thousands of anti-war Americans marched, she visited the Korean and Vietnam war memorials. Are war memorials to remember so we will never go to war and kill so many again, she asked, overwhelmed by the number of dead listed in the memorials, or are they to glorify war? This is a good question to ponder on Remembrance Day. I myself have always been uncomfortable wearing the red poppy because of this ambiguity. I liked it when peace activists gave out a white poppy on Remembrance Day that was clearly for peace. Canada has always had a strong peace movement. Powerful anti-war sentiment in Quebec made conscription a central issue of national unity in both the First and Second World Wars. The modern womens movement in Canada was born of a peace group, the Voice of Women for Peace. In the dark days of the Cold War in the early sixties, these women helped to stop nuclear testing in the U.S. by collecting baby teeth and showing that nuclear testing in the Nevada desert was poisoning infants across North America. They were part of a small but determined group of Ban the Bomb, anti-nuclear activists that stood up to the Cold War hysteria and fought to stop the arms race. In the late sixties, Canada played an important role in opposing the U.S. adventure in Vietnam. In an independence from the American government almost unimaginable today, Canada permitted young American men who opposed the war to escape the draft by coming to Canada. The draft dodgers, as they were called, formed the centre of a vibrant anti-war movement on our side of the border. In this era, when the rich and powerful can go to war killing thousands of people while barely risking life or limb of their own soldiers, anti-war activism has never been more important. The Bush doctrine of pre-emption, which declares that the United States has the right to invade sovereign countries and overthrow their governments if they are seen as hostile to U.S. interests, must be stopped. If we as citizens sit by and permit the United States to use its overwhelming military might to enforce a regime change in Iraq today, what will stop them from using it against Venezuela or Brazil tomorrow? The U.S. has been waging a cold war against Iraq ever since the Gulf War, through sanctions and periodic bombing raids. Infant mortality in Iraq has tripled since the 1980s. Today, thirteen per cent of Iraqi children die before their fifth birthday. The biggest problem is the lack of potable water and the breakdown of sewage treatment plants, both due to sanctions. The U.S. has successfully blocked most of the food for oil initiatives taken at the U.N. Still, a war will massively increase the death toll. In the U.S. and across Europe, a mighty anti-war movement has already taken to the streets to stop the war against Iraq before it starts. There were an estimated 200,000 in Washington and 400,000 in London at the end of October. In Italy, millions have marched against war over the last month. George W. Bushs determination to go to war against the long-suffering people of Iraq has provoked a massive reaction around the globe. Canada is lagging behind. While there is strong anti-war sentiment in Canada, action on the streets has, so far, been modest. On Saturday, November 16 an anti-war demonstration is planned for Queens Park in Toronto. A large anti-war coalition is planning a peace march in Vancouver from Peace Flame Park on the following day as part of a Cross-Canada Day of Action. While Canadians alone cant stop the hand of George W. Bush, we can ensure that our government does not support the war against Iraq by joining the growing anti-war movement in the United States and Europe. On this Remembrance Day, let us remember the terrible suffering inflicted by war and promise in the words of a famous anti-war song, war no more. Thank you for reading this story… More people are reading rabble.ca than ever and unlike many news organizations, we have never put up a paywall – at rabble we’ve always believed in making our reporting and analysis free to all, while striving to make it sustainable as well. Media isn’t free to produce. rabble’s total budget is likely less than what big corporate media spend on photocopying (we kid you not!) and we do not have any major foundation, sponsor or angel investor. Our main supporters are people and organizations -- like you. This is why we need your help. You are what keep us sustainable. rabble.ca has staked its existence on you. We live or die on community support -- your support! We get hundreds of thousands of visitors and we believe in them. We believe in you. We believe people will put in what they can for the greater good. We call that sustainable. So what is the easy answer for us? Depend on a community of visitors who care passionately about media that amplifies the voices of people struggling for change and justice. It really is that simple. When the people who visit rabble care enough to contribute a bit then it works for everyone. And so we’re asking you if you could make a donation, right now, to help us carry forward on our mission. Make a donation today.
<urn:uuid:ef26c835-cd9d-4396-8df0-78fbc040a4ba>
CC-MAIN-2021-04
https://rabble.ca/news/war-stories
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704821253.82/warc/CC-MAIN-20210127055122-20210127085122-00237.warc.gz
en
0.962948
1,131
2.765625
3
This article needs additional citations for verification. (August 2016) (Learn how and when to remove this template message) Primary succession is one of two types of biological and ecological succession of plant life, occurring in an environment in which new substrate devoid of vegetation and other organisms usually lacking soil, such as a lava flow or area left from retreated glacier, is deposited . In other words, it is the gradual growth of an ecosystem over a longer period of time. In contrast, secondary succession occurs on substrate that previously supported vegetation before an ecological disturbance from smaller things like floods, hurricanes, tornadoes, and fires which destroyed the plant life. In primary succession pioneer species like lichen, algae and fungi as well as other abiotic factors like wind and water start to "normalize" the habitat. Primary succession begins on rock formations, such as volcanoes or mountains, or in a place with no organisms or soil. Primary succession leads to conditions nearer optimum for vascular plant growth; pedogenesis or the formation of soil, and the increased amount of shade are the most important processes. These pioneer lichen, algae, and fungi are then dominated and often replaced by plants better adapted to less harsh conditions, these plants include vascular plants like grasses and some shrubs that are able to live in thin soils that are often mineral based. Water and nutrient levels increase with the amount of succession exhibited. The early stages of primary succession are dominated by species with small propagules (seed and spores) which can be dispersed long distances. The early colonizers—often algae, fungi, and lichens—stabilize the substrate. Nitrogen supplies are limited in new soils, and nitrogen-fixing species tend to play an important role early in primary succession. Unlike in primary succession, the species that dominate secondary succession, are usually present from the start of the process, often in the soil seed bank. In some systems the successional pathways are fairly consistent, and thus, are easy to predict. In others, there are many possible pathways. For example, nitrogen-fixing legumes alter successional trajectories. Spores of lichen or fungus, being the pioneer species, are spread onto a land of rocks. Then, the rocks are broken down into smaller particles. Organic matter gradually accumulates, favoring the growth of herbaceous plants like grass, ferns and herbs. These plants further improve the habitat by creating more organic matter when they die, and providing habitats for insects and other small animals. This leads to the occurrence of larger vascular plants like shrubs, or trees. More animals are then attracted to the area and a climax community is reached. One good example of primary succession takes place after a volcano has erupted. The lava flows into the ocean and hardens into new land. The resulting barren land is first colonized by pioneer organisms, like algae, which pave the way for later, less hardy plants, such as hardwood trees, by facilitating pedogenesis, especially through the biotic acceleration of weathering and the addition of organic debris to the surface regolith. An example of this is the island of Surtsey, which is an island formed in 1963 after a volcanic eruption from beneath the sea. Surtsey is off the South coast of Iceland and is being monitored to observe primary succession in progress. About thirty species of plant had become established by 2008 and more species continue to arrive, at a typical rate of roughly 2–5 new species per year. Another example takes place after a glacier in Signy Island, South Orkney Islands, Maritime Antarctic. Glacier retreat is becoming more normal with the warming climate, and lichens and mosses are the first colonizers. The study, conducted by Favero-Longo et al. found that lichen species diversity varies based on the environmental conditions of the previously existing earth that is first exposed and the lichens reproductive patterns. - Ecological succession - Pioneer species - Secondary succession - Soil creation - Stability (ecology) - "Biology Online Dictionary". Biology Online. Retrieved 12 October 2011. - Walker, Lawrence R.; del Moral, Roger. "Primary Succession". Encyclopedia of Life Sciences. doi:10.1002/9780470015902.a0003181.pub2. Retrieved 9 December 2015. - Baldocchi, Dennis. "Ecosystem Succession: Who/What is Where and When" (PDF). Biomet Lab, University of California, Berkeley. Retrieved 9 December 2015. - Fujiyoshi et al., “Effects of Arbuscular Mycorrhizal Fungi and Soil Developmental Stages on Herbaceous Plants Growing in the Early Stage of Primary Succession on Mount Fuji.” - Korablev and Neshataeva, “Primary Plant Successions of Forest Belt Vegetation on the Tolbachinskii Dol Volcanic Plateau (Kamchatka).” - Chapin, F. Stuart; Pamela A. Matson; Harold A. Mooney (2002). Principles of Terrestrial Ecosystem Ecology. New York: Springer. pp. 281–304. ISBN 0-387-95443-0. - The volcano island: Surtsey, Iceland: Plants, Our Beautiful World, retrieved 2 February 2016 - Favero-Longo et al., “Primary Succession of Lichen and Bryophyte Communities Following Glacial Recession on Signy Island, South Orkney Islands, Maritime Antarctic.”
<urn:uuid:e2c9685c-86b6-4999-899b-9d4ccac75b64>
CC-MAIN-2020-29
https://en.wikipedia.org/wiki/Primary_succession
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657167808.91/warc/CC-MAIN-20200715101742-20200715131742-00506.warc.gz
en
0.906493
1,133
4.21875
4
Educational Philosophy and Theory 40 (3):362–382 (2008) The German philosopher Max Scheler defines the human person as a value-oriented act structure. Since a person is ideally a free being with open possibilities, the aim of education is to help human beings develop their potential in various directions. At the centre of Scheler's educational philosophy is the idea of all-round education, which aims towards a developed capacity for assessment, an ability to make choices and an ability to focus on the objective nature of things. |Keywords||education person Scheler| |Categories||categorize this paper)| References found in this work BETA The Nature of Sympathy.Max Scheler, Peter Heath & W. Stark - 1955 - Philosophical Review 64 (4):671-673. Citations of this work BETA No citations found. Similar books and articles Personalism and the Metaphysical.John J. Drummond - 2005 - American Catholic Philosophical Quarterly 79 (1):203-212. Max Scheler (1874-1928): Centennial Essays.Max Scheler & Manfred S. Frings (eds.) - 1974 - M. Nijhoff. Exemplary Persons and Ethics.John R. White - 2005 - American Catholic Philosophical Quarterly 79 (1):57-90. Max Scheler's Tripartite Anthropology.John White - 2001 - Proceedings of the American Catholic Philosophical Association 75:255-266. Book Review:Man's Place in Nature Max Scheler, Hans Meyerhoff; Ressentiment Max Scheler, Lewis Coser, William W. Holdheim. [REVIEW]Leon J. Goldstein - 1963 - Philosophy of Science 30 (3):292-. The Meaning of Objectivism and Realism in Max Scheler's Philosophy of Religion: A Contribution to the Understanding of Max Scheler's Catholic Period.Hanna Hafkesbrink - 1941 - Philosophy and Phenomenological Research 2 (3):292-309. Scheler Versus Scheler.Jonathan J. Sanford - 2005 - American Catholic Philosophical Quarterly 79 (1):145-161. Book Review:Formalism in Ethics and the Non-Formal Ethics of Values: A New Attempt Toward the Foundation of an Ethical Personalism. Max Scheler; Selected Philosophical Essays. Max Scheler. [REVIEW]Peter H. Spader - 1978 - Ethics 88 (3):271-. Scheler on Feeling and Values.Jonathan J. Sanford - 2002 - Proceedings of the American Catholic Philosophical Association 76:165-181. Added to index2009-01-28 Total downloads54 ( #96,433 of 2,164,542 ) Recent downloads (6 months)1 ( #347,995 of 2,164,542 ) How can I increase my downloads?
<urn:uuid:3863436a-26d1-46bf-8123-71a43e2fb093>
CC-MAIN-2017-26
https://philpapers.org/rec/PUOMSA
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321309.25/warc/CC-MAIN-20170627101436-20170627121436-00567.warc.gz
en
0.709699
597
3.203125
3
Penguins, Penguins, Everywhere! Release date: 02/01/2007 Like his Dem Bones and Dinosaur Bones , Barner's straightforward primer about all things penguin is anything but pedagogical. In fact, the rhyming verse resembles more of a lyrical lesson ("Cold penguins huddle close with penguin heat to share./ Daddies warm fragile eggs with tender, special care"). For those more familiar with Arctic penguins, Barner sets the record straight: that the black-and-white birds can live in both cool and warm climes. He divides his opening spread into a cool blue backdrop on the left and a warm golden setting on the right (with matching accents on the yellow-eyed penguin of New Zealand). Horizontal spreads make the most of icy landscapes and coral reefs, with collage elements introducing brightly colored starfish, and gray watercolor wash underscoring the Arctic chill. Splashy images of penguins at work and play range from those eluding predator seals to a sleepy penguin floating with its parent. At story's end, a "Penguin Puzzler" reveals answers to some of the more confounding questions ("Why do penguins look the way they do?"), while a "Penguin Parade" identifies their many types and habitats. Whether or not readers are penguin aficionados to begin with, they will likely end up knowing more than when they started. Ages 3-7. (Feb.)
<urn:uuid:aac5dc9d-2d3f-4b96-9eb4-55b6bdedc5a4>
CC-MAIN-2014-52
http://www.publishersweekly.com/978-0-8118-5664-5
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802776556.43/warc/CC-MAIN-20141217075256-00120-ip-10-231-17-201.ec2.internal.warc.gz
en
0.881187
297
2.671875
3
List of Common Writing Mistakes in English. Many words in the English language are commonly misused because they sound similar, yet they have different spelling and meaning (homonyms). Other words may not sound alike, yet might still be confusing. Common Writing Mistakes in English Affect is a verb meaning “influence, shape” and effect is a noun meaning “result, outcome.” Effect can be used as a verb only when it means to bring about or cause something to happen. - Will the study affect the school’s budget? (verb) - We are studying the effects of the environment on behavior. (noun) - We are hoping that the results will effect a change in his behavior. (verb) Accept is a verb that means to receive; except is a preposition that means excluding. - John will accept his award during the ceremony. - Everyone will be in attendance except his father. Ensure, Insure and Assure Ensure means to make something certain; insure means to guarantee something against monetary loss, or protect against risk; assure means to state in a convincing manner. - I cannot ensure that the contract is legally binding. - The stolen ring was insured for $5,000. - I can assure you of her sincerity. There, Their, They’re There refers to a place that indicates where something is located and can be used as a pronoun that introduces a sentence. Their is a plural possessive pronoun. They’re is a contraction of they are. - Please leave your dripping umbrella over there. (location) - There is no room for argument here. (introduces a sentence) - The students had to turn in their proposals on Wednesday. (possessive) - They’re meeting in the boardroom. A council is group of people that assembles for discussion; counsel means advice or guidance. - The council met twice every month. - He obviously did not want any legal counsel. Compliment means a statement of praise; complement means to go well with or perfect something else. - The customer sent his compliments to the chef. - The picture complements the design perfectly. Allusion is an indirectly made reference. Illusion is a misconception or false impression. - He made several allusions to the poem in his paper. - John was under no illusion about his new job; he knew exactly what to expect. Principle means rule or standard. Principal refers to a person who holds a high position or plays an important role; it also an adjective that means chief or leading. - The school principal will be resigning next year. - He has a principal reason for resigning. - He has always refused to compromise his principles. Elicit means to bring out, draw out, or evoke. Illicit means illegal. - Nothing the teacher said could elicit a response from the child. - He is in jail for illicit drugs. Its is a possessive pronoun that indicates ownership or possession; it’s is a contraction of it is or it has. Note: The use of contractions needs to be avoided in formal writing. - Place each item in its designated box. (possessive) - It’s a shame that Jerry cannot make it to the concert tonight. (it is) - It’s been a long time since he attended any musical event. (it has) An emigrant is one who leaves one’s native country to settle in another; an immigrant is one who enters and settles in a new country. - The emigrant spent four weeks aboard the ship before it landed in LA. - It is very hard for immigrants to find jobs. That usually introduces as essential phrase that is not set off by commas; which introduces a non-essential phrase that is set off by commas. - This is the room that we were looking for. (essential) - The old car, which I’ve had for years, has finally broken down. (not essential) The whole comprises (or includes) the parts; and the parts compose (or make up) the whole. - The United States comprises fifty states. - Organic compounds compose the fertilizer used by the farmer. Lie means to recline or rest on a surface; its principal parts are lie, lay, lain. Lay means to put or place; its principal parts are lay and laid. - I was so tired after work I had to lie down for a short time. - I laid the files on the desk. Common Writing Mistakes in English | Images
<urn:uuid:fa1ca858-20ab-41ba-9c70-03049744401b>
CC-MAIN-2018-51
https://www.eslbuzz.com/misused-words-common-writing-mistakes-in-english/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829140.81/warc/CC-MAIN-20181218102019-20181218124019-00371.warc.gz
en
0.961344
980
3.671875
4
EXERCISE SCIENTISTS have discovered a link between weak hips and that all-too-common knee agony known as patellofemoral pain syndrome(PFPS), which aggravates the front of the knee. Weak hip muscles cause a runner's form to slightly disintegrate—the hips can't adequately control the motion of the legs. This places unhealthy stress on the knee. These four exercises, done three times a week, help prevent and treat PFPS. Stand with shoulders relaxed and back. Step forward onto one heel, then your whole foot. Do not lean sideways. End with the knee above the midfoot and the thigh parallel to the ground. Return to start; repeat 10 times on both legs. Lie on one side and prop up your torso with your elbow. Press your feet into the floor, and slowly lift your hips up toward the ceiling. (If it's too difficult to balance, try the move with bent legs.) Hold for 15 to 20 seconds, and then switch sides. Lie on your back with knees bent. Squeeze your glutes while lifting your hips. Once you have your balance, rest one ankle on top of the other knee. Hold for five or more seconds; repeat five times on both legs. Stand, facing forward, in front of an eight-inch step. Step backward onto the step, setting only one foot down. Don't let the knee turn in. Balance, then return to start. Repeat 10 times on both legs. ABOUT 50 PERCENT OF RUNNING INJURIES INVOLVE THE KNEE, ACCORDING TO A BRITISH JOURNAL OF SPORTS MEDICINE REPORT.
<urn:uuid:89e0b005-417e-472c-a215-7e45bdf61702>
CC-MAIN-2018-34
https://www.runnersworld.com/health-injuries/a20797887/strengthen-your-hips-to-help-knee-pain/
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209165.16/warc/CC-MAIN-20180814150733-20180814170733-00126.warc.gz
en
0.891628
343
3.109375
3
Israel Independence Day is celebrated annually, according to the Hebrew calendar, on 5 Iyar, the anniversary of the establishment of the State of Israel. The day preceding this celebration is devoted to the memory of those who gave their lives for the achievement of the country's independence and its continued existence. This proximity is intended to remind people of the heavy price paid for independence. On this day the entire nation remembers its debt and expresses eternal gratitude to its sons and daughters who gave their lives for the achievement of the country's independence and its continued existence. Yom Hazikaron, Remembrance Day, which will begin on Monday evening, April 27, is a day of collective and personal anguish mingled with awe and honor for the fallen. The official events begin at 8:00 PM with a moment of national silence heralded by a one minute siren. Officer places a flag on a fallen soldier's grave. (Photo: IDF Spokesperson) The following morning, ceremonies commence at 11:00 AM at 43 IDF military cemeteries located throughout the country following a two minute blast of the siren. There will also be a ceremony for overseas Mahal volunteers who fought and died during the War of Independence, which will take place near the Sha'ar Hagai Junction. Israel's flag, adorned with a black ribbon and memorial flame, is placed on each and every grave of those who fell in Israel's battles and are buried in military cemeteries throughout Israel. It expresses the country's respect for the fallen as well as the entire country's participation in the grief of the families. "The ambassadors of peace shall weep bitterly..." - In memory of those who have fallen while on duty in the Israeli Foreign Service A total of 22,570 men and women have been killed defending the land of Israel since 1860, the year that the first Jewish settlers left the secure walls of Jerusalem to build new Jewish neighborhoods. In the past year, since Remembrance Day 2008, 133 members of the security forces - police, IDF, Border Police, Israel Security Agency and other organizations - have been killed in the service of the state. Israel's 61st Independence Day celebrations will commence on Tuesday evening, April 28, when the state flag is raised to full mast at a national ceremony on Mount Herzl, at which twelve torches are lit. Theodor Herzl was the leader and founder of the Zionist movement and increased international recognition for the need of a Jewish state. On May 14th, 1948, the day the British Mandate expired, the new Jewish state - the State of Israel - was formally established in parts of what was known as the British Mandate for Palestine. With the establishment of the State of Israel in 1948, Jewish independence, lost two thousand years earlier, was restored. Independence Day is filled with festivities and celebrations including picnics, barbecues, family gatherings and nature trips. Balconies, car windows, store fronts and more are liberally decorated with Israeli flags. Independence Day is a celebration of the renewal of the Jewish state in the Land of Israel, the birthplace of the Jewish people. In this land, the Jewish people began to develop its distinctive religion and culture some 4,000 years ago, and here it has preserved an unbroken physical presence, for centuries as a sovereign state, at other times under foreign domination. Throughout their long history, the yearning to return to the land has been the focus of Jewish life. Since its establishment, Israel continues to be a homeland to the thousands who make their way to Israel annually. It is home to some of the holiest religious sites of the three major religions, all which enjoy the democratic rights delineated in the Declaration of the Establishment of the State of Israel. Population of Israel: 7.4 million On the eve of Israel's 61st Independence Day, the Israel Central Bureau of Statistics announced that the population of Israel numbers 7,411,000 people - 5,593,000 Jews (75.5% of the total population) and 1,498,000 Arabs (20.2%); on the establishment of the State of Israel in 1948 the total population numbered 806,000. 70% of the total Jewish population are "Sabras" - born in Israel - compared with 35% native-born in 1948. Since Independence Day last year there have been approximately 154,000 babies born, and more than 12,000 immigrants arrived, in Israel. On Wednesday, April 29th beginning at 10:50PM Israel time, communities from around the world will join together to sing Israel's national anthem Hatikva. Broadcasting from Tel Aviv, the Mayor will join with over 100 young adults celebrating Tel Aviv's 100th Birthday and the 61st birthday of the State of Israel. Last year, Live Hatikva broke the Guinness Book of Records for the number of people singing a national anthem in unison. You're welcome to watch last year's Live Hatikva at http://www.livehatikva.org/. Live Hatikva will be broadcast around America and on the Internet streaming live at www.jltv.tv Relevant documents and websites
<urn:uuid:a4e2be0a-c371-4ab6-8929-a45d4997864d>
CC-MAIN-2014-42
http://www.mfa.gov.il/mfa/mfa-archive/2009/pages/israel_celebrates_61_years_independence_28-apr-2009.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507443062.21/warc/CC-MAIN-20141017005723-00112-ip-10-16-133-185.ec2.internal.warc.gz
en
0.943246
1,051
2.859375
3
Hi, Im really confused on one of the problems that I have for homework. Solve the system: x^2 + 2y^2 =33 x^2 + y^2 + 2x =19 Follow Math Help Forum on Facebook and Google+ Multiply the bottom equation by 2. Subtract the bottom from the top and you should get a quadratic which you can solve. okay, i did it out and got -1 + square route of six, and -1 - square route of six. Did i do it right? take it from there. ohhh ok thanks i get it now i did some stupid multiplication thing before Be sure you finish the problem! The reason rtblue said "take it from there" is that a solution is a pair of numbers, x and y. This problem has four separate solutions. View Tag Cloud
<urn:uuid:31bdbb05-a1a5-495e-9991-a386334f73c0>
CC-MAIN-2016-44
http://mathhelpforum.com/algebra/175328-solving-system.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720962.53/warc/CC-MAIN-20161020183840-00238-ip-10-171-6-4.ec2.internal.warc.gz
en
0.940816
187
3.109375
3
A scientist has revealed why we often wake up at 3am and think about every decision we've ever made. We've all been there, you bolt up in your bed and catastrophise everything, from our relationships and work, to that thing someone said to you at school 10 years ago. Well, it seems that there is a very good reason behind it. In a post on The Conversation, Greg Murray, a psychology researcher explained that it's incredibly common. He said: "In a normal night's sleep, our neurobiology reaches a turning point around 3 or 4am. "Core body temperature starts to rise, sleep drive is reducing (because we've had a chunk of sleep), secretion of melatonin (the sleep hormone) has peaked, and levels of cortisol (a stress hormone) are increasing as the body prepares to launch us into the day. "Remarkably, all this activity happens independent of cues from the environment such as dawn light - nature decided long ago that sunrise and sunset are so important that they must be predicted (hence the circadian system). "We actually wake up many times each night, and light sleep is more common in the second half of the night. When sleep is going well for us, we are simply unaware of these awakenings. "But add a bit of stress and there is a good chance that waking will become a fully self-aware state." The past year, Greg says, has also taken its toll on people, and affected our shut eye. He added: "Not surprisingly, there is evidence the pandemic is a sleep-disturbing stressor. So if you're experiencing 3am wakings at the moment, you're definitely not alone." And this often culminates in us staying awake and thinking our whole lives over. But why? Greg said: "Around this time in the sleep cycle, we're at our lowest ebb physically and cognitively. "From nature's viewpoint, this is meant to be a time of physical and emotional recovery, so it's understandable that our internal resources are low. "But we also lack other resources in the middle of the night - social connections, cultural assets, all the coping skills of an adult are unavailable at this time. "With none of our human skills and capital, we are left alone in the dark with our thoughts. "So the mind is partly right when it concludes the problems it's generated are unsolvable - at 3am, most problems literally would be. "The truth is, our mind isn't really looking for a solution at 3am. We might think we are problem-solving by mentally working over issues at this hour, but this isn't really problem-solving; it's problem-solving's evil twin - worry." If you're struggling with this, though, Greg does have some words of advice. He said: "I bring my attention to my senses, specifically the sound of my breath. When I notice thoughts arising, I gently bring my attention back to the sound of breathing (pro tip: earplugs help you hear the breath and get out of your head). "Sometimes this meditation works. Sometimes it doesn't. If I'm still caught in negative thinking after 15 or 20 minutes, I follow the advice from cognitive behavioural therapy, and get up, turn on dim light and read." Featured Image Credit: Alamy Topics: Science, World News, Interesting, Sleep
<urn:uuid:7782518e-c518-47ae-b187-96a1b1cd2a75>
CC-MAIN-2023-14
https://www.ladbible.com/news/news-theres-a-reason-why-we-wake-up-around-3am-and-think-about-our-fears-20211014
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945030.59/warc/CC-MAIN-20230323065609-20230323095609-00147.warc.gz
en
0.961917
714
2.765625
3
They turn to social apps before they turn into teens. Teach your children to take precautions to protect them on social media. by Featured Provider Daniel Pelzer on Tuesday, October 30, 2018 Written by BJ Towe As a parent, it’s your duty to keep your children safe. But how can you protect kids from potential bullying and other dangerous behaviors lurking within social media networks? “A common reaction is to ban social media altogether but, in today’s connected world, that’s not realistic,” says Dr. Daniel Pelzer, a pediatrician with The Iowa Clinic in West Des Moines. “Kids will find a way to connect with their friends via a wide variety of social media apps, and they all have the potential to harm. The best defense is for parents to be involved in their child’s online life.” Should your child even have a social media account? Legally speaking, no child under the age of 13 should have a social media account without verifiable consent from their parents. But let’s be real — that’s next to impossible to enforce. In fact, on Facebook alone, a Consumer Reports survey found there are as many as 7.5 million kids under 13 years old and 5 million under the age of 10. But, says Dr. Pelzer, “Most kids under age 13 aren’t yet able to logically think through the things they see or do on social media. For example, they don’t understand who else might view their selfie. It could be reposted, solicit negative comments or even be used in ads.” Turning 13 doesn’t mean a child is ready to handle social media, either. “Research shows that more than half of all teens have made new friends via social networks, and more than 20 percent have actually met up with at least one friend they made online. Obviously, that’s dangerous,” Dr. Pelzer says. How can you help your kids have positive online experiences? There are good things about social media. It can help kids stay connected with friends and family. It helps them connect with others who have similar interests. Through the sharing of ideas, art and music, it can build creative-thinking skills. Social media can also be the conduit for getting involved with charitable organizations, advocacy groups and other organizations that have philosophies you support. To accentuate the positive, Dr. Pelzer says parents play a critical role. Be involved in your child’s online life. Most parents are clueless when it comes to their kids’ social media activity. About 60 percent of parents underestimated how lonely, worried or depressed their kids were. About 97 percent underestimated the amount of fighting on social media. And many kids secretly use apps their parents may never have heard of or switch to the latest apps their friends are on — and their parents aren’t. “From the moment your child starts using electronic devices, proactively talk with them about what they’re doing. Ask them to show you how to use apps they like. Join any network your child uses and monitor their activity — and when you see something that concerns you, have a loving conversation with your child about it. When parents are involved in their kids’ online lives, kids are less likely to be negatively impacted by things they see online,” Dr. Pelzer adds. To help your child develop a healthy self-esteem as well as protect their physical safety, have frequent conversations about the things they see online. For example, they may feel hurt when they learn about events and activities that didn’t include them. They may see negative comments made about them online. (For help dealing with your child’s emotions, read the article, “Emotion Coaching: One of the Most Important Parenting Practices in the History of the Universe.”) Or they may overshare, exposing events or thoughts too broadly. “Help your child put the things they see online into proper perspective. For instance, it’s important for them to know that others’ constantly happy posts don’t reflect their full-time realities. They should never compare themselves to what they see online because that’s not real,” says Dr. Pelzer. “And carefully monitor your child’s connections. Help them understand why it’s never a good idea to connect with people they don’t already know,” he says. Be a good role model. It is important to demonstrate the healthy online behaviors you expect from your child: Leverage parental controls. All the popular social media apps have privacy settings or parental controls. Research how to effectively use them, then do so. For an added layer of protection, download an app that is designed to help keep kids safe, such as Pocket Guardian, MamaBear, Circle and Apple’s Family Sharing. None of these is foolproof, so review the benefits of each and choose the one that suits you best.
<urn:uuid:60731fd1-f773-4400-9fa4-a10ef874c3cc>
CC-MAIN-2022-27
https://www.iowaclinic.com/primary-care/specialties/pediatrics/how-to-keep-your-kids-safe-on-social-media/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104205534.63/warc/CC-MAIN-20220702222819-20220703012819-00178.warc.gz
en
0.934431
1,248
2.984375
3
Affiliation: University of Tampere - A method for reporting and classifying acute infectious diseases in a prospective study of young children: TEDDYMaria Lönnrot University of Tampere, Tampere, Finland BMC Pediatr 15:24. 2015..The numbers and frequencies of acute infections and infectious episodes are shown... - Diagnosis of enterovirus and rhinovirus infections by RT-PCR and time-resolved fluorometry with lanthanide chelate labeled probesM Lonnrot Department of Virology, Medical School and University Hospital of Tampere University, Tampere, Finland J Med Virol 59:378-84. 1999..High sensitivity, rapidity, and easy performance make the assay suitable for the routine diagnosis of enterovirus and rhinovirus infections... - Enterovirus RNA in serum is a risk factor for beta-cell autoimmunity and clinical type 1 diabetes: a prospective study. Childhood Diabetes in Finland (DiMe) Study GroupM Lonnrot JDFI Center for Prevention of Type 1 Diabetes in Finland, Tampere, Finland J Med Virol 61:214-20. 2000.... - Enterovirus infection as a risk factor for beta-cell autoimmunity in a prospectively observed birth cohort: the Finnish Diabetes Prediction and Prevention StudyM Lonnrot JDFI Center for Prevention of Type 1 Diabetes in Finland and the Department of Virology, University of Tampere Medical School and Tampere University Hospital Diabetes 49:1314-8. 2000..Our data imply that enterovirus infections are associated with the development of beta-cell autoimmunity and provide evidence for the role of enteroviruses in the initiation of beta-cell destruction... - Enterovirus infections as a risk factor for type I diabetes: virus analyses in a dietary intervention trialK Sadeharju JDRF Center for Prevention of Type 1 Diabetes in Finland, Department of Virology, University of Tampere Medical School and Tampere University Hospital, Tampere, Finland Clin Exp Immunol 132:271-7. 2003..These results suggest that enterovirus infections are associated with the induction of beta-cell autoimmunity in young children with increased genetic susceptibility to type I diabetes... - Enterovirus infections in early childhood and the risk of atopic disease--a nested case-control studyL Korhonen Department of Virology, School of Medicine, University of Tampere, Tampere, Finland Clin Exp Allergy 43:625-32. 2013..Enterovirus infections in childhood have been associated with a reduced risk of atopy in cross-sectional studies... - Comparison of enterovirus-specific cellular immunity in two populations of young children vaccinated with inactivated or live poliovirus vaccinesS Juhela Turku Immunology Centre, Department of Virology, University of Turku, Finland Clin Exp Immunol 117:100-5. 1999..This may explain the lower incidence of IDDM in Estonia by providing effective protection against diabetogenic enterovirus strains in Estonian children...
