text
stringlengths
198
621k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
15
1.73k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
49
160k
score
float64
2.52
5.03
int_score
int64
3
5
A cesarean section is a surgical delivery of your baby. The doctor makes an incision in the abdomen and uterus to remove the baby. It's a fairly common procedure, with about one in five babies delivered by C-section. A C-section is only performed when medically necessary for the safety of you and your baby. It is not an elective procedure. The C-section may be planned because of known conditions or it may happen because of a complication during a vaginal delivery. Some reasons you may have a scheduled C-section include: You may need an emergency C-section in a situation when you were planning to have a vaginal birth. This may be because: Even though you won't be laboring and pushing in the traditional sense, you are still giving birth and it's normal to feel nervous. Complete a birth plan using our guide to notify the care team of your preferences for support people, the environment of the room, and whether you want to breastfeed or formula feed. Practice some relaxation techniques, pick music to listen to in the operating room, and take steps to mentally prepare for the delivery. Throughout your pregnancy, aim to maintain a reasonable weight gain and stay as physically active as you can. This will help you during the recovery phase. A C-section is a surgical procedure, so it does carry some risks, but serious complications are rare. Some risks include: You may have one of three different types of incisions, but scars today are much smaller and more easily hidden than in the past. On the day of your delivery, you will be prepared for surgery and attached to equipment to monitor you and your baby's health. You'll meet with the anesthesiologist who will explain the pain-control methods used. You are awake during the procedure, but you won't feel pain. You may feel some pressure or pulling. The doctor will make the incision, gently deliver the baby from your uterus, and give the baby to the nurse. He or she will cut the umbilical cord and remove the placenta. After delivery, the doctor will close the incision in the uterus with stitches that dissolve and use stitches or staples to close the incision on your abdomen. You can hold and begin nursing your baby immediately. After the surgery, you may receive pain medication to keep you comfortable. If you're breastfeeding, lactation consultants can help you find the right position. It may be difficult to sit up at first, and you want to be sure the baby isn't putting pressure on your incision during feedings. You may spend two to four days in the hospital after delivery. While in the hospital, you'll be encouraged to walk soon after the anesthesia wears off. For the first few days, you may have soreness at the incision and be constipated or gassy. Avoid lifting anything heavy and limit activities that put pressure on your incision. It may take you six to eight weeks to fully heal and return to work and normal activities. Your health care provider will give you specific instructions about activity and caring for your scar. The birthing center at Magee is a family-friendly facility with access to the latest medical technology. You will receive care from our experts, who have experience delivering thousands of babies every year. Our team will support you and your family throughout the delivery and recovery. To find out more about delivering at Magee, call 1-866-MyMagee (696-2433) to speak with a member of our staff.
<urn:uuid:6ff0b2fb-970c-4ea5-9b0f-c60178f0d67c>
CC-MAIN-2020-24
https://www.upmc.com/locations/hospitals/magee/services/labor-and-delivery/birthing-methods/cesarean-section
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348492295.88/warc/CC-MAIN-20200604223445-20200605013445-00065.warc.gz
en
0.9624
725
2.6875
3
Among the dermatologist’s primary concerns is skin cancer awareness. We try to make all patients aware enough of the hazards of skin cancer that they will receive/perform regular skin cancer screenings, both at the dermatologist’s office and at home. Why is vigilant and routine skin cancer screening so necessary? Like all cancers, skin cancer is the rapid and uncontrolled growth of abnormal cells. This growth results in tumors that are either benign (non-cancerous) or malignant (cancerous). Skin is the largest organ and must be monitored carefully for lesions that are potentially harmful, sometimes fatally so. The best way to do this is with thorough skin cancer screening by the specialist (particularly for high-risk, fair-skinned individuals). With skin cancer, abnormal cells are identified in three ways: Basal cell carcinoma; Squamous cell carcinoma; and Melanoma. Basal cell and squamous cell carcinomas are the less serious types and make up 95% of all skin cancers. Melanoma is the most serious and causes 75% of all skin cancer deaths. Left untreated too long, it can quickly spread to other organs and become difficult to contain. With any suspicion of melanoma, seeing a dermatologist immediately is of utmost importance. NYDG FLASH FACTS - Skin cancer has become the most prevalent cancer in the USA. - Skin cancer is mainly caused by ultraviolet radiation from the sun. (Though UV light from tanning beds is also dangerous.) - Cumulative exposure to ultraviolet radiation over years causes basal cell and squamous cell cancers. Severe sunburns from the past are mostly responsible for melanoma. - Skin cancer has a high cure rate if detected and treated early. The most common warning sign is a visible change on the skin, a new growth, or a change in an existing lesion or mole. Look for: - A – Asymmetry. Two sides not alike - B – Border. Irregular, wavy or indistinct border - C – Color. Varied and inconsistent - D – Dimension. Change in size - E – Elevation. Patch is raised above surrounding skin
<urn:uuid:82097a73-5999-4262-8385-dff3ba249375>
CC-MAIN-2021-17
https://www.nydermatologygroup.com/procedures/new-york-dermatologist/skin-cancer-screening/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038064898.14/warc/CC-MAIN-20210411174053-20210411204053-00193.warc.gz
en
0.92787
443
3.375
3
This Edo No Zu, created by Kitagawa Sōchō in 1853, is the map of Edo centered with Edo Castle, which was surrounded by the moat during the Edo period. The Edo period, also known as the Tokugawa period or the pre-modern Japan, is the period from 1603 to 1868. The Tokugawa shogunate was founded by the shogun Tokugawa Ieyasu in Edo on March 24th, 1603, three years after the battle of Sekigahara, where he eliminated his rivals in 1600. It is also the third and the last warrior governments (the first two being the Kamakura and Muromachi shogunates) in the Japanese history. And this long Japanese history was ruled under the Tokugawa shognate and the country’s daimyo, the Bakuha system. This paper will discuss about some interesting features drawn on this particular Edo No Zu, why are they important and how are they related to the Japanese history of the Edo period. The Tokugawa shogunate, also known as the Tokugawa bakufu and the Edo bakufu, has a very strict hierarchy system created by the shogun Tokugawa. The system used to rule the country was called the Bakuha system. Hall mentioned in his article, “Bakuha system (bakuhan taisei), coined by modern Japanese historians, recongnizes the fact that under the Edo bakufu, or shogunate, government organization was the result of the final maturation of the institutions of shogunal rule at the national level and of daimyo rule at the local level.”. With this kind of ruling method, the Tokugawa shogunate also established a four-class system (Shi-no-ko-sho), the samurai, farmer, artisan, and merchant, in descending order of ranking, in order to keep things in control. By the beginning of the eighteenth century, roughly 10 percent were samurai, with the population of close to 30 million people. The ranking of a samurai is relatively high; not only is he permitted to hold two swords to show his identity to the public, he could also cut down people’s head when he felt he has been insulted; and it was not uncommon during that time. In the Shank’s Mare, one samurai felt he was insulted by Yajirobei and intended to cut Yaji’s head off using his swords. Fortunately, both his and his companion’s swords were unable to use, and that was how Yaji was lucky enough to escape from this fate, and to keep his life and continue on his journey with his companion Kita to their final destination, Ise. Below the shogun were the daimyo, or domain (han) lords, and the shogun’s direct vassals. Those who are entrusted the most by the shogun were called shinpan, the collateral houses, who worked on provincial administration. Below them were the “house” (fudai) daimyo, who had been following Tokugawa before the battle of Sekigahara. And the rest were made up by the “outside” (tozama) daimyo, who gained the name before the rise of the Tokugawa. The total number of daimyo by the end of eighteenth century was around 260. To help the shogun controlling all the daimyo living in different parts of Japan, the shogunate introduced the alternate attendance (sankin kotai) system, which forced the daimyo to visit shogun and the Edo once in every period of time, usually every other year but depended on the region. In order to make this policy happen, a daimyo had to reside his wife and children in a residential estate or palace (yashiki) in Edo, which normally cost around 70 to 80 percent of his income. In the center of the map, we could see there are two kanji reading “oshiro” (castle) and “nishinomaru” (Western circle/quarters). The area on the map referred to the Edo-jo, which located the Tokugawa family members and ministry officials of the time. We could also see another interesting feature on this map, the red clan symbols, is called the mon, showing on the houses. They only appeared on the spaces relatively bigger than the others, since the property belonged to the members of Tokugawa government, and therefore more power and more money than an ordinary citizen in the society. Even though the governors had more money than the regular citizens, a performance of an alternate attendance, usually involved 2,000 people per trip, would cost around three thousand ryo, which, after converting into yen using nowadays, is roughly around two hundred million yen, for a thirteen-day-twelve-night trip. In a result, many daimyo had to borrow a huge amount of money just to complete this mandatory performance, and at last, led to the bankruptcy of the family. The four classes, Shi-no-ko-sho, only categorized the men during the Edo period, and not the women. Women, who were married to the daimyo, were usually settled with their children in a residential estate in Edo as mentioned above. For most part of the houses and names seen on the map resided only women and children, because the daimyo were out of Edo city to stay at important positions and protecting them for the shogun. In the beginning of the Edo period, there were only limited number of travel literature records composed by women; and most of them were usually the wives and daughters of the daimyo, who have the time and money to do so. During those years, only a few women were willing to take the risk to go on the road, therefore, there were only very few records recording in the official records about females. However, a couple of years later, the number of women travelling on road had increased, and more and more frequent for them to appear on the official records. “A document produced by the checkpoints of Hakone and Nebugawa on 1715/9/23, for instance, reveals that in the second month of that year alone a total of forty-nine women had transited through the two barriers. Of the 171 travel permits collected therein in the span of five months, 167 had been issued for female travelers. As women traveled in larger numbers, their categories became more diverse. By 1721 the authorities acknowledged that ‘recently in the cities the number of people who on a daily basis request travel permits for women has grown,’ coming to include ‘even lower classes and servants’ (suezue karukimono mademo)”. Despite of an increased number of women travelling during the period of Edo, in most of the cases, women’s appearances in the history remained hidden because their journeys and diaries simply did not survived the time. Not only the works of the women, they were the same for men’s as well, “unless she (or he) filed a petition to obtain a passport, made a recorded donation at a temple, inscribed her (his) name onto a memorial stone.”. Even though there are a lot of different kinds of maps created by various artists for the city of Edo, the reason why I have chosen this one to analyze is because this particular Edo No Zu is more colourful than the others and therefore has a more lively feeling. With this brighter use of colours, in contrast with the stubborn hierarchy and Bakuha system during Edo period, I feel like it gives us a closer feeling to the everyday life of Edo. With the strict rules created by the Tokugawa shogunate, everyone has to obey them, or else they would be treated as not loyal to the shogun or a traitor to the country. One might think that being a daimyo would be easier than being an ordinary person living in Edo, however it may not be the case, since being a daimyo meant that he has to own a residence in Edo for his wife and children to live, and moreover, he has to participate in the alternate attendance, which cost a crazy amount of money per trip, which usually occurred every two years. Being a woman during Edo period might not be as easy as just living in the palace, which her husband has bought for her and her children, in Edo, there are many reasons that their appearances remain hidden behind the scene. Since women usually remained hidden from the official records, we are not sure about their statuses and their life styles. We only know that towards the end of the Edo period, the number of women travelling to other cities has increased. Shirane, Haruo, ed. Translations from the Asian Classics : Early Modern Japanese Literature : An Anthology, 1600-1900. New York, US: Columbia University Press, 2002. Accessed March 19, 2017. ProQuest ebrary. Hall, John Whitney, Marius B. Jansen, Madoka Kanai, Denis Twitchett, James L. McClain, and Cambridge Histories Online 2012 and Preceeding. 1991. Early modern japan. New York: Cambridge University Press. Rotolo, P. (2013). Mapping social hierarchies onto the city of Edo. Osher Map Library: Smith Center for Cartographic Education. Retrieved from http://www.oshermaps.org/exhibitions/map-commentaries/social-hierarchies-edo Nenzi, Laura Nenz Detto, and Project Muse University Press Archival eBooks. 2008;2007;. Excursions in identity: Travel and the intersection of place, gender, and status in edo japan. Honolulu: University of Hawai’i Press. March 27, 2017
<urn:uuid:1fec9a31-e1c3-4b45-9db9-32a8f61dfec7>
CC-MAIN-2019-51
https://asia453.wordpress.com/tokugawa-maps/archives-2017-term-2/edo-no-zu/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540564599.32/warc/CC-MAIN-20191213150805-20191213174805-00057.warc.gz
en
0.977839
2,087
3.390625
3
Quarter ♑ Capricorn First Quarter is the lunar phase on . Seen from Earth, illuminated fraction of the Moon surface is 50% and growing larger. The 7 days young Moon is in ♐ Sagittarius. * The exact date and time of this First Quarter phase is on 14 September 2078 at 11:22 UTC. Moon rises at noon and sets at midnight. It is visible high in the southern sky in early evening. Moon is passing about ∠22° of ♐ Sagittarius tropical zodiac sector. Lunar disc appears visually 6.5% narrower than solar disc. Moon and Sun apparent angular diameters are ∠1788" and ∠1908". Next Full Moon is the Harvest Moon of September 2078 after 7 days on 21 September 2078 at 17:31. There is low ocean tide on this date. Sun and Moon gravitational forces are not aligned, but meet at big angle, so their combined tidal force is weak. The Moon is 7 days young. Earth's natural satellite is moving through the first part of current synodic month. This is lunation 973 of Meeus index or 1926 from Brown series. The length of the lunation is 29 days, 15 hours and 7 minutes. It is 2 hours and 43 minutes shorter than the next lunation's length. The lengths of the following synodic months are going to increasing with the true anomaly getting closer to the value it has at the point of New Moon at apogee (∠180°). The length of the current synodic month is 2 hours and 23 minutes longer than the mean synodic month length. It is 4 hours and 40 minutes shorter compared to 21st century's longest synodic month length. At the beginning of the lunation cycle the true anomaly is ∠115.1°. At the beginning of next synodic month the true anomaly is going to be ∠146.4°. 2 days after point of apogee on 11 September 2078 at 14:50 in ♏ Scorpio. The lunar orbit is getting narrow, while the Moon is moving towards the Earth. It will keep this direction over the next 9 days, until the Moon reaches the point of next perigee on 23 September 2078 at 13:38 in ♈ Aries. The Moon is 400 825 km (249 061 mi) away from Earth and getting closer over the next 9 days until the point perigee when Earth-Moon distance is going to be 361 662 km (224 726 mi). 3 days after descending node on 11 September 2078 at 01:26 in ♏ Scorpio. The Moon is located south of the ecliptic over the following 10 days, until the lunar orbit crosses from South to North in ascending node on 24 September 2078 at 13:18 in ♉ Taurus. 17 days since the beginning of current draconic month in ♉ Taurus, the Moon is navigating from the second to the final part of the cycle. 13 days since the previous standstill on 1 September 2078 at 05:56 in ♋ Cancer when the Moon has reached North declination of ∠27.321°, the lunar orbit is extending southward over the next day to face maximum declination of ∠-27.437° at the point of next southern standstill on 15 September 2078 at 16:23 in ♑ Capricorn. In 7 days on 21 September 2078 at 17:31 in ♓ Pisces the Moon is going to be in a Full Moon geocentric opposition with the Sun and thus forming the next Sun-Earth-Moon syzygy alignment.
<urn:uuid:03bfb2ff-e7a9-4b19-8281-f7f9f006958e>
CC-MAIN-2023-06
https://lunaf.com/lunar-calendar/2078/09/14/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500671.13/warc/CC-MAIN-20230208024856-20230208054856-00590.warc.gz
en
0.91227
786
2.75
3
• Setting aside certain areas as wilderness or some other conservation zone protected from most development. • Ensuring continuity of millions of dollars of "payment in lieu of taxes" to counties and also existing mineral and grazing leases, which could be disrupted if federal land switches title to Utah. • Establishing an interim commission to further study the transfer of federal land to the state. Kathleen Clarke, the state's public lands point person, urged the interim natural resources committee to draft legislation creating the commission. Passed last session, HB148 demands title to most federal land within Utah's borders be transferred to the state. This land covers about 60 percent of Utah and does not include the five national parks and the national monuments except for Grand Staircase-Escalante nor areas designated under the National Wilderness Preservation System. The move is seen by conservationists as a land grab doomed to failure, while state officials characterize it as a way to ensure more sound management that is responsive to local concerns. The law called for the Public Lands Policy Coordinating Office to help CDC prepare the study released Wednesday. The Southern Utah Wilderness Alliance jumped on the study, calling it further proof that HB148 amounts to a "fool's errand" that has virtually no prospect of getting past Congress or the courts or even increasing revenue to the state. "In today's report, the state of Utah was forced to admit that their proposal to take control of federal public lands is not a money maker for the state and will not help fund Utah schools," executive director Scott Groene said. "Gov. Herbert and the Utah Legislature should have investigated how much money Utah would lose in a land transfer six months ago, before they passed a law demanding that the federal government hand over 30 million acres of public lands to the state." The new study largely provides a historical and administrative perspective on the movement for state control of lands managed by the U.S. Forest Service, the Bureau of Land Management and the Fish and Wildlife Service. Collectively these agencies spend more than $200 million a year managing their holdings in Utah. Mining and grazing on Utah's 22 million acres of BLM land generated about $445 million in economic activity last year. About $141 million in mineral royalties found its way to state coffers and another $34.7 million was distributed to Utah counties under as payment in lieu of taxes, or PILT, according to the study. But these lands can be yielding much more and would be better cared for under state control, said Clarke, who ran the BLM during President George W. Bush's first term. "We have a serious problem. The current system doesn't work. The federal forests are infested with bugs," she told lawmakers. "We don't have a federal government that is responsive to these local interests. We need to find balance in the management of these lands." She stressed that some lands are worth protecting and urged the Legislature to "pre-designate" certain areas as wilderness or some other conservation designation so there is no confusion about restrictive management regimes should they be transferred to the state. "There are amazing lands throughout the state that we don't want to disrupt or destroy, but there are activities that are compatible with those places," Clarke said. "The state has a claim on these lands to develop them and enjoy the resources that are there." SUWA officials remained skeptical of the state's motivations. "This is terrible public policy," SUWA lawyer Steve Bloch said."They have passed a highly antagonistic piece of legislation. We are the only one in the country doing this. This is not a balanced approach to public land management. We have to look at the track record, more than the rhetoric." He noted that the federal government would reasonably expect compensation for the lands, but the state has not calculated that cost. "These are national lands managed on behalf of all Americans, not just Utahns," Bloch said. "The claim that these lands were promised to Utah at statehood [in 1896] is simply fictitious and historically wrong." Public Lands Transfer Study recommendations Set up a 9-member "interim" panel with representatives from various interests to continue studying the state acquisition of federal land. Pre-designate protected wilderness or conservation areas. Indemnify Utah counties against any loss of revenue. Review existing state park designations and increase funding to parks and landscape conservation initiatives. Direct new revenue to public education or other legislatively designated priorities.
<urn:uuid:2e80cae0-6628-4212-8d97-533b94040b1b>
CC-MAIN-2016-22
http://archive.sltrib.com/article.php?id=24069475&itype=storyID
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275645.9/warc/CC-MAIN-20160524002115-00135-ip-10-185-217-139.ec2.internal.warc.gz
en
0.957434
913
2.515625
3
Physical activity is any type of exercise or motion of the body that makes use of power. Lower bodily exercise is a strong predictor of cardiovascular events in aged sufferers with type2 diabetes mellitus past traditional danger components: the Japanese aged diabetes intervention trial. Role of way of life and getting older on the longitudinal change in cardiorespiratory fitness. Incidental physical activity is that which occurs all through the course of the day throughout activities of each day residing. General practitioner advice on physical activity: analyses in a cohort of older main well being care sufferers (getABI). Pregnant, postpartum girls and individuals with cardiac events might must take further precautions and search medical advice before striving to attain the beneficial levels of bodily activity for this age group. Even although flexibility doesn’t have recommended guidelines, it is a crucial part of physical fitness. After completing the bodily exercise, gradually decelerate or lower intensity to assist the body quiet down. Hinrichs T, Moschny A, Klaassen-Mielke R, et al. General practitioner recommendation on bodily exercise: analyses in a cohort of older major health care patients (getABI). Low ranges of bodily exercise are related to an increased threat of mortality in individuals over the age of sixty five years. To promote and preserve health, older adults should take part in average-depth aerobic exercise for no less than half-hour on five days of the week, or vigorous-intensity cardio activity for at least 20 minutes on three days of the week. Paterson D, Warburton D. Physical exercise and purposeful limitations in older adults: a systematic overview associated to Canada’s physical exercise tips. Flexibility plays an integral half in some sorts of physical activities similar to dancing. False—There is strong evidence indicating that older adults who’re apparently healthy should engage in advisable ranges of bodily activity with positive benefits on mortality and morbidity. Talk to your physician when you have a persistent well being situation (comparable to heart disease, arthritis, or diabetes) or signs (similar to chest ache or pressure, dizziness, or joint ache) earlier than starting a bodily exercise program. Prevention of onset and progression of fundamental ADL incapacity by bodily activity in neighborhood dwelling older adults: a meta-analysis. These recommendations are related to all wholesome adults aged 18-sixty four years until specific medical circumstances indicate on the contrary.
<urn:uuid:eba93ef9-2c80-42e2-85ce-b5a48e86bab6>
CC-MAIN-2017-51
http://neurolumabrainpill.com/physical-fitness-2.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948522205.7/warc/CC-MAIN-20171213065419-20171213085419-00398.warc.gz
en
0.914341
497
2.921875
3
Ryan Zurakowski, assistant professor of electrical and computer engineering at the University of Delaware, is co-author of a paper appearing in Nature Medicine on Jan. 12 highlighting the role of T-cells in HIV. The paper, titled "HIV-1 Persistence in CD4+ T-Cells with Stem Cell-Like Properties," provides evidence that a particular T-cell type may help researchers better understand why HIV can persist despite treatment. Zurakowski's co-authors include Mathias Lichterfeld, the paper's lead author, and researchers from Massachusetts General Hospital (MGH); Ragon Institute of MGH, the Massachusetts Institute of Technology and Harvard University; the First Affiliated Hospital of China Medical University; Brigham and Women's Hospital; and Howard Hughes Medical Institute. Zurakowski explained that HIV treatments do not kill infected cells. Instead, they stop the infection of new cells, and rely on the virus itself to kill the infected cells. Unfortunately, some cells infected by the virus - memory T-cells - are not killed by the virus. T-cells are a type of lymphocyte, or white blood cell, produced by the thymus gland, that actively participates in the body's immune response. "Memory" T-cells can live for years, or even decades, providing life-long immunity to previously encountered diseases. They can form "quiescent" infections, which last for years, and cause HIV to rebound whenever a patient stops treatment. During a decade-long study, the researchers discovered that not all memory T-cells are alike. A subgroup of memory T-cells, called "Stem-Cell Memory T-cells" (Tscm), are different, particularly in their ability to produce daughter cells. The researchers were able to show that the HIV-infected Tscm cells in patients on HIV therapy decayed more slowly than any other type of T-cell. As a result, after 10 years of therapy, the Tscm cells represented 24 percent of the total HIV infected cell population, despite being only 1 percent of the total T-cell population. This finding is significant, Zurakowski said, because it demonstrates that Tscm cells are the slowest-decaying portion of the HIV reservoir. "Over time this particular cell type plays an increasingly significant role in sustaining HIV infection in patients that have remained on therapy," he said. Zurakowski credits the finding to the diligence of Lichterfeld and the researchers at the Ragon Institute in carefully following the same HIV patients for a decade. "Because the researchers have followed the same patients over a decade, we have created a high fidelity data set that would not otherwise have been possible," he said. Drugs currently being developed for cancer therapy that target stem-cell metabolic pathways may be able to target this cell type as well, due to the "stem-cell like" nature of the Tscm cells, he continued. A better understanding of how the HIV virus leverages a cell's stem cell-like properties of cellular immune memory to stay alive could lead to improved clinical strategies for HIV treatment. "If we can find a way to selectively eliminate the HIV-infected Tscm cells, it will be a major step in developing a true 'cure' for HIV infection," concluded Zurakowski.
<urn:uuid:13bf7228-e132-44fd-8ae4-205083f67611>
CC-MAIN-2017-39
https://www.news-medical.net/news/20140115/Research-paper-highlights-the-role-of-T-cells-in-HIV.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686169.5/warc/CC-MAIN-20170920033426-20170920053426-00081.warc.gz
en
0.938137
691
2.953125
3
In cities worldwide, particulate air pollution is on the rise due to growing urban populations, transportation, and industrialization. Not only does air pollution aggravate climate change, it contributes to an accelerated increase in respiratory and cardiovascular diseases. Buildings are primarily concerned with interior comfort and air quality for their own occupants. With great concern for the quality of the climate at the pedestrian level in outdoor public spaces, this project’s research goal is to rethink the outermost surface of a building facade as a steward for public health and propose a new function for urban architecture: to clean outdoor air for pedestrians. Air velocity increases when squeezing through constricted spaces. Smaller-scale structures and building façade surfaces can be designed to increase local air movement and to filter dangerous particulate matter, resulting in public pockets of fresh air at the lower pedestrian levels. While At Headlands I want to explore how contours on a building surface can control and increase air movement. By controlling the direction and velocity of wind at a micro-climate level, I hope to eventually filter the air. To do this, I plan to do the following: - Building surface models: Three-dimensional relief geometries will be developed digitally and prototyped using my own 3-D printer. The surface geometries will be designed to increase and decrease directional air movement. Research on fluid dynamics (turbulence, eddy currents, etc.) will help inform the final outcomes. - Incorporating low-tech material: The same reliefs will be tested at full scale using readily available and inexpensive materials. The intent is to develop options for developing countries. - Testing air flow: Using basic testing of air movement with smoke and electronic sensors, I would like to video document and record the direction and speed of movement of air.
<urn:uuid:6e65fc7e-35dd-4c26-bea8-83b7079c527e>
CC-MAIN-2022-40
https://www.headlands.org/artist/doris-sung/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00648.warc.gz
en
0.901684
373
3.34375
3
In the rearing of silk-worms, Ardeche ranks second to Gard among French departments, and great numbers of mulberry trees are grown for the purposes of this industry. In the south the Orb, the Herault and the Vidourle are independent rivers flowing to the Golfe du Lion; farther north, the Gard - formed by the union of several streams named Gardon - the Ceze and the Ardeche flow to the Rhone. When the Revolution began he became leader of the Jacobin party in Besancon, and when a regiment of volunteers of the department of the Gard marched through the city he was elected lieutenant-colonel. The Am, the, Sane (which rises in the Faucilles and in the lower part of its course skirting the regions of Bresse and Dombes, receives the Doubs and joins the Rhone at Lyons), the Ardche and the Gard are the affluents on the right; on the left it is joined by the Arve, the Isre, the Drme and the Durance. The mulberry grows in the valleys of the Rhne and its tributaries, the lsre, the Drme, the Ardche, the Gard and the Durance, and also along the coast of the Mediterranean. AIGUES MORTES, a town of south-eastern France, in the department of Gard 25 m.
<urn:uuid:94ebfa93-7e91-4503-b6e2-d82170ea81ab>
CC-MAIN-2017-13
https://www.all-dictionary.com/sentences-with-the-word-Gard
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190134.67/warc/CC-MAIN-20170322212950-00392-ip-10-233-31-227.ec2.internal.warc.gz
en
0.953114
293
2.515625
3
Tatarastan, the only Muslim republic still in the Russian Federation, is losing the autonomy that it gained in 1991 after the dissolution of the Soviet Union and had consolidated since then. It has also been forced to put on hold the legislation it passed in early 2001, in defiance of Russian objections, to distance itself culturally from Moscow by dropping the Cyrillic alphabet imposed by Joseph Stalin in 1939. Tatarastan, which is a small country of 3.7 million inhabitants (mostly Slavs until last year) only an hour’s flight from Moscow, was in no position to declare its independence, as Chechnya has done. But it was determined to work for, and succeeded in securing, a reasonable degree of autonomy, mainly thanks to the skill of Mintimer Shamiev, its president since June 1991 and also an old Soviet hand, in lobbying the Duma, the Russian parliament’s lower house. In 1992 a Tatar constitution was adopted that provided for Tatarastan to be “a republic associated with Russia” and “subject to international law”. This enabled it to send emissaries abroad, apply for international loans and trade with other countries, without having to go through Moscow. For instance, it began to export oil and arms. The republic also declared Tatar to be the country’s official language, although this did not worry the Russians unduly at the time because they constituted the majority of the population and Russian remained (and continues to be) the lingua franca of the republic’s various cultural and linguistic groups (only about half of the Tatars speak their own mother tongue). However, things began to change last year, when Russians became a minority as a result of the return of migrant workers from Central Asia. President Putin of Russia redoubled his efforts to consolidate Moscow’s grip, particularly after the legislation dropping the Cyrillic alphabet the same year. But even then president Shamiev’s relentless efforts to lobby the Duma continued to pay off, even as recently as February last year. In that month he persuaded the Duma to pass a bill that authorised a third term for the governors of the Russian Federation’s 89 territorial entities – a move that somewhat dented Putin’s so-called “verticality of power” programme for securing Moscow’s grip. That was, however, due to the fact that the Russian leader’s control over the Duma was not as effective then as it is now, and Shamiev’s ability to influence Russian legislators is now history. The result, unfortunately, is that Tatarastan’s autonomy has vanished and Moscow’s control of its affairs is assured. The slide began when Tatar officials opened negotiations with Putin last November, and the Russian constitutional court threatened to dissolve the Tatar parliament. At the end of January, the court gave the republic six months “to bring its constitution into line with that of Russia”. The order of the court was implemented in February and the republic’s institutions fell under Moscow’s control as a result. For instance, the local secret service, previously controlled by president Shamiev, and the republic’s judicial system, were both put back under Moscow’s authority. Moreover the Tatar Communist party lost its independence, becoming once again a regional branch of the Russian party, which is itself reeling from the losses it has recently suffered in the Duma at the hands of the Kremlin-controlled ruling coalition. In the financial sector Tatarastan has suffered similar setbacks. This year, for example, it is expected to pay 64 percent of the taxes it collects to Moscow. This is much more than the 36 percent of its tax revenues that it had formerly been required to contribute to Moscow’s coffers. To add insult to injury, a ‘federal inspector’ and his deputy have arrived in Kazan, the Tatar capital, to monitor the implementation of the new changes and to report to a ‘super prefect’ appointed by Putin. He is an official of the Volga region, which is itself a new administrative entity that now has authority over the republic. Many Tatars now feel that this disposal of their country’s “special status” is bound to end for the time being their dream of reviving their Muslim and Turkophone culture. They also believe that Putin’s unchallenged popularity among Russians will encourage him to reduce Tatarastan’s autonomy to nothing. That Tatars now comprise 52 percent of the population matters little, because the levers of power are in the hands of officials in Moscow. Putin now commands a popular approval rating of between 70 and 75 percent, partly because of the war he continues to wage against the Muslim people of Chechnya. And although the Tatars have not declared a war of independence, and are content (for the time being) to remain within the Russian federation, Putin’s high-profile attack on their cultural ambitions and their country’s autonomy is likely to appeal to Russians, earning him even greater popularity. With Duma elections due late next year and a presidential election early in 2004, Putin and other Russian politicians are bound to fight on strictly nationalist platforms. Even political parties opposed to Putin and his ruling coalition, like the Communist Party in Moscow, will not dare to be seen or heard in public to be sympathetic to Tatarastan’s cultural or autonomy aspirations. Nor is the outside world interested in what is happening to the Tatars in their own country. The western countries, which have a strategic alliance with Russia against ‘Islamic terrorists’, have no interest in backing Tatarastan’s Islamic revival. After all, they are silent about Moscow’s war against Chechen Muslims and China’s against Muslims in East Turkestan. They label both Chechen and Chinese Muslims ‘terrorists’ and ‘separatists’ and leave the matter at that. More significantly, the Muslim world is oblivious to what is happening in Tatarastan. If the Muslims can abandon the Palestinians, what chance have the Tatars of securing their support?
<urn:uuid:0cf65220-b277-4584-9fd6-342e71209935>
CC-MAIN-2022-49
https://mediamonitors.net/tatarastan-losing-both-autonomy-and-alphabet/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710733.87/warc/CC-MAIN-20221130060525-20221130090525-00617.warc.gz
en
0.967773
1,281
2.796875
3
News | Topic: Sexual Coercion Apr 29, 2021 Trafficking Teens: What Warning Signs Parents Need To Know The average age of a child bought and sold for sex is just 13-years-old, according to the Tennessee Bureau of Investigations. Read the article here. Apr 20, 2021 Tools For Teens To Call Out Sexual Violence A sex ed teacher talks about how young people can try to keep themselves safe from sexual assault and be allies to others. Read the article here. Mar 1, 2021 The Trouble With Boys: What Lies Behind The Flood Of Teenage Sexual Assault Stories? Young women are being failed by a society that seems unable – or unwilling – to address rape culture and its grave consequences. Read the article here. Feb 25, 2021 Sending Nudes: Starting The Convo Early – 3 Tips For Smart Parents Kids are growing up in a world where sending nudes is the norm. Read the article here. Jan 18, 2021 New Trend Making Teens Vulnerable To Human Trafficking How a trend to gain social media followers is making teens vulnerable to trafficking. Read the article here. Dec 23, 2020 Frustrations Grow Over Cheerleading’s Mishandled Sexual Misconduct Cases USA TODAY interviewed nearly two dozen people who expressed frustration with the way USASF handled their concerns, citing the organization’s drawn-out process and lack of communication. Read the article here. Sep 16, 2020 4 Body Safety Rules To Protect Kids Ages 5-10 Teaching simple body safety rules and empowering kids to reject pornography are powerful ways to safeguard your family. Read the article here. Aug 12, 2020 Is Your Child At Risk For Harmful Sexual Behavior? Solid advice for prevention and resources from a juvenile judge. Read the article here. Mar 11, 2020 Gay Lesbian Teens At High Odds For Physical, Sexual Abuse Overall, LGBQ teens face roughly twice the risk of physical violence compared with straight youth, the surveys revealed. Read the article here. Feb 19, 2020 What Parents Need To Know About Sexual Grooming Understanding the stages of sexual grooming can help to protect your child. Read the article here. Feb 10, 2020 MN Study Says Teens At Risk Of Being ‘Sexploited’ At least 5,000 high school teens have been affected by sexual exploitation according to Minnesota’s first estimates. Read the article here. Feb 6, 2020 ‘We’re constantly asked for pictures’: Teen Researches Why Sending Naked Pics Is Now Normal Kiona Osowski’s Grade 12 research project started with a question, based on her own experiences as a 17-year-old teenager: why are girls so often asked for nude photos? Read the article here. Nov 5, 2019 Katie Couric’s New Podcast: Teens’ Easy Access To Hardcore Porn Could Hurt Them… Literally Katie Couric wanted to know why one in four women are scared during sex. Her short answer: porn. Read the article here. Oct 10, 2019 Teens Tried To Catch Man Trying To Solicit Girls For Sex. He Kidnapped One Of Them. The 17-year-old victim was rescued after she messaged her friends for help, who then called police. Read the story here. Sep 17, 2019 Many U.S. Women Say First Sexual Experience Was Forced In Teens The study’s results suggest that for 1 in 16 American women — or 3 million — the first sexual encounter was not voluntary. Read the article here. Jul 23, 2019 Many Teen Girls Pressured By Partners To Get Pregnant Nearly one in eight sexually active teen girls are pressured by their partners to have unprotected sex and try to conceive when they don’t want a baby, a U.S. study suggests. Read the article here. Jun 18, 2019 Teen Vogue Encourages Children To Explore Prostitution As A Career On April 26, Teen Vogue posted an article titled “Why Sex Work is Real Work” by Dr. Tlaleng Mofokeng. Read a response to that article and access the original here. Mar 14, 2019 5 Body Safety Rules Every 5-Year-Old Should Know It seems like the number of things you need to talk to your children about in order to keep them safe just keeps growing! One issue that should be at the top of your list is protecting kids from sexual abuse. Read the article here. Mar 1, 2019 Is “After” The New “50 Shades of Grey” For Kids? The movie “After” is coming to the big screen, originally written online as a Harry Styles fan fiction series. Read more about the movie here. Dec 13, 2018 Young Aussies Taught To Properly Ask For Consent In Sex-Ed Ad A new sex-education ad being rolled out across NSW aims to teach young people how to properly ask for and recognize consent. Read the article and view the video here.
