text
stringlengths 198
621k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 15
1.73k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
160k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Fans of fishing know that each type of fish has its own behavior and habits, which vary depending on the season and weather conditions. But not only rain, changes in temperature and pressure affect the nature of the bite. Wind can also have a huge impact on fish activity. Therefore, in order not to go fishing for nothing, it is important to know whether the fish bite at the wind outside the window.
- The effect of wind on nibble
- 2Wind factors
- 2.1 Direction
- 2.2 Strength
- 2.3 Fouling
- 2.4 Duration of exposure
- 3 How does the wind affect the individual parts of the reservoir
- 4 Favorable and unfavorable wind for biting
- 5 Seasonal Wind Effect
The effect of wind on nibble
When planning to return from fishing with a good catch, it is very important to consider the presence of the wind, as well as its strength and many other factors. Of course, the wind does not have a direct impact on the fish that swim in the water depths. However, the movement of air masses and the nature of these phenomena, undoubtedly affect such factors:
- Air temperature and upper water layers;
- Insect activity;
- Atmospheric pressure at the water’s edge;
- The presence of waves on the pond, as well as the strength and direction of their movement.
Cold northerly winds can quickly cool even thoroughly warmed air masses and water. In addition, in such a wind, insects that fish like to eat also show minimal activity. As a result, the fish also tries not to waste energy in search of food, which should not be. Warm air currents awaken insects, and therefore, the fish is also activated, knowing that food should appear soon.
It should be borne in mind that the wind is indirectly able to influence the location of the fish in the pond. With a strong and bright summer sun, it mostly hides in the shady waters. And since the wind often brings with it clouds, the weather becomes overcast. At this time, the fish rises to warm up. In addition, cloudy weather brought by the wind can be a sign of a quick rain, in which fish love to hunt.
In order to understand at which wind the fish do not bite, it is important to take into account such factors that characterize this natural phenomenon:
- Direction of air flow;
- The force with which the wind blows;
- Fluctuations in speed, as well as the direction of the movement of the wind, or its gustiness.
A very important factor that can drastically change the nature of the bite is the duration of exposure to wind in the region.
The sides of the wind direction play a huge role in assessing the prospect of fishing. This indicator clearly defines the weather conditions of the coming days. In the direction of the wind, you can easily calculate what will change soon due to the approaching air masses. The wind direction determines whether the coming days will be dry or humid, and whether warm or cold weather is assumed.
For most of the representatives of the fish fauna, the appearance of the northern wind is accompanied by severe stress, since almost all residents of the river and lake waters are heat-loving. The northern direction of the wind always carries a rapid coolness that quickly cools the reservoir and leads to a significant decrease in the activity of mosquitoes, flies and other insects living near the reservoirs. For the same reason, the wind from the north contributes to the fact that fish descend closer to the bottom or are looking for brightly illuminated parts of the water.
Fish are also badly caught in the cold wind because the odors of the lure, baits and flavors in them are weakly distributed in the water cooled by cold air flows. In most cases, a flock of fish swims past the bait and simply ignores it.
With westerly and easterly winds, fish bite well in almost any weather. In its warmth, this wind is average between hot and dry southern and gusting cold northern. West and east winds maintain slightly cool water, in which a strong appetite awakens in fish.
With such a wind, the inhabitants of the waters intuitively presume an imminent cardinal change in the weather in the direction of extreme cold or heat, and are actively engaged in the search for food. Such a wind often contributes to a slight decrease in pressure in the upper water layers. And this factor greatly enhances the fish appetite.
The positive moment of the east and west wind for fishermen is also the fact that they contribute to the rapid spread of odors from bait and bait.
Southern winds always warm the water, but they act on fish differently, depending on the ambient temperature.
Depending on the force with which the wind blows, the behavior of the fish in the pond and its interest in lures largely changes. Small and medium strength wind always creates ripples on the surface of the water. Because of it, the fish does not clearly see what is above the water, and therefore behaves curiously and does not frighten even the things that are noticeable and unusual for a pond. Of course, the fisherman should not relax with such a wind and use clearly visible fishing lines, hooks and make a lot of noise. However, even such danger signals fish can ignore and will actively take the bait.
However, when a strong wind begins, the speed of which exceeds the figure of 10 m / s, anticipating a possible storm or storm, the fish cease to bite and goes to the depth where it is safe.
Very weak, up to 2 m / s, as well as the missing wind have a beneficial effect on the intensity of biting in the evening, as well as in the early morning.
The gusty wind, which is prone to frequent changes of direction and often brings heavy rain, is one of the worst conditions for fishing. The bait scattered in the water quickly spreads throughout the reservoir, and therefore does not allow to lure aquatic inhabitants to one point suitable for the fisherman.
A strong gusty wind contributes to the constant change in the movement of water masses, as well as sharp, abrupt changes in atmospheric pressure in the upper layers of water. Fish does not like such sudden weather changes and practically does not bite.
The appearance of a strong rain, often with thunder and lightning, also belongs to the negative influences of the gusting wind. And since the fish are afraid of strong and loud sounds, in most cases they will not search for prey, but will sink to the bottom before the onset of favorable weather conditions.
For the fisherman, the presence of a gusting wind is also a dangerous factor. Strong and often changing air currents can easily break the gear. And modern carbon fiber rods have the ability to attract lightning.
Duration of exposure
The total lack of movement of water masses or minor currents always mean for fish that there is no feed in the water. At the same time, the appearance of wind always provokes the movement of the water surface. In this case, the upper layers of the reservoir are saturated with oxygen, which in itself attracts fish. And a long and practically non-destructive wind, not only provides a large amount of air, but also contributes to some renewal of the composition of the water.
For fish, the long-term presence of an active current triggered by the wind means that the air flow brings with it a variety of delicacies in the form of insects, as well as seeds and fruits of field crops. That is why the prolonged presence of wind at the reservoir favorably affects the catch.
It is best to fish begins to peck when the same wind does not hold longer than 3 days in a row.
How does the wind affect the individual parts of the reservoir
When wind arises, it contributes to the movement of water masses from the windward part of the coast to the leeward. When this occurs, the following phenomena:
- Intensive saturation of water masses with oxygen;
- Blowing from the windward shore of insects and seeds of edible field plants;
- Washing down the leeward coast, where the places where most microorganisms edible for fish are located are laid bare;
- The occurrence of reverse flow at depth.
In most cases, when the wind is all tasty for the inhabitants of the water food particles are demolished on the edge. Here there is also a high content of air in the water. That is why the fish, with the appearance of a favorable weak and medium in intensity wind, moves to the edge.
Favorable and unfavorable wind for biting
In any weather, a good bite provides the wind, which reaches a speed of 4 m / s. That he is able to create pleasant for the inhabitants of the water depths of the ripples on the surface of the reservoir. Such a phenomenon for fish means the presence in the water of feed brought from the fields by air masses and collected in one place due to a uniformly flowing current. At the same time, in different seasons, southern, eastern and western winds may become most favorable.
Wind blowing from the north provokes a calm in fish at any time of the year. The average activity when it appears can be observed only with a strong heat in the summer, and only in the first hours after sudden changes in weather conditions.
Seasonal Wind Effect
A significant role in the quality and quantity of bites is played by the season, during which the wind is observed during fishing. So in the winter months mostly cold north wind blows. Most of the fish hides, and only burbot retains a stable average activity. However, even in winter, biting can become good if the western and southern winds suddenly come, especially if they are accompanied by light snowfall.
Spring is one of the most successful seasons for fishing. After the winter period, the fish is hungry and very actively pecks on almost any bait. The wind in these months has virtually no effect on the effectiveness of fishing. However, the warm southern breeze quickly warms the upper layer of water and a large number of fish rises to the surface to warm themselves. When planning to fish further in the coming months at the chosen place, it is important not to scare away the fishes, which are clearly visible in the clear water after the ice has melted. To do this, it is recommended to fish using thin woods.
The best fish bite is observed in the first month of the summer season. At this time, warm southerly winds are actively beginning to blow, and the fish massively rises into the upper layers of water to search for food. However, the positive influence of the southern wind on the quality and quantity of the catch ends with the onset of heat. During this period, the inhabitants of the waters descend deeper, fleeing from the intense heat, and those who are full of food become rather lazy.
Of course, the fish is caught and at high temperatures. However, the special activity of fish in mid-summer can be observed with the wind that comes from the east and west. And if at this time it also rains a little, which will cool the water slightly and saturate its upper layers with oxygen, representatives of the water depths will rather quickly become interested in bait.
In the autumn, in anticipation of long cold weather, the fish takes the bait well. But she is particularly active when the wind blows from the west and east. | <urn:uuid:70577fcd-c5b8-4eb6-b9e7-cc0beebc9ffa> | CC-MAIN-2021-04 | https://survinat.com/what-wind-does-a-fish-have-in-summer-and-why/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703549416.62/warc/CC-MAIN-20210124141945-20210124171945-00473.warc.gz | en | 0.955993 | 2,327 | 3.453125 | 3 |
Date: November 5, 2010
Creator: Archick, Kristin & Mix, Derek E.
Description: The European Parliament (EP) is one of the three key institutions of the European Union (EU), and the only EU institution whose members are directly elected. This report discusses the construction and history of the EP, its role in functions of the EU as well as internationally, various international supports and criticisms of the EP, and the EP's ties with the U.S. Congress.
Contributing Partner: UNT Libraries Government Documents Department | <urn:uuid:6553f1e7-3432-4ae1-b424-fc9d21f31223> | CC-MAIN-2016-40 | http://digital.library.unt.edu/explore/collections/CRSR/browse/?fq=str_location_country%3ALithuania&fq=untl_decade%3A2010-2019&fq=str_year%3A2010&q=%22international+affairs%22&t=dc_subject | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660158.61/warc/CC-MAIN-20160924173740-00144-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.90398 | 111 | 2.828125 | 3 |
BY JANIE & TANIA – LITTLE BIRDIE BOOKS
Communicating with little people can be extremely challenging. Your child might be reluctant to use words, may be tricky to understand or may be just fine-tuning their ability to ignore instructions. Whatever the situation, here are 5 truths for how to engage and communicate more effectively with the little people in your life:
Talking Truth 1: Don’t ask questions
For young children at the first word stage, overuse of questions such as “Who’s that?” does not provide particularly useful or functional ‘first words or phrases’. Try interpreting more than questioning. For example, “I heard a bird” instead of “What’s that?” provides a much better language model.
It seems like a counterproductive point, however, to a child, being asked questions actually implies ‘testing’ whereas making comments implies interest. By balancing our questions with comments, we create more opportunities for children to take a turn in the conversation. “Studies have shown that the more children are involved in back-and-forth interactions with their caregivers, the more activity they have in the part of the brain responsible for language production and processing.” [The power of turn taking: how back and forth interactions help children learn language]
Talking Truth 2: Don’t be attentive
If we constantly pre-empt our child’s needs and wants, we do not create opportunities for them to communicate. ‘Sabotage’ is a language strategy that involves making a mistake on purpose to give a child a chance to take a turn in the conversation. For example, give an empty cup for a drink or say only the first part of a phrase then wait for your child to finish it “Ready, set… (go!)” For children at the first word stage, songs provide a perfect platform for allowing your child to take a turn “Humpty Dumpty sat on the wall, Humpty Dumpty had a great….WAIT… (fall!)”
The biggest challenge for parents is not only waiting but also realising that even a look, a wiggle, a smile or a sound is your child taking a turn. Communication is verbal and non-verbal! Strangely, being an attentive parent can actually be counterproductive to a child’s language learning.
Talking Truth 3: Avoid being interesting
Children are ego-centric. It seems like common sense but it’s important to let the child LEAD the interaction. It’s all about something called ‘cognitive resourcing’. If a child has to use all their ‘cognitive resourcing’ or ‘brain power’ to maintain attention on what the adult is discusssing, then less brain capacity is available for the topic of conversation. So, in a nutshell, if they are enjoying banging on a drum, don’t bring over a truck! The best way to bring a conversation to a grinding halt is to talk about something a child is NOT interested in.
Talking Truth 4: Try not to ‘supervise’
Well okay, we take that back! Please supervise your children. But better yet, rather than standing by supervising and being a spectator, join in and be a player! The number one way to get a young child to open up and “have a chat” is to get down to their level and PLAY! Joining in and playing starts the flow of conversation as it provides an engaging and shared context to build on. Plus, if you listen to your toddler during playtime, they may be more inclined to listen to you when it’s your turn to be boss. One can only hope …
Talking Truth 5: Never make ‘NO’ an option
“Do you want to put on your shoes?” No. “Would you like some broccoli?” No. Sound familiar?
A closed question is one that can be answered with a one word response, usually a yes or no, whereas an open-ended questions (e.g., wh questions) can have lots of different responses that usually require a longer response. For younger children, offering a choice allows a child to use more words than just yes or no. For example, “Would you like big swings or little swings?” or “Would you like a cuddle or a high five?” Choice questions provide a safe bridge between closed and open questioning by allowing the child to give a one or two word response matching their expressive language abilities.
WARNING: Make sure you are happy with both options in the choice before you offer it!
We hope this blog post sheds some light on some simple truths of language learning. It is not so much what you say but how you say it that makes all the difference.
Connect on socials
Little Birdie Books
If you are keen to support your child’s communication development as they move from ‘learning to talk’ to ‘talking to learn’, we have created themed, interactive book boxes for families with children aged 3-6 years. Check out our shop page at https://littlebirdiebooks.com.au or follow us on Instagram https://www.instagram.com/littlebirdiebooks/ or Facebook https://www.facebook.com/littlebirdiebooks/.
Little Birdie Books also collaborates with Childcares, Kindergartens and Pre-schools, so feel free to email us at [email protected] | <urn:uuid:ce7248fb-47a6-450b-9bfa-dd26a57a67f6> | CC-MAIN-2019-35 | https://growingkind.com.au/5-truths-about-learning-to-talk/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318952.90/warc/CC-MAIN-20190823172507-20190823194507-00518.warc.gz | en | 0.934054 | 1,166 | 2.78125 | 3 |
The Lycian Coast of Turkey
The Lycian coast of Turkey refers aptly to the area in the Mediterranean region that was formerly governed by the Lycian empire from approximately the 15th century BC to 546BC. Also known as the South-Aegean coast or the turquoise coast, it lies in the province of Mugla. Although it has not been verified, historians strongly suspect their demise came about, when their cities were invaded by Harpogos, a median general that is credited with having put Cyrus the Great on the throne of Persia. His story is elegantly told in a book by Atulya K Bingham, who recounts her friend’s story of having hiked the Lycian way in present times. Other than that, tell-tale signs of their existence can be seen all over the stretch of coastline which is truly spectacular.
Rugged cliffs of pine forests plunge into the turquoise sea, between them are small bays of sand and shingle accessible only by boat. In ancient times the Lycians, mentioned in Homer’s Iliad, settled here and the ruins of their cities and majestic rock tombs can easily be seen. The arrival of the coastal road, though, has led to the opening up of once-isolated fishing villages, while resorts are still on a small scale, they are becoming more developed. However, the cobbled narrow backstreets, the memorable call to prayer from the mosques and the friendly locals combine to make for a relaxing holiday and an adventure.
The World Famous Lycian Trek
Recognized by the Sunday Times as one of the best 10 walks in the world, the 516 km official trek stems from the region of Antalya to Fethiye. Along the way, walkers visit some of the most breath-taking landscape scenery as well as hundreds of historical sites built by the Lycian Empire. Xanthos, that was the centre of the Lycian empire has unearthed some of the most exquisite artefacts including the tomb of Pavaya, that is now in the British history museum. Four km away is Letoon, the most important religious sanctuary of its time.
Fethiye is the primary city of the region; surrounded by verdant mountains, Lycian ruins, and turquoise sea; it’s the gateway to Ölüdeniz, the Blue Lagoon. Near to Fethiye sits Tlos, with its large Lycian rock tombs overlooking the Xanthos Valley and Patara that was a key trading centre, thanks to its seaside port location is also allocated for more excavation works. Kayakoy is an abandoned village with hundreds of partially ruined houses south of Fethiye it is often referred to as “The ghost town of Kayakoy”. Saklikent (Hidden City) Gorge is the second-largest in Europe its 20 km-long and is the longest and deepest gorge in Turkey, about a 40 minutes’ drive from Fethiye. It is a spectacular place, with 4km of sculpted walls, the gorge is best visited after April when most of the snow from the Taurus Mountains has melted and passed through the gorge on its way to the Xanthos River. Summer is the best time to visit as the canyon as its shaded and you can take a leisurely walk.
The ancient city of Myra, further up the coastline in an area known as Demre, it has a magnificent theatre and the rock tombs but is also famous for the church of Saint Nicholas, otherwise known as Santa Claus, who was the Bishop of the region.
Resorts of the Lycian coast
Towns and villages sitting on the Lycian coast, have four advantages. Not only do they belong to the Lycian way but also the Turkish Riviera that is a popular sailing centre for yachts from all around the world. Thirdly, sitting on the Mediterranean coast, they enjoy admiration as the second most popular holiday destination in Turkey, after Istanbul. Lastly, the major coastal road called the D400 connects towns, village and cities, providing easy transportation and access, which in turn boosts visitors looking to complete self-drive holidays of Turkey.
Some resorts have maintained a quiet and dignified appearance such as Cirali, which is a one-street village, while the neighbouring resort of Olympos started its claim to fame in the seventies when backpacking hippies flocked there for the vibes of living off the land and being at one with nature, today it’s a backpackers dream destination its full of wooden tree-houses and bustling nightlife. Dalyan is a beautiful spot and has miles of channels meandering around marshlands and the beach is where endangered caretta caretta turtles lay eggs, and nearby rock tombs are engraved on the hillsides
Places like Gocek and Kalkan are promoted as upmarket destinations and this is evident in the luxury boats living in the marinas, Gocek is known as a yachter’s mecca located on the tip of the bay with plenty of secluded coves and small islands which are covered with pine forests. Kalkan has a typically Mediterranean feel about it with its whitewashed houses and brightly coloured flowers. Many wealthy Turks have purchased second-holiday homes in those areas, while resorts such as Olu Deniz, and Calis are middle market and attract mainly British clientele, who like the vibes and atmosphere of their home country that restaurants, bars and hotels have provided in order to attract more holidaymakers.
Faralya is a village in Lycia it is about 15 km south of Ölüdeniz (and 30 km south of Fethiye), Faralya was known as the “village on the cliffs of the Butterfly Valley” a deep canyon with sea on one side and some rare butterflies with the only access from the sea or a difficult climb down to the canyon via a narrow path. Carry on 8 km further south and you find Kabak which consists of two physically separate sections: a settlement which is a small cluster of two-story buildings along the road, clinging on a mountainside way above the coastline with panoramic views of beautiful Mediterranean and between the coast and the canyon is Kabak Koyu, which, with its pine groves, waterfalls, and coastline, is similar to more famous Butterfly Valley of Faralya.
No doubt the most favourite area of the Lycian coast is Antalya, a destination with a knack for accommodating all nationalities and types of holiday makers. Adventure sport lovers flock to places like Koprulu canyon while history enthusiasts admire Aspendos and Phaselis, an ancient sea trading port deserted after constant attacks by pirates. The city centre is a major hub for business, tourism and transport, while the smaller resorts, like Kemer, are respected for their beaches. Anyone considering a visit to the Lycian coast will surely find what they are looking for whether it is beautiful landscapes, historical value or simply a taste of Mediterranean living.
The weather is a typical Mediterranean climate and the further South you head towards Antalya the more humid it becomes. The summers are hot and long and the winters are cool and mild. Dalaman airport serves most of the Lycian area however as you go further east you can use Antalya international airport. Getting around is made effortless with the local bus service called a Dolmus, these buses are both reliable and inexpensive and ideal for journeys in the vicinity or further afield.
You can visit Rhodes and some of the smaller Greek islands which lie just off the Lycian coast by using the services of the direct ferries from a number of the Turkish harbour resorts. The Lycian coast offers an abundance of colourful rich history, stunning sand beaches and views of the Mediterranean, nature and wildlife, plus places of interest it’s a gem in Turkey’s crown! | <urn:uuid:b0caaeb1-3690-4b98-b4d2-7bcb54bcf874> | CC-MAIN-2018-43 | https://www.spotblue.com/lycian-coast-of-turkey/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512499.22/warc/CC-MAIN-20181019232929-20181020014429-00502.warc.gz | en | 0.966443 | 1,651 | 2.96875 | 3 |
There are many attempts that have attempted to reconcile social, ethical aspects and mood humans with the imperative need to produce and grow economically since the origin of economics as a science. We don’t have to forget that one of the most widely accepted definitions on the economy is that it is a science that analyzes human behavior as a relationship between given ends and scarce means which have alternative uses. Why is always positive and healthy analyze and question whether our way of dealing with this difficult task is the more correct. Economic models taxes and developed in every age not have refute or validated by laboratory experiments controlled a priori, but rather its breeding ground has been the society itself, with its productive units as integral elements, and their organizing and investing units such as scientists, which alter, modify or supersede the various economic systems of each historical moment. The problem of all this is that it is always a great majority of humankind who pays errors in the allocation of resources, the Organization of the productive units, and sharing the benefits of production and trade by large investors. There are many social-economicos experiments that have been promoted and tried to establish throughout the 19th and 20th century. Some to improve social and economic conditions of society as a whole, and others to enhance the role of power groups or specific lobbies in the world economy. But there is no doubt that all healthy and responsible society should debate and discuss the economic model most suitable to your expectations and its development model. This unfortunately doesn’t happen, since society is not a consultative body on these issues for national and international governments, nor for large multinationals. They extend their model of liberal globalization where some individuals or international supraentidades advocate the fierce free market, where the formula of both you have both vouchers is asserting against the personal initiative and State or supranational, limitations as necessary for social fields such as education, health or employment. | <urn:uuid:9f06aa8c-fa7b-4e05-8768-5130fcf5547e> | CC-MAIN-2019-26 | http://www.sgpgefegypt.org/tag/corporate/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000231.40/warc/CC-MAIN-20190626073946-20190626095946-00449.warc.gz | en | 0.968492 | 384 | 2.828125 | 3 |
When a trial starts, the charges are read out to the accused, who is asked to confirm his or her understanding of the charges, and to either plead guilty or not guilty. During the trial, the Prosecution and Defence each present their cases, and the Legal Representatives of Victims present the victims' views and concerns. At the end of the trial, the judges either acquit the accused or find the accused guilty, based on the evidence. If the judges find the accused guilty, they render a verdict of guilt and later a decision on the sentence. The maximum sentence is 30 years, or in extreme circumstances, life imprisonment. The judges may also render a decision on reparations for victims. The verdict and these decisions may be appealed. | <urn:uuid:091fc7ae-a7ce-42b0-8921-3cba79b3ea64> | CC-MAIN-2017-51 | https://www.icc-cpi.int/Pages/trial.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948529738.38/warc/CC-MAIN-20171213162804-20171213182804-00506.warc.gz | en | 0.965938 | 148 | 2.859375 | 3 |
The Space Between: Using Peer Theater To Transcenid Race, Class, and Gender
Venessa A. Bowers and Patrice M. Buzzanell
Interrogating Culture. Patrice M. Buzzanell
Purdue University, USA
First, critical empathy is more than relating to or understanding another, the usual way in which many approach “empathy.” In typical notions of empathic responses, a person sorts through talk, interactions, and other experiences to try to grasp what another person’s life is like.
Often, this process involves “walking in another’s shoes” or moving physically, affectively, and cognitively through the spatio-temporal environment in which others exist. Empathy can be seen as reactionary insofar as it engages the heart after knowing another person or community, but it also builds capacity to embrace others more swiftly over time and different experiences.
In these respects, empathy seeks to build shared understanding, but it also is conceptualized as a skill (e.g., Ponterotto, 2010).
In contrast, as Dr. Robyn Remke (2006) notes, critical empathy is the deeply profound
realization that one could never ever truly and deeply know the life of another, particularly another person from a different culture. As Remke (2006) conceives of critical empathy, it is both an investigative lens for uncovering deeply divisive assumptions and limitations and a stance for co-orienting, not coordinating or harmonizing, with others. The “burden” for building some kind of relationship and understanding lies in difference not attempts to locate similarities
and shared understanding. She writes:
Critical empathy acknowledges the methodological attempt to understand another’s
experience but does not demean the subject’s experience by trying to duplicate it or
adopt it as the researcher’s own — which again, I suggest is ultimately impossible.
Additionally, critical empathy does not try to downplay or explain away the distance
between researcher and participant. Rather, the researcher uses the distance and
difference in an analytic way to help reveal and illuminate taken-for-granted forms
of oppression and constraint. The research analysis develops out of the researcher’s
relationship to her participants, informed in part by her descriptive understanding of the participant’s experience. Empathic awareness is thus present. But by sustaining
a critical distance, the researcher remains attuned to forms of oppression that might
otherwise be obscured were she to literally assume the participant’s point of reference.
- ► 2014 (75)
- ► 2013 (95)
- Mundos virtuales de open source (marzo, 8, 2012...
- Issues in Informing Science & Information Technolo...
- Delafé y Las Flores Azules - Espiritu Santo - A BX...
- The Space Between: Using Peer Theater To Trans...
- Free/Libre and Open Source Software: Survey and St...
- The Cathedral and the Bazaar, by Eric S. Raymond
- The Top 50 Proprietary Programs that Drive You Cra...
- Software libre para una sociedad libre, Richard M....
- ▼ July (10)
- ► 2011 (182)
- ► 2010 (404)
- ► 2009 (123) | <urn:uuid:d91b3fe9-231d-4150-b611-3965a47f2786> | CC-MAIN-2018-26 | http://fromcommunication.blogspot.com/2012/07/space-between-using-peer-theater-to.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864546.30/warc/CC-MAIN-20180622143142-20180622163142-00489.warc.gz | en | 0.874781 | 696 | 3.125 | 3 |
These days, the lives of many children diagnosed with cancer can be saved. But the treatment can lead to problems later in life.
Four out of five children diagnosed with cancer survive. But many survivors suffer side effects of their cancer treatment later in life. Where previously the aim was to survive at all costs, the aim is now increasingly to survive at a reasonable price.
These days we know of about 100 genes that we are certain are significant, but in the vast majority of cases we don’t know why children develop cancer.
Thanks to a new approach to developing new cancer drugs for children the hope is growing of saving more.
William Florin was 15 years old when he had cancer of the nasopharynx. It affects one teenager every three years.
"That morning we had been out picking spring flowers, and now we had been told that our one-year-old had leukaemia."
Freja Östergren Löthén wants to be a paediatric oncologist. She thinks children would find it reassuring if their doctor was someone who had had the same experience. | <urn:uuid:6c2bc124-f516-46cb-95a3-e28f2470531b> | CC-MAIN-2018-09 | https://ki.se/en/research/spotlight-on-childhood-cancer | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812756.57/warc/CC-MAIN-20180219151705-20180219171705-00703.warc.gz | en | 0.983663 | 225 | 2.96875 | 3 |
What is a "Real
does America stand for?
Does America mean anything?
Or are we all just "Global Citizens" now?
It's not your fault if you don't know what a Real
You're probably a victim of Educational
Malpractice by our Government schools.
Take this quick quiz:
|In which country does the
government prohibit teachers in government-run schools
from teaching students that the Declaration
of Independence (1776) is really
b. North Korea
c. Communist China
d. The United States
e. All of the above
- That's correct:
|The U.S. Federal
a school teacher in a government-run school
from teaching students that the Declaration of
Independence really is true.
America's Birth Certificate -- the
Declaration of Independence -- says.
None of these things can be
taught as truth in a school
controlled by the government of the United
The Federal Government says that teachers in
government-operated schools paid for by your local property
taxes cannot "endorse"
these ideas. Oh, sure, students can be taught that a long time
ago some people believed
the Declaration of Independence was true, but teachers
cannot say The Declaration of Independence really is objectively
true, regardless of whether any human being or any
government believes it to be true, and that students should
stand up and risk
their lives, their fortunes and their sacred honor in defense of
those unchanging true principles. This is the only controversy
about Birth Certificates that matters.
The Court requires
government at all levels to maintain a
neutrality between theism and
non-theism which results, in practical
effect, in a governmental preference
of the religion of agnostic
secularism. Justice Brennan argued, in
his concurrence in the 1963 school
prayer case, that the words
"under God" could still be
kept in the Pledge of Allegiance only
because they "no longer have a
religious purpose or meaning."
Instead, according to Brennan they
"may merely recognize the
historical fact that our Nation was believed
to have been founded 'under
School District v. Schempp, 374
U.S. 203, 304, (1963).] This
false neutrality would logically prevent
an assertion by any government
official, whether President or school
teacher, that the Declaration
of Independence—the first of the Organic
the United States printed at the head
of the United States Code—is
in fact true when it asserts
that men are endowed "by their
Creator" with certain unalienable
rights and when it affirms "the
Laws of Nature and of Nature's God,"
Judge of the world" and
Constitution: Guarantor of
the Constitution: The Undermining of
Edward B. McLean, Intercollegiate
Studies Institute, 1997, pp. 155-56.
Notre Dame Professor of Law Charles E. Rice has observed
(see box) that under current Court interpretation, if a student
asks a teacher if the Declaration of
Independence was really true when it spoke about God,
"Providence," and "the Laws of Nature and of
Nature's God," the teacher could not say
"Yes, our nation is based on these eternal truths."
Presumably, no competent public school teacher (?) would say,
"No, America is just one big lie." So this means that a
school teacher can only say "I don't know" when asked if
the Declaration of Independence is actually true.
Not a single person who signed the
Constitution intended to prohibit a school teacher from telling
students that the Declaration of Independence was really true when
it spoke about God, "Providence," and "the Laws of
Nature and of Nature's God."
And we wonder why the more government-education a person has,
the more likely he is to be illiterate,
America's Founding Fathers would see government-run education as
perhaps the greatest threat to the Republic they created.
Government schools are certainly the greatest threat to the
idea of "Liberty
America's Founding Fathers would say most Americans today are illiterate
victims of educational malpractice
at the hands of the federal government.
How about you? Are you a victim of educational malpractice?
Would you like to become
- • an extraordinary American
- • an extraordinary Christian
- • an extraordinary Human Being
America was once the most prosperous and most admired
nation in history.
America is now bankrupt
even by former admirers.
This is because the system of
education that made America great has been replaced by one that
makes us a third-rate nation.
It also has made you a third-rate American, a carnal Christian,
and a truncated human being.
You can begin to change that here. | <urn:uuid:54ad678d-2f26-4647-898c-b3fa3415d6f9> | CC-MAIN-2017-17 | http://kevincraig.us/schools.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118519.29/warc/CC-MAIN-20170423031158-00287-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.932974 | 1,034 | 2.609375 | 3 |
‘Patience’ (forbearing) derives from the Latin patientia, ‘patience, endurance, submission’, and, ultimately—like ‘passivity’ and ‘passion’—from patere, ‘to suffer’. It can be defined as the quality of endurance and equanimity in the face of adversity, from simple delay or provocation to grand-scale misfortune or calamity.
The Old Testament Book of Proverbs tells us that, ‘he that is slow to anger is better than the mighty; and he that ruleth his spirit than he that taketh a city’ (16:32, KJV), and also that, ‘by long forbearing is a prince persuaded, and a soft tongue breaketh the bone’ (25:15). According to Ecclesiastes, ‘better is the end of a thing than the beginning thereof: and the patient in spirit is better than the proud in spirit. Be not hasty in thy spirit to be angry: for anger resteth in the bosom of fools.’ In Buddhism, patience is named as one of the ‘perfections’ (paramitas), and, as in other religious traditions, extends to not returning harm. Thus, Paul’s First Epistle to the Thessalonians exhorts, ‘be patient toward all men. See that none render evil for evil unto any man; but ever follow that which is good, both among yourselves, and to all men’ (5:14-15).
Although patience is often spoken of as a virtue, it can also be construed as a complex of virtues such as self-control, humility, tolerance, generosity, and mercy. Patience also belies several other virtues, not least ambition, hope, faith, and love. If patience is a virtue, it is because it tends to be beneficial—and also very difficult. There are several types of patience, including patience in the face of irritation, patience in the face of boredom, patience in the face of vindication, patience in the face of misfortune, and, most difficult of all, patience in the face of suffering.
The opposite of patience is, of course, impatience, but also hastiness, impetuosity, and perhaps even cowardice, suggesting that patience may have a lot in common with courage. Impatience is the inability or disinclination to endure perceived imperfection. It amounts to a rejection of the present moment born out of an evaluation that it is marred and ought to be supplanted by a more ideal future. More than that, impatience can amount to a rejection of human finitude. Patience recognizes that life is a struggle for each and every one of us. Impatience on the other hand takes offence at things that are not intended to offend, betraying a certain disregard, even contempt, for others, and, by extension, the order of nature.
Impatience implies impotence, which in turn implies frustration, which is sterile and self-defeating in that it serves no purpose other than to make us miserable and turn others against us, rendering us even more impotent and frustrated. Indeed, ‘frustration’ derives from the Latin frustra, ‘in vain, in error’, and is related to fraus, ‘injury, harm’. More subtly, but also more perversely, impatience leads to procrastination, since to put off a difficult or boring task is also to put off the irritation and frustration to which it is bound to give rise.
Today more than ever, patience is a lost virtue. Our individualistic society values ambition and action (or at least activity) above all else, but unlike, say, glamorous courage, patience seems to involve a withdrawal and withholding of the self. Neither is technology helping. In a recent study of millions of internet users, researchers found that, within just 10 seconds, about half of users had abandoned videos that did not start playing. Moreover, users with a faster connection were quicker to click out, suggesting that the pace of technological progress is rapidly eroding our patience. Indeed, much of today’s economy is geared at making things faster and reducing waiting times to next to nothing. In my books The Art of Failure and Hide and Seek, I argue that our increasing impatience has much to do with the manic defence, the essence of which is to prevent feelings of helplessness and despair from entering the conscious mind by occupying it with opposite feelings of euphoria, purposeful activity, and omnipotent control.
Even in the most propitious of times, the so-called ‘egocentric predicament’ makes patience difficult to exercise. Simply put, because I have privileged access to my own thoughts and feelings, I magnify them out of all proportion. If I am impatient in the queue, it is ultimately because I am under the impression that my time is more valuable, and my purpose more worthwhile, than that of the mugs standing in front of me. Thinking that I could do a much better job of manning the till, I give dagger eyes to the cashier, failing to appreciate that she is coming at it from a different place and angle, and with different skills and abilities. An added source of impatience is with my impatience itself, as I vacillate between persisting in the queue and taking abortive action such as asking for another till to be opened, giving up on my shopping, or filing for divorce.
Patience can be looked upon as a decision-making problem: eat up all the grain today or plant it in the ground and wait for it to multiply. Unfortunately, man evolved as a hunter-gatherer, not as a farmer. Our ancestral shortsightedness, manifest in our strong tendency to discount long-term rewards, is borne out by the Stanford marshmallow experiment, a series of studies on delayed gratification led by Walter Mischel in the late 1960s and early 1970s. These studies, conducted on hundreds of mostly four- and five-year-old children, involved a simple choice: either eat this marshmallow now or within the next 15 minutes, or hold back for 15 minutes and be given another one. Having explained this choice to a child, the experimenter left the child alone with the marshmallow, only to return after the 15 minutes had elapsed. Follow-up studies carried out over 40 years found that the minority of children who had been able to hold back for a second marshmallow enjoyed significantly better life outcomes, including higher SAT scores, less substance misuse, and better social skills.
Even so, patience is more than the mere ability to await some future gain. Exercising patience (note the verb ‘to exercise’) is just like dieting or growing a garden: of course waiting is involved, but it is not just about waiting: there also needs to be a plan in place, and that plan needs to be worked at. When it comes to others, patience does not amount to mere toleration, but to a complicit engagement in their struggle and welfare, often at the expense of our own short-term welfare. In that much, patience is a form of compassion, which, instead of alienating people, turns them into friends and allies.
Rather than enfeeble us, patience frees us from frustration and its ills, delivers us to the present moment, and affords us the time and perspective to think, do, and say the right things—which is why, in psychotherapy, both patient and therapist can require several years together. Last but not least, patience enables us to achieve the greatest things. Being patient does not mean never complaining or giving up, but doing so in a considered fashion, never pettily or pointlessly, and never from an angry place. Neither does it mean withholding, just like ageing a case of fine wine for 10 years does not mean withholding from wine during all that time (God forbid). Life is too short to wait, but it is not too short for patience.
It is much easier to be patient if one can understand that patience can and does secure much better outcomes, not just for others but also and above all for ourselves. In 2012, researchers at the University of Rochester decided to replicate the marshmallow experiment. However, before doing so, they split the children into two groups, exposing a first group to unreliable experiences (broken promises) and a second group to reliable experiences (honoured promises). They found that the children exposed to honoured promises waited an average of four times longer than the children exposed to broken promises. In other words, patience is largely a matter of confidence, or trust, or faith.
1. Krishnan and Sitaraman (2012). Video Stream Quality Impacts Viewer Behavior. ACM Internet Measurement Conference, Nov 2012.
2. Mischel et al. (1972). Cognitive and attentional mechanisms in delay of gratification. Journal of Personality and Social Psychology 21 (2): 204-218.
3. Kidd et al. (2013). Rational snacking: Young children’s decision-making on the marshmallow task is moderated by beliefs about environmental reliability. Cognition 126 (1): 109-114. | <urn:uuid:b2d00291-6a69-409f-9984-1e7246d5e995> | CC-MAIN-2015-40 | http://outre-monde.com/category/philosophy/page/2/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737913039.71/warc/CC-MAIN-20151001221833-00048-ip-10-137-6-227.ec2.internal.warc.gz | en | 0.95344 | 1,907 | 3.234375 | 3 |
Find and Reduce Database Fragmentation in SQL Server
Summary: This blog is all about the fragmentation in SQL server & various ways to get rid of such issues. Types of index fragmentation in SQL server is also discussed here. In addition, users will get to know how to find this fragmentation & reduce it to make the server run smoothly.
Table of Content
What is Fragmentation In SQL Server Database?
Fragmentation in SQL Server occurs when the data within a table is inserted, deleted or modified over time this is just another issue like SQL server error 824 or any other error. There are two kinds of fragmentation that can occur in SQL Server:
1. Logical Fragmentation
Logical fragmentation in SQL Server Database occurs when logical ordering of pages containing indexes does not match the physical ordering of pages inside the data file. This logical fragmentation occur by the splitting of pages due to any insert or update operation or heavy deletion of pages that result in discontinuation in page chain.
2. Extent Fragmentation
Extent fragmentation occurs when the extent of indexes are not contiguous with the database leaving extents. We can say that this extent fragmentation occurs due to some random delete or interleaving table’s data extent with other objects.
As we keep on modifying our data in the database the indexes in the database gets fragmented. Because of this, it results in the degraded performance of the database and data becomes less efficient. Therefore,we need to identify the techniques, which will help in finding the database fragmentation in SQL Server.
How to Check Database Fragmentation in SQL Server Easily?
In order to clear the problem of both fragmentation types the user has to use the DMV command sys.dm_db_index_physical_stats.
Two important columns helpful in detecting the database fragmentation or to find fragmentation in SQL Server are:
This query to check fragmentation of table in SQL server represents the External Fragmentation and is represented in percentage value. In Logical Fragmentation this query is suitable for the clustered table and for the heap it’s called Extent Fragmentation. Lower the value better will be the result. 10% value is good and less than 10% value is okay and more than 10% value corrections are required in the database.
This query calculates the percentage use of pages and it represents as Internal Fragmentation. Higher the value better the results. If the value is less than 75%, corrections are required in the database.
How to Reduce Fragmentation in SQL Server?
After finding the database fragmentation or table fragmentation in SQL server one can use the following procedures and methods in order to reduce fragmentation in SQL Server database. It will help the user to remove the fragmentation from table in their database and get accurate results from that. They are as follows:
1. Reducing Fragmentation in a heap
In order to reduce the fragmentation in a heap user must create clustered index on a table. After creating the clustered index, rearrange the values in the database and then place the pages contiguously on the disk. This method is only useful, whenever the data is in the heap and unable to verify the data.
2. Reducing Fragmentation in an Index
There are three methods which can be used by the user to reduce fragmentation in an index. It depends on the user which method they want to use according to the percentage value user has got from the detection of fragmentation of a database. User has to choose from one of the following methods:
- If avg_fragmentation_in_percent >5% and less than 30% then use ALTER INDEX REORGANIZE: This statement is replaced by DBCC INDEXDEFRAG and leaf order pages are reordered in a logical order. It is performed when the user is online as this is an online operation the index is available while the statement is running.
- If avg_fragmentation_in_percent >30% then use ALTER INDEX REBUILD: This statement is replaced by DBCC DBRINDEX and the index can be rebuild both online or offline mode. In that case, we can use drop or re-create index method.
- Drop or Re-Create the clustered Index: Re-creating the clustered index redistributes the data and full data pages are created. Fullness level can be done by replacing CREATE INDEX in place of FILLFACTOR.
NOTE: This method is less recommended then the previous methods. These methods must be known to the user if they want to reduce the fragmentation from their database.
Also Read: SQL Server Error 4014 Best Solution
This blog discusses about the SQL Server Database Fragmentation and its types. It also covers, how to find fragmentation in SQL Server and ways to reduce fragmentation in SQL Server. We are sure that by reading the entire article, users can easily check SQL server fragmentation & even reduce it as they want. | <urn:uuid:0d40bfde-af6c-4cf9-a00a-73f33874a84e> | CC-MAIN-2024-10 | https://www.sqlserverlogexplorer.com/how-to-find-database-fragmentation/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474360.86/warc/CC-MAIN-20240223021632-20240223051632-00834.warc.gz | en | 0.880528 | 1,001 | 2.609375 | 3 |
One major environmental issue Malaysia faces is solid waste. Currently, there are over 23,000 tonnes of waste produced each day in Malaysia. However, this amount is expected to rise to 30,000 tonnes by the year 2020. The amount of waste generated continues to increase due to the increasing population and development, and only less than 5% of the waste is being recycled.
We grew up learning about the “three R’s” of managing waste – reduce, reuse, and recycle. But in recent times, two more R’s – “refuse” and “repurpose”, have been added to the list of best practices to fight environmental pollution. That makes a total of five R’s we have to pay attention to. We all can reduce the environmental impact by practicing the 5 R’s at our homes and work. We can reduce our carbon footprints with only minimal efforts. Here are some basics about waste management and a few ways that you can start going green.
“Refuse” goes hand in hand with “Reduce” because you can easily reduce your plastic usage by refusing to accept certain types of plastic products. We can first start by refusing single use plastics such as plastic bags and straws. Usually, these items are only used once and then discarded, hence it is regarded as single-use plastics. The next time you are offered a plastic straw or a plastic shopping bag for an item you can carry with your own bag, remember to refuse it politely. The positive impact might seem small, but if people are more aware of this, it will add up over time and produce results of a better environment.
As mentioned before, refuse goes hand in hand with reduce. By refusing to use certain types of plastic, you are also reducing the amount of plastic you use daily. Reduce plastic bags while shopping and use your reusable grocery bags instead. This greatly contributes to reducing your carbon footprints. Reduce your purchase of goods wrapped in plastic. Go for goods that are packaged in glasses instead, because glasses can be washed and reused. If it will leave behind plastic trash, don’t buy it. Furthermore, the remaining “R’s” become easier because there is less plastic to address down the line.
Instead of throwing things away, you can reuse materials in their original form or pass those materials on to others who could use them too. This way, you get to save money when you are not buying something new. The residual contents left in your shampoo bottles or face cream jars cannot be cleaned efficiently, thus it is less likely to be recycled. We need to make a habit of reusing them because it would be a waste not to. Some companies have already started producing refill packs so that consumers will be able to reuse their empty bottles. Ditch the disposable for reusable.
Here is a situation everyone can related to: we tend to keep stuff around the house that no longer serves any purpose, because we think that it might come in handy one day. Instead of waiting for a time that you will actually need the stuff you kept lying around, why not start repurposing them? Repurposing helps the environment by reducing the amount of waste that is put into landfills.
This is a significant trend that is taking off. You can repurpose simply by taking something you are no longer using and alter it for another more practical use. A real simple example would be taking an old shirt and turning it into a pyjamas. If you have an empty jar, tie a ribbon around it and fill it up with your pens and stationeries. Think about the things you have lying around the house, and get creative to repurpose it.
Recycling is important in today’s world if we want to leave this planet for our future generations. One thing everyone should know about extracting and processing raw resources to make usable materials is that it requires a lot of energy. Recycling often saves energy because the products being recycled usually require much less processing to turn them into usable materials.
Recycling reduces the amount of waste sent to landfills and incinerators. Each time we recycle, we are doing our part in conserving our natural resources. Anything made from metal, wood, plastics, or papers are all likely to have a recycling option. Recycling is what you should do when you are unable to reduce, refuse or reuse your plastic products.
We hope you will join us on our journey of saving the environment. Remember the “five R’s” outlined above and be sure to incorporate these best practices in your daily routine to make a meaningful difference. | <urn:uuid:58409d21-b2a4-4746-b9b1-3bd0ea912004> | CC-MAIN-2020-05 | https://raygosolar.com/2019/07/25/the-5-rs-of-waste-management/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250603761.28/warc/CC-MAIN-20200121103642-20200121132642-00107.warc.gz | en | 0.956466 | 957 | 3.171875 | 3 |
One thing that a lover of music must be absolutely aware of is the fact that much music theory after 1914-1920 is fundamentally designed to undermine hope and faith. Arnold Schönberg, Anton Webern, Alban Berg, Iannis Xenakis, Krzysztof Penderecki, and Elliott Carter are all famous examples of this.
Penderecki, for example, is a Roman Catholic, and yet there is a cynical terror in his music, filled with an absolutely hope-less impulse of pure darkness. His "Threnody for the Victims of Hiroshima" of 1960 greatly influenced modern Ambient Music, because it's basically an endless stream of soul-breaking noise. It sounds as if the violins are being tortured to death; which, on reflection, seems to be fitting for the subject, but it still ends in death and cynicism. Similar to this is the work of Schönberg, whose atonal music of the 1920's is basically a faster version of modern ambient music; or, rather, modern ambient music is a slower version of Schönberg's atonality.
In my opinion, we should only listen to music that glorifies God in the Highest places. Atonal music (i.e. ambient) almost universally attacks joy and good feelings. Even those who love atonal ambience and minimalist music (and who win awards for composing it) are always saying how dark it is, and how much it reminds them of the depression of modern existence. In their music rests the shadows of an empty, purposeless Cosmos, and in their harmonies is a pessimistic lack of hope in God.
There is beautiful ambient music, to be sure, but both John Paul II and Benedictus XVI gave us very strong reasons for composing art music of the pre-atonal European style. Something about the compositional style of the Common Period, from Vivaldi (1720's) to Bruch (1890's) really transcends all sin and darkness, and imprints hope in us. Surely there are darker moments in classical music, but unlike modern ambient music, the darker moments of classical music always resolve to hope of some sort. Palestrina, Lassus, and Monteverdi may have had a different system of tonality from Purcell and Bach, but they still tried to end on hopeful notes back then.
Today, we have a serious problem with hopeless, joyless music. It serves only as a background to our daily activities, and not a very good background at that. We need the soul-stirring joy of full string orchestras proclaiming God's glorious, eternal happiness through His sons Mozart and Dvořák.
Do not be afraid | <urn:uuid:169f51c0-ec79-4d59-af6a-cdc1cd7c678a> | CC-MAIN-2016-26 | http://forums.catholic.com/showthread.php?t=486239 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00185-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.934409 | 552 | 2.578125 | 3 |
With chills in the air, you ought to be prepared for blizzards, snowfall or cold temperatures. This is the season of sniffles, sneezing, and spills. To stay safe throughout this weather, get prepared with proper first aid training. When the ground gets slick and icy, you become vulnerable to sprains and broken bone injuries. In the colder months, there is an added risk of hypothermia. Low temperatures make it difficult to fight with illnesses and keep your immune system stay stronger. Join the best first aid classes online to prepare for protection against illnesses and injuries in this upcoming winter. Here are some basic tips that you’ll learn:
What to Do For a Broken Bone?
In the icy winter months, spills and slips become common. A little soreness in the bones or severe sprains can make it tough for anyone. If in case, someone sustains a bone injury during these months, you can help with proper first aid. Firstly, call emergency response services if the injury is serious.
If you see any bleeding from the body, use a clean cloth and hold it tight to the fracture site to stop bleeding right away. For swelling, use ice packs that can numb the pain. If you need to create a splint, use a rigid surface to make its skeleton.
What to Do For Hypothermia?
When someone is exposed to extreme chill, especially if wet, hypothermia may occur. Infants, the elderly and those who engage in outdoor winter sports are vulnerable to this disease. An ideal approach is to monitor high risk individuals whenever they go outside. In the first aid classes online, you’ll learn how to identify the signs like shivering, exhaustion, and bright red skin color in the individuals.
The victim should be immediately taken to a warm place. Check the body temperature and call emergency services if it’s below 95 degrees F. When warming an individual suffering from hypothermia, do not massage the body as it can further create cardiovascular issues.
How to Deal With Cold or Flu?
If someone is down with cold or flu for a long time, this condition may worsen and lead to pneumonia. Consulting a doctor is the right decision in this condition. If you are trained in first aid, you can easily identify the warning signs when a person should be taken to a doctor.
They may include difficulty in breathing, a lasting fever, pain in the abdomen, bluish or gray skin, dehydration, persistent vomiting, sudden confusion, or seizures. The infants may suffer from symptoms like loss of appetite, irritability, and loss of energy when suffering from lasting cold or flu.
If you are equipped with right knowledge, you can more easily help a person stay safe and healthy during the chilling winter months. | <urn:uuid:516b9d63-81ae-4117-a718-aa65aa4072a7> | CC-MAIN-2020-05 | https://cprcare.com/blog/how-to-prepare-for-the-cold-months-with-first-aid-training/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783000.84/warc/CC-MAIN-20200128184745-20200128214745-00485.warc.gz | en | 0.916472 | 568 | 2.953125 | 3 |
Hearing Loss – Can Vitamins and also Supplements Job?
Vitamins and minerals– most of us understand they benefit our total wellness. But did you know those advantages include our ears too and aid hearing loss? From potassium and magnesium to vitamins C as well as E, nutrients load a punch when it concerns listening to healthcare. Let’s dive into which vitamins as well as supplements are understood to assist ear health.
Minerals for Hearing Loss Renovation
Minerals are compounds found in water as well as dirt, which plants then soak up. When we consume plant items (or pets that have consumed these plant products), our bodies reach profit of these nourishing nutrients.
Magnesium as well as various other minerals have been shown to aid or enhance usual hearing conditions such as age-related hearing loss, ear infections as well as ringing in the ears (ringing in the ears). Right here’s a better consider a few of those minerals.
Magnesium avoids internal ear damages
Noise-induced hearing loss is a significant health issue amongst adults. Nevertheless, researchers have found magnesium might play an vital duty in safeguarding our ears from the damaging impacts of noise. Loud audios motivate the manufacturing of totally free radical molecules in our ear, which damage the fragile hair cells of the inner ear. Since these hair cells are required to transmit audio from the ear to the brain, this damage can lead to noise-induced hearing loss.
The bright side: evidence recommends that magnesium is an important ear health and wellness mineral due to the fact that it assists block the task of these cell-damaging particles. In one research study, 300 topics that were provided a magnesium supplement before long term direct exposure to loud noise were significantly less likely to create noise-induced hearing loss than the control group.
Many people with noise-induced hearing loss likewise deal with ringing in the ears. Magnesium has actually been revealed to soothe the severity of tinnitus signs. A healthy supply of magnesium also keeps the blood vessels kicked back, permitting sufficient blood to flow throughout the body, including via the vessels in the inner ear.
Potassium assists transform noise
Potassium aids our body do a great deal of points, including aid it regulate the fluid in our blood as well as tissues. Researchers have located the liquid in our internal ear requires potassium as part of its critical process of converting audio right into nerve impulses that get sent out to the mind. Potassium levels in our inner ear decline as we age, which can contribute to age-related hearing loss. Therefore, it is very important to load up on potassium-rich foods to assist keep a healthy supply as well as balance of potassium in the internal ear.
Zinc eradicate bacteria and also infections
This trace element is understood for its immune-boosting powers and also capability to aid battle colds. Zinc assists activate as well as generate T-cells (T-lymphocytes)– our bodies’ defender cells that are especially designed to acknowledge and damage germs, infections and other invaders. While research studies have shown mixed outcomes on whether this mineral in fact prevents ear infections, it’s not a bad idea to sustain up on foods rich in this anti-inflammatory mineral for your hearing health. One hearing-related problem that zinc has been shown to assist is unexpected hearing loss. Research study reveals zinc supplementation can help recoup and also improve hearing for those experiencing sudden sensorineural hearing loss (SSNHL).
Note: Contact your physician initially before including zinc supplement to your regimen, particularly if you take anti-biotics or diuretics, as zinc can adversely connect with these kinds of drugs.
A Powerful Vitamin Mix for Noise-Induced Hearing Loss
Researchers recently found which vitamins to look for in order to battle noise-induced and also age-related hearing loss. If your hearing loss is connected to direct exposure to loud noise, take into consideration vitamins A, C, and also E taken along with magnesium. If your hearing loss is merely an result of aging, folic acid may aid maintain your ears sharp.
To decrease noise-induced hearing loss, vitamins A, C, and also E coupled with magnesium may be the solution. Noise-induced hearing loss can happen from one incident alone or as the outcome of lasting direct exposure to loud noise. Regardless, it’s a extensive trouble– about 30 million Americans are on a regular basis subjected to hazardous sound degrees.
Hearing Scientist Recommend Vitamins A, C and also E.
Scientist located that this nutrient combination assists avoid noise-induced hearing loss by obstructing the development of free radicals. We normally link cost-free radicals with clinical troubles like cancer cells, yet did you understand that cost-free radicals can additionally damage your hearing?
Below’s just how. When the ear is subjected to loud noises, the cells of the inner ear produce free radicals. When those totally free radicals been available in contact with the small hair cells in the ear, they destroy the hair cells, reducing hearing capability. As soon as the hair cells are dead, they can not expand back. Simultaneously, the cost-free radicals restrict blood circulation to the ear, making hearing even more hard.
The hearing specialists reported, on the websites Hearing Loss Aid and also Wellness Talk, that vitamins A, C as well as E work together with magnesium to quit the free radicals from forming in response to loud noise. The combination stopped an outstanding 80 percent of noise-induced hearing loss. While the vitamins and magnesium taken alone a little helped hearing loss, when created– they were substantially a lot more reliable!
Because cost-free radicals remain to create even after exposure to loud noise, taking the nutrient combination as several as three days after the occurrence can still help reduce hearing damages.
Any longer than that, nevertheless, as well as the damages can not be decreased. From soldiers who have actually served on the front lines, to employees in loud factories, to teenagers who like their songs cranked up, this searching for has the prospective to assist the vast number of individuals that are exposed to loud noises for either job or play.
Folic Acid for Age-Related Hearing Loss.
Even if you have actually never ever operated in a loud atmosphere or appreciated paying attention to loud music, you still may discover it obtaining tougher to hear as you age. If so, you aren’t alone– one in three Americans over age 70 live with some degree of hearing loss. Luckily, stopping age-related hearing loss may be as simple as upping your folic acid intake.
Age-related hearing loss can take place partially due to the amino acid homocysteine. This necessary amino acid causes hearing difficulty by reducing blood flow to the inner ear.
A research study located that males and females with high levels of homocysteine in their blood were an worrying 65 percent most likely to struggle with hearing loss. That’s where folic acid is available in. By helping the body break down homocysteine, folic acid avoids the pesky stuff from reducing blood flow to the ear.
In a 2010 research study, audiologists discovered that individuals with low degrees of folic acid were considerably most likely to experience high-frequency hearing loss. As a incentive– since excessive homocysteine in the blood might additionally suggest heart disease, stroke as well as mental deterioration,– you’re doing far more than simply assisting your hearing when you up your intake of folic acid. You can, of course, find folic acid in supplement kind, however you can likewise press a lot more in your diet by choosing beans, citrus fruits, whole grains as well as dark, leafy vegetables.
So you see, many nutrients aid stop hearing loss, including vitamins A, C, E, folic acid as well as magnesium. Age-related hearing loss and noise-induced hearing loss affect numerous individuals in America. Medical scientists and also audiology professionals recommend these basics for optimum hearing wellness. Since you recognize the value of nutritional supplements for hearing troubles, begin paying attention today and enhance your hearing! | <urn:uuid:979fe1cd-b77c-49e3-ba83-6b2014cd5891> | CC-MAIN-2022-40 | https://www.deejaytakeover.com/random-hearing-loss/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00549.warc.gz | en | 0.960623 | 1,658 | 2.59375 | 3 |
Your Friends are Good for Your Spirit – and Your Mind!
Here are 5 ways your social life impacts more than just your calendar.
By Sheryl Berardinelli, PsyD, ABPP
Board-Certified Rehabilitation Psychologist, Bancroft NeuroRehab
Physical activity isn’t the only type of activity that’s good for you. Increasingly, we’re learning that being socially active throughout your life is just as important for your overall well-being.
From helping us to learn social cues and boosting our self-esteem as children, to keeping our minds young as we age, it’s becoming clear that relationships – from close friendships, to romantic connections, to fun group interactions – are key to a healthy brain across the lifespan.
Here are just a few reasons why:
- It could lower your risk of dementia. People who socialize tend to perform better on memory and other cognitive tests. Being socially active supports brain health and research suggests it could delay the onset of dementia.
- It boosts mental health. Social interactions reduce feelings of depression and loneliness. One way to improve your mood is to expand your social connections.