<urn:uuid:cef32473-64cb-4ba5-a3e2-d41a7c7df6bb>
CC-MAIN-2016-40
https://www.labome.org/expert/finland/university/lonnrot/m-lonnrot-676000.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661349.6/warc/CC-MAIN-20160924173741-00179-ip-10-143-35-109.ec2.internal.warc.gz
en
0.813537
660
2.609375
3
That’s why veterinary emergency clinics are very busy with cases of pancreatitis during the holidays. But is the answer really that simple? How does that explain why one dog can regularly raid the garbage and gorge on fatty bits and never get pancreatitis, while another gets a little piece of steak or nothing at all and becomes severely ill? How does it explain why you can have two dogs of the same breed in the house, eating exactly the same stuff, and one of them stays perfectly healthy while the other one dies from severe acute or chronic pancreatitis? The truth is that while we are familiar with risk factors for the disease, we don’t fully understand its true cause(s). Why can one dog’s pancreas can deal with anything that gets thrown at it and another breaks down? What makes one dog more vulnerable than the other? So what are the known risk factors, beside fatty meal(s) or table scraps? Trauma to the pancreas or a tumor Anything that disrupts normal pancreatic tissue can cause the inflammation that is at the heart of pancreatitis. Reflux of duodenal contents The duodenum is the first section of small intestine, into which bile and pancreatic enzymes are secreted. Pancreatic enzymes are created in an inactive form and get activated once they enter the duodenum. If, however, duodenal contents get backwashed into the pancreas, the digestive enzymes will be prematurely activated. Breed does play a role. Miniature Schnauzers, Miniature Poodles, and Cocker Spaniels get pancreatitis more frequently than other breeds, but any dog is at risk. Hyperlipidemia, an excessive amount of fat molecules (lipids) in the blood, is associated with episodes of pancreatitis. Interestingly, it doesn't seem to be always clear what comes first, the chicken or the egg—or in this case, hyperlipidemia or pancreatitis. Hyperlipidemia most commonly occurs as a result of other disorders, such as diabetes mellitus, hypothyroidism, Cushing’s disease, some liver diseases or kidney disease. Some breeds are more predisposed to primary hyperlipedimia where no such underlying disorder can be identified. These include as Miniature Schnauzers, Beagles, Shetland Sheepdogs, Briards, Rough Collies and Poodles. Hyperlipedimia can also occur after a meal of high-fat foods. Yes, folks, here it is again. In particular, pancreatitis is more prevalent in overweight spayed females. There is a higher incidence of pancreatitis in dogs with diabetes, Cushing’s syndrome and hypothyroidism. These diseases are all associated with metabolic changes and hyperlipedimia (see above). Excessive levels of calcium in the blood can activate stored (inactive) digestive enzymes. Hypercalcemia is typically associated with some cancers, parathyroid dysfunction, kidney failure, Addison’s disease or vitamin D poisoning. Certain drugs or toxins increase the risk of pancreatitis Drugs that can predispose dogs to pancreatitis are certain antibiotics, anti-seizure medications and some chemotherapy agents. The role of corticosteroids is controversial. To my thinking, though, if Cushing’s can be a risk factor, so can corticosteroids. Exposure to certain organophosphate insecticides has also been implicated. High stress can be a contributing factor too. Think about it. Flight or fight response leads to major metabolic changes in the body, which includes release of high levels of cortisol. Some new studies seem to be showing that chronic inflammation can drive the immune system to destroy the pancreas. Some studies in humans show that antioxidant deficiencies might play role in chronic pancreatitis. The pancreas is not an island In chronic cases, the function of other organs, particular digestive organs, needs to be evaluated. IBD and liver, gallbladder and kidney disease can play a role. Here is a rare one for those who live in relevant geographic areas, scorpion stings. Scorpion venom can also trigger inflammation of the pancreas. And then there are dogs who get pancreatitis and nobody ever figures out why as well as those dogs who live with low-grade pancreatitis that never gets diagnosed. And, of course, there is Cookie who got pancreatitis after getting into horse feed. Pancreatitis is not a simple problem. But before you give your dog some fatty scraps, please think twice about it. That is the simplest way to help prevent your dog from getting pancreatitis. Acute Pancreatitis – A Disease That Should Not Be Ignored! Primer On Pancreatitis The Perplexities of Pancreatitis The House Is On Fire! Bridget's Pancreatitis Holistic Look At Pancreatitis Dog With Pancreatitis In Critical Condition The Project That Is Cookie: Pancreatitis Up Close And Personal Pancreatitis: Cookie’s Blood Work Another Belly Upset: Pancreatitis Again Or Not? Pancreatitis: Official Veterinary Killjoy Of The Holidays Pancreatitis: Bandit's Last Treat
<urn:uuid:faacb242-7a69-4270-927f-40d37c54661c>
CC-MAIN-2017-13
http://dawgbusiness.blogspot.com/2014/03/pancreatitis-what-causes-it.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186891.75/warc/CC-MAIN-20170322212946-00178-ip-10-233-31-227.ec2.internal.warc.gz
en
0.901162
1,112
3.171875
3
All Glossary terms found in this site are listed below. Adaptive Management: A structured, iterative process of systematically testing assumptions to learn, adapt and improve decision-making in the face of uncertainty. Adaptive management encompasses the design, management and monitoring of a strategy. Biodiversity: the variability within and among all living organisms and the ecological complexes in which they occur. Biodiversity includes ecosystem or community diversity, species diversity, genetic diversity and the ecological and evolutionary processes that sustain it. Community of Practice (CoP): As defined by Etienne Wenger, who coined the term, a CoP is a group "of people who share a concern or a passion for something they do and learn how to do it better as they interact regularly...[reflecting] the fundamentally social nature of human learning." A CoP exists when a learning community shares a domain, a community and a practice. http://wenger-trayner.com/resources/what-is-a-community-of-practice/ Conceptual model: A conceptual model is a tool for visually depicting the context we want to change and, in particular, the major forces that are influencing nature and people within the scope analyzed. It is a diagram that uses a series of boxes and arrows to succinctly represent a set of causal relationships among factors that are believed to impact one or more conservation targets. Conservation Action Planning (CAP): CAP is the precursor to the Open Standards for Conservation. CAP is a framework developed by The Nature Conservancy in the 1990s to help practitioners focus their conservation strategies on a limited number of biodiversity elements (conservation targets), articulate the threats to these conservation targets, and then measure and adaptively manage the resulting strategies over time. CAP was a foundational conservation planning approach for the Conservancy used extensively internally and by partners until the mid-2000s. Since the mid-2000s, the Open Standards (see below) has expanded and improved on CAP, and thus it is the more current methodology. Conservation by Design 2.0 and the Open Standards are intended to update and replace that workbook and we urge practitioners to use them instead of CAP. Conservation Business Planning: this was the previous iteration of the Conservancy's conservation planning approach. CbD 2.0 Guidance replaces Conservation Business Planning (CBP). Note that the majority of CBP attributes were carried forward into this Guidance. The principle objective of conservation business planning was to clarify expectations and help managers and teams focus on what is most important and useful in planning, as well as produce brief, useful and dynamic conservation business plans. Interested staff can find archived information about CBP here Conservation Coaches Network (CCNet): A formal network of practitioners who have been trained in the Open Standards and in coaching others to use them. CCNet is global, with over 500 trained coaches from 60 countries. Please see Appendix B for more information about CCNet. Conservation Target: is a type of primary interest that is directly associated with biodiversity. It is defined as entities, traits, processes or values we aim to conserve, it can include species, ecosystems and other aspects of biodiversity, as well as, environmental services or natural processes. Driver: A generic term for an element of a conceptual model including direct and indirect threats, opportunities and stakeholders. Also known as a factor or root cause in Open Standards. Ecosystem services: The benefits nature provides to people. Ecosystem services can provide material benefits (such as food, water and employment) or intangible benefits (such as spiritual values and intellectual satisfaction) and can contribute to any component of human well-being. Evaluation: an assessment of a program’s impact. Evidence: the body of reported data and information that we draw from or build in the design and implementation of conservation strategies. Free, Prior, and Informed Consent (FPIC): the principle that anyone has the right to give or withhold information or knowledge that they possess, and any community or individual has the right to give or withhold consent to proposed projects that may affect the lands they customarily own, occupy or otherwise use. It implies the absence of coercion and outside pressure (Free), having sufficient time to allow for information-gathering and full discussion; including translations into traditional languages, before a project starts (Prior); having all the relevant information available reflecting all views and positions (Informed); and the demonstration of clear and compelling agreement, in keeping with the decision-making structures of the communities in question, including traditional consensus procedures (Consent). See Appendix C for more information Goal, or Minimum Goal Statement: generated early on in the conservation process and describes the lowest acceptable threshold for success, for nature and connected human well-being interests. Minimum goals are converted to outcome statements when strategies are selected and the theory of change is articulated. Healthy Country Planning ("HCP"): An approach used by Indigenous Australians, facilitated by conservation coaches, that adapts the Open Standards to guide Indigenous communities in making a plan to look after their country, culture, and people, and to identify ways to develop livelihoods while managing their lands appropriately. HCP puts the decisions about the planning approach, the use of the planning tools, the planning content, and the strategic decisions that emerge from it, back in the hands of the people whose country it is. It is planning with people and place, not for people and place. Human Well-Being: A state of being in which one's needs are met, one can act meaningfully to pursue chosen goals, and one enjoys a satisfactory quality of life. Human well-being is a complex state that can be defined by multiple components, including basic sustenance, health, education, work and leisure, governance, social cohesion, security, and equality. Human well-being focal area: Broad aspects of life that broadly define human well-being. The Conservancy has developed a human well-being framework that includes eight focal areas. Please see Appendix E for more details. Human well-being interest: a type of primary interest that deals specifically with people. It specifies the human well-being focal area or component that the Conservancy and other project partners care about. Typically the draft goal statement and final outcome statements are set for only a subset of identified human well-being interests. Impact: The desired future state of a conservation target or human well-being. Intermediate result: essential precursors to achieving outcomes. Intermediate results are often the near-term focus of strategies and evidence that the theory of change is playing out as expected. Knowledge sharing: the spectrum of activities through which information, skills, and expertise are exchanged. Measures: express the results of monitoring and analysis in the context of outcomes and management decisions. Monitoring: the act of collecting information over time to provide data on a project's status. Nature: Biodiversity and ecosystem services, as well as the processes necessary to maintain them. Open Standards: A project of the Conservation Measures Partnership (CMP) to combine principles and best practices in adaptive management and results-based management from conservation and other fields to create the Open Standards for the Practice of Conservation. The Open Standards bring together common concepts, approaches, and terminology in conservation project design, management, and monitoring in order to help practitioners improve the practice of conservation. Outcome: statement detailing desired impact of project, such as the desired future status of a conservation target or human well-being interest. An outcome statement should be linked to conservation targets and/or connected human well-being interests, impact oriented, measurable, time limited and specific. Outcome Mapping: "an approach to planning, monitoring and evaluation that puts people at the centre; defines outcomes as changes in behavior; and helps measure contribution to complex change processes.” www.outcomemapping.ca Primary interests: A general term for the topics that planning organizations, influential actors, and important stakeholders care about in the context of the socio-ecological system or problem, and their desires for conservation. There are two major types of primary interests: nature (i.e., biodiversity, conservation target) and people (i.e., human well-being interest). Typically draft goals and outcomes are set for only a subset of identified primary interests. Relevant groups: the people that are affected – positively or negatively – by environmental change and conservation actions. Results Chain: A results chain is a diagram that depicts the assumed causal linkage between an intervention and desired impacts through a series of expected intermediate results. Return on Investment (ROI): A performance measure used to evaluate the efficiency of an investment or to compare the efficiency of a number of different investments. In conservation strategies, return on investment assess the increase in the conservation outcomes per unit cost of the conservation action. Situation analysis: an assessment that identifies and weighs the key challenges affecting primary interests in a place or problem, including the political, socioeconomic, institutional, and ecological factors creating impacts or threats, driving change, and providing opportunities for conservation intervention. Social safeguards: are a means to ensure we uphold human rights and achieve long-term sustainable conservation outcomes in addition to being a risk assessment and mitigation tool. Socio-Ecological System: defined by Singh et. al 2012 as: 1) a coherent system of biophysical and social factors that regularly interact, 2) a system that is defined at several spatial, temporal, and organizational scales, which may be hierarchically linked, 3) a set of critical resources (natural, socioeconomic, and cultural) whose flow and use is regulated by a combination of ecological and social systems, and 4) a perpetually dynamic system with continuous adaptation. Stakeholder: Any individual, group, or institution who has a vested interest in the natural resources of the project area and/or who potentially will be affected by project activities and have something to gain or lose if conditions change or stay the same. Strategy: The set of actions or interventions that a project implements in order to achieve a desired impact for nature and people. Strategy Mapping: spatial representation of the impact of different candidate strategies, based on the distribution and status of conservation targets, human well-being targets and threats, and mapping of enabling conditions of intermediate results. Systemic Change: refers to creating or strengthening the social, economic, political, and cultural systems that comprise and sustain a socio-ecological system. Theory of Change: The description of a sequence of events that is expected to lead to a particular desired outcome. It shows a causal pathway from the current to the desired situation by specifying what is needed for goals to be achieved, articulating underlying assumptions which can be tested and measured. Whole System: a term commonly used by the Conservancy to describe social-ecological systems, which have a recognizable, unifying ecological or physical feature. They are large enough to be resilient to significant disturbances and sustain ecosystem services that human communities rely on as well as key ecological processes. Whole systems are mosaics of high ecological integrity areas embedded in a matrix of lands and waters that vary in quality but are critical for providing habitat, increasing effectiveness of protected areas, and contributing to connectivity.
<urn:uuid:e29c6326-da85-4f6b-81f6-b62ce6fab940>
CC-MAIN-2018-51
https://conservationbydesign.org/resources/glossary/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828507.57/warc/CC-MAIN-20181217113255-20181217135255-00208.warc.gz
en
0.926562
2,287
3.515625
4
ORIGINAL RESEARCH article Social Cognition in Children with High-Functioning Autism Spectrum Disorder and Attention-Deficit/Hyperactivity Disorder. Associations with Executive Functions - 1Departamento de Psicología Evolutiva y de la Educación, Universidad de Valencia, Valencia, Spain - 2Departamento de Psicología Evolutiva y de la Educación, Universidad Católica de Valencia “San Vicente Mártir”, Valencia, Spain - 3Departamento de Educación, Universitat Jaume I, Castellón, Spain Autism spectrum disorder (ASD) and attention deficit hyperactivity disorder (ADHD) are neurodevelopmental disorders characterized by social impairments. The first objective of this study was to analyze social cognition deficits of children with ADHD, high-functioning ASD (HFASD), and typical development (TD) in their performance on explicit and applied measures of theory of mind (ToM). The second objective was to investigate the relationships between executive functions and social cognition in HFASD and ADHD. One hundred and twenty-six 7- to 11-year old children, 52 with HFASD, 35 with ADHD, and 39 with TD, performed the NEPSY-II social perception subtests. Parents estimated their children's ToM skills using the Theory of Mind Inventory (ToMI). Teacher-reported data from the Behavior Rating Inventory of Executive Function (BRIEF) were also obtained. The HFASD and ADHD groups showed worse performance on the verbal ToM task than the TD group, and only the performance of the HFASD group was significantly lower than the TD group on the contextual ToM task. Parents also estimated that the HFASD group had more difficulties on the applied ToM than the ADHD and TD groups. Furthermore, there is a different executive function-theory of mind link in the HFASD and ADHD groups: behavioral regulation processes such as inhibition and emotional control are more associated with social cognition in children with ADHD, whereas metacognitive processes such as initiation and planning have a strong association with social cognition in children with HFASD. These findings have implications for understanding social perception deficits in neurodevelopmental disorders, highlighting the need for early intervention. Autism spectrum disorders (ASD) and attention deficit hyperactivity disorder (ADHD) are two disorders that stem from a disruption in the development of the brain and share the same genetic etiology, which largely explains the complexity of the impairments that characterize them (Ghirardi et al., 2017). Further evidence for common neurobiological substrates is based on the identification of similarities in the cognitive endophenotypes in individuals with these two disorders (Rommelse et al., 2011). The comparison and combination of the findings on overlapping and contrasting areas in the clinical manifestations and their possible interrelationships can help to clarify the nature of these two neurodevelopmental disorders. Two of the possible candidates for research on the cognitive profiles of ASD and ADHD are executive functioning (EF) and social cognition (Theory of Mind and affect recognition). Other possibilities such as weak central coherence or delay aversion are not appropriate for this line of research because each is related to only one of the two disorders, ASD and ADHD, respectively. Research on social cognition is particularly valuable in understanding individual differences in social ability and exploring the social interaction impairments commonly found in both disorders. The study of the typical social cognition impairments in ASD has extended to ADHD in an attempt to identify possible similarities and divergences between the two disorders. Social cognition (SC) refers to the mental operations that underlie social interactions and involve interpersonal sensitivity in real social settings. It is a broad, complex, and multifaceted construct that reflects a wide variety of psychological processes, highlighting affect recognition (AR) and theory of mind (ToM). On the one hand, AR consists of identifying emotionally salient information in the environment, including verbal (lexical-semantic) and nonverbal (intonation, facial, visual, and body movement) cues about other people's emotions (Phillips, 2003). On the other hand, ToM is defined as the cognitive ability to attribute mental states such as thoughts, beliefs, and intentions to other people. It implies an awareness that others have minds with mental states, information, and motivations that may differ from one's own, allowing an individual to explain, manipulate, and predict behavior (Korkmaz, 2011). The analysis of the 11 studies that have compared children and adolescents with ASD and ADHD (see Table 1) shows that these two disorders share difficulties in social cognition, both on different levels of ToM tasks and on tests of emotion recognition (Buitelaar et al., 1999; Adachi et al., 2004; Downs and Smith, 2004; Sinzig et al., 2008; Yang et al., 2009; Bühler et al., 2011; Demurie et al., 2011; Demopoulos et al., 2013; Baribeau et al., 2015; Hutchins et al., 2016) or empathic capacity (Dyck et al., 2001). Table 1. Previous studies that compare social cognition skills in children and adolescents with ADHD and high-functioning ASD (N = 11). With regard to the severity of the dysfunction in ToM and AR abilities, the studies indicate that the differences between ASD and ADHD are generally more quantitative than qualitative. People with ASD are affected more severely, producing a symptomatological continuity where ADHD holds an intermediate position between TD and ASD (Demurie et al., 2011; Demopoulos et al., 2013; Baribeau et al., 2015). In fact, individuals with ADHD, compared to ASD, seem to perform similarly to the TD group on appearance-reality tasks (Yang et al., 2009). However, some studies diverge from the general tendency, revealing that children with ADHD could not be differentiated from children with high-functioning autism on their performance on ToM tasks, especially on second-order mentalizing skills (Buitelaar et al., 1999). In addition, some findings have shown a negative effect on AR when ADHD symptoms are associated with ASD. When comparing the facial AR skills of groups of children and adolescents with ASD, ADHD, ASD+ADHD, and TD, the findings showed that the groups with ADHD symptoms had more AR difficulties than the groups with only ASD or TD (Sinzig et al., 2008). Likewise, when ADHD is accompanied by oppositional-defiant disorder (ODD), there is an additional impairment in ToM development, so that the ADHD/ODD group showed more socio-emotional and behavioral impairment than the ASD group, which exhibited cooperation and ToM skills (Downs and Smith, 2004). Along with comorbidity, the types of ASD and ADHD are factors that should also be taken into account when evaluating the results. For example, one study that included only children with ADHD with a predominance of inattention did not find ToM impairments in the ADHD group, although this group showed less empathic ability. The children with severe ASD experienced pronounced deficits in ToM skills and the capacity for empathy. By contrast, the group with high-functioning autism (with Asperger's syndrome) showed a similar profile to the group with no psychopathologies (Dyck et al., 2001). The developmental stage is another aspect to consider in ToM skills because the development of mentalizing skills seems to follow a different course in ASD and ADHD. Although, there is a lack of studies with a longitudinal design, using a cross-sectional design (Bühler et al., 2011), a significant difference in facial emotion recognition was observed between the youngest ASD and ADHD groups (ASD < ADHD), and this difference did not occur in the older groups. Therefore, social cognition impairments occur later in ADHD than in ASD, probably depending on experiences in the family circle and with classmates. There is a noteworthy influence of the procedure used to measure the mentalist skills on the results, as reflected in the study by Hutchins et al. (2016). On all the measures, both on the battery that rated explicit ToM knowledge and on the TOMI inventory, focused on applying ToM to daily life situations, the ASD group had worse performance than the other groups. However, the ADHD group achieved higher performance on the explicit tasks, that is, on the laboratory measures. In fact, no differences were found between the ADHD and neurotypical groups on the composite score on the ToM battery (explicit knowledge), whereas on the TOMI inventory scores, the ADHD group showed significantly lower performance levels than the TD group. The authors argue that this result may be due to the fact that the application of ToM skills in daily life requires a greater number of executive functioning (EF) resources (inhibition, working memory, attention). Another possible explanation is related to the quality of the EF resources, as the applied ToM would imply a greater involvement of the “Hot” EF, which are activated to address problems that require affect and motivation regulation. This circumstance would also justify the intermediate performance of the ADHD group on the Early and Basic Subscales and their impaired performance on the Advanced subscale of the ToMI: “It may be that the Early, Basic, and Advanced Subscales require variable thresholds of EF for success” (Hutchins et al., 2016, p. 104). The concept of EF refers to skills that make it possible to maintain an adequate response pattern to reach a future goal and dynamically self-regulate one's behavior (Goldstein et al., 2013). It includes a broad spectrum of higher mental processes that are grounded in prefrontal and thalamic-reticular areas of the brain. Their function is to direct the thoughts, actions, and emotions, and, therefore, they play a decisive role in socio-personal adaptation (Barkley, 2011; Diamond, 2013). Poor executive functions are an established deficit of two of the most common neurodevelopmental disorders, ADHD (Barkley, 1997) and ASD (Lai et al., 2017). “ase provide the city name for”). In fact, EF deficits are the neuropsychological traits common to both disorders that have received the most support in the literature (Rommelse et al., 2011), although findings related to the specific subdomains of the deficit are not completely consistent. On the one hand, some studies suggest that the EF differences between ASD and ADHD are more quantitative than qualitative, so that it is difficult to use executive measures to differentiate the specific domains affected in each of these disorders. On the other hand, a large number of studies have provided evidence for the dissociation of the EF deficits in ADHD and ASD. Children with ASD would mostly show an alteration in planning, whereas the deficits of children with ADHD would affect inhibition and verbal working memory (Gargaro et al., 2011; Miranda-Casas et al., 2013; Craig et al., 2016). Problems in inhibition, information recall, flexibility, and the ability to monitor, plan, and initiate socially appropriate responses—all aspects of EF—may contribute to the social impairments experienced by children with ADHD and children with ASD. A large body of evidence supports the associations between the EF and ToM in typical development (Carlson et al., 2004; Hughes and Ensor, 2007). However, few studies have examined the interesting interplay between EF and social cognition in children with neurodevelopmental disorders such as ASD and ADHD. In the case of ADHD, the findings point out that the inhibitory problems of children with ADHD impede the representation of mental states and ToM skills. In other words, ToM itself remains intact, but there is a failure to express this ability (Papadopoulos et al., 2005; Sodian and Hulsken, 2005). Supporting this view, Mary et al. (2016) hypothesize that ToM dysfunctions in children with ADHD could be due to attentional or executive deficits. They found that children with ADHD performed worse than neurotypical children on all the EF tests (inhibition, planning, attention) and two higher-order ToM tasks. The most interesting result was that, controlling inhibition and attention, the performance of children with ADHD was similar to that of children with typical development. By contrast, controlling the ToM scores did not normalize their performance on inhibition and attention tasks, indicating that EF and attention deficits were determining the ToM failures in children with ADHD. The literature also supports the critical role of EF in the ToM skills of children with ASD. Specifically, cognitive flexibility and shifting skills have shown a significant correlation with ToM tasks that require children to change from their own perspective to that of others (Zelazo et al., 2002; Pellicano, 2007). Furthermore, cognitive shifting predicts ASD preschoolers' capacity to shift between their own beliefs and a false belief presented (Kimhi et al., 2014). Likewise, in a longitudinal study conducted over a 3-year period, early EF and central coherence skills predicted developmental changes in ToM skills, regardless of age, language, and nonverbal intelligence (Pellicano, 2010). An important and unexplored question is related to the functional link between ToM and EF in ASD and ADHD. To the best of our knowledge, in the only study that analyzed this question, carried out by Yang et al. (2009), the data from the correlational analyses showed that only inhibition was significantly related to ToM performance after partialling out non-verbal intelligence. Yang et al. (2009) applied laboratory neuropsychological tasks to measure EF. However, given the differences between the demands of a structured evaluation scenario and those of the real world, it is essential to collect the ratings of a set of metacognitive, behavioral, and emotional abilities in daily life by informants who know the subject well. Two recent studies have provided interesting findings. On one hand, it has been found that metacognitive executive processes (i.e., initiation, working memory, planning, organization, and monitoring) predicted social function only in children with ASD and not in TD children (Leung et al., 2016). On the other hand, teachers' ratings of poor initiation, working memory, and planning and organizational skills have been related to more time engaged in solitary play, suggesting that metacognitive skills such as initiation, working memory, and planning and organization are associated with social functioning in children with autism (Freeman et al., 2017). In summary, a growing body of research supports the existence of social cognition impairments in children with ASD and children with ADHD and, to a lesser extent, differential patterns across these disorders, with more significant social perception deficits in ASD and milder deficits in ADHD. However, other findings provide relatively mixed evidence, possibly due to factors such as the broad age range of the participants, the developmental stage, the nature of the ToM measurement procedure itself (explicit or applied), group differences in intelligence, and the diagnosis of the type of presentation of the ADHD participants. Thus, one important area for future research is the continued investigation of these two neurodevelopmental disorders. This study builds on the previous one, focusing on the analysis of similarities and differences between the implicit and explicit ToM systems and possible links between ToM and EF in children with HFASD and children with ADHD. In order to obtain reliable conclusions, critical factors have been controlled, specifically the intelligence level (IQ) and verbal ability, given the degree of overlap between IQ and EF and the relationships between verbal ability and the capacity to represent mental states (Happé, 1995). Considering the significance of these findings about similarities and differences between ASD and ADHD in the conceptualization of these two disorders, the first objective of this study is to compare the AR and ToM abilities, both explicit (laboratory tasks) and applied (parent ratings in real life—ToMI), in children with HFASD, ADHD, and TD, matched on chronological age, mental age, and vocabulary. Children with HFASD are expected to have worse performance on all the measures of social cognition than the children with TD. Children with ADHD are expected to show a more variable performance, depending on the type of measure, and occupy an intermediate position between the children with HFASD and the children with TD. The second objective consists of exploring in the two clinical groups, children with HFASD and children with ADHD, the interplay between AR and ToM skills and “everyday” components of EF measured by the BRIEF. Based on the limited literature examining the relationship between executive and social functioning in children with ASD and children with ADHD, we predict that the EF components that have a significant relationship with the ToM in both disorders will differ. Specifically, we expect that EF behavioral regulation index subdomains, a characteristic deficiency seen in individuals with ADHD (Barkley, 1997; Mary et al., 2016), will maintain a more significant relationship with AR, ToM tasks, and ToMI total scores in this group. We also expect that the EF metacognitive index subdomains in the group with ASD will show a higher relationship with the overall indicators of AR, ToM tasks, and the ToMI performance (Leung et al., 2016; Freeman et al., 2017). Materials and Methods Participants in this study were 126 children from 7- to 11-years old, distributed in three groups: a group with HFASD (n = 52), a group with ADHD (n = 35), and a group with TD (n = 39). Mean age of children with HFASD, M = 8.59, SD = 1.38; children with ADHD, M = 9.14 SD = 1.41; children with TD, M = 8.46, SD = 1.27. The decision on the age range was motivated by developmental reasons (coinciding with the phase of the development of concrete operational stage) and due to the importance of Primary Education in the Spanish education system that coincides with this developmental period. All the participants had an overall IQ equal to or above 80, measured with the K-BIT (Kaufman and Kaufman, 2000): Children with HFASD, M = 101.42, SD = 12.65; children with ADHD, M = 99.03, SD = 9.87; children with TD, M = 102.21, SD = 8.70. The three groups were balanced on age, F(2, 123) = 2.61, p = 0.078, total IQ, F(2, 123) = 0.865, p = 0.423 and semantic language level, assessed with the vocabulary subtest of the WISC-IV (Wechsler, 2003) F(2, 123) = 1.03, p = 0.350. In addition, 91.42% of the HFASD group and 94.3% of the ADHD group were male. The children in the two clinical groups had received a diagnosis of HFASD or ADHD in the Child Neurology and Child Psychiatry Services of hospitals and medical centers in the provinces of Valencia and Castellón (Valencian Community, Spain). The clinical diagnoses of HFASD and ADHD were confirmed before applying the battery of tests selected for the present study. Specifically, to confirm the HFASD diagnosis, strict cut-off points recommended for the Social Communication Questionnaire (SCQ; Rutter et al., 2003) and the revised Autism Diagnostic Interview (ADI-R; Rutter et al., 2006) were applied. These two instruments were administered to the parents by a clinical psychologist from the research team who had been accredited for their application. The ADHD diagnosis was also confirmed through interviews with parents and teachers, who provided information about the 18 ADHD criteria from the DSM-5 (American Psychiatric Association, 2013), rating the severity of each item from 0 to 3. The requirements were the presence of at least six inattention symptoms and/or another six hyperactivity/impulsivity symptoms, persistence of the symptoms for at least 1 year, and their clear interference in the subject's daily functioning. Another requirement was a T score equal to or greater than 63 on the scales related to the ADHD diagnosis on Conners' Rating Scales—Revised, parents version (CPRS-R:L; Conners, 2001). The majority of the subjects in this group, 77.14%, showed a combined ADHD presentation, whereas 22.86% met the criteria for a presentation with a predominance of inattention. As would be expected, the rate of behavior problems (identified with the Strengths and Difficulties Questionnaire, SDQ, filled out by the parents; Goodman, 1997) in our ADHD sample was 40%. Regarding the school modality, three children with HFASD (5.8%) and two children with ADHD (5.7%) were attending school in regular classrooms full time; 29 children with HFASD (55.7%) and 33 with ADHD (94.3%) attended regular classrooms but received educational support for their specific needs in the school; and finally, 20 children with HFASD (38.5%) were placed in the Communication and Language classrooms modality. Participants with TD were all attending school in regular classrooms in the same schools where the children with ADHD and HFASD attended. They had no history of psychopathology or referral to children's mental health units (USMI), according to the information from the school records, and they did not meet the DSM 5 criteria for ADHD or HFASD on the screening carried out by SCQ before beginning the evaluation. The exclusion criteria for the children who participated in the study were evaluated through an extensive prior anamnesis carried out with the families. They included severe or genetic neurological diseases, brain lesions, psychosis, visual, auditory, motor, or sensorial deficits, and an intelligence coefficient <80. The administration of psycho-drugs was only an exclusion criterion for the TD group. By contrast, 32.7% of the children in the HFASD sample were taking antipsychotics (mainly Risperidone), and 71.4% of the children in the ADHD sample were receiving psychostimulants, generally time-released (mainly Methylphenidate). The study was approved by the Ethics Committee of the University of Valencia (Declaration of Helsinki in the Convention of the Council of Europe, 1964). It obtained the approval of the Consellería de Educación de la Generalitat Valenciana to locate children who had received a previous diagnosis of HFASD or ADHD by professionals in specialized childhood mental health services. The families were personally told about the aims of our research and asked for their informed consent. Oral permission from the children and written informed consent from their parents were obtained before beginning the evaluation, which took place in the schools in which they were enrolled. The intelligence test and the two tests from the social perception domain were administered to all the children individually by trained examiners in prepared classrooms in the different schools. The parents provided information about their children's ToM skills in daily life contexts, and the teachers-tutors filled out the questionnaire selected to assess the EF. The subtest from the social perception domain of the NEPSY-II battery (A Developmental Neuropsychological Assessment Battery, Korkman et al., 2007) was applied. It consists of four different tasks, and its purpose is to assess the ability to recognize the six basic emotions: happiness, sadness, fear, anger, disgust, and neutral, in photographs of children's faces. On the first and second tasks, the child is shown three photographs and asked to select two photographs of faces that express the same emotion. On the third task, the child must select one of the four faces that show the same emotion as the photograph that appears in the upper part. On the final task, the child is shown a face for 5 s and immediately asked to point to the two photographs, out of six, that show the same emotion as the face shown previously. The total score ranges between 1 and 25 in children aged 6 or younger and between 1 and 36 in children aged 7 or older, with higher scores reflecting a greater ability to match the same emotions. Theory of Mind Abilities (ToM) In our evaluation of the ToM, we accept the distinction made by Hutchins et al. (2016) between explicit ToM competence, defined as conceptual, operative, and logical knowledge, and applied knowledge, which involves the capacity to display ToM knowledge when facing everyday real-life dilemmas. Explicit ToM knowledge To evaluate explicit ToM knowledge, we used the Theory of Mind subtest included in the social perception domain of the NEPSY-II battery (A Developmental Neuropsychological Assessment Battery, Korkman et al., 2007). This test was designed to evaluate the capacity to comprehend mental functions such as beliefs, intentions, deception, and emotions, among others. The purpose, therefore, is to assess the capacity to understand that others have thoughts and feelings that might be different from one's own. Likewise, it aims to measure the capacity to understand the relationship between the emotions and the social context, and identify the appropriate emotion in specific social contexts. It consists of two tasks. The verbal tasks consist of showing the child an image and describing a situation related to that image. Next, the child is asked a question that requires him/her to comprehend another person's point of view. The tasks combine first- and second-order false belief questions, double deception tasks, and comprehension of figurative language. The verbal tasks