<urn:uuid:b9a90c07-909d-48eb-876f-469ad6b47ec8>
CC-MAIN-2021-25
https://sexualintegrityinitiative.com/news_topic/sexual-coercion/
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487622234.42/warc/CC-MAIN-20210616063154-20210616093154-00605.warc.gz
en
0.900676
1,076
2.640625
3
Dividing Fractions: Understanding Division with Numbers Less than 1 (Grade 5) This lesson set provides an introduction to division with numbers less than one, both when the whole number amount is being divided by less than one and when the fraction is being partitioned by a whole number. They will use representations (pictorial and symbolic) and mathematical reasoning to link prior knowledge of division to division when one number involved is a fraction. Students will: - apply understanding of division with whole numbers to division involving numbers less than 1; - recognize the meaning of the dividend and the divisor and what happens when a unit fraction is in - either position (but not both); and - use a variety of representations to respond to a problem situation and weigh the advantages and disadvantages of such representations. Standards: 5.NF.B.7, 5.NF.B.7.A, 5.NF.B.7.B, 5.NF.B.7.C
<urn:uuid:73dff159-1e28-42e0-9bab-a8cfddf33dbe>
CC-MAIN-2022-49
https://www.shopifl.com/collections/math-lesson-sets/products/dividing-fractions-understanding-division-with-numbers-less-than-1-grade-5
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711001.28/warc/CC-MAIN-20221205000525-20221205030525-00358.warc.gz
en
0.90718
203
4.125
4
2011 was a terrible year for New Zealand seabirds. The Rena oil spill in October received the most media coverage and provided dramatic images (see Rena oil spill blogs). More insidious were the impacts of the Japanese earthquake and ensuing tsunami in March. A plume of radioactive fallout from the crippled Fukushima Daiichi nuclear power plant contaminated the North Pacific feeding grounds of several New Zealand-breeding species, including flesh-footed shearwater, sooty shearwater (muttonbird), Buller’s shearwater and mottled petrel. However, the most extreme mortality event for any single species was a severe July storm estimated to have killed several hundred thousand broad-billed prions (see Riders of the storm – thousands of seabirds perish on New Zealand shores). The broad-billed prion is a poorly studied species. There are no well-monitored populations, and so there are few opportunities to determine the impact of the storm at a population level. In the New Zealand region, broad-billed prions breed on small islands in the Chatham Islands, Fiordland, and around Stewart Island, and on the Snares Islands. A few breed on islets and stacks off Whenua Hou/Codfish Island, north-west of Stewart Island. I visited tiny Trig Island (a known broad-billed prion breeding site) there on 8 December, and found a ghost town. The peaty soil was honeycombed with an estimated 500 burrows, but 90% looked like they had not been visited at all this season. In early December, most burrows should contain large chicks, but I found only four in about 50 active burrows inspected, and estimated only about ten chicks to be present on the island (i.e. about 2% of burrows contained chicks). The storm that killed so many broad-billed prions hit 6 weeks before broad-billed prions begin to lay. The large number of active burrows on Trig Island that did not contain chicks may be due to an imbalance in the sex ratio of birds that survived the storm, or those that lost a mate may not have had time to find a new one before it was time to breed. Feather samples taken from the four chicks handled, along with older skeletal remains found on the island, will be used as part of a Te Papa genetic study seeking to determine where the vast numbers of birds killed in July came from. Efforts will be made to collect genetic samples from other breeding sites as part of this study. Additional information on the wildlife of Codfish Island can be found on http://blog.tepapa.govt.nz/2011/12/13/codfish-island-1934-and-2011-in-the-footsteps-of-edgar-stead-part-4/ and http://www.birdingnz.net/forum/viewtopic.php?f=3&t=1516 By Colin Miskelly, Curator Terrestrial Vertebrates
<urn:uuid:8eaf0473-4fbc-4411-9c49-a35034df4a71>
CC-MAIN-2017-30
http://blog.tepapa.govt.nz/2011/12/13/riders-of-the-storm-the-severely-depleted-next-generation/?like=1&source=post_flair&_wpnonce=7b62a7b6bf
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424296.90/warc/CC-MAIN-20170723082652-20170723102652-00650.warc.gz
en
0.952929
629
2.953125
3
Many of the photos and videos made by EAST depict animals living in grassless, undersized concrete cages and appear to be lethargic and stressed. The experts stressed, however, that no definitive conclusions could be drawn from photos alone. They said bears lose some hair during summer conditions and that captive bears can lose hair for unexplained reasons. Other evidence is less subjective. Wu Hung said that in 1999 feral dogs killed four of the zoo's red-necked wallaby. Other animal-welfare experts agreed that conditions at Shoushaun are poor. Rob Laidlaw, director of the Canadian group Zoocheck and a biologist who has monitored animals in captivity since 1984, visited Shoushan in November 2004. "The zoo is outdated and, ideally, should be closed," Laidlaw said. "It was a disaster." He said nearly every exhibit is "antiquated in design—predominantly old-style grottos, pits, and small, fenced ungulate [hoofed animal] yards." He described cages as "grossly undersized" and "barren with inappropriate concrete or compacted-earth floor surfaces, solid walls or barriers that allow no opportunity for animals to view the outside world." He said exhibits contained no "features, furnishings, or objects to facilitate natural movements or behaviors." Photos provided by Zoocheck show a group of oryx, a species of antlope, attempting to graze in a grassless enclosing strewn with concrete rubble. Another photo shows fallow deer sitting on a barren, flat brick floor. A third shows three wild boars resting in another rock-strewn enclosing. Paul Littlefair, senior manager for international programs with Britain's Royal Society for the Prevention of Cruelty to Animals (RSPCA), has visited Shoushan twice, most recently in November 2005. "I did not find mistreatment, per se, but there were some concerns about the quality and size of enclosures in the case of some exhibits," he said. He said carnivore enclosures were "in line of sight and relatively close to what would be prey animals—large herbivores—in the wild." He also noted "little control over feeding by visitors." "It's true that there have been several serious incidents over the years, and compared to the other large zoo in Taiwan, conditions are generally poor," he said. He added that in 2005 he did notice improvements at some exhibits. Have Conditions Improved? Fu-Feng Hung, the Kaohsiung government official, was shown photos of the animals and a copy of this story. "I believe the most pressing and professional thing to do is to organize a team which consists of experts from various fields to evaluate all aspects of Shousan Zoo as soon as possible," he said in a letter of response. Fu-Feng Hung said EAST would be invited to help in an upcoming audit of the facility, and he stressed that the photos do not reflect current conditions. "The condition of the zoo right now is nothing like the impression that you might have from viewing those photos," he said. EAST's Wu Hung disagrees. "The zoo is in the exact condition as the pictures show," he said. "However, the turning point may come soon, as the Kaohsiung city government is now organizing a task force which aims to assess the zoo and the possibility of its transformation," he said. Laidlaw of Zoocheck also expressed doubts. "I have talked to people who have visited there since my last trip, and I have no reason to believe things have changed," he said. "It would take a massive influx of money to make the necessary changes." Shoushan Zoo officials were contacted by phone and email but did not provide responses to written questions for this article. But a second letter from Fu-Feng Hung's office said recent changes have been overlooked by critics. He noted that in 2006 the zoo put grass in the lion grotto and added a pool and some branches to the brown bear exhibit. "Whether the zoo is to be closed one day or its function is to be changed to something else, our main concern right now is to try as hard as we can to protect animal welfare," the letter stated. Free Email News Updates Sign up for our Inside National Geographic newsletter. Every two weeks we'll send you our top stories and pictures (see sample). SOURCES AND RELATED WEB SITES
<urn:uuid:c9abebe5-e725-4207-948c-b7cdea326eda>
CC-MAIN-2018-05
https://news.nationalgeographic.com/news/2007/05/070518-crocodile-zoo_2.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891980.75/warc/CC-MAIN-20180123151545-20180123171545-00021.warc.gz
en
0.971504
943
2.515625
3
The study of communication centres on verbal and non-verbal human interactions. Verbal communication are narrowed down to two basic types: interpersonal and public speaking. While the majority of verbal communication is done interpersonally, public speaking is crucial in interacting with society and influencing people. Inter-personal communication deals with how people use language to communicate with each other one-on-one and in small group settings. Etiquette plays a large role in this form of communication's success and failure. It is also important how an individual views and is viewed by others. Inter-personal communication in a business setting has developed into a hierarchical system regarding etiquette. Public speaking involves how an individual influences others in a one-way style of communication. Also important is how the speaker is perceived by others and how these others are influenced. Whether speaking to persuade or inform, this theory of communication is crucial to understanding people and societies. Obstacles in Verbal Communication Interpretation of another person's verbal cues is subjective and can be influenced by many things, such as differences of understanding within a particular language or between multiple languages. Cultural differences play a large role in verbal interpretation as well. Many times, people assume their messages are correctly interpreted when in fact that may not be the case, which results in potential problems and conflicts.
<urn:uuid:b5e23c9f-9f65-4be3-85c9-dd482631e8d7>
CC-MAIN-2018-39
http://www.ehow.co.uk/facts_7608752_theory-verbal-communication.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160145.76/warc/CC-MAIN-20180924050917-20180924071317-00106.warc.gz
en
0.94372
264
4.03125
4
sex determining region Y The SRY gene provides instructions for making a protein called the sex-determining region Y protein. This protein is involved in male sexual development, which is usually determined by the chromosomes an individual has. People usually have 46 chromosomes in each cell. Two of the 46 chromosomes, known as X and Y, are called sex chromosomes because they help determine whether a person will develop male or female sex characteristics. Girls and women typically have two X chromosomes (46,XX karyotype), while boys and men usually have one X chromosome and one Y chromosome (46,XY karyotype). The SRY gene is found on the Y chromosome. The sex-determining region Y protein produced from this gene acts as a transcription factor, which means it attaches (binds) to specific regions of DNA and helps control the activity of particular genes. This protein starts processes that cause a fetus to develop male gonads (testes) and prevent the development of female reproductive structures (uterus and fallopian tubes). Mutations in the SRY gene have been identified in approximately 15 percent of individuals with Swyer syndrome, also known as 46,XY complete gonadal dysgenesis or 46,XY pure gonadal dysgenesis. SRY gene mutations that cause Swyer syndrome prevent production of the sex-determining region Y protein or result in the production of a nonfunctioning protein. A fetus whose cells do not produce functional sex-determining region Y protein will not develop testes but will develop a uterus and fallopian tubes, despite having a typically male karyotype. In most individuals with 46,XX testicular disorder of sex development, the condition results from an abnormal exchange of genetic material between chromosomes (translocation). This exchange occurs as a random event during the formation of sperm cells in the affected person's father. The SRY gene is misplaced in this disorder, almost always onto an X chromosome. A fetus with an X chromosome that carries the SRY gene will develop male characteristics despite not having a Y chromosome. SRY gene mutations that impair but do not eliminate the function of the sex-determining region Y protein have been identified in a small number of people with 46,XY disorder of sex development, or partial gonadal dysgenesis. Affected individuals may have external genitalia that do not look clearly male or clearly female (ambiguous genitalia) or other abnormalities of the genitals and reproductive organs. About 10 percent of individuals who have both testicular and ovarian tissue, a condition called ovotesticular disorder of sex development, have two X chromosomes with one carrying a misplaced copy of the SRY gene. - essential protein for sex determination in human males - sex-determining region on Y - sex determining region protein - testis-determining factor
<urn:uuid:953614b3-f27b-47cf-b78c-11ab78852e61>
CC-MAIN-2019-26
https://ghr.nlm.nih.gov/gene/SRY
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627997508.21/warc/CC-MAIN-20190616002634-20190616024634-00206.warc.gz
en
0.912942
578
3.890625
4
If you’re trying to detect the orientation of an object, sometimes you really don’t need a 6DOF gyro and accelerometer. Hell, if you only need to detect if an object is tilted, you can get a simple “ball in a tube” tilt sensor for pennies. [tamberg] liked this idea, but he required a tilt sensor that works in the X, Y, and Z axes. Expanding on the ‘ball in a tube’ construction of simple tilt sensors, he designed a laser cut 3D tilt sensor that does all the work of of a $30 IMU. The basic design of this tilt sensor is pretty simple – just an octahedron with four nails serving as switch contacts at each vertex. An aluminum ball knocks around inside this contraption, closing the nail head switches depending on what orientation it’s in. Simple, and the three dimensional version of a ball in tube tilt sensor. To get the tilt data to the outside world, [tamberg] is using an Adafruit Bluetooth module, with two of the nails in each corner connected to a pin. With just a little bit of code, this 3D tilt sensor becomes a six-way switch to control an RGB LED. Video of that below.
<urn:uuid:45440d9c-27d0-4b8b-b885-2deb92631bb0>
CC-MAIN-2023-40
https://hackaday.com/2014/07/01/diy-3d-tilt-sensor/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511055.59/warc/CC-MAIN-20231003060619-20231003090619-00792.warc.gz
en
0.901754
269
2.734375
3
VBA Filter function is very useful for filtering the records to suit our requirement. We use VBA Filter function to filter the records with verity of criteria to get the limited number of records. Sometimes you need to refine and exclude the unwanted rows in Excel 2007, 2010, 2013, 2016 to create the clean data set. You need to retrieve few records from the large number of records based on some criteria. 50+ Project Management Templates Pack Excel PowerPoint Word Advanced Project Plan & Portfolio Template Ultimate Project Management Template 20+ Excel Project Management Pack 20+ PowerPoint Project Management Pack 10+ MS Word Project Management Pack In this topic: - Filtering the Data using VBA - VBA Filter Function - Example Code on Filter Function in VBA - VBA AutoFilter Method - Syntax of VBA AutoFilter - Example Code on AutoFilter Method in Excel VBA We will see the different use cases of Filtering the Data using VBA in this topic. We explain each topic with suitable data, VBA code and the filtered records (its outputs) with the screenshots. VBA AutoFilter – Filtering the Data using VBA: We have two functions to filter the data using VBA, Filter function in and Autofilter method in Excel VBA. You can use one of this based on your requirement. If you want to filter array elements, you can use VBA Filter function. And you can use Autofilter method to filter the data in Excel Worksheets. VBA Filter Function: Helps to filter the array elements based on match string. You can use this function in any MS Office application to filter an array by matching a string. Syntax of VBA Filter Here is the syntax of the Filter function in VBA. It has 4 arguments, two are required arguments and other two are optional arguments. Here is the syntax for VBA Filter Function Filter( SourceArray, Match, [Include], [Compare] ) SourceArray is your main array contains the list of items. Match is the string which you want to match with the array items. Include is optional parameter and a Boolean True or False. True to includes the match items, and False do not include the match string. Compare is an optional parameter and it is to specify the comparison type: - vbBinaryCompare: To performs a binary comparison, this is the default value. - vbTextCompare : To performs a text comparison - vbDatabaseCompareTo performs a database comparison Example Code on Filter Function in VBA: Here is the Example code to filter the data using VBA Filter Function. This will filter an array matching with a string. Sub sbAT_VBA_Filter_Function() 'Declare an array variable to store the collection of items Dim myStringsArray As Variant 'Store few names in myStringsArray for testing purpose myStringsArray = Array("Ravi", "Mike", "Allen", "Tom", "Jenny", "James") 'Create another function to store the filtered data Dim myStringsArray_Filtered As Variant 'Let's Filter the contains "a" myStringsArray_Filtered = Filter(myStringsArray, "a") 'Let's Filter the NOT contains "a" myStringsArray_FilteredFalse = Filter(myStringsArray, "a", False) End Sub VBA AutoFilter Method: Helps to filter the data in Excel Range based on specific condition. You can use this function in any MS Excel to filter rows by based on required criteria. Syntax of VBA AutoFilter Here is the syntax of the AutoFilter method of Excel VBA. It has 4 arguments, two are required arguments and other two are optional arguments. Here is the syntax for VBA AutoFilter method Range . AutoFilter( Field , Criteria1 , Operator , Criteria2 , VisibleDropDown ) Field: offset number of the field of the target range. Criteria1: First criteria to filter the data Operator: Logical Operator to apply between Criteria 1 and 2 List of available operators: xlAnd, xlOr, xlBottom10Items, xlTop10Items, xlBottom10Percent, xlTop10Percent, xlFilterCellColor, xlFilterDynamic, xlFilterFontColor, xlFilterIcon, xlFilterValues Criteria2: First criteria to filter the data. VisibleDropDown: True to display the AutoFilter drop-down arrow for the filtered field. False to hide the drop-down arrow, default value is True. Example Code on AutoFilter Method in Excel VBA Here is the simple macro to filter the data in range A1 to H100 of active worksheet. It will match cells of column 2 and display the records if cells of column 2 contains “a”. Sub sbAT_VBA_AutoFilter_Method() ActiveSheet.Range("$A$1:$H$100").AutoFilter Field:=2, Criteria1:="=*a*" End Sub |Excel VBA Reference||Project Management Reference|
<urn:uuid:e0150019-d4e9-4527-b474-a83f18557eb0>
CC-MAIN-2019-47
https://analysistabs.com/vba/filter/autofilter/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496664469.42/warc/CC-MAIN-20191112001515-20191112025515-00253.warc.gz
en
0.67886
1,098
2.890625
3
Artificial Intelligence Courses Artificial intelligence (AI) refers to the ability of a computer program or machine to simulate human intelligence, including learning, reasoning, and problem-solving. AI encompasses the use of data science, computer science, machine learning, natural language processing, Python programming, and more. Examples of current AI usage include facial recognition, drones, and self-driving cars. Artificial intelligence has also been tested and implemented in the healthcare and financial industries, among others. Courses That Teach Artificial Intelligence The part-time Data Science course uses a project-based learning model, which allows students to use data analysis, modeling, Python programming, and more to solve real analytical problems. The part-time Machine Learning Course was designed to introduce students to the fundamentals of machine learning and computer programming. The Data Science bootcamp is an intensive course designed to launch students’ careers in data. Roles that require basic knowledge of Artificial Intelligence: - Data Scientist - Data Analyst - Data Engineer - Artificial Intelligence Engineer - AI Project Manager - Artificial Intelligence Consultant - Web Developer Take an Artificial Intelligence Course On-Campus You can take an Artificial Intelligence course at one of our beautiful campuses or online in the comfort of your own home or office. New York City, NY, 10012 460 King St W Toronto, ON, M5V 1K7 455 Granville St Vancouver, BC, V6C 1T1 The BrainStation Experience BrainStation provides a hands-on, project-based learning environment, allowing you to collaborate with professionals and Educators on a range of real-world projects. BrainStation Educators are the world's best digital experts and professionals, bringing experience and insight from some of the most innovative companies to the classroom. World-Class Hiring Partners BrainStation graduates are hired by industry-leading companies around the world, and over 90 percent of bootcamp graduates find work within six months. The Global Leader in Workforce Transformation BrainStation offers a full spectrum of cutting-edge, instructor-led digital skills training, online or at state-of-the-art campuses around the world. Speak to a Learning Advisor Join a network of over 100,000 professionals who have transformed their career through BrainStation. - Discover new courses and programs - Learn about tuition, payment plans, and scholarships - Get access to VIP events and workshops
<urn:uuid:d849752f-e73e-480a-a450-b9ea491efff1>
CC-MAIN-2021-43
https://brainstation.io/courses/artificial-intelligence
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584913.24/warc/CC-MAIN-20211016170013-20211016200013-00450.warc.gz
en
0.885025
504
3.109375
3
A question in quizbowl typically refers to one of three things: a tossup, a bonus, or a single part of a bonus. Together, they comprise the tossup/bonus format, in which the game is structured as a series of tossup/bonus cycles where the successful answering of a tossup will award a team the corresponding collaborative bonus. - See: tossups A tossup (or toss-up) is a question, usually containing several sentences, that is read out loud for both teams to attempt to answer. During a game, any player who believes they know the answer to a tossup can use their buzzer to interrupt the question and deliver an answer in an attempt to score points for their team. Tossup questions are the staple of gameplay for virtually all contemporary quizbowl. "Good quizbowl" advocates for tossups in pyramidal style, in which a question begins with more in-depth knowledge about the answer and progresses towards easier clues, the intent being that more knowledgeable teams should answer before less knowledgeable teams. In Britain, tossups may be called "starters." - See: bonuses A bonus is a set of several questions that the whole team can work together to answer. Bonuses are given as a reward to the team that answered a tossup immediately beforehand. A bonus is typically worth 30 points, and they have been standardized as three-part questions whose parts are worth 10 points each.
<urn:uuid:a50473b1-b5ba-41d3-8317-e65895286b7e>
CC-MAIN-2022-21
https://www.qbwiki.com/wiki/Question
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662631064.64/warc/CC-MAIN-20220527015812-20220527045812-00401.warc.gz
en
0.961715
306
2.8125
3
Section 1: Define the report. The purpose of this report is to analyse religious expression in New Zealand, specifically of certain cults, sects and the Catholic Church. I have chosen The Unification Church as a cult, 7th Day Adventists for my sect and the Catholic Church. I will investigate each religious expression, as well as compare and contrast them. Delving specifically into the Social Organisation, Religious Practice and Doctrine of each. As well as how the number of followers has changed in the past 20 years, and the possible reasons why. Section 2: Define the terms that you will be using in the report. Sect - A religious body that has deviated from a larger domination, following many of the larger domination’s teachings but differing on a number of key issues. Cult - A religious group normally held together by a dominant, often charismatic individual, or by the worship of a divinity or an idol of some sort. Followers adhere to an exclusive system of religious beliefs and practices that they practice in their life. A cult is separate from a religion, and nowadays is often viewed as a negative, controlling religious practice due to their ‘extreme’ beliefs. Religion - The expression of man’s belief in and reverence for a superhuman power or powers regarded as creating or governing the universe. Any personal or institutionalised system of beliefs or practices embodying this belief or reverence. Doctrine - A principle or body of principles taught or advocated in instruction presented for acceptance or belief. Normally originating from a sacred text such as the Bible or Koran. Ritual - The prescribed form or order of conducting a religious or other solemn ceremony. Actions believed to have symbolic value or traditional value. Social structure - The leadership structure that’s runs the cult/sect/religion deciding the direction of the faith and it’s beliefs. The relationship between
<urn:uuid:74c41b80-ee20-4811-9cf1-fee3315f7a42>
CC-MAIN-2023-40
https://www.studymode.com/essays/Sects-Cults-And-The-Catholic-Church-255190.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510284.49/warc/CC-MAIN-20230927071345-20230927101345-00288.warc.gz
en
0.943204
390
2.765625
3
More than 625,000 women and girls are held in prisons around the world. The majority are imprisoned for petty, non-violent offences, and frequently as a result, directly or indirectly, of discrimination and deprivation, often experienced at the hands of their husbands or partners, their family and the community. This briefing paper outlines the ways in which women and girls face discrimination in criminal justice systems and how their gender specific needs can be addressed. It includes references to relevant international standards, including the 2010 UN Bangkok Rules on the Treatment of Women Prisoners and Non-Custodial Sanctions for Women Offenders, and good practice examples from a range of countries. The paper covers the following issues. - Gender-specific / status offences - Disadvantages during penal procedures - Non-custodial measures - Vulnerability to sexual abuse - Imprisonment / Detention - Girls in prison A version of this briefing was also produced for parliamentarians attending the Inter-Parliamentary Union in October 2012 and was published in English, French, Spanish and Arabic. If you download a resource, please link to it from your website or share with your professional network.
<urn:uuid:a00cc4bc-c58c-48d1-a9cb-f81002bf3c9a>
CC-MAIN-2018-39
https://www.penalreform.org/resource/access-justice-discrimination-women-criminal-justice-systems/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159165.63/warc/CC-MAIN-20180923075529-20180923095929-00161.warc.gz
en
0.954579
241
2.78125
3
Pipilo maculatus ("Spotted Chirper") by Tom Hopkins, © 1999 This colorful and active resident of the Ventana is usually observed in coastal scrub, chaparral and oak woodlands. The adult spotted towhee is slightly smaller and more slender than a robin, measuring about 8" from tip of bill to tip of tail. The male (shown) has a black head and chest, black back and wings with abundant white spots, and black tail with white corners conspicuous in flight. Belly is white with robin red sides. The Female has plumage like the male except that the black areas in the male are sooty brown in the female. Both sexes have bright red eyes. The juvenile, during the first summer, has a streaked breast like a large sparrow with the white tail corners and red eyes. Spotted towhees in the Ventana spend much of their time on the ground or near it. Their typical foraging technique is to scratch through the organic litter, under shrubs, trees and occasionally in grassy areas, with both feet together looking for a variety of insects and seeds to eat. Their diet includes most insects, spiders, snails and other invertebrates, some small vertebrates, seeds, berries and acorns. Young are fed mostly insects and fruit. During courtship, the male often chases the female then fans his tail to display the white tail corners. During courtship and especially after mating and nest building, the male is often observed perched at the top of a low tree or shrub singing a repetitious buzzy trill: "chweeeeee, chweeeeee, chweeeeee." Nests are constructed by the female on the ground, often in a depression dug by the female. They are well hidden and usually located under chaparral or dense shrubs. Nests are sometimes located in a shrub, vine or small tree up to five feet above ground. The well concealed, bulky, cup shaped nest is constructed of bark fiber, leaves, twigs, grasses and roots then lined with fine grasses, rootlets, pine needles and animal hair. A clutch of 3-5 gray, creamy or olive colored eggs with brownish speckles is laid from mid-April through July. The female alone incubates the eggs for 12-13 days. Both adults feed the young who generally fledge within 10-12 days. The same pair often produces a second brood, with eggs laid 10-20 days after the first brood fledges. The whole family group, including young from both broods, often remain together into early autumn. Peterson, Roger Tory, Western Birds, Houghton Mifflin Co., Boston, Third Edition, 1990. Rising, James D., The Sparrows of the United States and Canada, Academic Press, New York, 1996. Scott, Shirley L. (ed.), Field Guide to the Birds of North America, National Geographic Society, Washington, D. C., Third Edition, 1999. Terres, John K., The Audubon Society Encyclopedia of North American Birds, Random House, New York, 1996.
<urn:uuid:0882ca44-d80c-4511-ad4b-5d065ba7c019>
CC-MAIN-2017-39
http://www.ventanawild.org/news/fe99/towhee.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685912.14/warc/CC-MAIN-20170919164651-20170919184651-00497.warc.gz
en
0.947387
668
2.90625
3
An introduction to validation challenges 31 January 2017 • Author(s): Salvatore Vetruccio, Assessor – CCS On-Board Department at Italcertifer Testing and validating an on-board ‘European Vital Computer’ (EVC) requires a specific test-environment with the ability to simulate all the stimulus, signalling and interfaces with which an EVC can exchange information. The European Union Agency for Railways has listed1 and publicly disseminated the performance requirements and guidelines to be utilised when developing such a facility. This article from Salvatore Vetruccio, Assessor – CCS On-Board Department at Italcertifer outlines the company’s efforts in developing such a system and the process that led to its success. Our work began with the aim of designing a system of simulation that best reproduces the environment around EVC during the time a train is in operation: the proposed model has got to recreate (indoors) a full series of railway scenarios that the vital computer will face during its operational lifetime2. Akiem Artesyn Embedded Technologies Bombardier Transportation Fenner Precision Frauscher Sensor Technology GHH-BONATRANS Harsco Rail McGeoch LED Technology Mechan Rosehill Rail Röchling Engineering Plastics SE & Co. KG Schenck Process GmbH SMTC Stadler Rail AG Weighwell Engineering Ltd
<urn:uuid:fea32663-f02e-43c8-ac98-b49ce517819f>
CC-MAIN-2017-13
https://www.europeanrailwayreview.com/31702/past-issues/issue-1-2017/introduction-validation-challenges/
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189474.87/warc/CC-MAIN-20170322212949-00639-ip-10-233-31-227.ec2.internal.warc.gz
en
0.887016
292
2.53125
3
Wow, that’s like three puns in one title. Anyway, scientists have revealed they have found large amounts of carbonates (minerals containing CO3 in them) in rocks on Mars. That’s kind of a big deal: it’s been expected that a lot of rocks would have this compound in them, because there’s lots of carbon dioxide afoot there, and plenty of evidence that Mars was once wet. Those two ingredients lead to carbonates. Yet the rocks looked at closely by the rovers have been strangely devoid of them. For the rover Opportunity it’s not all that strange; the water on that part of Mars was acidic, and that makes carbonates tough to form. But Spirit is on the other side of the planet, and it was expected it would find carbonates all over the place. Well, turns out it finally has. Some rocks it examined back in 2005 are loaded with carbonates, but it took this long to figure that out because dust that got in the instrument on the rover screwed things up. The scientists had to do some heroic work to tease the data out. At this point we’ve pretty much exhausted my knowledge of this, but happily we have access to Emily Lakdawalla and her blog, where she goes into detail about the rocks, talking to a scientist involved in all this, too. So go over there and get the rest of this interesting story. And when you’re over there, don’t forget: we’re talking about a whole planet here. A world. And it was once warmer, wetter, with a thicker atmosphere. Sure, it was over a billion years ago, but it’s always a good idea to keep an eye on Mars when thinking about Earth. There but for the grace of random chance go us.
<urn:uuid:5461b446-446e-4c8d-817a-a854018f3cb8>
CC-MAIN-2014-35
http://blogs.discovermagazine.com/badastronomy/2010/06/10/martian-soda-water-on-the-rocks/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834883.60/warc/CC-MAIN-20140820021354-00354-ip-10-180-136-8.ec2.internal.warc.gz
en
0.965081
384
2.515625
3
LUCKY SEVERSON, guest anchor: On our calendar this week, the eight-day Jewish observance of Passover. On Wednesday night, Jews will gather for a Seder, a special dinner, where they retell the story of their ancestors’ exodus from Egypt. The Seder ritual is guided by a special book called the Haggadah. In recent years, in addition to the traditional observance, some Jewish groups have developed Seders with a special focus. This year, Ma’yan, the Women’s Project at the Jewish Community Center of Manhattan, celebrated the tenth anniversary of its feminist Seder. The story from Kim Lawton. Rabbi JOY LEVITT (reading): Why is this night different from all other nights? KIM LAWTON: It’s a Passover Seder — but one quite different from most traditional Seders. This one recounts the children of Israel’s exodus from slavery in Egypt from the perspective of women. Rabbi LEVITT (Jewish Community Center, New York City) : A feminist Seder attempts to locate women in that story, not only the story of the liberation of the Israelites in Egypt but the continuing, evolving story of liberation of women everywhere. Rabbi LEVITT (reading with unidentified woman): What do we cleanse ourselves of tonight? The exhaustion of cleaning and cooking. The echo of exclusionary language. The weight of history. The fear of women’s voices. LAWTON: The feminist ritual is guided by a specially written Haggadah — or text — which uses feminine language for God. Daughters, instead of sons, ask the Four Questions, which help tell the story. Rabbi LEVITT: It’s important for every Jew to make this ritual his or her own. That’s the commandment that the rabbis bestow on us — that one needs to feel this experience personally LAWTON: The feminist Passover meal includes traditional symbolic foods such as unleavened bread, or matzoh; hard-boiled eggs; and bitter herbs. And something very nontraditional — an orange. Organizers aren’t sure exactly why the custom began — some say it symbolizes inclusion of gays and lesbians. Others say it’s in response to a man who once said the idea of a female rabbi was as ridiculous as an orange on a Seder plate. In the feminist Seder, Moses’s sister Miriam plays a key role. Rabbi LEVITT: She was a source of great energy, power, comfort, and nourishment to the Israelites as they made their way out of Egypt. LAWTON: In the traditional Seder, there is a cup of wine for the Prophet Elijah, who many Jews believe will herald the Messianic Age. In this meal, there’s also Miriam’s Cup, which is filled with water. Rabbi LEVITT: I like to think of Elijah’s cup as the cup that symbolizes the future, whereas I think Miriam’s cup really symbolizes the present. We wait for Elijah, but we work with Miriam. LAWTON: According to the Bible story, Miriam celebrated the exodus from Egypt with singing, dancing, and tambourine playing — a hallmark of every feminist Seder. The ritual details may be different, but organizers say they are celebrating the enduring Passover theme of liberation. Rabbi LEVITT: The message of the Seder really is that I can’t be free unless you are. And my responsibility is to work for your freedom just as your responsibility is to work for mine. LAWTON: I’m Kim Lawton reporting.
<urn:uuid:0fee913c-2406-44e2-8f6d-712845fc54a4>
CC-MAIN-2013-20
http://www.pbs.org/wnet/religionandethics/episodes/april-11-2003/womens-seder/15531/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705575935/warc/CC-MAIN-20130516115935-00059-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946051
795
2.625
3
A processor is being developed in Japan that will penetrate skin and paper at speeds up to 30Gbps Rohm, a Japanese component maker, has developed a processor that could eventually transmit and receive signals over short distances at 30 gigabits per second (Gbps) using the TeraHertz (THz) frequency band. The chip uses a waveband within the 100GHz to 10THz range of the electromagnetic spectrum, a section that lies between radio signals and visible light waves and has been difficult and expensive to detect in the past. This gives the signals the ability to penetrate thin barriers but it otherwise requires a direct “line of sight” placement. HDTV performance encouraging The experimental system passes data at 1.5Gbps but Rohm developers claim that this can be cranked up to 30Gbps if the processor goes into production. In an experiment at the current rate, a high-definition television (HDTV) programme was streamed without interruption but a higher bitrate will be required for future televisions with higher definition and 3D capabilities. Although Rohm is concentrating on TV and image projection systems at the moment, the new chips could find their way into IT and medical equipment in the future. The ability to pass through cloth, paper, plastic and skin adds to the attraction for these purposes. There is often a problem when technology is implanted in the human body. Gathering information or installing software upgrades can be difficult but Rohm claims that the device could come to market within four years at a price around £8. This could prove attractive to developers. Apart from being much cheaper than current equivalent systems, the Rohm development is also much more compact – which is another desirable quality. Current chips in this frequency band cost several thousand pounds, measure 20cm square and only achieve 0.1Gbps, Rohm claimed. The team developing the processor have several challenges to defeat before the chip is commercially viable. At the moment, the product is not durable or stable enough and work is in progress to improve these performance issues.