- It improves your physical health. Social connections can boost our immune system. The Harvard Women’s Health Watch reported that people with satisfying relationships have fewer health problems and live longer. On the other hand, people who lack social contacts are more likely to experience higher levels of stress and inflammation.
- It keeps you physically healthy and can extend your life. Social engagement has been associated with reduced rates of disability and mortality.
- It helps optimize brain injury rehabilitation. For those recovering from traumatic brain injury, research shows the quality and amount of social support available to a patient increases the effectiveness of their rehabilitation, and enhances their overall well-being.
So make some time today to visit an old friend or schedule an outing! Here are some other ideas to boost your social engagement:
- Join hobby clubs such as book, knitting, crocheting, hunting, film, bowling, golf, etc. Local recreation centers and regional Facebook groups can be a great way to connect with people of similar interests.
- Consider joining a choir, music group, or the local theater.
- Find volunteer activities in your area.
- Attend religious services at your church, synagogue, temple, or mosque.
- Use video chatting apps such as Facetime, Skype, Viber, or Snapchat to connect with family and friends who live far away.
- Walk around your neighborhood and chat with neighbors.
- Sign up for a class at your local library, college, or town recreation center.
- Join group classes at your local gym.
- Invite friends or family members over for meals, coffee, tea, cards or board games. | <urn:uuid:3a0c0c71-673c-4473-9e27-832718772880> | CC-MAIN-2019-43 | https://neurorehab.bancroft.org/family_resources/your-friends-are-good-for-your-spirit-and-your-mind/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986655554.2/warc/CC-MAIN-20191014223147-20191015010647-00306.warc.gz | en | 0.933097 | 574 | 2.796875 | 3 |
School Food: What’s Happened In 2013Thu 19 Dec 2013
Story by The Jamie Oliver Food Foundation (USA) Team
Good food at school not only improves children’s health but it has also been shown to improve attainment(1). Schools provide a great opportunity, and have an important role to play, in improving diet and food behaviours of children – after all they do spend most of their waking hours at school each day and can consume up to half (or in some cases more) of their daily calories while at school.
Last year, we saw updates to school food come into play across the US following the Healthy Hunger Free Kids Act (2010), with changes mandated to the school lunch program.
This year studies have found that already around 80% of schools believe that they are meeting these new guidelines, which include doubling the amount of fruit and vegetables, more whole grains, less salt and unhealthy fats, and appropriate age-based portions. What’s more, a study by the Kids’ Safe and Healthful Foods project found that this number should rise to 94%.
However, many schools say that their current kitchen equipment and infrastructure limit their ability to meet such guidelines. Because of this food service staff need more training and are currently making do with less-efficient processes, such as manually chopping or slicing fruits and vegetables rather than using tools and equipment common in other food service operations, or having daily, and more costly, deliveries of fresh produce instead of being able to store it on-site.
So while it is evident that there is still a lot of work to be done, there are a lot of positive changes to school food, and as more schools work out how to meet these guidelines and an emphasis is put on the importance of training, skills and infrastructure, these lessons learned will help guide others.
The National School Lunch Program (NSLP) feeds nearly 32 million kids each day and with 17% (12.5 million) kids and adolescents in the US classed as obese, these changes couldn’t come at a more important time.
This year big updates have also been made to the regulations around competitive foods available in schools – anything that competes with the school lunch program: vending machines, a la carte lines, school stores etc. In April, proposed updates for these nutritional standards, which had not been updated nationally in 30 years, were released.
In June, these final standards were released and will go into effect in the 2014-2015 school year. The new standards will better address obesity and dietary problems —with limits on calories, saturated and trans fats, salt, and sugars. While sugary sweetened beverages will still be allowed, they must have less than 40 calories per 8 ounces and full calorie soda is no longer permitted. According to the new rule, snacks need to be reasonable, kid-sized portions, generally must have fewer than 200 calories, be low in fat, sodium, and sugar and at a minimum, these foods must fit into these categories:
• Whole grain
Additionally, after a phase-in period, companies won't be able to just fortify snacks with cheap nutrients to qualify them as healthy; all school foods will have to contain actual healthy food ― some fruit, vegetables, whole grains, or another healthy food component.
While some states do already have strong regulations in place for these foods, research by the Kids’ Safe and Healthful Foods Project has shown that most U.S. secondary schools do not offer fruits and vegetables in stores, snack bars, or vending machines, but many do sell less-healthy options. Together with the updated school meal regulations, these changes will go a long way to address the obesity epidemic and tackle some of the nutritional shortfalls in children in the U.S. today.
While these big changes have been made possible by changes made at a governmental level, we know that the schools and districts really pioneering the way are down to great leaders. The USDA lists many of the schools meeting these guidelines here and we’ve been hearing stories of many school districts that are doing great work to meet guidelines and improve school food. Check out our Pinterest board here, highlighting some school lunches across the nation.
These improvements in school food can be seen in districts such as the LAUSD, who, since Jamie was there in 2011, have been doing much work to remove flavoured milk and unhealthy items, improve the nutritional content of all school food, and support the local economy at the same time. It’s not always easy for big schools districts such as the LAUSD, which feeds over 680,000 kids per day, so it is great to see positive changes and coalitions such as the ‘Urban School Food Alliance’ come together to work collaboratively to improve school food.
In line with these improvements to school food, comes a need for better food education at school. Not only will improved food education and marketing around healthy foods have a positive impact on the uptake and participation of new meals through a ‘whole school’ approach, but it will also equip kids with the skills to make the right choices both in and out of the cafeteria.
That’s why we teamed up with Food Day back in May to launch the ‘Get Food Education in Every School’ campaign and work together to make food education more accessible to kids in schools throughout the nation. This year we aimed to research the current situation and garner support for action. We’ve been extensively researching the programs that exist in schools, whether mandated at a nation level or smaller private hands-on projects and you can see a snapshot of these on this map. We’ve also had over 80 organisations, including the American Association of Family and Consumer Sciences, Center for Ecoliteracy, Food Family Farming Foundation and the Edible Schoolyard Project, sign on to the effort this year. Together we’ll work to promote food education and make it more accessible to kids at school.
We believe that food skills are as important as learning to read and write and that just as improved school food has become a priority, so should food education throughout the school day. Together these two elements can have a huge impact on our children’s health, both now and in the future.
The Jamie Oliver Food Foundation (USA) Team
Images: Taken from the CSPI/JOFF (USA) 'School Foods Rule' Pinterest Board
1. Institute for Social and Economic Research
- Pilot Light Chefs Spark Food Education In Chicago
- Something For Lunch. Too Much To Ask For Kiwi Kids?
- Dirty Hands Can Lead To Healthy Hearts.
- TEDxManhattan: Changing The Way We Eat
- The 52 New Foods Challenge: Prepare For Success
- Food Truth Chefs Visit Food Literacy Center
- January 2015: New Year, New Challenges
- Making Wellness Happen In Forest Hills, Queens
- The 52 New Foods Challenge: Start The New Year Right
- The 52 New Foods Challenge: Easy Soup Recipes
- Food Revolution Toronto: Teamwork For A Common Goal
- Easy Holiday No Bake Desserts
- December 2014 Monthly Challenges
- The US School Food Fight: An Update
- Blog Of The Month: The 52 New Foods Challenge
- Ambassador Of The Month: Getting Kids Excited To Cook
- The UK School Food Plan - Year One
- Cooking Studio Brings Food Education To Taiwan
- Thanksgiving Leftovers For Breakfast
- Thanksgiving Food Traditions | <urn:uuid:1ca31be2-95ea-4d7f-b22b-9716b59fbb0a> | CC-MAIN-2015-06 | http://www.jamieoliver.com/us/foundation/jamies-food-revolution/news-content/school-food-what-s-happened-in-2013 | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115856087.17/warc/CC-MAIN-20150124161056-00139-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.949648 | 1,532 | 3.234375 | 3 |
Easy to Understand Short StoriesEasy-to-understand short stories
At all levels from beginner to advanced. Read and listen to short stories for children free of charge; simple, simple, animated stories for children with audio and transcript. You can read stories and poems in English to improve your level.
A simple way to create short stories that are selling
It allows you to create, publish, write, enter and distribute your own short stories, whether you want to be featured in journals, e-zines and/or antologies, or whether you would rather go alone - and soon earn cash with your self-written stories on Amazon Kindle.
This course is focused on quickly gaining the thinking of a pro writer so you can start getting inspiring and competent enough to start creating short stories for the market. Includes over fifty face-to-face presentations on inspirations, gender convention, characterisation guidance, plots, texture and rapid typing, and many text-based mini-courses to deepen your creativity.
It also contains an up-to-date list of available (chargeable!) short stories stores. "Discover the real ities of a writer's world, learnt from the authors of over thirty bestselling books. It takes you on an exciting trip, from mastering the writer's way of thought to reflecting on persuasive stories; from structuring stories for the greatest impact to properly formating and presenting your stories to writers and publishing houses.
By the end of this course you can look forward to being able to start a completely new professional paying scriptwriter and start your own business. He has been a teacher of typing for almost two years. Beginning with an introductory course in the author's way of thinking, the course initially concentrates on intellectual preperation, perfect timing, objective and the importance of high self-confidence.
Prefabricated models are available to help you understand these problems. The second part of the course deals with inspirations and concepts, finds topics for your stories and offers a clear guideline to the movie genres: Romanticism, Thriller, Terror, fantasy and sci-fi. The third section features Rob Parnell's advice and strategies from professionals with key hints on creating characters, creating empathy, motivating characters and agendas, dialog, story settings, styles, sounds, descriptions, points of views, and more.
You' ll also see the 7-Step storyline generator - a utility that allows you to test and build any notion. You will also be taught the perfect 5-point storyline layout and the easy way to build a template for hanging short stories. On the way there are text-based classes on creating characters, plots and a specific demonstration of The Art of History, a downloaded resources that fully explain the more technological aspect of the perfect storyline layout.
It also includes a section on authoring that introduces the solutions to each author's needs. The fourth part explores the real writing: how to spell fluently, without blocs, for maximal effect. The fifth part shows you how to find and get closer to short stories market. By the end of this course, you will have a clear insight into the short stories market and will be in an ideal position to assert yourself in this thrilling and fast-growing new professional development area.
You will at least be able to create wonderful short stories that will be loved and admired by all! | <urn:uuid:268c31d4-51ad-4091-a30d-808ea9ca6dda> | CC-MAIN-2020-10 | http://www.101books.net/topic/easy-to-understand-short-stories | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146066.89/warc/CC-MAIN-20200225110721-20200225140721-00362.warc.gz | en | 0.924998 | 681 | 2.875 | 3 |
A global citizen science platform
to discover, share and identify wildlife
Fomitopsis pinicola, is a stem decay fungus. Its conk (fruit body) is known as the red belt conk. Description Cap is hoof-shaped or triangular, hard and tough texture, up to 30–40 x 25 x 10 cm. Its surface is more or less smooth, at first orange-yellow with a white margin, later dark reddish to brown and then frequently with orange margin. The pore surface is pale yellow to leather-brown, 3–4 pores per mm. It grows as thick shelves on live and dead coniferous or (less common) deciduous trees. The fruiting body of Fomitopsis pinicola is called the conk. It is a woody, pileate fruiting body with pores lined with basidia on its underside. As in other polypores, the fruiting body is perennial with a new layer of pores produced each year on the bottom of the old pores. The pores are whitish when young and become somewhat brownish in age. This mushroom is inedible due to its woody texture, but it is useful as tinder.
Found in Redwood Forest Hiouchi, California. The species is common throughout the temperate Northern Hemisphere. It is a decay fungus that serves as a small-scale disturbance agent in coastal rainforest ecosystems. It influences stand structure and succession in temperate rainforests. It performs essential nutrient cycling functions in forests.
Not Edible. Has Medicinal properties see 2nd link. Has been used by natives to keep embers burning while carring to next camp site. Good tinder. | <urn:uuid:d669e66c-a128-41ad-8397-701fce1b38a2> | CC-MAIN-2020-34 | https://www.projectnoah.org/spottings/283593563 | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735792.85/warc/CC-MAIN-20200803083123-20200803113123-00029.warc.gz | en | 0.923483 | 348 | 3.09375 | 3 |
Happy Mother’s Day!
“Triage theory,” put forward by Bruce Ames , is an obviously true but nevertheless important idea. It offers a helpful perspective for understanding the consequences of malnourishment during pregnancy
Triage theory holds that we’ll have evolved mechanisms for devoting nutrients to their most fitness-improving uses. When nutrients are scarce, as in times of famine, available nutrients will be devoted to the most urgent functions – fuctions that promote immediate survival. Less urgent functions – ones which affect end-of-life health, for instance – will be neglected.
Ames and his collaborator Joyce McCann state their theory with, to my mind, an unduly narrow focus: “The triage theory proposes that modest deficiency of any vitamin or mineral (V/M) could increase age-related diseases.”
McCann and Ames tested triage theory in two empirical papers, one looking at selenium and the other at vitamin K . McCann & Ames used a clever method. They used knockout mice – mice in which specific proteins were deleted from the genome – to classify vitamin K-dependent and selenium-dependent proteins as “essential” (if the knockout mouse died) or “nonessential” (if the knockout mouse was merely sickly). They then showed experimentally that when mice were deprived of vitamin K or selenium, the nonessential proteins were depleted more deeply than the essential proteins. For example:
- “On modest selenium (Se) deficiency, nonessential selenoprotein activities and concentrations are preferentially lost.”
- The essential vitamin K dependent proteins are found in the liver and the non-essential ones elsewhere, and there is “preferential distribution of dietary vitamin K1 to the liver … when vitamin K1 is limiting.”
They also point out that mutations that impair the “non-essential” vitamin K dependent proteins lead to bone fragility, arterial calcification, and increased cancer rates – all “age-related diseases.” So it’s plausible that triage of vitamin K to the liver during deficiency conditions would lead in old age to higher rates of osteoporosis, cardiovascular disease, and cancer.
Generalizing Triage Theory
As formulated by Ames and McCann, triage theory is too narrow because:
- There are many nutrients that are not vitamins and minerals. Macronutrients, and a host of other biological compounds not classed as vitamins, must be obtained from food if health is to be optimal.
- There are many functional impairments which triage theory might predict would arise from nutrient deficiencies, yet are not age-related diseases.
I want to apply triage theory to any disorder (including, in this series, pregnancy-related disorders) and to all nutrients, not just vitamins and minerals.
Triage theory has already been applied frequently on our blog and in our book, though not by name. It works for macronutrients as well as it does for micronutrients.
Protein, for instance, is preferentially lost during fasting from a few locations – the liver, kidneys, and intestine. The liver loses up to 40 percent of its proteins in a matter of days on a protein-deficient diet. This preserves protein in the heart and muscle, which are needed for the urgent task of acquiring new food.
Protein loss can significantly impair the function of these organs and increase the risk of disease. Chris Masterjohn has noted that in rats given a low dose of aflatoxin daily, after six months all rats on a 20 percent protein diet were still alive, but half the rats on a 5 percent protein diet had died. On the low-protein diet, rats lacked sufficient liver function to cope with the toxin.
Similarly, carbohydrates are triaged. On very low-carb diets, blood glucose levels are maintained so that neurons, which need a sufficient concentration gradient if they are to import glucose, may receive normal amounts of glucose. This has misled many writers in the low-carb community into thinking that the body cannot face a glucose deficiency; but the point of our “Zero-Carb Dangers” series was that glucose is subject to triage and, while blood glucose levels and brain utilization may not be diminished at all on a zero-carb diet, other glucose-dependent functions are radically suppressed. This is why it is common for low-carb dieters to experience dry eyes and dry mouth, or low T3 thyroid hormone levels.
One “zero-carb danger” which I haven’t blogged about, but have long expected to eventually be proven to occur, is a heightened risk of connective tissue injury. Carbohydrate is an essential ingredient of extracellular matrix and constitutes approximately 5% to 10% of tendons and ligaments. One might expect that tendon and ligament maintenance would be among the functions put off when carbohydrates are unavailable, as it takes months for these tissues to degrade. If carbohydrates were unavailable for a month or two, there would be little risk of connective tissue injury. Since carbohydrate deprivation was probably a transient phenomenon in our evolutionary environment, except in extreme environments like the Arctic, it would have been evolutionarily safe to deprive tendons and ligaments of glucose in order to conserve glucose for the brain.
Recently, Kobe Bryant suffered a ruptured Achilles tendon about six months after adopting a low-carb Paleo diet. It could be coincidence – or it could be that he wasn’t eating enough carbohydrate to meet his body’s needs, and carbohydrate triage inhibited tendon maintenance.
Triage Theory and Pregnancy-Related Disorders
I think triage theory may helpfully illuminate the effects of nutritional deficiencies during pregnancy. When a mother and her developing baby are subject to nutritional deficiencies, how does evolution partition scarce resources?
Nutritional deficiencies are extremely common during pregnancy. For example, anemia develops during 33.8% of all pregnancies in the United States, 28% of women are still anemic after birth [source].
It’s likely that widespread nutritional deficiencies impair health to some degree in most pregnant women.
Those who have read our book know that we think malnutrition is a frequent cause of obesity and diabetes. Basically, we eat to obtain every needed nutrient; if the diet is unbalanced, then we may need an excess of fatty acids and glucose before we have met our nutritional needs. This energy excess can, in the right circumstances, lead to obesity and diabetes.
But obesity and diabetes are common features of modern pregnancy. Statistics:
- 5.7% of pregnant American women develop gestational diabetes. [source]
- 48% of pregnant American women experience a weight gain during pregnancy of more than about 35 pounds. [source]
I take the high prevalence of these conditions as evidence that pregnant women are generally malnourished and the need for micronutrition stimulates appetite, causing women to gain weight and/or develop gestational diabetes.
Another common health problem of pregnancy is high blood pressure: 6.7% of pregnant American women develop high blood pressure [source]. This is another health condition which can be promoted by malnourishment.
It’s likely that nutritional deficiencies were also common during Paleolithic pregnancies. If so, there would have been strong selection for mechanisms to partition scarce nutrients to their most important uses in both developing baby and mother.
A Look Ahead
- Nutritional deficiencies are widespread during modern pregnancies.
- They probably lead to measurable health impairments and weight gain in many pregnant women.
- The specific health impairments that arise in pregnant women or their babies are probably determined by which nutrients are most deficient, and by evolutionary triage which directs nutrients toward their most important functions and systematically starves other functions.
- Due to variations in how triage is programmed, deficiency of a nutrient during pregnancy may present with somewhat different symptoms than deficiency during another period of life.
This series will try to understand the effects of some common nutritional deficiencies of pregnancy. Triage theory may prove to be a useful tool for understanding those effects. Based on the incidence of possibly nutrition-related disorders like excessive weight gain, gestational diabetes, and hypertension, it looks like there may be room for significant improvements to diets during pregnancy. | <urn:uuid:3e2d6c3b-b6be-430d-bd23-b674bb117e3a> | CC-MAIN-2017-04 | http://perfecthealthdiet.com/category/pregnancy/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280761.39/warc/CC-MAIN-20170116095120-00249-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.952769 | 1,715 | 3 | 3 |
You may not think of polymers as technology, but they are making a huge difference. In the roofing industry, acrylic polymer mixtures are now being sprayed on roofs prior to hurricanes making landfall. This is because they add a significant amount of added protection to roofs.
Watch this video to learn how it works.
The acrylic polymer is sprayed out of a nozzle and onto every inch of the roof. As it soaks into the tiles, it hardens and provides additional support. It glues everything together to form one large cohesive roof structure. This means that the hurricane would have to yank off the entire roof rather than each shingle. Plus, this entire roof is now solidly glued to the house itself. This is why this technique has proven to prevent damage from miles up to 130 miles per hour. Even if you don’t live in a hurricane prone area, this coating can still significantly extend the life of your roof by as much as 100%. It may even protect your roof from a run in with a tornado if you live in the Midwest part of the country. | <urn:uuid:1c70a4a3-5a91-427f-a572-05140a0ab48d> | CC-MAIN-2023-40 | https://techtalkradioshow.net/this-coating-can-save-your-roof-from-hurricane-damage/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510454.60/warc/CC-MAIN-20230928194838-20230928224838-00308.warc.gz | en | 0.963412 | 221 | 3.15625 | 3 |
The Renal System at a Glance, 3rd Edition
September 2009, Wiley-Blackwell
This new edition of The Renal System at a Glance:
- Now features new self-assessment case studies with short answer questions to increase clinical relevance and reinforce learning
- Includes a new chapter ‘Chronic kidney disease and kidney disease in the elderly’
- Now includes the latest guidelines and classifications for chronic kidney disease and hypertension
- Contains full-colour artwork throughout, making the subject even easier to understand
The companion site at www.ataglanceseries.com/renalsystem contains multiple choice questions (MCQs) and full feedback on your answers
It’s an invaluable resource for all medical students, junior doctors, and for those training in allied health professions, including specialist nurses working on renal or intensive care wards.
Review of the previous edition
"Students in their pre-clinical years will find this book an
excellent and thorough introduction to the renal system and may
well struggle without a book of this calibre... This is a book that
should be on the bookshelf of all medical students, there's no
excuse not to have a copy! In addition, undergraduates from life
science/health allied disciplines and clinicians are likely to find
this book useful as a source of reference."
—GKT Gazette, September 2006
1 The kidney: structural overview.
2 The kidney: functional overview.
3 Development of the renal system.
4 Clinical features of kidney disease.
5 The kidney: laboratory investigations and diagnostic imaging.
Basic renal science.
6 Renal sodium handling.
7 Renal potassium handling.
8 Renal acid–base and buffer concepts.
9 Renal acid–base handling.
10 Calcium, phosphate, and magnesium metabolism.
11 The kidney and water handling.
12 Erythropoietin and anemia in renal disease.
13 Renal vascular biology.
14 Drug and organic molecule handling by the kidney.
15 Renal pharmacology: diuretics.
Disorders of renal metabolic function.
16 Hereditary disorders of tubular transport.
17 Regulation of body sodium and body water.
18 Disorders of sodium and water metabolism.
19 Hyponatremia and hypernatremia.
20 The edema states: sodium and water retention.
21 Regulation of potassium metabolism.
22 Hypokalemia and hyperkalemia.
23 Regulation of divalent ions and disorders of phosphate and magnesium.
24 Hypocalcemia and hypercalcemia.
25 Acid–base regulation and responses to acid–base.
26 Clinical disorders of acid–base metabolism and metabolic acidosis.
27 Metabolic alkalosis, respiratory acidosis, and respiratory alkalosis.
28 Renal tubular acidosis.
Renal disease processes.
29 Glomerular disease: an overview.
30 Glomerular pathologies and their associated diseases.
31 Specific diseases affecting the glomeruli.
32 Tubulointerstitial disease.
33 Proteinuria and the nephrotic syndrome.
34 Hypertension: causes and clinical evaluation.
35 Hypertension: complications and therapy.
36 Diabetes mellitus and the kidney.
37 Renal vascular disease.
38 Polycystic kidney disease.
39 Acute kidney injury: pathophysiology.
40 Acute kidney injury: clinical aspects.
41 Chronic kidney disease and kidney function in the elderly.
42 Severe chronic kidney disease and renal bone disease.
43 Severe chronic kidney disease: clinical complications and their management.
44 Treatment of kidney failure with dialysis.
45 Peritoneal dialysis and continuous hemofiltration.
46 Renal transplantation.
47 Urinary tract infection.
48 Renal tract stones.
49 Renal tract cancer.
50 Pregnancy and the renal system.
Self-assessment: case studies and questions.
Appendix: normal values.
Buy Both and Save 25%!
The Renal System at a Glance, 3rd Edition (US $49.95)
-and- Neuroanatomy and Neuroscience at a Glance, 4th Edition (US $42.95)
Total List Price: US $92.90
Discounted Price: US $69.67 (Save: US $23.23) | <urn:uuid:e5177f43-8155-4510-a62e-865f0ab3c8a6> | CC-MAIN-2016-30 | http://www.wiley.com/WileyCDA/WileyTitle/productCd-1405184728.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828322.57/warc/CC-MAIN-20160723071028-00302-ip-10-185-27-174.ec2.internal.warc.gz | en | 0.842006 | 915 | 3.015625 | 3 |
| ||Format||Pages||Price|| |
|9||$46.00|| ADD TO CART|
|Hardcopy (shipping and handling)||9||$46.00|| ADD TO CART|
Significance and Use
4.1 Measurements of bending strength and modulus of elasticity in bending should be made for materials whose principal stressing mode is bending. For many materials, the tensile and compressive moduli are somewhat different. Since the bending modulus is a combination of the tensile and compressive moduli, it is often different from each of them.
4.2 Precise measurements of the modulus of elasticity in bending and bending strength require due regard for numerous variables that may affect their determination. These include (1) characteristics such as specimen orientation with respect to the rolling direction, grain size, residual stresses, previous strain history, dimensions and specimen preparation, orientation of deformed grains relative to the direction of the normal stress; and (2) test conditions, such as tem- perature, temperature variations, condition of the test equipment and adherence to the recommended test procedure.
1.1 This standard describes three test methods2 for determining the modulus of elasticity in bending and the bending strength of metallic strips or sheets intended for the use in flat springs:
1.2 The values stated in inch-pound units are to be regarded as standard. The values given in parentheses are mathematical conversions to SI units that are provided for information only and are not considered standard.
2. Referenced Documents (purchase separately) The documents listed below are referenced within the subject standard but are not provided as part of the standard.
E4 Practices for Force Verification of Testing Machines
E6 Terminology Relating to Methods of Mechanical Testing
E111 Test Method for Youngs Modulus, Tangent Modulus, and Chord Modulus
E177 Practice for Use of the Terms Precision and Bias in ASTM Test Methods
E691 Practice for Conducting an Interlaboratory Study to Determine the Precision of a Test Method
ICS Number Code 21.160 (Springs)
UNSPSC Code 31161900(Springs)
|Link to Active (This link will always route to the current Active version of the standard.)|
ASTM E855-08(2013), Standard Test Methods for Bend Testing of Metallic Flat Materials for Spring Applications Involving Static Loading, ASTM International, West Conshohocken, PA, 2013, www.astm.orgBack to Top | <urn:uuid:e1340031-e4d2-42bd-833f-2888c561a113> | CC-MAIN-2018-22 | https://www.astm.org/Standards/E855.htm | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863689.50/warc/CC-MAIN-20180520205455-20180520225455-00166.warc.gz | en | 0.839445 | 528 | 2.9375 | 3 |
Python Beginner to Expert/Structured Python
Starting the shell
As suggested in the introduction, Python was conceived as a bridge between a command shell and an application development language, so it's important to learn how to use the Python command shell. The Python shell can be invoked by opening a terminal window and entering the word python at the prompt. If more than one version of Python is installed, the version number may be required as part of the command, for example python3.2. Selecting from versions may vary depending on the OS used and the method of installation.
Starting python3.2 on an Ubuntu Linux system will create the following messages on the terminal window.
Python 3.2.2 (default, Sep 5 2011, 21:17:14)
[GCC 4.6.1] on linux2
Type "help", "copyright", "credits" or "license" for more information.
The opening message shows the Python version, some build information, and four commands that may be used to get more information about python. license() provides a brief history of python including release years of major version and detailed information about the python distribution and license agreement. credits() provides a brief message of thanks to organizations and individuals who have supported python. copyright() provides a short list of copyrights that pertain to the Python. help() will execute the python help subsystem, which offers detailed information about python functions primarily derived from help strings.
The Python help() command will be discussed in detail later in this tutorial in a separate section.
Python's default prompt command prompt is >>>. Python displays a cursor to the right of the >>> prompt and python commands should be entered there.
To exit the shell and return to the system prompt, type exit() or Ctrl-D.
The shell itself does not offer much functionality to the user other than to provide a command line for entering python commands and functions. Editing capabilities in the shell are extremely limited.
Commands entered into the shell may be recalled by scrolling backward and forward through the command history using the up arrow and down arrow key. The left and right arrow keys are useful to reposition the cursor while editing the current line. The backspace key is destructive and will delete the character to the left of the cursor. It is possible to toggle between insert and overwrite modes by pressing the insert key. The delete key works like the backspace key except that it deletes the character at the cursor rather than the character to the left of the cursor. The home key repositions the cursor to the leftmost character on the current line while the end key repositions the cursor to the end of the line. Pressing enter will attempt to execute the current line no matter where the cursor is positioned. Note that pressing enter will not break the current at the cursor.
The shell maintains a partial history of commands that have been entered starting each time the shell is invoked. The history is not preserved between sessions.
The PageUp selects the first command in the history list for editing while the PageDown key performs the complementary function editing the last command entered.
Most python users will have little use for the command shell interpreter. Probably it's most common use is as a calculator. Arithmetic expressions entered at the command line will be evaluated immediately and the result displayed. The result of the most recent calculation is assigned to the underscore character. The following shows the use of the underscore character.
Basic Arithmetic with Python
Python has two basic numeric types: int (integer) and float (floating point). A python integer can be of any length. Python integers do not have a minimum or maximum (lower or upper) limit although naturally processing speed is reduced when dealing with very long integers. At the command line, Python will recognize that a number is an int if it is entered with no decimal point and that it is a float if a decimal point is included. Python will recognize that 1 is an int while 1.0 is a float. A real can be cast to an int and vice versa like this: float(1) casts an integer to a float, while int(1.1) casts an int to a float.
Python 3.2.2 for 32-bit Windows provides the following information regarding the numeric floating point type:
sys.float_info(max=1.7976931348623157e+308, max_exp=1024, max_10_exp=308, min=2.2250738585072014e-308, min_exp=-1021, min_10_exp=-307, dig=15, mant_dig=53, epsilon=2.220446049250313e-16, radix=2, rounds=1)
Python offers the following well known and understood symbols for arithmetic operations.
Modulus %; Multiplication *; Division / (equal precedence)
Addition +; Subtraction - (equal precedence)
Python observes typical precedence for these operators in the order shown. Calculations enclosed between parentheses have the highest precedence. When precedence of operations is not dictated by operator precedence or grouping by parentheses, calculations are performed from left to right.
1. Start the python interpreter. Note the version number that is displayed on the welcome screen. Exit the shell. Restart the shell. Try entering the different commands that are listed in the welcome message (help, copyright, credits, license). Try some calculations. Try dividing two integers that you would expect would produce an fractional result (for example, 5/2). Note the result. Try various combinations of operations to convince yourself that the order of precedence is predictable. Be sure to experiment with parentheses. Enter 2*(5+ at the command line. What happens when you don't match each left parenthesis with a right parenthesis?
2. Consider other ways to start the python command line interpreter. Consider which method you favor and why.
Python scripts may be created in any text editor with a couple of caveats. 1. It is generally advisiable to include a shebang line when writing for Unix types of systems. 2. In some Unix type environments, the interpreter may have problems with DOS type line endings.
A full installation of Python includes an IDE called IDLE. The name IDLE looks as if it is an acronym for something but like Python itself, it is a name borrowed from Monty Python, in this case the last name of Monty Python regular Eric Idle. IDLE was written by Python progenitor's, Guido von Rossum.
IDLE is included with most or all versions of Python available from the official python website, Python.org. It is often not included with other alternate versions of Python, such as IronPython and ActivePython.
You can start IDLE from the shell or command window, however the preferred method would be to start IDLE via your OS's GUI menu. By default, IDLE open's two Windows: the editor and the shell.
The IDLE shell resembles the command interpreter shell but provides significant additional functionality. Before discussing the additional functionality, note that we lost one of the handier features of the command interpreter shell, the capaibility to scroll and forwards through history list of commands with the up and down arrows keys. In the IDLE shell, if you want to edit re-execute a previously issued command you can use Alt-p and Alt-n to scroll through the recent command list. You can also find the previously issued command in the window, position the cursor on it, and press the enter key. Unlike the command shell interpreter, IDLE keeps a history of all commands in the shell from the beginning of the session until the shell is closed.
Both IDLE shell and the IDLE editor support the mouse and scroll bars for navigating and editing content in their Windows.
The following is quoted verbatims from the IDLE README
IDLE is Python's Tkinter-based Integrated DeveLopment Environment. IDLE emphasizes a lightweight, clean design with a simple user interface. Although it is suitable for beginners, even advanced users will find that IDLE has everything they really need to develop pure Python code. IDLE features a multi-window text editor with multiple undo, Python colorizing, and many other capabilities, e.g. smart indent, call tips, and autocompletion. The editor has comprehensive search functions, including searching through multiple files. Class browsers and path browsers provide fast access to code objects from a top level viewpoint without dealing with code folding. There is a Python Shell window which features colorizing and command recall. IDLE executes Python code in a separate process, which is restarted for each Run (F5) initiated from an editor window. The environment can also be restarted from the Shell window without restarting IDLE. This enhancement has often been requested, and is now finally available. The magic "reload/import *" incantations are no longer required when editing and testing a module two or three steps down the import chain. (Personal firewall software may warn about the connection IDLE makes to its subprocess using this computer's internal loopback interface. This connection is not visible on any external interface and no data is sent to or received from the Internet.) It is possible to interrupt tightly looping user code, even on Windows. Applications which cannot support subprocesses and/or sockets can still run IDLE in a single process. IDLE has an integrated debugger with stepping, persistent breakpoints, and call stack visibility. There is a GUI configuration manager which makes it easy to select fonts, colors, keybindings, and startup options. This facility includes a feature which allows the user to specify additional help sources, either locally or on the web. IDLE is coded in 100% pure Python, using the Tkinter GUI toolkit (Tk/Tcl) and is cross-platform, working on Unix, Mac, and Windows. IDLE accepts command line arguments. Try idle -h to see the options. If you find bugs or have suggestions or patches, let us know about them by using the Python issue tracker: http://bugs.python.org For further details and links, read the Help files and check the IDLE home page at http://www.python.org/idle/ There is a mail list for IDLE: [email protected]. You can join at http://mail.python.org/mailman/listinfo/idle-dev
This may prove sufficient introduction for many users. The IDLE help menu offers addition instruction information regarding uses and features of IDLE's menus and options and the entire contents of the help are reproduced here.
[See the end of this file for ** TIPS ** on using IDLE !!] Click on the dotted line at the top of a menu to "tear it off": a separate window containing the menu is created. File Menu: New Window -- Create a new editing window Open... -- Open an existing file Recent Files... -- Open a list of recent files Open Module... -- Open an existing module (searches sys.path) Class Browser -- Show classes and methods in current file Path Browser -- Show sys.path directories, modules, classes and methods --- Save -- Save current window to the associated file (unsaved windows have a * before and after the window title) Save As... -- Save current window to new file, which becomes the associated file Save Copy As... -- Save current window to different file without changing the associated file --- Print Window -- Print the current window --- Close -- Close current window (asks to save if unsaved) Exit -- Close all windows, quit (asks to save if unsaved) Edit Menu: Undo -- Undo last change to current window (A maximum of 1000 changes may be undone) Redo -- Redo last undone change to current window --- Cut -- Copy a selection into system-wide clipboard, then delete the selection Copy -- Copy selection into system-wide clipboard Paste -- Insert system-wide clipboard into window Select All -- Select the entire contents of the edit buffer --- Find... -- Open a search dialog box with many options Find Again -- Repeat last search Find Selection -- Search for the string in the selection Find in Files... -- Open a search dialog box for searching files Replace... -- Open a search-and-replace dialog box Go to Line -- Ask for a line number and show that line Show Calltip -- Open a small window with function param hints Show Completions -- Open a scroll window allowing selection keywords and attributes. (see '*TIPS*', below) Show Parens -- Highlight the surrounding parenthesis Expand Word -- Expand the word you have typed to match another word in the same buffer; repeat to get a different expansion Format Menu (only in Edit window): Indent Region -- Shift selected lines right 4 spaces Dedent Region -- Shift selected lines left 4 spaces Comment Out Region -- Insert ## in front of selected lines Uncomment Region -- Remove leading # or ## from selected lines Tabify Region -- Turns *leading* stretches of spaces into tabs (Note: We recommend using 4 space blocks to indent Python code.) Untabify Region -- Turn *all* tabs into the right number of spaces New Indent Width... -- Open dialog to change indent width Format Paragraph -- Reformat the current blank-line-separated paragraph Run Menu (only in Edit window): Python Shell -- Open or wake up the Python shell window --- Check Module -- Run a syntax check on the module Run Module -- Execute the current file in the __main__ namespace Shell Menu (only in Shell window): View Last Restart -- Scroll the shell window to the last restart Restart Shell -- Restart the interpreter with a fresh environment Debug Menu (only in Shell window): Go to File/Line -- look around the insert point for a filename and linenumber, open the file, and show the line Debugger (toggle) -- Run commands in the shell under the debugger Stack Viewer -- Show the stack traceback of the last exception Auto-open Stack Viewer (toggle) -- Open stack viewer on traceback Options Menu: Configure IDLE -- Open a configuration dialog. Fonts, indentation, keybindings, and color themes may be altered. Startup Preferences may be set, and Additional Help Sources can be specified. On MacOS X this menu is not present, use menu 'IDLE -> Preferences...' instead. --- Code Context -- Open a pane at the top of the edit window which shows the block context of the section of code which is scrolling off the top or the window. (Not present in Shell window.) Windows Menu: Zoom Height -- toggles the window between configured size and maximum height. --- The rest of this menu lists the names of all open windows; select one to bring it to the foreground (deiconifying it if necessary). Help Menu: About IDLE -- Version, copyright, license, credits IDLE Readme -- Background discussion and change details --- IDLE Help -- Display this file Python Docs -- Access local Python documentation, if installed. Otherwise, access www.python.org. --- (Additional Help Sources may be added here) ** TIPS ** ========== Additional Help Sources: Windows users can Google on zopeshelf.chm to access Zope help files in the Windows help format. The Additional Help Sources feature of the configuration GUI supports .chm, along with any other filetypes supported by your browser. Supply a Menu Item title, and enter the location in the Help File Path slot of the New Help Source dialog. Use http:// and/or www. to identify external URLs, or download the file and browse for its path on your machine using the Browse button. All users can access the extensive sources of help, including tutorials, available at www.python.org/doc. Selected URLs can be added or removed from the Help menu at any time using Configure IDLE. Basic editing and navigation: Backspace deletes char to the left; DEL deletes char to the right. Control-backspace deletes word left, Control-DEL deletes word right. Arrow keys and Page Up/Down move around. Control-left/right Arrow moves by words in a strange but useful way. Home/End go to begin/end of line. Control-Home/End go to begin/end of file. Some useful Emacs bindings are inherited from Tcl/Tk: Control-a beginning of line Control-e end of line Control-k kill line (but doesn't put it in clipboard) Control-l center window around the insertion point Standard Windows bindings may work on that platform. Keybindings are selected in the Settings Dialog, look there. Automatic indentation: After a block-opening statement, the next line is indented by 4 spaces (in the Python Shell window by one tab). After certain keywords (break, return etc.) the next line is dedented. In leading indentation, Backspace deletes up to 4 spaces if they are there. Tab inserts spaces (in the Python Shell window one tab), number depends on Indent Width. (N.B. Currently tabs are restricted to four spaces due to Tcl/Tk issues.) See also the indent/dedent region commands in the edit menu. Completions: Completions are supplied for functions, classes, and attributes of classes, both built-in and user-defined. Completions are also provided for filenames. The AutoCompleteWindow (ACW) will open after a predefined delay (default is two seconds) after a '.' or (in a string) an os.sep is typed. If after one of those characters (plus zero or more other characters) you type a Tab the ACW will open immediately if a possible continuation is found. If there is only one possible completion for the characters entered, a Tab will supply that completion without opening the ACW. 'Show Completions' will force open a completions window. In an empty string, this will contain the files in the current directory. On a blank line, it will contain the built-in and user-defined functions and classes in the current name spaces, plus any modules imported. If some characters have been entered, the ACW will attempt to be more specific. If string of characters is typed, the ACW selection will jump to the entry most closely matching those characters. Entering a Tab will cause the longest non-ambiguous match to be entered in the Edit window or Shell. Two Tabs in a row will supply the current ACW selection, as will Return or a double click. Cursor keys, Page Up/Down, mouse selection, and the scrollwheel all operate on the ACW. 'Hidden' attributes can be accessed by typing the beginning of hidden name after a '.'. e.g. '_'. This allows access to modules with '__all__' set, or to class-private attributes. Completions and the 'Expand Word' facility can save a lot of typing! Completions are currently limited to those in the namespaces. Names in an Edit window which are not via __main__ or sys.modules will not be found. Run the module once with your imports to correct this situation. Note that IDLE itself places quite a few modules in sys.modules, so much can be found by default, e.g. the re module. If you don't like the ACW popping up unbidden, simply make the delay longer or disable the extension. OTOH, you could make the delay zero. You could also switch off the CallTips extension. (We will be adding a delay to the call tip window.) Python Shell window: Control-c interrupts executing command. Control-d sends end-of-file; closes window if typed at >>> prompt (this is Control-z on Windows). Command history: Alt-p retrieves previous command matching what you have typed. Alt-n retrieves next. (These are Control-p, Control-n on the Mac) Return while cursor is on a previous command retrieves that command. Expand word is also useful to reduce typing. Syntax colors: The coloring is applied in a background "thread", so you may occasionally see uncolorized text. To change the color scheme, use the Configure IDLE / Highlighting dialog. Python default syntax colors: Keywords orange Builtins royal purple Strings green Comments red Definitions blue Shell default colors: Console output brown stdout blue stderr red stdin black Other preferences: The font preferences, keybinding, and startup preferences can be changed using the Settings dialog. Command line usage: Enter idle -h at the command prompt to get a usage message. Running without a subprocess: If IDLE is started with the -n command line switch it will run in a single process and will not create the subprocess which runs the RPC Python execution server. This can be useful if Python cannot create the subprocess or the RPC socket interface on your platform. However, in this mode user code is not isolated from IDLE itself. Also, the environment is not restarted when Run/Run Module (F5) is selected. If your code has been modified, you must reload() the affected modules and re-import any specific items (e.g. from foo import baz) if the changes are to take effect. For these reasons, it is preferable to run IDLE with the default subprocess if at all possible. Extensions: IDLE contains an extension facility. See the beginning of config-extensions.def in the idlelib directory for further information. The default extensions are currently: FormatParagraph AutoExpand ZoomHeight ScriptBinding CallTips ParenMatch AutoComplete CodeContext
Rather than try to elaborate on or reword the lucid explanations provided in the IDLE documentation, what follows is just a series of exercises that are designed to familiarize the reader with menu items and features of the IDLE IDE.
1. Find and open IDLE from your OS's GUI menu. Try closing the editor. Note that closing the editor does not terminate the shell. Use the File|New Window menu item from the shell to open a new Editor window. Using the same menu item, determine whether you can have more than editor window open at a time.
2. Now close the shell. Reopen the shell by using the IDLE editor's Windows|*Python Shell* menu item.
3. Enter a short program in the shell, something like
for n in range(0,10): print(n)
Be sure to press enter after the colon at the end of the first line. Notice that IDLE indents automatically. What do you think triggers the identation?
4. Re-enter the line with deliberate mistakes. What happens?
5. Locate a valid copy of the code in the shell window. Using the mouse or arrows position the cursor (the thin blinking vertical bar) to the line reading for n in range(0,10): and press enter. Notice that the entire block of code is copied to the active prompt where you can edit it. Try copying the same code by selecting it with mouse and pressing Ctrl-C to copy and then paste at the current position. Consider which method is easier for you to use.
6. Copy the same code and paste in into the editor window. Check the script with the IDLE editor's Run|Check Module menu item. Try to run the script with the IDLE Editor's Run|Run Module menu item or with the F5 key. You should have found that in order to do either you need to save the script. There is a way to direct the IDLE editor to save script changes automatically. Where do you suppose that option is found? Be advised that IDLE does not create backup copies of your scripts but that it does keeps 1000 undo steps in memory. Consider methods that you might use to keep an external audit trail so that you revert to an earlier version of your code if necessary.
7. Save the code in the text editor if you have not already. Note whether you need to type the .py extension or whether the save dialog automatically does it for you.
8. Save the contents of the shell window. Open the saved contents in the IDLE editor. Can you think of any situation where saving the contents of the shell window might be useful?
9. Tear off a copy of any drop down menu by clicking on the dashed lined at the top of the menu. Close the floating copy of the drop down menu. Consider whether this is a useful feature and what you might use it for.
10. Compare the main menu items shown in the shell with those in the editor. Notice that each has seven menus but that the editor has a Format item where the shell has a Shell item.
11. Try out the various options from the IDLE editor's Format menu. You may cut and past the following snippet into your IDLE editor for practice:
pyramid = [3, 7, 4, 2, 4, 6, 8, 5, 9, 3] class node(object): value = 0 left = 0 right = 0 def __init__(self, v, l, r): self.value = v self.left = l self.right = r l = c = 0 r = 0 t = node for n in pyramid: t = node(n, 0, 0) l.append(t) for t in l: print(t.value, t.left, t.right) | <urn:uuid:4e602d0e-bde4-4e64-a12e-6ebb49edcd17> | CC-MAIN-2016-07 | https://en.wikibooks.org/wiki/Python_Beginner_to_Expert/Structured_Python | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701158601.61/warc/CC-MAIN-20160205193918-00138-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.849828 | 5,251 | 3.640625 | 4 |
Types of Databases
These days, when you talk about databases in the wild, you are primarily talking about two types: analytical databases and operational databases.
Let's examine each type.
Analytic databases (a.k.a. OLAP- On Line Analytical Processing) are primarily static, read-only databases which store archived, historical data used for analysis. For example, a company might store sales records over the last ten years in an analytic database and use that database to analyze marketing strategies in relationship to demographics.
On the web, you will often see analytic databases in the form of inventory catalogs such as the one shown previously from Amazon.com. An inventory catalog analytical database usually holds descriptive information about all available products in the inventory.
Web pages are generated dynamically by querying the list of available products in the inventory against some search parameters. The dynamically-generated page will display the information about each item (such as title, author, ISBN) which is stored in the database.
Operational databases (a.k.a. OLTP On Line Transaction Processing), on the other hand, are used to manage more dynamic bits of data. These types of databases allow you to do more than simply view archived data. Operational databases allow you to modify that data (add, change or delete data).
These types of databases are usually used to track real-time information. For example, a company might have an operational database used to track warehouse/stock quantities. As customers order products from an online web store, an operational database can be used to keep track of how many items have been sold and when the company will need to reorder stock.
Besides differentiating databases according to function, databases can also be differentiated according to how they model the data.
What is a data model?
Well, essentially a data model is a "description" of both a container for data and a methodology for storing and retrieving data from that container. Actually, there isn't really a data model "thing". Data models are abstractions, oftentimes mathematical algorithms and concepts. You cannot really touch a data model. But nevertheless, they are very useful. The analysis and design of data models has been the cornerstone of the evolution of databases. As models have advanced so has database efficiency.
Before the 1980's, the two most commonly used Database Models were the hierarchical and network systems. Let's take a quick look at these two models and then move on to the more current models.
As its name implies, the Hierarchical Database Model defines hierarchically-arranged data.
Perhaps the most intuitive way to visualize this type of relationship is by visualizing an upside down tree of data. In this tree, a single table acts as the "root" of the database from which other tables "branch" out.
You will be instantly familiar with this relationship because that is how all windows-based directory management systems (like Windows Explorer) work these days.
Relationships in such a system are thought of in terms of children and parents such that a child may only have one parent but a parent can have multiple children. Parents and children are tied together by links called "pointers" (perhaps physical addresses inside the file system). A parent will have a list of pointers to each of their children.
This child/parent rule assures that data is systematically accessible. To get to a low-level table, you start at the root and work your way down through the tree until you reach your target. Of course, as you might imagine, one problem with this system is that the user must know how the tree is structured in order to find anything!
The hierarchical model however, is much more efficient than the flat-file model we discussed earlier because there is not as much need for redundant data. If a change in the data is necessary, the change might only need to be processed once. Consider the student flatfile database example from our discussion of what databases are:
As we mentioned before, this flatfile database would store an excessive amount of redundant data. If we implemented this in a hierarchical database model, we would get much less redundant data. Consider the following hierarchical database scheme:
However, as you can imagine, the hierarchical database model has some serious problems. For one, you cannot add a record to a child table until it has already been incorporated into the parent table. This might be troublesome if, for example, you wanted to add a student who had not yet signed up for any courses.
Worse, yet, the hierarchical database model still creates repetition of data within the database. You might imagine that in the database system shown above, there may be a higher level that includes multiple course. In this case, there could be redundancy because students would be enrolled in several courses and thus each "course tree" would have redundant student information.
Redundancy would occur because hierarchical databases handle one-to-many relationships well but do not handle many-to-many relationships well. This is because a child may only have one parent. However, in many cases you will want to have the child be related to more than one parent. For instance, the relationship between student and class is a "many-to-many". Not only can a student take many subjects but a subject may also be taken by many students. How would you model this relationship simply and efficiently using a hierarchical database? The answer is that you wouldn't.
Though this problem can be solved with multiple databases creating logical links between children, the fix is very kludgy and awkward.
Faced with these serious problems, the computer brains of the world got together and came up with the network model.
In many ways, the Network Database model was designed to solve some of the more serious problems with the Hierarchical Database Model. Specifically, the Network model solves the problem of data redundancy by representing relationships in terms of sets rather than hierarchy. The model had its origins in the Conference on Data Systems Languages (CODASYL) which had created the Data Base Task Group to explore and design a method to replace the hierarchical model.
The network model is very similar to the hierarchical model actually. In fact, the hierarchical model is a subset of the network model. However, instead of using a single-parent tree hierarchy, the network model uses set theory to provide a tree-like hierarchy with the exception that child tables were allowed to have more than one parent. This allowed the network model to support many-to-many relationships.
Visually, a Network Database looks like a hierarchical Database in that you can see it as a type of tree. However, in the case of a Network Database, the look is more like several trees which share branches. Thus, children can have multiple parents and parents can have multiple children.
Nevertheless, though it was a dramatic improvement, the network model was far from perfect. Most profoundly, the model was difficult to implement and maintain. Most implementations of the network model were used by computer programmers rather than real users. What was needed was a simple model which could be used by real end users to solve real problems. | <urn:uuid:d507b388-72eb-45cb-aa8a-933f6c584fe5> | CC-MAIN-2015-40 | http://www.theukwebdesigncompany.com/articles/types-of-databases.php | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737867468.81/warc/CC-MAIN-20151001221747-00094-ip-10-137-6-227.ec2.internal.warc.gz | en | 0.949978 | 1,447 | 3.28125 | 3 |
The Paris Agreement adopted by the 21 st Conference of Parties (COP21) under the United Nations Framework Convention on Climate Change (UNFCCC) on 12 December 2015, was the outcome of major battles on a multitude of issues, especially between developed and developing countries.
Developing countries by and large had these negotiating objectives. They wanted to (a) defend the Convention and not let it be changed or subverted; (b) ensure that the Agreement is non-mitigation-centric with all issues (including adaptation, loss and damage, finance and technology, besides mitigation) addressed and in a balanced manner; (c) ensure differentiation in all aspects be reflected, with the principles of equity and common but differentiated responsibilities and respective capabilities; (d) ensure that developed countries enhance the provision of finance and technology transfer (f) ensure that loss and damage is recognised as a separate pillar apart from adaptation and (g) have legally binding provisions, especially on the developed countries.
The United States and allies (especially those under the Umbrella Group) wanted the opposite. They mounted an onslaught on the Convention, seeking to weaken the provisions and their obligations; redefine differentiation so as to blur the different obligations of developed and developing countries; and a legal hybrid agreement (in terms of what clauses are and are not legally binding), mainly to suit the US administrations relations with the US Congress, which is hostile to the climate change issue.
COP21 was a battleground that involved an onslaught (with both defensive and offensive interests) of the US and its allies versus the resistance and offensive by the Group of 77 and China, and especially the Like-minded Developing Countries (LMDC) that had comprehensive negotiation positions and a well operating machinery.
A major concern was how the French Presidency of COP 21 would behave, in light of the polarised positions. Towards the end, an important meeting took place between the LMDC and the French Presidency (who were crafting the final compromise) during the night of Friday, 11 December, where the LMDC presented its super-redlines. These included: that the purpose of the Agreement is to enhance the implementation of the Convention in accordance with the principles and provisions of the Convention; reflection and operationalisation of equity and CBDR across all elements; clear differentiation between developed and developing countries on the mitigation efforts; commitment by developed countries on provision of finance, technology transfer and capacity-building with no transfer or extension of obligations to developing countries to provide finance.
The LMDC conveyed the message that with 30 countries in its grouping representing more than 50% of the population of the world and 70% of the poor, it wanted the COP to be a success but that the outcome must be balanced, and not depart from its super-redlines. In the end the French took the LMDC points, and got the US to agree.
The COP 21 Presidency was generally viewed as playing a fair and difficult role in securing a delicate and balanced outcome, except for an incident in the final plenary that somewhat marred the process. This is the should incident where the US wanted the word shall to be replaced with the word should in Article 4.4 of the Agreement that related to the mitigation efforts of Parties. The US wanted developed and developing countries to be treated in a like manner legally, as the original version referred to shall for developed countries and should for developing countries. Instead of raising the issue from the floor of the plenary, the US request was accommodated by the COP Presidency by what was termed a technical correction and the word shall was then replaced with should and was read out by the Secretariat. This was viewed with dismay by some LMDC delegations, but as there was no formal objection, the US-inspired amendment stood.
Another incident was when Nicaragua put up its flag in the final session of the Paris Committee 1 that adopted the Paris Agreement but it was ignored by the Chair. The Minister of Nicaragua made a strong statement protesting against his being ignored, after the Agreement had been passed by the Committee.
After adopting the Paris Agreement, the Paris Committee then forwarded it to the COP which in turn adopted the Agreement.
2. Highlights of the Paris Agreement
[Read all the highlights in the pdf of this briefing paper.]
The developing countries started the Paris talks with some clear objectives and principles. Though some aspects were diluted, it got its red lines protected, though it did not get some of its offensive points accepted (for example, clearer targets on finance or a reference to IPRs as a barrier to technology transfer). Some of the important points gained by developing countries were that
- The Paris Agreement is not mitigation-centric as desired by developed countries, although in some aspects mitigation does gets pride of place;
- The developing countries to a significant extent successfully defended the Convention and stopped the plans of developed countries to drastically rewrite the Convention.
- Differentiation between developed and developing countries was retained in the main, although weakened in some areas.
- The principles of equity and CBDR were mentioned in a specific clause in the important Article 2 on purpose of the Agreement, and operationalised in some key areas of the Agreement.
- Sustainable development and poverty eradication as important objectives of developing countries were referred to as the context of actions by developing countries in some key areas.
- Developed countries should take the lead in mitigation and finance is referred to in the Agreement.
- Although the temperature goal is to limit temperature rise to well below 2°C from pre-industrial levels, the reference to pursuing efforts to limit temperature rise to below 1.5°C (this 1.5°C as the target was called for by Small Island States, LDCs, Africa and ALBA countries) is significant;
True, the Paris Agreement also means that big pressures will be put on developing countries, and especially the emerging economies, to do much more on their climate actions, including mitigation. But these enhanced actions need to be taken, given the crisis of climate change that very seriously affect developing countries themselves.
The Agreement also fails to provide actions that fulfil the 2°C pathway, let alone 1.5°C. The emissions gap between what countries in aggregate should do and what they pledged to do in their INDCs up to 2030 is very large. This has led many commentators to condemn the Paris COP21 as a failure.
However another perspective is that COP21 is only a start, and the Agreement represents an agreement internationally to enhance individual and collective actions to face the climate catastrophe. A real failure would have been a collapse of the Paris negotiations, Copenhagen-style, or an outcome that only favours the developed countries with the rewriting of the Convention.
The Agreement, from this perspective, has laid the foundation on which future actions can be motivated and incentivised, a baseline from which more ambitious actions must flow. There are mechanisms in place in the Paris Agreement, such as the global stocktake, that can be used to encourage countries to raise their ambition level.
International cooperation, however inadequate and flawed, remains intact from which much more cooperation can flow in future.
The outcome represented by the Paris Agreement, that a bottom-up approach is taken on enabling each country to choose its nationally determined contribution with presently very weak or even no compliance, was the only possibility, given the state of many governments (including the United States) generally not being ready or willing or able to undertake legally binding targets.
It can be expected that developed countries will pile pressure on developing countries, especially emerging economies, and also try to shift or avoid their obligations. For the developing countries, they should invoke the overall context of what will make a low-carbon pathway a reality finance, technology transfer, capacity building plus adaptation, loss and damage, all in the context of sustainable development and poverty eradication. They must also remain firm and united in the negotiations and other processes ahead, starting from now, even before the signing and ratification of the Agreement.
Meenakshi Raman is Senior Legal Adviser and Coordinator of the Climate Change Programme of the Third World Network.
The contribution of Martin Khor is gratefully acknowledged. | <urn:uuid:b7f59e9f-c8f2-42cf-a73e-33beab4446d2> | CC-MAIN-2019-43 | https://twnetwork.org/climate-change/climate-change-battle-paris | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986677230.18/warc/CC-MAIN-20191017222820-20191018010320-00114.warc.gz | en | 0.966627 | 1,646 | 2.5625 | 3 |
New audacious mission specialists NASA launched on 9 September, at 2.50 am Moscow time from Cape Canaveral went camera OSIRIS-REx for the extraction of soil from the asteroid Bennu. Not landing, he will only touch the stone blocks of the robotic arm to take samples and bring them to the Ground.
To space OSIRIS-REx went on the Atlas V rocket To an asteroid flight would be two years. By 2018, the apparatus should be out on the solar orbit, which rotates Benn, to catch up with him and take samples, but not immediately, and only in 2020. Well, after the way home with 2 kilos of alien substances, which American scientists had already promised to give to all the world’s leading laboratories, as was once done with the lunar regolith. It is believed that inside of Bennu, which is approximately equal to the age of the Earth – 4.5 billion years — it may contain the answer to the question about the origin of life on our planet. The aircraft’s return to Earth is scheduled for 2023.