also include questions based on verbal scenarios with no pictorial support. An example for children from 7 to 11 years old would be the following: “the children in the class of Judith, their teacher, were decorating Christmas cards. Since it was almost time for recess, Judith said: “children hurry up!” What did she mean? There are also two items that measure verbal imitation and gesture skills, which are considered a basic ToM factor. The contextual task measures the child's capacity to relate an emotion to the social context. It is composed of 6 items that show images of a girl in different social contexts. From four photographs of the girl's face with different emotions, the child is asked to identify the one that has the same emotion as the girl in the picture. The child can respond by pointing to the photographs, and no verbal responses are necessary. Applied ToM Knowledge Theory of Mind Inventory (ToMI, Hutchins et al., 2014. Spanish adaptation: Pujals et al., 2016). The ToMI inventory for parents or caregivers is composed of 42 items, and its objective is to address the breadth and complexity of mentalist skills. The items are grouped in 3 subscales, and they offer a general average score. The early subscale (ToMI-E) is composed of 7 items and assesses ToM skills that begin to develop in the first stages of childhood, such as social references and understanding basic emotions (e.g., “my child understands that when I show fear, the situation is unsafe or dangerous,” or “my child recognizes when others are happy”). The basic subscale (ToMI-B) includes 19 items that encompass ToM characteristics typical of children beginning the educational stage, such as the basic meta-representations and the distinction between physical and mental representations [e.g., “If I showed my child a cereal box filled with cookies and asked him/her “What would someone who has not looked inside think is in the box?” My child would say that another person would think there was cereal in the box” (false belief)]. Finally, the advanced subscale (ToMI-A) is composed of 16 items that assess more mature aspects of the ToM that develop between 5 and 8 years old, such as second-order inferences and making complex social judgments (e.g., “My child understands the difference between a friend teasing in a nice way and a bully making fun of someone in a mean way”). Each item is rated from 0 to 20, from “Definitely not” to “Definitely,” with a mid-point of “Undecided.” Responses are made with a vertical mark on a continuous line, indicating the score that best reflects the degree of agreement with each statement presented. High scores show the perception of good ToM competence. The ToMI inventory has been extensively validated, and it has shown test-retest reliability, internal consistency, and criterion validity for samples with typical development and ASD. It has also shown excellent sensitivity (0.9) and specificity (0.9) when used to examine children with ASD, although its purpose is not to perform a differential diagnosis (Hutchins et al., 2012). Behavior rating inventory of executive function; (BRIEF, Gioia et al., 2000) The teacher version of the questionnaire was applied to assess the child's EF through the teacher's observation of his/her behavior in the school context. It consists of 86 items rated on a Likert-type scale with three levels (never, sometimes, often). The items are grouped in 8 scales: Inhibit (“Interrupts others”); Shift (“Becomes upset with new situations”); Emotional control (“Overreacts to small problems”); Initiate (“Is not a self-starter”); Working Memory (“Has a short attention span”); Plan/Organize (does not finish long-term projects); Organization of materials (“Leaves playroom a mess”); and Monitor (“Does not check work for mistakes”). The scales make up two indexes. The Behavioral Regulation Index (BRI) is composed of the Inhibit, Shift, and Emotional Control scales, assessing the child's capacity to make cognitive changes and adjust his/her emotions and behavior through appropriate inhibitory control. The Metacognition Index (MI) is composed of the Initiate, Working Memory, Plan/Organize, Organization of materials, and Monitor scales. This index reflects the child's ability to initiate, plan, organize, self-monitor, and maintain working memory. It could be interpreted as the ability to self-manage cognitive tasks and supervise their performance. This index is related to the capacity to actively solve problems in a variety of contexts. The direct scores can be transformed into T-scores, with higher scores indicating worse EF. The questionnaire's reliability and validity have been adequately demonstrated (Gioia et al., 2002; García Fernández et al., 2014). Statistical analyses were performed using the software Statistical Package for the Social Sciences (SPSS), version 22.00 (SPSS Inc., Chicago, IL USA). Multivariate Analysis of Variance (MANOVA) was conducted to analyze differences between the HFASD, ADHD, and TD groups on the AF and ToM (explicit knowledge) subscales of the NEPSY-II and the ToMI inventory (applied knowledge). For the additional ANOVAs, the level of significance was set at p < 0.006 after applying the Bonferroni correction, and η2p was calculated to assess the strength of association. Pearson correlation analyses were also conducted in each clinical group to study the relationships between different EF domains and AR and explicit and applied competence in ToM. Because the age differences were close to statistical significance, analyses were performed, introducing age as covariable in the MANCOVA and conducting partial correlations; however, essentially the same results emerged when the analyses were conducted with the covariate. Comparison between Children with HFASD, ADHD, and TD in Social Cognition The MANOVA conducted to assess the main group effect on the conceptual knowledge (NEPSY subscales) and applied knowledge (ToMI) indicators was statistically significant [Wilk's Lambda (Λ) = 0.26, F(16, 232) = 13.76, p < 0.001, η2p = 0.48]. ANOVAs showed significant differences in the NEPSY subscales: Affect recognition, F(2, 123) = 18.57, p < 0.001, η2p = 0.23; Verbal-ToM, F(2, 123) = 13.91, p < 0.001, η2p = 0.18; Contextual-ToM, F(2, 123) = 5.84, p = 0.004, η2p = 0.08, and Total-ToM score, F(2, 123) = 17.28, p < 0.001, η2p = 0.22. Statistically significant differences were also shown in the applied knowledge task (TOMI): Early-ToMI, F(2, 123) = 35.65, p < 0.001, η2p = 0.36; Basic-ToMI, F(2, 123) = 64.25, p < 0.001, η2p = 0.51; Advanced-ToMI, F(2, 123) = 116.04, p < 0.001, η2p = 0.65 and in the ToMI total score [F(2, 123) = 96.42, p < 0.001, η2p = 0.61]. Bonferroni post-hoc analyses showed statistically significant differences between the TD group and both clinical groups on AR, Verbal-ToM, and Total-ToM (p < 0.001), with no significant differences between clinical groups. On the contextual task, the HFASD group showed significantly worse performance than the TD group (p < 0.001), and performance of the ADHD and TD groups was similar. However, there were no significant differences between clinical groups on this task. A different pattern was observed for ToM applied knowledge, where there were statistically significant differences among the three groups, HFASD, ADHD, and TD, on the three subscales of the ToMI and on the Total score (p < 0.001). The HFASD group had the lowest score, whereas the TD group had the highest, according to parent estimations. See Table 2. Table 2. Differences between children with ASD, ADHD, and TD on ToM tasks and ToMI Inventory (ANOVAs). Relations between EF and Social Cognition in HFASD and ADHD Groups In the ADHD group, AR significantly correlated with Inhibit (p < 0.001), Shift (p < 0.001), Emotional control (p = 0.012), and the BRI (p < 0.001). There were also significant correlations between AR and Monitor (p = 0.016). There were no significant correlations between AR and EF in the HFASD group, as Table 3 shows. In the HFASD group, there were significant correlations between the metacognitive component of Initiate and Verbal-ToM (p = 0.009) and Total-ToM (p = 0.020), both from the NEPSY-II battery. Similarly, there were significant correlations between Initiate and Basic-ToMI (p = 0.033), Advanced-ToMI (p = 0.046), and Total-ToMI (p = 0.040). There were also significant correlations between Organization of materials and Basic-ToMI (p = 0.033), advanced-ToMI (p = 0.030), and Total-ToMI (p = 0.016), and between MI and advanced-ToMI (p = 0.043) and Total-ToMI (p = 0.026). Table 3. Pearson correlation coefficients between executive functions and social cognition measures in ASD and ADHD groups. Correlation analyses in the ADHD group did not show significant associations between ToM tasks on the NEPSY-II and BRIEF subscales. However, there were significant negative correlations between inhibit and Early-ToMI (p = 0.034), Basic-ToMI (p < 0.001), and total-ToMI (p = 0.027), as well as between emotional control and Early-ToMI (p = 0.045). The same pattern was observed between the BRI and the Early-ToMI (p = 0.014), Basic-ToMI (p = 0.013), and Total-ToMI (p = 0.049). Regarding the metacognitive processes, there were statistically significant correlations between Organization of materials and Early-ToMI (p = 0.026), Basic-ToMI (p = 0.012), and Total-ToMI (p = 0.049), as well as between Monitor and Early-ToMI (p = 0.018), Basic-ToMI (p = 0.013), and Total-ToMI (p = 0.022). Research on poor social functioning in children with ASD and ADHD has increased exponentially, suggesting a significant clinical overlap between these two disorders in terms of impairments in social skills. Although, the consequences of social impairment in the trajectory of both disorders is no longer disputed, only a small body of research has examined social cognition deficits comparing groups of children with ASD, ADHD, and TD. The literature review on this area of study reveals two important issues. First, there is a lack of consistency in the findings related to the profile of ToM skills in individuals with ASD and ADHD. Second, another question that remains unresolved is related to the possible functional link between ToM and EF in ASD and ADHD. Therefore, the first objective of this study was to analyze two fundamental social cognition abilities, affect recognition and ToM, in children with HFASD, ADHD, and typical development, matched on age, IQ, and semantic knowledge. Children with HFASD were expected to have worse performance on all the social cognition measures than children with TD and children with ADHD. The analysis revealed that children with HFASD and children with ADHD, compared to a group of typically developing peers, showed impairments on all the social cognition measures. In addition, consistency is observed in the results, regardless of the ToM assessment methodology employed, that is, performance tasks or parent estimates of daily life behavior. This finding, which is consistent with the initial hypothesis, supports the idea that children with these two disorders experience deficits in AR (Downs and Smith, 2004; Sinzig et al., 2008; Demurie et al., 2011; Demopoulos et al., 2013; Baribeau et al., 2015) and attribution of mental states, such as feelings, beliefs, intentions, and desires (Buitelaar et al., 1999; Adachi et al., 2004; Demurie et al., 2011; Demopoulos et al., 2013; Hutchins et al., 2016). The use of ToM measures with different levels of complexity, i.e., laboratory tasks of explicit knowledge and applied abilities in everyday life contexts, adds specific nuances to the findings. First, when comparing the ability to recognize basic emotions such as happiness, sadness, fear, anger, and disgust, the performance of children with HFASD and children with ADHD is not significantly different. The ease of distinguishing between different faces is based on holistic processing, that is, the perception of faces as more than the sum of their parts. It is likely that failures of individuals with ASD and ADHD in understanding and interpreting facial emotions are due to the use of predominantly non-holistic, chaotic, and disorganized strategies. They focus attention on some minor facial feature that keeps them from fully understanding someone else's emotional expression. In fact, Berggren et al. (2016) demonstrated that attention had a significant influence on AR in individuals with ADHD and ASD. Furthermore, according with the Weak Coherence Account (Happé and Frith, 2006), individuals with ASD have a perceptual bias for local, rather than global, stimulus features. However, according to a study by Booth and Happé (2010), individuals with ADHD, in spite of their inhibitory deficits, do not have central coherence problems. Consequently, impaired visual processing related to attentional or monitoring strategy deficits might contribute more to the emotion recognition problems observed in the ADHD group than weak central coherence. However, our study cannot provide an answer to this question, which remains open to future research. On the NEPSY-II ToM verbal subtest, both the HFASD and ADHD groups differed from TD, but not from each other. Both clinical groups were equally affected in their ability to understand first- and second-order false beliefs, double deception, and figurative language, all aspects assessed on the ToM verbal subtest. The HFASD group also presented difficulties on the contextual task, obtaining significantly worse results than the TD group. By contrast, the ADHD group's performance was similar to that of the TD group, suggesting that children with ADHD do not have problems with inferring feelings or mental states of other children based on the visual or physical social context. ADHD children seem to frame emotions based on context clues with greater ease than children with ASD. These results might be related to the “context blindness” hypothesis (Vermeulen, 2014), which states that individuals with ASD experience impairments in the spontaneous use of context in information processing, in this case, of a social and emotional nature. A different pattern was observed in the applied ToM skills, distinguishing children with HFASD, ADHD, and typically developing peers. Statistically significant differences among the three groups were found on all three ToMI subscales (Early, Basic, and Advanced): Parents perceived that the ASD group had more difficulty than the other two groups in understanding basic emotions, distinguishing between physical and mental, making second-order inferences, or making complex social judgments. In addition, there appeared to be a symptomatic continuity, such that the ADHD group was found in an intermediate position between TD and ASD in the practical application of ToM abilities. The results agree with the trend found in previous work (Demurie et al., 2011; Demopoulos et al., 2013; Baribeau et al., 2015). It is possible that daily life situations estimated by parents require more resources than laboratory executive tasks. In other words, the individuals would be less likely to efficaciously apply their conceptual capacity in real life interactions due to difficulties in parallel processing and in selecting appropriate strategies for the context. However, in any case, real-world, everyday ToM impairments observed by parents or teachers would not reduce the importance of neuropsychological tasks. Instead, they could contribute to a broader understanding of structured performance-based TOM deficits found in the clinical or laboratory setting. When the achievement levels of children with HFASD and ADHD are compared on the two types of ToM tasks, explicit and applied, the results are not fully consistent with the work of Hutchins et al. (2016). In the only study that applied both types of measures, Hutchins et al. (2016) found “impaired explicit and applied ToM in children with ASD, but intact explicit and impaired applied ToM competence in children with ADHD” (p. 103). Our work coincides with this generalized profile of the ASD group's deficits in mental abilities, regardless of their explicit or applied nature. However, the group with ADHD, in our case, showed deficits on the verbal task of explicit knowledge. One reason the performance of children with ADHD on this task would be equal to that of children with ASD could be a high rate of comorbid learning disabilities. In fact, although we have no objective data, more than 90% of the children with ADHD were receiving educational support for their specific needs at school. Our results suggest the existence of more severe impairments in social cognition in the HFASD group compared to the ADHD group, although both neurodevelopmental disorders involve difficulties in processing social information. Furthermore, deficits are found on the AR task, which requires perceptual skills, as the children do not have any other information apart from what is contained in the facial expressions, and on the ToM tasks, which require higher thought processes such as logical skills, pragmatic language, and the recognition that one's mind is different from the minds of others. Deficits are also shown in both structured ToM test situations and multidimensional real-life situations, which require more complex and sophisticated skills. Moreover, the worse performance of the group with HFASD on ToM abilities, compared to the group with ADHD, does not seem to be due to language limitations, considering that the two groups were matched on expressive vocabulary. HFASD difficulties may be linked to a more severe meta-representational deficit, an idea that future research will have to verify. The second objective of this study was to explore the interplay between AR and ToM abilities and “every day” EF in children with HFASD and children with ADHD to find out whether ToM deficits are related to different EF subdomains in these children. A first analysis showed that, in both groups, significant relationships were found on scales measuring the application of ToM skills in the real world. Social interactions in daily life where we must respond spontaneously to a variety of events require more EF resources than laboratory tasks performed in contexts with greater control and stimuli isolation. Hence, it is important to complement the evaluation of ToM performance tasks by measuring how children cope with real-world social interactions that can result in success or failure and have emotional consequences. As expected, the interrelationships between EF and ToM abilities presented a different profile in ASD and ADHD. In children with ADHD, Inhibit, Shift, Emotional control, and the Behavioral regulation index presented high and significant correlations with AR and Early TOMI. Inhibitory control and the Behavioral regulation index also correlated significantly with the Basic TOMI. Finally, Monitor presented correlations with AR and Early and Basic TOMI scales, underlining the ongoing control that the integration of emotional cues requires in the constantly changing social environment. The findings coincide with previous literature (Yang et al., 2009; Mary et al., 2016) demonstrating a close association in ADHD between inhibition and ToM measures that require ignoring the knowledge we have about a situation and responding from another person's perspective. The overall pattern fits Barkley model (1997), which explains how the involvement of inhibitory control in different EF components (e.g., affect regulation and motivation) affects a wide range of behaviors linked to social information processing. The correlations in the ASD group show a quantitatively and qualitatively different situation. This group shows a somewhat worse profile that focuses on the EF of Initiate. A poor decisive attitude, or difficulty in thinking of alternatives to solve problems, correlated negatively with performance on the verbal ToM task and, especially, with two scales that assess the application of ToM abilities in the context of everyday life, that is, Basic and Advanced TOMI. Organization of materials was significantly associated with the Basic TOMI, whereas the Metacognitive index was associated with the Advanced TOMI. Previous studies have demonstrated a link between ToM and EF in children and adolescents with ASD, specifically on set-shifting skills (Joseph and Tager–Flusberg, 2004; Pellicano, 2007). Likewise, measures of divided attention and semantic fluency have been significantly associated with social and communication autism symptoms (Kenworthy et al., 2009). In our study, the initiate behavior skills in ASD focus the relationship between EF and ToM on metacognitive subdomains related to the ability to actively solve problems in a variety of contexts. As in previous studies (Leung et al., 2016; Freeman et al., 2017), we found significant associations between metacognitive executive function and social cognition measures in ASD. Our findings add to existing knowledge about deficits of children with ADHD and HFASD in AR and understanding others' mental states, which reflects a certain symptomatological continuum where HFASD shows greater severity. However, the social impairments of these two neurodevelopmental disorders cannot be explained solely on the basis of ToM failures. According to a recent meta-analysis (Imuta et al., 2016), although performance on ToM tasks is associated with different subtypes of prosocial behavior (helping, cooperating, comforting), the magnitude of the association is relatively weak, and it is still necessary to explore additional paths. Social cognition development is dependent on the maturing of several brain systems, and it is urgent to develop new research to study emotional dysfunctions in ADHD, using not only behavioral measures, but also cerebral activity measures (Albert et al., 2008). Fronto-striatal system dysfunction, an etiology shared by ASD and ADHD (Gargaro et al., 2011), could be an explanatory factor in social cognition and executive problems. However, the brain's organization is shaped by parenting (attachment type, discipline style, parenting stress, coping strategies, sociodemographic family characteristics, parents' mental health), school (learning environments, instructional methodology, teacher cognitive schemes), and the social macrosystem that determines social norms. This exemplifies the complex interactions that occur between brain development and the (social) environment. The present study has several methodological limitations. Sample size and the fact that most of the children in the ADHD group have a combined presentation may affect the generalizability of the results. Moreover, the low number of females and the recruitment of participants from families with middle-class income levels may not adequately represent the general population. A high percentage of children with ADHD were medicated. Another limitation is related to the ToM measures used. Although, an effort was made to integrate measures of a different nature, it would have been desirable to also incorporate measures based on direct observation protocols. In addition, the present study relied only on teachers' reports of EF, without including supplemental laboratory performance measures. Future work should combine laboratory and informant-based measures for a more in-depth investigation. In particular, the unexpected lack of significant relationships between working memory and ToM in both the HFASD and ADHD groups may be due, at least in part, to the measurement methodology used. It would have been advisable to use other memory indicators such as performance tests. Furthermore, the results of the correlation analyses have an exploratory nature, due to the many variables that intervene in the analyses. However, the application of the Bonferroni correction in this situation would involve a greater possibility of committing a Type II error and rejecting relationships that may exist. Finally, the cross-sectional design does not allow us to conclude whether the interrelationships between mental abilities and EF follow a different course in ASD and ADHD. A longitudinal research design would make it possible to test the directionality of the influence. Despite these limitations, this study provides evidence about deficits in social cognition processes in children with ASD and ADHD and the differential role of EF. It supports the importance of incorporating EF measures in the evaluation and treatment of children with these two neurodevelopmental disorders. A better understanding of the individual differences in this interdependence will lead to greater possibilities of carrying out successful interventions. Inhibition and behavioral regulation deficits need special treatment that might differ from interventions for metacognitive deficits. Above all, interventions on social problems will be more successful if they are developed from the point of view of performance, the family, and the school, and introducing multimodal components of EF and ToM, given the relationships between these skills. AM, CB, BR, IB, and CC each made substantial contributions to the conception and design of the work, to the acquisition, analysis, or interpretation of data for the work, drafting the work or revising it critically for important intellectual content, final approval of the version to be published, and agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved. Conflict of Interest Statement The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. This work is supported by the Spanish project PSI2016-78109 (AEI/FEDER, UE) and the predoctoral fellowship UV-INV-PREDOC15-265889. Adachi, T., Koeda, T., Hirabayashi, S., Maeoka, Y., Shiota, M., Wright, E. C., et al. (2004). The metaphor and sarcasm scenario test: a new instrument to help differentiate high functioning pervasive developmental disorder from attention deficit/hyperactivity disorder. Brain Dev. 26, 301–306. doi: 10.1016/S0387-7604(03)00170-0 Albert, J., López-Martín, S., Fernández-Jaen, A., and Carretié, L. (2008). Alteraciones emocionales en el trastorno por déficit de atención/hiperactividad: datos existentes y cuestiones abiertas. Rev. Neurol. 47, 39–45. doi: 10.1016/S0387-7604(03)00170-0 Baribeau, D. A., Doyle-Thomas, K. A., Dupuis, A., Iaboni, A., Crosbie, J., McGinn, H., et al. (2015). Examining and comparing social perception abilities across childhood-onset neurodevelopmental disorders. J. Am. Acad. Child Adolesc. Psychiatry 54, 479–486. doi: 10.1016/j.jaac.2015.03.016 Booth, R., and Happé, F. (2010). “Hunting with a knife and …fork”: examining central coherence in autism, attention deficit/hyperactivity disorder, and typical development with a linguistic task. J. Exp. Child Psychol. 107, 377–393. doi: 10.1016/j.jecp.2010.06.003 Bühler, E., Bachmann, C., Goyert, H., Heinzel-Gutenbrunner, M., and Kamp-Becker, I. (2011). Differential diagnosis of autism spectrum disorder and attention deficit hyperactivity disorder by means of inhibitory control and 'theory of mind'. J. Autism Dev. Disord. 41, 1718–1726. doi: 10.1007/s10803-011-1205-1 Buitelaar, J. K., Van der Wess, M., Swaab-Barneveld, H., and Van der Gaag, R. J. (1999). Theory of mind and emotion-recognition in autism spectrum disorders and in psychiatric control and normal children. Dev. Psychopathol. 11, 39–58. doi: 10.1017/S0954579499001947 Carlson, S. M., Moses, L. J., and Claxton, L. J. (2004). Individual differences in executive functioning and theory of mind: an investigation of inhibitory control and planning ability. J. Exp. Child Psychol. 87, 299–319. doi: 10.1016/j.jecp.2004.01.002 Craig, F., Margari, F., Letrottaglier, A. R., Palumbi, R., Giambattista, C., and Margari, L. (2016). A review of executive function deficits in autism spectrum disorder and attention-deficit/hyperactivity disorder. Neuropsychiatr. Dis. Treat. 12, 1191–1202. doi: 10.2147/NDT.S104620 Demopoulos, C., Hopkins, J., and Davis, A. (2013). A comparison of social cognitive profiles in children with autism spectrum disorders and attention-deficit/ hyperactivity disorder: a matter of quantitative but not qualitative difference? J. Autism Dev. Disord. 43, 1157–1170. doi: 10.1007/s10803-012-1657-y Demurie, E., deCorel, M., and Roeyers, H. (2011). Empathic accuracy in adolescents with autism spectrum disorders and adolescents with attention deficit/ hyperactivity disorder. Res. Autism Spectr. Disord. 5, 126–134. doi: 10.1016/j.rasd.2010.03.002 Dyck, M. J., Ferguson, K., and Shochet, I. M. (2001). Do autism spectrum disorders differ from each other and from non-spectrum disorders on emotion recognition tests? Eur. Child Adolesc. Psychiatry 10, 105–116. doi: 10.1007/s007870170033 Freeman, L. M., Locke, J., Rotheram-Fuller, E., and Mandell, D. (2017). Brief report: examining executive and social functioning in elementary-aged children with autism. J. Autism Dev. Disord. 47, 1890–1895. doi: 10.1007/s10803-017-3079-3 García Fernández, T., González-Pienda, J. A., Rodríguez Pérez, C., Álvarez García, D., and Álvarez Pérez, L. (2014). Psychometric characteristics of the BRIEF scale for the assessment of executive functions in Spanish clinical population. Psicothema 26, 47–52. doi: 10.7334/psicothema2013.149 Gargaro, B. A., Rinehart, N. J., Bradshaw, J. L., Tonge, B. J., and Sheppard, D. M. (2011). Autism and ADHD: how far have we come in the comorbidity debate. Neurosci. Biobehav. Rev. 35, 1081–1088. doi: 10.1016/j.neubiorev.2010.11.002 Ghirardi, L., Brikell, I., Kuja-Halkola, R., Freitag, C. M., Franke, B., Asherson, P., et al. (2017). The familial co-aggregation of ASD and ADHD: a register-based cohort study. Mol. Psychiatry. doi: 10.1038/mp.2017.17. [Epub ahead of print]. Gioia, G., Isquith, P. K., Retzlaff, P. D., and Kimberly, A. E. (2002). Confirmatory factor analysis of the behavior rating inventory of executive function (BRIEF) in a clinical simple. Child Neuropsychol. 8, 249–257. doi: 10.1076/chin.18.104.22.16813 Goldstein, S., Naglieri, J. A., Princiotta, D., and Otero, T. M. (2013). “Introduction: a history of executive functioning as a theoretical and clinical construct,” in Handbook of Executive Functioning, eds S. Goldstein and J. A. Naglieri (New York, NY: Springer), 3–12. Hutchins, T. L., Prelock, P. A., and Bonazinga, L. (2012). Psychometric evaluation of the Theory of Mind Inventory (ToMI): a study of typically developing children and children with autism spectrum disorder. J. Autism Dev. Disord. 42, 327–341. doi: 10.1007/s10803-011-1244-7 Hutchins, T. L., Prelock, P. A., and Bonazinga-Bouyea, L. (2014). Technical Manual For the Theory of Mind Inventory and Theory if Mind Task Battery. Available online at: theoryofmindinventory.com. Hutchins, T. L., Prelock, P. A., Morris, H., Benner, J., LaVigne, T., and Hoza, B. (2016). Explicit vs applied theory of mind competence: a comparison of typically developing males, males with ASD, and males with ADHD. Res. Autism Spectr. Disord. 21, 94–108. doi: 10.1016/j.rasd.2015.10.004 Imuta, K., Henry, J., Slaughter, V., Selcuk, B., and Ruffman, T. (2016). Theory of mind and prosocial behaviour in childhood: a meta-analytic review. Dev. Psychol. 52, 1192–1205. doi: 10.1037/dev0000140 Joseph, R. M., and Tager–Flusberg, H. (2004). The relationship of theory of mind and executive functions to symptom type and severity in children with autism. Dev. Psychopathol. 16, 137–155. doi: 10.1017/S095457940404444X Kenworthy, L., Black, D. O., Harrison, B., Della Rosa, A., and Wallace, G. L. (2009). Are executive control function related to autism symptoms in high-functioning children. Child Neuropsychol. 15, 425–440. doi: 10.1080/09297040802646983 Kimhi, Y., Kugelmas, D., Agam Ben Artzi, G., Ben Moshe, I., and Bauminger-Zviely, N. (2014). Theory of mind and executive function in preschoolers with typical development versus intellectually able preschoolers with autism spectrum disorder. J. Autism Dev. Disord. 44, 2341–2354. doi: 10.1007/s10803-014-2104-z Lai, C. L. E., Lau, Z., Lui, S. S. Y., Lok, E., Tam, V., Chan, Q., et al. (2017). Meta-analysis of neuropsychological measures of executive functioning in children and adolescents with high-functioning autism spectrum disorder. Autism Res. 10, 911–939. doi: 10.1002/aur.1723 Leung, R. C., Vogan, V. M., Powell, T. L., Anagnostou, E., and Taylor, M. J. (2016). The role of executive functions in social impairment in Autism Spectrum Disorder. Child Neuropsychol. 22, 336–344. doi: 10.1080/09297049.2015.1005066 Mary, A., Slama, H., Mousty, P., Massat, I., Capiau, T., Drabs, V., et al. (2016). Executive and attentional contributions to Theory of Mind in attention deficit/hyperactivity disorder (ADHD). Child Neuropsychol. 22, 345–365. doi: 10.1080/09297049.2015.1012491. Miranda-Casas, A., Baixauli-Fortea, I., Colomer-Diago, C., and Roselló-Miranda, B. (2013). Autismo y Trastorno por déficit de atención con hiperactividad: convergencias y divergencias en funcionamiento ejecutivo y teoría de la mente. Rev. Neurol. 57(Suppl. 1), S177–S184. Papadopoulos, T. C., Panayiotou, G., Spanoudis, G., and Natsopoulos, D. (2005). Evidence of poor planning in children with attention deficits. J. Abnorm. Child Psychol. 33, 611–623. doi: 10.1007/s10802-005-6741-8 Pujals, E., Batlle, S., Camprodon, E., Pujals, S., Estrada, X., Ace-a, M., et al. (2016). Brief report: translation and adaptation of the Theory of Mind Inventory to spanish. J. Autism Dev. Disord. 46, 685–690. doi: 10.1007/s10803-015-2576-5 Rommelse, N. N. J., Geurts, H. M., Franke, B., Buitelaar, J. K., and Wallace, G. L. (2011). A review on cognitive and brain endophenotypes that may be common in autism spectrum disorder and attention-deficit/hyperactivity disorder and facilitate the search for pleiotropic genes. Neurosci. Biobehav. Rev. 35, 1363–1396. doi: 10.1016/j.neubiorev.2011.02.015 Sinzig, J., Morsch, D., and Lehmkuhl, G. (2008). Do hyperactivity, impulsivity and inattention have an impact on the ability of facial affect recognition in children with autism and ADHD? Eur. Child Adolesc. Psychiatry 17, 63–72. doi: 10.1007/s00787-007-0637-9 Sodian, B., and Hulsken, C. (2005). “The developmental relation of theory of mind and executive functions: a study of advanced theory of mind abilities in children with attention deficit hyperactivity disorder,” in Young Children's Cognitive Development: Interrelationships among Executive Functioning, Working Memory, Verbal Ability, and Theory of Mind, eds W. Schneider, R. Schumann-Hengsteler, and B. Sodian (Mahwah, NJ: Lawrence Erlbaum Associate), 175–187. Yang, J., Zhou, S., Yao, S., Su, L., and McWhinnie, C. (2009). The relationship between theory of mind and executive function in a simple of children from Mainland China. Child Psychiatry Hum. Dev. 40, 169–182. doi: 10.1007/s10578-008-0119-4 Keywords: ADHD, ASD, facial affect recognition, theory of mind, executive functions Citation: Miranda A, Berenguer C, Roselló B, Baixauli I and Colomer C (2017) Social Cognition in Children with High-Functioning Autism Spectrum Disorder and Attention-Deficit/Hyperactivity Disorder. Associations with Executive Functions. Front. Psychol. 8:1035. doi: 10.3389/fpsyg.2017.01035 Received: 11 October 2016; Accepted: 06 June 2017; Published: 23 June 2017. Edited by:Layne Kalbfleisch, George Washington University, United States Reviewed by:Alicia Abundis-Gutierrez, University of Guadalajara, Mexico Benjamin Yerys, Children's Hospital of Philadelphia, United States Copyright © 2017 Miranda, Berenguer, Roselló, Baixauli and Colomer. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. *Correspondence: Ana Miranda, [email protected]
<urn:uuid:0abea1b7-f107-496f-9366-95a4f33ea9a7>
CC-MAIN-2022-27
https://www.frontiersin.org/articles/10.3389/fpsyg.2017.01035/full
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036176.7/warc/CC-MAIN-20220625220543-20220626010543-00132.warc.gz
en
0.921488
14,052
2.5625
3
The English physician William Harvey (1578–1657) was the first to discover how blood actually circulates in living creatures. This book is a fascinating account of how Harvey's theory of the circulation of the blood came into being. A classic of science, it has long been considered a model of accurate observation, careful experimentation and notation, and logical deduction. Through his intense studies in anatomy and the experience he gained through a long series of dissections of animals, Harvey amassed a much broader knowledge of the comparative anatomy of the heart and blood vessels than his contemporaries or any others before him. It was a breakthrough that stunned his colleagues, most of whom still clung to the theories of Aristotle, Galen, and others — theories Harvey proved both inadequate and inaccurate. The original text of Harvey's landmark study consisted of two works written and published in Latin. This Dover edition, reprinted from a rare copy of a limited edition of 1,450 copies, reproduces the English translation made during Harvey's lifetime. In the Editor's Postscript, Geoffrey Keynes praised this lively translation as one filled with "the vigour of the seventeenth century . . . with a sufficient sprinkling of expressive, if now unusual, terms to produce the feeling that Harvey himself is speaking." Reprint of The Anatomical Exercises of Dr. William Harvey, published by Nonesuch Press, London, 1953. |Availability||Usually ships in 24 to 48 hours| |Dimensions||5 1/2 x 8 1/2|
<urn:uuid:350fb20e-ceed-4c8f-829d-d7afb86386e7>
CC-MAIN-2017-34
http://store.doverpublications.com/0486688275.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110578.17/warc/CC-MAIN-20170822104509-20170822124509-00466.warc.gz
en
0.925106
309
3.296875
3
A review paper advocates studying the presence of wrens (Maluridae) in local landscapes to assess the ecological soundness of land management practices. Wildlife ecologist Dr Anya Skroblin says wrens are relatively easy to observe and are present throughout much of Australia with their behaviour, habitat, physiology and conservation status having been widely studied. "There's really great background knowledge which then we can use when we are thinking about conservation issues," she says. She says sympatric species also present good opportunities for understanding conservation problems. "There's a lot of places where we have threatened species co-occurring with Malurids that aren't threatened [but] they are both experiencing the same land-management regimes," Dr Skroblin says. "If one species is declining where the other species is not we can use that information to investigate … what fundamental factor is at play. "So it's a way of teasing apart how these threatening processes within the landscape are influencing species." She gave the example of the purple-crowned fairy-wren (Malurus coronatus coronatus) at Mornington Wilderness Camp in the Kimberley, where she conducted much of the field work for her PhD. "That species is the only threatened fairy wren on mainland Australia," Dr Skroblin says. "It's been declining in the Kimberley region and it co-occurs with the red-backed fairy-wren (M. melanocephalus cruentatus) and the variegated fairy-wren (M. lamberti rogersi) and they haven't been shown to be declining at the same rate. "I did my PhD on the purple crowned fairy wren so I'm quite intimate with the reasons for its decline. "It's probably due to the fact that the purple crowned fairy wren occurs on the riverine vegetation … in that area. She says the vegetation in question is particularly susceptible to being degraded by grazing cattle and is also very fire sensitive. Dr Skroblin says improved land management practices at Mornington Station have been beneficial to purple-crowned fairy wrens. About half of the purple-crowned fairy-wren's habitat at Mornington Station has been de-stocked of cattle, and improved fire regimes have prevented riparian vegetation from burning. "We've seen that the riparian vegetation has increased in density and … populations of purple-crowned fairy-wrens along the rivers have increased," she says. "There are really interesting comparisons between what happens when we remove cattle and what happens when we allow them to remain. "Once you understand how different species are affected by the same management regime, land managers can go about changing the way they manage their landscape." Explore further: Study shows fairy-wrens learn to drive off cuckoos from their neighbors
<urn:uuid:fb3d3e92-8a99-44c6-bf7a-9628d252e974>
CC-MAIN-2014-10
http://phys.org/news/2013-09-lobbies-closer-techniques.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011094911/warc/CC-MAIN-20140305091814-00009-ip-10-183-142-35.ec2.internal.warc.gz
en
0.961736
602
3.828125
4
Researchers from Princeton University conducted a study to see what will prevail at the top and discovered that the Megalodon shark is the ultimate “predator of predators.” According to a recent research, a “enormous” prehistoric shark was named the “predator of predators” for being at the top of the marine food chain. Researchers from Princeton University conducted a study in which they rated historical predators, with the Megalodon shark coming out on top. The most astounding aspect about Megalodons was their enormous size. They were extinct now, but they were a species of mackerel shark that lived between 23 and 3.6 million years ago. However, at 65 feet long, they were at least three times bigger than the largest current great white sharks and more than a match for other nearby predators. The biggest animals, such as blue whales, whale sharks, even elephants and diplodocuses, are typically thought of as filter feeders or herbivores rather than predators, according to research author Emma Kast. Meg died extinct just a few million years ago, but Megalodon and the other megatooth sharks were actually huge carnivores that consumed other predators. The Megalodon was considered to be at the “highest trophic level,” or the top of the food chain, due to its size and willingness to consume other predators. The fact that Megalodons had no known predators and hence ruled supreme supports this. Because they begin with such tiny creatures, ocean food webs do have a tendency to be longer than the grass-deer-wolf feeding chain of terrestrial animals, according to Dr. Kast. We need to add more than one trophic level, or apex predator, to the top of the contemporary marine food web in order to attain the trophic levels we are measuring in these megatooth sharks. The scientists employed a unique method to analyze the nitrogen isotopes in the sharks’ teeth in order to examine the prehistoric marine food chain. A species’ position in the food chain increases with the amount of nitrogen-15 that is found in it. The minute levels of nitrogen that have been retained in the enamel layer of these prehistoric shark teeth have not yet been quantified by scientists. “We have a series of shark teeth from different historical periods, and we were able to connect their trophic level vs their size,” said Zixuan (Crystal) Rao, a graduate student and co-author of the study. Cannibalism is one strategy for certain creatures to move up the food chain, and there is evidence of it in both megatooth sharks and other extinct marine predators.
