text
stringlengths 198
621k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 15
1.73k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
160k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Arginase [EC 184.108.40.206; L-arginine aminohydrolase] is an enzyme that hydrolyzes Larginine to L-ornithine and urea in the urea cycle. Two forms of arginase exists which are designed as arginase I and arginase II. Liver-type arginase I is expressed primarily in the liver and to some extend in the erythrocytes. Arginase II is expressed in many extrahepatic tissues, such as brain, spinal cord, kidney, small intestine and mammary gland. Although arginase I and arginase II have similar enzyme activities, they have different pI, immunological reactivity and are encoded by different genes. Human arginase I is a 35 kDa protein circulating in blood probably as a homotrimer. Circulating liver-type arginase was clinically used as a liver specific marker which may reflect not only early occurrence of liver injury but also early termination of liver injury. The measurement of liver-type arginase is clinically applicable for monitoring conditions of patients with liver disorders or pre- and postoperative conditions of patients who received partial hepatectomy with quicker normalization in comparison with aminotransferases (ALT and AST). Recently, arginase I gene was found to be one of the most prominent among astma genes. In situ hybridization demonstrated marked staining of arginase I in submucosal inflammatory lesions and arginase activity increased in allergen challenged lungs. Finally, it was found that both arginase I was the most significantly up-regulated protein in the murine spinal cord during experimental autoimmune encephalomyelitis. The results indicated that arginase I played important roles in autoimmune inflammation in the central nervous system.
- References to Arginase I (EC 220.127.116.11, L-arginine aminohydrolase) | <urn:uuid:d9654505-1ebe-4651-99bb-1359dd6133fb> | CC-MAIN-2020-24 | https://www.biovendor.com/arginase-i | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347402457.55/warc/CC-MAIN-20200529054758-20200529084758-00471.warc.gz | en | 0.948748 | 405 | 2.75 | 3 |
Differences Between Text Mining vs Text Analytics
Structured data has been out there since the early 1900s but what made text mining and text analytics so special is that leveraging the information from unstructured data (Natural Language Processing). Once we are able to convert this unstructured text into semi-structured or structured data it will be available to apply all the data mining algorithms ex. Statistical and machine learning algorithms.
Even Donald Trump was able to leverage the data and convert it to information which helped him to win the US presidential elections, well basically he didn’t do it his subordinates did. There is a very good article out there http://fivethirtyeight.com/features/the-real-story-of-2016/ you can go through it.
Many businesses have started using text mining to use valuable inputs from the text available out there, for example, a product based company can use the twitter data/ Facebook data to know how well or bad their product is doing out there in the world using Sentimental Analysis. In the early days the processing used to take a lot of time, days, in fact, to process or even implement the machine learning algorithms, but with the introduction of tools such as Hadoop, Azure, KNIME, and other big data processing software’s the text mining has gained enormous popularity in the market. One of the best examples of text analytics using association mining is Amazon’s Recommendation engine where it automatically gives recommendations to its customers what else other people bought when buying any one particular product.
One of the biggest challenges of applying text mining tools to something which is not in a digital format/ on computer drive is the process of making it. The old archives and many important documents that are available only on papers are sometimes read through OCR (Optical Character Recognition) which have many errors and sometimes data is entered manually which is prone to human mistakes. The reason we want these is that we may be able to derive other insights which are not visible from traditional reading.
Some of the steps of text mining are as below
- Information Retrieval
- Data Preparation and Cleaning
- Stop-word numbers and punctuation removal
- Convert to lowercase
- POS tagging
- Create text corpus
- Term-Document matrix
And below are the steps in Text Analytics which are applied after the Term Document Matrix is prepared
4.7 (3,220 ratings)
- Modeling ( This may include inferential models, predictive models or prescriptive models)
- Training and evaluation of models
- Application of these Models
- Visualizing the Models
The only thing one must always remember is that text mining always precedes text analytics.
Head to Head Comparison Between Text Mining vs Text Analytics (Infographics)
Below is The 5 Comparison between Predictive Text Mining vs Text Analytics
Key Differences between Text Mining vs Text Analytics
Let’s differentiate text mining and text analytics based on the steps which are involved in few applications where these text mining and text analytics both are applied:
• Classification of documents
In this the steps which are included in text mining are tokenization, stemming and lemmatization, removing stopwords and punctuation and at last computing the term frequency matrix or document frequency matrices.
Tokenization – The process of splitting the whole data (corpus) into smaller chunks or smaller words usually single words is known as tokenization (N-Gram model or Bag of words Model)
Stemming and Lemmatization – For example the words, big bigger and biggest all mean the same and it will form duplicate data, in order to keep the data redundant we do lemmatization, linking of words with the root word.
Removing stop words — Stop words are no use in analytics which will include words like is, the, and etc.
Term frequencies – This is a matrix that has row headers as the document names and columns as the terms(words) and the data is the frequency of the words occurring in those particular documents. Below is a sample screenshot.
In the above figure, we have the attributes in the rows (words) and the document number as columns and the word frequency as the data.
Now coming to text analytics we have the following steps that need to be considered
Clustering – Using K-means clustering/Neural Networks/ CART(Classification and regression trees) or any other clustering algorithm we can now cluster the documents based on the features that were generated (features here being the words).
Evaluation and Visualization – We van plot the cluster into two dimensions and look how these clusters vary from each other, and if the model holds good on test data we can deploy it in production and it will be a good document classifier which will classify any new documents which are given as input and it would just name the cluster in which it will fall into.
One of the most powerful tools out there in the market which help in processing twitter data/ Facebook data or any other data which can be used to derive the sentiment out of it whether the sentiment is good, bad or neutral to any particular process/product or person is sentiment analysis.
The source of the data can easily be available by using twitter API / Facebook API to get the tweets/comments/likes etc. on the tweet or a post of a company. The major problem being, this data is hard to structure. The data would contain various advertisements too and the data scientist who works for the company has to make sure that the selection of data is done in the right way so that only selected tweets/posts go through for pre-processing stages.
Other tools include Web- Scraping, this is a part of text mining wherein you scrap the data from websites using crawlers.
The process of text mining remains the same as tokenization, stemming and lemmatization, removing stopwords and punctuation and at last computing, the term frequency matrix or document frequency matrices but the only difference comes while applying the sentiment analysis.
Usually, we give a score to any post/tweet. Usually, when you buy a product and review if you are also given an option to give stars to the review and post a comment. Google, Amazon, and other websites use the stars to rate the comment, not only this they also take the tweets/posts and give them to human beings to rate it as good/bad/neutral and on combing these two scores they generate a new score to any particular tweet/post.
Visualization of sentiment analysis can be done using a word cloud, bar charts of the frequency term matrix.
•Association of Mining Analysis
One of the applications on which some guys were working on was the “Adverse Drug Event Probabilistic model” wherein one can check for which adverse events may cause other adverse events if he takes any particular medicine.
The text mining included the below workflow
From the above figure, we can see that till data-mining all steps belong to text mining which is identifying the source of data, extracting them and then preparing it ready to be analyzed.
Then applying association mining we have the below model
As we can see that some arrow marks point towards the orange circle and then one arrow points towards any one particular ADE (Adverse drug event). If we take an example on the left bottom side of the image we can find apathy, asthenia and feeling abnormal leads to feeling guilty , well one can say that’s obvious, it is obvious because as a human you can interpret and relate but here a machine is interpreting it and giving us the next adverse drug event.
An example of the word cloud is as below
Comparison Table between Text Mining vs Text Analytics
Below are the lists of points, describe the comparisons between Text Mining vs Text Analytics:
|Basis for Comparison||Text Mining||Text Analytics|
|Text mining is basically cleaning up od data to be available for text analytics||Text Analytics is applying of statistical and machine learning techniques to be able to predict /prescribe or infer any information from the text-mined data.|
|Text mining is a tool that helps in getting the data cleaned up.||Text Analytics is the process of applying the algorithms|
|If we talk about the framework, text mining is similar to ETL(Extract Transform Load), which means to be able to insert data into database these steps are carried out||In-text analytics this data is used to add values to the business, example creating word clouds, bi-grams frequency charts, N-grams in some cases|
|Python and R are the most famous text mining tools out there for text mining||For text analytics, once the data is available at database level then we can use any of the analytics software out there including python and R. Other software ’s include Power BI, Azure, KNIME, etc.|
Conclusion -Text Mining vs Text Analytics
The future of text mining and text analytics is not only applicable to English, but there have also been continuous advancements and using linguistic tools not only English other languages are too considered for analysis.
The scope and future of text mining will grow as there are limited resources to analyze other languages.
Text Analytics has a very broad range where it can be applied, some of the examples of the industries where this can be used are:
- Social Media Monitoring
- Pharma /Biotech Applications
- Business and Marketing Applications
This has been a guide to Difference between Text Mining vs Text Analytics, their Meaning, Head to Head Comparison, Key Differences, Comparison Table, and Conclusion. You may also look at the following articles to learn more – | <urn:uuid:972b08f8-39a0-46d9-860d-65f2e556dd12> | CC-MAIN-2019-35 | https://www.educba.com/text-mining-vs-text-analytics/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317817.76/warc/CC-MAIN-20190823020039-20190823042039-00095.warc.gz | en | 0.916227 | 1,990 | 2.875 | 3 |
Location: Sufi Mediterranean
Presenter: Peter Smith, Bridge Engineer, from T.Y. Lin International
Summary: Caltrans, in partnership with the City of San Diego, completed the seismic retrofit and rehabilitation of the Laurel Street Overcrossing in 2014. This National Historic Landmark, also known as the Cabrillo Bridge, was constructed in 1914 for the Panama-California Exposition of 1915. The bridge crosses the SR 163 Freeway and provides the only access for pedestrians and vehicles into the heart of Balboa Park from the west over Cabrillo Canyon. The bridge was identified for seismic retrofitting and needed rehabilitation to repair corrosion and to improve accessibility for maintenance inspection. Retrofit and rehabilitation work started in 2013 and was completed in time for the 2015 Centennial Celebration of the park. | <urn:uuid:97f4929d-91f2-4e6c-ba7e-f27c46d606a7> | CC-MAIN-2020-50 | http://www.sandiego-ymf.org/blog/archives/11-2015 | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141753148.92/warc/CC-MAIN-20201206002041-20201206032041-00362.warc.gz | en | 0.930753 | 161 | 2.640625 | 3 |
Learn something new every day More Info... by email
Property tax abatement is a decrease in the amount of money owed to a governmental tax authority on a real property tax bill. In most jurisdictions, there are multiple programs that abate property taxes if a person or the property is eligible. An abatement is usually requested by property owners who feel that the tax assessment is too high, given the current value of the property or the owner’s ability to pay. The abatement proceeding pursuant to an owner’s appeal of an assessment is in the nature of an administrative hearing that either grants the requested relief or upholds the assessment.
Countries that allow the assessment of taxes on the private ownership of real property typically give over the right to local jurisdictions where the property is located. These local governments use property taxes to raise money for public projects and services, such as to support the police and fire departments, the public school system, or to build new roads. The amount of the tax bill is a percentage of the market value of the land and its improvements. An official government assessor makes this value determination.
The value determination is based on the market value of the property. This amount is derived by using recent comparable sales of properties. Housing market downturns can decrease the value of property drastically, but the tax assessment never decreases of its own accord to take into account properties that are selling below market. In difficult economic times, owners often proactively request a property tax abatement to bring the tax bill on their property into line with what the property is really worth.
Property tax abatement is an option in most jurisdictions, but it is often difficult to obtain. The request is heard and decided upon administratively without the benefit of the input by common folks who may know from ordinary experience how property values in the area have decreased. Local governments often allow property owners only one shot to present a case for abatement within a certain number of years, so succeeding on the first try is particularly important. Many property owners hire independent tax abatement experts to manage the process and make the case to ensure the highest probability of success.
A local government can also make tax abatements on its own initiative. Sometimes, a jurisdiction will design a public program that uses property tax abatement as a carrot to encourage certain behavior or to help a certain class of people. For instance, the economic development arm of a local government might offer abatements for businesses that locate facilities in a particularly distressed area. A local government could also design a program to keep senior citizens in their homes and might offer an abatement to individuals over a certain age.
One of our editors will review your suggestion and make changes if warranted. Note that depending on the number of suggestions we receive, this can take anywhere from a few hours to a few days. Thank you for helping to improve wiseGEEK! | <urn:uuid:5fbe60fd-9808-4e1f-9da2-fae23bc58995> | CC-MAIN-2014-52 | http://www.wisegeek.net/what-is-property-tax-abatement.htm | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802775221.51/warc/CC-MAIN-20141217075255-00066-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.949655 | 588 | 3.171875 | 3 |
Robust knowledge, to me robust is means a large and solid amount of something and in this case it is describing knowledge. Therefore this knowledge will be very vast and also have validity. Though more importantly, what is consensus and what is disagreement? Consensus and disagreement are easily two sides of a coin. Consensus is an agreement upon an idea by a group of people. While disagreement being a conflicting group of ideas between people. Both may be necessary for robust knowledge or just one
Introduction Knowledge management as the name suggest is separate set of discipline in an organization whose major task is to promote an integrated approach to identify, capture , evaluate, retrieve and share all the information in context of an organization , that is the information which is relevant to the organization. It may include the database of the organization, documents, the set of terms and condition followed in the organization, procedures, and the final records of the organization.
some protection to creators and inventors, this must be limited to benefit society. The utilitarian theory of IP law, the theory I find most compelling, is the ‘guideline that lawmakers’ beacon when shaping property rights.’ Landes and Posner's essay exemplifies this theory, arguing that IP law should protect creations and inventions for the benefit of society. Despite this, I will argue that IP protection has gone too far beyond utilitarian theory, so the term of copyrights and patents ought
1. Introduction 1.1 Background Everyone has heard of or seen of an opera singer breaking glass with his/her robust vocals. From cartoons to Ella Fitzgerald from classical 1970's commercials, the phenomenon between loud, piercing sounds and shattering glass is well known.1 This phenomenon depends highly on the property that is very specific for any material, its natural frequency. The material's natural frequency is the frequency an object will vibrate with after an extrinsic disturbance. These frequencies | <urn:uuid:cd1b182a-f65b-4e93-b177-e1e02b6886bf> | CC-MAIN-2022-21 | https://www2.bartleby.com/essay/Essay-On-Robust-Knowledge-FCRHHHY9E6 | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662594414.79/warc/CC-MAIN-20220525213545-20220526003545-00299.warc.gz | en | 0.944777 | 382 | 2.96875 | 3 |
Solving Ratio and Proportion Problems Part 1
One of the key concepts tested in the Civil Service Exam is ratio and proportion. In this series, we are going to discuss how to solve problems involving ratio and proportion. We first begin below by explaining the meaning and concept of ratio and how to represent it.
Suppose we are cooking, and for every 4 teaspoons of vinegar, we put 3 teaspoons of soy sauce, then we can say the ratio of the volume of vinegar to the volume of soy sauce is “four is to three” and represent it as 4:3. We can also use the fraction 4/3 to represent the ratio above. Now, we discuss more examples about ratio.
In a class, there are 24 girls and 18 boys. What is the ratio of (1) the number of girls to the number of boys and (2) the number of boys to the number of girls?
The number of girls is 24 and the number of boys is 18, so the ratio of the number of girls to the number of boys is 24:18 or 24/18. In contrast, the ratio of the number of boys to the number of girls is 18:24 or 18/24.
In a box of colored balls, there are 5 red balls and 8 blue balls. What is the ratio of the number of blue balls to the total number of balls?
The number of blue balls is 8 and the total number of balls is 5 + 8 = 13. Therefore the ratio of the number of blue balls to the total number of balls is 8:13 or 8/13.
Gemma put 2 teaspoons of sugar for every cup of coffee. Represent the ratio of the number of teaspoons of sugar if there are 6 cups of coffee.
For every cup of coffee, we need 2 teaspoons. Therefore, for 6 cups of coffee, we need 6 times 2 = 12 teaspoons. So, the ratio of the number of teaspoons and 6 cups of coffee is 12:6.
In the three examples above, we have learned how to represent ratio. The ratio A: B means how many times of B is A. For example, the ratio 4:3 means A is 4/3 times of B.
In the next post, we are going to discuss about proportion or equal ratio. | <urn:uuid:53393434-6abc-4239-8faf-c0ac6cbc8d02> | CC-MAIN-2019-18 | http://civilservicereview.com/2016/05/solving-ratio-and-proportion-1/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578759182.92/warc/CC-MAIN-20190426033614-20190426055614-00169.warc.gz | en | 0.929504 | 473 | 3.765625 | 4 |
Canada’s ambassador sent a letter (PDF) to U.S. officials in February warning that an overly broad interpretation of the Energy Independence and Security Act, signed into law in December 2007, could actually prohibit the United States government from importing oil. The law prohibits the import of alternative fuels with higher greenhouse-gas emissions than conventional petroleum sources. Canada points out this might be read to include oil from tar sands, which makes up the bulk of the oil Canada sends to the United States. Canada is the largest single supplier of oil to the United States, thanks in part to the North American Free Trade Agreement (NAFTA).
The concerns raised by the Canadian embassy highlight a looming clash between climate change policy and U.S. commitments to free trade. After years in which the United States declined to take part in the multilateral approach to climate policy, symbolized by the Kyoto Protocol, U.S. lawmakers appear ready to push through climate change legislation. But lawmakers worry about U.S. competitiveness. They want to discourage industries from relocating abroad to avoid climate regulation. They also want to ensure foreign producers don’t get a “free ride” on greenhouse-gas regulations when U.S. industries are forced to comply. Under pending proposals (PDF), U.S. lawmakers are weighing several options that would penalize foreign trading partners if they do not take steps to reduce emissions during the production of commodities for the U.S. market. But the import taxes, labeling specifications, and requirements to purchase emissions permits being proposed are in conflict with the notion of free trade, say some experts. The European Union, in particular, is considering such measures (EurActiv), many of them directed at producers in the United States.
U.S. lawmakers and environmental advocates believe these measures would fall within World Trade Organization (WTO) rules covering environmental standards. But some experts disagree. Although the WTO allows discriminatory actions by members for environmental concerns, such measures must be proved not to be arbitrary, overly onerous, or merely using the environment as a means to erect covert trade barriers. International trade lawyer Bernd G. Janzen says that to date, the WTO’s rulings on these issues offer little in the way of guidelines for U.S. or other policymakers. A report from the National Foreign Trade Council, a U.S.-based trade advocacy group, points to a 1994 WTO ruling (PDF) that prevented the United States from imposing an auto import tax on based on fuel efficiency standards.
Gary Clyde Hufbauer, an economist at the Peterson Institute for International Economics, told U.S. lawmakers earlier this month that almost all environmentally based trade restrictions (PDF) stand a good chance of a WTO challenge. He says such restrictions could spark retaliation on U.S. exports. Sebastian Mallaby, director of CFR’s Center for Geoeconomic Studies, says the potential destabilizing force of green tariffs on existing international trade deals should be assessed before finishing a new round of global trade talks. The U.S. Chamber of Commerce, a powerful proponent of free trade, suggests a better climate policy solution would be liberalizing the trade of clean energy technologies (PDF). The Bush administration and European Union are both pushing for an end to clean-technology tariffs currently imposed by other countries. The administration has also warned against imposing the type of tariffs being proposed in Congress and the European Union.
A number of policy groups, including the Center for American Progress, suggest climate trade restrictions should be policy “tools of last resort.” Instead they suggest engaging countries in multilateral or bilateral climate agreements. A 2008 World Bank report notes that many climate measures focus on production methods and processes (PDF), which it suggests could be crucial to finding a regime that can pass WTO muster. The WTO recently upheld a U.S. ban on imported shrimp trawled without protective measures for sea turtles. In that ruling, the WTO noted that the disputants were all signatories of the same endangered species treaty. Such reasoning, the report says, could be applied to climate and trade policy clashes between nations. | <urn:uuid:d879cf4e-44ba-48be-a6d4-4f184f7a6915> | CC-MAIN-2013-20 | http://www.cfr.org/canada/policy-clash-looms-between-trade-climate/p15715 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703788336/warc/CC-MAIN-20130516112948-00022-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.945805 | 835 | 2.84375 | 3 |
from Wiktionary, Creative Commons Attribution/Share-Alike License
- adj. iliac
from the GNU version of the Collaborative International Dictionary of English
- adj. Iliac.
from The Century Dictionary and Cyclopedia
- Same as iliac, 1.
Sorry, no etymologies found.
The megatherium had wide iliacal expansions due to its semi-erect habits; but as its weight was in great part supported by the huge tail, and as the fermora rested in acetabula placed far forward, the leverage necessary to contract the lower portion of the pelvis was absent. | <urn:uuid:b2062ba4-d1e1-4675-82e0-9ffcc39d0871> | CC-MAIN-2015-22 | https://www.wordnik.com/words/iliacal | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930895.96/warc/CC-MAIN-20150521113210-00035-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.89838 | 136 | 2.515625 | 3 |
The following is a tip from Lynn Byczynski from her book The Flower Farmer, Revised and Expanded: An Organic Grower’s Guide to Raising and Selling Cut Flowers.
One of the tricks to growing flowers organically is to cut them before insects have a chance to destroy their beauty. I learned this the hard way during the first summer I grew sunflowers commercially. The guidelines I had received from various sources said that sunflowers should be cut when about one-fourth of the disc flowers—the tiny flowers in the brown center—were open. But by the time this happened, cucumber beetles had chewed holes in all the petals.
So I started to cut sooner. I harvested the sunflowers when the petals had just opened, and they held fine. But a few beetles were still getting their bites in, so I started cutting earlier and earlier, until I was cutting the flowers before the petals had even unfurled. Those flowers eventually opened in buckets, were just as vibrant as those that had bloomed outside, and were cosmetically perfect.
This trick works well with nearly all the composite flowers, which have large, flat outer petals subject to insect damage. Rudbeckia, cosmos, gaillardia, and tithonia all can be cut early and bloomed indoors. Zinnias, although they are in the same family, aren’t as attractive to insect pests and don’t suffer the same kind of chewing damage, so it’s best to cut them once their blooms fully open. I also have found that some sunflower cultivars are less receptive than others to cutting early, so I recommend that you experiment with a dozen or so of each type that you grow in order to find out just how early you can cut. On the other hand, most of the spike-type flowers (delphinium, larkspur, etc.) can be cut when just one or two flowers on the stem are open. The alphabetical listing of recommended cut flowers in appendix 1 gives specific instructions about the best time to harvest each type of flower, and there you will find many others that can be cut in the bud.
It’s better to cut unopened flowers in the evening, when their stems are full of starches and sugars that will help them continue to open. You also should use floral preservative, which contains about 1 percent sugar. Some preservatives can be used at double strength to prompt buds to open; check the label. You can also make a bud-opening solution that contains 2 percent sugar by adding 5 ounces of sugar to 2 gallons of water. Leave the flowers in this solution in a cool place out of the sun (but not in a cooler) until the flowers open. | <urn:uuid:92609ae3-77b7-4a8c-bad4-c4d6da4eb00c> | CC-MAIN-2017-04 | http://www.chelseagreen.com/blogs/tip-cutting-flowers-early-to-prevent-insect-damage/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284429.99/warc/CC-MAIN-20170116095124-00298-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.973293 | 569 | 2.59375 | 3 |
The University of Rochester Medical Center has a new tool to assess whether a medication might be harmful to the heart. The technology addresses a major health issue – drug toxicity – illustrated most recently by Merck's voluntary withdrawal of Vioxx from the market after concerns that it may cause heart attacks and strokes.
Jean-Philippe Couderc, a biomedical engineer, developed a software program that provides a simpler, more accurate way to analyze the electrocardiograms (EKGs) of people who volunteer for clinical trials to test new drugs. The Food and Drug Administration purchased a copy of the technology, called COMPAS, which stands for Comprehensive Analysis of Repolarization Signal. The university hopes to license the copyrighted software to drug companies and other institutions involved in pre-market drug testing, said John Fahner-Vihtelic, deputy director of the Office of Technology Transfer.
"Our program provides a more reliable method to identify cardiovascular toxicity at a time when the scientific community is diligently seeking ways to address this problem," said Couderc, Ph.D., M.B.A., a research assistant professor in the Cardiology department and assistant director of the Heart Research Follow-up Program. "We are confident that COMPAS will be a valuable tool in the clinical trial and drug development arena."
More comprehensive testing of the heart's reaction to medications is not only important for the success of any new drug, but it became an FDA requirement two years ago. To meet this standard, most companies that design Phase I and II clinical trials require thousands of volunteer subjects to undergo an extensive physical examination, which includes a review of a patient's 24-hour EKG.
The patient's EKG data is loaded onto a computer. Doctors look for abnormalities related to the QT interval. This is the split-second period that occurs from the time a heart beats or contracts, through its recovery phase. Drugs that prolong the recovery phase are of concern, because they can be toxic to the heart.
COMPAS was designed to accurately identify EKG abnormalities, while taking into consideration other factors that may influence a person's heart activity, such as eating, exercise or stress. COMPAS also assesses cardiac drug toxicity by automating the reading process.
Many drugs have been pulled from the market – or the FDA has limited their use – due to the tendency to prolong the QT interval. Usually this occurs, however, after millions of patients have already suffered serious side effects. The list includes antibiotics, weight loss and anti-psychotic medications, heartburn medications, and some cancer and heart disease therapies. (See www.QTdrugs.org for a partial listing.) Therefore, the goal among those who are developing and testing new treatments is to identify the cardiovascular risks to patients at the earliest possible stage.
The Medical Center's Heart Research Follow-up Program is a national and international leader in the science of heart arrhythmias and a rare genetic condition associated with an abnormal QT interval, called the congenital Long QT Syndrome (LQTS). The university keeps an international registry for LQTS, and follows thousands of families who have this inherited condition. The genetic form of the QT prolongation syndrome is similar to the drug-induced syndrome, and Couderc's work focuses on developing the tools to identify individuals with either form.
Source: Eurekalert & othersLast reviewed: By John M. Grohol, Psy.D. on 21 Feb 2009
Published on PsychCentral.com. All rights reserved.
I am a kind of paranoiac in reverse. I suspect people of plotting to make me happy.
-- J.D. Salinger | <urn:uuid:6d613beb-32ee-4e81-97c6-541f50ec30d6> | CC-MAIN-2014-10 | http://psychcentral.com/news/archives/2004-11/uorm-fbt110404.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999652570/warc/CC-MAIN-20140305060732-00098-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.933227 | 751 | 2.984375 | 3 |
Big Data is not an overly sized star trek character or endless storage, but is rather the new currency for IT organizations, that can be analyzed, queried and manipulated to provide a meaningful outcome to almost any analytical question.
And that currency has been paying off big dividends for those organizations with the need and the willingness to dive in. Here are some examples of how the Big Data and Analytics currency is being used today in business environments.
Insurance – Insurance companies have been using risk profiling applications and metrics for decades. A good example of a working model for this industry is credit checking. With the differing sources of data available today (Social, utility based, financial and others), predicting the possibility of credit default, sustainability or even risk profiling for life based insurance policies becomes an awful lot more accurate. Quotations for policies and also credit agreements can be made in minutes not days!
Health – Within the health industry the benefits are obvious. Analysis of healthcare-related Big Data can and does predict the outcome of disease progression, origination and ultimately the outcome of illness within any given subject (correct data supplied). Being fully automated, it eliminates doctor burn-out – working long hours, manually analyzing ever-increasing volumes of data. The increase in efficiency brought by analysis of Big Data will be the catalyst that will drive improved understanding and advancement in medicine like never before.
Retail – The retail market is another great example of using unstructured big data to increase revenue and profitability. Most large retailers understand that location-based data analytics can predict how much product is required per location, what volume of stock is consumed, and why. Not to mention potential future locations of stores based on historical trends and market demand analyses. There is very likely a strong correlation between retail success stories, and the ability of said retailers to leverage their own data effectively.
Of course these 3 examples are probably just some of the most obvious examples of Big Data analytics usage in business, however there are many more in play today. But with the sheer volume of data that’s required to be analyzed how do you do this securely and in a cost effective manner while performing this task……rapidly?
Where Big Data becomes Huge Data at scale
The term Big Data was coined by John Mashey in the 1990s, when the world contained less than 50 exabytes of data. Today, the world contains more than 20 zetabytes of data. The growth in data is so extreme, that using the same terminology somehow minimizes it. So maybe that means that Big Data now must called Huge Data. And naming conventions aside, it will require huge compute power to manage.
You might think that you just have to buy enough hardware, or just leverage a service that does most of this for you. However, you need to think about security when giving access to your currency – a third party may not be the answer.
However, if you are fortunate enough to have a highly resilient, secure and scalable technology within your technical estate now, shouldn’t you use it? If you’re running a mainframe data center, then already you have it – mainframe technology is an ideal candidate to fulfil these needs, and you have already made that investment.
Mainframe technology has evolved over the past few decades to become the defacto universal high-performance computing platform that has adapted to the changes and pace of today’s technical advancements. Faster, more resilient, more powerful, Open Source ready, highly secure and completely scalable – it is a phenomenal piece of tech that’s not only passed the test of time, but adapted extremely well to today’s digital transformation revolution. | <urn:uuid:593c410a-6c0b-4863-bc3e-40f90a2ad7e3> | CC-MAIN-2022-49 | https://planetmainframe.com/2017/11/big-data-true-scale/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711221.94/warc/CC-MAIN-20221207221727-20221208011727-00066.warc.gz | en | 0.951914 | 743 | 2.515625 | 3 |
Reflecting on the 47th anniversary of ‘Loving v. Virginia’ at the Supreme Court
June 12, 2014
Today is the 47th anniversary of the Supreme Court decision in Loving v. Virginia, a landmark ruling that declared bans on interracial marriage in the United States unconstitutional. The Supreme Court ruled unanimously that all Americans should be free to marry the person they love.
The plaintiffs in the 1967 Loving case were Mildred and Richard Loving, a black woman and white man who filed their case to combat Virginia's anti-miscegenation statute, which prohibited interracial marriages.
The ruling has been a touchstone for supporters of the freedom to marry again and again - most recently in many of the 20 consecutive rulings in state and federal court in favor of marriage for same-sex couples.
Perhaps most poignantly, U.S. District Judge Arenda L. Wright Allen cited the Loving ruling when she struck down an anti-marriage constitutional amendment in Virginia in February 2014. Judge Wright Allen, in fact, began her ruling by citing a public statement by Mildred Loving from 2007, the 40th anniversary of her case being decided by the Supreme Court. In that statement, Mildred Loving declared:
When my late husband, Richard, and I got married in Washington, DC in 1958, it wasn't to make a political statement or start a fight. We were in love, and we wanted to be married.
...Not a day goes by that I don't think of Richard and our love, and how much it meant to me to have that freedom to marry the person precious to me, even if others thought he was the 'wrong kind of person' for me to marry. I believe all Americans, no matter their race, no matter their sex, no matter their sexual orientation, should have that same freedom to marry.
...I am proud that Richard's and my name are on a court case that can help reinforce the love, the commitment, the fairness, and the family that so many people, black or white, young or old, gay or straight, seek in life. I support the freedom to marry for all. That's what Loving, and loving, are all about.
In more than 14 cases throughout history, including Loving v. Virginia, the United States Supreme Court has declared marriage a fundamental right. In the Loving decision, the Court wrote, "The freedom to marry has long been recognized as one of the vital personal rights essential to the orderly pursuit of happiness by free men." Read more about the other 13 cases HERE.
Today, as we reflect on the 47th anniversary of the momentous Loving v. Virginia decision, we hope that soon - as soon as next year - we have another landmark marriage victory to celebrate at the Supreme Court. | <urn:uuid:c2d01aa2-4bb9-4273-bf35-e283402d02e1> | CC-MAIN-2017-04 | http://www.freedomtomarry.org/blog/entry/reflecting-on-the-47th-anniversary-of-loving-v.-virginia/www.capturingloveguide.com/blog | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00077-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.963869 | 568 | 2.578125 | 3 |
Sustainability is such a broad and global concept that it can be overwhelming to figure out how to participate. Start by finding an area of sustainability that appeals to you and look for ways to make an impact within it. Sustainability is a community journey, and by doing your part you’re contributing to the whole group.
Reduce, Reuse, Recycle – These three little words are classic when it comes to sustainability and there’s a reason they’ve lasted so long – they work. They are quick and easy ways to create an impact. Start by buying products with less packaging, which helps reduce resource use and waste. Reusing items like water bottles and shopping bags also helps reduce waste. With single-stream recycling and drop-off bins popping up in grocery stores and shopping centers, recycling has become even easier. Any one of these is a great way to start your sustainability journey.
Energy Conservation – Turning lights off, using LED bulbs and utilizing power strips to reduce ghost energy are all easy and effective ways to reduce your energy consumption. Small changes can have a big impact; at Darden we’ve been able to reduce our energy consumption just by adjusting the lighting in our restaurants.
Water Conservation – Water is a precious resource and you can help protect and preserve it by rethinking daily habits like, turning water off when brushing your teeth. Planting native plants and changing the fertilization schedule for your lawn can impact water quality and quantity in your local aquifer.
Animal and Habitat Preservation – Animals have a big impact on our environment. From the pollinators to the scavengers, each one can influence our quality of life and the health of the natural places around us. You can help keep their environments growing strong by participating in lake and habitat cleanups or by planting trees and community gardens. Volunteering at your local nature conservancy is also a great way to get involved.
Wellness – Physical and emotional wellbeing are an important part of living a fulfilling and sustainable life. The health of our community depends on the health of its people. Fortunately, many of the activities that keep you healthy also reduce your impact on the environment. You can increase your physical activity and reduce fuel emissions by leaving the car at home and walking or biking to work or other local destinations, like the grocery store. While you’re there be sure to pick up plenty of healthy fruits and vegetables, which have the added bonus of little to no packaging, so you’re reducing your waste too!
Taking a practical approach to sustainability is important because it should be something that you can continue to do without even thinking about it. Remember that you don’t have to do it all, just as community cleanups and tree plantings go, everyone does their little part and collectively they achieve something beautiful. | <urn:uuid:649a582d-14fb-47a1-b968-b3a8efd6ffef> | CC-MAIN-2019-26 | https://www.darden.com/blog/approaching-sustainability-in-a-sustainable-way | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998581.65/warc/CC-MAIN-20190617223249-20190618005249-00446.warc.gz | en | 0.950712 | 573 | 2.859375 | 3 |
Galway c.1200 to c.1900: from medieval borough to modern city
This pocket map from the Irish Historic Towns Atlas shows historic Galway plotted onto a detailed Ordnance Survey Ireland modern base. Over 200 sites and streets covering 700 years are depicted in colour and listed in an accompanying index. Town walls, bridges, churches, gallows, public buildings, schools, theatres and wells are among the sites shown, many of which no longer survive in the present-day cityscape. An ideal aid for a walking tour of the historic town, the map (940 x 705 mm) is folded to pocket size and accompanied by a booklet with a commentary on the urban development of Galway by authors Jacinta Prunty and Paul Walsh.
The map is based on work in progress for the Irish Historic Towns Atlas of Galway by the same authors, which is due for publication in 2016. Similar maps have been produced by the Irish Historic Towns Atlas project for Belfast, Dublin, Limerick and New Ross.
The Irish Historic Towns Atlas is a research project of the Royal Irish Academy and is part of a wider European scheme. www.ihta.ie.
Authors: Jacinta Prunty, Paul Walsh; Cartography: Sarah Gearty; Series editors: Anngret Simms, H.B. Clarke, Raymond Gillespie, Jacinta Prunty; Consultant editor: J.H. Andrews; Cartographic editor: Sarah Gearty; Editorial assistants: Angela Murphy, Jennifer Moore, Frank Cullen. | <urn:uuid:83aea66a-89fb-4f2b-bd1d-a98725c9ee84> | CC-MAIN-2021-39 | https://www.ria.ie/ga/node/91842 | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057366.40/warc/CC-MAIN-20210922132653-20210922162653-00238.warc.gz | en | 0.905744 | 314 | 3.203125 | 3 |
Alienation and Loneliness
Added to the misfortunes that the speaker of this poem faces is also the pain of knowing that he is facing his trials alone. Society tends to distance itself from sufferers; as the old adage puts it, “Laugh and the world laughs with you; cry and you cry alone.” “Sonnet 29” starts by briefly identifying the source of the problem as “disgrace with Fortune” before settling in to examine the social ramifications of bad luck and the alienation that it causes. The remainder of the first stanza concerns itself with the speaker’s feeling of isolation, a feeling that forces him to withdraw into himself, mostly in anger: he weeps, cries to heaven, and curses fate. The speaker is alone, or so he says, because everyone else thinks badly of him. The next stanza, though, brings up the opposite side of the equation: it is the speaker’s own dark thoughts that are forcing him to distance himself from others. He is jealous, listing the things that others have that he wishes were his own. By its placement in this poem, following the first mention of his isolation, there is a strong suggestion that it is the jealousy he feels, not his bad luck alone, that is at the root of his isolation. The second stanza is presented as an explanation for the speaker’s loneliness, while no such explanation is offered for his bad fortune. The list of things that he envies of others progresses from the shallow to the more serious. He first mentions jealousy toward those who have more money, which is a trait that even the very wealthy may have. In line 6 the poem becomes a bit more specific about what this writer thinks others have that he himself is lacking, specifically good looks and plenty of friends. The third line of this stanza strikes modern readers as a little puzzling or amusing, since the past four hundred years have established Shakespeare as a supreme master of his art, unsurpassed in the scope of his understanding of human nature. The second stanza ends with a line that presents the speaker’s problem as being ultimately one of internal attitude, not external fate: the same things that would satisfy him at other times, he says, just don’t work for him any more. Ironically, the bad mood that he has projected to the outside world, forcing his withdrawal from society, is also broken by a force outside himself: in contrast with the expanding shame that alienates the speaker from most people, one relationship is so strong in itself that it alone can overcome the speaker’s intense loneliness.
(The entire section is 1048 words.) | <urn:uuid:29d0ef05-5d35-4a3a-bad4-bd05a2b651de> | CC-MAIN-2014-15 | http://www.enotes.com/topics/sonnet-29/themes | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609535745.0/warc/CC-MAIN-20140416005215-00379-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.983517 | 548 | 3.34375 | 3 |
Badbury Rings - PHOTOGRAPHER COMMENT
Badbury Rings are a great place to explore, relax and appreciate the surrounding countryside of Dorset. The ramparts are still impressive, steep enough that they are difficult to climb. Paths run along the tops of them. This panoramic image was taken on the path approaching the hill forts.
Badbury Rings - FURTHER INFORMATION
Badbury Rings - Wimborne Minster visitor guide showing a virtual tour of 'Badbury Rings' linked to an interactive map with local and travel information. 360° panoramas from Dorset.
Badbury Rings is an ancient Iron Age hill fort in Dorset, close to both Wimborne Minster and Blandford Forum. Use of the site goes back at least to the Bronze Age (2200BC-800BC), as shown by the presence of 4 Bronze Age round barrows (burial mounds). The hill fort is thought to have been used from about 800BC to around 47AD, the time the Romans invaded Britain. From the top there are commanding panoramic views over the surrounding Dorset countryside, and on a clear day it is possible to see all the way to the Isle of Wight. There are two other panoramas that show the views from the top of the inner rampart and also some sense of the steep trough between ramparts.
Whilst no excavation has been done on the site, there are some signs that circular huts occupied the central part of the fort from the circular depressions in the ground about 3m across. It is thought that the fort may have been occupied by the Durotriges tribe, who also built Maiden Castle near to Dorchester.
Badbury Rings is surrounded by 3 concentric ditches and ramparts. The ditches are up to 7m deep with the excavated earth being piled up to form the ramparts. This provides defensive structures would have reached 40ft (15m) in height, and though 2000 years erosion has reduced this, the ramparts are still impressive today. Each rampart would then have been topped with a palisade to provide further defense. The weakest parts of the structure would have been the wooden gates that provided access between the ramparts. These were built at the same point of each circle, which may have helped every day access, but were often burnt down in a successful attack.
The site also contains the remains of 2 important Roman roads. The large earthwork remains of the road from Dorchester to Old Sarum runs across the west of Badbury Rings. This crosses another road to the north of the site that may have run from Bath to Hamworthy (Poole). The Romans left Britain in the early 5th Century. The area was then invaded by Jutes, Angles and Saxons. Writings by Gildas, a monk at the time, indicate that this advance was impeded for several generations when a fierce warrior named Arthur was the victor in a battle at Mons Badonicus (Mount Badon). It is thought that this location could have been the hill fort at Badbury Rings.
Today Badbury Rings is managed by the National Trust. Entrance is free.
TRAVEL DIRECTIONS AND GETTING THERE
Car: Babury Rings lies on the B3082 Blandford Road which runs from Wimborne Minster to Blandford Forum. The site is about 4 miles for Wimborne, and about 6 from Blandford. Parking available next to the site. | <urn:uuid:8362ad16-474c-4656-8536-6d95eaa319ac> | CC-MAIN-2015-32 | http://www.panoramicearth.com/1143/Badbury_Rings | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990217.27/warc/CC-MAIN-20150728002310-00236-ip-10-236-191-2.ec2.internal.warc.gz | en | 0.963326 | 716 | 2.578125 | 3 |
Making cookies is totally a recipe for fun (pun intended). Consider the “ingredients”—rolling dough, cutting fun shapes, getting messy, and decorating with icing, sugars, and sprinkles—not to mention you get a sweet end product that makes everyone smile long after the kitchen’s been cleaned up. While many parents are being more attentive to sugar intake (especially over the holidays), those vibrant colors that make these delectable confections look so eye-catching should raise a red flag, too.
Did you know that the European Union requires labels on foods containing artificial colors? And that the U.K. called for a voluntary ban on six artificial colors? Artificial food colorings used to dye icing, candies, flavored popcorn, yogurt, cereal, and macaroni and cheese have been linked to many health risks, which children are more vulnerable to than adults, says Christopher Gavigan. According to the Center for Science in the Public Interest, “Commonly used food dyes, such as Yellow 5, Red 40, and six others, are made from petroleum and pose a ‘rainbow of risks.’ Those risks include hyperactivity in children, cancer (in animal studies), and allergic reactions.” Despite these concerns, about 15 million pounds of these petroleum-based dyes continue to be used in food each year in the United States. No warnings. No labels. No nothing.
While common household American brands have replaced artificial colors with natural vegetable dyes in the foods they sell in Europe, here at home it’s up to you to take control of your grocery cart and keep those egregious ingredients out.
How can you still enjoy your favorite treats without the worry?
1. Avoid products that contain names with numbers. Make sure to read labels and pass on products listing Red No. 3, Red No. 40, Yellow No. 5, Yellow No. 6, Citrus Red No. 2, Green No. 3, Blue No. 1, and Blue No. 2.
2. Head to the produce section and the spice aisle. Pick up organic vegetables, fruits, and spices that can be used to color frosting and foods naturally—plus they offer the health benefits of cancer-fighting antioxidants.
3. Believe it or not, look for products that say color added. Milton Stokes, M.P.H. and R.D., shares in an Eating Well article, “Counterintuitively, the terms ‘artificial color,’ ‘artificial color added’ or ‘color added’ also indicate that nature-derived pigments were used since synthetic dyes must be listed by their names.”
4. Try these easy recipes for natural food coloring:
5. Join Healthy Child Healthy World in petitioning brands to remove fake dyes from their snacks.
Whatever recipes you choose, remember to have fun! And, go ahead, get a little messy—it’s nothing a little Honest bubble bath won’t take care of! | <urn:uuid:a0d1caa6-0377-44da-b9d9-bf3709fa7394> | CC-MAIN-2017-51 | https://blog.honest.com/5-ways-to-avoid-risky-artificial-food-dyes/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948579564.61/warc/CC-MAIN-20171215192327-20171215214327-00787.warc.gz | en | 0.939826 | 628 | 2.921875 | 3 |
In an effort to improve the numbers of Yellowstone Cutthroat Trout, Game and Fish officials are killing fish.
Wyoming – The Yellowstone Cutthroat Trout has been in decline for a number of years. In 2001, environmental groups cited decreasing numbers of the trout in an attempt to get it listed as an endangered species. In 2006, the U-S Fish and Wildlife Service declined to list the trout as endangered saying that a number of conservation efforts were being undertaken to restore the fish. One of those efforts is being headed up by the Wyoming Game and Fish department. To the casual observer, the strategy might seem a bit unusual. Wyoming Public Radio's Bob Beck reports. | <urn:uuid:b69b59c8-f986-4f06-ae0d-5f483c9d7181> | CC-MAIN-2014-52 | http://wyomingpublicmedia.org/post/effort-improve-numbers-yellowstone-cutthroat-trout-game-and-fish-officials-are-killing-fish | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802777118.12/warc/CC-MAIN-20141217075257-00108-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.962501 | 136 | 2.6875 | 3 |
Gold Digging in Colombia: Mining Throughout Latin America
• Mining is an important source of foreign investment and development
• Rural populations are among the prime losers in mining operations
• Environmental protection is no match for multinational greed
• Governments are selling out their citizens
In the 16th century, the Spanish conquistadors were drawn to the Americas by a quest for riches; in their pursuit they were soon exploiting the land of its resources. Today, remarkably little has changed. Like the conquistadors, foreign companies today are seeking the fabled deposits of ores and minerals found in the western cordillera, the Andes chain. Mining technology has dramatically changed since the Spanish first reached South America: hand-dug tunnels have been replaced by open pits, and pickaxes supplanted by heavy machinery, explosives, and gargantuan dredgers. These mining methods, at times taking place in the heart of the Amazon, have had devastating consequences for the surrounding environment and local populations. In this respect, Colombia has become a poster child for irresponsible mining practices.
Currently, South America has more mining exploration than any other area in the world. 38% of global investment in metallurgical prospecting goes to South America, as well as 27% of all gold exploration. The area is particularly appealing to foreign investors because it contains a huge supply of cheap labor and because its mineral reserves are relatively untouched compared to the rest of the world. Although metal prices slumped from 2006 to 2009, they have since surged and we are now witnessing mining companies scrambling to invest. Analysts predict that in 2011 and 2012 alone, at least USD 29 billion of mining investment will be funneled into the two mining leaders of the area, Chile and Peru. In Colombia, the mining sector constituted 4.5% of GDP and provided 24.8% of the country’s total exports, or USD 7.3 billion dollars, in 2009. Mining continues to be a significant source of foreign investment and resource development for Colombia and the South America region.
Illegal Mining in Rural Colombia
Colombia’s rural population has been born into a system that continuously places their lives and welfare at a disadvantage and has perpetuated predictable intergenerational bouts of poverty. This system is being exacerbated by a longstanding tradition of questionable mining processes practiced by both domestic and foreign-owned operations. Former President Álvaro Uribe encouraged “Seguridad Democrática”, a policy that sought to lower crime and to dismantle the Fuerzas Armadas Revolucionarias de Colombia (FARC) guerillas as well as the former right-wing vigilante organization, Autodefensas Unidas de Colombia (AUC). As it turned out, the decrease in crime rates, while impressive, pertained mainly to the population living in urban areas. As paramilitary groups and guerrilla fighters were pushed out of urban streets, they subsequently relocated to the relatively un-policed, dirt roads of rural Colombia.
Despite a 63% drop in kidnappings during Uribe’s first term and a 40% decline in assassinations and “disappearances” at the hands of the AUC, the rural population remains at high risk. Nowadays, illegal gold mining is helping to fund the FARC and surviving vigilante groups, fueling the plight of rural people. These illegal mines do not follow worker safety regulations and the land is often forcefully taken before it is exploited. Since Santos came into office, the government has shut down 56 illegal mines and 573 people have been arrested, but the problem persists and lawmakers are still investigating strategies to counteract illicit operations.
Canada and Mining Multinationals in Colombia
As the fifth largest coal exporter in the world, Colombia depends on mining for employment. Small mining towns, such as Marmato in the Caldas region of northeastern Colombia, historically have participated in ‘subsistence’ mining – small mining operations that produce just enough income to survive. This type of extractive mining does not create environmental hazards like the large-scale mining practices followed by international corporations. Additionally, because the environment is preserved through smaller, less obtrusive operations, subsistence mining is generally more beneficial for local populations than its corporate counterpart because it usually creates long-term employment. “El Burro,” a mountain located in Marmato, has characterized the local people, shaping the history of the town since before the Spanish encounter of the Americas.
But a big change is in the making. In less than 20 years, Colombia Goldfields Ltd. (a deceptively named Canadian company) will unravel the fiber of mining culture in Colombia. Open pit operations, the preferred practice of most resource-processing transnational corporations, excavate the ground of rock and soil in order to extract the desired mineral. However, the process does not favor the work of individuals, but rather the systematic use of explosives to get the job done. As the open land of the community is progressively bought up, and subsequently blown-up, the inhabitants are forced to find jobs and obtain scarce housing from the neighboring areas. Those who remain are often forced by the job shortage to participate in certain informal sectors of the economy; locals note that prostitution and crime inevitably increase after the mining companies move in. The results tend to be that residents are economically displaced while foreign economies reap the benefits of local natural resources.
While some miners may retain their jobs for long periods of time, the conditions in which they work are typically treacherous and the companies that employ them rarely adhere to international or domestic labor standards. One company, Carbones de Cerrejón, has been accused of causing mine-related illnesses in over 20 percent of its labor force due to poor working conditions. The company, now a joint corporation called Cerrojón Coal Company involving Anglo American, Glencor International and BHP Billiton, was also cited as having bulldozed the town of Tabaco in August 2001. The new mining site was located on reservation land of the Wayuu indigenous group, requiring the forceful evacuation of 700 residents by 500 soldiers and 200 police backing the mine owner. The town leveling destroyed a clinic and a cemetery, with the town’s people having no opportunity to retrieve their belongings. Cerrejón expanded in June 2004 and pushed out even more indigenous Wayuu and Afro-Colombian communities. Sintracarbon, a coal mining union, attempted to protect the displaced groups, but received menacing calls from paramilitary groups threatening bodily harm and extortion of some of their assets.
Last May, the Permanent People’s Tribunal (TPP) in Madrid attempted to shed light on this situation by putting the corporation on a “people’s” trial. The function of the group was to bring attention to crimes against humanity and the environment for which justice, legal action, or compensation have not been successfully sought. Unfortunately, the tribunal received scant media coverage and the indigenous and Afro-Colombian groups ultimately received no compensation.
Gold Mining and the Colombian Environment
While all types of mining can bring hardship to miners and rural communities, gold mining has been cited as the “dirtiest” and most environmentally hazardous mining process. Since gold prices reached an all-time high in December, renewed attention is being paid to the yellow mineral. Mining operations in Colombia inflict especially severe consequences on local ecosystems, as the Amazon and surrounding rainforests possess some of the highest levels of biodiversity in the world. But the government is eager to exploit its gold reserves because of the attractive numbers that accompany them: according to the Miner’s Association of Colombia, Asomineros, gold mining could attract USD 3.3 billion in investment in just a few years. As is often the case, this lucrative enterprise comes with enormous environmental cost that is often being blithely shunted aside.
In an area of the eastern Andes of Colombia named the páramos, huge ecological value is being ignored and mining operations under the Canadian company, Greystar Resources, are in their initial stages. The regulation of mining seems to make little difference – the Colombian constitution requires areas of ecological importance to be protected, and mining in the páramos is specifically banned in the Mining Code, a set of legislative regulations pertaining to mining. But the projected mine in the páramos holds a tempting 10.2 million Troy ounces of measured gold reserves, and Greystar has planned investments of USD 600 million in this particular site. The need to develop Colombia’s resources and create jobs has, not surprisingly, trumped and effortlessly overwhelmed ecological concerns.
What exactly is at stake if gold mining companies are allowed to work in the páramos? Environmentally speaking, the ramifications are huge. The páramos have high levels of biodiversity and are home to various endangered species as well as flora and fauna found only in that area. Additionally, the páramos are a massive collection center for precipitation that eventually turns into ponds and lakes, providing needed water for the local ecological systems and human populations. The unique soil of the area is also particularly adept at storing carbon, an important tool in fighting climate change caused by greenhouse gases. The páramos provide important services for humans and ecosystems that must be protected.
Modern mining techniques can be extremely harmful to the environment because of the nature of the equipment and chemicals used during the mining process. Greystar practices open-pit mining, which will require approximately 1,100 hectares of land to be removed for this particular project. The surrounding habitats of the páramos will be literally erased and the natural systems destroyed. Gold mining also requires huge amounts of water –Greystar’s operations will use approximately 250,000 liters of water every hour during the leaching (extracting) process. This water will be diverted from natural water sources, depleting ground water and lessening river supplies for the 2.2 million people in the surrounding area who rely on them. Lack of ground water can deplete the nutrients of and physically weaken surface soils, further damaging the natural ecosystems. Even more worrisome is that sodium cyanide will be used – about 500 milligrams per liter of water –in the extracting process. While sodium cyanide may be preferable to mercury – another substance that is commonly involved in extracting gold – its use still risks contaminating local drinking water. Exacerbating this risk is the poor and inadequate infrastructure in the mountains that may make transporting the chemical safely a challenging task. Sodium cyanide may also evaporate and return to the soil in the form of acid rain, which could appear miles away and affect areas with no connection to the mining operations.