Why chosen mission asteroid Bennu, because in the Solar system, flying more than 500 thousand asteroids known to scientists? He chose from the objects near-Earth similar Earth orbits (low inclination) and a diameter of more than 200 meters. This factor was important because the speed of rotation of the body with diameter less than 200 meters is very high, and it would prevent the mechanical arm of the apparatus to capture soil samples. Besides Benn, was approached by researchers from the point of view of its chemical composition. We had to choose the one that is rich in carbon and has not undergone significant changes since its formation 4 billion years ago. This condition for potential preservation of organic molecules, volatile substances and amino acids, which may be the predecessors of life on Earth.
Benn turns around the Sun every 436 604 days (1.2 years) and every 6 years comes very close to the Ground within 0.002 AU (about 300 thousand kilometers). | <urn:uuid:d4dc0b67-e712-4b2c-a1ff-4c69f6b7f69e> | CC-MAIN-2018-05 | http://the-newspapers.com/2016/09/09/asteroid-bennu-will-help-solve-the-mystery-of-the-origin-of-life-on-earth | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886436.25/warc/CC-MAIN-20180116125134-20180116145134-00011.warc.gz | en | 0.954118 | 414 | 2.8125 | 3 |
Most Important Inequality Questions for IBPS Clerk Exam 2019
IBPS CLERK Exam 2019 is going to be conducted; we hope all have been preparing well for the mains exam. So, to aid your preparation, we are providing a free PDF of Important Questions of Inequality for IBPS Clerk Prelims Exam 2019. These important questions will definitely help you to crack the IBPS CLERK Exam.
Approach to solve Inequality questions:
- In these questions, you will be provided with a statement consisting of a group of elements. These elements will be having a certain coded relationship among them which is denoted by different inequality symbols like >, <, = etc.
- Whenever in a statement you get both the priority 2 in opposite order (A≥ B ≤C) there will be a conflict and thus no conclusion. If A ≥ B ≤C Then A ≤ C = False & C ≥ A = False. If A ≥ B ≥ C then A ≥ C = True, C ≤ A = True.
- For the sake of convenience, the relationship between certain statements and their meaning is given below in a tabular form.
|1.||A > B||A is Greater than B.|
|2.||A < B||A is Smaller than B|
|3.||A = B||A is Equals to B.|
|4.||A ≠ B||A is either greater than or smaller than B|
|5.||A ≥ B||A is Greater than or Equals to B|
|6.||A ≤ B||A is Smaller than or Equals to B|
Read More : | <urn:uuid:ae9c6d62-3306-4701-acfc-7391d5be351e> | CC-MAIN-2020-34 | https://www.makemyexam.in/most-important-inequality-questions-for-ibps-clerk-exam-2019-7070 | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736972.79/warc/CC-MAIN-20200806151047-20200806181047-00595.warc.gz | en | 0.915735 | 347 | 3.390625 | 3 |
Open-pit mining which is sometimes referred to as open cut mining, opencast mining or simply strip mining is a mining technique that extracts important minerals from a borrow or an open pit.
There are two types of mining methods commonly used in large scale mineral mining; open pit mining and tunneling. Open pit mining is used when the minerals to be mined are located just close to the surface. This is especially when the soil or material covering the minerals are relatively thin and can easily be moved for the mining to take place.
Open-pit mines are usually operated until either the mineral asset in them is depleted or expanding the mines becomes uneconomical to sustain. At such a point when this happens, the depleted mines are in some cases changed over to landfills for disposal of wastes.
Some type of water control is generally required to keep the pits for the open pit mine from turning into a lake; this is especially important if the mine is located in a climate with considerable precipitation or if the geological makeup of the mine allows for underground water movement.
Extraction of the Mine
Open-cast mines are burrowed on benches, which depict vertical levels of the pit. These benches are usually excavated at between four and sixty-meter intervals. The size of the benches depends on the size of bulldozers used to make them.
Most of the open pits mines used to produce building materials (quarries) are usually shallow and thus don’t have benches. The walls of the pits are excavated at an angle to minimize the dangers associated with having vertical walls such as falling rocks. This is determined the nature of the rocks especially their weathering and structural weaknesses such as foliations, shears, and faults within the area.
The walls to the pits are usually stepped. The flat part of the wall steps is known as the berm or bench while the slanted segment of the walls is known as the batter. The creation of steps in the walls is meant to help prevent rocks falling. Sometimes rock bolts, shotcretes, and cable bolts are used to create additional support for the walls. De-watering drills might be used to help mitigate water weight by boring on a level plane into the walls, which might affect the strength of the walls.
Other than strong walls, open pit mines are made with a strong haul road which is generally built along the edge of the pit, in the form of a gradual slope up from the bottom of the pit on which trucks can drive up carrying both minerals and waste rocks. The waste rocks are heaped up on the surface, close to the edge of the open pit in what is commonly referred to as the waste dump. The waste dump is likewise layered and stepped, to slow down degradation.
The processed ore from an open pit mine is usually in a form of a slurry known as the tailings. This is pumped into a tailings dam or settling lake, where the water dissipates.
Tailings dams can be poisonous because of the presence of toxic materials such as unextracted sulfide minerals, several types of harmful minerals in the gangue, and most often cyanide which is utilized to treat gold ore using the heap leaching process. This poisonous materials can be harmful to the encompassing environment if not managed properly.
Rehabilitation of the Mine
When the mineral in the open pit is depleted, the mine need to undergo rehabilitation. Some of the time, abandoned open pits are used as dumping for solid waste. In the event that the mined ore contained sulfides it is secured with a layer of mud to be used avert access of rainwater and oxygen from the air, which can oxidize the sulfides to produce sulfuric acid. The mine is then covered with soils and vegetables planted over it to recover the natural look of the area.
Mine rehabilitation is an important step in the process of developing a mine, and most countries require a plan in place to to rehabilitate the land following a mining operation, although not all countries have the same requirements. 3rd world countries are generally much more relaxed about regulations than some of the major gold mining countries such as Canada, Australia, or the United States. | <urn:uuid:57540c66-1c7b-441d-88a4-8d8ebe5c74a6> | CC-MAIN-2020-05 | http://raregoldnuggets.com/?p=2158 | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251700988.64/warc/CC-MAIN-20200127143516-20200127173516-00364.warc.gz | en | 0.956778 | 850 | 3.734375 | 4 |
The USA "Way Of Life"
If you are planning to live, learn and grow in the United States, you already possess a well-known American characteristic—a sense of adventure! As an international student, you will experience many new and exciting things. In this section, we hope to prepare you for some of the adventures involved in living in the United States.
It is difficult, if not impossible, to discuss exactly what "Living in the U.S." means to everyone. American culture has been enriched by the values and belief systems of virtually every part of the world. From an international student's perspective, that diversity is very valuable. If you choose to live in a completely different environment, you may be challenged with new situations every day; but if you decide to live in a part of the U.S. that resembles your home country in some ways, you may find comfort in those similarities.
Learning more about yourself is perhaps the most important part of your decision to travel to the U.S. Once you know what you want to achieve, then you can identify the right place to study and live and grow in the States.
You probably expect that things will not be the same in the United States as they are in your home country; but are you prepared to deal with those differences? Learn More
Your interaction with other people—your social life—is an integral part of your stay in the United States. Learn More
Whether you are living on or off campus, in a city or suburb, you have many transportation options for getting around in in the US. Learn More
In this section, we explore money matters that you may encounter on a daily basis during your adventure in the United States. Learn More | <urn:uuid:9165e7f0-b9de-424e-a057-37eef4158a2e> | CC-MAIN-2015-14 | https://www.internationalstudent.com/study_usa/way-of-life/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131295993.24/warc/CC-MAIN-20150323172135-00109-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.957166 | 350 | 2.609375 | 3 |
The cyber attacks that paralyzed a handful of major South Korean websites earlier this year were almost certainly carried out by North Korea or parties allied with the country, computer security company McAfee said Tuesday in a report.
The company's analysis, carried out with the help of the South Korean and U.S. governments, is one of the most thorough yet published on the March attacks, and details how they were carried out, and why they were so difficult to counter.
In investigating the incident, the report draws clear parallels with a similar attack that knocked South Korean and U.S. websites offline in 2009 and comes to an unsettling conclusion: the attacks were likely designed to test South Korea's cyber defense and response, and could be the prelude of a much larger attack in the future.
The attack began on March 4 when thousands of computers started bombarding 14 websites with traffic. The sites included prominent government agencies, South Korean companies and the home page of U.S. Forces Korea. The method, called a DDoS (distributed denial of service) attack, is designed to overwhelm the sites with so many requests that they become overloaded. To genuine users they appear very slow or, in many cases, offline.
The computers that took part in the attack would have been earlier infected with a piece of malicious software that lay dormant waiting for instructions from control servers, which were themselves compromised computers. In the case of the March attack, these servers made up the middle layer of the infrastructure and were controlled by an additional tier of command computers.
Encryption was used throughout the system to make it more difficult to analyze the messages and computer code. In an extra step to make analysis even more difficult, multiple encryption algorithms were employed at different stages of the system.
The attacks lasted up to 10 days after which time the malicious software was programmed to self-destruct. Key files were deleted and overwritten, and then the master boot record of the disk on which they were stored was corrupted. This would leave the disk unusable, even for the legitimate owner of the computer being used.
After analyzing the attack and how it was carried out, researchers had one big question: Why would you build so much sophistication into software designed to carry out a pretty primitive attack?
"DDoS can be done with software from your local cyber criminal," said Dmitri Alperovitch, vice president of threat research for McAfee Labs, in a telephone interview. "The level of effort that went into this one far exceeds any DDoS botnets until now."
The attack didn't try to evade detection -- taking down major websites is guaranteed to draw attention -- but it did seek to impede analysis of the attack, said Alperovitch. The investigators concluded that the attack was political in nature and had a predetermined and narrow focus.
"It was to test the response of the South Korean government," he said. "When you look at who might do that, one actor jumps off the page. The North Korean government would want to see if a future conflict could have a cyber impact as well as a real-life impact."
McAfee didn't find any concrete evidence linking the attacks to North Korea, but Alperovitch said the company is convinced the attack was conducted by the government of the reclusive Asian nation or a group closely allied with it.
The same conclusion was reached by a South Korean government investigation into the attacks.
North and South Korea remain technically at war, having never signed a peace agreement at the close of the Korean War in 1953. The border between the two neighbors is one of the most heavily fortified in the world.
The 2011 attacks showed an additional degree of sophistication over the 2009 attacks, said McAfee. The March incident involved 14 target websites, less than a third of the 40 sites hit in 2009, and this time included no websites in the U.S.
"This time they dropped all the U.S. targets," he said. "They know taking down WhiteHouse.gov serves no purpose, and taking down NYSE.com doesn't impact the U.S. economy because they're hitting the website, not the trading system."
The narrower range of targets and enhancements to the command and control systems indicate the attackers learned several lessons from their first attempt in 2009, said Alperovitch. The lessons learned this time could further be developed to ensure greater success the next time around. | <urn:uuid:2e7fb5c4-287c-4051-8152-a1093387e0f0> | CC-MAIN-2017-34 | http://www.pcworld.com/article/235098/article.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106990.33/warc/CC-MAIN-20170820204359-20170820224359-00409.warc.gz | en | 0.980668 | 894 | 2.515625 | 3 |
Unism as a universal doctrine cannot be reduced to philosophy, but philosophy is one of its fundamental integral parts, and one certainly needs some general ideas to comprehend the unist approach to various applied areas. The illustration of the philosophical ideas of unism, as presented here, cannot serve as a guide to philosophy in general and the philosophy on unism in particular; it is far from any breadth and completeness. Still, just a little is better than nothing at all, and that is why I have decided to present the scattered notes as they are, without too much bothering about succession and congruence. The primary principle of unism is to do something rather than merely fancy it. So, here is a part of what could be done. | <urn:uuid:94128e7f-01ef-40ae-8191-d1902d23d858> | CC-MAIN-2019-22 | http://unism.narod.ru/phi/phie.htm | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232254889.43/warc/CC-MAIN-20190519141556-20190519163556-00242.warc.gz | en | 0.976145 | 149 | 2.546875 | 3 |
Guidelines for the Security of Information Systems and Networks - Key Aims and Principles
These Guidelines respond to an ever changing security environment by promoting the development of a culture of security - that is, a focus on security in the development of information systems and networks and the adoption of new ways of thinking and behaving when using and interacting within information systems and networks. The Guidelines signal a clear break with a time when secure design and use of networks and systems were too often afterthoughts. Participants are becoming more dependent on information systems, networks and related services, all of which need to be reliable and secure. Only an approach that takes due account of the interests of all participants, and the nature of the systems, networks and related services, can provide effective security.
Each participant is an important actor for ensuring security. Participants, as appropriate to their roles, should be aware of the relevant security risks and preventive measures, assume responsibility and take steps to enhance the security of information systems and networks.
Promotion of a culture of security will require both leadership and extensive participation and should result in a heightened priority for security planning and management, as well as an understanding of the need for security among all participants. Security issues should be topics of concern and responsibility at all levels of government and business and for all participants. These Guidelines constitute a foundation for work towards a culture of security throughout society. This will enable participants to factor security into the design and use of all information systems and networks. They propose that all participants adopt and promote a culture of security as a way of thinking about, assessing, and acting on, the operations of information systems and networks.
These Guidelines aim to:
- Promote a culture of security among all participants as a means of protecting information systems and networks.
- Raise awareness about the risk to information systems and networks; the policies, practices, measures and procedures available to address those risks; and the need for their adoption and implementation.
- Foster greater confidence among all participants in information systems and networks and the way in which they are provided and used.
- Create a general frame of reference that will help participants understand security issues and respect ethical values in the development and implementation of coherent policies, practices, measures and procedures for the security of information systems and networks.
- Promote co-operation and information sharing, as appropriate, among all participants in the development and implementation of security policies, practices, measures and procedures.
- Promote the consideration of security as an important objective among all participants involved in the development or implementation of standards.
1) Awareness: Participants should be aware of the need for security of information systems and networks and what they can do to enhance security.
Awareness of the risks and available safeguards is the first line of defence for the security of information systems and networks. Information systems and networks can be affected by both internal and external risks. Participants should understand that security failures may significantly harm systems and networks under their control. They should also be aware of the potential harm to others arising from interconnectivity and interdependency. Participants should be aware of the configuration of, and available updates for, their system, its place within networks, good practices that they can implement to enhance security, and the needs of other participants.
2) Responsibility: All participants are responsible for the security of information systems and networks.
Participants depend upon interconnected local and global information systems and networks and should understand their responsibility for the security of those information systems and networks. They should be accountable in a manner appropriate to their individual roles. Participants should review their own policies, practices, measures, and procedures regularly and assess whether these are appropriate to their environment. Those who develop, design and supply products and services should address system and network security and distribute appropriate information including updates in a timely manner so that users are better able to understand the security functionality of products and services and their responsibilities related to security.
3) Response: Participants should act in a timely and co-operative manner to prevent, detect and respond to security incidents.
Recognising the interconnectivity of information systems and networks and the potential for rapid and widespread damage, participants should act in a timely and co-operative manner to address security incidents. They should share information about threats and vulnerabilities, as appropriate, and implement procedures for rapid and effective co-operation to prevent, detect and respond to security incidents. Where permissible, this may involve cross-border information sharing and co-operation.
4) Ethics: Participants should respect the legitimate interests of others.
Given the pervasiveness of information systems and networks in our societies, participants need to recognise that their action or inaction may harm others. Ethical conduct is therefore crucial and participants should strive to develop and adopt best practices and to promote conduct that recognises security needs and respects the legitimate interests of others.
5) Democracy: The security of information systems and networks should be compatible with essential values of a democratic society.
Security should be implemented in a manner consistent with the values recognised by democratic societies including the freedom to exchange thoughts and ideas, the free flow of information, the confidentiality of information and communication, the appropriate protection of personal information, openness and transparency.
6) Risk assessment: Participants should conduct risk assessments.
Risk assessment identifies threats and vulnerabilities and should be sufficiently broad-based to encompass key internal and external factors, such as technology, physical and human factors, policies and third-party services with security implications. Risk assessment will allow determination of the acceptable level of risk and assist the selection of appropriate controls to manage the risk of potential harm to information systems and networks in light of the nature and importance of the information to be protected. Because of the growing interconnectivity of information systems, risk assessment should include consideration of the potential harm that may originate from others or be caused to others.
7) Security design and implementation: Participants should incorporate security as an essential element of information systems and networks.
Systems, networks and policies need to be properly designed, implemented and co-ordinated to optimise security. A major, but not exclusive, focus of this effort is the design and adoption of appropriate safeguards and solutions to avoid or limit potential harm from identified threats and vulnerabilities. Both technical and non-technical safeguards and solutions are required and should be proportionate to the value of the information on the organisation’s systems and networks. Security should be a fundamental element of all products, services, systems and networks, and an integral part of system design and architecture. For end users, security design and implementation consists largely of selecting and configuring products and services for their system.
8) Security management: Participants should adopt a comprehensive approach to security management.
Security management should be based on risk assessment and should be dynamic, encompassing all levels of participants’ activities and all aspects of their operations. It should include forward-looking responses to emerging threats and address prevention, detection and response to incidents, systems recovery, ongoing maintenance, review and audit. Information system and network security policies, practices, measures and procedures should be co-ordinated and integrated to create a coherent system of security. The requirements of security management depend upon the level of involvement, the role of the participant, the risk involved and system requirements.
9) Reassessment: Participants should review and reassess the security of information systems and networks, and make appropriate modifications to security policies, practices, measures and procedures.
New and changing threats and vulnerabilities are continuously discovered. Participants should continually review, reassess and modify all aspects of security to deal with these evolving risks. | <urn:uuid:37849a4b-084c-4245-831f-efc6e9d2dc04> | CC-MAIN-2022-27 | https://www.galexia.com/public/research/articles/research_articles-art21.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104660626.98/warc/CC-MAIN-20220706030209-20220706060209-00513.warc.gz | en | 0.92868 | 1,538 | 2.859375 | 3 |
It has been acknowledge that Globalization have driven many changes in many spectrum of the economy. As such the learning paradigm needs to be reshaped in tandem and evolve, so as to meet the new challenges. The education of a country’s citizen is therefore a critical factor in determining its future.
With a vision of amplifying knowledge, skills and abilities, we believe SMNO Education Bureau would be able to add-value and complement the current quality driven education system hence providing a strong foundation and comprehensiveness of a broad base education in Singapore.
With that strong beliefs,Singapore Malay National Organisation (SMNO) will be re-opening its Tuition Scheme, integrated with the Social and Emotional Learning (SEL) approach, to primary school students.
The SMNO Tuition Scheme, or Ikhlas (Sincerity) Project, is managed by the Education Bureau of SMNO spearheaded by myself and assisted by a team of experience, well qualified tutors and motivational trainers.
Social and Emotional Learning (SEL) is an umbrella term that refers to students' acquisition of skills to recognize and manage emotions, develop care and concern for others, make responsible decisions, establish positive relationships, and handle challenging situations effectively.
Briefly it refers to skills to manage self, relate to others and make decisions.
We strongly believe Social and Emotional competencies help students to achieve his or her academic best.
-Self Management skills like impulse control and stress management help students to priortize. It also helps them to deal with negative emotions like anger and anxiety, so that they can concentrate better in class.
-Relationship Management skills help students to reduce interpersonal conflicts that result in negative emotions. These skills also enable students to be more effective in obtaining the help they need from others for their studies.
-Moral Education via Culture and Religion. Instill principle, code of acceptable behavior and conduct via teaching of ISLAM.
All of which would be further reitierate to the students via our Motivational Approach
- Help motivate your child/student to be their best (Establishing Mentorship and Moral Support group)
- Use tools that are innovative for learning and effective (Mutlimedia,video, photo, graphic and etc)
- Equip with practical and effective study skills
We want to equip students with the ideal learning skills, besides instilling the importance of education in their lives. In short, we intend to make learning meaningful and fun for them.
Details of Ikhlas Project
Fee: $10 per month only for Four Subjects [English Language, Malay Language, Mathematics and Islamic Foundation Studies] Student intake for all levels are capped at 150 in total.
Classes will be held every Saturday for 42 weeks, except the June and December holidays at the SMNO building in Eunos.
Students will be categorised as follows:
Level 1: Primary One and Primary Two [2.30pm till 4.30pm]
Level 2: Primary Three and Primary Four [5.00pm till 7.00pm]
Level 3: Primary Five and Primary Six [7.30pm till 9.30pm]
Enrichment Classes will also be offered to students who wish to develop their skills further. This is separate and additional to that off Iklas Project. For more details do contact us at 6447 0468 or 6345 5275.
The public may get their registration forms from the SMNO Secretariat at 218F, Changi Road, PKMS Building, Singapore 419737. The office is open Mondays to Fridays, 10am to 5pm. Email completed forms to [email protected] or fax to 6345 8724. | <urn:uuid:7e5b6abf-0a59-47b6-899e-6dfcac51eebb> | CC-MAIN-2018-13 | http://abdulmutalibithnin.blogspot.com/2011/12/launch-of-pkmssmno-education-programmes.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257650730.61/warc/CC-MAIN-20180324151847-20180324171847-00172.warc.gz | en | 0.936358 | 764 | 2.578125 | 3 |
- Author: Lynn M. Sosnoskie
A drive around parts of the San Joaquin Valley revealed some fields with Palmer amaranth (Amaranthus palmeri) rising above the crop canopy (See image below).
A male Palmer amaranth in a corn field in Merced County
Palmer amaranth is a tall (growing up to 10 feet in height), dioecious (male and female flowers develop on separate plants), summer annual that grows rapidly and produces significant amounts of seed (upwards of 400,000-1,000,000 per female plant). The species is extremely competitive with many crops, including corn and cotton. In the United States, Palmer amaranth populations with resistances to the ALS inhibitors (WSSA 2), EPSPS inhibitors (WSSA 9), HPPD inhibitors (WSSA 27), micotubule inhibitors (WSSA 3), PPO inhibitors (WSSA 14), and PSII inhibitors (WSSA 5) have been documented; this includes populations with resistances to two or more sites of action (http://weedscience.org/). In California (CA), glyphosate resistance has been confirmed, although the geographic distribution of the trait is largely unknown.
Hand-weeding is a common strategy for weed management in many CA crops. However, Palmer amaranth plants that have survived hand-weeding attempts have been known to re-grow and produce seed, sometimes in significant quantities. In 2014, my colleagues at the University of Georgia and I published a paper specifically looking at the intensity of defoliation on subsequent Palmer amaranth development (Sosnoskie et al. 2014 Ann Appl Biol 165:147-154) to address concerns that growers were having with late-season seed set following management efforts. With respect to the methodology: when Palmer amaranth began to flower (which was 8 weeks after cotton planting (PHY 375)), 10 pigweed plants per 25 feet of row were cut back to 1) the soil line, 2) ~1 inch above the soil line, and 3) ~6 inches above the soil line; a set of plants were left untreated as a control population. Weed heights were measured for up to 6 weeks following cutting. At cotton defoliation, seed was collected from the surviving female Palmer amaranth plants and the amounts and viability were quantified.
Plant survival, re-growth, and seed production were directly affected by the cutting height. 95% of the plants that were cut back to ground level died as compared to 64% of the plants cut back to 1 inch above the soil line and 35% of the plants cut back to 6 inches above the soil line. Palmer amaranth plants that survived the cutting treatments grew (from adventitious stem buds) to final heights of 40 inches (6 inch cutting treatment), 15 inches (1 inch cutting treatment) and <1 inch (cut to ground level). Comparatively, the untreated plants grew to heights of 86 inches. With respect to seed production, female plants in the control plots produced, on average, 400,000 seeds per plant; surviving plants cut back to 6 inches, 1 inch, and to the soil line produced approximately 100,000 seeds per plant, 35,000 seeds per plant, and 700 seeds per plant, respectively. Seed viability was not affected by cutting treatments (Mean germination = 76%).
While cotton yield can directly benefit from the removal of Palmer amaranth plants, the intensity of defoliation and stem removal could also have an impact future weed populations. To reduce the potential for competitive interference in subsequent crops, care must be taken to prevent as many seeds as possible from returning to the seed bank. Similarly, to minimize the risk of developing herbicide-resistant weeds and to manage existing populations, soil seed bank populations must also be addressed. Growers, farm managers, and crop advisors should be aware that hand-weeding failures can and do occur and that viable seed production can occur from Palmer amaranth plants that survive defoliation attempts.
Sosnoskie, L.M., T.M. Webster, T.L. Grey, and A.S. Culpepper. 2014. Severed stems of Amaranthus palmeri are capable of regrowth and seed production in Gossypium hirsutum. Annals of Applied Biology 165:147-154.
For more information about identifying commonly occurring pigweeds in California, please refer to this blog post: http://ucanr.edu/blogs/blogcore/postdetail.cfm?postnum=27501
This post is also hosted at the Agronomy and Weed Science Blog
which is an extension of the Agronomy and Weed Science program at UCCE Merced County | <urn:uuid:85ea86dc-1980-41f6-84d8-455d8e3157fe> | CC-MAIN-2020-10 | https://ucanr.edu/blogs/blogcore/postdetail.cfm?postnum=27583 | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144429.5/warc/CC-MAIN-20200219214816-20200220004816-00450.warc.gz | en | 0.950953 | 977 | 3.046875 | 3 |
LONDON (AP) — A group of researchers claim they've found the most distant explosion ever detected, a pulse of high energy radiation sent by a disintegrating star near the very edge of the observable universe.
The stellar blast was first spotted by a NASA satellite in April 2009, but researchers announced Wednesday that they have since gathered data placing it more than 13 billion light years away — meaning that the event took place when the universe was still in its infancy.
Andrew Levan, one of the scientists behind the discovery, said this blast from the past blew open a window onto the universe's early years, showing that massive stars were already dying within the first few hundred million years of the birth of the universe.
This particular explosion wasn't a supernova but a gamma ray burst, the name given to a short but powerful pulse of high energy radiation. Such bursts, thought to result from the collapse of massive stars into black holes, shoot jets of energy across the universe.
Charles Meegan, a researcher in gamma ray astronomy, said that a typical burst "puts out in a few seconds the same energy expended the sun in its whole 10 billion year life span."
"You can't get your arms around that very easily," he said. "I can't. And I've been thinking about it for decades."
Not only are gamma ray bursts more powerful than supernovae, they're faster too — typically lasting only a few seconds or minutes. They work differently as well. Whereas a supernova spreads its radiation all around, gamma ray bursts shoot it out in narrow beams, like a laser, which can make them hard to detect.
NASA's Neil Gehrels, who serves as the lead scientist on Swift, the gamma-ray detecting satellite which first picked the distant burst's signal, said that "we only see about one in 1,000 of all the gamma ray bursts that go off."
So when a promising one comes along, scientists take note.
Levan said he was at an early morning meeting in Sweden on April 29, 2009, when his phone went off, alerting him to the explosion. From that moment on, it was a race against time. Gamma ray bursts come and go far too quickly for telescopes, but their afterglows linger for a little while longer and can be analyzed by astronomers.
Levan rushed out of the meeting.
"Fortunately the office was next door," he said. "So I was able to rush into the building and get online."
There Levan got a little less lucky. Some of the world's most powerful telescopes were soon tasked with tracking the burst, but the view from Chile's La Silla Observatory was hampered by unfavorable atmospheric conditions, while two Hawaiian telescopes — Gemini North and the United Kingdom Infrared Telescope — were buffeted by high winds. Chile's Very Large Telescope managed to train its eye on the sky for a while, but by then it was already getting light.
The glitches deprived Levan's team of some important data, but they spent the next two years painstakingly trying to build context and double-check their observations. His paper, due to published soon in Astrophysical Journal, stated with 90 percent certainty that the gamma ray burst had been spotted between 13.11 billion and 13.16 billion light years away.
Gehrels, whose satellite identified the burst but who wasn't involved in drawing up the paper, said he believed Levan was right — praising his team's "careful analysis."
But other outside experts said they were skeptical. Richard Ellis, a professor of astronomy at the California Institute of Technology, called the discovery "potentially very exciting" but said that there wasn't enough data to justify such a bullish estimate. In any case, he warned of the difficulties associated with peering across such a vast distance.
"This is plonk at the frontier, where we have very little idea what's going on," he said.
Richard McMahon, a professor of astronomy at Cambridge University, made a similar point, pointing out that the mechanics of how gamma ray bursts occurred were still too little understood to rule out the possibility that some other factor could be at play.
"There are still some surprises in store for us," he predicted.
Levan teaches astronomy at the University of Warwick, near the English city of Birmingham. The paper's lead author, Antonio Cucchiara, is at University of California, Berkeley. The paper counts 31 other co-authors.
NASA Swift Homepage: http://heasarc.nasa.gov/docs/swift/swiftsc.html
Raphael G. Satter can be reached at: http://twitter.com/razhael | <urn:uuid:b1b41bc4-a68f-47a5-8a41-242c8a23724f> | CC-MAIN-2015-40 | http://cnsnews.com/news/article/farthest-ever-explosion-found-edge-cosmos | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736672328.14/warc/CC-MAIN-20151001215752-00079-ip-10-137-6-227.ec2.internal.warc.gz | en | 0.971684 | 962 | 3.171875 | 3 |
You feel a headache coming on from a long day at the office ... your knee is aching from your morning jog ... when reaching into your medicine cabinet for common painkillers, you may not have realized that you were taking a non-steroidal anti-inflammatory drug (NSAID), a category of medications helpful for reducing pain and inflammation.
More than 23 million Americans take NSAIDs on a daily basis, including common over-the-counter medications like generics ibuprofen and naproxen. Additionally, between 2010 and 2011, doctors wrote 96 million prescriptions for NSAIDs. For most patients, these medications are safe and effective when used correctly. However, when used incorrectly, they can lead to serious consequences that may affect the kidneys, heart and digestive system (stomach, small intestines, colon, etc.).
“Like all medications, NSAIDs can cause side effects. Taking NSAIDs at high doses or for an extended period of time can put patients at risk, as can not treating pain adequately,” said Dr. Bill McCarberg, president of the Alliance for Rational Use of NSAIDs. “Furthermore, many patients are not aware that many medications they may take on a daily basis are NSAIDs. That’s why spreading awareness about the appropriate use of NSAIDs is so crucial.”
Up to half of all regular NSAID users experience problems with their digestive system that may include nausea, stomach pain, ulcers and increased bleeding. Each year, these complications result in 100,000 hospital visits. Kidney problems resulting from improper NSAID use can include edema – swelling caused by an excess of fluid in the body – kidney failure and high blood pressure. Elderly patients and those who already have kidney problems can be at higher risk for these side effects. Cardiovascular risks can be especially severe, including heart attack, stroke and in some cases death.
“To ensure appropriate and safe NSAID use, the Alliance for Rational Use of NSAIDs recommends that patients take the lowest effective dose for the shortest period of time required for relief,” said Dr. McCarberg. “Being educated about all the types of medications you’re taking is also an important step in responsible use.”
Doing something as simple as reading the label on a medication bottle can help ensure responsible use. Knowing when you’re taking an NSAID can help prevent taking more than one NSAID inadvertently. Making sure your physician knows about all of the medications – prescription and over-the-counter – you’re taking can also help avoid adverse drug reactions. And a pharmacist can be a great resource for information about medication safety.
“NSAIDs can be very helpful and effective, and patients should always consult with their physician or pharmacists about the potential side effects of any medication they are taking, including NSAIDs,” Dr. McCarberg said. “I encourage patients to take charge of their own health, and become advocates for ensuring that they and their families are using medications safely.”
For more information, please visit www.nsaidalliance.com. | <urn:uuid:54c25019-f1f0-47c7-9538-38cbc3a70fe7> | CC-MAIN-2016-36 | http://www.bcrnews.com/articles/ara/2013/06/26/8080030101/index.xml | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982293615.23/warc/CC-MAIN-20160823195813-00247-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.942996 | 639 | 2.953125 | 3 |
Finished and partially-made shell fishhooks and 'blanks' cut from heavy turban shells, Turbo torquatus, for making hooks have been found in several Aboriginal middens in the Sydney region.
Fishhooks used around coastal Sydney were curved but not barbed. They were usually made from shell but wood, bird talons and possibly bone were used. The sheen from the pearl-like inner surface of turban shells may have acted as a lure for the fish. The fish hooks were made by women.
The archaeological record suggests there were five stages to making a shell fishhook:
Stage 1: one or more oval-shaped 'blanks' were cut from each shell. The edges of these blanks were partly smoothed by filing.
Stage 2: the outer (convex) surface of the blank was ground down, probably on a flat stone, until its centre was very thin or worn through.
Stage 3: a hole was made (if the centre was not worn through) or enlarged (if the centre was worn through) by chipping out the thinned centre of the shell until there was only a ring of shell left.
Stage 4: the rough shape of the final fishhook was formed by removing a small part of the ring.
Stage 5: the final hook is formed by filing the inside smooth, finishing the point and notching the longer end where the line was tied.
Small, pointed ground stone files (often referred to as fishhook files) which were used in making the hooks, have been found in shell middens of the same age and geographic distribution as the shell fishhooks. These files were also used to work wood and perhaps bone. | <urn:uuid:a33d7b44-3c65-4de2-95a3-7957283a796f> | CC-MAIN-2022-40 | https://australian.museum/learn/cultures/atsi-collection/sydney/fishhooks-bera/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337371.9/warc/CC-MAIN-20221003003804-20221003033804-00636.warc.gz | en | 0.990549 | 352 | 3.71875 | 4 |
|Eyewitness Identification Research Laboratory
At the University of Texas at El Paso
Lineup Fairness as Procedural Safeguard.
Including additional persons in the lineup along with the suspect is a safeguard against false identification. In order for the safeguard to be effective these two closely related conditions should be achieved:
• The fillers should be good alternatives to the suspect, and
• The suspect should not stand out from the other lineup members.
If the first is achieved the second should follow. From these conditions others can be derived. For example, the suspect in a lineup should not be identifiable by non-witnesses or by persons who know (remember) only his general description - because the fillers will have been chosen in the first place because they are similar to the suspect. If non-witnesses can reliably choose the suspect from a lineup, then the lineup violates the principle that the suspect should not stand out from the fillers. Instead it is biased towards the suspect, fails as a safeguard, and is unfair.
Compared with showing a witness the suspect alone (a "show-up"), placing a suspect in a lineup reveals some important possibilities:
* If a witness identifies the suspect, surmounting the higher bar instituted by the safeguard, the case for the prosecution is markedly strengthened. But only if the lineup was fair: if it's a biased lineup it's not possible to interpret the meaning of the identification.
* If a witness identifies someone other than the suspect, the suspect may be eliminated from investigation, and/or the investigation may be redirected towards other possible suspects. Alternatively, the quality of the witness’ evidence (memory) may be re-evaluated.
* If an identification is not made the witness may not have a very good memory and/or may be unwilling to identify someone they’re not sure of. Alternatively, the eyewitness may have a good memory and know that the offender is not in the lineup.
* A properly constructed lineup protects an innocent suspect from a witness with little visual identification information who nonetheless feels constrained to identify someone, and at the same time allows a witness with good visual identification information to identify the offender if he is present.
Of course all of these points are based on the assumption that the fillers are good alternatives to the suspect, and its corollary that the suspect does not stand out from the fillers. When you think about it, this is obvious. If the suspect stands out, then it would be easy for a witness with no memory of the offender at all to know which person in the lineup is the investigator's suspect, even if he were innocent!
The evidence from research on these issues supports the conclusion that properly constructed lineups impose little or no handicap on the identification of the guilty, while offering substantial protection against false identification of innocent suspects. | <urn:uuid:51eaf4aa-b999-4a6a-a008-6035beae1ffa> | CC-MAIN-2013-48 | http://eyewitness.utep.edu/consult05A.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164009894/warc/CC-MAIN-20131204133329-00041-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.937041 | 579 | 2.75 | 3 |
You could argue that Waymo, the self-driving subsidiary of Alphabet, has the safest autonomous cars around. It’s certainly covered the most miles. But in recent years, serious accidents involving early systems from Uber and Tesla have eroded public trust in the nascent technology. To win it back, putting in the miles on real roads just isn’t enough.
So today Waymo not only announced that its vehicles have clocked more than 10 million miles since 2009. It also revealed that its software now drives the same distance inside a sprawling simulated version of the real world every 24 hours—the equivalent of 25,000 cars driving 24/7. Waymo has covered more than 6 billion virtual miles in total.
This virtual test track is incredibly important to Waymo’s efforts to demonstrate that its cars are safe, says Dmitri Dolgov, the firm’s CTO. It lets engineers test the latest software updates on a wide variety of new scenarios, including situations that haven’t been seen on real roads. It also makes it possible to test scenarios that would be too risky to set up for real, like other vehicles driving recklessly at high speed.
“Let’s say you’re testing a scenario where there’s a jaywalker jumping out from a vehicle,” Dolgov says. “At some point it becomes dangerous to test it in the real world. This is where the simulator is incredibly powerful.”
Unlike human drivers, autonomous cars rely on training data rather than real knowledge of the world, so they can easily be confused by unfamiliar scenarios.
But it is not easy to test and prove machine-learning systems that are complex and can behave in ways that are hard to predict (see “The dark secret at the heart of AI”). Letting the cars gather vast amounts of usable training data from a virtual world helps train these systems.
“The question is whether simulation-based testing truly contains all the difficult corner cases that make driving challenging,” says Ramanarayan Vasudevan, an assistant professor at the University of Michigan who specializes in autonomous-vehicle simulation.
To explore as many of these rare cases as possible, the Waymo team uses an approach known as “fuzzing,” a term borrowed from computer security. Fuzzing involves running through the same simulation while adding random variations each time, to see if these perturbations might cause accidents or make things break. Waymo has also developed software that ensures the vehicles don’t depart too much from comfortable behavior in the simulation—by braking too violently, for example.
Besides analyzing real and simulated driving data, Waymo tries to trip its cars up by engineering odd driving scenarios. At a test track at Castle Air Force Base, in central California, testers throw all sorts of stuff at the cars to confuse them: everything from people crossing the road dressed in wild Halloween costumes to objects falling from the backs of passing trucks. Its engineers have also tried cutting the power lines to the main control system to make sure the fallback will step in correctly.
Waymo is making progress. In October last year, it became the first company to remove safety drivers from some of its vehicles. Around 400 people in Phoenix, Arizona, have been using these truly autonomous robo-taxis for their daily drives.
However, Phoenix is a fairly straightforward environment for autonomous vehicles. Moving to less temperate and more chaotic places, like downtown Boston in a snowstorm, will be a huge step up for the technology.
“I’d say the Waymo deployment in Phoenix is more like Sputnik rather than full self-driving in Michigan or San Francisco, which I’d argue would be closer to an Apollo mission,” says Vasudevan.
The situation facing Waymo and other self-driving-car companies remains, in fact, a neat reminder of the big gap that still exists between real and artificial intelligence. Without many billions more miles of real and virtual testing, or some deeper level of intelligence, self-driving cars are always liable to trip up when they come across something unexpected. And firms like Waymo cannot afford that kind of uncertainty.
A Roomba recorded a woman on the toilet. How did screenshots end up on Facebook?
Robot vacuum companies say your images are safe, but a sprawling global supply chain for data from our devices creates risk.
The viral AI avatar app Lensa undressed me—without my consent
My avatars were cartoonishly pornified, while my male colleagues got to be astronauts, explorers, and inventors.
Roomba testers feel misled after intimate images ended up on Facebook
An MIT Technology Review investigation recently revealed how images of a minor and a tester on the toilet ended up on social media. iRobot said it had consent to collect this kind of data from inside homes—but participants say otherwise.
How to spot AI-generated text
The internet is increasingly awash with text written by AI software. We need new tools to detect it.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more. | <urn:uuid:eabea681-316e-46d6-ae90-b7b7015a344c> | CC-MAIN-2023-06 | https://www.technologyreview.com/2018/10/10/139862/waymos-cars-drive-10-million-miles-a-day-in-a-perilous-virtual-world/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499710.49/warc/CC-MAIN-20230129080341-20230129110341-00391.warc.gz | en | 0.937301 | 1,080 | 2.796875 | 3 |
This report is the 2015 'Trends and projections' version from the European Environment Agency (EEA), providing an updated assessment of progress made by the European Union (EU) and European countries towards their climate mitigation and energy objectives. It also presents some analysis of the progress made at EU level in meeting longer-term policy objectives, where relevant data are available.
According to the report, the EU is heading for a 24% reduction by 2020 with current measures in place, and a 25% reduction with additional measures already being planned in Member States (MS). The EU is already working towards its 2030 goal of an emissions reduction target of at least 40% — the EU's contribution towards the new global climate change agreement in Paris in December 2015.
The report also shows that, while the EU is on track, the situation among MS differs significantly:
- 24 MS are on track to meet their GHG targets;
- 20 MS are on track to achieve their renewable energy targets;
- 20 MS are on track to achieve their energy efficiency targets;
- 13 MS are on track to deliver on their national targets in all three areas.
The data show an improvement on 2014, where only 9 MS were on track to deliver on their national targets in all three areas. Furthermore, most MS that were on track to their national target in 2014 remain on track in 2015.
To download the report, please visit the relevant EEA website: http://www.eea.europa.eu/publications/trends-and-projections-in-europe-2015 | <urn:uuid:a7bf98bc-7d53-40fe-a994-19fb9734814d> | CC-MAIN-2019-18 | http://www.buildup.eu/pl/node/46322 | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528481.47/warc/CC-MAIN-20190420020937-20190420042937-00149.warc.gz | en | 0.962125 | 321 | 2.71875 | 3 |
First Law of Thermodynamics
The First Law of Thermodynamics is a balance of the various forms of energy as they pertain to the specified thermodynamic system (control volume) being studied.
First Law of Thermodynamics - The First Law of Thermodynamics states:
Energy can neither be created nor destroyed, only altered in form. For any system, energy transfer is associated with mass and energy crossing the control boundary, external work and/or heat crossing the boundary, and the change of stored energy within the control volume. The mass flow of fluid is associated with the kinetic, potential, internal, and "flow" energies that affect the overall energy balance of the system. The exchange of external work and/or heat complete the energy balance. The First Law of Thermodynamics is referred to as the Conservation of Energy principle, meaning that energy can neither be created nor destroyed, but rather transformed into various forms as the fluid within the control volume is being studied. The energy balance spoken of here is maintained within the system being studied. The system is a region in space (control volume) through which the fluid passes. The various energies associated with the fluid are then observed as they cross the boundaries of the system and the balance is made. As discussed in previous chapters of this module, a system may be one of three types: isolated, closed, or open. The open system, the most general of the three, indicates that mass, heat, and external work are allowed to cross the control boundary. The balance is expressed in words as: all energies into the system are equal to all energies leaving the system plus the change in storage of energies within the system. Recall that energy in thermodynamic systems is composed of kinetic energy (KE), potential energy (PE), internal energy (U), and flow energy (PL); as well as heat and work processes. Σ (all energies in) = Σ (all energies out) + Δ(energy stored in system) For most industrial plant applications that most frequently use cycles, there is no change in storage (i.e. heat exchangers do not swell while in operation). In equation form, the balance appears as indicated on Figure 14.
Heat and/or work can be directed in to or out of the control volume. But, for convenience and as a standard convention, the net energy exchange is presented here with
the net heat exchange assumed to be into the system and the net work assumed to be out of the system. If no mass crosses the boundary, but work and/or heat
do, then the system is referred to as a "closed" system. If mass, work and heat do not cross the boundary (that is, the only energy exchanges
taking place are within the system), then the system is referred to as an isolated system. Isolated and closed systems are nothing more than specialized cases of the open system. In this text, the open system approach to the First Law of Thermodynamics will be emphasized because it is more general. Also, almost all practical applications of the first law require an open system analysis.
An understanding of the control volume concept is essential in analyzing a thermodynamic problem or constructing an energy balance. Two basic approaches exist in studying Thermodynamics: the control mass approach and the control volume approach. The former is referred to as the Le Grange approach and the latter as the Eulerian approach. In the control mass concept, a "clump" of fluid is studied with its associated energies. The analyzer "rides" with the clump wherever it goes, keeping a balance of all energies affecting the clump.
The control volume approach is one in which a fixed region in space is established with specified control boundaries, as shown in Figure 15. The energies that cross the boundary of this control volume, including those with the mass crossing the boundary, are then studied and the balance performed. The control volume approach is usually used today in analyzing thermodynamic systems. It is more convenient and requires much less work in keeping track of the energy balances. Examples of control volume applications are included in Figures 16-18.
The forms of energy that may cross the control volume boundary include those associated with the mass (m) crossing the boundary. Mass in motion has potential (PE), kinetic (KE), and internal energy (U). In addition, since the flow is normally supplied with some driving power (a pump for example), there is another form of energy associated with the fluid caused by its pressure. This form of energy is referred to as flow energy (Pν-work). The thermodynamic terms thus representing the various forms of energy crossing the control boundary with the mass are given as m (u + Pν + ke + pe).
In open system analysis, the u and Pν terms occur so frequently that another property, enthalpy, has been defined as h=u+Pν. This results in the above expression being written as m (h + ke + pe). In addition to the mass and its energies, externally applied work (W), usually designated as shaft work, is another form of energy that may cross the system boundary.
In order to complete and satisfy the conservation of energy relationship, energy that is caused by neither mass nor shaft work is classified as heat energy (Q). Then we can describe the relationship in equation form as follows.
Example 1 illustrates the use of the control volume concept while solving a first law problem involving most of the energy terms mentioned previously.
Example 1: Open System Control Volume
The enthalpies of steam entering and leaving a steam turbine are 1349 Btu/lbm and 1100 Btu/lbm, respectively. The estimated heat loss is 5 Btu/lbm of steam. The flow enters the turbine at 164 ft/sec at a point 6.5 ft above the discharge and leaves the turbine at 262 ft/sec. Determine the work of the turbine.
This example demonstrates that potential and kinetic energy terms are in significant for a turbine, since the delta(ape) and delta(kea) values are less than 1 Btu/lbm. When the system (the fluid being studied) changes its properties (temperature, pressure, volume) from one value to another as a consequence of work or heat or internal energy exchange, then it is said that the fluid has gone through a "process." In some processes, the relationships between pressure, temperature, and volume are specified as the fluid goes from one thermodynamic state to an other. The most common processes are those in which the temperature, pressure, or volume is held constant during the process. These would be classified as isothermal, isobaric, or isovolumetric processes, respectively. Iso means "constant or one." If the fluid passes through various processes and then eventually returns to the same state it began with, the system is said to have undergone a cyclic process. One such cyclic process used is the Rankine cycle, two examples of which are shown in Figure 19. The processes that comprise the cycle are described below.
ab: Liquid is compressed with no change in entropy (by ideal pump).
bc: Constant pressure transfer of heat in the boiler. Heat is added to the compressed liquid, two-phase, and super heat states.
cd: Constant entropy expansion with shaft work output (in ideal turbine).
da: Constant pressure transfer of heat in the sink. Unavailable heat is rejected to the heat sink (condenser).
Note the individual processes the fluid must go through before completing the complete cycle. Rankine cycles will be discussed in greater detail later in this module. Figure 20 shows a typical steam plant cycle. Heat is supplied to the steam generator (boiler) where liquid is converted to steam or vapor. The vapor is then expanded adiabatically in the turbine to produce a work output. Vapor leaving the turbine then enters the condenser where heat is removed and the vapor is condensed into the liquid state. The condensation process is the heat-rejection mechanism for the cycle. Saturated liquid is delivered to the condensate pump and then the feed pump where its pressure is raised to the saturation pressure corresponding to the steam generator temperature, and the high pressure liquid is delivered to the steam generator where the cycle repeats itself.
With the example complete, it seems appropriate to discuss the various components of a typical steam plant system. Although such a system is extremely complex, only the major components will be discussed. A typical steam plant system consists of: a heat source to produce the thermal energy (e.g. nuclear or fossil fuel); a steam generator to change the thermal energy into steam energy (a complete steam plant usually exists in connection with the steam generator in converting the steam into eventual electrical energy); pumps to transfer the fluid back to the heat source (reactor coolant pumps in a nuclear reactor); a pressurizer to ensure that the primary system maintains its desired pressure; and the necessary piping to ensure the fluid passes through each stage of its cyclic process. Of necessity, the steam plant is a large "closed" system. However, each component of the system is thermodynamically analyzed as an open system as the fluid passes through it. Of primary importance is the process of dissipating the energy created by the heat source. This process takes place in the steam generator, which acts as a giant two-phase heat generator.
The hot fluid from the heat source passes through the primary side of the steam generator where its energy is passed to the secondary side of the heat exchanger in such a manner as to create steam. The fluid, with its energy removed from the primary side, leaves the steam generator at a lower temperature, and is pumped back to the heat source to be "re-heated." Each major component of a steam plant can be treated as a separate open system problem. A thermodynamic analysis, using the various forms of energies discussed, can be applied to the particular component in studying its behavior. A simplified example of the thermodynamics involved in the steam generator is shown below.
Example 2: Open System -Steam Plant Component
Primary fluid enters the heat exchanger of a nuclear facility at 610°F and leaves at 540°F. The flow rate is approximately 1.38 x 108 lbm/hr. If the specific heat of the fluid is taken as 1.5 Btu/lbm°F, what is the heat transferred out of the steam generator?
The minus sign indicating heat out of the heat exchanger, which is consistent with the physical case. This example demonstrates that for a heat exchanger, the heat transfer rate
can be calculated using the equation
. It is important to note that the later equation can only be used when no phase change occurs since ΔT = 0 during a phase change. The first equation can be used for a phase change heat transfer process as well as for latent heat calculations.
The pumps used for returning the fluid to the heat source can be analyzed as a thermodynamic system also. One such example is illustrated in Example 3.
Example 3: Open System -Coolant
A power pump is used to return the fluid from the heat exchanger back to the core. The flow rate through the pump is about 3.0 x 107 lbm/hr with the fluid entering the pump as saturated liquid at 540°F. The pressure rise across the pump is 90 psia. What is the work of the pump, neglecting heat losses and changes in potential and kinetic energy?
Note: The minus sign indicating work put into the fluid by the pump. 1 hp = 2545 Btu/hr.
A thermodynamic balance across the reactor core gives an indication of the amount of heat removed by the coolant that is given off by the fuel rods.
Example 4: Thermodynamic Balance across Heat Source
In a particular facility, the temperature leaving the reactor core is 612°F, while that entering the core is 542°F. The coolant flow through the heat source is 1.32 x 108 lbm/hr. The cp of the fluid averages 1.47 Btu/lbm°F. How much heat is being removed from the heat source? The pe and ke energies are small compared to other terms and may be neglected.
For this example has been used to calculate the heat transfer rate since no ˙
phase change has occurred. However, Qm (hout-hin) could also have been used had
the problem data included inlet and outlet enthalpies.
The individual principal components of a reactor system have been thermodynamically analyzed. If all components were combined into an overall system, the system could be analyzed as a "closed" system problem. Such an analysis is illustrated in the following example.
Example 5: Overall Thermodynamic Balance
A nuclear facility (primary side) is to be studied as a complete system. The heat produced by the heat source is 1.36 x 1010 Btu/hr. The heat removed by the heat exchanger (steam generator) is 1.361 x 1010 Btu/hr. What is the required pump power to maintain a stable temperature?
Of the examples just completed, emphasis should be placed on the heat exchanger analysis. Both the primary side and the secondary side have their own energy balances as the heat energy is transferred from one fluid to the other. In calculating heat exchanger heat transfer rates, we
found that we could use the equations
Perhaps a short analysis of the secondary side of the heat exchanger will aid in understanding the heat exchanger’s importance in the energy conversion process.
Example 6: Secondary Side of Heat Exchanger
Steam flows through a condenser at 2.0 x 106 kg/hr, entering as saturated vapor at 40°C (h = 2574 kj/kg), and leaving at the same pressure as sub cooled liquid at 30°C (h = 125.8 kJ/kg). Cooling water is available at 18°C (h = 75.6 kJ/kg). Environmental requirements limit the exit temperature to 25°C (h = 104.9 kJ/kg). Determine the required cooling water flow rate.
In this example, we calculated the flow rate using the equation Q= mΔh since a phase change
occurred when the steam was condensed to liquid water. Q p ˙
mc ΔT would not have worked ˙since ΔT=0 for a phase change. Had we attempted to solve the problem using Q p=mc ΔT, we
˙would have discovered that an error occurs since the ΔT=10oC is the ΔT needed to subcool the liquid from saturation at 40oC to a subcooled value of 30oC. Therefore, the heat transfer process to condense the steam to a saturated liquid has not been taken into account. | <urn:uuid:832c4477-524d-4f2d-95d1-719bdcee97b7> | CC-MAIN-2015-35 | http://www.engineersedge.com/thermodynamics/first_law.htm | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065318.20/warc/CC-MAIN-20150827025425-00341-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.942837 | 3,046 | 3.390625 | 3 |
Race, gender and class have been central methods for dividing and classifying individuals in society for centuries. The impact of this division on human interaction, community development and individual identity is the subject of a new volume of essays edited by Kijana Crawford, associate professor of sociology/anthropology at Rochester Institute of Technology.
A New Age: Readings and Studies on Race, Gender and Class Using the Sociological Imagination features leading scholars in sociology, anthropology, history and political science and provides a blueprint for improving social divisions and reducing their impact on societal development through education and greater cultural and multi-cultural interaction.
“Sociology aids us in understanding what is real about society and social life,” notes Crawford. “The essays presented in A New Age provide new methods of thinking about and fixing the problems associated with race, gender and class in society.”
The book, published by Kendall Hunt, includes selections on the use of political cartoons to illuminate social divisions in society and an analysis of the impact of race, class and gender on the 2008 presidential election.
Crawford has spent over three decades as a scholar and educator working in the areas of race relations, women’s studies and society and culture. Her previous book, The We and the Us: Mentoring African American Females in Higher Education, details her research regarding mentoring initiatives and their impact on performance and happiness in the workplace. | <urn:uuid:3c378ce6-cee7-4e9b-8b44-f0e2bf4cec61> | CC-MAIN-2014-42 | http://www.rit.edu/news/story.php?id=47459 | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119649133.8/warc/CC-MAIN-20141024030049-00260-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.929489 | 287 | 2.625 | 3 |
The Sensing research thrust was engaged in developing and testing highly connected networks of Doppler radar hardware that transmit short-range microwave pulses into the lower atmosphere and measure numerous meteorological conditions at smaller scales and greater frequency than ever before. Our research defined, designed, fabricated, and field-tested solid-state, low-cost, rapid-scan, multi-beam radars, along with the unique collaborating configurations that connect these units to create DCAS systems.
The key parameters of these small-scale radars are transmitter power, beam requirements, antenna size, operating frequency, and bandwidth. The Sensing thrust conducted research into the interaction of electromagnetic waves with the atmosphere in both stormy environments and in clear weather. The team studied the physical mechanisms by which DCAS networks measure precipitation, detect winds, temperature, and humidity. View a multimedia presentation on the Sensing thrust and radars by Sandra Cruz Pol, CASA Associate Director, University of Puerto Rico Mayaguez. (Note: RealPlayer is required to view this presentation.) | <urn:uuid:436c4b9b-0afe-4ba4-9320-da27f0fa8615> | CC-MAIN-2017-13 | http://www.casa.umass.edu/main/casa-nsf/research/sensing/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190754.6/warc/CC-MAIN-20170322212950-00252-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.907332 | 209 | 2.96875 | 3 |
New research has shed light on the origin and extinction of a giant, shaggy Ice Age rhinoceros known as the Siberian unicorn because of its extraordinary single horn.
An international team of researchers from Adelaide, Sydney, London, the Netherlands, and Russia, have settled a long-standing debate about the relationship of the Siberian unicorn to living rhinos, and revealed that it survived much later than previously believed, overlapping in time with modern humans.
Published in the journal Nature Ecology and Evolution and led by London's Natural History Museum, the researchers say the Siberian unicorn became extinct around 36,000 years ago. This was most likely because of reduction in steppe grassland where it lived – due to climate change rather than the impact of humans.
Today there are just five surviving species of rhino, although in the past there have been as many as 250 species.
Weighing up to 3.5 tonnes with a single enormous horn, the Siberian unicorn (Elasmotherium sibiricum), which roamed the steppe of Russia, Kazakhstan, Mongolia, and Northern China, was undoubtedly one of the most impressive.
Genetic analyses performed at the University of Adelaide's Australian Centre for Ancient DNA (ACAD), however, have shown that the Siberian unicorn was the last surviving member of a unique family of rhinos.
"The ancestors of the Siberian unicorn split from the ancestors of all living rhinos over 40 million years ago," says co-author and ACAD researcher Dr. Kieren Mitchell, who analysed the DNA of the Siberian unicorn. It is the first time DNA has ever been recovered from E. sibiricum.
"That makes the Siberian unicorn and the African white rhino even more distant cousins than humans are to monkeys."
This new genetic evidence overturns previous studies that suggested the Siberian unicorn was a very close relative of the extinct woolly rhino and living Sumatran rhino.
It had long been assumed that the Siberian unicorn went extinct well before the last Ice Age, perhaps as much as 200,000 years ago.
In this study 23 Siberian unicorn bone specimens were dated, confirming that the species survived until at least 39,000 years ago, and possibly as late as 35,000 years ago. The Siberian unicorn's final days were shared with early modern humans and Neanderthals.
"It is unlikely that the presence of humans was the cause of extinction," says co-author Professor Chris Turney, climate scientist at the University of New South Wales.
"The Siberian unicorn appears to have been badly hit by the start of the ice age in Eurasia when a precipitous fall in temperature led to an increase in the amount of frozen ground, reducing the tough, dry grasses it lived on and impacting populations over a vast region."