<urn:uuid:52a64cb7-9c95-423d-a52f-049a2428de1f>
CC-MAIN-2023-40
https://hasanjasim.online/scientists-laud-a-50-foot-shark-as-the-ultimate-predator-after-it-devoured-competitors/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510498.88/warc/CC-MAIN-20230929054611-20230929084611-00092.warc.gz
en
0.963639
567
3.609375
4
Strenuous exercise results in a marked blood acid-base disturbance which is accompanied by large increases in ventilation rate, heart rate and mean arterial blood pressure. Recovery to normal resting values follows an exponential time course with a half-time of approximately 2 h for all parameters except Pa, CO2 and ventilation rate. The latter return to normal by 30 min following the exercise period. Analysis reveals that there is initially a large discrepancy between the quantity of metabolic acids buffered in the blood and the blood lactate levels. The significance of this finding is discussed. Significant changes in the concentrations of chloride, bicarbonate and lactate, in both plasma and erythrocytes, accompany the blood acid-base disturbance. Chloride and bicarbonate appear to be passively distributed between the two compartments according to a Gibbs-Donnan equilibrium whereas lactate only slowly permeates the erythrocyte. - © 1980 by Company of Biologists
<urn:uuid:91567bdf-6d8d-4a20-84bd-7cf9f8cda66b>
CC-MAIN-2017-22
http://jeb.biologists.org/content/84/1/273
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607620.78/warc/CC-MAIN-20170523103136-20170523123136-00277.warc.gz
en
0.906414
194
2.703125
3
How to make human life on planet Earth dignified We would like to tell you something about our project SpaceX Earth. We want to make life on planet Earth meaningful and sustainable again. We believe that we can still achieve it during our lifetime. We believe that we can make it and that everybody will be able to live a dignified life on Earth – have enough to eat, have enough to drink, have the certainty of a safe home and access to health care. We are convinced that humankind now has to choose between two paths. Either we have to passively wait for a disaster. While we are not advocates of apocalyptic scenarios, it is obvious that under the given conditions, nothing else awaits us. Or, we can become a civilization with completely different value foundations. We hope you agree with us that this is the right way. What would a dignified life on planet Earth be like? How can we save humankind? (Fig. 1)? Sometimes people wonder: Why planet Earth? Why not escape somewhere else, maybe to Mars? But our possibilities are limited. Let us take Venus, for instance. The pressure is high, the water is toxic; that would really be risky. Venus is not the goddess from ancient myths at all. Life on Venus would simply be rather difficult. Then there is planet Mercury, but it is too close to the Sun. The moons of Jupiter and Saturn come into consideration, but they are too, too far. We could also colonize the Moon, but it is much smaller than our planet. It has no atmosphere, few mineral resources, and one day on the Moon lasts 28 days on Earth. We would hardly get used to that. Moreover, we do not support such escapism at all. In fact, we are only left with one option: planet Earth. Automation of most of today’s labor, free public services, basic income, renewable sources. Can you imagine extracting mineral resources for life on Earth on other planets? Sure, we do not think that everybody will join us right away. But there may be sponsors. Maybe in the beginning, there will only be a small number of inhabitants of Earth; those that can afford it. Maybe there will soon be others who could save some financial resources and could donate them. We want every human to be able to live a dignified life on planet Earth as a result (Fig. 2). We estimate that the costs for one person would be 200 000 dollars, later perhaps even 100 000 dollars, depending on the speed of technological progress which will not serve the interests of the minority as it is today but the interests of all. Maybe it could even be less. Sure, it will be very costly to fund this project. But there are many people in the commercial sphere who are interested in the whole thing and who want to participate financially and in other ways. Even governments may become interested in the future. Inevitably, there will be a big partnership of the private and the state sector. At the moment, we simply strive for the greatest possible progress in this matter with the finances at hand. We want things to be moving, to continue, for the effort not to stop. Last but not least, let us add that we only gather all our capital just with the aim of financing this project. We have no other motivation besides this life-long project of ours. Elon Musk and Tereza Stejskalová, November 11, 2019 Queer intellectual – Zeynab Gueye Trip to Mars applicant – Patrik Holubář Colonizer – Roman Horák Tardigrade – Nataša Mikulová Valerie Solanas – Hana Varadzinová Reader – Daniela Voráčková script editing, camera, editing – Kristýna Bartošová sound – Michal Straka camera – Alan Soural script consultant – Pavel Šplíchal audio post production – Jan Mesany script consultant – David Zábranský steel construction production – Peter Demek
<urn:uuid:17082d8d-3060-4669-b31d-33122fff880d>
CC-MAIN-2023-06
https://drdovagallery.com/2019/11/09/barbora-kleinhamplova-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500288.69/warc/CC-MAIN-20230205193202-20230205223202-00375.warc.gz
en
0.943671
854
3.421875
3
What happened to Pontius Pilate after the death of the Lord Jesus Christ? We do not know where Pontius Pilate was born. One tradition says that he was a member of the Pontii tribe and of Samnite nobility. The Samnites lived in the southern region of Italy. Another tradition states that Pontius Pilate was born in Germany and was a bastard son of Tyrus, king of Mayence. Reportedly, his father sent him to Rome as a hostage. While there he was charged with murdering someone and was sent to Pontus, which is on the southeastern border of the Black Sea. In short, the traditions are in conflict and we do not really know where Pilate was born or his life as a teenager or young adult. Supposedly, his name was changed in Pontus to Pontius Pilate and he was eventually appointed the sixth governor or procurator of Judea by Sejanus, a favorite of the Roman emperor Tiberius. Pilate was unpopular with the Jewish population because he hung worship images of the emperor throughout Jerusalem and minted coins with the image of pagan symbols. But now Pilate, the procurator of Judea, removed the army from Cesarea to Jerusalem, to take their winter quarters there, in order to abolish the Jewish laws. So he introduced Caesar’s effigies, which were upon the ensigns, and brought them into the city; whereas our law forbids us the very making of images; on which account the former procurators were wont to make their entry into the city with such ensigns as had not those ornaments. Pilate was the first who brought those images to Jerusalem, and set them up there; which was done without the knowledge of the people, because it was done in the nighttime; but as soon as they knew it, they came in multitudes to Cesarea, and interceded with Pilate many days, that he would remove the images; and when he would not grant their requests, because it would tend to the injury of Caesar, while yet they persevered in their request, on the sixth day he ordered his soldiers to have their weapons privately, while he came and sat upon his judgment seat, which seat was so prepared in the open place of the city, that it concealed the army that lay ready to oppress them: and when the Jews petitioned him again, he gave a signal to the soldiers to encompass them round, and threatened that their punishment should be no less than immediate death, unless they would leave off disturbing him, and go their ways home. (59) But they threw themselves upon the ground, and laid their necks bare, and said they would take their death very willingly, rather than the wisdom of their laws should be transgressed; upon which Pilate was deeply affected with their firm resolution to keep their laws inviolable, and presently commanded the images to be carried back from Jerusalem to Cesarea. The New Testament gospel of Luke records that Pilate had heard about Jesus and His miracles before He was brought before Pilate. Now Herod was very glad when he saw Jesus; for he had wanted to see Him for a long time, because he had been hearing about Him and was hoping to see some sign performed by Him. Luke 23:8 (NASB) Pilate was apparently not threatened by Jesus since he had not taken action earlier. But the Jewish leaders did care. They wanted Jesus dead. As a result, pressure was applied by the Jewish Sanhedrin (Luke 23:2-7) upon Pilate. It appears that Pilate attempted to avoid a direct conflict with the Jewish leaders by hoping that King Herod might release Jesus (Luke 23:7-11). Pressure was also applied by his wife to have nothing to do with Jesus. Tradition states that her name was Claudia Procula. While he was sitting on the judgment seat, his wife sent him a message, saying, “Have nothing to do with that righteous Man; for last night I suffered greatly in a dream because of Him.” Matthew 27:19 (NASB) History records that Pilate avoided her counsel and crucified Jesus Christ. His decision may have also been made to avoid a bad report to Rome. After Jesus died on the cross, the gospels record that Pilate allowed several members of the Sanhedrin, Joseph of Arimathea and Nicodemus, to bury Jesus (Mark 15:43; John 3:1; 19:38-40). Pilate also stationed a guard of Roman solders at the tomb after a large stone was rolled into place at the opening to prevent anyone from taking the body (Matt. 27:65-66). Yet, Jesus returned from death to life and left the tomb anyway (Matt. 28:1-6). Now after the Sabbath, as it began to dawn toward the first day of the week . . . And behold, a severe earthquake had occurred, for an angel of the Lord descended from heaven and came and rolled away the stone and sat upon it. And his appearance was like lightning, and his clothing as white as snow. The guards shook for fear of him and became like dead men. The angel said to the women, “Do not be afraid; for I know that you are looking for Jesus who has been crucified. He is not here, for He has risen, just as He said. Come, see the place where He was lying.” Matthew 28:1-6 (NASB) The Jewish historian Flavius Josephus records these words about Pilate, Now, there was about this time Jesus, a wise man, if it be lawful to call him a man. For he was a doer of surprising feats – a teacher of such men as receive the truth with pleasure. He drew over to him both many of the Jews and many of the Gentiles. He was [the] Christ; and when Pilate, at the suggestion of the principal men amongst us, had condemned him to the cross, those that loved him at the first did not forsake him, for he appeared to them alive again the third day, as the divine prophets had foretold these and ten thousand other wonderful things concerning him; and the tribe of Christians, so named from him, are not extinct to this day. Later, Pilate in his own words stated that Jesus was crucified in his official record, Acts of Pilate, which was sent to Rome and archived there for others to read. And that it was predicted that our Christ should heal all diseases and raise the dead, hear what was said. There are these words: “At His coming the lame shall leap as an hart, and the tongue of the stammerer shall be clear speaking: the blind shall see, and the lepers shall be cleansed; and the dead shall rise, and walk about.” And that He did those things, you can learn from the Acts of Pontius Pilate. And the expression, “They pierced my hands and my feet,” was used in reference to the nails of the cross which were fixed in His hands and feet. And after He was crucified they cast lots upon His vesture, and they that crucified Him parted it among them. And that these things did happen, you can ascertain from the Acts of Pontius Pilate. Pontius Pilate should have listened to his wife. For more information about the Acts of Pilate, visit “Pontius Pilate – refers to Christ in official records.” According to Flavius Josephus, Pilate’s supporter, Sejanus, was murdered later. Without his protector in power, Pilate made a major error and suppressed a small uprising in Samaria. The leader of the Samaritan group had promised that “He would show them those sacred vessels which were laid under that place, because Moses put them there.” But Pilate sent his troops and defeated them before they arrived at Mt. Gerizim. However, trouble followed as indicated in Josephus’ following statement, But when this tumult was appeased, the Samaritan senate sent an embassy to Vitellius, a man that had been consul, and who was now president of Syria, and accused Pilate of the murder of those that were killed . . . So Vitellius sent Marcellus, a friend of his, to take care of the affairs of Judea, and ordered Pilate to go to Rome, to answer before the emperor to the accusation of the Jews. So Pilate, when he had tarried ten years in Judea, made haste to Rome, and this in obedience to the orders of Vitellius, which he dare not contradict; but before he could get to Rome, Tiberius was dead. Eusebius reported that Pontius Pilate committed suicide during the reign of Caius or Emperor Caligula. Eusebius records the following for us, It is worthy of note that Pilate himself, who was governor in the time of our Savior, is reported to have fallen into such misfortunes under Caius, whose times we are recording, that he was forced to become his own murderer and executioner; and thus divine vengeance, as it seems, was not long in overtaking him. This is stated by those Greek historians who have recorded the Olympiads, together with the respective events which have taken place in each period. The quote reveals that many Greeks considered Pilate’s misfortunes to be divine justice for the death of Jesus Christ. Tradition adds that Pilate died in Vienne, France on the Rhone or on Mount Pilatus, Switzerland. The Eastern Orthodox church believes that Pilate and his wife eventually became Christians. That would be wonderful if true. 1. Wroe, Ann. Pontius Pilate. The Modern Library. 1999, p. 14. 2. McClintock and Strong. Cyclopedia of Biblical Theological, and Ecclesiastical Literature. 1887, p. 199. 3. Britannica 2005. 4. Falvius Josephus. Antiquities of the Jews 18.3.1. 5. McClintock and Strong. Cyclopedia of Biblical Theological, and Ecclesiastical Literature. 1887, p. 201. 6. Flavius Josephus. Antiquities of the Jews 18.3.3. 7. Justin Martyr. First Apology 48. 8. Justin Martyr. First Apology 35. 9. Flavius Josephus. Antiquities of the Jews 18.4.1. 10. Flavius Josephus. Antiquities of the Jews 18.4.2. 11. Flavius Josephus. Antiquities of the Jews 18.4.2. 12. McClintock and Strong. Cyclopedia of Biblical Theological, and Ecclesiastical Literature. 1887, p. 202. Suggested Links:Pontius Pilate - refers to Christ in official records Did the people who crucified Christ go to hell or the Lake of Fire? Was Jesus resurrected on the same day Noah's ark rested on Mt. Ararat? Is there more information on Pontius Pilate's wife? During what years was Pontius Pilate governor of Judea?
<urn:uuid:bc623716-06b1-46f4-807d-a25c5274e467>
CC-MAIN-2020-29
https://www.neverthirsty.org/bible-qa/qa-archives/question/what-happened-to-pontius-pilate-after-the-death-of-the-lord-jesus-christ/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655898347.42/warc/CC-MAIN-20200709034306-20200709064306-00046.warc.gz
en
0.984523
2,351
3.515625
4
Ratified in 1933, the 20th Amendment of the Constitution revised start dates for presidential, vice presidential and congressional terms. Before its enactment, new terms didn't begin until March, meaning government officials potentially remained in office for several months after they'd been voted out. With advances in communication and transportation since the Constitution's drafting, this long period between terms was not necessary or desirable. Bridging the Gap When someone new is elected to federal office, a transition period between the date of the election and the beginning of work is necessary. For example, a president-elect has to decide who will serve as advisors and cabinet officials. Both new Congress members and executive branch officials need to become familiar with the pressing issues that will confront them in their new positions. Prior to the enactment of the 20th Amendment, the period between the date of an election and the beginning of a new term reflected the length of time required to travel to Washington, D.C., from distant parts of the country. Additionally, it could take weeks to finalize election results. Moving the Date The Constitution doesn't specify an exact date when terms of office begin. Soon after the Constitution was adopted, Congress enacted legislation designating the first Wednesday in March -- which happened to fall on March 4 that year -- as the date when terms would begin for the nation's first federal officers. However, since the Constitution did specify the length of terms, changing the date terms meant changing the term lengths for the people in office at the time. For that reason, changing the date could only be done by constitutional amendment. The 20th Amendment moves the presidential inauguration from March 4 to January 20 at noon. Congressional terms begin January 3 at noon. At the same time, the outgoing office holders' terms expire. Shooting Lame Ducks Between an election and the start of a new term, congressional sessions are called "lame duck" sessions because many members of Congress who attend them have been voted out of office in the election. People in finance historically used the phrase "lame duck" to refer to debtors who couldn't repay their loans. In the government context, the phrase describes a representative who, having lost an election, is no longer accountable to the voters. From the viewpoint of the framers of the 20th Amendment, allowing lame ducks to enact laws was undemocratic because the majority of voters had rejected that member's political views. However, the 20th Amendment only shortened the lame-duck period -- it didn't eliminate it entirely. From 1933 through 2012, laws have been passed in 18 lame-duck sessions of Congress. The 12th Amendment, as ratified in 1804, provided for the vice president to serve as acting president if something happened to the president and the House of Representatives was unable to select a replacement by March 4. Since the 20th Amendment moved Inauguration Day to January 20, it also corrected this portion of the 12th Amendment and provided a process for a scenario in which the president-elect dies or otherwise becomes unqualified for office in the time between election and inauguration. If the president dies, the vice president is sworn in as president. If the president merely becomes incapacitated or otherwise is unable to perform the duties of the office, however, the vice president becomes the acting president and is expected to step down when the president is ready to resume the role. - Jupiterimages/Photos.com/Getty Images
<urn:uuid:605a07dc-2dc7-4c86-b54c-7a98cdbf583f>
CC-MAIN-2018-09
https://classroom.synonym.com/effects-constitutions-20th-amendment-20937.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812978.31/warc/CC-MAIN-20180220145713-20180220165713-00041.warc.gz
en
0.971662
694
4.53125
5
Family or Household Decision Making. families are related by blood or marriage households are people living together, but not necessarily related. Families and Households. What’s the difference between a Family and Household ?. Types of Households/Families. Family or Household Decision Making families are related by blood or marriage households are people living together, but not necessarily related What’s the difference between a Family and Household? Why is it Important for Marketers to know about Families and Households? newly married, no kids young couple, kids < 6 young couple, kids >6 older married w/ dep. empty nesters, working widower - working, not working Changes Over Life-Cycle primary decision maker Why is it of value to understand the family life cycle? What are the Critical Consumption factors? Stages of the family life cycle 1) Bachelor Stage. (Young single people not living at home): (a) Few financial burdens, (b) Fashion/opinion leader led, (c) Recreation orientated, (d) Experiment with personal financial management (e) men and women differ in consumer behaviour - women more housing-related items and furniture, basic kitchen equipment, basic furniture, cars, holidays, cars, fringes, cookers, life assurance, durable furniture, holidays, 2) Newly married couples (Young, no children) (DINKS) (a) Better off financially than they will be in the near future, (b) High levels of purchase of homes and consumer durable goods, (c) Establish patterns of personal financial management and necessities - washers, dryers, baby food and clothes, health foods vitamins, toys, books etc.; 3) Full nest I. (Youngest child under six): (a) Home purchasing at peak, (b) Liquid assets/saving low, (c) Dissatisfied with financial position and amount of money saved, (d) Reliance on credit finance, credit cards, overdrafts etc., (e) Child dominated household, necessities - foods, cleaning material, clothes, bicycles, sports gear, music lessons, pianos, junk foods, holidays etc.; 4) Full nest II. (Youngest child six or over): (a) Financial position better, (b) Some wives return to work, (c) Child dominated household, 5) Full nest III. (Older married couples with dependent children.: (a) Financial position still better, (b) More wives work, (c) School and examination dominated household, (d) Some children get first jobs; other in further/higher education, (e) Expenditure to support children's further/higher education, new, more tasteful furniture, non-necessary appliances, boats, holidays, etc. luxuries, home improvements e.g. fitted kitchens etc.; ) Empty nest I. (Older married couples, no children living with them, head of family still in labor force): (a) Home ownership at peak, (b) More satisfied with financial position and money saved, (c) Interested in travel, recreation, self-education, (d) Make financial gifts and contributions, (e) Children gain qualifications and move to Stage 1. medical appliances or medical care, products which aid health, sleep and digestion, hobbies and pastimes, 7) Empty nest II. (Older married couples, no children living at home, head of family retired): (a) Significant cut in income, (b) Keep home, (d) Concern with level of savings and pension, (e) Assist children hobbies and pastimes, 8) Solitary survivor I. (In labour force): (a) Income still adequate but likely to sell family home and purchase smaller accommodation, (b) Worries about security and dependence; (c) Concern with level of savings and pension, 9) Solitary survivor II. (Retired): (a) Significant cut in income, (b) Additional medical requirements, (c) Special need for attention, affection and security, (d) May Seek sheltered accommodation, (e) Possible dependence on 'others for personal financial, management and control. How do the following overall demographics of the modern family affect marketers? Households vary in consumption habits depending on stage where they are in family life cycle Household decision making is also different from individual decision making Family role structure orientation influences household decision making Nature of good or service to be purchased and consumed influences household decision making Types of Purchase Decisions Made by Families Group Members Have Different Preferences and Can’t Agree on a Purchase That Will Satisfy Everyone. Group Agrees on the Desired Purchase, Differing Only in Terms of How It Will Consensual Decision Making Conflict Occurs When There is Not Complete Correspondence in Family Members’ Needs and Preferences. Some Specific Factors Determining the Degree of Family Decision Conflict Include the Following: Person’s Level of Investment in the Group Degree to Which the Product in Question Will Be Used or Will Satisfy a Need For Procurement, Maintenance, Payment, etc. One Family Member’s Influence Over the Others in Making Decisions Influence may depend on the good or service to be purchased, role structure orientation, stage of the decision making process autonomous or unilateral; Who makes the Decisions? Made by One Spouse or the Other Decisions Made Jointly Four Factors Influencing Family Decision Making 1. Sex-role stereotypes - separation of decision-making for sex-typed products. 2 Spousal Resources - spouse contributing the greater resources (usually, but not always, money) has the greater influence 3. Experience - individual decisions are made more frequently when the couple has gained experience as a decision-making unit 4. Socio-Economic Status - middle class families make more joint decisions than either upper or lower class families. Initiators: initiate consumption behaviour Information Gatherers: research alternatives Gatekeepers: control flow of information to other members Influencer(s): provide information about a good or service to other members Deciders: have power to make final buying decision Buyers: member(s) who actually make purchase Preparers: transform product into useable form Users: family members who use the good or service Maintainers: responsible for maintenance of good Disposers: responsible for disposal of good/service Marketing communication: advertising message, media used, person targeted, product positioning Product development: products, e.g. minivans and cars built specifically for families; vacations; services, e.g. insurance, hotel Pricing decisions: e.g. discounts for bulk purchases Distribution: changes in family lifestyle means changes in distribution, e.g. longer retail hours Public policy regulations re marketing to children Households can be targeted by advertising by lifestyle . Marketing to the Family When marketing to the family children must be a consideration. How would you reach families with your marketing message? Internet, e-mail and other technology marketing to families employs strategies and practices that strongly appeal to parent customers and their children for the ultimate purpose of increasing sales. It involves looking at your sales and marketing processes from the viewpoint of a consumer who has money to buy, children beside them and is stretched for time. Family marketing has three components: For many households, a car purchase is a family event. It can be a pleasant one or a story that is retold with embarrassment and horror. Which do you think will lead to a repeat sale or referral? If you were the owner of a car dealership how would you make the purchase of a car a pleasant family event. Since 1976, the real income (in constant dollars corrected for inflation) of Canadian families has remained relatively constant. How is this situation affecting the purchasing behaviour of Canadian Families? How should a firm use this information to develop a marketing strategy for For what kinds of products would the family-life cycle concept be most useful in estimating demand? Give some examples of the effects of the changing role of women on marketing practices (product, promotion, price, place)
<urn:uuid:bb20ddcb-5f76-4d60-93a4-a20b1f392234>
CC-MAIN-2017-04
http://www.slideserve.com/osanna/family-or-household-decision-making
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00380-ip-10-171-10-70.ec2.internal.warc.gz
en
0.892061
1,776
3.171875
3
Pros and Cons of Relocating to Tertiary and Rural Markets How are housing markets defined? When talking about housing markets, there are no hard-and-fast definitions, just some typical characteristics (and remember, markets are fluid: What’s tertiary today could be secondary in a handful of years and vice-versa): - Primary (aka, Level I) markets include the major urban areas — New York metro and Los Angeles metro are longstanding examples, while Miami metro and Dallas/Ft. Worth are examples of areas with significant growth over the last couple of decades. These typically have metro populations of 5+ million. Primary markets tend to have high (and dense) populations, well-developed economies and plentiful jobs in a range of industries, upgraded infrastructures and a huge range of amenities. (Luxury markets are a specific niche with many primary characteristics, although they tend to have inherent characteristics, such as oceanfront or Rocky Mountain locations, that limit population growth while driving desirability). - Secondary (or Level II) markets are typically around 1-5 million people — the Austin, TX metro and Seattle/Tacoma/Bellevue are good examples. Outside of population, these areas meet (or soon will) just about every criteria for primary, Level I categorization. - Tertiary, or Level III markets, often have metro populations of one-million residents or less. Some are undergoing their first period of significant growth, while others include cities that have notable histories but may have hit hard times. As a result, these markets have great potential, but there are some challenges that make them less desirable than primary or secondary markets. These traits may include things like: - A lack of steady jobs in forward-leaning industries, either because larger companies haven’t developed, expanded or relocated there yet or because they’ve suffered from a loss of major employers, overdependence on government jobs or on a specific industry or employer that, when eliminated, has had detrimental overall economic impact. - Lagging infrastructure, either because newer areas don’t yet have the population and tax bases in place to create it or because it’s aging in key areas, such as transportation and technology. - Lack of access to quality primary and secondary schools. - Lack of quality-of-life amenities, including diverse leisure and recreational activities, either because the areas inherently don’t offer them, the population can’t support them or they haven’t been developed yet. What’s the current attraction to tertiary markets? For decades, the leading reason that people moved was for work. Today, though, and largely as a result of the pandemic, the primary driver has shifted. Instead of job opportunities, people are looking for more space — bigger homes, more home-based amenities, larger lots. In many cases, the only way to get those is to move to tertiary markets, because many of these residential wants and needs simply aren’t within financial reach in primary and secondary markets for most people. Additionally, data shows that homebuilding isn’t keeping pace with family formation , so this factor, too, is heating up competition all over: Since the pandemic, people are taking advantage of the opportunity to leave higher-cost cities and move to smaller cities and towns that are often a few hours (or more) from any major metro area. To illustrate just how stark the differences are from a homeownership perspective, here’s an example of what you can get for $400,000 in New York City’s primary, secondary and tertiary markets. Primary: A studio apartment where there’s not a lot of interior space, but you have everything that New York City has to offer: Secondary: About a 90-minute drive north, here’s what you’ll get when you give up Manhattan’s 24/7 lifestyle and go for suburban life: Tertiary: Just over three hours from Manhattan — well out of commuting distance but still good for a weekend visit now and then — is Binghamton, NY: Given this, if people are looking to gain space while staying within a particular price point, then the reason for the migration to tertiary markets is clear. What are the pros and cons of moving to a tertiary market? - Less population density means a (real or perceived) sense of safety during a pandemic - More space at home means long-term work-from-home and home-schooling opportunities are more feasible - Small-town/city quality of life is often perceived as more relaxed with easier commutes (whether work or errands) and many amenities that are more accessible (financially and otherwise, such as lower-cost theater tickets — if there is a theater, that is) - Much greater reliance on cars, which can add significant additional expense and be a sore spot for the environmentally minded, as many tertiary markets have little-to-no sufficient public transportation - Day-to-day needs — such as health care, pet care, home maintenance supplies and car care — may be harder to fulfill - Often, much-loved amenities are lacking, such as Starbucks, an organic-foods co-op or a favorite ethnic-food restaurant Additionally and significantly, too, it often doesn’t take long before a tertiary market with nice homes, large yards and some notable characteristics — great parks or free arts and cultural activities, for example — gets noticed and as more people relocate, often the bucolic or small-city charms are lost to development and sprawl. Is it worth the trade-off? If you ask me, I’d likely say that I’d rather live in a garage near the beach in coastal Orange County than give up on southern California altogether — but, then again, I’ve not grappled with the current reality of an undersized home full of spouses, pets, inlaws and children that many people face. If that was my situation, then I might change my tune. And so it is with all of housing and all of humanity: We’re forever in search of (and moving for) better opportunities, whether higher-paying jobs, civil rights, better schools, more affordable homes, fresher air, proximity to family or any of a thousand more reasons why you may take a chance on a home in a new-to-you town. Where you go is a personal decision, but one thing that’s underappreciated is that moving to a tertiary market may not be an easy decision to reverse, should you end up craving primary- or secondary-market life again: There are a lot of expenses involved simply in the acts of purchasing a home and relocating (not to mention the time invested) and outside of a pandemic, homes in many tertiary markets may be less desirable and it can be hard to recoup your full investment in a short time. That said, if you’re buying because you found an area you love and a home you love, that’s terrific. But if you think you’ve found the next area that’s ripe for a migration boom and are hoping to cash in, I can only urge caution: Many tertiary (and rural) markets have reached peak prices that are about as high as they can bear for a while. Unless you’re in this for the long game, keep in mind this traders’ insight that’s true of stocks, art, wine, cars and, certainly, of housing markets: The higher the quality, the lower the risk — and reduced risks come at a price.