Greystar argues that its gold mine will not damage the surrounding environment –a conclusion supported, not surprisingly, by the company’s own environmental study – but many Colombian government officials disagree. The environmental authority from the nearby city of Bucaramanga opposes the project, and the federal official appointed to investigate the complaints against Greystar has recommended the government withhold an environmental license for the project. By law, Greystar is also required to consult local communities before they begin mining. With assurances of jobs and other community benefits, Greystar has easily won over the support of local residents, if not government officials.
But the community might well serve itself by exercising caution in giving its approval so readily. Hundreds of miles away, in the western Colombian Andes, there is a town that has a strikingly similar story. In 2006, a South African mining company moved in on gold reserves in the town of Cajamarca that, like the páramos , should have been barred from mining operations because they were located in a forest reserve established in 1959. It also held important water supplies, and, like in the páramos, the locals were initially excited to have new industry and well-paying jobs in the area. But the excitement soon faded in late 2007 when they realized the effects that mining would have on the surrounding environment. The mining operations in Cajamarca have been suspended ever since because of local opposition, and the community is still fighting the resumption of mining today. They offer an example that residents of the páramos should take note of – that foreign mining companies might come with lavish promises of improved living standards and jobs, but these will not mitigate the permanent damages that accompany open-pit mining.
While the government deliberates on whether it will grant an environmental license or not, Greystar’s operations are on hold. If the government rejects their request for a license, the Canadian company may alter the project to be underground rather than an open pit, which would decrease its environmental impact. But Greystar is only one example of negligent practices on the sometimes sordid Colombian gold mining scene.
More troubling is the popularity of illegal gold mining, which encourages avoidance of environmental regulation completely. Illegal mines are known for utilizing chemicals carelessly and contaminating water and soil. While the Colombian government has made great efforts to shut down these illegal mines, the overall task of properly balancing the economy and the environment persists.
The Economics of Colombian Mining – is it Helping or Hindering?
Former President Uribe certainly encouraged foreign direct investment in Colombia. Before he left office in 2010, the number of hectares with mining concessions had increased eight-fold, showing his determination to stimulate the mining sector. But, as with many of his policies, this investment strategy had limited success. Foreign mining companies, like Greystar Resources and Colombian Mines Corporation, have dominated the Colombian economy while profits from natural extraction have inexorably gone abroad. When multinational corporations move into a country, they do so because the host country believes that the corporation will benefit the people by providing badly needed infrastructure and employment. In the case of Colombian Mines Corporation, a Canadian multinational operating in Colombia, they buy up mines in rural towns with the promise of offering employment. The reality is that the mining operations offer only short-term employment, displace the dwellers who had previously lived on the land, and leave behind a tell-tale crater where a community once stood. The often ephemeral financial benefits brought on by the mining industry are reflected in the Colombian gross domestic product because the extraction takes place within the nation’s borders. However, the profits from the business actually factor into the Canadian gross national product rather than the Colombian, which economically is seen as the true measure of wealth. Thus, multinationals invest their capital into other countries, mine their resources over a finite number of years, displace the local people and disrupt their economies, all for the gain of the exporting country at the expense of the host.
Mining Throughout Latin America
Colombia is not the only nation to fall victim to the lethal price exacted by mining. Although the prevalence of specific mining hazards varies from country to country, most Latin American mining nations have witnessed the inevitable scars of poor labor standards, social disruption, and environmental degradation.
In Bolivia, the mining situation is dominated by multinationals that displace and exploit inhabitants as cheap local labor. Potosí is such a mining city, known previously for its copious amounts of silver that eventually reached Spain after being carried across the Isthmus of Panama. In the 1600s, the city’s population was larger than that of Paris and it was the jewel of the Spanish Empire . Today, silver, zinc and tin are being mined there. Despite child labor laws in Bolivia, 10% of the miners in Cerro Rico, the largest mine in the country, are under 18 years old. Additionally, the majority of them are indigenous Quechua men and boys. Within ten to thirty years they are usually affected by a mine-related illness, which leads to health complications and in certain cases, death. There is no compensation for their families. The government has not yet intervened, but the United Nations Refugee Agency (UNHCR) has taken notice of the exposed nature of the population. Unfortunately, the effort to keep children in school and their families healthy has not gone further than this.
Conversely, the mining situation in Chile has been cast in an ill-deserved positive light given the recent rescue of 33 miners from a mining shaft after being trapped for ten weeks. Despite this apparent success, one month before the miners were rescued, the owner of the San Sebastian Group declared bankruptcy, posing a threat to any compensation that would be offered to the 33 trapped and 300 other unpaid workers. This is not the first time the San Sebastian Group has been scrutinized as the result of an accident. Their mining sites were more dangerous than the average Chilean mine due to a labor code established in 1980 under the brutal dictator, Augusto Pinochet. The strongman’s free market policies eradicated labor rights for working class Chileans. Current President Sebastian Piñera claims that “not only in the mining sector; we are revising our standards in many other sectors in order to guarantee that we are doing our best in terms of protecting lives, health, and integrity of our workers.” However, the Pinochet-era labor laws are still in effect.
In Peru, the fourth largest gold producer in the world, mining has produced the same problems and challenges. At Yanacocha, the largest gold mine in Latin America, the indigenous people have protested adamantly against further expansion of the mine because of the negative effects it has had on their environment and society. Since mining began in Yanacocha, local residents say, poverty has gone up, an increasing number of inhabitants have been forced to move out of their homes, and indigenous cultural practices have diminished. These results are not specific to Yanacocha – Peru has seen a general trend whereby mining operations have been followed by poverty, environmental degradation, prostitution, and health problems. This is exacerbated by the fact that about one quarter of Peruvian gold is produced illegally, which means health and environmental regulations are slim to none.
In Brazil, a primary consequence of gold mining has been mercury contamination of soil and water and mercury poisoning among workers. In a survey of Brazilian miners, roughly 30% had mercury levels above World Health Organization (WHO) standards. High levels were reported in those who lived near gold refining areas as well. In a field survey of Amazonian waters adjacent to gold mines, edible fish contained mercury levels over five times the Brazilian standard that is safe for consumption. Often, miners are uneducated about the severe health effects of mercury and do little to protect themselves. The Brazilian government has made minimal efforts to address these health dangers.
The only sure way to avoid the social and environmental destruction that all too often accompanies open-pit mining would be to completely discontinue the practice. Many cite eco-tourism as a way to “exploit” the natural resources of ecological treasure troves and the folklore appeal of rural communities without destroying them. These are the suggestions of idealists and they will not likely ever come to fruition. However, there are several ways mining practices could be modified to improve health standards and reduce damage to the environment.
The first priority should be to crack down on illegal mining operations, which do not respect any regulations and are not held accountable for pollution or on-site accidents. A second priority should be better education for miners on health hazards and how to minimize environmental damage; often, miners have no idea that they are working with toxic chemicals. For example, one Peruvian miner interviewed by the BBC was under the belief that mercury exposure had cured his heart condition. Such potentially fatal misconceptions could be easily corrected with better education. Miners should also be instructed in proper clean-up and disposal methods of the chemicals they are using. Another way to mitigate environmental damage would be to opt for underground shaft mines, which are by no means eco-friendly, but are distinctly less harmful than stripping the land with open-pit mines. Latin American governments need to step up enforcement of labor and environmental standards and not let tantalizing foreign investment corrupt their integrity or their vision of what is best for their local communities.
In addition to requiring environmental licenses to engage in mining pursuits, companies should be required to obtain “community licenses.” That is, they need to develop plans for working with locals to maximize local employment, provide proper compensation for displaced peoples, and diminish the impact of baleful damages to the area. On a larger scale, governments should consider renegotiating contracts with foreign companies to provide tougher restrictions in order to retain better control over their own resources. Until they do this they will not only continue to send the benefits of their own natural resources to other countries, but profoundly injure their own people in the process.
References for this article are available here. | <urn:uuid:bbbd5c34-4c0a-4a7c-badc-f4da9b2d6df1> | CC-MAIN-2015-22 | http://www.coha.org/gold-digging-in-colombia-mining-throughout-latin-america/comment-page-1/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927245.60/warc/CC-MAIN-20150521113207-00270-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.960419 | 4,207 | 2.84375 | 3 |
The key to better health is always to be creating a lifestyle based on moderation. It is critical to eat a balanced and nutrient rich diet, exercise and manage your daily stress.
Diabetes occurs in the body when cells that typically respond to insulin become insulin resistant. Insulin is a hormone that communicates with cells, telling them to allow glucose (blood sugar) to enter. If glucose cannot enter the cells, it builds up in the blood stream and begins to damage tissues and organs throughout the entire body. This type of damage leads to cardiovascular disease, kidney disease, vision damage and nerve damage or neuropathy.
Insulin can either be used by the body for energy, or it can become stored as fat for later use. What is amazing about the chemistry in your body is that it reflects and mimics your daily habits. This is the key to understanding that living a sedentary life creates a sedentary environment in which your body is trying to function. If you are unable to manage stress, neither can your body. It begins to produce excess levels of cortisol to help your body manage the effects of stress. Cortisol causes your body to store extra amounts of fat for energy during these times of distress. This is the fat that is found in the belly, the most dangerous kind of fat you can carry. This type of belly fat is directly related to heart disease.
You can reverse your Type 2 diabetes diagnosis!! In as little as one week, you can make the lifestyle changes necessary to promote the pancreas to start working efficiently, to begin to normalize your blood sugars, and to increase your body’s cells to become more insulin sensitive.
Weight Loss: Losing just 5 to 10 percent of body weight can drastically lower blood sugar levels and reduces insulin resistance. This also has the added benefit of decreasing your risk for cardiovascular disease.
Eat Healthy: Eat whole foods rich in nutrients and fiber. Stay away from refined carbohydrates and those foods that affect your glycemic index, like white flour in breads and pastas, sugars, potatoes, and processed foods. Avoid saturated and Trans fats. Eat a heavily plant based diet of vegetables, beans, nuts, whole grains, berries, and lean proteins.
Exercise: This is one of the very best things you can do for diabetes. Exercise encourages your muscles and liver to take in glucose, lowering the blood sugar levels in your body. Exercise will decrease insulin resistance, regulate your blood pressure, reduce stress and help you sleep! Find something you love to do! Go for a brisk walk, ride your bike, put on a fun DVD workout dance video. Get excited about building muscle and becoming fit! You have the power to change your body! Get moving today!
Manage Stress: Stress hormones increase blood sugar levels. This is the time to meditate, breathe, try yoga, and get out in the garden, read a book, or exercise. Take time in your day to unwind and do something just for you. Feed your soul!
Supplements: Cinnamon is fantastic at regulating blood sugar. Those who take 1-6 grams of cinnamon a day reduce their blood sugars by 24%. Alpha Lipoic Acid (ALA) is the antioxidant in your body responsible for converting glucose into energy. It also protects your nerve cells from damage. Vitamin C in a mineral form is a powerful antioxidant carried in insulin that helps to maintain blood sugar. GTF Chromium is essential for carbohydrate and fat metabolism. People with low levels of GTF Chromium have increase insulin sensitivity. Vitamins B6 and B12 protect the cells against nerve damage and neuropathy.
For additional and more in-depth information on Type 2 diabetes please join us for our class on Saturday, April 9th @ 10AM. | <urn:uuid:1bec342e-fd29-4bcd-9275-574149473a10> | CC-MAIN-2018-51 | http://www.wonnampa.com/wonedu/april-2016-managing-reversing-type-2-diabetes | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825123.5/warc/CC-MAIN-20181214001053-20181214022553-00587.warc.gz | en | 0.932418 | 762 | 2.9375 | 3 |
(a) The control system must be investigated as follows for control surface loads due to ground gusts and taxiing downwind:
(1) If an investigation of the control system for ground gust loads is not required by paragraph (a)(2) of this section, but the applicant elects to design a part of the control system of these loads, these loads need only be carried from control surface horns through the nearest stops or gust locks and their supporting structures.
(2) If pilot forces less than the minimums specified in § 23.397(b) are used for design, the effects of surface loads due to ground gusts and taxiing downwind must be investigated for the entire control system according to the formula:
H=K c S q
H=limit hinge moment (ft.-lbs.);
c=mean chord of the control surface aft of the hinge line (ft.);
S=area of control surface aft of the hinge line (sq. ft.);
q=dynamic pressure (p.s.f.) based on a design speed not less than 14.6 √(W/S) 14.6 (f.p.s.) where W/S=wing loading at design maximum weight, except that the design speed need not exceed 88 (f.p.s.);
K=limit hinge moment factor for ground gusts derived in paragraph (b) of this section. (For ailerons and elevators, a positive value of K indicates a moment tending to depress the surface and a negative value of K indicates a moment tending to raise the surface).
(b) The limit hinge moment factor K for ground gusts must be derived as follows:
Position of controls
Control column locked lashed in mid-position.
Ailerons at full throw; moment on one aileron, − moment on the other.
(c) Elevator full up (−).
(d) Elevator full down ( ).
(e) Rudder in neutral.
(f) Rudder at full throw.
(c) At all weights between the empty weight and the maximum weight declared for tie-down stated in the appropriate manual, any declared tie-down points and surrounding structure, control system, surfaces and associated gust locks, must be designed to withstand the limit load conditions that exist when the airplane is tied down and that result from wind speeds of up to 65 knots horizontally from any direction.
[Doc. No. 4080, 29 FR 17955, Dec. 18, 1964, as amended by Amdt. 23-7, 34 FR 13089, Aug. 13, 1969; Amdt. 23-45, 58 FR 42160, Aug. 6, 1993; Amdt. 23-48, 61 FR 5145, Feb. 9, 1996]
Title 14 published on 2014-01-01
no entries appear in the Federal Register after this date.
This is a list of United States Code sections, Statutes at Large, Public Laws, and Presidential Documents, which provide rulemaking authority for this CFR Part. | <urn:uuid:d10c6f4e-79c9-4d96-a1c7-9d54443650da> | CC-MAIN-2014-15 | http://www.law.cornell.edu/cfr/text/14/23.415 | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223205375.6/warc/CC-MAIN-20140423032005-00091-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.86512 | 635 | 2.609375 | 3 |
Economic and Social Council
1. During the past three years the people living in the territory of the former Yugoslavia have been suffering the most serious and systematic violations of human rights and humanitarian law in Europe since the Second World War. As a result of the policy of "ethnic cleansing", millions of human beings of various ethnic origins have been forced to leave their homes, hundreds of thousands have been killed and tortured, and tens of thousands have been reported as missing. They disappeared in the course of armed conflict or as targets of "ethnic cleansing" operations, carried out by military or paramilitary forces, by the police or civilians. They left behind their parents, spouses or children, deprived of any information as to whether they are buried in mass graves or still kept in secret detention. After years of searching in vain, living between hope and desperation, families often prefer to have certainty about the death of their relatives rather than to continue to live in that type of uncertainty which arises in the case of a missing person.
2. In the former Yugoslavia, two major situations of missing persons and their relatives have to be distinguished, namely in the Republic of Croatia and in the Republic of Bosnia and Herzegovina. In Croatia, most of the disappearances occurred during the armed conflict between the Yugoslav National Army (JNA) and Croatian forces in the autumn of 1991, most notably in Vukovar after that city was besieged and seized by the JNA and Serbian paramilitary forces. Of the more than 13,000 persons who were originally reported missing in Croatia, many were released in the course of prisoner-of-war exchanges, or their whereabouts have been clarified in other ways. However, the fate of more than 2,700 persons remains unknown, despite numerous attempts to clarify their whereabouts undertaken by their relatives, by associations of family members and other non-governmental organizations, the Croatian Red Cross, the International Committee of the Red Cross (ICRC) and the Government of Croatia.
3. In Bosnia and Herzegovina, the first wave of disappearances occurred during the armed conflict and "ethnic cleansing" operations in the spring and summer of 1992. Since these operations are continuing in many areas of Bosnia and Herzegovina, the number of missing persons continues to rise. Estimates run up to 20,000 persons, but nobody knows the exact size of the tragedy. Owing to the ongoing hostilities, relatives are not well organized, and family members, out of fear of reprisal, often do not dare to submit reports on missing persons. Tracing activities concern both government and de facto authorities and the question of missing persons often plays a role in the political negotiations of the parties involved.
4. Already in his first report to the Commission on Human Rights dated 28 August 1992, the Special Rapporteur on the situation of human rights in the territory of the former Yugoslavia, Mr. Tadeusz Mazowiecki (hereafter referred to as the Special Rapporteur), recommended the establishment of "an investigative commission, under the auspices and in cooperation with the competent United Nations bodies, vested with the task of determining the fate of the thousands of persons who disappeared after the seizure of Vukovar as well as of other persons who disappeared during the conflicts in the former Yugoslavia" (E/CN.4/1992/S-1/9, para. 67). He added that the Working Group on Enforced or Involuntary Disappearances of the Commission on Human Rights (hereafter referred to as the Working Group) might be called upon to advise and assist in that regard.
5. In fact, already in 1992, more than 11,000 cases of disappearance in the former Yugoslavia were reported to the Working Group by non-governmental organizations. As the Working Group's mandate does not cover international armed conflicts, these cases were not taken into consideration, and the Working Group sought guidance from the Commission at its forty-ninth session as to how to proceed with these cases (E/CN.4/1993/25, para. 36).
6. On 23 February 1993, the Commission on Human Rights adopted resolution 1993/7, entitled "Situation of human rights in the territory of the former Yugoslavia", in paragraph 33 of which it requested the Special Rapporteur, in consultation with the Working Group and ICRC, to develop proposals for a mechanism to address the subject of disappearances in the former Yugoslavia. Accordingly, after respective consultations, in August 1993, a member of the Working Group, Mr. Toine van Dongen, carried out a visit to the Republic of Croatia and the Federal Republic of Yugoslavia (Serbia and Montenegro) in order to study the issue and determine which mechanism might be proposed with a view to elucidating the fate and whereabouts of the missing persons.
7. In his report (E/CN.4/1994/26/Add.1), discussed in September 1993 with the Working Group and the Special Rapporteur, Mr. van Dongen proposed the establishment of a "special process on missing persons in the former Yugoslavia", implemented as a joint mandate of the Special Rapporteur and one member of the Working Group, entrusted with the task of dealing with all cases of missing persons in the territory of the former Yugoslavia, regardless of whether the victim was a civilian or a combatant or whether the perpetrators were connected to the Government or not. The proposal to establish a special process was fully endorsed by the Working Group (E/CN.4/1994/26, para. 43) and the Special Rapporteur (E/CN.4/1994/110, para. 208) in their respective reports to the Commission. The Special Rapporteur added his conviction that the United Nations was under an obvious obligation to act more effectively with respect to cases of missing persons in the area.
8. The Commission on Human Rights in paragraph 23 of resolution 1994/39, entitled "Question of enforced disappearances", took note with interest of that proposal. In paragraphs 23 and 24 of resolution 1994/72 on the situation of human rights in the territory of the former Yugoslavia, the Commission urged all parties and, in particular, the Governments of Croatia and the Federal Republic of Yugoslavia (Serbia and Montenegro), to cooperate in determining the fate of thousands of missing persons by disclosing all information and documentation in order finally to locate such persons and alleviate the suffering of their relatives. Noting in this context the proposal on the special process, it requested the Working Group, represented by one of its members, to cooperate as appropriate with the Special Rapporteur in dealing with that issue. In compliance with this provision, the Chairman of the Working Group nominated Mr. Manfred Nowak, in the capacity of expert, to carry out this task.
9. The present report discusses the mandate and methods of work of the special process, the activities of the expert undertaken during the first half year of his mandate, the situation of missing persons in the Republics of Croatia and Bosnia and Herzegovina on the basis of individual cases he has received and processed, and his conclusions and recommendations as to how to determine in a more efficient manner the fate and the whereabouts of the thousands of missing persons in the territory of the former Yugoslavia.
10. The special process on missing persons in the territory of the former Yugoslavia is the first special mechanism established by the Commission on Human Rights which is of both a thematic and a country-specific nature. It has been developed as a response to the extraordinary nature, both in qualitative and quantitative terms, of the problem of missing persons in the area. As the Working Group has repeatedly pointed out, its methods of work "are not really geared to handling situations of the size and nature of the one in the former Yugoslavia", and it "could not be expected to devise special working methods to meet the requirements of one particular situation, however important" (E/CN.4/1993/25, paras. 41 and 42).
11. When establishing the special process, the Commission on Human Rights explicitly referred in its resolutions 1994/39 and 1994/72 to the proposal of the Working Group as contained in the report of Mr. van Dongen. The expert, therefore, bases his methods of work on the framework for action recommended by Mr. van Dongen (E/CN.4/1994/26/Add.1, paras. 23-87) and endorsed by the Working Group and the Special Rapporteur.
12. The methods of work follow those of the Working Group and are adapted to the specific needs resulting from the situation in the former Yugoslavia. In summary, the methods of work may be described as follows:
(a) The special process takes a strictly humanitarian, non-accusatory approach with the sole aim of clarifying the fate and whereabouts of missing persons in the territory of the former Yugoslavia;
(b) The special process functions as a channel of communication between the relatives of missing persons or other sources of information and those who may provide information on the whereabouts of missing persons, whether they are allegedly responsible for the situation or not. Its role ends when the fate and whereabouts of the missing person have been clearly established. The expert does not concern himself with the question of determining the responsibility of the alleged perpetrators for the phenomenon of missing persons;
(c) All cases of missing persons in any part of the former Yugoslavia are subject to the special process, i.e. also cases resulting from a situation of armed conflict, both of an international and non-international character. This is a major difference from the working methods of the Working Group, which does not deal with situations of international armed conflict. This difference follows from the complexity of the situation in the former Yugoslavia and was one of the major reasons for establishing the special process;
(d) The target group of the special process is, therefore, much broader than the "disappeared persons" dealt with by the Working Group and defined in the preamble to the Declaration on the Protection of All Persons from Enforced Disappearance (General Assembly resolution 47/33 of 18 December 1992). In particular, not only civilians but also combatants involved in an armed conflict are considered. Therefore, the special process uses the wider term "missing person";
(e) In principle, the special process deals with all cases of missing persons, regardless of whether the perpetrators are in effect connected to government authorities or not. Only cases that are clearly the result of common crime are excluded;
(f) It follows from the general approach of the special process that the expert submits individual cases to both the Government and de facto authorities involved at the national, regional or local levels. In addition, the expert draws on other available sources of information, including national Red Cross Societies and other institutions involved in tracing activities, military authorities, as well as United Nations agencies, such as the Office of the United Nations High Commissioner for Refugees (UNHCR) and the United Nations Protection Force (UNPROFOR). This is another major difference from the methods of the Working Group, which deals exclusively with national Governments. As has been pointed out in Mr. van Dongen's report, in the context of the former Yugoslavia the traditional method of the Working Group would be a "self-defeating approach" (E/CN.4/1994/26/Add.1, para. 74). Contacts with de facto authorities are, of course, of a strictly humanitarian nature and must therefore not be interpreted as implying any kind of official recognition by the United Nations;
(g) In order not to put the relatives of missing persons at risk of reprisals, interlocutors such as associations of family members should, wherever possible, act on behalf of the relatives concerned and, as a rule, the identity of sources remains confidential;
(h) In principle, the minimum elements of information necessary for registering and transmitting individual cases are the same as those required by the Working Group, i.e. the name and other distinguishing criteria of the missing person, date and place of disappearance, forces allegedly held responsible and steps taken to determine the fate or whereabouts of the missing person. In the context of the situation in the former Yugoslavia, these admissibility criteria must, however, be applied in a flexible and pragmatic manner. Tabulated lists of missing persons comprising abbreviated data for each case may be transmitted;
(i) In view of its limited personnel and financial resources, the special process essentially functions as a channel of communication involving database handling and correspondence, leaving the actual tracing and negotiating activities in the field to more experienced organizations such as ICRC and national Red Cross Societies, as well as local, national and international bilateral tracing and exchange commissions existing in this area. As a procedure established by the Commission on Human Rights the special process is, however, available to provide its good offices whenever requested to do so by the parties involved. It is, therefore, essential that it carry out field visits in order to establish direct contacts with all governmental, intergovernmental and non-governmental institutions concerned, to inform them about the special process and its methods of work, to train interlocutors on how to submit individual cases, to transmit cases directly to those who might provide information and clarification, and to offer other services aimed at establishing the fate and whereabouts of missing persons. As a matter of principle, field visits are only carried out at the invitation of the Governments concerned and the de facto authorities.
13. The special process has been established as a joint mandate of the Special Rapporteur and one member of the Working Group. Upon his appointment, the expert discussed with the Special Rapporteur the modalities of implementing their joint mandate in the most efficient way, taking into account the strictly humanitarian and non-accusatory nature of the special process. They agreed that the expert be entrusted with the task of carrying out the mandate, with responsibility for dealing with the relatives of missing persons and with all governmental, intergovernmental and non-governmental institutions concerned. The Special Rapporteur does not take any active role in implementing the mandate; however, he provides support to the special process. In particular, the field offices of the Centre for Human Rights in the territory of the former Yugoslavia and the staff members servicing the mandate of the Special Rapporteur are at the disposal of the expert. It was further agreed that, after consultation with the Special Rapporteur, the expert will submit his reports on the implementation of the special process directly to the Commission on Human Rights and, if requested, to the General Assembly.
14. Following his appointment, the expert visited Geneva on 31 May and 1 June 1994. During this visit and during his participation in the forty-third and forty-fourth sessions of the Working Group in Geneva (29 August-2 September and 29 November-9 December 1994), he met with the Special Rapporteur to discuss the mandate and methods of work of the special process and held meetings with representatives of the Governments of the Republic of Croatia, the Republic of Bosnia and Herzegovina and the Federal Republic of Yugoslavia (Serbia and Montenegro) in order to introduce the special process, explain the strictly humanitarian nature of the mandate and to initiate cooperation with the Governments concerned. He also held meetings with representatives of UNHCR and ICRC dealing with the former Yugoslavia, with a view to coordinating his activities in tracing missing persons and assuring mutual cooperation. In addition, he exchanged views with representatives of non-governmental organizations and with special rapporteurs of the United Nations active in this field.
15. Already during his first consultations at Geneva, the expert was invited to pay a visit to Croatia and to Bosnia and Herzegovina. His request to visit the Federal Republic of Yugoslavia (Serbia and Montenegro) was, however, rejected. In a letter dated 24 June 1994, the Permanent Representative of the Federal Republic of Yugoslavia to the United Nations Office at Geneva explained the reasons for his Government's decision as follows:
"Allow me to inform you that, bearing in mind the present circumstances, and, above all, the mandate of your Working Group, as well as Mr. Mazowiecki's activities so far, that have been highly politically oriented, one-sided, and not based on facts, the Government of the Federal Republic of Yugoslavia is not able to accept your visit to the Federal Republic of Yugoslavia. However, I should like to use this opportunity to reiterate that the Federal Republic of Yugoslavia is interested in and open for cooperation with your Working Group, in accordance with its original mandate, that is, you will agree, exclusively humanitarian, and should not be subject to political manipulations."
16. The expert deeply regrets this negative attitude on the part of the Government of the Federal Republic of Yugoslavia (Serbia and Montenegro). In resolution 1994/72, the Commission on Human Rights urged the Government of the Federal Republic of Yugoslavia (Serbia and Montenegro) to cooperate in determining the fate of thousands of missing persons and requested the Working Group on Enforced Involuntary Disappearances, represented by one of its members, to cooperate as appropriate with the Special Rapporteur in dealing with this issue. Similarly, the General Assembly, at its forty-ninth session, adopted resolution 49/196, entitled "The situation of human rights in the Republic of Bosnia and Herzegovina, the Republic of Croatia and the Federal Republic of Yugoslavia (Serbia and Montenegro)", in paragraph 25 of which it urged all parties, and in particular the Government of the Federal Republic of Yugoslavia (Serbia and Montenegro), to cooperate with the special process on missing persons in the territory of the former Yugoslavia established pursuant to paragraph 24 of Commission on Human Rights resolution 1994/72 of 9 March 1994 in determining the fate of thousands of missing persons by disclosing information and documentation on inmates in prisons, camps and other places of detention in order finally to locate such persons and alleviate the suffering of their relatives.
17. The expert can carry out his difficult mandate efficiently only if he receives the full support and cooperation of all Governments involved. As has been stressed repeatedly, and as clearly follows from its methods of work outlined above, the special process is of a strictly humanitarian nature and, in this respect, does not differ at all from the approach of the Working Group. Its only aim is to assist the families in the territory of the former Yugoslavia, irrespective of their ethnic origin, in their efforts to establish the fate and whereabouts of their missing relatives. As long as the special process is not known to the families and all relevant governmental and non-governmental institutions in the Federal Republic of Yugoslavia (Serbia and Montenegro), the expert is unable to provide his assistance to them. He, therefore, expresses his hope that the Government of the Federal Republic of Yugoslavia (Serbia and Montenegro) will change its position and will soon invite him to visit Belgrade with a view to establishing direct contacts, introducing the special process to all governmental, intergovernmental and non-governmental institutions concerned and contributing in the difficult task of tracing thousands of missing persons.
18. Upon the invitation of the Governments of the Republic of Croatia and the Republic of Bosnia and Herzegovina, the expert, together with a staff member of the Centre for Human Rights carried out a visit to Zagreb, the United Nations Protected Area (UNPA) Sector East, and to Sarajevo from 3 to 11 July 1994. He wishes to thank both Governments for their availability, hospitality and assistance, notwithstanding the existing difficult situation. He also wishes to thank the United Nations Protection Force (UNPROFOR) for its assistance in arranging the travel plans and providing him with flights to the UNPA Sector East and to Sarajevo. Valuable assistance was also provided by staff members of the field offices of the Centre for Human Rights in Zagreb and Sarajevo.
19. In Zagreb, the expert held meetings with the Deputy Prime Minister and other government officials of the Republic of Croatia, with the President and other members of the governmental Commission for Tracing Missing Persons and Detainees and with the head of the Government Office for Victims of War. He also met with the Executive President of the Croatian Red Cross, with the ICRC Coordinator for the former Yugoslavia and the Chief of Delegation for Croatia, and with the UNHCR chiefs of mission for Croatia and for Bosnia and Herzegovina. Finally, he had extensive consultations with relatives of missing persons and with representatives of the Association of Families of Imprisoned and Missing Defenders of Croatia, the Mothers from Vukovar, the Mothers for Peace, the Serbian Democratic Forum and other non-governmental organizations.
20. Because of logistical problems resulting from the blockade of checkpoints by organizations of Croatian refugees, the visit to UNPA Sector East, in Croatia, had to be considerably shortened. During his short visit to Klisa and Erdut on 8 July 1994, the expert held consultations with representatives of UNPROFOR and UNHCR. His visits to Vukovar and Osijek, and his scheduled meetings with the Presidents of the Croatian and the Serbian Commissions on the Exchange of Prisoners of War and Missing Persons, as well as with relatives of missing persons had, unfortunately, to be postponed.
21. Similar logistical problems were encountered with the UNPROFOR flight to Sarajevo. Consequently, scheduled meetings with representatives of ICRC and of the Bosnian Committee for Human Rights had to be cancelled and the whole programme of the visit to the Republic of Bosnia and Herzegovina adjusted to the shortened period. On 9 and 10 July 1994, the expert held meetings with the Secretary of the Ministry of Foreign Affairs, the Deputy Minister of Justice and other government officials of the Republic of Bosnia and Herzegovina, with the head of the Government Committee for the Exchange of Prisoners, the secretary of the Government Committee for the Investigation of War Crimes, the general manager of the tracing bureau established by the Bosnian Red Cross, and the UNPROFOR Civil Affairs Coordinator for Bosnia and Herzegovina.
22. During his field visits, the expert received allegations
concerning a total of more than 30,000 missing persons in the
territory of the former Yugoslavia. The President of the Croatian
Commission for Tracing Missing Persons and Detainees explained,
for instance, that his Commission had initially registered some
13,700 missing persons, and the head of the Bosnian Committee
for the Exchange of Prisoners reported that 17,028 persons were
listed as missing in the territory held by Bosnian Serb forces
23. According to the methods of work of the special process, outlined above, allegations on individual cases must contain a number of minimum elements of information in order to be registered and transmitted to Governments or other sources that might provide relevant information. Taking into account the difficulties encountered in the former Yugoslavia, in particular in Bosnia and Herzegovina, in providing timely and relevant information, the expert adopted a pragmatic twofold approach. In principle, only individual cases containing all the necessary information have been registered and transmitted. For this purpose, the relatives and other sources have been provided with forms which have to be filled in for every individual case and which are submitted either directly to the Centre for Human Rights in Geneva or via its field offices in Zagreb and Sarajevo. In order to speed up the tracing activities, the expert also accepted, as a first step, to transmit tabulated lists of missing persons comprising abbreviated data for each case.
24. In Croatia, the expert received from the Commission for Tracing Missing Persons and Detainees a tabulated list of 2,764 cases of missing persons which had been transmitted to the Government of the Federal Republic of Yugoslavia (Serbia and Montenegro) and other possible sources of information. At the same time, the Association of Families of Imprisoned and Missing Defenders of Croatia undertook the task of obtaining detailed information from the families of these 2,764 missing persons and of submitting this information on the regular forms of the Working Group. During his visit to Zagreb, a total of 121 cases were personally handed to the expert, and in November 1994 he received another 1,053 cases. Out of these 1,174 cases, a total of 401 were registered and transmitted to the Government of the Federal Republic of Yugoslavia (Serbia and Montenegro) and 6 cases were transmitted to the Government of Croatia. In addition, the registered cases and lists of names of missing persons were forwarded to both ICRC and UNHCR. The other cases are in the process of being registered and transmitted.
25. In Bosnia and Herzegovina, it was agreed with the Tracing Bureau of the Bosnian Red Cross that the expert would receive an initial tabulated list of some 3,800 cases of missing persons. In November 1994, the Tracing Bureau submitted a first list of 1,278 names of missing persons. In addition, 223 cases with detailed information have been submitted by relatives, mostly through the Sarajevo field office of the Centre for Human Rights, of which 200 were registered. These 200 cases were transmitted to the Government of the Federal Republic of Yugoslavia (Serbia and Montenegro), to the Bosnian Serb de facto authorities and to other possible sources of information.
26. Up to 16 December 1994 no information concerning the fate or whereabouts of any of the missing persons was received.
27. The cases of disa ppearance so far reported within the framework of the special process are directly related to the conflict between Croats and Serbs living in Croatia, in particular in the Krajina region, later declared as the United Nations Protected Areas (UNPAs), Sectors South, North, West and East. After Pakrac had declared itself on 28 February 1991 an autonomous region within Croatia (now UNPA-West), and with the intervention of the Yugoslav National Army (JNA) a few days later, the sporadic clashes gradually turned into a full-scale armed conflict. From early May 1991 the JNA also participated actively in the hostilities in Slavonia (now UNPA-East). Fighting in this sector intensified in July 1991 when Serb paramilitary forces, with the aid of JNA, seized Erdut, Dalj and Aljmas. Most widely known is the siege and fall of the city of Vukovar. Beginning in August 1991, Vukovar was for 86 days under heavy shelling and attack by the JNA and Serb paramilitary forces such as Seselj's "White Eagles" and Arkan's "Tigers". On 18 November 1991, after all the neighbouring towns had already been seized, the Croatian National Guard in Vukovar finally surrendered. As has been described in the reports of the Special Rapporteur and of the Commission of Experts established pursuant to Security Council resolution 780 (1992), most gross violations of human rights and humanitarian law resulted from the "ethnic cleansing" operations during and immediately after the seizure of Vukovar and other towns and villages.
28. Of the 2,764 cases of missing persons contained in the tabulated list submitted by the Croatian Commission for Tracing Missing Persons and Detainees, the vast majority of more than 1,800 missing persons were reported from UNPA- East. More than 600 cases allegedly occurred in Sector North, almost 200 cases in Sector West and roughly 100 cases in Sector South.
29. A thorough study of 407 cases of missing persons received from the Association of Families of Imprisoned and Missing Defenders of Croatia and transmitted so far to the Yugoslav and Croatian authorities shows that most of them concern Croats who were detained or abducted by the JNA and Serb paramilitary forces during the seizure of their towns and villages. With the exception of a 2-year-old child, the age of the victims ranges from 20 to 75 years. The majority of the reported victims are men; roughly one sixth are women. Only a few persons of Serbian, Hungarian, Albanian, Ukrainian and Czech origin have been reported missing and were allegedly abducted or detained by the JNA and Serb paramilitary forces. Except for two cases that reportedly occurred in April and May 1991 all other disappearances took place between July 1991 and February 1992.
30. The vast majority of the cases reported so far occurred in UNPA-East between September and November 1991. In the city of Vukovar, most cases allegedly occurred between 18 and 20 November 1991. Of particular concern is the fate of many patients and medical staff of Vukovar hospital. According to various sources, the director of the hospital and the JNA had agreed on the evacuation of all 420 Croatian patients to the Croatian-held territory, with ICRC and the European Community Monitoring Mission supervising the operation. However, on 20 November 1991, only women, children and the elderly were transported to the Croatian-held territory, while most other patients, in particular soldiers, were allegedly taken to the JNA barracks in Vukovar. Since then, their whereabouts remain unknown. Similarly, in Borovo Naselje, a suburb of Vukovar, the missing persons were reportedly abducted from the field hospital "Borovo Commerce".
31. Also in UNPA-North, notably in Dubica, Bacin, Glina and Petrinja, most of the cases reported so far occurred between September and November 1991. Various sources reported that during the occupation of Dubica, all ethnic Croats were convened on 20 November 1991 to the local school, from where they were transported to a detention centre in Glina. Since then, their whereabouts remain unknown. Other cases of missing persons are reported to have occurred in UNPA-West, notably in Antunovac, and in UNPA-South, in particular in Knin and Skabrnje.
32. Among the missing persons reported so far are six ethnic Serbs who were allegedly arrested by the Croatian Military Police between July and December 1991. According to the sources, one of these arrests took place in Nova Gradiska (Croatian territory, east of UNPA-West), the others in Zagreb, Bjelovar (Croatian territory between Zagreb and UNPA-West) and Slavonski Brod (Croatian territory between UNPA-West and UNPA-East).
33. Very little information has been received about the whereabouts of missing persons after their arrest or abduction. Some of the victims allegedly detained by the JNA or Serb paramilitary forces are reported to have been seen later in detention centres in the UNPAs, such as Glina (Sector North), Dalj, north of Vukovar, or the Velepromet warehouse in Vukovar (Sector East). Others were reportedly deported to the Federal Republic of Yugoslavia (Serbia and Montenegro) and last seen in late 1991 or early 1992 in detention camps such as Sremska Mitrovica (near the border with Croatia), Nis and in the mines of Aleksinac (in Serbia, north-east of Kosovo).
34. The bodies of a large number of both civilians and military personnel killed in connection with the armed conflict in Croatia are believed to have been buried in mass graves in various locations, mainly in UNPA-East. The majority of these persons were allegedly killed in mass executions in and around Vukovar in November 1991. On 31 March 1994, the Commission of Experts established pursuant to Security Council resolution 780 (1992) received information identifying 180 mass grave sites in the whole of the former Yugoslavia. Forty-four of these sites are located in Croatia. According to various sources, a considerable number of Croats abducted in Vukovar, in particular patients and medical staff of Vukovar hospital, were shot and were buried in a mass grave at Ovcara, some 6 km south-east of Vukovar. As the Commission of Experts did not succeed in its attempts to excavate the Ovcara mass grave due to, inter alia, opposition from the Serb de facto authorities, including the Parliament of the "Serb Republic of Krajina" (S/1994/674, paras. 265-276), it has not yet been possible to verify these allegations. In October and November 1993 the Commission of Experts deployed forensic teams to carry out preliminary investigations near Poljana Pakracka (UNPA-West) in order to confirm the existence of a mass grave, said to contain the remains of up to 1,700 persons. As a result of these investigations 19 bodies were exhumed from 9 separate graves. Forensic examination of the corpses confirmed that the persons had indeed been executed. Most of the bodies had their hands tied together and exhibited multiple bullet-wounds to the head and other parts of the body. Since the objective of this preliminary investigation was merely to establish the existence and location of the grave site, no attempt was made to identify any of the bodies.
35. It is to be noted that the Joint Commission to Trace Missing Persons and Mortal Remains established on 16 December 1991 by the Republic of Croatia and the Federal Republic of Yugoslavia (Serbia and Montenegro) and chaired by ICRC has been at a standstill since July 1992. The recently established Joint Commission of Governments of the two countries for the questions of missing persons, refugees and displaced persons met only once, during the visit of the Yugoslav Deputy Prime Minister to Zagreb on 12 February 1994, and since then there has been no follow-up on its mandate.
36. As in Croatia, the widespread phenomenon of missing persons is a direct result of the armed conflict and of the policy of "ethnic cleansing" in many areas of Bosnia and Herzegovina, in particular in the territory under the control of Bosnian Serb de facto authorities. The armed conflict broke out soon after the Republic of Bosnia and Herzegovina declared its independence, on 3 March 1992. On 7 April 1992, the Serbian Democratic Party declared the independence of the so-called "Serbian Republic of Bosnia and Herzegovina". From this period fierce fighting flared up and escalated in many parts of the country. The JNA and Serb paramilitary units took control of large territories, while agreements on cease-fires were invariably violated. Fighting broke out on 1 April 1992 in Bijeljina in north-eastern Bosnia and intensified in the southern municipalities of Mostar, Neum and Kupres. From Bijeljina the fighting spread southwards along the Drina river, which forms the border with the Federal Republic of Yugoslavia (Serbia and Montenegro), to Zvornik, Visegrad and Foca. According to reliable sources, by the end of the summer at least 300,000 Muslims had been "cleansed" from the eastern part of the country. Up to 40,000 people are believed to have been killed in this operation alone. In the period from May to July 1992 a similar fate hit the predominantly Muslim inhabitants of the area in and around Prijedor in western Bosnia, where thousands of civilians were reportedly killed, thousands sent to concentration camps, and even larger numbers deported.
37. Since the beginning of the conflict, a systematic pattern of gross and reliably attested violations of human rights and humanitarian law has been established as can be seen, inter alia, from the 14 reports submitted so far by the Special Rapporteur (the latest to the General Assembly is dated 4 November 1994) and from the reports of the Commission of Experts established pursuant to Security Council resolution 780 (1992), the latest being contained in the annex to document S/1994/674.
38. As a result of the rapid escalation of the conflict between Government forces and Bosnian Serb troops in the Bihac enclave in late October 1994, thousands of civilians were displaced and many families torn apart. The number of people who were killed or went missing under these chaotic circumstances is impossible to estimate. It is further believed that both sides to the conflict have taken a large number of prisoners of war. With intense fighting still going on in the Bihac pocket, nothing is known about their fate or whereabouts.
39. The number of missing persons alleged in Bosnia and Herzegovina runs to 20,000. Until 16 December 1994, only 223 cases with detailed information have been submitted by relatives to the special process, of which 200 were registered. Most of these cases concern Muslim men between 25 and 60 years of age who were detained or abducted in Bosnia and Herzegovina between April and November 1992. A few cases were reported to have occurred in the western region, but no cases from other parts of the country have been received. To date, only one Croat was reported arrested by the Bosnian forces and two Serbs were allegedly detained by the Bosnian police.
40. An analysis of the cases shows that the JNA was mainly mentioned by the sources as the force responsible, even in cases which occurred after its official withdrawal from Bosnia and Herzegovina on 19 May 1992. Serb paramilitary groups such as Arkan's "Tigers", Seselj's "White Eagles" and "Marticeva" forces, as well as Serb neighbours of the missing people, were also held responsible for the abductions. Furthermore, subsequent to their abduction, the victims were allegedly transported to detention camps in order either to be exchanged against Serb prisoners or to be sent to forced labour assignments. In this respect, Jagomir hospital in Sarajevo, the bunker camp in Vogosca (north of Sarajevo) and "Pelemis" in Vlasenica (north-east of Sarajevo) were mentioned as regular detention camps where missing persons were last seen. Moreover, in a considerable number of cases, sources reported that the missing persons were deported to the mines of Aleksinac, north-east of Kosovo in the Federal Republic of Yugoslavia (Serbia and Montenegro), to undertake forced labour.
41. Mass abductions from other localities were also reported. According to sources, 22 persons were abducted in May 1992 by the JNA from Ilidza near Sarajevo. In Rogatica (east of Sarajevo) 12 Muslims were allegedly abducted by their Serb neighbours in June 1992, and their whereabouts remain unknown. Another reported incident was an attack on the village of Ahatovici (near Sarajevo) by a paramilitary group, during which 56 men were abducted. A source also reported that 10 persons from Babljak Rogatica (east of Sarajevo) were arrested by the JNA. They were first detained in Borike (near Rogatica) and later allegedly transferred to Aleksinac to work in the mines. A considerable number of disappearances were reported from the town of Novoseoci-Sokolac (north-east of Sarajevo) relating to the fact that on 22 September 1992 all Muslim inhabitants were allegedly gathered up by Serb paramilitary forces, and that women and children were then taken to Hreso (in the vicinity of Sarajevo). No information is available on the whereabouts of the men.
42. With respect to cases received from the western region of the country, it was reported that in November 1992 four Muslims were abducted from a wood near Kotor Varos (north-western Bosnia) and were later transported to a camp in Grabovica (also in north-western Bosnia). It was further alleged that in May 1992, six persons were arrested at their home in Prijedor by the local police with the aid of the paramilitary. They were detained at "Impro", a firm located in the same street as their residence. Several of the cases allegedly occurred in Sanski Most and Kotor Varos (north-western Bosnia) and one case was reported to have occurred in Brcko (north-eastern Bosnia).
43. The establishment of the Federation of Bosnia and Herzegovina after the Washington agreement of 18 March 1994 has brought new stability to relations between the Government and the Bosnian Croats. It is to be hoped that within the framework of this Federation the parties will be able to overcome past animosities and enter a process of normalization. The agreement also allows for increased freedom of movement, which in turn will enhance the prospects for determining the fate and whereabouts of persons who have gone missing during the conflict in Bosnia and Herzegovina. An encouraging step towards a solution of this problem was taken when, following the peace settlement between the Government and the Bosnian Croats, the two parties agreed to release and exchange their prisoners of war. This prisoner exchange was completed in May 1994 and each side now allegedly holds only three prisoners, who are charged with having committed serious crimes during the conflict.
44. Since the special process on missing persons in the territory of the former Yugoslavia has been operating only for about half a year, relatively few individual cases of missing persons have so far been received, registered and transmitted. The following conclusions which are primarily based on an analysis of these roughly 600 cases, are therefore of a preliminary nature only. While these cases may be representative of the situation in Croatia, this is definitely not true for Bosnia and Herzegovina. For instance, no cases have so far been reported from the southern part of the country, and only a few from the western region. Most individual cases date back to events which occurred in 1992, although various reports indicate that disappearances continue to take place. Finally, only eight missing persons of Serbian origin have been reported to the expert. This fact might be explained, inter alia, by the unwillingness of the Government of the Federal Republic of Yugoslavia (Serbia and Montenegro) to cooperate with the expert and to make the special process better known to the family members of missing persons.
45. Although the mandate of the special process is broad enough to cover also combatants who are missing as a direct result of armed confrontations, a first analysis of the individual cases processed so far leads to the conclusion that most of the allegations can be classified as enforced disappearances in the narrow sense of the 1992 Declaration on the Protection of All Persons from Enforced Disappearance (hereafter referred to as the Declaration). In the preambular part of resolution 47/133, in which the General Assembly proclaimed the Declaration, enforced disappearances are defined "in the sense that persons are arrested, detained or abducted against their will or otherwise deprived of their liberty by officials of different branches or levels of Government, or by organized groups or private individuals acting on behalf of, or with the support, direct or indirect, consent or acquiescence of the Government, followed by a refusal to disclose the fate or whereabouts of the persons concerned or a refusal to acknowledge the deprivation of their liberty, thereby placing such persons outside the protection of the law".
46. According to the allegations in relation to individual cases in Croatia as well as in Bosnia and Herzegovina, most victims were civilians who were detained or abducted by military or paramilitary forces during or shortly after the seizure of their towns or villages. Many of them were suspected to be in detention centres in the territories controlled by the Bosnian Serb de facto authorities or in the so-called "Republic of Serbian Krajina", or were deported to the territory of the Federal Republic of Yugoslavia (Serbia and Montenegro).
47. According to the sources, the JNA and Serb paramilitary forces such as Arkan's "Tigers", Seselj's "White Eagles" and "Marticeva forces" were in most cases allegedly responsible for the detentions and abductions. Even if the majority of the disappearances were actually carried out by paramilitary forces, these groups reportedly acted with the direct or indirect support and consent of the JNA. The Government of the Federal Republic of Yugoslavia (Serbia and Montenegro) is, therefore, allegedly responsible for most disappearances that occurred in Croatia, as well as for most disappearances in Bosnia and Herzegovina until 19 May 1992, the date of the JNA's official withdrawal. However, the Government of the Federal Republic of Yugoslavia, in its letter to the expert dated 24 June 1994 stated that "in the case of the Federal Republic of Yugoslavia the problem of missing persons exists only in relation to Croatia". After the withdrawal of the JNA from Bosnia and Herzegovina, the Bosnian Serb de facto authorities are held responsible by the sources for most detentions and abductions reported to the expert. These cases, therefore, fall outside the definition of disappearances under the Declaration. They are, however, covered by the mandate of the special process.
48. Most of the missing persons reported from Croatia are Croats, most of the missing persons reported from Bosnia and Herzegovina are Muslims. Taking into account that the JNA and Serb paramilitary forces are allegedly responsible, these are strong indications that most missing persons reported so far are victims of "ethnic cleansing" operations.
49. In Croatia, the practice of disappearances allegedly stopped with the agreement on a cease-fire and the termination of the armed conflict. The number of persons reportedly still missing has declined to less than 3,000, most of them Croats. Although the Government of the Federal Republic of Yugoslavia (Serbia and Montenegro) claimed that some 1,000 Serbs were missing in Croatia, no individual cases were submitted to the expert by the Yugoslav authorities. The six persons of Serbian origin reported missing in Croatia were allegedly detained by the Croatian military police. Their cases were submitted by Croatian non-governmental sources. A considerable number of missing persons of Croatian origin were allegedly deported to the Federal Republic of Yugoslavia (Serbia and Montenegro) to undertake forced labour. The existence of mass graves could be the result of massive summary executions, victims of which might have been reported to the expert as missing persons. The Joint Commission of Governments for the Questions of Missing Persons, Refugees and Displaced Persons and for Humanitarian Affairs, established by the Federal Republic of Yugoslavia (Serbia and Montenegro) and the Republic of Croatia to trace missing persons was of no avail.
50. In Bosnia and Herzegovina, the number of missing persons allegedly continues to rise. Most of the cases submitted to the expert concern Muslims who are reported to have been detained in 1992 by the JNA, by Bosnian Serb de facto authorities or by Serb paramilitary forces. According to the sources, many of them could still be held in detention, either in the territory of Bosnia and Herzegovina controlled by Bosnian Serb de facto authorities, or in the Federal Republic of Yugoslavia (Serbia and Montenegro).
51. Under articles 3, 13 and 14 of the Declaration, all States bear the responsibility of taking effective legislative, administrative, judicial or other measures to prevent and terminate acts of enforced disappearance, of investigating thoroughly all alleged cases of disappearances and of bringing the perpetrators to justice. The following recommendations are based on these responsibilities, which are either directly applicable (acts of enforced disappearance attributable to Governments) or which are applied by analogy to reported cases of missing persons for which de facto authorities are allegedly responsible.
52. The Government of the Federal Republic of Yugoslavia (Serbia and Montenegro) is urged to cooperate with the special process and to invite the expert to carry out a visit with a view to introducing the special process to all governmental, intergovernmental and non-governmental organizations concerned. Furthermore, the expert wishes to remind the Yugoslav authorities of their responsibility under the Declaration to investigate all cases of enforced disappearances in which the JNA or paramilitary forces under the control of the JNA were allegedly involved. These cases concern alleged disappearances in Croatia, as well as those having occurred in Bosnia and Herzegovina, until 19 May 1992. In addition, the Yugoslav authorities are under an obligation to bring to justice all persons under their jurisdiction who are presumed responsible for an act of enforced disappearance. Finally, the Yugoslav authorities are requested to provide their good offices for the purpose of tracing missing persons allegedly held by the Serb de facto authorities in Croatia and Bosnia and Herzegovina.
53. The Government of the Republic of Croatia is requested to continue cooperating with the special process. In particular, the expert wishes to remind the Croatian authorities of their responsibility under the Declaration to investigate thoroughly the six cases of Serbs who were allegedly arrested by the Croatian Military Police and to bring the perpetrators to justice. In addition, the Croatian authorities are requested to provide their good offices for the purpose of tracing missing persons from Bosnia and Herzegovina.