Other species that shared the Siberian unicorn's environment were either less reliant on grass – like the woolly rhino – or more flexible in their diet – like the saiga antelope – and escaped the Siberian unicorn's fate, though the woolly rhino eventually became extinct 20,000 years later.
Explore further: When did the 'Siberian unicorn' disappear?
Pavel Kosintsev et al. Evolution and extinction of the giant rhinoceros Elasmotherium sibiricum sheds light on late Quaternary megafaunal extinctions, Nature Ecology & Evolution (2018). DOI: 10.1038/s41559-018-0722-0 | <urn:uuid:1bb581ea-3fc5-437c-8ffb-7aecffb9eafe> | CC-MAIN-2018-51 | https://phys.org/news/2018-11-climate-siberian-unicorn.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825098.68/warc/CC-MAIN-20181213193633-20181213215133-00255.warc.gz | en | 0.956473 | 710 | 4.125 | 4 |
By Mônica Favre, Ph.D., Frontiers Science Writer
Neuroscientists are on their way to turn a person’s thoughts into speech producible by a device, to help victims of stroke and others with speech paralysis to communicate with their loved ones.
Professor Robert T. Knight, M.D., and his team at UC Berkeley are working on finding a way to decode speech imagined in the human brain. “We learned that hearing words, speaking out loud or imagining words involves mechanisms and brain areas that overlap. Now, the challenge is to reproduce comprehensible speech from direct brain recordings done while a person imagines a word they would like to say,” said Knight, who is also the Founding Editor of Frontiers in Human Neuroscience.
Knight says the goal of the device is to help people affected by motor disease, such as paralysis and Lou Gehrig’s Disease. “There are many neurological disorders that limit speech despite patients being fully aware of what they want to say,” Knight said. “We want to develop an implantable device that decodes the signals that occur in the brain when we think about a word, then turn these signals into a sound file that can be reproduced by a speech device.”
Such a novel device would communicate people’s intended thoughts via an electronic speaker or writing device, but the team still has a lot more research to conduct. They have been able to reproduce a word a person has just heard on a machine, by monitoring temporal lobe activity in a neurosurgical setting. Using high density electrodes positioned on the surface of the language areas of the brain of awake patients, they monitored the pattern of electrical responses of brain cells during perceived speech. The scientists then created a computational model that could match spoken sounds to these signals.
“We recorded electrical signals directly from the human language areas when a person heard words. We then decoded these electrical signals and were able to turn them into sound files that reflected what the person heard, with remarkable accuracy,” Knight explained.
Remarkably, the team was then able to decode speech when a person thinks of a specific word, from direct brain recordings. “The new techniques and mathematical processing of the brain signals got us closer to the details we need to extract the signals that are relevant for reproducing speech,” he said.
The researchers took a clever approach to overcome some important limitations by accounting for example, for the natural differences in sound timing when one is producing the same word twice, such as when thinking of the word then by uttering it. “We applied a temporal realignment procedure that improved our accuracy in classifying words that are spoken or imagined,” Knight explained.
The team’s approach is based on evidence that the brain evolved to sense the physical properties of the sounds produced by human voice, and then process them into meaningful elements of language, such as words, despite their high variability. “Our work showed us it is possible to capture the brain signals that represent an intended word,” he said.
Such substantial progress brings the team closer to building an effective prosthetic device, but the work must continue. “Better understanding of language organization and better recording devices will allow us to achieve useful implantable, wireless and battery-powered speech prosthesis,” said Knight.
So far, the work is based on rare data collected from patients that have been scheduled for neurosurgery for a non-related reason, such as to treat epilepsy. “Our ultimate goal is to create a small device that can be used in everyday life,” he said.
Further author biography and related research articles available via Loop | <urn:uuid:1e413da3-5eca-4795-a50e-66e39a3615a6> | CC-MAIN-2018-43 | https://blog.frontiersin.org/2016/05/27/setting-free-the-words-trapped-in-our-heads/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515088.88/warc/CC-MAIN-20181022134402-20181022155902-00520.warc.gz | en | 0.964701 | 758 | 3.484375 | 3 |
Taurine (2-aminoethanesulfonic acid) is a free amino acid found ubiquitously in millimolar concentrations in all mammalian tissues. Taurine exerts a variety of biological actions, including antioxidation, modulation of ion movement, osmoregulation, modulation of neurotransmitters, and conjugation of bile acids, which may maintain physiological homeostasis. Recently, data is accumulating that show the effectiveness of taurine against diabetes mellitus, insulin resistance and its complications, including retinopathy, nephropathy, neuropathy, atherosclerosis and cardiomyopathy, independent of hypoglycemic effect in several animal models. The useful effects appear due to the multiple actions of taurine on cellular functions. This review summarizes the beneficial effects of taurine supplementation on diabetes mellitus and the molecular mechanisms underlying its effectiveness.
Taurine (2-aminoethanesulfonic acid) is widely distributed and is found in millimolar concentration in mammalian tissues. Many evidences support that taurine is a cytoprotective agent in a variety of tissues. Taurine modulates a variety of cellular functions, including antioxidation, modulation of ion movement, osmoregulation, modulation of neurotransmitters and conjugation of bile acids etc. (Huxtable 1992; Satoh 1998; Schaffer et al. 2000; Sjovall 1959). The source of taurine in body is biosynthesis and dietary intake. Taurine is synthesized from methionine and cysteine mainly in the liver. It is well-known that biosynthetic capacity of taurine is very low in human and is absent in cats, while rodents have high synthetic capacity (Hansen 2001). On the other hand, dietary taurine is ingested from meat and sea food. Especially, sea food is rich in taurine. Yamori et al. (2001) demonstrated that urinary taurine excretion as a marker of taurine intake inversely correlated with mortality rate caused by ischemic heart diseases in world wide epidemiological study. Moreover, taurine depletion by taurine-deficient diet in cats causes various pathological conditions, including retinal degeneration, reproductive failure and dilated cardiomyopathy (Hayes et al. 1975; Pion et al. 1987; Sturman 1991). Therefore, taurine seems an essential nutrient and its deficiency may cause various tissue disorders in human. Moreover, treatment of taurine benefits many kinds of pathologies. The accumulating data show the effectiveness of taurine supplementation against both insulin dependent, non-insulin dependent diabetes mellitus and insulin resistance (Franconi et al. 2004, 2006; Hansen 2001; Schaffer et al. 2009). In addition, taurine supplementation is beneficial to diabetic complications, including retinopathy, nephropathy, neuropathy, atherosclerosis and cardiomyopathy. These useful effects appear due to the multiple actions of taurine on cellular functions. This review summarizes the beneficial effects of taurine supplementation on diabetes and the molecular mechanisms underlying the effectiveness.
The effect of taurine on hyperglycemia in diabetic animal models and its potential mechanisms
The effect of taurine on type 1 diabetic models
The effect of taurine administration for type 1 diabetes has been well investigated. Treatment of taurine before diabetic onset suppressed hyperglycemia and lowered plasma glycated hemoglobin, cholesterol and triglyceride in STZ-induced type 1 diabetic rats (Alvarado-Vasquez et al. 2003; Tokunaga et al. 1979, 1983). Moreover, taurine reduced plasma lipid peroxidation products induced in type 1 diabetes mellitus. The prevention of hyperglycemia by taurine was also reported in alloxan-induced type 1 diabetic rabbits (Tenner et al. 2003; Winiarska et al. 2009). Importantly, it has been reported that treatment of taurine started from the time-point of diabetic onset failed to improve hyperglycemia in type 1 diabetic animals (Goodman and Shihabi 1990), indicating that lowering effect of taurine on blood glucose level in type 1 models may be due to the protection of beta cells from STZ or alloxan (Chang and Kwon 2000; Gavrovskaya et al. 2008). Interestingly, taurine supplementation from 2 days later of STZ injection prolonged survival in diabetic rats (Di Leo et al. 2004). This observation indicates that taurine may confer the resistance against some stresses induced by hyperglycemia, which may associate with the beneficial role against the complications, as described below.
Non-obese diabetic (NOD) mice genetically develop autoimmune diabetes caused by infiltration of the pancreatic islets by mononuclear leucocytes. Taurine supplementation starting before birth (pregnant mice were received a diet supplemented with taurine) until weaning significantly increased in pancreatic islet mass in NOD mice (Arany et al. 2004), suggesting that taurine alters islet development. Moreover, taurine treatment delayed the onset time of diabetes, and 20% of treated female mice remained free of diabetes.
The effect of taurine on obese-induced diabetic models
The Otsuka Long-Evans Tokushima Fatty (OLETF) rat is a model of non-insulin dependent diabetes, which exhibits hyperglycemia and insulin resistance and has accumulated abdominal fat as compared to the normal rats. It has been demonstrated that taurine supplementation improved hyperglycemia and insulin resistance in OLETF rats (Harada et al. 2004; Nakaya et al. 2000). Taurine also suppressed the increase in serum triglyceride and cholesterol, but not body weight and abdominal fat mass. Whereas it was expected that taurine could enhance the calorie consumption and/or lipid oxidation, taurine supplementation did not increase but decrease the energy expenditure and did not alter the lipid oxidation in OLETF rats (Harada et al. 2004). Therefore, the other pathways may underlie. Concerning with body weight and fat mass, taurine supplementation prevented the high fat diet-induced increase in body weight as well as fat mass in high fat diet-induced obese mice (Tsuboyama-Kasaoka et al. 2006). Then, the effect of taurine on obesity may differ dependent on animal species and/or experimental procedures.
The effect of taurine on fructose-fed rat model
High fructose diet impairs glucose tolerance and insulin sensitivity, taurine supplementation suppressed hyperglycemia and insulin resistance in high fructose-fed rat model (Nandhini et al. 2004, 2005; El Mesallamy et al. 2010). Furthermore, taurine supplementation to high fructose-fed rats decreased in the biomarkers of oxidative stress, such as lipid peroxidation and conjugated dines. Additionally, while taurine improved urinary kallikrein activity in fructose-fed rats, the effect of taurine supplementation was prevented by co-administration of Hoe 140, a kinin B2 receptor antagonist (Nandhini and Anuradha 2002, 2004). Since kinins influence insulin release and insulin action, this action may be involved in the molecular mechanism of the effect of taurine against insulin resistance.
The effect of taurine on insulin secretion and insulin sensitivity in acute glucose or lipid infusion models
Prolonged elevation of glucose is associated with insulin resistance. While 6-h infusion of high glucose induced a decrease in insulin-stimulated peripheral glucose uptake, co-infusion of taurine prevented the defect of glucose uptake (Haber et al. 2003). Furthermore, co-infusion of taurine suppressed lipid peroxidation induced by high glucose infusion in soleus muscle, indicating that anti-oxidative role of taurine in skeletal muscle is involved in the pathway of effectiveness against peripheral insulin resistance. However, taurine failed to prevent a decrease in glucose-stimulated insulin secretion and an increase in reactive oxygen induced by 48-h infusion of high glucose (Tang et al. 2007). On the other hand, some reports demonstrated various protective actions of taurine, such as the modulation of mitochondrial calcium handling and the stabilization of protein folding, against high glucose exposure in the cultured beta cells (Han et al. 2004; Kaniuk et al. 2007).
Meanwhile, the beneficial effect of taurine on islet dysfunction induced by free fatty acid was observed (Oprescu et al. 2007). While 48-h intravenous infusion of oleate decreased the glucose-stimulated insulin secretion, co-infusion of taurine prevented defective insulin secretion in islets induced by oleate. Furthermore, taurine suppressed oleate-induced ROS production in islets. Moreover, taurine also prevented hepatic insulin resistance induced by intravenous infusion of fatty acids (Wu et al. 2010). This beneficial effect was accompanied by inhibition of fatty acid-induced oxidative stress and JNK1 activation which impairs insulin signaling. These reports indicate the beneficial effect of taurine against lipotoxicity in islets and livers, which in turn may contribute to the prevention of diabetic onset in obesity.
The effect of taurine against diabetic complications and its molecular mechanisms
Alteration of taurine level in diabetes
Plasma and tissue taurine level are known to alter in a variety of pathophysiological conditions. Plasma taurine concentration in patients with insulin-dependent diabetes mellitus (IDDM) was significantly lower than in control subjects (Franconi et al. 1995, 1996). Consistently, the reduction of plasma taurine level has been demonstrated in STZ- or alloxan-induced diabetic animals (Franconi et al. 1996; Trachtman et al. 1995). In case of type2 diabetes, plasma taurine level is lower in the patients than non-diabetic healthy subjects (De Luca et al. 2001; Merheb et al. 2007). Since taurine deficiency associates with dysfunction in various tissues (Hayes et al. 1975; Pion et al. 1987; Sturman 1991), a decrease in taurine level in diabetic subjects may be involved in the diabetic complications.
The role of taurine against the production of advanced glycation end-products and modified LDL
Hyperglycemia accelerates non-enzymatic glycation of protein and causes the accumulation of advanced glycation end products (AGEs). It is known that AGEs play a key role in the development of diabetic complications, such as nephropathy and microvascular diseases. Since taurine has a high reactivity with aldehyde as compared to the other amino acids (Ogasawara et al. 1993), the preventive actions of taurine on the productions of AGEs in diabetes are expected. Indeed, taurine inhibited the AGE formation in vitro (Nandhini et al. 2004; Nandhini and Anuradha 2003; Selvaraj et al. 2006). Consistently, taurine supplementation prevented an increase in the plasma glycated proteins, such as fructosamine and glycated hemoglobin, in high fructose-fed rats (Nandhini et al. 2004).
While the modified LDL also contributes to development of vascular complications, some actions of taurine is likely to associate with prevention of LDL modification. The reactivity of taurine with aldehyde is also likely to contribute to decrease in malondialdehyde-related LDL modification (Ogasawara et al. 1993). Moreover, taurine also has the scavenging action for hypochlorous acid (HClO), while HClO, produced by myeloperoxidase in neutrophils and macrophages, possesses the antimicrobial properties and is also involved in oxidation of LDL (Pennathur and Heinecke 2007). In type 2 diabetic models, high myeloperoxidase activity has been found in the vessels of diabetic obese rats (Zhang et al. 2004), indicating that HClO may contribute to increase in oxidized LDL in diabetes. Moreover, lowering effect of taurine on the production of LDL-cholesterol itself may contribute the reduction of oxidized LDL (Bellentani et al. 1987; Gandhi et al. 1992; Nakamura-Yamanaka et al. 1987; Yokogoshi et al. 1999). The increased serum level of LDL cholesterol in STZ-treated diabetic mice was normalized by the chronic administration of taurine (Mochizuki et al. 1999; Nanami et al. 1996).
Most of diabetic complications are associated with vascular disorder. Microangiopathy causes retinopathy, nephropathy and neuropathy, whereas macroangiopathy causes cardiomyopathy and atherosclerosis. In STZ-treated diabetic mice, it has been demonstrated that the chronic taurine supplementation normalized the acetylcholine-induced relaxation of aortic rings, while the vasodilatation capacity is attenuated (Kamata et al. 1996; Wang et al. 2008). Furthermore, pre-incubation of the tissues with taurine for 2-h ex vivo improved both the enhanced response to norepinephrine and the attenuated response to acetylcholine in aorta ring from STZ-treated diabetic rats (Abebe 2008). These data illustrate the protective action of taurine on the impaired endothelium-dependent vasodilator response in hyperglycemia.
A variety of molecular mechanisms underlie the beneficial role of taurine against endothelial dysfunction in diabetes mellitus (summarized in Fig. 1). As described above, lowering effect of taurine on AGE and modified LDL may be involved in the molecular pathway of beneficial effect of taurine. Additionally, HClO consumes the nitric oxide and in turn causes vasoconstriction and endothelial dysfunction (Pennathur and Heinecke 2007). Taurine may increase the bioavailability of NO through scavenging HClO. Furthermore, taurine suppressed the expressions of vascular cell adhesion molecule-1 (VCAM-1) and intercellular adhesion molecule-1 (ICAM-1) induced by high glucose in cultured endothelial cells (Ulrich-Merzenich et al. 2007). Consistently, taurine supplementation started after the diabetes onset in STZ-treated diabetic rats prevented the induction of ICAM-1 and lectin-like oxidized LDL receptor-1 (LOX-1), which is responsible for the incorporation of oxidized LDL into cells, in aortas (Wang et al. 2008). Furthermore, while acute hyperglycemia induced by intravenous infusion of glucose activated leucocyte adhesion and migration to endothelium and increased in endothelial ICAM-1 and apoptosis in rats, taurine supplementation for 5 days prior to the experiment prevented leucocyte actions and the elevation of ICAM-1 and apoptotic cell death (Casey et al. 2007). Therefore, taurine may prevent the leukocyte-endothelial cell interaction and endothelial apoptosis enhanced by hyperglycemia.
It has been reported that taurine supplementation started concurrently with STZ injection reduced albuminuria and diminished glomerulosclerosis and tubulointerstitial fibrosis (Trachtman et al. 1995). More recently, it has been demonstrated that the taurine administration from fourth month later of the induction of diabetes significantly suppressed further increase in urinary protein excretion in diabetic rats, accompanied by the reduction of mesangial extracellular matrix expansion, TGF-β expression and oxidative stress in the renal glomerulus in rats (Higo et al. 2008). In vitro study also demonstrated that taurine treatment suppressed the increases in lipid peroxidation and TGF-β by high glucose in renal proximal tubule cells (Park et al. 2001). Moreover, taurine attenuated impairment of cellular growth and tubule cell hypertrophy induced by high glucose, associated with the suppression of high glucose-induced signal activations including MAPK cascade and STAT3 (Huang et al. 2007). Furthermore, taurine attenuated the induction of cytochrome P450 2E1 which metabolizes a variety of endogenous and exogenous compounds and is a potential source of ROS in kidney of STZ-treated diabetic rats (Yao et al. 2009). Taurine also attenuated cell hypertrophy and fibrosis induced by AGE exposure in renal tubular epithelial cells (Huang et al. 2008). Moreover, it has been reported that taurine suppressed the induction of fibrosis-related genes in AGE-treated renal tubular cells (Huang et al. 2009). Therefore, taurine may prevent renal injury and fibrosis in diabetic animals through suppression of ROS induced by glucose and AGE in kidney.
In STZ-induced diabetic model, taurine supplementation after diabetic onset effectively improved the changes in ultrastructure and attenuated induction of glial fibrillary acid protein (GFAP), a marker of gliosis, and apoptosis in retinal glial cells of STZ-treated diabetic rats without the effect on plasma glucose concentration (Yu et al. 2008; Zeng et al. 2009, 2010a), indicating the beneficial role of taurine on diabetic retinopathy. Furthermore, the taurine supplementation in STZ-treated rats significantly decreased in retinal carbonyl dienes (Di Leo et al. 2002, 2003). Additionally, taurine supplementation attenuated the induction of retinal VEGF, which associates with vascularization, in STZ-diabetic rats, suggesting that taurine may normalize the retinal vascular function in diabetes (Obrosova et al. 2001b; Zeng et al. 2009). Furthermore, while elevation of glutamate in retina is associated with the development of diabetic retinopathy, taurine prevented the elevation of retinal glutamate content and reduction of the proteins involved in glutamate uptake and degradation in STZ-treated diabetic rats (Zeng et al. 2009). Consistently, taurine suppressed high glucose-induced defect of glutamate uptake and degradation in cultured Muller cells (Zeng et al. 2010b).
Taurine is known to be the most abundant free amino acid in eye lens, and lens taurine level is decreased in diabetic cataract group in STZ-treated diabetic rats (Anthrayose and Shashidhar 2004; Malone et al. 1990; Vilchis and Salceda 1996). Chronic taurine supplementation reduced malondialdehyde level in lens of STZ-induced diabetic rats (Obrosova and Stevens 1999). Furthermore, although taurine did not improve opacity of eye lens induced by the exposure to high glucose medium for 6 days in cultured lens, taurine inhibited protein carbonylation induced by high glucose (Son et al. 2007). These studies indicate that taurine protects the lens from oxidative stress induced by hyperglycemia, while the effect of taurine against cataract is arguable.
It is well-known that sorbitol accumulation in the nerve is associated with diabetic peripheral neuropathy. When intracellular glucose is increased in hyperglycemic condition, excessive glucose is metabolized to sorbitol through aldose reductase. Organic osmolytes, including sorbitol, taurine and myo-inositol, are regulated in response to the change of extracellular osmolality to maintain the cell volume. Stevens demonstrated that taurine and myo-inositol are decreased in nerve of STZ-treated diabetic rats, whereas administration of aldose reductase inhibitor attenuated the depletion of taurine and myo-inositol (Stevens et al. 1993), suggesting that excessive accumulation of sorbitol led to the depletion of other organic osmolytes. Interestingly, the exposure of cells to high glucose reduces the expression of taurine transporter, whereas the treatment of an aldose reductase inhibitor or an antioxidant with the high glucose reversed the expression of taurine transporter (Askwith et al. 2009; Stevens et al. 1999), suggesting the crucial role of sorbitol in the regulation of intracellular taurine concentration. While diabetic neuropathy is observed in STZ-treated diabetic model, taurine supplementation improved the defective nerve functions, such as nerve conductance deficits and hyperalgesia, and ameliorated the deficit of nerve blood flow (Li et al. 2005b; Obrosova et al. 2001a, b; Pop-Busui et al. 2001; Stevens et al. 1993). Taurine supplementation reduced the oxidative stress in nerves and prevented the impairment of calcium handling in sensory neuron of STZ-treated diabetic rats (Li et al. 2005b). Additionally, a decrease in nerve growth factor (NGF) in STZ-treated rats was prevented by taurine supplementation (Obrosova et al. 2001a). Similarly, usefulness of taurine against diabetic peripheral neuropathy, including deficits of hind limb sciatic motor and digital sensory nerve conduction velocity, nerve blood flow, and sensory thresholds, was observed in Zucker diabetic fatty rats (Li et al. 2006).
Atherosclerosis and thrombosis
Diabetes is a major risk factor of atherosclerosis. While there are several reports on the beneficial effects of taurine against atherosclerosis (Kondo et al. 2000; Murakami et al. 1999a, 1999b, 2002), no evidence has been demonstrated in the diabetic models. Since endothelial dysfunction and accumulation of oxidized LDL in vessel are the critical features of atherosclerosis, various actions of taurine in endothelial cells mentioned above, such as lowering oxidized LDL and anti-apoptosis, can work effectively on atherosclerosis in diabetes.
Moreover, platelet activation and aggregation caused by atherosclerosis are the critical events in thrombosis. It is known that platelet function alters in diabetic subjects, which may sensitize the platelet for stresses to generate thrombi. It has been reported that platelet taurine level as well as plasma taurine level is decreased in both type 1 and type 2 diabetic patients (De Luca et al. 2001; Franconi et al. 1995). Because taurine depletion causes an increase in platelet sensitivity to aggregation (Hayes et al. 1989), it has been hypothesized that taurine supplementation can prevent platelet aggregation in diabetic patients. Franconi et al. (1995) reported that taurine supplementation at 1.5 g/day for 90 days in IDDM patients suppressed platelet aggregation induced by arachidonic acid in the isolated platelet. Additionally, they demonstrated the pre-incubation of taurine inhibits arachidonic acid-induced aggregation in platelet from diabetic patients, but not in platelet from control subjects. Spohr et al. (2005) demonstrated that taurine supplementation at 1.5 g/day for 8 weeks had no effect on ADP-stimulated platelet aggregation in high risk subjects with a positive family history of NIDDM.
Unlike the other tissues, cardiac taurine level increases in STZ-treated diabetic models and does not alter in obese-induced diabetic models (Militante et al. 2000). Elevation of cardiac taurine level seems the feature of cardiomyopathy, since its elevation has also been reported in the animal models or patients with congestive heart failure (Huxtable and Bressler 1974). Although the biological significance of the elevation of taurine level in the failing heart is still unveiled, the elevated taurine is expected to modulate glycolytic capacity, such as pyruvate dehydrogenase phosphorylation, in diabetic cardiomyopathy (Militante et al. 2000). Recently, Li et al. (2005a) reported that taurine supplementation started after the development of cardiomyopathy prevented an increase in heart weight and improved the impaired −dp/dt max but not +dp/dt max. Furthermore, taurine supplementation suppressed the reduction of Bcl-2 expression in STZ-treated diabetic cardiomyopathy rats, indicating that anti-apoptotic action of taurine may be involved in the protective effect of taurine against diabetic cardiomyopathy.
The clinical usefulness of taurine on diabetes has been evaluated in some clinical studies (listed in Table 1). In clinical trial for type 1 diabetic patients, Elizarova and Nedosugova (1996) investigated the effect of taurine on hyperglycemia in type 1 diabetic patients (n = 10) who had been already medicated with insulin. Additive supplementation of taurine (0.5 g twice a day) improved the carbohydrate metabolism and decreased in triglyceride. In the other study, however, Franconi et al. (1995) reported that the administration of taurine (1.5 g per day) for 90 day did not modify glucose metabolism in IDDM patients (n = 39). Clinical usefulness on type 1 diabetes is still arguable.
There are some clinical trials of taurine supplementation on the patients with type 2 diabetes mellitus. Chauncey et al. (2003) tested the hypoglycemic effect of taurine on type2 diabetes patients (n = 32), and they showed that taurine supplementation (3 g per day) for 4 month increased in plasma taurine level but did not change HbA1c level and the plasma lipid peroxide level compared to placebo group. Brons et al. (2004) also tested the effect of taurine in overweight non-diabetic men (n = 20) in crossover study. Although plasma taurine level was elevated after taurine administration (1.5 g per day) for 8 weeks, taurine had no effects on insulin secretion or sensitivity, and on plasma lipid level. These studies concluded that taurine does not influence hyperglycemia and insulin resistance in type 2 diabetic patients, inconsistent with animal studies. However, it should be noted that these clinical studies have some limitations such as other medications, given dose of taurine, duration of trial etc. On the other hand, usefulness of taurine supplementation against the impairment of insulin sensitivity was reported in the crossover clinical study by Xiao et al. (2008). They demonstrated the effect of taurine against chronic elevation of plasma fatty acids induced by the intravenous infusion of Intralipid (20% soybean oil, 1.2% egg phospholipids, 2.25% glycerin in water, heparin) on non-diabetic men who were either overweight or obese (n = 6). While 48-h infusion of intravenous lipid induced insulin resistance, a 2-week pretreatment of taurine (3 g per day) before lipid infusion improved the impaired insulin sensitivity and prevented the rise in lipid peroxidation products in plasma, indicating that oral taurine supplementation ameliorates fatty acid-induced insulin resistance in humans, possibly due to reducing oxidative stress.
Concerning diabetic nephropathy, Nakamura et al. (1999) tested the taurine supplementation (3 g per day) on the patients with microalbuminemia of type 2 diabetes and treatment was continued for 12 months in intergroup trial (n = 10 each group). They demonstrated that taurine supplementation had no benefit against microalbuminemia and the biomarkers for fibrosis, such as serum collagen IV and plasma Matrix metalloproteinase-9.
Meanwhile, Moloney et al. (2010) recently reported the beneficial effect of taurine on endothelial dysfunction in type 1 diabetic patients in crossover study. While arterial stiffness and flow-mediated dilatation of brachial artery, which are endothelium-dependent reactions, were low in diabetic patients as compared to control subjects, taurine supplementation (1.5 g per day) for 2 weeks returned these parameters to control level without hypoglycemic effect, indicating the protective role of taurine on endothelium. Interestingly, same group previously reported that taurine supplementation (1.5 g per day) for 2 weeks also attenuated the impairment of flow-mediated dilatation in young cigarette smokers (Fennessy et al. 2003). Furthermore, while the culture medium conditioned with monocytes taken from smokers impaired the release of nitric oxide and increased in endothelin-1 in HUVECs, the levels of nitric oxide and endothelin-1 returned to control levels in HUVECs cultured with the monocyte-conditioned medium taken from smokers who had been treated with taurine. Therefore, the suppression of monocyte-endothelium interaction is likely to be a key action of protective role of taurine on endothelial function. Since the involvement of monocyte–endothelium interaction in endothelial dysfunction of diabetic animal models is also demonstrated as described above, it is possible that same pathway underlies the action of taurine against endothelial dysfunction in diabetic patients.
As described in this article, numerous studies revealed that taurine supplementation is beneficial to diabetes and its complications in several animal models. Moreover, multiple actions of taurine coordinate to protect from diabetes and complications (Table 2). Especially, suppressive effect of taurine against oxidative stress is associated with various pathways in diabetic condition. First, reactivity of taurine against aldehyde can contribute to the reduction of AGE and modified LDL. Second, scavenging action against HClO can reduce the LDL modification and increase in bioavailability of the NO. Finally, taurine is likely to inhibit the ROS production via regulation of mitochondria (reviewed in Schaffer et al. 2009). While very high taurine concentration is found in mitochondria, several roles of taurine in mitochondria have been proposed. Taurine-containing modified uridine has recently been discovered at wobble position in mitochondrial transfer RNA (tRNA) (Suzuki et al. 2002). Taurine-modified tRNA may play a crucial role in the translation of proteins responsible for electron transport (Kirino et al. 2004), suggesting that taurine depletion might cause a decrease in taurine-modified tRNA and impairs electron transport capacity. Moreover, buffering property of taurine in mitochondrial matrix has been reported (Hansen et al. 2010). Therefore, taurine depletion in diabetes may contribute to mitochondrial dysfunction and it is possible that restoration of taurine contributes to normalize mitochondrial function, which may associate with inhibition of the ROS production from mitochondria. To elucidate the role of taurine depletion in mitochondrial function and in the development of diabetic complications, further studies, such as investigations using taurine transporter knock-out animals (Ito et al. 2008), will be required.
Nevertheless, most of clinical studies failed to prove the beneficial role of taurine on insulin resistance and diabetic complications, whereas the others revealed the effectiveness. The discrepancies between animal experiments and clinical trials might be due to some limitations of clinical studies, such as a severity of the disease, other medications, given dose, duration of trial etc. Especially, the given dose of taurine per body weight is more than 10 times higher in animal experiments (e.g. diet containing 5% taurine) than in clinical trials (1.5–3 g taurine per day). Intake of taurine is thought to be quite safe as well as the amino acids found in food. While several reports strongly support that taurine is safe at levels up to 3 g/day, several clinical trials tested higher taurine dosages without adverse effects (Azuma et al. 1983, 1985; Shao and Hathcock 2008). Furthermore, since the pharmacological effect of taurine seems mild but not powerful, simultaneous therapy by using some medicines is also a problem. At present none of clinical studies have a sufficient numbers of patients. Therefore, long-term surveillance with large numbers of patients may be necessary to elucidate the effectiveness of taurine against diabetes or its complications in clinical study. Moreover, life style, such as diet, and genetic factors, such as genomic polymorphisms which relate to individual differences, can affect to the result of trials. It is known that urinary taurine concentration in human varies widely among individuals (Yamori et al. 2001). Brons et al. (2004) reported a wide variation in the increasing rate of plasma taurine concentration after taurine administration among individuals. These variations of taurine movement among individuals must differ dependent not only on life style but also genomic polymorphisms in taurine-related genes associated with the kinetics of taurine, such as taurine transporter. Therefore, we believe that the discovery of the genetic factors which determine the variation of taurine movement will help to elucidate the effectiveness of taurine against diabetes and its complications in humans.
Abebe W (2008) Effects of taurine on the reactivity of aortas from diabetic rats. Life Sci 82:279–289
Alvarado-Vasquez N, Zamudio P, Ceron E, Vanda B, Zenteno E, Carvajal-Sandoval G (2003) Effect of glycine in streptozotocin-induced diabetic rats. Comp Biochem Physiol C Toxicol Pharmacol 134:521–527
Anthrayose CV, Shashidhar S (2004) Studies on protein and taurine in normal, senile and diabetic cataractous human lenses. Indian J Physiol Pharmacol 48:357–360
Arany E, Strutt B, Romanus P, Remacle C, Reusens B, Hill DJ (2004) Taurine supplement in early life altered islet morphology, decreased insulitis and delayed the onset of diabetes in non-obese diabetic mice. Diabetologia 47:1831–1837
Askwith T, Zeng W, Eggo MC, Stevens MJ (2009) Oxidative stress and dysregulation of the taurine transporter in high-glucose-exposed human Schwann cells: implications for pathogenesis of diabetic neuropathy. Am J Physiol Endocrinol Metab 297:E620–E628
Azuma J, Hasegawa H, Sawamura A, Awata N, Ogura K, Harada H, Yamamura Y, Kishimoto S (1983) Therapy of congestive heart failure with orally administered taurine. Clin Ther 5:398–408
Azuma J, Sawamura A, Awata N, Ohta H, Hamaguchi T, Harada H, Takihara K, Hasegawa H, Yamagami T, Ishiyama T et al (1985) Therapeutic effect of taurine in congestive heart failure: a double-blind crossover trial. Clin Cardiol 8:276–282
Bellentani S, Pecorari M, Cordoma P, Marchegiano P, Manenti F, Bosisio E, De Fabiani E, Galli G (1987) Taurine increases bile acid pool size and reduces bile saturation index in the hamster. J Lipid Res 28:1021–1027
Brons C, Spohr C, Storgaard H, Dyerberg J, Vaag A (2004) Effect of taurine treatment on insulin secretion and action, and on serum lipid levels in overweight men with a genetic predisposition for type II diabetes mellitus. Eur J Clin Nutr 58:1239–1247
Casey RG, Gang C, Joyce M, Bouchier-Hayes DJ (2007) Taurine attenuates acute hyperglycaemia-induced endothelial cell apoptosis, leucocyte-endothelial cell interactions and cardiac dysfunction. J Vasc Res 44:31–39
Chang KJ, Kwon W (2000) Immunohistochemical localization of insulin in pancreatic beta-cells of taurine-supplemented or taurine-depleted diabetic rats. Adv Exp Med Biol 483:579–587
Chauncey KB, Tenner TE Jr, Lombardini JB, Jones BG, Brooks ML, Warner RD, Davis RL, Ragain RM (2003) The effect of taurine supplementation on patients with type 2 diabetes mellitus. Adv Exp Med Biol 526:91–96
De Luca G, Calpona PR, Caponetti A, Romano G, Di Benedetto A, Cucinotta D, Di Giorgio RM (2001) Taurine and osmoregulation: platelet taurine content, uptake, and release in type 2 diabetic patients. Metabolism 50:60–64
Di Leo MA, Santini SA, Cercone S, Lepore D, Gentiloni Silveri N, Caputo S, Greco AV, Giardina B, Franconi F, Ghirlanda G (2002) Chronic taurine supplementation ameliorates oxidative stress and Na+ K+ ATPase impairment in the retina of diabetic rats. Amino Acids 23:401–406
Di Leo MA, Ghirlanda G, Gentiloni Silveri N, Giardina B, Franconi F, Santini SA (2003) Potential therapeutic effect of antioxidants in experimental diabetic retina: a comparison between chronic taurine and vitamin E plus selenium supplementations. Free Radic Res 37:323–330
Di Leo MA, Santini SA, Gentiloni Silveri N, Giardina B, Franconi F, Ghirlanda G (2004) Long-term taurine supplementation reduces mortality rate in streptozotocin-induced diabetic rats. Amino Acids 27:187–191
El Mesallamy HO, El-Demerdash E, Hammad LN, El Magdoub HM (2010) Effect of taurine supplementation on hyperhomocysteinemia and markers of oxidative stress in high fructose diet induced insulin resistance. Diabetol Metab Syndr 2(46):46
Elizarova EP, Nedosugova LV (1996) First experiments in taurine administration for diabetes mellitus. The effect on erythrocyte membranes. Adv Exp Med Biol 403:583–588
Fennessy FM, Moneley DS, Wang JH, Kelly CJ, Bouchier-Hayes DJ (2003) Taurine and vitamin C modify monocyte and endothelial dysfunction in young smokers. Circulation 107:410–415
Franconi F, Bennardini F, Mattana A, Miceli M, Ciuti M, Mian M, Gironi A, Anichini R, Seghieri G (1995) Plasma and platelet taurine are reduced in subjects with insulin-dependent diabetes mellitus: effects of taurine supplementation. Am J Clin Nutr 61:1115–1119
Franconi F, Miceli M, Fazzini A, Seghieri G, Caputo S, DiLeo MA, Lepore D, Ghirlanda G (1996) Taurine and diabetes. Humans and experimental models. Adv Exp Med Biol 403:579–582
Franconi F, Di Leo MA, Bennardini F, Ghirlanda G (2004) Is taurine beneficial in reducing risk factors for diabetes mellitus? Neurochem Res 29:143–150
Franconi F, Loizzo A, Ghirlanda G, Seghieri G (2006) Taurine supplementation and diabetes mellitus. Curr Opin Clin Nutr Metab Care 9:32–36
Gandhi VM, Cherian KM, Mulky MJ (1992) Hypolipidemic action of taurine in rats. Indian J Exp Biol 30:413–417
Gavrovskaya LK, Ryzhova OV, Safonova AF, Matveev AK, Sapronov NS (2008) Protective effect of taurine on rats with experimental insulin-dependent diabetes mellitus. Bull Exp Biol Med 146:226–228
Goodman HO, Shihabi ZK (1990) Supplemental taurine in diabetic rats: effects on plasma glucose and triglycerides. Biochem Med Metab Biol 43:1–9
Haber CA, Lam TK, Yu Z, Gupta N, Goh T, Bogdanovic E, Giacca A, Fantus IG (2003) N-acetylcysteine (NAC) and taurine prevent hyperglycemia-induced insulin resistance in vivo: possible role of oxidative stress. Am J Physiol Endocrinol Metab 285:E744–E753
Han J, Bae JH, Kim SY, Lee HY, Jang BC, Lee IK, Cho CH, Lim JG, Suh SI, Kwon TK et al (2004) Taurine increases glucose sensitivity of UCP2-overexpressing beta-cells by ameliorating mitochondrial metabolism. Am J Physiol Endocrinol Metab 287:E1008–E1018
Hansen SH (2001) The role of taurine in diabetes and the development of diabetic complications. Diabetes Metab Res Rev 17:330–346
Hansen SH, Andersen ML, Cornett C, Gradinaru R, Grunnet N (2010) A role for taurine in mitochondrial function. J Biomed Sci 17(Suppl 1):S23
Harada N, Ninomiya C, Osako Y, Morishima M, Mawatari K, Takahashi A, Nakaya Y (2004) Taurine alters respiratory gas exchange and nutrient metabolism in type 2 diabetic rats. Obes Res 12:1077–1084
Hayes KC, Carey RE, Schmidt SY (1975) Retinal degeneration associated with taurine deficiency in the cat. Science 188:949–951
Hayes KC, Pronczuk A, Addesa AE, Stephan ZF (1989) Taurine modulates platelet aggregation in cats and humans. Am J Clin Nutr 49:1211–1216
Higo S, Miyata S, Jiang QY, Kitazawa R, Kitazawa S, Kasuga M (2008) Taurine administration after appearance of proteinuria retards progression of diabetic nephropathy in rats. Kobe J Med Sci 54:E35–E45
Huang JS, Chuang LY, Guh JY, Huang YJ, Hsu MS (2007) Antioxidants attenuate high glucose-induced hypertrophic growth in renal tubular epithelial cells. Am J Physiol Renal Physiol 293:F1072–F1082
Huang JS, Chuang LY, Guh JY, Yang YL, Hsu MS (2008) Effect of taurine on advanced glycation end products-induced hypertrophy in renal tubular epithelial cells. Toxicol Appl Pharmacol 233:220–226
Huang JS, Chuang LY, Guh JY, Huang YJ (2009) Effects of nitric oxide and antioxidants on advanced glycation end products-induced hypertrophic growth in human renal tubular cells. Toxicol Sci 111(1):109–119
Huxtable RJ (1992) Physiological actions of taurine. Physiol Rev 72:101–163
Huxtable R, Bressler R (1974) Taurine concentrations in congestive heart failure. Science 184:1187–1188
Ito T, Kimura Y, Uozumi Y, Takai M, Muraoka S, Matsuda T, Ueki K, Yoshiyama M, Ikawa M, Okabe M, Schaffer SW, Fujio Y, Azuma J (2008) Taurine depletion caused by knocking out the taurine transporter gene leads to cardiomyopathy with cardiac atrophy. J Mol Cell Cardiol 44:927–937
Kamata K, Sugiura M, Kojima S, Kasuya Y (1996) Restoration of endothelium-dependent relaxation in both hypercholesterolemia and diabetes by chronic taurine. Eur J Pharmacol 303:47–53
Kaniuk NA, Kiraly M, Bates H, Vranic M, Volchuk A, Brumell JH (2007) Ubiquitinated-protein aggregates form in pancreatic beta-cells during diabetes-induced oxidative stress and are regulated by autophagy. Diabetes 56:930–939
Kirino Y, Yasukawa T, Ohta S, Akira S, Ishihara K, Watanabe K, Suzuki T (2004) Codon-specific translational defect caused by a wobble modification deficiency in mutant tRNA from a human mitochondrial disease. Proc Natl Acad Sci USA 101:15070–15075
Kondo Y, Murakami S, Oda H, Nagate T (2000) Taurine reduces atherosclerotic lesion development in apolipoprotein E-deficient mice. Adv Exp Med Biol 483:193–202
Li C, Cao L, Zeng Q, Liu X, Zhang Y, Dai T, Hu D, Huang K, Wang Y, Wang X et al (2005a) Taurine may prevent diabetic rats from developing cardiomyopathy also by downregulating angiotensin II type2 receptor expression. Cardiovasc Drugs Ther 19:105–112
Li F, Obrosova IG, Abatan O, Tian D, Larkin D, Stuenkel EL, Stevens MJ (2005b) Taurine replacement attenuates hyperalgesia and abnormal calcium signaling in sensory neurons of STZ-D rats. Am J Physiol Endocrinol Metab 288:E29–E36
Li F, Abatan OI, Kim H, Burnett D, Larkin D, Obrosova IG, Stevens MJ (2006) Taurine reverses neurological and neurovascular deficits in Zucker diabetic fatty rats. Neurobiol Dis 22:669–676
Malone JI, Lowitt S, Cook WR (1990) Nonosmotic diabetic cataracts. Pediatr Res 27:293–296
Merheb M, Daher RT, Nasrallah M, Sabra R, Ziyadeh FN, Barada K (2007) Taurine intestinal absorption and renal excretion test in diabetic patients: a pilot study. Diabetes Care 30:2652–2654
Militante JD, Lombardini JB, Schaffer SW (2000) The role of taurine in the pathogenesis of the cardiomyopathy of insulin-dependent diabetes mellitus. Cardiovasc Res 46:393–402
Mochizuki H, Takido J, Oda H, Yokogoshi H (1999) Improving effect of dietary taurine on marked hypercholesterolemia induced by a high-cholesterol diet in streptozotocin-induced diabetic rats. Biosci Biotechnol Biochem 63:1984–1987
Moloney MA, Casey RG, O’Donnell DH, Fitzgerald P, Thompson C, Bouchier-Hayes DJ (2010) Two weeks taurine supplementation reverses endothelial dysfunction in young male type 1 diabetics. Diab Vasc Dis Res 7:300–310
Murakami S, Kondo Y, Tomisawa K, Nagate T (1999a) Prevention of atherosclerotic lesion development in mice by taurine. Drugs Exp Clin Res 25:227–234
Murakami S, Kondo-Ohta Y, Tomisawa K (1999b) Improvement in cholesterol metabolism in mice given chronic treatment of taurine and fed a high-fat diet. Life Sci 64:83–91
Murakami S, Kondo Y, Sakurai T, Kitajima H, Nagate T (2002) Taurine suppresses development of atherosclerosis in Watanabe heritable hyperlipidemic (WHHL) rabbits. Atherosclerosis 163:79–87
Nakamura T, Ushiyama C, Suzuki S, Shimada N, Ohmuro H, Ebihara I, Koide H (1999) Effects of taurine and vitamin E on microalbuminuria, plasma metalloproteinase-9, and serum type IV collagen concentrations in patients with diabetic nephropathy. Nephron 83:361–362
Nakamura-Yamanaka Y, Tsuji K, Ichikawa T (1987) Effect of dietary taurine on cholesterol 7 alpha-hydroxylase activity in the liver of mice fed a lithogenic diet. J Nutr Sci Vitaminol (Tokyo) 33:239–243
Nakaya Y, Minami A, Harada N, Sakamoto S, Niwa Y, Ohnaka M (2000) Taurine improves insulin sensitivity in the Otsuka Long-Evans Tokushima Fatty rat, a model of spontaneous type 2 diabetes. Am J Clin Nutr 71:54–58
Nanami K, Oda H, Yokogoshi H (1996) Antihypercholesterolemic action of taurine on streptozotocin-diabetic rats or on rats fed a high cholesterol diet. Adv Exp Med Biol 403:561–568
Nandhini AT, Anuradha CV (2002) Taurine modulates kallikrein activity and glucose metabolism in insulin resistant rats. Amino Acids 22:27–38
Nandhini TA, Anuradha CV (2003) Inhibition of lipid peroxidation, protein glycation and elevation of membrane ion pump activity by taurine in RBC exposed to high glucose. Clin Chim Acta 336:129–135
Nandhini AT, Anuradha CV (2004) Hoe 140 abolishes the blood pressure lowering effect of taurine in high fructose-fed rats. Amino Acids 26:299–303
Nandhini AT, Thirunavukkarasu V, Anuradha CV (2004) Stimulation of glucose utilization and inhibition of protein glycation and AGE products by taurine. Acta Physiol Scand 181:297–303
Nandhini AT, Thirunavukkarasu V, Ravichandran MK, Anuradha CV (2005) Effect of taurine on biomarkers of oxidative stress in tissues of fructose-fed insulin-resistant rats. Singapore Med J 46:82–87
Obrosova IG, Stevens MJ (1999) Effect of dietary taurine supplementation on GSH and NAD(P)-redox status, lipid peroxidation, and energy metabolism in diabetic precataractous lens. Invest Ophthalmol Vis Sci 40:680–688
Obrosova IG, Fathallah L, Stevens MJ (2001a) Taurine counteracts oxidative stress and nerve growth factor deficit in early experimental diabetic neuropathy. Exp Neurol 172:211–219
Obrosova IG, Minchenko AG, Marinescu V, Fathallah L, Kennedy A, Stockert CM, Frank RN, Stevens MJ (2001b) Antioxidants attenuate early up regulation of retinal vascular endothelial growth factor in streptozotocin-diabetic rats. Diabetologia 44:1102–1110
Ogasawara M, Nakamura T, Koyama I, Nemoto M, Yoshida T (1993) Reactivity of taurine with aldehydes and its physiological role. Chem Pharm Bull (Tokyo) 41:2172–2175
Oprescu AI, Bikopoulos G, Naassan A, Allister EM, Tang C, Park E, Uchino H, Lewis GF, Fantus IG, Rozakis-Adcock M et al (2007) Free fatty acid-induced reduction in glucose-stimulated insulin secretion: evidence for a role of oxidative stress in vitro and in vivo. Diabetes 56:2927–2937
Park SH, Choi HJ, Lee JH, Woo CH, Kim JH, Han HJ (2001) High glucose inhibits renal proximal tubule cell proliferation and involves PKC, oxidative stress, and TGF-beta 1. Kidney Int 59:1695–1705
Pennathur S, Heinecke JW (2007) Oxidative stress and endothelial dysfunction in vascular disease. Curr Diab Rep 7:257–264
Pion PD, Kittleson MD, Rogers QR, Morris JG (1987) Myocardial failure in cats associated with low plasma taurine: a reversible cardiomyopathy. Science 237:764–768
Pop-Busui R, Sullivan KA, Van Huysen C, Bayer L, Cao X, Towns R, Stevens MJ (2001) Depletion of taurine in experimental diabetic neuropathy: implications for nerve metabolic, vascular, and functional deficits. Exp Neurol 168:259–272
Satoh H (1998) Cardiac actions of taurine as a modulator of the ion channels. Adv Exp Med Biol 442:121–128
Schaffer S, Takahashi K, Azuma J (2000) Role of osmoregulation in the actions of taurine. Amino Acids 19:527–546
Schaffer SW, Azuma J, Mozaffari M (2009) Role of antioxidant activity of taurine in diabetes. Can J Physiol Pharmacol 87:91–99
Selvaraj N, Bobby Z, Sathiyapriya V (2006) Effect of lipid peroxides and antioxidants on glycation of hemoglobin: an in vitro study on human erythrocytes. Clin Chim Acta 366:190–195
Shao A, Hathcock JN (2008) Risk assessment for the amino acids taurine, l-glutamine and l-arginine. Regul Toxicol Pharmacol 50:376–399
Sjovall J (1959) Dietary glycine and taurine on bile acid conjugation in man; bile acids and steroids 75. Proc Soc Exp Biol Med 100:676–678
Son HY, Kim H, Y HK (2007) Taurine prevents oxidative damage of high glucose-induced cataractogenesis in isolated rat lenses. J Nutr Sci Vitaminol (Tokyo) 53:324–330
Spohr C, Brons C, Winther K, Dyerberg J, Vaag A (2005) No effect of taurine on platelet aggregation in men with a predisposition to type 2 diabetes mellitus. Platelets 16:301–305
Stevens MJ, Lattimer SA, Kamijo M, Van Huysen C, Sima AA, Greene DA (1993) Osmotically-induced nerve taurine depletion and the compatible osmolyte hypothesis in experimental diabetic neuropathy in the rat. Diabetologia 36:608–614
Stevens MJ, Hosaka Y, Masterson JA, Jones SM, Thomas TP, Larkin DD (1999) Downregulation of the human taurine transporter by glucose in cultured retinal pigment epithelial cells. Am J Physiol 277:E760–E771
Sturman JA (1991) Dietary taurine and feline reproduction and development. J Nutr 121:S166–S170
Suzuki T, Suzuki T, Wada T, Saigo K, Watanabe K (2002) Taurine as a constituent of mitochondrial tRNAs: new insights into the functions of taurine and human mitochondrial diseases. EMBO J 21:6581–6589
Tang C, Han P, Oprescu AI, Lee SC, Gyulkhandanyan AV, Chan GN, Wheeler MB, Giacca A (2007) Evidence for a role of superoxide generation in glucose-induced beta-cell dysfunction in vivo. Diabetes 56:2722–2731
Tenner TE Jr, Zhang XJ, Lombardini JB (2003) Hypoglycemic effects of taurine in the alloxan-treated rabbit, a model for type 1 diabetes. Adv Exp Med Biol 526:97–104
Tokunaga H, Yoneda Y, Kuriyama K (1979) Protective actions of taurine against streptozotocin-induced hyperglycemia. Biochem Pharmacol 28:2807–2811
Tokunaga H, Yoneda Y, Kuriyama K (1983) Streptozotocin-induced elevation of pancreatic taurine content and suppressive effect of taurine on insulin secretion. Eur J Pharmacol 87:237–243
Trachtman H, Futterweit S, Maesaka J, Ma C, Valderrama E, Fuchs A, Tarectecan AA, Rao PS, Sturman JA, Boles TH et al (1995) Taurine ameliorates chronic streptozocin-induced diabetic nephropathy in rats. Am J Physiol 269:F429–F438
Tsuboyama-Kasaoka N, Shozawa C, Sano K, Kamei Y, Kasaoka S, Hosokawa Y, Ezaki O (2006) Taurine (2-aminoethanesulfonic acid) deficiency creates a vicious circle promoting obesity. Endocrinology 147:3276–3284
Ulrich-Merzenich G, Zeitler H, Vetter H, Bhonde RR (2007) Protective effects of taurine on endothelial cells impaired by high glucose and oxidized low density lipoproteins. Eur J Nutr 46:431–438
Vilchis C, Salceda R (1996) Effect of diabetes on levels and uptake of putative amino acid neurotransmitters in rat retina and retinal pigment epithelium. Neurochem Res 21:1167–1171
Wang LJ, Yu YH, Zhang LG, Wang Y, Niu N, Li Q, Guo LM (2008) Taurine rescues vascular endothelial dysfunction in streptozocin-induced diabetic rats: correlated with downregulation of LOX-1 and ICAM-1 expression on aortas. Eur J Pharmacol 597:75–80
Winiarska K, Szymanski K, Gorniak P, Dudziak M, Bryla J (2009) Hypoglycaemic, antioxidative and nephroprotective effects of taurine in alloxan diabetic rabbits. Biochimie 91:261–270
Wu N, Lu Y, He B, Zhang Y, Lin J, Zhao S, Zhang W, Li Y, Han P (2010) Taurine prevents free fatty acid-induced hepatic insulin resistance in association with inhibiting JNK1 activation and improving insulin signaling in vivo. Diabetes Res Clin Pract 90(3):288–296
Xiao C, Giacca A, Lewis GF (2008) Oral taurine but not N-acetylcysteine ameliorates NEFA-induced impairment in insulin sensitivity and beta cell function in obese and overweight, non-diabetic men. Diabetologia 51:139–146
Yamori Y, Liu L, Ikeda K, Miura A, Mizushima S, Miki T, Nara Y (2001) Distribution of twenty-four hour urinary taurine excretion and association with ischemic heart disease mortality in 24 populations of 16 countries: results from the WHO-CARDIAC study. Hypertens Res 24:453–457
Yao HT, Lin P, Chang YW, Chen CT, Chiang MT, Chang L, Kuo YC, Tsai HT, Yeh TK (2009) Effect of taurine supplementation on cytochrome P450 2E1 and oxidative stress in the liver and kidneys of rats with streptozotocin-induced diabetes. Food Chem Toxicol 47:1703–1709
Yokogoshi H, Mochizuki H, Nanami K, Hida Y, Miyachi F, Oda H (1999) Dietary taurine enhances cholesterol degradation and reduces serum and liver cholesterol concentrations in rats fed a high-cholesterol diet. J Nutr 129:1705–1712
Yu X, Xu Z, Mi M, Xu H, Zhu J, Wei N, Chen K, Zhang Q, Zeng K, Wang J et al (2008) Dietary taurine supplementation ameliorates diabetic retinopathy via anti-excitotoxicity of glutamate in streptozotocin-induced Sprague-Dawley rats. Neurochem Res 33:500–507
Zeng K, Xu H, Mi M, Zhang Q, Zhang Y, Chen K, Chen F, Zhu J, Yu X (2009) Dietary taurine supplementation prevents glial alterations in retina of diabetic rats. Neurochem Res 34:244–254
Zeng K, Xu H, Mi M, Chen K, Zhu J, Yi L, Zhang T, Zhang Q, Yu X (2010a) Effects of taurine on glial cells apoptosis and taurine transporter expression in retina under diabetic conditions. Neurochem Res 35:1566–1574
Zeng K, Xu H, Chen K, Zhu J, Zhou Y, Zhang Q, Mantian M (2010b) Effects of taurine on glutamate uptake and degradation in Müller cells under diabetic conditions via antioxidant mechanism. Mol Cell Neurosci 45:192–199
Zhang C, Yang J, Jennings LK (2004) Leukocyte-derived myeloperoxidase amplifies high-glucose-induced endothelial dysfunction through interaction with high-glucose-stimulated, vascular non-leukocyte-derived reactive oxygen species. Diabetes 53:2950–2959
This work is supported by Grant-in-aid from Ministry of Education, Science, Sports and Culture of Japan. This work is also supported by a research grant from Taisho Pharmaceutical Co. Ltd.
This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author(s) and source are credited.
About this article
Cite this article
Ito, T., Schaffer, S.W. & Azuma, J. The potential usefulness of taurine on diabetes mellitus and its complications. Amino Acids 42, 1529–1539 (2012). https://doi.org/10.1007/s00726-011-0883-5
- Diabetic mellitus
- Diabetic complications
- Insulin resistance | <urn:uuid:d40ef761-4560-4f11-ace7-12aac6a390db> | CC-MAIN-2021-31 | https://link.springer.com/article/10.1007%2Fs00726-011-0883-5 | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154175.76/warc/CC-MAIN-20210801092716-20210801122716-00450.warc.gz | en | 0.840539 | 13,209 | 2.875 | 3 |
Hospital admissions for cardiovascular diseases decline on days with major snowfalls compared to days with no snowfall, but they jump by 23% two days later, according to a new study led by researchers from Harvard T.H. Chan School of Public Health.
“With global climate change, major snowstorms may become more frequent and severe,” said lead author Dr. Jennifer Bobb of the Group Health Research Institute in Seattle, who worked on the study as a postdoctoral researcher in the Department of Biostatistics at Harvard Chan School. “Understanding trends in hospitalizations related to snowfall will help us develop ways to protect public health during harsh winter conditions.”
The study was published online January 30, 2017 in the American Journal of Epidemiology.
The researchers analyzed data for 433,037 adults hospitalized at the four largest hospitals in Boston (Beth Israel Deaconess Medical Center, Brigham and Women’s Hospital, Boston Medical Center, and Massachusetts General Hospital) during the months of November through April, for the years 2010–2015. They focused on admissions for cardiovascular diseases; cold-weather related conditions such as frostbite; and falls and injuries.
“This was a complex data science endeavor that required coordination and linkage of electronic medical records across hospitals,” said senior author Dr. Francesca Dominici, professor of biostatistics and senior associate dean for research at Harvard Chan School.
Other findings included:
Health hazards posed by snowfalls may have previously been unrecognized, according to the researchers. A possible explanation could be that people who are most susceptible to cardiovascular events and falls stay indoors during heavy snowfalls and avoid potential hazards, say the researchers.
They write that the two-day delayed jump in admissions for cardiovascular events after heavy snowfalls could reflect delays getting to the hospital during snow emergencies.