<urn:uuid:1b02320e-6174-4e2c-8133-a3e24c88ed97>
CC-MAIN-2023-14
https://eqtyrealestate.com/blog/tertiary-and-rural-housing-market-relocation-pros-and-cons
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949689.58/warc/CC-MAIN-20230331210803-20230401000803-00386.warc.gz
en
0.952628
1,612
2.6875
3
The goal of higher education is to develop graduates who will be self-directed lifelong learners. This is no exception in Malaysia. The purpose of education is the holistic development of character and capabilities, the acquisition of specific skills, the realisation of intellectual, physical and spiritual potential, and the training of human capital Ministry of Higher Education-MOHE, 2007. Therefore, the learning process needs to be re-engineered. This includes realigning the structure of the curriculum for the course-subject which will allow ample and continuous opportunities for the students to perform and receive constant suggestions for self-development. For that reason, assessment, specifically formative assessment is pertinent to students' growth during and after their higher education. Formative assessment has the ability to turn each item of assessed work into an instrument for further development on each student's learning. Furthermore, such opportunities can be captured via eportfolio. The eportfolio plays a significant tool for the students' development because it has the potential to be a learning tool, an assessment tool, and a record of achievement. Therefore this study explores how eportfolio was developed and managed as a formative assessment tool. The eportfolio platform for this research was Googlesites. Analysis was conducted from the observation data in the online platform and questionnaire data from the undergraduate students. The outcomes of the research are; (1) the students need to be informed and assisted on using the eportfolio as a formative assessment tool and (2) clear guidelines are crucial on setting up the eportfolio platform.
<urn:uuid:cc49a4a0-8a4d-48e9-83b8-ab6712f7ab92>
CC-MAIN-2022-49
https://squ.pure.elsevier.com/en/publications/the-use-of-googlesites-as-a-formative-assessment-tool-eportfolio-
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711552.8/warc/CC-MAIN-20221209213503-20221210003503-00421.warc.gz
en
0.955028
312
2.625
3
Origins of growth: How state institutions forged during the Protestant Reformation drove development. Jeremiah Dittmar, Ralf R Meisenzahl. Vox 26 April 2016. Throughout history, most states have functioned as kleptocracies and not as providers of public goods. This column analyses the diffusion of legal institutions that established Europe’s first large-scale experiments in mass public education. These institutions originated in Germany during the Protestant Reformation due to popular political mobilisation, but only in around half of Protestant cities. Cities that formalised these institutions grew faster over the next 200 years, both by attracting and by producing more highly skilled residents.
<urn:uuid:799785e4-5ced-4c53-946b-b1c658e54bba>
CC-MAIN-2018-43
http://moderndebtjubilee.blogspot.com/2016/04/new-article-on-german-cities-that-began.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511761.78/warc/CC-MAIN-20181018084742-20181018110242-00487.warc.gz
en
0.945504
135
2.953125
3
This page is an attempt to describe the earliest history of looms, and of weaving in general. I am trying to present an overview of the most primitive loom types, the types of weaves that are found in early history (and why they are associated with the loom types that produce them), and the fibers used in prehistoric weaving (and why they are probably found in the areas where there have been located). Band looms: No physical remains have been left by these looms, and any representations of them in prehistoric images are rare enough to be nearly nonexistent. The only evidence we have that they must have existed is the bands that have been found — they exist, therefore the looms they were woven on must have existed. They were probably back-strap looms. Probably the oldest type of loom — the next two types derive from it but are completely different solutions to the same problem: weaving a wider piece of cloth than is possible from a band loom. Back-strap looms: Probably the simplest form of loom: one end of the warp is tied to a tree, post, or some other large object that is not likely to be easily moved, and the other end is tied to the weaver’s waist. Warp tension is controlled by the weaver leaning back on the warp. The width of the fabric that can be produced using this method is limited, though — tying the warp into a bundle at each end forces the weaving into a condensed space, laterally, and having the warp tied to the weaver limits how far the fabric can be woven before adjustments must be made to accommodate the reach of the weaver’s arms. Clearly the warp must be spread wider in order to get any sort of substantial width in the resulting cloth. Two-beam ground looms: These are simple looms formed by pegging sticks into the ground, placing beams on the outside of the pegs and winding a warp between the two beams. A heddle rod may be used to control the weaving shed of the warp. Again, no physical evidence of the looms exists, except in depictions of weavers on other artifacts. These seem to have developed in the Late Neolithic, in the area of Mesopotamia and Syria, and their use moved southeast from there. Warp-weighted looms: This is an upright loom, using an upper beam to support the warp, which is divided into the different sheds needed for the cloth being woven, and then stretched taut by weights hung from the warp threads. A lower beam keeps the front and back parts of the warp separated, and heddle rods are used to change the weaving sheds between the sections of warp as needed for the weave chosen by the artisan. Warp-weighted looms are possibly the only type of loom for which there are plentiful artifacts remaining, in the form of loom-weights. Note here that the cloth is woven from the top down, with the weaver beating upward. These, too, seem to have developed in the Late Neolithic, in the area of the Eastern Mediterranean, and then migrated northwest throughout Central and Western Europe. Two-beam vertical looms: This seems to answer the problem of weaving in a different way than the warp-weighted loom, by using the bottom beam of the loom to hold the warp taut instead of free-hanging loom-weights. This also allows the weaver to beat down on the weaving, instead of beating upward (thus allowing the weaver to sit down while weaving). This loom is believed to have been invented in the Third Millennium BC, in the area of Syria, essentially on the border of the areas that used the horizontal and vertical (warp-weighted) looms. It is also possible that it was developed in the Caucasus, where no information has been preserved of what was used for weaving in prehistoric periods. One drawback, in comparison to the warp- weighted loom, is that the size of the loom and the length of warp possible limit the length of the cloth produced. By contrast, the warp-weighted loom puts little limit on length, as excess warp can be gathered below the loom-weights, and only the length of the cloth beam and the other crossbeams used to build the loom limits the width of the cloth. Plain/Tabby weave (& Basket weave): This is the simplest form of weave – one thread over, one thread under. In basket weave, the bundles are equal numbers each way. The weave may be even, with both warp and weft showing, or the cloth may be either warp- or weft-faced, depending on which thread predominates. The ground looms are theorized to have been limited to this, due to the difficulty of using multiple heddle bars on a ground loom. Twill weaves: X threads over/X threads under — with the Xs not necessarily being equal — with a shift of usually one thread laterally with each successive iteration. This produces diagonal lines in the weave structure. If the shift is not one thread, then the twill is usually referred to as a “broken” twill. Warp-weighted looms, and any shafted looms, can weave these, as can any upright loom that can be fitted with multiple heddle rods. Tapestry: A weft-faced plain weave, using multiple colors, usually used for patterning, as the weft normally goes only for short distances before it turns back on itself. Two-beam vertical looms are most often used for this weave. Knotted pile weaves: Most commonly, this is a combination of interlacing ground weft and short lengths of tuft-forming weft threads. The ground weft may be inserted with the aid of a shed-forming device on a loom, but the short lengths for the tuft are always hand-inserted with a needle — either by loop wrapping or by knotting, whether symmetrically or asymmetrically. This is also most commonly done on a two-beam vertical loom. Linen/Bast fibers: Egypt seems to have used linen and other bast fibers predominantly, and used them on the ground loom to the exclusion of any sign of a warp-weighted loom in the region, once it started weaving in the 5th Millennium BC. Wool: Mesopotamia, Syria, Palestine, Iran and the Caucasus all seem to have taken up using wool, as well as using linen, in their weaving, and may have done so early, as sheep domestication may have occurred as early as the 7th Millennium BC. Both these fibers spread northwest throughout Europe, along with the warp-weighted loom. Elizabeth Wayland Barber, in her book Prehistoric Textiles (1991, see pp. 249-253, particularly), ultimately divides the area of Europe, Western Asia and the Middle East/North Africa into four different zones, as far as the development of weaving and textiles is concerned. Her zones, and their criteria are: (Central and Eastern Europe) Warp-Weighted Loom Bast and Wool Supplemental-Weft floats (Egypt and the Nile) Bast and very little Wool Supplemental-Weft inlay (Western Asia & Ural Mountains) Felt Wool and a little Bast Stitchery (Mesopotamia and the Middle East) Ground Loom Bast and Wool fibers Faced weaves, including T apestry Surprisingly little has been written about loom weights, beyond their identification and locations where they have been found, until recent years. Only within the past decade or two has any analysis been done as to what loom weights can tell us about the cloth being woven on the looms they were associated with — the fineness of the threads being used, the density of warp that is possible, etc. Just as the weight of a spindle whorl controls the fineness of the thread that can be spun on a spindle, so too the weight and shape of a loom weight can control how many threads can be attached to it, and what quality of fabric could have been produced, given a specific quality of thread. Loom weights (and spindle whorls) are finally being looked at as a source of information in their own right, not just as an artifact of domestic life in an area. We should see exciting information from here, soon. Some Suggested Readings Barber, E. J. W. Prehistoric Textiles: The Development of Cloth in the Neolithic and Bronze Ages, with Special Reference to the Aegean. Princeton, NJ: Princeton University Press, 1991. Filled with many sections on warp-weighted looms and weaving, intermingled with other fascinating topics. For being a research monograph, it reads very easily, and Barber explains her theories well. Barber, Elizabeth Wayland. Women’s Work: The First 20,000 Years — Women, Cloth, and Society in Early Times. New York: W. W. Norton & Company, Inc., 1994. A more popular, rather than strictly scholarly, book, but better expected. The warp-weighted loom mentions are scattered throughout the book, and it often takes a thorough browse of the indexed area to locate the full context of the discussion. Broudy, Eric. The Book of Looms: A History of the Handloom from Ancient Times to the Present. Hanover and London: University Press of New England, 1979. Chapter 2 covers the warp-weighted loom, and is broken into Operation, the Greek loom, the Scandinavian loom, and the Chilkat loom. Overall, a good overview, aimed at the interested newcomer. Geijer, Agnes. A History of Textile Art: A Selective Account. London: Pasold Research Fund in Association with Sotheby Parke Bernet, 1979. This is a very nice overview of the topic. The section on the warp-weighted loom itself is fairly small, but there are discussions of the loom and its weaving throughout the book. Hoffmann, Marta. The Warp-Weighted Loom: Studies in the History and Technology of an Ancient Implement. Trans. Harold B. Burnham and Elizabeth Seeberg. Oslo, Norway: The Norwegian Research Council for Science and the Humanities, (1964) 1974. The starting point for any study on the wwloom, though there are places where Hoffmann gets it wrong — for example, she does not see how a wwloom can weave a 2/1 twill, something later researchers figured out quite easily later, esp. when a 2/1 twill woven piece was found. Mårtensson, Linda, et al. Technical Report Experimental Archaeology Part 3 Loom Weights. Copenhagen: The Danish National Research Foundation’s Centre for Textile Research (CTR) University of Copenhagen, 2007. http://ctr.hum.ku.dk/tools/Technical_report_3__experimental_archaeology.PDF One of the new research projects that are taking a closer look at loom weights and the information that can be gleaned from them. Interesting! Additional Articles of Interest: A Warped Version: Manipulating Roman Looms for Metaphorical Effect – Potamius of Lisbon’s Epistula de Substantia 5‑9 (2018) A Warped Version: Manipulating Roman Looms for Metaphorical Effect – Potamius of Lisbon’s Epistula de Substantia 5‑9, Humanitas 71(1), p. 51-70, doi:https://doi.org/10.14195/2183-1718_71_3 Aspects of Gender and Craft Production in Early Anglo-Saxon England, with Particular Reference to the Kingdom of Kent (2002) Aspects of Gender and Craft Production in Early Anglo-Saxon England, with Particular Reference to the Kingdom of Kent, p. 399 + 144 pp., url Looms for Linen (1994) Looms for Linen, Laborativ Arkeologi 7, p. 75-77 Pattern and Loom (2009) Pattern and Loom Second edi, p. 400, pdf The Horizontal Loom at Novgorod (1968) The Horizontal Loom at Novgorod, Medieval Archaeology 12, p. 146-147 When did weaving become a male profession? Loom Weights & Warp Weighted Looms Ancient Egyptian and Greek Looms (1913) Ancient Egyptian and Greek Looms, p. 1-41, Halifax: F. King & Sons Ltd., Printers Aspects of textile production in Iron Age Transjordan (2012) Aspects of textile production in Iron Age Transjordan From archaeological finds to high quality textile fabrics: new data from Herakleia, southern Basilicata, Italy (2014) From archaeological finds to high quality textile fabrics: new data from Herakleia, southern Basilicata, Italy, Monographs of the Archaeological Society of Finland 3, p. 76-87, pdf Notes on the statistical analysis of some loomweights from Pompeii (2008) Notes on the statistical analysis of some loomweights from Pompeii, Archeologia e calcolatori 19, p. 239-256 Shape of things: Understanding a loom weight (2009) Shape of things: Understanding a loom weight, Oxford Journal of Archaeology 28(4), p. 373-398, doi:10.1111/j.1468-0092.2009.00334.x Statistical Analysis of Some Loomweights From Pompeii: A Postscript (2010) Statistical Analysis of Some Loomweights From Pompeii: A Postscript, Archeologia e calcolatori 21, p. 185-200 Technical Report Experimental Archaeology Part 3 Loom weights, 2007 (2006) Technical Report Experimental Archaeology Part 3 Loom weights, 2007, p. 1-17 Textile Production Tools from the Excavations at Caere, 2012 - 2014 (2015) Textile Production Tools from the Excavations at Caere, 2012 - 2014, p. vii + 86 pp., url Textile Production at Tell ’ Abū al-Kharāz , Jordan Valley (2009) Textile Production at Tell ’ Abū al-Kharāz , Jordan Valley, A Timeless Vale. Archaeological and Related Essays on the Jordan Valley in Honour of Gerrit van der Kooij on the Occasion of His Sixty-Fifth Birthday, Gerrit Van der Kooij (ed.), p. 109-117, Leiden: Leiden University Press Tools and Textiles - Texts and Contexts Examination of spinning and weaving samples (2006) Tools and Textiles - Texts and Contexts Examination of spinning and weaving samples, Tools and Textiles - Texts and Contexts, p. 1-24 Unravelling the Fabric: Textile Production in Iron Age Transjordan (2013) Unravelling the Fabric: Textile Production in Iron Age Transjordan(december), p. 365 pp. Weaving relationships in areas of cultural contacts: production, use, and consumption of loom weights in pre-Roman Sicily (2014) Weaving relationships in areas of cultural contacts: production, use, and consumption of loom weights in pre-Roman Sicily, Monographs of the Archaeological Society of Finland 3, p. 88-101, pdf Weighing the evidence: Determining and contrasting the characteristics and functionality of loom weights and spindle whorls from the Garrison at Birka (2012) Weighing the evidence: Determining and contrasting the characteristics and functionality of loom weights and spindle whorls from the Garrison at Birka, url Feel free to contact me, if you have any questions!
<urn:uuid:303ab5d7-13a4-40c2-b568-42afc272b771>
CC-MAIN-2022-21
http://www.fiadnata.org/a-short-overview-of-loom-types-and-their-place-in-weaving-history/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534773.36/warc/CC-MAIN-20220521014358-20220521044358-00012.warc.gz
en
0.916958
3,384
3.953125
4
A program loaded into the memory of a Linux computer becomes a process. Processes need to be managed and monitored because they consume system resources like CPU time, memory and disk space. There are also security and safety implications. Monitoring and managing processes is, therefore, an important function of systems administrators. A process is a running instance of a launched, executable program. It consists of: - An address space of allocated memory - Security properties, including ownership credentials and privileges - One or more execution threads of program code - The process state The environment of a process includes: - Local and global variables - A current scheduling context - Allocated system resources, such as file descriptors and network ports An existing process duplicates its own address space (fork) to create a new (child) process structure. Every new process has a unique process ID (PID) for tracking and for security. The PID and parent process (PPID) are elements of a new process environment. Any process may create its own child process. All processes are descendants of the first system process, which is systemd in the case of the Red Hat Enterprise Linux 7 system. Through the for routine, a child process inherits security identities, the previous and current file descriptors, port and resource privileges, environment variables and program code. A child process may then execute its own program code. Normally, a parent process sleeps while the child process runs, setting a request (wait) to be signalled when the child process completes. On exiting, the child process closes or discards its resources and environment; the remainder is referred to as a zombie. The parent, which is signalled awake when the child exits, cleans the remaining structure and continues with executing its own program code. In a multi-tasking operating system, each CPU (or CPU core) can work on one process at a single point in time. As a process runs, its immediate requirements for CPU time and resource allocation change. Processes are assigned as states, which change with the circumstances. The Linux process states are explained in Table 1. The ps command is used for listing current processes. The command can provide detailed process information including: - The user identification (UID), which determines process privileges - The unique process identification - The CPU and real-time already expended - How much memory the process has allocated in various locations - The location of process STDOUT known as the controlling terminal - The state of the current process Important: The Linux version of ps supports three options/formats, including: - UNIX (POSIX) options, which may be grouped and must be preceded by a dash - BSD options, which may be grouped and must not be used with a dash - GNU long options, which are preceded by two dashes For example, ps –aux is not the same as ps aux. A common display listing (options aux) displays all processes, with columns that users will be interested in; this includes processes without a controlling terminal. A long listing (options lax) provides more technical details, but may display faster by avoiding the user name lookup. A similar UNIX syntax uses the options –ef to display all processes. The output of some commands is shown in Figures 1, 2 and 3. By default, ps with no option selects all the processes with the same effective user ID (EUID) as the current user, and is associated with the same terminal where ps was invoked. - Processes in brackets (usually at the top) are scheduled kernel threads. - ps displays once. The man page of top (1) can be referred to for a repetitive updated process display. - ps can be displayed in tree format to view parent/child relationships. - The default output is unsorted. The display order matches that of the system process table, which reuses table rows as processes die and new ones are created. The output may appear chronological, but this is not guaranteed unless explicitly stated –O, –sort options are used. Jobs and sessions: Job control is a command shell feature allowing a single shell instance to run and manage multiple commands. Without job control, a parent shell forks a child process to run a command, sleeping until the child process exits. When the shell prompt redisplays, the parent shell returns. With job control, commands can be selectively suspended, resumed and run asynchronously, allowing the shell to return for additional commands while the child process can run. A foreground process is a command running in a terminal window. The terminal device ID (tty) is the process’s controlling terminal. Foreground processes receive keyboard-generated input and signals, and are allowed to read from or write to the terminal (e.g., via stdin and stdout). A process session is created when a terminal or console first opens (e.g., at login or by invoking a new terminal instance). All processes (e.g., the first command shell, its children and pipelines) initiated from that terminal share the same session ID. Within that session, only one process can be in the foreground at a time. A background process is started without a controlling terminal because it has no need for terminal interaction. In a ps listing, such processes (e.g., services, daemons and kernel process threads) display a question mark (?) in the TTY column, while background processes that (improperly) attempt to read from or write to the terminal may be suspended. Running jobs in the background Any command can be started in the background by appending an ampersand (&) to the command line. The bash shell displays a job number (unique to the session) and the PID of the new child process. The command shell does not wait for the child process and redisplays the shell prompt. The bash command shell tracks jobs, per session, in a table displayed with the jobs command as shown in Figure 4. Background jobs can reconnect to the controlling terminal by being brought to the foreground using the fg command with the job ID (%job number). The example sleep command is now running on the controlling terminal. The command shell is again asleep, waiting for this child process to exit. To resend it to the background, or to send any command in which the trailing ampersand was not originally included, send the keyboard generated suspend request (Ctrl-z) to the process. The suspend request takes effect immediately. The job is placed in the background. The pending output and keyboard typeahead are discarded. The ps option j displays job information, including the initial command shell of each session. Since the sleep example command is currently suspended, the state flag displayed is T. To restart the process in the background, use the bg command with the same job ID. The command shell will warn a user who attempts to exit a terminal window (session) with suspended jobs. If the user tries exiting again immediately, the suspended jobs are killed. Process control using signals A signal is a software interrupt delivered to a process. Signals report events to an executing program. Events that generate a signal can be an error, or can be external events (like an I/O request or expired timer) or can be generated by explicit requests (e.g., using a signal-sending command or by a keyboard sequence). Table 2 lists the fundamental signals used by systems administrators for routine process management. Each signal has a default action, which is usually one of the following: - Term – Causes a program to terminate (exit) at once. - Core – Causes a program to save a memory image (core dump), and then terminate. - Stop – Causes a program to stop executing (suspend) and waits to continue (resume). - A program can be written for expected event signals by implementing handler routines to ignore, replace or extend a signal’s default action. Commands for sending signals by explicit request Users signal their current foreground process by typing a keyboard control sequence to suspend (Ctrl –z), kill (Ctrl-c), or core dump (Ctrl-\) the process. To signal a background process or processes in a different session requires a signal-sending command. Signals can be specified either by name (-HUP or –SIGHUP) or by number (like -1). Users may kill their own processes but root privileges are required to kill processes owned by others. - The kill command sends a signal to a process using ID. Despite its name, the kill command can be used for sending any signal, not just those for terminating programs. - Use the killall command to send a signal to one or more processes with matching selection criteria, such as a command name, processes owned by a specific user or system-wide processes. - The pkill command, like killall, can signal multiple processes. Pkill uses advanced selection criteria, which can include a combination of the following: - Command – Processes with a pattern-matched command name - UID – Processes owned by a Linux user account, effective or real - GID – Processes owned by a Linux group account, effective or real - Parent – Child processes of a specific parent process - Terminal – Processes running on a specific controlling terminal
<urn:uuid:ed161aa1-3e89-4379-9d72-b5a6533922cd>
CC-MAIN-2022-40
https://www.opensourceforu.com/2018/10/how-to-monitor-and-manage-linux-processes/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00127.warc.gz
en
0.897399
1,921
3.359375
3
To accompany the publication of Chris McCabe’s Cenotaph South: Mapping the Lost Poets of Nunhead Cemetery, we commissioned artist Frances Ives to create an illustrated map of London’s lost poets, writers buried in the capital’s Victorian cemeteries. McCabe has uncovered 93 lost poets in the ‘Magnificent Seven’ – West Norwood, Nunhead, Tower Hamlets, Abney Park, Highgate, Kensal Green and Brompton. The map includes the celebrated figures Karl Marx, Christina Rossetti and Christopher Logue, alongside names forgotten to history such as Marian Richardson, John Yarrow and William ‘Spring’ Onions. This beautifully illustrated map is printed in a limited run, and features stunning watercolour portraits of 21 dead poets. The reverse lists the names of all 93 poets discovered in the Magnificent Seven. I first became involved with finding dead poets during the ‘Curious’ exhibition at West Norwood Cemetery in 2013. I discovered twelve poets, each with their own story and body of work. I was excited to find that West Norwood was one of seven cemeteries opened in London between 1833 and 1841 with the aim of taking pressure from the overcrowing of inner-city churchyards. My interest in finding a great lost poet has grown into an obsession which I am documenting in my series of books, each volume covering one of the seven cemeteries. Frances Ives is a freelance artist and illustrator, who completed her MA Illustration at Camberwell College of Art in 2014. Frances draws from observation, and combines figurative drawings with abstract mark making to make her illustrations. She works primarily in inks and watercolour, but sometimes mixes media and printing methods, composing elements digitally to create illustrations. She create original works, for exhibition or for commissions.
<urn:uuid:e4a14cee-a3e6-4812-9182-1a910486de89>
CC-MAIN-2019-18
http://www.pennedinthemargins.co.uk/index.php/2016/11/the-lost-poets-of-the-magnificent-seven-map/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578532882.36/warc/CC-MAIN-20190421195929-20190421220830-00058.warc.gz
en
0.94315
385
2.53125
3
In November 2013, a colleague of mine, Nic Cullen of Otago University, was part of an expedition to climb Aoraki/Mt Cook, the highest mountain in New Zealand, in order to remeasure its current summit elevation. In the early morning of 14 December 1991, 12 million cubic metres of Aoraki/Mt Cook, in the Southern Alps, collapsed and roared down the ice fields of the east face. It then plunged to the Tasman Glacier on the valley floor. The rock avalanche travelled 7.5 km at an average speed of 200 km/hour. No property was damaged and there were no fatalities, but climbers on the mountain had a close call. The edge of the slide passed less than 300 m from Plateau Hut as they were readying themselves for an attempt on the summit. Photo after the landslide (also from Te Ara) Aerial photography-based calculations performed by Otago National School of Surveying researcher Dr Pascal Sirguey and Masters student Sebastian Vivero indicated that the summit height had changed and in response to this the expedition was arranged to remeasure the summit with high precision GPS instrumentation as a field validation of the photogrammetry work. For more information you can read the Otago University article about the expedition, or the excellent project webpage, and I also recommend watching the very nice video they made about the expedition: Out of respect of the cultural significance of this mountain the research team did not step on the summit, but used GPS measurements from just below the summit to constrain a photogrammetric model of the mountain. The official summit height of Aoraki / Mt Cook is now: 3,724m
<urn:uuid:f7863933-878c-47c7-9886-55c2331526b6>
CC-MAIN-2021-04
http://lindseynicholson.org/2014/01/changing-height-of-aoraki-mt-cook/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703531702.36/warc/CC-MAIN-20210123001629-20210123031629-00714.warc.gz
en
0.957794
345
2.828125
3
Managing credit is about using money responsibly and building a strong credit history. It can seem like a big job, but it's vital. Everything from finding a place to live to making major purchases to getting insurance is affected by your credit standing. The good news is, once you set up a system for credit management, you just have to invest a small amount of time maintaining it. Know and Build Your Credit Score The first step in credit management is to know where you're starting. Finding out your FICO credit score will help you know where you stand. Several factors that affect credit scores, including: - Payment history - Amount owed - Credit history - Number of new credit lines - Types of credit accounts Once you know where you're starting, you can take steps to build your credit up if necessary. If your creditworthiness is already excellent, good credit management can keep it that way. Use Credit Wisely There are several steps you can take to manage your existing credit and keep debt under control. Maintain a Budget Creating a budget helps you know how much money you have coming in and how it's being spent. A budget will help you understand if you need to make changes to your spending habits or perhaps work additional hours. You can use a sample budget form to get started on creating your own household budget. Set Payment Reminders Paying on time is a major part of keeping your credit score in good condition. Life is busy, and it's easy to forget when you have a credit payment coming up. It can help to schedule a reminder on your calendar or phone to review your bills at specific times. Many credit card companies offer payment alerts as well, which can help you stay on track. Pay More than the Minimum Payment Credit card bills will show you the minimum amount you have to pay on the due date, but it's important to pay more if you can. Paying minimum payments will extend the amount of time you owe, and will cost you a lot of money in interest. Pay your credit cards off each month if you can. If you can't, try to pay more than the minimum payment. You can save money on interest by putting extra money toward your mortgage and car payments as well. Limit Available Credit and Debt It's easy to end up with more available credit and debt than you realize, and it can happen quickly. Almost every retailer offers store credit cards and entice customers to open accounts with discounts or other special offers. Many furniture stores and other providers of expensive goods offer store financing with no down payment and low interest rates (often zero). While these may seem like a good deal at the time, things can quickly get out of hand. Both available credit and total debt can impact your creditworthiness. It's hard to say how many credit accounts are 'too many' since lenders have varying standards. However, having a lot of available credit shows lenders, such as mortgage banks, that you are at a high risk to overdo your debt. Further, having a lot of available credit can quickly turn into a lot of debt, which can cause problems quickly. To effectively manage your credit, it is ideal to keep your debt-to-income ratio at or below 36 percent. Find the Right Credit Offers When you need to use credit, it's essential to shop around and find the best deals. There are several kinds of credit that you may need from time to time. When used properly, credit cards are an excellent way to develop a strong credit history. You can use credit cards to finance major purchases, or simply to earn rewards on purchases you make already. You want to check a variety of banks and credit offers before deciding on one. Be sure to look for the lowest interest rate for your situation. Buying a home is a dream come true for many people, but a mortgage is a major commitment. Be sure to shop around to get the best mortgage. You want to compare interest rates, fees, and more. It's also important not to buy a home that you cannot comfortably afford. Just because a bank approves a loan doesn't mean it's the right amount for your budget. Buying a car can be a nerve-wracking experience, but there are many ways to make sure you get the best financing deal. The loan you're offered at the dealership may not be the right one for you. Be sure to check local banks and credit unions, and don't be afraid to negotiate the car loan rate with the dealer. Avoid applying for several different lines of credit at one time. Each one affects your credit, and having several in a short time can be a red flag to lenders. Instead, compare credit offers before you apply, and only go for the one that is right for you. Keep Your Credit Secure When you've are managing debt wisely and have chosen appropriate credit accounts, you've done a lot to keep your credit in good condition. However, there are also security concerns that you should keep in mind. Protect Your Personal Information You should always keep your personal information safe. Never share your bank account, social security number, or credit card information with someone who calls you on the phone or sends you an email. Don't click on links in emails you don't recognize. Shred personal documents before throwing them away, and don't enter private or financial information on unsecured Wi-Fi networks or public computers. Review Your Credit Report You can also keep an eye on your credit report. You can receive a free credit report every year. It may not have your credit score on it, but it will have other important information. Be sure to look over the full report to make sure there are no errors or unauthorized accounts. If there are mistakes, contact the credit bureau and let them know. Report Identity Theft Promptly If you believe that you are the victim of identity theft, it's important to report it right away. You'll need to contact the Federal Trade Commission (FTC), your credit card company, and the local police. You also need to report the problem to the Internal Revenue Service (IRS), since a stolen social security number can be used for tax or employment fraud. Get Help with Credit Problems Financial problems affect everyone, and sometimes they can wreak havoc on your credit. If you've made some mistake or hit hard times and now your credit is suffering, don't panic. There are a number of options available. The first step to take is to save money any way you can. There are dozens of tips available for how to cut costs, from changing your transportation situation to finding deals on daily purchases. Sometimes buying in bulk makes sense, and you may be able to save money by creating things at home that you would normally purchase. When you cut your expenses, you'll have more money to handle your debt. Consolidating your credit card debt can help you combine several payments into one. You may also be able to get a lower interest rate, which will help you save money. Debt consolidation offers vary, so be sure to compare several before making a decision. A debt management or debt settlement program should be considered only if you cannot keep up with your payments. With a debt management program, you pay into an account with the debt settlement company rather than paying your creditors. Over time, as your balance builds, the debt settlement company makes offers to your creditors to eliminate your debt for less than you owe. Of course, falling behind on payments will damage your credit, but you may be able to get out of debt more quickly. Make sure you understand all fees, as debt management companies typically charge a percentage of your total debt. It's also important to carefully research programs before you enroll, and never pay an upfront fee. Unfortunately, debt management is an area full of fraud, as criminals prey on desperate consumers. Bankruptcy should only be considered as a last resort. It will damage your credit and the negative impact will stay on your credit report for seven years. If you do declare bankruptcy, it takes a lot of time and patience to rebuild your credit. Manage Your Credit Wisely When you look at managing your credit, it can seem complex. However, a lot of credit management just involves keeping up with payments and obligations. Maintaining a budget and only taking out credit you truly need is essential. You should also take great care to protect your personal information. If something goes wrong, you can recover, but it can take a long time. It's better to focus on excellent credit management.