54. The Government of the Republic of Bosnia and Herzegovina is requested to continue cooperating with the special process. In particular, the expert wishes to draw the attention of the Bosnian authorities to their responsibility under the Declaration to investigate thoroughly the two cases of missing Serbs for whom the Government of Bosnia and Herzegovina is allegedly responsible. They are also requested to make the special process better known among the people under its jurisdiction and to assist relatives of missing persons in submitting cases to the expert.
55. The Serb de facto authorities in Bosnia and Herzegovina are urged to stop the practice of "ethnic cleansing" and similar acts which might cause the disappearance of persons under their control. They are also urged to take all necessary measures to prevent such acts, to investigate thoroughly all cases of missing persons which allegedly occurred either in the territory under their control or for which the forces under their control are reported to be responsible, and to bring the perpetrators to justice.
56. The Serb de facto authorities in Croatia are urged to investigate thoroughly all cases of missing persons that allegedly have occurred in the territory under their control or for which forces under their control are reported to be responsible, and to bring the perpetrators to justice. In particular, they are requested to cooperate in the excavation of mass graves in the territory under their control such as Ovcara.
57. ICRC, national Red Cross Societies and United Nations bodies concerned such as UNHCR and UNPROFOR, are requested to continue their cooperation with the special process.
58. All parties involved in armed conflicts are urged to take all measures necessary to prevent or terminate acts which may result in cases of missing persons. In particular, they are requested to include in cease-fire agreements and peace treaties explicit provisions which guarantee that alleged cases of missing persons are thoroughly investigated. Independent bodies should be established to monitor compliance with such agreements.
59. As experience in other countries shows, the investigation and clarification of the fate and whereabouts of missing persons is a precondition for a process of reconciliation that might lead to a lasting peace based on justice and respect for human rights. Associations of families and relatives of missing persons and other non-governmental organizations might play a crucial role in initiating such a process of reconciliation by actively cooperating with similar organizations in other parts of the former Yugoslavia. Most important, for the time being, is, however, the political will of Governments and de facto authorities to terminate the hostilities and to conduct thorough investigations concerning all cases of missing persons. The expert will stay available to provide his good offices whenever requested to do so by the parties concerned. | <urn:uuid:ce5978be-f778-4df8-9ce7-b2516c5d029d> | CC-MAIN-2013-48 | http://www1.umn.edu/humanrts/commission/country51/37.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163985723/warc/CC-MAIN-20131204133305-00085-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.966486 | 10,405 | 2.8125 | 3 |
Development Of Real-Time Detection Of Cyanotoxins In Drinking And Irrigation Water Sources Using Unmanned Aerial Vehicles And Validation With Laboratory Measurements
algal bloom contains toxins of concern at dangerous levels. Full Project Information Read about the ... New research will take the birds’ eye view of harmful algal blooms to get test results faster ... algal blooms rely on physically collecting water samples, transporting them to a laboratory and ...
Field to Faucet making strides in improving Ohio’s water quality
Jay Martin talks about Lake Erie’s harmful algal blooms and the Field to Faucet program ’s efforts to ... 23 Field to Faucet projects are planned or underway. Examples include: Developing field sensors that ... monitor harmful algal blooms in lakes and farm ponds. Conducting edge-of-field research that will compare ...
Field to Faucet Projects
Field to Faucet Funded Projects Field to Faucet is an integrated suite of research, education and ... outreach activities designed to deliver end-to-end solutions to harmful algal blooms and other water ... quality issues. Background After harmful algal blooms shut down drinking water for two days in Toledo, OH ...
Clean Water for Ohio: New Partners, Projects, Funding are Growing Field to Faucet
researchers to better monitor harmful algal blooms in lakes and agricultural ponds. · Edge of field ... Environmental Sciences at The Ohio State University launched its Field to Faucet program, significant strides ... have been made to improve Ohio water quality. Field to Faucet was conceived by Bruce McPheron, Ohio ...
The Field to Faucet initiative is an innovative suite of reseach and extension efforts by The Ohio ... The initiative began in 2014 after a water quality crisis in Lake Erie due to harmful algal blooms ... Agricultural, and Environmental Sciences at Ohio State. The lead faculty point of contact for Field to Faucet is ...
Develop New Technologies
resources. Projects Field to Faucet Funded Projects New field sensors will quickly scan for multiple algal ... New Ideas for An Old Problem Harmful algal blooms (HABs) are not a new phenomenon--but Ohio State ... and partners have some new ideas to help manage, prevent or take advantage of them. Field to Faucet ...
Educate and Engage
and mitigating harmful algal blooms (HABs). Projects Field to Faucet Funded Projects New field sensors ... Projects Guidance for Regulators On Fish And Produce During Algal Bloom Season A team of Ohio State ... during Lake Erie’s harmful algal bloom season. Lead: Stuart Ludsin, Ohio State University. Read more... ...
Protect Public Health
neutralize or remove contaminants of concern from water Projects Field to Faucet Funded Projects New field ... Projects Guidance for Regulators On Fish And Produce During Algal Bloom Season A team of Ohio State ... "Is it safe to drink? Swim? Fish? Water my plants?" But since harmful algal blooms (HABs) are so ...
Jay Martin to Lead Field to Faucet
to address harmful algal blooms. Along with Field to Faucet, the Global Water Initiative includes ... blooms, Jay Martin will tell you they’re the solution. Martin was recently chosen to lead Field to Faucet ... detect real-time concentrations of microcystin in Lake Erie’s waters. Field to Faucet project funding ...
Jay Martin to Lead Field to Faucet and Global Water Initiative
blooms, Jay Martin will tell you they’re the solution. Martin was recently chosen to lead Field to Faucet ... from a variety of disciplines. Field to Faucet was conceived and funded by Bruce McPheron, Ohio State’s ... ability to bring people together to solve this complicated issue.” Field to Faucet involves researchers ... | <urn:uuid:6db645b0-79c1-4b4f-9a6d-6ba19fa4b775> | CC-MAIN-2023-23 | https://cfaes.osu.edu/search/site/about%20us%20projects%20field%20faucet%20projects%20uavs%20faster%20algal%20bloom%20sampling | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00781.warc.gz | en | 0.868204 | 1,154 | 3.1875 | 3 |
Phenomena of Clapping of Hands in the Bible and the Present Time
Keywords:Expression, joy, clapping, worship
The clapping of hands has become a practice in many church gatherings in the contemporary time. The clapping of hands in the Scriptures poses the issue of its place in the worship service of the church. This study determined the occurrences of the clapping of hands particularly in the Old Testament to see if there is in any theological basis for the current practice of clapping in the church. There are nine occurrences on the gesture of clapping pertaining to people which can either be positive or negative. The clapping as an expression of joy at the ascension of a king seems to be the only positive when pertaining to man. The negative clapping of hands pertaining to man was when it was done as an expression of disgust, anger, and malicious glee. All of them were associated with God’s judgment against sin. However, the clapping is always positive when the gesture is pertaining to God. It was an expression of joy on account of God’s saving action. It was an expression of religious adoration and worship. Clapping of hands in the Temple was an expression to exalt God as King. It was used in recognition of Him as the Creator. Thus, rightly understood and practiced, it seems that clapping can be suggested to be a part of worship.
How to Cite
Copyright © 2019 ISC Committee. | <urn:uuid:f81b63ae-8ead-4728-9933-3098325753b2> | CC-MAIN-2021-21 | https://jurnal.unai.edu/index.php/isc/article/view/1592 | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988828.76/warc/CC-MAIN-20210507211141-20210508001141-00555.warc.gz | en | 0.960662 | 300 | 3.125 | 3 |
Vector-borne Diseases. Are You at Risk?
Original Air Date: April 7, 2014
World Health Day is celebrated on April 7 every year to mark the anniversary of the founding of the World Health Organization (WHO) in 1948. The day provides an opportunity for organizations and individuals in every community to get involved in activities that can lead to better health.
This year, World Health Day 2014 aimed to raise awareness of vector-borne diseases. To support this theme, Walden University and partner institutions in the Laureate International Universities network came together to share examples of research that address the issue of vector-borne diseases in different communities around the world.
The webinar featured Walden University faculty member Dr. Aimee Ferraro. Dr. Ferraro has 15 years of experience conducting mixed-method research within a variety of public health settings, including nonprofits, universities, and government agencies. Since completing a CDC/CSTE applied epidemiology fellowship with the Pennsylvania Department of Health, Dr. Ferraro has been conducting epidemiological research on infectious diseases in Lima, Peru.
Dr. Ferraro was accompanied by a leading faculty member and a recent graduate from two other universities in the Laureate International Universities network who will also contributed to this special World Health Day 2014 webinar. | <urn:uuid:d629680f-f33e-4239-9217-830916c3484a> | CC-MAIN-2014-49 | http://www.waldenu.edu/about/events/webinars/health-sciences/vector-borne-diseases-risk | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400380394.54/warc/CC-MAIN-20141119123300-00168-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.935727 | 257 | 2.890625 | 3 |
Report Work on Semantic Markup
- 1 Semantic Markup
- 1.1 Review of basic annotation techniques
- 1.2 Semantic Markup for OGC standards
- 1.3 Examples
The last few years have seen an explosion in the number and variety of sensors being deployed in all manner of environments around the globe; and this trend will continue as sensors are becoming cheaper and more readily available. The outcome of this development is an avalanche of observational data that must be analyzed and explained in order to achieve an understanding of our environment. Currently, this data is too often stove piped, with a strong tie between the sensor network, observation database, and end-user application. With the advent of projects such as the OGC Sensor Web Enablement (SWE) and the W3C Semantic Sensor Networks Incubator Group (SSN-XG) this information is now being set free and made available on the Web. With this new freedom, however, comes significant challenges, such as the following
- How do we discover, access and search sensor data on the Web?
- How do we integrate the sensor data when it comes from many heterogeneous sources?
- How do we make raw sensor data meaningful to Web applications and naive users?
SWE has taken important initial steps towards answering these questions. It includes the development of a set of XML-based languages and Web service interface specifications. The service interfaces, such as the Sensor Observation Service (SOS) [SOS 2008], provide a means to discover, access and search sensor data (as much as it is possible in XML-level syntactic interoperability level and through the use of standardized tags); and the languages, such as the Sensor Model Language (SensorML) [SENSORML 2007] and Observations and Measurements (O&M) [OM 1 2007], [OM 2 2007], provide a means to integrate data from heterogeneous sources in a standard format accessible to Web users. Such syntactic level interoperability is a good start and provides a solid framework to begin exploring the issue of semantic level interoperability. The latter issue falls under the charter of the W3C SSN-XG and is being explored through the investigation of two separate but closely related projects -- the development of an ontology for describing sensors and sensor data, and an annotation framework for adding semantic metadata to the SWE standards. This is a description of the latter.
In this document, the semantic annotation of sensor data is being considered within the scope of the SWE specifications (SensorML, O&M, SOS, etc.). In addition to considerations of the documents to be encoded, several use-cases have been defined which showcase the value of semantically annotating sensor data. These use-cases include (1) data discovery and linking, (2) device discovery and selection, (3) provenance and diagnosis, and (4) device operation tasking and programming. For more detail regarding these use-cases, see Section 3.
Review of basic annotation techniques
XLink (XML Linking Language) is an XML markup language for creating hyperlinks in XML documents. XLink is a W3C recommendation and outlines methods of describing links between resources in XML documents. Any element in an XML document can behave as a link. XLink supports simple links (like HTML) and extended links (for linking multiple resources together). In addition, with XLink, the links can be defined outside the linked files. XLink attributes can be added to SensorML and O&M documents to provide semantic annotations for the sensor data. XLink is already used in SWE documents, thus, no syntactic or structural changes are required. This explains the relative success of XLink-based approaches in earlier attempts to add semantic annotations to SWE documents, so recognizing which XLink attributes correspond to semantic annotations and which correspond to permissible SWE usages could become difficult.
Two versions of the XLink specification are available, XLink 1.0 [XLINK 2001] and XLink 1.1 [XLINK11 2010]. The description below covers XLink 1.0 because this is the specification which is used in OGC standards like GML [GML 2007].
- xlink:type - Every element defining an XLink *must* contain a "type" attribute, which specifies what type of link it is - the value for this attribute may be any one of "simple", "extended", "locator", "arc", "resource", "title" or "none".
- xlink:href - The "href" attribute is used to specify the URL of a remote resource, and is mandatory for locator links. In addition to the URL of the remote resource, it may also contain an additional "fragment identifier", which drills down to a specific location within the target document.
- xlink:show - The "show" attribute is used to define the manner in which the endpoint of a link is presented to the user. The value of this attribute may be any one of "new" (display linked resource in a new window); "replace" (display linked resource in the current window, removing whatever is currently there); "embed" (display linked resource in a specific area of the current window); "other" (display as per other, application-dependent directives); or "none" (display method unspecified)
- xlink:actuate - The "actuate" attribute is used to specify when a link is traversed - it may take any of the values "onLoad" (display linked resource as soon as loading is complete); "onRequest" (display linked resource only when expressly directed to by the user, either via a click or other input); "other" and "none".
- xlink:label - The "label" attribute is used to identify a link for subsequent use in an arc.
- xlink:from and xlink:to - The "from" and "to" attributes are used to specify the starting and ending points for an arc respectively. Both these attributes use labels to identify the links involved.
- xlink:role and xlink:arcrole - The "role" and "arcrole" attributes reference a URL which contains information on the link's role or purpose.
- xlink:title - The "title" attribute, not to be confused with the title type of link, provides a human-readable descriptive title for a link.
RDFa (Resource Description Framework - in - attributes) is a W3C Recommendation [RDFA SYNTAX 2008] that adds a set of attribute level extensions to XHTML for embedding rich metadata within Web documents. The RDF data model mapping enables its use for embedding RDF [RDF SYNTAX GRAMMAR 2004] triples within XHTML documents, it also enables the extraction of RDF model triples by compliant user agents. RDFa attributes can be added to SensorML and O&M documents to provide semantic annotations for the sensor data. Approaches based on RDFa look promising at the level of SWE documents since it would be easy to process the annotations independently of the rest of the document. Further work is required to check that the introduction of RDFa would not bring major changes for the implementers of the SWE standards and also to investigate how RDFa-enabled SWE services could be further integrated with other RDFa-based Web mashups.
- rdfa:about - A URI or CURIE [CURIE 2009] specifying the resource the metadata is about; in its absence it defaults to the current document.
- rdfa:rel - and rdfa:rev Specifies a relationship or reverse-relationship with another resource.
- rdfa:href, rdfa:src, and rdfa:resource - Specifies the partner resource.
- rdfa:property - Specifies a property for the content of an element.
- rdfa:content - Optional attribute that overrides the content of the element when using the property attribute
- rdfa:datatype - Optional attribute that specifies the datatype of text specified for use with the property attribute
- rdfa:typeof - Optional attribute that specifies the RDF type(s) of the subject (the resource that the metadata is about).
Other Annotation Techniques
- GRDDL [GRDDL 2007] - A markup format for Gleaning Resource Descriptions from Dialects of Languages. It is a W3C Recommendation, and enables users to obtain RDF triples out of XML documents, including XHTML. It defines the syntax to include a reference to a lifting script in a source document - the lifting script can then be used to transform the document to RDF.
- Microdata - Allows nested groups of name-value pairs to be added to documents, in parallel with the existing content. A non-semantic alternative to RDFa.
- SAWSDL [SAWSDL 2007] - A set of extension attributes for the Web Services Description Language and XML Schema definition language that allows description of additional semantics of WSDL components. Allows the user to record the mapping of WSDL elements to concepts defined in a reference ontology and to specify the lifting scripts which can be applied to the output of a service to transform it into a RDF file using the reference ontology concepts.
- hRESTs [Kopecky et al. 2008] - A microformat to add additional meta-data to REST API descriptions in HTML and XHTML. Developers can directly embed meta-data from various models such an ontology, taxonomy or a tag cloud into their API descriptions. The embedded meta-data can be used to improve search (for example: perform faceted search for APIs), data mediation (in conjunction with XML annotation) as well as help in easier integration of services to create mashups.
- SA-REST [Sheth et al. 2007] and Micro-WSMO [Kopecky et al. 2009] - two similar methods to semantically annotate REST services using the same microformat (hRESTs) and a different target ontology. This is similar to SAWSDL (including the possibility to include a reference to a lifting script) but applicable to an HTML-based description of a service).
Comparison of techniques
This report focuses on XLink and RDFa because they are the two primary techniques to add semantic annotations. For additional information on how these approaches can be applied to the development of geospatial mashups, see [Lefort 2009 ].
The following tables demonstrate the mapping of XLink and RDFa attributes to RDF, respectively. Such mapping guides the translation of semantic annotations to RDF syntax.
|xlink:href||Identifier of the resource which is the target of the association, given as a URI||rdf:about of range resource|
|xlink:role||Nature of the target resource, given as a URI||rdf:about of class of range resource|
|xlink:arcrole||Role or purpose of the target resource in relation to the present resource, given as a URI||rdf:about of object property linking domain element to range resource|
|xlink:title||Text describing the association or the target resource||rdfs:comment|
|rdfa:about||The identification of the resource (to state what the data is about)||rdf:about of domain resource|
|rdfa:typeof||RDF type(s) to associate with a resource||rdf:about of class of a resource|
|rdfa:href||Partner resource of a relationship ('resource object')||rdf:about of range resource|
|rdfa:property||Relationship between a subject and some literal text ('predicate')||rdf:about of datatype property|
|rdfa:rel||Relationship between two resources ('predicate')||rdf:about of object property|
|rdfa:rev||Reverse relationship between two resources ('predicate')||rdf:about of (inverse) object property|
|rdfa:src||Base resource of a relationship when the resource is embedded ('resource object')||rdf:about of domain resource|
|rdfa:resource||Partner resource of a relationship that is not intended to be 'clickable' ('object')||rdf:about of range resource|
|rdfa:datatype||Datatype of a property||XML type range of datatype property|
|rdfa:content||Machine-readable content ('plain literal object')||Value for datatype property|
Below is a comparison of the capabilities of XLink and RDFa to express types defined in RDF. In this respect, as the table demonstrates, RDFa is more expressive than XLink.
|Domain Instance||rdfa:about or rdfa:src|
|Inverse Object Property||rdfa:rev|
|Range Instance Object Property||xlink:href||rdfa:href or rdfa:resource|
|Range Value||rdfa:content or element content|
Semantic Markup for OGC standards
The Semantic Markup approach proposed below leverage two common features of the Sensor Web Enablement (SWE) languages, inherited from the design conventions originally defined for the Geography Markup Language [GML 2007]: its basic structure with nested resource-property pairs and the use of XLink as a linking mechanism to externally managed resources.
The overall compatibility of the design principles applied in GML with RDF is now acknowledged ([Schade and Cox 2010]). The OGC community is now aware that "only minor changes to current SDI standards" are required to allow the augmentation of Spatial Data Infrastructure with Linked Data ([Schade et al. 2010]). Some of these changes have already been engaged, e.g. the replacement of the Uniform Resource Names (URNs), previously mandated for the identification of resources governed by OGC, by HTTP URIs ([Cox 2010])
Current use of XLink in OGC standards
The OGC was an early adopter of XLink. Traditionally, however, the OGC has defined the use of XLink annotation as a composition by inclusion of remote resources. This definition regards annotation as a pointer to a remote resource such that the description is deferred. While this definition is useful for pointing to concepts in an ontology, it does not allow use of annotation for adding information to an existing resource description. To add further complexity to the situation, there are several (subtly) different usages of XLink in sub-communities of OGC. The GML specification authorizes four variants on the use of XLink:
- A reference to an object element in the same GML document may be encoded as:
- A reference to an object element in a remote XML document using the gml:id value of that object may be encoded as:
- A reference to an object element in a remote XML document (or GML object repository) using the gml:identifier property value of that object may be encoded as:
<myProperty xlink:href="http://my.big.org/test.xml#element(//gml:GeodeticCRS[./gml:identifier[ @codeSpace="urn:x-ogc:def:crs:EPSG:6.3:"]="4326"])"/>
- A reference to an object element with a uniform resource name may be encoded as follows (note that a URN resolver is required to resolve the URN and access the referenced object):
These four uses of XLink correspond to the definition of XLink annotation as a composition by inclusion of remote resources. Within this framework xlink:href is used to point to a target instance and xlink:role is used to point to its nature or type (e.g. to handle unknown features in this example). Describing XLink annotation as a semantic annotation, xlink:href would be used to point to an individual in an ontology and xlink:role would be used to point to a class in an ontology.
We recommend the use of XLink for providing semantic annotations to sensor data. While, as demonstrated above, RDFa is more expressive, XLink is already widely used within the sensor web community -- in particular the Open Geospatial Consortium. Therefore, XLink provides a low barrier to entry and requires no change to the existing Sensor Web Enablement specifications.
|xlink:href||link to ontology individual||rdf:about of range resource|
|xlink:role||link to ontology class||rdf:about of class of range resource|
|xlink:arcrole||link to ontology object property||rdf:about of object property linking domain element to range resource|
Currently, xlink should only be used to annotate property nodes within the SWE XML languages; the latest specification does not cover issues dealing with "nested" annotations, or semantic annotations embedded within inner nodes of the XML tree. The use of xlink for this type of semantic annotation is being considered as a future extension.
The recommendation issued here does not cover all the use cases identified in [Maue et al. 2009] especially the opportunity to annotate service descriptions discussed in [Lefort 2009 ] or the two-step mapping annotation mechanism investigated by the SAPIENCE project.
The Review of semantic annotation proposals and [group discussion on Semantic Markup] also list specific issues like the migration from Uniform Resource Names (URNs) to HTTP URIs representing semantic web resources.
The examples provided here are based on standards which fully apply the GML design principles: Observations and Measurements (O&M) and Sensor Observation Service (SOS).
Sensor Observation Service (SOS) GetCapabilities: The following example illustrates an observation offering with sensor rain_gauge_sth_esk_up_esk_rd_bridge that measures thickness_of_rainfall_amount
<swes:offering xlink:role="http://purl.oclc.org/NET/ssnx/ssn#Observation" xlink:arcrole="http://www.loa-cnr.it/ontologies/DUL.owl#hasSetting> <sos:ObservationOffering> <swes:procedureIdentifier xlink:role="http://purl.oclc.org/NET/ssnx/ssn#SensingDevice" xlink:href="http://purl.oclc.org/NET/ssnx/ssn-dev#rain_gauge_sth_esk_up_esk_rd_bridge" xlink:arcrole="http://purl.oclc.org/NET/ssnx/ssn#observedBy"> http://csiro.au/sw/rain_gauge_sth_esk_up_esk_rd_bridge </swes:procedureIdentifier> <swes:observableProperty xlink:href="http://purl.oclc.org/NET/ssnx/cf/cf-property#thickness_of_rainfall_amount" xlink:arcrole="http://purl.oclc.org/NET/ssnx/ssn#observedProperty" xlink:role="http://purl.oclc.org/NET/ssnx/qu/dim#Distance"/> <sos:phenomenonTime xlink:role="http://www.w3.org/2006/time-entry#Interval"> xlink:arcrole="http://purl.oclc.org/NET/ssnx/ssn#observationTime" <gml:TimePeriod gml:id="phenomenonTime11"> <gml:beginPosition xlink:role="http://www.w3.org/2006/time-entry#begins" xlink:arcrole="http://www.w3.org/2001/XMLSchema#time"> 2001-01-11T16:22:25.00 </gml:beginPosition> <gml:endPosition xlink:role="http://www.w3.org/2006/time-entry#ends" xlink:arcrole="http://www.w3.org/2001/XMLSchema#time"> 2005-10-18T19:54:13.000Z </gml:endPosition> </gml:TimePeriod> </sos:phenomenonTime> </sos:ObservationOffering> </swes:offering>
Sensor Discovery Example
The following provides a more comprehensive example of the annotation of a SOS GetCapabilities document useful for sensor discovery.
Description - Find all the sensors that meet certain criteria. While all (or most) criteria necessary for sensor discovery can be found in a SensorML document, parsing through hundreds or thousands of XML documents to find a sensor matching a set of criteria would be terribly inefficient. Therefore, like finding most resources on the Web, sensor discovery will likely occur through Web services rather than document searches. The Sensor Observation Service [SOS 2008] is the prominent service within the OGC Sensor Web Enablement for searching and accessing sensor data. The Sensor Observation Service, however, currently has no method for finding relevant sensors and encourages the use of catalogue services for this task. However, by semantically annotating the GetCapabilities document of an SOS, we can provide the ability to discover relevant sensors through several criteria of interest for this use-case (i.e., location, property, availability, etc.). The following table details the search criteria for the sensor discovery use-case and the resources that contain this information.
|Within geographic region (location)||yes||yes|
|Range of measurement||yes|
+ Note: The Application Domain criteria is not part of the original Sensor Discovery Use Case description, but is part of the SOS GetCapabilities and may be useful for discovery (e.g., for Water Resource Management).
The SOS DescribeSensor method returns a SensorML document with all the information about a particular sensor, however, you must know about the sensor (i.e., sensor ID) before invoking the method. Therefore, DescribeSensor is not sufficient for finding relevant sensors based on particular attributes. The following table describes the parameters of DescribeSensor:
|outputFormat||The outputFormat attribute specifies the desired output format of the DescribeSensor operation.|
|SensorId||The sensorId parameter specifies the sensor for which the description is to be returned. This value must match the value advertised in the xlink:href attribute of a procedure element advertised in the SOS GetCapabilities response.|
|service||Service type identifier (i.e., SOS)|
|version||Specification version for operation|
The SOS GetCapabilities method, on the other hand, returns a service description that contains several attributes that could be useful for sensor discovery (i.e., location, property, availability, etc.).
|time||Time period for which observations can be obtained. This supports the advertisement of historical as well as real-time observations.||Availability|
|observedProperty||The observable/phenomenon that can be requested in this offering.||Measured phenomenon|
|featureOfInterest||Features or feature collections that represent the identifiable object(s) on which the sensor systems are making observations. In the case of an in-situ sensor this may be a station to which the sensor is attached representing the environment directly surrounding the sensor. For remote sensors this may be the area or volume that is being sensed, which is not co-located with the sensor. The feature types may be generic Sampling Features (see O&M) or may be specific to the application domain of interest to the SOS. However, features should include spatial information (such as the GML boundedBy) to allow the location to be harvested by OGC service registries.||Location|
|intendedApplication||The intended category of use for this offering such as homeland security or natural resource planning||Application Domain|
|procedure||A reference to one or more procedures, including sensor systems, instruments, simulators, etc., that supply observations in this offering. The DescribeSensor operation can be called to provide a SensorML or TML description for each system.|
The following example illustrates an SOS GetCapabilities document describing a service for a weather station. The sensor description is semantically annotated with model references to classes and individuals related to a sensor, observed properties, and a location.
<sos:Contents> <sos:ObservationOfferingList> <sos:ObservationOffering gml:id="urn:ogc:def:procedure:JPEO-CBD::WeatherStation_1"> <gml:name>urn:ogc:def:procedure:JPEO-CBD::WeatherStation_1</gml:name> <gml:boundedBy> <gml:Envelope srsName="urn:ogc:def:crs:EPSG:4326"> <gml:lowerCorner>18.556825 -72.297935</gml:lowerCorner> <gml:upperCorner>18.556825 -72.297935</gml:upperCorner> </gml:Envelope> </gml:boundedBy> <sos:time> <gml:TimeInstant xsi:type="gml:TimeInstantType"> <gml:timePosition indeterminate="now"/> </gml:TimeInstant> </sos:time> <sos:procedure xlink:href="http://purl.oclc.org/NET/ssnx/ssn-dev#WeatherStation_1"/> <sos:observedProperty xlink:href="http://purl.oclc.org/NET/ssnx/cf/cf-property#snow-precipitation"/> <sos:observedProperty xlink:href="http://purl.oclc.org/NET/ssnx/cf/cf-property#temperature"/> <sos:observedProperty xlink:href="http://purl.oclc.org/NET/ssnx/cf/cf-property#windspeed"/> <sos:featureOfInterest xlink:href="http://sws.geonames.org/5248611/"/> <sos:responseFormat>text/xml;subtype="om/1.0.0"</sos:responseFormat> <sos:resultModel xmlns:ns="http://www.opengis.net/om/1.0">ns:Observation</sos:resultModel> <sos:responseMode>inline</sos:responseMode> <sos:responseMode>resultTemplate</sos:responseMode> </sos:ObservationOffering> </sos:ObservationOfferingList> </sos:Contents>
An important benefit of semantically annotating sensor data is the additional expressivity supplied by an ontological representation. For example, if a weather ontology provides definitions for winter storms and their observable properties, then annotating sensor data with concepts (i.e., classes, individuals, and relations) from this ontology enables the ability to reason over such concepts. The GetCapabilities document above represents an offering with a weather station capable of observing three properties. Each property is a semantically annotated with a link to its definition within an ontology. From observations generated by this weather station, a blizzard may be inferred. Such knowledge may then be added to the original GetCapablities document. The GetCapabilities document below illustrates this example. In particular, notice the added sos:featureOfInterest tag which links to a blizzard individual. Within a standard Sensor Observation Service that has been extended with semantic annotations, we have now provided the ablitity to query for high-level weather events, along with low-level weather phenomena.
<sos:Contents> <sos:ObservationOfferingList> <sos:ObservationOffering gml:id="urn:ogc:def:procedure:JPEO-CBD::WeatherStation_1"> <gml:name>urn:ogc:def:procedure:JPEO-CBD::WeatherStation_1</gml:name> <gml:boundedBy> <gml:Envelope srsName="urn:ogc:def:crs:EPSG:4326"> <gml:lowerCorner>18.556825 -72.297935</gml:lowerCorner> <gml:upperCorner>18.556825 -72.297935</gml:upperCorner> </gml:Envelope> </gml:boundedBy> <sos:time> <gml:TimeInstant xsi:type="gml:TimeInstantType"> <gml:timePosition indeterminate="now"/> </gml:TimeInstant> </sos:time> <sos:procedure xlink:href="http://purl.oclc.org/NET/ssnx/ssn-dev#WeatherStation_1"/> <sos:observedProperty xlink:href="http://purl.oclc.org/NET/ssnx/cf/cf-property#snow-precipitation"/> <sos:observedProperty xlink:href="http://purl.oclc.org/NET/ssnx/cf/cf-property#temperature"/> <sos:observedProperty xlink:href="http://purl.oclc.org/NET/ssnx/cf/cf-property#windspeed"/> <sos:featureOfInterest xlink:href="http://sws.geonames.org/5248611/"/> <b><i><sos:featureOfInterest xlink:href="http://purl.oclc.org/NET/ssnx/ssn-dev#Blizzard_1"/></i></b> <sos:responseFormat>text/xml;subtype="om/1.0.0"</sos:responseFormat> <sos:resultModel xmlns:ns="http://www.opengis.net/om/1.0">ns:Observation</sos:resultModel> <sos:responseMode>inline</sos:responseMode> <sos:responseMode>resultTemplate</sos:responseMode> </sos:ObservationOffering> </sos:ObservationOfferingList> </sos:Contents> | <urn:uuid:78e58456-e54c-4043-b1dd-c99ca5fda74f> | CC-MAIN-2015-22 | http://www.w3.org/2005/Incubator/ssn/wiki/index.php?title=Report_Work_on_Semantic_Markup&oldid=3229 | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207926828.58/warc/CC-MAIN-20150521113206-00147-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.765325 | 6,548 | 2.65625 | 3 |
The terms foobar, foo, bar, baz and qux are sometimes used as placeholder names (also referred to as metasyntactic variables) in computer programming or computer-related documentation. They have been used to name entities such as variables, functions, and commands whose purpose is unimportant and serve only to demonstrate a concept. The words themselves have no meaning in this usage. Foobar is sometimes used alone; foo, bar, and baz are sometimes used in that order, when multiple entities are needed.
The usage in computer programming examples and pseudocode varies; in certain circles, it is used extensively, but many prefer descriptive names, while others prefer to use single letters. Eric S. Raymond has called it an "important hackerism" alongside kludge and cruft.
History and etymology
The origins of the terms are not known with certainty, and several anecdotal theories have been advanced to identify them. Foobar may have derived from the military acronym FUBAR and gained popularity due to the fact that it is pronounced the same. In this meaning it also can derive from the German word furchtbar, which means awful and terrible and described the circumstances of the Second World War.
FOO is an abbreviation of Forward Observation Officer, a British Army term in use as early as the First World War. The etymology of foo is explored in the Internet Engineering Task Force (IETF) Request for Comments 3092, which notes usage of foo in 1930s cartoons including The Daffy Doc (with Daffy Duck) and comic strips, especially Smokey Stover and Pogo. From there the term migrated into military slang, where it merged with FUBAR.
"Bar" as the second term in the series may have developed in electronics, where a digital signal which is considered "on" with a negative or zero-voltage condition is identified with a horizontal bar over the signal label; the notation for an inverted signal foo would then be pronounced "foo bar". Bar may also be read as beyond all repair, which is how it is used in the acronym FUBAR.
Full article ▸ | <urn:uuid:4114bea5-4f96-4086-912a-99207b47f433> | CC-MAIN-2017-47 | http://www.princeton.edu/~achaney/tmve/wiki100k/docs/Foobar.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805242.68/warc/CC-MAIN-20171119004302-20171119024302-00183.warc.gz | en | 0.959613 | 439 | 2.984375 | 3 |
the Week of Proper 3 / Ordinary 8
Hosts, Lord of
The 1901 Jewish Encyclopedia
Like other Hebrew proper names, the name of God is more than a mere distinguishing title. It represents the Hebrew conception of the divine nature or character and of the relation of God to His people. It represents the Deity as He is known to His worshipers, and stands for all those attributes which He bears in relation to them and which are revealed to them through His activity on their behalf. A new manifestation of His interest or care may give rise to a new name. So, also, an old name may acquire new content and significance through new and varied experience of these sacred relations.
It can readily be understood, therefore, how the divine name is often spoken of as equivalent to the divine presence or power or glory. In Exodus 23:20-23 it is promised that Yhwh's angel will lead and give victory to His people, who must yield reverent obedience, for, the Lord says, "my name is in him." The devout Israelite will not take the name of a false god upon his lips (Exodus 23:13; Joshua 23:7; Hosea 2:16-17; Psalms 16:4). To make mention of Yhwh's name is to assert confidence in His strength and present and efficient aid. The name excites emotions of love, joy, and praise (Psalms 5:11; 7:17; 9:2; 20:1,7). That name is, therefore, especially connected with the altar or sanctuary, the place where God records His name (Exodus 20:24), or "the place which the Lord your God shall choose out of all your tribes to put His name there" (Deuteronomy 12:5; comp. 1 Kings 8:16,29; 9:3; Jeremiah 7:12). The Temple is "the place of the name of the Lord of hosts, the mount Zion" (Isaiah 18:7). In one or two comparatively late passages "the Name" () is used absolutely, doubtless as an equivalent for "the name of Yhwh" (Leviticus 24:11,16; comp. Deuteronomy 28:58).
Of the names of God in the Old Testament, that which occurs most frequently (6,823 times) is the so-called Tetragrammaton, Yhwh (), the distinctive personal name of the God of Israel. This name is commonly represented in modern translations by the form "Jehovah," which, however, is a philological impossibility (see See JEHOVAH). This form has arisen through attempting to pronounce the consonants of the name with the vowels of Adonai ( = "Lord"), which the Masorites have inserted in the text, indicating thereby that Adonai was to be read (as a "ḳeri perpetuum") instead of Yhwh. When the name Adonai itself precedes, to avoid repetition of this name, Yhwh is written by the Masorites with the vowels of Elohim, in which case Elohim is read instead of Yhwh. In consequence of this Masoretic reading the authorized and revised English versions (though not the American edition of the revised version) render Yhwh by the word "Lord" in the great majority of cases.
This name, according to the narrative in Exodus 3 (E), was made known to Moses in a vision at Horeb. In another, parallel narrative (Exodus 6:2,3, P) it is stated that the name was not known to the Patriarchs. It is used by one of the documentary sources of Genesis (J), but scarcely if at all by the others. Its use is avoided by some later writers also. It does not occur in Ecclesiastes, and in Daniel is found only in ch. The writer of Chronicles shows a preference for the form Elohim, and in Psalms 42- Elohim occurs much more frequently than Yhwh, probably having been substituted in some places for the latter name, as in Psalms 53 (comp. Psalms 14).
In appearance, Yhwh () is the third person singular imperfect "ḳal" of the verb ("to be"), meaning, therefore, "He is," or "He will be," or, perhaps, "He lives," the root idea of the word being,probably, "to blow," "to breathe," and hence, "to live." With this explanation agrees the meaning of the name given in Exodus 3:14, where God is represented as speaking, and hence as using the first personâ"I am" (, from , the later equivalent of the archaic stem ). The meaning would, therefore, be "He who is self-existing, self-sufficient," or, more concretely, "He who lives," the abstract conception of pure existence being foreign to Hebrew thought. There is no doubt that the idea of life was intimately connected with the name Yhwh from early times. He is the living God, as contrasted with the lifeless gods of the heathen, and He is the source and author of life (comp. 1 Kings 18; Isaiah 41:26-29, 44:6-20; Jeremiah 10:10,14; Genesis 2:7; etc.). So familiar is this conception of God to the Hebrew mind that it appears in the common formula of an oath, "ḥai Yhwh" (= "as Yhwh lives"; Ruth 3:13; 1 Samuel 14:45; etc.).
If the explanation of the form above given be the true one, the original pronunciation must have been Yahweh () or Yahaweh (). From this the contracted form Jah or Yah () is most readily explained, and also the forms Jeho or Yeho ( = ), and Jo or Yo (, contracted from ), which the word assumes in combination in the first part of compound proper names, and Yahu or Yah () in the second part of such names. The fact may also be mentioned that in Samaritan poetry rimes with words similar in ending to Yahweh, and Theodoret ("Quæst. 15 in Exodum") states that the Samaritans pronounced the name 'IαβÎ. Epiphanius ascribes the same pronunciation to an early Christian sect. Clement of Alexandria, still more exactly, pronounces 'IÎ±Î¿Ï Î or 'IÎ±Î¿Ï Î±Î¯, and Origen, 'Iα. Aquila wrote the name in archaic Hebrew letters. In the Jewish-Egyptian magic-papyri it appears as ÎαÏÎ¿Ï Î·Îµ. At least as early as the third century B.C. the name seems to have been regarded by the Jews as a "nomen ineffabile," on the basis of a somewhat extreme interpretation of Exodus 20:7 and Leviticus 24:11 (see Philo, "De Vita Mosis," 3:519,529). Written only in consonants, the true pronunciation was forgotten by them. The Septuagint, and after it the New Testament, invariably render δκÏÏÎ¹Î¿Ï ("the Lord").
Various conjectures have been made in recent times respecting a possible foreign origin of this name. Some derive it from the Kenites, with whom Moses sojourned, Sinai, the ancient dwelling-place of Yhwh, having been, according to the oldest tradition, in the Kenite country. A Canaanite, and, again, a Babylonian, origin have been proposed, but upon grounds which are still uncertain. Various explanations of the meaning of the name, differing from that given above, have been proposed: e.g., (1) that it is derived from ("to fall"), and originally designated some sacred object, such as a stone, possibly an acrolite, which was believed to have fallen from heaven; (2) or from ("to blow"), a name for the god of wind and storm; (3) or from the "hif'il" form of ("to be"), meaning, "He who causes to be," "the Creator"; (4) or from the same root, with the meaning "to fall," "He who causes to fall" the rain and the thunderboltâ"the storm-god." The first explanation, following Exodus 3:14, is, on the whole, to be preferred.
The most common of the originally appellative names of God is Elohim (), plural in form though commonly construed with a singular verb or adjective. This is, most probably, to be explained as the plural of majesty or excellence, expressing high dignity or greatness: comp. the similar use of plurals of "ba'al" (master) and "adon" (lord). In Ethiopic, Amlak ("lords") is the common name for God. The singular, Eloah (), is comparatively rare, occurring only in poetry and late prose (in Job, 41 times). The same divine name is found in Arabic (ilah) and in Aramaic (elah). The singular is used in six places for heathen deities (2 Chronicles 32:15; Daniel 11:37,38; etc.); and the plural also, a few times, either for gods or images (Exodus 9:1, 12:12, 20:3; etc.) or for one god (Exodus 32:1; Genesis 31:30,32; etc.). In the great majority of cases both are used as names of the one God of Israel.
The root-meaning of the word is unknown. The most probable theory is that it may be connected with the old Arabic verb "alih" (to be perplexed, afraid; to seek refuge because of fear). Eloah, Elohim, would, therefore, be "He who is the object of fear or reverence," or "He with whom one who is afraid takes refuge" (comp. the name "fear of Isaac" in Genesis 31:42,53; see also Isaiah 8:13; Psalms 76:12). The predominance of this name in the later writings, as compared with the more distinctively Hebrew national name Yhwh, may have been due to the broadening idea of God as the transcendent and universal Lord.
The word El () appears in Assyrian (ilu) and Phenician, as well as in Hebrew, as an ordinary name of God. It is found also in the South-Arabian dialects, and in Aramaic, Arabic, and Ethiopic, as also in Hebrew, as an element in proper names. It is used in both the singular and plural, both for other gods and for the God of Israel. As a name of God, however, it is used chiefly in poetry and prophetic discourse, rarely in prose, and then usually with some epithet attached, as "a jealous God." Other examples of its use with some attribute or epithet are: El 'Elyon ("most high God"), El Shaddai ("God Almighty"), El 'Olam ("everlasting God"), El Ḥai ("living God"), El Ro'i ("God of seeing"), El Elohe Israel ("God, the God of Israel"), El Gibbor ("Hero God").
The commonly accepted derivation of this name from the Hebrew root , "to be strong," is extremely doubtful. A similar root has been explained from the Arabic as meaning "to be in front," "to be foremost," "to lead," "to rule," which would give the meaning "leader," "lord." But the fact that the e in El was originally short, as seen in such proper names as Elkanah, Elihu (), and in the Assyrian "ilu," is strong evidence against this derivation. As in the case of Elohim, it is necessary to admit that the original meaning is not certainly known.
Shaddai and 'Elyon.
The word Shaddai (), which occurs along with El, is also used independently as a name of God,chiefly in the Book of Job. It is commonly rendered "the Almighty" (in LXX., sometimes ÏανÏοκÏάÏÏÏ). The Hebrew root "shadad," from which it has been supposed to be derived, means, however, "to overpower," "to treat with violence," "to lay waste." This would give Shaddai the meaning "devastator," or "destroyer," which can hardly be right. It is possible, however, that the original significance was that of "overmastering" or "overpowering strength," and that this meaning persists in the divine name. Another interesting suggestion is that it may be connected with the Assyrian "shadu" (mountain), an epithet sometimes attached to the names of Assyrian deities. It is conjectured also that the pointing of may be due to an improbable rabbinical explanation of the word as ("He who is sufficient"), and that the word originally may have been without the doubling of the middle letter. According to Exodus 6:2,3, this is the name by which God was known to Abraham, Isaac, and Jacob.
The name 'Elyon () occurs with El, with Yhwh, with Elohim, and also alone, chiefly in poetic and late passages. According to Philo Byblius (Eusebius, "Præparatio Evangelica," 1:10), the Phenicians used what appears to be the same name for God, 'Eλιον.
Adonai and Ba'al.
Adonai () occurs as a name of God apart from its use by the Masorites as a substituted reading for Yhwh. It was, probably, at first Adoni ("my Lord") or Adonai ("my Lord," plural of majesty), and later assumed this form, as a proper name, to distinguish it from other uses of the same word. The simple form Adon, with and without the article, also occurs as a divine name. The name Ba'al (), apparently as an equivalent for Yhwh, occurs as an element in a number of compound proper names, such as Jerubbaal, Ishbaal, Meribaal, etc. Some of these names, probably at a time when the name of Baal had fallen into disrepute (comp. Hosea 2:16,17), seem to have been changed by the substitution of El or Bosheth for Baal (comp. 2 Samuel 2:8, 4:4, 5:16; 1 Chronicles 8:33,34; 9:39,40; 14:7).
Other titles applied to the God of Israel, but which can scarcely be called names, are the following: Abir ("Strong One" of Jacob or Israel; Genesis 49:24; Isaiah 1:24; etc.); Ḳedosh Yisrael ("Holy One of Israel"; Isaiah 14, 31:1; etc.); áºur ("Rock") and áºur Yisrael ("Rock of Israel"; 2 Samuel 23:3; Isaiah 30:29; Deuteronomy 32:4,18,30); Eben Yisrael ("Stone of Israel"; Genesis 49:24 [text doubtful]).
The names Yhwh and Elohim frequently occur with the word áºeba'ot ("hosts"), as Yhwh Elohe áºeba'ot ("Yhwh God of Hosts") or "God of Hosts"; or, most frequently, "Yhwh of Hosts." To this last Adonai is often prefixed, making the title "Lord Yhwh of Hosts." This compound divine name occurs chiefly in the prophetic literature and does not appear at all in the Pentateuch or in Joshua or Judges. The original meaning of áºeba'ot is probably to be found in 1 Samuel 17:45, where "Yhwh áºeba'ot" is interpreted as denoting "the God of the armies of Israel" (comp. Joshua 5:13-15; Isaiah 13:4). The word, apart from this special use, always means armies or hosts of men, as, for example, in Exodus 6:26, 7:4, 12:41, while the singular "áºaba" is used to designate the heavenly host. It is noteworthy also that the name Yhwh áºeba'ot is more than once directly associated with the Ark, which was the symbol of God's presence in the midst of the hosts of His people (Numbers 10:35,36; 1 Samuel 4:4; 2 Samuel 6:2). Later, and especially in prophetic usage, the word was transferred to the heavenly hosts, or rather the heavenly were added to the earthly hosts. For this idea of heavenly hosts joining their forces with those of God's people, or fighting on behalf of God's servants, compare Judges 5:20; 2 Kings 6:16,17; Psalms 34:7, 68:17.
- Gray, Hebrew Proper Names, London, 1896;
- Driver, The Book of Genesis, excursus , pp. 402-409, London, 1904;
- Spurrell, Hebrew Text of Genesis, Appendix;
- Driver, on the Tetragrammaton, in Studia Biblica, vol. , Oxford, 1885;
- Kuenen, Religion of Israel (English transl.), 1:41-42;
- Monteflore, Religion of Hebrews, pp. 50-53, London, 1893.
âIn Rabbinical Literature:
The Rabbis as well as the cabalists steadfastly maintained their belief in monotheism. Hence they recognized only one proper name for the Deity, considering the other names as appellations or titles signifying divinity, perfection, and power, or as characterizing His acts as observed and appreciated by mankind in the various stages of their development. The cabalists illustrate this by the instance of one who looks at the sun through various-colored glasses, which change the impressions produced upon the observer, but do not affect the sun.
The name Yhwh is considered as the Name proper; it was known in the earliest rabbinical works simply as the Name; also as Shem ha-Meyuḥad ("the Extraordinary Name"; Sifre, Num. 143); as Shem ha-Meforash ("the Distinguished Name"; Yoma 6:2); as Shem ben Arba' Otiyyot ("the Tetragrammaton" or "the Quadriliteral Name"; Ḳid. 71a); and as Yod He Waw He (spelling the letters of Yhwh). The pronunciation of the written Name was used only by the priests in the Temple when blessing the people (Numbers 6:22-27); outside the Temple they used the title "Adonai" (Soá¹ah 7:6; p. 38a). The high priest mentioned the Name on Yom Kippur ten times (Tosef., Yoma,; 39b). R. Johanan said the sages delivered to their disciples the key to the Name once in every Sabbatical year. The sages quoted, "This is my name for ever, and this is my memorial unto all generations" (Exodus 3:15). Here the word "le-'olam" (forever) is written defectively, being without the "waw" for the vowel "o," which renders the reading "le-'allem" (to conceal; Ḳid. 71a). SHEM HA-MEFORASH.
The restriction upon communicating the Name proper probably originated in Oriental etiquette; in the East even a teacher was not called by name. For naming his master Elisha, Gehazi was punished with leprosy (2 Kings 8:5; Sanh. 100a). After the death of the high priest Simeon the Righteous, forty years prior to the destruction of the Temple, the priests ceased to pronounce the Name (Yoma39b). From that time the pronunciation of the Name was prohibited. "Whoever pronounces the Name forfeits his portion in the future world" (Sanh. 11:1). Hananiah ben Ṭeradion was punished for teaching his disciples the pronunciation of the Name ('Ab. Zarah 17b). It appears that a majority of the priests in the last days of the Temple were unworthy to pronounce the Name, and a combination of the letters or of the equivalents of the letters constituting the Name was employed by the priests in the Temple. Thus the Twelve-Lettered Name was substituted, which, a baraita says, was at first taught to every priest; but with the increase of the number of licentious priests the Name was revealed only to the pious ones, who "swallowed" its pronunciation while the other priests were chanting. Another combination, the Forty-two-Lettered Name, Rab says, was taught only to whomever was known to be of good character and disposition, temperate, and in the prime of life (Ḳid. 71a; comp. Rashi to 'Ab. Zarah 17b). Maimonides, in his "Moreh," thinks that these names were perhaps composed of several other divine names.
The Incommunicable Name was pronounced "Adonai," and where Adonai and Yhwh occur together the latter was pronounced "Elohim." After the destruction of the Second Temple there remained no trace of knowledge as to the pronunciation of the Name (see JEHOVAH). The commentators, however, agree as to its interpretation, that it denotes the eternal and everlasting existence of God, and that it is a composition of (meaning "a Being of the Past, the Present, and the Future"). The name Ehyeh () denotes His potency in the immediate future, and is part of Yhwh. The phrase "ehyeh-asher-ehyeh" (Exodus 3:14) is interpreted by some authorities as "I will be because I will be," using the second part as a gloss and referring to God's promise, "Certainly I will be [ehyeh] with thee" (Exodus 3:12). Other authorities claim that the whole phrase forms one name. The Targum Onḳelos leaves the phrase untranslated and is so quoted in the Talmud (B. B. 73a). The "I AM THAT I AM" of the Authorized Version is based on this view.
The name Yah () is composed of the first letters of Yhwh. There is a difference of opinion between Rab and R. Samuel as to whether or not "hallelujah" is a compound word or two separate words meaning "praise ye Yah" (Yer. Meg. 1:9; Pes. 117a). The name Ho () is declared to be the middle part of Yhwh and an abridged form of the Name (Shab. 104a; Suk. 4:5).
Elohim denotes multiplied power, that is, the Almighty, and describes God as the Creator of nature. R. Jacob Asheri, the author of the "Ṭurim," in his annotations to the Pentateuch, says the numerical value of the letters in ("Elohim") equals the value (86) of those in ("nature"). Elohim represents the force of "din" (fixed laws), while Yhwh is the modification of the natural laws and the elements of "raḥamim" (mercy and leniency) as reflected in the developed state of mankind. In the Zohar, R. Simeon says the Divine Name (Yhwh) was mentioned only when the world was perfected, and quotes Genesis 2:4 (Hebr.)â"in the day that Yhwh made the earth and the heavens." The word "'asot" is interpreted as "perfected," after the Creation (Zohar, Yitro, 88a, ed. Wilna, 1882). El is part of Elohim, meaning simply "power" (= "mighty"). "Shaddai" is explained as "the selfsufficient" ("she-dai hu lo").
The sacredness of the divine names must be recognized by the professional scribe who writes the Scriptures, or the chapters for the phylacteries and the mezuzah. Before transcribing any of the divine names he prepares mentally to sanctify them. Once he begins a name he does not stop until it is finished, and he must not be interrupted while writing it, even to greet a king. If an error is made in writing it, it may not be erased, but a line must be drawn round it to show that it is canceled, and the whole page must be put in a genizah and a new page begun.
The Seven Names.
The number of divine names that require the scribe's special care is seven: El, Elohim, Adonai, Yhwh, Ehyeh-Asher-Ehyeh, Shaddai, and áºeba'ot. R. Jose, however, considered áºeba'ot a common name (Soferim 4:1; Yer. R. H. 1:1; Ab. R. N.; "Sefer Yeáºirah," ). R. Ishmael held that even Elohim is common (Sanh. 66a). All other names, such as Merciful, Gracious, and Faithful, merely represent attributes that are common also to human beings (Sheb. 35a). The prohibition of blasphemy, for which capital punishment is prescribed, refers only to the Name properâYhwh (Soferim , end; comp. Sanh. 66a). In many of the passages in which "clohim" occurs in the Bible it refers to Gentile deities, or in some instances to powerful or learned men (comp. Genesis 3:5; ), to judges (Exodus 21:6), or to Israel (Psalms 81:9, 82:6; see Tan., Ḳedoshim). Adonai sometimes refers to a distinguished person (comp. Genesis 18:3). Even the name Yhwh, misused in the narrative of Micah (Judges 17:2,3,13; 18:6), is not a divine name, according to the decisive authority (Sheb. 35b). A list of all the doubtful divine names found in the Scriptures is given in Soferim and in the codes.