The mechanisms by which snowstorms lead to adverse cardiovascular events that are not fully understood, noted the authors. Snow shoveling may be one such factor. This possibility derives from prior studies of “snow-shoveler’s infarction,” which found that heavy snow shoveling resulted in cardiorespiratory demands that were comparable to or higher than the demands of maximal treadmill testing. | <urn:uuid:596e879a-5a67-4598-be57-06c86cf1dc5c> | CC-MAIN-2020-45 | https://www.aspph.org/harvard-cardiovascular-disease-related-hospital-admissions-jump-on-second-day-after-major-snowfall/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107880656.25/warc/CC-MAIN-20201023043931-20201023073931-00359.warc.gz | en | 0.955711 | 461 | 2.703125 | 3 |
Research Resources in Bristol
Research Materials in Bristol
Bristol has a wide range of archives and published collections that can be used by historians from the undergraduate level, onwards. Major collections cover subjects as diverse as the history of slavery, methodism, liberalism and the theatre, as well as major collections relating to the history of the city and its region. The following provides a guide to some of the resources available at Bristol.
- Online Resources (subscribed)
- UOB Historical Studies, Resources & Support
- Bristol University Special Collections
- Bristol Central Library
- Bristol Record Office
- Empire and Commonwealth Museum
- Bristol University Theatre Collection
- Wesley College
- Feminist Archive
ARTstor A huge digital image library.
- Brunel papers: Letterbooks, sketchbooks, accounts and diaries of the 19th century engineer, Isambard Kingdom Brunel.
- Gladstone Library: Papers and books of the National Liberal Club and the Women's Liberal Federation, 1888-1988. This includes an exceptional collection of political pamphlets from the 19th and 20th centuries.
- Penguin Books Ltd: Historical and editorial files.
- Pinney Family papers: Accounts, letter books, family and estate papers of a major merchant family involved in the West Indies trade, including the eighteenth century slave economy, 1650-1986.
- Bristol Moravian Church: diaries, minute books, memoires and congregational library, 1760-1893
- Major printed collections cover: Early science and medicine, Business History, Courtesy Books, Early Novels and Garden History.
- Bristol Local Studies Collection: Begun in 1855 this contains c.25,000 printed works, in addition to manuscript collections on matters relating to Bristol history.
- Emanuel Green Collection: Over 10,000 items relating to the history of Somerset and the City of Bath. Strong on early topographical and biographical material.
- Manuscripts and printed material relating to Samuel Coleridge (1772-1834) and Thomas Chatterton (1752-70).
- Richard Smith Collection: Manuscript and printed material related to the history of the theatre in Bristol, 1672-1843.
- Collection of documents relating to slavery in and the Slave trade in the West Inides, 1723-36.
Enquiries: Tel. (0117) 903 7202
- Records of Fry and Sons Ltd. Chocolate manufacturers, 1693-1966.
- Imperial Tobacco Ltd . (formerly W.D. and H.O. Wills): Records, late 18th century - 20th century.
- Sir George White: Papers of the transport pioneer, c. 1874-1935
- P. and A. Campbell Ltd. Paddle steamer company, 1893-1971.
Enquiries: The City Archivist, Tel. (0117) 922 4224
Opened in 2002, this museum is rapidly acquiring major archives of national and international importance.
The Theatre Collection is an internationally renowned research centre for the study of drama and British theatre history.
Reference library: over 8,500 reference books on performance, theatre and theatre history; a wide range of periodicals from the nineteenth century to the present day; and a collection of rare books.
Archive: second largest of its type in the UK, contains a vast array of original and unique material, including:
- Company Archives: London Old Vic; Bristol Old Vic; Welfare State International.
- Personal Archives of designers, writers, producers, and actors, managers: Stephanie Cole, Joyce Grenfell, Julia Trevelyan Oman, John Moody, Herbert Beerbohm Tree, Alan Tagg.
- Design Collection: more than 5,000 set and costume designs.
- Theatre Historians papers: Eric Jones-Evans, Kathleen Barker.
- Programme and Playbill Collection: London and regional professional productions.
- Set Models: over 70 theatre and set models, inc. designs by John Elvery, Norman Hunter, Michael Knight, John McMurray, Tanya Moiseiwitsch, Patrick Robertson, Richard Southern, Alan Tagg.
- The Women's Theatre Collection: more than 1,000 published and unpublished playscripts, and smaller, personal archives of women playwrights, and directors.
- Art Collection: material from the eighteenth century onwards.
Our web site provides more details about the Collections and has a searchable database of the catalogued parts of the archive: www.bris.ac.uk/theatrecollection
Major archival collections concerned with the history of the Methodist Church.
Enquiries: The Hon. Archivist, Tel. (0117) 926 4740
Collections of material from the 1950s, includes the Greenham Peace Camp Collection. | <urn:uuid:0bab3f92-311c-477e-95d6-0f015ad92501> | CC-MAIN-2017-43 | http://www.bristol.ac.uk/history/research/resources.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822116.0/warc/CC-MAIN-20171017144041-20171017164041-00221.warc.gz | en | 0.845481 | 988 | 2.609375 | 3 |
Nanotechnology is a highly strategic industrial and economic sector with enormous potential benefits for many societal and environmental domains.
"Towards a method for detecting the potential genotoxicity of nanomaterials"
Human exposure to manufactured nanomaterials (MNs) used in consumer products may occur during several phases of their life cycle, from synthesis, production and inclusion in products to the release of these nanomaterials into the environment.
The lack of scientific knowledge and the absence of evidence demonstrating the safety of certain nanotechnology products make regulation very difficult (Source: January 2009 SCENIHR opinion). Because of this, health and safety evaluation is attracting the attention of the public and of governments worldwide.
The Executive Agency for Health and Consumers awarded a grant through the second programme of Community action in the field of health (2008-2013) for a Joint Action on the "Safety of nanomaterials".
The aim of this Joint Action is to establish a robust (specific and sensitive) methodology to assess the potential genotoxicity (i.e. inducing DNA damage) of MNs and to generate data on the genotoxic effect of certain reference materials.
Title: Safety evaluation of manufactured nanomaterials by characterisation of their potential genotoxic hazard.
Priority area: Improve citizen’s health security
Context of the Joint Action:
A call for a Joint Action on "the Safety of Nanomaterials" under Section 3.2 "Improve citizens' health security" of the Community Public Health Program work program was published on Thursday, 26 February 2009, following an initial proposal by France (DGS) This Joint action was approved in July 2009 for 6.2 millions of Euros of which 2.9 M€ (46%) were funded by European Commission’s health programme, while partners and some ministries of the participating Member States (Belgium, France, Germany, and Netherlands) provide the remaining.
The Action was launched on 18-19 March at the AFSSET (Paris, France) the project aims to obtain a sound and reliable method for detecting the potential genotoxicity of manufactured nanomaterials within 3 years.
Nanotechnology is a highly strategic industrial and economic sector revealing enormous potential benefits for many societal and environmental domains. Human exposure to manufactured nanomaterials used in consumer products may occur during several phases of their life cycle: from synthesis, production and inclusion in the final products to the release of manufactured nanomaterials to the environment (through industrial emissions or product disposal).
Nanotoxicology, that study of the potential adverse effects of chemicals (in our case nanomaterials) on living organisms, is thus attracting the attention of the public and of governments worldwide.
The lack of scientific knowledge and absence of evidence of the health and safety potential hazards of nanotechnology products, however, make regulation very difficult (source January 2009 SCENIHR opinion (PDF). The general objective of the Joint Action is a high added-value complement to the Member States’ policies and contributes to improve citizens’ health security and also participates in the EU’s leadership position in this field as well as in ongoing international work ( OECD, ISO…).The aim of the Joint Action is highly relevant in the current context. It targets crucial items identified in the programme providing a genuine European dimension as 16 institutions from 11 Member States, including new Member States, are involved.
The methods and means implemented include 4 scientific Work Packages (WPs) with the aim of:
- strengthening, expanding and sharing the knowledge required for hazard, exposure and overall risk assessment of manufactured nanomaterials (MNs), in particular by building a strategy able to generate relevant and reliable data for EU public health authorities (scopes 1,2,3);
- accelerating the exploitation of existing data, FP6 (Sixth Frame Work Programme) and FP7 (Seventh Frame Work Programme) projects such as: NANOINTERACT, NANOSTRAND, NANOSH, NANOSAFE, and the exchange of best practices in risk assessment and management, thus minimising the potentially harmful long-term effects of MNs. The Joint Action may offer society alert signals for genotoxic substances leading to potential cancers or reproductive diseases. It constitutes a first step towards creating a future programme by public health authorities based on long-term animal studies or epidemiological population surveillance (scopes 1,2,3);
- promoting the establishment of a robust methodology to screen potentially genotoxic MNs. To achieve this, fully characterised MNs widely used in consumer products are tested with standard in vitro assays completed with specific tests. Using these results, a ring test (among participating MS laboratories) for the relevant assays is performed. This methodology may be used by regulatory control bodies and industrials to check for possible genotoxicity as alternative techniques to animal experimentation. In vivo assays are conducted to characterise the toxicokinetics of selected MNs and validate the in vitro data. Standard Operating Procedures ( SOPs)will be used and if lacking, will be established as a priority. If needed, the audit of laboratories (cross evaluation) and/or staff training is planned to ensure that the laboratories involved conduct their studies following the SOPs contributing then to highlight national reference laboratories in this field (scope 2).
Major expected outcomes of this Joint Action are:
- Increasing health information and knowledge about the human and environmental safety of MNs by generating relevant and reliable data sets by:
- Distinguishing specific hazards regarding the physical and chemical parameters of MNs.
- Establishing a correlation between in vivo and in vitro geno-toxicological data and completing information on manufactured nanomaterial bioaccumulation by identifying target organs.
- Promoting a robust reliable methodology for testing potential genotoxicity of MNs by exchanging best practices through a round robin test. The MNs to be tested are widely available in many kinds of products, namely TiO2 and SiO2 MNs, but also carbon nanotubes ( CNT) which, according to the literature, might present toxicological effects in experimental animals similar to asbesto.
The JA will provide quick, reliable and economical tests to assess potential genotoxicity of MNs with alert signals useful for society and industries. Distinguishing specific hazards regarding the physical and chemical parameters of MNs.
General objective of the project
The general objective of the JA is to complement, support and add value to the Member States' policies and to contribute to increasing the safe use of MNs in the European Union. The JA intends to improve citizens' health security by:
(i) Strengthening, expanding and sharing the knowledge required for the assessment of the hazard, exposure and overall risk of MNs at the European level. The JA provides a genuine European dimension since it involves a significant number of institutions from many Member States. It will contribute to building a strategy able to generate relevant and reliable data for Public Health authorities to assess the risk of nanomaterials.
(ii) Accelerating the exploitation of existing data (using previous and ongoing EU FP6 and F P7 projects (e.g. NANOSTRAND, NANOSAFE, NANOSH, NANOINTERACT) and the exchange of best practices in risk assessment and management thus minimising the potentially harmful long-term effects of MNs. The JA will thus contribute to giving society alert signals for genotoxic substances. It will constitute the first step towards the creation of a future programme based on long-term animal studies or epidemiological population surveillance by Public Health authorities.
These two objectives above are implicit throughout the whole JA and its 4 scientific work packages.
(iii) Promoting the establishment of robust methodologies throughout the EU. In order to make available a robust methodology (specific and sensitive) to screen potentially genotoxic MNs, fully characterized MNs widely used in consumer products will be tested with standard in vitro assays completed with specific tests. Taking into account these results, a ring test (among the participating Member State laboratories) for the relevant assays will be performed in order to establish a robust methodology to be used by the regulatory control bodies and industries to check for possible genotoxicity using alternative techniques to animal experimentation. In vivo assays will be conducted to characterize the toxicokinetics of selected MNs and compared to in vitro data.
Regulation on MNs is nearly absent, yet there is growing concern, as highlighted in the January 2009 SCENIHR opinion on the Risk assessment of products of nanotechnologies. Long-term risks of MNs to public health may be important, which is why priority is given to cancerogenesis of MNs for which the preliminary required step is their characterization. The partners included in the proposal were selected for their knowledge of the field, and of their skills, with due notice to the budgetary constraints.
Targets groups are:
(a) The general public. An overview of nanomaterial present in consumer products and available on the European market shows that MNs are used for a wide variety of applications (e.g. pharmaceuticals, food...) and technologies (e.g. ICT, energy, transport...). The most important product categories in Europe are: motor vehicles, electronics, computers, personal care, cosmetics and household. As for all newly developed substances or products, attention should be paid to potential health risks.
(b) The regulatory authorities and market surveillance bodies. Implicitly, according to REACH, the use of MNs is regulated by manufacturers (and importers) responsible for the safety of the chemicals or products they produce (or import), enabling the authorities to take action if products pose a health risk.
It is, however, questionable if new risks arising from the presence of MNs will be recognized through the current regulatory system. More knowledge is therefore needed to assess the extent to which the current legislations can identify potential new risks.
(c) The implicated industries which should apply the developed methodology before marketing their MNs directly or in consumer products.
(d) The policy-making bodies. Until there is an evidence base on which the nature of the risks posed by MNs can be determined, it is not possible to assess the extent to which the implementation of current legislation addresses all potential risks posed by MNs.
Methods and means
Member states who are developing their skills on this topic were also included, with special attention to their needs through the implementation of audits, and if necessary, of training activities. The framework of the JA thus includes, if needed, depending on the capacities of the laboratories involved to correctly perform the experiments according to the protocols defined, the audit of laboratories and/or staff training to ensure that the different laboratories involved run studies in their own lab with the correct SOPs.
The technical role of each partner organization is clearly defined in the work package descriptions. The partners involved are key organizations in the field within each country; this and the close links with ministries in the JA will ensure that the JA results will be communicated to participating countries. Other countries will be informed of the JA through an active dissemination strategy with a number of proposed tools, and through possibilities for further possible involvement as collaborating partners (this is already the case with the UK and Ireland). In addition, various JA partners have had the opportunity to work together in the past in research projects (co-funded by the EC or other sources) as well as in programmes such as the OECD WPMN.
To build a robust reliable methodology with alternative tests for risk assessment of MNs, the following list of prerequisites will ensure that the testing results are comparable:
- standard operating procedures (SOPs) are used and disseminated to all participants by the WP leaders including handling, dosimetry and dispersion of MNs in culture medium etc. If a SOP is lacking, this will be the first priority milestone;
- as far as possible, all experimental studies will use the same origin/source of particles (i.e. same production method and physicochemical characteristics). The aim is to use the same specifically designated batch for each WP. For each study, a control of the culture media used by the different laboratories will be done to check for possible variations;
- OECD guidelines will be preferably used and, if needed, adapted to take into account MN specificities;
- each WP, for the same type of work, will harmonise practices to minimise potential variations due to different batches and methods of sample preparation
The JA has 4 scientific WPs:
- To interpret and compare genotoxicity tests results, the MNs need to be fully characterized (WP 4) including detailed physicochemical properties and SOPs for producing suitable suspension of the MN types in mediums used for genotoxicity testing. MNs are delivered by industry with technical specifications and dispersed following standardized procedures to be agreed. Sufficient quantities from defined and characterized batches are supplied to partners at comparable qualities for each WP;
- For in vitro genotoxicity testing (WP5), OECD GD 34 needs consideration in planning of the standardized round robin tests. All routes of exposure will be covered by different cell lines: pulmonary cell lines and one intestinal for all MNs, one reconstructed human full skin model only for TiO2 due to its specific use in cosmetics. Comet and micronucleus assays will be performed as well as MLA and lymphocytes micronucleus assay following the available international guidance documents;
- For in vivo genotoxicity (WP6), as far as it remains feasible, in light of technical constraints and limitations (feasibility with regards to dispersion, characterization protocols, the reproducibility of the protocols etc.), pulmonary and oral exposure routes will be tested on selected MNs, using instillation to mimic inhalation and gavage for oral exposure. Skin models will not be used because rats are not sensitive to the dermal route and the use of other animals e.g. mini-pigs raise ethical problems;
- For toxicokinetics (WP7), oral route and IV routes will be considered for TiO2 and SiO2 and only IV for CNT in order to know which doses to administer to rats and identify target organs for accumulation. Selection of the MN dose-range to be tested is crucial for in vitro and animal exposure: realistic doses (epidemiologically meaningful doses) will be used.
Each scientific work package, in order to achieve the third general objective of promoting the Establishment of a robust methodology must carry out, upstream, the first 2 general objectives mentioned through studying the state-of-the-art and existing data in order to choose what is relevant for MNs and justify their choice of protocols. Furthermore, each laboratory involved in the JA must run these protocols and it is important that each step is fully defined and justified as all scientific WPs are interlinked and dependant on the actions and results of the other scientific WPs. Hence, knowledge sharing is central to the JA.
Human exposure to MNs used in consumer products may occur during several phases of the life cycle of those consumer products, i. e. the synthesis of the MNs, the production, inclusion and use in consumer products and the release of MNs to the environment (through industrial emissions or disposal of consumer products). Therefore, all exposure routes will be tested on MNs selected from industry, both in vitro and in vivo. The expected outcomes deal mainly with information that is not currently available.
The major outcomes are:
1) Collecting, analyzing and disseminating health information and knowledge about the human and environmental safety of nanomaterials (scopes 1 and 2) by generating relevant and reliable data sets by:
- (i) Distinguishing specific hazards regarding the physical and chemical parameters of MNs.
- (ii) Providing toxicological parameters for risk assessment and better understanding the behaviour of MNs by comparing them to conventional materials (scopes 1, 2 and 3).
- (iii) Establishing a correlation between in vivo and in vitro genotoxicological data as well as completing the information on MN bioaccumulation by identifying target organs (scope 2).
2) Promoting a robust reliable methodology at the European level in order to be used for testing potential genotoxicity of MNs by exchanging best practices through a round robin test involving 11 European States including New Member States (scopes 1, 2 and 3). This methodology will have t he interesting advantage of quickly defining an available economical procedure for MNs genotoxicity alert signals. In addition, these alert signals could be applied to MNs, already widely used on the market, namely TiO2 and SiO2, but also to MNs, which according to the current literature, have some toxicological effects in experimental animals, namely CNT. This action will help reinforce the European Union's leadership on MN safety and contribute to international work already ongoing ( OECD and ISO). An additional benefit may be a possible application to the non-intentionally produced nanomaterials (e.g., nanoparticles form smoke and diesel), thus providing a better understanding of their behaviour (scope 2).
Thus, the outcomes of the JA target crucial items of the programme by facilitating overall safety evaluation for MNs (scopes 2 and 3), sharing knowledge on identified MNs (scope 1) and filling the gaps in risk assessment through genotoxicity ring testing (scopes 1, 2 and 3). The outcomes also bring significant added value at the European level through the participation of key actors in the consortium.
Furthermore, national reference laboratories will be highlighted through the consistent use of standard operating procedures and cross evaluation and/or staff training in the laboratories involved.
Concerning the long term contribution or sustainability of the JA, this will be ensured in a number of ways. At a minimum, a network of reference laboratories will have been created. Those laboratories could continue, even after the JA, to work either on their own or within the network, on the basis of the developed SOPs to continue the work. In addition, a database will have been developed within the JA, with data that are valid and exploitable and can serve as a reference. These data will be available for different materials, selected for their different potential levels of toxicity (based on current knowledge), materials which are widely produced and used, available on the market, and for which exposures occur through different routes. In addition to the creation of a database, the JA will develop a robust, rapid, reliable method, alternative to animal testing, capable of giving alert signals to different target groups:
Manufacturers who may decide to stop developing materials on the basis of the obtained results, or control authorities, or citizens. The developed method can be transferred to other stakeholders outside the JA. Also, for the organizations participating in the JA, the project will offer a possibility to share technical competences as well as procedures and SOPs. | <urn:uuid:01c183f5-7243-431e-9dc1-1801a7cc6a54> | CC-MAIN-2023-50 | https://www.anses.fr/en/content/nanogenotox-project | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00480.warc.gz | en | 0.922776 | 3,890 | 2.71875 | 3 |
All probability is conditional and we are always interested in some proposition, call it X. We want to know “the probability of X”. Well, there is none: not ever. There is no unconditional “probability” of anything.
There is, however, Pr(X | E), where E is some evidence (data, observations, premises, surmises, whatever). Change the evidence, change the probability.
In the precautionary principle, X is some disaster or undesirable event. Now it is easy to supply some E to deduce a probability of X. If there was widespread agreement on this E, then there would be agreement on the probability of X. The opposite case is also true. In global warming, there is great disagreement about evidence, usually because lovers of models chose to forget their creations’ flaws. Love is blind.
But the precautionary principle doesn’t quite work that way in practice. Usually the X is dire and the E is missing except to say E_c = “X is possible”, which is another way of saying X is contingent. All contingent things are logically possible; i.e. they are not impossible. With E_c, officially 0 < Pr(X | E_c) < 1, which tells us almost nothing except that X is not logically impossible and that X is not logically necessary. Weak evidence indeed.
Notice very carefully that Pr(X | E_c) is not 0.5, nor any other single number. You can’t use this interval to argue the probability “may be likely”. This is a false reading. The probability is the interval.
Another point of stress: if we knew or agreed upon decent E such that Pr(X|E) is greater than some decision threshold, then we do not need to use the precautionary principle. We’d have Pr(X|E) and we can use the some regular form of decision making. The precautionary principle is only invoked when such evidence is missing. Indeed, it is used to supply the missing evidence. The argument is that we don’t know E so we don’t know the probability but we do know E_c, thus X could happen, therefore X is sufficiently likely, thus we ought to do something. This is obviously a fallacy.
Or the precautionary principle is used when evidence exists which shows the chance of X is very low indeed. Say E_r (for realized evidence) then Pr(X|E_R) = ε > 0, but only just. It’s then said that because this probability is greater than 0, this is sufficient if the doom in X is disastrous enough. That’s why yesterday at The Stream I illustrated the precautionary principle with a hostile alien invasion.
An invasion is a contingent event, so it’s logically possible. There exists lots of (non-quantitative) evidence that this chance is near-zero low, such as the vast distances of space and so forth. But it could happen! And, like I said, if it did, nothing short of the Apocalypse would be as bad. Thus, according to the precautionary principle, we should—even must!—act to stop it.
Yet alien invasions are only the start of contingent doomsday events that might destroy us all. Rocks from space, viral mutations, planetary plagues, black holes plunging into the ocean, serial volcanic eruptions, the core of the Earth spinning out of control, Hillary presidency, rapacious nanobots, rogue humanoid robots, and on and on. Because each is possible and each would destroy mankind, no amount of protection is too little.
And then there are the troubles I mentioned yesterday, the precautionary principle applied to itself. If we can’t agree on the evidence such that we can say something about the probability of X, then the effects of protecting against X by manipulating the causes or possible causes of X are also likely unknown, and just as likely as hazardous, or perhaps even more hazardous, than X itself.
The solution is boring. Return to the hard work of amassing evidence such that we can agree on the evidence and compute reasonable probabilities. Tough, grueling, time-consuming labor.
Or you can run around like an addled fool and call your detractors “Deniers!” or “Troglodytes!”
Update Another Twitter interaction.
I hope readers can see that.
If a “black swan” is defined as X = “an event which we know nothing about”, then we cannot find evidence E probative of it. There is no probability. Notice that that “nothing” is a very strong word. Make sure you get this.
What I have seen is that some define “black swans” as events which we can characterize at least partly. For instance, X = “Destruction of the human race” (or, in vulgar terms, X = “Loss of all capital”) . No idea in X how the event comes about, thus finding evidence probative of it is a problem. Like I said above, we can go on endlessly positing different ways the world can end. All these can form E, which, taken together, make X all but certain. Ponder this.
But because we packed everything into E, and formed a frightening probability of X, we have learned nothing. Which of the elements of E should we protect against—if it’s even possible? We can’t say “all of them”, because this is silly. | <urn:uuid:ff5c3c3b-b4e4-4702-a4f7-3b23fd1e7c34> | CC-MAIN-2018-22 | http://wmbriggs.com/post/16515/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868248.78/warc/CC-MAIN-20180527111631-20180527131631-00207.warc.gz | en | 0.943208 | 1,176 | 3.6875 | 4 |
D3 helps you bring data to life using HTML, SVG and CSS.
Basically Using D3.Js we can easily visualize the data's.
There are many library for viualize the data as graphs.But the beauty of d3.js is SVG (Scalable Vector Graphics) based.We can easily create and show any type of visualizing not only like line chart,bubble chart,area chart etc.Also,We can create based on our choice.
What is SVG mean?
SVG stands for Scalable Vector Graphics. SVG is used to define vector-based graphics for the Web SVG defines the graphics in XML format SVG graphics do NOT lose any quality if they are zoomed or resized
Every element and every attribute in SVG files can be animated
Mercury leverages virtual-dom which uses an immutable vdom structure
Mercury comes with observ-struct which uses immutable data for your state atom
Mercury is truly modular, you can trivially swap out subsets of it for other modules
Mercury source code itself is maintainable, the modules it uses are all small, well tested and well documented. you should not be afraid to use mercury in production as it's easy to maintain & fix.
Mercury encourages zero dom manipulation in your application code. As far as your application is concerned elements do not exist. This means you don't need to reference DOM elements when rendering or when handling events
Mercury is a small glue layer that composes a set of modules that solves a subset of the frontend problem.
Crafty, previously known as CraftyJS, is a small, simple, and lightweight game engine that can greatly help you build prototypal or fully-featured 2D HTML5 games. Crafty is also open-source and completely free. Its code is hosted openly on GitHub.com and is distributed under the MIT or GPL license.
A Crafty.js game is build up of entities -- the player character, enemies, and obstacles are all represented this way.
Loads any module format when running the ~15KB development build.
Loads ES modules compiled into the System.register module format for production with exact circular reference and binding support
Supports RequireJS-style map, paths, and bundles configuration.
Built with the ES Module Loader project, which is based on principles and APIs from the WhatWG Loader specification, modules in HTML and NodeJS.
Supports IE9+ provided a promises polyfill is available in the environment.
System.js however is a pretty good replacement for require.js. The config is robust, the bundling API is reasonable, and if you have dynamic loading scenarios, especially where you don't know the resources at bundling time, it's really a good client loader.
The above definition may be ambiguous, in simple terms, PhantomJS is a web browser without a graphical user interface.
Since PhantomJS is not usable when it comes to surfing the web, it has a whole set of features that developers love and use for many purposes.
Multiplatform, available on major operating systems: Windows, Mac OS X, Linux, and other Unices.
Pure headless (no X11) on Linux, ideal for continuous integration systems. Also runs on Amazon EC2, Heroku, and Iron.io.
Video for Phantom.Js https://www.youtube.com/watch?v=6Y3ugEFU0uU | <urn:uuid:fedfb4c1-bbf3-404d-b086-2682ad29dc18> | CC-MAIN-2017-30 | http://tech.queryhome.com/141918/small-discussion-about-dimple-js | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424721.74/warc/CC-MAIN-20170724042246-20170724062246-00327.warc.gz | en | 0.869816 | 713 | 2.53125 | 3 |
we often read or hear about the water’s surface tension and how it affects fly-leader-fly line floating/sinking abilities and also how aquatic insects can have a hard time breaking through it on their way to the surface and other insects can use it to literally walk on water. often described as some sticky, gluey thing that’s between water and air but what is it exactly ?
since i probably won’t be able to explain it without making any silly mistakes.., i’ll let this silly young lady do it for me !
“Africans do this with mosquitoes to help stop the spread of Malaria, material (soap) is put in the water to break the surface tension. Mosquitoes use water tension to land on the water so that they can lay their eggs. Without the water tension, they sink like that spring.”
so, how does this help us in our fly fishing world ?
apart from something cool to know and yet another example of how amazing water is, if you’re a fisher that doesn’t think that a floating tippet near a dry fly makes a difference and you still catch fish, then this won’t help.
however, if you want to up your game, specially on fish that aren’t on a feeding rampage or on slower waters or on any types of waters and you’re dealing with fish that might be in a mild-alert stage then one of the best ways to have a chance with them is to degrease a good 2-3 ft of your terminal end leader or tippet with sink paste to get it to break the surface tension as soon as the fly alights on the water.
as a reminder, sink pastes are typically made of three ingredients- liquid soap, glycerine and clay powder. the powder acts as a binding agent (it’s also a very mild abrasive that removes a little surface shine from monofilaments), the glycerine keeps the paste from drying out and the main ingredient is as seen in the accompanying videos: soap, which allows the tippet to sink under the surface rapidly and not be so visible and light reflecting and/or create nasty shadows on the riverbed on a sunny day.
if currents aren’t too strong sink paste also greatly helps unweighted wet flies and nymphs to get into the feeding zone without having to weigh down the flies themselves or use split shot or whatever resulting in a free moving, more realistic impression of life to the fly. this last point is no secret but it’s rarely brought up and it’s a real gem to have in your bag of tricks.
since science and trippy often go hand-in-hand, here’s another eye candy example of surface tension experiments,
and how even water itself can be subject to the sticky-gluey barrier. | <urn:uuid:939df434-91c3-46d7-896a-b6b2f36f5265> | CC-MAIN-2017-13 | https://thelimpcobra.com/category/water/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191353.5/warc/CC-MAIN-20170322212951-00230-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.940849 | 607 | 2.734375 | 3 |
The Resurrection, Cecco del Caragaggio (Francesco Buoneri)
One of Caravaggio’s most important assistants and pupils was known as Cecco del Caragaggio, more recently identified as Francesco Buoneri.
Though a number of works are attributed to him, this striking painting of the Resurrection is the only one assigned to his hand with certainty.
Buoneri evidently learned much from his master, from his command of the human form in foreshortening, to the dramatic chiaroscuro with which he pulls his figures from the background. He also mastered the depiction of armor and drapery, as well as the textures of clothing, fur and feathers.
Though the composition seems a bit oddly “stacked”, the individual figures are immensely strong. The faces of the angel and the soldiers guarding the tomb are marvels of expression. | <urn:uuid:e2d1abca-bb39-4fb3-9845-44360985c374> | CC-MAIN-2021-39 | http://linesandcolors.com/2016/03/27/the-resurrection-by-cecco-del-caragaggio-francesco-buoneri/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057039.7/warc/CC-MAIN-20210920131052-20210920161052-00185.warc.gz | en | 0.975213 | 187 | 2.640625 | 3 |
Nuclear Magnetic Resonance (NMR) spectroscopy is a powerful technique in structural biology for obtaining high resolution 3-D structures of proteins, second only, and complementary to X-ray crystallography. Molecules are studied in solution, where conditions are closer to what is found in the cell. It is the primary technique used to obtain information on intrinsically disordered (unfolded) proteins, since these proteins will not crystallize easily.
The aim of this book is to provide the newcomer to NMR techniques with practical guidance on how to choose the right experiment, how to carry out the experiment, and how to analyse the resulting spectra. Those who are familiar with the chemical applications of NMR will also find it helpful in describing the special requirements of proteins.
Keywords: NMR Spectroscopy / MRI / Imaging | <urn:uuid:fd0c37bd-8a0c-474e-8ce6-bcbfadb924b9> | CC-MAIN-2018-34 | https://www.ellibs.com/book/9781119972013/protein-nmr-spectroscopy-practical-techniques-and-applications | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210559.6/warc/CC-MAIN-20180816074040-20180816094040-00409.warc.gz | en | 0.922729 | 169 | 2.71875 | 3 |
If Elon Musk, the CEO of Tesla Motors and SpaceX has his way, humans will take their first step onto Mars in 10 years.
Musk said in an interview with The Wall Street Journal last week that a 10-year timeline was his "best-case scenario" for reaching the planet. Worst case, he said, would be 15 to 20 years.
Musk, also the co-founder of PayPal, founded SpaceX in 2002 to develop launch vehicles for exploring and developing space. The company has already built several rockets suitable for launching cargo, but its stated goal is to send humans to space.
"I want SpaceX to help make life multi-planetary. I'd like to see a self-sustaining base on Mars," Musk said in the interview, most of which focused on Tesla. "...We want to be the shipping company that brought people from Europe to America or the Union-Pacific Railroad. Our goal is to facilitate the transfer of people and cargo to other planets."
NASA's own human spaceflight programs were recently cut, but the organization has been hiring outside companies to devise alternatives. Last week NASA awarded SpaceX a $75 million contract to enable one of the company's spacecraft to carry astronauts. | <urn:uuid:52c6eb67-30cf-44b6-9b81-ae68ec970547> | CC-MAIN-2014-52 | http://mashable.com/2011/04/25/elon-musk-mars/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770718.139/warc/CC-MAIN-20141217075250-00058-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.97493 | 247 | 2.875 | 3 |
April 10th, Humanitarian agencies said that the cessation of hostilities in Yemen comes at a crucial moment when an entire country is on the brink, as well as they warned that should the ceasefire break down again, as previous ones did, the consequences would be catastrophic.
This last year of escalated violence has meant that each day, around 6610 people were forced to flee their homes and around 25 civilians are killed or injured. A school or health facility has been attacked every three days. The number of children dying daily from preventable diseases has risen to 137, an additional 28 a day since the start of the war. More than 82 per cent of Yemenis, or 21.2 million, now depend on humanitarian aid.
In just the last two months, more than 325,700 people were displaced by the conflict, raising the total number of displaced to a staggering 2.75 million.
“This is a moment of truth for Yemen’s millions of civilians. A real ceasefire could be the first step towards ending this staggering yet forgotten crisis,” said the Secretary General of the Norwegian Refugee Council, Jan Egeland. “If it doesn’t hold, those breaking it must be held accountable for the bloodshed. The figures speak for themselves. Every day of war is another day of massive death, displacement and despair.”
While an immediate cessation of hostilities is essential, it is just the first of several measures needed to stop the crisis and pave the way for long-lasting peace and recovery.
“The widespread destruction of Yemen’s houses, factories, schools and hospitals will require decades to rebuild; the destruction of Yemen’s social fabric and the trauma millions of innocent people are suffering will take even longer to heal,” said Sajjad Mohammad Sajid, Oxfam’s Country Director in Yemen, “in the more than three decades that we’ve been working in Yemen, we have never witnessed a crisis of this scale. The blockade, war and now a looming banking crisis risk pushing millions into famine.”
The humanitarian agencies reiterated their call on international governments to fully fund the humanitarian response so that millions of civilians receive essential aid and services like food, water, medicine and housing as an immediate priority. Parties to the conflict need to allow aid agencies to reach those most in need caught in the fighting, and the most vulnerable to reach the services they need. The commercial blockade needs to be lifted so that commercial supplies are allowed into Yemen.
Save the Children’s Country Director in Yemen Edward Santiago said, “as long as parties to the conflict continue to wage war and obstruct aid, millions of children will continue to go hungry or without healthcare, clean water and education. Yemenis must not be let down yet again, with more empty promises of ceasefires that fail to stop the killing. Yemeni children need more than words this time, they need action and a genuine commitment to end the violence once and for all.”
The agencies warned that the upcoming UN-sponsored peace talks, due to start on 18 April, are the only real opportunity to end the suffering. Long-term solutions however must include the voices and concerns of Yemeni civil society in a representative and inclusive process.
“All Yemenis need their voices to be heard if there is any hope for these peace talks to be sustainable,” said Daw Mohammed, CARE Country Director in Yemen. “Women, youth and minority groups must be included because they will be critical to rebuilding Yemen in the years to come.”
Statement released by:
Danish Refugee Council
International Rescue Committee
Norwegian Refugee Council
Save the Children | <urn:uuid:89038a0e-f9cb-4474-8560-79080d84deee> | CC-MAIN-2018-09 | http://en.althawranews.net/2016/04/yemen-ceasefire-must-hold-or-thousands-more-will-die/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814101.27/warc/CC-MAIN-20180222101209-20180222121209-00013.warc.gz | en | 0.947446 | 749 | 2.515625 | 3 |
National Taiwan Museum, established in 1908, is the oldest museum in Taiwan. The Japanese government wanted to commemorate the opening of the west coast railway and so established the Taiwan Governor Museum on October 24, 1908. At its opening, there were more than 10,000 pieces of collections in the museum. In 1913, funds were collected to build the Governor-General Kodama Gentaro and Chief Civil Administrator Goto Shinpei Memorial Museum at current site. In 1915, after two years of construction, the museum was completed. It is one of the most noteworthy public buildings in Taiwan.
The museum was designed by Japanese architect Ichiro Nomura and Eiichi Araki. The construction was carried out by the company Takaishi Gumi. The structure itself is reinforced concrete (RC) with load-bearing brick walls. RC was an advanced technology in the early 20th-century in Taiwan. The roof was made of cypress and covered with copper tiles.
With its Greek temple facade and Pantheon-like vaulted ceiling, the museum was constructed in classical style. The building can be divided into three parts: the base, the walls, and the roof. The base is raised for a bigger room on the first floor and lend majesty to the structure. The walls are composed of columns, with Renaissance-style windows. The roof is a dome and the gable is decorated with gorgeous flower and leaf patterns. These, together with the huge classical Doric hexastyle columns supporting the portico, create a solemn and sacred atmosphere. From a distance, the 30-meter-high dome appears to float above the surrounding trees and becomes the center of attention.
Walking into the museum, you will find an elegant Renaissance-style hall. In Taiwan, it's hard to find a building that the interior and exterior are done in different styles. This is called eclecticism, an approach that involves various paradigm by need. The main hall of the museum is surrounded by 32 Corinthian columns whose capitals boast exquisite acanthus and volute patterns. The grand staircase at the main hall is also eye-catching.
Looking up at the 16-meter high ceiling, the light spills evenly through the stained glass windows between the double vaults into the hall. This design is similar to that of a Gothic church where light and shadow create a sacred atmosphere. At the time the museum was built, bronze statues of Governor-General Kodama Gentaro and Chief Civil Administrator Goto Shinpei were placed in the alcoves of the lobby. A pattern combining the family coat-of-arms of the two officers was used in the stained glass and lamps, showing the commemorative purpose behind the building of the museum.The exterior wall is decorated with washed pebbles to imitate the texture of stone architecture. The stairs and handrails of the interior are of marble imported from Japan. Black marble and white calcite were used on the interlaced floor, making Taiwan a pioneer in using marble as the main building material. Splendid clay sculptures were installed around the interior doors and windows as well as in alcoves. In addition to popular European floral patterns, these sculptures also showcased Taiwanese elements such as the wax apple, banana, and star fruit.
For over a century, the museum has been standing in front of the Taipei Railway Station, on the north-south and east-west pivotal crossroads of old Taipei in Qing dynasty. Its elegant architecture, rich collection, and unique geographical position have made the National Taiwan Museum an important landmark in Taipei. In 1998, the Ministry of the Interior designated the museum as a National Historic Site. From the colonial-era Taiwan Governer Museum to the National Taiwan Museum today, the building has witnessed the history of Taiwan and also recorded the natural and anthropological development of this land. At the museum, visitors can witness the tracks of development and the many splendors of Taiwanese culture, geology, flora, and fauna.
Today, the museum retains the scale it had when it opened. The collection and research continue to focus on the research of anthropology, earth sciences, zoology, and botany. Through themed exhibitions, educational activities, publications, and various cooperation plans, the museum has achieved its educational goal in the society to welcome and serve the public. | <urn:uuid:ca984291-645a-4823-809f-51adb0483d55> | CC-MAIN-2019-30 | https://en.ntm.gov.tw/content_171.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525133.20/warc/CC-MAIN-20190717081450-20190717103450-00244.warc.gz | en | 0.963404 | 870 | 3 | 3 |
Famous scholars have often said that education is never constant. It is the system of learning that keeps on changing and updating on its way.
Recently, education is undergoing drastic changes. Computer screens are replacing books and copies. Present day schools are employing e-learning methods to teach students.
Apps are helping people to learn anything, anywhere. In addition, with the entry of AI in smart homes, people can know and learn in comfort.
Keeping education in the background, we find educators and policymakers joining hands with technological industries. Corporates are making assistants who will help the user answer all complex questions.
People are using educational apps which help them to learn even during traveling. Schools are turning into smart classrooms. Educational Councils are launching their apps to aid the student with learning. In this regard, engineers are setting certain educational trends.
What is Education Technology?
Education is turning into the knowledge economy. Education and technology are moving together parallelly. Robots, A.I devices such as Amazon Echo, Google Assistants, Siri, etc. are taking over the public and personal platforms.
With this in mind, education technology is still facing some serious with AI. Often, data gathered from people are biased and low in quality.
The cost to generate and accumulate data is also high. Furthermore, personal information security is not guaranteed.
Since the last 5 years of the knowledge, industries are playing a crucial role. Countries like the USA, Canada, Australia, the UK, etc., all have shown incredible progress in terms of educational technology.
They are setting trends for other nations to follow. Nonetheless, we will discuss 7 trends that are changing the system for the last 5 years.
Change in the school system
On the grass root level, schools are changing in terms of digitalization. Classes are becoming smarter by using strong connectivity and machine learning process.
Students are learning every information using computer or apps. Parents can connect to schools using live chat options.
Students are also taking help of Google learning apps to understand any concept. Tech giants are improving their services to provide quick solutions.
Mobile learning is the most followed trend in the last 5 years. Students, teachers, and parents are using tools like the WiFi, iPads, smartphones, mini laptops etc to teach and learn.
This step towards digitalization is addressing a large audience at the same time.
For example, YouTube videos address a mass of people instantly. This step is enhancing the process of interaction.
In addition, with the entry of Alexa, Siri, and Cortana, we can get answers with the use of voice-search.
Other Trends To Follow
- Big Data Tools– Big data finds itself in industrial and educational sectors. Teachers and professors use signals to learn about the progress of the candidate.
- Learning through blend and Flip– Blending and flipping in education is necessary. Modern classrooms show short videos to the students. Finally, discussions and debates take place.
At times, students are given work on similar topics. These simple methods of learning, bring more interest to the student.
- Online courses– This trend is beneficial for distance learners and job seekers. Students can opt for online courses and learn within their comfort hour.
It is flexible and students in foreign countries take up loads of online courses without hampering their studies.
Learning made easy
Every learner has different needs and prerequisites. Some want basic information, while some want knowledge. To help us with this, customized learning has been introduced.
Here, readers or learners can learn through interaction with tools. Each tool will cater to what they wish to learn. We can use Siri to get immediate answers.
Making education fun
Nothing can be better than playing games while learning. Game developers are introducing new video games. These are interactive and teach basic values about cooperation, rewards, and group norms.
Clash of Clans is a classic example. Teachers are also trying to design cooperation, motivation, interaction based on the game pattern. This will change student behavior pattern.
Note for the Reader
The changes in the education system are shaping young minds. Furthermore, the trends that are gaining momentum will change the learning process.
In fact, machine learning is creating a huge impact. In the last five years, we are learning through apps more than teachers themselves.
But there are some serious flaws with AI we must always remember despite its pros. Therefore, we need human efforts. We cannot forget that a tool is an invention of man. | <urn:uuid:ed0dd5c3-6b0a-4c1d-8893-f32370581807> | CC-MAIN-2019-47 | https://www.alanemrich.com/education-technology-trends/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670535.9/warc/CC-MAIN-20191120083921-20191120111921-00166.warc.gz | en | 0.946062 | 911 | 2.890625 | 3 |
Mary Jane and Alex Edaakie bake their bread in a traditional oven called a horno
Imagine Ireland without the potato, Switzerland without chocolate, Italy without the tomato, India without hot peppers. Now imagine Florida with no oranges, California without a single grape, Texas with no cattle, Iowa with no wheat. The year 1492 began a massive two-way exchange of animals, plants, and foods. The "Columbian Exchange," as scholars term it, affects every food ingredient we now grow, buy, cook, or eat.
Pure Old World or New World cuisine simply doesn't exist. Chocolate may have been the "Food of the Gods" for the Aztecs in Mexico, but only as a beverage. It took scientists and industrialists in Belgium, France, Holland and Switzerland to turn it into a delightful solid confection, and a worldwide industry. By the same token, frybread, typical of so many Indian tribes of the Southwest, is composed primarily of wheat flour, unknown in America before Columbus, and baking powder, unknown anywhere before its invention in the 1850s. Ingredients aside, Indian bread baking uses techniques and equipment that long pre-date Columbus.
Mary Jane and Robert Edaakie give demonstrations in Indian bread baking twice a month in the courtyard of the Maxwell Museum of Anthropology on the University of New Mexico campus in Albuquerque. The dishes they produce do speak of long tradition, but that wouldn't be worth much if they weren't so satisfying to eat. Mary Jane is a full-blooded member of the Isleta Pueblo, while Robert is half Isleta and half Zuni; their four-year-old son Alex, who "helps," is four-fourths adorable. The Edaakies (the name is Zuni) offer their goodies for sale, with plenty of background explanation, at lunchtime. There is always a line for their sweets, breads and frybread tacos, and an informal poll I took indicated that everyone in the line-students, faculty and museum workers-had been there before.
"We really enjoy having these demonstrations," Carol Anne Brannan, the museum's Coordinator of Public Programs told me, "It's a good way for people to learn a little about Native American and Pueblo Indian culture and food, and attract people into the museum so they can enjoy our exhibits and learn from them."
When I first met Mary Jane she was busy preparing loaves of bread dough she and Robert planned later to bake in the traditional dome-shaped horno, the outdoor adobe ovens found in Indian communities throughout the Southwest. Mary Jane explained that she had begun the night before with a 25-pound sack of regular all-purpose flour, into which she mixed water, salt, yeast and lard, "with plenty of work." She was busy forming the dough, which she had allowed to rise in a plastic tub the night before, into individual rounded loaves of approximately one pound each. She formed some of the loaves into decorative shapes with hand movements I could never reproduce. "We use these decorative breads for gift baskets for feast days," she explained, " or when we entertain people for special occasions in the Pueblo." I asked her what other kinds of foods were usually served with the bread at such events. "Chicken and rice," she answered, "also stew-lamb or beef with bones-bread pudding, and, of course, chiles." Mary Jane's sweet dessert specialties include thin, diamond-shaped pies, filled with peach, pumpkin and raisins, and her variety of thick shortbread cookies, all of which are popular items among her campus customers.
Once the individual round loves of dough are formed, Mary Jane covers them carefully with plastic wrap and towels to keep them warm for their second rising, which takes an hour or so. Robert is busy at the horno filling it with wood, which he lights, stokes, and nurtures into a vigorous fire. The horno will take about an hour to heat; the loaves will in turn take an hour or so to bake, then additional time to cool.
While the bread loaves rise and the horno heats up, the Edaakies keep busy producing frybread tacos, which take approximately twenty seconds to turn from dough to finished food. Indian tacos differ from Hispanic tacos in one critical respect; they are made with wheat-based frybread instead of corn-based tortillas. Mary Jane hastens to point out that her frybread is not Indian frybread but Isleta frybread. I do not think I will be able to base a doctoral thesis on the differences in frybread among the Pueblos and Indian tribes of New Mexico, though such a comparison may become the impetus for a diet. The one common thread for frybread is that it acts as a symbol for Indian unity; you will always find it at powwows and intertribal councils. Mary Jane stresses that she fries in vegetable oil rather than lard or shortening, as do some other peoples. My own observation was that her frybread, though technically flat compared to, say, a sopaipilla, was puffier than the frybread I had recently enjoyed at the Indian pavilion of the New Mexico State Fair in Albuquerque.
Frybread dough is simplicity itself: flour, salt, water, and baking powder. Mary Jane first forms the dough into three-inch rounds, then rolls them into nine-inch disks using a thin wooden dowel. She uses the same dowel to poke a hole in the center and another an inch or so in from one of the edges. "I make the two holes so the oil can go through the taco and it won't puff up too much," she explains. She throws the taco into a pot of hot oil, while Robert attends it, using a long stick he slides into the center hole to turn the taco and lift it out a few seconds later when it is done. The taco cools a moment, then Mary Jane tops it with a soupy mixture of beans, tomatoes, ground beef and chiles, garnished with lettuce and tomato.
Joe Watkins, Associate Professor of Anthropology at UNM, is one of the many fans of this simple yet satisfying cuisine. We discuss the cultural significance of the breads, the demonstration, and the traditions involved as we sit with little Alex Edaakie at a table just behind the horno. "I love it and come here as often as I can," he says. "I've gotten acquainted with the family and Alexander here. It's like having lunch at home." I dodge an errant gust of smoke from the horno, which is still building to baking temperature; my imagination turns the heat and smoke into big loaves of bread you can cradle like a child. Little Alex repeatedly begs us: "Take me to the Duck Pond." We both explain that he'll have to wait until his enterprising parents finish feeding half the campus. The loaves go into the horno, one by one; the smell is intoxicating. I can now understand why Alex doesn't want to wait. I don't want to wait either.
2 cups all purpose flourSift the dry ingredients together to mix. Stir in the warm water or milk, adding flour if necessary to get the dough to kneading consistency. Heat the oil to 375 degrees Fahrenheit. If you don't have a thermometer, roll out a mini frybread and slide it into the oil as a test; it should fry up nicely in just a few seconds without burning. Frybreads can take any shape, but for tacos, tear off balls of dough the size of your fist, roll them out to 8-10 inch disks, poke a hold in the middle and one an inch from one of the edges (or, if you want the breads to puff up, skip the holes). You fry the dough until "it's done," then drain, put on a topping, or eat as is. Top -- Food Articles Home
1 tablespoon baking powder (make sure it's fresh)
1 teaspoon salt
1 cup milk or warm water
oil, shortening or lard for frying
Food Articles Home --
Style Gourmet Home
Copyright © Elliot Essman 2003
Contact Elliot Essman and Style Gourmet
This page is www.stylegourmet.com/articles/015.htm
Top of this page.
Copyright © Elliot Essman 2003 | <urn:uuid:cf1ca7d0-8413-4e49-819f-9a0e4634ba60> | CC-MAIN-2018-17 | http://stylegourmet.com/articles/015.htm | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947822.98/warc/CC-MAIN-20180425135246-20180425155246-00250.warc.gz | en | 0.964377 | 1,733 | 2.921875 | 3 |
Casein is a quick-drying, aqueous medium using a milk-based binding agent, and is one of the most durable mediums known to man. Nine thousand year old Casein cave paintings have been discovered in Asia, and later, the medium was used by Byzantine, Roman and Renaissance artists including the Old Masters.
In 1933, Casein pigments in tubes were developed by Ramon Shiva who relied on the expertise of the artists who used them to help perfect his high-quality paints. Casein paints can be used to create a variety of effects from the rich opaques of oil to thin watercolor washes. Casein paints may be applied to almost any rigid, non-oily surface such as canvas panel, illustration board, heavy watercolor paper, plaster, metal, wood, masonite, and canvas or linen mounted on masonite. Because Casein has an exceptional integrity of color and always dries to a perfect matte finish, it is unexcelled for art reproduction. The velvety matte finish can also be buffed to a satin sheen or varnished to produce a resemblance to oils. Over time, Casein pigments become resistant to moisture and as history has proven, the medium has a durability and permanence which has easily stood the test of time. | <urn:uuid:602934ff-ecf0-4b6f-8d57-6e62a1444a30> | CC-MAIN-2015-48 | https://www.aswexpress.com/wholesale/paints/egg-tempera-and-casein/richeson-shiva-series-casein-colors.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398458553.38/warc/CC-MAIN-20151124205418-00172-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.955245 | 268 | 3.0625 | 3 |
Energy efficiency: benefits of variable speed control in pumps, fans and compressors
A large proportion of the electricity produced around the world is used to raise, move or pressurize liquids and gases with machines such as pumps, fans and compressors.
Given the increasing importance of controlling energy consumption, special attention must be paid to the way these machines are operated and the energy savings that can be achieved through variable speed control. These different aspects will be dealt with in this Cahier Technique publication, both from the qualitative and quantitative standpoint. Variable speed drives are among the front-ranking solutions proposed by Schneider Electric to increase Energy efficiency. | <urn:uuid:83fe50a9-273f-4885-a2e0-57afe08c3b6d> | CC-MAIN-2021-43 | https://climatesmartwater.org/library/energy-efficiency-benefits-of-variable-speed-control-in-pumps-fans-and-compressors/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585504.90/warc/CC-MAIN-20211022084005-20211022114005-00307.warc.gz | en | 0.923935 | 126 | 2.546875 | 3 |
Just when you finally started bringing a snack to work because you believe it is the healthy thing to do, new research might make you question yourself.
According to a study published in Hepatology, snacking on high-fat and high-sugar foods may cause you to gain belly fat. Dutch researchers fed a group of lean, healthy men a normal diet or a high-calorie diet. Those consuming the extra calories did so by eating fat and sugar or just sugar, either with meals or between meals. While the additional calories overall increased body mass index (BMI), noshing between meals significantly increased fat in the liver but eating larger meals didn't. Belly fat also increased for those who snacked.
Lead study author Mireille Serlie, M.D., concluded in a press release, "Our study provides the first evidence that eating more often, rather than consuming large meals, contributes to fatty liver independent of body weight gain. These findings suggest that by [sic] cutting down on snacking and encouraging three balanced meals each day over the long term may reduce the prevalence of NAFLD (non alcoholic fatty liver disease)."
Well I am not convinced. The BMIs going up from the extra calories makes sense since no matter what you eat, healthy or not, if it is too many calories than your body needs, you will gain weight. The problem I have with this study is their choice of where the extra calories came from. High-sugar and high-fat snacks would never be my choice, unless the sugar, for example, came from fresh fruit or dairy, and the fat came from nuts or avocado. So perhaps it isn’t really the “snack” but it was the nutrients—or lack thereof—that made a difference. I would like to see more research done is this area, especially with more participants and some women, before I am ready to give up my snacks. | <urn:uuid:24c0d41a-6206-44c1-aad8-6c1a75bff69d> | CC-MAIN-2016-30 | http://www.shape.com/blogs/weight-loss-coach/high-fat-high-sugar-snacks-linked-belly-fat | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257832475.43/warc/CC-MAIN-20160723071032-00057-ip-10-185-27-174.ec2.internal.warc.gz | en | 0.968834 | 393 | 2.53125 | 3 |
Download full text
Download full text
ERIC Number: ED024035
Record Type: RIE
Publication Date: 1968-Sep
Reference Count: 0
Attitudes and Motivation: Their Role in Second-Language Acquisition.
TESOL Quarterly, v2 n3 Sep 1968
The author reviews some of the research which he has conducted on the role of the parent in the language-learning situation. While most of this research has not dealt with English as a second language, it is suggested that the observed phenomenon is as relevant to the ESL program as to any other second-language situation. The author summarizes his views as follows: (1) Attitudinal motivational characteristics of the student are important in the acquisition of a second language. (2) The nature of these characteristics suggests that the truly successful student (i.e., the one who will acquire communicational facility with the language) is motivated to become integrated with the other language community. (3) Th"s integrative motive appears to derive from the attitudinal characteristics in the home and must be fostered by an accepting attitude, by the parents, concerning the other language group. (4) The process of second-language acquisition involves the child both in taking on behavioral characteristics of the other language community, and in experiencing resistance from himself and pressures from his own cultural community. (Author/AMM)
Descriptors: American Indians, Attitudes, Childhood Attitudes, Cultural Differences, Cultural Influences, Culture Conflict, English (Second Language), French, Interference (Language), Language Role, Learning Motivation, Parent Attitudes, Second Language Learning, Teacher Attitudes
TESOL, Institute of Languages and Linguistics, Georgetown University, Washington, D.C. 20007 ($1.50).
Publication Type: N/A
Education Level: N/A
Authoring Institution: Teachers of English to Speakers of Other Languages.
Note: Paper presented at the TESOL Convention, March 1968. | <urn:uuid:6ef75ba9-9a7d-48aa-a2a7-16344db3c681> | CC-MAIN-2016-44 | http://eric.ed.gov/?id=ED024035 | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721027.15/warc/CC-MAIN-20161020183841-00018-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.927188 | 410 | 3.28125 | 3 |
Virginia’s Governor, his past indiscretions aside, celebrated the triumph of his party in the State legislative election by promising more iconoclasm in the Old Dominion.
There are over 660 Confederate monuments across the United States. A scholarly study conducted in 1982 found that nearly half of these are specifically memorializing Confederate war dead. Another third are generic pronouncements of sacrifices made during the Civil War. The smallest grouping denotes a celebration of “lost cause” ideology.
The recent passing of the eminent Bud Robertson, chosen by John Kennedy to chair the Civil War Centennial Committee, has been largely ignored by academics(no doubt due to resentment.) In one of his last speeches, Robertson derided current efforts to destroy all the progress made by his Centennial commission …. unity, and remembrance.
Today, Civil War history is being molded into something divided, derisive, and vengeful. Bud may not have been at his best, but he could identify the problem:
“Elements hell-bent on tearing apart unity that generations of Americans have painfully constructed.” | <urn:uuid:432e415a-5f19-43be-8d75-5af7243c0889> | CC-MAIN-2020-05 | https://practicallyhistorical.org/2019/11/07/memorials-to-war-dead/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606226.29/warc/CC-MAIN-20200121222429-20200122011429-00463.warc.gz | en | 0.961062 | 221 | 2.671875 | 3 |
He was named professor emeritus after teaching in the Department of Philosophy for nearly four decades
The Department of Mathematics at Johns Hopkins University solicits applications for one two-year postdoctoral fellowship beginning Summer 2021 (with some flexibility in the start and end dates). Th…
Our research began when a colleague brought to the university’s attention an 1850 US census return for Johns Hopkins: A “slave schedule” that attributed the ownership of four enslaved men (aged 50, 45, 25, and 18) to Hopkins. Preliminary research confirmed that the “Johns Hopkins” associated with this census return was the same person for whom the university was later named.
This evidence ran counter to the long-told story about Johns Hopkins, one that posited him as the son of a man, Samuel Hopkins, who had manumitted the family’s slaves in 1807. Johns Hopkins himself was said to have been an abolitionist and Quaker, the implication being that he opposed slavery and never owned enslaved people.