<urn:uuid:75e6a666-16d8-4e07-9b36-11b83ff42ea6>
CC-MAIN-2016-50
http://www.silicon.co.uk/workspace/rohms-30gbps-processor-works-in-thz-band-47812
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542588.29/warc/CC-MAIN-20161202170902-00041-ip-10-31-129-80.ec2.internal.warc.gz
en
0.951656
419
3.078125
3
Obstructive sleep apnea is a chronic and very common type of sleeping disorder. This condition affects breathing due to the relaxation of the muscles at the back of your throat. There are several signs and symptoms that are associated with OSA. These include excessive daytime sleepiness, insomnia, snoring and choking sounds while sleeping. Read on… Un-stuffing Your Stuffy Nose: What You Need To Know So You Can Breathe Better, Sleep Better, & Live Better As a dentist in Marietta, we focus on keeping our patients in excellent oral health and part of that process is understanding how the entire body works together. Oral health, as with the health of any part of your body, is not isolated. This is why something like gum disease can impact your gums, teeth and even your heart. Even your breathing connects to your oral health. The importance of sleep In Sleep Interrupted by Steven Y. Park, M.D there is discussion around the negative side effects of breathing through your mouth. While it may seem natural to switch between the mouth and nose breathing, there are distinct health advantages to breathing through your nose. The first of these is that you will receive more oxygen. Nitric oxide helps the body to receive more oxygen. When you breathe through your nose, you create small amounts of this gas that helps your lungs to absorb oxygen. As a result, you will receive 10 to 25 percent more oxygen and have more energy. As a dentist in Marietta, I frequently work with patients that do not get enough oxygen while they sleep due to obstructive sleep apnea. This condition is generally caused by the lower jaw and tongue falling backward and blocking the airway. This condition can lead people to feel so incredibly fatigued that they cannot stay up past dinner, fall asleep when doing activities like watching television or working on the computer, etc. I treat this condition using a non-invasive, removable oral appliance. The results are consistent and dramatic as patients begin to breathe freely at night and wake up feeling refreshed for the first time in months or years. Through these treatments, I witness firsthand the importance of getting the right amount of oxygen. This makes the studies on nose breathing even more interesting because if you could change how you are breathing, you could start to feel more energized than you have in years and begin to enjoy life more thoroughly. Treating other health issues Simultaneously, this makes it important to treat any problems that you have with your nose right away. If you have a sinus infection or too much mucus, it needs treatment with a visit to your primary care doctor. Clearing the mucus can help you to breathe through your nose during the day and improve your breathing at night. While obstructive sleep apnea is typically a result of the tongue blocking the airways, it worsens from a plugged up nose. In this case, wearing a removable oral appliance while sleeping becomes even more important. As a dentist, I can examine you and suggest steps for an at-home sleep study to determine if you have obstructive sleep apnea. If you do, we will make an impression of your mouth and take measurements. This information will then be sent to the dental lab for your oral appliance to be created. It will fit perfectly so that you can sleep without it moving out of place or causing you any discomfort. This, combined with treating any sinus problems that you have, can help you to get more oxygen while sleeping. Breathing through your nose during the day will further improve your oxygen levels, making it possible to have the energy you need to enjoy more strenuous activities. Looking for ways to solve your sleep apnea issues? Whether you have been officially diagnosed with this serious sleeping disorder or are exhibiting one or more signs of this condition, making an appointment with a dentist for a complete evaluation is your next step.While many people believe that only a medical professional can solve sleep… TMJ disorder affects millions of Americans each year. The good news is the condition can be treated through non-invasive measures when corrected before the discomfort and tension begin to worsen. This review discusses TMJ disorder and looks at the symptoms of discomfort and tension, focusing on why they occur and how they can be relieved.TMJ… Uncomfortable dentures need professional denture repair. This ensures the proper function, fit, and appearance of your dentures. Ignoring any damage in your dental appliance can cause pain, discomfort, or even infection. If you want to find out the advantages of getting professional denture repair, here are the details.A professional provider of denture repair can enhance…
<urn:uuid:c91673ac-32a5-49a5-8e35-963fb614cf78>
CC-MAIN-2021-43
https://www.mytotaldentistry.com/blog/un-stuffing-stuffy-nose-need-know-can-breathe-better-sleep-better-live-better/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585204.68/warc/CC-MAIN-20211018155442-20211018185442-00015.warc.gz
en
0.947429
947
2.5625
3
Nothing in life is free. Money doesn’t grow on trees. These were the money mantras baby boomers heard from parents who lived through the Great Depression. Most of the baby boomer generation were brought up with a strong work ethic and most held down an after-school job, like cutting lawns or delivering the newspapers. Some had allowances for doing chores around the house. And a few were given allowances without doing anything. But for the most, if you wanted something, you got a job and saved for it. Some boomers thought that their Great Depression parents were stingy about money; thought they were tight fisted misers. Others viewed their parent’s conservative spending as frugality against an unknown future. After all, another Great Depression could emerge from a slow economy. Back in the Fonzie era your family’s wealth, or the lack thereof, was judged by the location of your home and the car that you drove. Securing a mortgage or a car loan wasn’t a slam-dunk. But that all changed with the invention of credit for about any item you could desire. Introducing easy access to large amounts of credit was the greatest contribution to the economy the baby boomers ever made to society. Consumer credit would become the engine of the American economy and its government. But is debt sustainable? The emotion of instant gratification dulls your senses to high interest rates. The feel- good attributes of acquiring immediate possessions blinds most consumers to the consequences of long-term indebtedness. And the marketers of your soul did this by addicting you to minimum payments. Never mind that you were paying loan shark interest rates. The power to purchase almost anything at will, without considering its value or real necessity, and the failure to exercise a little self-denial, created demand spending at both the consumer and governmental level. Marketing and sales campaigns fixated around creating insecurities in your psyche about some product line they were selling by making it “in” to own it, “cool” to have it, and a sign of true success to flaunt it. But as the predecessors of the baby boomer generation constantly chanted, “sooner or later you’re going to have to pay the piper.”
<urn:uuid:11115e05-2e94-4195-84ed-4270db7b7f2c>
CC-MAIN-2019-35
https://news.findit.com/news/1809514/upbringing-can-create-attitudes-about-money-especially-holiday-spending
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314130.7/warc/CC-MAIN-20190818205919-20190818231919-00556.warc.gz
en
0.979122
470
2.703125
3
What Is a Leverage Ratio? A leverage ratio is any one of several financial measurements that look at how much capital comes in the form of debt (loans) or assesses the ability of a company to meet its financial obligations. The leverage ratio category is important because companies rely on a mixture of equity and debt to finance their operations, and knowing the amount of debt held by a company is useful in evaluating whether it can pay off its debts as they come due. Several common leverage ratios are discussed below. - A leverage ratio is any one of several financial measurements that assesses the ability of a company to meet its financial obligations. - A leverage ratio may also be used to measure a company's mix of operating expenses to get an idea of how changes in output will affect operating income. - Common leverage ratios include the debt-equity ratio, equity multiplier, degree of financial leverage, and consumer leverage ratio. - Banks have regulatory oversight on the level of leverage they are can hold. Understanding The Leverage Ratio What Does a Leverage Ratio Tell You? Too much debt can be dangerous for a company and its investors. However, if a company's operations can generate a higher rate of return than the interest rate on its loans, then the debt may help to fuel growth. Uncontrolled debt levels can lead to credit downgrades or worse. On the other hand, too few debts can also raise questions. A reluctance or inability to borrow may be a sign that operating margins are tight. There are several different ratios that may be categorized as a leverage ratio, but the main factors considered are debt, equity, assets, and interest expenses. A leverage ratio may also be used to measure a company's mix of operating expenses to get an idea of how changes in output will affect operating income. Fixed and variable costs are the two types of operating costs; depending on the company and the industry, the mix will differ. Finally, the consumer leverage ratio refers to the level of consumer debt compared to disposable income and is used in economic analysis and by policymakers. Banks and Leverage Ratios Banks are among the most leveraged institutions in the United States. The combination of fractional-reserve banking and Federal Deposit Insurance Corporation (FDIC) protection has produced a banking environment with limited lending risks. To compensate for this, three separate regulatory bodies, the FDIC, the Federal Reserve, and the Comptroller of the Currency, review and restrict the leverage ratios for American banks. This means they restrict how much money a bank can lend relative to how much capital the bank devotes to its own assets. The level of capital is important because banks can "write down" the capital portion of their assets if total asset values drop. Assets financed by debt cannot be written down because the bank's bondholders and depositors are owed those funds. Banking regulations for leverage ratios are complicated. The Federal Reserve created guidelines for bank holding companies, although these restrictions vary depending on the rating assigned to the bank. In general, banks that experience rapid growth or face operational or financial difficulties are required to maintain higher leverage ratios. There are several forms of capital requirements and minimum reserve placed on American banks through the FDIC and the Comptroller of the Currency that indirectly impacts leverage ratios. The level of scrutiny paid to leverage ratios has increased since the Great Recession of 2007 to 2009 when banks that were "too big to fail" were a calling card to make banks more solvent. These restrictions naturally limit the number of loans made because it is more difficult and more expensive for a bank to raise capital than it is to borrow funds. Higher capital requirements can reduce dividends or dilute share value if more shares are issued. For banks, the tier 1 leverage ratio is most commonly used by regulators. Leverage Ratios for Evaluating Solvency and Capital Structure Perhaps the most well known financial leverage ratio is the debt-to-equity ratio. The Debt-to-Equity (D/E) Ratio This is expressed as: Debt-to-Equity Ratio=Total Shareholders’ EquityTotal Liabilities For example, United Parcel Service's long-term debt for the quarter ending December 2019 was $21.8 billion. United Parcel Service's total stockholders' equity for the ending December 2019 was $3.3 billion. The company's D/E for the quarter was 8.62. That is considered high. A high debt/equity ratio generally indicates that a company has been aggressive in financing its growth with debt. This can result in volatile earnings as a result of the additional interest expense. If the company's interest expense grows too high, it may increase the company's chances of a default or bankruptcy. Typically, a D/E ratio greater than 2.0 indicates a risky scenario for an investor; however, this yardstick can vary by industry. Businesses that require large capital expenditures (CapEx), such as utility and manufacturing companies, may need to secure more loans than other companies. It's a good idea to measure a firm's leverage ratios against past performance and with companies operating in the same industry to better understand the data. Fedex has a D/E ratio of 1.78, so there is cause for concern where UPS is concerned. However, most analysts consider that UPS earns enough cash to cover its debts. The Equity Multiplier The equity multiplier is similar, but replaces debt with assets in the numerator: Equity Multiplier=Total EquityTotal Assets For example, assume that Macy's (NYSE: M) has assets valued at $19.85 billion and stockholder equity of $4.32 billion. The equity multiplier would be: $19.85 billion÷$4.32 billion=4.59 Although debt is not specifically referenced in the formula, it is an underlying factor given that total assets includes debt. Remember that Total Assets = Total Debt + Total shareholders' Equity. The company's high ratio of 4.59 means that assets are mostly funded with debt than equity. From the equity multiplier calculation, Macy's assets are financed with $15.53 billion in liabilities. The equity multiplier is a component of the DuPont analysis for calculating return on equity (ROE): DuPont analysis=NPM×AT×EMwhere:NPM=net profit marginAT=asset turnoverEM=equity multiplier The Debt-to-Capitalization Ratio An indicator that measures the amount of debt in a company’s capital structure is the debt-to-capitalization ratio, which measures a company’s financial leverage. It is calculated as: Total debt to capitalization=(SD+LD+SE)(SD+LD)where:SD=short-term debtLD=long-term debtSE=shareholders’ equity In this ratio, operating leases are capitalized and equity includes both common and preferred shares. Instead of using long-term debt, an analyst may decide to use total debt to measure the debt used in a firm's capital structure. The formula, in this case, would include minority interest and preferred shares in the denominator. Degree of Financial Leverage Degree of financial leverage (DFL) is a ratio that measures the sensitivity of a company’s earnings per share (EPS) to fluctuations in its operating income, as a result of changes in its capital structure. It measures the percentage change in EPS for a unit change in earnings before interest and taxes (EBIT) and is represented as: DFL=% change in EBIT% change in EPSwhere:EPS=earnings per shareEBIT=earnings before interest and taxes DFL can alternatively be represented by the equation below: This ratio indicates that the higher the degree of financial leverage, the more volatile earnings will be. Since interest is usually a fixed expense, leverage magnifies returns and EPS. This is good when operating income is rising, but it can be a problem when operating income is under pressure. The Consumer Leverage Ratio The consumer leverage ratio is used to quantify the amount of debt the average American consumer has relative to their disposable income. Some economists have stated that the rapid increase in consumer debt levels has been a contributing factor to corporate earnings growth over the past few decades. Others blamed the high level of consumer debt as a major cause of the great recession. Consumer leverage ratio=Disposable personal incomeTotal household debt Understanding how debt amplifies returns is the key to understanding leverage. Debt is not necessarily a bad thing, particularly if the debt is taken on to invest in projects that will generate positive returns. Leverage can thus multiply returns, although it can also magnify losses if returns turn out to be negative. The Debt-To-Capital Ratio The debt-to-capital ratio is a measurement of a company's financial leverage. It is one of the more meaningful debt ratios because it focuses on the relationship of debt liabilities as a component of a company's total capital base. Debt includes all short-term and long-term obligations. Capital includes the company's debt and shareholders' equity. This ratio is used to evaluate a firm's financial structure and how it is financing operations. Typically, if a company has a high debt-to-capital ratio compared to its peers, it may have a higher default risk due to the effect the debt has on its operations. The oil industry seems to have about a 40% debt-to-capital threshold. Above that level, debt costs increase considerably. The Debt-To-EBITDA Leverage Ratio The debt-to-EBITDA leverage ratio measures a company's ability to pay off its incurred debt. Commonly used by credit agencies, this ratio determines the probability of defaulting on issued debt. Since oil and gas companies typically have a lot of debt on their balance sheets, this ratio is useful in determining how many years of EBITDA would be required to pay back all the debt. Typically, it can be alarming if the ratio is over 3, but this can vary depending on the industry. The Debt-To-EBITDAX Ratio Another variation of the debt-to-EBITDA ratio is the debt-to-EBITDAX ratio, which is similar, except EBITDAX is EBITDA before exploration costs for successful efforts companies. This ratio is commonly used in the United States to normalize different accounting treatments for exploration expenses (the full cost method versus the successful efforts method). Exploration costs are typically found in the financial statements as exploration, abandonment, and dry hole costs. Other noncash expenses that should be added back in are impairments, accretion of asset retirement obligations, and deferred taxes. The Interest Coverage Ratio Another leverage ratio concerned with interest payments is the interest coverage ratio. One problem with only reviewing the total debt liabilities for a company is they do not tell you anything about the company's ability to service the debt. This is exactly what the interest coverage ratio aims to fix. This ratio, which equals operating income divided by interest expenses, showcases the company's ability to make interest payments. Generally, a ratio of 3.0 or higher is desirable, although this varies from industry to industry. The Fixed-Charge Coverage Ratio Times interest earned (TIE), also known as a fixed-charge coverage ratio, is a variation of the interest coverage ratio. This leverage ratio attempts to highlight cash flow relative to interest owed on long-term liabilities. To calculate this ratio, find the company's earnings before interest and taxes (EBIT), then divide by the interest expense of long-term debts. Use pre-tax earnings because interest is tax-deductible; the full amount of earnings can eventually be used to pay interest. Again, higher numbers are more favorable.
<urn:uuid:5b10d2e4-f685-4b93-99f9-4e80f85f7070>
CC-MAIN-2020-40
https://www.investopedia.com/terms/l/leverageratio.asp
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400228998.45/warc/CC-MAIN-20200925213517-20200926003517-00211.warc.gz
en
0.948448
2,430
2.890625
3
When John Mitchell arrived in Newcastle in the final year of the eighteenth century there were already three newspapers produced in the town. The first newspaper on Tyneside - ‘The Newcastle Gazette or The Northern Courant, Being an Impartial account of Remarkable Transactions, Foreign or Domestic’ - was published in 1710 (copies can be found in the Advocates Library in Edinburgh dated Saturday 23 December to Monday 25 December 1710). While most towns in eighteenth century struggled to support a single newspaper, Newcastle published three ‘respectable family weeklies’ (the Courant, the Chronicle and the Advertiser) as well as ten periodicals. None of these publications had advanced views on political subjects. By the nineteenth century the press performed a political function, not simply as a campaigning arm for the middle classes but a voice for progressive reform. The first such organ was John Mitchell’s Tyne Mercury (the ‘only newspaper published on Tuesday betwixt York and Edinburgh’), which first appeared on 1 June 1802 and whose offices were originally on Dean Street. John Mitchell, who arrived from Carlisle in 1799, was born in Ayr and apprenticed to Wilson, the Kilmarnock printer of Rabbie Burns. In Newcastle Mitchell set up shop on Pilgrim St and published chapbooks and moral tales for street hawkers. His statement of arrival was the publication of a directory of Newcastle in 1801 (‘printed and sold by J Mitchell, Dean St, Price Two Shillings’). By this time Mitchell had moved to larger premises, finally moving to St Nicholas’ Churchyard in 1811. Mitchell was a substantial bookseller, with an extensive stock, but gave up retail in 1809. His politics were radical, and at first he struggled against opposition from pamphleteers who disliked his politics. He was lampooned in the theatre and a public war with an actor started up when Mitchell responded by publishing a pamphlet. He struggled to find a readership and had difficulty getting customers to advertise. His friends rallied round including the Rev William Turner and a number of able writers contributed to the paper. By the time of its tenth anniversary the Mercury was established among the political organs of the north. Indeed, in 1812 Mitchell could point to a circulation of 1,550 copies – a figure more than double that of any other Northumberland or Durham newspaper. Current events, notably the wars with revolutionary France, played a part in the success. The established papers published at the end of the week, but Mitchell would travel to London to pick up the latest news then head back to Newcastle to publish on Tuesday, before any of the London papers had arrived. The low cost - the Mercury cost 6d – helped too. Papers could be found in reading rooms, and a single copy might be shared between a group of men over a pint and the contents discussed. In April 1814 – the month Napoleon surrendered - Mitchell claimed that his circulation stood at 2,475 copies. Mitchell was editor, sub-editor, reporter and publisher: his writing was described as ‘strong, vigorous and trenchant’. During the winter of 1818 he fell ill and died, aged 47, on 24 April 1819 at his house Chimney Mills. He was radical in religion as well as politics and had chosen his burial plot at the bottom of his garden where he’d planted lilacs, laburnums and other shrubs. The Unitarian Rev William Turner of the Hanover Square Chapel conducted the service. Mitchell’s obituary described him as an ‘ardent advocate of the principles of civil and religious liberty’. His sons carried on the paper with W. A. Mitchell as editor who, writing as ‘Tim Tunbelly’, waged war against the excesses of the Corporation. The brothers, William and Henry, sold the paper in 1842. They founded the Newcastle Magazine in 1820 which ran for 11 years. In 1836 William became a member of the Town Council. M. Milne, 'The Tyne Mercury and Parliamentary Reform', Northern History, 14:1 (1978), 227-42.
<urn:uuid:0084c60c-278d-46a5-b4f3-4dc9e56b1217>
CC-MAIN-2020-05
http://radicaltyneside.org/events/john-mitchell-radical-publisher-1772-1819
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593937.27/warc/CC-MAIN-20200118193018-20200118221018-00155.warc.gz
en
0.97518
855
2.640625
3
Objective: Assignment Day is an important tradition in the lives of the children of Ember. The objective of this lesson is to consider the importance of traditions and how traditions begin. 1) 1. For class discussion: Ask students to consider how Assignment Day became such an important tradition in the lives of students. Encourage students to realize the lifestyle and needs of the city and its inhabitants played an important role in establishing that tradition. 2. For homework: Have students write a comparison of Assignment Day to any tradition celebrated in America today. Encourage students to include how the traditions came into being and how they are celebrated. 3. For class work: Break students into groups of three or four. Have each group come up with a list of at least three traditions common in Ember and at least three traditions common in their own families. 4. For class discussion: Ask students... This section contains 4,997 words (approx. 17 pages at 300 words per page)
<urn:uuid:bfd3cfd2-e594-4f3d-a0f1-4c535545ea98>
CC-MAIN-2015-11
http://www.bookrags.com/lessonplan/the-city-of-ember/lessons.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463708.99/warc/CC-MAIN-20150226074103-00070-ip-10-28-5-156.ec2.internal.warc.gz
en
0.959258
199
4.25
4
Striking American Railway Union members confront Illinois National Guard troops in Chicago during the Pullman Strike |Location||Pullman, Chicago; throughout the United States| |Methods||Strikes, Protest, Demonstrations| |Parties to the civil conflict| The Pullman Strike was a nationwide railroad strike in the United States in the summer of 1894. It pitted the American Railway Union (ARU) against the Pullman Company, the main railroads, and the federal government of the United States under President Grover Cleveland. The strike and boycott shut down much of the nation's freight and passenger traffic west of Detroit, Michigan. The conflict began in Pullman, Chicago, on May 11 when nearly 4,000 factory employees of the Pullman Company began a wildcat strike in response to recent reductions in wages. Most factory workers who built Pullman cars lived in the "company town" of Pullman on the South Side of Chicago, Illinois. The industrialist George Pullman had designed it ostensibly as a model community. When his company laid off workers and lowered wages, it did not reduce rents, and the workers called for a strike. They had not formed a union. Founded in 1893 by Eugene V. Debs, the ARU was an organization of unskilled railroad workers. Debs brought in ARU organizers to Pullman and signed up many of the disgruntled factory workers. When the Pullman Company refused recognition of the ARU or any negotiations, ARU called a strike against the factory, but it showed no sign of success. To win the strike, Debs decided to stop the movement of Pullman cars on railroads. The over-the-rail Pullman employees (such as conductors and porters) did not go on strike. Debs and the ARU called a massive boycott against all trains that carried a Pullman car. It affected most rail lines west of Detroit and at its peak involved some 250,000 workers in 27 states. The Railroad brotherhoods and the American Federation of Labor (AFL) opposed the boycott, and the General Managers Association of the railroads coordinated the opposition. Thirty people were killed in response to riots and sabotage that caused $80 million in damages. The federal government secured a federal court injunction against the union, Debs, and the top leaders, ordering them to stop interfering with trains that carried mail cars. After the strikers refused, President Grover Cleveland ordered in the Army to stop the strikers from obstructing the trains. Violence broke out in many cities, and the strike collapsed. Defended by a team including Clarence Darrow, Debs was convicted of violating a court order and sentenced to prison; the ARU dissolved. During a severe depression (the Panic of 1893), the Pullman Palace Car Company cut wages as demand for new passenger cars plummeted and the company's revenue dropped. A delegation of workers complained that wages had been cut but not rents at their company housing or other costs in the company town. The company owner, George Pullman, refused to lower rents or go to arbitration. Many of the Pullman factory workers joined the American Railway Union (ARU), led by Eugene V. Debs, which supported their strike by launching a boycott in which ARU members refused to run trains containing Pullman cars. The plan was to force the railroads to bring Pullman to compromise. Debs began the boycott on June 26, 1894. Within four days, 125,000 workers on twenty-nine railroads had "walked off" the job rather than handle Pullman cars. The railroads coordinated their response through the General Managers' Association, which had been formed in 1886 and included 24 lines linked to Chicago. The railroads began hiring replacement workers (strikebreakers), which increased hostilities. Many blacks were recruited as strikebreakers and crossed picket lines, as they feared that the racism expressed by the American Railway Union would lock them out of another labor market. This added racial tension to the union's predicament. On June 29, 1894, Debs hosted a peaceful meeting to rally support for the strike from railroad workers at Blue Island, Illinois. Afterward, groups within the crowd became enraged and set fire to nearby buildings and derailed a locomotive. Elsewhere in the western states, sympathy strikers prevented transportation of goods by walking off the job, obstructing railroad tracks, or threatening and attacking strikebreakers. This increased national attention and the demand for federal action. Under direction from President Grover Cleveland, the US Attorney General Richard Olney (formerly a lawyer for a railroad) dealt with the strike. Olney obtained an injunction in federal court barring union leaders from supporting the strike and demanding that the strikers cease their activities or face being fired. Debs and other leaders of the ARU ignored the injunction, and federal troops were called up to enforce it. While Debs had been reluctant to start the strike, he threw his energies into organizing it. He called a general strike of all union members in Chicago, but this was opposed by Samuel Gompers, head of the AFL, and other established unions, and it failed. City by city the federal forces broke the ARU efforts to shut down the national transportation system. Thousands of United States Marshals and some 12,000 United States Army troops, commanded by Brigadier General Nelson Miles, took action. President Cleveland wanted the trains moving again, based on his legal, constitutional responsibility for the mails. His lawyers argued that the boycott violated the Sherman Antitrust Act, and represented a threat to public safety. The arrival of the military and the subsequent deaths of workers in violence led to further outbreaks of violence. During the course of the strike, 30 strikers were killed and 57 were wounded. Property damage exceeded $80 million. The strike affected hundreds of towns and cities across the country. Railroad workers were divided, for the old established Brotherhoods, which included the skilled workers such as engineers, firemen and conductors, did not support the labor action. ARU members did support the action, and often comprised unskilled ground crews. In many areas townspeople and businessmen generally supported the railroads while farmers—many affiliated with the Populists—supported the ARU. In Billings, Montana, an important rail center, a local Methodist minister, J. W. Jennings, supported the ARU. In a sermon he compared the Pullman boycott to the Boston Tea Party, and attacked Montana state officials and President Cleveland for abandoning "the faith of the Jacksonian fathers." Rather than defending "the rights of the people against aggression and oppressive corporations," he said party leaders were "the pliant tools of the codfish monied aristocracy who seek to dominate this country." Billings remained quiet but on July 10, soldiers reached Lockwood, Montana, a small rail center, where the troop train was surrounded by hundreds of angry strikers. Narrowly averting violence, the army opened the lines through Montana. When the strike ended, the railroads fired and blacklisted all the employees who had supported it. In California the boycott was effective in Sacramento, a labor stronghold, but weak in the Bay Area and minimal in Los Angeles. The strike lingered as strikers expressed longstanding grievances over wage reductions, and indicated how unpopular the Southern Pacific Railroad was. Strikers engaged in violence and sabotage; the companies saw it as civil war while the ARU proclaimed it was a crusade for the rights of unskilled workers. Public opinion was mostly opposed to the strike and supported Cleveland's actions. Republicans and eastern Democrats supported Cleveland (the leader of the northeastern pro-business wing of the party), while southern and western Democrats, as well as Populists, generally denounced him. Governor John Peter Altgeld of Illinois, a Democrat, denounced Cleveland and said he could handle all disturbances in his state without federal intervention. Media coverage was extensive and generally negative. A common trope in news reports and editorials depicted the boycotters as foreigners who contested the patriotism expressed by the militias and troops involved, as numerous recent immigrants worked in the factories and on the railroads. The editors warned of mobs, aliens, anarchy, and defiance of the law. The New York Times called it "a struggle between the greatest and most important labor organization and the entire railroad capital." In Chicago the established church leaders denounced the boycott, but some younger Protestant ministers defended it. Debs was arrested on federal charges, including conspiracy to obstruct the mail as well as disobeying an order directed to him by the Supreme Court to stop the obstruction of railways and to dissolve the boycott. He was defended by Clarence Darrow, a prominent attorney, as well as Lyman Trumbull. At the conspiracy trial Darrow argued that it was the railways, not Debs and his union, that met in secret and conspired against their opponents. Sensing that Debs would be acquitted, the prosecution dropped the charge when a juror took ill. Although Darrow also represented Debs at the United States Supreme Court for violating the federal injunction, Debs was sentenced to six months in prison. At the time of his arrest, Debs was not a socialist. During his time in prison, he read the works of Karl Marx. After his release in 1895, he became the leading socialist figure in the United States. He ran for president in 1900 for the first of five times as head of the Socialist Party ticket. Civil as well as criminal charges were brought against the organizers of the strike and Debs in particular, and the Supreme Court issued a unanimous decision, In re Debs, that rejected Debs' actions. The Illinois Governor John P. Altgeld was incensed at Cleveland for putting the federal government at the service of the employers, and for rejecting Altgeld's plan to use his state militia rather than federal troops to keep order. Cleveland's administration appointed a national commission to study the causes of the 1894 strike; it found George Pullman's paternalism partly to blame and described the operations of his company town to be "un-American". In 1898, the Illinois Supreme Court forced the Pullman Company to divest ownership in the town, as its company charter did not authorize such operations, and the land was annexed to Chicago. Much of it is now designated as an historic district, which is listed on the National Register of Historic Places. In 1894, in an effort to conciliate organized labor after the strike, President Grover Cleveland and Congress designated Labor Day as a federal holiday. Legislation for the holiday was pushed through Congress six days after the strike ended. Samuel Gompers, who had sided with the federal government in its effort to end the strike by the American Railway Union, spoke out in favor of the holiday. - " The Pullman Strike and Boycott," Annals of American History. <http://www.america.eb.com/america/article?articleId=386364&query=pullman+strike> [Accessed January 24, 2014]. - Ray Ginger, Eugene V. Debs (1962) p 170 - Papke, David Ray (1999). The Pullman Case: The Clash of Labor and Capital in Industrial America. Landmark law cases & American society. Lawrence, Kansas: University Press of Kansas. pp. 35–37. ISBN 0-7006-0954-7. - Joseph C. Bigott (2001). From Cottage to Bungalow: Houses and the Working Class in Metropolitan Chicago, 1869-1929. U. of Chicago Press. p. 93. - Richard Schneirov; Shelton Stromquist; Nick Salvatore (19919). The Pullman Strike and Crisis of 1890s: Essays on Labor and Politics. U. of Illinois Press. p. 137. - Wish, "The Pullman Strike" - Donald L. McMurry, "Labor Policies of the General Managers' Association of Chicago, 1886-1894," Journal of Economic History (1953) 13#2 pp. 160-178 in JSTOR - David E. Bernstein, Only One Place of Redress (2001) p. 54 - Harvey Wish, "The Pullman Strike: A Study in Industrial Warfare," Journal of the Illinois State Historical Society (1939) 32#3, pp. 288-312 in JSTOR - Eric Arnesen (2004). The Human Tradition in American Labor History. Rowman & Littlefield. p. 96. - Salvatore, Debs pp 134-37 - John R. Commons et al. (1918). History of Labour in the United States vol 2. Macmillan. p. 502. - Carroll Van West, Capitalism on the Frontier: Billings and the Yellowstone Valley in the Nineteenth Century (1993) p 200 - Van West, Capitalism on the Frontier: Billings and the Yellowstone Valley in the Nineteenth Century, p 200 - William W. Ray, "Crusade or Civil War? The Pullman Strike in California," California History (1979) 58#1 pp 20-37. - Allan Nevins, Grover Cleveland: A Study in Courage (1933) pp 624-7 - H.W. Brands (2002). The Reckless Decade: America in the 1890s. U. of Chicago Press. p. 153. - Troy Rondinone, "Guarding the Switch: Cultivating Nationalism during the Pullman Strike," Journal of the Gilded Age and Progressive Era (2009) 8#1 pp 83-109. - Donald L. Miller (1997). City of the Century: The Epic of Chicago and the Making of America. Simon and Schuster. p. 543. - Heath W. Carter, "Scab Ministers, Striking Saints: Christianity and Class Conflict in 1894 Chicago," American Nineteenth Century History (2010) 11#3 pp 321-349 - John A. Farrell (2011). Clarence Darrow: Attorney for the Damned. Random House Digital, Inc. pp. 69–72. - Peter Zavodnyik (2011). The Rise of the Federal Colossus: The Growth of Federal Power from Lincoln to F.D.R.. ABC-CLIO. pp. 233–34. - Dennis R. Judd; Paul Kantor (1992). Enduring tensions in urban politics. Macmillan. - "Online NewsHour: Origins of Labor Day – September 2, 1996". PBS. Retrieved July 25, 2011. - Bill Haywood, The Autobiography of Big Bill Haywood, 1929, p. 78 ppbk. - Grover Cleveland (1913), The government in the Chicago strike of 1894, Princeton: Princeton University Press, OCLC 1920888 - Ginger, Ray. The Bending Cross: A Biography of Eugene V. Debs. New Brunswick, NJ: Rutgers University Press, 1949. - Hirsch, Susan Eleanor. After the Strike: A Century of Labor Struggle at Pullman. Urbana, IL: University of Illinois Press, 2003. - Lindsey, Almont. The Pullman Strike: The Story of a Unique Experiment and of a Great Labor Upheaval. Chicago: University of Chicago Press, 1943. - Lindsey, Almont. "Paternalism and the Pullman Strike," American Historical Review, Vol. 44, No. 2 (Jan., 1939), pp. 272–289 in JSTOR - Nevins, Allan Nevins. Grover Cleveland: A Study in Courage. (1933) pp. 611–28 - Papke, David Ray. The Pullman Case: The Clash of Labor and Capital in Industrial America. Lawrence, KS: University Press of Kansas, 1999. - Rondinone, Troy. "Guarding the Switch: Cultivating Nationalism During the Pullman Strike," Journal of the Gilded Age & Progressive Era 2009 8(1): 83–109 27p. - Salvatore, Nick. Eugene V. Debs: Citizen and Socialist. Urbana, IL: University of Illinois Press, 1984. - Schneirov, Richard, et al. (eds.) The Pullman Strike and the Crisis of the 1890s: Essays on Labor and Politics. Urbana, IL: University of Illinois Press, 1999. - Smith, Carl. Urban Disorder and the Shape of Belief: The Great Chicago Fire, the Haymarket Bomb, and the Model Town of Pullman. Chicago: University of Chicago Press, 1995. - Winston, A.P. "The Significance of the Pullman Strike," Journal of Political Economy, vol. 9, no. 4 (Sept. 1901), pp. 540-561. In JSTOR - Wish, Harvey. "The Pullman Strike: A Study in Industrial Warfare," Journal of the Illinois State Historical Society (1939) 32#3 pp. 288–312 in JSTOR - United States Strike Commission, Report on the Chicago Strike of June–July, 1894. Washington, DC: Government Printing Office, 1895. - Pullman Strike Timeline - Chicago Strike - Pullman strike town - The Pullman Strike, Illinois During the Gilded Age 1866–1894, Illinois Historical Digitization Projects at Northern Illinois University Libraries
<urn:uuid:8980d079-0560-4a74-9660-6e2a7c757ee2>
CC-MAIN-2014-35
http://en.wikipedia.org/wiki/Pullman_Strike
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500801235.4/warc/CC-MAIN-20140820021321-00099-ip-10-180-136-8.ec2.internal.warc.gz
en
0.938969
3,569
3.609375
4
The following guest post about the need to recycle comes from Laura Scott, webmaster for the Toymaker of Williamsburg. “Bobby, why are you throwing that water bottle in the trash?You should always recycle plastic, glass, and paper products.”Maria said. “Why Maria? It’s all trash. Who cares if I throw it away or recycle it,” said Bobby. “Chipmunks and squirrels and birds care,” answered Maria. She continued saying, “Every time you recycle, you save a part of nature.” “What? How does recycling do that, Maria?” asked Bobby. “Everything that we use comes from something. Paper and wood products come from trees and most plastic comes from wood or oil. To get paper or plastic we need to cut down trees and those trees are home to chipmunks and squirrels and birds. But if we recycle, we can save some of those trees! If we recycle, people can use our trash to make something useful for someone else. Every time we recycle we save trees, and we save chipmunk and squirrel and bird homes. Paper, cardboard, and bottles like that water bottle can be used to make things that people really need. All kinds of things can be made from recycled stuff. When you recycle plastic, it can be used to make things like that fleece jacket you’re wearing or even a bench at the park. When you recycle paper, it can be used to make other paper products; you’re probably even using some at your house right now!” “O wow, I had no idea, I think I’ll recycle this bottle.” “That’s a great idea, Bobby,” Maria said.