The Talmud says Shalom ("Peace"; Judges 6:23) is the name of God, consequently one is not permitted to greet another with the word "shalom" in unholy places (Shab. 10b). The name Shelomoh (from shalom) refers to the God of Peace, and the Rabbis assert that the Song of Solomon is a dramatization of the love of God: "Shalom" to His people Israel = "Shulamite." "King of kings" in Daniel 2:37 refers to God. "'Attiḳ Yamin" (ib. 7:9) refers to the Ancient One of the universe (see Yalḳ., Chron. 1076). The pronoun "Ani" (I) is a name of God (Suk. 4:5). The first verse in Ezekiel ("we-Ani") refers to God (Tos. Suk. 45a). Hillel's epigram "If I [am] here everything is here" (Suk. 53a) is interpreted as referring to God. The divine names are called in the Talmud "Azkarot," or "Adkarata" in the Aramaic form. Divine names that occur in the handwriting of minim should be excised and buried in the genizah (Shab. 116a; Cant. R. 2:4). God is named also Ha-Geburah ("The Majesty"; Shab.87a), but generally Ha-Maḳom. ("The Omnipresence"),accompanied with Baruk-hu ("Praised be He"). For other appellations see list below.
It became the custom at an early period to use the name of God in personal greetings, as "The Lord be with thee," or "The Lord bless thee" (Ruth 2:4; Ber. 9:1; comp. Mak. 23a). The Greek inquisition in Judea prohibited the utterance of God's name, but when the Hasmoneans became victorious they decreed that the Name should be mentioned even in notes and documents. The formula began: "On . . . in the year of the high priest Johanan, the servant of the Most High God." The sages, however, opposed this innovation, as they thought the Name would be defiled when the notes were canceled and thrown away as useless. Consequently on the third day of Tishri following, the record says, the Rabbis forbade the mention of God's name in documents (Meg. Ta'anit; R. H. 18b).
The cabalists, in their system of cosmology, explained the significance of the names and added other divine names. The most important name is that of the En Sof ("Infinite" or "Endless"), who is above the Sefirot. The Forty-two-Lettered Name contains the combined names of (spelled in letters = 42 letters), which is the name of Aáºilut ("Animation"). The cabalists added the Forty-five-Lettered Name as being the equivalent in value of Yhwh ( = 45). The name is derived from Proverbs 30:4â"what is his name?" The numerical value of the letters (= "what") equals 45 (Zohar, Yitro, 79a). The Seventy-two-Lettered Name is derived from three verses in Exodus (14:19-21) beginning with "Wayyissa'," "Wayyabo," "Wayyeá¹," respectively. Each of the verses contains 72 letters, and when combined they form the following names:
The first and third verses are to be read forward and the second verse backward, one letter of each word respectively in the above order from right to left. Rashi, also, in his comment to Suk. 45a, mentions this scheme (see Zohar, Beshallaḥ, 52a, and Appendix, 270a, ed. Wilna). A combination of the Seventy-two-Lettered Name appeared on the Urim and Thummim, consisting of the names of the Twelve Tribes (50 letters), of the Patriarchs (13 letters), and of the "Shibá¹e Yisrael" (the tribes of Israel; 9 letters). When the Urim and Thummim were consulted in regard to any matter this divine name lit up the letters, which were brought into relief according to R. Johanan, or into such a combination, according to Resh Laḳish, as to make the answer intelligible (Yoma 73b). Ibn Ezra figures the Seventy-two-Lettered Name as the equivalent in value of the name Yhwh spelled with the names of the letters (=72).
The divine names of God, the Haggadah says, were used to perform miracles by those who knew their combinations. King David, on making excavations for the Temple, and finding that the deep was moving upward, asked for permission to stop its rising, which threatened to destroy the world, by inscribing the name of God on a potsherd and throwing it into the deep. His minister Ahithophel, who was well versed in the Law, permitted it (Mak. 11a). The manipulation of the sacred letters forming the divine names was the means used to create the world ("Sefer Yeáºirah," ). By a similar method some of the Talmudists are credited with having created living animals (Sanh. 65b, 67b); in later times others succeeded by the same means in creating the golem (see GOLEM).
Divine Names in Print.
Awe at the sacredness of the names of God and eagerness to manifest respect and reverence for them made the scribes pause before copying them. The text of the Scriptures was of course left unchanged; but in the Targumim the name Yhwh was replaced by two "yods" with a "waw" over them, thus: , which letters are equal in value to Yhwh (=26). In their commentaries the authors substituted Elohim by Eloḳim () and Yhwh by Ydwd (). For other changes see list below. In Ḳimḥi's commentary on the Prophets (ed. Soncino, 1485) the printer apologizes for changing the "he" of Yhwh to a "dalet" and the "he" of Elohim to a "ḳof," "in honor and reverence for His Name, for sometimes copies may be lost and become liable to misuse." In Hebrew literature generally and in Hebrew letter-writing the name of God is represented by the letter "he" or "dalet" with an accent over it, thus: or . Authors of Hebrew theological works begin their introductions generally with four words whose initial letters form the name Yhwh (e.g., ).
The following names and transcriptions of the names of God are found in rabbinical writings (the names mentioned in the Bible also are not given):
|For Elohim.||For Adonai.|
|By transposition of letters (see Mezuzah):|
- Maimonides, Yad, Yesode ha-Torah,;
- idem, Moreh, 1:60-62;
- Shulḥan Aruk, Yoreh De'ah, 276;
- Maḥzor Vitry, pp. 692-694;
- Ibn Ezra, Sefer ha-Shem, Fürth, 1834;
- Yesod Moreh, § 11 and notes, Prague, 1833;
- Eleazar Fleckeles, Mel'eket ha-Ḳodesh, Prague, 1812;
- Zunz, S. P. p. 145.
These files are public domain.
Singer, Isidore, Ph.D, Projector and Managing Editor. Entry for 'Hosts, Lord of'. 1901 The Jewish Encyclopedia. https://www.studylight.org/encyclopedias/eng/tje/h/hosts-lord-of.html. 1901. | <urn:uuid:75b7821d-0912-4e86-96e1-a45e32275548> | CC-MAIN-2023-23 | https://www.studylight.org/encyclopedias/eng/tje/h/hosts-lord-of.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00741.warc.gz | en | 0.946677 | 7,503 | 3.296875 | 3 |
VOLUNTARY GUIDELINES – NATURAL & HUMAN-MADE DISASTERS
16.1 Food should never be used as a means of political and economic pressure.
16.2 States reaffirm the obligations they have assumed under international humanitarian law…..with respect to the humanitarian needs of the civilian population including in situations of armed conflict and occupation
Additional Protocol I provides, inter alia, that “the starvation of civilians as a method of warfare is prohibited” and that “it is prohibited to attack, destroy, remove or render useless objects indispensable to the survival of the civilian population, such as foodstuffs, agricultural areas for the production of foodstuffs, crops, lifestock, drinking water installations and supplies for irrigation works, for the specific purpose of denying them, for their sustanence value to the civilian population or to the adverse party, whatever the motive, whether to starve out civilians, to cause them to move away, or for any other motive”…..
16.3 In situations of occupation, international humanitarian law provides, inter alia: that to the fullest extent of the means available to it, the Occupying Power has the duty of ensuring the food and medical supplies of the population; that it should, in particular, bring in the necessary foodstuffs, medical stores and other articles if the resources of the Occupied Territory are inadequate….
16.5 States should make every effort to ensure that refugees and internally displaced persons have access at all times to adequate food. In this respect, States and other relevant stakeholders should be encouraged to make use of the Guiding Principles on Internal Displacement when dealing with situations of internal displacement. | <urn:uuid:fbc59a04-615a-48ab-bf2b-856a67de92a6> | CC-MAIN-2019-39 | http://girlsspeakout.org/in-this-season-remember-the-right-to-food-belongs-to-each-person-no-matter-where-they-are/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574084.88/warc/CC-MAIN-20190920221241-20190921003241-00339.warc.gz | en | 0.909108 | 345 | 2.53125 | 3 |
Introduction and Aknowlegdements
The threnody of sound builds to a minor cresendo as the speck seen in the distance grows in size. As the small shape begins to grow the slender shape becomes more defined. The growling whine reaches a peak as the aircraft we have been watching becomes more defined. A quick flick of the ailerons and the elliptical wing shape is revealed before the sound fades on the wind and the fighter is gone.
Go to any airshow and amongst the warbird fraternity there will be airframes powered by the Rolls-Royce Merlin engine. Some will be Mustangs, possibly a Lancaster, even a Hawker Hurricane or two, however it is highly likely that the carrier of the engine will be a Supermarine Spitfire. Each type has its own particular soundwave, and that of the Spitfire is not only distinctive but a source of great pleasure to its many fans. It is also the fighter that characterised the British effort in the Second World War (although fans of the Hawker Hurricane will no doubt disagree.) The Supermarine Spitfire is today seen as one of the greatest fighter aircraft ever.
It owes its conception to one man, R J Mitchell, and to a series of events including the Schneider Trophy races. Although the aircraft that Supermarine would develop in later years bore no direct relationship to the S.6 seaplane racers, the concept behind the streamlining of the airframe and the shoehorning of the largest powerplant possible into the smallest space proved that such an approach was feasible. As these events were happening, the Royal Air Force was still equipping its front-line squadrons with such aircraft as the Bristol Bulldog, the Hawker Fury, and the Gloster Gauntlet and Gladiator series of biplanes.
In Europe one man was in the process of rising to power in Germany and his influence would force that continent into a war that would eventually become almost global in its scope. Against this backdrop the Spitfire would be born. Small, fast, and agile it would be churned out in vast numbers to equip the squadrons of the RAF and its allies. In the seminal Battle of Britain it would share combat honours with the Hawker Hurricane which would in fact claim more victories than its Supermarine rival.
As the war would progress, so the design would develop. Clipped, clapped, and cropped would be the phrase used to describe the Mk.V converted for low-altitude work.
Developments would also see Spitfires operating at the other end of the spectrum as pressurisation was incorporated so that the fighter, complete with modified engine, could chase the Luftwaffe's highaltitude raiders.
Further changes would see bombs, fuel tanks, and even kegs of beer loaded on to the airframe whilst some daring souls would streak across Europe on reconnaissance missions in Spitfires painted, of all colours, pink.
The aircraft also went to sea where it equipped the squadrons of the Fleet Air Arm aboard escort and main fleet carriers. This, then, is the story from a slightly different angle of a fighter that still graces museums and airshows, where the growl of that famous Merlin engine can still be heard.
As always a work such as this is a multi person affair so I would like to thank the following for their much prized assistance: Damien Burke, FAA Archive; Nick Challoner; Dave Stewart; Danny Jacquemin; Chris Michell of Airframe Assemblies; Ray Deacon; Owen Morris; and Sander Wittenaar. Special thanks must go to Peter Russell Smith who yet again came up trumps with those essential photographs; and that doyen of Spitfire historians, Eric B Morgan, who also came to my rescue with those rarities once again.
At the end, but always in the centre, are the team at Specialty Press and my good friend and designer, Dennis R Jenkins, without whose sterling efforts this slim volume would not exist.
Kev Darling - Wales - September 2001
MÀJ : 19 novembre 2018
Suivi des modificationsInformation
Historique des modifications du site
Les dix dernières modifications
Unités Nouveau Système International - 26e Conférence Générale Poids et Mesures.
Bibliothèque Air France et le DOUGLAS DC-3
Vilgénis Promotion 1956-1959 - Photo équipe rugby (Avec promo 1957-1960)
Constellation Tous les Lockheed Constellation Air France sur une seule page
Constellation Moteur-R3350 - Carburation - Injection (détails)
Constellation Manuel Theory of Operation Turbo Compound Engine
Constellation Photos et rapport accident F-BGNA à Preston (03/08/1954)
Vilgénis Promo 1960-1963 - 58e anniversaire - Ajout photos de Jacques Demarque » Mado »
Vilgénis Promo 1960-1963 - 58e anniversaire
Vilgénis Photos repas promotion 51-54 étendue - Mennecy 28 avril 2018
Cliquez pour les voir toutes avec les liens
Effectuée par freefind.com
Métaux et alliages aéronautiques
L'acier et ses alliages,
l'aluminium et ses alliages (Alpax, Duralumin, Duralinox, Zicral,...),
le magnésium et ses alliages,
le titane et ses alliages.
Propriétés physiques et chimiques.
Traitements thermiques et chimiques. Etc.
Concorde dans la presse entre 1965 et 2003
Plus de 700 documents
- des coupures de presse, la plupart patiemment récupérées et archivées par un agent Air France passionné de Concorde, Pierre Dumez, père d'un de mes anciens collègues,
- des extraits de revues internes Air France (Briefing, France Aviation, Point Fixe,...), avec l'aimable autorisation d'Air France
- un extrait de Lignes Aériennes, avec l'aimable autorisation de Jacques Darolles
- quelques photographies de matériel,
- des documents divers, comme la brochure du Comité de soutien Concorde d'avril 1974, aimablement communiquée par Francis SAINT PIERRE.
On peut y trouver l'historique en trois étapes, le premier vol, les essais au sol et en vol, les moteurs, la philatélie, la publicité technique et commerciale, le tragique accident du F-BTSC, les modifications, le redécollage et l'arrêt des vols. | <urn:uuid:6a082f76-1c5d-46f0-9cbe-394dd15e5d08> | CC-MAIN-2018-51 | http://aviatechno.net/bib/images.php?image=56 | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823318.33/warc/CC-MAIN-20181210055518-20181210081018-00321.warc.gz | en | 0.732867 | 1,473 | 3.21875 | 3 |
Pegboard books provide a way for young children who are blind or visually impaired, including those with multiple disabilities, to begin to explore books. Based on the work of Dr. Lilli Nielsen and her Active Learning approach, this format uses real objects attached to pieces of pegboard. The common household materials that are selected have varied and interesting tactile properties, which encourage exploration. Ronda Dalley of the New Mexico School for the Blind shared this example of a pegboard book.
- shelving unit or frame to hold the book together
- string, velcro, cable ties, or other way to secure the items to the book
- interesting tactile materials, such as mirrors, brushes, socks, and other textured items
- Items can be changed, as needed, or removed to be cleaned.
- Books can be made following a theme or a routine, such as bathtime.
- For more examples of pegboard books, see also http://www.activelearningspace.org/things-you-can-make/books | <urn:uuid:9f0a6b09-7f93-48f9-be71-ebf91414c1ed> | CC-MAIN-2019-26 | http://www.pathstoliteracy.org/strategies/pegboard-books-our-earliest-readers | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999066.12/warc/CC-MAIN-20190619224436-20190620010436-00410.warc.gz | en | 0.902015 | 213 | 3.84375 | 4 |
Hotter and dryer conditions are leading to an increasing number of wildfires in North America and elsewhere around the world. The damage they cause is well-known. But one aspect of that damage that tends to be overlooked is the impact on aquatic environments and drinking water supplies.
Hydrogen fuel cell electric vehicles are just starting to enter the market but they have a long way to go before they can even catch up with their battery-powered counterparts. Powering cars with hydrogen has the advantage that fueling the vehicle is much like what we are used to: pull up to the pump, fill your tank for a few minutes, and drive off.
Organizers of the Tokyo 2020 Olympic Games announced in February that all the Olympic medals for the games will be made from recycled materials. The strategic roadmap for the games, laid out in the document “Olympic Agenda 2020”, specifically calls for the inclusion of sustainability in every aspect of the games. | <urn:uuid:880ea713-2a9e-458d-ab31-c9538ec0daa1> | CC-MAIN-2020-05 | https://earthwiseradio.org/tag/metals/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250610004.56/warc/CC-MAIN-20200123101110-20200123130110-00434.warc.gz | en | 0.971623 | 191 | 2.921875 | 3 |
The first ski area at Kreuzeck 1,340 m (4,396 ft) was developed for the 1936 Winter Olympics in neighboring Garmisch-Partenkirchen, the first Olympics to feature alpine skiing. The sole event was the combined, with one downhill run and two runs of slalom. The Kreuzeck valley base station served as finish line for the downhill, while the slalom was run at Gudiberg, adjacent to the ski jumping hill, Große Olympiaschanze.
The Kreuzeck featured Germany's first Mountain Gondola (Kreuzeckbahn 1926) which made the Kreuzeck range the alpine portal to the neighboring areas of the Kreuzjoch, the Alpspitze, and the Höllental and provided the infrastructure to host the downhill event for the 1936 Winter Olympics. The original Olympic course is still maintained and accessible. The current downhill course garnered notoriety as a designated "Kandahar" event and continues to host World Cup events in downhill, super G, and giant slalom. It hosted the World Championships in 1978 and 2011. | <urn:uuid:436888a8-2e37-42a9-909a-445a9e812596> | CC-MAIN-2018-13 | http://placesadvise.com/Germany/Garmisch_Partenkirchen/Kreuzeck | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648198.55/warc/CC-MAIN-20180323063710-20180323083710-00571.warc.gz | en | 0.92421 | 237 | 2.703125 | 3 |
As the cheerleaders used to say…READY? OKAY!
(To start your memoir that is).
(Image: Edward Hopper painting on cover for latest Redwood Writers’ Anthology-available on Amazon)
Let’s Get Started:
- MIND MAPS. The easiest way for me to organize my thoughts is with a mind map. This is a free-form record of the thought processes for constructing your memoir that you can add to or subtract from easily.
- To begin, find yourself a large sheet of drawing paper and place your main thought in the center. For instance, let’s call it “My Memoir” for now.
- Draw a circle around your title/main thought.
- Next, draw lines that look like the spokes of a wheel, out from your main circle. Not too long. Leave room between them, because you are going to write down your thoughts about your memoir along these lines. Whatever comes to you.
- Then, see if you can think of a few other thoughts on each subject. Draw branches for these secondary thoughts, and then branch from them, just like the branches of a tree. Don’t overthink it at this point, just write down whatever comes to your mind. One thought or subject will lead organically to another.
- Pretty soon you’ll see something resembling a spider web or tree. Have fun with it. Add color and unique shapes. Play.
- Now on a separate piece of paper, make a few notes on each subject you’ve been able to identify. And so on.This technique works best for right-brain dominant folks (artists and flower children, perhaps). Now let’s look at how to begin your memoir if you’re a left-brain type (say a mathematician or an engineer):
2. OUTLINE (you remember how to do this from high school, don’t you?) It goes like this:
- Me-(during the period defined by the memoir—not your whole life, that’s an autobiography)
- My Family
- How they affected my life, etc.
a. strong memories about them
c. funny stories
…and so on. I guess you can sorta tell into which camp I fall.
The most important thing, remember, is to “just do it!”
No more excuses.
Until next time… | <urn:uuid:16b5aeae-93b6-4ea6-b15e-6b9f03002e28> | CC-MAIN-2017-39 | http://winecountrywriter.com/begin-writing-memoir-2-two-different-ways/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690016.68/warc/CC-MAIN-20170924115333-20170924135333-00067.warc.gz | en | 0.899812 | 509 | 2.640625 | 3 |
We all use our smartphones at least once a day, often much more than is appropriate. Some of us, I’m sure, could not survive without them. A modern cellphone can do many tasks because of its highly improved features. They have enabled internet services like online banking and research on practically everything, not to mention they have made it easy to contact anyone, anytime, from anywhere. It even seems ludicrous to consider a time before smartphones because their use has become so compulsive. But there was. Every technology has its origins in innovation, and its rise to popularity can take years.
So when did cell phones start to become common? The 2000s saw a rise in the use of cell phones as they became more widely available. Earlier, the majority of people couldn’t afford them. Obtaining one was challenging, even with money available. However, cellphone production increased, and prices dropped in the early 2000s.
6 Reasons Cell Phones Became Popular In The 2000s
The late 2000s and early 2010s were when smartphones became widely used. The first iPhone was released in 2007, and the Android operating system followed in 2008. Smartphones revolutionized the cell phone industry because they offered features that had never been seen before, such as internet access, apps, and cameras. Suddenly, cell phones became virtual devices that people couldn’t live without.
More Useable for Personal Communication
The internet and social media have made staying in touch with people easier. You can communicate with anyone, anytime, anywhere. This was a major selling point of smartphones when they first came out, and it’s one of the reasons they’re so popular today.
While smartphones are frequently used for entertainment and games, their primary purpose is still personal communication. We use them to stay in touch with our family and friends, whether it’s through text messages, social media, or video calls. They’ve become essential to our lives, and we can’t imagine living without them. Due to their higher prices, corporations and governments tended to use cell phones more frequently in the beginning.
However, as technology improved and costs decreased, cell phones became popular. They were more frequently used for private communications.
Demand surged as a result, which further lowered prices. Cell phones continued to spread out and become more affordable as time went on, continuing the cycle.
Advances in Cellular Network
Cell phone companies improved their services in the 2000s, which made cell phones more attractive to customers. The coverage became much better and dropped calls were less common. This was a big selling point for cell phones because people wanted to be able to rely on them.
The cellular network also got faster in the early 2000s. This was thanks to the introduction of 3G technology. This made it possible to use the internet on your cell phone, which was a major selling point. People could now do things like check their email and access social media while on the go. Cell phones became more widely available and well-liked in the 2000s because of considerable developments in cellular network technology.
The first commercial 3G network went live in Japan in the middle of 2001, and by 2010, there were more than 2.3 billion 3G subscribers worldwide.
These developments made possible faster downloads, web surfing, streaming, and better audio and video calling.
The Release of the Apple iPhone in 2007
The Release of the iPhone in 2007 was a game-changer for the cell phone industry. It was the first smartphone on the market and offered features that had never been seen before. The iPhone popularized many features that are now common on all smartphones, such as internet access, apps, and a touchscreen interface. The 2007 introduction of the Apple iPhone was a watershed moment for mobile phone technology.
The iPhone utilized a new operating system, iOS, which transformed the mobile phone into a mini-computer capable of web browsing and running desktop-style programs.
The iPhone was billed as a “smartphone” with capabilities beyond making calls and sending texts. Smartphones are currently more popular than ever and show no signs of diminishing.
You could buy them in stores.
You could buy them anywhere, which was a major selling point. In the past, cell phones had been difficult to obtain because you had to sign up for a plan with a cell phone company.
The iPhone was expensive but still much cheaper than previous smartphones. It was also
more user-friendly and had a better interface. Made it more appealing to a wider range of people, not just those already familiar with the technology. The iPhone was a major success, and it changed the cell phone industry forever.
The service plans were affordable.
The plans were affordable, and this made them more appealing to customers. In the past, flagship phone companies had been known for their high prices and poor customer service. This made it difficult for people to justify the cost of a cell phone.
The iPhone was different because it offered a great user experience at a reasonable price. This made it much more attractive to customers and helped to boost sales. The iPhone was a major success, and it changed the cell phone industry forever.
They weren’t too expensive.
The main selling point of the best android phone or IOS was that it was much cheaper than previous smartphones. This made it more appealing to a wider range of people, not just those already familiar with the technology. The cell phone was a major success, and it changed the cell phone industry forever.
Is there something we cannot do with our smartphones? A few years ago, phones were mostly used for making calls and sending text messages. Today’s mobile phones are powerful, multifunctional handheld computers that enable their users to surf the web, send emails, shoot and edit photographs, listen to music, watch movies, have online meetings, and even keep track of their money.
Edge-to-edge displays of the first generation
Xiaomi and LG unveiled the first generation of edge-to-edge display smartphones in 2016. These phones have a tiny bezel surrounding the display, allowing for a larger display area on the front of the device.
Bezel-less smartphones (first generation)
Bezel-less smartphones, commonly called infinity display smartphones, have a huge display area and a considerably reduced bezel area. This provides a more immersive experience when reading, watching films, or playing games on a mobile device. This phone’s screen is the most prominent feature, providing the user with an unobstructed view of their preferred material. The first version of these phones was released in 2017 and was exclusive to high-end Samsung Galaxy S8 and Apple iPhone X models.
Google and Android enter the picture.
Smartphones were in a favorable position at the turn of the 21st century. Numerous companies, including Motorola, Nokia, and BlackBerry, had introduced their first smartphones by this time, and their gadgets had attracted devoted followers. The iPhone wasn’t scheduled to be released for several years.
At that point, though, Google entered the game unexpectedly. The business revealed that it would develop Android, a smartphone operating system. This is where the beginnings of Android and Google got intertwined when Google acquired Android in 2005 for USD 50 million. Google had always focused on software for PC users, not smartphone users, making this a surprise shift.
The operating system was open-source and accessible to third-party developers, enabling them to create applications quickly and easily. Android subsequently become one of the world’s most popular operating systems.
The operating system was designed to be open-source and available to third-party developers, enabling them to construct applications fast and easily.
The introduction of the iPhone and Android smartphones fundamentally altered how people interact with computers, specifically the internet.
Future of mobile phones
The next major stage in the evolution of our smartphones may involve screens that can be rolled, folded, or even transformed into wristbands.
Flexible display phones have been available for some years. However, the screens are only somewhat bendable; they cannot be bent completely around to make a bracelet without shattering. LG Display, a South Korean company, is developing new technology that could change this. They claim to have built a rollable 18-inch OLED display similar to a newspaper. If LG can get this technology small enough to fit in smartphones, it might usher in an entirely new era for mobile electronics.
There are still obstacles to overcome before smartphones with flexible displays can be introduced to the market. It is unclear how flexible users want or need their phones to be; what good is a flexible display if the phone itself cannot be folded? In addition, flexible displays often have a shorter lifespan than conventional screens and are more expensive to manufacture.
We believe these features are just the beginning of what we can do as a company to ensure everyone has access to reliable technology. We’re enthusiastic about what’s to come.
Smartphones equipped with AI processors and software
Multiple smartphone manufacturers are developing the first smartphones with artificial intelligence (AI) processors and software, enabling the devices to do tasks more effectively.
The built-in AI processor is designed to make your phone smarter than ever, learning from you to give personalized features and usefulness.
The AI chips permit mobile devices to do activities locally without transferring data to and from the cloud. This implies that it can quickly complete tasks without sharing your information with a third party.
AI chips can be used for more than voice recognition; for instance, they can assist with facial recognition or modify camera settings automatically based on the user’s aim.
Selfies became more popular than viewing other people’s photographs.
It is common knowledge that selfies are more popular than ever. What began as a localized fad has grown into a global phenomenon. A recent survey found that the average person shoots 20 to 30 selfies daily and spends at least 30 minutes each day reviewing their images. That’s more than 1,000 selfies annually!
This is not only a problem for adolescents and young adults. People of all ages are snapping and publishing online selfies. The selfie craze has also generated other apps, such as Snapchat, enabling users to edit and share their photographs with peers instantly. Some experts have referred to the trend of taking selfies as “the new narcissism” Although at first look, this may appear to be an exaggeration, there are various reasons why it could be accurate.
Smartphones and mobile devices have gained greater popularity than ever before. These devices have achieved this by being designed with the user in mind, with features that are not merely there for the sake of a design trend but rather make the device easier to use and provide additional functionality.
There are numerous ways in which the smartphone has transformed our lives with its smartphone operating system. When consumers have access to mobile internet, the possibilities are infinite, from being able to swiftly and easily access the internet to utilizing social media and online purchasing applications. No longer are we socially or professionally tethered to our desks or computers as a source of communication.
What does the future hold for mobile phones?
Recently, smartphones were introduced, and phones with physical buttons are becoming obsolete today. This demonstrates that cell phones are developing so swiftly that there is no time to focus on a single design. Based on this pattern, it appears that practically anything we can conceive will be achievable in the future.
New technologies are continually being developed, and mobile phone manufacturers are fast to adopt them. It appears that there is no limit to the invention. Best smartphones nowadays have a dual camera setup with an optical zoom like google pixel with low light photography with night mode of the main camera lens, the best battery life than the iPhone SE with wireless charging, a great outer display with more space than any android phone or IOS.
Future experts expect that most phone software and hardware will be migrated to the cloud. Smartphones with a great camera system will dominate the market, causing the extinction of classic button cell phones. Future Android phones will be designed to appeal to our emotions. It will be able to coordinate with our biological reflexes, including cognitive processes, eye movement, cultural preferences, and kinesthetic. They are expected to become even more integrated into our daily lives than they now are.
The future best phone, according to some futurologists, will serve as the remote control for our lives. There will be flexible-frame phones, biodegradable phones, solar phones, human companion phones, and various types of artificial intelligence. In reality, smartphones may be replaced by devices powered by artificial intelligence that fulfill all the tasks of smartphones.
Smartphones have become popular in the last decade. They provide a variety of features that people find useful, such as internet access, cameras, and GPS capabilities. In addition, smartphones are often more affordable than traditional computers. Smartphones continue to grow in popularity, with new models being released yearly. Another blog And Follow YouTube Channel | <urn:uuid:85ca3f9c-3557-4dd5-9771-80050a0fff67> | CC-MAIN-2023-14 | https://freedomguider.com/when-did-smartphones-become-popular/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00348.warc.gz | en | 0.96552 | 2,651 | 2.78125 | 3 |
European court makes landmark ruling on DNA rights
By Paisley Dodds
LONDON — Europe's top human rights court Thursday struck down a British law that allows the government to store DNA and fingerprints from people with no criminal record - a landmark decision that could force Britain to destroy nearly 1 million samples on its database.
Rights groups say the ruling could have even wider implications for the storage of other sensitive and personal data.
The case originated when British police refused to destroy DNA samples of two Britons whose criminal cases were dropped.
The European Court of Human Rights' ruled unanimously that keeping DNA samples and fingerprints was in violation of people's right to a private life - a protection under the Human Rights Convention to which the United Kingdom is a signatory. It also criticized Britain's use of "blanket and indiscriminate" storage.
Britain cannot appeal the ruling. It has until March to submit plans for destroying samples or to make a case for why some should be kept. Many European countries allow for temporary storage of DNA in sex crimes or other offenses but samples are usually destroyed after the cases are closed.
"It's a fantastic result after a 7-year, hard-fought battle," said Peter Mahy, a lawyer who represented the two Britons.
Britain has one of the world's largest DNA databases with more than 4.5 million samples, usually collected with a cheek swab.
In England and Wales, more than 850,000 DNA samples from people with no criminal record are stored on a national database. Samples have come from anyone who has been arrested, regardless whether they were charged, convicted or acquitted. Even the DNA of crime victims has been stored on occasion.
"DNA and fingerprinting is vital to the fight against crime, providing the police with more than 3,500 matches a month, and I am disappointed by the European Court of Human Rights' decision," said Britain's Home Secretary Jacqui Smith. "The existing law will remain in place while we carefully consider the judgment."
Human rights advocates have long claimed that storing the DNA of innocent people is a disproportionate invasion of privacy when weighed against actual convictions using DNA.
The European court complaint was brought by Michael Marper, and a teenager only named as "S" because he is a juvenile. Both were arrested in 2001 - Marper for harassing his partner and "S" for attempted robbery - but the charges against the two were dropped.
The two, whose cases were unrelated, first appealed to the police to have their DNA and fingerprints removed from the database.
South Yorkshire Police refused, saying the details would be retained "to aid criminal investigation." The men then appealed to the House of Lords, which ruled in favor of the police, saying that keeping the information was legal under the Criminal Justice and Police Act and did not breach their human rights.
The European court based in Strasbourg, France, disagreed, ordering British authorities to pay euro42,000 ($53,000) in legal fees. Its rulings are binding on all EU nations.
"Sweeping up the innocent with the guilty does not help fight crime," said Anna Fairclough, legal officer for the London-based rights group, Liberty.
Police, however, pointed to recent cases solved with the use of DNA.
Prosecutors used DNA evidence this year to convict a man with the murders of five prostitutes in a series of slayings that shocked Britain.
Chris Sims, a forensics specialist from Britain's Association of Chief Police Officers, said 200,000 DNA samples were retained from 2001 to 2005 from people charged but not convicted of offenses.
"Of these, about 8,500 profiles of individuals have been linked with crime scene profiles involving nearly 14,000 offenses, including 114 murders, 55 attempted murders, 116 rapes, 68 sexual offenses, 119 aggravated burglaries and 127" drug cases, he said.
The core complaint to the European court centered on the retention of DNA, not collecting it to solve crimes.
"The court was struck by the blanket and indiscriminate nature of the power of retention in England and Wales," it said in its ruling. "The data in question could be retained irrespective of the nature or gravity of the offense with which the individual was originally suspected or of the age of the suspected offender."
Britain's current policy is to retain samples until the individual dies or reaches 100 years old. Scotland, which has its own legislature, destroys DNA samples taken during criminal investigations that are dropped.
DNA samples are also destroyed upon acquittal in Finland, Germany and Sweden.
The U.S. government announced plans this year to begin collecting DNA samples from anyone arrested by a federal law enforcement agency. It also plans to collect DNA samples from foreigners who are detained, whether they have been charged or not - a departure from current practice that limits DNA collection to convicted felons.
If a person is arrested but not convicted, they can ask the Justice Department to destroy the sample.
In France, police can take DNA samples from people before they are formally charged and those samples can be kept for 25 years. People acquitted or not charged can ask to be removed from the database but it's "a complex process," said Jeanne Bossi of the CNIL, France's independent privacy watchdog.
A key part of the European court's ruling said people "were entitled to the presumption of innocence."
Privacy International said the ruling provides a benchmark for collecting data from innocent people - a ruling that could challenge Britain's plans for a database containing DNA samples of children, for a national identity register and for storing sensitive personal information such as financial or health details.
Copyright 2014 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
"The entire legal underpinning of Britain's surveillance state has now collapsed," said Simon Davies with Privacy International. | <urn:uuid:d4751d95-08c1-4b0a-b1d6-dc51f84e7253> | CC-MAIN-2014-15 | http://www.policeone.com/police-products/crime-scene-investigation/articles/1762627-European-court-makes-landmark-ruling-on-DNA-rights/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533308.11/warc/CC-MAIN-20140416005213-00462-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.963932 | 1,184 | 2.625 | 3 |
hartfordHartford sits at the southernmost part of the byway and is often a starting point for many byway travelers. More than 200 years ago, Lewis & Clark made the village of Hartford their winter home as they established their first camp, Camp River Dubois. It was here that the men prepared for their westward journey. At the confluence of the Mississippi and Missouri Rivers, it was here that the Corps of Discovery departed on May 14, 1804.
Nearly 100 years after Lewis & Clark's departure, the village of Hartford was settled as a rail, river, road and commercial community, the type of industrial center which remains today. Visitors to Hartford will want to be sure that they take the time to explore the Lewis & Clark State Historic Site. This 14,000 square foot facility is dedicated to telling the story of Lewis and Clark in Illinois and at Camp River Dubois. The museum consists of six exhibit galleries, a theater, a full-scale 55-foot "cutaway keelboat" and a fortified encampment. The museum is the largest heritage site dedicated to Lewis & Clark east of the Rocky Mountains.
In 2010, the village opened its newest attraction - the Lewis & Clark Confluence Tower. From platforms at 50, 100 and 150 feet in the air, visitors are able to look down on the confluence of the Missouri & Mississippi rivers, where the journey began.
For more information on Hartford, visit their community website at www.hartfordillinois.net | <urn:uuid:37e75b93-4f62-44da-ba42-1ac839d3f4be> | CC-MAIN-2018-51 | https://www.visitalton.com/places/hartford | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824115.18/warc/CC-MAIN-20181212181507-20181212203007-00001.warc.gz | en | 0.953677 | 304 | 2.625 | 3 |
By Erik S.
Legend  of the Unicorn
One legend stems from the vertebrate (The Narwhal) whose tusk is alluded to as alicon.
The Norwhal ( unicorn ) is one of the rarest whales realized that lives in the Arctic. The male of this species has a solitary left tusk that is an adjusted upper incisor. The tusk is spirally curved, typically in a counter clockwise position. In a full grown example the tusk could be 2 to 7 metres in length. One horn in Liverpool University is accepted to have been from the horn of a Narwhal, measuring 110cm long with a width of 5.2cm, decreasing to 2.5cm. The Narwhal is not an imperiled species, not, one or the other is it chased industrially. | <urn:uuid:0006609a-d26c-46a0-9fc1-e8d2a22b4d18> | CC-MAIN-2018-47 | http://dailybeautyandfashion.com/legend-unicorn/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743353.54/warc/CC-MAIN-20181117102757-20181117124757-00368.warc.gz | en | 0.950358 | 174 | 2.9375 | 3 |
|Northern Marsh Orchid|
There is greater diversity of plant life on the roadsides than on the moorland a few yards back from the road. This must in part be due to the passing traffic helping to distribute seeds, but other factors maybe the disturbance of the soil when the roads were built (here, the main road was built in about 1965), and fences which keep the moorland sheep away from the flowering plants. For safety reasons, to improve visibility, the verges are generally mown later in the summer, but the plants flowering now will have set seed by then. I think this helps with diversity too, as there don't seem to be as many flowering plants in places where the mowing doesn't happen - but the grasses look amazing!
|25th June, Roskhill| | <urn:uuid:2f79947f-c6e3-4617-bebc-a1a5ce2014b6> | CC-MAIN-2023-50 | https://skyecalling.blogspot.com/2014/06/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102637.84/warc/CC-MAIN-20231210190744-20231210220744-00525.warc.gz | en | 0.984359 | 166 | 2.515625 | 3 |
|RADIXSORT(3)||FreeBSD Library Functions Manual||RADIXSORT(3)|
NAMEradixsort, sradixsort — radix sort
LIBRARYStandard C Library (libc, -lc)
SYNOPSIS#include < limits.h>
#include < stdlib.h>
radixsort( const unsigned char **base, int nmemb, const unsigned char *table, unsigned endbyte);
sradixsort( const unsigned char **base, int nmemb, const unsigned char *table, unsigned endbyte);
DESCRIPTIONThe radixsort() and sradixsort() functions are implementations of radix sort.
These functions sort an array of pointers to byte strings, the initial member of which is referenced by base. The byte strings may contain any values; the end of each string is denoted by the user-specified value endbyte.
Applications may specify a sort order by providing the table argument. If non- NULL, table must reference an array of UCHAR_MAX + 1 bytes which contains the sort weight of each possible byte value. The end-of-string byte must have a sort weight of 0 or 255 (for sorting in reverse order). More than one byte may have the same sort weight. The table argument is useful for applications which wish to sort different characters equally, for example, providing a table with the same weights for A-Z as for a-z will result in a case-insensitive sort. If table is NULL, the contents of the array are sorted in ascending order according to the ASCII order of the byte strings they reference and endbyte has a sorting weight of 0.
The sradixsort() function is stable, that is, if two elements compare as equal, their order in the sorted array is unchanged. The sradixsort() function uses additional memory sufficient to hold nmemb pointers.
The radixsort() function is not stable, but uses no additional memory.
These functions are variants of most-significant-byte radix sorting; in particular, see Algorithm R and section 5.2.5, exercise 10. They take linear time relative to the number of bytes in the strings.'s
RETURN VALUESThe radixsort() function returns the value 0 if successful; otherwise the value -1 is returned and the global variable errno is set to indicate the error.
- [ EINVAL]
- The value of the endbyte element of table is not 0 or 255.
Additionally, the sradixsort() function may fail and set errno for any of the errors specified for the library routine malloc(3).
SEE ALSOsort(1), qsort(3)
Knuth, D.E., Sorting and Searching, The Art of Computer Programming, Vol. 3, pp. 170-178, 1968.
Paige, R., Three Partition Refinement Algorithms, SIAM J. Comput., No. 6, Vol. 16, 1987.
McIlroy, P., Computing Systems, Engineering Radix Sort, Vol. 6:1, pp. 5-27, 1993.
HISTORYThe radixsort() function first appeared in 4.4BSD.
|January 27, 1994||FreeBSD| | <urn:uuid:ccc7c1b7-a67a-430a-a3a1-f4983a150532> | CC-MAIN-2016-44 | http://www.yosbits.com/opensonar/rest/man/freebsd/man/en/man3/radixsort.3.html?l=en | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719542.42/warc/CC-MAIN-20161020183839-00315-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.722068 | 689 | 2.9375 | 3 |
To The Victoria Falls
The Zambezi River
The Upper Zambezi
From a humble bubbling stream, rising in the Kaleni Hills in the Mwinilunga District of north-western Zambia, close to the borders with Angola and the Congo, the Zambezi River begins a meandering 2,574 kilometre journey from the heart of southern Africa to the Indian Ocean. The source is located 1,524 metres above sea level.
The headwaters of the Zambezi were first discovered and mapped in 1886 by Frank Stanley Arnott, a missionary. He described the marshland between the basins of the Zambezi and Congo rivers as 'the sloppy country'.
The town of Zambezi in the North-Western Province of Zambia, on the Zambezi River west of Kabompo, is home to the chiefs of the Lunda (or BaLunda) and Lovale (or BaLovale) people, known for their traditional beliefs associated with witchcraft or voodoo and which are still commonly practised, and their Makishi dancers who perform a masquerade in intricate masks and costumes. [Makishi dancers are popular in tourism shows, especially at Victoria Falls, although they are not from the immediate vicinity.]
At the Kalene Hills the missionary Dr Walter Fisher started the first mission station in the region in around 1906.
From its source the Zambezi flows south-west, being joined by its first significant tributary, the Kabompo River, and into Angola for about 240 km, where it is joined by a much larger tributary, the Lungue River, before turning south and back into Zambia. When it re-enters Zambia the Zambezi is approximately 400m wide in the rainy season with fast flowing white-water sections at the Cholwezi rapids.
At Chavuma Falls, a few kilometres downstream from the border, the river is forced through a narrow gap in an outcrop of hard volcanic rock and tumbles over a three metre high waterfall. The water sounds like it is being blown through a hole, 'Chaa-VUM-aah', giving rise to the local name. The falls are drowned each year under the high seasonal water levels. The nearby town, of the same name, is situated on a hill overlooking the Zambezi and Kashyi plains, where another early mission station was established.
From its source to Chavuma, about 350 km downstream, the river drops about 400 metres. From here to the Victoria Falls, 800 km distant, the level of the basin is very flat and uniform, dropping only by another 180 metres.
The river is supplemented by another tributary, the Lungwebungu River, and another historical mission station was established at Chitokiloki. Further downstream near Kabompo are the Nyamboma rapids, marking the beginning of extensive floodplains.
The river is wide and slow flowing through this section, travelling over a thick mantle of sand, evidence of the past northern extension of the Kalahari Desert, and forming the vast Barotse Floodplain which extended for some 200 km, being joined by the Luanginga River, which drains a large area to the west, and in flood by overflow of the Luampa/Luena River system from the east. In the rainy season the width of the flooded river can reach up to 25 km.
This section of the upper Zambezi River is known as Barotseland and is the domain of the Lozi people, who live, farm and fish on the floodplains during low water and whose lives are dominated by the seasonal flood cycle of the river. During the rainy season when the plains are in flood, they move to higher ground and forest fringes to escape the flood waters, led by their king, the Litunga, in an annual migration ceremony known as the Kubomboka.
Zambezi River in flood forming the Barotse Floodplain (dark area, lower centre)
From the east it continues to receive numerous small streams, but on the west is without major tributaries for 240 km. South of settlement of Senanga the Ngonye Falls are worthy of note. Situated a few hundred kilometres upstream of the Victoria Falls, near a small town called Sioma, they are formed by the same geological process as the Victoria Falls, with cracks in the basalt riverbed being eroded away to form the drop. Their height is only 10-25 meters, but the width of the falls forms a broad crescent, interrupted by rocky outcrops, creating an impressively picturesque scene. Upstream of these falls, the river is broad and shallow as it flows across Kalahari sands, but below the falls extensive white water rapids exist, as the river is hemmed in by gorges cut into basalt rock, much like the Victoria Falls but on a smaller scale.
Further south, the Zambezi turns east and briefly forms the border between Zambia and Namibia's Caprivi Strip before emerging into the Caprivi Swamps at Katima Mulilo.
At Katima Mulilo the variation in the height of the river from low water is up to 7 metres. The water flow at flood time varies between 2500–4500 cubic metres per second flowing at 7-8 km per hour. In 2004 the flow in full flood was recorded at 6000 cubic metre per second and approx 10km per hour.
This extensive and complext wetland system lies on Namibia’s international border with Botswana, Zambia and Zimbabwe, and stretches from the Kwando River in the west to the Zimbabwean border-post at Kazungula in the east. The area is divided into five geographically distinct zones: the Upper Kwando (137 km2), Lower Kwando and Linyanti Swamps (3,830 km2), the emphemeral Lake Liambezi (406 km2), the Chobe River and marsh (311 km2) and the Zambezi flood-plains (1,800 km2).
The swamplands are almost completely flat and topographically featureless, resulting in an unusual hydrology regieme. Under flood conditions, the Kwando is essentially linked to the Zambezi, with water flowing from the Kwando into the Linyanti Swamp, about 10% of which finally reaches Lake Liambezi. When full, Lake Liambezi has an outlet to the Chobe river, which subsequently joins the Zambezi at Kazungula. When the Zambezi is in flood, the flow is reversed and water is pushed up the Chobe to Lake Liambezi.
Zambezi River emerging from the Caprivi swamps
It was in this region during the mid 1800s that the Makololo established dominance over the Lozi, eventually subjugating their whole kingdom. It was during this time that Dr David Livingstone first explored this region, discovering the river and being the first to link it with the known river mouth of the Zambezi on the east coast. The Makololo were later overthrown by the Lozi who regained their kingdom.
The Caprivi Strip itself results from the colonial era, projecting east from the main part of Namibia (then German South-West Africa) expressly to give access to the Zambezi. Schuckmannsburg was the capital of the Caprivi until 1939 when it was moved to Katima Mulilo.
The region itself consists of reed and papyrus beds interspersed with a myriad of channels and islands. One such channel, the Kasai, is 5 kilometres long and was opened up by the Germans to link the Zambezi and Chobe Rivers and avoid the Mombova rapids which were an obstacle to river navigation.
An unintended consequence of this deal between these rival European colonial powers, which remains a peculiar feature of the region, is that where the Chobe and Zambezi Rivers meet, so apparently do four neighbouring countries - Zambia, Namibia, Botswana and Zimbabwe - a feature known as a 'quadripoint' - although there is some debate as to its existence. If so, it is the only place in the world where four countries meet like this.
A large brown and white pole in the river marks the supposed spot (approximately 17°47′30″S 25°15′48″E). However there is debate as to if all four countries do indeed meet - modern sources and maps cite two separate trijunctions existing perhaps some 100 or 150 meters apart, where the countries of Botswana and Zambia meet and seperate Namibia from Zimbabwe. In 1970, South Africa, which at the time administered Namibia, informed Botswana that there was no common border between Botswana and Zambia, claiming that a quadripoint existed. As a result, South Africa claimed, the Kazungula Ferry, which links Botswana and Zambia at the quadripoint, was illegal. Botswana firmly rejected both claims. There was actually a confrontation and shots were fired at the ferry. some years later, the Rhodesian Army attacked and sank the ferry, maintaining that it was serving military purposes.
Stories tell of a trader who established himself on an island near here called Konkumba in the early days, and who received demands to pay taxes by each of the different countries, who all claimed it as part of their own territory. His answer was always 'Prove the island is yours and I will pay'. The question of ownership is apparently still disputed to this day.
Kazungula, a small border town in Botswana on the south bank of the Zambezi, marks the official border crossing point between Botswana and Zambia. About 20km downstream from Kazungula the swamplands end, and here the Zambezi traverses the Katambora rapids, with swirling white waters for several kilometres, before again entering calm waters.
Flowing east from the Caprivi swamps the Zambezi River's valley and flood plain is wide and broad, ridged by sandstone hills, through which the river gently meanders. Here the river lies at an altitude just over 900 meters above sea-level, on the basalt sheet of the south-central African Plateau. As it continues eastwards it suddenly reaches a chasm which cuts directly across the width of the river bed, and over which it flows creating the spectacular Victoria Falls - the boundary between the Upper and Middle Zambezi sections. | <urn:uuid:1758c350-4a4f-4962-b6da-fa8c06eb9036> | CC-MAIN-2019-39 | https://www.tothevictoriafalls.com/vfpages/zambezi/upperzambezi.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574765.55/warc/CC-MAIN-20190922012344-20190922034344-00175.warc.gz | en | 0.959684 | 2,169 | 3.234375 | 3 |
Road safety - safe cycling
Cycling is a fun, convenient and healthy way to get around - but if you don't follow basic safety guidelines the results could be very serious.
It is important that you are well equipped to cycle safely and aware of the needs of all highway users. The following tips should help you on your way to becoming a safer and more considerate cyclist
- Wear a cycle helmet (with a British standard) - ensure it is a good fit. If you are unsure of how to fit your helmet properly visit your local bicycle shop.
- Wear reflective materials and use a bike light when it is dark to make sure you're seen.... and can be seen!
- Keep your bike well serviced, check brakes, steering and tyres regularly.
When cycling on roads, highways and pavements:
- Always follow the Highway Code. Remember, cyclists are subject to the same traffic laws as motorists and must stop at red traffic lights.
- Be seen - most accidents to cyclists happen at junctions
- Use your bell - Bicycles can be very quiet and can startle pedestrians when they approach from behind. On shared use paths cyclists should slow down when approaching pedestrians, steer a wide birth and ring their bell to warn of their presence. Remember large numbers of people are hard of hearing and or visually impaired.
- Be wary of weather conditions – go more carefully when paths are wet or covered in fallen leaves
- Remember it is illegal to cycle on the pavement, except on shared paths.
When cycling on shared use paths please:
- Give way to pedestrians, leaving them plenty of room
- Keep to your side of any dividing line be prepared to slow down or stop if necessary
- Don't expect to cycle at high speeds
- Be careful at junctions, bends and entrances
- Remember that many people are hard of hearing or visually impaired - don't assume pedestrians can see or hear you
- Carry a bell and use it - don't surprise people
- Give way where there are wheelchair users and horse riders
When cycling in the countryside:
- Follow the Country Code
- Respect other land management activities such as farming or forestry and take litter home
- Keep erosion to a minimum if off road
- Be self-sufficient - in remote areas carry food, repair kit, map and waterproofs
- Try to cycle or use public transport to travel to and from the start and finish of your ride
- Cycle within your capabilities
- Match your speed to the surface and your skills
Cycle Safety Activities Menu
(Please click on an activity.)
1. Know Your Bike
Can you correctly name the main parts of a bike? This is your chance to find out.
2. Protect Your Head
Find out what happened to Roxy on the one day that she forgot to wear her helmet. Beware of Spike!
3. The Bicycle Story
We all love our bikes but, do you know how bikes came about? This is the story to find out and test your memory at the same time.
4. Ready for the Road?
Roxy, Max, Jess and Tom want to cycle outside, but we think they need your help to make sure they are ready for the road.
5. Tom's Bike Survey
Cycling is popular in Tom's class as this survey shows, but Tom is stuck! Can you help him with his spreadsheet?
6. Find the Hidden Message
Max is involved in a mystery game of letters. Get your detective 'helmet' on!
7. Spot the Mistakes
Jess is out cycling, but you won't believe the things she's doing wrong! Please help her before she gets in trouble.
8. Safer Routes
Help Roxy find a safer route for cycling from where she lives to school. (Try to guess where she met Spike in Activity 2.)
9. Build a Bike
Have you ever dreamed of building your own bike? This is your chance to do it,
on-screen! Remember to recycle what you don't need.
10. Parts of a Bike - Wordsearch
Another chance to see if you know your 'gears' from your 'spokes' - this time as a word game. Something happens to the wheel when you find all the words. | <urn:uuid:83aee720-c480-4377-8dd7-c01a4a2aada4> | CC-MAIN-2017-47 | http://abercarnprimary.com/mod/page/view.php?id=51 | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805417.47/warc/CC-MAIN-20171119061756-20171119081756-00398.warc.gz | en | 0.941522 | 881 | 3.40625 | 3 |
du: Finding the file/folder size from command line in linux
To find the amount of space occupied by any file or folder in the system we can use the command du.
Let us say we have a folder test which contains the files file1,file2,file3,temp
To find the size of the folder test
$ du test 4 test/temp 8 test
The first column Indicates the size of the folder and the second column gives the name of the folder. By default du also lists the sizes of only the sub folders and not of files.
In case we want to have a look at the size of the files too we can use the option “-a”
$ du -a test 0 test/file2 0 test/file3 0 test/file1 4 test/temp 8 test
The size column if displayed with no suffix can be difficult to read for bigger sized files, to make the reading easier we can use the option “-h” which sill convert it into more human readable form
$ du -h test 4.0K test/temp 8.0K test
The suffix K indicating the size is in Kilo bytes. For Mega bytes it will be M for giga G etc.
If we just want the size of the folder and not its sub folders we can use the option “-s”
$ du -s test 8.0K test
We can also pass file names to find the size of a file instead of a folder.
$ du -h test/file1 0 test/file1
Thus we can easily find the space occupied by any file or folder on the system using the du command | <urn:uuid:30827b62-40a6-4977-8682-6c1e5a7815b6> | CC-MAIN-2018-39 | http://www.zubi-dubi.com/du-finding-the-filefolder-size-from-command-line-in-linux/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155561.35/warc/CC-MAIN-20180918150229-20180918170229-00443.warc.gz | en | 0.822334 | 350 | 2.921875 | 3 |
You might call a mouse small, but a tiny creature knows and a shrew may be much smaller. In fact, shrews are among the tiniest mammals on earth.