<urn:uuid:1492ce5f-2323-4fc8-9015-4f47c8b0ca31>
CC-MAIN-2019-22
https://creditcards.lovetoknow.com/Credit_Management
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256147.15/warc/CC-MAIN-20190520202108-20190520224108-00249.warc.gz
en
0.96474
1,752
2.65625
3
HANDFIELD, JOHN, military officer, member of the Nova Scotia Council; m. Elizabeth Winniett; d. c. 1763. Little is known of John Handfield’s early life. Commissioned an ensign in Philipps’ regiment (the 40th Regiment of Foot) in February 1719/20, he spent his entire military career in Nova Scotia. In 1721 he was among the officers signing an indictment of Lieutenant John Washington*’s behaviour and in the winter of 1729/30 he witnessed the oath obtained by the governor of Nova Scotia, Richard Philipps, from the Acadians of the Annapolis River area. By 1731 he had built a home at Annapolis Royal (formerly Port-Royal) “at a Considerable Charge for the Conveniency of his ffamily. . . .” Mention of his family would indicate that his marriage to the daughter of William Winniett had taken place by this time. Promoted lieutenant in April 1731, he was appointed to the council, along with his brother-in-law, Lieutenant Edward Amhurst, and Ensign John Slater, in November 1736. Lieutenant Governor Lawrence Armstrong* described the new members as “Men of Sense & Merit. . . .” For 13 years Handfield regularly attended council meetings, contributing to the discussions and serving on committees. In 1740 he was promoted captain. He was still at Annapolis Royal in 1744 when French troops under the command of François Du Pont* Duvivier unsuccessfully besieged the fort. A break in his Annapolis service came in 1749 when Paul Mascarene, the commanding officer of the garrison there, was instructed to send 100 men to Minas to meet the French and Indian threat in the area. Handfield was in charge of the contingent and, in one skirmish with the Indians, his son, Lieutenant John Handfield, was taken prisoner. By the early 1750s Handfield was back in Annapolis Royal commanding the troops there. He was granted a commission as justice of the peace in July 1751 and, because there was no clergyman present at the time, he received permission to perform the marriage ceremony between his daughter and John, son of Otho Hamilton, in August 1752. As commandant of Annapolis Royal, Handfield was ordered to threaten with severe punishment “such Inhabitants as Communicate too much with the French” and to try to prevent the Acadians and the English traders on the Bay of Fundy from supplying the French and Indians with corn. These instructions were embarrassing for him since one of the individuals suspected by Governor Charles Lawrence of trading with the enemy was his brother-in-law, Joseph Winniett. The Acadian deportation provided another occasion when Handfield was torn between personal relationships and his duty as a British officer. In August 1755 he received instructions that the Acadians were to be “dispersed among his Majesty’s Colonies upon the Continent of America” and that he was to be responsible for the embarkation of the inhabitants of the Annapolis district. He carried out his orders methodically and on 8 Dec. 1755 seven transport ships left Annapolis Basin carrying their cargoes of exiled Acadians to the New England colonies and the Carolinas. In correspondence with Colonel John Winslow*, who was carrying out the same task at Minas, Handfield revealed his dislike of his duties: “I heartily join with You in wishing that we were both of us got over this most disagreeable and troublesome part of the Service. . . .” He had good reason for finding the deportation “most disagreeable.” His wife’s mother had been Marie-Madeleine Maisonnat, and among the victims of the deportation were Elizabeth’s “sister-in-law, nephews and nieces, uncles, aunts and cousins.” In at least one instance he intervened, delaying a relative’s departure and writing on his behalf to New England. Promoted major on 15 Oct. 1754, Handfield became lieutenant-colonel in March 1758. In the same year he participated in the capture of Louisbourg, Île Royale (Cape Breton Island). According to the Army lists he retired from the regiment in 1760. He apparently took up residence in Boston, and his death date has been suggested as around 1763. In addition to his son John and his daughter Mary there was at least one other child, Thomas, who “became the ancestor of the Handfields of Montreal.’ Boston Public Library, Mellen Chamberlain autograph coll., Ch.F.1.65. PANS, RG 1, 21, pp.29, 150; 35, nos.5, 11; 134, pp.2, 6, 7, 74, 75, 86, 87, 88, 107, 201, 202, 246, 247, 248, 287, 288, 302, 303, 321, 322, 323, 324, 325, 326; 164/1, p.68. Army list, 1760, 91. Documents relating to currency in Nova Scotia, 1675–1758 (Shortt), 147. Knox, Historical Journal (Doughty), I, 214. N.S. Archives, I, 274–76, 580; III, 182, 183, 185, 186, 232, 233, 234, 239, 243, 249, 254; IV, 6, 10, 11, 14, 18, 22, 25–27, 29–33, 40, 42, 49–53, 55–56, 86, 88, 90, 93, 95–97. Winslow, “Journal,” N.S. Hist. Soc. Coll., III (1883), 103, 134, 137, 138, 142, 164, 168. Calnek, History of Annapolis (Savary). Dalton, George the first’s army, II. C. J. d’Entremont and H.-J. Hébert, “Parkman’s diary and the Acadian exiles in Massachusetts,” French Canadian and Acadian Geneal. Rev. (Quebec), I (1968), 241–94. A. W. H. Eaton, Lt.-Col. Otho Hamilton of Olivestob: lieutenant-governor of Placentia, lieutenant-colonel in the army, major of the 40th Regiment of Foot, member of the Nova Scotia Council from 1731 to 1744 (Halifax, 1899). Harry Piers, “The fortieth regiment, raised at Annapolis Royal in 1717; and five regiments subsequently raised in Nova Scotia,” N.S. Hist. Soc. Coll. XXI (1927), 115–83. Smythies, Historical records of 40th regiment.
<urn:uuid:ebc08870-9ce1-40cb-8041-9b2bfa8fdab8>
CC-MAIN-2017-47
http://www.biographi.ca/en/bio/handfield_john_3E.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806832.87/warc/CC-MAIN-20171123123458-20171123143458-00342.warc.gz
en
0.972762
1,435
2.71875
3
A new study has said that disarming harmful bugs rather than trying to kill them may help overcome antibiotic resistance. Research led by Monash University in Melbourne, Australia showed a protein complex called TAM formed a type of molecular pump in bacteria. The pump allows bugs to shift disease-causing molecules from inside the bug cell to the outside, readying them for infection, the journal Nature Structure and Molecular Biology reports. Biochemistry doctoral student Joel Selkrig at Monash University, who led the study, said the work opens the way to developing new drugs that disrupts the pumping process, neutralising the bugs potential to infect, according to a Monash statement. "The TAM was discovered in many disease-causing bacteria that cause whooping cough and meningitis, to hospital-acquired bacteria that are developing resistance to current antibiotics," Selkrig said.
<urn:uuid:714b203a-9528-4d76-9362-939b1112d6d7>
CC-MAIN-2017-34
http://www.medindia.net/news/antibiotic-resistance-may-be-overcome-by-disarming-bugs-99825-1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104172.67/warc/CC-MAIN-20170817225858-20170818005858-00418.warc.gz
en
0.932276
177
3.25
3
Scuba Diving Newsletter Diving with Asthma? Many asthmatics want to dive, but unfortunately, there are a number of concerns about the effect of asthma on dive safety. Dive physicians have traditionally taken a very conservative approach to asthma in dive fitness assessments. Mention of the word "Asthma" and potential divers were ejected from the surgery faster than you could say, "but it wasn't serious and it's gone away now" More recently, some dive physicians have begun to take a more liberal, informed consent approach in assessing previous or mild asthmatics for diving. Some ex-sufferers previously prevented from diving can now dive, after making an informed choice about the possible risks. What is Asthma? Asthma is a condition affecting medium to small airways in the lungs. In asthmatics, these airways are prone to narrowing, which impedes the flow of air into and, in particular, out of the small air sacs (alveoli) where gas exchange occurs. The trigger for these events is often an allergic response to a specific stimulus, Some asthmatics also respond to physical stimuli such as exercise or a change from breathing warm air to cold air. The result is that the patient feels short of breath and there may be an audible wheeze due to airway narrowing which can cause severe breathing difficulty, and asthma attacks can certainly be fatal. One of the biggest problems in discussing asthma, and this is particularly true when discussing asthma in the context of diving, is that the spectrum of severity is extraordinarily wide. Problems with Asthma in Diving There are 3 main concerns about asthma and diving: First, asthma may make divers more likely to suffer a dive-related illness. We are all taught that the most important rule in diving is to breathe normally and to never hold your breath. If a diver ascends while holding his breath, the expanding air can damage delicate lung tissue, and air may be introduced directly into the blood, travel to the brain and cause an arterial gas embolism (AGE). There is concern that an asthmatic may suffer narrowing or blocking of small airways during a dive, and that expansion of any trapped air during ascent may lead to the same problem. There is also concern that use of reliever medication, such as Ventolin, prior to diving may cause the lungs to be less efficient at filtering out the venous nitrogen bubbles we all have after dives. These bubbles may then circulate through the lungs and reach arteries where they might, in theory, be more likely to contribute to the development of decompression illness. Second, it is recognised that an asthma attack in the water may severely compromise the diver's safety by incapacitating him and causing an inability to function effectively. Indeed, it is hard to argue that difficulty breathing would not be a decided disadvantage if you were caught in a current that was sweeping you away from your boat. Third, it is a plausible concern that diving itself could precipitate asthma. Asthma can be precipitated by the exercise associated with diving, or by the irritant effect of breathing a cold, dry gas. It is also recognised that regulators frequently leak a little salt water, and that some of this may be nebulised into a mist during breathing. This mist can irritate the airways and precipitate narrowing in vulnerable individuals. The problem with all these very plausible concerns is that we have no idea how truly significant they are as there has been very little historic research. There is some data from retrospective surveys and these reveal many asthmatics (including active asthmatics) do dive, and that while their relative risk in diving may be more, their absolute risk remains reasonably low. e.g. 1 survey indicated that asthmatic is twice as likely to suffer an AGE as a non-asthmatic. Sound bad? Maybe. But if the risk of AGE for a non-asthmatic is 1 in every 50,000 dives, then the risk for an asthmatic is 1 in 25,000; a clear illustration of the fact that not very much multiplied by 2 is still not very much. Assessing Suitability of Asthmatics for Diving In this day and age where people do not want to take responsibility for their own actions, the most prudent thing for a dive physician to do when an asthmatic walks into his surgery is to say "Bog off, you're unfit". This happens frequently, and who can blame the doctors? However, while it might be defensive medicine, it is not necessarily good medicine. Indeed, such subjective pronouncements often motivate the candidate to go to another doctor and lie about having asthma. There is now an alternative informed consent basis of assessment. Fundamentally, this means clearly and comprehensively explaining the risks of diving to the candidate, and letting him make an informed choice about whether to proceed. However, there are some important provisos. In the context of asthma, most dive physicians would agree that the more active the asthma, the greater the risk in diving. Those candidates who suffer serious attacks, wheeze relatively often or who use reliever medications regularly, cannot be considered for diving, even on an informed consent basis, because rightly or wrongly, the risks are perceived to be too high. On the other hand, previous asthmatics and milder cases may be subject to little extra risk, and it is reasonable to let them, as intelligent adults, make up their own minds on the matter. Every day of our lives we make decisions that inherently involve weighing risk against benefit. We choose to get on planes, we choose to play rugby, we choose to ride bicycles on busy roads, all because we decide the benefit outweighs the risk. There is no reason diving should be any different in this regard, although dive candidates are much less well-informed about its inherent risks than they are about these other intuitively obvious risk situations. It is the dive physician's role in this setting to sufficiently educate candidates so they can make an informed choice. A sensible approach to the asthmatic dive candidate is to first take a detailed history of his problem. The obvious active asthmatics are told they cannot dive, and the reasons are clearly explained. Asthmatics who have not experienced symptoms of asthma or have not used medication for years are usually able to dive without any special investigations. The most problematic are mild asthmatics i.e. those candidates who wheeze once or twice a year when they have colds; or who wheeze a little in the spring when certain pollens are around, etc. With these candidates, a long discussion about the potential risks in diving implied by their asthmatic history, is usually followed with tests to check that neither exercise nor the breathing of nebulised salt water (at the same concentration as sea water) provoke airway narrowing. If these tests are negative and patients exhibit a clear understanding of the issues and wish to proceed, then we should be happy for them to dive. Unfortunately, to conduct and document this process properly is a time consuming and expensive exercise, but at least it's better than being told to "clear off" without so much as an explanation.
<urn:uuid:ef3dd282-015e-4972-af29-5459615f7e92>
CC-MAIN-2015-18
http://www.dive-the-world.com/newsletter-200404-asthma-diving.php
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430448956264.24/warc/CC-MAIN-20150501025556-00068-ip-10-235-10-82.ec2.internal.warc.gz
en
0.963117
1,483
2.90625
3
Home / Health Insurance / Articles / Dealing with Piles: Best diet and home remedies Team AckoFeb 21, 2023 Piles is a condition in which the blood vessels around the anus are swollen and fall out, especially while passing stools. Medically, this condition is termed “haemorrhoids”. Piles are a very common concern and about half of the population suffers from Piles at some point by the age of 50. In general, if you experience pain while passing stools, itching or mucus discharge from the anus, bright-red blood when you pass stools or feel like you never really evacuate your bowels completely, it may be a good idea to visit your doctor to check for Piles. A very important part of the treatment of Piles is avoiding factors that can aggravate them. There are also several conditions in which Piles can occur more commonly. These include the following. Lifting heavy objects Constipation or excessive straining while passing motions Prolonged periods of sitting or standing Chronic cough or wheezing Repeated episodes of vomiting The most preferable method of management of Piles in the early stages is diet modification with lifestyle changes. Having a diet low in fibre is linked with constipation. Chronic constipation increases the incidence of Piles. Hence, patients are advised to consume foods rich in fibre along with adequate water. If the constipation is persistent, syrups or powders are given to assist with the passing of stools. In severe cases, surgery is needed to remove the haemorrhoids. Patients with severe Piles can lose a lot of blood if not treated appropriately. As food is such an important part of the management of Piles, it is important to know which food items to eat and which to avoid. Luckily, the regular Indian diet is rich in food items that are high in fibre. However, of late, with the increase in consumption of processed and packaged foods, most people do not meet their daily fibre requirement. Here are some food items to include in your diet if you are suffering from Piles. Eating fruits such as bananas, apples, pears, etc., is extremely beneficial for Piles. They help in multiple ways. Firstly, their high fibre content helps soften stools, so it is easier to pass them. Just make sure to wash them well before eating. Secondly, fruits such as berries and plums are rich in flavonoids. Flavonoids are an established part of the treatment protocol for Piles. They can help strengthen veins and reduce the chances of symptoms such as bleeding. Fresh juicy fruits also have a high water content. Adequate fluid intake is a vital part of the diet recommended for Piles. You may have noticed that you often feel heavy and constipated after eating a lot of bread, biscuits, cake, etc. These foods are all made of maida which is a refined form of wheat flour. Simple switches in your diet can have a big effect. If you’re used to having toast with chai, try having oatmeal instead. You can also switch to whole wheat flour while baking at home. In India, we also have a wide variety of millets and other grains that you can use. When people think about vegetables, they often picture raw salads or steamed tasteless food. That is not true. Fresh vegetables add a crunchy texture on the side and give a good variation in the flavour profile of your meals. Another common mistake is to add all kinds of salad dressings to make them more palatable. Store-bought salad dressings often have mayonnaise, sugar, etc., that actually end up making them unhealthy. Yes, you heard that right. Adding a bowl of dahi to your meals or drinking buttermilk can be beneficial in relieving symptoms of Piles. Curd is a probiotic that boosts digestive capacity by increasing the healthy bacteria in the intestines. Better digestion is linked with comfortable bowel movements and subsequently lesser pain and discomfort when you are in the bathroom. Grabbing a handful of walnuts and almonds can be beneficial in more ways than one. Most people know that dry fruits are a great source of healthy fats and vitamins. However, they also have the additional advantage of being rich in fibre. You can roast nuts and add them as a topping on your morning bowl of oatmeal or in smoothies or salads for added crunch. Beans are one of the most underrated sources of fibre available. Adding chickpeas and kidney beans to your diet can improve digestion and help you reach your daily requirement of fibre. Knowing what not to eat is just as important as knowing what to eat. As a guideline, try to avoid all foods that make you feel heavy or bloated. These are foods that your body is not able to digest well. The food items to avoid if you have haemorrhoids are mentioned below. White bread and products with refined flour Frozen foods or packaged foods that are heavily processed Alcohol and aerated beverages While modifying your diet is a very important part of Piles treatment, here are some other things that can help as well. If you’re suffering from Piles or chronic constipation, these home remedies can be beneficial. A warm Sitz bath is one of the most effective ways to reduce the pain and swelling of Piles. You can use a regular plastic tub and fill it with warm water and sit in it for 15 minutes 2 to 3 times a day. Adding Epsom salt has also been recommended. We are all familiar with the soothing effects that aloe vera has on the skin. Applying it to the affected area can also relieve inflammation because of Piles. However, pure aloe vera should always be tested by applying it on normal skin first to make sure you are not allergic to it. Both of these have been promoted as a good way to lubricate the digestive tract and ensure better gut health. Having one or two teaspoons of coconut oil or ghee in the morning is recommended. If you are unable to do that you can also apply the oil externally or add it to food while cooking. Not drinking enough water is one of the most important causes of Piles. Ensure that you consume enough water on a regular basis. In case of severe inflammation and enlarged Piles, applying an ice pack is helpful. However, ice should not be applied directly. It can be wrapped in a cloth or commercially available reusable ice packs can be used. Yes, if not treated appropriately, Piles can result in severe bleeding, causing anaemia. With the right combination of medical guidance and self-care such as eating the right diet for Piles, you can be relieved of the symptoms. Yes, applying an ice pack can be useful if you have Piles. Disclaimer: The content on this page is generic and shared only for informational and explanatory purposes. Please consult a doctor before making any health-related decisions. A Comprehensive Guide to Monsoon Car Care: The Dos and Don'ts Team Acko Jun 2, 2023 Uncovering the Connection: A Look at the Relationship Between Digestive and Mental Well-Being Team Acko Jun 1, 2023 The Benefits of Probiotic Supplements for Nourishing Digestive Health Team Acko Jun 1, 2023 Maximizing Your Digestive Health Through Nutritious Eating Habits and Supplementation Team Acko Jun 1, 2023 Want to post any comments? Affordable Health Insurance for You & Your Family starting @ ₹20/day* ✅ 100% Room Rent Covered* ✅ Zero deductions at claims ✅ 7100+ Cashless Hospitals
<urn:uuid:6d842935-e731-402e-bfd6-c1b61fa00e86>
CC-MAIN-2023-23
https://www.acko.com/health-insurance/piles-haemorrhoids/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00681.warc.gz
en
0.946977
1,624
2.796875
3
Titular Bishop of Anémour and first Vicar Apostolic of Athabasca-Mackenzie , Canada ; b. 17 March, 1823, at Gigondas, France ; d. at St. Boniface, Manitoba, 26 September, 1890. After admission to the juniorate of the Oblates of Mary Immaculate, and while still in minor orders, he was sent to the missions of Northern America, and ordained priest, 8 May, 1847, at St. Boniface, Manitoba. Then he replaced Father (afterwards Bishop ) Laflèche at Ile-à-la-Crosse, and in 1849 he proceeded further North, establishing the mission of Lake Athabasca, which he inaugurated 8 September, 1851. The following year, he visited Great Slave Lake, where no missions had ever been, and ministered to the Indians of Peace River (1858-59). On the 13th of May, 1862, he was made titulary of the newly created Vicariate Apostolic of Athabasca-Mackenzie ; but such was his isolation from the civilized world, that he did not know of it before July of the following year. Mgr. Guilbert, of Tours, consecrated him Bishop of Anemour, 30 Nov., 1864, a title he bore for twenty-five years, during which he evidenced considerable administrative abilities, founding missionary posts as far as the Frozen Ocean, on the one side, and the Peace and Liard Rivers, on the other. In 1835 he repaired to France, for the General Chapter of his Congregation. In 1889 he was one of the Fathers of the Provincial Council of St. Boniface, at the termination of which his growing infirmities prevented him from returning to his distant missions in the North. The Catholic Encyclopedia is the most comprehensive resource on Catholic teaching, history, and information ever gathered in all of human history. This easy-to-search online version was originally printed between 1907 and 1912 in fifteen hard copy volumes. Designed to present its readers with the full body of Catholic teaching, the Encyclopedia contains not only precise statements of what the Church has defined, but also an impartial record of different views of acknowledged authority on all disputed questions, national, political or factional. In the determination of the truth the most recent and acknowledged scientific methods are employed, and the results of the latest research in theology, philosophy, history, apologetics, archaeology, and other sciences are given careful consideration. No one who is interested in human history, past and present, can ignore the Catholic Church, either as an institution which has been the central figure in the civilized world for nearly two thousand years, decisively affecting its destinies, religious, literary, scientific, social and political, or as an existing power whose influence and activity extend to every part of the globe. In the past century the Church has grown both extensively and intensively among English-speaking peoples. Their living interests demand that they should have the means of informing themselves about this vast institution, which, whether they are Catholics or not, affects their fortunes and their destiny. Copyright © Catholic Encyclopedia. Robert Appleton Company New York, NY. Volume 1: 1907; Volume 2: 1907; Volume 3: 1908; Volume 4: 1908; Volume 5: 1909; Volume 6: 1909; Volume 7: 1910; Volume 8: 1910; Volume 9: 1910; Volume 10: 1911; Volume 11: - 1911; Volume 12: - 1911; Volume 13: - 1912; Volume 14: 1912; Volume 15: 1912 Catholic Online Catholic Encyclopedia Digital version Compiled and Copyright © Catholic Online
<urn:uuid:e09bc6bc-7a9e-4797-adad-f76b50cb264b>
CC-MAIN-2015-40
http://www.catholic.org/encyclopedia/view.php?id=4571
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737911339.44/warc/CC-MAIN-20151001221831-00002-ip-10-137-6-227.ec2.internal.warc.gz
en
0.952832
755
2.5625
3
Deering, New Hampshire |Deering, New Hampshire| Deering Community Church (built 1829) c.1903 Location in Hillsborough County, New Hampshire |• Board of Selectmen||Aaron Gill, Chair |• Total||31.4 sq mi (81.4 km2)| |• Land||30.8 sq mi (79.8 km2)| |• Water||0.7 sq mi (1.7 km2) 2.04%| |Elevation||1,083 ft (330 m)| |• Density||62/sq mi (24.0/km2)| |Time zone||Eastern (UTC-5)| |• Summer (DST)||Eastern (UTC-4)| |GNIS feature ID||0873577| First settled about 1765, the town was incorporated on January 17, 1774 by John Wentworth, governor of the province of New Hampshire. He named it Deering after the maiden name of his wife, Frances Deering Wentworth, just as two years earlier he bestowed Francestown with her first name. Deering had 928 residents when the first census was taken in 1790. By 1859, the population was 890. Its hills and valleys were well suited for agriculture. Industries included two sawmills, one gristmill, and one clothing factory. Deering is in northwestern Hillsborough County, bordered by Hillsborough and Henniker to the north, Weare to the east, Francestown to the south, Bennington to the southwest, and Antrim to the west. According to the United States Census Bureau, the town has a total area of 31.4 square miles (81.4 km2), of which 30.8 square miles (79.8 km2) is land and 0.66 square miles (1.7 km2) is water, comprising 2.04% of the town. The highest point in Deering is Clark Summit, at 1,570 feet (480 m) above sea level. Deering lies fully within the Merrimack River watershed. The eastern two-thirds of the town are drained by tributaries of the Piscataquog River, which flows east to join the Merrimack in Manchester, while the western third of the town drains to the Contoocook River, which forms the western boundary of the town and flows north to the Merrimack in Penacook. The town is crossed by State Route 149, connecting Hillsborough to the north with Weare to the east. As of the census of 2010, there were 1,912 people, 740 households, and 534 families residing in the town. The population density was 62.1 people per square mile (24.0/km²). There were 932 housing units at an average density of 30.3 per square mile (11.7/km²). The racial makeup of the town was 97.0% White, 0.3% African American, 0.2% Native American or Alaska Native, 0.1% some other race, and 1.5% from two or more races. Hispanic or Latino of any race were 1.3% of the population. There were 740 households, out of which 28.4% had children under the age of 18 living with them, 58.9% were headed by married couples living together, 7.3% had a female householder with no husband present, and 27.8% were non-families. 20.1% of all households were made up of individuals, and 6.2% were someone living alone who was 65 years of age or older. The average household size was 2.49, and the average family size was 2.85. In the town the population was spread out with 19.4% under the age of 18, 7.2% from 18 to 24, 26.7% from 25 to 44, 33.2% from 45 to 64, and 13.5% who were 65 years of age or older. The median age was 42.9 years. For every 100 females there were 107.4 males. For every 100 females age 18 and over, there were 105.1 males. For the period 2009-13, the estimated median annual income for a household in the town was $68,281, and the median income for a family was $76,389. Male full-time workers had a median income of $60,114 versus $40,272 for females. The per capita income for the town was $33,042. About 5.4% of families and 9.6% of the population were below the poverty line. - James W. Grimes, US senator and third Governor of Iowa - Lotte Jacobi, photographer; lived in Deering from 1955 until her death in 1990 - Jon Rheault (1986– ), forward with Adler Mannheim - Tom Rush, folk singer; lived in Deering (1971–1990) - "Geographic Identifiers: 2010 Census Summary File 1 (G001): Deering town, Hillsborough County, New Hampshire". U.S. Census Bureau, American Factfinder. Retrieved April 16, 2015. - Gannett, Henry (1905). The Origin of Certain Place Names in the United States. Govt. Print. Off. p. 102. - Austin J. Coolidge & John B. Mansfield, A History and Description of New England, Boston, Massachusetts 1859 - Foster, Debra H.; Batorfalvy, Tatianna N.; Medalie, Laura (1995). Water Use in New Hampshire: An Activities Guide for Teachers. U.S. Department of the Interior and U.S. Geological Survey. - "Profile of General Population and Housing Characteristics: 2010 Census Summary File 1 (DP-1): Deering town, Hillsborough County, New Hampshire". U.S. Census Bureau, American Factfinder. Retrieved April 16, 2015. - "Selected Economic Characteristics: 2009-2013 American Community Survey 5-Year Estimates (DP03): Deering town, Hillsborough County, New Hampshire". U.S. Census Bureau, American Factfinder. Retrieved April 16, 2015. - Town of Deering official website - Don and Jean Johnson, "Brief History of Deering", at Town of Deering website - New Hampshire Economic and Labor Market Information Bureau Profile
<urn:uuid:37464376-364a-4e45-afaf-e2fe8de68338>
CC-MAIN-2015-35
https://en.wikipedia.org/wiki/Deering,_New_Hampshire
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645330816.69/warc/CC-MAIN-20150827031530-00068-ip-10-171-96-226.ec2.internal.warc.gz
en
0.942876
1,345
2.53125
3
When it comes to buying a home or a building, it can be rather stressful. There are many areas to be concerned about with regard to the structure and makeup of the home or building. In many cases, getting a clear understanding of the electrical system is key. If you have multiple GFCI outlets on your circuit set up you will need to know a few things. Have you ever wondered how to test a GFCI outlet? Push the reset button on the GFCI to reset the breaker. Also, pushing the test button will verify if it is working. Let’s take a look below at some more details regarding a GFCI outlet. What Is A GFCI Outlet? Understanding what a GFCI outlet is will help you in determining the best way to test one. GFCI stands for ground-fault circuit interrupter. The purpose of a GFCI is to eliminate power to the circuit when something isn’t working properly. A GFCI is a safety device built into the electrical outlet to protect you from shock or electrocution. Additionally, they will protect your appliances that are plugged into them from getting a circuit overload that can damage their working parts. A ground fault occurs when the following things happen: - Equipment is used in an area where there is water. - You have damaged wiring or electrical cords. For example, frayed wires. - Using tools or appliances that have faulty wiring. How Can I Test One? Believe it or not, it is fairly simple to test your GFCI outlet. Let’s take a look below at what the best way to do this is. - Locate the test button that is located on the face of the outlet. You will notice the word “Test” on the button itself. The test button and reset button are nestled between any electrical cords that you have plugged in. Once you push the test button you will hear a snapping sound and notice the breaker has tripped. This means that the power to that outlet is no longer occurring and the GFCI outlet is working. - Check that the outlet has stopped working by plugging in a lamp or some device that utilizes power. If the device does not function then you know the power is off. You can also check the circuit breaker in the garage to see if it tripped. - To turn the power back on to the GFCI outlet, push the reset button and power should be restored to the outlet. Plug your device back in and verify that you have power. Another way to test your GFCI is by using a handheld GFCI tester. The GFCI tester is great at identifying any problems with your electrical wiring. Not only do they identify open ground, open hot or neutral, and reversed hot and ground, but they can also determine if you have reversed polarity. Additionally, the GFCI tester has a test button that can safely trip your GFCI outlet to determine its safety functionality. Other Recommended Maintenance Now that you understand how to test a GFCI outlet, this would be a good time to consider installing more tamper-resistant outlets. Since not all of your outlets can be GFCI outlets, it is a great idea to install tamper-resistant outlets for your remaining outlets. Next, have your local licensed electrician or home inspection team check the wiring in your home. It is important that your electrical wires are copper and not aluminum. In some cases, aluminum wiring was used for electrical wiring. Getting this changed is important for keeping your home safe. Lastly, if you happen to have a circuit breaker box that is labeled as a challenger GFCI circuit breaker box, there was a recall of this type of breaker box. As a homeowner, you should always know your systems and what has been installed. This way you can troubleshoot any issues down the road. When Do I Call A Professional? Worrying about your electrical system can keep you up at night. It is a great idea to call on your local licensed electrician. They can look at your GFCI outlets and ensure that they are working properly to trip your circuit breaker when an emergency arises. Additionally, call on your local home inspection team. They can conduct a full electrical system inspection during your full home inspection. Also, they can refer you to a reputable licensed electrician. GFCIs are an important part of keeping you and your family safe from accidental electrocution. Having GFCI outlets in the right places in your home is key. Make sure that you test your GFCI outlets about once a month to ensure that they are still working properly. Reach out to Atkinson Inspection Services can inspect your electrical system when performing a home inspection in Orlando, Clermont, and the Villages.