<urn:uuid:c133241e-db65-401e-b7da-c58b64f303e3>
CC-MAIN-2017-51
http://candostreet.com/blog-kids/tag/recyclle/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948522343.41/warc/CC-MAIN-20171213084839-20171213104839-00329.warc.gz
en
0.943384
381
2.578125
3
There are four main ingredients in making beer: malt, hops, yeast, and water. Familiarize yourself with each ingredient and learn to use adjuncts and finings to expand your repertoire of recipes. Remember, this is just a brief overview. For more information on each ingredient, expand the Further Reading section for each ingredient or Get the Book! Malt is the principal source for fermentable sugar in beer. Raw, brewing-grade barley undergoes a germination and kilning process by malt manufacturers to prepare it for brewers. In other words, malt is barley that has been sprouted and dried. Every combination of roasting time, temperature, pH, concentration, sugar, and nitrogenous compounds will create a different set of flavor chemicals in a malt. Base malt refers to the majority of the malted grains used to make beer while specialty malts (e.g. chocolate malt) have a more dramatic impact on the flavor, mouthfeel, and color of the beer. Utilizing specialty malts is a relatively easy way to add more depth and character to extract brews. Agricultural historians believe that the barley grown across Europe in the early Middle Ages was mainly six-row. The genetic ancestors of two-row types grown in Europe were likely brought back from the Middle East during the Crusades. Get the Book Malt extract is concentrated sugar extracted from brewing-grade malted barley and comes in both dried (powder) and liquid (syrup) forms. Extract lets brewers skip the mashing process needed to brew with grains and takes you straight to the boil. Various types of malt extract are available, such as pale, wheat, and amber. Today you’ll even find specialty extracts like rye and Maris Otter. The specific type to use in a brew depends on the desired style of beer. Malt extract is made by mashing grains to make wort. The wort is then concentrated from its original gravity to a thick syrup by evaporation under gentle heat, typically under vacuum. More than just resembling rabbit food in pellet form, hops are the green, cone-shaped flower of the hop plant that are used to add balance, flavor, and aroma to beer. Hops contain specific amounts of alpha and beta acids, as well as essential oils broken down in boiling wort that give many beers their signature bitterness, flavor, and aroma. You may also use a technique called dry hopping, in which hops are added after fermentation for added aroma and flavor. Aside from the added flavors hops lend, they are also an excellent preservative of beer. The genus Humulus likely originated in Mongolia at least six million years ago. A European type diverged from that Asian group more than one million years ago; a North American group migrated from the Asian continent approximately 500,000 years later. - Wet Hopped Beer: Showcasing Fresh Hops - How to Grow Hops at Home - How to Harvest, Prepare, and Store Homegrown Hops - Hop Storage: Vacuum Sealed vs. Non-Purged Baggie - The Effect of Post-Boil/Whirlpool Hop Additions on Bitterness in Beer - How to Store Hops - Trivia: Growing Hops - Trivia: More Hops - Trivia: British Hops - Trivia: Evolution of Hops Yeast & Bacteria Brewer’s yeast (Saccharomyces) is a type of fungus that consumes fermentable sugars in the wort and creates alcohol and carbon dioxide as a byproduct, a process known as fermentation. The nuances of fermentation come down to the type of yeast used, primarily ale or lager yeast. Using two different types of yeast in the same wort can create drastically different beers. Other than alcohol and carbon dioxide, yeast strains produce other compounds like esters, fusel alcohols, ketones, and various phenols and fatty acids, all of which contribute to the character of a beer. Wild yeast and bacteria like Brettanomyces (Brett), Lactobacillus (Lacto), or Pediococcus (Pedio), are either very favorable or avidly detested by brewers due to their reputation as contaminants. While these yeasts and bacteria can pose a high risk for cross-contamination, the unique flavor and aromas they produce can outweigh the risk and extra effort in certain kinds of beer. Just be careful! It’s typically recommended maintain separate equipment for “clean” beers and “wild” beers to prevent cross-contamination of future batches. A single yeast cell is about 5 to 10 microns (0.0002–0.0004 inches) in size and round to ovoid in shape. And although a yeast cell is ten times larger than bacteria, it is still too small to be seen by the naked eye. In fact, it takes more than ten yeast cells to equal the diameter of one human hair. Get the Book - Brooklyn Brewery’s Tips on Yeast Health - How to Make a Yeast Starter - How to Harvest and Culture Commercial Yeast for Homebrewers - Sour Microbes: Yeast and Bacteria Explained - Domestication of Yeast - 5 Facts on Brewer’s Yeast from White Labs - Esters vs. Phenols - Yeast Washing & Yeast Rinsing: What’s the Difference? - Trivia: Yeast Part 1 - Trivia: Yeast Part 2 It may seem like an obvious ingredient, but because water makes up the vast majority of beer, it’s a critical one. There are four key aspects of water that relate to homebrewing: pH, hardness, alkalinity and residual alkalinity, and “flavor” ions. All four aspects affect brewing. The colloquial terms “hard water” and “soft water” come from the cleaning industry. The term “hard” means that it is hard to raise a lather due to the chemical binding of the soil-binding sites in soaps by calcium and magnesium ions. Get the Book Adjuncts are another source of fermentable sugars for adding alcohol to your homebrew. Adjuncts are often used as a cheaper alternative to malted grains or to produce a lighter, less malty beer, but they can just as easily lend their own unique character to beers brewed with them—oatmeal stout, anyone? Rice has been used as a brewing adjunct in the United States and Britain since the 19th century. Varieties of rice used specifically for brewing are bred to have nearly no flavor or aroma. A fining agent is a compound added to beer to improve clarity. Fining agents work by attaching themselves to contaminants and cause them to rapidly settle to the bottom of the fermenter. They may be added either at the end of the boil or in the fermenter, depending on what fining agent is used. Historically speaking, clear beer is a recent invention. Attitudes towards beer appearance began to change as clear glassware became more widespread, thus spawning a search for improved clarity.
<urn:uuid:0a41921f-b37b-4b3a-993f-8f8cc2395cf9>
CC-MAIN-2023-40
https://www.homebrewersassociation.org/how-to-brew/homebrew-ingredients/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506423.70/warc/CC-MAIN-20230922202444-20230922232444-00659.warc.gz
en
0.933235
1,542
3.28125
3
45 minutes (Year 3) 50 minutes (Year 5) The National Assessment Program – Literacy and Numeracy (NAPLAN) is an annual national assessment for all students in Years 3, 5, 7, and 9. All students in these year levels are expected to participate in tests in reading, writing, language conventions (spelling, grammar and punctuation) and numeracy. The tests provide parents and schools with an understanding of how individual students are performing at the time of the tests. They also provide schools, states and territories with information about how education programs are working and which areas need to be prioritised for improvement. NAPLAN tests are one aspect of each school’s assessment and reporting process, and do not replace the extensive, ongoing assessments made by teachers about each student’s performance.
<urn:uuid:308721bd-e075-4d60-b46b-5b314c76dd1c>
CC-MAIN-2020-10
https://lhps.nsw.edu.au/events/event/naplan-reading/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143963.79/warc/CC-MAIN-20200219000604-20200219030604-00241.warc.gz
en
0.945012
170
3.328125
3
The politics of Nepal function within a framework of a republic with a multi-party system. Currently, the position of President (head of state) is occupied by Bidhya Devi Bhandari. The position of Prime Minister (head of government) is held by Puspakamal Dahal (Parchanda). Executive power is exercised by the Prime Minister and his cabinet, while legislative power is vested in the Constituent Assembly. Until May 28, 2008, Nepal was a constitutional monarchy. On that date, the constitution was altered by the Constituent Assembly to make the country a republic. Nepal has seen rapid political changes during the last two decades. Up until 1990, Nepal was a monarchy under executive control of the King. Faced with a communist movement against absolute monarchy, King Birendra, in 1990, agreed to a large-scale political reform by creating a parliamentary monarchy with the king as the head of state and a prime minister as the head of the government. Nepal’s legislature was bicameral, consisting of a House of Representatives called the Pratinidhi Sabha and a National Council called the Rastriya Sabha. The House of Representatives consisted of 205 members directly elected by the people. The National Council had 60 members: ten nominated by the king, 35 elected by the House of Representatives, and the remaining 15 elected by an electoral college made up of chairs of villages and towns. The legislature had a five-year term but was dissolvable by the king before its term could end. All Nepali citizens 18 years and older became eligible to vote. The executive comprised the King and the Council of Ministers (the cabinet). The leader of the coalition or party securing the maximum seats in an election was appointed as the Prime Minister. The Cabinet was appointed by the king on the recommendation of the Prime Minister. Governments in Nepal tended to be highly unstable, falling either through internal collapse or parliamentary dissolution by the monarch, on the recommendation of the prime minister, according to the constitution; no government has survived for more than two years since 1991. The movement in April 2006 brought about a change in the nation’s governance: an interim constitution was promulgated, with the King giving up power, and an interim House of Representatives was formed with Maoist members after the new government held peace talks with the Maoist rebels. The number of parliamentary seats was also increased to 330. In April 2007, the Communist Party of Nepal (Maoist) joined the interim government of Nepal. In December 2007, the interim parliament passed a bill making Nepal a federal republic, with a president as head of state. Elections for the constitutional assembly were held on 10 April 2008; the Maoist party led the results but did not achieve a simple majority of seats. The new parliament adopted the 2007 bill at its first meeting by an overwhelming majority, and King Gyanendra was given 15 days to leave the Royal Palace in central Kathmandu. He left on 11 June. On 26 June 2008, the prime minister Girija Prasad Koirala, who had served as Acting Head of State since January 2007, announced that he would resign on the election of the country’s first president by the Constituent Assembly. The first round of voting, on 19 July 2008, saw Parmanand Jha win election as Nepali vice-president, but neither of the contenders for president received the required 298 votes and a second round was held two days later. Ram Baran Yadav of the Nepali Congress party defeated Maoist-backed Ram Raja Prasad Singh with 308 of the 590 votes cast. Koirala submitted his resignation to the new president after Yadav’s swearing-in ceremony on 23 July 2008. On 15 August 2008, Maoist leader Prachanda (Pushpa Kamal Dahal) was elected Prime Minister of Nepal, the first since the country’s transition from a monarchy to a republic. On 4 May 2009, Dahal resigned over on-going conflicts with regard to the sacking of the Army chief. Since Dahal’s resignation, the country has been in a serious political deadlock with one of the big issues being the proposed integration of the former Maoist combatants, also known as the People’s Liberation Army, into the national security forces. After Dahal, Jhala Nath Khanal of CPN (UML) was elected the Prime Minister. Khanal was forced to step down as he could not succeed in carrying forward the Peace Process and the constitution writing. On August 2011, Maoist Babu Ram Bhattarai became third Prime Minister after the election of constituent assembly. On 24 May 2012, Nepals’s Deputy PM Krishna Sitaula resigned. On 27 May 2012, the country’s Constituent Assembly failed to meet the deadline for writing a new constitution for the country. Prime Minister Baburam Bhattarai announced that new elections will be held on 22 November 2012. “We have no other option but to go back to the people and elect a new assembly to write the constitution,” he said in a nationally televised speech. One of the main obstacles has been disagreement over whether the states which will be created will be based on ethnicity. Nepal is one of the few countries in Asia to abolish the death penalty. Nepal is the only Asian country where the possibility of same-sex marriage has been proposed in the high court and in the legislature although same-sex marriage currently does not exist in Nepal (see also LGBT rights in Nepal and Same-sex marriage in Nepal). The decision was based on a seven-person government committee study, and enacted through Supreme Court’s ruling November 2008. The ruling granted full rights for LGBT individuals, including the right to marry and now can get citizenship as a third gender rather than male or female as authorized by Nepal’s Supreme Court in 2007.
<urn:uuid:fc4d0a53-0f1c-4a2d-bbd0-b55a9637ef6e>
CC-MAIN-2018-34
https://demo.aarambhathemes.com/super-blog-pro-travel/?page_id=13
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210413.14/warc/CC-MAIN-20180816034902-20180816054902-00189.warc.gz
en
0.97892
1,215
3.78125
4
Telemachus was a monk who lived in a small monastic community near the end of the fourth century. He had a peaceful life of Bible study, prayer, and gardening for the cloister. His peaceful life was interrupted by the sense that God wanted him to move from the country to the distant city of Rome. Telemachus didn’t want to move. He loved his simple life, but he believed it was what God wanted, and so he left. When he arrived at Rome, he found everything he feared. Political corruption, pleasure gone amuck, wild and godless living abounded. He followed the crowds into the Coliseum. He was shocked when he saw the gladiators stand and salute the emperor, saying, “We who are about to die salute you!” It turned his stomach to see crowds watching men slaughter each other for pleasure. Telemachus had enough. He climbed a wall and shouted out, “In the name of Christ stop this! Stop this now!” but nobody listened. The gore continued. Finally he jumped down into the arena and approached the gladiators, yelling, “In the name of Christ, stop this! Stop it!” Generally, they ignored him, pushing him out of the way, but the crowd grew agitated that this little monk dared to interfere with the sport. Someone in the crowd shouted “Run him through! Kill him!” and the rest of the crowd joined in. A gladiator listened to the crowds and struck Telemachus with a mortal wound. Telemachus fell to his knees, and with his last breaths, gasped, “In the name of Christ…stop this!” Then something strange happened. The soldiers and spectators stopped, watching this monk die. His death wasn’t like the deaths that entertained them moments ago. It was different. There was no roar for the victor. Silence overtook the arena. Then one onlooker walked away. Then another. And another, until the spectators deserted the Coliseum, never to return. Tradition says that the death of the little country monk brought an end to the spectacle of organized murder for entertainment. There is much to admire and learn from the life and death of Telemachus. What principles of scripture does he remind you of?
<urn:uuid:db08a6e7-cb55-4506-b93a-13f6dcfd4479>
CC-MAIN-2019-47
http://www.happyhiatt.com/2016/06/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670821.55/warc/CC-MAIN-20191121125509-20191121153509-00081.warc.gz
en
0.969185
477
2.5625
3
08.2005 > Notes on Design of Double-Angle and Tee Shear Connections for Gravity and Seismic Loads By Abolhassan Astaneh-Asl, Ph.D,P.E. Notes on Design of Double-Angle and Tee Shear Connections for Gravity and Seismic Loads This Steel TIPS presents information on behavior and design of steel double-angle and tee shear connections. In these connections,a tee section or two angles are welded or bolted to the web of a beam and to the supporting member. The main role of a tee or of double angles in these connections is to transfer shear force from the end of the beam to its support. The behavior of shear connections under the effect of gravity and seismic loads is presented. Included are updated design procedures. PDF file size-: 1,670 KB
<urn:uuid:34ee984a-36a1-4819-91e5-a1ed5dd729e3>
CC-MAIN-2019-26
http://www.steeltips.org/steeltips/tip_details.php?id=91
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998986.11/warc/CC-MAIN-20190619123854-20190619145854-00393.warc.gz
en
0.874898
182
3.015625
3
Story and photos by Andrea Kjaer We’re all more than familiar with STEM as an acronym in the academic world these days. But is an important letter—and subject—left out? Recently, educators have inserted an “A” into the term, effectively renaming it STEAM: science, technology, engineering, arts and mathematics. Students at the 7th Annual STEAM Showcase in Sandy Springs had no trouble making that “A” feel right at home, complete with a flash mob of high-schoolers in white lab coats storming the gym floor to celebrate. The STEAM Showcase, hosted by the Sandy Springs Education Force, is a science fair taken to a whole new level. With the help of educators and generous sponsors, children in the local school district design and present their work alongside institutions like Comcast and Microsoft that use STEAM skills in the real world. Educators know that the modern workforce is more technical and specialized than ever. Teachers are taking an innovative approach to prepare the younger generation for success by giving kids STEAM opportunities even as they are building basic skills. The goal of the educators, participants and sponsors at the STEAM Showcase is to give students experiences that will help them identify and develop as young STEAMers long before it’s time to pick a college major. If the participation was any judge of the success, the event was a hit. Kids and adults alike crowded around the dazzling array of booths set up around the gym. Many offered unique hands-on experiences with advanced robotics, computer equipment, medical technology, virtual reality and even drones. Be4StemInc, Kell Robotics and LEGO Education showcased opportunities available right now for kids interested in STEAM. Organizations like the Georgia Tech Research Institute, Mercedes-Benz, Microsoft, Gwinnett Tech and Comcast were among the major exhibitors that offered insight into the ways in which students might use STEAM skills in their future careers. Some of the exhibitions offered more niche examples, including a local startup called Replantable, a crime scene investigator from the Sandy Springs Police, brain-teasing puzzlers from Mastermind Escape Rooms and high-tech sound equipment demonstrations from the Atlanta Institute of Music and Media. While there were a lot of high-tech, well-funded projects, the students’ contributions were just as innovative. One group of girls from Lake Forest Elementary showed off the dollhouse they designed and wired with electricity. Thanks to them, Barbie’s dream house now has lighting and fans. Representatives from Sandy Springs Charter Middle School detailed their experience constructing their own drone in a way that would have impressed a TED audience. Rather than using a prepackaged model, they designed and built their drone themselves. The persistent students even had to start over more than once when they encountered unexpected problems, like the balsam wood they used as a frame shattering during a landing. With a few experiments, they solved the problem by replacing the fragile balsam with California redwood, which has a natural flexibility—a discovery they made all on their own. Young scholars at Ridgeview Charter Middle School built bridges and tested their strength against simulated earthquakes, and fellow students gathered around to look at their demonstrations and experiments with equal interest to those of the professional sponsors. With hard work and a little steam of their own, we bet that these kids will one day be the ones presenting their innovative work as professionals to the next generation of young thinkers. We’re looking forward to it already.
<urn:uuid:69d9ca41-996f-4f04-942d-91f687f2e72c>
CC-MAIN-2019-26
http://southeastmakersatl.com/steam-showcase-theres-little-bit-dancing-lot-learning/
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999003.64/warc/CC-MAIN-20190619163847-20190619185847-00087.warc.gz
en
0.95925
723
2.796875
3
Particulate filters are an important part of the exhaust system of a modern vehicle. These filters are responsible for capturing the particles emitted by the engine and prevent them from escaping into the environment. However, like any other component, particulate filters can suffer from saturation problems. Saturation of particulate filters refers to the process in which the pores of the filter are filled with particles and can no longer capture any more. This can be due to a variety of factors, such as the type of fuel used, the quality of the oil or the use of the vehicle. When a particulate filter becomes saturated, it can cause a number of problems. Firstly, the efficiency of the filter decreases, which means that particles can pass into the environment. In addition, filter saturation can increase the pressure in the exhaust systemThis can lead to a decrease in engine performance and an increase in fuel consumption. There are several measures that can be taken to prevent the saturation of particulate filters. Some of the most important ones are mentioned below: Low quality fuels may contain particles that are more difficult to filter out. Using high quality fuels can help reduce the amount of particulates that reach the particulate filter. Dirty oil may contain particles that can damage the particulate filter. Changing the oil regularly can help reduce the amount of particles reaching the particulate filter. Excessive use of low engine speeds can lead to particulate build-up in the particulate filter. It is important to try to keep engine revs in a healthy range. It is important to perform regular maintenance on the vehicle to ensure that all components are working properly. Regular maintenance can help prevent particulate build-up in the particulate filter. In some cases, cleaning may be necessary to recover the particulate filter. This involves a process in which the filter is removed for cleaning with specific machines, such as the DPF REVIVAL, in order to remove the soot and ash from the interior and to restore the performance of the ceramics. It is important to take the vehicle to a specialised workshop with the right machine to carry out this procedure. In summary, the saturation of particulate filters can cause a number of problems in the vehicle. It is important to take preventive measures to avoid particulate filter saturation and to perform regular maintenance on the vehicle. With proper care, particulate filters can last for many years and help protect the environment. Copyright © 2023 Iberisa Asesoramiento Gestión y Servicios S.L.
<urn:uuid:8f0eab78-da27-4ca3-8a5d-1994ec1f3e4a>
CC-MAIN-2023-23
https://dpf-revival.com/en/particulate-filter-filter-saturation-how-it-affects-your-vehicle-and-how-to-prevent-it/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652569.73/warc/CC-MAIN-20230606114156-20230606144156-00337.warc.gz
en
0.930787
526
3.5
4
What Is Vaping? Lots of people are confused about what is vaporizing if they hear the word “e-cigs”. They believe that it’s the same thing as electronic cigarettes. Not all vaporizers use the same technology, but they all produce exactly the same end product – vapor. In most cases, there are three various kinds of vaporizers: electronic, box style, and water pipes. Each has a unique way of developing a delicious-smelling sensation. An electronic vaporizer is simply an electronic device that mimics traditional smoking methods. It offers a device containing a battery and an electrical supply like a small battery or perhaps a portable plug-in. Rather than tobacco, an individual smokes chemical-laced vapor instead. As such, using a vaporizer is frequently referred to as “vaping”, because users actually inhale chemical-laced liquid. Inhaling these chemicals could be harmful to the health, even though some experts believe that it may be beneficial using situations. Proponents argue that it lessens the negative effects of smoking on the smoker’s body. Box Style E-Cigarettes There are two basic styles of electronic cigarettes, the classic box type and the newer “modular” or “portable” style. Both work on exactly the same basic principle by heating and inhaling a liquid, which contains nicotine and different other chemicals, into the lungs. The main difference between the two styles may be the size of the lungs and the way the liquid is distributed to the user’s throat. Because the amount of nicotine and other chemicals remains constant, it is significantly less addictive than smoking regular cigarettes. Water Pipes are another popular kind of electronic cigarette. They work in a very similar fashion to vaporizers, with the only real main distinction being that the liquids used usually do not become airborne, but rather are inhaled straight into the lungs. Even though some water pipes have filters to prevent solvents and chemicals from entering the liquids, most have these filters removed, since they do not allow for adequate vaporization. While a filter can be placed in place, it generally does not always prevent vaporization. This means that the vapor that’s created is very concentrated and may be irritating to sensitive mucus membranes. Electronic Smokers are a different type of electronic cigarettes that work in much the same way as inhalers. They work with a heating element, similar to the electrical plug, which gets hotter a coil, producing the vapor that’s inhaled by the vaper. The heating element is usually set on the highest heat setting, which means that it will produce probably the most vapor in the shortest amount of time. Some newer units are even built with a timer which will stop the heating element once the vaper has finished using it. Because the temperature is so high, this method of what is called “throating” the coil, while keeping constant temperature, makes for the fastest smoking experience possible. There are many different reasons why people choose to use e-cigs over traditional cigarettes and vapes. There are those who simply want to be able to inhale all the same flavors and aroma without the mess and toxins of regular cigarettes, or there are those who simply usually do not wish to smoke at all. Regardless of your personal reason, e-cigs offer an exceptionally enjoyable and beneficial option to both traditional smoking and vaporizing. E-Cigs are really popular in many parts of the world. Not only are they a healthier option to regular cigarettes, also, they are a far more comfortable way to smoke. Many people who suffer from asthma have found that they can substantially lessen their symptoms simply by using e-cigs instead of their usual cigarettes. Even individuals podsmall who are non-smokers find that they are able to drastically decrease their symptoms by simply puffing away on an e-arette instead of the real thing. If you’re looking to find out more about e-cigs, you should read this article. Specifically, we’ll discuss what e-cigs are, how they work, and which are the benefits and drawbacks of utilizing them. After scanning this article, you should be in a position to decide if you wish to pursue the world of electronic cigarettes. Additionally, you should be able to select between liquid, solid and chamomile flavored electric cigarettes.
<urn:uuid:9fcd74ea-97cb-4b7a-8cf6-7387d534bbc1>
CC-MAIN-2021-49
https://cooper365.dixipixi.com/p/682
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358074.14/warc/CC-MAIN-20211126224056-20211127014056-00443.warc.gz
en
0.942747
905
2.8125
3
A little girl on the beach sees hundreds of sea stars (starfish) stranded on the sand and begins throwing them back into the water. A man approaches and tells her there's no point. There are too many sea stars. Her efforts don't matter. The girl looks at the sea star in her hand and says, "It matters to this one." This story is often used as metaphorical inspiration when people think they can't make a difference. The message is basically 'start with one thing.' Recently, I had a more literal experience of this story. Not long after the wood frogs descended upon our nearby "frog pond," my kids and I went back looking for eggs (more appropriately called spawn). We collected one mass that we brought home to watch. We placed it in a large plastic jug with plenty of water and muck from the pond. We changed the water occasionally to keep the balance healthy. Finally, on Monday of last week, I noticed tadpoles emerging. Unfortunately, the kids were at school, but I had some time, so I hiked out to the pond to see what was happening. We've been in drought conditions here in the Northeast, so when I arrived, I found the water level significantly lower than when I had last been out there. I also found this: |Can you see the shape of one in the shadow on the left side of the photo? Click to make larger.| Can you see the gills? They're the little fin-like things on the sides of it's body. I'll be honest, there were moments when I was ready to just quit. It was hot, I wanted time to observe, I felt an occasional light-headedness with all of the up and down and balancing on rocks. But, my readers know I love this place and I love frogs. You may remember how devastated I was by the logging that took place over the winter and early spring and how I worried about the fate of the wood frogs. I couldn't leave them to die. I just focused on moving one mass at a time until eventually all were back in the water. Author Anne Lamott called this Bird by Bird. I think I'll call it "Polliwog by Polliwog." What task in your life could you better manage if you remembered to take it one little step at a time? How could you help your children or students learn this same lesson? (Science fact I need to share: I'm not certain these eggs are Wood Frog spawn. Amphibian eggs can look very similar. I also tend to avoid research-I'd rather learn from my own observations for something like this. So, we're simply watching the tadpoles in our jug carefully to see how they change over time. Soon, we'll return them to the pond because they won't be able to stay healthy in our porch. Hopefully they will have changed enough for us to ID them by then. That said, if you can definitively ID the species from my photos, please feel free to put it in comments).
<urn:uuid:a66ca608-aa1e-4482-a4ce-510d00735802>
CC-MAIN-2018-22
http://www.michellecusolito.com/blog/2012/05/one-little-step-at-time.html?rq=wood%20frogs
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864657.58/warc/CC-MAIN-20180522092655-20180522112655-00085.warc.gz
en
0.981784
628
2.65625
3
According to all standard book and webpage I consulted, godan verb's potential form are produced by first changing to え (e) form, and then add in る (ru). But a native Japanese speaker (who is also ... The following dialogue is from Final Fantasy XII: さて……王宮に忍びこむ方法じゃがな。 まず5番倉庫に行ってみい。 あそこに扉が2つあるじゃろう? I bolded 行ってみい. I'm not sure what this is, and there's no dictionary entry for みい. My ... I'm still playing Final Fantasy VI, and I came across this bit of dialogue: マリアの頭にオモリ 落としたるけんね。 I understand it up to 落とし. Orthros is going to drop the weight on her head! I can't make ... I recently saw 「やってもた」 used in a Japanese conversation, I don't remember the context exactly, it was something like: 久々にやってもた。 After asking my Japanese friend, it turns out to be some kind of ... One friend of mine told me when she was living in Japan, she liked to end her sentences with ん (maybe instead of の). Examples: 明日学校にいくん? 明日学校に行かないと思う…風邪引いたん。 Actually I've never seen it! But my ...