Shrew are furry animals that look much like a mice, except for their long, pointed noses, which they use to explore cracks and crevices for food.
Some kinds of shrews are only two to three inches long and weight about as much as a penny, while the largest ones may be the size of small rats.
Shrews make their homes in grassy fields, woodlands, gardens and marshes. They are often mistaken for mice because of their small size.
But for all its small size, a shrew is a big eater and spends almost all its life in a never-ending hunt for food.
It must eat nearly twice its own weight in insects and worms each day to keep up its supply of energy.
Shrews are useful in gardens and farms. They get rid of pests that destroy drops.– Dick Rogers | <urn:uuid:c4ed612d-dd11-4c3b-8769-b78c13316737> | CC-MAIN-2016-22 | https://mindjourney1962.wordpress.com/2009/07/10/what-is-a-shrew/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049274119.75/warc/CC-MAIN-20160524002114-00160-ip-10-185-217-139.ec2.internal.warc.gz | en | 0.98065 | 209 | 3.1875 | 3 |
When the Defense Audiovisual Agency (DAVA) and the United States Air Force (USAF) produced the film “Ejection Decision- A Second Too Late” in 1981 the services had been through a war (Vietnam) and years of operational experience with ejection seats. The film was made as a training film for aircrews to ingrain proper decision making about ejection seat use, and the timing thereof. It’s an eye-opening piece of work that features pilots and crews who had to “punch out” and in so doing joined the Martin-Baker Ejection Tie Club when their aircraft were no longer in controlled flight. Thanks to YouTuber Wdtvlive42 – Archive Footage for uploading it.
Ejection seat technology was pioneered by the Germans and the Swedes. The first operational aircraft with an ejection seat was the German Heinkel He 162A Spatz jet. Ejection seats first appeared in American aircraft when prototype jets began to appear during the mid-1940s. These initial ejection seats were manufactured by the Martin-Baker company. Convair’s F-102 Delta Dagger was the first aircraft to be equipped with a rocket-propelled ejection seat.
Since that time the rocket-propelled ejection seat has become standard equipment on the majority of jet-propelled aircraft. In the film the Fairchild-Republic A-10 Thunderbolt II, McDonnell Douglas F-4 Phantom II, General Dynamics F-111, McDonnell Douglas (Boeing) F-15 Eagle, and General Dynamics F-16 Fighting Falcon jets are all featured as aircraft from which ejection in a timely manner was the correct decision. | <urn:uuid:18dd76e7-82ba-4492-a65b-a4e21a57b49d> | CC-MAIN-2018-26 | https://www.avgeekery.com/handgrips-raise-triggers-squeeze-how-to-eject-at-the-right-time/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863939.76/warc/CC-MAIN-20180620221657-20180621001657-00475.warc.gz | en | 0.967862 | 351 | 3.296875 | 3 |
Location: Arizona, United States
The project is located on the Shivwits Plateau in northeastern Arizona, within the newly established Parashant National Monument. This area is one of the most poorly understood areas of the Southwest culture region. The environment suggests that the area would have been marginal for farming, yet we know that puebloan farmers did indeed live here. From research elsewhere we also know that these farmers regularly made pottery trade with people living to the north. Our field investigations will focus on examining how the puebloans managed to make a living in this marginal environment, and what role pottery production and trade may have played in their adaptation. Field research will focus on excavating a late Pueblo II period habitation site and survey of the adjacent vicinity. We will stay approximately 65 miles south of St. George, Utah and 1.5 miles from the north rim of the Grand Canyon, at a base camp provided by the National Park Service.
Period(s) of Occupation: Virgin Branch Puebloan Culture (A.D. 1100-1250)
Minimum Length of Stay for Volunteers: Six weeks (the entire session)
Room and Board Arrangements
A cabin, equipped with running water and electricity, will be available to support the field school, though students will stay in their own tents. Students are expected to provide their own tents and bedding. The cost of food, which will be prepared daily by a camp cook, is covered in the $600 field school fee. | <urn:uuid:d2b177cb-d62b-497e-8b88-8c9d61fba8fe> | CC-MAIN-2016-50 | https://www.archaeological.org/fieldwork/afob/2105 | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542687.37/warc/CC-MAIN-20161202170902-00409-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.959245 | 309 | 2.8125 | 3 |
Climate change is affecting the physiology, phenology and distribution of European plant and animal species (e.g., Thomas et al., 2001; Warren et al., 2001; van Herk et al., 2002; Walther et al., 2002; Parmesan and Yohe, 2003; Root et al., 2003, 2005; Brommer, 2004; Austin and Rehfisch, 2005; Hickling et al., 2005, 2006; Robinson et al., 2005; Learmonth et al., 2006; Menzel et al., 2006a, b). A Europe-wide assessment of the future distribution of 1,350 plant species (nearly 10% of the European flora) under various SRES scenarios indicated that more than half of the modelled species could become vulnerable, endangered, critically endangered or committed to extinction by 2080 if unable to disperse (Thuiller et al., 2005). Under the most severe climate scenario (A1), and assuming that species could adapt through dispersal, 22% of the species considered would become critically endangered, and 2% committed to extinction. Qualitatively-similar results were obtained by Bakkenes et al. (2002). According to these analyses, the range of plants is very likely to expand northward and contract in southern European mountains and in the Mediterranean Basin. Regional studies (e.g., Theurillat and Guisan, 2001; Walther et al., 2005b) are consistent with Europe-wide projections.
An assessment of European fauna indicated that the majority of amphibian (45% to 69%) and reptile (61% to 89%) species could expand their range under various SRES scenarios if dispersal was unlimited (Araújo et al., 2006). However, if unable to disperse, then the range of most species (>97%) would become smaller, especially in the Iberian Peninsula and France. Species in the UK, south-eastern Europe and southern Scandinavia are projected to benefit from a more suitable climate, although dispersal limitations may prevent them from occupying new suitable areas (Figure 12.2). Consistent with these results, another Europe-wide study of 47 species of plants, insects, birds and mammals found that species would generally shift from the south-west to the north-east (Berry et al., 2006; Harrison et al., 2006). Endemic plants and vertebrates in the Mediterranean Basin are also particularly vulnerable to climate change (Malcolm et al., 2006). Habitat fragmentation is also likely to increase because of both climate and land-use changes (del Barrio et al., 2006).
Figure 12.2. Change in combined amphibian and reptile species richness under climate change (A1FI emissions; HadCM3 GCM), assuming unlimited dispersal. Depicted is the change between current and future species richness projected for two 30-year periods (2021 to 2050 and 2051 to 2080), using artificial neural networks. Increasing intensities of purple indicate a decrease in species richness, whereas increasing intensities of green represent an increase in species richness. Black, white and grey cells indicate areas with stable species richness: black grid cells show low species richness in both periods; white cells show high species richness; grey cells show intermediate species richness (Araújo et al., 2006).
Currently, species richness in inland freshwater systems is highest in central Europe declining towards the south and north because of periodic droughts and salinisation (Declerck et al., 2005). Increased projected runoff and lower risk of drought in the north will benefit the fauna of these systems (Lake, 2000; Daufresne et al., 2003), but increased drought in the south will have the opposite effect (Alvarez Cobelas et al., 2005). Higher temperatures are likely to lead to increased species richness in freshwater ecosystems in northern Europe and decreases in parts of south-western Europe (Gutiérrez Teira, 2003). Invasive species may increase in the north (McKee et al., 2002). Woody plants may encroach upon bogs and fens (Weltzin et al., 2003). Cold-adapted species will be forced further north and upstream; some may eventually disappear from Europe (Daufresne et al., 2003; Eisenreich, 2005).
Sea-level rise is likely to have major impacts on biodiversity. Examples include flooding of haul-out sites used for breeding nurseries and resting by seals (Harwood, 2001). Increased sea temperatures may also trigger large scale disease-related mortality events of dolphins in the Mediterranean and of seals in Europe (Geraci and Lounsbury, 2002). Seals that rely on ice for breeding are also likely to suffer considerable habitat loss (Harwood, 2001). Sea-level rise will reduce habitat availability for bird species that nest or forage in low-lying coastal areas. This is particularly important for the populations of shorebirds that breed in the Arctic and then winter on European coasts (Rehfisch and Crick, 2003). Lowered water tables and increased anthropogenic use and abstraction of water from inland wetlands are likely to cause serious problems for the populations of migratory birds and bats that use these areas while on migration within Europe and between Europe and Africa (Robinson et al., 2005). | <urn:uuid:243c8202-adb1-4913-9316-a44552f48d37> | CC-MAIN-2017-30 | https://www.ipcc.ch/publications_and_data/ar4/wg2/en/ch12s12-4-6.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424148.78/warc/CC-MAIN-20170722202635-20170722222635-00233.warc.gz | en | 0.899689 | 1,070 | 3.515625 | 4 |
Dmitri Shostakovich was born in St. Petersburg in 1906, at the dawn of Czardom and a time of growing unrest among the people. At the break-out of the 1917 Russian revolution, Shostakovich was 11 years old and composed a funeral march for its victims, perhaps an early revelation of his rebellious, revolutionary spirit. Not just the old Shostakovich as we know him, but also the young composer was a revolutionary. Soon after admission into the St. Petersburg Conservatory, Shostakovich attracted the interest of others and irritated his teachers. Aleksandr Glazunov, the director, disliked Shostakovich’s music, found it “ghastly” and stated: “This is the first music I can’t hear when I read the score”. Yet Glazunov also added: “But that isn’t what’s important: the future belongs to this boy, not to me.”
As Russia overcame monarchy, so did Shostakovich overcome the late romantic period in music. In the very beginning of his career as a composer, Shostakovich experimented with elements of the avant-garde, such as futurism and atonality, but soon found his own style, a very individual mixture of convention and revolution, solid compositional craftsmanship and fantasy-full rhythm, traditional form and modern melody plus harmony. From time to time, he even took excursions into the world of jazz. Shostakovich was an outstandingly fast and productive composer. He created 15 symphonies and is known as one of the most important symphonic composers of the 20th century. Nevertheless, his work also includes 15 string quartets, 2 full operas, one operetta, three ballets, concerts for various instruments, piano- and chamber music as well as film music.
The enormous work load and the political pressure imposed on Shostakovich as an artist of the Soviet Union must have affected him immensely. Although internationally presented as flagship-composer of the socialist regime, the attitude of Soviet leadership towards Shostakovich was subject to permanent changes. Shostakovich refused to leave his Russian homeland for foreign exile and was at times regarded a conformist, yet at other times considered incompatible with socialist realism. It is not far-fetched to assume that these conflicts might have superimposed on Shostakovich’s already weak physical health. Shostakovich suffered from tuberculosis in his teens, and later on developed myelitis which might be compatible with amyothrophic lateral sclerosis (ALS), also known as motor neuron disease (MND) or Lou Gehrig’s disease (see Pascuzzi et al., 1999 and Kalapatapu et al., 2010). After undergoing a fracture of the leg in 1967, Shostakovich’s ability to walk remained impaired through his death in the year 1975 in a Moscow hospital.
Author: Stefan Fuchs (Translation: Manfred Hecking) | <urn:uuid:6296aa3b-0c46-4931-b5ea-94a00b55e08b> | CC-MAIN-2019-47 | http://soundsandscience.com/index.php?id=121 | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669183.52/warc/CC-MAIN-20191117142350-20191117170350-00267.warc.gz | en | 0.97326 | 634 | 2.921875 | 3 |
Although it is a sexually transmitted infection, you can get HPV even in sex without penetration, such as with skin-to-skin contact. Hence, there's been a lot of doubt as to whether condoms -- even when used perfectly -- can protect against HPV.
Doubters still can point to the fact that condoms don't offer perfect protection. But they now have to admit they help.
Women whose male sex partners use condoms consistently -- and correctly -- cut their risk of HPV infection by 70%, according to the study by University of Washington researchers Rachel L. Winer, PhD, and colleagues.
"Male condoms effectively reduce the risk of male-to-female genital HPV transmission," Winer and colleagues write.
The findings appear in the June 22 issue of The New England Journal of Medicine.
In an editorial accompanying the report, Family Health International researchers Markus J. Steiner, PhD, and Willard Cates Jr., MD, MPH, spell out what this means.
"Persons who choose to be sexually active can be reassured that condom use can reduce the risk of most sexually transmitted diseases," Steiner and Cates write. "Persons who abstain from sexual intercourse or who are uninfected and mutually monogamous eliminate the risk of sexually transmitted infections."
Winer's team studied 82 college women, aged 18 to 22, who began sexual activity either during or just before the start of the 5-year-study.
The women kept a diary of their sexual activity. They also underwent Pap screens, DNA tests for HPV, and gynecologic exams every four months.
Women whose sex partners used condoms less than 5% of the time had an HPV infection rate of 89 infections per 100 patient-years. That is, if 100 of these women were sexually active for one year, 89 of them would have HPV infections. Women who used condoms every time they had sex had an HPV infection rate of 38 infections per 100 patient-years. | <urn:uuid:d2756dde-43e2-41f0-a265-a7efab370353> | CC-MAIN-2016-07 | http://www.webmd.com/cancer/cervical-cancer/news/20060621/condoms-may-prevent-cervical-cancer | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701171770.2/warc/CC-MAIN-20160205193931-00278-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.96277 | 398 | 2.578125 | 3 |
The Moons Importance
The moon, it's phases, eclipses, and tides.
The Moons Role
The moon is very important for many reasons. First, the moon has 8 phases. Second, there are tides. Last, the moon has eclipses. All of these have very different effects on Earth, and in my Tackk, I'll tell you the ways they affect Earth. We'll start with the moons phases first.
Phases of the Moon
The phases of the moon are important for many reasons. First, the phases of the moon help judge the time. You can judge what day/time it is by the moon phase. The moon phases include new moon, waxing crescent, first quarter, waxing gibbous, full moon, waning gibbous, third quarter, and waning crescent. Another important thing about moon phases is when someone who is working late walks home, they could use a moon phase to find their way home. Lastly, sailors and navigators would use the moon to get to their destination. Now, we are going to be talking about tides.
Tides are when the sun and moon's gravity is pulling on Earth's water at the same time. There are two types of tides, neap and spring. Neap is when the moon and sun are pulling on the water at a ninety degree angle. Spring is when the sun and moon pull on Earth's water at a 180 degree angle. Tides are important because sailors need to know when the high and low tides are going to happen so that they know when to go fishing and when to return so that they're not stuck floating or stuck in the mud. Lastly, we're going to discuss eclipses.
Finally, eclipses are the last important thing to deal with the moon I'm going to talk about on this slide. An eclipse happens when the moon passes into Earth's shadow. This is called a lunar eclipse, and we humans can only see it during the night. Another eclipse can happen when the moon passes in front of the sun. This is called a solar else, and it can only happen during the day. The reason being that when the moon passes in front of the sun, the Earth becomes dark, as the absence of light makes it. Eclipses effect Earth severely, because if a man/woman is walking in the day, and a solar eclipse happens, then the person could become lost or hurt, by falling from absence of sight.
To conclude, the moon is important for many reasons. First, the moon has phases. These phases have helped tell time for billions of years. Secondly, the moon causes tides. Tides have shown sailors when and when not to fish, finding he most opportune times to leave and return before they were stuck on the sea. Finally, the moon helps cause eclipses. Eclipses have been admired for years as a rare spectacle of spectacular beauty, and many people love to watch them. The moon has always been a key element in Earth's life. At least until we realized we revolved around the sun............ ;) | <urn:uuid:8ece6f21-6a63-4bee-9f8a-a73ae97cb4b0> | CC-MAIN-2017-34 | https://tackk.com/0dj6lt | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112539.18/warc/CC-MAIN-20170822181825-20170822201825-00126.warc.gz | en | 0.962204 | 632 | 3.109375 | 3 |
Mars Looms Big And Bright As It Swings Close To Earth
Cambridge MA (SPX) Oct 19, 2005
Look east late these evenings and you'll see a big, fiery yellow "star" shining much brighter than any other. This is the planet Mars, and it's passing unusually close to Earth during late October and early November 2005.
Anyone can see it - no matter how little you know about the stars or how badly light-polluted your sky may be.
During mid- to late October, look for Mars glaring low in the east after 8 p. m. local daylight-saving time. In November, it's there in view as early as 6 p.m. standard time. Later in the evening, Mars climbs higher into better view and shifts over to the southeast. There's nothing else nearly as bright that you can confuse it with.
Mars will be its closest to Earth on the night of October 29 - passing 43.1 million miles (69.4 million kilometers) from our planet around 11:25 p.m. on the 29th Eastern Daylight Time. However, Mars will look just about as big and brilliant for a couple of weeks before and after that date.
Mars is at opposition (opposite the Sun in our sky) on November 7th. This means it rises at sunset, is up all night, and sets at sunrise.
This is the nearest that Mars has come since its record-breaking close approach in August 2003. At that time it passed by at a distance of only 34. 7 million miles (55.8 million kilometers), the closest it had come in nearly 60,000 years. But for amateur telescope users, now is still a very special time.
The planet will reach an apparent diameter of 20.2 arcseconds (the angular size of a penny seen at a distance of 620 feet), offering an usually detailed view of its surface. That compares with 25.1 arcseconds in August 2003 (the angular size of a penny at 500 feet), and only 15.9 arcseconds at Mars's next swing-by, in December 2007 (a penny at 800 feet).
In fact, not until the summer of 2018 will Mars again come as close to Earth as it is right now (this statement remains true until mid-November).
Moreover, this year skywatchers at the latitudes of North America and Europe have a big advantage they didn't have in 2003. That year Mars was far south in the sky and never got very high for telescope users at mid-northern latitudes. But this time Mars is farther north and rises higher during the night, affording a sharper, cleaner view in a telescope through Earth's blurry atmosphere.
Good as this fall's showing is, surface details on Mars are always a pretty tough target in a telescope. To begin with, Mars is only about half the size of Earth. Even at its closest, under high magnification it will appear as only a surprisingly small, bright ball with some subtle dark markings, possible white clouds around its edges, and perhaps a tiny remnant of the white South Polar Cap shrunken in the warmth of the Martian summer.
The brightest yellow areas are deserts covered by fine, windblown dust. The darker markings are terrain displaying more areas of bare rock or darker sand and dust. Mars rotates in a little more than 24 hours, so you can see it turning in just an hour or two of watching.
To see much detail on Mars, several things all have to be working in your favor. You'll need at least a moderately large telescope with high-quality optics. (For the lowdown on how to select a telescope wisely, see Sky & Telescope's article "Choosing Your First Telescope," located on our Web site at http://SkyandTelescope.com/howto/scopes/article_241_1.asp)
And you'll need to wait until Mars rises high in the sky, well above the thick, murky layers of Earth's atmosphere near the horizon.
Moreover, the atmospheric "seeing" must be good. This is the astronomer's term for the constant fuzzing and shimmering of highly magnified telescopic images due to the tiny heat waves that are always rippling through the atmosphere. The seeing changes from night to night and sometimes from moment to moment.
More about Mars and its unusual close approach appears in the September issue of Sky & Telescope and in the November/December 2005 issue of Night Sky, our new bimonthly magazine for beginners.
Email This Article
Comment On This Article
Subscribe To SpaceDaily Express
Mars News and Information at MarsDaily.com
Lunar Dreams and more
Pasadena CA (JPL) Jan 09, 2006
Last week Spirit completed robotic-arm work on "El Dorado." The rover used all three of its spectrometers plus the microscopic imager for readings over the New Year's weekend.
|The content herein, unless otherwise known to be public domain, are Copyright 1995-2006 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA PortalReports are copyright European Space Agency. All NASA sourced material is public domain. Additionalcopyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement| | <urn:uuid:e40a6a7d-dade-4a50-b234-14d0df963cc1> | CC-MAIN-2015-27 | http://www.marsdaily.com/reports/Mars_Looms_Big_And_Bright_As_It_Swings_Close_To_Earth.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098808.88/warc/CC-MAIN-20150627031818-00030-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.934645 | 1,117 | 3.484375 | 3 |
Have you ever had something caught in your teeth for days? It’s likely because it was lodged deep between a tooth and your gums. That gum tissue is what keeps our chompers in place. There are three stages of gum disease and all are treatable.
The mild form of gum disease is Gingivitis. This is where plaque and other byproducts irritate the gums. It makes them swollen, tender, and more likely to bleed. Periodontitis is stage two. The gum tissue starts deteriorating as it detaches from the teeth forming pockets around the roots. This leaves teeth exposed and more susceptible to decay. Finally, Advanced Periodontitis can set in. Tooth pockets get deeper as the severe gum recession leads to bone loss causing loose teeth.
Common Risk Factors of Periodontal Disease
- Genetics – it’s hereditary and some of us are just unlucky! While you may be more susceptible to periodontitis, having a good oral hygiene routine with regular dental visits can help your smile stay healthy. Talk to us about finding the right balance for your needs.
- Health – underlying medical conditions like diabetes and Crohn’s disease, as well as lowered immunity from illnesses and treatments often affect gum tissue. Medications, hormonal changes and obesity are also culprits and should be discussed.
- Bad Habits – chewing on ice, not brushing or flossing daily and using tobacco are the most common behavior changes we encourage you to ditch. However, substance abuse and a diet lacking in vitamin C will also impact your smile.
- Stress – it’s inevitable. But keep an eye on exactly how much it’s weighing you down. High levels or chronic stress can lead to poor hygiene habits. Anxiety can also lower your immune system from effectively fighting off bacteria that causes gingivitis (stage 1).
When to Seek Help
Common red flags of gum disease include:
- Bleeding gums
- Swollen or tender gums
- Gums look bright red
- Teeth wiggle
There’s no home remedy to cure gum disease. Only professional treatment can help, so call and schedule an exam today (707) 745-8002.
Dr. David Shafer D.D.S.,
Dr. Brian Houston, D.D.S., and
Sukhmani Singh, D.D.S.
142 East D St
Benicia, CA 94510
Call Us (707)745-8002 | <urn:uuid:c410b795-ecc7-429e-90ee-8b223c97e23d> | CC-MAIN-2018-09 | https://carquinezdental.wordpress.com/tag/general-dentistry/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816083.98/warc/CC-MAIN-20180225011315-20180225031315-00316.warc.gz | en | 0.925513 | 517 | 3 | 3 |
Public health experts are now recommending that pregnant women get the vaccine for whooping cough during pregnancy. The recommendation is in response to the growing outbreak of the disease in the U.S. So far, there are more than 32,000 reported cases of whooping cough across the country. If the trend holds, it’s on track to be the highest number of cases since 1959.
An advisory committee of the Centers for Disease Control and Prevention made the new recommendation this week. The group says expectant mothers should be vaccinated for every pregnancy, and ideally, during the third trimester.
New data shows that boosters don’t last as long as previously thought.
Dr. Jeff Duchin is Chief of Epidemiology at Seattle King County Public Health and is on the CDC advisory committee. Duchin says the goal is to insure that both mother and baby get enough of the antibodies.
“That not only protects the mother from infections, but it also provides very good protection to the infants during their most vulnerable time period when their immune systems are immature and just developing, those first months of life,” Duchin says.
Whooping cough is a respiratory infection and is highly contagious. The disease can be fatal to babies. The CDC notes that up to 40 percent of infant infections were transmitted by mothers.
To date, Washington has reported more than 4,300 cases of whooping cough. In April the state declared an epidemic. | <urn:uuid:b1d5a197-3c17-4aa7-a6c7-39035bca9e2c> | CC-MAIN-2017-30 | http://kuow.org/post/cdc-recommends-pertussis-vaccine-expectant-moms | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425339.22/warc/CC-MAIN-20170725162520-20170725182520-00534.warc.gz | en | 0.970823 | 293 | 3.03125 | 3 |
Controversy in Policing Covid-19 Preventive Measures
The Covid-19 pandemic has spread from its capital Wuhan, China, crippling different systems across the globe. In measures to control the spread of the virus, different cities and states have required people to adhere to certain regulations such as maintaining social distancing and wearing masks. Governor Andrew M. Cuomo of the New York imposed a stringent measure, requiring people to wear face coverings or masks where social distancing was not possible, especially in public places. The effect would take effect where residents would be unable to keep a distance of 6 feet from each other. Wearing of face coverings shall introduce a mutual and civic obligation in the future.
Local governments have a mandate of enforcing the measures through the New York Police Department. The police have a mandate of ensuring each member of the public wears a mask or a face covering where possible. According to a post in the New York Times, anyone who lacked masks would be ejected from public transit. The governor reinstated that the state would issue civil penalties to individuals who fail to follow the set regulations.
However, there is a controversy involving the NYPD police in regards to the enforcement of the measures to curb the spread of the corona virus. There have been acts of racial segregation towards the enforcement of wearing of masks and social distancing (Louis and Maria, 2020). Residents claim that the police officers have been unfairly targeting black people and Latinos in the recent arrests of citizens who fail to abide to the set measure, especially social distancing and wearing of masks. Community groups and some elected leaders claim that some of the arrest videos illustrate racial segregation for social distancing, particularly when the police conduct stop and frisk processes. According to the mayor, the acts on the videos were disheartening and those involved in the misconduct would be held accountable if found guilty.
Public defenders and elected leaders have called out the governor to curtail the police department in their role of enforcing rules against people standing close to each other and large mass gatherings. In the videos, the police officers handled white people softly by giving those masks and when it came to the black and Hispanic people in their neighborhoods, they used force to arrest the violator of the measures. The calls to curb the rogue police have tremendously grown after the police released data on arrests and summons in the past week showing that over 90% of the people arrested because of violating the pandemic measures were black or Hispanic. The state attorney reinstates that the disparities raised a lot of mistrust among the forces and could further increase the divide between the police and the people. Opinions from black neighborhood was that it was wrong for police to aggressively attack people from one group when committing mistakes, yet when another group does the same they aren’t convicted.
A number of elected officials, community leaders and public defender groups have requested information on social-distancing from the NYPD that includes the breakdown of individual arrests such as age and race (Spectrum News Staff, 2020). The police commissioner has so far shown discontent among some officers. Moreover, 20 percent of the officer were out sick due to the corona pandemic and those who remained on duty were expected to act according to the code of conduct among the police. According to the mayor, what happened with the stop and frisk checks was unconstitutional and oppressive in nature and had created a larger problem in the society than it was thought to solve (Ashley, 2020). He reinstated that the police department would need to be part of the safety of the New Yorkers other than introducing a higher division between the people and the police.
Black elected officials claim that the police targeted black poor neighborhoods and the presence of marijuana odor in the neighborhoods was used to justify the arrests. They reinstated that the arrests were unfair and would be a toxic combination when combining the arrests with hunger and lack of employment especially in the black poor neighborhoods (Poppy, 2020). The officials claim that the era of aggressive policing and enforcement was a revived in the name of social distancing.
The city mayor, Bill de Blasio has recently announced that police officers will no longer enforce force covering regulations. The city is deploying 2200 ambassadors whose mandate shall be ensuring social distancing is practiced by monitoring crowds, the pilot is to be effected in crowds within public parks. Police should now monitor and control movement of people especially in parks and other crowded public spaces. According to the mayor, the police shall disperse groups of up to six adults and shall not arrest anyone without a face covering unless there is a serious danger to the public. The local government wants to create a good impression and avoid reviving the mistakes of the past (Josiah, 2020). On a memo sent to the police department stated that it would initiate a backtrack strategy, in the future enforcements police would not summon or make arrests acts related to face coverings, and violations of other guidelines related to the curbing of Covid-19. This comes after an outcry of community leaders and elected officials on behalf of the public claiming that the arrests upon violation of the laws was inclined to certain racial groups (The Associated Press, 2020).
The new enforcement guidelines were made in consultation with the police commissioner, the mayor, elected officials and community leaders. The outcome of the new strategy shall create a positive impression among the different groups of New York. Additionally, the division between the police and the blacks shall reduce during the pandemic times.
Ashley Southall. (2020). N.Y.C. Commissioner Denies Racial Bias in Social Distancing Policing. Retrieved 16 May 2020, from https://www.nytimes.com/2020/05/13/nyregion/nypd-social-distancing-race-coronavirus.html
Josiah Bates. (2020) NYPD Will Scale Back on Social Distancing Enforcement. (2020). Retrieved 16 May 2020, from https://time.com/5837596/new-york-mayor-announces-nypd-will-scale-back-social-distancing-enforcement/
Luis Ferré-Sadurní and Maria. 2020. Cramer New York Orders Residents to Wear Masks in Public. Retrieved 16 May 2020, from https://www.nytimes.com/2020/04/15/nyregion/coronavirus-face-masks-andrew-cuomo.html
Poppy Noor. (2020). A tale of two cities: how New York police enforce social distancing by the color of your skin. (2020). Retrieved 16 May 2020, from https://www.theguardian.com/world/2020/may/04/coronavirus-new-york-police-enforce-social-distancing
Spectrum News Staff. (2020). NYPD Will No Longer Enforce Face Coverings. Retrieved 16 May 2020, from https://www.ny1.com/nyc/all-boroughs/news/2020/05/15/nypd-social-distancing-pilot-program-in-parks-begins-this-weekend
The Associated Press. (2020). New York City to change social-distance policing after outcry. (2020). Retrieved 16 May 2020, from https://www.mercurynews.com/2020/05/10/new-york-city-to-change-social-distance-policing-after-outcry/ | <urn:uuid:1e49ad8d-1e01-43ba-9724-991c2c778114> | CC-MAIN-2023-23 | https://sharksavewriters.com/controversy-in-policing-covid-19-preventive-measures/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644915.48/warc/CC-MAIN-20230530000715-20230530030715-00767.warc.gz | en | 0.953015 | 1,521 | 2.96875 | 3 |
This week the Nursery finished exploring the topic of ‘Autumn’ by focussing on ‘Hibernation’ and the way in which animals prepare for Winter. They had a fantastic time playing in the bear cave role-play area and engaging in lots of activities such as reading stories about bears, singing hibernation songs and making hedgehogs out of playdoh and pinecones. We finished the topic with a ‘Hibernation Day’ and the children came in to Nursery in their pyjamas, made a den from sheets and a clothes line and even had the chance to meet a tortoise called Ben kindly sent in by Florence Day!
We hope you all have a fantastic half term and we look forward to seeing you when we return Tuesday 3rd November!
Here are some of the exciting and multi-sensory ways that we have been learning all about Food and Harvest.
We have been reading and writing stories all about food!
We made jam sandwiches and egg and cress sandwiches for “the Giant Jam Sandwich”
and ate them at a picnic with our parents
We read “The little Red Hen” and acted it out
We pretended to run a market stall like the one we read about in the story “Fatou, fetch the water”
We made food that began with ‘p’ like ‘pizza’ and ‘potato’
And of course we got messy
What a busy term! Yum Yum
Thank you Yellow Class!
Miss Davison 🙂
At the museum, children marvelled at the size of the dinosaur skeletons and imagined what the Earth was like when dinosaurs roamed in search of food!
In the Earthquake zone, children waited nervously to experience the earthquake simulation.
During the workshop, children explored different animal skulls and used their knowledge of teeth to identify carnivores, herbivores and omnivores.
The children were beautifully behaved. Excellent ambassadors for their school.
We have continued exploring the topic of ‘Autumn’ in the Nursery this week, focussing on the environmental changes such as leaves falling from trees and changes in the weather during this season. The children have enjoyed a variety of activities including conker rolling, Autumn walks around the school, making leaf collages and exploring Autumn vegetables.
Next week we will be continuing with the topic of ‘Autumn’ and learning about how animals prepare for winter and hibernation throughout this season with lots of exciting activities. Don’t forget it’s ‘Hibernation Day’ on Friday 23rd October and the children are invited to attend Nursery in their pyjamas!
Miraat and Reshmi from Galahad heard how badly some pets needed help. They decided they needed to do something.
On the 31st of August, Miraat and Reshmi prepared and planned a successful crafts, cakes and lemonade stall at the Lower Road Allotments. They were fundraising for PDSA. There was an abundance of other stalls for their open day. Two weeks before the event they began by making a series of crafts, and the night before the event was busy making cakes! At the allotments, the pair were very enthusiastic and did amazingly well. The Mayor of Bromley herself said how impressed she was the by the handmade items at the stall.
Miraat and Reshmi said, ‘We both had a really good time at the allotments, although it was pouring with rain all day!’ They are very proud to have raised an amazing £55.20 all together. Well done girls!
Last Friday we were astounded by the amount of Grandparents who came to celebrate Harvest with the Nursery, Reception, Year 1 and 2 children.
The children loved singing Big Red Combine Harvester among other Harvest favourites.
All the Grandparents then came to make various Harvest crafts in the classroom with the children. They created ears of corn, handprint trees and hedgehogs.
We would like to thank all the Grandparents for sharing in this wonderful event. Please rest assured that we are thinking of ways to ensure you have a clearer view of the children next year.
This week we have begun to explore the topic of ‘Autumn’ and have been focussing on ‘Harvest.’ The children have enjoyed lots of activities including baking bread, vegetable printing, pumpkin malleable and learning about all the hard work taking place on the farm at this time of year.
It was fantastic to welcome so many grandparents in to the Nursery this week for our ‘Harvest Festival and Craft’ sessions. We hope you were all as proud of the children’s brilliant performances as we were!
Next week we will be continuing with the topic of ‘Autumn’ and looking at environmental changes such as weather and leaves on trees.
Photos of the children’s performances and wonderful Harvest craft activities.
Last Saturday Oliver and his sister Emily (now Year 7) completed a 5 kilometre ‘Run or Dye’ fun run at Hever Castle (without stopping or walking!). They raised over £150 for their chosen charity which was Hospice in the Weald.
We are very proud of you both!
This is a photo of them at the end. It looks like a lot of fun!
The children have been exploring the Topic ‘All About Me’ this week and have extended their learning to incorporate family celebrations and achievements. They have enjoyed a ‘Party’ role-play area complete with lots of dressing up and decorations, writing invites/greetings cards and wrapping ‘presents’ for their friends.
Next week we will be focussing on the Topic of ‘Harvest’ and learning all about this time of year.
We discussed different emotions and the facial expressions which accompany them. The children then used icing sugar and sweets to make faces on digestive biscuits and talk about how their biscuit person was feeling.
Jinita, Ariadre and Rhys shared the ‘All About Me Bag’ with their friends this week and it was lovely to see all the things that they felt made them special and unique.
Party role-play was very popular this week and the children enjoyed showing off their groovy dance moves with the lots of party dances as well as dressing up and singing happy birthday to all their friends!
PE was lots of fun and the children explored balancing, rolling, throwing and catching as well as counting games. | <urn:uuid:643f8d07-922a-46e3-b2d8-129182ed8f07> | CC-MAIN-2019-47 | http://tpsnews.edublogs.org/2015/10/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670921.20/warc/CC-MAIN-20191121153204-20191121181204-00140.warc.gz | en | 0.973934 | 1,366 | 2.828125 | 3 |
a number of factors that create differences in deer numbers.
- Variation in ownership patterns
- Property size
- Hunter density
- Habitat condition
- Fawn recruitment (number of fawns surviving to the fall)
- Sex ratio (number of does per buck)
The variability in individual landowners’ deer management goals creates a dynamic landscape in terms of deer numbers over even small distances.
Inside the Numbers
There is no question that an increase in hunting opportunities combined with unlimited antlerless permits, implementation of antler point restrictions and localized hemorrhagic disease outbreaks have reduced deer numbers in several northern, central and western Missouri counties from peak population levels in the mid-2000s. Liberalization of harvest regulations on antlerless deer has helped to stabilize and even decrease deer numbers in many areas where significant damage and deer numbers were too high. As deer numbers have decreased and reach more acceptable levels, the continued availability of antlerless permits is concerning to hunters in some counties. A look inside the numbers reveals some important trends regarding the use of antlerless permits.
Despite the unlimited availability of antlerless permits, only 1 percent of archery hunters and 2 percent of firearms hunters harvest three or more deer. Of the 9,270 individuals harvesting deer on archery antlerless permits, 93 percent harvested two or fewer antlerless deer. Of the 65,026 individuals harvesting deer on firearms antlerless permits, 95 percent harvested two or fewer antlerless deer. While the vast majority of hunters are not utilizing these permits, limiting them would reduce landowners’ ability to shoot the number of does appropriate to their specific management goals.
If we take a closer look at the harvest impacts of reducing antlerless permits from unlimited to one, we predict a 10–15 percent decrease in total antlerless harvest. If we went from unlimited antlerless to two antlerless permits, we might expect a 5–8 percent decrease in total antlerless harvest.
As we continue to investigate ways to better manage deer numbers, an additional category of antlerless permits could provide a finer degree of control than what is currently provided by zero, one or unlimited antlerless permits. However, a reduction in the availability of antlerless permits does not guarantee that those permits will be used in the appropriate locations. Ultimately, landowners and hunters are the key to management of deer populations. They are the ones who control harvest and dictate local deer numbers.
Property Specific Harvest Rates
The quantity of antlerless permits available | <urn:uuid:bc3de527-7da4-4f9e-8994-6f8f483062e0> | CC-MAIN-2014-41 | http://mdc.mo.gov/conmag/2011/10/key-successful-deer-management?page=0,1 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657114926.36/warc/CC-MAIN-20140914011154-00336-ip-10-196-40-205.us-west-1.compute.internal.warc.gz | en | 0.921015 | 514 | 2.703125 | 3 |
Fabry disease ICD10 = E75.2 (ILDS E75.25) Classification and external resources
Alpha galactosidase - the protein that is deficient in Fabry disease.
ICD-9 272.7 OMIM 301500 DiseasesDB 4638 eMedicine neuro/579 derm/707 ped/2888 MeSH D000795
Fabry disease (also known as Fabry's disease, Anderson-Fabry disease, angiokeratoma corporis diffusum and alpha-galactosidase A deficiency) is a rare X-linked recessive (inherited) lysosomal storage disease, which can cause a wide range of systemic symptoms. The disease is named after one of its discoverers, Johannes Fabry (June 1,1860 - June 29,1930).
A deficiency of the enzyme alpha galactosidase A (a-GAL A, encoded by GLA) due to mutation causes a glycolipid known as globotriaosylceramide (abbreviated as Gb3, GL-3, or ceramide trihexoside) to accumulate within the blood vessels, other tissues, and organs. This accumulation leads to an impairment of their proper function.
The DNA mutations which cause the disease are X-linked recessive. The condition affects hemizygous males (i.e. all males), as well as homozygous, and in many cases heterozygous females. While males typically experience severe symptoms, women can range from being asymptomatic to having severe symptoms. This variability is thought to be due to X-inactivation patterns during embryonic development of the female.
Symptoms are typically first experienced in early childhood and can be very difficult to understand; the rarity of Fabry disease to many clinicians sometimes leads to misdiagnoses. Manifestations of the disease usually increase in number and severity as an individual ages.
Full body or localized pain to the extremities (known as acroparesthesia) or GI tract is common in patients with Fabry disease. Acroparesthesia in Fabry disease is believed to be related to the damage of peripheral nerve fibers that transmit pain. GI tract pain is likely caused by accumulation of lipids in the small vasculature of the GI tract which obstructs blood flow and causes pain.
- Renal involvement
Kidney complications are a common and serious effect of the disease; renal insufficiency and renal failure may worsen throughout life. Proteinuria (which causes foamy urine) is often the first sign of kidney involvement. End stage renal failure in males can typically occur in the third decade of life, and is a common cause of death due to the disease.
- Cardiac manifestations
Cardiac complications occur when glycolipids build up in different heart cells; heart related effects worsen with age and may lead to increased risk of heart disease. Hypertension (high blood pressure) and cardiomyopathy are commonly observed.
- Dermatological manifestations
Angiokeratomas (tiny, painless papules that can appear on any region of the body, but are predominant on the thighs, around the belly-button, buttocks, lower abdomen, and groin) are a common symptom.
- Ocular manifestations
Cosmetic ocular involvement may be present showing cornea verticillata (also known as vortex keratopathy), i.e. clouding of the corneas. Keratopathy may be the presenting feature in asymptomatic carriers, and must be differentiated from other causes of vortex keratopathy (e.g. drug deposition in the cornea). This clouding does not affect vision.
- Other manifestations;
Fatigue, neuropathy (in particular, burning extremity pain), cerebrovascular effects leading to an increased risk of stroke, tinnitus (ringing in the ears), vertigo, nausea, inability to gain weight, chemical inbalances, and diarrhea are other common symptoms.
Fabry disease is indicated when associated symptoms are present, and can be diagnosed by a blood test to measure the level of alpha-galactosidase activity, however this may be misleading in female carriers due to the random nature of X-inactivation. Chromosomal analysis of the GLA gene is the most accurate method of diagnosis, and many mutations which cause the disease have been noted. Kidney biopsy may also be suggestive of Fabry Disease if excessive lipid buildup is noted.
Naturally, alpha-galactosidase A (a-GAL A) is likely to be present only at very low levels in the blood, particularly in males. In females, owing to X-inactivation patterns, levels are commonly normal even if the patient is not asymptomatic. The Sifap (stroke in young Fabry patients) project will investigate the relation between stroke and Fabry's disease.
Misdiagnosis of Fabry Disease.
Pediatricians as well as internists commonly misdiagnose Fabry disease.
Until the 2000s, treatment of Fabry disease targeted the symptomatic effects.
In 2001, three Enzyme Replacement Therapies (ERTs) were released: Agalsidase alpha (Replagal, manufactured by Shire) and Agalsidase beta (Fabrazyme, manufactured by Genzyme). These attempt to replace the deficient enzyme by means of infusion, most commonly, every two weeks. The cost of these drugs is problematic (approximately $250,000 US a year/patient) and remains a barrier to many patients in some countries. The infusion may be performed by the patient themselves, in the patient's home by a registered nurse, or at a medical facility. Enzyme replacement therapy is not a cure, but can allow normal metabolism and both prevent disease progression as well as potentially reverse symptoms.
Pain in Fabry disease responds to ERT, but pain management regimens may also include analgesics, anticonvulsants, and non-steroidal anti-inflammatory drugs.
Pop Cultural references
- House (Epic Fail, season 6 episode 3) centers on a patient with Fabry Disease.
- Scrubs (My Catalyst, season 3 episode 12) features a Fabry Disease diagnosis.
- ^ James, William D.; Berger, Timothy G.; et al. (2006). Andrews' Diseases of the Skin: clinical Dermatology. Saunders Elsevier. p. 538. ISBN 0-7216-2921-0.
- ^ synd/1761 at Who Named It?
- ^ Karen JK, Hale EK, Ma L (2005). "Angiokeratoma corporis diffusum (Fabry disease)". Dermatol. Online J. 11 (4): 8. PMID 16403380. http://dermatology.cdlib.org/114/NYU/NYUtexts/0419054.html.
- ^ James, William D.; Berger, Timothy G.; et al. (2006). Andrews' Diseases of the Skin: clinical Dermatology. Saunders Elsevier. pp. [page needed]. ISBN 0-7216-2921-0.
- ^ Hoffmann MD, Bjoern; Beck, Michael PhD; Sunder-Plassmann, Gere PhD; Borsini, Walter MD; Ricci, Roberta PhD; Mehta, Atul MD (July/August 2007). "Nature and Prevalence of Pain in Fabry Disease and Its Response to Enzyme Replacement Therapy—A Retrospective Analysis From the Fabry Outcome Survey.". The Clinical Journal of Pain 23 (6): 535–542. doi:10.1097/AJP.0b013e318074c986.
- ^ Marchesoni CL, Roa N, Pardal AM, Neumann P, Caceres G, Martinez P, Kisinovsky I, Bianchi S, Tarabuso AL, Reisin RC. (2010). "Misdiagnosis in Fabry disease". J Pediatr. 156 (5): 828–831. doi:10.1016/j.jpeds.2010.02.012. PMID 20385321.
- GeneReview entry on Fabry disease by NIH
- Fabry Disease Information Page at NINDS
- Fabry disease at NLM Genetics Home Reference
- Fabry Registry
- Stroke in young Fabry patients
- Support groups
- Fabry International Network
- Focus on Fabry by Shire
- Fabry Community by Genzyme
- Fabry Support & Information Group (FSIG)
- Fabry support at MPS Society
- Canadian Fabry Association
- National Fabry Disease Foundation
- Fabry Support Group Australia
(LSD) Inborn error of lipid metabolism: lipid storage disorders (E75, 272.7–272.8) Sphingolipidoses
(to ceramide)From globosideGlobotriaosylceramide: Fabry's diseaseFrom sphingomyelinTo sphingosine
NCL Other Sex linkage: X-linked disorders X-linked recessive Immune Hematologic Endocrine Metabolicmineral: Menkes disease/Occipital horn syndrome Nervous system
X-Linked mental retardation: Coffin–Lowry syndrome · MASA syndrome · X-linked alpha thalassemia mental retardation syndrome · Siderius X-linked mental retardation syndromeCharcot–Marie–Tooth disease (CMTX2-3) · Pelizaeus–Merzbacher disease · SMAX2
Skin and related tissue Neuromuscular Urologic Bone/tooth No primary system X-linked dominant
Wikimedia Foundation. 2010.
Look at other dictionaries:
Fabry disease — Fabry disease. См. болезнь Фабри. (Источник: «Англо русский толковый словарь генетических терминов». Арефьев В.А., Лисовенко Л.А., Москва: Изд во ВНИРО, 1995 г.) … Молекулярная биология и генетика. Толковый словарь.
Fabry disease — A genetic disease due to deficiency of an enzyme called alpha galactosidase A. This enzyme is essential to the metabolism of molecules known as glycosphingolipids. Without the enzyme, glycosphingolipids accumulate in the kidneys, heart, nerves… … Medical dictionary
Fabry disease — (= angiokeratoma) Storage disease due to deficiency of ceramide trihexosidase … Dictionary of molecular biology
Fabry disease — n. genetic disease of deficiency of alpha galactosidase A enzyme … English contemporary dictionary
Anderson-Fabry disease — A genetic disease, also known as Fabry disease, due to deficiency of an enzyme called alpha galactosidase A. This enzyme is essential to the metabolism of molecules known as glycosphingolipids. Without the enzyme, glycosphingolipids accumulate in … Medical dictionary
Fabry's disease — DiseaseDisorder infobox Name = Fabry disease ICD10 = ICD10|E|75|2|e|70 (ILDS E75.25) ICD9 = ICD9|272.7 ICDO = Caption = OMIM = 301500 OMIM mult = MedlinePlus = eMedicineSubj = neuro eMedicineTopic = 579 DiseasesDB = 4638 MeshID = D000795 Fabry… … Wikipedia
Disease, Anderson-Fabry — A genetic disease, also known as Fabry disease, due to deficiency of an enzyme called alpha galactosidase A. This enzyme is essential to the metabolism of molecules known as glycosphingolipids. Without the enzyme, glycosphingolipids accumulate in … Medical dictionary
Disease, Fabry — A genetic disease due to deficiency of an enzyme called alpha galactosidase A. This enzyme is essential to the metabolism of molecules known as glycosphingolipids. Without the enzyme, glycosphingolipids accumulate in the kidneys, heart, nerves… … Medical dictionary
Fabry — n. family name; Johannes Fabry (1860 1930), German dermatologist (Fabry disease named after him); large lunar crater … English contemporary dictionary
Fabry — can refer to the following:*Charles Fabry French physicist, inventor of the Fabry Perot etalon *Fabry s diseaseFabri can refer to the following:*Martinus Fabri a Dutch composer *Thomas Fabri a Dutch (Franco flemish) composer … Wikipedia | <urn:uuid:23ef9aec-caff-498b-895f-6bd9fb5c3e13> | CC-MAIN-2020-50 | https://enacademic.com/dic.nsf/enwiki/11510670/Fabry | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141171077.4/warc/CC-MAIN-20201124025131-20201124055131-00326.warc.gz | en | 0.871916 | 2,781 | 3.4375 | 3 |
Cathedral Caverns State Park is located near the town of Grant, in northeastern Marshall County. Although the cave has been open as a commercial operation at various times since 1955, it was not until May 2000 that it became officially opened to the public as Cathedral Caverns State Park. Operations of the park are overseen by the Alabama Department of Conservation and Natural Resources. Ranger-guided tours are provided throughout the day and take approximately one hour. In addition to the cave tour, the park has a welcome center, picnic areas, and primitive tent camping. In 1995, Cathedral Caverns provided the cave setting for the Disney Studios film Tom and Huck. In 2009, the park had 39,000 visitors, annual operating expenses of $351,000, and a staff of six people.
The caverns are located in the Cumberland Plateau physiographic section of Alabama and formed within Mississippian Period limestone deposited between 350 and 320 million years ago. Archaeological excavations at the cavern's mouth indicate that human use of the cave by Native Americans dates back to 8,000 years ago. In modern times, the cave was originally called Bats Cave and was operated as a private attraction by local entrepreneur Jay Gurley from 1955 to 1974. It was Gurley who adopted the Cathedral Caverns name, reportedly after his wife commented that the cave's soaring ceiling, with its dramatic stalactites and stalagmites, looked "like a cathedral." In 1972, it was declared a National Natural Landmark. Two years later, the Gurleys ran into financial problems, and the cave was sold at auction and remained in private hands until the state of Alabama bought the cave and 461 acres of surrounding land in 1987. Funding delays postponed the state's plans to open the cave as a state park until 2000, however.
The public areas of Cathedral Caverns traverse approximately two miles of trails, but there are many more passages that are not open to the public. Some 11,000 feet of passages have been mapped, but the total extent of the cave system is unknown. Access to Cathedral Caverns is provided by a paved and lighted pathway. Its massive entrance is 128 feet across and 25 feet high, making it the largest commercial cave opening in the world. The trek from the mouth of the cave to its farthest reaches is a little more than a mile along the sloping and twisting walkway. It is also wheelchair accessible. The cave is a constant 60 degrees year round. The largest chamber, known as the Big Room, is 792 feet long and 200 feet wide. Other cave formations include the world's largest stalagmite, Goliath, which is 45 feet tall and 243 feet around, another stalagmite that is 35 feet tall and only three inches around, a stalactite forest, and a 135-foot-long wall of flowstone that resembles a frozen waterfall.
Mystery River flows through the cave, and some of the passages are subject to flooding during periods of high rainfall. About 2,700 feet of passage are not open to the public, including the Crystal Room, which is full of delicate formations composed of fragile pure white calcite. These formations would be degraded by the heat, humidity, and movement of visitors. | <urn:uuid:65b205ea-f0ff-49f9-a4e8-69166d54315a> | CC-MAIN-2015-35 | http://www.encyclopediaofalabama.org/article/h-2582 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644066586.13/warc/CC-MAIN-20150827025426-00126-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.972741 | 653 | 2.71875 | 3 |
Ocular Coherence Tomography (OCT) is an extremely advanced health check for people of all ages. Very similar to Ultrasound, the OCT uses light rather than sound waves to illustrate the different layers that make up the back of your eye with 3D images. OCT scans are used for early detection of glaucoma, macular degeneration, macular holes, vitreous detachment, diabetic eye disease and more.
The OCT allows the eye doctor to evaluate the layers of the central retina to look for retinal diseases such as macular degeneration, central serous retinopathy, diabetic maculopathy and vitreomacular traction. It also documents and measures the optic nerve head.
The light levels used for the scan are very low. The scan takes seconds to acquire and is totally painless. All the patient needs to do is look at a light, keep the eyes still and not blink for several seconds.
Patients with early stage ocular disease appreciate being able to have this state-of-the art technology conveniently available in our office, eliminating the need to send them to a large referral center for OCT scans. Healthy patients appreciate the peace of mind that comes from knowing they have had a very thorough ocular health check.
How does this technology improve eye exams?
Having 3D OCT scans available allows for earlier detection of eye disease. The scans also allow the doctor to monitor much more closely for changes in the structures of the eye as the scans are stored and can mathematically show any changes from one visit to the next. This provides a level of monitoring way beyond the ability of even the most experienced observer with normal viewing methods.
Who should have the OCT screening?
Everyone over the age of 35, people with a family history of eye disease, smokers, and diabetics.
For more information, contact Dr. Heyler today. | <urn:uuid:f96cbcce-3d4b-4096-bece-1062d35c51a7> | CC-MAIN-2017-22 | https://www.canterburyvc.com/2015/09/07/ocular-coherence-tomography-oct-early-detection-of-ocular-diseases/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607802.75/warc/CC-MAIN-20170524055048-20170524075048-00472.warc.gz | en | 0.943612 | 383 | 2.96875 | 3 |
The article - "Energy Drinks: What Teenagers (and Their Doctors) Should Know," - summarizes recent evidence regarding the content, benefits and risks of energy drinks which are consumed by teenagers.
Energy drinks are beverages with caffeine added to them. They are advertised as a means to enhance performance, boost the immune system, or create a "buzz".
The most popular energy drinks contain elevated, unregulated quantities of caffeine and other stimulants which give the caffeine an extra kick.
Caffeine is known to produce detrimental health effects in adolescents, including dehydration, digestive problems, obesity, anxiety, insomnia, and tachycardia.
Some energy drinks contain alcohol. Sometimes, people mix them with alcoholic drinks.
When energy drinks are mixed with alcohol, the potential dangers for adolescent health are much greater; there is also a risk of abuse.