The details of the 1850 census slave schedule for Johns Hopkins have generated new research along four lines of inquiry. How had the university for so long told a story about Hopkins that did not account for his having held enslaved people? Which aspects of the Hopkins family story can be confirmed by evidence? What do we learn about Hopkins and his family when we investigate their relationship to slavery anew? And, who were the enslaved people in the Hopkins households and what can we know about their lives?
Launched in fall 2020, the Hard Histories at Hopkins Project examines the role that racism and discrimination have played at Johns Hopkins. Blending research, teaching, public engagement and the creative arts, Hard Histories aims to engage our broadest communities—at Johns Hopkins and in Baltimore—in a frank and informed exploration of how racism has been produced and permitted to persist as part of our structure and our practice.
Some great articles hiding here. Glad that Johns Hopkins is doing some research into it’s own history.
History tells us how we got here. Hard Histories show us a way forward.
Johns Hopkins, the 19th-century businessman who bequeathed a fortune to found the hospital and university in Baltimore that bear his name, and who on scanty evidence was long heralded as an abolitionist, enslaved at least four Black people before the Civil War, school officials disclosed Wednesday.
Francis James Child (February 1, 1825 – September 11, 1896) was an American scholar, educator, and folklorist, best known today for his collection of English and Scottish ballads now known as the Child Ballads. Child was Boylston professor of rhetoric and oratory at Harvard University, where he produced influential editions of English poetry. In 1876 he was named Harvard's first Professor of English, a position which allowed him to focus on academic research. It was during this time that he began work on the Child Ballads. The Child Ballads were published in five volumes between 1882 and 1898. While Child was primarily a literary scholar with little interest in the music of the ballads, his work became a major contribution to the study of English-language folk music.
Child considered that folk ballads came from a more democratic time in the past when society was not so rigidly segregated into classes, and the “true voice” of the people could therefore be heard. He conceived “the people” as comprising all the classes of society, rich, middle, and poor, and not only those engaged in manual labor as Marxists sometimes use the word. ❧
Annotated on August 04, 2020 at 09:31AM
Though there were no graduate schools in America at the time, a loan from a benefactor, Jonathan I. Bowditch, to whom the book was dedicated, enabled Child to take a leave of absence from his teaching duties to pursue his studies in Germany. There Child studied English drama and Germanic philology at the University of Göttingen, which conferred on him an honorary doctorate, and at Humboldt University, Berlin, where he heard lectures by the linguists Grimm and was much influenced by them. ❧
Annotated on August 04, 2020 at 09:33AM
Elizabeth Freeman (Mum Bett), the first enslaved African American to sue for her freedom in the courts based on the law of the 1780 constitution of the state of Massachusetts, which held that “all men are born free and equal.” The Jury agreed and in 1781 she won her freedom. Her lawyer had been Theodore Sedgwick. ❧
Annotated on August 04, 2020 at 09:35AM
Eliminating an unfair tradition made our university more accessible to all talented students.
Johns Hopkins’ claim that it will create a model police force for the country is nearly impossible in practice. It is clear that the police force will only answer to a small class of administrators and not to community members, residents and lawmakers, as any proper police force should.
I’m very troubled after reading this article because it doesn’t sound like the Hopkins I typically know.
Instagram filter used: Clarendon
Photo taken at: UCLA Bookstore
I just saw Emily Riehl‘s new book Category Theory in Context on the shelves for the first time. It’s a lovely little volume beautifully made and wonderfully typeset. While she does host a free downloadable copy on her website, the book and the typesetting is just so pretty, I don’t know how one wouldn’t purchase the physical version.
I’ll also point out that this is one of the very first in Dover’s new series Aurora: Dover Modern Math Originals. Dover has one of the greatest reprint collections of math texts out there, I wish them the best in publishing new works with the same quality and great prices as they always have! We need more publishers like this.
For the first couple of months of freshman year, I spent my evenings breaking into buildings on campus.
Having just passed our 20th college reunion, an old friend starts spilling the beans…
Apparently the statute of limitations on college shenanigans has run out and one of my best friends has written a nice little essay about some of “our” adventures. Fortunately he has kindly left out the names of his co-conspirators, so I’ll also remain silent about who was responsible for which particular crimes. Like him, I will leave the numerous other crimes he redacted unsung.
For the first couple of months of freshman year, I spent my evenings breaking into buildings on campus. This began, naturally, because a few of us who lived in and around the Vincent-Willard dorm had mail ordered lock-picking kits, and, well, we needed something to practice on besides our own dorm rooms.
So down into the midnight bowels of Krieger we crept, sneaking deep underground into disused classrooms, mute hallways, and one strange lab whose floor was tight-knit mesh wiring with a Silence of the Lambs–esque chamber below. We touched little, took nothing (except, once, a jar of desiccant—sorry!), and were never caught.
Such was the state of fun at Johns Hopkins in the fall of 1992, an era when the administration seemed to have adopted a policy of benign neglect toward the extracurricular happiness of its undergraduate body. We had Spring Fair and the occasional bus trip to New York for the day. What more could we want?
For many—really, most—of my cutthroat classmates, this was reason to grumble. Why, they moaned from the depths of D-level, couldn’t school be more exciting? A student union, they pleaded. A bar. A café. Anything to make campus life more bearable.
But for my friends and me, the school’s DGAF attitude meant freedom: We could do whatever we wanted, on campus or off. When lock-picking grew old (quickly, I’m pleased to say), we began to roam, wandering among the half-abandoned industrial sites that lined the unreconstructed harbor, or driving (when someone happened to have a car) under the interstates that cut through and around the city. We were set loose upon Baltimore, and all we ever wanted was to go and see what there was.
Here’s what we found: A large yellow smiley face painted on the end of an oil-storage tank. The 16mm film collection at the Pratt Library. A man who claimed to have been hanging out with Mama Cass Elliot of the Mamas & the Papas the night she lost her virginity. The Baltimore Streetcar Museum. How to clear the dance floor at Club Midnite by playing the 1978 song “Fish Heads” (eat them up, yum!). The big slice at Angelo’s and the $4.95 crabcake subs at Sip & Bite. Smart drugs, Neal Stephenson, and 2600 magazine at Atomic Books. The indie movie screenings at Skizz Cyzyk’s funeral home “mansion.”
None of these alone was world-changing (okay, except maybe “Fish Heads”). Put together, though, they amounted to a constant stream of stimulation, novelty, and excitement, the discoveries that make new adulthood feel fresh and occasionally profound.
All the while, I heard the no-fun grumbling from around campus and failed to understand it. We had freedom—what more could we need? The world was all around us, begging to be explored. We didn’t even have to leave campus: One spring, my girlfriend and I simply stepped off the sidewalk next to Mudd Hall into a little dell—and discovered a stand of wild scallions. We picked a ton, brought them home, and feasted on our foraged bounty. All we’d had to do was to leave the asphalt path—no red brick in those days—behind.
Matt Gross, Johns Hopkins A&S ’96, ’98 (MA), is a food and travel writer/editor who’s worked for everyone from The New York Times and Bon Appétit to The Guardian, The Village Voice, and Saveur. He lives in Brooklyn with his wife, Jean Liu, A&S ’96, and their two daughters.
Incidentally he also had two other meaty pieces that came out yesterday as well:
- Are we Living in a Post-Bacon World? | ExtraCrispy.com
- A New Book About Nathan’s Famous Feeds Our Need for Cheap Eats — and the Prosperity Myth | Village Voice
For the past several weeks, we’ve been making plans for our first official event to be held in conjunction with a week long Intersession course being offered by the Film and Media Studies Program at Hopkins. We’re happy to announce the details for this event on January 7th and hope everyone can join us. There will be a panel discussion as well as ample time to chat with a variety of fellow alumni, current students, and faculty.
Are you a member of the Arts, Entertainment, Media, or Entrepreneurship communities in Los Angeles?
Join us as we welcome Linda DeLibero, Director of the Hopkins Film and Media Studies Program, and current Film majors from the Film and Media Studies Intersession Course for a diverse and dynamic panel discussion featuring creative and successful Hopkins alumni working in the industry. Learn relevant information, make connections with fellow LA area alumni and talk with the current students.
Donald Kurz ’77, Johns Hopkins University Trustee and School of Arts and Sciences Advisory Board Member, and
the Arts Entertainment Media Entrepreneurship Affinity: LA Group
January 7, 2016
at Omelet, LLC, 3540 Hayden Avenue, Culver City, CA 90232
No Charge for alumni and guests
For more information:
Johns Hopkins University Alumni Association AEME LA Reception
Office of Alumni Relations
As part of the reception, we’ll have a panel discussion with a variety of local alumni who work in the entertainment and media sectors.
|Jason P. Somerville, ’97
Founder and Managing Partner, EIG
|Mark Swift, ’93
|Dalia Ganz, ’05
Director, Digital & Partnership Marketing at ABC Family
|Mitch Tenzer, ’75
Partner, Ziffren Brittenham, LLP
|Sunny Boling, ’99
A number of students from Hopkins will be in attendance at the event as part of an Intersession course being offered by the department. The listing for the course follows:
This week-long course in Los Angeles gives students inside access to the entertainment industry through daily meetings and workshops with key figures in film, television, new media, and music, many of them JHU alums: directors, producers, screenwriters, studio executives, agents, exhibitors and more. We will visit studios, major agencies and production companies, and will end the week with a JHU networking event and panel discussion with alumni who work in film and television.The course runs from January 4 -8. Open to all Film and Media Studies majors and minors, with preference given to seniors. Students outside FMS may apply if slots remain open after all FMS students have registered.
Course Number: AS.061.377.60
Days: Monday 1/4/2016 – Friday 1/8/2016
Times: M – 9:00-4:00PM | Tu- 9:00-4:00PM | W- 9:00-4:00PM | Th- 9:00-4:00PM | F- 9:00-4:00PM
Instructor: Linda DeLibero
The event was a wonderful success. I wanted to share a few of the photos I took during the panel discussion:
“Homewood campus, Peabody Conservatory, East Baltimore campus have made cameos big and small over the years”
It’s almost like they write some of this stuff just for me. Though I was already aware of most of the movies they mentioned, they did miss a few:
Washington Square (1997) directed by Agnieszka Holland in Hollywood Pictures/Caravan Pictures production has a stunning cameo of the interior of the Peabody Library – this cameo is the only reason I vaguely remember the film at all.
The Johns Hopkins Science Review (1948-1955) This production is also particularly notable as being the television debut (October 8, 1951) of actor and alum John Astin who now heads the JHU Drama program and for whom the eponymous theater in the Merrick Barn is named.
Fratricide (1966) – A very independent short black and white film (with no credits) starring professor Richard Macksey that was produced by a group of students which included later Hollywood luminaries Walter Murch (who just a few years later co-wrote THX 1138 with George Lucas), Caleb Deschanel, and Matthew Robbins, who coincidentally co-wrote Crimson Peak with Guillermo del Torro which comes out in theaters today.
I have a nagging feeling there are a few more, but they’re just not coming to me at the moment…
By the way, for those suffering through Head of State, you should know in advance that the Shriver Hall scene doesn’t appear until the very end of the movie and then plays through the credits. | <urn:uuid:8a830a8f-78e7-430e-b7f8-6071cb76ce6e> | CC-MAIN-2022-21 | https://boffosocko.com/tag/johns-hopkins-university/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662573189.78/warc/CC-MAIN-20220524173011-20220524203011-00163.warc.gz | en | 0.962255 | 3,313 | 3.1875 | 3 |
Proton Pump Inhibitors for Treating Reflux
Gastroesophageal reflux disease (GERD) is a digestive disease that occurs when the stomach’s contents return back up into the esophagus. Carrying stomach acid or bile, the contents of the stomach irritate the esophagus’ lining. Symptoms of the disease include heartburn, difficulty swallowing, excessive salivation, bloating, and chest pain. Fortunately, GERD is a treatable disease with generally manageable symptoms. One common treatment for GERD is proton pump inhibitors (PPIs).
What Are Proton Pump Inhibitors?
PPIs are a class of medications designed to block and reduce the production of stomach acid in patients with gastrointestinal disorders (namely GERD). They target the site of acid production: the parietal cells. These medications provide treatment, giving the esophagus time to heal and preventing symptoms such as heartburn.
PPIs are one of many treatment options for GERD, ulcers of the stomach, Helicobacter pylori (a bacterium found in the stomach), and a rare condition called Zollinger-Ellison syndrome.
How Do PPIs Work?
The stomach contains proton pumps that produce acid. PPIs work to diminish that acid secretion by binding to proton pumps, and then sending signals to acid-forming cells (parietal cells). These signals essentially tell the cells to stop “pumping” acid back up into the esophagus.
PPIs must be taken about 30 to 60 minutes before a meal in order to be effective.
Types of PPIs
There are various types of PPIs, available both over-the-counter (OTC) and in prescription form. All of them are structurally and chemically similar, and suggested to work equally as well. There is no research suggesting otherwise.
Types of PPIs that are available over-the-counter include:
- Zegerid (omeprazole and sodium bicarbonate).
Lansoprazole and omeprazole are also available in prescription form, as are the following PPIs:
Omeprazole and Lansoprazole have been available the longest and are highly trusted among physicians and patients alike. Other medications are relatively newer. Some are designed for specific uses. For instance, Rabeprazole and Pantoprazole are smaller, making them a convenient choice for people who have difficulty swallowing pills. Pantoprazole is also generally cheaper, making it a more affordable option for people paying for their own medications.
PPI Side Effects
The most common side effects of PPIs include headaches, diarrhea, abdominal pain, gas, and bloating — though these medications are generally well-tolerated. Long-term use of PPIs in rare cases have resulted in more adverse side effects such as bone fractures, infections, myocardial infarction, renal disease, and dementia. However, more research is needed to confirm these notions.
What Are the Benefits of Proton Pump Inhibitors?
There are significant benefits to PPIs, which explains why they are such a common treatment for acid reflux. Not only do PPIs inhibit acid secretion as they’re supposed to, but they also do not wear off even after long-term usage. Their effectiveness largely stays the same throughout a treatment plan. This could mean minimal dosage changes and less switching of medications or treatment plans.
What Are the Risks of Proton Pump Inhibitors?
PPIs are largely safe and effective medications for gastrointestinal disorders. However, long term use of PPIs may cause more adverse side effects, as previously mentioned. One adverse effect of PPIs, for instance, is thought to be pneumonia. Exacerbating that, patients diagnosed with SARS-CoV-2 are suggested to have more severe clinical outcomes if they’re currently using PPIs.
Research suggests that “PPIs disrupt the healthy human gut microbiome.” Disruptions to the gut microbiome make it easier to contract Clostridium difficile infection (CDI), an inflammation of the colon. Another research study suggests that long-term PPI use leads to less calcium absorption in the body, in turn causing “negative calcium balance, increased osteoporosis, development of secondary hyperparathyroidism, increased bone loss, and increased fractures.”
Limitations of Proton Pump Inhibitors
Like any drug, PPIs have their limitations. For one, these medications require meal-associated dosing. This means PPIs must be taken some time (typically, a half-hour to an hour) prior to eating in order to be effective. Patients may forget to take the medication before eating or experience heartburn in the absence of eating. In either case, PPIs are not medications that work on demand.
PPIs also are most effective when taken for brief periods of time, rather than every day for a long duration of time. The FDA recommends a time period of 4 to 8 weeks. People who have self-medicated with OTC PPIs may abuse this suggested time frame, diminishing the effectiveness of the medication. On the other hand, people may need a more permanent solution to GERD or other heartburn-inducing conditions.
These limitations may force people to seek out other medications for GERD or even look into surgery. The TIF procedure is a minimally invasive option performed on patients with GERD. This procedure is performed through the mouth and inside the stomach, leaving behind no incision marks.
Surgery may ultimately be the best option for those with chronic or long-lasting symptoms of GERD. PPIs or H2 receptor blockers (another treatment option for GERD) are only temporary solutions to these symptoms. Surgery, on the other hand, seeks to restore the esophageal valve to its original state, thus eliminating symptoms at the source. | <urn:uuid:2ffcffe3-4484-4551-93b5-f0b91b34a7ed> | CC-MAIN-2021-10 | https://www.gerdhelp.com/blog/ppi-medication-options-for-gerd/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385529.97/warc/CC-MAIN-20210308205020-20210308235020-00123.warc.gz | en | 0.927525 | 1,220 | 3.609375 | 4 |
Trace & Write Story Stencils
Seattle kindergarten teacher Kevin Gallagher loves the word bank on these bold, graphic stencils, and his students found the draw-and-write format “immediately useful and usable—I received such quality and commitment in their writing samples!”
Language Arts Anchor Chart Set
Third-grade Texas teacher Juan Gonzalez says these posters are essential visual aids for reviewing parts of speech. “Plus, the reproducible versions are perfect for notebooks, if you don’t have wall space for posters year-round.”
“What a treat to have an educational game that isn’t a million little pieces!” says Katie Blomquist, a former first-grade teacher in Mount Pleasant, South Carolina. Students identify subject, verb, and object cubes—and they can build up to 640 sentences.
Learning the cursive alphabet can feel like studying a whole new language. Angela Lattin, a K–3 instructional coach in Baker City, Oregon, finds Cool Cursive to be “an interactive, fun game” that helps her students identify letters written in multiple styles.
Help students get over writer’s block in a snap—or a spin! Lattin’s first graders loved putting two spinners together to find adjectives that matched each noun, and she appreciates the game’s simplicity and ESL applications.
Photos: Adam Chinitz | <urn:uuid:fe88a25a-7e1a-453e-b7a5-a2a649577782> | CC-MAIN-2020-50 | https://www.scholastic.com/teachers/articles/18-19/teachers-picks-ela-essentials/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141196324.38/warc/CC-MAIN-20201129034021-20201129064021-00419.warc.gz | en | 0.897058 | 299 | 2.796875 | 3 |
HCG Levels During Pregnancy
Submitted by Pregnancy and Baby Care team on January 31, 2012
Human chorionic gonadotropin, or HCG, is a hormone which is produced during pregnancy. it is produced by the cells that form the placenta. The production of HCG starts immediately after the egg attaches itself to the uterine walls. It is very important to keep a regular check on HCG levels during pregnancy. Any ups and downs in HCG can cause many complications, so special care should be taken to maintain a regular level. HCG maintains the corpus luteum, which is responsible for progesterone production during early pregnancy.
Pregnancy And Baby Care Questions
Progesterone helps keep the lining of the uterus thick for a healthy pregnancy. If the HCG levels are low, or not present in a woman's body, the lining of the uterus will begin to shed and the menstrual cycle will begin. So the production of HCG plays a critical part in your pregnancy. HCG levels in the body can be easily known through the quadruple screening test or maternal serum.
Low HCG levels may indicate a wrong calculation of the conception date, miscarriage, or ectopic pregnancy. However, it is also possible to have a healthy pregnancy with low levels of HCG. Just as low levels or high levels of HCG may indicate a miscalculation of the date of conception, it may also indicate a multiple pregnancy (twins) or a molar pregnancy. An HCG level less than 5mIU/ml is considered negative for pregnancy and anything above 25mIU/ml is considered positive for pregnancy. HCG levels vary as the pregnancy progresses from week to week.
The HCG level rises steeply during the first 14 to 16 weeks of the last menstrual period and doubles every 48 to 72 hours. After this, the HCG levels keeps on decreasing. In the initial period when the HCG level is rising, it gives a lot of information about the pregnancy and the infant's health.
HCG levels during pregnancy based on weeks since the last menstrual period (LMP):
3 weeks LMP 5 - 50 mIU/ml
4 weeks LMP 5 - 426 mIU/ml
5 weeks LMP 18 - 7,340 mIU/ml
6 weeks LMP 1,080 - 56,500 mIU/ml
7 - 8 weeks LMP 7, 650 - 229,000 mIU/ml
9 - 12 weeks LMP 25,700 - 288,000 mIU/ml
13 - 16 weeks LMP 13,300 - 254,000 mIU/ml
17 - 24 weeks LMP 4,060 - 165,400 mIU/ml
25 - 40 weeks LMP 3,640 - 117,000 mIU/ml
non pregnant 55-200 ng/ml
These numbers are only a guideline. It isn't the absolute value that matters in these results, but the change in value. Each and every woman's HCG level rises differently. The HCG level itself does not matter as much as the rate of change in the HCG level in your blood. A healthcare provider may recheck your levels if you are bleeding, experiencing severe cramps, or have a history of miscarriage.
Read more articles from the During Pregnancy Category. | <urn:uuid:6e536687-c542-4869-80b7-977e8039eaad> | CC-MAIN-2014-52 | http://www.pregnancy-baby-care.com/articles/168/during-pregnancy/hcg-levels-during-pregnancy.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802777118.12/warc/CC-MAIN-20141217075257-00151-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.918526 | 685 | 3.15625 | 3 |
Risks and Benefits of Nuclear Energy
English, 88 pages, published: 06/20/07
NEA#6242, ISBN: 978-92-64-03551-5
Available online at: http://www.oecd-nea.org/ndd/pubs/2007/6242-risks-benefits.pdf
- Français: Risques et avantages de l'énergie nucléaire
In the context of sustainable development policies, decision making in the energy sector should be based on carefully designed trade-offs which take into account, insofar as feasible, all of the alternative options' advantages and drawbacks from the economic, environmental and social viewpoints. This report examines various aspects of nuclear and other energy chains for generating electricity, and provides illustrative examples of quantitative and qualitative indicators for those chains with regard to economic competitiveness, environmental burdens (such as air emissions and solid waste streams) and social aspects (including employment and health impacts).
This report will be of interest to policy makers and analysts in the energy and electricity sectors. It offers authoritative data and references to published literature on energy chain analysis which can be used in support of decision making. | <urn:uuid:1262cd16-a7dc-4afb-999e-36d883106039> | CC-MAIN-2015-22 | http://www.oecd-nea.org/tools/publication?id=6242 | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927458.37/warc/CC-MAIN-20150521113207-00191-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.868589 | 244 | 2.78125 | 3 |
Tween 40 Quick Details
Chemical Name: Tween 40
CAS No.: 9005-66-7
Synonyms: Polyoxyethylene sorbitan monopalmitate; polysorbate 40
Appearance: Light yellow paste
Tween 40 Typical Properties
|Acid Value||2.0 KOH mg/g Max.|
|Saponification value||41-52 KOH mg/g|
|Hydroxyl value||89-105 KOH mg/g|
What is Tween ?
Tween is a kind of synthetic nonionic emulsifier. One type of emulsifier was first developed by ICI Company of the United States. Tween is the trade name of ICI company for this kind of emulsifier, and it is different according to the use in the synthesis process. Fatty acid types are given different numbers to form complete trade names such as Tween 60 and Tween 80. Tween 40 scientific name polyoxyethylene sorbitan monopalmitate, amber oily liquid, oil / water emulsifier, used as stabilizer, solubilizer, diffusing agent, antistatic agent, fiber lubricant and so on. 2. It is prepared by condensation of sorbitan monopalmitate with ethylene oxide.
Tween 40 Application
1. This product is used as an emulsifier, solubilizer, stabilizer, diffuser and fiber lubricant.
2. For O/W type food emulsifier, use alone or in combination with Span-60, Span-65, Span-80.
3. Used as stabilizer, wetting agent, diffusing agent, antistatic agent, etc.
Tween 40 Packaging and Shipping
Tween 40 Storage
This product should be stored in a cool, ventilated, dry place to avoid sun and rain. | <urn:uuid:65dd87ab-6c2c-4fe8-b170-8a66d5c9c0fe> | CC-MAIN-2021-39 | https://zhonglanindustry.com/product/cas-9005-66-7/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060201.9/warc/CC-MAIN-20210928032425-20210928062425-00651.warc.gz | en | 0.800161 | 394 | 2.53125 | 3 |
New historical markers are being placed in seven towns across south-central Pennsylvania this summer to commemorate events from the Civil War. Among these locations are Gettysburg, York, Hanover, and Wrightsville (all of which play a key role in my new book, Flames Beyond the Susquehanna: The Gordon Expedition. These markers are part of the state-sponsored Pennsylvania Civil War Trails program, similar in concept to well-regarded programs in Maryland and Virginia.
One of the new markers honors the courage of Wrightsville’s residents, “Women and Children under Siege.” A number of residents came under Confederate artillery fire when John B. Gordon‘s expeditionary force attacked Union entrenchments surrounding the town. Most huddled in their homes and cellars, although a few caught unaware in the streets when the guns opened fire had to dodge shell fragments that rained down upon the town as the Union militia retreated towards the Susquehanna River. Mrs. Amanda Beaverson and her three children were hustled to safety in a cellar by a man named Jacob Freet, who spotted the mother and kids standing in the street and shells exploded overhead.
A driving tour and literature will be available for those folks wishing to explore beyond Gettysburg to visit other spots in Pennsylvania relevant to the Gettysburg Campaign.
For details, see www.PACivilWarTrails.com. | <urn:uuid:1983ae3a-8d4d-46f0-a080-6305bcf3fc59> | CC-MAIN-2015-32 | https://scottmingus.wordpress.com/2007/04/22/new-civil-war-markers-being-erected-in-pa/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042989178.64/warc/CC-MAIN-20150728002309-00294-ip-10-236-191-2.ec2.internal.warc.gz | en | 0.945548 | 286 | 2.71875 | 3 |
ADDIS ABABA, Ethiopia
The second wave of the COVID-19 pandemic in Africa has been more severe than the first, according to a study published in The Lancet late Wednesday.
The observational study carried by the authoritative international medical journal was based on what was described as the “first-ever continent-wide analysis.”
“The authors found that daily infections were approximately higher during the rise of Africa’s second wave as compared to the peak of the first wave,” read the report.
Almost 3 million COVID-19 cases and more than 65,000 deaths were reported across the continent between February and December 2020, according to the report.
“As of 31st December 2020, Africa had reported 2,763,421 COVID-19 cases – around 3% of the global total – and 65,602 deaths. A mean number of 18,273 new cases were reported each day during the first peak in mid-July 2020,” the study said.
However, by the end of last December, the “mean number of new daily cases had risen by 30% to 23,790,” according to the report.
It found that the spike was recorded at a time when “approximately 65% of countries (36 of them) had experienced or were currently experiencing a second wave of infections.”
“Although the case numbers and deaths in Africa as a whole were low compared to many other parts of the world, country-level analysis reveals particularly high incidence rates in some nations (including Cape Verde, South Africa, Libya, and Morocco), which are similar to other countries across the world,” the study said.
“Despite daily infections being 30% higher during the rise of the continent’s second wave compared with the peak of the second wave, most countries implemented fewer public health measures.”
The report also included comments from John Nkengasong, director of the Africa Centres for Disease Control and Prevention, who stressed the need for continued efforts to curb the spread of the virus.
“Our findings indicate that several factors likely led to Africa’s larger second wave of COVID-19 cases,” he explained.
“Alongside reports that adherence to public health measures – such as mask wearing and physical distancing – has decreased, they highlight the importance of continued monitoring and analysis particularly in light of the emergence of new, more transmissible variants.” | <urn:uuid:85b9dab3-c79b-4c50-a5bf-5b3c1c02af0e> | CC-MAIN-2021-31 | https://infosurhoy.com/news/2nd-wave-of-pandemic-more-severe-in-africa-study.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155458.35/warc/CC-MAIN-20210805063730-20210805093730-00201.warc.gz | en | 0.981438 | 511 | 2.875 | 3 |
Visit the Englewood Heritage Station website: Exciting National Train Day event coming May 14, 2016.
In 1865, Junction Grove became part of the incorporated town of Lake. In 1868, Henry B. Lewis, a wool merchant on South Water Street, and a member of both the Cook County and Town of Lake boards of education, suggested the name of Englewood (after Englewood, New Jersey), since the area was heavily wooded. (Excerpt from Encyclopedia of Chicago)
Photo from https://www.flickr.com/photos/brulelaker/14167761979
Once known as Junction Grove, the rich history of Englewood began in the mid-1800s as the area quickly developed into a rail and commerce crossroads. Junction Grove changed its name to Englewood in 1868, and in 1889, it became part of the City of Chicago. With its cross streets at 63rd and Halsted, the four railroad stations, and the 63rd Street ‘L’ stop, Englewood has long been a transportation hub of the south west side. This easy access helped to make Englewood one of the largest outlying business districts in the country for much of the first half of the 20th century. But Englewood has changed over the years. Now a struggling urban area, it is nevertheless known for its grassroots organizations and strong sense of community, on the forefront of revival.Chicago’s Englewood Neighborhood: At the Junction explores the history of the people, places, commerce, and community that have created this ever-changing neighborhood. | <urn:uuid:285b9d3a-86aa-4f00-8b40-dfb2e0c54f4d> | CC-MAIN-2019-51 | https://bronzevillehistoricalsociety.wordpress.com/2016/03/08/englewood-heritage-station-2016/?shared=email&msg=fail | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540527010.70/warc/CC-MAIN-20191210070602-20191210094602-00023.warc.gz | en | 0.959641 | 329 | 3.296875 | 3 |
Gamma1 Fornacis (Gam01 For) is the Bayer Classification for the star. The Id of the star in the Yale Bright Star Catalogue is HR844. HIP13197 is the reference name for the star in the Hipparcos Star Catalogue. The Id of the star in the Henry Draper catalogue is HD17713.
More details on star alternative names can be found at Star Names .
The location of the star in the night sky is determined by the Right Ascension (R.A.) and Declination (Dec.), these are equivalent to the Longitude and Latitude on the Earth. The Right Ascension is how far expressed in time (hh:mm:ss) the star is along the celestial equator. If the R.A. is positive then its eastwards. The Declination is how far north or south the star is compared to the celestial equator and is expressed in degrees. For Gamma1 Fornacis, the location is 02h 49m 50.99 and -24° 33` 36.0 .
All stars like planets orbit round a central spot, in the case of planets, its the central star such as the Sun. In the case of a star, its the galactic centre. The constellations that we see today will be different than they were 50,000 years ago or 50,000 years from now. Proper Motion details the movements of these stars and are measured in milliarcseconds. The star is moving -129.61 ± 0.25 miliarcseconds/year towards the north and -50.75 ± 0.52 miliarcseconds/year east if we saw them in the horizon.
The Radial Velocity, that is the speed at which the star is moving away/towards the Sun is -6.10 km/s with an error of about 0.70 km/s . When the value is negative then the star and the Sun are getting closer to one another, likewise, a positive number means that two stars are moving away. Its nothing to fear as the stars are so far apart, they won't collide in our life-time, if ever.
Luminosity is the amount of energy that a star pumps out and its relative to the amount that our star, the Sun gives out. The figure of 74.47 that I have given is based on the value in the Simbad Hipparcos Extended Catalogue at the University of Strasbourg from 2012.
Gamma1 Fornacis has a spectral type of K0III. This means the star is a orange to red giant star. The star is 7,450.00 Parsecs from the Galactic Centre or in terms of Light Years is 24,299.17 s. The star has a B-V Colour Index of 0.99 which means the star's temperature has been calculated using information from Morgans @ Uni.edu at being 4,868 Kelvin.
Gamma1 Fornacis Radius has been calculated as being 8.63 times bigger than the Sun.The Sun's radius is 695,800km, therefore the star's radius is an estimated 6,007,278.37.km. If you need the diameter of the star, you just need to multiple the radius by 2. However with the 2007 release of updated Hipparcos files, the radius is now calculated at being round 10.38. The figure is derived at by using the formula from SDSS and has been known to produce widely incorrect figures.
Gamma1 Fornacis has an apparent magnitude of 6.14 which is how bright we see the star from Earth. Apparent Magnitude is also known as Visual Magnitude. If you used the 1997 Parallax value, you would get an absolute magnitude of 0.91 If you used the 2007 Parallax value, you would get an absolute magnitude of 0.51. Magnitude, whether it be apparent/visual or absolute magnitude is measured by a number, the smaller the number, the brighter the Star is. Our own Sun is the brightest star and therefore has the lowest of all magnitudes, -26.74. A faint star will have a high number.
Using the original Hipparcos data that was released in 1997, the parallax to the star was given as 8.98 which gave the calculated distance to Gamma1 Fornacis as 363.21 light years away from Earth or 111.36 parsecs. It would take a spaceship travelling at the speed of light, 363.21 years to get there. We don't have the technology or spaceship that can carry people over that distance yet.
In 2007, Hipparcos data was revised with a new parallax of 7.48 which put Gamma1 Fornacis at a distance of 436.05 light years or 133.69 parsecs. It should not be taken as though the star is moving closer or further away from us. It is purely that the distance was recalculated.
Using the 2007 distance, the star is roughly 27,575,349.80 Astronomical Units from the Earth/Sun give or take a few. An Astronomical Unit is the distance between Earth and the Sun. The number of A.U. is the number of times that the star is from the Earth compared to the Sun.
The star's Galacto-Centric Distance is 7,450.00 Parsecs or 24,299.17 Light Years. The Galacto-Centric Distance is the distance from the star to the Centre of the Galaxy which is Sagittarius A*.
The source of the information if it has a Hip I.D. is from Simbad, the Hipparcos data library based at the University at Strasbourg, France. Hipparcos was a E.S.A. satellite operation launched in 1989 for four years. The items in red are values that I've calculated so they could well be wrong. Information regarding Metallicity and/or Mass is from the E.U. Exoplanets. The information was obtained as of 12th Feb 2017.
|Primary / Proper / Traditional Name||Gamma1 Fornacis|
|Alternative Names||Gam01 For, HD 17713, HIP 13197, HR 844|
|Constellation's Main Star||No|
|Multiple Star System||Yes|
|Star Type||Giant Star|
|Colour||orange to red|
|Absolute Magnitude||0.91 / 0.51|
|Visual / Apparent Magnitude||6.14|
|Naked Eye Visible||Yes - Magnitudes|
|Right Ascension (R.A.)||02h 49m 50.99|
|Declination (Dec.)||-24° 33` 36.0|
|Galactic Latitude||-63.30 degrees|
|Galactic Longitude||214.12 degrees|
|1997 Distance from Earth||8.98 Parallax (milliarcseconds)|
|363.21 Light Years|
|2007 Distance from Earth||7.48 Parallax (milliarcseconds)|
|436.05 Light Years|
|27,575,349.80 Astronomical Units|
|Galacto-Centric Distance||24,299.17 Light Years / 7,450.00 Parsecs|
|Proper Motion Dec.||-129.61 ± 0.25 milliarcseconds/year|
|Proper Motion RA.||-50.75 ± 0.52 milliarcseconds/year|
|Radial Velocity||-6.10 ± 0.70 km/s|
|Stellar Luminosity (Lsun)||74.47|
|Associated / Clustered Stars||Gamma2 Fornacis|
|Calculated Effective Temperature||4,868 Kelvin|
The star has been identified as being a multi-star system, one in which there is at least one star in close orbit to another star or two or more stars orbiting a central point. The stars may be of equal mass, unequal mass where one star is stronger than the other or be in groups orbiting a central point which doesn't necessarily have to be a star. More information can be found on my dedicated multiple star systems page. The source of the info is Simbad. The file is dated 2000 so any differences between this and any other source will be down to the actual source from where the information came from.
|Proper Motion mas/yr|
|H.D. Id||B.D. Id||Star Code||Magnitude||R.A.||Dec.||Spectrum||Colour||Year|
There's no register feature and no need to give an email address if you don't need to. All messages will be reviewed before being displayed. Comments may be merged or altered slightly such as if an email address is given in the main body of the comment. | <urn:uuid:00c22a5d-9c81-4547-9674-edafe5947f9c> | CC-MAIN-2019-09 | https://www.universeguide.com/star/gamma1fornacis | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249556231.85/warc/CC-MAIN-20190223223440-20190224005440-00332.warc.gz | en | 0.895991 | 1,855 | 2.8125 | 3 |
Which Natural Disaster do you think is the most dangerous? Why?
This question will be one that Year 6 will be thinking about and exploring as part of their topic work for this term. Throughout the topic the children will look at what causes the different types of disasters and the impact they can have on those affected by them.
To introduce the topic, the children will be exposed to the effects of a ‘Mini-Earthquake’, experiencing first-hand what it is like to walk into a room that has been destroyed, and some of their possessions ‘lost’.
Throughout the topic the children will build on these thoughts and emotions as they try to gain enough knowledge and understanding to be able to discuss which they believe to be the most dangerous.
Watch this space to find out their responses.... | <urn:uuid:13a107c2-0091-4a07-93da-6cff3db4b7e9> | CC-MAIN-2018-13 | http://www.victoriaparkschool.co.uk/the-big-question-7/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647649.70/warc/CC-MAIN-20180321121805-20180321141805-00022.warc.gz | en | 0.972392 | 166 | 3.765625 | 4 |
Serious concerns have been raised about the safety of the diabetes drug, Actos, due to new information about potential Actos side effects, including cardiovascular risk. Actos has been available in the U.S. since 1999 as a treatment for type II diabetes in adults, and is commonly used in combination with diet and exercise to lower blood sugar levels in patients with this disease. Actos (pioglitazone) functions by increasing the sensitivity of muscle, liver and fat cells to insulin, thereby allowing cells to remove glucose from the blood more effectively. Actos belongs to a class of drugs called thiazolidinediones, to which the diabetes drug Avandia also belongs, and is currently manufactured by drug maker Takeda Pharmaceuticals. In 2010, more than two million patients were taking drugs like Actos, metformin and glimepiride to treat their diabetes. Unfortunately, researchers have identified Actos use as a potential risk factor for the development of major side effects, including cardiovascular risks like heart failure and heart disease. If you took Actos to treat your type II diabetes, and have since suffered from a cardiovascular risk side effect, contact an Actos attorney for legal guidance.
Two cardiovascular risks potentially associated with the diabetes drug Actos are heart disease and heart failure. Heart disease is caused by blocked, stiffened or narrowed blood vessels which prevent the heart, brain and other parts of the body from receiving a sufficient amount of blood. Heart disease symptoms include shortness of breath, chest pain, and pain or weakness in the arms or legs. Heart failure is a severe condition in which the heart can no longer pump an adequate amount of blood to the rest of the body, resulting in an irregular pulse, shortness of breath, fatigue and cough.
For patients with heart disease, treatment may include drug therapy, lifestyle changes or surgery to repair the damaged portions of the heart. The major goal of heart disease treatment is to open narrowed arteries, which can be achieved by living a healthy lifestyle. Patients with heart failure may benefit from a number of different treatments, including monitoring and self-care, drug therapy, or surgical procedures and devices like a pacemaker. Heart failure is considered a chronic condition, which can worsen over time with physical stress or infection. In some cases, heart failure can be effectively controlled, while other patients may suffer from life-threatening complications like pulmonary edema, total heart failure, and irregular heart rhythms.
Actos currently carries a “black box” warning notifying patients and healthcare professionals about the drug’s potential to cause or worsen congestive heart failure. The journal Lancet published a study in 2007, indicating that the risk of heart failure was significantly higher in patients taking Actos, particularly in those patients with a history of heart failure or heart disease. The FDA made an announcement earlier this year that another thiazolidinedione diabetes drug, Avandia, would be removed from the market in November 2011, due to concerns that the drug may cause significant cardiovascular side effects in patients, including heart failure and heart disease. Actos has been removed from the market in France, and officials in Germany have advised physicians to avoid using Actos in new patients, due to new Actos side effect information regarding the increased risk of bladder cancer. In the U.S., the FDA issued a safety announcement in June 2011 warning patients and physicians about the increased risk of bladder cancer in patients taking Actos for more than one year.
The potential connection between Actos and cardiovascular risks like heart disease and heart failure is serious, and diabetes patients have been urged by the FDA to carefully consider all possible benefits and potential risks of Actos before making any decisions to use the drug. If you or a loved one has suffered from a cardiovascular risk side effect, which you believe to be linked to Actos, contact a qualified Actos attorney to discuss your legal options. You may have grounds to file an Actos lawsuit against Takeda Pharmaceuticals in order to seek financial compensation for your injuries, medical expenses, and pain and suffering. Drug companies like Takeda are responsible for the safety of their medications, and should be held liable for any side effects sustained by consumers of their products. Unfortunately, this isn’t always the case. By hiring an experienced Actos lawyer, victims of potential Actos side effects can feel confident that their case is in good hands. | <urn:uuid:17183b20-92c1-4b7c-9fd5-f8f2f31932e7> | CC-MAIN-2020-05 | http://www.consumerjusticefoundation.com/actos/actos-and-cardiovascular-risk/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251773463.72/warc/CC-MAIN-20200128030221-20200128060221-00282.warc.gz | en | 0.943986 | 890 | 2.703125 | 3 |
As part of the QB50 mission, 28 CubeSats of the QB50 constellation, including Ex-Alta 1, were integrated into 11 NanoRacks 6U deployers earlier this year.
On April 18, 2017, the QB50-ISS group was launched with the Orbital ATK Cygnus spacecraft on a cargo resupply mission to
the International Space Station (ISS) atop a United Launch Alliance Atlas 5 rocket from Cape Canaveral Air Force Station, Florida.
Once on the ISS, the crew used the NanoRacks CubeSat Deployer (NRCSD) to deploy the QB50 satellites. Once deployed, the satellites began to orbit the Earth in the thermosphere, a layer of atmosphere that extends from about 95 km to 500 km. Of note, the ISS maintains an orbit about 403 km (250 miles) above Earth.
The satellite deployed at 2:55 a.m. Mountain time on May 26, 2017 from the International Space Station. Students at the university ground stations heard the satellite’s beacons and announced operational status. CubeSat mission durations and orbital life vary, though it’s hoped that Ex-Alta 1 will orbit for up to 18 months. Upon mission completion, the CubeSats fall to Earth, burning up harmlessly in the atmosphere.
The AlbertaSat team is already working on its second satellite, the Ex-Alta 2, which will be entered in the 4th Canadian Satellite Design Challenge in 2018. The Ex-Alta 2 will fly in-house developed technologies and experiments as scientific payloads and focus on open sourced cube satellite systems. | <urn:uuid:8c2f3576-2ee9-48c5-ba2b-047592458cf5> | CC-MAIN-2018-22 | https://www.novatel.com/tech-talk/velocity/velocity-2017/university-of-alberta-students-launch-space-weather-satellite/the-launch/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864622.33/warc/CC-MAIN-20180522014949-20180522034949-00423.warc.gz | en | 0.902569 | 330 | 2.765625 | 3 |
Lamarck and Natural Selection
Melvyn Bragg discusses Jean-Baptiste Lamarck, the 18th century French scientist, and his theory of Natural Selection. Who was he and how far did he pave the way for Darwin?
Melvyn Bragg discusses Jean-Baptiste Lamarck, the 18th century French scientist.Charles Darwin defined Natural Selection in On the Origin of Species, Variations, however slight and from whatever cause proceeding, if they be in any degree profitable to the individuals of a species will tend to the preservation of such individuals, and will generally be inherited by the offspring. It was a simple idea that had instant recognition, How extremely stupid not to have thought of that! said T H Huxley. However, Darwin did not invent the idea of evolution and not everyone saw his ideas as original. The great geologist Charles Lyell repeatedly referred to Lamarcks theory as modified by Darwin, Darwin complained to him, I believe this way of putting the case is very injurious to its acceptance. He desperately wanted to escape the shadow of this genuine scientific precursor and what has become known as the Lamarckian Heresy has maintained a ghostly presence on the fringes of biology to this day.Who was Lamarck? How did Natural Selection escape from his shadow and gain acceptance from the scientific establishment? And has any evidence emerged that might challenge the elegant simplicity of Darwins big idea?With Sandy Knapp, Senior Botanist at the Natural History Museum, Steve Jones, Professor of Genetics in the Galton Laboratory at University College London and author of Almost Like a Whale: The Origin of Species Updated; Simon Conway Morris, Professor of Evolutionary Paleobiology at Cambridge University. | <urn:uuid:bc15f363-47bc-4e7d-b82a-7a093722bcab> | CC-MAIN-2018-51 | https://www.bbc.co.uk/programmes/p005495d | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376831334.97/warc/CC-MAIN-20181219045716-20181219071716-00360.warc.gz | en | 0.955533 | 348 | 3.421875 | 3 |
One of the main causes of ingrown hairs is dead skin cells, which block the pores through which hairs grow. This is why it is very important to exfoliate your skin 1 – 2 days before epilating or after 2 days you had epilated your body.
What Is Exfoliation?
Exfoliating your body is the process of eliminating dead cells from the outer layer of your skin utilizing an exfoliant, which can either be a chemical as well as a physical exfoliant. There are a number of means to physically scrub. The initial includes using a skincare device, such as a sponge, towel or brush, on your skin to displace and also get rid of dead skin cells. The various other method entails making use of a fluid, gel or scrub with granules like microbeads of sugar or coffee to smooth and also refine the skin.
Your skin is regularly repairing as well as changing itself. As a result of this, you can be entrusted layers upon layers of dead skin all over your body. Scrubbing aids free your body of these remaining dead skin cells, exposing much healthier, brighter skin instantly after. Exfoliating your body should become your regular treatment.
While brighter skin is certainly a perk, peeling can in fact help enhance the wellness of your skin also. If your skin is filled with dead cells, your skincare items might not be able to permeate deep into the skin as well as do their work. By eliminating the top-most layer of skin, you’re making it simpler for your topical skin therapies to sink deep below the surface area where they can make a distinction.
If you have acne-prone skin, peeling can assist clean out clogged up pores that typically lead to outbreaks. It can additionally assist in discolor acne scars much faster by increasing skin cell turnover and promoting collagen manufacturing. Exfoliating your body and face should be always gentle and smooth.
Exfoliating Your Face
The first step that you should apply for cleaning your facial skin is to start by using your regular cleanser. After that, take a quarter-size amount of your face scrub and use it onto your face in round motions, avoiding the eye location. Carefully massage therapy the product onto the skin for as long as your details item recommends, usually from 30 secs to a complete min. Then, rinse off with warm water as well as carefully pat your skin with a tidy towel. Follow with your hydrating mask, as well as the face cream.
The best exfoliating tool that I would recommend would be Braun Facial sponge, which comes with Braun Facial Epilator. The facial cleansing brush attachment gently sweeps away make-up and impurities to restore your skin’s natural glow. Dermatologist tested, hundreds of micro-oscillations work 6x more effectively* than a manual wash to cleanse the skin, preparing it to better absorb face cream or serum.
Remember that exfoliating your face should be gentle and just be done about one to three times a week, as scrubbing it too often or also hard may cause micro-tears on your skin’s surface as well as strip your skin’s protective layer. If you have inflammatory acne, rosacea, or hypersensitive skin, ask your dermatologist to determine what exfoliant to use and also exactly how often to use it.
Exfoliating Your Body
Exfoliation exists among the most effective methods to improve your skin’s appearance and tone, and it’s something all of us can do right in your home. However, it’s likewise truly very easy to overdo it by scrubbing frequently or utilizing the wrong technique for your skin kind.
For best results try to scrub about a day before you plan to epilate. You can also exfoliate your skin right before the epilating, but it might leave your skin sensitive, which might cause some irritation and redness.
My choice of the products are usually organic, no synthetic, no paraben products like:
1. Naturals Arabica Coffee Scrub
- PREMIUM ARABICA COFFEE SCRUB – A premium quality arabica coffee scrub for body and face that softens and moisturizes as it scrubs away dirt and dead skin cells.*
- INFUSED WITH COLLAGEN & STEM CELL providing a boost in natural collagen while increasing skin cell longevity. Together these deliver an anti-aging performance you’ve come to expect from M3 Naturals.*
- DETOXIFY YOUR SKIN by drawing out unwanted toxins, dirt, pollution and bacteria from your pores and balancing systemic pH. A great pore minimizer that restores your silky-smooth skin!*
- SKIN BLEMISHES – Our unique blend of ingredients can help to reduce the appearance of acne, blackheads, cellulite, stretch marks and scars!*
- MADE IN USA: M3 Naturals is proud to provide you with natural products made right here in the United States of America.
Refreshing and Exfoliating
Using arabica coffee grounds and dead sea salts, our premium body scrub removes dead cells and provides you a fresher, younger and more moisturized appearance.* Coupled with a potent dose of caffeine, M3 Naturals Arabica Scrub may also support the lightening of scars & blemishes, as well as support skin tightening.*
Natural Formula for Your SkinM3 Naturals Body Scrub includes 100% natural arabica coffee. Watch our premium formula scrub away the dirt and dead skin cells, leaving you with the support you need for softer and optimally moisturized skin.* For the complete effect, we infuse our formula with Collagen and Stem Cells. These widely known, skin-loving ingredients form the ultimate duo for a more refreshed, protective and moisturized foundation.*
Professional Full Body Pampering
M3 Naturals creates clean skin care to improve skin health. That is our mission. We are committed to leading the skin care industry in innovation and we utilize nature’s finest ingredients, backed by science, to deliver professional & spa-quality results. We want to help you be the best version of yourself and that’s why we go above and beyond to create premium formulas. So when you grab your M3 Naturals Arabica Coffee Scrub, know that you are using only the finest ingredients to support that refreshed, more youthful looking skin you deserve!*
2. Brooklyn Botany Arabica Coffee Body Scrub & Face Scrub
- COMBAT CELLULITE NATURALLY: Our Coffee Body Scrub, Facial Scrub, Hand Scrub, and Foot Scrub is great for reducing the appearance of cellulite! Massage our anti cellulite coffee body scrub onto any problem area. It may help reduce the appearance of cellulite. We combine the best quality coffee grounds with moisturizing, skin-soothing coconut oil and dead sea salt for an extra exfoliating and moisturizing kick. Use for a better experience than any cellulite cream or cellulite removal cream.
- SPA QUALITY BODY SCRUB, FACIAL SCRUB, FOOT SCRUB, & SKINCARE TREATMENT: Exfoliating your body to remove dead skin gives you a fresher, younger, and moisturized appearance. The coffee grounds in this body scrub are a natural exfoliator that help freshen your skin, and reveal new, healthy skin underneath. Arabica Coffee contains enzymes and acidic properties that help exfoliate and remove dead skin.
- REDUCES SIGNS OF AGING SKIN: This Body Scrub & Face Scrub Exfoliator and Moisturizer can help with aging skin! Our exfoliating and moisturizing Body Scrub is loaded with antioxidants, which help fight the appearance of premature skin aging like wrinkles, sun spots, and fine lines. The caffeine restricts blood vessels, which reduces swelling and inflammation. When applied under and around your eyes, it can help in minimizing the appearance of puffy eyes and dark circles under your eyes.
- VERSATILE SKIN CARE FULL BODY SCRUB: This extremely versatile exfoliating and moisturizing scrub can be used as a face scrub, lip scrub, body scrub, hand scrub, foot scrub, and more! Use everywhere on your body to keep your skin smooth and clear! It works as an amazing exfoliator, while not drying out your skin like a lot of other exfoliating products do. It also keeps your skin moisturized and smooth, and it smells amazing!
- 100% NATURAL ARABICA COFFEE BODY SCRUB, FACIAL SCRUB, HAND SCRUB, & FOOT SCRUB: Our Arabica Coffee Body Scrub is made in NY, USA using only the highest quality ingredients. It does not contain alcohol, parabens, or sulfates. It is All-Natural, Vegan, and Cruelty Free.
3. 100% Natural Arabica Coffee Scrub with Organic Coffee, Coconut and Shea Butter
- CELLULITE ENEMY: We combine best quality of organic coffee grounds with moisturizing, skin-soothing organic coconut oil and dead sea salt for an extra exfoliating kick. By massaging our organic anti cellulite coffee body scrub onto any problem area, it may help in reduction of the appearance of cellulite.It is a better experience than any cellulite cream.
- LOADED WITH ANTI-OXIDANTS: Our Coffee Body Scrub is loaded with antioxidants, which help to fight the appearance of premature skin aging like wrinkles, sun spots, and fine lines. When applied under and around the eyes, it can help in minimizing the appearance of puffy eyes as caffeine restricts blood vessels, which reduces swelling and inflammation. It may also help lightens the appearance of dark circles under the eyes.
- 100% NATURAL EXFOLIATING SCRUB & ACNE TREATMENT SKINCARE: Exfoliate your skin improves circulation & help remove residual dirt, giving you a fresher, younger, more moisturized appearance. Coffee grounds in this scrub acts as a mechanical exfoliate that helps to scrub away dead skin to reveal the new, healthy skin underneath and as a chemical exfoliater removing skin cells with enzymes or acidic properties.
- CACAO COCONUT SHEA BUTTER SUGAR FACIAL SCRUBS FORMULA: This high caffeine formula specializes in targeting stretch marks & Spider veins while boosting your skins anti-oxidants. The caffeine in a coffee scrub may also help in reducing the appearance of varicose veins. This dead sea salt body scrub also helps to lighten the scars and tighten the skin.
- 100% Natural Arabica Coffee Scrub 10 oz. with Organic Coffee, Coconut and Shea Butter : Order Now and get Professional Results and Full-On Pampering Without Straining Your Budget.
Anti-Cellulite Scrub: Caffeine is the one of the enemy of Cellulite and is an important ingredient in all cellulite cream.
Our Coffee Scrub may help with premature skin aging appearances.
Anti-Acne Treatment & Skincare: Coffee grounds and dead sea salts may helps to remove dead cells thus giving you a fresher, younger, more moisturized appearance.
Lightens Scars: Caffeine in a coffee scrub may help to lighten the scars and tighten the skin.
Our emulsified formula is made using high quality, all natural gourmet coffee, which softens skin as it scrubs away dirt and dead skin cells. This formula also contains the favorite skin-loving Coconut Oil, Olive oil, Shea Butter, Sweet Almond Oil, Grape Seed Oil making this aromatic exfoliating scrub a luxurious staple in any skin care regime. | <urn:uuid:b1822418-f83c-4216-8209-3682e5ec869f> | CC-MAIN-2021-10 | https://smoothskinforyou.com/exfoliating-your-skin/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178364008.55/warc/CC-MAIN-20210302125936-20210302155936-00026.warc.gz | en | 0.903401 | 2,471 | 2.515625 | 3 |
Recently, some of the major cellular carriers have released “Network Extenders”, also known as femtocell. The network extender is a device that a subscriber purchases to extend the reach of the cell phone network. (In effect, the subscriber is paying for the privilege of increasing the cellular network coverage. What a deal!)
The network extender is conceptually similar to a Wi-Fi access point. Both connect to the Internet via wire, and both provide wireless services. While the Wi-Fi device provides Internet services, the femtocell provides cellular services.
The femtocell basically appears as a new cell tower to cell phones that are within its range. And, the femtocell will process calls for any and all cell phones that successfully register with the cell phone while is it connected to the Internet. Effectively, the femtocell is just a new gateway to the cellular network.
It is not possible for the cell phone owner to choose to connect to the femtocell or to a regular cell tower. The decision on how the cell phone connects to the cell network is made by the cell phone and the “cell tower”. And, this did not used to be a problem, when only the cellular carriers were putting up cell towers. However, the release of the network extender has allowed individuals to deploy cell towers.
Recently, I encountered a denial of service issue with a cell phone that I tracked back to an issue with a femtocell. A cell phone has registered with the femtocell to connect to the wireless network. However, the femtocell lost connectivity to the Internet. (Remember, the femtocell is a gateway that uses the Internet to connect to the cellular network.)
Since the femtocell still had power, the wireless side was still active. This meant that any cell phone that had registered with the femtocell thought that it was still connected to the cellular network. However, the femtocell had no ability to connect to the cellular network, since the Internet was done. It appears that the current cell phones do not have the ability to determine if they are connected to a cell tower that is active.
Thus, the cell phone could not make or receive calls or text messages. And the user had no ability to tell the cell phone to switch to a working cell tower. The only was to get the cell phone working again was to move to a different area, outside of the range of the femtocell. And, the cell phone reported 3 or 4 bars during the entire outage.
Until the carriers improve the algorithm that a cell phone uses to ensure it has an active cell tower, about the only thing the subscriber can do is use a Voice over IP (VoIP) application as a backup to the standard phone. And, this will only work if the VoIP application can use the Wi-Fi network for calls. And, if that is not possible, use email, which should still work via Wi-Fi if the cell tower is not functioning. | <urn:uuid:4070280b-7eb0-41bd-ae94-31dc24666781> | CC-MAIN-2016-50 | https://sbranigan.wordpress.com/2012/01/30/why-wont-my-call-go-through-denial-of-service-in-the-cell-phone-network/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540909.75/warc/CC-MAIN-20161202170900-00274-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.961823 | 618 | 2.9375 | 3 |
Gone are the days when a website was a part of extensive promotional campaigns for a venture. Nowadays, having a legitimate website has turned into a business necessity. As much important as having a website is keeping it safe and secure is even more critical. Now many might think that their website isn’t worth hacking.
However, remember that every website is at stake of getting compromised by hackers. Generally, most of the security breaches don’t happen to steal your data or to tamper with it, but majorly it attempts to use your server for email spams or for hosting any temporary illegal web servers or for distributing any files in unlawful nature. https://www.youtube.com/embed/2fL8Otb9mTESome other commons ways of exploiting servers include using it to caster bitcoins or using it as part of any botnets etc. Sometimes illegal ransomware is also generated and distributed by such webserver to hack. Automatically generated scripts generally do these hackings.
And thus, here are eight web server security tips for 360-degree complete security for your web server.
To create and maintain a secured web server ensures that you are using a secured established connection. The best possible way of creating a secure connection is by using Secured Shell Protocol .
The significant advantage of using a secured shell protocol is that it can encrypt all kinds of data during and during the exchange. Although you need to install an SSP Daemon and have an SSP client for issuing commands, managing services, and have remote access.
As an additional note, remember that an SSH port number is 22. And to create an extra layer of security, it’s best that you configure the port number somewhere within ‘1024 to 32 or 767’ etc.
Generally, people use traditional security techniques like passwords for authenticating SSH servers. However, with using keys, you can have an added layer of security because keys carry a number of bits than traditional passwords and thus almost uncrackable.
As a simple analogy, if you use an RSA 2048 bit encryption that comes to be equivalent to nearly a 617 digit password.