<urn:uuid:fc1a6cfe-ea82-4c21-af63-cf2c7830a82d>
CC-MAIN-2013-48
http://japanese.stackexchange.com/questions/tagged/dialects+colloquial
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163936569/warc/CC-MAIN-20131204133216-00079-ip-10-33-133-15.ec2.internal.warc.gz
en
0.865442
385
2.65625
3
It's a living legal community making laws accessible and interactive. Click Here to get Started » The nature and extent of the privileges afforded to individuals kept in custody or confinement against their will because they have been convicted of performing an unlawful act. For most of U.S. history, the treatment of prisoners was left entirely to the discretion of prison administrators. In the late 1960s and early 1970s, the federal courts began to oversee state prison systems and develop a body of law dealing with prisoners' rights. During the 1980s, however, a more conservative Supreme Court limited prisoners' rights, and, in the 1990s, Congress enacted laws that severely restricted litigation and post-conviction appeals by prisoners. Two statutes enacted during the 104th Congress have had a significant effect on the federal court's treatment of prisoners who seek to bring claims against prison officials. Congress passed the Prison Litigation Reform Act (PLRA) of 1995, Pub. L. 104-134, 110 Stat. 1321, to place restrictions on the ability of federal courts when they consider claims by prisoners. The Antiterrorism and Effective Death Penalty Act of 1996, Pub. L. 104-132, 110 Stat. 1214, reformed the system of habeas corpus review in federal court. Although prisoners continue to bring lawsuits in federal court, these statutes have made it more difficult for prisoners to make successful claims. Prisoners and Detainees A prisoner is anyone who is deprived of personal liberty against his or her will following conviction of a crime. Although not afforded all the privileges of a free citizen, a prisoner is assured certain minimal rights by the U.S. Constitution and the moral standards of the community. Detainees are individuals who are kept in jail even though they have not yet been convicted of a crime. A majority of detainees are individuals who are unable to obtain sufficient funds to post bail and therefore cannot be released from jail pending a trial on the criminal charges. Until the 1960s, courts refused to set standards for the treatment of prisoners, claiming they lacked the authority and the expertise to do so. Courts deferred to experienced prison administrators to avoid interfering with their ability to respond to the varied, complex issues involved in a penal system, such as custody, security, rehabilitation, discipline, punishment, and limited resources. By the late 1960s, however, prison conditions in many states were clearly intolerable. Courts began to review the claims of prisoners and to intervene regularly on their behalf. Finding that even prisoners are entitled to minimum rights, federal courts in particular exhibited renewed interest in the right of access to the courts, freedom of expression and religion, the constitutional prohibition against cruel and unusual punishment, and the right to due process of law. Rights of Detainees A great number of persons are jailed before their trials. These persons, known as pretrial detainees, are ordinarily held because they are unable to satisfy the financial requirements for a bail bond. Important law concerning the rights of pretrial detainees emerged in the 1970s. In Bell v. Wolfish, 441 U.S. 520, 99 S. Ct. 1861, 60 L. Ed. 2d 447 (1979), the Supreme Court rejected the theory that pretrial detainees cannot be deprived of any right except the right to come and go as they choose. The Court criticized lower federal courts that had given detailed orders to prison administrators regarding how they should do their jobs. Although prisons cannot employ methods designed only to punish detainees before conviction, they can use suitable procedures for purposes of security and discipline. Rights of Citizenship Convicted offenders are deprived of many of their civil rights, both during and after their period of incarceration. A majority of states deprive citizens of the right to vote in all state and federal elections upon conviction of a felony. Even in jurisdictions where offenders can vote after release, they ordinarily cannot obtain an absentee ballot and vote while in prison. Conviction and incarceration for serious crimes can also lead to the total or partial loss of the right to start a lawsuit not related to imprisonment or to enter into a contract. Correction officials argue that permitting a prisoner the right to carry on business as usual creates an impossible security burden. Most states, however, permit a prisoner to be sued. The right of a prisoner to inherit property or receive a pension can be affected by various state laws. Most of the legal disabilities to which prisoners are subject are upheld because they do not interfere with fundamental human rights. Prisoners have certain rights regarding personal property in their possession. Court decisions have established the right of a prisoner to own some personal items, such as cigarettes, stationery, a watch, cosmetics, or snack foods. In certain cases, prison officials have been found to be justified in forbidding certain items because they fear that permitting inmates to accumulate some form of wealth encourages gambling, theft, and buying favors from guards. Judges have sometimes refused to support prisoner demands for the right to own such items as radios, televisions, or personal typewriters. Prisoners do not have the right to expect privacy in a prison setting. Court decisions have established that prison officials can properly monitor and record prisoners' conversations, provided that the prisoner and the visitor are warned that this will be done. Prison officials cannot intrude upon conversations that are legally afforded confidentiality, such as those between the prisoner and the prisoner's attorney or spouse. In Hudson v. Palmer, 468 U.S. 517, 104 S. Ct. 3194, 82 L. Ed. 2d 393 (1984), the Supreme Court declared that prisoners do not have a Fourth Amendment right to be free of unreasonable searches and seizures of their property because the Fourth Amendment is inapplicable to them. Throughout U.S. history, prison officials have severely restricted the mail of prisoners. For example, officials have opened incoming mail to catch plans and instruments of escape, weapons, pornography, drugs, and other contraband. The threat of revoking mail privileges has also been used to enforce discipline. Courts have mandated, however, that prison officials offer good reasons for banning publications they consider inflammatory, obscene, or racist. A vague allegation that a book or magazine is likely to stir up trouble has been held inadequate to justify broad censorship. Prison administrators cannot unreasonably restrict or censor a prisoner's outgoing mail. In 1974, the Supreme Court, in Procunier v. Martinez, 416 U.S. 396, 94 S. Ct. 1800, 40 L. Ed. 2d 224, ruled that the California Department of Corrections could not censor the direct personal correspondence of prisoners unless such censorship was necessary to further important interests of the government in security, order, and rehabilitation. The Court also held that a procedure must be established to determine that censorship, when appropriate, is neither arbitrary nor unduly burdensome. Prisoners do not have a First Amendment right to speak freely. Prison officials may discipline inmates who distribute circulars calling for a mass protest against mistreatment. Administrators have traditionally limited prison newspapers to issues that promote good morale. The restrictions against First Amendment rights to prisoners have extended to so-called "inmate law clerks." In many prisons, a certain inmate is often declared the inmate law clerk by prison authorities to consult fellow inmates about legal problems and to assist them with filling out paper work. The use of inmate clerks provides inmates with inexpensive and accessible counseling. However, prison authorities often maintain control over the clerks by preventing them from consulting with inmates without prior approval. An inmate in a Montana prison who had violated the rules restricting unauthorized communication in his role as the inmate law clerk with another inmate brought suit claiming that the restriction violated his First Amendment rights. Although the Ninth Circuit declared that inmates have a constitutional right to assist other inmates with their legal claims, the U.S. Supreme Court disagreed. In Shaw v. Murphy, 532 U.S. 223, 121 S. Ct. 1475, 149 L. Ed. 2d 420 (2001), the Court, in an opinion by Justice Clarence Thomas, noted that a prior ruling on prisoner-to-prisoner communications required that restrictions must be "reasonably related to legitimate and neutral government objectives." Therefore, the sole question was whether legal correspondence merited a blanket exception to this rule. Thomas made comparisons to other First Amendment restrictions of prisoners, including prohibitions against giving media interviews, organizing private labor unions, and uncensored correspondence among inmates. The restrictions on legal correspondence were no different, according to the Court, and were not entitled to First Amendment protection. The law has long recognized the importance of visitation rights, because such rights aid the prisoner's eventual transition back into the community by keeping the individual in touch with society. Prisoners do not have a constitutional right to enjoy contact visits, as opposed to arrangements in which prisoners are only permitted to talk to visitors over a telephone (Block v. Rutherford, 468 U.S. 576, 104 S. Ct. 3227, 82 L. Ed. 2d 438 ). Courts have held that restrictions on visitation must be reasonable and related only to security needs and good order. Prisoners do not have a right to engage in sexual relations with a visitor. The issue of the right of a prisoner to communicate and see visitors becomes more significant when the proposed visitor is a news reporter. Federal courts have held that a genuine need for security must be given greater weight than access to the media. Although inmates have a First Amendment right to communicate with the media, this right can be satisfied through the mail. Before an individual interview with a reporter is approved, prison officials can require the prisoner or reporter to complete an application that discloses the names of the persons involved and the nature of the intended discussions. Officials can also limit reporters to random interviews conducted during a tour of the prison, as opposed to prearranged interviews with specific prisoners. In addition, face-to-face interviews can be banned for any prisoner who has been placed in maximum security. Access to the Courts States cannot interfere with the right of a prisoner to petition a court for relief. Neither a state nor a prison official can refuse, for any reason, to review a prisoner's applications and submit them to federal court. In addition, a state is not permitted to prohibit prisoners from having law books or legal papers in their cells on the basis that such materials tempt other prisoners to steal or create a fire hazard. If a prisoner is indigent, the state cannot require him to pay even a small fee to file legal papers with the court. However, a prisoner association cannot have filing fees waived. The right to proceed as an indigent party is allowed only for individual prisoners. Prisoners have a fundamental right to legal counsel that requires special consideration. Prison officials must allow reasonable times and places for prisoners to communicate confidentially with their attorneys. Prisoners who cannot afford an attorney generally turn to fellow inmates who are experienced in arguing their own cases. Assistance from these jailhouse lawyers was forbidden in most prisons until 1969, when the Supreme Court, in Johnson v. Avery, 393 U.S. 483, 89 S. Ct. 747, 21 L. Ed. 2d 718, held that prisons cannot completely forbid inmate assistance unless there is an alternative for prisoners. Prisoners must be provided with writing materials and law books. Additionally, prisoners must be able to have their legal papers notarized. Prisoners ordinarily receive token wages for work performed in prison. Courts have rejected prisoner lawsuits demanding fair wages for prisoner labor, concluding that prisoners do not have to be paid at all. Prisoners have no right to their own labor, or the benefits of it, while incarcerated. Prisoners cannot refuse to work or choose the work they will do. Prison officials can punish prisoners for refusing to do work assigned to them. Every prisoner is entitled to food in amounts adequate to sustain an average person. Various groups of prisoners have protested the failure of prisons to furnish them with special diets, and prisoners with special medical needs are generally accommodated. Dietary accommodations have been made for Orthodox Jews and for Muslim prisoners, though prison officials may balance the needs for prison security and economy with the religious beliefs of the inmates. Prisoners must be allowed to practice their religion, obtain and keep written religious materials, see or communicate with a religious leader, and obey the rules of their religion that do not endanger order and security in the prison. In addition, wherever possible, formal religious observances for groups of inmates must be allowed on a regular basis. Prisoners can have access to religious programs broadcast on radio and television. Different religions within a particular prison must be given equal treatment. Until 1997, when the U.S. Supreme Court overturned portions of the Religious Freedom Restoration Act (42 U.S.C.A. § 2000bb-1 ), prisoners who had been denied permission to exercise their religious beliefs sought to obtain relief under this federal law. Under the law, a restriction that imposed a substantial burden on religious exercise had to further a compelling state interest in the least restrictive way to be constitutional. However, as of 2003, prisoners had not been successful in overturning restrictions under this law because courts generally agreed with prison officials that compelling state interests were at stake. Prisoners are entitled to adequate medical treatment. A prison official's refusal to provide medical care to a seriously ill inmate violates the Eighth Amendment's prohibition against cruel and unusual punishment (Estelle v. Gamble, 429 U.S. 97, 97 S. Ct. 285, 50 L. Ed. 2d 251 ). In cases where the treatment is neither cruelly withheld nor intentionally mismanaged but is inept, prisoners can sue physicians in state courts for medical malpractice. Prisons traditionally have strictly regulated the appearance of prisoners. In situations where prisoners have complained that they were denied opportunities to shower or shave, courts have insisted on minimum standards of human decency and personal hygiene. When necessary, courts have allowed prisons to force inmates to keep themselves clean for purposes of maintaining the health of the general prison population. Discipline and Punishment The rules regarding conduct must be clearly defined and explained to inmates, and each prisoner must be provided with a written list of the rules when entering a correctional facility. Disciplinary rules must relate to the needs of security, good order, and good housekeeping. A prisoner accused of breaking rules does not have all the rights of an accused at trial because a prison disciplinary proceeding is not the same as a criminal prosecution. Inmates are not entitled to an attorney at disciplinary hearings, nor are they entitled to confront or crossexamine the witnesses against them. Prisoners must be given notice of the charges against them, the particular rules they are charged with violating, and the penalties for such infractions. A hearing can be informal for small infractions. The ordinary procedure is for the fact finder to write a statement that explains the evidence relied on and the reason for any disciplinary action taken. The punishment must reasonably relate to the seriousness of the infraction. Prison personnel can use force in self-defense, stopping fights between inmates, compelling obedience to lawful orders where milder measures fail, and defending state property. Where guards use force without justification, a prisoner does not necessarily have the right to resist. The use of tear gas and chemical mace is justified only when an immediate danger of riot or serious disorder exists. Prison officials may punish prisoners by withdrawing certain privileges, such as seeing visitors, buying items from the commissary, or earning wages. Prisoners cannot be denied fundamental human necessities. Segregation is the most common type of punishment used in prisons for rule breaking. Prisoners can be categorized into groups and segregated from the general inmate population for a number of other reasons as well. Each prison has its own system and titles for different degrees of segregation. Separate areas may be set aside for young prisoners, repeat offenders, or prisoners who have been sentenced to death. Homosexuals and other prisoners who have or may be subjected to sexual abuse can be segregated. Segregation cannot be used, however, to separate prisoners according to race. A number of prisons have more than one level of segregation, the most serious of which is solitary confinement. Punitive isolation is not unconstitutional in and of itself. Conditions in some prisons, however, have been found to be so strict that they constitute cruel and unusual punishment. A person in solitary confinement can be punished by the restriction of ordinary privileges, but a prisoner cannot be denied basic food, light, ventilation, or sanitation. Many federal courts have found that mere confinement in some prisons amounted to cruel and unusual punishment. The intervention of federal courts in prison reform began in the early 1970s and continued into the early 2000s. In 1996, eight jurisdictions (Alaska, Mississippi, New Mexico, Rhode Island, South Carolina, Texas, Puerto Rico, and the Virgin Islands) were under court order or a consent decree to improve prison conditions. At the same time, major prison facilities in 32 jurisdictions were under court supervision. Typically, federal courts intervene when a facility has serious overcrowding or does not meet minimum standards. Federal court intervention has forced states to improve prisons through the expenditure of money for new facilities, more staff, and improvements at existing prisons. However, many states have objected to what they perceive as unwarranted federal interference. Congress responded by passing the Prison Litigation Reform Act (PLRA) in 1995, which imposed substantive and procedural limitations on the ability of federal courts to issue injunctions mandating prison reform. The act also restricted the courts' ability to employ special masters to assist in prison condition cases. (A special master is a person appointed by the district court to handle the day-to-day details and oversight of a case.) The law has been challenged on many fronts by those seeking reforms in prison conditions. Lower federal courts have confronted issues posed by the PLRA by finding that the statute restricts their ability to establish minimum prison conditions. In Inmates of Suffolk County Jail v. Rouse, 129 F.3d 649 (1st Cir. 1997), the First Circuit Court of Appeals ruled that the PLRA required a district court to vacate a 1979 consent decree that set conditions for confinement of pretrial detainees in Suffolk County, Massachusetts. In its decision, the court rejected the inmates' contention that the PLRA was unconstitutional because it violated the separation of powers principle and the Due Process and equal protection Clauses of the Fourteenth Amendment. The PLRA contains a section that entitles a state or local government entity to the immediate termination of "any prospective relief" previously ordered by a court. Under the act, prospective relief includes all relief other than compensatory damages. This definition meant that provisions of the consent decree dealing with the housing of prisoners could be terminated. The First Circuit found that the statute was constitutional and held that the law mandated the termination of the consent decree unless the district court made specific findings that the decree was narrowly drawn to correct a violation of federal law. Remedies Available to Prisoners Prisoners who seek to protect a constitutional or civil right are entitled to complain, but they are required to pursue whatever procedures exist within the prison before taking the case to court. The most popular vehicle for prisoner lawsuits has been a federal civil rights statute, 42 U.S.C.A. § 1983 (1871; recodified 1979). A "section 1983 action" permits a prisoner to sue in federal court for an alleged deprivation of a federally protected or constitutional right by a person acting under the authority of state law. A prisoner may sue the warden or supervisor, a guard, or the local government that owns and runs the prison. In the early 1980s, as many as 15,000 section 1983 actions were filed each year, many of them frivolous. The Supreme Court responded by requiring many prisoners to use state tort claims acts rather than the federal statute and the federal courts. The Court also established difficult standards of proof for prisoners to meet. In 1995, Congress sought to restrict prisoner lawsuits by devoting numerous provisions of the Prison Litigation Reform Act to this subject. The statute requires prisoners to exhaust administrative remedies before bringing a lawsuit, expands the federal courts' ability to dismiss lawsuits filed by prisoners, imposes numerous restrictions on the fees that can be awarded to a prisoner's attorney, and forbids a prisoner from filing an action for mental or emotional injury without a prior showing of physical injury. In addition, the act imposes restrictions on the ability of prisoners to proceed without paying filing fees. Another provision requires courts to prescreen lawsuits filed by prisoners and expands the grounds for dismissal of such suits. Finally, the act grants federal courts the power to revoke the good time credits of prisoners who file frivolous or harassing lawsuits or present false testimony or evidence to the court. A prisoner's ability to file a habeas corpus action in the federal courts challenging prison conditions was also diminished. A writ of habeas corpus is a legal document ordering anyone who is officially holding the petitioner to bring him into court to determine whether the detention is unlawful. A federal court can hear an application for a writ of habeas corpus by a state prisoner who is being held in custody, allegedly in violation of the Constitution or the laws of the United States. Traditionally a writ of habeas corpus was granted only for the purpose of ordering an immediate release of a prisoner from all restraints. A court would have to find that the imprisonment itself was illegal, for example, if the petitioner was convicted but his constitutional rights were violated during the trial. The scope of federal habeas corpus expanded in the 1970s and early 1980s, entitling prisoners to the writ even if they were legally in custody but the conditions of the confinement violated their constitutional rights. The writ is rarely used in these circumstances, however, because federal courts prefer to improve prison conditions rather than set a convicted felon free. Provisions of the Antiterrorism and Death Penalty Act of 1996 further limited the power of federal courts to review cases through habeas corpus review. The act lowered the applicable statute of limitations to one year after the judgment convicting the defendant becomes final, which is generally the date of a final appeal or the final date when an appeal would be available. The act also provides several restrictions on the ability of a federal court in a habeas corpus review from reconsidering the factual and legal bases for the defendant's incarceration. Call, Jack E. 1995. "The Supreme Court and Prisoner's Rights." Federal Probation 59 (March). Robbins, Ira P. 1993. "The Prisoners' Mail Box and the Evolution of Federal Inmate Rights." Federal Rules Decisions 144 (January). Mushlin, Michael B. 2002. Rights of Prisoners. 3d ed. St. Paul, Minn.: Thomson/West. Palmer, John W. 1997. Constitutional Rights of Prisoners. 5th ed. Cincinnati: Anderson.
<urn:uuid:67b0e9e3-eebc-4b90-98ff-6eeef756cd9d>
CC-MAIN-2013-48
http://lawbrain.com/wiki/Prisoners'_Rights
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164034642/warc/CC-MAIN-20131204133354-00070-ip-10-33-133-15.ec2.internal.warc.gz
en
0.951924
4,688
3.109375
3
Simple Machines Lesson Plan: An Online Game and Learning Stations Submitted by: Angela Watson In this simple machines lesson plan, which is adaptable for grades 3-6, students use BrainPOP Jr. and BrainPOP resources (including an online science game) to explore a variety of simple machines. Students participate in cooperative hands-on learning activities to investigate different types of simple machines. They will also create their own simple machines during online gameplay and afterward using classroom materials. - Identify and define different types of simple machines. - Recognize the uses of simple machines in real-world scenarios. - Explain how simple machines make our lives easier. - Create their own simple machine during online game play and using classroom materials. - Internet access for BrainPOP resources - Materials for simple machines centers/stations Preparation:Preview the simple machines game from The Museum of Science and Industry, Chicago and familiarize yourself with game play. In this game, students help a character named twitch collect spare robot parts that are scattered all over the Museum. Students assist Twitch in using the found objects to create simple machines that will help him solve challenges with a minimum of force. You can visit The Museum of Science and Industry, Chicago's Simple Machines Exhibit Resources page for more information and ideas related to the game. You'll also want to preview the BrainPOP Jr. and BrainPOP resources used in the lesson plan and determine how to adapt them for your students' needs. Plan out centers or stations that students can complete in groups so that they have the opportunity to explore each type of simple machine in a hands-on way. Some simple ideas can be found in The Museum of Science and Industry, Chicago'sSimple Machines Activities PDF and in BrainPOP Jr.'s Simple Machines Lesson Ideas. - Show students the Word Wall vocabulary and talk about the meaning of the words displayed. You may want to have students suggest definitions in their own words, then click on a word to see the definition provided by BrainPOP Jr. - Play the BrainPOP Jr. movie Simple Machines to give students an overview of the different types of simple machines. Ask students to recall all the simple machines they saw in the movie and talk about the functions of each one. - Challenge students to find the simple machines hidden in the BrainPOP Jr. Search Game so that they can see how the machines appear in real-world scenarios. Extend student understanding by talking about places they've seen simple machines in their own homes, school, and community. - Tell students they will have the opportunity to explore simple machines in an online game. Pair students up and give them 10-20 minutes to explore the Simple Machines game. Encourage students to apply information they learned from the BrainPOP Jr. resources as they play. - Divide students into groups and have them rotate through stations to explore various types of simple machines. The stations could incorporate investigations from The Museum of Science and Industry, Chicago's Simple Machines Activities. Other station activities could include watching the related BrainPOP movies (Levers, Inclined Plane, Wheel and Axle, and Pulley) and taking the accompanying quizzes or completing the corresponding activity pages. - Allow students to revisit the Simple Machines game, either in pairs or independently. Afterward, talk to the class about the simple machines they created in the game for Twitch and in their stations. How are simple machines used in everyday life? How do simple machines make our lives easier? - Assess student learning by having students take the BrainPOP Jr. Hard Quiz or the quizzes from the BrainPOP movies on individual simple machines.
<urn:uuid:3ee4eeba-7158-4e7f-a3ec-e53aa210c539>
CC-MAIN-2017-09
https://educators.brainpop.com/lesson-plan/simple-machines-lesson-plan/?bp-topic=levers
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00366-ip-10-171-10-108.ec2.internal.warc.gz
en
0.896492
751
4.25
4
Power English: Writing is a structured writing approach which follows a proven pedagogical cycle developed to raise standards in writing and empowering children to write creatively. - Teaching Guides for each year group contain structured lesson plans and mini‑lessons. - Interactive online planner contains lesson plans linked to to front of class teaching screens, worksheets and videos. - Writing Tips & Tricks cards cover grammar, punctuation and spelling for each year group. - Child‑facing online Genre Booklets provide children with the tools they need to produce successful writing for each genre. - Assessment scales and advice on assessing writing, with examples.
<urn:uuid:51340731-e956-4690-8303-f304aab20d5d>
CC-MAIN-2020-24
https://www.pearson.com/international-schools/british-curriculum/primary-curriculum/power-english-writing.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348513230.90/warc/CC-MAIN-20200606093706-20200606123706-00487.warc.gz
en
0.864645
129
3.8125
4
On any given website, there’s a lot of implicit meaning that’s easy for some users to interpret. There are a lot of visual clues and hints on sites. Text that’s larger than usual is typically headings, the navigation menu looks a certain way, and a magnifying glass icon tends to signify a search feature. Without these visual clues, most of these implicit relationships disappear. We can have somebody (or something) read us the content – but all the small visual cues that helped us understand emphasis, paragraphs, and general content structure will be lost. Want proof of concept? Go to the website you’re working on now, click ctrl+a to copy “everything”, and paste the text into your favorite text editor. Welcome to the world of no semantics. Luckily, the web can portray much more meaning than this. This article will show you why semantics on the web is important, what kind of semantic elements are built into HTML, and how you can use them in your apps to improve accessibility, availability, SEO and profits. What does semantics even mean? As far as words go, “semantics” is a tricky one. It’s plural but singular, and it means “the meaning of words”. On the web, semantics typically refer to the intrinsic meaning provided by HTML elements. On web pages that are semantically built, these HTML elements are used to place its content into some kind of structure. Some content should take the center stage, while other content is more peripheral in nature. Some content should be emphasized, while other content should be presented as a quote. HTML provides tools for all of these types of content, and tons more. Why you should care Content that’s structured this way (we’ll call it the “semantically correct” way) is easier to consume and process for everyone interested. That brings with it a few great advantages: By using the correct semantic markup to structure your content, you’ll make it much easier to consume by all users. Screen readers will be able to present the content in the most efficient way possible and will allow its users to navigate your site much faster than they would without semantic markup. Increased discoverability (SEO) Search engine crawlers have a much easier time indexing your content correctly with semantic markup. By using the correct tags, you’ll provide valuable hints to the underlying sorting algorithms that decide how easy your content will be to find. And since semantic markup is better for accessibility, you’ll get an extra boost in the ratings, too! 💪 Easier to parse Screen readers and crawlers might not be the two only programs interested in your content. There are price aggregators, reading list apps, sharing features and probably a thousand more ways your content can be consumed, and making that process as easy as possible will only gain you readers. Your code is easier to read Reading through source code that’s all <div />s is not a great experience. Luckily for us, HTML is so much more than the generic <div /> and <span /> tags! You can place navigation specific content in a <nav />, your main content section inside of a <main /> tag, and suddenly your code is much easier to scan. This might not be adding end-user value – but a happy developer is a productive one, right? What does HTML have to offer? As I mentioned, HTML is much more than <div />s and <span />. In fact, there are over 100 different elements! You can check all of them out in the MDN reference, but they can be roughly grouped into three groups – content sectioning, content semantics, and functional elements. A web page typically contains a few sections of content – a header, a footer, a main content area, and so on. HTML provides a few elements that will let you denote these different “landmarks” of a page. Some of the ones you should remember are these: <main />wraps the actual content of your page, or the main functionality of your app. Simply put, it’s your web site without the header, footer, and sidebar <header />should wrap the main header of your page or app, but also the “head” of any other groups of content. It could contain the heading and content category of a blog post, or your app’s logo and main navigation <section />is a generic content container which should wrap a section of your site or app. These elements typically have a heading, too. A good rule of thumb is that a section should logically appear in the outline of your website <article />is almost similar to a <section />. The main difference is that you should use <article />tags around content that could be separately reused in another context, and not around the main content. Examples could be blog post summaries, a comment or even a complete widget <aside />can be used in two different ways. If you use it inside an <article />tag, it’s understood to contain content that closely relates to that article, like a glossary or an explanation box. If it’s used outside of an article, it can be used to wrap semi-related content, like a sidebar or a list of related links <footer />is typically used to provide copyright or author information for an article or the website itself <nav />wraps your page’s main navigation sections. Your main site navigation, pagination, and next post / previous post features should all be wrapped in a By remembering these seven elements and when to use them, you can provide lots of structure to your website. You can read more about structuring content in general in this article if you’re interested. There’s another group of HTML tags that lets you structure the actual content of your site, and I’m calling it “content semantics”. This group of elements let you add semantic meaning to your content itself, making it possible to discern quotes and image captions from regular text. There are a lot of these, and if you’ve used HTML at all, you’re probably familiar with most of them. Here are a few you might not have used a lot, but are great to know about! <blockquote />wraps extended quotes and lets you cite the source of those quotes. If the source is a URL, you can use the citeattribute, otherwise, you can use the <cite />tag to provide the source of the origin <figure />should wrap your images, illustrations, and figures (i.e. charts, code snippets). By providing a <figcaption />as well, you can add a caption that’s semantically related to the figure <dl />stands for “definition list”, and is great for whenever you need to display a key-value relationship. Product metadata and glossaries are great examples of this The ones above all wrap a block of content. You can (and should!) get even more granular, and provide further semantic meaning to each of these blocks though. <time />wraps a specific period or place in time. You can specify it further with the datetimeattribute, which accepts a more detailed timestamp <em />creates emphasis, which is great for when you’re using a screen reader or a voice assistant to parse your text. You can even nest them to provide an added level of emphasis if needed <small />wraps your “legal text” and copyright notices <abbr />is for explaining the abbreviations you use. It’s weird that the abbrtag itself is an abbreviation for “abbreviation”, but let’s leave it. You can explain the abbreviation with the There are indeed a few more to look at for the extremely interested. You can find a complete list here. The semantic web is so much more than a buzzword. By using the appropriate HTML tags, you can provide structural hints to screen readers, search crawlers and all users alike. If you don’t remember when to use what, look it up a few times. The MDN docs are incredible, and this article outlines the ones you’ll use the most. Try to see how long you can survive without using a <div /> or <span /> in that new landing page you’re putting together! I hope this article will inspire you to add some meaning to your document structure and let you dive into this wonderful language called HTML. Plug: LogRocket, a DVR for web apps LogRocket is a frontend application monitoring solution that lets you replay problems as if they happened in your own browser. Instead of guessing why errors happen, or asking users for screenshots and log dumps, LogRocket lets you replay the session to quickly understand what went wrong. It works perfectly with any app, regardless of framework, and has plugins to log additional context from Redux, Vuex, and @ngrx/store.
<urn:uuid:0a18c9cc-2c62-4b82-9326-4f2b518fa1e0>
CC-MAIN-2020-16
https://blog.logrocket.com/how-to-do-semantics-the-right-way/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370519111.47/warc/CC-MAIN-20200404011558-20200404041558-00538.warc.gz
en
0.878627
1,927
3
3
If Eugene O’Neill was the great tragedian of American drama and Arthur Miller its great social conscience, Tennessee Williams (1911-1983) was the great lyrical and thematic innovator, the one who pushed the boundaries of language and content the furthest. His works also rank with the novels of William Faulkner as the finest representation of southern American literature. The heavily autobiographical The Glass Menagerie (1944), about the dysfunctional Wingfield family, gave Williams his first major success. In the play, a delusional mother’s overbearing tendencies alienate both her jaded son and her disabled daughter, who has withdrawn from reality into a fantasy life amid her collection of glass animal figurines. When the world opened in Chicago, ecstatic critics practically begged the public to go see it, and initially small audiences soon swelled to full houses. Productions of Williams’s next major work, A Streetcar Named Desire (1947), demonstrated that his stories worked just as effectively on film as onstage. The play’s protagonist, the haughty Southern belle Blanche DuBois, is ruined by both her own indiscretions and her run-ins with her loutish brother-in-law, Stanley Kowalski. A Pulitzer Prize for the world solidified Williams’s reputation. Williams followed with Cat on a Hot Tin Roof (1955), a searing disclosure of the mendacity underlying the sexual and familial relationships in a seemingly prosperous southern clan. This play won Williams another Pulitzer Prize. The themes that Williams explored in his works—violence, sexual frustration, mental illness, incest, alcoholism, and homosexuality—were scandalous for their time and shocked audiences. Williams’s language, meanwhile, was among the most innovative to grace the American stage. His characters speak in a strange, eloquent vernacular that brings mythic weight to their struggles—a world away from the acutely realistic dialogue that many of Williams’s contemporaries employed. Note: This excerpt is taken from The Intellectual Devotional by David S. Kidder and Noah D. Oppenheim. ©2006 Rodale
<urn:uuid:c84a2900-845e-4518-8cea-e879ea053e23>
CC-MAIN-2017-26
https://paperbackfool.wordpress.com/2010/09/08/literary-devotional-tennessee-williams/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322320.8/warc/CC-MAIN-20170628032529-20170628052529-00448.warc.gz
en
0.943329
440
2.625
3
Of the approximately eighty women who were instrumental in opening up the legal profession for women in the United States, Frances Wolf was the first Jewish woman in that very select group. She was born in Memphis, Tennessee, on June 18, 1873, the oldest of Tobias and Kate (Klein) Wolf’s eight children. Only Wolf, two sisters, and three brothers survived to maturity. Frances was a second mother to her siblings, breadwinner and caregiver all her life, most importantly after her father’s death in 1906. Wolf’s mother, Kate Klein, who was born in Baltimore, the daughter of a storekeeper, came to Memphis with her parents and met Tobias Wolf, an office worker. The Wolfs were a typical southern Jewish family: Reform in religion and southern in culture, keeping only the High Holy Days and cooking southern-style food. After graduating from Memphis High School and a business school, Wolf was employed as a clerk. Sent by her employer to work in a booth at the World’s Columbian Exposition in Chicago, she became interested in women’s rights and the law when she visited the Woman’s Pavilion. On her return, she began to read law and went to work for the law firm of John P. Houston. In 1903–1904, she attended the University of Tennessee law department, but not as a degree candidate. As the state of Tennessee would not admit her to practice law, she went to St. Louis and was admitted to the Missouri bar in 1904, returning to Houston’s office to work as a law clerk. Meantime, Marion Griffin, who worked in Judge T.M. Scruggs’s office in Memphis, left to study law at the University of Michigan. She graduated in 1906 and was admitted to the Michigan bar. Wolf and Griffin knew each other through their association with Judge Scruggs’s office. Griffin had been lobbying for a woman’s bar admission statute since 1900. When she came back to Memphis in 1906, Wolf joined her, and together they promoted the passage of the bar admission bill. Its enactment in 1907 was the result of their joint effort. The story is told that the two women planned to be admitted at the same time, but Griffin’s friends prevailed upon her to move immediately for admission without telling Frances Wolf. Griffin was admitted in February 1907, and Wolf, after struggling to get over her disappointment, was admitted on July 11, 1907. It was not the first time that two women working together to secure enabling legislation were caught up in a battle for the honor of being the first. The local bar association, however, always recognized both women as pioneers. Wolf worked as a title lawyer and trial lawyer with John Houston and John Johnson, practicing in all the state’s courts. She was the first woman lawyer to argue before the Court of Civil Appeals. Houston named her executor of his will, and when he died in the late 1920s, Wolf successfully administered his estate with its large real estate holdings. After her mother died in 1934, Wolf retired to take care of an invalid sister. A woman with a keen sense of humor, she loved music, nature, children, and her ever-growing collection of books, many on Napoleon. Her devotion to her family was exemplary. Frances Wolf died at age eighty-three of arteriosclerosis and pulmonary edema on January 28, 1957. She is buried in Temple Israel Cemetery in Memphis. Bench and Bar of Memphis Memorial Record. Memphis, Tenn. (n.d.); Memphis Commercial Appeal, July 12, 1907, and Obituary. January 29, 1957; Watkins, Emma. Interview, July 1961. How to cite this page Thomas, Dorothy. "Frances Wolf." Jewish Women: A Comprehensive Historical Encyclopedia. 1 March 2009. Jewish Women's Archive. (Viewed on January 21, 2017) <https://jwa.org/encyclopedia/article/wolf-frances>.
<urn:uuid:00071caa-c88a-456e-82a5-a7ced646c341>
CC-MAIN-2017-04
https://jwa.org/encyclopedia/article/wolf-frances
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281202.94/warc/CC-MAIN-20170116095121-00228-ip-10-171-10-70.ec2.internal.warc.gz
en
0.981392
829
3.328125
3
Some harmful chemicals can mess with your natural production of hormones. Some endocrine-disrupting chemicals can imitate hormones or turn one hormone into another. This interferes with their signalling to the body. Some studies have linked these chemicals to fertility issues, thyroid issues, cancer and developmental disorders. Apparently our hormones are critical for development which means that babies and children are at a higher risk of adverse effects from harmful chemicals. So which are the most common harmful chemicals? Here are 5 of the ones we think you should know about and how you can avoid them. Bisphenol A (BPA) BPA can often be found in the lining of canned foods and plastic packaging or bottles. It has been associated with cancer, reproductive and fertility issues, early puberty and obesity. In fact, it has been suggested that we should refrain from microwaving any food or drinks in plastic as it can transfer BPA into the body and can cause issues - especially for a growing one! Instead, use glass containers in your microwave. Manufacturers are rarely required to notify consumers when BPA is present, which means it's almost impossible to know whether you're exposed to it. However, you can take these steps to lower the chances: - Steer clear of plastics that have a "PC" marked on them - this stands for polycarbonate and many of them contain BPA. - Rather than buying canned food, opt for fresh, frozen or dried food. - Avoid heating food in the can or leaving food in the can when refrigerating after opening. Instead, transfer to a pan or glass container. - Even though not all manufacturers state whether BPA is present in their packaging, some do, so still check for this before buying! Phthalates are commonly found in synthetic fragrances, PVC, cling film and toys. Some studies have linked this chemical to birth defects and fertility issues in men, miscarriages and gestational diabetes. To avoid phthalates you can: - Avoid plastic tupperware and toys made from plastic. - Avoid products that have phthalates on the ingredients label, as well as any products that has 'fragrance' written on it. PFAS chemicals are a group of fluorinated compounds, which includes over 4,700 chemicals - some of which have been linked to thyroid problems, cancer, weak immune system and developmental defects. The group also includes chemicals whose health impacts are unknown. PFAS can be found in many items around the home including: kitchenware, waterproof clothing, carpets, upholstered furniture and food packaging. As PFAS are nonstick, waterproof and grease-resistant, they are highly desirable to manufacturers. It has even been found in drinking water in the UK. How to avoid PFAS: - Drink filtered water - either with a filter jug or a filter for your tap. Make sure when buying a filter you have an understanding of which chemicals it filters out - unfortunately it's not a one-size-fits all scenario! - Avoid stain-repellant treatment on carpets, upholstery and any other fabrics around the home. - Fast food is often served in PFAS-treated packaging- so eat as little of this as possible! - Hand-pop popcorn on the hob as microwaveable popcorn bags are often coated with PFAS. - Avoid nonstick pans and kitchen utensils that are made with PFAS. Atrazine is a chemical in the form of white crystals typically used as a herbicide for crops and to clear plant-life from industrial sites. Its use means that it often contaminates soil and water. Although virtually non-toxic to birds, it is very toxic to aquatic life. Scientists have found that the chemical can turn male frogs into females that produce fully viable eggs. The chemical can also affect humans. Atrazine can enter the body by inhaling air that has atrazine in or drinking water that is contaminated. Sadly, Atrazine can sometimes be found in our drinking water. Recent studies have shown its link to childhood leukaemia and Parkinson's disease. It can also cause gastrointestinal irritation (nausea, vomiting, diarrhoea) or skin irritation. To avoid this chemical, invest in a filter for your drinking water and buy organic produce. Perchlorate is a component of rocket fuel. It is an endocrine disruptor that can interfere with the thyroid glad. It does this by competing with iodine when entering the body, which the thyroid gland needs to make its natural hormones. Thyroid hormones regulate metabolism and are critical for proper brain/organ development in growing children. Perchlorate has been found to contaminate drinking water in the UK, as well as fruit and vegetables grown in greenhouses and cloches, dairy products and baby food! You can read the full report here. To avoid perchlorate, use a reverse-osmosis filter in your drinking water tap. While it is extremely difficult to avoid this chemical in food, you can offset potential effects by supplementing your diet with iodised salt to ensure you are consuming enough iodine.
<urn:uuid:03ceec03-a203-4f0a-a8b5-62a7daa119b6>
CC-MAIN-2020-50
https://www.kinn-living.com/blogs/informative/5-common-chemicals-and-how-to-avoid-them
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141163411.0/warc/CC-MAIN-20201123153826-20201123183826-00553.warc.gz
en
0.966286
1,052
2.953125
3
This week, the International Federation of Association Football (FIFA) named the Brazilian three-banded armadillo as the next World Cup mascot. The endangered animal, represented in cartoon form, will feature prominently in the branding images for the 2014 event, taking place in Brazil. As reported in Scientific American, the three-banded armadillo (Tolypeutes tricinctus) is classified as being “vulnerable to extinction.” Once common in the savannahs of Brazil, the armadillo has lost much of its natural habitat to cattle ranches and soybean plantations. The armadillo is also disappearing because of subsistence hunting. An article published last month in Biological Conservation predicts there will no suitable habitats for the three-banded armadillo by 2050, and the authors behind the paper call for the creation of new preserves for the animal. With the mascot decision, FIFA hopes to increase awareness of the armadillo’s possible extinction, and with the world watching, the event will emphasize the importance of conservation and ecology. FIFA has created a website for fans to learn more about unnamed mascot. The armadillo says that its blue shell represents “the natural beauty of Brazil that I am so committed to protecting. The blue tones represent the sky and clear waters in and around Brazil, which are full of life.” The site goes on to explain that this species belongs to one of only two armadillo species that can roll up into a nearly impenetrable ball. Although there may be doubt as to whether the mascot can truly make a difference in saving the species, the mascot is already drawing attention. Brazilian fans are unhappy with the potential names FIFA has selected for the mascot, reports Sports Illustrated. The names, Amijubi, Fuleco and Zuzeco, are a mix of Brazilian words for friendship, joy, football, blue, and ecology.