The authors advise health care professionals to ask their adolescent patients whether they consume energy drinks. They should explain what the dangers of consuming both energy drinks alone or with alcohol are. Doctors should become aware of the signs and symptoms of energy drink consumption.
The authors say that teenagers are no strangers to energy drinks. Over the last 24 months, the media has heightened the awareness of doctors, lawmakers and parents.
About 66% of energy drink consumers are aged between 13 and 35.
Lead author Dr. Kwabena Blankson, a U.S. Air Force major and an adolescent medicine specialist at the Naval Medical Center in Portsmouth, Virginia, said regarding energy drinks:
"They contain too much caffeine and other additives that we don't know enough about. Healthy eating, exercise and adequate sleep are better ways to get energy."
In 2010, nine students at Washington State University were admitted to the hospital. Doctors attributed their illness to fruit-flavored caffeinated alcoholic drinks. One of the students nearly died. Twenty-three students were hospitalized one month later in New Jersey after drinking the same combination as the Washington students.
Energy drinks mask the effects of consuming alcoholWhen we mix energy drinks with alcohol, the "cocktail" can make us feel less drunk than we actually are. Many adolescents are not aware of this, the researchers explained. Consuming just one energy drink with alcohol may be equivalent to drinking a whole bottle of wine and several cups of coffee.
The average cup of coffee has approximately 100 milligrams of caffeine, compared to 160 milligrams in a 16-ounce energy drink.
According to Dr. Blankson, teenagers should consume a maximum of 100 milligrams of coffee per day. Other ingredients found in energy drinks increase caffeine's potency, such as guarana and ginseng.
According to a US government report issued in January 2013, twice as many people visited hospital emergency rooms because of energy drink consumption in 2011 compared to 2007. The majority of hospital visits were by teenagers and young adults, said the SAMHSA (Substance Abuse and Mental Health Services Administration) report.
Approximately 42% of emergency room cases in 2011 involved energy drinks mixed with either alcohol or medications, such as Ritalin or Adderall.
Believe it or not, the human body knows when and how much alcohol it is drinking and emits cues when the person should stop for the evening and get some rest. Some people try to overcome these cues by mixing energy drinks with alcohol.
A study carried out by Cecile Marczinski, a psychologist at Northern Kentucky University, found that combining energy drinks with alcohol removes our built-in checks that stop us from overindulging.
"Even with just alcohol alone, young, underage drinkers are bad at deciding how safe a driver they are, but I think this (mixing alcohol with energy drinks) would make that situation far worse."
Nine years ago, the French government banned the sale of Red Bull, a popular energy drink. The French Scientific Committee on Human Nutrition found that Red Bull had too much caffeine, it also raised concerns about the beverage's other ingredients, taurine, an amino acid which Red Bull promoters say can "kick-start" the metabolism, and glucuronolactone, a carbohydrate.
After an appeal, Europe's highest court upheld the French Red Bull ban.
In this latest report, the authors say that the readers should be able to:
- Understand how large the energy drink market is, as well as recognize the most common brands
- Realize that teenagers are great consumers of energy drinks, which they use as performance enhancers
- Know what the ingredients of energy drinks are, and how they may impact negatively on health
- Understand that energy drinks can cause obesity, high blood pressure, tachycardia and other medical problems in teenagers
- Understand how dangerous it is to mix energy drinks with alcohol
- Understand the relationship between alcohol tolerance/dependence and caffeine tolerance/dependence
- Understand how important it is to screen adolescents for energy drink consumption, and offer suitable counseling | <urn:uuid:dd2a7791-125b-45c8-9278-1ce1deec18cd> | CC-MAIN-2017-09 | http://www.medicalnewstoday.com/articles/255925.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00095-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.945009 | 1,007 | 3.265625 | 3 |
The main problem related to the Python ‘or’ operator is that it can lead to unexpected results if used incorrectly. This is because the ‘or’ operator will return a value of True if either of its operands evaluates to True, regardless of whether both are true or not. For example, if you use the ‘or’ operator on two boolean values (True and False), it will return True, even though both values are not true. This can lead to unexpected results in your code and should be avoided unless you know exactly what you’re doing.
The code "%27or%27" is a string that contains the word "or". It is written in Python using URL encoding, which replaces certain characters with a percent sign followed by two hexadecimal digits. In this case, the single quote character (') has been replaced with "%27".
Difference between ‘ and ” in Python
The single quote (‘) and double quote (“) characters are used to denote strings in Python. The difference between them is that single quotes are used to denote a literal string, while double quotes can be used to denote a string with formatting or escape sequences. For example, the following code will print out the string “Hello World” using single quotes:
However, if you want to include an apostrophe in your string, you must use double quotes:
print(“It’s a beautiful day”)
Python is a powerful programming language that can be used for many different tasks. Examples of Python code can be found in many places, including online tutorials, books, and even on the official Python website. Here are some examples of Python code that you might find useful:
1. Printing Hello World: This is one of the most basic examples of Python code and is often used to introduce people to the language. It simply prints “Hello World” to the screen when run.
2. Calculating Fibonacci Numbers: This example shows how to use a looping structure in Python to calculate the Fibonacci sequence up to a certain number.
3. Working with Lists: This example demonstrates how to create and manipulate lists in Python using various methods such as append(), extend(), insert(), remove(), pop() and sort().
4. Using Classes and Objects: This example shows how classes and objects can be used in Python for creating custom data types with their own attributes and methods.
5. Working with Files: This example demonstrates how files can be opened, read from, written to, closed, deleted or moved using various functions available in the os module of Python’s standard library | <urn:uuid:d3d0126d-23e7-4110-8e48-c3bba21db232> | CC-MAIN-2023-06 | https://www.sourcetrail.com/python/%27or%27-explanation/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499831.97/warc/CC-MAIN-20230130232547-20230131022547-00491.warc.gz | en | 0.887843 | 560 | 4.78125 | 5 |
Vitrectomy is an eye operation usually performed by a retinal specialist to treat a variety of retinal conditions. Most vitrectomies are performed to treat:
For me, this is state of the art. A 25 gauge vitrectomy uses thinner instruments compared to the older 20 gauge vitrectomy system (the higher the number, the thinner the instruments). I have rarely used a 20 gauge system in the last 5-7 years. There really is no need.
To most, the largest advantage of the thinner system is the small incisions, or holes, needed to enter the eye. The entry areas are so small, stitches are not needed as they self-seal. This shortens the operation as I don’t have to spend time stitching the entry wounds in the sclera and conjunctiva.
While shortening operating time is great, the biggest advantage is quicker healing and comfort to the patient!
Compared to older technology, or 20 gauge vitrectomy systems, 25 gauge systems are also safer for the patient. While infection rates have been traditionally lower in retinal operations, the smaller gauge vitrectomy systems now cause far fewer retinal tears compared to the 20 gauge, larger, predecessor.
Hence, 25 gauge vitrectomy is now as safe or safer than cataract surgery.
In addition to faster operating and quicker healing, the smaller and thinner instruments cause fewer tears due to the fact that thinner instruments can not generate as much “sucking” force as wider/fatter instruments.
Try drinking through a coffee stirrer versus and drinking straw. That’s the difference between 25 gauge (thinner) and 20 gauge (thicker) instrumentation.
As a result, the newer instruments can not pull on the vitreous as forcefully as the thicker instrument.
The vitreous is very adherent to the retina in certain parts of the eye. Pulling on the vitreous can, therefore, cause a retinal tear.
What Does this Mean?
Modern vitrectomy is very safe. Fewer complications occur with the 25 gauge system. The chance of blinding infection (endophthalmitis) has always been lower in vitrectomy compared to cataract surgery. Now, with advanced technology, the thinner vitrectomy system causes far fewer retinal tears (and, therefore, retinal detachments).
While the thinner instruments do have intuitive advantages for doctor and patient such as quicker healing, fewer office visits and speedier operating time.
The fact that fewer tears are created escapes most physicians (even some retina specialists). The changes in size, smaller openings and thinner instrumentation, has allowed vitrectomy eye surgery to become a very safe surgery. | <urn:uuid:8d46acb3-4d5d-4757-924a-8c59662eb8fa> | CC-MAIN-2020-45 | https://retinaeyedoctor.com/2013/04/what-is-25-gauge-vitrectomy/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107896778.71/warc/CC-MAIN-20201028044037-20201028074037-00312.warc.gz | en | 0.918409 | 560 | 2.796875 | 3 |
Chemistry is one of the subjects that impacts highly applicable knowledge, especially if you are in the carpet cleaning industry. Understanding the chemical make-up – particularly the PH level – of a cleaning solution can identify the difference between having a discolored carpet and one that is looking rejuvenated.
When it comes to cleaning carpets, it may seem reasonable to grab any type of cleaner and start scrubbing to remove stains and oils. However, this is a big mistake because of one crucial component of cleaning: PH levels. As professional carpet cleaners, we know that PH plays an integral role when it comes to carpet cleaning products because of its ability to damage fibers and dyes.
What is PH?
In simplest terms, a PH level of solution refers to the alkalinity or acidity of a water-based solution. A PH of 7 indicates a neutral solution. So, anything below 7 is considered acidic, and anything above is considered alkaline.
In the early 1950s, the issue of PH guidelines started when a group called the British Standards was looking for volunteers to set limits on alkalinity for carpet cleaning. Most of the cleaners were using shampoo method because all carpets back then are wool. Many were boosting their products with ammonium hydroxide while some pushed the limit, increasing the PH too much, so the committee set a PH range of 5.5 to 8.0.
Starting in the 1960s, the concern about alkalinity lessened because synthetics became the dominant fibers in the United States. Then acid dye blockers came in 1986, and once again, alkalinity was a big issue.
Later, the majority claimed that Wools of New Zealand had modified the 5.5 to 8.0 rule to become a 4.5 to 8.5 guideline. But it turned out that Wools of New Zealand did not make this rule. Their focus was on certifying woolen carpets, but the organization owned another group called Woolsafe.
Woolsafe marketed laboratory testing and certifications for detergents, spotters, and protectors. They had approved a product with a PH of 13.5, but according to a study performed in 2004, Woolsafe did not approve some products with a PH of 6.5 because they were too alkaline.
The IICRC commissioned Dr. Al Luedtke, a chemist, wrote a white paper on carpet cleaning and PH to address these contradictory recommendations. Dr. Luedtke pointed out that the PH of a product alone was an insufficient measurement of its compatibility with a fiber. However, the myth of the 10.0 rule persists.
PH and Carpet Cleaning
Science lesson aside, why does PH matter? Well, choosing an appropriate PH level ensures the effectiveness of the solution’s cleaning ability without damaging fibers or dyes in your carpet. Carpets are made up of different materials which means a solution that helps clean one thing may actually damage another.
In general, carpets will suffer from oily soils, which require alkaline solutions to remove. Some soils need to be cleaned with solutions that are more acidic.
The Institute of Inspection Cleaning and Restoration Certification (IICRC) recommends that carpets in residential homes should be cleaned with carpet solutions whose PH is between 8 and 10. Commercial areas like restaurants, can use cleaning solutions with higher alkalinity, from 12 upwards.
Work with Alpine Cleaners
To avoid causing damage to your carpets, professional carpet cleaners will identify the fibers used in your carpets and select the cleaning solution and method that is most appropriate for the job. Most carpets today are synthetic, made of nylon or polyester, so professionals tend to avoid solutions with a PH higher than 10 that can cause damage, or use an all-natural green cleaning solution. Not all damage is immediately apparent when the PH used is incorrect but it is important that your carpet cleaner knows the difference in PH levels and how to properly manage them during carpet cleaning.
If you are in need of professional carpet cleaning service professional carpet cleaning service in Massachusetts, look no further than Alpine Cleaners. We have over 30 years of experience providing residential and commercial clients with comprehensive cleaning services tailored to their needs. We offer our 10-Step Premium and Green Carpet Cleaning Process that only uses healthy, all-natural, soap-free, and green cleaning solutions, as well as use truck-mounted hot water extraction to clean your carpets.
Your Carpet Cleaning Partners in Worcester, Hampden County & other nearby areas. | <urn:uuid:31dfc95c-94e2-447e-b6ec-365f49213405> | CC-MAIN-2022-27 | https://www.alpinecleaners.com/blogs/archives/03-2021 | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103337962.22/warc/CC-MAIN-20220627164834-20220627194834-00196.warc.gz | en | 0.961724 | 951 | 2.546875 | 3 |
Table of Contents
Importance of fasting on Ramadan
Ramadan is the month in which Muslims discipline their body and mind. The absence of drink, food and other pleasures provides a perfect opportunity for Muslims to concentrate on prayer and worship.
When Ramadan starts?
Beginning of Ramadan is based upon the phase of the moon since the new moon indicates the beginning of the new month.
Things that you should NOT do on Ramadan
There are many things that you should not do on Ramadan month. You are not allowed to drink, eat and sex from early morning before sunrise to sunset, but you can have it after your prayer at the sunset. On whole Ramadan Month You should NOT smoke, drink alcohol, use drugs, swear, selfish, disrespect others, hurt or being cruel any living things, and other things that is universally accepted as ‘Unhealthy’
Things that you should do on Ramadan
There are many things that you must do on Ramadan.
- All Muslims should do fasting.
- Muslims must pray more on Ramadan days.
- Go to mosque more
- Must read Qur’an more
- Share religious teachings
- Ramadan help Muslims to learn to stay away from bad habits and sins
- Ramadan help Muslims to continue these practices in many cases even after Ramadan is over.
Muslims usually donate more to poor people and help them on these days.
Am I not allowed to take food on whole Ramadan Day?
No. You can take food before the dawn (Time before the Sunrise) and after your prayer on the sunset.
What type of foods can I eat before and after fasting on Ramadan?
Usually Muslims break fasting by eating dates because Prophet Muhammed break fasting by eating dates. However, You can take any type of food (provided it is prepared in the halal manner), except food made of Pork and Alcohol. Remember you are not taking food in day time, so you must take very nutritious food after breaking fasting in the evening. So the recommended nutritious food for Muslims includes dates, milk, honey, water, olives, figs, chicken, meat, fish butter, fruits and other religious significance.
Who all should do fasting?
Not all Muslims should do fasting. Young children of Muslims are encouraged to learn about fasting, but fasting is must for anyone beyond adolescence (according to some Muslim scholars it’s over the age 10). Muslims who have medical conditions that make fasting difficult, those who are going through a pregnancy or menstruation cycle, those who are too old are not required to do fasting. Some individuals who cannot fast for some reasons may make up the fast at a later date.
Moreover Ramadan brings peace and corporation to the Muslim community and it’s a most important festival to Muslims. Thanks to my friend Nowfel, and other great Muslim scholars from Kerala, India who shared their knowledge with me to write this article about Ramadan.
Liked this article about Ramadan? Please spread the whole world about Ramadan by sharing this article about Ramadan with your friends and relatives through email, Facebook, Orkut, MySpace and some other online social bookmarking websites too by using the sharing button in orange color given below some lines. Spread now!.. | <urn:uuid:40c3a8b9-e774-491e-8dd9-e02af503d9ab> | CC-MAIN-2021-17 | https://www.freezonal.com/ramadan/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038057476.6/warc/CC-MAIN-20210410181215-20210410211215-00108.warc.gz | en | 0.942076 | 654 | 2.578125 | 3 |
Ian M. Miller1, Caitlin Shishido2, Liam Antrim3, and C. Edward Bowlby3, Editors
1Washington Sea Grant, Olympic Peninsula Field Office, Port Angeles, WA
2Washington Sea Grant, Seattle, WA
3Olympic Coast National Marine Sanctuary, Port Angeles, WA
Due to global climate change, the Intergovernmental Panel on Climate Change (IPCC) projects a high likelihood that marine ecosystems around the globe will be measurably altered in the coming century (Bernstein et al. 2007). In some cases, the collapse of entire ecosystems is viewed as possible, or even likely. These projections are valuable in terms of describing the global implications of climate change and clarifying the role that anthropogenic emission of greenhouse gases plays in large-scale ecosystem change. However, they are less useful for assisting managers and policy-makers at the regional or local scale in their efforts to prepare for and, where possible, adapt to climate-related changes.
The Olympic Coast National Marine Sanctuary (OCNMS) is comprised of 8,572 square kilometers of marine and near-shore waters and intertidal habitat off of Washington State's Pacific Ocean coast. As one of 14 national marine sanctuaries managed by the National Oceanic and Atmospheric Administration (NOAA), OCNMS is provided protected status because of extraordinary ecological and maritime heritage values. The Office of National Marine Sanctuaries developed its "Climate-Smart Sanctuary" program in order to facilitate the process of climate adaptation in these special marine waters. This assessment is designed to assist OCNMS in adapting to climate change by bridging the gap between the global projections provided by the IPCC, and the regional and local implications of climate change by 2100.
The direct consequences of climate change on the physical environment in OCNMS were considered and, where possible, the direction and magnitude of change was estimated (Section 2). These physical effects were divided into seven categories: Increasing ocean temperature, ocean acidification, sea level rise, increasing storminess, changing ocean current patterns (with a focus on upwelling), increasing hypoxia or anoxia and altered hydrology in rivers draining into OCNMS. These are summarized here:
- Based on the literature reviewed for this assessment it is considered likely that Pacific Northwest (including the habitats within OCNMS) average air and ocean temperatures will rise measurably by 2100, probably outside of the contemporary range of variability. Downscaling of multiple global climate models for the Pacific NorthWest Coastal zone suggests that ocean water will warm on average, by 1.2°C by 2050, given a range of emissions scenarios (Section 2.2).
- The magnitude and extent of corrosive ocean water (with pH reduced relative to contemporary values and reduced availability of carbonate ions) is also expected to increase. Corrosive ocean water is currently associated with deeper water in OCNMS and is probably only drawn to the surface during periods of intense upwelling. By 2050, however, shallower areas within OCNMS will be exposed to corrosive water with greater frequency (Section 2.3).
- Due primarily to the warming of the ocean and melting of land-based ice, mean true sea level rise in OCNMS could exceed 1.0 m by 2100, but variable rates of vertical land movement associated with tectonic forces will cause variations in the rate of relative sea level rise. Relative sea level is expected to be greater along the southern coast of shoreline within OCNMS as compared to the northern coast (Section 2.4).
- Climate model projections suggest that the tracks of storms in the northeast Pacific Ocean will migrate, on average, further north due to climate change, but it is not clear if the magnitude or duration of storms will change. Observational evidence from locations in the northeast Pacific Ocean suggests the possibility that the ocean adjacent to OCNMS has become stormier in the last 50 years, though it isn't clear if the trend is related to long-term climate trends (Section 2.5).
- Projections regarding the possibility of increased upwelling favorable winds in OCNMS are mixed, and based on the contemporary variability in the timing, duration and intensity of upwelling favorable winds it is considered unlikely that climate change will cause measurable changes by 2100 (Section 2.6). Other factors besides upwelling favorable wind, notably warming of the surface layer of the ocean (Section 2.2), may also influence the timing and magnitude of upwelling and, by extension, productivity in OCNMS.
- Concentrations of dissolved oxygen in the northeast Pacific Ocean are expected to decrease as the upper ocean warms and becomes more stratified. Based on the dynamics of water masses influencing ocean areas within OCNMS, dissolved oxygen concentrations in the ocean waters in OCNMS should be approximately analogous. Long-term declines in dissolved oxygen have been observed at numerous locations in the northeast Pacific, including coastal locations near OCNMS (Section 2.7).
- Future warming in the Pacific Northwest region of the United States is projected to alter regional rainfall patterns and trigger more 100-year magnitude floods and lower summertime low flows among some basins that drain to OCNMS, including the Sol Duc, the Hoh, the Queets and the Quinault Rivers (Section 2.8).
The ecological implications of these likely or possible changes to the physical environment in OCNMS were analyzed in three different ways. First, the general ecological consequences of the suite of changes expected in OCNMS were examined (Section 3.2). These focused on the various ways in which marine ecological systems respond to change - by shifting species' ranges or by altering the timing of life history stages (phenology) for example - or on the consequences of these responses, which include changes in the composition of biological communities in OCNMS and increasing interactions between native" and "non-native species. Given the magnitude of projected climate-related change and evidence from distant and neighboring marine ecosystems it is likely that the marine ecosystem in OCNMS will experience all of these responses or consequences of climate change by 2100. There is some empirical, quantitative evidence from the Northeast Pacific Ocean that some of these responses or consequences are likely already influencing communities in OCNMS (Section 3.2).
Next, the cumulative impacts of multiple changes to the physical environment were assessed for four broad habitat categories: Nearshore and shallow water; deep-sea benthic; pelagic; and freshwater habitats. All habitat categories were vulnerable to various aspects of climate-related change. Chemical-biological impacts due to the changing properties of ocean water within OCNMS (i.e., increased ocean temperature, decreased oxygen concentration, increased acidity) are likely to interact directly with biota in all habitats. By contrast, the "mechanical" consequences of climate change, related to higher or lower streamflow, sea level rise, larger waves, or changes in the magnitude, intensity or location of storms are likely to influence freshwater and nearshore and shallow water habitats most directly. In all cases, though, there was no clear trend related to these changes due to the likely interaction between complex physical and biological systems. For example, in pelagic habitats primary productivity would be expected to increase under climate change scenarios involving increasing upwelling favorable winds and higher CO2 concentrations in ocean water, but rising ocean temperature would be expected to partly or entirely counteract that response by increasing stratification and reducing mixing in the shallow surface ocean.
Finally, the implication of climate-related changes on a select group of species or species assemblages, including phytoplankton, zooplankton, deepsea corals, intertidal mussels, sea urchins (Stronglyocentrotus spp.), Dungeness crab (Metacarcinus magister, formerly Cancer magister), fish, seabirds, cetaceans, pinnipeds and sea otters, was analyzed. There were clear implications of climate-related changes for all species analyzed. In some cases, those implications are due to the direct interaction between the organism and the changing environment, as is the case for some deep-sea coral species whose ability to maintain calcium carbonate body structures may be compromised by ocean acidification (Section 4.4). In other instances, the implications of climate-related change are via ecological interactions that mediate projected changes in the physical environments within OCNMS through other species. For example, given their role as mid- to upper-trophic level predators, the susceptibility of seabirds to climate-mediated changes will depend in large part on the impacts that their prey species experience (Section 4.9). In some instances, the documented consequences of climate cycles (Section 6.3) in the northeast Pacific Ocean are used to suggest the overall impact of climate change on particular species. For example, decreased ocean survival of Chinook and Coho salmon is likely based on observations made during conditions of unusually high water temperatures and reduced or delayed upwelling (Section 4.8).
Despite these very clear implications of climate change, very little certainty could be ascribed to the magnitude or direction of change for a given species or species assemblage, or to the overall consequence of ecological change. For example, despite the clear physical consequences of ocean acidification on some species of deep-sea corals, some capacity to adapt to corrosive ocean water has been demonstrated for species in OCNMS (Section 4.4). In some cases, possible or likely species alterations may not have clear ecological consequences. For example, resident forage fish including northern anchovy, Pacific herring, and smelts (surf and whitebait), may become less abundant in OCNMS (Section 4.8). The abundance of these species is currently highly variable, though. Additionally, migratory fish species, including Pacific hake, jack and Pacific chub mackerel, and Pacific sardine, are likely to become more abundant. Upper trophic-level species, like cetaceans (Section 4.11) and seabirds (Section 4.9), may have some capacity to adapt to these changes by altering their feeding behavior and targeting new or more abundant species. Even in instances in which conditions during El Nino-Southern Oscillation (ENSO; Section 6.3) warm phases, for example, are used to project future climate-related trends, it is not entirely clear that these short-term events are perfect analogs for projected long-term climate trends.
Adapting to climate change within the sanctuary will be shaped in part by the need to decide if, when, and where adaptation should be directed at helping species and ecosystems increase their resistance, resilience, or ability to respond to climate change. In some cases these choices will be made based on what is required to meet the mission of the sanctuary and other directives governing the activities within the sanctuary. How those directives are interpreted may simultaneously be influenced by climate change as well.
There are several tenets or guiding principles related to "climate-smart conservation" that can be used to frame adaptation thinking in the sanctuary. These include protect adequate and appropriate space, manage for uncertainty and expect surprises, reduce non-climate stresses, mainstream climate adaptation, plan for both climate variability and climate change, and reduce the rate and extent of climate change. These guiding principles can be used to frame decisions about adaptive actions related to the four management focal points detailed in the 2011 Management Plan and OCNMS Terms of Designation (water, habitats, living resources, and maritime archaeological resources).
Climate Change, Olympic Coast, Olympic Peninsula, Washington Coast, Marine Ecology, Climate Impact, Climate Assessment | <urn:uuid:7d4c5b0d-822b-453e-bdcd-181d4f3eef49> | CC-MAIN-2019-26 | https://sanctuaries.noaa.gov/science/conservation/cc_ocnms.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000044.37/warc/CC-MAIN-20190626013357-20190626035357-00211.warc.gz | en | 0.934127 | 2,384 | 2.78125 | 3 |
College is a pretty pricey proposition, even after grants and scholarships are factored in. And the millions of students graduating this spring will soon learn just how expensive their degrees were when they start getting student-loan bills.
As a Pew Research Center analysis noted last year, nearly one in five U.S. households (19%) owed money on student loans in 2010, more than double the proportion in 1989. Among households headed by someone younger than 35 (i.e., people more likely to be recent college graduates), a record 40% had student-loan debt outstanding.
The average student loan balance outstanding in 2010 was $26,682, but 10% of student debtors owed more than $61,894. (Pew Research derived those numbers from the Survey of Consumer Finances, conducted every three years by the Federal Reserve Board.)
Somewhat older data from the National Postsecondary Student Aid Study (analyzed by both Pew Research and the College Board) breaks down debt levels by type of institution and degree. As of the 2007-08 academic year, for instance, 25% of students who earned bachelor’s degrees from private nonprofit colleges carried more than $30,000 in debt, compared with 12% of public-college graduates and a remarkable 57% of graduates of private, for-profit schools.
According to the College Board, loans from all sources accounted for 40.4% of the $191.8 billion spent on financing undergraduate education in 2011-12. Grants from all sources accounted for 50.6%, with education tax benefits and work-study making up the rest.
The College Board figures exclude whatever students and their families pay from their own resources. But according to 2009 data from the Organization for Economic Cooperation and Development, the United States ranked fifth among 31 major countries studied in terms of reliance on households for funding higher education: 45.3% of total expenditures, trailing Chile, the United Kingdom, Japan and South Korea. (Although three countries — Denmark, Finland and Germany — didn’t separate households from other private-sector funding sources, their total private-funding percentages were well below the U.S.)
On average, public sources accounted for about 70% of total higher-ed expenditures in the 31 countries studied by the OECD, versus 38% in the United States. | <urn:uuid:06e5b9c6-c5b0-43f2-b7f1-ba9b59bedde3> | CC-MAIN-2020-24 | https://www.pewresearch.org/fact-tank/2013/05/13/in-time-for-graduation-season-a-look-at-student-debt/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413551.52/warc/CC-MAIN-20200531151414-20200531181414-00416.warc.gz | en | 0.964064 | 473 | 2.515625 | 3 |
How To Differentiate The Good From The Bad!
Carbohydrates are important in our diet because they provide us with the necessary energy to fuel our workouts. If you want a lean and healthy body you have to “nail” your nutrition. Regardless of the effort you put in at the gym you will not look your best if you are not eating the right foods. A great deal of confusion surrounds the issue of carbohydrates in terms of differentiating the good from the bad. Some people foolishly label all simple carbohydrates as bad and all complex carbohydrates as good.
Simple Carbohydrates Are Not all Bad
Cakes, muffins, cookies and sweets are all simple carbohydrates and are viewed as bad because of their high sugar content, which leads to a spike in sugar levels. Such foods give a short-lasting energy followed by a huge “crash”, and evidently they are not ideal to have before a workout session.
Although fruits can be classified as simple carbohydrates, the energy obtained from them is long-lasting because of the fiber they posses which slows down the rate at which these foods are absorbed into the bloodstream. Consuming fruits will not result in such an extreme spike in blood sugar levels and to top it all off, fruits contain important vitamins and minerals which are beneficial to your body.
Complex Carbohydrates Are Not All Good
Complex carbohydrates are viewed as good because of the complex nature of these foods, which allows the sugar in them be released gradually into the bloodstream, therefore preventing an insulin surge. Examples of complex carbohydrates are rice, pasta and bread. For the record, just because a carbohydrate is complex does not mean it is good for you. White bread and white rice are complex carbohydrates but the germ and bran in these foods have been completely removed, leaving these foods with little to no nutritional value for you. When choosing complex carbohydrates you should ensure that you choose the ones that are unprocessed like brown bread and brown rice. Brown bread and brown rice retain the germ and bran which contain much of the many vitamins, nutrients and minerals that will revitalize your body and stabilize blood sugar levels.
The Glycemic Index to the Rescue?
Clearly, it is flawed to group all simple carbohydrates as bad and all complex carbohydrates as good. In an effort to better assess whether a carbohydrate is good or bad, the glycemic index was invented. The glycemic index measures the rate of absorption of carbohydrates in relation to pure sugar, but the presumption is that the faster the carbohydrate is absorbed by the body the less healthy it is for you; this is not necessarily the case. The reason bad carbohydrates tend to be absorbed very quickly is because of all the processing the food has already gone through, in other words, the food has already been broken down by processing so there is not much for your body to do. This makes these foods impact the bloodstream much faster resulting in blood sugar spikes which lead to unhealthy food cravings. Furthermore, as a result of the extraction of most of the nutrients from these foods, they posses little to no nutritional value and is more likely to be stored by the body as fat.
Glycemic Index Not Foolproof
The glycemic index is not a foolproof method of assessing a carbohydrate’s merit since solely examining the rate at which a carbohydrate is absorbed into the bloodstream ignores other important factors. The watermelon has a high glycemic index, but the total calories in a watermelon is so low that it will have little to no impact on your blood sugar level, therefore, judging the merit of a carbohydrate on this basis is unsound.
The Best Way of Judging Whether A Carbohydrate Is Good Or Not
The best way of judging whether a carbohydrate is good or bad is to find out how natural it is. The closer the food is to nature the better it will be for your body. Fruits and vegetables are excellent sources of carbohydrates along with brown bread and brown rice for this reason. Their unprocessed nature allows them to be better utilized by the body and consequently less likely to be stored as fat. Therefore, if you want to achieve your fitness goals faster you need to drop the bad carbohydrates from your diet. Bad carbohydrates will lead to further unhealthy food cravings and lethargy, so if you know what’s good for you then you should stay away from those empty calories. | <urn:uuid:7c1a9c33-d826-45c6-9836-190356dec97b> | CC-MAIN-2015-27 | http://www.askthetrainer.com/good-vs-bad-carbohydrates/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094634.87/warc/CC-MAIN-20150627031814-00039-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.943568 | 889 | 2.953125 | 3 |
Digitization help student to explore and study their academic courses online, as this gives them flexibility and scheduling their learning at their convenience. Kidsfront has prepared unique course material of GENERAL KNOWLEDGE General Physics for CDS Exam student. This free online GENERAL KNOWLEDGE study material for CDS Exam will help students in learning and doing practice on General Physics topic of CDS Exam GENERAL KNOWLEDGE. The study material on General Physics, help CDS Exam GENERAL KNOWLEDGE students to learn every aspect of General Physics and prepare themselves for exams by doing online test exercise for General Physics, as their study progresses in class. Kidsfront provide unique pattern of learning GENERAL KNOWLEDGE with free online comprehensive study material and loads of CDS Exam GENERAL KNOWLEDGE General Physics exercise prepared by the highly professionals team. Students can understand General Physics concept easily and consolidate their learning by doing practice test on General Physics regularly till they excel in GENERAL KNOWLEDGE General Physics. | <urn:uuid:3c8745e3-8246-492e-90e5-32e32407d88d> | CC-MAIN-2023-14 | https://mail.kidsfront.com/competitive-exams/study-material/CDS+Exam-GENERAL+KNOWLEDGE-General+Physics-p1.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00300.warc.gz | en | 0.932532 | 192 | 2.65625 | 3 |
Density(Redirected from Densities)
The density, or more precisely, the volumetric mass density, of a substance is its mass per unit volume. The symbol most often used for density is ρ (the lower case Greek letter rho), although the Latin letter D can also be used. Mathematically, density is defined as mass divided by volume:
where ρ is the density, m is the mass, and V is the volume. In some cases (for instance, in the United States oil and gas industry), density is loosely defined as its weight per unit volume, although this is scientifically inaccurate – this quantity is more specifically called specific weight.
For a pure substance the density has the same numerical value as its mass concentration. Different materials usually have different densities, and density may be relevant to buoyancy, purity and packaging. Osmium and iridium are the densest known elements at standard conditions for temperature and pressure but certain chemical compounds may be denser.
To simplify comparisons of density across different systems of units, it is sometimes replaced by the dimensionless quantity "relative density" or "specific gravity", i.e. the ratio of the density of the material to that of a standard material, usually water. Thus a relative density less than one means that the substance floats in water.
The density of a material varies with temperature and pressure. This variation is typically small for solids and liquids but much greater for gases. Increasing the pressure on an object decreases the volume of the object and thus increases its density. Increasing the temperature of a substance (with a few exceptions) decreases its density by increasing its volume. In most materials, heating the bottom of a fluid results in convection of the heat from the bottom to the top, due to the decrease in the density of the heated fluid. This causes it to rise relative to more dense unheated material.
The reciprocal of the density of a substance is occasionally called its specific volume, a term sometimes used in thermodynamics. Density is an intensive property in that increasing the amount of a substance does not increase its density; rather it increases its mass.
In a well-known but probably apocryphal tale, Archimedes was given the task of determining whether King Hiero's goldsmith was embezzling gold during the manufacture of a golden wreath dedicated to the gods and replacing it with another, cheaper alloy. Archimedes knew that the irregularly shaped wreath could be crushed into a cube whose volume could be calculated easily and compared with the mass; but the king did not approve of this. Baffled, Archimedes is said to have taken an immersion bath and observed from the rise of the water upon entering that he could calculate the volume of the gold wreath through the displacement of the water. Upon this discovery, he leapt from his bath and ran naked through the streets shouting, "Eureka! Eureka!" (Εύρηκα! Greek "I have found it"). As a result, the term "eureka" entered common parlance and is used today to indicate a moment of enlightenment.
The story first appeared in written form in Vitruvius' books of architecture, two centuries after it supposedly took place. Some scholars have doubted the accuracy of this tale, saying among other things that the method would have required precise measurements that would have been difficult to make at the time.
From the equation for density (ρ = m/V), mass density has units of mass divided by volume. As there are many units of mass and volume covering many different magnitudes there are a large number of units for mass density in use. The SI unit of kilogram per cubic metre (kg/m3) and the cgs unit of gram per cubic centimetre (g/cm3) are probably the most commonly used units for density. One g/cm3 is equal to one thousand kg/m3. One cubic centimetre (abbreviation cc) is equal to one millilitre. In industry, other larger or smaller units of mass and or volume are often more practical and US customary units may be used. See below for a list of some of the most common units of density.
Measurement of density
The density at all points of a homogeneous object equals its total mass divided by its total volume. The mass is normally measured with a scale or balance; the volume may be measured directly (from the geometry of the object) or by the displacement of a fluid. To determine the density of a liquid or a gas, a hydrometer, a dasymeter or a Coriolis flow meter may be used, respectively. Similarly, hydrostatic weighing uses the displacement of water due to a submerged object to determine the density of the object.
If the body is not homogeneous, then its density varies between different regions of the object. In that case the density around any given location is determined by calculating the density of a small volume around that location. In the limit of an infinitesimal volume the density of an inhomogeneous object at a point becomes: , where is an elementary volume at position . The mass of the body then can be expressed as
In practice, bulk materials such as sugar, sand, or snow contain voids. Many materials exist in nature as flakes, pellets, or granules.
Voids are regions which contain something other than the considered material. Commonly the void is air, but it could also be vacuum, liquid, solid, or a different gas or gaseous mixture.
The bulk volume of a material—inclusive of the void fraction—is often obtained by a simple measurement (e.g. with a calibrated measuring cup) or geometrically from known dimensions.
Mass divided by bulk volume determines bulk density. This is not the same thing as volumetric mass density.
To determine volumetric mass density, one must first discount the volume of the void fraction. Sometimes this can be determined by geometrical reasoning. For the close-packing of equal spheres the non-void fraction can be at most about 74%. It can also be determined empirically. Some bulk materials, however, such as sand, have a variable void fraction which depends on how the material is agitated or poured. It might be loose or compact, with more or less air space depending on handling.
In practice, the void fraction is not necessarily air, or even gaseous. In the case of sand, it could be water, which can be advantageous for measurement as the void fraction for sand saturated in water—once any air bubbles are thoroughly driven out—is potentially more consistent than dry sand measured with an air void.
In the case of non-compact materials, one must also take care in determining the mass of the material sample. If the material is under pressure (commonly ambient air pressure at the earth's surface) the determination of mass from a measured sample weight might need to account for buoyancy effects due to the density of the void constituent, depending on how the measurement was conducted. In the case of dry sand, sand is so much denser than air that the buoyancy effect is commonly neglected (less than one part in one thousand).
Mass change upon displacing one void material with another while maintaining constant volume can be used to estimate the void fraction, if the difference in density of the two voids materials is reliably known.
Changes of density
In general, density can be changed by changing either the pressure or the temperature. Increasing the pressure always increases the density of a material. Increasing the temperature generally decreases the density, but there are notable exceptions to this generalization. For example, the density of water increases between its melting point at 0 °C and 4 °C; similar behavior is observed in silicon at low temperatures.
The effect of pressure and temperature on the densities of liquids and solids is small. The compressibility for a typical liquid or solid is 10−6 bar−1 (1 bar = 0.1 MPa) and a typical thermal expansivity is 10−5 K−1. This roughly translates into needing around ten thousand times atmospheric pressure to reduce the volume of a substance by one percent. (Although the pressures needed may be around a thousand times smaller for sandy soil and some clays.) A one percent expansion of volume typically requires a temperature increase on the order of thousands of degrees Celsius.
In contrast, the density of gases is strongly affected by pressure. The density of an ideal gas is
where M is the molar mass, P is the pressure, R is the universal gas constant, and T is the absolute temperature. This means that the density of an ideal gas can be doubled by doubling the pressure, or by halving the absolute temperature.
In the case of volumic thermal expansion at constant pressure and small intervals of temperature the temperature dependence of density is :
where is the density at a reference temperature, is the thermal expansion coefficient of the material at temperatures close to .
Density of solutions
Mass (massic) concentration of each given component ρi in a solution sums to density of the solution.
provided that there is no interaction between the components.
Knowing the relation between excess volumes and activity coefficients of the components, one can determine the activity coefficients.
|Material||ρ (kg/m3)[note 1]||Notes|
|Metallic microlattice||0.9||[note 2]|
|Air||1.2||At sea level|
|Tungsten hexafluoride||12.4||One of the heaviest known gases at standard conditions|
|Liquid hydrogen||70||At approx. −255 °C|
|Ice||916.7||At temperature < 0 °C|
|Water (fresh)||1,000||At 4 °C, the temperature of its maximum density|
|Liquid oxygen||1,141||At approx. −219 °C|
|Plastics||1,175||Approx.; for polypropylene and PETE/PVC|
|Diiodomethane||3,325||Liquid at room temperature|
|Interstellar medium||×10−191||Assuming 90% H, 10% He; variable T|
|The Earth||5,515||Mean density.|
|The inner core of the Earth||13,000||Approx., as listed in Earth.|
|The core of the Sun||33,000–160,000||Approx.|
|Super-massive black hole||×1059||Density of a 4.5-million-solar-mass black hole
Event horizon radius is 13.5 million km.
|White dwarf star||×1092.1||Approx.|
|Atomic nuclei||×10172.3||Does not depend strongly on size of nucleus|
|Stellar-mass black hole||×10181||Density of a 4-solar-mass black hole
Event horizon radius is 12 km.
|Temp. (°C)[note 1]||Density (kg/m3)|
|T (°C)||ρ (kg/m3)|
Molar volumes of liquid and solid phase of elements
The SI unit for density is:
The litre and metric tons are not part of the SI, but are acceptable for use with it, leading to the following units:
Densities using the following metric units all have exactly the same numerical value, one thousandth of the value in (kg/m3). Liquid water has a density of about 1 kg/dm3, making any of these SI units numerically convenient to use as most solids and liquids have densities between 0.1 and 20 kg/dm3.
- kilogram per cubic decimetre (kg/dm3)
- gram per cubic centimetre (g/cm3)
- 1 g/cm3 = 1000 kg/m3
- megagram (metric ton) per cubic metre (Mg/m3)
In US customary units density can be stated in:
- Avoirdupois ounce per cubic inch (1 g/cc ≈ 0.578036672 oz/cu in)
- Avoirdupois ounce per fluid ounce (1 g/cc ≈ 1.04317556 oz/fl. oz = 1.04317556 lbs/pint)
- Avoirdupois pound per cubic inch (1 g/cc ≈ 0.036127292 lb/cu in)
- pound per cubic foot (1 g/cc ≈ 62.427961 lb/cu ft)
- pound per cubic yard (1 g/cc ≈ 1685.5549 lb/cu yd)
- pound per US liquid gallon (1 g/cc ≈ 8.34540445 lb/gal)
- pound per US bushel (1 g/cc ≈ 77.6888513 lb/bu)
- slug per cubic foot
Imperial units differing from the above (as the Imperial gallon and bushel differ from the US units) in practice are rarely used, though found in older documents. The Imperial gallon was based on the concept that an Imperial fluid ounce of water would have a mass of one Avoirdupois ounce, and indeed 1 g/cc ≈ 1.00224129 ounces per Imperial fluid ounce = 10.0224129 pounds per Imperial gallon. The density of precious metals could conceivably be based on Troy ounces and pounds, a possible cause of confusion.
- List of elements by density
- Air density
- Area density
- Bulk density
- Charge density
- Density prediction by the Girolami method
- Energy density
- Lighter than air
- Linear density
- Number density
- Orders of magnitude (density)
- Orthobaric density
- Paper density
- Specific weight
- Spice (oceanography)
- Standard temperature and pressure
- The National Aeronautic and Atmospheric Administration's Glenn Research Center. "Gas Density Glenn research Center". grc.nasa.gov. Archived from the original on April 14, 2013.
- "Density definition in Oil Gas Glossary". Oilgasglossary.com. Archived from the original on August 5, 2010. Retrieved September 14, 2010.
- Archimedes, A Gold Thief and Buoyancy Archived August 27, 2007, at the Wayback Machine. – by Larry "Harris" Taylor, Ph.D.
- Vitruvius on Architecture, Book IX, paragraphs 9–12, translated into English and in the original Latin.
- "EXHIBIT: The First Eureka Moment". Science. 305 (5688): 1219e. 2004. doi:10.1126/science.305.5688.1219e.
- Fact or Fiction?: Archimedes Coined the Term "Eureka!" in the Bath, Scientific American, December 2006.
- New carbon nanotube struructure aerographite is lightest material champ Archived October 17, 2013, at the Wayback Machine.. Phys.org (July 13, 2012). Retrieved on July 14, 2012.
- Aerographit: Leichtestes Material der Welt entwickelt – SPIEGEL ONLINE Archived October 17, 2013, at the Wayback Machine.. Spiegel.de (July 11, 2012). Retrieved on July 14, 2012.
- "Re: which is more bouyant [sic] styrofoam or cork". Madsci.org. Archived from the original on February 14, 2011. Retrieved September 14, 2010.
- Raymond Serway; John Jewett (2005), Principles of Physics: A Calculus-Based Text, Cengage Learning, p. 467, ISBN 0-534-49143-X, archived from the original on May 17, 2016
- "Wood Densities". www.engineeringtoolbox.com. Archived from the original on October 20, 2012. Retrieved October 15, 2012.
- "Density of Wood". www.simetric.co.uk. Archived from the original on October 26, 2012. Retrieved October 15, 2012.
- CRC Press Handbook of tables for Applied Engineering Science, 2nd Edition, 1976, Table 1-59
- glycerol composition at Archived February 28, 2013, at the Wayback Machine.. Physics.nist.gov. Retrieved on July 14, 2012.
- Hugh D. Young; Roger A. Freedman. University Physics with Modern Physics Archived April 30, 2016, at the Wayback Machine.. Addison-Wesley; 2012. ISBN 978-0-321-69686-1. p. 374.
- Density of the Earth, wolframalpha.com, archived from the original on October 17, 2013
- Density of Earth's core, wolframalpha.com, archived from the original on October 17, 2013
- Density of the Sun's core, wolframalpha.com, archived from the original on October 17, 2013
- Extreme Stars: White Dwarfs & Neutron Stars Archived September 25, 2007, at the Wayback Machine., Jennifer Johnson, lecture notes, Astronomy 162, Ohio State University. Accessed: May 3, 2007.
- Nuclear Size and Density Archived July 6, 2009, at the Wayback Machine., HyperPhysics, Georgia State University. Accessed: June 26, 2009.
- "Density". Encyclopædia Britannica. 8 (11th ed.). 1911.
- "Density". The New Student's Reference Work. 1914.
- Video: Density Experiment with Oil and Alcohol
- Video: Density Experiment with Whiskey and Water
- Glass Density Calculation – Calculation of the density of glass at room temperature and of glass melts at 1000 – 1400°C
- List of Elements of the Periodic Table – Sorted by Density
- Calculation of saturated liquid densities for some components
- Field density test
- On-line calculator for densities and partial molar volumes of aqueous solutions of some common electrolytes and their mixtures, at temperatures up to 323.15 K.[permanent dead link]
- Water – Density and specific weight
- Temperature dependence of the density of water – Conversions of density units
- A delicious density experiment
- Water density calculator Water density for a given salinity and temperature.
- Liquid density calculator Select a liquid from the list and calculate density as a function of temperature.
- Gas density calculator Calculate density of a gas for as a function of temperature and pressure.
- Densities of various materials.
- Determination of Density of Solid, instructions for performing classroom experiment.
- density prediction
- density prediction | <urn:uuid:19357c6d-9143-4115-8cf2-16b7ee16c8a6> | CC-MAIN-2018-26 | https://en.m.wikipedia.org/wiki/Densities | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864022.18/warc/CC-MAIN-20180621040124-20180621060124-00095.warc.gz | en | 0.852 | 3,938 | 4.34375 | 4 |
Optic neuritis refers to an inflammation of the optic nerve, which can occur due to damage or loss of the protective layer that coats the nerve. As a result, the patient's vision becomes compromised, and visual perception may change. The patient may notice blind spots and worsened color vision. Pain is often present but improves with rest. If the condition doesn't go away after some time, ophthalmologists may prescribe certain medications. Find out the top 10 symptoms of optic neuritis.
While this symptom may sound alarming, in most cases it is mild and non-permanent. In rare cases, vision loss, which is most likely to affect young adults, can become permanent. Fortunately, it usually only affects one eye. To examine for vision loss, a specialist will measure changes in your vision. The usual result is reduced visual acuity as well as changes in peripheral vision. The perception of brightness is also likely to become affected. As a result, a loss of color vision may occur. Optic neuritis usually resolves by itself in due time.
One of the most common symptoms of optic neuritis is a pain that occurs around the eye. Because the eye is one of the most fragile parts of the body, many different variables can cause pain to occur, including superficial damages. In optical neuritis patients, up to one-third of all cases are characterized by visible swelling, sometimes including swelling of the blood vessels around the nerve, a condition known as papillitis. Alternatively, inflammation can occur behind the eyes, which may be harder to diagnose. In any case, movement or exercise may make the pain worse.
In some cases, patients with optic neuritis also show signs of dyschromatopsia, or the inability to see colors correctly. Some people cannot distinguish certain colors, while others will lose sharpness in their vision. In most cases, patients start developing symptoms over the course of a couple of hours and up to a few days or weeks. Changes to vision may be temporary, but in some cases, they may be permanent.
You may experience a symptom known as photopsia, which refers to the presence of flashes of light in the field of vision. Many different conditions, including migraines and occipital lobe infarction, may cause photopsia. When optic neuritis is to blame, the patient may see flashes of light in one or both eyes, depending on the extent of the condition. To make a correct diagnosis of optic neuritis, different variables are taken into account, including patient history and different examinations. Sometimes blood tests are used to make a diagnosis, and an MRI may be useful.
Because optic neuritis affects the nerves of the eye, you may experience changes in your vision. One of the most common ways in which vision is affected is the perception of light and how the pupil reacts to it. In most cases, optic neuritis affects young adults in one eye.
If you develop optic neuritis, you may experience Uhthoff's phenomenon, in which vision becomes worse with increased body temperature. Heat can affect the nerves and how they transmit information across the body. Different activities, such as going to the sauna, may increase body temperature and make your symptoms worse. Avoid activities such as exercise and hot showers, as well as any others that your doctor prohibits.
Optic neuritis can affect the eyes and vision in many different ways, causing people to experience small areas of blurred vision. In extreme cases, there may be complete blindness. Blurry vision usually occurs within a few days after the appearance of the condition. While optic neuritis does tend to get better by itself, sometimes medical attention may be necessary. You may also experience other symptoms, such as pain that gets worse with movement and a general decrease in vividness.
Changes in vision due to optic neuritis can include a loss of contrast and an inability to distinguish between different colors. If you are diagnosed with optic neuritis, your treatment plan should take into account permanent deficits in color vision, contrast, and brightness. In most cases, this condition resolves on its own.
Unfortunately, for some patients with optic neuritis, seeing less vividly is a reality that many have to face. Instead, the vision may become blurrier and less colorful, vibrant and clear due to the damage caused by the condition. Fortunately, several medications are available to reduce pain, improve vision and reduce inflammation of the nerve. If a patient becomes hospitalized, IV steroids may be given, which may slightly increase the speed of recovery.
Patients who develop optic neuritis may complain of dull pain in the eye. Some individuals report feeling more pain during times of movement or physical activity, and over time, the pain can become more severe. Usually, the pain is felt in different parts of the eye, although sometimes it occurs in only one area.
This site offers information designed for educational purposes only. You should not rely on any information on this site as a substitute for professional medical advice, diagnosis, treatment, or as a substitute for, professional counseling care, advice, diagnosis, or treatment. If you have any concerns or questions about your health, you should always consult with a physician or other healthcare professional. | <urn:uuid:31a1013f-ec9a-481b-9256-112fe9526f10> | CC-MAIN-2022-05 | https://facty.com/ailments/eyes/10-symptoms-of-optic-neuritis/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300533.72/warc/CC-MAIN-20220117091246-20220117121246-00259.warc.gz | en | 0.949201 | 1,054 | 3.046875 | 3 |
MIT economist Esther Duflo on rising food prices:
...Several reasons explain the upward trend in prices, including the demand for biofuels (which consume a significant part of the corn produced worldwide), and the growth and enrichment of the world population (particularly the increased demand for meat in China – paradoxically, it takes more grain to produce a calorie in meat form than it does to produce a calorie in grain form).
Several short-term factors also help to explain the recent price peak. Because the main consumers of rice are also producers, the volume of rice traded is low compared to the volume of rice produced (only seven percent of produced rice is traded). Restrictions by big producers (such as India) can thus have large impacts on the world price of rice, since they affect a large proportion of the volume of rice traded. It keeps the prices in India relatively insulated from what is happening on the world market, however. Wheat harvests have been poor in several major producing countries, rice is suffering from a mysterious parasite in Vietnam, and following accusation of corruption and mismanagement in the last few years, there have been sharp declines in grain stocks maintained by governments to stabilise prices (they are at their lowest levels since 1984). As a result, prices are not only high in general, but also more volatile (another drop in rice prices is expected after the harvests in Indonesia and India); even the financial crisis plays a role: in the current meltdown, commodities offer an interesting betting opportunity.
...So when grain prices rise, some of the poor gain, and some lose – in the short-term. In part, the uproar over food prices reflects a fundamental political economy reality: when some gain and some lose, the voice of those who lose is always louder. This is particularly true of an increase in food prices, which hurt primarily the urban poor. In the medium-term, however, an increase in price volatility is damaging for everyone. Poor families in developing countries are already facing enormous risks (they are often self-employed, they are subject to the uncertainties of weather, and their health is fragile), and there is very little insurance against such risks, apart from their own savings or informal solidarity. Furthermore, these risks are more serious for households struggling to provide the bare minimum. A setback might mean sacrificing the children’s education, or not being able to save a little girl from a diarrhea attack (on this, see a beautiful paper by Elaina Rose, which showed that during drought, the relative survival probability of girls dramatically declines).3 A passing difficulty can leave a permanent scar.