The best way of transferring files to and from servers without any risk of getting data compromised is by using File Transfer Protocol Secure. This kind of process works in a dual-mode by encrypting data files along with authenticating your information.
Generally, FTPS uses both kinds of channel, i.e., a command channel and a data channel. And as a user, you can encrypt both. However, note that FTPS can only protect your data while transferring, but as it reaches the server, it isn’t encrypted anymore. And thus to add a layer of security encrypting while uploading on the server is necessary.
The simplest and one of the most authentic ways of maintaining a secured web server is by using a virtual private network or VPN . Unlike other open systems that are accessible to all, VPN restricts access and allows only selective users.
Generally, these private network uses private IPs to establish isolated connections. Thus all the servers attached to the same accounts can establish connections and share information without any risk of external interference.
Another major web server security tips come in the form of keeping a check over login attempts. Generally, the automated hacking attacks use trial and error software, which uses various sets of alphanumeric combinations and gains access in the system.
Using intrusion prevention/detection software keeps an eye over all the files stored in the server and detects if there are any suspicious activities or not. And in case the number of login attempts exceeds a certain threshold, such software can also block the IP address for some time or even indefinitely.
Always remember that the default operating system installations are never secured. Generally, the regular website and mobile app development company provide a typical default installation package that comes in with several services devoid of any need in the webserver configuration. A few such common examples include remote registry, server printing, RAS, and various other features.
Just remember the more the number of services, the more ports will be left open for hackers to attack. So switch off all that is unnecessary and disable them.
Now it is nothing new that most of the top website and mobile app services provide updates regularly. Remember, the regular you update, the more secure your website stays. An old, outdated website has already been exposed and exploited for good. Leaving it as it makes it even easier for hackers to attack.
The best way of keeping your website is by the setting of the auto-update mechanism. However, for an added layer of security, many websites and mobile app services suggest that you first test how the update works in a test environment before entirely using it.
Now in an ideal situation, you want all kinds of hackers and malicious software out of your website server. However, just in case they manage to breach your security layers keeping malicious software detectors can be your last resort.
There is plenty of targeted software for Linux and rootkits . Most of the leading mobile app development company uses a combination of two and generates hash counts of files daily to tally it up with any suspicious changes.
Keep data backups regularly and take many other common precautions that can help you in creating a 360 degrees protection to your server. However, it doesn’t guarantee 100% security, but it secures your server to a much greater extent. | <urn:uuid:7808e48e-9507-4772-a2ec-68337da4c572> | CC-MAIN-2023-14 | http://chinadiecasting.org/web-server-security-tips.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949025.18/warc/CC-MAIN-20230329182643-20230329212643-00053.warc.gz | en | 0.932248 | 1,100 | 2.65625 | 3 |
Gibbons v. Ogden, Law, and Society in the Early Republic
Publication Year: 2009
Decided in 1824, Gibbons v. Ogden arose out of litigation between owners of rival steamboat lines over passenger and freight routes between the neighboring states of New York and New Jersey. But what began as a local dispute over the right to ferry the paying public from the New Jersey shore to New York City soon found its way into John Marshall’s court and constitutional history. The case is consistently ranked as one of the twenty most significant Supreme Court decisions and is still taught in constitutional law courses, cited in state and federal cases, and quoted in articles on constitutional, business, and technological history.
Gibbons v. Ogden initially attracted enormous public attention because it involved the development of a new and sensational form of technology. To early Americans, steamboats were floating symbols of progress—cheaper and quicker transportation that could bring goods to market and refinement to the backcountry. A product of the rough-and-tumble world of nascent capitalism and legal innovation, the case became a landmark decision that established the supremacy of federal regulation of interstate trade, curtailed states’ rights, and promoted a national market economy. The case has been invoked by prohibitionists, New Dealers, civil rights activists, and social conservatives alike in debates over federal regulation of issues ranging from labor standards to gun control. This lively study fills in the social and political context in which the case was decided—the colorful and fascinating personalities, the entrepreneurial spirit of the early republic, and the technological breakthroughs that brought modernity to the masses.
Published by: Ohio University Press
Download PDF (42.3 KB)
List of Illustrations
Download PDF (28.4 KB)
Download PDF (65.5 KB)
“THE GALLING SACKLES with which a few lordly monopolists have, for some years past, contrived to fetter our navigation and intercourse with our sister state, have been at length broken by the Ithuriel spear, whose-all-powerful touch makes every unrighteous decision to crumble into dust,” exclaimed an article in the Elizabethtown Gazette of Elizabethtown, New Jersey, on...
Download PDF (46.5 KB)
IT IS WITH PLEASURE that I acknowledge the following individuals for their contributions to this book. I am particularly grateful to my doctoral dissertation adviser, Richard E. Ellis, whose sound advice and patience guided this project to completion. Michael H. Frisch, Tamara Plakins Thornton, and Donald M. Roper...
1: Steam Power and Patent Law: Development in the Eighteenth Century
Download PDF (164.7 KB)
ON MONDAY, AUGUST 20, 1987, a crowd gathered at the Front Street wharves on the banks of the Delaware River in Philadelphia. Curious, the people had come to watch John Fitch and Henry Voight launch their experimental steamboat, aptly named Perseverance. The inventors were an interesting pair. Fitch radiated detached impatience, whereas the jovial Voight...
2: Origins of the Fulton-Livingston Monopoly
Download PDF (174.0 KB)
“THE PRESENT MOMENT will long be remembered as an auspicious era in the history of our state. A new state of things is rising up,” declared the New York Columbian on January 26, 1820. Expounding on the greatness of the Empire State, the article boasted, “She is capable of unfolding her immense resources, in every noble improvement but connected with civil policy...
3: Corporate Negotiations
Download PDF (92.1 KB)
SHORTLY AFTER HIS triumphant return to New York City on August 20, 1807, Robert Fulton reported to Joel Barlow, “The power of propelling boats by steam is now fully proved.” The jubilant inventor also confided, “Although the prospect of personal emolument has been some inducement to me, yet I feel infinitely more pleasure in reflecting on the immense advantages that my country will draw...
4: Defending the Monopoly
Download PDF (137.8 KB)
IN 1810, ROBERT FULTON and Robert R. Livingston began an aggressive campaign to expand their steamboat operations across the nation. Their petitions to western state and territorial legislatures combined Livingston’s methods of courting local politicians for regional monopolies with Fulton’s ambitions of bringing steamboats to the Mississippi River valley. Fulton hoped that...
5: Interstate Competition
Download PDF (152.2 KB)
THROUGHOUT 1812, the profits of the North River Company continued to soar, and Fulton tenaciously pursued his dream of a steamboat franchise on the Mississippi River. Two new adversaries, however, quickly emerged to contest the New York monopoly—former New Jersey governor Aaron Ogden and former planter and Savannah mayor Thomas Gibbons. Both...
6: Personal Rivalries and Lawsuits
Download PDF (142.9 KB)
ON FEBRUARY 23, 1815, Jonathan Dayton reported the repeal of Ogden’s New Jersey steamboat monopoly to Thomas Gibbons. “When we took the vote, the disappointment of the Colonel was great, his mortification extreme,” gloated Dayton. As Ogden was “governed more by the spirit of prejudice than prescience,” he would now certainly negotiate with Gibbons...
7: The Road to the U.S. Supreme Court
Download PDF (197.9 KB)
CHANCELLOR KENT'S INJUNCTION provided Ogden with a sorely needed victory. But the spread of steamboats across the United States made the future of the New York monopoly ever more precarious. The steamboat Henrietta now plied the Cape Fear River between Fayetteville and Wilmington, North Carolina. Promoters launched the five-hundred-ton Western Enquirer, from...
8: Strategies and Deliberations
Download PDF (129.7 KB)
ON JUNE 4, 1822, Supreme Court justice Joseph Story wrote his colleague Brockholst Livingston, stating that it was a “matter of regret to me that the constitutionality of the Act of New York is about to come before the Supreme Court.” The Supreme Court’s reputation had already been maligned by states’ rights supporters for the justices’ nationalistic decisions in the...
9: The Gibbons Decision and Popular Reaction
Download PDF (102.5 KB)
THE ARGUMENTS IN Gibbons v. Ogden had been masterful and the drama intense. Charles Rhind stoically informed the Townsends, “The battle is begun and we must patiently await the result.”1 William Wirt took a different approach and optimistically informed his brother that “the Steam Boat cause is finished—and we are triumphant I hope—not as to the decision of the...
10: The Decline of the New York Steamboat Monopoly
Download PDF (89.9 KB)
IN THE WAKE of the Gibbons decision, the North River Steam Boat Company lost its most powerful weapon—the ability to legally enjoin out-of-state competitors from running steamboats in New York waters. Marshall, however, had primarily addressed congressional control of interstate commerce in his decision. Many monopoly supporters thus believed they might still control...
Conclusion: Gibbons v. Ogden as Historical Precedent
Download PDF (132.3 KB)
GIBBONS V. OGDEN was a conflict that bordered at times on melodrama. Nonetheless, it was not merely the story of powerful families, public campaigns, and private intrigue. The steamboat monopoly case found its origins in a new age of experimentation, in the efforts of John Fitch and James Rumsey to secure federal patents and state monopolies over new forms of steam...
Download PDF (296.6 KB)
Download PDF (120.4 KB)
Download PDF (74.8 KB)
Publication Year: 2009 | <urn:uuid:d726fb43-960b-471f-ad86-601cf04979a9> | CC-MAIN-2015-14 | http://muse.jhu.edu/books/9780821443330 | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131296603.6/warc/CC-MAIN-20150323172136-00274-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.924977 | 1,675 | 2.6875 | 3 |
Eastern Cicada Killer Wasp
Facts, Identification & Control
Adults are very large, approximately 2 inches long. The abdomen, the portion of the body immediately behind the insect’s “thread-waist,” is black with yellow markings on three segments. Their six legs are pale red to orange and the wings are a shaded- brown color. Male cicada killer wasps are two times smaller than females. People often mistake European hornets for cicada killers.
Behavior, Diet & Habits
Since cicada killers don’t live in colonies and they build their nests underground, they are considered solitary wasps. The cicada killer’s life cycle begins as a grub-like larva that has spent the winter in the protection of the burrow dug by the female wasp the previous year. In the spring, the grub changes into the pupal stage, which is then followed by the emergence of adults in the early summer or late spring. After adult emergence, the female feeds, mates and sets out making burrows to house her offspring. Some of the likely burrowing sites are lawns; edges of concrete slabs; sparsely vegetated slopes and sandy areas around playground equipment; and golf course sand traps. The burrow may seem pretty simple on the surface, but there is a lot of construction done below ground. The burrow is dug about a foot deep with cells for the eggs that will become the next generation of cicada killers. Other than seeing a cicada killer, which is an awesome, somewhat daunting site, the presence of excavated soil in the shape of a “U” at the burrow entrance means a cicada killer construction project is in progress. Upon completion of the cells, the female begins hunting for cicadas or other insects that will become food for the larva in each cell. Once she finds the prey, she stings and paralyzes it, flies back to the burrow and lays one egg on the prey insect. After egg laying, the female pushes the prey into each egg chamber and seals the chamber. In about 2-4 days the egg hatches and the newly hatched larva feeds on the prey for about 1-2 weeks. After feeding is completed, the larva builds a silk cocoon and prepares to overwinter. There is only one generation of cicada killers each year. After mating, the males die. The females die after completing their work laying eggs and providing food for the eggs that will hatch into larvae. While alive, adults will feed on flower nectar and more commonly on fermented sap from trees and other large plants in their habitat.
Male cicada killers do not sting. While the females can sting, they are not aggressive and sting only in very rare instances by injecting very mild venom that is far less painful than the sting of many social wasps, like yellow jackets. The perceived danger of the cicada killers, while exaggerated, is a real issue that homeowners and managers of public places must consider. These insects look vicious and dangerous, so people will describe seeing a cicada killer in terms like, “the biggest yellow jacket I’ve ever seen in my life!” Therefore, control is sometimes necessary. Since these insects are not likely to sting, the homeowner may elect to apply an insecticidal dust in and around the burrow entrance when first noticing cicada killer activity in the soil. When choosing to use insecticides, always read and carefully follow the product’s label directions. If there is a heavy population located in a sensitive, public area, the best thing to do is contact your pest management professional for their service. | <urn:uuid:54b2aafb-40a0-4092-8d2c-eb4980583b35> | CC-MAIN-2014-42 | http://www.orkin.com/stinging-pests/wasps/eastern-cicada-killer-wasp/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646519.4/warc/CC-MAIN-20141024030046-00220-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.944206 | 763 | 3.609375 | 4 |
Suprasl Lexicon [Супрасльський лексикон; Supraslskyi leksykon]. A 4,000-word Church Slavonic-Polish dictionary titled Leksykon syrech slovesnyk slavenskii (Lexicon or Slavonic Glossary) that was printed in 1722 at the Basilian monastery in Suprasl near Białystok, Poland. It was intended for use by the clergy. Its Church Slavonic content was based almost entirely on Pamva Berynda’s lexicon. Its Serbian-Bulgarian orthography was modernized, however, stresses were changed, and Volhynian-Polisian pronunciation was introduced (eg, the confusion of rě/ry/ri/rы, rja/ra, ы with y/i, and ě with y). As a result, erroneous Polish versions of Berynda’s Ukrainian definitions of words occurred. The lexicon was reprinted with few changes as an appendix in a book on moral theology in Pochaiv in 1751 and 1756, and separately in 1804. It was used by Yosyp Levytsky in the compilation of his Slavonic-Polish dictionary (1813).
[This article originally appeared in the Encyclopedia of Ukraine, vol. 5 (1993).] | <urn:uuid:a6a58278-f235-4009-ba3d-0c79e3512810> | CC-MAIN-2020-34 | http://www.encyclopediaofukraine.com/display.asp?linkpath=pages%5CS%5CU%5CSupraslLexicon.htm | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738723.55/warc/CC-MAIN-20200810235513-20200811025513-00339.warc.gz | en | 0.952722 | 298 | 2.78125 | 3 |
You’ve read one of your four complimentary articles for this month.
You can read four articles free per month. To have complete access to the thousands of philosophy articles on this site, please SUBSCRIBE!
A Kripkean Argument For Goatism
Bill Capra demonstrates that the fact that everything is a goat can be shown by a simple argument which draws on elementary modal principles.
Saul Kripke showed us that identity statements, when true, are necessarily true, assuming that what flanks the identity sign are both rigid designators [names]. But the opposite principle is no less true. Statements of non-identity, when true, are also necessarily true, assuming that what flanks the identity sign are both rigid designators. What could be more intuitive than the principle that if two things are distinct, then they could not have failed to have been distinct? Two things, surely, could not have been one.
‘Goat’ and ‘cat’ are both rigid designators. So if goats and cats are distinct, then they are necessarily distinct. Now surely Hilary Putnam was right to argue that cats might have turned out to be robots from Mars. We can tell a story according to which this is coherent and quite possible. Similarly, cats might have been goats. We can imagine that goats know how to make themselves quite small and fit themselves into cat suits, although we have not noticed this before. We have a strong intuition of possibility here, and it is not as if it is some illusory intuition of possibility that can be explained away. How could someone argue that goats could not have put on cat suits and learned to purr, chase mice, and engage in other cat-like activities? No, cats themselves (those very things) might have been goats. This is not a mere ‘epistemic’ possibility that is not really possible. It is really metaphysically possible that we might have examined cats carefully and found that they were goats in cat suits. Cats might have been goats.
Now, as we know from Kripke, if an identity fails, it fails of necessity. So if cats are not goats, then necessarily cats are not goats. The trouble is that we have an intuition of contingency – that cats might have been goats – which we have no reason to disrespect. It follows that it cannot be the case that cats are distinct from goats. Therefore cats are goats.
The same argument carries over to birds, cars, pencil sharpeners, and all other material things. They all might have been goats, and thus they all are goats. For if they are not goats then they could not have possibly been goats. But what could be plainer than the fact that they could be goats? (Who here is the philosopher and who the plain, commonsensical person?) Indeed, you, dear reader, might have been a goat. Therefore you are not necessarily distinct from a goat. And since non-identities are necessary, you are not non-identical with a goat. Therefore you, dear reader, are a goat.
This sort of argument generalizes, to show that all material things are goats. But what about parts of goats? Surely a goat’s leg is not itself a goat, and thus goatism is false? One reply would be that modern philosophy of language has shown that there is no determinate difference between referring to a goat and referring to an undetached goat leg. But we need not rely on that possibly contentious doctrine, because it is obvious that a goat’s leg might itself be a goat, just as a cat might be a goat. It follows that goat’s legs are goats. And the same goes for other goat parts. Hence all goats are composed of smaller goats. So the world is goats all the way down! Furthermore, like many Mediaeval philosophers, we should accept that mereological fusions of goats [whereby many things compose another thing] are themselves goats. These fusions are many-headed goats. There is even the ‘All-goat’, which is the mereological fusion of all goats – even of all actual and possible goats. The All-goat is itself a goat, even if it is admittedly a rather exceptional goat in view of how many heads, legs and tails it has in contrast with the goats we are more familiar with. The All-goat has many heads.
Although we have thus shown that all material things are goats, the thesis is not yet fully general. We have not yet shown that absolutely everything is a goat, for the argument does not obviously extend to abstract objects such as numbers. We need to demonstrate that numbers are one and all goats; and for that we need the premise that any number might have been a goat.
We set considerable store by ordinary modal intuitions in the above argument concerning material things; yet it seems that some people have intuitions to the effect that numbers are necessarily abstract and do not exist in space and time, whereas goats are necessarily concrete and do exist in space and time. The surprising conclusion which would seem to follow from this, is that numbers could not be goats, and thus are not goats.
One response would be to deny the existence of abstract objects such as numbers. This strategy would certainly fit with one aspect of goatism, whereby it strives to be a simple and economical view. If goats turn out to be the one underlying substance which takes a variety of forms, then empirical science can investigate the combinations and permutations of the goat-substance which gives rise to the manifold of diverse appearances which suggest to the na ïve that some things are not goats.
However, I believe in being metaphysically cautious, and this crude dismissal of abstract objects seems metaphysically extravagant. It seems metaphysically safer to say that some goats are abstract objects. But does not the intuition that goats are concrete get in the way of this idea?
Well, I think it is true that numbers are necessarily abstract. But we have conceded that pencil sharpeners might have been goats, and thus cannot be said to be necessarily distinct from goats, and thus are identical with them. But it is also true that superficially, pencil sharpeners seem to have essential properties incompatible with their being goats. However, once we know that they are in fact goats, our view of their essence should change; and we know that the essential properties that we associate with our conception of pencil sharpeners do not in fact exclude their being a goat. So pencil sharpeners do not in fact have properties that exclude a goaty essence; and the same is true of numbers. It might be part of the nominal essence of a number to be, say, even, or prime, or an abstract object. But in addition to such nominal essences, things may have hidden or real essences, which are not available by mere conceptual reflection. We may come to believe that a thing has essential properties that we did not know it had merely by conceiving it. Being a goat is just such a property of numbers.
Since there is no conceptual bar to numbers being goats, it appears that it is possible that numbers are goats. But is this really possible? What we need here is something parallel to the story of goats putting on cat-suits, so as to give us positive reasons for thinking that there is a possibility open here, rather than the mere appearance of a possibility. Yet it is difficult to see how goats could have dressed up as numbers so that numbers (those very things) could turn out to be goats.
However, perhaps this is making things too hard for ourselves. What we need to do is to tell a story according to which goats could have numerical properties. Now, on the structuralist view of mathematics, it is essential to numbers that they have relational properties but not essential for them to have intrinsic properties. Some such views insist that numbers only have relational properties, and have no intrinsic properties at all, but that seems over strong. The weakest structuralist view – and hence the most plausible – restricts itself to claiming that insofar as we conceive of numbers as numbers, we conceive of them as having relational essences, not as having intrinsic essences. These relational properties are their nominal essences, leaving open whether numbers have intrinsic essences. Structuralism only says that in thinking of numbers we do not think of them as having intrinsic essences. This means it is a quite open question what the intrinsic nature of numbers is. Numbers as we conceive of them are roles. It is a conceptual truth that numbers have certain roles with respect to other numbers; but what fills those roles is not a conceptual question. It is perfectly possible that goats are the role-fillers. What fills the roles are vast ranks of immaterial goats standing in numerical relations to each other. It is true that we will need an infinite number of such goats. But even in the material world we have seen reason to believe that there are an infinite number of goats, if goats are always composed of other goats. So we need not shrink from postulating infinitely large numbers of goats. Hence numbers can be goats, since goats may fill the roles that are the nominal essences of numbers. And thus, by the elementary principles of modal reasoning we rehearsed in the case of cats, numbers are goats.
Goats take a variety of forms, and the ones that we are most familiar with are those whose essence is most immediately manifest to us. These are the ‘classic’ goats – those with beards, which try to butt people, and which can be perceived by the five ordinary senses. But other goats are shy. They conceal their goaty essence. In particular, numbers are shy goats. Numbers are shy goats whose goaty essence is not as immediately available as the goaty essence of the more brash material goats that we can perceive. Deep down though, the world is of one underlying goaty nature.
The assertion that everything is a goat is something that we should embrace on the broad grounds of its coherence with other things that we believe, and because of its unifying explanatory power. Faced with this kind of argument, some philosophers respond with an incredulous blank stare. But if the goatist thesis has the virtues of economy and explanatory power, these must weigh more highly than nebulous feelings of metaphysical discomfort. Furthermore, in many respects, the goatist thesis is an entirely commonsensical theory in its accordance with our ordinary modal intuitions.
© Bill Capra 2010
Bill Capra ruminates at the CHVR Institute. | <urn:uuid:349a27d4-150c-442f-aa11-cc4a3ece3e7f> | CC-MAIN-2017-34 | https://philosophynow.org/issues/79/A_Kripkean_Argument_For_Goatism | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102307.32/warc/CC-MAIN-20170816144701-20170816164701-00560.warc.gz | en | 0.97355 | 2,173 | 3 | 3 |
By Michele Robert Poche
They help us to communicate and learn. They soothe us with familiar voices and sounds. They maintain our sense of physical balance, and they warn us when danger is near. There’s no doubt that properly functioning ears enrich the quality of life. So, what can we do to keep our children’s ears healthy and fully operational?
Don’t insert anything into the ear canal. Fingers, pencils and cotton swabs have no place inside the ear. The ear is self-cleaning, and its wax serves the purpose of keeping all foreign matter from entering it. If you’re concerned that something is lodged within, seek medical help immediately.
Maintain healthy noise levels. Allowing a child to listen habitually to loud music, video games or other noise via headphones or speakers can cause hearing damage. If you need to shout to be heard over the noise, turn it down. Also, try to balance the loud time with some quiet time and rest for the ears.
Protect from burns and injury. Because they protrude from the head and often poke through the hair, ears are very vulnerable to sunburn. Don’t forget sunscreen or a hat on sunny days. Also, when participating in physical activity, like cycling or contact sports, wear a helmet. Concussions can damage hearing.
Keep ears dry.
Outer ear infections, such as swimmer’s ear, develop when water gets trapped in the ear canal. Safeguard
against this painful problem by tilting the head to each side and shaking a few seconds to expel the water. If prone to this problem, use earplugs while swimming and preventative drying drops when getting out of the water. | <urn:uuid:eba98672-e588-484b-bfe5-6f8fea3675ab> | CC-MAIN-2018-26 | http://inspirehealthmag.com/hear-hear-tips-for-keeping-kids-ears-healthy/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867364.94/warc/CC-MAIN-20180625014226-20180625034226-00509.warc.gz | en | 0.938206 | 357 | 3.609375 | 4 |
When you begin learning how to learn to play the piano, you eventually will need to know what an E minor triad is and how to play it. So in this article, we’re going cover exactly this topic, and hopefully you’ll walk away with a better understanding of how to play this particular triad.
What is an E Minor Triad?
Musically speaking, a “triad” is a group of three notes made up of a “root”, a third, and a fifth.
What all of that means is that using any given musical “scale”, you can make a triad by taking the first note (the root), the third note, and the fifth. This can also be called a chord.
An E minor triad would be made using the 1st, 3rd, and 5th tone from the E minor scale, and that is what this article will be teaching. Here is a quick look at that E minor scale.
The notes we will be using are E, G, and B. Because our scale is “minor”, it will not quite sound like the scales of the “do, re, mi” variety that you may have learned when you were younger.
That’s because, in music, minor refers to any chord, song, etc. set in a tonality that invokes a feeling of sadness, anger, or melancholy, as opposed to the happier sounding pieces in “major” keys.
The difference comes from lowering the third tone in the scale by one semi-tone. Sometimes the sixth and seventh tones can be altered too. As you can hear, such small changes really do make quite a bit of difference.
And now that you know what an E minor triad is, we are going to learn how to find it on the piano keyboard.
The Piano Keyboard
As explained earlier, the notes of the E minor triad are E, G, and B. In order to play this on the piano, we first have to know where to look.
Whether you are playing on an upright or a digital, your keyboard is made up of black and white keys. If you take a closer look, you will notice that those black keys (excluding the one on the very left on a full-size keyboard) are separated into groups of two or three.
This is going to be a very important tool that we will use to help navigate the keyboard. Check out the picture below. To make things a little easier, I have circled the sets of two in blue and the sets of three in red.
A triad or chord can be played using any combination of the notes that it is made of, but for this article, I will be teaching you how to play it in root position — that is with the E on the bottom. To find an E, first look for a set of two black keys. It will not matter which set of two that you use, since all E’s look the same. If you are looking for a lower sound, find a set of two on the left side of the piano and for a higher sound, find a set of two on the right side of the piano.
It is easier however, and more comfortable, to start in the middle. Pianists orient themselves at the keyboard using middle C.
It’s called middle C, because it is almost the exact middle of the keyboard. If you start with the E to the right of that, you’ll be in the most natural place to start.
Once you find a starting place, find that set of two black keys and put your finger on the black key on the right. Slide your finger to the white key to its right and you have found the E. It looks like this:
That’s our root. Now, the next note in the triad is the third. Head up two white notes to the right to find the G. We are now venturing into the group of notes that touch the set of three black keys. Another way to locate a G is to just find a set of three black keys and look between the first and second. The G looks like this:
One more note to go! Using the set of three black keys where the G is, put your finger on the black key farthest to the right in that group. Then, just as you did to find the E, you’ll slide your finger to the right, to the very next white key. That key is B, the 5th in our triad.
All together the E minor triad looks like this:
Every other white note! Not all triads and chords will only use white notes, but since E minor happens to be one of the easier keys to play in, it will.
Now that we can locate the triad on the piano, let’s take the next step and learn how to play it.
E Minor Triad on Piano
Unlike many other instruments, a pianist uses all ten of their fingers to play the keys. To keep things a little more organized, pianists number their fingers like the chart shown below.
When using sheet music, there are often markings above the notes with numbers to indicate which finger should be used. If you follow these suggestions, it will put your hand in the most efficient and easiest way to play a certain section of music. This strategy of indicating what fingers to use is called the music’s “fingering.”
To play the E minor triad as efficiently as possible, I highly recommend using the fingering that I am going to describe.
Let’s begin with the right hand. Place your 1st finger on the E of your choice.
Take note of the hand shape shown in the picture above, as well as the way the thumb is laying on the key. It is very important to keep your hand nice and rounded and the heel of your palm off of the keyboard. It may not make much of a difference playing this one triad, but if your goal is to play entire songs or scales and arpeggios, you definitely want to use the proper technique to make the learning process as smooth as possible.
Now that we’ve got our E, our hand is in position to play the rest of the triad. The next two notes are G and B and you will play them with your 3rd and 5th finger, like so:
And that is the E minor triad in your right hand! When you press note your notes, be sure use the weight of your hand instead of your individual fingers. This will ensure that all notes are pressed at the same time and ring out simultaneously.
Alright, halfway there! Let’s get to the left hand now!
Your left-hand fingering will be the opposite of your right since your hands are mirror images of each other. Your left pinky (5th finger) will play the root this time.
Find the E of your choice and put your 5th finger on it, like so:
Again, make sure your hand stays nice and rounded and that you are developing your finger strength by using your fingertip and not letting your pinky bend at the first joint. That will definitely make things easier for you in the long run.
Okay, we’ve got the root and now we are in position to play the rest of the triad. The next two notes are the E and the B and they will be played with the 3rd finger and the 1st finger just like the picture shows below.
That’s all there is to it! Congrats! Now you can play the E minor triad in both hands!
The Next Step
Once you’ve gotten the hang of locating and playing the E minor triad with both hands, why not take the next step? Play around with the notes! Try playing the triad broken, as in playing the notes separately instead of all together. Try playing the triads in different octaves! See how many E minor triads, you can find on the piano!
You can also try an inverted triad. Fancy name, but all it means is starting the triad with a different note on the bottom as in GBE or BEG, instead of the root position we learned in this article.
Triads also sound great with the pedal! For a nice effect, put your foot down on the right pedal of your piano. This pedal is called the damper or sustain pedal and it keeps the hammers (both physical and digital) from landing back on the string after you strike a key, letting the note ring out long after you’ve released. Pianos have either two or three pedals, but the damper pedal is always the one on the right.
If you’re playing a keyboard, don’t worry about being left out! If you’d like to introduce a pedal to your playing, there are digital pedals available in all shapes and sizes that hook up to your instrument via audio jack. Check out the hookups at the back of your keyboard to make sure the pedal you buy is compatible with your instrument. Check out this link for more pedaling techniques!
Pop Songs in E Minor
Here are some popular songs originally composed in the key of E minor:
Come As You Are by Nirvana – Get your flannel out, it’s time to go grunge! This Nirvana favorite starts with a guitar riff leading up to an E minor chord!
Another One Bites the Dust by Queen – Stomp, stomp, clap! Stomp, stomp, clap! Another classic that starts with one of the most iconic bass guitar riffs in rock! This one starts right on an E minor chord!
Nocturne in E Minor Op. 72, No. 1 by Frederic Chopin – A beautiful piece from my personal favorite piano composer. This is one of those classical pieces that some know and some don’t, but it is definitely worth a listen. You may have heard it if you’ve seen the movie Tombstone. It’s the piece Doc Holliday plays on the piano in the saloon! I’m your Huckleberry, indeed.
Now that you’ve know where an E minor triad is and how to play it on the piano, go forth and play! With practice you can slowly add on to the chords and triads in your arsenal! And the more of those you can get down, the more songs you can confidently add to your repertoire. That does it for this article!
Happy practicing, readers! And when you’re ready, we will see you in the next article!
If this article helped you, please “like” our Digital Piano Review Guide Facebook page!
You Might Also Like:
Triad – three notes, consisting of any given note combined with the notes three and five notes higher in the corresponding scale.
Root – note that establishes the tonality of a musical key, chord, or scale and gives it its name.
Scale – graduated sequence of notes dividing what is called an octave
Major – tonality based on a major scale, the 3rd tone being a major third above root. “Happy” sounding.
Minor – tonality based on a minor scale, the 3rd tone being a minor third above root. “Sad and Melancholy” sounding.
Fingering – the placement of fingers in the most suitable and efficient way to play a series of notes. | <urn:uuid:d1fb22c5-6787-4d75-9a26-9c2167de9ffd> | CC-MAIN-2022-40 | https://www.digitalpianoreviewguide.com/e-minor-triad/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338244.64/warc/CC-MAIN-20221007175237-20221007205237-00529.warc.gz | en | 0.948447 | 2,413 | 3.671875 | 4 |
Understanding Dig Command Basics:
Dig (Domain Information Groper) is a command-line tool for querying Domain Name System name servers, mail exchangers, hosts, etc. Dig command is mostly used for troubleshooting DNS problems because of its ease of use and clarity of results. Dig is part of the BIND domain name server software suite.
Dig is normally used with command-line arguments, bu... read more | <urn:uuid:cc0d9268-8c74-4cfa-a1d5-77ff04b3352a> | CC-MAIN-2021-21 | https://etnhost.com/kb/category/dns-records | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991178.59/warc/CC-MAIN-20210516171301-20210516201301-00576.warc.gz | en | 0.856391 | 85 | 2.53125 | 3 |
|Wild Wild West|
State Standard: 1, 2, & 4
|Equipment: 4 Mats & Several yarn balls.||Grade: 2-5|
|Purpose of Event: Running, Throwing, & Catching|
|Time: 15- 20 minutes|
|Organization: Set-up four mats on end in the shape of a circle. Place a basket of several yarn balls in the middle of the gym. Separate the students into two teams. One group will be the throwers (cowboys/cowgirls) who will be standing inside the middle oval on the gym floor. The other group will be the runners/catchers (buffaloes) standing on the outside of the mats.
Activity: On the signal, the buffaloes begin by running around the outside of the mats in a circle (around gym) as the cowboys/cowgirls (standing in the middle) are trying to throw the yarn ball at the buffaloes. The goal is for the buffaloes to try and catch a yarnball thrown by a cowboy/cowgirls before hits the ground. The game keeps going for 4-5 minutes and then switch the groups. The cowboys/cowgirls become the buffaloes and the buffaloes become the cowboys/cowgirls.
Variations: Group the students into groups of two (partners). Have one partner begin as a buffalo and the other as runner. The goal is for the two pairs to catch a ball 5 times in a row and then switch places (can make it a higher number for older students). For younger students try using a larger ball (i.e., beachball or beanbags). Instead of running; incorporate different locomotor skills for the buffaloes (i.e., skipping & galloping). Have students practice underhand or overhand throwing as well. You can also have the students rotate when they have caught a ball so many number of times. I have my Ss usually go to 5 times and then switch.
|Concerns: Move safely around the gym. Making sure students are sharing the yarn balls (not fighting)!!! Students are NOT to be throwing the ball at the runners; not dodge ball. Working on throwing and catching while moving.|
|This idea is from: Amy Staples, Physical Education Teacher, Sioux Falls, SD.| | <urn:uuid:cbfaee4f-55d0-4d60-ba47-b125c108ae2d> | CC-MAIN-2021-43 | https://mrkirsch.edublogs.org/2017/01/16/wild-wild-west/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585561.4/warc/CC-MAIN-20211023033857-20211023063857-00482.warc.gz | en | 0.923588 | 486 | 2.59375 | 3 |
signal for everybody within range of the fort to commence firing. We raised a yell and made a dash in order to get under the walls of the fort before their artillery could open upon us, but in this we were unsuccessful. The heavy guns joined in the awful din, and the air seemed literally filled with missles.
The Virginians, Georgians and South Carolinians commenced firing from the flanks at the fort and at the enemy's main line, as did our artillery, and the enemy's infantry and artillery from all sides opened upon us.
On we went, as it seemed to us, literally "into the mouth of hell." When we got to the walls of the fort we dropped down on the ground to get the men in order and let them get their breath. While waiting we could hear the Yankee officers in the fort trying to encourage their men, telling them, among other things, to "remember Fort Pillow." (In that fort Forrest's men had found negroes and whites together, and history tells what they did for them).
NOVEL METHODS OF FIGHTING.
Then commenced a novel method of fighting. There were quite a number of abandoned muskets with bayonets on them lying on the ground around the fort. Our men began pitching them over the embankment, bayonet foremost, trying to harpoon the men inside, and both sides threw over cannon balls and fragments of shells and earth, which by the impact of the explosion had been pressed as hard as brick. Everybody seemed to be shooting at the fort, and doubtless many were killed by their friends. I know some of the Yankees were undoubtedly so killed.
In almost less time than I can tell it we were in condition to go in. Col. H. H. King ordered the men near him to put their hats on their bayonets and quickly raise them above the fort, which was done, and, as he anticipated, they were riddled with bullets. Then he ordered us over the embankment, and over we went, and were soon engaged in a hand-to-hand struggle of life and death. The enemy shrank back, and the death grapple continued until most of the Yankees found in there were killed. This slaughter would not have been so great had not | <urn:uuid:9320107b-ab02-47fc-a85b-98d2233f986b> | CC-MAIN-2020-40 | https://en.m.wikisource.org/wiki/Page:Southern_Historical_Society_Papers_volume_36.djvu/182 | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400234232.50/warc/CC-MAIN-20200926040104-20200926070104-00026.warc.gz | en | 0.991712 | 467 | 3.09375 | 3 |
Problem Based Learning Certification
Problem Based Learning (PBL) is a state-of-the-art educational approach originally used by medical school. PBL is emerging as the most dynamic and engaging form of learning for officers of all ranks. This intensive, one-of-a-kind, 10-day course is described as one of the most challenging courses in policing today. PBL is student based and uses real life problems to help students learn how to solve problems and think in creative ways. Successful candidates will be certified PLB instructors joining an elite group of police educators centered at the Police Society for Problem Based Learning.
May 8-19, 2017
8:30 a.m. – 4:30 p.m.
Canadian Military Police Academy
To register, please email, fax or mail the registration form with payment method.
For more information:
Toll Free: 800.862.6307 ext 6072
1430 Victoria Avenue East
Brandon, MB, Canada R7A 2A9
The sessions will consist of full days with group assignments and required evening work. There is also an online pre-course assignment and a field exercise that must be completed prior to the start of the course.
On successful completion of this course, candidates will receive certification as problem based learning instructors.
You Will Learn
- How to use PBL to help students self-discover course materials and take ownership of their own learning.
- How to use the tools of Police PBL: the ill-structured problem, the cohort learning group, tutoring and mentoring, emotional intelligence, and the evaluation rubric.
How to encourage students to think creatively and think on their feet in a competent and confident manner.
- How to coach students to resolve neighbourhood problems in collaboration with the community.
- How to help police recruits become confident, safe and ethical officers.
Who Should Attend
- Academy instructors and managers
- Field training officers and patrol supervisors
- Educators in criminal justices and policing
Should a course candidate need to withdraw from this course, they will be granted a refund of tuition based on the following timeline:
- Six weeks or more of notice – full tuition refund
- More than two weeks, less than six weeks – one-half of the full tuition
- Less than two weeks notice – no refund of the tuition | <urn:uuid:42a51908-6f33-4adf-a70f-37162d9f0959> | CC-MAIN-2020-10 | http://www.cape-educators.ca/problem-based-learning-upcoming-certification/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147154.70/warc/CC-MAIN-20200228104413-20200228134413-00224.warc.gz | en | 0.940738 | 484 | 2.546875 | 3 |
In addition to the data itself, a set of
program is necessary to facilitate adding new data as well as modifying and
retrieving existing data within a database. This set of programs is referred to
as database management system (DBMS).
Generally, the user of a database management
system accesses the database via a special query language or via applications
programs written in a high-level language. The applications program utilizes
special host- or command-language instructions to communicate requests for data
to the portion of the DBMS referred to as the database processing system.
Basically, the database processing system consists of a series of programs that
translate requests from users or user programs into the instructions necessary
to access, add to, change, or delete records or items of data from database.
Thus, an applications program need include only a command to access the desired
data element. The actual mechanics of locating and accessing the data element
are accomplished by the database processing programs.
Accessing Data from a database in response to
an applications program request.
- Application program instruction initiates a request for
- Control unit transfers control to DBMS
- DBMS verifies that the request is valid and determines
location of data element in database
- DBMS issues command to access data from secondary
- Data element is accessed and stored in a buffer of the
- DBMS transfers data element to application program
- Next instruction in application program is accessed and | <urn:uuid:72a878de-10db-47e5-a5ff-33fc546238f0> | CC-MAIN-2021-25 | http://www.cl500.net/dbms.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487636559.57/warc/CC-MAIN-20210618104405-20210618134405-00089.warc.gz | en | 0.853863 | 300 | 3.5 | 4 |
CHD Medical Professionals
About Medical Professionals
Children who are seen in a cardiac clinic will interact with many different health professionals. Here, we’ve created two categories: Health Professionals who you will definitely meet as part of your care, and other health professionals who you may encounter or who you may wish to seek out.
Every child’s experience is unique. To support you on your journey there will be many members of your health care team, both when you are receiving treatment and throughout your lifetime of care.
Providers you are most likely to encounter:
Primary Care Physician
This is typically your child’s family doctor or your child’s paediatrician. She/he is your gateway into the medical community. The primary care physician manages your medical care, helps you to provide your child with a healthy lifestyle and directs you to other health care professionals at their discretion. It’s likely that you will be visiting your primary care physician on a regular basis.
Your child’s cardiologist is a doctor who specializes in providing medical care for your child’s heart condition. Your child should visit them for regularly scheduled appointments, and if your child’s condition changes.
A cardiac surgeon is a physician who is specifically trained to operate on your child’s heart. You will meet with this surgeon if your child is being considered for surgery, or to follow up after an operation.
These individuals, as well as other specific medical educators, can teach you and your child about the heart and how to keep it healthy. You will meet with them to learn how to keep your child’s heart healthy, and whenever your medications or diet need to be changed.
Whenever you need prescriptions filled, or have questions about how often your child should take medications, or potential side effects – you will talk to your local pharmacist.
Other potential members of your health care team:
There are many specialist physicians who may be asked to help your child to be healthy and active. Often children who are seen in a cardiac clinic will also been seen by a nephrologist (kidney specialist), neurologist (brain/nerve specialist), electrophysiologist (heart beat rhythm specialist), lipid disorder specialist (for cholesterol), endocrinologist (for diabetes or other metabolic conditions), physiatrist (rehab specialist) or others. These professionals will provide you with medical care within their area of specialization. Visits to see them will likely occur only if your child’s condition needs their expertise, or if special procedures need to be performed.
Physiotherapist / Occupational Therapist / Rehabilitation Nurse
These professionals can help your child to build strength, flexibility, and independence during your child’s recovery after surgery and rehabilitation. You’ll encounter them during your time in hospital, and perhaps afterwards for visits.
Kinesiologist or Exercise Physiologist
These individuals are experts at improving your child’s health and quality of life through physical activity, exercise and physical movement. Being able to play actively with friends is important for the mental and physical health of all children. These professionals can also help your child to plan and develop the skills and activity options that will help your child to be active, on his/her own or with your friends or family.
Dieticians are certified nutrition experts who can help you and your child find and keep appropriate eating habits. For children who are seen in a heart clinic, there are often dietary changes required. Meeting with a registered dietician can help your child to eat foods that will help to keep your child healthy.
Psychiatrist / Psychologist / Social Worker / Case Manager
Dealing with medical conditions can be difficult at times. This group of professionals can assist you and your child with the psychological aspects of your child’s diagnosis, treatment, and rehabilitation. They can also help coordinate your care and services. Your visits with them will be arranged when needed. | <urn:uuid:0b5e62f4-6a4f-4c05-981e-483f68ea1ac2> | CC-MAIN-2023-40 | http://ww.cchaforlife.org/chd-medical-professionals | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00784.warc.gz | en | 0.954954 | 844 | 2.78125 | 3 |
The body has three storage depots to use as fuel:
- Carbohydrates from food
- Protein that is converted to glucose in the liver and used for energy
- Stored body fat and ketones
In a regular high carb diet, carbohydrates are the main source of fuel for the body.
- Carbohydrates, specifically starches and sugars are readily broken down into glucose in the bloodstream, giving the body its principal energy source.
- At this point, the hormone insulin steps in to remove glucose from the bloodstream as too much sugar can lead to a dangerous condition known as glycosylation.
- Insulin converts glucose into glycogen. Some glycogen is stored inside the liver as a fuel reserve for the brain, and the rest is stored in the muscles as fuel reserves for the body.
- When that muscle glycogen is not used through a lack of energy expenditure or exercise, it stays in the muscles.
- The human body can only store so much glycogen, about 1800 calories worth. When that reserve becomes full both the muscles and the liver send a signal to stop insulin production and excess glucose from dietary carbs begins to build up in the bloodstream, calling for more and more insulin to be released to remove it.
- Insulin levels surge, and eventually this leads to insulin resistance.
- At this point, the liver then sends any excess glucose to be stored as body fat.
- As high carb intake continues, glucose floods the bloodstream, insulin levels increase, and so do the body’s fat stores.
|A VICIOUS CYCLE
High Carb Intake = High Glucose In The Blood = High Insulin = Body Fat Stores
Eventually this leads to metabolic syndrome, a set of conditions caused by insulin resistance, which includes obesity, fatty liver, type 2 diabetes, heart disease, and other metabolic issues.
While this carb cycle may not occur in everyone, for many who are obese, have a sensitivity to carbs, or who do not expend the required amount of stored energy, this is often the case and the main culprit behind obesity.
Lipolysis And Ketosis
Under normal dietary conditions, ketones play no role in fueling the body and energy production, but during a Ketogenic low carb diet, ketones become the central player, fueling the body and at the same time flipping on the fat burning switch.
When the intake of carbs is limited, and their sources controlled, meaning that starches and sugars are eliminated, the body goes into a state called lipolysis, a most efficient biochemical pathway to weight loss and a scientifically proven alternative to using glucose for energy.
- Lipolysis is the only practical alternative to giving the body an alternative for glucose fuel, the process that often leads to obesity
- Lipolysis occurs when the body begins to burn fat stores for energy instead of carbohydrates that are obtained from the diet.
- The by-products of this fat burning process are ketones and so ketosis is the secondary process of lipolysis.
- By lowering intake of carbohydrates and also the sources of those carbohydrates, which the body will use for energy first when available, it is forced to use its fat stores instead, literally melting it off the body in a state referred to as ketosis.
- Ketones, the byproduct of ketosis, fuel the body
Sugars, grains, starches, and starchy vegetables fuel your body when you eat them, a state called glucosis (a term coined by the late Dr. Atkins, a pioneer in low carb weight loss). It is only when you lower carb intake and limit it to non-starchy vegetables, and small amounts of certain dairy foods that you are not eating enough carbs to create glucose, creating a state of ketosis where the body begins to burn its fat stores for energy.
- The only exception to the body not needing glucose for fuel is ketones
Lipolysis and its secondary process, ketosis provides adequate fuel for cells, the brain, and other organs just as glucose from carbs does BUT, unlike when the body uses glucose from carbs for energy, ketosis does not store fat, and actually allows the body to burn stored fat for fuel.
Ketosis and ketoacidosis are often confused and they are two completely different things.
- Ketosis is a natural fat burning process in the body, while ketoacidosis is a medical condition that occurs only in uncontrolled diabetes.
- Ketoacidosis is dangerous, but ketosis on a ketogenic diet is perfectly normal, healthy, and necessary for weight loss.
Fuel Utilization By The Brain
According to Psychology Today, while the brain typically runs on glucose, it has no problems getting its fuel from ketones when they are available.
Lipolysis and the its secondary process, ketosis
Ketone production occurs when insulin in the bloodstream is low.
The lower the insulin level, the higher the ketone production and vice versa.
This process can only occur while following a low carb diet and the sources of those carbs are not insulin trigger foods, such as starches or sugars.
While some parts of the brain can only use glucose for energy, the body takes care of this too.
When glucose is lacking, it can turn protein into glucose through a process called gluconeogenesis. | <urn:uuid:4d6c4943-521c-477a-9601-efd9a1d4930a> | CC-MAIN-2024-10 | http://www.ketoconnection.net/articles/fuel-utilization-in-the-body-the-main-principle-of-keto/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474544.15/warc/CC-MAIN-20240224180245-20240224210245-00025.warc.gz | en | 0.92082 | 1,097 | 3.640625 | 4 |
Conquering the deadliest enemy 0
We are once again entering the season of remembrance in Canada, and this month marks the 70th anniversary of the beginning of the Italian campaign during the Second World War. It was a long, bloody struggle, where two Canadian Army divisions fought alongside a multinational coalition that included contingents from Britain, the United States, France, South Africa, New Zealand, India, Poland, Italy, and Brazil. Almost 93,000 Canadians served in Italy, and 5,500 died there in some of the costliest struggles of the war.
But we, as 21st-century Canadians, can draw more than remembrance from the Second World War: there are lessons we can learn and experiences we can benefit from, individually and for public policy. One of the most valuable lessons from the Second World War involves health care and the prevalence of infectious disease.
It’s surprising, but some of the most revolutionary changes to warfare in human history occurred on the medical front in the years before and during the Second World War. Until the First World War, the overwhelming majority of soldiers who died in war would die from infectious diseases, not from battle wounds
During the American Revolution, nine colonial soldiers died of disease for every one soldier who died in battle. During the British army’s campaigns against Napoleon, typically seven soldiers would die from disease for every one in battle (during the ill-fated Walcheren Expedition of 1809, the ratio became a staggering 37 to one in favour of disease deaths). In the Crimean War it was five to one, in the American Civil War and the Boer War about two to one.
Even in the First World War, counting all fronts, there was still one soldier dying of disease for every two who died of battle wounds. And all of these numbers represent only the soldiers who died of the diseases they were infected with: the majority of soldiers would survive infections, but were still lost (at least temporarily) to military service.
Why was disease rampant? For most of human history the microbial causes of disease were unknown, but even after their discovery it took decades for the military illness rates to drop. Disease was spread through contaminated food and water, poor personal and collective hygiene, a lack of sanitation and waste removal, insufficient precautions against disease-spreading mosquitoes or lice, deployment to foreign lands where different diseases were endemic, and the centralization of sick soldiers in general hospitals where infection would spread to others.
But public health measures improved sanitation and hygiene, and attitudes changed toward health care and the state. It was around the time of the Second World War that the tables decisively turned and the death rate from disease plummeted. In the Canadian Army of the Second World War only one soldier died of disease for every 11 who died in battle, and the overall rate of infection was even lower.
The radical change came about not because of heroic cures or the eradication of disease, but through hard work, medical discipline, and attention to detail. Vaccines for some diseases were developed in the 19th century, but they were only effective when authorities made vaccination mandatory for soldiers. (In the first months of the First World War the French army, in which vaccination was voluntary, suffered 65,000 sick and 11,000 dead from preventable typhoid fever.) Hygiene specialists and inspectors were empowered to monitor sanitation, cleanliness, and potential sources of contamination. Soldiers were educated as much as possible about the benefits of prophylaxis.
These measures, though simple, created one of the most remarkable shifts in all of military history. But the dramatic victory over disease was not a permanent one. Any laxness or breakdown in medical discipline could send disease rates skyrocketing once again.
Such was the case at the end of the Sicilian campaign in August 1943, just prior to the Allied invasion of Italy. After the month-long struggle to capture Sicily, the Canadians had a few weeks to rest, only to suffer a severe outbreak of malaria.
Malaria is a potentially fatal disease transmitted by mosquitoes, caused by a one-cell parasite called Plasmodium that provokes flu-like symptoms and intermittent fever. Today malaria still kills upwards of one million people annually. There is no cure or vaccine, but it can be prevented or reduced in severity through medication, bite prevention, and mosquito habitat destruction.
During the Second World War, the Allies were armed with a comprehensive knowledge of preventive medicine and a plan for how to deal with a malarial zone like Sicily. But everything went wrong on the ground.
Mosquito netting, essential for preventing bites, was in short supply: almost 40% of the Canadians’ nets were lost en route to Sicily or placed in a later convoy. Many more nets were damaged during the course of combat operations across the Sicilian highlands.
Mosquito-repellant cream was distributed to troops, but it was sticky, greasy, and rancid, particularly in the scorching hot Mediterranean summer. The troops did not use it, and the officers understandably did not make them use it.
Mepacrine, a synthetic anti-malarial drug, was given to the troops regularly before the landing in Sicily. But when Canadians waded ashore, the water damaged the mepacrine pills and made many of them useless. In the subsequent danger and excitement of combat, they often forgot to take the pills. Less than half of the Canadian troops in Sicily were taking their mepacrine on schedule until the rest period in August.
The result of these lapses was significant. In 1943, between July 10 and Aug. 31, there were 1,184 cases of actual or suspected malaria in Canadian hospitals in Sicily. Few died, but infected soldiers were still incapacitated for extended periods of time. There were 562 Canadian combat deaths and 1,664 wounded in Sicily, making malaria one of the greatest sources of casualties.
The official medical historian of the Canadian Army judged that the cause of the malaria epidemic in Sicily was neglect on the part of units and individuals in implementing existing precautionary measures. This neglect was due to the inadequacy of prior anti-malaria training and the consequent failure of military personnel to fully appreciate the dangers of the disease.
Fortunately, lessons were learned well. During the coming operations in Italy, anti-malarial medication, medical discipline, preventive measures, and education were all greatly improved and the incidence of malaria dropped dramatically.
What lessons can apply for Canada’s military today? First, we still live in the shadow of infectious disease. Particularly in the military, any laxness in terms of preventive medicine, hygiene, sanitation, vaccination, or education can result in major infectious disease outbreaks. Even if mass deaths from epidemics are a thing of the past, a force losing half its soldiers (even temporarily) to preventable disease faces catastrophe. Force health protection must always remain a priority.
But beyond the military, disease prevention remains a major public health issue. A recent report found that a quarter of a million Canadians going into hospital each year contract an infectious disease they did not already have, and between 8,000 and 12,000 die of those infections annually.
Diseases caught “in-care” are among the leading causes of death in this country. The context has changed, but as the Second World War has taught us, public health and attention to hygiene, sanitation, and prophylaxis in order to prevent widespread disease rather than treat cases as they emerge pays enormous dividends; and the absence of these measures can have dire consequences.
Robert Engen teaches history at Queen’s University, and is the 2013 Margaret Angus Research Fellow at the Museum of Health Care at Kingston. On Oct. 10 he will be giving a free public talk through the museum on public health and the military. Please visit the museum’s website for more information: www.museumofhealthcare.ca | <urn:uuid:3ffa9eb2-ae9c-4180-8deb-78949727d39c> | CC-MAIN-2014-10 | http://www.thewhig.com/2013/09/16/conquering-the-deadliest-enemy | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654396/warc/CC-MAIN-20140305060734-00009-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.972333 | 1,614 | 3.296875 | 3 |
The people of West Michigan have a deep love for the Great Lakes, the surrounding watershed and the other natural resources that make Michigan a distinctly beautiful place to live.
We feel a responsibility to protect these precious and globally significant resources. That’s one reason the Kent County Department of Public Works and local stakeholders are determined to find a better way to handle our trash. Collectively, they’ve drawn a line in the sand – in this case, along the border of the Kent County landfill – and said it’s no longer acceptable to simply dig a hole in the ground and bury our trash.
They’ve decided we can do better, and they have a plan. If the plan comes to fruition, it could become a global model for how to effectively and sustainably transform solid municipal waste around the world.
Each year, Kent County residents and businesses discard about 2.1 million cubic yards of trash – that’s enough trash to fill the Van Andel Arena eight times over.
The Kent County DPW estimates that about 75% of that trash could be reused, recycled or converted. And they know it has value.
In fact, a 2016 municipal solid waste (MSW) report by the West Michigan Sustainable Business Forum pegs the dollar value of the landfilled waste in Kent County in the tens of millions. And, while the value of recyclable plastics and papers has dropped significantly in recent years, the importance of recycling has only increased as consumers produce more MSW each year.
Interior shot of Van Andel Arena during a Griffins Hockey game.
Photo Credit: Grand Rapids Griffins
Last month, in a story about ways the plastics industry is working to become more sustainable, we talked about some of the innovations that Kent County DPW’s Reimagine Trash vision was driving. Among the most aggressive county-led sustainability efforts in the nation, Reimagine Trash aims to reduce the area’s landfill waste by 20% by 2020 and 90% by 2030.
“If we could do a better job recycling and reducing how much waste we landfill, we could keep thousands of tons of waste from hitting our natural environment each year,” said Kristen Wieland, Communication & Marketing Manager at the Kent County Department of Public Works. “We could also generate millions of dollars to invest in our communities.”
The time to develop local solutions is here.
A circular economy
“We need to move from the make, take and use – or linear – economy to a circular economy where we make it, use it, then find a way to reuse it or change its structure so its valuable to someone else,” explained Wieland. “And it’s important that we develop ways to do that right here in Kent County so we’re not dependent upon the fluctuations of the global recyclables market.”
That’s where the plan for the Kent County Sustainable Business Park comes in. For the past several years, Kent County DPW has been working with local stakeholders, gathering data and prioritizing project goals to determine the feasibility of developing a sustainable business park on 250 acres of land adjacent to the county’s current landfill. The open acreage has been earmarked for a new landfill once the current one reaches capacity – estimated to happen in nine years.
Instead, DPW and its partners envision a more sustainable use for the land – a park where businesses would transform trash into products with new uses including materials for manufacturing, fuel sources for clean energy, compost for agricultural applications, or entirely new products. The park would leverage private sector investment to support a regional circular economy and localize the recycling and conversion process. It would also create jobs, preserve open space, expand research opportunities, generate and use renewable energy and reduce landfill waste, protecting water quality and promoting sustainability.
Kent County DPW infographic detailing statistics about their work.
Photo Credit: Kent County Department of Public Works (KCDPW)
The first step is to attract anchor tenants that can sort and begin to process the raw trash. That includes a mixed waste processor that would take the MSW directly from the residential waste collection trucks and sort the paper, plastics, metal, food waste and other materials. Once sorted, the materials can move on to other tenants for further processing.
Based on analyses – both of the waste coming into the landfill and the proven technologies available to sort and process it – about 20-25% of the sorted waste would be organic and could be composted, anaerobically digested, or converted to fuel. Another 10-15% could be recycled and 50-60% could be converted into energy through a physical or chemical transformation, either on-site or off-site. These technologies together would help Kent County DPW reach its goal of 90% reduction in landfilled waste by 2030.
If we bury it in a landfill, it won’t fully break down and it will produce gases that are harmful to the environment.
Instead, separating the trash, sanitizing it and utilizing it for something beneficial would bring not only environmental improvements over landfilling it but economic benefits to the entire community. This is precisely why Kent County brought the expertise of The Right Place, Inc. into the fold.
According to Tim Mroz, vice president of strategic initiatives at The Right Place, Inc., this plant would be an anchor, fundamental to the success of the business park. The Right Place is the economic development partner in the Kent County Sustainable Business Park. The organization aims to identify and attract businesses that will be key to the park’s success.