<urn:uuid:43cb561a-d345-432e-afa0-daf76239462e>
CC-MAIN-2017-22
http://www.onegreenplanet.org/news/endangered-armadillo-named-mascot-of-2014-soccer-world-cup/
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612036.99/warc/CC-MAIN-20170529072631-20170529092631-00084.warc.gz
en
0.931006
393
2.75
3
The longstanding idea that "cyclists fare best when they act and are treated as drivers of vehicles" ought to be reconsidered, a cycling columnist argues. The bicyclists who fought for the right to ride in Central Park 130 years ago won their battle only by agreeing that bikes should be legally regarded the same as horse-drawn carriages, J. David Goodman writes in the Spokes column in the Sunday New York Times. Once the carriage era ended, bicyclists were then subjected to the same rules that applied to drivers of automobiles. "It was in some ways a Faustian bargain, ensuring roads across the country would be bike-accessible but requiring cyclists to follow rules intended for much larger, more dangerous vehicles," Goodman observes. "Despite the law," says Goodman, "cyclists still debate where the bicycle belongs in the spectrum: from pedestrian to vehicle." “What is a bicycle?” asked the title of a panel discussion at an international bike conference last month in Spain. “An engine-less car or a pedestrian on wheels?” Goodman quotes Michael J. Smith, a longtime bike advocate in New York, as arguing that cyclists are are in fact "more like pedestrians” than like motorists. A two-wheeler is much smaller and far more vulnerable in a collision. A recent police crackdown on cyclists who disregarded some of the rules of the road in Central Park has focused attention once again on the standards that apply to bicyclists. Goodman suggests it's time to rethink bicycling's legal status.
<urn:uuid:ee4dd368-a650-4a13-9a36-03ea1b1d4d46>
CC-MAIN-2016-36
http://bettercities.net/news-opinion/links/14423/maybe-cyclists-shouldnt-be-treated-motorists
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982974951.92/warc/CC-MAIN-20160823200934-00054-ip-10-153-172-175.ec2.internal.warc.gz
en
0.964173
315
2.53125
3
Sleep apnea occurs when the throat collapses during sleep, and can be the direct cause of snoring, gasping for air, waking up in the middle of the night and feeling tired upon waking up. Many people are unaware that they have the disorder, and roughly one-third of the study patients had undiagnosed, and untreated apnea. Sleep apnea may be an indicator of dementia, according to a new study by researchers at the Brigham and Women’s Hospital in Boston, Massachusetts. The scientists monitored the health of elderly women who, at the beginning of the study had no signs of dementia. Participants who had sleep apnea were 80 percent more likely to develop the degenerative brain disease than those without breathing problems. “We were surprised that the effect persisted after considering education levels, other health problems and other possible reasons,” Dr. Susan Redline, one of the researchers, told The Boston Channel. The risk of developing sleep apnea increases with age, as does dementia. If an older adult exhibits signs of either one, a personal emergency response system may be a good investment to keep them safe.
<urn:uuid:c46f621c-b09f-470a-bd1e-a525dd40355a>
CC-MAIN-2017-17
https://www.bayalarmmedical.com/medical-alert-blog/researchers-find-link-between-sleep-apnea-and-dementia/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122996.52/warc/CC-MAIN-20170423031202-00622-ip-10-145-167-34.ec2.internal.warc.gz
en
0.963459
231
3.53125
4
Bloodstream infections (BSI) still account for significant morbidity and mortality. Rodriguez-Aguirregabiria et al. (2013) describe the epidemiology, etiology, sources and adequacy of empiric antimicrobial treatment in BSI in a retrospective study about all BSI diagnosed during one year. The pattern resistant pathogen study was an EPINE-EPPS project. Three-hundred-forty patients were included. The median age was 74.5 years [interquartile range (IQR), 58.5-80.5]; acute physiology and chronic health evaluation (APACHE II) score was 13 (IQR, 7-29). BSI were community-acquired in 56 percent of the cases. The most common source of BSI was urinary tract (48.3 percent ), intra-abdominal (25.6 percent ) and lower respiratory tract infections (18.6 percent ). The most commonly isolated microorganisms were: Escherichia coli, K. pneumoniae, S.aureus (15% oxacilin resistant) and S. pneumoniae. The 8.6 percent of enterobacteracea family produced extended-spectrum B-lactamasas (ESBLs). Inappropriate treatment was observed in 24.5 percent and crude mortality rate was 7.7 percent . Twenty-eight percent of BSI were nosocomial-acquired. The sources of BSI were unknown in 31.7 percent of the cases and catheter-related in 25.7 percent. The secondary sources of BSI were intra-abdominal in 57 percent of the cases. The most common isolated microorganisms were: S.epidermidis and other coagulasa negative, Candida, S. aureus (36 percent oxacilin resistant) and E. coli. 25 percent of enterobacteracea family were ESBLs. The researchers found five BSI caused by Acitetobacter carbapenem (CPM) resistant and 2 BSI by P. aeruginosa CPM resistant. Inappropriate treatment was observed in 52.5 percent and mortality rate was 28.7 percent. Healthcare-related BSI produced 15.1 percent of the cases. The source of BSI were unknown in 22.6 percent and catheter-related in 11.3 percent. The secondary sources of BSI were urinary tract (60 percent), intra-abdominal (31.4 percent) and respiratory tract infections(8.6 percent). The most common microorganisms were: E.coli, S.aureus (25 percent oxacilin resistant), S.epidermidis and K.pneumoniae. Inappropriate treatment was noticed in 34 percent and mortality rate was 17 percent. The researchers conclude that knowledge of local epidemiology is important to improve empiric antimicrobial treatment and to reduce mortality-related inappropriate treatment. Reference: Rodriguez-Aguirregabiria M, Gimenez-Julvez T, et al. Poster presentation P006 at 2nd International Conference on Prevention and Infection Control (ICPIC 2013): Highlights in bloodstream infections: where does the patient acquire the infection? Antimicrobial Resistance and Infection Control 2013, 2(Suppl 1):P6 doi:10.1186/2047-2994-2-S1-P6
<urn:uuid:97f8f4c0-6f18-423b-bcaf-731c01e0c5d9>
CC-MAIN-2020-16
https://www.infectioncontroltoday.com/personal-protective-equipment/researchers-study-epidemiology-etiology-empiric-antimicrobial
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370499280.44/warc/CC-MAIN-20200331003537-20200331033537-00297.warc.gz
en
0.925145
705
2.734375
3
Secular moral philosophy is the idea that morals come from your environment. In other words, they suggest that we receive our moral understanding from the society that surrounds us. This, coupled with the idea of the conscience encoded into all of us in our DNA, brings us morality. This ideology does not propose an objective standard. Therefore, every culture would have a unique moral standard. This is true simply because in every culture man and humanism would be held up as the standard objective for morality. It is not in man to set moral standards because of the varying nature of individuals. Rather, it is God that sets the standard for His creation. The Creator is the one who is the author of morality for what He has created, not any man, men, village, culture, or environment. Paul says in (1 Cor 15:33), “Do not be deceived: “Bad company ruins good morals” (ESV). With this statement Paul shows us that there is indeed a moral standard. Solomon says that there is a way of understanding. “Forsake foolishness and live, and go in the way of understanding” (Pro 9:6). Solomon is boldly proclaiming that God is the way of understanding. This means that Solomon understands and teaches us that God is the great Creator from which all wisdom comes from. With God’s wisdom comes all the information that is needed for life and godliness. “As His divine power has given to us all things that pertain to life and godliness, through the knowledge of Him who called us by glory and virtue,” (2 Pet 1:3). You see, it is God that calls us to virtue and godliness, not by chance or an idea, but through knowledge. Thus Solomon would come to the conclusion “Let us hear the conclusion of the whole matter: Fear God and keep His commandments, for this is man’s all” (Eccl 12:13). Within God’s commandments sits the root of man’s understanding of right and wrong, and man’s guide for morality. Another problem with the secular moral philosophy idea is that it is based on human emotion. A key component to this theory is that humans are bliss-driven. Your moral compass is effected by your society, and your society then reacts to what is positive and what is negative. In other words, what causes bliss and happiness is good and accepted as part of the moral standard. To the contrary, things that cause sadness, anger, and depression etc. are considered bad or not up to the moral standard. One of the problems with this idea is that what makes one person happy might not make another person happy. Some people achieve happiness when they commit murder and rape while others do not. According to secular morality, if the amount of people who become happy when they murder and rape outnumber the ones who don’t, then murder and rape become the standard of morality. When man is lifted up as the standard of morality, then man will fall because of his standards. To be continued next week…
<urn:uuid:8d86d44e-c286-4f0e-8fb2-78006940c92a>
CC-MAIN-2018-09
http://www.pearlandcoc.com/faulty-origins-of-morality/
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812880.33/warc/CC-MAIN-20180220050606-20180220070606-00222.warc.gz
en
0.959429
638
2.75
3
If you’ve walked by your horses feeding area or water trough and noticed slimy balls of half chewed food laying on the ground, your horse may be quidding. Quidding is a response to mouth pain in which the horse loses or spits balls of semi-chewed food stuffs out of their mouth. The most common cause of quidding is teeth that are uneven or that have sharp points. This does not allow the mouth to close properly and makes chewing extremely difficult. There is a host of other mouth issues that can lead to this problem as well, including cavities, abscesses, and unseen injuries. This problem most commonly occurs in older horses, however all ages can be affected. Besides the fact that quidding is an indicator that there is something wrong (and probably painful) in your horse’s mouth, this is an issue for a very simple reason: if the feed is falling on the ground, it is not being ingested and used by your horse. This can result in loss of weight and body condition as the horse may only swallow a fraction of what is being fed. In fact, one of the first things you should check if your horse starts dropping weight and losing body condition is the condition of the teeth and mouth. The good news is that quidding can be greatly improved or even cured all together with regular dental care by your veterinarian or an equine dentist. Often a process called floating the teeth can help file down sharp or uneven places on the teeth. Dental exams should happen at a minimum of once per year, even on healthy horses with no known problems. For horses who have dental issues, the check ups and/or treatments may be prescribed more often. In addition to regular dental exams, a horse with dental issues should be fed a feed that is easy to chew and digest. Make sure the ration is nutrient-dense to make the most out of what they do take in and, if necessary, consider switching the horse with severe dental problems over to a complete feed that may be soaked to soften before feeding.
<urn:uuid:b02aa0f9-3a62-44b2-872f-c7d474c7ab20>
CC-MAIN-2024-10
https://www.horsefeedblog.com/2014/02/quidding-more-than-just-a-funny-word/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00008.warc.gz
en
0.960961
421
2.984375
3
Children and teens have a wide variety of things to maneuver around in life as they grow up, but bullying shouldn’t be one of them. Two essential learning areas for children of all ages are educational and social growth. While most parents and educators try to focus on their child’s education skills, one of the most important life skills children can obtain is respectful social skills. Integration and Self Esteem While childhood offers many wonderful chances to advance not all places where children get education and socialization are healthy. To ensure that children grow up in healthy environments, they must have positive places to experience new things and grow. One of the most important ways to create a safe place for children to grow and thrive is by ensuring they are learning and socializing in respectful environments for people of all races and backgrounds. That means there needs to be strong stances against bullying with a zero-tolerance anti-bullying policies in their schools and programs they participate in. Educators, administrators, coaches, and program directors need to stop turning a blind eye to bullying behavior and create healthy environments that foster respect for every student and participant. One of the best ways to ensure bullying is prevented in childhood environments is by exposing the bullying at the core while encouraging respect as a mandate and enforcement against bullying. This should include reporting of bullying both in school and on social network platforms. If you are looking at a great way to get involved in anti-bullying programs, “I-SHOUT-OUT ” is a global platform for anyone wanting to speak out against intolerance, injustice, racism, or bullying, and you can learn more about their project at website.
<urn:uuid:414f9048-f599-4792-a5b6-f96941963d3d>
CC-MAIN-2024-10
https://theeducationcentral.com/2020/09/17/creating-healthy-anti-bullying-environments-for-kids-of-all-ages/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474595.59/warc/CC-MAIN-20240225103506-20240225133506-00482.warc.gz
en
0.963545
338
4.03125
4
Twelve kneading / petrissage techniques During a massage session, at least, 50% of time has to be spent on the petrissage-kneading techniques. Not only that each protocol, proposed in this book, offers its detailed mechanism, but also presents its purposes and goals in the overall scheme of treatment. In addition it’s important to discuss variety of kneading techniques. Medical massage recognizes twelve of them, five or six of which are used in daily practice. However, I believe that each massage therapist should know and perfectly administer each of these techniques. One of the greatest masters of conventional medical massage therapy, Sarazini, once said “if you want to assess the professional capabilities of a massage therapist, check how he performs kneading techniques.” There is some truth to this because the main power of massage therapy is a reflexive therapy. I don’t want to repeat myself because in chapters “Full Body Medical Stress Management Massage” and “Science of Massage and Energy Work” I explain the mechanisms of massage therapy in detail. Kneading techniques are mainly responsible for awakening the multiple therapeutic reflexes as a reaction to the original stimuli by our hands due to massive deformation of proprioreceptors caused by kneading. As you understand, the creation of electrical potentials is the result of deformation of proprioreceptors that are located in skin, fascia and muscles. Many research studies support the idea that for the best results, at least 50-60% of the massage therapy procedure must be spent on kneading. It doesn’t matter, which type of massage you are performing, whether it is full body stress management massage or sport massage or orthopedic massage or treatment for asthma. Unless otherwise indicated, all kneading techniques should be performed for at least 3 or 4 mobilization movements in one place before moving to a different area. Initial position; palms flat on human body, thumbs extended from fingers approximately 70 degrees. The first movement is initiated with both hands giving finger pressure against the tissue. Sustaining this pressure, we use the fingers of both hands, in sync, to shift the tissue towards the thumbs. Thumbs play the role of barriers. After shifting tissue to the thumbs, we continue circle motion of fingers, and this kind of kneading we performing 3-4 movements in each area. Amount of areas depend on the size of the part, which we are massaging as well as of our own hands. However, with Petrissage #1 we cover and stimulate all massage area. In principle, we perform this technique exactly like Petrissage #1, only instead of moving the hands synchronously, we move them one after the other. This technique is performed hand after hand, like Petrissage #2. However, whereas in Petrissage #2 it is the fingers that shift the tissue, in Petrissage #3 both the fingers and thumb of each hand works to shift the tissue, hand after hand, removing layer by layer, working deeper and deeper into the region. This makes the technique ideal for rounded areas such as the neck, knee, ankle, wrist/forearm, or shoulder. This technique is used for mobilization of the paravertebral tissue. Extend the thumb of one hand 90 degrees and place the web of this hand over the paravertebral region. With the 2nd-4th fingers of the other hand, applying pressure in a circular motion, shift-knead the tissue into the web of the first hand. The circular motion should be nonstop, in a manner that allows us to continuously shift the tissue into the barrier of the hand-web, resulting in massive mobilization. We can perform this technique over all areas of the back, as well as on the anterior and posterior thigh. In principle this technique is similar to #4, where the web between the fingers and extended thumb of one hand acts as the barrier. With the opposing forearm in a circular motion we shift the tissue to the barrier hand. In principles we perform this exactly like #5, but instead of the elbow, we use the fist to mobilize-knead the tissue towards the barrier of the other hand. This technique we perform on the lower part of the anterior leg and the forearm. One hand performs a kneading action like a single-handed Petrissage #3, traveling towards the heart. The other hand surrounds the lower leg or forearm and in a squeezing action follows after the kneading hand. This technique is performed with the knuckles, hands together in sync, with the thumbs creating a barrier and supporting the hands like a pole. Petrissage # 8 and 9 are typically used in treatment of people who suffer from asthma, or in pre-event sports massage treatment. Performed exactly like #8, but hand-after-hand. This technique utilizes the hypothenar region of both hands to shift and mobilize the tissues, hand after hand. When one hand does the circle motion the other hand has to create a barrier against the shifting in order to cause the deformation of proprioreceptors. Performed with both forearms, similar to how we utilize the hypothenars in #10. Mostly we administer the Petrissage #12 for calf muscles mobilization. With both hands grab the calf muscles, shift posterially as far as possible, squeeze between thumb and fingers and as it is being lifted, perform asynchronous kneading movement.
<urn:uuid:ebe45652-7dc3-4954-aeef-415bb63030d8>
CC-MAIN-2019-18
https://medicalmassage-edu.com/twelve-kneadingpetrissage-techniques/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578841544.98/warc/CC-MAIN-20190426153423-20190426175423-00224.warc.gz
en
0.917655
1,135
2.53125
3
Although 75 years have passed since the end of World War II, some of its secrets are still not disclosed. One of them is the existence in Poland of treasures in which the Nazis hid gold, jewelry and works of art. Manuel Villatoro on the pages of the Spanish edition of ABC discusses whether there really are hidden treasures of the Nazis. The reason for the search for Nazi treasures was the order of the head of the SS Himmler to hide in Poland the values stolen in the occupied countries. For the Nazis, the need to urgently hide values was caused by the rapid offensive of the Red Army. Whether this order actually existed is not reliably known, but according to some reports, the Germans involved about 260 trucks in the operation. Supporters of this version refer to the diary of one of the SS officers, which refers to 11 hiding places in Poland, and to other documents found. Their opponents believe that such treasures are unlikely to exist. For example, the historian Joanna Lamparsky believes that people who were in the hands of this information would hardly have published it, but would have acted differently. Of course, the Germans robbed the population of Eastern Europe more brazenly and shamelessly than the West European countries, therefore, more values were stolen by the Nazis in the east than in the West. The reason for this was the neglect of the Nazis towards the Slavs, whom they considered the lower race, unworthy of possession of works of art. The Spanish historian Miguel Martorell, who wrote the book Nazi Robbery, said in an interview with ABC that one should not trust the sensational publications about Hitler’s treasures too much and be so trusting. He believes that only irrefutable evidence of the existence of Nazi treasures deserves trust, and not rumors that need to be carefully checked: Is this possible? Of course. However, this still needs to be proved.
<urn:uuid:a720e33e-c22a-4e7c-b8e9-2d381e618388>
CC-MAIN-2020-45
https://en.topwar.ru/171913-sprjatannye-v-polshe-sokrovischa-nacistov-mif-ili-realnost.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107869933.16/warc/CC-MAIN-20201020050920-20201020080920-00204.warc.gz
en
0.971196
386
3.25
3
Antarctic Demolition is Underway Satellites shows B-15a iceberg scraping the Antarctic sea ice and shattering it. It is an event so large that the best seat in the house is in space: a massive iceberg is on a collision course with a floating glacier near the McMurdo Research Station in Antarctica. NASA satellites have witnessed the 80-mile-long B-15A iceberg moving steadily towards the Drygalski Ice Tongue. Though the iceberg's pace has slowed in recent days, NASA scientists expect a collision to occur no later than January 15, 2005. Image top: The Moderate Resolution Imaging Spectroradiometer (MODIS) instrument on NASA's Aqua and Terra satellites captured the above image and others recently. Image left: The MODIS instrument on NASA’s Aqua and Terra satellites captured 13 images of the shifting B-15A iceberg between November 9 and January 2, 2005. The Iceberg is also compared to the size of Long Island, New York. Click on image left for animation sequence. (.mpg) "It's a clash of the titans, a radical and uncommon event," says Robert Bindschadler, a researcher at NASA's Goddard Space Flight Center, and if the two giant slabs of ice collide, we could see one of the best demolition derbies on the planet. "Even a 'tap' from a giant can be powerful. It will certainly be a blow far larger than anything else the ice tongue has ever experienced," says Bindschadler. When the iceberg and the ice tongue collide, the impact will likely "dent their bumpers," says Bindschadler. The edges could crumple and ice could pile or drift into the Ross Sea. But if the B-15A iceberg picks up enough speed before the two collide, the results could be more spectacular. The Drygalski Ice Tongue could break off. The ice tongue is thick ice that grows out over the Ross Sea from a land-based glacier on Antarctica's Scott Coast. "Ice tongues do break off on occasion," says Bindschadler. "It would only take one thin area on the ice tongue to make it break off." There's no guarantee that the Drygalski Ice Tongue will break off, but "this is the toughest blow it has ever had to deal with." "That Ice tongue has no reason for staying intact" says Waleed Abdalati, researcher with NASA's Goddard Space Flight Center, but Bindschadler points out, it may not break up either. The results depend on the movement of the B-15A iceberg. The B-15A iceberg is a 3,000-square-kilometer (1,200-square-mile) behemoth that has a history of causing problems. It is the largest fragment of a much larger iceberg that broke away from the Ross Ice Shelf in March 2000. Scientists believe that the enormous piece of ice broke away as part of a long-term natural cycle (every 50-to-100 years, or so) in which the shelf, which is roughly the size of Texas, sheds pieces much as human fingernails grow and break off. Image right: A comparison of Iceberg B-15A and Long Island, New York. The berg initially drifted toward McMurdo Sound and grounded near Cape Crozier on Ross Island. It has since broken into pieces, the largest of which is B-15A. This year, B-15A has trapped sea ice in McMurdo Sound. The currents that normally break the ice into pieces and sweep it out into the Ross Sea have not been able to clean out the Sound, so winter's thick ice remains intact. The build-up of ice presents significant problems for Antarctic residents. Penguins must now swim great distances to reach open waters and food. Adult penguins may not be able to make the trip and return with food for their young. As a result, many chicks could starve, says Antarctica New Zealand, the government organization that oversees New Zealand's Antarctic research, in the Associated Press. The National Science Foundation (NSF) officials said that the B-15A iceberg and the frozen Sound will not interfere with supply ship access to McMurdo Station, the U. S. logistics hub for much of the nation's research activity in Antarctica. Forty miles of ice typically separate the pier at McMurdo from the open sea, but this year the ice stretched 80 miles from the station. So far, the extra ice has not been a problem. The U.S. Coast Guard icebreaker Polar Star left Seattle, Washington, on Nov. 4 and docked at McMurdo in early January after cutting a channel through the ice for supply ships. Ironically, a collision between the iceberg and the ice tongue could make things easier for both penguins and ships. If the ice tongue collapses, the way may be opened for sea ice to escape the Sound. There is no guarantee that satellite will see a great demolition because the berg's fate is unclear. The berg's future depends on unpredictable winds, tides and other forces, but possibilities include colliding with the floating Drygalski Ice Tongue, or continuing north, eventually melting. If the collision occurs as predicted, this could be an event that we witness again and again. The tides that drive the iceberg's motion tend to push it in circles. "If B-15A bangs the ice tongue once, it could bang it again," says Bindschadler. With multiple daily views of the Ross Sea, NASA satellites will be there to watch the show. Rani Chohan and Holli Riebeek NASA Goddard Space Flight Center
<urn:uuid:bb861b54-65f8-47d0-95cb-e33a801e2a3a>
CC-MAIN-2021-17
https://www.nasa.gov/vision/earth/lookingatearth/ice_berg_ram2.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039610090.97/warc/CC-MAIN-20210422130245-20210422160245-00328.warc.gz
en
0.932253
1,179
3.546875
4
The Fundamentals of Drawing offers an academic-inspired, foundational exploration of the drawing basics, which ultimately serves as the gateway to Walter Foster's newest core drawing-book series: The Academy of Art. Structured like a class curriculum, The Fundamentals of Drawing covers the basic concepts any beginning artist needs to learn this art form, including space and depth, proportion, composition, perspective, and more. To start the exploration, art instructor Jim Dowdalls demonstrates how to use the different types of drawing tools, including how to hold a pencil, how to use supports, and how to make a variety of marks and strokes. Artists will discover helpful information for understanding value and learning to create a value scale, as well as how to build value in their drawings using various techniques. Throughout this educational book, a myriad of step-by-step exercises and drawing projects encourage artists to put their newfound knowledge to use and practice the concepts and techniques demonstrated. With the skills and techniques they acquire in this comprehensive drawing course, beginning artists will be ready to take their artwork to the next level. Full of beautiful artwork that will inspire readers to explore drawing further, The Fundamentals of Drawing is the perfect place to start a mastery of fine art.
<urn:uuid:8c84ac8a-0a50-48f7-9ad7-d645afdb1f35>
CC-MAIN-2018-26
https://www.quartoknows.com/books/9781600584527/The-Fundamentals-of-Drawing.html?direct=1
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267868135.87/warc/CC-MAIN-20180625150537-20180625170537-00279.warc.gz
en
0.93687
249
3.046875
3
The initial bloom of a titan arum could take as long as 20 years, after the seed is cultivated. Kansas State University’s titan arum or “corpse flower” was cultivated in 2001 — but the last 10 days have been the longest. “I’ll never be pregnant, never know what that physically feels like,” said Chad Miller, an assistant professor of landscape horticulture at K-State. “But I think I have a good idea of what a pregnant woman hears, as far as the questions she may get. ‘Is it time yet?’ ‘When will it happen?’ I’ve had a lot of those questions since late last week.” In the very early hours of Wednesday morning, the bloom began to slowly open, stopping about halfway of what has been observed with other corpse flowers around the planet, including last week’s bloom in Cambridge, England. Miller said this slow opening might be due to the lack of pollination. “Oftentimes, by this point, a lot of those other gardens have already pollinated; they’ve cut a little hole in the side of the bloom and dusted some pollen inside. With a lot of plants, once they’ve been pollinated and fertilization has occurred, they keep opening, which is actually an act of wilting.” “We think of a fully-open bloom as something that is ‘alive,’ but actually that’s the first step in the death of that bloom,” Miller added. At its peak, the bloom (scientifically called an inflorescence) was about 51 inches high. Amorphophallus titanum produces the world’s largest unbranched inflorescence. A slow trickle of visitors made their way to the greenhouse during the past few days. Many more had been following Miller’s updates to the K-State Horticulture and Natural Resources Facebook Page, and the live video stream on YouTube. When people got wind of the bloom Wednesday morning, they began showing up in droves. The corpse flower experience is multi-sensory — a feast for the eyes, but a sock to the nose. “If you’ve ever driven by a dead animal on the side of the road in the middle of summer, that’s been lying there for a day or two, that’s what this pretty much might smell like, to most folks,” said Miller. The scent given off by the flower, along with the heat it generates, is meant to draw the flies that serve as pollinators. Bees and butterflies get to sit this one out. Not everyone was thrilled by the stench, which could be detected several yards from the greenhouse. “I can’t do it,” said one visitor who works in the Department of Horticulture. “I can do barf. I have twin boys, and I can do barf — but I can’t do this!” Since the flower is only open for about 24 hours, Miller had a narrow window for his next critical mission: pollen. He’d hoped to receive some pollen from nearby botanical gardens, but by early Wednesday afternoon, none had arrived. “To get the best seed set, it’s imperative to get pollen from another plant,” said Miller. “Since that doesn’t look like it’s going to happen, I’m going to attempt to collect pollen, and save some to share with other universities and botanical gardens in the future.” For anyone who missed the 2017 corpse flower bloom, Miller is hopeful that another bloom may happen as early as next year. “Our plant is quite large, so I think we may have another opportunity to see one of these in a year or two, or three.”
<urn:uuid:0efea7f4-d06c-414f-887b-a9a1c4f57e65>
CC-MAIN-2021-39
https://gardnernews.com/2017/07/03/kansas-state-university-greenhouse-welcomes-visitors-rare-bloom/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055684.76/warc/CC-MAIN-20210917151054-20210917181054-00643.warc.gz
en
0.969142
823
2.796875
3
Fire safety; Bicycle safety; Water safety Accidents are the most common cause of death in children 14 years old and younger. In fact, accidents cause more childhood deaths than diseases, drugs, or violence. Fortunately, many accidents -- for both children and adults -- can be avoided if simple safety measures are taken. - Install smoke detectors in hallways, sleeping areas, the kitchen, and garage. Test them once a month and change the batteries regularly. - Do not smoke in bed. - Keep matches and other flammable materials out of reach of children. - Never leave a burning candle or fireplace fire unattended. - Establish fire escape routes from every room in your house and teach family members what to do in case of a fire. Have twice-a-year fire drills to practice escaping. - Keep fire extinguishers in handy locations. Have at least one extinguisher on each level of your home. - Know how to use a fire extinguisher. In an emergency, you must be able to act fast. - Teach children about fires. Explain how they are accidentally started and how to prevent them. - Children's sleepwear should be specifically labeled as snug-fitting or flame-resistant. Using other clothing, including loose-fitting garments, increases the risk of severe burns if the item catches fire. - Make sure household wiring is up-to-date. - Store flammable materials away from heat sources, water heaters, and open-flame space heaters. - Supervise children when they are using fireworks. Never assume that a child will read and follow safety instructions. HOTEL FIRE SAFETY - After checking into a hotel, always find the exits and fire alarm closest to your room. Point these out to the people you are staying in the room with. - Review the hotel's safety information in your room. - Do not smoke in bed. - If there is a fire outside of your room, always feel the door before opening it. If it is hot, do not open it -- telephone for help. - If you leave your room, take your room key with you so that you can get back into your room if the nearest exit is blocked. - If you are forced to stay in your room, telephone for help, turn off the air-conditioning and heating systems, and open your window slightly for ventilation. - To help keep smoke from entering into your room, soak sheets and towels and stuff them under the door. - Stay close to the floor for the freshest air and hold a wet washcloth over your face. - Do not attempt to run though smoke or flames. - Do not use any elevators during a fire. They are electrical and could shut down, trapping you inside. - Wear a bike helmet. - Make sure bikes are the right size. A child should be able to straddle a bike with both feet on the ground. - Young children should use bikes with coaster brakes -- the kind that brake when you pedal backwards. With hand brakes, a child's hands should be large enough and strong enough to use the levers. - Avoid riding at night if at all possible. Make sure your bike has reflectors. - Stop at stop signs, check for traffic before turning, and never ride out into a street without stopping first. - Ride on the same side of the road as the cars. - Be predictable and ride defensively. Ride where drivers of cars can see you. Bicycles are frequently hit by cars because the driver did not even know the bike was there. Many accidents have been avoided because the biker was watching out for cars. - Wear brightly colored clothing so that motorists can easily see you. - The space between crib bars should be no more than 2.5 inches. - The distance from the mattress to the top of the rail should be over 2 feet. - DO NOT put extra blankets and stuffed animals in a crib with a baby. - DO NOT place a baby on the stomach to sleep. - Always keep one hand on an infant who is lying on a changing table. - Place gates at the top and bottom of each stairway. - Cover unused electrical sockets. - Keep cleaning fluids, bug poisons, and other chemicals well out of a child's reach. Avoid storing toxic substances in unmarked or inappropriate containers (such as food containers). If you suspect poisoning or have questions, call 1-800-222-1222. - Buy medicines with child-resistant caps. Place all medications out of the reach of children. - Put safety latches on cabinets that a child should not open. - Keep knives and matches out of reach. - Keep plastic bags away from children. - Keep children away from hot drinks and stove tops. - When cooking on the stove, make sure that pot and pan handles are turned to the middle of the stove. Handles that hang over the edge of the stove may be reached by a curious toddler. - Keep toys with small parts out of the reach of infants and toddlers. This includes stuffed animals with buttons. - Avoid putting dangerous items in a waste basket where a young child might find them. - Keep toilet lids down. - Never leave infants and children unattended in a bathtub. - Check water temperature in a bath before placing a child in it. - Set the hot water heater thermostat to no more than 125°F. - When heating a baby bottle, always test the milk temperature to prevent burning your baby's mouth. - Inspect playground equipment for signs of deterioration, weakness, and damage. - Teach children what to do if strangers approach them. Teach them at an early age that no one should touch private areas of the body. - Make sure children know their address as early as possible. Teach them to call 911 when in trouble. - Teach children to watch for cars on streets. They must stop, look both ways and listen for approaching traffic. Children must also be very aware of cars on driveways and in parking lots. Cars backing up cannot see small children. - Supervise young children at all times. - Wear protective footwear and eye wear when mowing the lawn, operating power tools, working with a chisel, or hammering metal on metal. - Keep tools away from children until they are old enough to use them properly. - All stairways should have a sturdy hand rail. - All entryways should have bright lighting. - Don't leave objects on stairways. Make sure that carpet on stairways is securely fastened. - Unplug appliances (such as heating pads and electric blankets) when they are not in use. - In the bathroom, use non-slip floor mats. Put non-slip appliques on the bathtub. - Don't use any electrical appliances when you are wet or in the bathtub, shower, or pool. - Make sure that each fireplace has a fire screen. - Keep guns locked up and unloaded. Firearms and ammunition should be stored separately. - Make sure your house number is easily visible from the street. - Always wear a seat belt. - Obey traffic laws and drive defensively. - Do not drink alcohol and drive. - While driving, try to avoid any distractions from others in your car. - Keep your vehicle properly serviced, especially before going on a long trip. Keep an emergency kit in your car. - Take the weather into account before venturing out on the roads. INFANT AND CHILD CAR SEATS - Car seats are required by law for children under 40 pounds. - The safest position for an infant car seat is rear facing in the back seat. - In most models, the infant seat is used AT LEAST until the child reaches 20 pounds and 1 year of age. (Some experts recommend rear-facing child seats until the child is 30 pounds; check the weight restrictions on your specific seat.) At that point, a forward-facing seat can be used. This may require a new car seat -- it depends on the model. - Booster seats should be used for children 40 to 80 pounds. Some states have passed laws requiring that children up to 8 years old or 80 pounds be put in booster seats. - Read the car owner's manual to determine the safest place to fasten a car seat in YOUR car. - Know how your car seat is designed to be used. Read the instructions carefully. - Adapters may be needed for certain types of cars or certain seat belt types. - For more information call your car seat manufacturer, car manufacturer, or the State Highway Safety Office. - Wear protective eye wear if your job carries any risk of eye injury. - If your work environment is so noisy that you have to shout to be heard, then wear earmuffs or ear plugs. - Be cautious when handling hazardous materials (such as asbestos) and wear appropriate masks and other protection if working in an environment where dangerous chemicals are used. Avoid any exposure to hazardous chemicals if you are pregnant or are trying to become pregnant. - Avoid any use of illegal drugs or alcohol while on the job, particularly when operating heavy machinery. Sleep disorders and health problems can result from frequent shift changes (like from night to day shifts) as well as from "jet lag" due to long-distance travel. Try to minimize frequent shift changes and excessive travel if possible. - Learn CPR . - Teach your children to swim, but do not assume that this alone will prevent drowning in young children. - Never leave young children unattended, even for a minute, in a bathtub, swimming pool, lake, ocean, or stream. - Fence all home pools and keep the gate closed and locked. - Always wear life preservers when boating, even if you can swim. - Avoid drinking alcohol when swimming or boating. - Never swim alone. - Never dive into water unless you know beforehand how deep it is. - Know your limits. Do not over-exert yourself. - Avoid standing on wet surfaces or being in water during a lightening storm. - Stay out of strong currents. - Do not overload your boat. If your boat turns over, stay with the boat until help arrives. CAMPING AND HIKING SAFETY - Always bring a first aid kit when camping. Know how to use it. - Use the buddy-system. Never camp or hike alone. If you were to break a leg or fall and get stuck, a partner could go for help. - Make sure someone knows where you plan to camp or hike. - Be careful when exploring. Take a compass and map. Remember landmarks. - Take whistles in case you get lost or run into trouble. Whistles can be heard further than your voice will carry. - Be careful when chopping wood or building fires. - Wear long-sleeved shirts and long pants to avoid bites from ticks and other insects. In cold conditions, wear many layers of thin clothing, along with a hat, boots and gloves. - Take a supply of clean drinking water and drink it. People can become dehydrated very quickly in warm, dry, or windy conditions. Dehydration can lead to other serious complications. - Don't drink stream or lake water. - Avoid drinking alcohol. It tends to cause dehydration. - Don't provoke, touch, or get close to wild animals. - Don't eat wild berries and plants. - Don't over-exert yourself when hiking. - Never leave a campfire unattended. - Before leaving a campsite to return home, make sure all fires are out and the ashes are cold. A single burning ember in a seemingly smothered fire is enough to initiate a full-blown fire. - When outside on a warm, sunny day, protect yourself from the sun by wearing a hat, a water-proof sunscreen, and loose-fitting, light-colored clothing. - Sun protection is especially important between 10 a.m. and 2 p.m. - Drink plenty of water, but avoid drinking alcohol on hot, humid days when you are outside. Alcohol can cause dehydration. - If you become overheated, sit in the shade, drink plenty of water, and try to keep your skin cool and moist. - Keep very young children's skin from being exposed to the sun. - Never leave children or pets unattended in a car in the sun -- even for a few minutes. - Wear appropriate sunscreens -- a sunscreen rating of 15 should give adequate protection for most people. - Remember, there is no such thing as a healthy suntan. - Avoid unnecessary display or talk about your valuables. - Avoid hiding a house key under the doormat or nearby vicinity. - Teach your family to leave the house undisturbed and call the police if they discover a burglary has been committed. - Trim trees and shrubs to eliminate hiding places. - Consider a security closet with a solid core door and a dead-bolt lock. - Keep emergency telephone numbers listed on your phone. - Install lights around the perimeter of your home. - Lock up your ladder. DOORS AND ENTRY AREAS - Outside doors should be solid core construction. - Entry doors should have a wide-angle viewer. - Exterior doors should have cylinder-type dead-bolt locks. - Doors without cylinder locks should have a heavy bolt or some similar secure device that can be operated only from the inside. - Sliding doors should have a lock that locks both the door panels together or the active side to the frame. - The garage door and basement door should be secured with a lock. - Lock your garage door at night and when you are away from home. - All windows should be equipped with locks or be pinned. - Keep your windows locked when they are shut. - Put secure locks on garage windows. - Cover garage windows with curtains. WHEN YOU GO ON VACATION - Arrange for friends or neighbors to pick up newspapers and mail. - Notify a neighbor you'll be gone. - Arrange to keep your lawn maintained. - Arrange to have your snow shoveled. - Use timing devices for your lights and radio. Rivara FP, Grossman D. Injury control. In: Kliegman RM, Behrman RE, Jenson HB, Stanton BF, eds. Nelson Textbook of Pediatrics. 18th ed. Philadelphia, Pa: Saunders Elsevier; 2007:chap 61. Hoyt DB, Coimbra R, Acosta J. Management of acute trauma. In: Townsend CM, Beauchamp RD, Evers BM, Mattox KL, eds. Sabiston Textbook of Surgery. 18th ed. Philadelphia, Pa: Saunders Elsevier; 2007:chap 20. Bergen G , Chen LH, Warner M, Fingerhut LA. Injury in the United States: 2007 Chartbook. Hyattsville, MD: National Center for Health Statistics. 2008. |Review Date: 8/2/2009| Reviewed By: Linda J. Vorvick, MD, Medical Director, MEDEX Northwest Division of Physician Assistant Studies, University of Washington, School of Medicine. Also reviewed by David Zieve, MD, MHA, Medical Director, A.D.A.M., Inc. The information provided herein should not be used during any medical emergency or for the diagnosis or treatment of any medical condition. A licensed medical professional should be consulted for diagnosis and treatment of any and all medical conditions. Call 911 for all medical emergencies. Links to other sites are provided for information only -- they do not constitute endorsements of those other sites. © 1997- A.D.A.M., Inc. Any duplication or distribution of the information contained herein is strictly prohibited.