<urn:uuid:5599680d-d19e-4133-a63b-46ab9e8a7bd1>
CC-MAIN-2023-40
https://atkinsoninspection.com/how-to-test-a-gfci-outlet/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510529.8/warc/CC-MAIN-20230929222230-20230930012230-00131.warc.gz
en
0.935608
1,000
2.953125
3
The Voting Rights Act of 1965 is a landmark piece of national legislation in the United States that outlawed discriminatory voting practices that had been responsible for the widespread disenfranchisement of African Americans in the U.S. Echoing the language of the 15th Amendment, the Act prohibits states from imposing any "voting qualification or prerequisite to voting, or standard, practice, or procedure … to deny or abridge the right of any citizen of the United States to vote on account of race or color." Specifically, Congress intended the Act to outlaw the practice of requiring otherwise qualified voters to pass literacy tests in order to register to vote, a principal means by which Southern states had prevented African-Americans from exercising the franchise. President Lyndon B. Johnson, a Democrat, who had earlier signed the landmark Civil Rights Act of 1964 into law, signed the Act into law. The Voting Rights Act established extensive federal oversight of elections administration, providing that states with a history of discriminatory voting practices could not implement any change affecting voting without first obtaining the approval of the Department of Justice, a process known as preclearance. These enforcement provisions applied to states and political subdivisions, mostly in the South that had used a "device" to limit voting and in which less than 50 percent of the population was registered to vote in 1964. The Act has been renewed and amended by Congress four times; in 2006, President George W. Bush signed a 25-year extension into law. The Act is widely considered a landmark in civil-rights legislation, though some of its provisions have sparked political controversy. During the debate over the 2006 extension, some Republican members of Congress objected to renewing the preclearance requirement (the Act's primary enforcement provision), arguing that it represents an overreach of federal power and places unwarranted bureaucratic demands on Southern states that have long since abandoned the discriminatory practices the Act was meant to eradicate. Conservative legislators also opposed requiring states with large Spanish-speaking populations to provide bilingual ballots Congress nonetheless voted to extend the Act for twenty-five years with its original enforcement provisions left intact.
<urn:uuid:8da3dafa-f288-4d0e-88f9-98e76a8e1490>
CC-MAIN-2015-40
http://nvrmi.com/?page_id=41
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737994631.83/warc/CC-MAIN-20151001221954-00033-ip-10-137-6-227.ec2.internal.warc.gz
en
0.960074
416
4.15625
4
to the Sun (NASA- "Why We Explore")- December 2, 2005 Humanity's epic voyages to the Moon are well known, the stuff of history. But what about voyages to the Sun? Though they do not involve human spacecraft, those voyages are no less epic. And on the occasion of the tenth anniversary of the launch of one of the most successful voyages is the Solar and Heliospheric Observatory, fondly known as SOHO it is fitting that we recall those voyages to our life-giving star. Solar Spacecraft Celebrates 10th Anniversary (NASA Feature)- November 29, 2005 The Solar and Heliospheric Observatory (SOHO) spacecraft celebrates its 10th anniversary December 2. The SOHO mission, a collaboration between NASA and the European Space Agency (ESA), has allowed scientists to make significant advances in understanding the closest star, Solar Flares (NASA press release)- November 8, 2005 When the biggest solar proton storm in 15 years erupted in January, many were left wondering: what would have happened if astronauts were on the moon? Odd List of Body Parts (NASA press release)- October 26, 2005 Researchers are making a list: Which parts of an astronaut are most sensitive to solar flares? Telescope for Students Reveals Record Solar Explosion Even More Powerful (NASA press release)- October 14, 2005 Astronomers using an inexpensive NASA radio telescope kit for students discovered that the record solar flare on November 4, 2003 was even more powerful than originally estimated. Afraid of a Solar Flare? (NASA press release)- October 7, 2005 Solar activity can be surprisingly good for astronauts. Pick up Earthly Aurora (NASA press release)- September 9, 2005 A coronal mass ejection (CME) hit Earth's magnetic field on Sept. 15, but it did not spark the strong display of auroras many people were hoping to see. In the CME's wake, however, a fast solar wind stream is blowing past Earth and buffeting our planet's magnetic field. This could cause mild geomagnetic storms. Solar Flares Continue (NASA press release)- September 7, 2005 Scientists are currently tracking a large sunspot that has so far unleashed seven major solar flares including an X-17-category blast on Sept. 7, an X-5 on Sept. 8, and an X-1 on Sept. 9. To say this is powerful is an understatement; Wednesday's X-17 flare was the fifth largest ever observed. (NASA feature)- August 22, 2005 Yesterday, Aug. 22, a pair of coronal mass ejections (CMEs) blasted off the Sun and headed toward Earth. Geomagnetic storms and auroras are possible today, Aug. 23 and tomorrow, Aug. 24 in Alaska and Canada and possibly beyond. bathed in pretty pink Aurora (The Register Article)- August 22, 2005 Stargazers in Utah, Colorado, New York and other US states were treated to a rare display in the early hours of this morning, when the first of two large coronal mass ejections from the Sun collided with the Earth's atmosphere, creating stunning Auroras. One Step Closer to Forecasting 'Clear Skies' for Astronauts (NASA feature)- August Scientists funded by NASA's Living With a Star program have made a big stride forward in learning how to forecast "all clear" periods where severe space weather is unlikely. Temper Blamed for Arctic Ozone Loss (Live Science Article)- March 1, 2005 A dramatic thinning of Earth's protective ozone layer above the Arctic last year was the result of intense upper-level winds and an extra dose of space weather, scientists said Tuesday. Solar Flares - January 27, 2005 The biggest solar proton storm in 15 years erupted last week. NASA researchers discuss what it might have done to someone on the
<urn:uuid:732a1099-c755-4d90-bada-f527aee6b962>
CC-MAIN-2014-35
http://solar-center.stanford.edu/news/news_2005.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919886.18/warc/CC-MAIN-20140909043549-00084-ip-10-180-136-8.ec2.internal.warc.gz
en
0.872675
846
3.140625
3
ARB Research Seminar This page updated June 19, 2013 Air Pollution Emission Controls In Europe Axel Friedrich, Ph.D., Environment and Transport Division, Umweltbundesamt - German EPA September 20, 2002 Cal EPA Headquarters, 1001 "I" Street, Sacramento, CA A reduction in regional air pollution in Europe has been achieved during the past decade and it is anticipated that further reductions will be obtained during the next one to two decades. The target for reductions of ozone precursors for the 15 European Union (EU) member states for 2010 relative to 1990 is about 50 percent. As of 1998 an overall reduction of about 20 percent had been achieved, with results for individual countries ranging from increased precursor emissions in Portugal and Greece to reductions of about 40 percent in Luxembourg and Germany. In Germany, the length of time that ozone limits were exceeded decreased substantially over the past decade. The annual-mean ozone amount did not decrease, although the growth rate did slow to almost zero. Some of the factors that prevented the annual mean ozone from decreasing probably include continued increases in atmospheric methane and ozone precursor emissions in other parts of the Northern Hemisphere. The concentration of black soot in street canyons decreased by 25-50 percent in German cities during the past decade. Improved emission controls on road traffic and decreased use of coal are likely contributors to the declining levels of black soot. The gross domestic product of the EU increased about 20 percent between 1990 and 1999. Energy use increased about ten percent in that period, so energy intensity declined about ten percent, reflecting an increase in energy efficiency of about one percent per year. Despite the absolute growth of energy use, a decrease of annual carbon dioxide emissions of about five percent was achieved, mainly as a result of fuel switching, especially reduced coal use, with a smaller contribution from increased use of renewable energies. The European Car Manufacturer's Association (ECMA) proposed, and the EU accepted, an agreement to reduce per-vehicle greenhouse gas emissions for new cars by 25 percent between 1995 and 2008. A variety of technologies are being implemented to meet these goals. For example, low rolling resistance tires reduce fuel consumption and carbon dioxide emissions by five percent, at very low cost and without compromising safety or increasing noise. For cars sold within the EU between 1995 to 2001, the ECMA has cut its average new car carbon dioxide emissions by 11.4 percent. During this same period the average mass, power, and engine capacity of new cars has increased 8.8 percent, 19.0 percent, and 4.9 percent, respectively. Dr. Axel Freidrich is the Head of the Environment and Transport Division at the Umweltbundesamt (German EPA) and is the single person most responsible for progress in the European Union on motor vehicle and other controls.
<urn:uuid:d83516b2-295b-4c8f-b5c7-cfd93e9f05db>
CC-MAIN-2015-32
http://www.arb.ca.gov/research/seminars/friedrich/friedrich.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990112.92/warc/CC-MAIN-20150728002310-00054-ip-10-236-191-2.ec2.internal.warc.gz
en
0.948257
576
2.703125
3
Science marches forward but not always in the direction we want it to go. Sometimes things get invented that, really, I wish were not. Choosing the “worst invention of the century” is a pretty subjective exercise no matter how you go about it. Still, some ideas are just terrible no matter how you look at them. First, take the 20th century’s worst idea: the baby nuke. During the dark days of the Cold War, nuclear war meant one thing — mass devastation on a scale so horrific that the mere thought of it normally stops the conversation right there. But in the middle of the 20th century, U.S. Army war planners hit on the idea of waging small-scale, limited nuclear war. Thus was born the idea for something called “tactical” nuclear weapons. The first artillery-based nuclear weapon was the M65 cannon. Nicknamed Atomic Annie, this weapons system fired a 15-kiloton shell about 7 miles. Soon after Annie’s inception, an even smaller nuclear cannon was developed. Code-named Davy Crockett, the small weapons system consisted of a recoilless rifle and small, portable nuclear shell (Figure A). In my opinion, Davy was a terrible rendition of a terrible idea on many levels. The nuclear payload would destroy most everything within a half mile of where it landed and release a cloud of deadly radioactivity in the process. Since the rifle had a maximum range of only about 3 miles, the gunners were bound to get a good dose of radiation themselves, especially if the wind was blowing their way. Worse, it’s not hard to imagine that if one side used a small nuke, then the other side would respond in similar fashion. After a few rounds of retaliation and counterretaliation, the big ICBMs would likely start flying, after which cockroaches and tardigrades would emerge as the dominant species on the planet. So that’s why I think tactical nukes are the worst idea ever. OK, enough with the serious stuff. The second worst invention of the 20th century is the leaf blower (Figure B). Your local home center has lots of gas- and electric-powered outdoor machines that really can make your life better. While I can’t say I love my lawnmower or snow blower, they do serve important purposes. But the leaf blower? Like the Davy Crockett, it’s something that should have never been invented. To subjectively paraphrase Shakespeare, a noisy, consumer-grade leaf blower is a device used “by an idiot, full of sound and fury, and that does almost nothing.” My former neighbor Big Pete loved his leaf blower. For him, any time was leaf blower time. Instead of using a rake or broom to clean up his yard, he’d joyfully shoulder up his leaf blower and spend a merry hour or two shattering the neighborhood peace with a 100-decibel roar, doing a job that could have likely been done in half the time with a manual tool. Not only that, these breathtakingly irrational wasters of energy are highly polluting. The typical leaf blower’s tiny and primitive two-stroke gas engine (in which oil is dumped directly into the fuel tank and from there, spewed into the atmosphere) puts out more pollutants per minute than a 3-ton Ford pickup truck, and has a carbon footprint 30 times greater. It’s true that electric leaf blowers are less polluting than gas-powered ones, but they’re still noisy and, in my opinion, they work poorly when compared to a regular garden rake. So is there any reason on Earth for a leaf blower to exist? Surprisingly, yes. It makes a terrific Wiffle Ball Launcher. The Wiffle Ball Launcher will accurately (by Wiffle ball standards) pitch ball after ball for games or practice. Made from $25 of plumbing supplies, some scrap wood, and your leaf blower, this project shows off your DIY chops to their best advantage. A key component is an easy-to-find PVC plastic fitting called a “low heel inlet elbow.” By a miraculous quirk of fate, the 3″×3″×2″ low heel inlet elbow couldn’t be better for turning your leaf blower into a Wiffle ball pitching machine. First, it accepts a 3″ diameter PVC pipe, which is the optimum-diameter barrel for a regulation Wiffle ball. Second, the 2″ inlet matches up exactly with most round leaf blower nozzles. But here’s the magical part: because of the fitting’s geometry and a fluid mechanics principle called Bernoulli’s Law (see my Remaking History column “Giovanni Venturi and the Venturi Effect”), an object like a Wiffle ball inserted in the top of the fitting will be sucked in and shot out the barrel. BUILD YOUR WIFFLE BALL LAUNCHER 1. Drill two ⅛”-diameter holes and insert the small screw eyes into the thick part of the low heel inlet, as shown in Figure C. 2. Refer to the Wiffle Ball Launcher Assembly diagram below during the remaining steps. Attach the 10-foot-long, 3″-diameter PVC pipe to the 3″ horizontal opening on the low heel inlet. Don’t reduce the length of the barrel because a short barrel won’t provide as much range or velocity. 3. Attach the 18″-long, 3″-diameter loading tube to the 3″ vertical opening on the low heel inlet. 4. Place the barrel, loading tube, and low heel inlet assembly on the sawhorses. Center the assembly and rotate it so the loading tube is vertical. Attach bungee cords from the sawhorses to the screw eyes to hold the loading tube vertical. 5. Some leaf blower nozzles fit well into the 2″ opening on the low-heel inlet. If yours fits, skip ahead to Step 6. If not, insert the 4″-long, 2″-diameter pipe into the 2″ hole on the low heel inlet and use reducing fittings as necessary to make it fit. 6. Align the nozzle of your leaf blower with the 2″-diameter pipe on the low heel inlet. Use duct tape to securely seal the connection (Figure D). You’re ready to go. Turn on the leaf blower, insert the Wiffle balls in the loading tube, and watch them shoot out. My shooting chronograph shows a muzzle velocity of about 50mph using my moderately powerful leaf blower. You can elevate the barrel with wood blocks to adjust the trajectory of the ball into the strike zone. Because of the Wiffle ball’s holes, each pitch will flutter and curve, making the batting challenge extra fun. Most leaf blowers don’t produce enough power to propel a Wiffle ball with a high enough velocity to be really dangerous. Still, Wiffle ball trajectories are erratic by design, so be aware you’ll frequently get hit by a pitch. Wear a batter’s helmet and eye protection. Victory Through Air Power Air guns, in one form or another, have been around for thousands of years — much longer than gunpowder weapons. If you think about it, blowguns are a type of air gun that has been used for hunting since prehistoric times. The use of mechanically powered air guns goes a long way back as well. The first were simply blowguns powered by a bellows attached to the breech. Instead of huffing into the pipe, some clever large-game hunter came up with the notion of putting a squeezable bag on the end. When the bag was squeezed, the compressed air shot a dart or pellet out of the gun. And if the bag was squeezed using the mechanical advantage derived from a system of levers (imagine a fireplace bellows), then the gun could be made to shoot much more powerfully than could be accomplished through lung power alone. The oldest existing mechanical air gun is thought to be a specimen in the collection of the Livrustkammaren museum in Stockholm, Sweden. Inside this old gun, which the museum dates to about 1580, a spring mechanism operated an air bellows located in the stock of the gun. When the shooter pulled the trigger, the spring caused the bellows to force a powerful air gush that shot a specially shaped bolt, or dart, toward the target. By roughly 1600, air-powered darts were being shot for sport across Europe, in a variety of ways. According to the people who study such arcana, spring-powered air guns activated by a moving piston (which was a big improvement upon the earlier bellows-reservoir technology) quickly appeared. An early, exceptionally detailed description of such an air gun is found in the Elemens d’Artillerie by David Rivaut, who was preceptor to Louis XIII of France. He ascribes the invention to a man identified only as “Marin, a burgher of Lisieux,” who presented the first air gun to England’s Henry IV. By the turn of the 19th century, air guns had developed to the point where they were likely more accurate and more powerful than black powder weapons of similar size. Circa 1800, air guns of any size and quality were frightfully expensive to make. It took months of time, arcane knowledge, and excellent tools to make a device of this type because the components — valves, locks, cylinders, and reservoirs — had to be very carefully machined. Consequently, an air gun cost far more than a simple black powder rifle and was beyond what most people of the time could spend on a sporting piece. But for those who could afford them, air guns offered a lot of advantages. By comparison with a smoothbore, muzzle-loading musket, air guns were a hunter’s dream. For one thing, they could be fired several times a minute, far more readily than the muskets of those days, which required a load-tamp-fire procedure. Second, they didn’t emit any smoke. This made it easier to aim the next shot if it was needed; line of vision wasn’t obscured by powder smoke. Third, a shooter didn’t need to be concerned about keeping his powder dry; it worked as well in damp weather as in dry. Probably the most famous air gun in American history was a rifle carried by Meriwether Lewis during the Lewis and Clark expedition of 1803–1806. The actual gun may reside (there is controversy surrounding its pedigree) in the Virginia Military Institute’s museum of historical weapons. The VMI museum claims that the .31″ caliber, flintlock-style pneumatic rifle in its collection is the one built by expert clockmaker Isaiah Lukens in Philadelphia and hauled to the Columbia River Valley and back by the Corps of Discovery. But recent scholarship suggests Lewis carried a Girandoni air rifle, an Austrian repeater that could empty its 20-ball magazine in 1 minute. In either case, Lewis’ air rifle demonstrations astonished the Native American tribes they met along their epic journey.
<urn:uuid:d492bccf-d225-4997-b241-e0349e86e2b5>
CC-MAIN-2019-22
https://makezine.com/projects/leaf-blower-wiffle-ball-launcher/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258147.95/warc/CC-MAIN-20190525164959-20190525190959-00439.warc.gz
en
0.943635
2,387
2.703125
3
Wireless communication is a technology used for transferring data between two or more points that are not connected by electrical or optical conductors. Most of the wireless technologies use radio waves as the medium instead of wires. The characteristics of a wireless electronic communication are mobility, reachability, simplicity, maintainability, and so on. The two major devices used in wireless communication are access point and wireless adapter. There are different technologies used in wireless communication, such as GPRS, WI-FI, Infrared and Bluetooth. These technologies can be used in different applications like home, military, industries and robotics. The following are a few of the wireless-based research projects that are most popular in a wide variety of applications. 1. Arduino Based Home Automation System Home automation is the residential extension of a building automation. This type of automation involves automation of a house work or any of the house-hold activities. House automation involves centralized controlling of lighting and HVAC (heating, ventilation and air conditioning) appliances. Home automation involves the use of a computer and information technology to control home appliances and home belongings such as windows and lighting system. The automation system can be controlled by a computer or micro controller based networks. The main objective of this project is to develop a home-automation system by an Arduino board with Bluetooth technology that can be remotely controlled by an Android OS smart phone. A Bluetooth module is interfaced to the Arduino board at the receiver end. At the transmitter end, a Graphical User Interface application within a cell phone sends on or off commands to the receiver where loads are connected. With this technology, by touching the specified location on the Graphical user interface, the loads can be turned on or off remotely. Arduino board operates loads through optic-isolators and TRAIC. 2. Raspberry pi based Solar Street Light The main aim of this project is to design a LED based street light with an auto-intensity control using the solar power from a photo voltaic cell interfaced to Raspberry pi board. This system consists of a solar street light comprising LEDs, a solar panel, a rechargeable battery, a charge controller and a Raspberry pi board. A charge control circuit is used to control the charging of the battery, and the photo voltaic panels that convert the sunlight into electrical energy are used for charging the batteries. During the peak hours, the intensity of the sunlight is very high, and then gradually diminishes as the dusk approaches, and eventually disappears with the onset of night and during late night hours. It means lights must remain on during the night time and get automatically switched off in the morning. This type of intensity control thus helps in saving energy during late nights wherein traffic density is low on streets. Therefore, to control the intensity of the light at different times during night, the traffic light control system is engaged with a programmable Raspberry Pi by using Pulse width modulation technique. 3. Zigbee Wireless Communication based Forest Fire Detection Powered by Solar Energy This project is implemented using Zigbee wireless technology to detect and control the forest fires. Solar energy system with maximum power point tacking attached to the embedded controller continuously monitors the temperature in the forest area. Remote operation is achieved by using Zigbee modem that if placed in the forest, sends the information signals to the central controlling area. If any fire mishap takes place in the control field, the sensors detects the temperature, and then the controller turns water pumping system on. This system uses a LabVIEW software to monitor all the field parameters that continuously interact with the Zigbee modem. 4. Vehicle’s Accident Prevention Using Eye Blink Sensor Nowadays different technologies are being introduced to reduce the accidents as they have become very frequent in our day-to-day life. The main objective of this project is to prevent an accident with an eye blink that stops a vehicle immediately when its driver sleeps. This project encompasses various components like a microcontroller, power supply, an eye blink sensor, an LCD display and an RF transmitter and receiver. The project comprises two sections namely a transmitter and a receiver section. The eye blink sensors can be mounted on the goggles to be worn while driving and the sensors are mounted in such a way that the transmitter and the receiver are aligned with the eye and are placed in front of the system. If eyes are open, then the IR will be reflected and received by the sensor, and if eyes are closed, then the IR sensor stops receiving the signal and the vehicle will be stopped automatically by displaying the information on the LCD. Similarly, if eyes open up again, the sensors receive the signal, and then the vehicle starts automatically displaying the message on the LCD. At the receiver side, the transmitted signal is received and the signal gets decoded, and then the information gets displayed on the LCD and simultaneously a buzzing sound alerts the receiver’s end. 5. Auto Metro Train to Shuttle between Stations This project is designed to demonstrate the technology of a metro train movement, which is very common in many of the developed countries. The above block diagram depicts a metro train designed by using robotics technology and programmed with a micro controller. This system consists of IR sensors that are placed on both the ends of a microcontroller and counters that are used for limiting the number of passengers with an automatic on and off system. This is a proposed system of automatic metro train that abandons the need of a driver. In this system, a microcontroller is used as a CPU. Whenever the train enters any station, it stops automatically as it is sensed by an IR sensor, and then the door opens automatically when any person enters or leaves the train. The system also counts the number of passengers. A seven segment display is used to display the number of passengers as well as other information required for the passengers including the station name. A Motor driver IC along with the set of motors help the robot to move in desired directions like forward, backward, left and right, respectively. A buzzer is placed in this system to alert the passengers while closing and opening the door. These are some of the research projects based on wireless communication system. You might have gained some valuable insights out of this article particularly from the projects related to communication system, after thoroughly reading them. Apart from this, for any assistance regarding projects including details, suggestions, and comments, you can comment in the comment section below.