Once the primary sorting facility is locked in, plans to expand to second- and third-tier processors and complementary manufacturers can get underway.
For instance, waste conversion processors could turn construction waste into new ash brick, residual organic waste into compost and fertilizers, discarded plastic into plastic flake used to manufacture new clothes and bottles, or wood scraps into wood pellets used to make new pallets and particle board.
“The ultimate goal will be to have a business park where a variety of innovative boutique-type companies process or reuse various components of the sorted waste,” explains Mroz. “This might include construction and demolition waste partnerships that would take concrete, wood, drywall, glass or metal waste and reclaim things like gypsum for new drywall or wood fuel pellets for heating.”
The technology already exists for much of this reclamation and processing, but the innovation comes in bringing the various components together in a single park.
“The feedstock for the whole thing will be the trucks coming into the landfill entrance, one-quarter mile north of the business park,” says Mroz. “Instead of dumping their trash in a hole in the ground, they’ll feed the sorting company and the anaerobic digestion plant. Those plants, in turn, feed the companies that create compost or plastic flake or wood pellets, which in turn feed the companies that make clothing and fuel and materials for manufacturing and construction.”
Environmental + economic benefits
Mroz and his colleagues at The Right Place think the park makes sense for several reasons.
“Number 1 – the environment,” says Mroz. “We’re a region surrounded by lakes and in the heart of the Great Lakes watershed. It doesn’t make sense to continue to pile up our garbage for future generations. Second, economic growth. There is tremendous business opportunity in sustainable manufacturing and for communities looking for new uses for municipal waste streams. And finally, if this works, it will put us on the map of sustainable regions.”
Kent Count DPW agrees and envisions everyone from university researchers, green retailers and artists-in-residence setting up shop to take advantage of the data collection, business start-up and reclamation opportunities.
While the entire project is still in the “proof of concept” phase, it’s received initial support from the Kent County Department of Public Works Board.
“In October 2018, the board gave us three years to complete the proof of concept. That means we’ll need to bring companies and the public to the table to determine if this will work,” explains Wieland. “If at the end of the three years, we can’t prove the concept, we’ll need to begin permitting for the landfill because that process will take several years.”
So far, stakeholders have generated interest from about two dozen potential tenants and are vetting their capabilities. As they do, they are listening closely to the needs of the community and remain optimistic about their ultimate success. After all, there’s a lot at stake.
“We can no longer perpetuate the act of burying millions of cubic yards of trash. Our children and our region deserve something better,” contends Kent County DPW Director, Darwin Baas. “We’ve matured as a community. We have the resourcefulness to lead this change across the country. Our hope is to transform what was destined to be landfill into a community resource that will help West Michigan become a leader in reclaiming, recycling, repurposing, reducing and reimagining waste.”
“A Grand Investment” is an ongoing series exploring the business landscape of Grand Rapids. Michigan’s fastest growing metro area and one of the nation’s strongest economies, Grand Rapids is fueled by a creative, collaborative spirit that generates global, national and entrepreneurial investment. This series highlights leading sectors of the local economy and underscores the city’s suitability for innovation-focused meetings. | <urn:uuid:4dfffad2-4c94-415e-87de-397a0802567a> | CC-MAIN-2021-17 | https://www.experiencegr.com/meetings-blog/post/reimagining-trash/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038118762.49/warc/CC-MAIN-20210417071833-20210417101833-00443.warc.gz | en | 0.926136 | 1,995 | 2.984375 | 3 |
By Dr. S. Narapalasingam
The ‘Lions and Tigers’ here are not the four-legged animals that live in forests away from human habitats but the two groups of natives in the war-torn island, who opted to embrace the lion and the tiger as their distinct emblems after the British colony, Ceylon (Sri Lanka since 1972), became an independent self-governing State in 1948.The ‘Tigers’ emerged openly as a distinct species after Black July 1983, though there was some indication of their emergence in the 1970s.
In the light of blatant discrimination and intimidation by the ‘Lions’ that made the ‘Tigers’ feel insecure and futureless, the latter started the violent campaign to preserve the portion of the island considered to be their territory. On the other hand the ‘Lions’ believe they are insecure unless the have full control over the entire island. To the ‘Lions’ nothing else only numerology, the power of numbers, counts. They make up nearly three quarters of the total inhabitants including some liberal Sinhalese. Hence, the justification for insisting on controlling the entire island under centralized majority rule. The diverse demographic features across the island are unimportant.
Their respective flags, one with the whole lion taking the major portion with narrow margins on one end representing the marginal status of the minorities in national politics, while the other with the fierce face of about to attack tiger depict the nature of the conflict that deprived many citizens as well as the entire island the benefits of uninterrupted development, which many less developed countries gained swiftly after independence under sensible leaders committed to national unity and peace.
The narrative of the ‘Lions’ and the ‘Tigers’ below depicts the opportunistic ways the power seekers used the electorate for achieving their narrow aims which promoted ethnic division and disharmony. They were not at all interested in building a robust democratic socialist nation in which all the diverse ethnic groups feel safe and confident about their future. If this had happened, Sri Lankans today would be leading a far better life. Instead, they made security the prime concern of the ‘Lions’. Even now this concern is sustained for political reason. The true fact is the security of all communities and the State depends crucially on their confidence in the system of government that must be inclusive and unbiased. Such an equitable system will help to ensure the ground conditions remain conducive for all to live in concord without encroaching on others rights, liberties and property.
Use of emotional symbols in politics and the consequences
Dr. A.R.M. Imtiyaz, Adjunct Professor of Political Science, Temple University, USA in a comprehensive analysis of electoral politics in independent Ceylon/Sri Lanka has discussed the importance given to emotional symbols such as ancient Sinhala monarchs and Buddhist heroes by the main political parties competing for power. “Almost all elections in Sri Lanka, between 1948 (parliamentary election) and 2010 (both Presidential and general election), have made use of religio-ethnic symbols”. These are irrelevant in the modern world and increasingly damaging to the solidarity of the pluralistic nation. When the developed countries and developing countries committed to steadfast social and economic development have discarded their real dissonant history, even mythological events are politically useful symbols for the ‘Lions’ in Sri Lanka.
Not surprisingly, the way these symbols were used continuously in politics promoted separate communal identities instead of the common national identity. The common interests, the ethnic communities had before independence also disappeared afterwards because of this symbolism. Patriotism became synonymous with Sinhala nationalism, advocated by the self-seeking Sinhala elite, aspiring for power or wanting to consolidate further their influential positions in their society. In response, Tamil nationalism grew as a patriotic fervour fuelled by the policies and actions of the State dominated by the Sinhala majority that blatantly discriminated against the ethnic minorities for immediate political advantage. These as intended pleased the Sinhala electorate. Certainly, there were many disadvantaged people among the Sinhalese compared with the average persons in the minority communities. There were acceptable ways of improving the living standard of the poor Sinhalese but the power seeking political elite chose to remove the rights and privileges of the non-Sinhalese. Thus the case for two separate nation-states was established by the ruthless Sinhala Lions.
To quote Dr. Imtiyaz: “This study argues that symbols are powerful, and they often motivate voters against the ethnic others when they are being politicized. In electoral politics, as argued above, symbols of groups become critically important due to its appeal to the nature of electoral politics, which requires votes for its survival. Political choices of masses not always associated with rational choices, and symbols often influence their choices. In Sri Lanka, elections are heavily symbolized. Sri Lanka’s experiences prove that the symbols win votes and thus politicians continuously use them to win and consolidate power.
But what is equally true is that the use of symbols or politicization of symbols of a particular group gradually increases the sense of insecurity among the ethnic others who became clear victim of politicization of symbols. In Sri Lanka, the Tamils, who became a clear victim of politicization of symbols that paved the way for the introduction of the deadly anti-Tamil policies such as the Sinhala-only language and ethnic education standardization as well as state supported anti-Tamil ethnic pogroms, feel that they were being marginalized by the Sinhala politicians to please the Sinhalese, and they will not win justice from the Sinhala polity.
Conversely, the Sinhala symbolism and nationalism pressed the Tamils to adopt their own form of symbolism as a defensive strategy to counter the threats of the Sinhala symbolism. Moreover, the Tamils’ distrust in the fair deliver of state and its institutions persuaded some to embrace violence to exercise their self-determination to build the separate state in the corner of the North and Eastern.
Sri Lanka’s experiences also prove that the use of symbolism for electoral politics in deeply divided societies would hurt the progress of the country. The island of Sri Lanka could have emerged as a model for successful democracy and economic growth, if there had been ethnic harmony and unity among the masses. But such progressive end was not gained mainly due to Sinhala elites’ misuse of primordial symbols for electoral gains”. [The full article, “Deadly Symbols, Vibrant Electoral Politics and War Crimes in Sri Lanka” was posted by TransCurrents on July 28, 2010. It appeared in the IUP Journal of International Relations, Vol IV, No. 3, July 2010. http://www.iupindia.in/International_Relations.asp]
The military victory last year that annihilated the ‘Tigers’ is now the new symbol of power of the majoritarians (‘Lions’). It helped immensely to win this year’s Presidential and Parliamentary elections. The current plan to celebrate annually May 19 as a victory day reflects the intent to hold on to this new symbol, hoping it will be useful for gaining the votes of the ‘Lions’ in future elections. This has also been of immense use in diverting the attention of many ‘Lions’ from pressing economic issues. But as expected by realists, recent developments indicate the emergence of discontent.
Buddhism and contradictory political culture
There is no doubt Buddhism another useful symbol in electoral politics has played a key role in the contest for political power within the Sinhala polity. The rival political parties have exhibited their commitments to Buddhism pretending there are threats to the Buddhist Sasana and there is the need to safeguard the interests of the Sinhala-Buddhists. The ‘Lions’ believe they are “the Buddha’s chosen people, and view the island of Sri Lanka as the Buddhist Promised land”. According to Dr. Imtiyaz, “Buddhism will continue to play a determined role in Sri Lanka’s polity, and that Sinhala political elites, regardless of their attachments to various ideologies, will employ Buddhism to win public office and to outbid their opponents in elections”. Buddhism which served as a useful symbol has no bearing on the nation’s political culture that is immoral and divisive.
What Kumsyoh has said on ‘Low intensity evil in Sri Lanka’ (Groundviews 31 July 2010) is very relevant here. “The logic to make someone or a group dominant at the cost of others is evil. Those who want to dominate make their viewpoints the most dominating viewpoints in public life. They make their viewpoint permeate every facet of society; it is beamed through different lenses and repeated intentionally so that it would influence the totality of the way people think”. The concluding paragraph highlights the dire consequences of negative politics. To quote: “The problem with low intensity evil is that it cannot be always managed. With sustained dissent or the convergence of suppressed anger and we can experience violent repercussions, leaving us to wonder what went wrong. Sri Lanka has been down this path before. Should we travel on it again?” Sadly there are no signs of a mutually acceptable arrangement for the ‘Lions’ and the ‘Tigers’ to shun their separate identities and live in concord in the present as during the time they were pleased to be known as Ceylonese. They did not have then any make-believe enemies within the island.
The creation and subsequent exploitation of the Tamil problem for narrow political gains illustrate this stratagem. The influence of the ‘Lions’ on the Sinhala-Buddhists, the mainstream voting public would not have been strong if not for the punishing treatment given to the ethnic Tamils. Now that the terrorizing lot is gone, the ‘Lions’ seem to be anxious to have at least a proxy to justify the continuation of the role of the protector of the ‘Lions’ terrain. The usefulness of having a hidden enemy within the blessed island is multifaceted.
The continued presence of the armed forces in the Tamil majority Northern and Eastern provinces, where military cantonments and quarters for the families of army personnel posted there can be justified. This is perceived by many Tamils there as another opportunistic move by the ‘Lions’ to colonize the former ‘Tiger’ land. The residents who have suffered under the control of the armed ‘Tigers’, now are under the control of uniformed men with guns from the traditional land of the ‘Lions’. Many do not feel liberated from the fear of sudden attack and displacement experienced since the time the ‘liberation’ struggle intensified into a full-scale war.
Apparently, there is a political need for the government to claim that the ground situation is not normal yet to remove fully the various restrictions imposed during the war. Emergency rule continues still, more than a year after the war ended. Also the emphasis on security helps to distract the people from annoying day-to-day problems, which have multiplied with the collapse of good governance, rule of law, independent judiciary, poverty alleviation, forward planning and not least the widely relied APRC process. It is unclear whether the development of the war-torn North-East is according to a comprehensive plan prepared in consultation with the local leaders.
The absence of coherence and practicality in decision-making is patent from the impulsive decisions such as the substantial salary increase promised to public servants, the award of 20% bonus on the interests paid to the savings of senior citizens deposited in commercial banks and to pay the monthly pensions of Sri Lankan government pensioners residing abroad in foreign currencies. Those who opted to receive their pensions in Dollars or Pounds are free to spend them at any time they want but other expatriates who get paid in Sri Lankan Rupees that too only into specified savings account must revisit Colombo to withdraw their pensions! Now the authorities are finding it difficult to implement the earlier decisions because of the shortage of funds. Any further discussion on this subject is outside the scope of this paper.
Buddhist principles did not influence the way of life of the majority of Sri Lankans, particularly the governance. The teachings of the Buddha, emphasize that falsehood, deception, pride, arrogance, intolerance, inconsideration, violence etc. are negative qualities. Both the ‘Lions’ and the ‘Tigers’ have competitively contributed to the evolution of the violent culture that continues to destroy life with impunity even after the much acclaimed dawn of peace with the elimination of the ruthless ‘Tigers’. Ironically, the ‘Lions’ and the ‘Tigers’ have each contributed unwittingly to the ruthlessness of the other. The ‘Lions’ defeated the ‘Tigers’ using some brutal methods during the final months of the war similar to those used by the ‘Tigers’ for decades. Given the nature of the conflict between the ‘Lions’ and the ‘Tigers’, will there be any use in investigating the alleged war crimes? Human rights, UN Covenant on Civil and Political Rights and international humanitarian law seem to be irrelevant in the ferocious ‘war’ between the two Sri Lankan groups, the ‘Lions’ and the ‘Tigers’. This contentious issue has to be seen in the context of ‘lost senses’ alleged to have prevailed since Black July 1983.
‘Lost senses’ since Black July 1983
Basil Fernando, a Director of ‘The Asian Human Rights Commission’ (AHRC) a regional non-governmental organisation monitoring and lobbying human rights issues in Asia based in Hong Kong in his article on Black July 1983 interpreted the gruesome event and subsequent ones, paradoxically in the name of peace that caused destruction and extensive suffering in the context of lost human senses.
“When acts of violence become so common and there is nothing much to talk about, it simply means life itself has reduced to something that there is nothing much to talk about. That is how I saw July 1983 events. Things in Sri Lanka is reduced to a point where there was nothing much to talk about. People talk about things in order to make some sense out of it and if possible to remove the nonsense that is involved in some events and to bring back society into some sense. To bring the lost senses back to what may be called a normal human sense and then to make some change, something creative, something meaningful out of suffering”
All what happened after Black July1983 are considered as just incidents reflecting more of the lost senses. “Then we got divided - The South Vs the North and East. Many of yet another incidents happened every day. Then a victory (refers to the triumphant military victory that mercilessly destroyed the ‘Tigers’) was celebrated. Was the victory not yet another incident? Many wanted to believe it was not. As days goes by it not possible convince ourself that such victories also are yet another incident only. …. I did not see July 1983 as an ethnic event. I saw it as a senseless situation. I saw it as a problem of the whole nation I have not seen an end of that situation but only a continuation.” (Sri Lanka Guardian 26 July 2010)
Although the optimists will not agree fully with the above comments, these give some idea of the complex nature of the national problem and the approach needed to resolve it once and for all. Joint actions are needed on several fronts, which entail the vital attitudinal change and trust between the divided ethnic and religious groups. The sensible Tamils have urged the different political groups in the North-East to abandon parochialism and unite at this critical time when the future of the community is increasingly uncertain.
Lionel Bopage, a former JVP leader in his recent speech on ‘Peace and Reconciliation in Sri Lanka’ delivered in Melbourne, Australia said: “The current political conflict cannot be oversimplified to a simple linear equation between development and peace”, which seems to be the case going by the government’s statements and actions. He has emphatically said that “the way forward for peace and reconciliation lies in exploring the potential for rebuilding inclusive relationships among the diversity of people through the existing and available dialogue and interaction mechanisms within communities both local and diasporic”.
Since a principled or rights based approach to resolve the issues of Tamil people cannot be expected to materialize from the ruling elite, he has suggested all movements committed to human rights, democratic rights, civil liberty, social justice and social inclusion to join in a non-violent campaign to get rid of the repressive political culture. The need for them “to exert pressure on the state to negotiate towards a meaningful and just power-sharing arrangement” has also been stressed. The political elite will not voluntarily change their attitude but will continue to exploit the social and political divisions for their benefit. They will also keep the present system exploitable. (The entire speech posted by groundviews on July 25, 2010)
Another prominent Sri Lankan residing in Australia, Brian Senewiratne has also explained lucidly ‘why national reconciliation is not possible in Sri Lana’ (30 July Sri Lanka Guardian). He has said for national reconciliation to occur the following fundamental requirements must be met.
“1. There must be a genuine intention to do so.
2. There must be regret for all that has happened to make national reconciliation necessary.
3. The fundamental problems that caused the rift must be addressed.
4. There must be a determination to wipe out all the obstructions to this process.
Since none of these are present in Sri Lanka, national reconciliation is not possible”.
He thinks the ‘Lions’ feel they are now in a good position to achieve their aim of formalising Sri Lanka as a Sinhala-Buddhist country. “The major obstruction (to national reconciliation) indeed the most virulent ones are the politically active Buddhist clergy and Sinhalese ethnoreligious chauvinists. There has been no action to control these disruptive elements that are now more vocal and virulent than they have ever been. If the Buddhist clergy are told clearly and unequivocally that their place is in Buddhist temples and not on the streets stirring up Sinhala supremacy and demanding the establishment of a Sinhala Buddhist country, then there might be some optimism of a national reconciliation. There has been no such move and these bigots are doing what they have done since Independence in 1948, destroying any possibility of a united country”. Although, there are Sinhala moderates and few politicians from the ethnic minorities in the government, it is the staunch Sinhala Buddhist nationalists who are influential.
My own view is they are not against unity but they want this on their terms that entail the acceptance by all the supremacy of Sinhala Buddhists and their right to govern the entire island which they consider to be exclusively their native land. Because of the influential status they have acquired after independence for reasons stated earlier in this paper, Brian Senewiratne thinks no government “will have the courage to confront these dreadful people who are not only doing irreparable damage to the country and its future, but bringing disrepute to one of the greatest teachers of peace and nonviolence the world has ever known, Gautama Buddha”.
The ultimate aim of the government leadership given the present ad hoc initiatives on the political front that are unrelated to the widely desired needs of the humble people is puzzling. No discerning person has said it focuses on rectifying the past blunders and building a unified nation respecting pluralism and equality, human and, political rights and democratic freedoms of all citizens. The system must also ensure equal justice for all regardless of their locality and status in the society. The civil society can no longer allow the political elite to decide the system of government needed for the welfare of the country and all the diverse groups in the Sri Lankan society. The two Republican Constitutions failed to protect equal rights and the justifiable interests of all recognised segments of the mixed society because of the exclusion of independent experts.
As before, the present political elite too are overly concerned about the near term in their approach to constitutional reform. The contemplated reforms too are perceived from their own political needs. It seems their confidence in effecting these changes within the present structure is high because of the military victory and the impression created that they have the power and the means to protect the Sinhala nation from any future revolt. Even the apparent move towards authoritarian rule may be perceived by some as necessary to avert another ‘Tiger’ menace. Sri Lankan Prime Minister told Parliament on August 3, the government troops have arrested more than 1500 Tiger suspects last month, nearly 14 months after the heavily armed group was crushed militarily. The usefulness of the ‘Tigers’ at the present time is also in other critical areas.
The ‘Tiger’ leadership or more aptly the leader also believed in the effectiveness of his high-handed methods in the pursuit of absolute power ignoring completely international opinion. The Tamil community paid the terrible price for his unrealistic conviction in absolutism and confidence in the brutal methods used to achieve his political aim. Now it is for the Sinhalese to think seriously whether they should be led along similar risky path, ignoring the present national and international realities.
[The writer is Former Additional Deputy Secretary to the Treasury, Sri Lanka and UN Advisor, Development Economics/Planning] | <urn:uuid:a6e22ac4-c3c1-474b-bcd7-2fe7262038d2> | CC-MAIN-2018-17 | http://www.vivalanka.com/news/page.jsp?articleid=95353 | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944848.33/warc/CC-MAIN-20180420233255-20180421013255-00219.warc.gz | en | 0.961841 | 4,496 | 3 | 3 |
Ebenezer Erskine (22 June 1680 – 2 June 1754) was a Scottish minister whose actions led to the establishment of the Secession Church (formed by dissenters from the Church of Scotland).
|Born||22 June 1680|
|Died||2 June 1754(aged 73)|
|Education||University of Edinburgh|
|Tradition or movement||(1) Church of Scotland|
(2) Associate Presbytery/ Secession Church
(3) Burgher Seceder
Ebenezer's father, Henry Erskine, served as minister at Cornhill-on-Tweed, Northumberland, but was ejected in 1662 under the Act of Uniformity and imprisoned for several years. Ebenezer and his brother Ralph were both born during this difficult period in their father's life. After the Glorious Revolution of 1688 Henry was appointed to the parish of Chirnside, Berwickshire.
In 1703, after studying at the University of Edinburgh, Ebenezer was ordained as minister of Portmoak, on the edges of Loch Leven in Kinross-shire. A year later, he married Alison Turpie. They remained in Portmoak for 28 years, until, in the autumn of 1731, he moved to the West Church in Stirling.
At the General Assembly of 1722, a group of men including Ebenezer had been rebuked and admonished for defending the doctrines contained in the book The Marrow of Modern Divinity. In 1733, a sermon he preached on lay patronage at the Synod of Perth led to new accusations being levelled against him. He was compelled to defend himself from rebuke by appealing to the General Assembly, but the Assembly supported his accusers. After fruitless attempts to obtain a hearing, he, along with William Wilson of Perth, Alexander Moncrieff of Abernethy and James Fisher of Kinclaven, was suspended from the ministry by the Commission of Assembly in November of that year.
In protest against this sentence, the suspended ministers constituted themselves as a separate church court, under the name the "Associate Presbytery". In 1739 they were summoned to appear before the General Assembly, but did not attend because they did not acknowledge its authority. They were deposed by the Church of Scotland the following year.
In the following years a large number of people joined their communion. The Associate Presbytery remained united until 1747, when a division took place over how the church should respond to a new oath required of all burgesses. Erskine joined with the "burgher" section, becoming their professor of theology. He continued to preach to a large and influential congregation in Stirling until his death. He was a very popular preacher and a man of considerable force of character. He was noted for acting on principle with honesty and courage. In 1820 the burgher and anti-burgher sections of the Secession Church were reunited, followed, in 1847 by their union with the relief synod as the United Presbyterian Church of Scotland.
The majority of Erskine's published works are sermons. His Life and Diary (edited by the Rev. Donald Fraser) was published in 1840. His Works were published in 1785.
In the United States, part of the Associate Presbyterian Church united with most of the Reformed Presbyterian Church in 1782, forming the Associate Reformed Presbyterian Church. This denomination, which continues today, operates Erskine College and Seminary in Due West, South Carolina.
His teachings are also popular in the Dutch Reformed Church.
His son-in-law Rev Robert Fisher (died 1775), married to his daughter Jean, was a minister in Glasgow.
Erskine was a Free Gardener. He was Initiated in the Dunfermline Lodge of Free Gardeners in 1722 the same year as his patron, John Leslie, 8th Earl of Rothes.
It is worthy of note that after he became a Free Gardener his sermons began to include numerous horticultural allusions.
- ^ Fraser 1831.
- ^ Chisholm 1911, p. 754.
- ^ Thomson & Struthers 1858, p. 538.
- ^ Chisholm 1911, pp. 754–755.
- ^ a b c Chisholm 1911, p. 755.
- ^ Cooper 2005.
- Blaikie, William Garden (1889). "Fisher, James". In Stephen, Leslie (ed.). Dictionary of National Biography. Vol. 19. London: Smith, Elder & Co.
- Carlyle, Edward Irving (1900). "Wilson, William (1690-1741)". In Lee, Sidney (ed.). Dictionary of National Biography. Vol. 62. London: Smith, Elder & Co.
- Chisholm, Hugh, ed. (1911). Encyclopædia Britannica. Vol. 9 (11th ed.). Cambridge University Press. pp. 754–755. This article incorporates text from this source, which is in the public domain. .
- Cooper, Robert (2005). Freemasons, Templars & Gardeners. Melbourne Belmont, Victoria: Australian & New Zealand Masonic Research Council, Rowick Printers. pp. 44–45. ISBN 0-9578256-2-5. OCLC 879603408.
- Fraser, Donald (1831). The life and diary of the Reverend Ebenezer Erskine, A.M. : of Stirling, father of the secession church, to which is prefixed a memoir of his father, the Rev. Henry Erskine, of Chirnside. Edinburgh: W. Oliphant. Retrieved 13 February 2019.
- Gordon, Alexander (1889). "Erskine, Ebenezer". In Stephen, Leslie (ed.). Dictionary of National Biography. Vol. 17. London: Smith, Elder & Co. This article incorporates text from this source, which is in the public domain.
- Gordon, Alexander (1889). "Erskine, Ralph". In Stephen, Leslie (ed.). Dictionary of National Biography. Vol. 17. London: Smith, Elder & Co.
- Harper, James; Eadie, John; Lindsay, William (1849). Lives of Ebenezer Erskine, William Wilson, and Thomas Gillespie, Fathers of the United Presbyterian Church. Edinburgh: A. Fullarton & Co.
- Johnstone, Thomas Boston (1894). "Moncrieff, Alexander". In Lee, Sidney (ed.). Dictionary of National Biography. Vol. 38. London: Smith, Elder & Co.
- MacEwen, A.R. (1900). The Erskines (Ebenezer and Ralph Erskine). Edinburgh: Oliphant, Anderson and Ferrier.
- McCrie, C. G. (1893). The Free Church of Scotland : her ancestry, her claims, and her conflicts. Edinburgh: T. & T. Clark. pp. 59-60. Retrieved 29 June 2020.
- McKerrow, John (1839a). History of the Secession Church. Vol. 1. Edinburgh: William Oliphant and Son. Retrieved 12 July 2020.
- McKerrow, John (1839b). History of the Secession Church. Vol. 2. Edinburgh: William Oliphant and Son. Retrieved 12 July 2020.
- Scott, Hew (1923). Fasti ecclesiae scoticanae; the succession of ministers in the Church of Scotland from the reformation. Vol. 4. Edinburgh: Oliver and Boyd. pp. 328-329. Retrieved 8 July 2019. This article incorporates text from this source, which is in the public domain.
- Small, Robert (1904a). History of the congregations of the United Presbyterian Church, from 1733 to 1900. Vol. 1. Edinburgh: David M. Small. Retrieved 12 July 2020.
- Small, Robert (1904b). History of the congregations of the United Presbyterian Church, from 1733 to 1900. Vol. 2. Edinburgh: David M. Small. Retrieved 12 July 2020.
- Thomson, Andrew; Struthers, Gavin (1858). Historical sketch of the origin of the Secession Church and the History of the rise of the Relief Church. Edinburgh and London: A. Fullerton and Co. Retrieved 12 July 2020.
- Young, David; Brown, John (1849). Memorials of Alexander Moncrieff, M.A., and James Fisher, fathers of the United Presbyterian Church. Edinburgh: A. Fullarton. | <urn:uuid:98ec6aa7-39f8-4c49-a951-5c5f0358f316> | CC-MAIN-2023-14 | https://en.m.wikipedia.org/wiki/Ebenezer_Erskine | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945182.12/warc/CC-MAIN-20230323163125-20230323193125-00587.warc.gz | en | 0.924201 | 1,917 | 3.078125 | 3 |
This article and other similar articles can be found in Traumatic Incident Reduction: Research & Results (2nd Edition) available from our bookstore at www.TIRbook.com
The views and opinions expressed in these articles and interviews are those of the individuals speaking, and do not necessarily represent those of Applied Metapsychology International.
In recent years, significant media attention given to the Post-Traumatic Stress Disorders (PTSD) of Vietnam veterans, whose post-war “nervous” problems (i.e., sleep disturbances, hyper-vigilance, paranoia, panic attacks explosive rages, and intrusive thoughts) were known to veterans of earlier campaigns as “battle fatigue,” “shell shock,” and “war neurosis” (Kelly, 1985). As any number of mugging, rape, and accident victims have demonstrated, however, one need not have been a casualty of war to experience the problem (APA, 1987). PTSD appears in children as well as adults (Eth & Pynoos, 1985) and has been attributed to abuse, abortions, burns, broken bones, surgery, rape, overwhelming loss, animal attacks, drug overdoses, near drownings, bullying, intimidation, and similar traumata. It manifests as a wide range of anxieties, insecurities, phobias, panic disorders, anger and rage reactions, guilt complexes, mood and personality anomalies, depressive reactions, self-esteem problems, somatic complaints, and compulsions.
The PTSD reaction is most easily distinguished from emotional problems of other sorts by its signature flashback: the involuntary and often agonizing recall of a past traumatic incident. It can be triggered by an almost limitless variety of present cognitive and perceptual cues (Kilpatrick, 1985; Foa, 1989). Lodged like a startle response beyond conscious control, the reaction frequently catapults its victims into a painful acting out of an earlier trauma and routinely either distorts or eclipses their perception of present reality. Although we can’t confirm that any of the countless animal species with which researchers have replicated Pavlov’s (1927) conditioned response ever actually flashed back to their acquisition experiences, the mechanism of classical conditioning is apparent in every case of PTSD. As salivation is to Pavlov’s dog, so PTSD is to its victims.
Like emotional problems of other sorts, however, PTSD is not accounted for solely in terms of antecedent trauma and classical conditioning. In order to provoke a significant stress reaction, as Ellis (1962) and others observe, an experience must ordinarily stimulate certain components of an individual’s pre-existing irrational beliefs. Veronen and Kilpatrick (1983) confirm that the rule holds for trauma as well as for more routine experience. Errant beliefs – related to the tolerance of discomfort and distress; performance, approval, and self-worth; and how others should behave:
“…may be activated by traumatic events and lead to greater likelihood of developing and maintaining PTSD symptomatology and other emotional reactions. Individuals who pre-morbidly [before illness] hold such beliefs in a dogmatic and rigid fashion are at greater risk of developing PTSD and experiencing more difficulty coping with the resulting PTSD symptomatology.” (Warren & Zgourides, 1991, p. 151)”.
Also activated and often shattered by trauma are assumptions regarding personal invulnerability; a world that is meaningful, comprehensible, predictable and just; and the trustworthiness of others (Janoff-Bulman, 1985; Roth & Newman, 1991). Such pre-existing beliefs and assumptions, plus the various conclusions, decisions and attitudes specific to a particular traumatic incident (especially when held as imperatives) constitute the operant cognitive components of PTSD.
Primary and Secondary Trauma
What makes PTSD a particularly persistent and pernicious variety of disturbance is the occurrence, at the time of its acquisition trauma, of significant physical and/or emotional pain. Such pain, in association with the other perceptual stimuli, thoughts, and feelings one experiences at the time, constitutes the “primary” traumatic incident. The composite memory of the primary incident, therefore, contains not only the dominant audio/visual impressions of that moment, but also one’s mind-set (motives, purposes, intentions) and visceral (emotional and somatic) reactions. Thus, whenever one subsequently encounters a “restimulator” or “reactivator” – any present sensory, perceptual, cognitive, or emotive stimulus similar to one of those contained in the memory of an earlier trauma – one is likely to be consciously or unconsciously “reminded” of and, therefore, to re-activate its associated pain or upset. It is this subsequent painful and involuntary reminder, of the primary trauma, that constitutes the painful secondary experience we recognize as PTSD (Foa, 1989).
In the Pavlovian model, the occurrence of the reactivator (trigger stimulus) equates to the ringing of the bell; the stress reaction itself equates to salivation. The mechanism is almost indefinitely extendible by association. Once the dog has been conditioned to salivate to the ringing of the bell, for example, the bell may be paired with a new perceptual stimulus, say, the flashing of a light, so that the dog will then salivate to the light as well as to the bell. If one next flashes the light and pulls the dog’s tail, the dog will learn to salivate when his tail is pulled (Hilgard, 1962). By sequencing stimuli so as to create a “conditioned response chain” in this manner, we expand the domain of stimuli that will elicit the salivation response.
This process may be illustrated by the following common example: A veteran originally injured in an artillery attack (the primary trauma) will often tend to be reactivated, even years later, by such things as smoke and loud noises. So it’s no surprise when he panics, post-war, in response to fireworks. However, should he happen to be triggered into a full-blown panic reaction by a fireworks display while eating fried chicken one day at a picnic in the park, he is likely thereafter, as strange as it seems, to get panicky around fried chicken (whether he flashes back to the park at the time or not). In such a circumstance, fried chicken gets added to the domain of toxic secondary restimulators of his war experience, and the “picnic in the park” incident acquires secondary trauma status and is itself subject to later restimulation. If, for instance, fried chicken subsequently gets (or previously had gotten) associated with his mother-in-law (who prepares it for his every visit), his contact with her also becomes subject to PTSD toxicity by association. The dynamic effect of such repeated reactions over a period of time is a gradual increase in the client’s toxic secondary reactions. This, in turn, produces a corresponding reduction of his day-to-day rationality and an inability both to comprehend and to break out of his increasingly volatile reactive pattern (see Hayman et al, 1987).
The more reactions one experiences, the more new toxic secondary stimuli develop. The more new toxic stimuli there are, the more reactions one has, which suggests that those experiencing PTSD would eventually come to spend most of their time with their attention riveted painfully on past trauma. In point of fact, that does happen. The longer and more complex the chains or sequences of secondary incidents become over time, however, the less likely one is to flash all the way back to the primary trauma. This is why so many PTSD clients who appear to succeed in getting their attention off their primary traumata nevertheless withdraw from many of the life activities they previously enjoyed. Because they flash back to “the big one” a lot less, their PTSD cases are presumed to have abated. In reality such clients are in worse shape overall because a lot of little things in their traumatic incident networks (all the secondary triggers or “cues” they picked up in the years following their primary traumata) bother them much more than they did in the past (Gerbode, 1989).
PTSD And the Cognitive Therapies
Gerbode points out that some of the key cognitions contained in the memory of any traumatic incident that later cause trouble when they are reactivated are those specific conclusions, decisions, and intentions the individual generated during the incident itself in order to cope emotionally with the painful urgency of the moment. In such a circumstance, not only would certain pre-existing beliefs govern one’s reaction to a traumatic event, but also the traumatic event itself would give rise to the formulation of new, potential errant cognitions. Viewed in this light, PTSD is very much a cognitive-emotive disorder and not nearly as Pavlovian as it at first appears to be. Accordingly, an effective cognitive-emotive approach is called for in its remediation, one in which the errant cognitions generated under the duress of the trauma are located and corrected.
Most cognitive therapists have traditionally favored challenging a client’s current disturbance-causing belief system over directly confronting the earlier experience(s) responsible for its acquisition (Ellis, 1962, 1989). A therapist’s decision to focus an intervention mainly on a client’s responses to day-to-day stressors is most understandable when the client does not report flashing back at the time of the upsets. Most non-PTSD clients, after all, have no special awareness of their early acquisition experiences and, therefore, have little or nothing to say about them. Their attention is fixed on a steady stream of disturbance-provoking current events for which both we and they realize they do need more rational coping skills. In the clear-cut PTSD case in which flashback is evident, the client not only puts the acquisition experience (the primary trauma) in focus right at the start but also often seems virtually obsessed by it. Flashback content, which is often concurrent with the client’s upset over something in present time, is so painfully “charged” that he or she is either barely able to shift attention from it or else must regularly struggle to resist attending to it (Solomon, 1991). In such a circumstance, the therapist who focuses intervention exclusively on the client’s dramatic over-reactions to current (secondary) events (on the reactivator, rather than on what is being reactivated) bypasses the opportunity to address directly and resolve the core of the client’s PTSD case. Such attention mainly to the present-time “cueing effect,” according to Goodman and Maultsby (1974, p. 62), “explains many failures or partial successes in psychotherapy, despite the best intentions of patient and therapist.”
Given the extreme volatility of the memory of a trauma, though, it’s really no wonder that many therapists and their PTSD clients (tacitly) agree not to confront such incidents head on. To understand why this is so often the case, consider the following:
- It is nearly impossible to get PTSD clients to perceive or appraise objectively a traumatic experience they are in the midst of re-experiencing;
- It is usually difficult, even when they are not in the middle of re-experiencing one, to sell PTSD clients on the idea of re-evaluating a traumatic event that has given them nightmares for the last fifteen or twenty years;
- Cognitive re-structuring, thought stopping, and stimulus blunting techniques give PTSD clients little or no control over their tendency to flash back spontaneously and go into reactivation; and
- Helping PTSD clients minimize the disruptive impact of their intrusive thoughts and teaching them not to down themselves over the persistence of their symptoms is better than nothing.
It becomes understandable, then, that many therapists choose to assist clients in their ongoing struggles to distance themselves from the memories of their traumata in an attempt simply to limit the frequency and intensity of their post-traumatic episodes.
Therapists may actually bring superb therapeutic skills to bear on clients’ over-reactions to a variety of contemporary stimulus-events (e.g., rage over a spill, anxiety at a meeting), but unless they help PTSD clients to resolve the prior trauma (e.g., auto accident, childhood abuse, war experience) that actively supports their current disturbance and to revise the errant cognition associated with that primary experience, they have elected not to address the PTSD at all. The result of such a purely secondary intervention is that clients’ unresolved primary traumas continue intermittently to intrude into consciousness, and clients are left to struggle alone to secure a sense of rationality against the influence of these traumas.
Because a traumatic incident is, by definition, exceedingly unpleasant, there is an understandable tendency, at the moment one is occurring, to resist and protest it as best one can. It is at just such moments of extreme physical and/or emotional pain, according to Gerbode (1989), that one’s thinking (evaluative cognition) is least likely to be well-reasoned and objective and most likely to be irrational and distorted. There is, moreover, a subsequent tendency to suppress and/or repress the memory of such an incident so as not to have to re-experience the painful emotional charge its reactivation brings up. Unfortunately, suppression/repression of the memory of a traumatic incident effectively locks its distorted ideation and painful emotion away together (along with the incident’s sensory and perceptual data) in long-term storage. Thus, the stage for PTSD is set. Fortunately however, when accessed with the specific cognitive imagery procedure of TIR, a primary traumatic incident can be stripped of its emotional charge permitting its embedded cognitive components to be revealed and restructured. With its emotional impact depleted and its irrational ideation revised, the memory of a traumatic incident becomes innocuous and thereafter remains permanently incapable of restimulation and intrusion into present time (Gerbode 1989).
As Manton and Talbot (1990) observe, “traumatic events…can bring into consciousness unresolved [prior] situations (with similar themes) such as incest, child abuse, or the death of an important person in the victim’s life” (p.508). When clients have more than one trauma in their history, the only completely effective procedure is one that traces each symptom of the composite post-traumatic reaction back through sequence(s) of related earlier incidents to each of the contributing primaries. Interestingly, a very similar observation was made by one of our earliest colleagues, (Freud, 1984) who wrote:
What left the symptom behind was not always a single experience. On the contrary, the result was usually brought about by the convergence of several traumas, and often by the repetition of a great number of similar ones. Thus it was necessary to reproduce the whole chain of pathogenic memories in chronologic order, or rather in reversed order, the latest ones first and the earliest ones last (p. 37).
The simple fact is that in order to deal effectively with past trauma, we must guide the client through to its resolution in imagery. The imagery process itself, however, is just the means by which we help PTSD clients get through their residual primary pain. It is by revising the errant cognition associated with that pain that they are freed from the grip of their PTSD.
Traumatic Incident Reduction
The most thorough and reliable approach to the resolution of both long-standing and recent disaster PTSD currently in use is Traumatic Incident Reduction (TIR), a guided cognitive imagery procedure developed by Gerbode (1989). A high-precision refinement of earlier cognitive desensitization procedures, TIR effectively resolves the outstanding trauma of the majority of the PTSD clients with whom it is used when carried out according to its strict guidelines.
TIR appears to be more efficient and more effective than other cognitive-imagery or desensitization procedures, as such procedures frequently focus mainly (and most often incompletely) on secondary episodes. By tracing each traumatic reaction to its original or primary trauma and by taking each primary trauma to its full resolution or procedural “end point” at one sitting (a crucial requirement), the TIR process leaves clients observably relieved, often smiling, and no longer committed to their previously errant cognitions. At that point, the traumatic incidents, their associated irrational ideation, and consequent PTSD have been fully handled, and clients are able to re-engage life comfortably in ways they might not have been able to do since their original traumatization.
Done one-on-one, the core TIR procedure may be completed in as little as twenty minutes or it may require two or three hours (average: 1.5 hrs) of “viewing” per incident. No procedure that is confined to the fifty-minute hour can be considered flexible enough to handle the average primary traumatic incident. The therapist needs to be willing to take the time necessary to guide the client back through the relevant trauma, carefully following TIR procedural guidelines, to permit the client to work through the painful memories of the experience in order to restructure its cognitive content as needed for full resolution.
Ideally, PTSD clients correctly identify their active primary incidents during intake. Clients who have regular flashbacks generally do this with ease. Such clients may be briefed on TIR the same day and, if not on drugs, scheduled for viewing the next day. Their PTSD problems can often be alleviated within the week. It is not unusual for a single Basic TIR session to resolve an “un-occluded” (obvious) primary traumatic incident in as little as two or three hours. Case resolution then would depend mainly on how many primary and secondary traumata needed to be addressed to restore full functioning.
More commonly, however, PTSD clients do not correctly identify all their active primary incidents at intake. A war veteran, for instance, may at first report with conviction that it all dates back to Vietnam; he’s only had the problem since then, and that is the content of his flashbacks. Once he gets into it, however, he is sometimes surprised to discover that his wartime experience was actually secondary to some previously occluded or less easily remembered earlier trauma.
In chronic cases, including some phobias and panic disorders in which flashbacks are absent, clients often have no clue at intake as to where or when their reaction patterns were actually acquired. Although technically not classified as PTSD, many such clients have had a significant number of stressful experiences over the years. Yet they cannot, at first, identify any one incident as having been much more significant than any other. They are often thoroughly frustrated and discouraged, as well as genuinely baffled, about the persistence of their symptoms. Those among them who lead otherwise comfortable lives and seem not to think much less rationally, day-to-day, than the majority of the population frequently come to the usually erroneous conclusion that their problems must be genetic in origin (“run in the family”). Needless to say, such cases are not resolved within the week. They are not generally a problem for TIR, however, as they may be handled to resolution very adequately by the Thematic TIR approach, a variation of the Basic procedure. Thematic TIR does not require clients to be aware of or to identify correctly the relevant historic components of their cases right at the start of their intervention. Instead, the Thematic technique simply traces each manifest (in the present) emotional and somatic symptom (“theme” or feeling) back through its sequence(es) of secondary incidents, one at a time, until the originally occluded primaries come into awareness and can be dealt with routinely.
Toward clients’ understanding of the TIR routine, which assuredly will be new to them, it is often useful to draw upon the illustrative value of the Pavlovian example mentioned earlier and with which they may already be familiar. One may point out, in this connection, that when the dog’s salivation response to the bell (primary stimulus) is extinguished, the light (secondary stimulus) loses its reactivative potential automatically (Hilgard, 1962). Likewise, once a primary incident is completely resolved, none of the stimuli that had later become associated with it as secondary reactivators is capable of triggering any further reaction (Gerbode, 1989). This means that when the veteran fully resolves his “artillery attack” (and any other related primary incidents), he will no longer be vulnerable to reactivation triggered by the various secondarily toxic stimuli associated with that experience. At that point, fried chicken and mother-in-law are back to representing nothing more than fried chicken and mother-in-law.
This may seem like a rather classical Pavlovian explanation, but one of TIR’s main concerns is the ultimate correction of the PTSD client’s trauma-related thought processes. Once clients realize that it was the cumulative effect of their traumatic incident networks on their cognitive-emotive response sets over a period of time that is responsible for the persistence of their PTSD symptoms, and once they understand that there is a way to shut down the networks’ active components permanently, they’ll be happy to use the TIR approach, even if they are already accustomed to another technique. Then, even thoroughly frustrated and discouraged chronic and absent-flashback PTSD clients will begin to feel hopeful.
The lexicon ofTIR reflects its purpose and procedure. The client is called a “viewer” because his/her primary function is to confront, via the viewing process, past trauma. The person conducting the session is called a “facilitator” because his/her purpose is simply to facilitate the viewer’s process of viewing (Gerbode, 1989). Just as “physician” and “patient” become “analyst” and “analysand” based on the requirements of their respective roles, the designations “facilitator” and “viewer” are reserved for those whose interaction is governed by the singular requirements of the TIR process.
TIR, like other cognitive-imagery processes, differs somewhat from most contemporary therapies. Although it holds errant cognition to be at the root cause of emotional disturbance, unlike the mainstream cognitive approaches, TIR carries the revision process back to the specific experience(s) that originally produced and enforced such cognition. In this regard, TIR is a bit more “personal” than most contemporary cognitive therapies. Instead of relying mainly upon the therapist’s insight into or inferences about a client’s probable belief structure, as is common in RET, TIR guides clients in the discovery and revision of their own original disturbance-causing cognitions.
What makes such a procedure both necessary and possible is the fact that, in PTSD, the disturbance-causing cognitions (except for the pre-existing ones) were originally generated in response to, and in order to cope with, a traumatically painful and/or upsetting experience. Moreover, the offending cognitions are still being kept in force by the long-term residual impact of the incident. In other words, if it hadn’t been for the specific circumstance of the trauma, as subjectively experienced by the client, e.g., “Oh my God, I’ve been shot! I’m gonna die!”, the client wouldn’t have formulated the response, e.g., “I should never let my guard down, even for a minute!” Moreover, if the incident hadn’t been so emotionally and/or physically painful, making it extremely difficult for the client to confront, its attendant cognition would be a great deal more accessible to routine reappraisal and restructuring.
So, while it remains very useful to be able to infer with reasonable certainty that an anxious client is generally feeling threatened and ineffectual while an angry client would like to assert control over something (pardon the reductionism), these are just some of the more obvious “common denominator” dynamics associated with their respective current disturbances. What we cannot infer but what TIR reveals to clients who have experienced trauma is exactly what happened (at a subjective/cognitive-emotive level) that so overwhelmed them that they would come away from their experience stuck in an involuntary, out-of-date, and irrational mind-set constructed, among other things, of numerous fairly obvious stress-producing mis-evaluations and distortions.
In a certain respect, TIR adds a new dimension to our understanding of the relationship between cognition and emotion. While theorists have long held that irrational thinking tends to promote upset feelings, TIR suggests that one’s (traumatically) upset feelings also tend to promote irrational thinking. Dodging the “Which came first?” (chicken or egg) question, it is probably safe to say that, on the face of it, the causal equation appears to be reversible. That is, not only does cognition significantly influence emotion, but emotion appears to significantly influence cognition.
Even more critically significant, at least in cases of PTSD, the remedial equation seems to be reversible as well. Whereas cognitive therapists observe that the restructuring of one’s irrational and distorted thinking produces a corresponding reduction of emotional disturbance, TIR confirms Ellis’ (1990) observation that a reduction of primary traumatic emotional disturbance produces a corresponding restructuring of one’s irrational and distorted thinking! In short, the client whose trauma has been fully reduced and resolved and who has become able to talk (and think) freely and painlessly about it (a TIR goal) almost immediately and self-directedly begins to display a substantively rational (moderate, tolerant, objective) viewpoint regarding that previously painful experience. As always, the client who succeeds in embracing a more rational viewpoint about an experience, regardless of how unfortunate or traumatic that experience once seemed, is no longer disturbed over it or unwittingly under its control. As a consequence, secondary restimulation and flashbacks cease, life’s energy and interest revive, and self-esteem rebounds.
What is particularly remarkable about the cognitive restructuring that takes place in TIR is that it takes place so obviously and spontaneously during the course of a given session. Equally remarkable is the fact that it takes place – and truly must take place – without didactic or corrective facilitator input. The facilitator’s role in TIR is mainly to so conduct the session and guide the viewer in “repeated review” of the selected trauma (in strict accord with the established protocol) that the viewer will be able rationally to restructure his own “misconceptions” about it (Raimy, 1975). Bear in mind that at this level of intervention the viewer is truly the only one who can decipher (by patient and careful re-examination of the cognitive images stored in memory) what actually happened or appeared to happen in the incident, what its significance was, what he or she was thinking at the time, why it was so extraordinarily painful, how he or she coped with that pain, and what trauma-related conclusions and/or decisions were made at the time. So, as the viewer reviews this highly sensitive and very painful material repeatedly in imagery in order to discharge the emotional impact holding the cognitive distortions in place, the facilitator says not a word.
Although in TIR’s handling of PTSD the operant trauma-related distortions virtually self-correct once the inordinate emotional distress of the traumatic experience is relieved, viewers frequently want to follow a completed TIR session with some discussion or review of some of the ways in which certain of their newly-surrendered trauma-related beliefs and attitudes had affected them since the occurrence of their original trauma! Most practitioners find this discussion one of those truly rewarding moments in clinical practice. It is not only confirmation of a successfully completed specific intervention. It is re-confirmation of what contemporary theorists have asserted all along about the relationship between cognition and emotion, with the additional suggestion that that relationship may be even more interesting than we had originally supposed.
A fully resolved traumatic experience is neither completely nor mostly forgotten. It is, by definition, simply benign and incapable of intrusive restimulation.
Back to Top
American Psychiatric Association (1987). Diagnostic and statistical manual of mental disorders (3rd edit.), Revised, APA, Washington, D.C.
Beck, A. T. (1970). Role of fantasies in psychotherapy and psychopathology. The Journal of Nervous and Mental Disease, 150, 3-17.
Beck, A. T. (1976). Cognitive therapy and the emotional disorders. New York: The New American Library, Inc.
Blundell, G. G., and Cade, C. M. (1980). Self-awareness and E.S.R. London: Audio Ltd.
Boudewyns, P. A., Hyer, L., Woods, M. G., Harrison, W. R., and McCranie, E. (1990). PTSD among Vietnam veterans: An early look at treatment outcome using direct therapeutic exposure. Journal of Traumatic Stress, 3, 359-368.
Dansky, B. S., Roth, S., and Kronenberger, W. G. (1990). The trauma constellation identification scale: A measure of the psychological impact of a stressful life event. J. of Traumatic Stress, 3, 557-572.
Dryden, W., and Ellis, A. (1986). Rational-emotive therapy (RET). In W. Dryden and W. Golden (Eds.), Cognitive-behavioral approaches to psychotherapy. London: Harper & Row.
Ellis, A. (1962). Reason and emotion in psychotherapy. New York: Lyle Stuart.
Ellis, A. (1973). Humanistic psychotherapy: The rational-emotive approach. New York: McGraw Hill.
Ellis, A. (1989). The history of cognition in psychotherapy. In A. Freeman, K. M. Simon, L. E. Beutler, and H.
Arkowitz (Eds.), Comprehensive handbook of cognitive therapy (pp. 5-19). New York: Plenum Publishing.
Ellis, A. (1990). The revised ABC’s of rational-emotive therapy (RET). Paper presented at The Evolution of Psychotherapy conference, Anaheim, CA.
Eth, S., and Pynoos, R. S. (Eds.). (1985). Posttraumatic stress disorder in children. Washington, D.C.: American Psychiatric Press.
Fairbank, J. A., and Nicholson, R. A. (1987). Theoretical and empirical issues in the treatment of post-traumatic stress disorder in Vietnam veterans. Journal of Clinical Psychology, 43, 44-55.
Foa, E. B., and Olasov, B. (1989). Treatment of post-traumatic stress disorder. Workshop conducted at Advances in Theory and Treatment of Anxiety Disorders, Philadelphia, PA.
Foa, E. B., Steketee, G., and Rothbaum, B. O. (1989). Behavioral-cognitive conceptualizations of post-traumatic stress disorder. Behavior Therapy, 20, 155-176.
Frederick, C. J. (1986, August) Psychic trauma and terrorism. Paper presented at the annual meeting of the American Psychological Association, Washington, D.C.
Freud, S. (1984). Two short accounts of psychoanalysis. In J. Strachey (Tr.), Five lectures on psychoanalysis (p. 37). Singapore: Penguin Books.
Gerbode, F. A. (1986a). Assistance without evaluation. The Journal of Metapsychology, 1, 7-9.
Gerbode, F. A. (1986b). A safe space. The J. of Metapsychology, 1, 3-6.
Gerbode, F. A. (1989). Beyond psychology: An introduction to metapsychology. Palo Alto, CA: IRM.M
Goodman, D. S. and Maultsby, M. C. (1974). Emotional well-being through rational behavior training. Springfield, IL: Charles C. Thomas.
Grossberg, J. M., and Wilson, H. K. (1968). Physiological changes accompanying the visualization of fearful and neutral situations. Journal of Personality and Social Psychology, 10, 124-133.
Hayman, P. M., Sommers-Flanagan, R., and Parsons, J. P. (1987). Aftermath of violence: Posttraumatic stress disorder among Vietnam veterans. Journal of Counseling and Development, 65, 363-366.
Hilgard, E. R. (1962). Introduction to psychology (3rd Edition). New York: Harcourt, Brace & World, Inc.
Horowitz, M. (1986). Stress Response Syndromes (2nd ed.). Northvale, NJ: Jason Aronson.
Janoff-Bulman R. (1985). The aftermath of victimization: Rebuilding shattered assumptions. In C. R. Figley (Ed.), Trauma and its wake. New York: Brunner/Mazel.
Keane, T. M., and Kaloupek, D. G. (1982). Imaginal flooding in the treatment of a posttraumatic stress disorder. Journal of Consulting and Clinical Psychology, 50, 138-140.
Keane, T. M., Fairbank, J. A., Caddell, J. M., and Zimering, R. T. (1989). Implosive (flooding) therapy reduces symptoms of PTSD in Vietnam combat veterans. Behavior Therapy, 20, 245-260.
Kelly, W. E. (Ed.). (1985). Post-traumatic stress disorder and the war veteran patient. New York: Brunner/Mazel.
Kilpatrick, D. G., Veronen, L. J., and Best, C. L. (1985). Factors predicting psychological distress among rape victims. In C. R. Figley (Ed.), Trauma and its wake. New York: Brunner/Mazel.
Lazarus, A. (1976). Multi-modal behavior therapy. New York: Springer Publishing Co.
Lyons, J. A., and Keane, T. M. (1989). Implosive therapy for the treatment of combat-related PTSD. J. of Traumatic Stress, 2, 137-152.
MacHovec, F. J. (1985). Treatment variables and the use of hypnosis in the brief therapy of post-traumatic stress disorders. International Journal of Clinical & Experimental Hypnosis, 33, 6-14.
Manton, M., and Talbot, A. (1990). Crisis intervention after an armed hold-up: Guidelines for counsellors. J. of Traumatic Stress, 3, 507-22.
Meichenbaum, D. (1977). Cognitive-behavior modification. New York: Plenum Press.
Moore, R. H. (1990, October). Absent flashback/covert PTSD: a video case report. Paper presented at the annual meeting of the International Society for Traumatic Stress Studies, New Orleans, LA.
Olasov, B., and Foa, E. G. (1987). The treatment of post-traumatic stress disorder in sexual assault survivors using stress inoculation training SIT). Paper presented at the annual meeting of the AABT, Boston, MA.
Pavlov, I. P. (1927). Conditioned reflexes. New York: Oxford Univ. Press.
Raimy, V. (1975). Misunderstandings of the self. San Francisco: Jossey-Bass Publishers.
Roth, S., and Newman, E. (1991). The process of coping with sexual trauma. Journal of Traumatic Stress, 4, 279-297.
Saigh, P. A. (1991). Posttraumatic stress disorder: A behavioral approach to assessment and treatment. Elmsford, NY: Pergamon.
Scurfield, R. M., Kenderdine, S. K., and Pollard, R. J. (1990). Inpatient treatment for war-related post-traumatic stress disorder: Initial findings on a longer-term outcome study. Journal of Traumatic Stress, 3, 185-201.
Solomon, Z., Mikulincer, M., and Arad, R. (1991). Monitoring and blunting: Implications for combat-related post-traumatic stress disorder. Journal of Traumatic Stress, 4, 209-221.
Stampfl, T. G., and Lewis, D. J. (1967). Essentials of implosive therapy: A learning-theory-based psychodynamic behavioral therapy. Journal of Abnormal Psychology, 72, 496-503.
Turner, S. M. (1979). Systematic desensitization of fears and anxiety in rape victims. Paper presented at the annual meeting of the Association for the Advancement of Behavior Therapy, San Francisco, CA.
Veronen, L. J., and Kilpatrick, D. G. (1983). Stress management of rape victims. In D. Meichenbaum and M. E. Jaremko (Eds.), Stress reduction and prevention. New York: Plenum Publishing.
Warren, R., and Zgourides, G. D. (1991). Anxiety disorders: A rational-emotive perspective. Elmsford, NY: Pergamon.
Go to top | <urn:uuid:62304c76-4239-45ff-979d-b794ee10f9f4> | CC-MAIN-2018-17 | http://www.appliedmetapsychology.org/research-publications/articles/primary-resolution-of-the-post-traumatic-stress-disorder/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945143.71/warc/CC-MAIN-20180421110245-20180421130245-00102.warc.gz | en | 0.939841 | 7,836 | 2.953125 | 3 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.