<urn:uuid:141823b8-42d7-4141-ae16-a9cb27aeb20a>
CC-MAIN-2014-49
http://www.gbmc.org/body.cfm?xyzpdqabc=0&id=16&action=detail&AEArticleID=001931&AEProductID=Adam2004_1&AEProjectTypeIDURL=APT_1
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931004246.54/warc/CC-MAIN-20141125155644-00042-ip-10-235-23-156.ec2.internal.warc.gz
en
0.894346
3,334
3.671875
4
Using high-efficiency mouse germline mutagenesis to investigate complex biological phenomena: genetic diseases, behavior, and development McDonald, J. David MetadataShow full item record Proceedings of the Society for Experimental Biology and Medicine. Society for Experimental Biology and Medicine (New York, N.Y.). 1995 Sep; 209(4): 303-8. A valuable approach to investigating a biological process is to study the effect of mutations in the involved genes. By studying a diverse set of such mutations, one can gain important insights into the roles that the given gene product plays in the biological process. Although this approach has long been recognized, the scarcity of mammalian mutations has largely limited such investigations to simple organisms. It has recently been shown that highly efficient mutagenesis of the mouse germline with a random point mutagen can produce mutations that are valuable in several important ways. First, it can produce numerous different types of mutations. Second, it can be used to mutate genes that have yet to be cloned or characterized. Genes that have been marked by mutation can ultimately yield molecular access after mapping to high resolution and cloning from map position. Such new investigative capabilities will ultimately allow one to gain intimate knowledge of the molecular basis of complex biological processes like behavior and development. Third, mutations can be induced that yield animal models of human heritable diseases. Such disease models allow for intensive research into the etiology of the given disease and also permit the facile evaluation of new therapeutic regimens. Click on the link below to access the article (may not be free). - BIO Faculty Publications
<urn:uuid:399aedb0-23eb-4e89-9173-f055a530fd84>
CC-MAIN-2015-48
http://soar.wichita.edu/xmlui/handle/10057/4208
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398453553.36/warc/CC-MAIN-20151124205413-00316-ip-10-71-132-137.ec2.internal.warc.gz
en
0.903275
325
2.640625
3
When Jack London embarked to the Klondike in search of gold, he brought two seminal works with him, Milton's Paradise Lost, and Charles Darwin's On the Origin of the Species. The latter's influence is evidenced by the ways in which nature administers the law. When Buck attacks a man to defend John Thornton, the miners set up a mock court to settle this dispute on the frontier. That they set up their own councils demonstrates a different kind of justice at work in the Northland. While "moral consideration” and reason operate in the Judge's courthouse in the Southland, Darwinian tenets, such as "survival of the fittest,” natural selection, and adaptation are actively enforced in London's Klondike. For example, most deaths in The Call of the Wild occur because the victim could not adapt to his/her environment. The dogs that Hal, Charles, and Mercedes acquire for their sled dog team are ill suited for work in the traces and for the Klondike's harsh environment, so they die. Similarly, Hal, Charles, and Mercedes perish because they cannot adapt to life in the Northland. Mercedes cannot part from her possessions, while Hal and Charles do not have the wherewithal to execute a successful trip across the Yukon, nor do they listen to the advice of experienced settlers, who warn them against traveling on thin ice. Consequently, Hal's ignorance leads his team to a treacherous patch of thin ice, while Mercedes' heavy articles weigh down the sled, causing the ice to cave beneath them. Because they do not adapt to nature's ways, they are neither fit, nor selected to survive. In contrast, Buck excels and survives in the wild because he follows his instincts. Such distinctions underline the harsh and brutal character of nature's laws, which are codified in the law of club and fang—wild justice is served when the most adaptive survive, the strong thrive, the weak die, and those who disrespect nature's laws suffer nature's wrath. This order is reflected in the way that the sled dog team operates, like an organism within an ecosystem. The sled dog team is healthy and thrives in the wild under the direction of respectful owners like François and Perrault, but suffers under poor masters like Hal, Charles, and Mercedes. Similarly, the dogs work best in the traces when every dog knows his place within the natural order, but falls into some disorder when Buck upsets this balance by overthrowing Spitz. However, Buck is able to restore order on the team when he takes over because he knows how to play by nature's rules. Wild Law and Order ThemeTracker Wild Law and Order Quotes in The Call of the Wild He was beaten (he knew that); but he was not broken. He saw once for all, that he stood no chance against a man with a club. He learned the lesson, and in all his after life he never forgot it. That club was a revelation. It was his introduction to the reign of primitive lawÉ Again and again, as he looked at each brutal performance, the lesson was driven home to Buck: a man with a club was a lawgiver, a master to be obeyed, though not necessarily conciliated. He had been suddenly jerked from the heart of civilization and flung into the heart of things primordial. No lazy, sun-kissed life was this, with nothing to do but loaf and be bored. Here was neither peace, nor rest, nor a moment's safety. All was confusion and action, and every moment life and limb were in peril. There was imperative need to be constantly alert; for these dogs and men were not town dogs and men. They were savages, all of them, who knew no law but the law of club and fang. So that was the way. No fair play. Once down, that was the end of you. This first theft marked Buck as fit to survive in the hostile Northland environment. It marked his adaptability, his capacity to adjust himself to changing conditions, the lack of which would have meant swift and terrible death. It was inevitable that the clash for leadership should come. Buck wanted it. He wanted it because it was his nature, because he had been gripped tight by that nameless, incomprehensible pride of the trail and trace—that pride which holds dogs in the toil to the last gasp, which lure them to die joyfully in the harness, and breaks their hearts if they cut out of the harness. The insidious revolt led by Buck had destroyed the solidarity of the team. It no longer was as one dog leaping in the traces. Dave resented being taken out, grunting and growling while the traces were unfastened, and whimpering brokenheartedly when he saw Sol-leks in the position he had held and served so long. For the pride of trace and trail was his, and sick, unto death, he could not bear that another dog should do his work. He had killed man, the noblest game of all, and he had killed in the face of the law of club and fang.
<urn:uuid:b81e5973-cf1d-4290-91d3-769678f98c72>
CC-MAIN-2016-40
http://www.litcharts.com/lit/the-call-of-the-wild/themes/wild-law-and-order
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661123.53/warc/CC-MAIN-20160924173741-00077-ip-10-143-35-109.ec2.internal.warc.gz
en
0.978658
1,052
3.125
3
In Florida, citrus orchards and an old well have been reborn as a Spanish explorer’s quixotic dream come true. Created in 1904 by local entrepreneur “Diamond Lil” (aka Luella Day McConnell), the 15-acre Fountain of Youth Archaeological Park is purportedly located on the site where Spanish explorer Ponce de Leon first landed in 1513. Although Ponce de Leon has long been associated with the story for the search for the mythical fountain, he actually never wrote anything about any such quest. It was only after his death that other biographers wrote that the fountain was the motivation behind his expedition in Florida. The legend of the mysterious life-giving spring dates back to at least the time of Herodotus, placed everywhere from Ethiopia to the mythical islands of Bimini, but since Ponce de Leon’s time it has firmly been associated with Florida. The larger-than-life personality of Diamond Lil matched her colorful background. She left her life as a practicing doctor in Chicago (unusual for a woman of the era) to take part in the Klondike gold rush of the 1890s (even more unusual). She must have done something right, because she was described as arriving in St. Augustine, Florida in 1904 with “cash and a diamond in her front tooth.” She bought land and promptly opened her park and converted the on-site well into the Fountain of Youth. St. Augustine at the time was firmly gripped with a kind of Ponce de Leon mania, so her choice of themes was appropriate. In no time at all she began unearthing “artifacts” related to the Spanish explorer, including one that looked suspiciously similar to an old salt cellar. Since her time, the park claims to have made several important archaeological discoveries, including Ponce de Leon’s “recording landmark and accompanying artifacts,” Native American artifacts, and evidence of an early colony on the site.
<urn:uuid:733018bc-cc94-4203-9333-848e7b75b449>
CC-MAIN-2022-49
https://www.atlasobscura.com/places/the-fountain-of-youth-st-augustine-florida
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711475.44/warc/CC-MAIN-20221209181231-20221209211231-00200.warc.gz
en
0.97345
408
3.015625
3
Living with cerebral palsy poses difficult physical challenges. One of these challenges is severe spasticity, which can get in the way of daily activities. Fortunately, there is a therapy from Medtronic that can minimise severe spasticity in some individuals. Cerebral palsy is a movement and posture disorder resulting from an injury or defect to the developing brain (brain damage). Cerebral palsy can be caused by brain injury during intrauterine life or at birth. It can also be acquired after birth. In this case, cerebral palsy is usually caused by brain damage in the first few months or years of life. Several risk factors can increase the likelihood of cerebral palsy. However, it's important to know that these risk factors will not necessarily result in the disease. These risk factors are usually present: Risk factors for cerebral palsy include:1 Early signs of cerebral palsy usually appear before a child is 18 months old. Infants with cerebral palsy are frequently slow to reach developmental milestones, such as learning to roll over, sit, crawl, smile, or walk. Parents are often the first to suspect that their infant is not developing motor skills normally.1 Symptoms that can accompany cerebral palsy include: Cerebral palsy ranges from mild to severe. Physical signs of cerebral palsy include weakness and floppiness of muscles, or spasticity and rigidity. In some cases, neurological disorders (such as mental retardation or seizures) also occur in children with cerebral palsy.2 Cerebral palsy is usually diagnosed early in life. Your doctor will review your child's medical and family history and perform a physical evaluation. In addition to checking for the typical symptoms, the doctor may perform specialised tests to help diagnose your child's condition. Your doctor can help distinguish normal variation in development resulting from a developmental disorder. Spasticity is caused by damage or injury to the part of the central nervous system (the brain or spinal cord) that controls voluntary movement. This damage disrupts important signals between the nervous system and muscles, creating an imbalance that increases muscle activity or spasms. Spasticity can make one's movement, posture, and balance difficult. It may affect your ability to move one or more of your limbs, or to move one side of your body. Sometimes spasticity is so severe that it gets in the way of daily activities, sleep patterns, and caregiving. In certain situations, this loss of control can be dangerous for the individual. Information on this site should not be used as a substitute for talking with your doctor. Always talk with your doctor about diagnosis and treatment information.
<urn:uuid:98c7ce73-357c-4e4c-bbc5-23655967d944>
CC-MAIN-2014-23
http://www.medtronic.eu/your-health/cerebral-palsy/index.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510266597.23/warc/CC-MAIN-20140728011746-00048-ip-10-146-231-18.ec2.internal.warc.gz
en
0.949403
547
3.421875
3
Hassan Fathy was born in 1900 in Alexandria, Egypt. He was an Egyptian architect, artist and poet who had a lifelong commitment to architecture in the Muslim world. Early in his career he began to study the pre-industrial building systems of Egypt to understand their aesthetic qualities, to learn what they had to teach about climate control and economical construction techniques and to find ways to put them to contemporary use. systems dominated his thinking: the climatically efficient houses of Mamluk and Ottoman Cairo, ingeniously shaded and ventilated by means of their two-storey halls, mashrabiyyas and courtyards; and the indigenous mud brick construction still to be found in rural areas. The latter consists of inclined arches and vaults, built without shuttering, domes on squinches built over square rooms in a continuing spiral, semi-domed alcoves and other related forms. The urban housing forms of Cairo could not serve Fathy directly as a replicable source because of the disappearance of the building traditions that created them. These fine old houses enriched his imagination, however, and were to become models for later large-scale work. The ancient mud brick forms, in contrast, were still being produced by rural masons unchanged. Stimulated by what he had learned, Fathy had what was then a revolutionary idea. He perceived that a connection could be made between the continuing viability of mud brick construction and the desperate need of Egypt's poor to be taught once again to build shelter for themselves. Hassan Fathy devoted himself to housing the poor in developing nations and deserves study by anyone involved in rural improvement. Fathy worked to create an indigenous environment at a minimal cost, and in so doing to improve the economy and the standard of living in rural areas. Fathy utilized ancient design methods and materials. He integrated a knowledge of the rural Egyptian economic situation with a wide knowledge of ancient architectural and town design techniques. He trained local inhabitants to make their own materials and build their own buildings. Climatic conditions, public health considerations, and ancient craft skills also affected his design decisions. Based on the structural massing of ancient buildings, Fathy incorporated dense brick walls and traditional courtyard forms to provide passive cooling. Awards 1959: Encouragement Prize for Fine Arts and Gold Medal. 1967: National Prize for Fine Arts and Republic Decoration. 1980: Chairman's Award, the Aga Khan Award for Architecture. 1984: Union Internationale des Architectes, Gold Medal. "As a member of the Doxiades Organization in Athens between 1957 and 1962, Fathy entered wholeheartedly into both the intellectual and social activities of the Ekistics group, lecturing on the relationship between climate and architecture at Athens Technical Institute and joining the 'City of the Future' research project then underway at the Ekistics Centre itself. The drawings for the Iraq Housing Program, which were associated with this project, include master planning of an entire city, as well as a detailed examination of one component. This component, representing one neighbourhood in the city, is made up of all the elements of a traditional Iraqi village, such as a mosque, market shops, coffee-house, school and houses, with the addition of a park and immaret, or administration centre. Closer examination of the drawingso for what he called Hussiyah Village, while initially giving pause because of an occaisional lapse into 'beton brut', which is used as a gesture towards his patron, show a deep concern for the separation of pedestrian and vehicular circulation, and for the types of housing provided for different classes of people, including farming and non-farming families as well as government officials, and tradesmen. The drawings are also accompanied by sketches of vernacular houses with stone basements designed to trap cool night air for recirculation through the house during hot summer days, indicating that they be used as models for single-family houses, with the old system incorporated into the new designs." (construction not verified) Steele, James. 1997. An Architecture for People: The Complete Works of Hassan Fathy. London, United Kingdom: Thames and Hudson.
<urn:uuid:50af527e-0b0e-41c7-a3e9-a7b8c29ba996>
CC-MAIN-2020-40
http://archnet.org/authorities/1/sites/2590
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400204410.37/warc/CC-MAIN-20200922063158-20200922093158-00300.warc.gz
en
0.968286
869
3.25
3
Bollinger Bands are a technical analysis indicator, that was first introduced in the 1980`s by long-time technician John Bollinger. Indicator’s main purpose is to predict the future behavior of the price chart. Bollinger Bands consist of a moving average and two trading bands. The latter are the result of adding (subtracting) a standard deviation to (from) a normal moving average. In statistics, the standard deviation is a measure that is used to qualify the amount of variation. In technical analysis, the standard deviation (SD) is used to estimate price volatility of an asset. In other words, the higher the standard deviation the wider the price range of an underlying asset for the given period of time. Measuring how far the price can deviate from its average value is helpful when one wants to predict future price fluctuations. How do Bollinger Bands work? As noted above, the indicator consists of three lines: one exponential moving average and two price channels above and below it. Price channels depend on price action, widening at the moments of high volatility and contracting when the market is still. Price bands are the standard deviations of the underlying asset and encompass the trading activity around the trend. For investors volatility is as important as trend direction and trend strength: volatile markets provide additional trading opportunities. If you want to understand how to use Bollinger Bands in trading, then it’s important to understand they are based on one simple idea: when the price level rises/drops too much it is supposed to bounce back. It can also be noted that calm periods of low volatility are usually followed by serious market movements, which can also be predicted with the help of Bollinger Bands. All of the above can be used by traders to determine optimal entry points. How to set up? Setting up Bollinger Bands in the IQ Option platform is easy. In order to do so simply click on the “Indicators” button in the bottom left corner of the screen and pick “Bollinger Lines” from the list of available indicators. Then click “Apply” if you prefer working with recommended settings. Otherwise, go to the “Set up & apply” tab and get an opportunity to adjust the period and the standard deviation according to your requirements. The indicator is ready for use. How to use Bollinger Bands in day trading? In order to use Bollinger Bands effectively in day trading, it’s essential to understand basic characteristics of price volatility and its applications in trading. As a rule, periods of low volatility are generally intermingled with high volatility periods. In the downtrend, the price usually fluctuates between the lower band and the average line. In the uptrend, on the contrary, the price lies in the corridor between the upper band and the middle line. The longer the market stays still the higher are the chances for an upcoming volatility boost. Bollinger Bands are ideally suited to pinpoint such moments. Using this indicator the trader is able to predict future volatility fluctuations and determine overbought/oversold positions, opening deal at the most expedient moment. When the asset leaves the “normal” price range the majority of risk-averse traders stop opening new deals and wait for the market to stabilize once again. The situation when the price bands come closer together is called the squeeze. Such periods indicate low current volatility and potential for high volatility in the near future. However, the indicator doesn’t provide the trader with the information on a particular moment in time when volatility is supposed to increase. Traders remain mostly inactive during the squeeze. Approximately 90% of price action takes place between the price bands. The events that take place in the remaining 10% of the time are called breakouts. A breakout is an event during which price action leaves the “normal” price range. They should not be used as trading signals as they do not provide any information on future trend strength and direction. Combine and conquer Bollinger Bands are good at showing current volatility and sometimes predicting upcoming market fluctuations but are not a universal trading tool. According to Mr. Bollinger himself, this indicator should be combined with other indicators for maximum predictive potential and effectiveness. Bollinger Bands are an indicator worth learning and using in real-life trading. Not only it is simple and useful but also has a potential of giving the trader timely buy or sell signals, while the majority of market participants are still unaware of the future trend direction. Buying the stock when the average line crosses below the lower Bollinger Band and selling it when the price has bounced from the upper Bollinger line is a widely used trading strategy with high profit-generating potential.
<urn:uuid:025827b5-023a-4a0e-bebc-5f4a5bf56a07>
CC-MAIN-2018-26
http://best-trading.eu/how-to-use-bollinger-bands-in-trading/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866888.20/warc/CC-MAIN-20180624063553-20180624083553-00443.warc.gz
en
0.929999
982
2.78125
3
The Indian Air Force does not plan to train women to be fighter pilots. Neighboring Pakistan is not much better, even though it has seven female fighter pilots. They fly F-7s, a Chinese version of the Russian MiG-21. None have been in combat yet, despite the heavy use of jet fighter-bombers in nearly a year of fighting in the tribal territories. There, the more modern F-16s are doing most of the bombing of Taliban targets. The Indian air force leaders believe that it costs so much (over $2 million) to train a fighter pilot, that they air force needs 10-15 years of active service to get that investment back. But women tend to leave the air force to have children, thus making them much more expensive fighter pilots than their male counterparts. So the Indian leadership is holding off on female fighter pilots. Women flying Pakistani F-7s are a very recent development, part of a program that only began six years ago. Pakistan is not alone using women as fighter pilots, with China graduating its first 16 female fighter pilots this year. There are already 52 women flying non-combat aircraft, and another 545 in training. India has female military pilots, who only operate helicopters and transports. All this began with the success of female military pilots in the United States over the last three decades. This led to an increasing number of other countries are moving in that direction. The reason is simple, many of the women who go through flight training turn out to have better flying skills than the average male pilot. All the nations considering female fighter pilots, are having a hard time keeping male pilots in uniform. Too many of the men depart for more lucrative, and less stressful, careers as commercial pilots. Women may not be the solution. Currently, only about half of Indian female officers stay in past their initial five year contract. Indian women, even military pilots, are under tremendous social and family pressure to marry. Those that do may still be pilots, but married women expected to have children. The Indian Air Force provides its female officers with ten months leave for this, six months during pregnancy, and four months after delivery. The air force does all this because pilots are very expensive to train. Fuel costs the same everywhere, as are spare parts. So what India may save in lower salaries, is not enough. A good pilot costs over half a million dollars for training expenses, and requires over five years flying experience to become effective in a first line fighter (the Su-30 for India). It's all that expensive aviation fuel that pushes the final "cost of a fighter pilot" to over $2 million. Many women are willing to take up the challenge. But they have already heard from their peers in Western air force, that motherhood and piloting can be a very exhausting combination. Worldwide, women are increasingly part of the military. In many nations, over ten percent of military personnel are female. A century ago, it was under one percent (and most of those were nurses and other medical personnel.) More women are in uniform now because there aren't enough qualified men, especially for many of the technical jobs armed forces now have to deal with. Islamic nations have higher illiteracy rates overall, and very high rates for women. These nations have a severe shortage of technically trained people. Those women that do get an education in Islamic cultures tend to be very bright and able. So there's a need, and a solution close at hand. But because of those religious restrictions, and the generally very macho attitudes in Islamic nations, there will never be as many women in uniform as are needed. This means that Islamic armed forces will continue to come up short when it comes to maintaining and using military technology. The future of military operations is more technology, so you can see where this is leading. No wonder Islamic radicals want to go back to the past. Unfortunately, the non-Moslem world is not inclined to join them. Taking a knife to a gun fight doesn't work. Allowing women to be combat pilots eventually leads to women commanding combat units. Once women were allowed to fly combat aircraft, it was only a matter of time before some of them rose to command positions. Several American female combat pilots have achieved command positions, and also managed to handle marriage and motherhood as well.
<urn:uuid:a42253fd-449f-4328-9c14-2da4311e61ad>
CC-MAIN-2020-10
https://www.strategypage.com/htmw/htlead/articles/20091119.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145897.19/warc/CC-MAIN-20200224040929-20200224070929-00264.warc.gz
en
0.974781
880
2.578125
3
Group 4A (or IVA) of the periodic table includes the nonmetal carbon (C), the metalloids silicon (Si) and germanium (Ge), the metals tin (Sn) and lead (Pb), and the yet-unnamed artificially-produced element ununquadium (Uuq). The Group 4A elements have four valence electrons in their highest-energy orbitals (ns2np2). Carbon and silicon can form ionic compounds by gaining four electrons, forming the carbide anion (C4-) and silicide anion (Si4-), but they more frequently form compounds through covalent bonding. Tin and lead can lose either their outermost p electrons to form 2+ charges (Sn2+, the stannous ion, and Pb2+, the plumbous ion) or their outermost s and p electrons to form 4+ charges (Sn4+, the stannic ion, and Pb4+, the plumbic ion). Carbon (C, Z=6). Carbon is most familiar as a black solid is graphite, coal, and charcoal, or as the hard, crystalline diamond form. The name is derived from the Latin word for charcoal, carbo. It is found in the Earth's crust at a concentration of 480 ppm, making it the 15th most abundant element. It is found in form of calcium carbonate, CaCO3, in minerals such as limestone, marble, and dolomite (a mixture of calcium and magnesium carbonate); calcium carbonate also forms the shells of marine organisms and the coral of coral reefs. Carbon is also found in coal, petroleum, and natural gas. Carbon is one of the most important elements on the periodic table (at least from the perspective of organic chemists!). Pure carbon is found in three stable forms at room temperature: graphite, diamond, and the fullerene form. In graphite, the carbon atoms are connected in sheets, which can slide past each other, which makes graphite able to act as a lubricant, and why it makes marks on paper in the form of pencil "lead." In diamonds, the carbon atoms are held together by covalent bonds in a rigid, three-dimensional framework, which results in a extremely hard and rigid structure. (Contrary to the James Bond title, diamonds aren't forever, since the graphite form is more stable; however, diamonds turn into graphite at an incredibly slow rate.) Diamonds are so different in their physical characteristics from graphite or charcoal that it was not recognized the diamond was a form of carbons; this was shown by Antoine Lavoisier in 1784 when he demonstrated that both charcoal and diamond could be burned to produce carbon dioxide. Smithson Tennant confirmed this relationship in 1796 when he showed that equal amounts of charcoal and diamond produced equal amounts of carbon dioxide. In the fullerene form, the carbon atoms are arranged in hollow balls, or in hollow tubes (called "nanotubes"); these forms of carbon have very interesting chemical physical properties, and are the subject of intense research by chemists and chemical engineers. Carbon is produced in stars by the triple alpha process, in which three alpha particles are converted into carbon-12. In this process, two alpha particles (helium nuclei, 42He) fuse to form beryllium-8, which then fuses with another alpha particle to produce carbon-12: 42He + 42He ® 84Be 84Be + 42He ® 126C + g This process takes place in older stars where a lot of hydrogen has been converted into helium; the star collapses, raising the pressure and temperature in the core to above 100 million Kelvins, initiating the process of helium burning. Some ionic compounds of carbon are known, but carbon typically forms compounds through covalent bonding. Carbon forms strong, stable covalent bonds to other carbon atoms, and is capable of forming long chains containing anywhere from a few dozen carbon atoms to hundred of thousands of carbon atoms. Carbon can also form bonds to other elements, such as hydrogen, oxygen, nitrogen, sulfur, phosphorus, the halogens, etc. There are therefore a tremendous variety of complex carbon-based chemicals. Organic chemistry is the field of chemistry concerned with the study of carbon-containing compounds. Such compounds form the basis of life (at least the kinds that we know about). Carbon is found is coal, and petroleum is a very complex mixture of thousands of different hydrocarbons. The burning of carbon and petroleum products (fossil fuels) provides most of the energy which we consume, and contributes to global warming through the release of carbon dioxide into the atmosphere. Carbon is used is the refining of iron and other metals (the oxygen in the ores is carried away in the form of carbon dioxide, leaving behind the elemental metal). Small amounts of carbon are added to iron to make an alloy called steel, which is harder than pure iron. Activated charcoal is a finely powdered form of carbon used to filter out impurities from water or gases. Carbon is taken up by green plants in the form of carbon dioxide, CO2; in the process of photosynthesis, the carbon in the carbon dioxide is transformed into carbohydrates (sugars), lipids, proteins, and all of the other organic molecules which are essential to life. Most carbon is in the form of the carbon-12 isotope (98.90%), which has 6 protons and 6 neutrons in its nucleus. Carbon-13, which is also non-radioactive, accounts for 1.10% of the world's carbon. Carbon-13 is particularly important in nuclear magnetic resonance spectroscopy (see the section on Hydrogen); organic molecules contain small amounts of carbon-13, which responds to magnetic fields in a similar fashion as hydrogen-1. Carbon-14, which consists of 6 protons and 8 neutrons, is an unstable isotope produced the reaction of free neutrons (produced from cosmic rays) with nitrogen-14 in the upper atmosphere. Carbon-14 undergoes beta decay to produce nitrogen-14, with a half-life of 5730 years: 147N + 10n ® 146C + 11H 146C ® 147N + 0-1b The amount of carbon-14 thus produced is extremely small — approximately 7 kilograms per year — but small amounts of this carbon-14 are taken up in the form of carbon dioxide along with the "normal" isotopes of carbon by green plants, and this isotope also becomes incorporated into the things that eat the green plants (and also the things that eat the things that eat the green plants — and so on). Once an organism dies, it stops taking in carbon-14 (or anything else, for that matter), and the carbon-14 that it had at the moment of death decays, and is no longer replaced. By measuring the amount of carbon-14 remaining in an organic sample, it is possible to determine how long ago the organism died. This technique works for carbon-containing materials that are up to about 50,000 years old; beyond that, there is too little carbon-14 remaining to get an accurate date, and some other form of radiometric dating must be used. This technique was developed by Willard F. Libby in the 1950s, who received the Nobel Prize in Chemistry in 1960 for this work. Silicon (Si, Z=14). Silicon is a dark gray element with a metallic luster. The name of the element is derived from the Latin word for flint, silicis. It is found in the Earth's crust at a concentration of 28%, making it the second most abundant element. In the form of silica (SiO2) or one of the silicates (SiO44-), it is found in many different minerals, including clay, quartz, zircon, feldspar, mica, zeolites, aluminosilicates, sand, etc. It is also found in the gemstones opal, agate, rhinestone, and amethyst. Silicon is one of the most important elements on the periodic table (at least from the perspective of computers!). Ultrapure silicon doped with boron or phosphorus is used as semiconductors in transistors, which are heavily employed in computers, solar panels, and other applications. Silica (which is primarily silicon dioxide, SiO2), is used in the manufacture of glass. Silicones, which consist of chains of alternating silicon and oxygen atoms, are used in oils, lubricants, and silicone rubber. Germanium (Ge, Z=32). Germanium is a hard, grayish white element with a metallic luster. The name of the element is derived from the Latin word for Germany, Germania. It is found in the Earth's crust at a concentration of 2 ppm, making it the 52nd most abundant element. It is found in the ores argyrodite [Ag8GeS6] and germanite [Cu13Fe2Ge2S16], but is more frequently obtained as a by-product of the refining of zinc. Like silicon, germanium is used as a semiconductor, and is widely used in the computer industry. Silicon and germanium are both metalloids, having some characteristics of both metals and nonmetals. The existence of germanium was predicted by Dimitri Mendeleev in 1869 from a blank space in his periodic table beneath silicon; before it was actually found, the hypothetical element was referred to as "eka-silicon." When germanium was discovered in 1886, its physical and chemical properties matched many of those predicted by Mendeleev. Tin (Sn, Z=50). Tin is a soft, silvery-white metal. The name of the element is derived from the Anglo-Saxon word for the metal, while the chemical symbol "Sn" is derived from the Latin name for the metal, stannum. It is found in the Earth's crust at a concentration of 2 ppm, making it the 49th most abundant element. It is found in the ore cassiterite [tin(IV) oxide, SnO2], and in trace amounts in other minerals. Elemental tin exists in two allotropic forms: above 13.2 °C, it is found as white or beta tin, which is the crystalline, metallic form; below 13.2°C it is found as gray or alpha tin, which has a powdery appearance. Structures made of tin that are cooled below 13.2°C can start to crumble, a condition known as "tin pest" or "tin disease." This can be prevented by alloying the tin with a small amount of antimony or bismuth. Tin is easily purified in its metallic form from its ores, and has been known since prehistoric times. Tin is commonly plated onto iron, forming a protective surface that prevents the iron from rusting; this is extremely useful in food containers (tin cans) because the tin is nontoxic and is not corrosive. Tin can be hammered into thin sheets ("tin foil"), but this application has been replaced with aluminum foil. Tin is also used in alloys such as bronze (95% copper and 5% tin), solder (33% tin and 67% lead), pewter (85% tin, 7% copper, 7% antimony, and 4% copper), and dental amalgams (60% silver, 27% tin, and 13% copper). Bronze has been used since at least 3000 BC, since it is harder than copper and more easily made into tools, weapons, works of art, etc. Lead (Pb, Z=82). Lead is a very dense, soft, very malleable, bluish-white or grayish metal. The name of the element is derived from the Anglo-Saxon word for the metal, while the chemical symbol "Pb" is derived from the Latin name for the metal, plumbum. It is found in the Earth's crust at a concentration of 14 ppm, making it the 36th most abundant element. It is found in the ores galena [lead(II) sulfide, PbS], cerussite [lead(II) carbonate, PbCO3], anglesite [lead(II) sulfate, PbSO4], pyromorphite [Pb5(PO4)3Cl], and boulangerite [Pb5Sb4S11]. Despite its relative rarity, lead has been known since ancient times, since it is comparatively easy to refine and purify. Lead used to be used in plumbing, since lead pipes don't corrode the way that iron pipes do; the Latin name for lead, plumbum, is also the root of the words "plumbing" and "plumber." It is also used in paints, solders, batteries (such as the lead-acid storage batteries found in cars), and radiation shielding. Lead is the end product of the radioactive decay of many heavier elements; the ratio of other elements to lead can be used in radioactive dating of rocks. Lead used to be used to sweeten wine, through the formation of lead(IV) acetate, Pb(C2H3O2)4, also known as "sugar of lead." Lead was also used as an octane booster for gasoline, in the form of tetraethyl lead, Pb(CH2CH3)4, but this has been phased out due to environmental concerns. The earliest pencils used lead, although now "pencil lead" is graphite mixed with clay. Lead is a cumulative poison; absorption of lead in the body over a long period of time causes it to be stored in the bones in the form of lead phosphate, where it interferes with the production of hemoglobin, leading to anemia, stomach cramps, constipation, headaches, infertility, etc. Ununquadium (Uuq, Z=82). Ununquadium is a synthetic element, produced by the fusion of an isotope of plutonium with an isotope of calcium. "Ununquadium" is a temporary, systematic name (literally meaning "1" "1" "4", the atomic number of the element) until the official name is decided upon. The longest-lived isotope produced so far, ununquadium-289, has a half-life of 30.4 seconds. It was first produced at the Joint Institute for Nuclear Research (JINR) at Dubna in 1998. Other isotopes have been produced in other labs, with a wide range of half-lives. It has been predicted that an isotope having 114 protons and 184 neutrons, ununquadium-298, should be especially stable, but this isotope has yet to be produced. John Emsley, The Elements, 3rd edition. Oxford: Clarendon Press, 1998. John Emsley, Nature's Building Blocks: An A-Z Guide to the Elements. Oxford: Oxford University Press, 2001. David L. Heiserman, Exploring Chemical Elements and their Compounds. New York: TAB Books, 1992.