Beyond emergency relief, which the world community is scrambling to organise at the moment, it is essential to establish effective insurance against variability in food prices for the poorest. Many argue now that the way to do it is to stop trade and encourage countries be “self sufficient” in food. This seems of course a third best solution, since the countries would then be entirely dependent on the vagaries of the weather at home. It is also not clear what countries that are net food importers would do (in the long run, the argument goes, they will improve their productivity… however, given Senegal’s climate, producing rice there will always be much more expansive than doing it in Thailand). The traditional method used by developing country governments – maintaining large stockpiles of grain by buying when the price is low and selling when the price is high – has its share of problems. In India, it was said that at some point that there were enough bags of rice in those storage facilities to go to the moon and back. The losses in storage and to corruption were important. Alternatively, the governments can manipulate prices using taxes and subsidies. Or perhaps it is time to be creative and make the international financial services actually work for the poor: governments could provide price insurance for the poor (in the form of transfers to some when price are high, and others when price are low). Countries that are neither net sellers nor net buyers could do this internally, and countries that are either net sellers or net buyers should be able to sell this insurance on the world market. There is nothing straightforward about these solutions. The key point, however, is that it is urgent to think of something.
The Cost of Food: Facts and Figures (from the BBC News) | <urn:uuid:03b1e234-d1e5-45e7-b9e5-2e0f241f18c6> | CC-MAIN-2017-39 | http://sapkotac.blogspot.com/2008/04/food-inflation-watch-duflo-argues-for.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689615.28/warc/CC-MAIN-20170923085617-20170923105617-00584.warc.gz | en | 0.968271 | 877 | 3 | 3 |
For a 28-day cycle, the time of ovulation and best chance of pregnancy is generally around the 14th day. AnswerParty.
Human reproduction is any form of sexual reproduction resulting in the conception of a child, typically involving sexual intercourse between a man and a woman. During sexual intercourse, the interaction between the male and female reproductive systems results in fertilization of the woman's ovum by the man's sperm, which after a gestation period is followed by childbirth. The fertilization of the ovum may nowadays be achieved by artificial insemination methods, which do not involve sexual intercourse.
Menstrual cycle is the cycle of changes that occurs in the uterus and ovary for the purpose of sexual reproduction. It is essential for the production of eggs and for the preparation of the uterus for pregnancy. The menstrual cycle occurs only in fertile female humans and other female primates.
In humans, the length of a menstrual cycle varies greatly among women (ranging from 25 to 35 days), with 28 days designated as the average length. Each cycle can be divided into three phases based on events in the ovary (ovarian cycle) or in the uterus (uterine cycle). The ovarian cycle consists of the follicular phase, ovulation, and luteal phase whereas the uterine cycle is divided into menstruation, proliferative phase, and secretory phase. Both cycles are controlled by the endocrine system and the normal hormonal changes that occur can be interfered with using hormonal contraception to prevent reproduction. Fertility
Fertility awareness (FA) refers to a set of practices used to determine the fertile and infertile phases of a woman's menstrual cycle. Fertility awareness methods may be used to avoid pregnancy, to achieve pregnancy, or as a way to monitor gynecological health.
Methods of identifying infertile days have been known since antiquity, but scientific knowledge gained during the past century has increased the number and variety of methods. | <urn:uuid:2e4469aa-c30e-4cb8-a992-fc84eeb66e94> | CC-MAIN-2014-41 | http://answerparty.com/question/answer/what-are-the-chances-of-a-girl-getting-pregnant-if-she-is-8-days-off-of-her-period | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663762.45/warc/CC-MAIN-20140930004103-00261-ip-10-234-18-248.ec2.internal.warc.gz | en | 0.934151 | 391 | 3.484375 | 3 |
Medical devices refer to instruments, equipment, in vitro diagnostic reagents and calibrators, and other related articles used in human body including required computer software. Its effectiveness is mainly obtained by physical means instead of pharmacology, immunology or metabolism.
What are the common misunderstandings about medical devices?
Medical devices are high-risk.
Medical devices can only be available in hospitals and only be used by medical personnel.
In fact, according to the risk level, medical devices are divided into three categories.
Class I medical devices has low risk level. The public can ensure the safety of use through learning and consulting the instructions. Many products can be used at home.
Some class II medical devices can be used for household.
Class III medical devices have high risk level. A few can be used for household under the instructions.
Some other devices are regarded as medical devices, such as some fitness, slimming, heightening and health care products. These devices have no medical device registration number, which can be clearly distinguished from this point.
Medical devices are more conducive to health than other devices.
Medical devices are special products. Their production and sales are subject to strict approval management. They have particular functions. The medical device should not be used for unsuitable people.
Other devices have a wider range of applications. Their main functions are not for medical purposes, but the respective functions of products.
As a manufacturer of medical devices, Perlove Medical currently have medical devices lines including DR lines, C-arm lines, DRF lines, and etc. We can supply products for different testing and procurement needs. If you are interested in our products, please leave us a message on our website. | <urn:uuid:b85d6c81-b0f0-4a66-84bb-a8f59379e7c4> | CC-MAIN-2024-10 | https://www.perlove.net/what-are-medical-devices-what-are-the-common-misunderstandings-of-medical-devices%EF%BC%9F/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474377.60/warc/CC-MAIN-20240223085439-20240223115439-00369.warc.gz | en | 0.944985 | 344 | 3.109375 | 3 |
The 2016 Summer Olympics in Rio are starting! With that in mind, let’s take a look at China and what sports they traditionally have success in during the Olympics.
Why Is China So Successful At The Olympics?
Some of it might be due to the training methods. Many Chinese athletes are scouted, and then separated from their peers and put into training facilities.
Athleticism and the spirit of the Olympics align very closely with Chinese values. Confucius values believe that hard work and perseverance gets results. With this in mind, they follow a long-term athletic development model that has proven to work for them. Every movement and technique is repeated and perfected until it is optimized, which is why they succeed in finesse sports such as gymnastics and diving.
The government is also heavily invested in the Olympic athletic program. The exact figure is unclear, but it is estimated to be the highest funded high performance program in the world.
There is plenty of pressure to win gold at the Olympics. Winning a gold medal will unlock millions of dollars worth in sponsorship deals and advertising opportunities. For example, Lei Sheng won his first and only Olympic gold medal in London in 2012, and he has appeared in commercials for BMW in China.
However, the same does not hold true for silver and bronze medalists. These athletes are often seen as “failures,” as they had the potential to achieve gold, but didn’t succeed. Gymnastics writer Trevor Low recounts what he witnessed when gymnast Deng Linlin wins a silver medal, narrowly losing gold to Romania’s Ana Porgras:
"[Chinese gymnast] Deng Linlin was living and breathing for a gold medal and it didn't come," says Low to BBC. "Losing face and respect in Chinese society still matters. She would be lauded for being a potential world champion and when it didn't happen, she lost face.
"You have to understand Chinese culture. They will be significantly shameful of the fact they have failed to live up to what they believed, and were told, they could do."
Here are the events that China traditionally sweeps at the Olympic Games.
1. Table Tennis 乒乓 (pīng pāng)
As China’s national sport, table tennis is a point of pride for the Chinese. (Few people know that table tennis, also known as ping pong, is actually a British invention rather than a Chinese one.) In the 2012 London Olympics, China won all 6 gold medals for this sport.
The structure of the table tennis event was changed due to China’s dominance in the sport. For the individual event, only two competitors from each country can enter (instead of 3). This format makes it such that one country cannot win all three top medals (which China was doing previously.)
Countries that could contest China for the gold medals are Japan, Singapore, and Germany.
(The characters 乒乓 (pīng pāng) are very similar to one another. See more here.)
Defending Chinese Table Tennis Medalists in Rio 2016
Zhang Jike (Gold, Men’s Singles, Men’s Team)
Ma Long (Gold, Men’s Team)
Li Xiaoxia (Gold, Women’s Singles, Women’s Team)
Ding Ning (Gold, Women’s Team. Silver, Women’s Singles.)
2. Badminton 羽毛球 (yǔ máo qiú)
In the 2012 London Olympics, China won all 5 gold medals for badminton.
There was a scandal in this particular event at the previous Olympics. The Chinese women’s pair Wang Xiaoli and Yu Yang, who were the No.1 team in the world, were disqualified for throwing the match in order to seek a more favorable draw. 3 other pairs from South Korea and Indonesia were also disqualified for “not doing their best to win a match” and “abusing or demeaning the sport.”
Even without their No.1 team, China’s pair Tian Qing and ZhaoYun Lei cinched the gold.
Lin Dan is one of the most recognizable faces in Chinese sports media. He is a two-time Olympic champion, five-time world champion, and six-time All England champion for the Men’s Singles badminton event. He is after his third gold medal in Rio, surprising many WeChat fans and users on Chinese social media, who say he has “earned his retirement.” Lin Dan’s greatest rival, Lee Chong Wei from Malaysia, is also competing.
Defending Chinese Badminton Medalists in Rio 2016
Lin Dan (Gold, Men’s Singles)
Li Xuerui (Gold, Women’s Singles)
ZhaoYun Lei (Gold, Women’s Doubles and Mixed Doubles)
Fu HaiFeng (Gold, Men’s Doubles)
Zhang Nan (Gold, Mixed Doubles)
Xu Chen (Gold, Mixed Doubles)
Ma Jin (Gold, Mixed Doubles)
Wang Yihan (Silver, Women’s Singles)
Chen Long (Bronze, Men’s Singles)
Tian Qing (defending Gold in Women’s Doubles) will not be participating. Instead, the Luo twins will be making their Olympics debut.
3. Gymnastics 体操 (tǐ cāo)
In London 2012, China won a total of 12 medals in gymnastics events, 5 of them gold.
China has always been strong in the gymnastics program. Part of it may be due to genetics (Asian people tend to be more petite, thus having a lower center of gravity and a form more forgiving to the sport.) Another part of it may be due to famous athletes in the sport in the past, such as Li Ning. Li Ning famously won 6 medals at the 1984 Summer Olympics (the first time China PRC attended the Olympics.) Afterwards, he went on to create the mega sports brand, Li-Ning, which has sponsored many athletes including Dwyane Wade and Shaquille O’Neal.
China’s gymnastics training camps were the ones that were under controversy for “robbing children of their childhood.” Children as young as 5 years old are scouted for future Olympic glory.
China has also been under major scrutiny in the past for possibly using underage gymnasts to compete.
Because gymnastics tends to have a high turnover rate, only Zhang Chenglong will be the only veteran Olympian from the Chinese team.
Defending Chinese Gymnastics Medalists in rio 2016
Zhang Chenglong (Gold, Men’s All Around Team)
4. Diving 跳水 (tiào shuǐ)
Chinese gymnastics training is said to be closely linked to the diving program, since the two utilize similar training methods and techniques. Gymnastics training centers often have a diving springboard (without water) so trainees can get accustomed to the feel of a springboard beneath their feet. In London 2012, China took home 10 diving medals, with 6 of them being gold.
DEFENDING Chinese Diving MEDALISTS IN RIO 2016
Qin Kai (Gold, Synchronized 3 m springboard. Silver, 3 m springboard)
Cao Yuan (Gold, Synchronized 10 m platform)
Wu Minxia (Gold, women’s 3 m springboard, Gold, women’s synchronized 3 m springboard)
He Zi (Gold, women’s synchronized 3 min springboard. Silver, women’s 3 m springboard)
Chen Ruolin (Gold, women’s 10 m platform. Gold, women’s synchronized 10 m platform)
Qiu Bo (Silver, men’s 10 m platform)
5. Weightlifting举重 (jǔ zhòng)
Though we previously mentioned that China tends to succeed in finesse sports, weightlifting has a lot of movements that require perfection over hundreds of repetitions. That is possibly one of the reasons why China has success in this category. In London 2012, China claimed a total of 7 medals in the weightlifting category, with 5 of them being gold.
DEFENDING Chinese Weightlifting MEDALISTS IN RIO 2016
Lu Xiaojun (Gold, Men’s 77 kg)
6. Shooting 射击 (shè jī)
In London 2012, China claimed a total of 7 medals in the shooting category, 2 of them being gold.
DEFENDING Chinese Shooting MEDALISTS IN RIO 2016
Guo Wenjun (Gold, women’s 10 meter air pistol)
Yi Siling (Gold, women’s 10 meter air rifle)
Chen Ying (Silver, women’s 25 meter pistol)
Wei Ning (Silver, women’s skreet)
Wang ZhiWei (Bronze, men’s 50 meter pistol)
There are some new sports crazes that are gripping the Chinese nation, due to sudden unexpected wins by stellar rookie athletes. Here are some sports that China has seen recent success in:
1. Swimming (游泳 yóu yǒng)
Swimming became a hot new sport for the Chinese at the London 2012 Olympics, largely due to two new Chinese swimmers’ shockingly impressive performances. Sun Yang became the first Chinese male swimmer to win a gold medal. He was also the only other Olympian to win two individual gold titles in London (the other being Michael Phelps.) Sun Yang won the gold in men’s 400 and 1500 freestyle, setting a new world record in the latter. He is the favorite to reclaim these two gold medals he won last Olympics, as well as attempt to turn his silver in the 200 into a gold.
Ye Shiwen won the gold in women’s 200 and 400 individual medley, breaking a World Record and an Olympic Record in the process. She quickly became known for impressive sprinting in the final leg of the race, comparable to the speed of American swimmer Ryan Lochte.
Ning Zetao is a Chinese swimmer making his Olympic debut this year. He has garnered plenty of attention already, though perhaps for other reasons.
Defending Chinese Swimming Medalists in Rio 2016
Sun Yang (Gold, men’s 400 freestyle. Gold, men’s 1500 freestyle. Silver, 200m freestyle)
Ye Shiwen (Gold, women’s 200m individual medley. Gold, women’s 400m individual medley)
2. Fencing (击剑 jí jiàn)
Only four years ago, there were 300 people participating in the nationwide fencing club league in Shanghai. Now there are 3,000. With the popularity of the sport growing in China, there are sure to be more Chinese athletes shooting for the gold in fencing events.
Lei Sheng, 32, who won the men’s individual gold medal in foil at London 2012, is China’s flag bearer at the opening ceremony in Rio. He is the first non-basketball player to be able to do so for China, reflecting the progress fencing has made in growing in China. Also present from the London 2012 team are Sun Yujie and Xu Anqi, two of the four who won the women’s team epee event four years back.
DEFENDING Chinese Fencing MEDALISTS IN RIO 2016
Lei Sheng (Gold, men’s individual foil)
Sun Yujie (Gold, women’s team epee)
Xu Anqi (Gold, women’s team epee)
3. Archery(射箭 Shè jiàn)
In London 2012, China snatched up 2 medals for archery, though neither were gold.
Xing Yu, 25 narrowly lost in the round of 32 at the London 2012 Olympics, and did not progress. The other five participating archers were not part of China’s team in London.
4. Boxing (拳击 quán jí)
None of China’s eleven boxing athletes competing in Rio won anything in London. However, they do have the inspiration of Zou Shiming, who won the gold in light flyweight in London.
5. Cycling (自行车 zì xíng chē)
In London 2012, China won 3 medals in cycling for the women's keirin, women's team sprint and women's individual sprint events. Guo Shuang and Gong Jinjie set new World Records in the women's team sprint, but were disqualified for an "early relay" and awarded the silver. Their coach strongly protested and claimed they were "robbed of the gold."
At the 2016 UCI Track Cycling World Championships, China won women’s and men’s places in team pursuit. Zhong Tianshi, 25, stood out, beating fellow China teammate Lin Junhong to win the women’s sprint. She is now well-poised to grab the gold at Rio, and become her country’s first Olympic track champion. China has won two places in both women’s sprint and men’s keirin, as well as one spot in men’s sprint.
DEFENDING Chinese Cycling MEDALISTS IN RIO 2016Gong Jinjie (Silver, women's team sprint)
What sports will you be watching? Let us know in the comments! | <urn:uuid:ee42e26b-23f0-4e6c-bfbb-5e129451a71c> | CC-MAIN-2023-14 | https://blog.tutorabcchinese.com/expats/sports-that-china-wins-at-olympics | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00033.warc.gz | en | 0.954832 | 2,908 | 2.59375 | 3 |
The problems of transportation and traffic are as old as man's history of transportation. The type of vehicles changed over the centuries and so did traffic problems and the ways one tried to solve them. The evolution of traffic in this century can be characterized by a vast increase in the number of cars. This process was followed by an expanding network of roads and streets trying to keep up with the increasing demand. At the same time new methods to control the traffic were advanced. They include simple and intelligent traffic lights as well as sufficient information and rerouting services.
Essential for the development of such a controlling mechanism is a detailed understanding of the traffic flow. A large number of models have been applied. Most of them are concerned with the one-dimensional vehicle flow on a road without intersections. In this paper, three different approaches will be described: a fluid dynamics model, a model based on the dynamics of individual vehicles and cellular automata (CA). All three predict traffic jams when a critical density is reached but the properties of the congested phases are rather different. The traffic flow in cities requires two-dimensional models. Three different approaches based on CA will be discussed. | <urn:uuid:7b549032-1d1f-45f5-a7ad-c74d88db1c0a> | CC-MAIN-2020-16 | http://militzer.berkeley.edu/traffic_jams/node1.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00475.warc.gz | en | 0.96941 | 233 | 3.046875 | 3 |
School Management System provides a suite of software covering all parts of a schools' administration.from behaviour and achievement,and lesson structures, planning curriculum, educational learning plans,data sharing,managing registration and admissions, and providing teachers, parents and pupils access to all this information over the internet or local network
School Management System has moved away from being viewed as a school administration tool and developed into an integrated Management Information System (MIS) for managing school business processes and whole school improvement. It supports schools in responding to The Children's Plan by enabling them to view a more rounded picture of a child.
1) It supports personal development, promote achievements.
2)Maintains real-time information to support schools in conducting regular and comprehensive self-evaluations.
3)Enables teachers to access information, analyse and input students data through the use of integrated desktops
4)Helps schools manage student registration and truancy, student performance, personalized learning, exam organisation, timetable construction, cover management and a range of other school activities. | <urn:uuid:01a7e00b-17d1-49cf-81c0-49d20f7192f8> | CC-MAIN-2013-48 | http://icreativeinfotech.com/Products.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163042430/warc/CC-MAIN-20131204131722-00028-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.91804 | 211 | 2.796875 | 3 |
Neuropathy & Its detection
Diabetic neuropathy is the most common complication of diabetes mellitus (DM), affecting as many as 50% of patients with type 1 and type 2 DM. Diabetic peripheral neuropathy involves the presence of symptoms or signs of peripheral nerve dysfunction in people with diabetes after other possible causes have been excluded.
Signs and symptoms
In type 1 DM, distal polyneuropathy typically becomes symptomatic after many years of chronic prolonged hyperglycemia, whereas in type 2, it may be apparent after only a few years of known poor glycemic control or even at diagnosis. Symptoms include the following:
- Sensory – Negative or positive, diffuse or focal; usually insidious in onset and showing a stocking-and-glove distribution in the distal extremities
- Motor – Distal, proximal, or more focal weakness, sometimes occurring along with sensory neuropathy (sensorimotor neuropathy)
- Autonomic – Neuropathy that may involve the cardiovascular, gastrointestinal, and genitourinary systems and the sweat glands
Physical examination should include the following assessments:
- Peripheral neuropathy testing – Gross light touch and pinprick sensation; vibratory sense; deep tendon reflexes; strength testing and muscle atrophy; dorsal pedal and posterior tibial pulses; skin assessment; Tinel testing; cranial nerve testing
- Autonomic neuropathy testing – Objective evaluation of cardiovagal, adrenergic, and sudomotor function in a specialized autonomic laboratory; may be preceded by bedside screening to assess supine and upright blood pressure and heart rate, with measurement of sinus arrhythmia ratio
Some of the commonest tests to diagnose are
- Monofilament test: Sensitivity to touch may be tested using a soft nylon fiber called a monofilament. A 10gm Monofilament is used to touch at many points in the foot to rule out the loss of protective touch sensation.
- Digital Biothesiometry: A more advanced, simple and reliable diagnostic quality instrument which is used to measure the loss of vibration perception threshold quantitatively.
- Nerve conduction studies. This test measures how quickly the nerves in your arms and legs conduct electrical signals. It's often used to diagnose carpal tunnel syndrome.
- Electromyography (EMG). Often performed along with nerve conduction studies, electromyography measures the electrical discharges produced in your muscles.
- Quantitative sensory testing. This noninvasive test is used to assess how your nerves respond to changes in temperature both HOT & COLD.
- Autonomic testing. If you have symptoms of autonomic neuropathy, your doctor may request special tests to look at your blood pressure in different positions and assess your ability to sweat. | <urn:uuid:6b85d5f5-70b0-499e-81d1-97e004e17455> | CC-MAIN-2021-43 | http://diabeticfootcareindia.com/neuropathy-detection.php | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583423.96/warc/CC-MAIN-20211016043926-20211016073926-00287.warc.gz | en | 0.891971 | 571 | 2.9375 | 3 |
It wasn’t so long ago that fats were almost a swear-word in nutrition circles, as it was well accepted that a high fat intake could cause heart disease. Thankfully, more and more research is emerging to refute these claims, with growing evidence indicating just how important fat is as part of a healthy diet.
Although the public are becoming savvier when it comes to nutrition, there is still some confusion when it comes to fats.
In this article, we are going to explore the benefits of a group of fats known as the omegas, uncovering what they can do for the health of the body and mind.
What Are the Omega Fats?
The omegas are a family of unsaturated fats that are unique thanks to their chemical structure. Without going into too much detail, the omega number depends on where the first carbon double bond occurs. So omegas 3s have their first double bond at the 3rd carbon, whereas omega 6 fats have their first at the 6th. Although there are various omega fats, we are going to focus on the three most important groups for health – 3, 6 & 9.
Omega 3 Fats
The omegas 3s are widely regarded as the most important of the group, given the weight of research indicating their importance. These essential fats can be separated into two groups – the ones from fish, and the ones from plants. Foods such as walnuts, chia seeds, and flaxseeds provide appreciable amounts of Alpha Linolenic Acid, otherwise known as ALA. On the other hand, marine foods such as salmon, mackerel and fresh tuna are fabulous sources of the EPA and DHA omega fats.
The body does have the ability to create EPA and DHA from ALA, but this process yields such a small amount that scientists believe it is essential for good health that we obtain EPA and DHA from the diet. This is why health enthusiasts are always preaching the importance of oily fish, with most government guidelines recommending at least one portion weekly.
Benefits of Omega 3 Fats
The omegas 3s are arguably best known for their heart health benefits. When a medical expert assesses someone’s cardiovascular health, they will typically look at cholesterol levels and blood pressure as key markers. All of the omega 3 fats have been shown to increase HDL ‘good’ cholesterol and lower LDL ‘bad’ cholesterol and triglycerides.
Similarly, these polyunsaturated fats have also been shown to reduce blood pressure. Around a third of adults in the western world are thought to have high blood pressure, which is to blame for 50% of cardiovascular disease and 75% of all strokes.
The omega 3 fats are also known to possess powerful and natural anti-inflammatory properties. Specific to heart health, this decreased inflammation helps to prevent plaque build-up in the arteries known as atherosclerosis.
Their anti-inflammatory properties are also why the omega 3s fats, especially the ones from fish, are so potent at reducing symptoms of rheumatoid arthritis. In a similar vein, the plant derived ALA has been shown to reduce inflammation in the airways of asthma sufferers.
Have you ever heard of fish referred to as “brain food”? I am sure you have. This phrase has come from the masses of research that has shown that DHA in particular is crucial for healthy brain function. DHA is known to be vital for the structure of neurons, which allows effective neurotransmission in the brain.
On a similar level, a good intake of the omega 3 fats has been shown to help various aspects of mental health, with research showing the benefits to depression. Interestingly, they have been shown to work well alongside medication typically prescribed for depressive symptoms.
Again, DHA specifically is well-known to protect eye health. This is thought that DHA maintains capillary health, limits inflammation and supports the function of the optic nerve.
In short, ensuring you have a good intake of omega 3 is one of the best things you could do for health. For the mentioned benefits, research suggests 250mg of EPA and DHA per day should be aimed for.
Just like the omega 3s, the omega 6s are a family of polyunsaturated fatty acids that are deemed essential to our health, and as the body cannot create them, must be supplied through the diet. There are several different omega 6 fats, with the main one being Linoleic Acid. Arachidonic Acid (AA), Gamma Linolenic Acid (GLA) and Dihomo-Gamma-Linolenic Acid (DGLA) make up the rest.
The omega 6 fats have gained some negative press recently, given that they can promote inflammation. However, it must be noted that inflammation is a natural response to help us stay healthy and fight pathogens. It is chronically high levels of inflammation which are the problem. In moderate amounts the omega 6 fats are health promoting, especially when complemented by a regular intake of the omega 3s.
Benefits of Omega 6 Fats
The omega 6 fats, especially linoleic acid, are crucial for the health and integrity of cell membranes, to let nutrients diffuse in and out of the cells effectively. The omega 6 fats also have a crucial role in the balance of inflammation. Even though AA can form compounds known as prostaglandins that can cause blood clotting, they can also create potent anti-inflammatory agents.
One of the omega 6 fats that has received the most attention is GLA. This nutrient is revered for its anti-inflammatory properties that have been shown in research to combat various conditions including eczema, dermatitis, asthma, rheumatoid arthritis, atherosclerosis, diabetes and obesity. Furthermore, researchers have seen mechanisms that suggest anti-cancerous properties.
GLA is particularly popular with adult women as its mechanisms in the body have been known to restore the balance of hormones that can be disturbed during the menopause. Hot flashes, mood alterations and sleep disturbances are also issues that have been improved with an increased GLA intake.
Although the body can make small amounts of GLA this decreases with age. Also, the benefits as shown in the published research have used higher amounts than the body can create at any life stage. GLA is supplied to infants in high amounts in breast-milk, but for adults, the only food options are blackcurrants and spirulina (a type of algae). Due to the lack of food sources, supplements represent a viable and convenient option.
Oil from the evening primrose is one of the best sources of GLA, so supplements are typically derived from these sources. If you are interested in GLA supplementation, look for products which have used cold-press techniques which extract the oils while preserving their delicate nutrients.
Unlike certain omega 3 and 6 fats, omega 9s are not deemed essential in the diet, because the body can create a sufficient amount to survive. However, that doesn’t mean we can create enough to thrive and therefore a good dietary intake of omega 9 is widely accepted to be important.
If we asked 100 people what they thought constituted a typical Mediterranean diet, most of them would likely mention olive oil. Like oily fish, olive oil is famed for its cardio-protective properties. Although olive oil contains polyphenols such as hydroxytyrosol, which is known to have a variety of benefits, experts are convinced that the omega 9 fat known as oleic acid is a key player in olive oils impact on health. For reference, the fats in olive oil are 75% oleic acid.
Benefits of Omega 9 Fats
Out of the three main omega groups, the omega 9s have been subject to the least amount of research. That being said, there have been numerous positive findings which mirror certain benefits of the other omega fats.
As earlier mentioned, olive oil and therefore oleic acid is a big component of the heart healthy Mediterranean diet. Research has shown that a diet high in oleic acid can lower blood pressure and improve good cholesterol in as little as a month. With the World Health Organization (WHO) stating that high blood pressure and high cholesterol levels are two of the eight risk factors for heart disease, those looking to protect the health of the body’s most important organ should look to regularly include olive oil in their diet.
Aside from the cardiovascular benefits, oleic acid is known to have anti-inflammatory and antioxidant properties. These anti-inflammatory properties have been shown to protect the blood vessels and also decrease the risk of diabetes, which can be partially caused by inflammatory factors that are released from fat-tissue.
Free radicals are unstable molecules that can enter the body, or can be a by-product of metabolism. They can cause damage to various areas of the body, but mainly cell membranes. Oleic acid has been shown to stabilize these free radicals and protect the cells. Researchers believe this could be one of the reasons why this monounsaturated fat has consistently shown have a role in healthy cognitive function, similar to DHA.
Hopefully now it is clear to see why the omega fats are so important to health and should make a significant contribution to a healthy diet. For good health, the research has shown that maintaining a good ratio of the omega fats is important. This is best achieved by limiting vegetable oils and processed foods that are very high in omega 6 and having a diet rich in oily fish, nuts and olive oil. This is one of the reasons why nutritionists and dieticians recommend a Mediterranean-style diet for health and longevity. If the diet is not sufficient, there are a select few nutrients that can be supplemented with to compensate for any shortcomings. | <urn:uuid:fc370970-e826-4e15-bd0d-f5b38fc81e3d> | CC-MAIN-2021-17 | https://www.ehealthspider.com/health-benefits-of-omega-fats/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038056869.3/warc/CC-MAIN-20210410105831-20210410135831-00304.warc.gz | en | 0.960534 | 1,995 | 3.21875 | 3 |
Chinese inflation fears are on the rise due to increasing commodity prices. This has resulted in an increase in producer price inflation, while consumer price inflation remains under control since the economy has not fully picked up speed after the COVID-19 crisis. Since consumer price inflation is not taking off and consumer spending is still underperforming, the central bank is unlikely to remove liquidity from the economy.
Commodity prices have been rising throughout the global economy as depleted inventories after COVID-19 have led to massive inventory restocking as businesses open again. Shipping bottlenecks have pushed up prices of tin and sugar. Low interest rates have resulted in a remodeling boom in the United States, adding to demand for lumber and copper. A drought in South America has constrained the supply of corn as demand for corn-based ethanol is rising. All of these factors have resulted in rising commodity prices, which have increased producer prices in China as well.
Of course, China is concerned about rising producer and commodity prices. The State Council has stated that it will crack down on “malicious speculation” in order to reduce rapidly rising commodity prices. Government bodies are also monitoring the rate at which producer price inflation affects consumer price inflation; at present, it appears that most of the producer price inflation is not translating into consumer price inflation, but rather that the gap between supply and demand is rising.
Does producer price inflation matter for monetary policy? Yes, it matters, but doesn’t play a major role in Chinese monetary policy. I recently carried out an analysis on the effect of the consumer price index (CPI), producer price index (PPI), and GDP on liquidity injections or removals. The technical findings are discussed in a bit more detail here. I found that only the CPI had a strong impact on whether liquidity was injected or removed, and a smaller impact on the actual size of open market operations. This is probably because consumer price inflation eats into the cost of living and can give rise to social instability, so the People’s Bank of China is careful to keep this type of inflation under control.
The annual CPI inflation rate can be seen below. The government’s annual target for the CPI is 3 percent, and inflation has been below this metric for the past eight years without the government having to withdraw a great deal of money from the economy. This means that the economy has been working well, but that demand for products is not excessive.
A little bit of consumer price inflation is considered good, because it means that the economy is functioning at capacity and people are choosing to purchase goods now rather than wait until later. Too much inflation means that people will start hoarding goods because they believe prices will be too high in the future, and wages cannot keep up with the price of products.
In China, the low CPI indicates that the economy is stable and that the price mechanism is functioning well. Therefore, it is highly unlikely that the government will withdraw liquidity from the economy, although it may choose to reduce the rate and/or amount of fund injections.
However, we need not be overly concerned about what China’s central bank will do. China’s government is very good at communicating future policies, and has clearly stated that it is more concerned about improving economic growth than cracking down on mild inflation. This is in part because officials do not foresee long-term inflation and expect producer price inflation to decline soon as supply recovers. It is also because the Chinese economy is continuing to recover after the COVID-19 epidemic ravaged the economy.
As a result, we expect the central bank to continue to add liquidity into the economy in order to bring back demand and stabilize the economy. In addition, we know that the People’s Bank of China will communicate future changes in monetary policy to the public in order to ensure smooth functioning and avoid major economic shocks. If the central bank does eventually decide to tighten up monetary policy, it will be because the economy is roaring once again and demand is soaring. As of now, that moment seems very distant indeed. | <urn:uuid:96459f9c-060b-4d79-b96a-a3ed7ee3536f> | CC-MAIN-2022-49 | https://thediplomat.com/2021/05/how-will-china-respond-to-rising-inflation/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711475.44/warc/CC-MAIN-20221209181231-20221209211231-00549.warc.gz | en | 0.963963 | 825 | 2.53125 | 3 |
The National Archives maintains a fine collection of photographs from the British Army during WWI. The only information included with this photo tells us that British troops captured this German soldier on June 8, 1917, during the fourth summer of WWI. I wondered who he was.
The first thing I notice, of course, is that gaze–what U.S. Marines a war later would call “a thousand yard stare.” He’s exhausted physically and emotionally. That’s a clue that helps me know, if not who he is, where he got captured. There are others.
Another hint is the date of the photo. The previous day, June 7, the British Army pushed up and over Messines Ridge, which formed the southern flank of the Ypres Salient in Belgium. Messines was the first operation in the infamous Battle of Passchendaele, or Third Battle of Ypres. To begin the battle, the British detonated 19 huge mines under the ridge, vaporizing hundreds of Germans entrenched on the modest heights.
This German’s unit was at the northernmost portion of the ridge, just south of Hill 60 and the Caterpillar, two artificial hills formed when a railroad went through in the 1850s. I can tell his location from the “120” on his shoulder strap. It means he was in the 120th Reserve Infantry Regiment of the 204th Infantry Division out of Württemberg. The Caterpillar and Hill 60 mines were two of the largest, with over 50,000 lbs of explosive each. Along with 17 other mines buried deep below the crest of the ridge, Hill 60 and the Caterpillar exploded at 3:10 a.m. on June 7. It still ranks as one of the largest man-made explosions ever.
Were these men in the front line at the time or further back in reserve? I don’t know, other than they were still alive to surrender on the 8th. If they were curled up sleeping in the front line that morning, they were thrown from their slumber by the “terrific tremor” that rocked and rolled no-man’s-land like a ship tossed at sea. To one British officer, the “earth seemed to open up and rise up to the sky…all shot with flame.” Clods of earth, shattered chunks of concrete from the German blockhouses that dotted the lines, barbed wire, men and bits of men, all rained down on the awestruck defenders who just seconds earlier were lost in their dreams. These German soldiers felt and saw it all, and from a distance much closer than 1,000 yards.
Barton, Peter, Peter Doyle and Johan Vandewalle. Beneath Flanders Fields: The Tunnellers’ War 1914-1918. Gloucestershire, UK: Spellmount Limited, 2007.
—Underground Warfare. Pen & Sword Books, 2010.
Turner, Alexander. Messines 1917: The Zenith of Siege Warfare. Oxford: Osprey Publishing, 2010. | <urn:uuid:5a141b58-a4ec-4df9-a78b-afeaa083d592> | CC-MAIN-2021-31 | https://fromthepublicdomain.com/2020/08/17/example-post-3/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154127.53/warc/CC-MAIN-20210731234924-20210801024924-00537.warc.gz | en | 0.965115 | 636 | 3.03125 | 3 |
NASA Developed special types of Polyurethane Foam to protect and insulate the external fuel tank of the space shuttle. The 1″ layer of foam on the outside of the external fuel tank helps keep 395,000 gallons of liquid hydrogen at a very cool -423 degrees Fahrenheit.
NASA Implements Polyurethane in a New Way
Here is a scenario: You have one of the most brilliant minds on the planet and you work for NASA (the National Aeronautics and Space Administration). Your team has been tasked to create the world’s lightest, most durable insulation capable of keeping a rocket fuel tank at -423 degrees Fahrenheit. What does your team come up with? Polyurethane Foam.
NASA created a special blend of polyols capable of self-flashing to a substrate with a remarkable combination of qualities: strength, insulation, durability, and light weight. Although blends of polyurethane existed before NASA, the space administration took the implementation of this technology out of this world (literally).
The space shuttle has jettisoned the external fuel tank which is now falling back to earth in this picture. The polyurethane foam is dark orange due to ultraviolet light radiation from sunlight.
Polyurethane Foam Insulates the Shuttle Fuel Tank
The shuttle fuel tank is the single largest part of the space shuttle. It is also the only part of the space shuttle that cannot be refurbished and reused on multiple missions (in other words, the fuel tank is ‘disposable’). The tank is mostly made of 1/8” thick aluminum. At full capacity, the tank holds 395,000 gallons of liquid hydrogen at 34psi. The tank weighs 58,500lbs empty, and 1,680,000lbs when full (almost 1.7 million pounds!).
The one inch layer of polyurethane foam slightly increases the structural integrity of the fuel tank while providing optimum insulation. Foam is ultra lightweight as well, which keeps the weight of the fuel tank at a minimum. Closed cell foam contains millions of tiny bubbles which trap vapor and seal a surface. This prevents air infiltration and creates a tight seal. Special compounds are used to clean the fuel tank surface before applying the foam. No adhesive is required; the foam self-adheres to the surface of the tank with enough strength to withstand the rocket launch (and even the fall back into the atmosphere; for the most part).
Polyurethane foam is pale yellow when first applied (this is the color of the fuel tank for the indoor pictures). After being outside for a period of time, the color of the tank shifts to orange. As ultraviolet rays from the sun hit the outermost layer of the foam, the material begins to break down on the surface. This does cause a small loss in insulation quality. Early on, NASA coated the the foam white to protect it from UV degradation. However, the paint added 600lbs with little benefit. Subsequent shuttles used bare, uncoated brown foam as a weight saving benefit.
The filled external fuel tank (orange) weighs nearly 1.7 million pounds and is primarily constructed with 1/8″ thick aluminum. Polyurethane foam was developed to insulate the outer layer of the tank, protect it from the external heat of the burning rocket fuel, and keep the contents of the tank super-cooled (-423 degrees Fahrenheit).
Everyday Applications for Polyurethane Foam
Some innovators saw the potential of polyurethane foam for use in everyday life. What use could a lightweight, durable, insulating, waterproof substance have?
Most modern day refrigerators use polyurethane foam as the key component for enhancing insulation. Many large refrigeration warehouses also use SPF foam for the same reason. Sometime later, perhaps during the late 1960’s or early 1970’s contractors began using polyurethane foam for roofing purposes. Some contractor had the bright idea that people might want a roof that would protect their property from leaks and insulate at the same time.
A crowd celebrates the completion of four space shuttle fuel tanks. Note: the one-inch outer layer on each tank is made of polyurethane foam. The external fuel tank is the largest part of the space shuttle, and the only part that cannot be reused.
Unfortunately, some ideal climate conditions must exist for polyurethane foam to be applied. These can be created artificially (as some contractors in wet, cold areas like the state of Maine have done for many years). Anyway, due to mostly climate based reasons, most foam roofing contractors are based in warmer states like California, Arizona, Texas and Florida (although there are definitely plenty of exceptions to this ‘rule’).
NASA Innovations That We Use Everyday
We have NASA to thank for many modern day marvels such as memory foam, scratch resistant glasses, cordless tools, water filters, long distance communications, and even invisible braces. We can also thank NASA for developing polyurethane foam—a superior insulator used in the refrigeration of our food before and after arriving at the supermarket and in our refrigerators. And in some cases, a blessed few can thank NASA for creating perhaps the ultimate roofing material (polyurethane foam), which can both seal and insulate a home or business.
NASA innovations impact our daily lives; from refrigerators and scratch resistant lenses to polyurethane foam roofing products.
More Interesting Facts
The external fuel tank includes the main engines, twin solid rocket boosters, and the orbiter. At 27.6 feet wide and 154 feet tall, the external fuel tank is the biggest element of the space shuttle, and it is the only part that cannot be reused. The aluminum skin of the tank is a mere 1/8″ thick, although it is structured to still withstand over seven million pounds of thrust during lift-off and the ascent.
The external fuel tank has a one inch layer of sprayed polyisocyanurate foam which protects the aluminum skin from ice formation and aerodynamic heat. The sprayed polyisocyanurate foam also keeps the 535,000 gallons of hydrogen and liquid oxygen propellants insulated and cool (-423 degrees Fahrenheit).
External Tank Facts:
Oxidizer: liquid oxygen
Fuel: liquid hydrogen
Propellant mass: about 730,000 kg
Pressurization: 3.0 atm LH2, 1.43 atm LOX
Feed lines: supplies SSMEs through two 43.2 cm diameter outlets
Insulation: 25 mm-thick polyurethane foam
Separation: after about 530 s, 110 km altitude, for destructive reentry
Diameter: 8.40 m (27.6 feet)
Length: 46.88 m (154 feet)
Dry mass: 35,430 kg for earlier version, later reduced to 29,930 kg in later models, 26,330 kg for aluminum-lithium alloy Super Lightweight version
The external tank is covered by three types of spray foam:
1-polyurethane foam: BX-250
2-polyisocyanurate foam: NCFI 24-124; used on the hydrogen and liquid-oxygen tanks
3-another polyisocyanurate foam: NCFI 24-57; used on lower hydrogen tank dome
References:A related video: http://www.youtube.com/watch?v=eEB8Z_Hq1Mk
-At 52 seconds view of tank up close
-At 4 seconds see the giant orange tank. although polyurethane foam is initially yellow, sun exposure has turned the tank orange
-Not painting the tank saved 600lbs of weight
-The original painted tank was white
The external fuel tank is the large orange tank in the middle. One inch of polyurethane foam insulates the tank.
The space shuttle fuel tank is still pale yellow because the polyurethane foam has not been exposed to sunlight yet.
Crews work on the external fuel tank (if you look carefully you can see people in this image). | <urn:uuid:b5f7a8d7-74d6-4924-a893-72261857495d> | CC-MAIN-2017-22 | http://dura-foam.com/resources/foam-roofing/nasa-shuttle-fuel-tank/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607702.58/warc/CC-MAIN-20170523202350-20170523222350-00245.warc.gz | en | 0.879721 | 1,679 | 3.625 | 4 |
Noble Hall facts for kids
Quick facts for kids
Noble Hall in December 2008
|Nearest city||Auburn, Alabama|
|Architectural style||Greek Revival|
|NRHP reference No.||72000163|
|Added to NRHP||March 24, 1972|
Noble Hall, also known as the Frazer-Brown-Pearson Home, is a historic Greek Revival style plantation house in Auburn, Alabama. It was listed on the National Register of Historic Places on March 24, 1972.
Noble Hall was built in 1854 as the main residence of a 2,000 acre (8 km²) cotton plantation. The house was constructed utilizing rock masonry, with eight rooms featuring 12 foot (3.7 m) ceilings and 18 inch (46 cm) thick exterior walls. The front and rear both feature full-width cantilevered balconies and four monumental Doric columns, for a total of eight. Built behind the home were the exterior kitchen, carriage and smokehouse, and overseer's house. As with most of the larger plantation houses in the antebellum South, Noble Hall was built with slave labor, though the owner brought in a contractor from Kentucky to manage the construction.
During the American Civil War, the home housed a number of sick and injured Confederate soldiers. Toward the end of the war, Union troops came to ransack the mansion, but were persuaded to take only the horses and mules when one of the residents showed a Masonic sign.
The home remained in the hands of the original owners, the Frazer family, until cotton prices collapsed in 1922. In 1932, Noble Hall was purchased by J.V. Brown, who restored the home and grounds to their original condition. In 1941, Brown sold the house and surrounding lands to Alabama Polytechnic Institute president Luther Noble Duncan. His daughter inherited the home in 1951, and named it Noble Hall, after her father. Noble Hall was placed on the National Register of Historic Places in 1972, making it the first structure in Lee County to be listed.
Noble Hall Facts for Kids. Kiddle Encyclopedia. | <urn:uuid:eb59ee3b-01f1-4afa-8ef4-ca942dd8ce1f> | CC-MAIN-2023-40 | https://kids.kiddle.co/Noble_Hall | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511075.63/warc/CC-MAIN-20231003092549-20231003122549-00687.warc.gz | en | 0.950967 | 473 | 2.984375 | 3 |
Forsknings- och affärsutvecklareContact Björn
Flexible, soft and stretchable electronics create possibilities to integrate new functionality and form in materials.
With novel materials and production methods we can create sensors and other electronic and iontronic components and systems based on soft and stretchable materials. The usage scenarios range from textiles, apparel, leather, interior design to the human body.
Our efforts in bioelectronics constitute an enabling technology platform to monitor patients remotely, create point-of-care and selftest so that we can spend less time in hospitals and create a more efficient health care system.
We connect technology with the human body's skin and nervous system. On the skin there are many markers such as conductance, humidity and temperature, and in saliva, urine and blood we can gather further data such as cortisol and amylas, to indicate our health status.
Medtech and care will drastically change from a reactive mode to a proactive discipline in the coming years, with help of new technology, no approaches and analytics. The efforts are collectively called P4: Predictive - Preventive - Personalized - Participatory.
In biological signalling systems such as the human body and in plants, charge is carried by ions as opposed to electrons in conventional electronics.
Iontronics is a new field in electronics - the possibility to control ion charges and their movement. Research in conducting organic polymers has led to extensive knowledge and new possibilities now exist to create components and systems in iontronics. In the human brain, for example, the communication signals occur in synapses between two neurons with neurotransmittors.
Undoped, conjugated, organic molecules and polymers possess properties of semiconductors, including the electronic structure and charge transport, which can be readily tuned by chemical design. Moreover, organic semiconductors (OSs) can be n-doped or p-doped to become organic conductors and can exhibit mixed electronic and ionic conductivity. Since the 2000s, increased attention has been paid to interfaces in organic electronics that involve dielectrics, electrolytes, ferroelectrics and even biological organisms.
The Ion Pump is a breakthrough in medical technology, allowing very precise delivery of transmittor substances (ions, molecules) without the injection of any fluid other than the active substance. The delivery is extremely fast, almost at a par with the speed of the human body's synapses.
Neurotransmitters are chemicals that enable neurotransmission. It is a type of chemical messenger which transmits signals across a chemical synapse, such as a neuromuscular junction, from one neuron (nerve cell) to another "target" neuron, muscle cell, or gland cell. Neurotransmitters are released from synaptic vesicles in synapses into the synaptic cleft, where they are received by neurotransmitter receptors on the target cells. Neurotransmitters play a major role in shaping everyday life and functions. Their exact numbers are unknown, but more than 200 chemical messengers have been uniquely identified. (Wikipedia)
In the project Smart Intrabody Network we combine several components and flexible electronics to create a network of sensors inside and on the outside of the human body. With the ion pump we can also actively address a specific area in the body and regulate levels of tranmittor substances to, for example, modulate pain. | <urn:uuid:8e0e9f2c-86cd-42d1-b590-11eb0e21d66f> | CC-MAIN-2021-25 | https://www.ri.se/en/what-we-do/expertises/soft-electronics-and-bioelectronics | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488525399.79/warc/CC-MAIN-20210622220817-20210623010817-00102.warc.gz | en | 0.907578 | 699 | 3.0625 | 3 |
1646 — Gottfried Wilhelm Leibniz was born. Leibniz was a mathematician and philosopher who promoted a theory of reality that was based on irreducible elements of activity called monads. The theory strongly affected early conceptions of perception and the nature of consciousness.
1858 — Charles Darwin read Alfred Russel Wallace's paper on evolution to the Linnaean Society along with portions of Darwin's own long-withheld manuscript of The Origin of Species by Means of Natural Selection. This was the first public announcement of Darwin's theory.
1870 — The Burgholzli, a cantonal psychiatric hospital near Zurich, Switzerland, was founded. Bernard von Gudden was the first director. August Forel, Eugen Bleuler, Karl Abraham, Franz Alexander, Ernest Jones, Carl Jung, and A. A. Brill are among those who spent portions of their careers at the Burgholzli.
1880 — The National Association for the Protection of the Insane and Prevention of Insanity (NAPIPI), an early advocacy group, was founded in Cleveland, Ohio. Harvey B. Wilbur was the first president. The NAPIPI charged that medical superintendents of American mental hospitals were neglecting their patients in favor of consulatation, administrative duties, and providing expert testimony in court.
1882 — The first state mental hospital in Nevada was ready for occupancy. The hospital was built about two miles east of Reno for the sum of $80,000, appropriated by the legislature in 1881. The location later became the city of Sparks and the institution is now named Nevada Mental Health Institute.
1899 — The Illinois legislature responded to the urging of women's groups and passed the first U.S. state law establishing separate court and detention facilities for juveniles. This development provided fertile ground in Illinois for early juvenile psychological clinics, such as William Healy's Juvenile Psychopathic Institute (1909).
1911 — The nation's first mother's aid law took effect in Illinois. These laws were intended to aid widowed mothers and were the precursors of contemporary programs of aid to families with dependent children. There was strong opposition to mother's aid laws, citing the potential for creating dependency, usurping the responsibilities of families, and expense.
1916 — The Government Hospital for the Insane, the oldest U.S. federal mental hospital, was officially renamed St. Elizabeth's Hospital. The new name was derived from the tract of land on which the hospital is located and had been informally used since the Civil War to avoid the social stigma associated with the official name.
1922 — Lawrence J. O'Rourke became the director of Personnel Research for the U.S. Civil Service Commission. O'Rourke is thought to be the first psychologist regularly employed by the civilian government of the United States.
1927 — The Institute for Child Guidance was founded in New York. The institute was part of the mental hygiene movement of the early 1900s. It supported research in the mental health of children, provided training facilities for child guidance professionals, and offered facilities for treating children with behavior disorders.
1941 — Neal Miller and John Dollard wrote the foreword to their book Social Learning and Imitation.
1942 — The Statistical Research Group was formed at Columbia University. The group applied scientific methods to wartime manufacturing and quality control, an early development in modern industrial psychology.
1942 — The Yale Laboratories of Primate Biology were renamed the Yerkes Laboratories of Primate Biology, as Karl Lashley replaced Robert M. Yerkes as director and Harvard University began to share support of the facility with Yale University.
1944 — Congress created the modern U.S. Public Health Service from several prior agencies by enacting the Public Health Service Act, Public Law 78-410. The National Institutes of Health were created by the same act.
1948 — The Iowa Psychological Association was founded.
1954 — In Durham v. U.S., the U.S. Court of Appeals adopted the "product rule," or "Durham rule," for insanity pleas: If the crime could be shown to be the product of mental disease or mental defect, the defendant could not be criminally responsible. Durham was later overturned by the federal court in U.S. v. Brawner (June 23, 1972). The product rule was first articulated by Justice Charles Doe of the New Hampshire Supreme Court in State v. Pike (1869).
1959 — The antidepressant drug Marplan (isocarboxazid; Hoffman-LaRoche) was approved for use by the U.S. Food and Drug Administration. Isocarboxazid is a monamine oxidase inhibitor that operates by interfering with the breakdown of the neurotransmitters norepinephrine and serotonin.
1963 — The state of Idaho enacted its licensure law for the practice of psychology.
1963 — The state of New Mexico enacted its professional psychologist certification law. The first board of examiners included Ralph D. Norman, Harold E. Paine, Robert S. Utter, Manuel N. Brown, and Joe E. Green. New Mexico later enacted a comprehensive licensure procedure on June 16, 1989.
1966 — Daniel Berlyne's article "Curiosity and Exploration" was published in Science.
1970 — The Black Students Psychological Association (BSPA) office opened at the APA headquarters building. Ernestine Thomas was the first BSPA administrator.
1972 — The APA's Journal of Counseling Psychology and Psychological Bulletin became the second and third APA journals to adopt anonymous reviewing practices. The first was the American Psychologist, edited by Charles Gersoni, in January 1972. This practice, now common, was first instigated as a result of claims of gender discrimination.
1976 — The California Supreme Court, ruling in Tarasoff v. Regents of the University of California, decided that when a psychotherapist knows of a client's threat of harm to another person, "he incurs an obligation to use reasonable care to protect the intended victim against such danger." This court decision altered the nature of the therapist-client relationship.
1976 — The state of Vermont adopted its psychologist licensure law.
1979 — Because of "sunset" legislation, Florida and South Dakota allowed their psychologist licensure laws to expire. In Florida, hundreds of new applications for psychologist business licenses were received by county occupational licensing offices, many from people with no credentials. One Florida psychologist licensed himself, his wife, four sons and a hamster. These two states and Alaska were the only states to lose licensure procedures to sunset laws.
1979 — The American Mental Health Counselors Association, a division of the American Personnel and Guidance Association, began to accept candidates for certification by its newly established National Academy of Certified Clinical Mental Health Counselors.
1980 — After a 6-month trial period, the APA received its first regular peer review case from the Civilian Health and Medical Program of the Uniformed Services (CHAMPUS). The APA had contracted with CHAMPUS to evaluate outpatient services.
1987 — The APA central office was restructured to create three "directorates," the Science Directorate, directed by Alan Kraut, the Practice Directorate, directed by Bryant Welch, and the Public Interest Directorate, headed by James Jones as interim director.
1992 — The American Association for Counseling and Development, which had been named the American Personnel and Guidance Association until 1983, changed its name to become the American Counseling Association. Lee J. Richmond was president of the association at the time.
Choose Another Day
How to Cite This Page in APA Style | <urn:uuid:0d7b4f5c-d091-49b5-b627-a34cc6c1eca5> | CC-MAIN-2017-47 | http://www.cwu.edu/~warren/calendar/cal0701.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806509.31/warc/CC-MAIN-20171122065449-20171122085449-00776.warc.gz | en | 0.960523 | 1,571 | 3.421875 | 3 |
The story of Harriet Jacobs begins at North Carolina in 1813 she was born into slavery though she didn’t realize that she was a slave stating “I was born a slave; but I never knew it…”(Jacobs 1809-1829). Jacobs was with her mother until her death in 1819 then she lived with Margaret Horniblow, her mother’s mistress. Horniblow taught Jacobs to read, write, and sew then in 1825 she died and willed Jacobs to her five year old niece. Douglass born February, 1818 in Maryland was born into slavery than taken at a young age, from his mother to live with his maternal grandmother. At age seven he was sent with his master, Aaron Anthony, to Wye House plantation until Anthony’s death. Douglass was given to Lucretia Auld than to Auld’s brother in law, Hugh, in Baltimore. Auld’s wife taught Douglass alphabet. These similarities between the two are where the line is drawn after this the experiences they had with slavery were poles apart.