<urn:uuid:aec64700-2876-45e7-8922-1069c4cb6f80>
CC-MAIN-2019-43
https://www.efxkits.us/project-kits-on-wireless-communication-for-electronics-professionals/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986672431.45/warc/CC-MAIN-20191016235542-20191017023042-00273.warc.gz
en
0.931431
1,304
3.328125
3
There are 24 named waterfalls in Ricketts Glen State Park in the U.S. state of Pennsylvania along Kitchen Creek as it flows in three steep, narrow valleys, or glens. They range in height from 9 feet (2.7 m) to the 94-foot (29 m) Ganoga Falls. Ricketts Glen State Park is named for R. Bruce Ricketts, a colonel in the American Civil War who owned over 80,000 acres (32,000 ha) in the area in the late 19th and early 20th centuries, but spared the old-growth forests in the glens from clearcutting. The park, which opened in 1944, is administered by the Bureau of State Parks of the Pennsylvania Department of Conservation and Natural Resources (DCNR). Nearly all of the waterfalls are visible from the Falls Trail, which Ricketts had built from 1889 to 1893 and which the state park rebuilt in the 1940s and late 1990s. The Falls Trail has been called "the most magnificent hike in the state" and one of "the top hikes in the East". The waterfalls are on the section of Kitchen Creek that flows down the Allegheny Front, a steep escarpment between the Allegheny Plateau to the north and the Ridge-and-Valley Appalachians to the south. The glens are made of sedimentary rocks from the Huntley Mountain and Catskill Formations that formed up to 370 million years ago in the Devonian and Carboniferous periods. The waterfalls are the result of increased flow in Kitchen Creek from glaciers enlarging its drainage basin during the last Ice Age. Ricketts named 21 of the waterfalls, mostly for Native American tribes and places, and his family and friends. There are ten named falls in Ganoga Glen, eight named falls in Glen Leigh, and between four and six named waterfalls in Ricketts Glen. The DCNR names 22 falls, the United States Geological Survey (USGS) Geographic Names Information System (GNIS) names 23 falls, and Scott E. Brown's 2004 book Pennsylvania waterfalls: a guide for hikers and photographers names 24. The falls are described in order going upstream along the creek for each of the three glens. The waterfalls in Ricketts Glen State Park are on the Allegheny Front, which is the boundary between the Allegheny Plateau to the north and the Ridge-and-Valley Appalachians to the south. The headwaters of Kitchen Creek are on the dissected plateau, from which the stream drops approximately 1,000 feet (300 m) in 2.25 miles (3.62 km) as it flows down the steep escarpment of the Allegheny Front. Much of this drop occurs in Glen Leigh and Ganoga Glen, two narrow valleys carved by branches of Kitchen Creek, which come together at Waters Meet.[a] The branch in Glen Leigh has eight named waterfalls and lies north of the confluence, while the branch in Ganoga Glen has ten named waterfalls and lies to the northwest. Ricketts Glen lies south of and downstream from Waters Meet; here the terrain becomes less steep, and there are fewer named waterfalls. The DCNR names only four in Ricketts Glen, all on Kitchen Creek; the USGS GNIS names these and one more on the creek, and Brown's book on Pennsylvania waterfalls adds a sixth named falls on a tributary. The rocks exposed in the park were formed between 370 and 340 million years ago, when the land was part of the coastline of a shallow sea that covered a great portion of what is now North America. The high mountains to the east of the sea gradually eroded, causing a build-up of sediment made up primarily of clay, sand and gravel. Tremendous pressure on the sediment caused the formation of the rocks that are found in the park and in the Kitchen Creek drainage basin: sandstone, shale, siltstone, and conglomerates. About 300 to 250 million years ago, the Allegheny Plateau, Allegheny Front, and Appalachian Mountains all formed in the Alleghanian orogeny. This happened long after the sedimentary rocks in the park were deposited, when the part of Gondwana that became Africa collided with what became North America, forming Pangaea. In the years since, up to 5,000 feet (1,500 m) of rock has been eroded away by streams and weather. At least three major glaciations in the past million years have been the final factor in shaping the land that makes up the park today. The effects of glaciation have made Kitchen Creek "unique compared to all other nearby streams that flow down the Allegheny Front", as it is the only one with an "almost continuous series of waterfalls". Prior to the last ice age, Kitchen Creek and Phillips Creek to the east had drainage basins of similar area and slope, and both watersheds were confined to the Allegheny Front. This changed when receding glaciers formed temporary dams on two of Kitchen Creek's neighboring streams on the Allegheny Plateau, South Branch Bowman Creek to the northeast and Big Run, a tributary of Fishing Creek to the northwest. The headwaters of South Branch Bowman Creek were very close to those for the Glen Leigh branch of Kitchen Creek, and the headwaters for Big Run were very close to those for the Ganoga Glen branch. As the glaciers retreated to the northeast about 20,000 years ago, glacial lakes formed. Drainage from the melting glacier and lakes cut a sluiceway, or channel, that diverted the headwaters of South Branch Bowman Creek into the Glen Leigh branch of Kitchen Creek. The retreating glaciers also left deposits of debris 20 to 30 feet (6.1 to 9.1 m) thick, which formed a dam blocking water from draining into Big Run. Instead water from Ganoga Lake and the area that later became Lake Jean was diverted into the Ganoga Glen branch of Kitchen Creek. These diversions added about 7 square miles (18 km²) to the Kitchen Creek drainage basin, increasing it by just over 50 percent to 20.1 square miles (52 km²). The result was increased water flow in Kitchen Creek, which has been cutting the falls in the glens since. The gradient or slope of Kitchen Creek was fairly stable for its flow when it had a much smaller drainage basin, as Phillips Creek still does. The increased basin size means that Kitchen Creek in the glens is too steep for its present amount of water flow. As Kitchen Creek continues to cut into the rock and erode it up the Allegheny Front, the creek's slope will decrease and become less steep. In the future, the creek's flow and slope are predicted to become similar to those of other nearby creeks with similar size drainage basins. This process could take so long that a new glacial period might occur before the transformation is complete. The park's waterfalls expose two distinct rock formations from the Devonian and Carboniferous periods. The higher and more recent of these is the Huntley Mountain Formation, from the late Devonian and early Mississippian. This is made of layers of olive green to gray sandstone and gray to red shale. The lower and older layer is the Catskill Formation, which is composed of red shale and siltstone up to 370 million years old. The harder Huntley Mountain Formation caps the Allegheny Front and has kept it from eroding as much as the softer Catskill Formation to the south. The portions of the Allegheny Front within the park are named North Mountain and Red Rock Mountain, with the latter name coming from an exposed band of Huntley Formation red shale and sandstone visible along Pennsylvania Route 487. Geologists classify the falls at Ricketts Glen State Park into two types. Wedding-cake falls descend in a series of small steps, forming waterfalls that are said to resemble a wedding cake. Within the park, this type of falls usually flows over thin layers of Huntley Mountain Formation sandstone. In bridal-veil falls, the second type, water falls over a ledge and drops vertically into a plunge pool in the stream bed below. Within the park, this type of falls flows over Catskill Formation rocks or the red shale and sandstone of the Huntley Formation. In the park, the harder caprock which forms the ledge from which the bridal-veil falls drops is grey sandstone. The softer red shale below is eroded away by water, sand and gravel to form the plunge pool. While the official Ricketts Glen State Park web page also classifies waterfalls as either the bridal-veil or wedding-cake type, Brown's Pennsylvania waterfalls: a guide for hikers and photographers uses four types for classification: falls, cascade, slide, and chute. The first, falls, is the same as the DCNR's bridal-veil type, with water that falls freely from a ledge. Brown divides the wedding-cake class into three types: cascade, where water falls down a "vertical to nearly vertical" surface that has terraces; slide, where water falls down a "near vertical to less than vertical" wide surface that is smoother than a cascade; and chute, where the water is confined by rock as it falls down "a narrow slide or cataractlike feature". Ricketts Glen State Park is in the Susquehanna River drainage basin, the earliest recorded inhabitants of which were the Iroquoian-speaking Susquehannocks. Their numbers were greatly reduced by disease and warfare with the Five Nations of the Iroquois, and by 1675 they had died out, moved away, or been assimilated into other tribes. After this, the lands of the Susquehanna valley were under the nominal control of the Iroquois, who encouraged displaced tribes from the east to settle there, including the Shawnee and Lenape (or Delaware). On November 5, 1768, the British acquired land, known in Pennsylvania as the New Purchase, from the Iroquois in the Treaty of Fort Stanwix; this included what is now Ricketts Glen State Park. After the American Revolutionary War, Native Americans almost entirely left Pennsylvania. Luzerne County was formed in 1786 from part of Northumberland County, and Fairmount Township, where the waterfalls are, was settled in 1792 and incorporated in 1834. About 1890 a Native American pot, decorated in the style of "the peoples of the Susquehanna region", was found under a rock ledge on Kitchen Creek by Murray Reynolds, for whom a waterfall is named. The Ricketts family began acquiring land in and around what became the park in 1851, when Elijah Ricketts and his brother Clemuel bought about 5,000 acres (2,000 ha) on North Mountain around what is now known as Ganoga Lake. By 1852 they had built a stone house on the lake shore, which they ran "as a lodge and tavern". Elijah's son Robert Bruce Ricketts, for whom the park is named, joined the Union Army as a private at the outbreak of the American Civil War and rose through the ranks to become a colonel. After the war, R. B. Ricketts returned to Pennsylvania and began purchasing the land around the lake from his father in 1869; eventually he controlled or owned more than 80,000 acres (32,000 ha), including the glens and waterfalls. Ricketts and the other settlers living in the area were not aware of the glens and their waterfalls until about 1865, when they were discovered by two of the Ricketts' guests who went fishing and wandered down Kitchen Creek. In 1872 Ricketts built a three-story wooden addition to the stone house; this opened as the North Mountain House hotel in 1873, and was run by Ricketts' brother Frank until 1898. Ricketts named 21 of the waterfalls; most have Native American names, and others are named for relatives and friends. In 1879 Ricketts started the North Mountain Fishing Club, and he renamed Long Pond as Ganoga Lake in 1881, based on a suggestion by Pennsylvania senator Charles R. Buckalew. Ricketts also used the name Ganoga for the tallest waterfall and the glen it flows through. In 1889 Ricketts hired Matt Hirlinger and five other men to build the trails along Kitchen Creek. It took them four years to complete the trails and stone steps through the glens. The wooden addition to the stone house was torn down in 1897, and the hotel and fishing club closed in 1903; the stone house remained the Ricketts' summer home. Ricketts was a lumberman who made his fortune clearcutting nearly all his land, but the glens were "saved from the lumberman's axe through the foresight of the Ricketts family". Ricketts died in 1918; between 1920 and 1924 the Pennsylvania Game Commission bought 48,000 acres (19,000 ha) from his heirs, via the Central Pennsylvania Lumber Company. This became most of Pennsylvania State Game Lands Number 13, west of the park in Sullivan County. These sales left the Ricketts heirs with over 12,000 acres (4,900 ha) surrounding Ganoga Lake, Lake Jean and the glens. The area was approved as a national park site in the 1930s, and the National Park Service planned a Civilian Conservation Corps camp at "Ricketts Glynn" (sic). Budget problems and World War II brought an end to national plans for development. In 1942 the Commonwealth of Pennsylvania bought 1,261 acres (510 ha), including the glens and their waterfalls, from the heirs for $82,000. Ricketts Glen State Park opened in 1944. The state bought a total of 16,000 acres (6,500 ha) more from the heirs in 1945 and 1950 for $68,000; the park today has about 10,000 acres (4,000 ha) from the Ricketts family and about 3,000 acres (1,200 ha) acquired from others. A 1947 newspaper article estimated that the new park would have 50,000 visitors that year, and detailed the work the state had done since acquiring the land. The Falls Trail through the glens was rebuilt, all the stone steps were replaced, and signs were added. Out of concern for greater safety, footbridges with handrails replaced those made from hewn logs, overhanging rock ledges were removed in places, and the trail was rerouted near some falls. The Evergreen Trail past Adams Falls was built at this time. In 1969 the Glens Natural Area was named a National Natural Landmark, and it became a Pennsylvania State Park Natural Area in 1993, which guarantees it "will be protected and maintained in a natural state". In 1996 heavy rains washed out two bridges on the Falls Trail; because of the difficulty of transporting materials on the trail, an Army National Guard helicopter dropped 36-foot (11 m) poles into the glens to rebuild the bridges in early 1997. In the winter of 1997 ice climbing was allowed in the Ganoga Glen section of the park for the first time. That same year local fire companies trained to rescue people injured in the park when icy conditions make reaching and transporting them treacherous. In 1998 a four-year project to "repair and improve the Falls Trail" began, with three park employees carrying materials in on foot to stabilize the trail, fix steps, reduce erosion, and repair some bridges. In 2001, John Young in Hike Pennsylvania: An Atlas of Pennsylvania's Greatest Hiking Adventures wrote of the Falls Trail: "This is not only the most magnificent hike in the state, but it ranks up there with the top hikes in the East." The readers of Backpacker magazine chose the Falls Trail as the best hike in Pennsylvania in 2009, and as one of the best hikes in the Northeast in 2010. Kitchen Creek flows through the park's three glens, which the descriptions of the waterfalls are organized by: Ricketts Glen, Glen Leigh, and Ganoga Glen. The falls are listed in order going upstream along Kitchen Creek, starting with the southernmost and ending at the northernmost in each glen. This is also the order in which a hiker would encounter the falls while traveling north along the creek on the Falls Trail. The Falls Trail is a 7.1-mile (11.4 km) loop hike. Starting at PA 118, it is 1.8 miles (2.9 km) north along the creek through Ricketts Glen to Waters Meet, where the trail divides. Following the Glen Leigh branch, it is 1.2 miles (1.9 km) north through the glen to the Highland Trail, then 1.0 mile (1.6 km) west along the Highland Trail to Ganoga Glen. Turning southeast, it is 1.3 miles (2.1 km) through Ganoga Glen back to Waters Meet, then the 1.8 miles (2.9 km) through Ricketts Glen is retraced, but heading south back to PA 118. The description of each waterfall starts with the name. While the Pennsylvania Department of Conservation and Natural Resources (DCNR) Bureau of State Parks names 22 waterfalls in Ricketts Glen State Park (all but Kitchen Creek and Shingle Cabin), the United States Geological Survey (USGS) Geographic Names Information System (GNIS) names 23 (all but Shingle Cabin), and Scott E. Brown's 2004 book Pennsylvania waterfalls: a guide for hikers and photographers names 24. There are also several unnamed waterfalls in the park, with the total number of falls given as 33 or 34. For each waterfall the height is given next, followed by the elevation above sea level, and the latitude and longitude. Each waterfall in the table is classified according to the four types used in Brown's book (falls, cascade, slide, and chute), with some classified as combinations of types. For each waterfall there are notes, which can give more information on the waterfall, the etymology of the name, and the location on the Falls Trail, followed by a photograph. Ricketts Glen is the name given to the Kitchen Creek valley south and downstream of Waters Meet. It is 1.8 miles (2.9 km) between Pennsylvania Route 118 and Waters Meet on the Falls Trail, making this the longest glen. The three northernmost waterfalls are all within 0.5 miles (0.80 km) of Waters Meet, and are only a short hike from the bottom of Ganoga Glen or Glen Leigh. The southern part of this glen has large areas of old-growth forest, chiefly hemlocks. Ricketts Glen is entirely in the Catskill Formation and all of the falls on this section of Kitchen Creek have plunge pools. Ricketts Glen is the only glen where sources differ on the number of named waterfalls. Only Brown's book names Shingle Cabin Falls, which is the sole named falls in the park on a tributary of Kitchen Creek. The names of the waterfalls at the southern end of Ricketts Glen, under and just south of PA 118, are the most disputed. The USGS GNIS names Kitchen Creek Falls (with coordinates very near the PA 118 bridge) and Adams Falls (with coordinates further south of PA 118). Brown's book also names both as separate falls and gives the height of Kitchen Creek Falls as 9 feet (2.7 m). A 1947 newspaper article on the new state park notes the unnamed falls under the highway bridge and refers to "Adam's Falls a short distance away". The official park map only names Adams Falls, shows it a short distance south of the bridge, and notes it is 36 feet (11 m) tall. However, the DCNR Pennsylvania Trail of Geology guide to the park says Kitchen Creek Falls is just another name for Adams Falls, and notes that "At the bridge on Pa. Route 118, Kitchen Creek plunges over three picturesque cascades (18, 25 and 10 feet high)" (5.5, 7.6, and 3.0 m high). |Adam Kale was a watchman on Kitchen Creek employed by the North Mountain Fishing Club, and the waterfall's name was still spelled "Adam's Falls" in 1947. Adams Falls, according to the DCNR Pennsylvania Trail of Geology guide, "is the most beautiful and the most accessible falls in the park". It is the only named waterfall in the park south of Pennsylvania Route 118 and the only one not visible from the Falls Trail; it is a short distance from the parking lot on the 1-mile (1.6 km) Evergreen Trail. Adams Falls has carved a narrow chute in the rock, and its lower plunge pool, Leavenworth Pool, has a diameter of 30 feet (9.1 m) and a depth of 8 to 10 feet (2.4 to 3.0 m). The pool is named for Frank Leavenworth, from Wilkes-Barre who operated coal mines and served as president of the fishing club.| |Kitchen Creek||9 feet |Kitchen Creek Falls is directly under the Pennsylvania Route 118 (PA 118) bridge, and has carved a narrow chute no more than 3 feet (0.91 m) wide in the rock. According to Brown, it is the shortest named waterfall in the park at 9 feet (2.7 m), but according to the Pennsylvania Trail of Geology it is 18 feet (5.5 m) tall. Although Kitchen Creek Falls is visible from the Falls Trail, it is not one of the DCNR's 22 named waterfalls. It is named in the USGS GNIS and Brown's book.| |Shingle Cabin||25 feet |Shingle Cabin Falls is on Shingle Cabin Brook, which enters the left bank of Kitchen Creek downstream of Murray Reynolds Falls. The Falls Trail is on the right bank, the opposite side of the creek from the falls, and foliage obscures the view much of the year. It is not one of the DCNR's 22 named waterfalls, but is named in Brown's book.| |Murray Reynolds||16 feet |G. Murray Reynolds (1838–1904) was a colonel, politician, and a brother of Elizabeth Reynolds Ricketts, wife of R. B. Ricketts. Murray Reynolds Falls was once known as "Pulpit Falls" for the pulpit-shaped rock in the midst of the chute. It is 1.3 miles (2.1 km) north of PA 118, 0.5 miles (0.80 km) south of Waters Meet, and is the first of the falls named by the DCNR encountered when heading north on the Falls Trail.| |Sheldon Reynolds||36 feet |falls, then cascade| |Sheldon Reynolds (1845–1895) was a lawyer, banker, historian, and a brother of Elizabeth Reynolds Ricketts, wife of R. B. Ricketts. Sheldon Reynolds Falls is 1.5 miles (2.4 km) north of PA 118 and 0.3 miles (0.48 km) south of Waters Meet. As hikers approach Sheldon Reynolds Falls from the south, Harrison Wright Falls is visible above it in the distance.| |Harrison Wright||27 feet |Harrison Wright (1850–1885) was a lawyer with a doctorate in mineralogy and an interest in archeology. He was active in the Wyoming Historical and Geological Society with R. Bruce Ricketts. Harrison Wright Falls is "perhaps the most photogenic falls in the park", and is 1.6 miles (2.6 km) north of PA 118 and 0.2 miles (0.32 km) south and downstream of Waters Meet.| Marcia Bonta in Outbound Journeys in Pennsylvania: A Guide to Natural Places for Individual and Group Outings calls this "the loveliest part of the entire trail—rugged, steep Glen Leigh". Bonta goes on to note that Glen Leigh "resembles a remote wilderness, hemmed in on one side by rock and on the other by surging water, and it has some of the most spectacular waterfalls in the park". Glen Leigh was named for Lake Leigh, which R. B. Ricketts named for his second daughter Frances Leigh (1881–1970). She married William S. McLean, Jr., a judge, in 1921. Leigh was also the middle name of R.B. Ricketts' mother, Margaret Leigh Lockart Ricketts (1810–1891). In 1907, R. B. Ricketts built a dam upstream of the waterfalls on the Glen Leigh branch of Kitchen Creek, hoping to use the resulting Lake Leigh for hydroelectric power generation. The dam was "poorly constructed" and could not be used to generate power; it was condemned by the state and the lake drained in 1956. Almost all of Glen Leigh is in the Huntley Mountain Formation, but a small region at the southern end, including Waters Meet, is in the Catskill Formation. Glen Leigh has eight named waterfalls in 0.64 miles (1.03 km). It is 1.8 miles (2.9 km) from PA 118 in the south to Waters Meet and the southern end of Glen Leigh. The glen is also accessible from the north; it is 1.04 miles (1.67 km) from the Lake Leigh trailhead parking lot by Lake Jean to Onondaga, the northernmost waterfall. The Highland Trail is the 1.2-mile (1.9 km) path between the northern ends of Glen Leigh and Ganoga Glen. It meets the Falls Trail just north of Onondaga Falls and has a short connector to F. L. Ricketts, the next waterfall south. The Falls Trail by both of these northernmost waterfalls had to be rebuilt in the early 2000s. |Wyandot Falls is one of two named waterfalls visible from Waters Meet (Erie Falls in Ganoga Glen is the other). It is the first named falls in Glen Leigh, and is 0.09 miles (0.14 km) upstream of Waters Meet. The Wyandots are an Iroquoian-speaking people (also known as the Hurons) who once lived in modern day Ontario; they were decimated by disease, then defeated by the Iroquois by 1649. The people who call themselves Wyandots now live in Oklahoma.| |B. Reynolds||40 feet |Benjamin Reynolds (1840–1913) was a banker and a brother of Elizabeth Reynolds Ricketts, wife of R. B. Ricketts; the Reynolds and Ricketts families shared a double house in Wilkes-Barre, Pennsylvania. B. Reynolds Falls is between 0.1 and 0.2 miles (0.16 and 0.32 km) upstream of Waters Meet, and is the second named falls in Glen Leigh. When the water is low it is only a "horse tail" falls.| |R. B. Ricketts||36 feet |cascade, then cascade| |Robert Bruce Ricketts (1839–1918) was a colonel in the Union Army in the American Civil War who fought at Gettysburg. He owned more than 80,000 acres (32,000 ha) at one time and sold most of its lumber. Ricketts did preserve the old-growth forest in what became Ricketts Glen State Park, which is named for him. Ricketts named 21 waterfalls on Kitchen Creek and hired six workers to build the original Falls Trail from 1889 to 1893. The "exceedingly pleasant" R. B. Ricketts Falls is 0.24 miles (0.39 km) upstream of Waters Meet, and is the third named falls in Glen Leigh.| |Named for the Ozone hiking club of Wilkes-Barre, which used the Ricketts house on the mountain as a local base. Although the reason for the club's choice of name is unknown, the only other Ozone Falls in the United States was so named because the air near the falls was believed to have a "stimulating quality" from the waterfall's mist. Ozone Falls is the tallest in Glen Leigh at 60 feet (18 m) and second tallest in the park. It is 0.35 miles (0.56 km) upstream of Waters Meet, and is the fourth named falls in Glen Leigh. The Falls Trail climbs a switchback beside the falls, and crosses Kitchen Creek just above it on a bridge. Water can cover the trail here.| |Huron Falls has a 90-degree turn as it slides down sandstone from the Huntley Mountain Formation. It is about 0.5 miles (0.80 km) upstream of Waters Meet, and is the fifth named falls in Glen Leigh. The top of Huron is just below the plunge pool of Shawnee Falls; Brown speculates that Huron and Shawnee Falls were once one waterfall. The Hurons are an Iroquoian-speaking people (also known as the Wyandots) who once lived in modern day Ontario; they were decimated by disease, then defeated by the Iroquois by 1649. The people who call themselves Hurons now live in Quebec.| |falls, then falls| |Shawnee Falls is 0.51 miles (0.82 km) upstream of Waters Meet, and is the sixth named falls in Glen Leigh. Shawnee and Huron falls are carving "a massive overhanging cliff of fractured sandstone" on the creek's left bank, opposite the trail; Brown speculates that Shawnee and Huron Falls were once one waterfall. The Shawnee are an Algonquian-speaking people who came to Pennsylvania as refugees in the late 17th century and left by 1772.| |F. L. Ricketts||38 feet |Frank L. Ricketts (1843–1908) was R. B. Ricketts younger brother and managed the Ricketts' North Mountain House hotel from 1873 to 1898. Frank was deaf from scarlet fever in his childhood. F. L. Ricketts Falls is 0.63 miles (1.01 km) upstream of Waters Meet, and is the seventh named falls in Glen Leigh. The trail was moved from the left bank, close to the falls, to the right bank of Kitchen Creek before 2003, as the wooden steps were too wet and unstable on the left side.| |2,077 feet (633 m)||cascade| |Onondaga Falls is 0.73 miles (1.17 km) upstream of Waters Meet, and is the eighth and last named falls in Glen Leigh. It is 1.04 miles (1.67 km) south of the Lake Leigh trailhead parking lot by Lake Jean. The trail to Onondaga Falls had to be reconstructed prior to 2001, after a storm washed it out. The Onondaga are an Iroquoian-speaking people and one of the original members of the Iroquois Confederation. They were geographically in the middle of the five tribes and "tended the council fire" of the Iroquois Longhouse; as such they were one of three "Elder Brothers" in the Confederacy. Their village at Onondaga, New York, was the Iroquois capital.| By 1875 Ricketts had named the tallest waterfall on Kitchen Creek Ganoga Falls, and in 1881, he renamed Long Pond as Ganoga Lake. Pennsylvania senator Charles R. Buckalew suggested the name Ganoga, an Iroquoian word which he said meant "water on the mountain" in the Seneca language. Donehoo's A History of the Indian Villages and Place Names in Pennsylvania identifies it as a Cayuga language word meaning "place of floating oil" and the name of a Cayuga village in New York. Whatever the meaning, Ganoga Lake is the source of the branch of Kitchen Creek that flows through Ganoga Glen, which has the tallest waterfall. A dam was built upstream of the waterfalls on the Ganoga Glen branch of Kitchen Creek in 1842. Ricketts strengthened the dam circa 1905 as part of a hydroelectric power generation scheme, and renamed the body of water Lake Rose (Rose is a Ricketts family name). However, both the Lake Rose and Lake Leigh dams were "poorly constructed" and could not be used to generate power; both dams were condemned by the state and Lake Rose was drained in 1969. Ganoga Glen is not as steep as Glen Leigh; both glens are almost entirely in the Huntley Mountain Formation, with a small region at the southern end, including Waters Meet, in the Catskill Formation. Ganoga Glen has ten named waterfalls in 1.1 miles (1.8 km). It is 1.8 miles (2.9 km) from PA 118 in the south to Waters Meet and the southern end of Ganoga Glen. From the north, it is 0.3 miles (0.48 km) from the Lake Rose trailhead parking lot by Lake Jean to Mohawk, the northernmost waterfall. There is also the 2.8-mile (4.5 km) Ganoga View Trail, which leads from Pennsylvania Route 487 in the west to Ganoga Falls. The Highland Trail, which meets the Falls Trail a short distance north of Mohawk Falls, is the 1.2-mile (1.9 km) connector between the northern ends of Ganoga Glen and Glen Leigh. Jeff Mitchell writes in Hiking the Endless Mountains: Exploring the Wilderness of Northeast Pennsylvania that Ganoga Glen has his "favorite place" in the park: "Here the trail wraps around ledges and underneath overhanging rocks, right next to the waterfalls. The roar of the falls reverberates against their rocky confines. The state park trail map says that Seneca, Delaware, and Mohican Falls are here, but it is hard to discern which falls are which because they explode from everywhere and are continuous." |Erie Falls is one of two named waterfalls visible from Waters Meet (Wyandot Falls in Glen Leigh is the other). It is the first named falls in Ganoga Glen, and is 0.1 miles (0.16 km) upstream of Waters Meet. The Erie were an Iroquoian-speaking people who lived on the southern shore of Lake Erie. They were destroyed as a people by 1656, as a result of a war with the Seneca and other Iroquois.| |cascade, then falls| |Tuscarora Falls is the second named falls in Ganoga Glen, and is a little more than 0.1 miles (0.16 km) upstream of Waters Meet. The Tuscarora are an Iroquoian speaking people who originally lived in what is now North Carolina, then moved to New York. In 1713 the Tuscarora became the sixth member of the Iroquois Confederation, which then became known as the Six Nations. During the American Revolutionary War, the Tuscarora and their allies the Oneida were the only Iroquois who supported the United States.| |Conestoga Falls is the third named falls in Ganoga Glen, and is 0.3 miles (0.48 km) upstream of Waters Meet. The Conestoga or Susquehannocks were an Iroquoian-speaking people who lived on the Susquehanna River, which is named for them; the park is in the Susquehanna's drainage basin. After the Iroquois defeated the Susquehannocks in war in 1675, the survivors were assimilated into other tribes, until the last members were killed by the Paxton Boys in 1763. Brown calls Conestoga Falls "not particularly photogenic".| |slide, then slide| |Mohican Falls is the fourth named falls in Ganoga Glen, and is 0.4 miles (0.64 km) upstream of Waters Meet. The Mohicans or Mahicans were an Algonquian speaking people who originally lived on the upper part of the Hudson River. They lost a prolonged war with the Mohawk nation and other Iroquois in 1673 and some later lived in Pennsylvania. Mohican Falls consists of two slides, one above the other. Brown notes it is difficult to photograph both parts (only the top slide is pictured here).| |Delaware Falls is the fifth named falls in Ganoga Glen, and is 0.5 miles (0.80 km) upstream of Waters Meet. The Delaware or Lenape are an Algonquian-speaking people who originally lived along the Delaware River and points east. The Lenape began selling land to William Penn in 1682; westward expansion of white settlers forced the last Lenape to leave Pennsylvania by 1772. Brown notes Delaware Falls is easy to miss, despite its size.| |Seneca Falls is the sixth named falls in Ganoga Glen, and is a little more than 0.5 miles (0.80 km) upstream of Waters Meet. The Seneca were an Iroquoian-speaking people and the westernmost of the original five tribes of the Iroquois Nation. As such they were known as the "Keepers of the Western Door" of the Iroquois Longhouse and were one of three "Elder Brothers" in the Confederacy. The two war chiefs of the Iroquois were chosen by the Seneca. The Seneca had many trails through Pennsylvania and used the western part of the state as a hunting ground. Brown notes Seneca Falls is also easy to miss.| |Ganoga Falls is the seventh named falls in Ganoga Glen, and is 0.7 miles (1.1 km) upstream of Waters Meet. Brown calls Ganoga Falls "the park's crown jewel", and notes that the creek changes direction near the top of the falls, "which causes the apparent size and shape of the falls to change with your perspective". At Ganoga, short spurs lead from the Falls Trail to the base of the falls and to near the top of the falls, as well as to the Ganoga View Trail. People have fallen at Ganoga Falls and suffered serious injuries.| |Cayuga Falls is the eighth named falls in Ganoga Glen, and is 0.8 miles (1.3 km) upstream of Waters Meet. According to Brown, Cayuga Falls "just isn't photogenic". The Cayuga are an Iroquoian-speaking people and one of the five original members of the Iroquois; their lands were between the central Onondaga and the westernmost Seneca. They were "Younger Brothers" in the Iroquois Confederation and were "affiliated with the Senecas".| |Oneida Falls is the ninth named falls in Ganoga Glen, and is 0.9 miles (1.4 km) upstream of Waters Meet. Brown describes the pleasures of photographing this falls. The Oneida are an Iroquoian-speaking people and one of the five original members of the Iroquois; their lands were between the central Onondaga and the easternmost Mohawk. They were "Younger Brothers" in the Iroquois Confederation and were "affiliated with the Mohawks". During the American Revolutionary War, the Oneida and their allies the Tuscarora were the only Iroquois who supported the United States.| |falls, then slide| |Mohawk Falls is the tenth and last named falls in Ganoga Glen, and is 1.1 miles (1.8 km) upstream of Waters Meet. It is also 0.3 miles (0.48 km) south of the Lake Rose trailhead parking lot by Lake Jean. Brown describes Mohawk Falls as a 9-foot (2.7 m) falls "with steeply descending, boulder-choked tailwaters". The Mohawk were an Iroquoian-speaking people and the easternmost of the original five tribes of the Iroquois Nation. As such they were known as the "Keepers of the Eastern Door" of the Iroquois Longhouse and were one of three "Elder Brothers" in the Confederacy. The Mohawk also had a veto in the Iroquois council.|
<urn:uuid:107512c1-8209-42e1-a36b-6399acda7b4c>
CC-MAIN-2019-43
https://wikiredia.info/wiki/Waterfalls_in_Ricketts_Glen_State_Park
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986669057.0/warc/CC-MAIN-20191016163146-20191016190646-00518.warc.gz
en
0.954007
8,283
2.9375
3
2.1 North and South in 1861 American Military History (Washington: Center of Military History, United States Army, 1989), pp. 192–193. Provided by United States Army Center of Military History. |Percent of nation’s population||71%||29%| |Percent of nation’s railroads||71%||29%| |Percent of nation’s farm acreage||65%||35%| |Percent of nation’s manufacturing workers||92%||8%| |Percent of nation’s manufacturing output||92%||8%| |Number of factories||110,000||18,000| As North and South lined up for battle, clearly the preponderance of productive capacity, manpower, and agricultural potential lay on the side of the North. Its crops were worth more annually than those of the South, which had concentrated on growing cotton, tobacco, and rice. Between February and May 1861 the Confederate authorities missed the opportunity of shipping baled cotton to England and drawing bills against it for the purchase of arms. In seapower, railroads, material wealth, and industrial capacity to produce iron and munitions the North was vastly superior to the South. This disparity became even more pronounced as the ever-tightening blockade gradually cut off the Confederacy from foreign imports. The North had more mules and horses, a logistical advantage of great importance since supplies had to be carried to the troops from rail and river heads. According to the census of 1860 the population of the United States numbered 31,443,321 persons. Approximately 23,000,000 of them were in the twenty-two northern states and 9,000,000 in the eleven states that later seceded. Of the latter total, 3,500,000 were slaves. The size of the opposing armies would reflect this disparity. At one time or another about 2,100,000 men would serve in the northern armies, while some 800,000 to 900,000 men would serve the South. Peak strength of the two forces would be about 1,000,000 and 600,000, respectively. Yet not all the advantages lay with the North. The South possessed good interior lines of communications, and its 3,550-mile coast line, embracing 189 harbors and navigable river mouths, was most difficult to blockade effectively. Possessors of a rich military record in wars against the British, Spanish, Mexicans, and Indians, the southerners initially managed to form redoubtable cavalry units more easily than the North and used them with considerable skill against the invading infantry. As the war moved along, the armies on both sides demonstrated high degrees of military skill and bravery. Man for man they became almost evenly matched, and their battles were among the bloodiest in modern history. Jefferson Davis hoped that the sympathy or even intervention of European powers might more than compensate for the Confederacy’s lack of material resources. This hope, largely illusory from the start, became less and less likely of realization with the emancipation of the slaves, with every Union victory, and with the increasing effectiveness of the blockade. Militarily, the South’s greatest advantage over the North was simply the fact that if not attacked it could win by doing nothing. To restore the Union the Federal forces would have to conquer the Confederacy. Thus the arena of action lay below the strategic line of the Potomac and Ohio Rivers. Here geography divided the theater of war into three interrelated theaters of operations. The eastern theater lay between the Atlantic Ocean and the Appalachian Mountains; the western theater embraced the area from the Appalachians to the Mississippi; and the trans-Mississippi theater ran westward to the Pacific Ocean. In the east, the strategic triangle of northern Virginia shielded invasion routes. Its apex aimed arrowlike at the Federal capital; the Potomac River and the lower Chesapeake Bay formed its right leg; its left bounded on the Blue Ridge and the adjacent Shenandoah Valley; and the base of the triangle followed the basin of the James and Appomattox Rivers, whereon stood Richmond, halfway between the bay and the valley. For three and a half years Federal commanders would be defeated on the legs and in the center of this triangle as they tried to take Richmond and defeat the Army of Northern Virginia under Lee. In three neighboring counties within this triangle more than half a million men would clash in mortal combat; more would die in these counties than in the Revolutionary War, the War of 1812, the War with Mexico, and all the Indian wars combined. To bring the Confederates out of this triangle the North would have to execute an operation aimed at breaking through the base line along the James and Appomattox Rivers. The hammer for swinging against the anvil of Virginia came from the line of the Ohio River as Union forces moved along the invasion routes of the Green, Cumberland, Tennessee, and Mississippi Rivers. To breach the lower reaches of the Appalachians, the Federals needed the railroad centers at Nashville, Chattanooga, and Atlanta; with them they could strike northward through the Carolinas toward the line of the James. But in the spring of 1861, the anvil and hammer concept had not yet occurred to the military leaders in Washington. Only the General in Chief, Winfield Scott, had a concrete strategic proposal for waging total war. He recommended to Lincoln that time be taken to train an army of 85,000 men and that the naval blockade of the Confederacy be enforced. Then the Army was to advance down the Mississippi to divide and conquer the South. The press ridiculed the strategy, calling it the Anaconda Plan. But few leaders examined the South in terms of its military geography or concentrated on a strategy to prevail over it. Instead, most thought in terms of political boundaries and a short war that would end with the capture of Richmond.
<urn:uuid:c8760be9-81ee-428d-ba58-d301838bc9f9>
CC-MAIN-2015-18
http://www.learnnc.org/lp/editions/nchist-civilwar/5463
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246637979.29/warc/CC-MAIN-20150417045717-00096-ip-10-235-10-82.ec2.internal.warc.gz
en
0.955473
1,203
3.6875
4
Comparing hiking, mountain biking and horse riding impacts on vegetation and soils in Australia and the United States of America Pickering, C.M., Hill, W., Newsome, D. and Leung, Y-F. (2010) Comparing hiking, mountain biking and horse riding impacts on vegetation and soils in Australia and the United States of America. Journal of Environmental Management, 91 (3). pp. 551-562. *Subscription may be required Hiking, horse riding and mountain biking are popular in protected areas in Australia and the United States of America. To help inform the often contentious deliberations about use of protected areas for these three types of activities, we review recreation ecology research in both countries. Many impacts on vegetation, soils and trails are similar for the three activities, although there can be differences in severity. Impacts include damage to existing trails, soil erosion, compaction and nutrification, changes in hydrology, trail widening, exposure of roots, rocks and bedrock. There can be damage to plants including reduction in vegetation height and biomass, changes in species composition, creation of informal trails and the spread of weeds and plant pathogens. Due to differences in evolutionary history, impacts on soil and vegetation can be greater in Australia than in the USA. There are specific social and biophysical impacts of horses such as those associated with manure and urine, grazing and the construction and use of tethering yards and fences. Mountain bike specific impacts include soil and vegetation damage from skidding and the construction of unauthorised trails, jumps, bridges and other trail technical features. There are gaps in the current research that should be filled by additional research: (1) on horse and mountain bike impacts to complement those on hiking. The methods used need to reflect patterns of actual usage and be suitable for robust statistical analysis; (2) that directly compares types and severity of impacts among activities; and (3) on the potential for each activity to contribute to the spread of weeds and plant pathogens. Additional research will assist managers and users of protected areas in understanding the relative impacts of these activities, and better ways to manage them. It may not quell the debates among users, managers and conservationists, but it will help put it on a more scientific footing. © 2009 Elsevier Ltd. All rights reserved. |Publication Type:||Journal Article| |Murdoch Affiliation:||School of Environmental Science| |Copyright:||© 2009 Elsevier Ltd.| |Item Control Page|
<urn:uuid:6e6821ed-56b9-4a06-af63-a7931662c6cb>
CC-MAIN-2017-17
http://researchrepository.murdoch.edu.au/id/eprint/2582/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121778.66/warc/CC-MAIN-20170423031201-00266-ip-10-145-167-34.ec2.internal.warc.gz
en
0.917269
507
2.859375
3