Douglass was taught the alphabet by his master’s wife he didn’t approve because “it is the wish of most masters within my knowledge to keep their slaves thus ignorant...
... middle of paper ...
...lusion the experiences that Jacobs and Douglass had were no different albeit the forms of their slavery were dissimilar. Abuse is abuse no matter how you slice it the desired effect is to break the spirit of the on being abused. One cannot say that their experience was worse than another because all they have is what they’ve been through. If the eyes are the windows of the soul than no one but the owner of those eyes can be able to perceive what they have been through and the severity of it. The most important thing to come from what they went through was that it turned these two into great minds of the generation. It took people like them to realize that the slavery was a microcosm of an ignorant world and the zeitgeist was changing. Douglass and Jacobs experiences with slavery were similar in the way that it took them knowledge to break free of their hindrances’.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Frederick Douglass, well known for his autobiography Narrative of the Life of Frederick Douglass and his actions he took to fight for slavery to end. Harriet Jacobs who wrote Incidents in the Life of a Slave Girl. Frederick Douglass and Harriet Jacobs both escaped from slavery. Both former slaves also wrote their own narratives and autobiographies and made an impact on ending slavery and provoked understanding that they and other slaves down South were people in dire need to be free physically and legally.... [tags: Slavery in the United States, Slavery]
878 words (2.5 pages)
- Fredrick Douglass and Harriet Jacobs were slaves with mutual and different experiences. Fredrick Douglass and Harriet Jacobs were both were born into slavery, and as children, they didn’t know that there was life outside slavery. Harriet writes; “I was born a slave; but I never knew it till six years of happy childhood had passed away” (Jacobs 921). They both saw suffering and death. They were both traded multiple times to different masters due to unforeseen events and deaths. They both confronted their masters.... [tags: Slavery in the United States, Slavery]
1069 words (3.1 pages)
- Many slave narratives share common themes. They discuss the brutality they experience, they discuss religion, and they discuss family. These narratives not only capture the spirit of the slave, they also capture the spirit of their masters, their family, and the abolitionist of the time. These narratives also display the slave’s desperation to attain freedom. Two of the most significant slave narrative would be A Narrative of the life of Fredrick Douglass, an American Slave and Incidents in the life of a Slave Girl.... [tags: Slavery in the United States, Frederick Douglass]
980 words (2.8 pages)
- Religion is often something people turn to during times of difficulty. During the times of enslavement, Christianity was a double edged sword. The Angela Davis edition of Narrative of the Life of Frederick Douglass and Harriet Jacobs’ Incidents in the Life of a Slave Girl, illustrate how religion, mainly Christianity, was immensely complex and moved from one extreme to the other. When preaching Christianity to the slaves, slaveholders emphasized the Bible’s passages teaching obedience and pacifism.... [tags: Slavery, Slavery in the United States]
1445 words (4.1 pages)
- A slave narrative is to tell a slave's story and what they have been through. Six thousand former slaves from North America told about their lives during the 18th and 19th centuries. About 150 narratives were published as separate books or articles most slaves were born in the last years of the slave regime or during the Civil War. Some Slaves told about their experiences on plantations, in cities, and on small farms. Slave narratives are one of the only ways that people today know about the way slaves lived, what they did each day, and what they went through.... [tags: slave narratives, frederick douglas]
1265 words (3.6 pages)
- Slaves are aware of their positions in society and have the choice to comply with their masters’ demands in order to gain a greater benefit to themselves often in the form of physical protection from abuse. Within the plantation hierarchy, the house slave was considered higher up than field slaves due to their close proximity to the master (Hall 566). The house slave’s position in the plantation microcosm evoked not only favor from the master, but jealousy from the field slaves. The fair-skinned, house slave woman and her master’s control over her mental psyche is a defining factor of her identity in relation to the other slaves on the plantation.... [tags: Slavery, Slavery in the United States]
1996 words (5.7 pages)
- Many of life’s fantasies can remind us of someone’s life from our past or someone we care about. Every so often, a reader may come across a story that feels as if the narrator is telling the story through his or her own life experiences. The nonfictional story, Incidents in the Life of a Slave Girl, is a convincing third person, limited omniscient narration by Harriet Jacobs, and it shows a diverse use of extreme cruelty and hardship that slaves resisted in their condition and by creating their own ways of living, which allow the readers to learn how narrators can use their emotion and feeling to explain their life experiences.... [tags: Slavery, Slavery in the United States, Abuse]
1093 words (3.1 pages)
- Many of life’s fantasies can resemble someone from our past or someone we care about. Every so often, a reader may come across a story that feels as if the narrator is telling the story through his or her own life experiences. The nonfictional story “Incidents in the Life of a Slave Girl” is a convincing third person limited omniscient narration by Harriet Jacobs, and it shows a diverse use of extreme cruelty and hardship slaves resisted in their condition and created their own ways of living, which allow the readers to learn how narrators can use their emotions and feeling to explain their life experiences.... [tags: Slavery, Slavery in the United States, Abuse]
1037 words (3 pages)
- During the 1800s, slaves received treatment comparable to that of livestock. They were mere possessions of white men stripped of almost every last bit of humanity in them. African-Americans were constricted to this state of mind by their owners vicious treatment, but also the practice of keeping them uneducated. Keeping the slaves illiterate hindered them from understanding the world around them. Slave owners knew this. The slaves who were able to read and write always rebelled more against their masters.... [tags: American History Slavery]
1721 words (4.9 pages)
- The book The Classic Slave Narratives is a collection of narratives that includes the historical enslavement experiences in the lives of the former slaves Harriet Jacobs, Frederick Douglass, and Olaudah Equiano. They all find ways to advocate for themselves to protect them from some of the horrors of slavery, such as sexual abuse, verbal abuse, imprisonment, beatings, torturing, killings and the nonexistence of civil rights as Americans or rights as human beings. Also, their keen wit and intelligence leads them to their freedom from slavery, and their fight for freedom and justice for all oppressed people.... [tags: Harriet Jacobs, Frederick Douglass]
1028 words (2.9 pages) | <urn:uuid:52d95a98-d1ad-4b4c-b99b-41613ac2f342> | CC-MAIN-2020-16 | https://www.123helpme.com/slavery-harriet-jacobs-and-frederick-douglas-preview.asp?id=238916 | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496901.28/warc/CC-MAIN-20200330085157-20200330115157-00440.warc.gz | en | 0.976524 | 1,839 | 3.421875 | 3 |
This project deals with a controller, made by Intel© Company, called the Intel® Galileo Board.
This controller was developed by Intel for education needs and for learning and experimenting with programming, as well as combining programming with hardware.
The controller is a part of a family of similar controllers, called Arduino controller, which create a cheap and comfortable environment of developing and running projects which combine software & hardware components.
This work was mainly based on two goals. The first goal is to examine the possibility of integrating the controller in the daily work of the laboratory workers, and even replace the existing instruments currently used in the laboratory. For that purpose, a characterization of the controller’s abilities was performed. In addition, the performance of the controller was examined, especially it’s processing rates and response time. The second goal is to build a user-friendly app to allow the laboratory workers to use the controller without any necessary professional knowledge in programming.
The program allows:
- Downloading and running source code files written in C++.
- Communication between the computer and the controller, in the form of sending & receiving strings of data.
- Showing the measurements from the controller’s analog inputs on a graphical plot.
- Showing the output of the code running on the controller, on several sub-plots (one sub-plot for each output variable).
- Viewing and modifying the code before downloading it to the controller.
In addition to the program above, another secondary program was built, which helps create the infrastructure which is used by the main program. The Infrastructure includes creating a preferences file, turning on the Ethernet connection interface on the controller and downloading a compiled code to the controller for the monitoring state of the controller. A user guide was also written (and presented in the report) which explains what is needed to be set on the computer in order for the program to work properly. The guide also explains how to use the built programs.
The requirements of the laboratory equipment are to be able to measure changes in the scales of milliseconds and lower (micro-seconds). Although with some adjustment the Galileo is able to send pulses in these time scales (as we saw in the case where the Galileo can output pulses with a frequency of 450KHz, 670KHz and 2.87 MHz), however the sampling performance borders on the limit of a millisecond, which might make it miss the very small changes in the system it measures. Moreover, when the output is set to high frequency, it becomes distorted, due to the capacitors in the output. Thus, without any external equipment the Galileo isn’t fit for small time scale systems or sensitive systems. However, it can still be used for simulations and systems with a higher time scale (even several milliseconds).
Another disadvantage is the fact that the Galileo’s working range is between ground and 5 volts (or ground and 3.3 volts), and it won’t measure negative voltage. This problem can be solved with an external shield which shifts the voltage range to a positive range, so that the Galileo will be able to measure it.
To conclude, the Galileo is not fit for replacing the laboratory equipment, however it can be used for simulations and for measuring analog signals with a certain frequency limit. For that purpose and more, a Graphical User Interface is built.
Written by Gil Aizenshtadt | <urn:uuid:f9a1e698-cc2c-41ee-9092-04db4b8e807c> | CC-MAIN-2018-13 | https://hananel.hazan.org.il/programs-and-projects/projects-technion/performance-characterization-test-for-intel-galileo-board/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257651007.67/warc/CC-MAIN-20180324210433-20180324230433-00722.warc.gz | en | 0.946474 | 690 | 3.15625 | 3 |
They say that there is nothing new under the sun (especially not in teaching?) but the notion of Assessment for Learning (as opposed to assessment of learning)is a big buzzword in mainstream education in the UK and there are plenty of ideas which we can apply to ESOL and ELT.
The idea of AfL originated from a booklet by Dylan Wiliam and Paul Black, Inside the Black Box: Raising Standards through Classroom Assessment. In this, and subsequent books and papers, they focus on four main ways of helping students to become more independent learners and to individualise learning:
- Questioning techniques
- Feedback methods
- Sharing criteria
- Self and peer assessment
I suspect that questioning is something which the average ESOL/ELT teacher already knows more about than Wiliam and Black assume. In my experience, a lot of teaching in our field(s) takes place through asking the right questions, whereas they seem to think that most teachers are asking closed questions to check knowledge. Having said that, I think it is still an area where further development may be useful.
Some approaches/activities you could try:
- Opening up ideas by asking other students to comment on what has been said, rather than commenting on it yourself.
- Bouncing questions around, so you nominate one student to answer another’s question.
- Get students to put up their hands to ask a question, rather than to answer one.
- Ask students to write down questions at the end of a lesson about what still confuses them. These could go into a box for you to look at when planning the next lesson, or they could be redistributed for small groups to answer.
- Ask why rather than just accepting an answer. This is particularly important, I think, when going through the answers to, say, a reading comprehension or a gapfill.
And my personal long time favourite: increasing wait time after you have asked a question. In Assessment for Learning: Putting it into practice, Black et al report that teachers who increased wait time found that:
– Answers were longer
– Failure to respond decreased
– Responses were more confident
– Students challenged and/or improved the answers of other students
– More alternative explanations were offered.
This refers to both giving students feedback on their work and on getting feedback as to how well each student is doing.
In terms of the first category, one of the big points made by AfL is that writing comments on students’ work is much more effective than grades. In fact, their research showed that a group of students given only comments improved noticeably, whereas the other two groups given either grades only or both comments and grades, did not. Of course, the comments have to be helpful and specific about exactly what the student has to do to improve.
In terms of getting feedback on how each student is doing, there are two basic themes. One, which will be familiar I am sure, is getting students to work in pairs and groups so that the teacher can monitor and assess. The other may be less familiar and involves a few nice little techniques:
- Using miniwhiteboards for students to write answers on and then hold up. If everyone is facing the front, peers will not be able to see who has written what, but the teacher can.
- Giving each student laminated A,B and C cards, so that they can hold up the answers to multiple choice questions in the same way.
- Using signals to indicate to the teacher how well they feel they have understood. These could be ‘traffic light’ red, amber or green cards (green for I am sure I have got this to red I haven’t a clue what you’re on about
In the ELT/ESOL context, the idea of sharing the criteria you use may not be that new. As a reminder though, some of the ideas in AfL may be useful:
- Using models of what you want students to achieve. This obviously applies to writing, but could also apply to speaking, with recordings of native speakers or more proficient students doing the same task. These models can be analysed by the students, using the criteria.
- Letting students decide on what they think the criteria for assessment should be, or negotiating it with them.
Self and peer assessment
Again, this is something which I think is quite common in ESOL/ELT classrooms, but it is given a lot of emphasis in AfL. Possible ideas:
- Two stars and a wish (may be better for Yls). Students peer assess using two stars to say two good things about the work and a wish to identify something which could be improved (further)
- Students identify what they think is their best piece of work, and say why.
- Using learning journals to set targets and self evaluate.
If you wish to find out more about AfL, either of the publications mentioned above would be a good place to start. I’d be very interested to hear any comments on any of these approaches, and whether this kind of approach is popular in your context (and of course why or why not 😉 ) | <urn:uuid:53a46d47-b591-4768-957d-e4db7e825610> | CC-MAIN-2019-18 | https://elt-resourceful.com/2012/02/19/differentiation-by-teaching-method-part-2-assessment-for-learning/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527865.32/warc/CC-MAIN-20190419161226-20190419183226-00282.warc.gz | en | 0.962664 | 1,059 | 3.53125 | 4 |
After graduating from Cambridge University, at the age of 20, in 1779, William Wilberforce chose to follow a career in politics and stood as Independent candidate, in an election for Hull's Member of Parliament. He won by an overwhelming majority and was elected to represent the citizens of Hull, at the age of just 21.
The young Wilberforce was a natural politician. Following the deaths of his father, Robert, and his uncle, William, he had inherited enough money to financially support his political career. He was also well liked among Hull's merchant families, who hoped that he would represent their business interests in parliament.
On taking up his seat in the House of Commons, Wilberforce met up with his university friend, William Pitt the Younger, who had also chosen a political career. Pitt and Wilberforce, spent much time studying the more experienced Members of Parliament, from the Commons gallery, and listening to heated political debates of the day.
Following his conversion to Methodism in 1785, Wilberforce considered leaving politics. Yet, Pitt and John Newton convinced him to persevere and use his political work as a way of serving God. Wilberforce saw the campaign to abolish the Transatlantic Slave Trade as a way of following his religious and humanitarian beliefs and moral conscience. | <urn:uuid:31f0d307-c8ff-466b-a672-e9589e24dc40> | CC-MAIN-2020-05 | https://mylearning.org/stories/william-wilberforce/108 | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593994.14/warc/CC-MAIN-20200118221909-20200119005909-00331.warc.gz | en | 0.990325 | 262 | 3.953125 | 4 |
WINSTON-SALEM, N.C. - Better management of persistent nerve-injury pain through a better understanding of how pain medicines operate is the goal of a new $6.1 million research center at Wake Forest University Baptist Medical Center. The Center for the Study of Pharmacologic Plasticity in the Presence of Pain is funded by a grant from the National Institute for Neurologic Diseases and Stroke of the National Institutes of Health.
For the next five years the center will investigate changes in the nervous system, particularly the spinal cord, in the presence of certain medicines and how those changes affect the sensation of pain. The research will take place both in the laboratory and in the clinic.
The research will focus on pain that persists from nerve injury in tissues that have since healed. Nerve-injury, or neuropathic, pain can be a burning or shooting feeling, often accompanied by painful feelings from otherwise normal events, such as light touch on the skin. Scientists believe that nerve activity in the spinal cord has a major influence over the perception of pain from damaged nerve endings.
James C. Eisenach, M.D., professor of anesthesiology and the principal investigator in the new pain center, used the example of sunburn. "Most people will recover from nerve injuries, just like their skin sensation returns to normal after a sunburn goes away. But a lot of people develop chronic pain, and when that happens there are changes in the spinal cord, with the chemicals and receptors. So even without the sunburn actually there, light touch can give them the sensation of pain."
As part of the center, Eisenach will lead a research project to study the pain-relieving mechanism of a blood-pressure medicine called clonidine. Although clonidine does not work for well for acute, trauma-induced pain, it is effective for pain following nerve injury - and at a much lower doses. Eisenach said he will test the theory that clonidine "stimulates a different circuit in the central nervous system that appears to be more important after nerve injury than before."
Another laboratory project will focus on changes in the nervous system that produce increased tolerance to narcotics such as morphine commonly used to treat pain. The research will study whether adding other medicines can stop or reverse those changes.
A third project will attempt to determine why certain pain-relieving drugs are much more potent in women than in men. Those drugs act on cells in the spinal cord called cholinergic cells, the same kinds of cells affected by nicotine. One of these types of drugs, called metanicotine, is patented by Eisenach and Wake Forest University School of Medicine and is made in Winston-Salem by Targacept Inc.
Animals, like humans, will abuse narcotics such as heroin, but rats that have experienced nerve injury that results in sensitivity to light touch have a much lower potential to abuse heroin that they are self-administering for their pain. A fourth laboratory project will study that phenomenon and try to determine what parts of the brain are being affected by heroin in the presence or absence of pain.
"The whole purpose of the grant is to better understand how to treat people," Eisenach said. Information gained from the laboratory projects will be applied to human patients in clinical trials through the Piedmont Pain Control Center, directed by Richard L. Rauck, M.D., clinical associate professor of anesthesiology.
Rauck said the center will concentrate on patients with a variety of pain, including lingering pain from back surgeries, industrial injuries that damaged a nerve, diabetic neuropathies, shingles pain, and possibly some residual cancer-related pain in people who are now disease-free.
He said the research will generate new information about - and hopefully more effective pain-relieving uses for - existing, FDA-approved medicines. "We''ll be looking at combinations of different drugs - how they work and how they work together in different types of these nerve pain states."
Eisenach and Rauck are also organizing a consortium of more than 100 doctors who treat chronic pain patients in a three-state area. The research center will also sponsor a symposium on pain each year for the Medical Center and the community, featuring nationally or internationally recognized experts in the basic science of pain research and the treatment of chronic pain conditions. The first symposium is planned for June 2002.
In addition to Eisenach and Rauck, principal investigators in the research center are Steven R. Childers, Ph.D., professor of physiology and pharmacology, Joseph R. Tobin, M.D., associate professor of anesthesiology and of pediatrics, and Thomas J. Martin, Ph.D., assistant professor of physiology and pharmacology.
Contact: Mark Wright, (336) 716-3382; Bob Conn (336) 716-4977 | <urn:uuid:03352f57-099a-48ea-bde4-54ebacb74145> | CC-MAIN-2023-14 | https://newsroom.wakehealth.edu/news-releases/2002/02/multimilliondollar-pain-research-center-funded-at-wfubmc | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949958.54/warc/CC-MAIN-20230401094611-20230401124611-00768.warc.gz | en | 0.942101 | 995 | 2.84375 | 3 |
Although the environmental issues discussed
in this section are presented separately, they all interact within the
complex backdrop of global change. Our ability to understand and unravel
the integrated nature of environmental challenges is improving, enabling
us to consider various solutions to the different problems of a complicated
world and choose the best course to follow – one that causes the
least damage, and leads to the most benefits.
It is also important to tease apart interacting local, regional, and
global drivers of environmental change and to recognize that they vary
substantially from place to place. This is vital to developing the appropriate
mix of responses for any situation. Stratospheric ozone depletion, climate
change, and biodiversity, for example, require global solutions. In
other cases, including fisheries and various challenges related to nitrogen,
regional and/or national solutions also have a major role to play.
The findings reviewed here underscore the urgent need to translate
improved scientific understanding into improved policymaking and action.
As science targets opportunities for better progress, decision makers
can more effectively use this information to address environmental challenges
and thereby improve conditions for all life on earth. | <urn:uuid:b599635b-1aee-413c-b871-b3df364a34e2> | CC-MAIN-2016-18 | http://www.unep.org/yearbook/2003/101.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860122533.7/warc/CC-MAIN-20160428161522-00217-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.905991 | 237 | 3.3125 | 3 |
Turbines are important machines in our nation’s fleet of fossil-fueled power plants, extracting energy from domestic resources and converting it into the electricity we depend on. Turbines can also be key players in conserving resources because they can provide clean energy by using less fuel and generating fewer emissions. In a coal-fueled power plant, fuel is combusted in a large furnace to release heat energy. That energy is then used to heat a boiler that turns water into steam. The steam drives the plant’s turbine, which converts the heat energy into kinetic energy. Inside the turbine, steam flows past the turbine blades causing them to turn, like a windmill or pinwheel, except that turbines are much more sophisticated with hundreds of tightly packed blades. Steam exits the turbine and is cooled and condensed through a heat exchanger so the water can be pumped back for reuse. An axle connects the turbine to a generator that spins around with the turbine. The generator uses the kinetic energy from the turbine to make electricity, which travels out of the plant and eventually powers our businesses, homes, appliances, and more. | <urn:uuid:54c478c6-cdf6-47e5-b652-6049c370cbca> | CC-MAIN-2019-04 | https://netl.doe.gov/news-room-news-stories?tid=83 | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658901.41/warc/CC-MAIN-20190117082302-20190117104302-00371.warc.gz | en | 0.943814 | 227 | 3.921875 | 4 |
Treatment of diabetes, like most areas of medicine, has changed considerably over the years as a result of technological advances. From the discovery, purification, and mass production of insulin to the development of less painful ways to deliver it, the lives of people with diabetes have been improved — and sometimes greatly extended — by both diabetes-focused research and broader improvements in medical care.
Although it can be difficult to predict the impact of an emerging technology, there are several exciting developments on the horizon that may soon significantly change how people with diabetes receive medical care or manage the condition on their own. At least one relatively new innovation, the continuous glucose monitor, is already changing the daily routine for some.
This article examines several innovations that are likely to change — or are already changing — the way medical care is delivered and the way medical information is communicated. Not all assessments of medical technology are completely upbeat, however. Especially when it comes to electronic health records, many experts are either frustrated at the pace of progress or skeptical of how the technology will be used.
Electronic health records
Dr. Richard Hellman, who is past-president of the American Association of Clinical Endocrinologists and has an endocrinology practice in North Kansas City, Missouri, laments that although someone can get money from an ATM or use a credit card anywhere in the world, medical information often cannot be easily accessed when it is needed. “The tragedy is that information doesn’t move around to the benefit of the patient,” he says. “There is much too much information that can’t be transmitted.”
The problem is not a technological one. Electronic health records already exist in many forms. Medical practices and hospitals often keep records of patient visits on a computer system; these records may include lab test results, imaging studies, weight and blood pressure measurements, comments by doctors and nurses, and anything else that can be captured digitally. However, these records often cannot be easily shared with other practices or hospitals because of the closed nature of the computerized record systems. While it may be possible to send information by e-mail or to print it out and then send it by fax or regular mail, an enormous amount of time could be saved by an integrated system in which everyone’s records are immediately accessible to health-care providers who need to see them. Such a system would be particularly useful in emergency situations, and if implemented correctly, the records would not be subject to accidental destruction in cases of disaster such as floods and fires.
But while the technology exists to develop an integrated system, security concerns and competition have so far stymied its realization. “It needs to be secure so someone can’t hack into [electronic files], take the information, and sell it,” says Dr. Hellman. To overcome the other roadblock, competition, the tech industry would need to “agree on common protocols: some agreement that there are certain standards that have to be used.” There would also need to be agreement on financing the new system: who would pay for the software, equipment, training, and data entry as paper records are computerized and computerized records are converted to the new system.
But Dr. Hellman asserts that these should not be actual barriers, citing the financial industry, which has been sharing information for years without significant security or compatibility issues. Just as a bank card from Indiana can withdraw cash from an ATM in Europe within seconds, with an integrated record system, a hospital emergency room anywhere in the world would be able to look up someone’s health problems or drug allergies as soon as he is admitted. And, for that matter, a natural disaster such as Hurricane Katrina would not be able to destroy the medical records of thousands, which is what happened in 2005. | <urn:uuid:438d739f-386f-48a3-80bb-f1a7a89c3987> | CC-MAIN-2014-15 | http://www.diabetesselfmanagement.com/articles/tools-and-technology/advances_in_medical_technology/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539776.45/warc/CC-MAIN-20140416005219-00158-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.964672 | 775 | 3.203125 | 3 |
In 2015, scientists from the University of Saarland presented their development iSkin - small stickers on the skin that respond to touch and send a signal to a smartphone. Today this technology has matured to the creation of full-fledged touch interfaces, which are called Multi-Touch Skin. It will allow the transmission of commands through an arbitrary area of human skin.
To activate Multi-Touch Skin, a sticker must be printed, which consists of an array of thin electrodes placed between the PET layers. The wires are connected to the power source and the controller, which sends the signal for processing to the Raspberry Pi Zero microcomputer. It takes about a minute to print a sticker, it can be of any shape and is glued on the wrists, shoulder, behind the ear or on the chest, at the request of the user.
When you touch the sticker, the finger contacts the electrode, which changes the electrical capacitance at a specific point - this is the signal for processing, by analogy with the smartphone screen. The complexity and variety of control gestures is limited only by the area of the sticker and the algorithms of the system. For example, a swipe behind the ear adjusts the volume of the music, and near the eyes adjusts the brightness of the lighting system.
To date, the developers of Multi-Touch Skin have created four optimal label formats. On the neck, on the side and on the back, to control the headset and similar wearable electronics. A bracelet on the wrist, for binding to an external device - a smart vacuum cleaner, a robot, etc. The sticker on the back of the hand will receive communication with messengers in the smartphone for receiving and transmitting calls. And a sticker on the forearm to quickly unlock or disconnect your smartphone. | <urn:uuid:d8535d4b-5df2-41df-b56b-5b3bb3c99e4f> | CC-MAIN-2021-25 | https://home-of-facts.com/publication/8194 | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487621450.29/warc/CC-MAIN-20210615145601-20210615175601-00068.warc.gz | en | 0.924264 | 353 | 3.203125 | 3 |
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
A four year old, Dutch Warmblood gelding was presented with a two day history of blepharospasm, diffuse corneal oedema, iris prolapse and panuveitis of the left eye secondary to trauma. There was no menace response and no consensual pupillary light reflex. Cases such as this have a poor prognosis for vision and immediate enucleation is a viable treatment option. In this case medical treatment was started with a view to clearing infection so that iridectomy could be performed; this would result in a more aesthetically pleasing outcome than enucleation. There was a significant response to therapy over two weeks and 6 weeks after presenting some vision had been regained. Traumatic lacerations with or without iris prolapse have the best prognosis when they are presented in the acute stages immediately after injury has occurred, when successful surgical repair is possible.
Iris prolapse seems to occur in similar proportions as a result of a traumatic injury or due to a perforating ulcer. Traumatic injuries occur most commonly in younger horses, which may be due to their more fractious nature compared to older horses (Chmielewski and others 1997). Iris prolapse particularly occurs with sharply penetrating injuries - blunt trauma generally results in much more severe intraocular damage as there is a rapid increase in intraocular pressure, often leading to an explosive rupture from the inside outward with expulsion of the intraocular contents (Lavach and others 1984, Capaldo and Komáromy 2006).
Millichamp (1992) explains that with sharply penetrating injuries, at the moment the cornea is perforated the iris is carried into the wound by escaping aqueous humor. Tissue damage causes breakdown of the blood-aqueous barrier and massive influx of protein into the anterior chamber. Fibrin formation produces a temporary seal around the plug of iris, and the trapped iridal tissue has a dark brown colour.
Ocular survival in cases of iris prolapse due to traumatic injury following combined medical and surgical therapy is reported to be 80%, but retention of vision is only 33% (Chmielewski and others 1997).
A four year old Dutch Warmblood gelding was presented with a two day history of blepharospasm and mucopurulent ocular discharge in the left eye following a penetrating injury to the cornea.
On clinical examination the menace response was completely absent and there was no consensual response to the pupillary light reflex (PLR) in the right eye. The horse was sedated with detomidine (0.01mg/kg intravenously [Domosedan 10mg/ml solution, Janssen Animal Health]) and butorphanol (0.01mg/kg intravenously [Torbugesic 1% solution, Pfizer Animal Health]) and auriculopalpebral and supraorbital nerve blocks of the left eye were performed using mepivicaine (2ml at each site [Intra-Epicaine 2% solution, Dechra Veterinary Products]). Upon examination there was conjunctival oedema, diffuse corneal oedema and a mass with a darkly pigmented rim protruding from the cornea at the lateral canthus. Marked anterior chamber hypopyon was evident obscuring the iris and pupil; ophthalmic examination of the posterior segment of the eye was not possible due to these abnormalities. Ultrasonographic examination revealed the anterior chamber of the left eye to be significantly smaller than that of the right eye. The corneal mass was identified as a prolapse of iris tissue. There was a significant amount of debris in the posterior chamber with a mixed echogenic appearance consistent with fibrin formation. There was no evidence of retinal detachment. A diagnosis of panuveitis and iris prolapse secondary to trauma was made.
A sub-palpebral lavage system was placed to allow administration of chloramphenicol (0.2mls every two hours [Chloramphenicol 0.5%, Martindale Pharmaceuticals]) and 0.2mls of autologous serum every two hours. A course of enrofloxacin (8mg/kg orally once a day [Baytril 10% oral solution, Bayer PLC]) was begun. Flunixin meglumine (1.1mg/kg intravenously [Meflosyl 5% solution, Fort Dodge Animal Health]) was given as the horse had been sedated and could not be fed, but this was changed to flunixin meglumine (1.1mg/kg orally twice a day [Finadyne Granules, Intervet/Schering-Plough Animal Health]) the next day.
Ophthalmic and ultrasonographic examination two days later revealed there was no change in the condition of the eye. The decision was made to change the chloramphenicol for ciprofloxacin (0.2mls every 2 hours [Ciloxan 0.3%, Alcon]).
Over the following 8 days, the level of ocular comfort improved and the amount of hypopyon reduced. The amount of fibrin in the posterior chamber also reduced, but a large clot remained attached to the posterior capsule of the lens. Neovascularisation of the iris prolapse also began, and there was the development of some photophobic response. The horse was discharged 13 days after admittance with instructions to continue the topical ciprofloxacin therapy.
6 weeks after initial presentation, the horse was presented for re-examination. On clinical examination there was a significantly reduced menace response in the left eye but there was a consensual PLR in the right eye, showing that the retina was able to respond to light to some degree. The left eye was phthitic and there was a relative enophthalmus, but no associated blepharospasm, ptosis or apparent discomfort was present. Mild corneal oedema was identified but the iris prolapse had reduced in size. The owner was advised that no further treatment was required but that an improvement in vision was unlikely.
Medical treatment or surgery?
When presented with an acute case of a perforating injury with iris prolapse, immediate surgery under general anaesthetic gives the best possible prognosis (Dallap Schaer 2007, Severin 1998). If the wound is less than one hour in duration and the iris is not severely prolapsed or damaged, it can be replaced into the anterior chamber. If the iris is severely prolapsed or damaged, it can be amputated. There are numerous methods of laceration closure, including corneal suturing, adhesives, conjunctival flaps and corneal transplants. The method chosen depends on the characteristics of the injury and skill of the surgeon (Severin 1998). Referral to a veterinary ophthalmologist is advised.
Due to the severe intraocular infection in this case and as it was already relatively chronic in nature, immediate surgical repair was not a sensible option. The two treatment options considered were therefore immediate enucleation or medical treatment with a view to clearing the infection enough to allow iridectomy. Immediate enucleation was a reasonable option as extensive ocular infection as a result of corneal penetration and disruption of intraocular contents are associated with a poor outcome for vision (Chmielewski and others 1997), and both were present in this case. Other negative prognostic indicators include lacerations greater than 15mm, lacerations with scleral involvement and extensive hyphaema (>50%) (Chmielewski and others 1997). When the lens and posterior chamber are not visible due to severe opacification, a negative dazzle response and consensual PLR can also be used as poor prognostic indictors for a return to vision. (Capaldo and Komáromy 2006). The decision was made to opt for medical treatment in this case though because the laceration was less than 15mm, and there was no evidence of retinal detachment on ultrasonographic examination, therefore it was a possibility that the quantities of debris in the anterior and posterior chamber were preventing a response to the menace test and PLR, i.e. there was a possibility that vision could be restored.
Antimicrobial delivery and choice
The normal blood-aqueous barrier prevents therapeutic levels of antimicrobial drugs occurring when they are given systemically (Severin 1998) and therefore, antimicrobials are usually given topically. However, when there are inflammatory processes occurring, such as with corneal perforation and iris prolapse, there is sufficient disruption to the blood-aqueous barrier that therapeutic levels can occur when antimicrobials are given systemically (Severin 1998). This is useful as topical administration is highly effective for anterior segment disease but may not establish therapeutic drug levels in posterior segment tissue; posterior segment disease is best treated with parenteral medications (Miller 1992). For horses with iris prolapse that are going straight to surgery, it is best to give systemic antimicrobials to avoid any potential further damage to the eye by topical solutions. Topical ointments should always be avoided as there is a risk that the petroleum base may cause uveitis (Dallap Schaer 2007, Severin 1998). Both systemic and topical antimicrobials were given in this case due to the severity of the intraocular infection and the frequency of application that was needed.
The normal equine eye has a predominantly Gram-positive bacterial population, with Staphylococcus species and Corynebacterium species being the most commonly isolated (Whitley and others 1983). However, this is significantly different in ocular disease, with Gram-negative Pseudomonas species and Escherichia coli being the most common isolates. The commensal bacteria can also act in an opportunistic manner, and Staphylococcus species and Streptococcus species are the most commonly isolated Gram-positive bacteria in ocular disease (Chmielewski and others 1997). Due to this variable population, antimicrobial choice would ideally be based on culture and sensitivity results. When these are not available, a broad-spectrum antibiotic should be chosen. Chloramphenicol is effective against most isolates of the equine eye and has high lipophilicty which allows ocular penetration (Moore and others 1995). However, it is not effective against Pseudomonas species (Moore and others 1995). Ciprofloxacin or ofloxacin have broad-spectrum activity including against Pseudomonas species and also have a high lipophilicity. When systemic antimicrobial therapy is required, enrofloxacin is useful due to the broad-spectrum activity and availability as an oral solution for ease of administration. Routine use of fluoroquinolones should be discouraged due to the potential to promote microbial resistance though, and thus chloramphenicol is a better first-line choice.
The solution tonicity is important - solutions that are outside physiologic ranges will cause local irritation and reflex tearing. Reflex tearing dilutes the solution and increases clearance from the ocular surface. Most animals tolerate tonicity ranging from 0.7% to 2% (Miller 1992).
Post-surgery, topical antimicrobial therapy should be continued until sutures are removed which typically occurs at 3 - 4 weeks (Severin 1998). Systemic antimicrobials should be given for 5 days or as long as deemed necessary.
Stromal collagenolysis can occur due to production of proteolytic enzymes by corneal epithelial cells, leukocytes and microbial organisms. There are a number of protease inhibitors that can be used to counteract this; two of the most common are 0.2% EDTA or autologous serum. Autologous serum is readily available, biologically non-toxic and has the widest spectrum of enzyme-inhibition (Capaldo and Komáromy 2006).
Presence of ocular discomfort requires analgesia to be given. Corticosteroids should not be used when there is a corneal defect as they have been shown to impair host defenses by reducing the migration of neutrophils and macrophages, delay corneal wound healing by decreasing keratocyte proliferation and collagen deposition, potentiate corneal collagenase activity and decrease epithelial healing rates (Giuliano 2004). Non-steroidal anti-inflammatory drugs (NSAIDs) have a more selective modality although there are still side-effects especially when given systemically (review the literature for details of pharmacodynamics). Flunixin meglumine is one of the most common NSAIDs to be prescribed traditionally and is anecdotally reported to be very good for ocular pain (Severin 1998). There also scientific evidence for its use; it has been shown to significantly limit miosis and reduce production of prostaglandin, and also to stabilise the blood-aqueous barrier (Giuliano 2004). If surgical repair is performed, the use of NSAIDs should be discontinued once the eye is comfortable as they slow vascularisation of the cornea, and complicated corneal lacerations heal by corneal vascularisation and scar formation (Millichamp 1992).
Atropine was not given in this case due to the risk of iris retraction from the corneal wound and deflation of the globe. However, there are reports that state this risk is very minimal (Capaldo and Komáromy 2006). Atropine causes mydriasis which therefore aids in the treatment of anterior uveitis and associated pain.
Due to the chronicity and extent of infection, this case of panuveitis and iris prolapse secondary to trauma was not amenable to immediate repair under general anaesthetic, which would have given the best prognosis. However, the medical treatment chosen resulted in significant improvement with some vision regained. If cases are to be managed medically, consider antibiosis and analgesia - topical chloramphenicol, systemic flunixin meglumine and topical atropine are suitable first-line treatments. | <urn:uuid:47f81845-7155-44df-be72-eaff7e00366f> | CC-MAIN-2017-09 | https://www.ukessays.com/essays/biology/panuveitis-iris-prolapse-secondary-to-trauma-in-horse-biology-essay.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170404.1/warc/CC-MAIN-20170219104610-00051-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.942085 | 2,952 | 2.546875 | 3 |
Larimer County has experienced two major natural disasters in the last two years, fire and flood. Natural disasters cause disturbance. From an ecosystem point of view, disturbance is anything that disrupts the existing plant and animal community. Ecosystems have an amazing ability to recover from disturbance. Sometimes an ecosystem will return to its original state. Often, disturbance provides opportunities for new species to move in.
Larimer County Weed District
Fires and floods bring additional human-caused disturbances: fire fighting equipment and crews accessing remote areas; emergency road construction; helicopter water drops from diverse locations (possibly containing weed seed); road reconstruction including transporting gravel and rock (also likely to contain weed seed); the movement of construction equipment and crews; even rehabilitation and restoration work can cause additional disturbance. Simply the act of disturbing the soil can give seeds that were dormant in the soil for years an opportunity to germinate. If controlled before they flower and produce seed, the seed bank of these undesirable plants can be significantly depleted.
Disturbance is an open invitation for weeds and bare ground is the welcome mat. From the point of view of soil stabilization and revegetation, any plant that puts roots in the ground is a good thing. But, when invasive noxious weeds visit, they tend to move in, take over and become obnoxious guests that refuse to leave. Their presence in overwhelming numbers can prevent native vegetation from recovering and reestablishing.
The best approach to slowing disturbance-induced weed infestations is to identify any new plants on your property. If it is new to your property, and it is not a native plant, it should probably be your highest priority to control. The Larimer County Weed District provides advice to landowners on managing noxious weeds. A comprehensive guide to Larimer County’s Noxious Weeds can be found on the Larimer County Weed District’s website, http://www.larimer.org/weeds/. The Weed District provides free site visits, plant identification, advice on controlling noxious weeds, and land and pasture management guidelines. Contact the Larimer County Weed District at 970-498-5768 | <urn:uuid:ba325f98-0531-4fd7-bec8-3df50f80ffdb> | CC-MAIN-2023-06 | https://northfortynews.com/category/uncategorized/after-fire-and-flood-what-next-weeds/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500904.44/warc/CC-MAIN-20230208191211-20230208221211-00215.warc.gz | en | 0.921129 | 439 | 3.21875 | 3 |
Micro Life Zone
Asked by campbellbrown to Arti, Chris, Dustin, James, Steven on 18 May 2012.
Keywords: boil, litre, steam
Since steam is a gas, and gases will essentially expand to the size of the container, then 1 litre of water turned into gas water, will expand to whatever volume it is in.
In the open environment, the steam just expands off in all directions, however, as it cools, the water then condenses out of the air.
So if you have a hot shower with the bathroom door and everything shut, the room will fill with steam. When the door opens it will flow out. But you will also notice that there will be water droplets on the roof and the walls will feel wet, this is because the steam is condensing back into water.
Dustin has explained it nicely – the steam will expand to fill as much space as it has available if it is in a confined space.
Just for fun, I tried to calculate how much volume the steam produced from 1L of water could theoretically occupy at 100 degrees C and at atmospheric pressure if it behaves like an ideal gas. (If you haven’t learnt about gas laws yet then this won’t make much sense to you at the moment, but you can ask your teacher if you’re interested.) According to my calculations, the answer is about 1812 L! That is a lot of steam!
Is that the sort of answer you were after?
Let me know if you’d like me to explain how I calculated this. 🙂
I think I’ll leave Arti to handle this with her equations and such.
By BRIDGE8 under license from Mangorolla CIC 2017
Short link to this page http://bit.ly/JbYUei | <urn:uuid:c2d04a09-45e0-44fa-a6be-6303b7c39eb0> | CC-MAIN-2017-09 | http://helium.imascientist.org.au/2012/05/18/when-you-boil-one-litre-of-water-how-much-steam-is-produced-in-litres-if-the-steam-is-going-to-the-open-environment/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170839.31/warc/CC-MAIN-20170219104610-00043-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.947709 | 381 | 3.25 | 3 |
A low cost and widely available drug could reduce deaths in traumatic brain injury patients by as much as 20% depending on the severity of injury, according to a major study carried out in collaboration with the University of Birmingham.
The research, published in The Lancet, showed that tranexamic acid (TXA), a drug that prevents bleeding into the brain by inhibiting blood clot breakdown, has the potential to save hundreds of thousands of lives.
The global randomised trial included more than 12,000 head injury patients who were given either intravenous tranexamic acid or a placebo.
It found that administration of TXA within three hours of injury reduced the number of deaths. This effect was greatest in patients with mild and moderate traumatic brain injury (20% reduction in deaths), while no clear benefit was seen in the most severely injured patients.
The trial found no evidence of adverse effects and there was no increase in disability in survivors when the drug was used. The trial was jointly funded by the Department for International Development (DFID), the Medical Research Council (MRC), the National Institute for Health Research (NIHR), (through the Department of Health and Social Care), and Wellcome. The early phase of the trial was funded was funded by The JP Moulton Charitable Foundation.
Traumatic brain injury (TBI) is a leading cause of death and disability worldwide with an estimated 69 million new cases each year. The CRASH-3 (Clinical Randomisation of an Antifbrinolytic in Significant Head Injury) trial is one of the largest clinical trials ever conducted into head injury. Patients were recruited from 175 hospitals across 29 countries.
Bleeding in or around the brain due to tearing of blood vessels is a common complication of TBI and can lead to brain compression and death. Although patients with very severe head injuries are unlikely to benefit from tranexamic acid treatment because they often have extensive brain bleeding prior to hospital admission and treatment, the study found a substantial benefit in patients with less severe injuries who comprise the majority (over 90%) of TBI cases.
Co-investigator for trial Professor Tony Belli, of the University of Birmingham’s Institute of Inflammation and Ageing, said: “This is a landmark study. After decades of research and many unsuccessful attempts, this is the first ever clinical trial to show that a drug can reduce mortality after traumatic brain injury.
“Not only do we think this could save hundreds of thousands of lives worldwide, but it will no doubt renew the enthusiasm for drug discovery research for this devastating condition.”
Ian Roberts, Professor of Clinical Trials at the London School of Hygiene & Tropical Medicine, who co-led the study, added: “We already know that rapid administration of tranexamic acid can save lives in patients with life threatening bleeding in the chest or abdomen such as we often see in victims of traffic crashes, shootings or stabbings.
“This hugely exciting new result shows that early treatment with TXA also cuts deaths from head injury. It’s an important breakthrough and the first neuroprotective drug for patients with head injury.
“Traumatic brain injury can happen to anyone at any time, whether it’s through an incident like a car crash or simply falling down the stairs.
“We believe that if our findings are widely implemented they will boost the chances of people surviving head injuries in both high income and low income countries around the world.”
As TXA prevents bleeds from getting worse, but cannot undo damage already done, early treatment is critical. The trial data showed a 10% reduction in treatment effectiveness for every 20-minute delay, suggesting that patients should be treated with TXA as soon as possible after head injury.
Dr Ben Bloom, Consultant in Emergency Medicine at Barts Health NHS Trust, the UK’s largest recruiter into the trial with more than 500 patients enrolled, said: “Treating traumatic brain injury is extremely challenging with very few treatment options available for patients. Thanks to these latest results, which are applicable to patients with head injuries of any cause and of all demographics, clinicians now have a potentially powerful new treatment available to them.”
The most common causes of TBI worldwide are road traffic crashes, which predominantly affect young adults, or falls, which are a major problem in older adults, and the incidence is increasing. In both cases, patients can experience permanent disability or death. Representatives from the charity that supports roach crash victims in the UK, Roadpeace, were involved in the design of the trial.
Amy Aeron-Thomas, Justice and Advocacy Manager from Roadpeace and co-author on the paper said: “It’s always better to prevent road crashes in the first place, but these results show that if a crash can’t be prevented, death can still be avoided.
“Given the time to treatment implications, it’s more important than ever that the post-crash response is as efficient as possible.”
CRASH-3 follows successful previous research involving 20,000 trauma patients, which showed that TXA reduced deaths due to bleeding outside of the skull by almost a third if given within three hours. Based on those trial results, tranexamic acid was included in guidelines for the pre-hospital care of trauma patients. However, patients with isolated traumatic brain injury were specifically excluded.
The authors noted some limitations of the trial, including wide confidence intervals despite the large trial size, and the fact that more patients with un-survivable head injuries were included in the trial than anticipated, which diluted the treatment effect. | <urn:uuid:0cb4d24e-aea1-4bff-8c3c-c886041b6e9c> | CC-MAIN-2023-40 | https://www.birmingham.ac.uk/news-archive/2019/global-trial-is-first-clear-evidence-that-a-widely-available-drug-reduces-head-injury-deaths | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510528.86/warc/CC-MAIN-20230929190403-20230929220403-00101.warc.gz | en | 0.962848 | 1,159 | 2.671875 | 3 |
Although most writers on Nathaniel Hawthorne touch on the importance of Salem, Massachusetts, to his life and career, no detailed study has been published on the powerful heritage bequeathed to him by his ancestors and present to him during his years in that town. In The Salem World of Nathaniel Hawthorne, Margaret B. Moore thoroughly investigates Hawthorne's family, his education before college (about which almost nothing has been known), and Salem's religious and political influences on him. She details what Salem had to offer Hawthorne in the way of entertainment and stimulation, discusses his friends and acquaintances, and examines the significant role of women in his life—particularly Mary Crowninshield Silsbee and Sophia Peabody.
Nathaniel Hawthorne felt a strong attachment to Salem. No matter what he wrote about the town, it was the locale for many of his stories, sketches, a novel, and a fragmentary novel. Salem history haunted him, and Salem people fascinated him. And Salem seems to have a perennial fascination for readers, not just for Hawthorne scholars. New information from primary sources, including letters (many unpublished), diaries, and contemporary newspapers, adds much not previously known about Salem in the early nineteenth century. Moore has found new sources in various manuscript collections, such as the privately owned Felt-White Collection and the Richards and Ashburner Papers in the National Library in Scotland. She also uses extensively the many manuscript collections at the Peabody Essex Museum.
By tracing the effect of Salem on Hawthorne's writing, The Salem World of Nathaniel Hawthorne makes clear that Hawthorne not only was aware of his "own dear native place" but also drew upon it consciously and subconsciously in his work. This book contributes to a better understanding of Hawthorne as man and writer and of Salem's vital part in his life and work. | <urn:uuid:c4722619-325e-4360-b689-bff6abb5c6b1> | CC-MAIN-2018-39 | https://www.bibliovault.org/BV.book.epl?ISBN=9780826213310 | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159165.63/warc/CC-MAIN-20180923075529-20180923095929-00283.warc.gz | en | 0.98345 | 375 | 3.15625 | 3 |
Time and Frequency from A to Z: Re to Ru
The ability of a device or measurement to produce, repeatedly and without adjustments, the same value or result, given the same input conditions and operating in the same environment.
The degree to which a measurement can be determined. For example, if a time interval counter has a resolution of 10 ns, it could produce a reading of 3340 ns or 3350 ns but not a reading of 3345 ns. This is because 10 ns is the smallest significant difference the instrument can measure. Any finer measurement would require more resolution. The specification for an instrument usually lists the resolution of a single measurement, sometimes called the single shot resolution. It is usually possible to obtain more resolution by averaging.
The natural frequency of an oscillator. The resonance frequency is usually either divided or multiplied to produce the output frequency of the oscillator. The table below shows the resonance frequency for several types of oscillators. A high resonance frequency leads to a higher Q, and generally improves the stability.
|Quartz Wristwatch||32 768|
|Hydrogen Maser1||1 420 405 751.768|
|Rubidium2||6 834 682 610.904|
|Cesium3||9 192 631 770|
1See Hellwig, Vessot, Levine, Zitzewitz, Allan, and Glaze, IEEE T. Instrum. Meas., IM-19(4), November 1970.
2The number for rubidium resonance (rounded to the millihertz) was obtained through measuremements comparing a cesium fountain to a rubidium fountain, and has been recommended by the BIPM as a secondary representation of the SI second. See Mandache, Vian, Rosenbusch, Marion, Laurent, Santarelli, Bize, Clairon, Luiten, Tobar, and Salomon, Proc. 2005 IEEE Intl. Freq. Cont. Symp., August 2005. Note that commercial rubidium standards can operate at resonance frequencies that differ from this value by a few hertz.
3The number for cesium resonance was first published in 1958 (Markowitz, Essen, Hall, and Parry, Phys. Rev. Lett., 1(3), 1958) and has been used since 1967 by the International System (SI) to define the second, the base unit of time interval.
The range of possible frequencies where a resonator can resonate. Narrowing the resonance width of an oscillator leads to a higher Q, and generally improves the stability. For example, if a resonator has a line width of 1 Hz, it will resonate only if it is within 1 Hz of the correct frequency.
The lowest priced members of the atomic oscillator family, rubidium oscillators operate near 6.83 GHz, the resonance frequency of the rubidium atom (87Rb), and use the rubidium frequency to control the frequency of a quartz oscillator. The optical beam from the rubidium lamp pumps the 87Rb buffer gas atoms into a particular energy state. Microwaves from the frequency synthesizer induce transitions to a different energy state. This increase the absorption of the optical beam by the 87Rb buffer gas. A photo cell detector measures how much of the beam is absorbed and its output is used to tune a quartz oscillator to a frequency that maximizes the amount of light absorption. The quartz oscillator is then locked to the resonance frequency of rubidium, and standard frequencies are derived from the quartz oscillator and provided as outputs as shown in the figure.
Rubidium oscillators continue to become smaller and less expensive, and offer perhaps the best price to performance ratio of any oscillator. Their long-term stability is much better than that of a quartz oscillator and they are also smaller, more reliable, and less expensive than cesium oscillators.
The Q of a rubidium oscillator is about 107. Undesirable shifts in the resonance frequency are due mainly to collisions of the rubidium atoms with other gas molecules and aging effects in the lamp system. These shifts limit the long-term stability. Stability is typically 1 x 10-11, and about 1 x 10-12 at one day. The frequency offset of a rubidium oscillator ranges from 5 x 10-10 to 5 x 10-12 after a warm-up period of a few minutes or hours, so they meet the accuracy requirements of most applications without adjustment. | <urn:uuid:84afdc52-88ad-4461-bfc8-9745f6de7d7e> | CC-MAIN-2013-48 | http://tf.nist.gov/general/enc-re.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164928424/warc/CC-MAIN-20131204134848-00008-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.886284 | 918 | 3.65625 | 4 |
It’s the phrase that plagued your childhood: take your vitamins. After countless times of hearing it, did you ever find out why you should take your vitamins? Read about astaxanthin benefits, and you’ll never doubt your mother’s sayings again.
Astaxanthin benefits make it an important nutrient to include in your diet. What is astaxanthin, and how does it work?
Astaxanthin is classified as a xanthophyll, a cartenoid, which is produced by plants and some animals for its protective qualities. Cartenoids are antioxidants that help to protect cells from oxidation. If oxidation occurs because of free radicals in the air, then cells are damaged and weak.
As an antioxidant, astaxanthin benefits you by reducing oxidation, strengthening the cells. Read on to see what these stronger cells protect you from.
When cells undergo oxidation, they are weak and unstable. Weak cells can lead to a number of problems, including:
- Dry, age-prone skin
- Cataract development
- Heart disease
Astaxanthin benefits you by reducing the risk for these problems by strengthening the body from within. Read on for tips to implement astaxanthin into your diet every day.
For astaxanthin benefits, it is important to add this antioxidant into your diet. How? Eat some foods that include astaxanthin, such as fish, shrimp, fruits, and vegetables.
If seafood isn’t your favorite, don’t worry: there are other ways to get astaxanthin benefits. Try taking a supplement, like Perricone’s Total Skin and Body. Supplement packets include astaxanthin along with an array of other beneficial vitamins, so your body will be fully loaded to combat disease and age.
Include this antioxidant powerhouse in your idea for total astaxanthin benefits. While you’re at it, thank your mom for her helpful tips. | <urn:uuid:6824bd61-18fa-4ad5-95b7-ea18f87bcb51> | CC-MAIN-2014-35 | http://blog.perriconemd.com/the-antioxidant-powerhouse-discover-astaxanthin-benefits/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917663.12/warc/CC-MAIN-20140901014517-00022-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.936002 | 410 | 2.640625 | 3 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.