<urn:uuid:4cc07a74-ab79-4278-88c9-e3079ea4765f>
CC-MAIN-2018-05
http://www.angelo.edu/faculty/kboudrea/periodic/periodic_main4.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887660.30/warc/CC-MAIN-20180118230513-20180119010513-00466.warc.gz
en
0.932006
3,173
3.71875
4
Unknown orange butterfly in Sumatra. Scientists believe we are in the midst of a defaunation crisis, which is impacting animals, and ecological services, the world over. Photo by: Rhett A. Butler. Get ready to learn a new word: defaunation. Fauna is the total collection of animals—both in terms of species diversity and abundance—in a given area. So, defaunation, much like deforestation, means the loss of animals in all its myriad forms, including extinction, extirpation, or population declines. A special issue in Science today shines light on this little-discussed global trend and highlights how it’s impacting human society. “Though for emotional or aesthetic reasons we may lament the loss of large charismatic species, such as tigers, rhinos, and pandas, we now know that loss of animals, from the largest elephant to the smallest beetle, will also fundamentally alter the form and function of the ecosystems upon which we all depend,” writes Sacha Vignieri, an Associate Editor with Science in an introduction on the issue. Starting with the bigger—more well-known—species, vertebrate populations on average have declined by over a quarter in the last forty years, according to a review paper in the issue. Such numbers are borne out by a lot of anecdotal reporting of the “empty forest” syndrome, where scientists are noticing more-and-more seemingly intact forests and other habitats that have been stripped of their medium to large vertebrates. Meanwhile at least 322 vertebrates have gone extinct since 1500, a trend in human-caused extinctions that likely began during the Pleistocene. Many additional vertebrates remain unrecorded for decades and could be extinct. Wildlife fetish market in Togo. Overexploitation of wild animals is one of the three biggest drivers of defaunation. Photo by: Nancy Butler. But “fauna” also extends to invertebrates, which really comprise the vast bulk of the world’s animals. Most of these animals—which includes everything from insects to mollusks and jellyfish to spiders—have been far less studied than the world’s vertebrates and so much less is known about how imperiled they are and their population trends. Still, the data that we do have is not good. A global review of 452 invertebrates find that these populations have fallen by 45 percent over the last 40 years. The best data is in the Lepidoptera family—moths and butterflies—which shows a drop in abundance of about 35 percent. “We were shocked to find similar losses in invertebrates as with larger animals, as we previously thought invertebrates to be more resilient,” said Ben Collen with University College London, co-author of the review study. “While we don’t fully understand what the long-term impact of these declining numbers will be, currently we are in the potentially dangerous position of losing integral parts of ecosystems without knowing what roles they play within it.” Of course, it must be noted that to date 1.4 million invertebrates have been described, so this monitoring covers only 0.03 percent of the world’s known invertebrates. Still, other data shows similar troubling trends. “Although less than one percent of the 1.4 million described invertebrate species have been assessed for threat by the IUCN, of those assessed, [about] 40 percent are considered threatened,” reads the paper. “Similarly, IUCN data on the status of 203 insect species in five orders reveal vastly more species in decline than increasing.” In fact the issue of defaunation is so troubling that lead author, Rodolfo Dirzo with Stanford University, told mongabay.com it should become as well-known to scientists and policy-makers as deforestation. “The term deforestation readily conveys the notion of a serious, dramatic anthropogenic impact and can move [and] has moved society to action given its consequences,” he noted, adding that “we are beginning to see that defaunation is omnipresent and of great intensity…we need to pay attention to its consequences and significance for society at large.” Habitat loss is currently the largest driver of defaunation. Here a logging road cuts into forest in the Pacific Northwest of the U.S. Photo by: Rhett A. Butler. Experts say defaunation is already having large-scale impacts across ecosystems, undercutting everything from pollination to pest control to water and soil quality. For example, a flood of recent research has found that the world’s pollinators may be in crisis—including bees and butterflies—threatening global agriculture and potentially costing billions. But the impacts of defaunation could even lead to worsening outbreaks of disease in humans. “Consider the case of heavy defaunation of large wildlife in Africa,” Dirzo said. “When that happens, according to our own research, the abundance of rodents increases; this implies more vectors and host of diseases, many of which are of great…significance to humans. We recently published another study showing that such differential defaunation in African savannas explains the increase in abundance of rodents and doubles the risk of Bartonellosis—a nasty disease in humans.” Defaunation can also result in co-extinctions. For example, many animals are ecologically connected to plant species, who may depend on them for pollination or seed dispersal. But if you lose the animal species—or if its population drops below a certain threshold—plants are likely to vanish as well. “Who would have thought that just defaunation would have all these dramatic consequences? But it can be a vicious circle,” Dirzo noted. The causes behind defaunation are clear and have been for decades: habitat loss including deforestation; overexploitation of species for bushmeat, medicine, or trophies; and invasive species rank as the big three according to the paper. “None of these major drivers have been effectively mitigated at the global scale. Rather, all show increasing trajectories in recent decades,” the scientists write in the paper. Worse still, the paper warns that “climate disruption” could eclipse all of these as a driver of mass extinction in the near-future. Native to Madagascar, the radiated tortoise is currently listed as Critically Endangered. Photo by: Rhett A. Butler. So, what can we do? “Two critical drivers of defaunation can and should be addressed as soon as possible: over-exploitation (consider the case of illegal trading and hunting, currently in the order of tens of millions of animals killed per year) and habitat destruction via land use change (deforestation, fragmentation),” Dirzo told mongabay.com. “These drivers could be addressed and help us buy time to start addressing the other drivers, particularly climatic disruption as we move forward.” Repairing—as much to our ability—damaged ecosystems may become controversial as well. Another paper in the issue recommends radical conservation measures, such as introducing non-native species environments in order to take-over the ecological roles of already-lost species. - Rodolfo Dirzo, Hillary S. Young, Mauro Galetti, Gerardo Ceballos, Nick J. B. Isaac, Ben Collen. (2014) Defaunation in the Anthropocene. Science. Surrounded by exotic meats, a vendor reaches for live bamboo rat in a bushmeat market in Laos. Photo by: Rhett A. Butler. (07/24/2014) Today, in the midst of what has been termed the “Sixth Great Extinction” by many in the scientific community, humans are contributing to dizzying rates of species loss and ecosystem changes. A new analysis suggests the time may have come to start widely applying intensive, controversial methods currently used only as “last resort” strategies to save the word’s most imperiled species. (07/14/2014) The world’s grasslands are being destabilized by fertilization, according to a paper recently published in the journal Nature. In a study of 41 grassland communities on five continents, researchers found that the presence of fertilizer weakened grassland species diversity. (07/14/2014) The world’s 35 biodiversity hotspots—which harbor 75 percent of the planet’s endangered land vertebrates—are in more trouble than expected, according to a sobering new analysis of remaining primary vegetation. In all less than 15 percent of natural intact vegetation is left in the these hotspots, which include well-known jewels such as Madagascar, the tropical Andes, and Sundaland. (07/07/2014) For those living either north or south of the tropics, images of this green ring around the Earth’s equator often include verdant rainforests, exotic animals, and unchanging weather; but they may also be of entrenched poverty, unstable governments, and appalling environmental destruction. A massive new report, The State of the Tropics, however, finds that the truth is far more complicated. (06/26/2014) It took humans around 200,000 years to reach a global population of one billion. But, in two hundred years we’ve septupled that. In fact, over the last 40 years we’ve added an extra billion approximately every dozen years. And the United Nations predicts we’ll add another four billion—for a total of 11 billion—by century’s end. (05/29/2014) Current extinction rates are at the high end of past predictions, according to a new paper published today in Science, however conservation efforts combined with new technologies could make a big difference. New research led by Stuart Pimm of Duke University argues that humans have pushed the current extinction rate to 1,000 times the historical rate. (04/10/2014) The comic dodo, the stately great auk, the passenger pigeon blotting out the skies: human kind has wiped out nearly 200 species of birds in the last five hundred years. Now, if we don’t act soon we’ll add many new ones to the list: birds such as the giant ibis, the plains-wanderer, and the crow honeyeater. And these are just a few of the species that appear today on the long-awaited EDGE list. (07/23/2013) Unsustainable hunting of forest elephants, gorillas, forest antelopes, and other seed-dispersers could have long-term impacts on the health and resilience of Congo Basin rainforests, warns a study published today in a special issue of the journal Philosophical Transactions of The Royal Society B. Conducting a review of more than 160 papers and reports on trends in wildlife populations, hunting, and land use in the Congo Basin, an international team of researchers conclude that unless effective management plans are put into place, hunting pressure in the region is likely to increase, with knock-on ecological effects.
<urn:uuid:82176978-534b-4eab-bf88-5b7aa8f78d25>
CC-MAIN-2019-30
https://news.mongabay.com/2014/07/its-not-just-extinction-meet-defaunation/
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528208.76/warc/CC-MAIN-20190722180254-20190722202254-00404.warc.gz
en
0.937758
2,342
3.59375
4
Chiropractic is a holistic therapy which recognizes the overall health of the patient and the body's innate ability to heal itself from physical, mental, and emotional stress and trauma. Chiropractic medicine is concerned with the relationship between the spinal column, afferent and efferent neurons, and the entire nervous system. Just to review, the human nervous system is comprised of the central nervous system (brain and spinal cord), the autonomic nervous system, and the peripheral nervous system (includes the somatic nervous system). All of the body's tissues and organs are connected electrically to the spinal column, or backbone, which is protected by twenty-four bones called vertebrae. It is the belief of chiropractic that the misalignment of the spinal cord affects other portions of the body and creates pain, sometimes disease, and other musculoskeletal abnormalities. This firm belief is followed through in diagnosis and treatment; just ask the 15 million Americans who turn to chiropractic physicians ever year to heal physical injury such as lower back pain, neck pain, and certain internal disorders. Chiropractic medicine is an excellent alternative for those who want to avoid surgery for injuries such as loose discs in the neck, slight scoliosis, and out of place vertebrae. According to chiropractic, pathological disease may be influenced by disturbances of the nervous system. The following factors can contribute to impaired health: genetic/hereditary factors, improper rest, lack of exercise, inadequate and improper nutrition, overindulgence, foods tainted by pesticides, insecticides, herbicides, fertilizers and preservatives, improperly cooked and/or processed foods, contaminated water, air pollution, stress, bodily trauma, and bacteria and viruses. Almost any component of the nervous system may directly or indirectly cause reactions within any other component by means of reflex mediation. Correction of the spinal (manipulative) lesion is imperative for effective management of common functional disorders of motor structure and for pelvic discomfort. The modern-day system of chiropractic was founded in 1895 by Daniel David Palmer, despite the fact that the practice of spinal adjustment has existed in virtually every ancient civilization, including that of Egypt. Palmer felt that the task of chiropractic was not to treat conditions but to remove nerve interference caused by subluxations so that the body's inherent capacity to heal itself would be able to take over and restore health and homeostasis. His approach appealed to those who demanded a more natural approach to healing. Chiropractic medicine has contributed greatly to modern medicine's knowledge of human biology, physiology, and anatomy, specifically of the spine and pelvic areas. Posture, kinesiology, neurology, roentgenology, orthopedics, and osteopathy have been stressed, as has the relationship between structural disorders and mental health.
<urn:uuid:3d352eb7-e012-4712-afdf-fe6626efa0a6>
CC-MAIN-2021-04
https://www.nspghealth.com/how-we-can-help-you/chiropractic-medicine.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703506640.22/warc/CC-MAIN-20210116104719-20210116134719-00309.warc.gz
en
0.93723
575
2.8125
3
Mahogany and teak are two exotic hardwoods. Teak is generally thought of as more exclusive than mahogany, and the price reflects it. Mahogany is more all-purpose than teak, with broader availability and distribution. Teak has the distinct advantage of moisture-resistance, making it more appropriate than mahogany for outdoor use. Wide Spread Mahogany The bulk of the mahogany lumber used commercially originates from Central and South America. Mahogany species are widespread, and so similar in appearance and application that they have become grouped together and marketed generically as genuine mahogany -- or in some instances, Honduran mahogany. African and Asian Substitutes Two other types of mahogany, that are sometimes marketed separately from genuine mahogany, include African and Philippine mahogany. African mahogany is more exclusive and slightly harder than genuine mahogany. Philippine mahogany is less expensive, softer, lacks the color, has a coarse texture, and is more difficult to work with than genuine. Philippine mahogany is sometimes referred to as luann, and is frequently utilized as an affordable a plywood product. Teak is widely grown and imported from plantations in Africa, Latin America and Asia. Teak is also grouped together with other varieties and referred to generically. Burmese teak, however, is specifically made from natural grown trees, as opposed to plantation-grown trees grown in other tropical regions. - Reddish, orange, or pinkish tint. - Consistently straight with fine grain patterns. - Coarse texture. - Half the cost, or less, of teak. - Moderate to low insect and rot resistance. - Light brown to gold in color and darkens with age - Irregular grain patterns, often flame-like, fine - Oily texture - Not considered as aesthetically pleasing as mahogany - One of the most decay-resistant hardwoods available Durability and Density The Janka scale ranks wood for density. Genuine mahogany has a hardness rating of 900, making it slightly softer than teak, which has a rating of 1,070. The differences in hardness are, for the most part, insignificant. For the sake of comparison, red oak ranks 1,290 on the Janka scale. Trim and Molding Mahogany is better suited for long, straight pieces of molding and trim than teak, specifically because it's straight, fine grained, resistant to warps and twists, and less expensive. Teak furniture is considered more exclusive than mahogany. Mahogany, with it's coarse texture, is harder to maintain as furniture. Teak, with it's closed-pore, oily texture, is considered more water resistant, and overall more durable than mahogany. Teak is far more durable for any type of exterior furniture, trim, decking or anywhere moisture or weather resistance comes into play. Mahogany is not typically recommended for any type of exterior use, but can be used when properly maintained with sealer. Exterior applications made with teak require far less maintenance. Teak is easy to maintain, with only an oil-based sealant if desired, or it can be left natural without anything at all. Mahogany typically requires lacquer, varnish or other film-forming top coat to protect it. If you have a staircase, stair railing, or want to build an exclusive project by hand, teak should be at the top of the list. If you want a beautiful, all-purpose, material you can afford, choose mahogany.
<urn:uuid:ff8f8585-fab2-4d9a-8ba8-c178a9c1f7a4>
CC-MAIN-2018-51
https://www.hunker.com/13401568/teak-wood-vs-mahogany
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826145.69/warc/CC-MAIN-20181214162826-20181214184826-00533.warc.gz
en
0.95019
764
2.546875
3
EC Proposes Draft Regulation on Biopiracy and Research 4 October 2012: The European Commission (EC) has introduced a draft Regulation to implement the Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization (ABS), aimed at protecting the rights of those possessing genetic resources and traditional knowledge, while providing researchers in the EU with reliable, more legally certain access to samples of these resources at low cost. The draft Regulation, which will be considered by the European Parliament and the Council, would benefit researchers and companies in the EU, particularly small and medium size enterprises (SMEs) and public-funded, non-commercial research. It is designed to clarify the rules over the use of genetic resource for research in areas including plant and animal breeding, cosmetics and pharmaceuticals. The intent is to protect the holders of genetic resources and traditional knowledge from the loss of benefits associated with these resources, a concern known as "biopiracy," while encouraging research and development. The actions associated with this draft Regulation include plans for an EU-register of trusted seed banks, botanical gardens and other collections committed to supplying only genetic resource samples that have been fully documented. The EC also released a summary of the definition of and provisions included under the term "access and benefit sharing." According to the EC, ABS is a basic principle of the Convention on Biological Diversity (CBD), which recognizes that States have sovereign rights over the genetic resources found within their jurisdiction, and that they can set conditions for access to such resources. It requires that any benefits that arise from the commercial use of the resources are shared fairly and equitably with the country providing the resources. The summary also addresses: why ABS has been problematic in the past; how the Nagoya Protocol will help achieve conservation goals; what happens in cases of non-compliance; whether countries with genetic resources must adopt access rules; and how the Protocol addresses the needs of indigenous communities; and questions on the draft regulation, including potential costs and benefits for users in the EU. [EC Press Release] [Questions and answers on access and benefit-sharing]
<urn:uuid:01f81cbd-51eb-4b49-af92-824fdabd777e>
CC-MAIN-2014-10
http://biodiversity-l.iisd.org/news/ec-proposes-draft-regulation-on-biopiracy-and-research/
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999644062/warc/CC-MAIN-20140305060724-00090-ip-10-183-142-35.ec2.internal.warc.gz
en
0.949103
436
2.671875
3
The $1.8 million NASA-funded project uses NASA remote-sensing data to help design management plans for public lands. According to MSU ecology professor Andrew Hansen, his team will use NASA satellite data to simulate how the ecosystems of two Landscape Conservation Cooperatives will change under forecasted climate and land use changes. The 21 LCCs, designated by the Department of the Interior, collectively form a national network of land, water, wildlife, and cultural resource managers, scientists, and interested public and private organizations--within the U.S. and across international borders--that share a common need for scientific information and interest in conservation. These lands include National Parks, National Forest and Bureau of Land Management lands. "It's a big challenge because the LCCs are trying to figure out how to manage under future climate change," Hansen said. "It's also a big challenge because they are trying to figure out how to manage across different governmental agencies." Hansen and his colleagues will look at past ecological trends and predicted future trends and assess the vulnerability of ecosystems and certain species to climate and land use change. The team will evaluate management options for the more vulnerable ecosystems and species within two LCCs. Then they will use the information to help the LCCs design management approaches for the vulnerable ecosystems and species. The project will focus on portions of the Great Northern and Appalachian LCCs, both of which support critical biological resources and have already undergone climatic warming. The Great Northern LCC encompasses the Northern Rockies and Columbia Basin and the Appalachian LCC covers most of the Appalachian Range. Hansen will be working with Scott Goetz from Woods Hole Research Center, Forrest Melton from California State University, Monterey Bay / NASA Ames, Bill Monahan from the National Park Service Inventory and Monitoring Program, Ramakrishna Nemani from NASA Ames Research Center, Tom Olliff from NPS I&M and the Greater Yellowstone Network, and David Theobald from Colorado State University. Andrew Hansen at 406-994-6046 or [email protected]
<urn:uuid:54a87271-8059-476a-b315-349d0253c7e7>
CC-MAIN-2015-22
http://www.montana.edu/news/10025/1-8-million-nasa-grant-helps-parks-prepare-for-climate-and-land-use-change
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927844.14/warc/CC-MAIN-20150521113207-00076-ip-10-180-206-219.ec2.internal.warc.gz
en
0.897462
424
2.9375
3
Health and Food Safety The City of Brenham Health Inspector works to control factors in our community that may adversely impact human health. Duties of the Health Inspector include identifying, evaluating, and correcting existing and potential health hazards to prevent disease, as well as educating citizens about public health issues. This is done by responding to sanitation problems and concerns, investigating complaints, inspecting premises, and reviewing plans for the operation of retail food services, childcare centers, mobile food vendors, foster care homes, public nuisances, swimming pools, fairs, and schools. The Health Inspector enforces both the municipal health code and State Health & Safety laws. For more information on the Texas Food Establishment Rules, click here.
<urn:uuid:a6dd2e5b-71d3-4a61-b445-2ad98f6d8741>
CC-MAIN-2022-27
https://www.cityofbrenham.org/city_government/departments/development_services/health_inspection.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103205617.12/warc/CC-MAIN-20220626101442-20220626131442-00563.warc.gz
en
0.939862
145
2.859375
3
The fishing city of Bartyn's Landing was built c. 529 BBY using a Hoersch-Kessel LH-3010 capital freighter as a basis. The founder dismantled the bulkheads to create piers and then populated the town with a first generation of fishermen, the First-Wavers. However, the descendants of the First Wavers decided to create an alternative port-in-the-port, later known as The Three Jetties. Eventually, it became the port of choice for most of the fishing boats. Besides, visitors from other places coming by sea commonly entered the town through the Three Jetties instead of using any of the bigger ports. Places of interestEdit One important place in the Three Jetties was the Noloh Gunga Fuel Station, an offshore meeting place for independent ships and site of Noloh Gunga Bongoform, one of the few local industries not belonging to the Bartyn family.
<urn:uuid:7ac84ef1-fea4-4d76-ac9b-dd29056dc60e>
CC-MAIN-2017-22
http://starwars.wikia.com/wiki/The_Three_Jetties
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607120.76/warc/CC-MAIN-20170522211031-20170522231031-00512.warc.gz
en
0.933866
198
2.53125
3
Bloody Mary is one of the most prevalent and scary urban legends to circulate in Western culture. Being able to summon her into any mirror means that many have attempted to interact with Mary, some even claim to have been successful in doing so with terrifying results. Those who manage to summon Bloody Mary will be greeted with a nasty, blood-covered spirit that could potentially scream at them through the mirror or worse, attack them. Some say that Bloody Mary has the power to kill and injure those who dare disturb her, with scratching out her victim’s eyes being a common theme. So, is there any truth behind this legend and just who is Bloody Mary? Who is Bloody Mary Although Bloody Mary is well known in pop-culture, she remains in a way elusive. Many have pondered who the inspiration for this mirror dwelling dark spirit may be. With a number of theories about Bloody Mary’s identity existing. The obvious choice is that the spirit of Bloody Mary is related to Mary Tudor or Mary I of England. This Mary gained infamy during her short but ruthless rule of England in the mid-1500s. During this time she even acquired the nickname Bloody Mary for burning hundreds of people at the stake in her religious motivated murderous decisions. Other than sharing the name of Bloody Mary, there is not much else tying Elizabeth Tudor to the Bloody Mary legend. Another historical figure who has accumulated ties to Bloody Mary is that of Elizabeth Bathory, more famously known as the Blood Countess. Elizabeth is represented in the pages of history as a maniacal and murders noblewoman who killed hundreds of young, virgin women from her surrounding village. She would supposedly kill in order to drink and bathe in the blood of her victims, thus retaining her own youth. Although these crimes are likely sensationalized and not true accounts of what transpired during her life in the 15 and 1600s, she does remain known as one of the most sadistic and prolific serial killers of all time. It seems the most likely ties to Elizabeth and Bloody Mary are those forged in blood, in fact, this seems to be the only tie they share. Finally, many people consider a woman by the name of Mary Worth to be Bloody Mary. Mary Worth’s past and history is blurred by the many versions detailing who she was, where she existed and what actions led to her infamy. These stories all seem to suggest that Mary Worth was a witch and was suspected of kidnapping young women from the village that she lived near. Though her origins are vague, many suspect that Bloody Mary could be a witch. How to Play The rules of how to play Bloody Mary are simple and easy to complete. It should be noted that there are many variations to these rules present and they have likely been twisted over time to fit into different communities and areas. Below are the most widely reported steps. 1. Find a room that can be darkened and which contains a mirror. 2. Enter the room, closing the door behind you. Proceed to light no more than a few candles as the ritual works best in low light. 3. Stare at the reflection of your own eyes in the mirror and do not break contact with them. Then repeat “Bloody Mary” out loud, without interruption, three times in a row. 4. Now the summoning ritual is complete. Many reports of different phenomena occurring after this exist. It is widely believed that completing these steps will summon Bloody Mary into your mirror. She may appear covered in blood behind you and has been said to attack some people, either scratching out their eyes, their faces or necks. Anyone playing paranormal games should always take caution. Whether you believe the legends of Bloody Mary or not, you never know when you might receive a response from the spirit world when calling on it! Always be prepared for an answer. Thanks for reading!
<urn:uuid:2fe145d0-ee2d-4ed7-9834-5c8965917a4e>
CC-MAIN-2020-24
https://amyscrypt.com/bloody-mary-how-to-play/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348523564.99/warc/CC-MAIN-20200607044626-20200607074626-00270.warc.gz
en
0.974803
787
2.796875
3
Just checking here. Propositional logic connectives like AND and OR have analogs or representations in set theory. For example, the logical connective AND is represented in set theory by intersection, an element of X AND Y is the element of the intersection of sets X and Y. And similarly, the logical connective of OR is represented in set theory by union, an element of X OR Y is the element of the union of sets X or Y. So what is the set theoretical representation of material implication. When I googled "set theory of material implication", I did not get anything explicit. Maybe I'm not searching the right phrases. Anyway, is the set representation of implication simply the subset, an element is a member of a set X implied by Y if X is a subset of Y. Is this right, or am I missing something? This is very important to me. I'd like to have a firm foundation for material implication in terms of set theory. Is this a well known concept? Are there any on-line references I can review and quote? Thanks.
<urn:uuid:108cf54f-ef56-4bc9-a33c-71b02805b513>
CC-MAIN-2016-50
https://www.physicsforums.com/threads/set-theory-representation-of-material-implication.206811/
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540563.83/warc/CC-MAIN-20161202170900-00409-ip-10-31-129-80.ec2.internal.warc.gz
en
0.956232
219
2.75
3
Asbestos fibers have to be JUST the right size, then be inhaled, to cause problems. Various procedures have been developed to reduce our risk when working with asbestos. Perhaps more invidious are the risks posed by paints. OK, so everyone has heard about "lead paint" ... but how many know what that actually means? Lead is but one of the heavy metals whose compounds have been used to color paint. In the case of lead, it was/is used to produce white, yellow, and greenish hues. I say "is," because it is STILL IN USE in automotive, industrial, and specialty applications. What about other 'heavy metals?' Another commonly used - this one for reds and oranges - is cadmium. Cadmium can be just as nasty. So are mercury compounds, used for the same colors. "Hexavalent Chrome," made famous by Erin Brockovitch, is another colorant used. The means of ingestion differs from asbestos, as does the sort of damage caused. That's not really relevant here. What matters is that we daily cut, sand, rub, tear, and sweep up these other materials as well. There's some sense to making a greater effort overall to contain our messes. I was installing a switch for my aunt just last summer, flipped it on, and saw a nice big (paint can) full of "Black Asbestos Furnace Caulk." Obvious what it was used for, just funny that it's still around and still full. Any takers? Also, being in the theatre industry (live theatre), most of the older lighting used asbestos cable. It was the only material capable of withstanding the heat until synthetics were developed. We got used to wrapping the whips in e-tape when we worked with them, to keep the fibers contained.
<urn:uuid:6301a730-22a7-4a7a-a513-8adcddbb340f>
CC-MAIN-2019-18
https://www.electrical-contractor.net/forums/ubbthreads.php/topics/200316/abestos.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527566.44/warc/CC-MAIN-20190419101239-20190419122152-00015.warc.gz
en
0.971545
384
2.828125
3
Solar energy warms the water in swimming pools, heats homes and can be converted into electricity. It does all of this without generating greenhouse gases like carbon dioxide or burning fossil fuels. You can explore solar power by harnessing some of the sun's energy and combining it with the natural curiosity of kids to do some experiments at home. Solar collectors absorb the sun's energy through panels that heat homes or by generating electricity at a solar power plant, including home solar installations. The U.S. Department of Energy has a simple experiment that explores this concept. Cut two 3-inch circles from white construction paper, and two 3-inch circles from black construction paper. Put one of each in the bottom of four equal sized plastic beverage containers. Pour 1/4 cup of cold water into each container and record the water's temperature. Enclose one of the bottles with a black circle and one of the bottles with a white circle in clear plastic wrap, secure them with rubber bands and place all four in a sunny location. Make a prediction regarding temperature fluctuations and check your predictions after 5 minutes and again after 10 minutes. Sea water is abundant, but drinking it won't quench your thirst unless you use a little scientific magic to make it potable. Fill a drinking glass with cold water and stir in 2 tbsp. salt until it is completely dissolved. Pour 2 inches of the saltwater into a large mixing bowl. Place an empty glass in the middle of the bowl. The glass needs to be below the rim of the bowl, but taller than the saltwater. Secure plastic wrap to the rim of the bowl, leaving it a little loose in the center. Put a marble or small stone in the center of the plastic wrap to direct the condensation to the cup. Make certain the plastic wrap doesn't rest on the rim of the glass. Put the bowl in a sunny spot and check it every 30 minutes to see how much water has collected in the glass. Make a prediction about the salinity of the water in the glass and of the water in the bowl. (See References 2). Most solar ovens can be used for anything that conventional ovens are used for, including baking cookies. This modified version from the U.S. Department of Energy, however, is just for warming up treats like s'mores. Use a piece of notebook paper to trace a rectangular shape in the center of the closed lid of a pizza box (the type used for deliveries). Form a cardboard flap on the lid by cutting the two long edges and one of the short edges, folding the flap back on the uncut edge and creasing it. Cover the inside of the flap with aluminum foil and tape it securely. Open the box and cover the bottom of it with black construction paper. Add insulation by tucking 1-inch thick newspaper rolls around the inside edges of the box and tape them in place. Create a pillow of insulation to cover the opening in the lid from two pieces of plastic wrap cut 1 inch larger than the flap opening. Tightly stretch one piece on the inside of the opening and secure it with tape, stretch and tape the other piece to the outside of the opening. Open the box and put your treat in the center. Close the box, open the flap and turn the box until the aluminum foil catches the sun. Prop the flap open with a stick and in about 30 minutes your treat should be warm. (See References 3) According to the DOE, researchers can concentrate sunlight up to 60,000 times and put that energy to all sorts of uses. This type of solar radiation detoxifies hazardous waste, powers lasers and treats the surface of metals for resistance to corrosion. You can conduct your own test of the impact concentrated sunlight has on plastic. Gather a selection of plastics and expose some of them to direct sunlight and some of them to sunlight that has passed through an ordinary pane of window glass. Notice how long it takes for the plastic to start fading or otherwise breaking down. (See References 4)
<urn:uuid:5210e20a-9f1d-49f8-a689-db2b6483344a>
CC-MAIN-2019-18
https://homeguides.sfgate.com/solar-home-experiments-children-79627.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526923.39/warc/CC-MAIN-20190419001419-20190419023419-00203.warc.gz
en
0.922094
809
3.765625
4
Falls are the leading cause of death from injury among people ages 65 years and older in the United States, with more than a third of adults aged 65 years or older falling each year. In 2001, this was more than 1.6 million older adult emergency room visits with nearly 388,000 associated hospitalizations. By 2020, the estimated cost of fall-related injuries may reach $32.4 billion. The majority of fall-related injuries occur in older adults living independently. In many cases, this leads to depression when their physical functioning does not improve after a fall. Most alarming is that some 70 percent of the fall injuries consist of falls indoors or within the housing area. In Colorado, nearly 7,750 people are hospitalized for fall-related injuries annually, and about 197 older adults die as the result of falls. Colorado is among a block of states in the West and upper Midwest with age-adjusted, fall-related death rates that are significantly above the U.S. rate of 4.7 per 100,000 population. Fall risks are generally due to one of two factors. They can occur due to intrinsic factors such as Parkinson's disease and normal age-related changes in vision, joints, muscles, gait and balance. They can also occur due to extrinsic factors occurring in the environment - both indoors and outdoors - and can include low lighting and low-height seating. Conflicting information on predictors of falls and the role of home environmental hazards have been described including a number of observational studies indicating no difference in the rate of falls based on number and type of hazards in the home. Still others have linked low lighting and low seating with falls in the home. Recommendations and modifications include installation of stair railings (inside and outside), tub benches for sitting while showering and sitting to enter the tub instead of stepping over the tub wall, taping the edges of or removing throw rugs, using step stools with hand railings, tub grab bars, changing the swing direction of screen/storm doors to allow easier entrance, and raised toilet seats and toilet grab bars. Increased awareness should also focus on small pets in the house, using lights when walking into garages and up and down stairs, and reducing clutter of walking pathways in the home. Additional information on Healthy Aging is available on the Colorado State University Extension Web site at www.ext.colostate.edu under Family/Consumer Dr. David Greene is an Associate Professor of Occupational Therapy, Colorado State University
<urn:uuid:8c171505-a521-440b-ac8a-93fb535319d6>
CC-MAIN-2016-26
http://www.craigdailypress.com/news/2007/oct/08/watch_your_step_and_out_your_home/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397748.48/warc/CC-MAIN-20160624154957-00182-ip-10-164-35-72.ec2.internal.warc.gz
en
0.948723
509
2.75
3
By: Miriam Mannak The global economic crisis has caused the collapse of the local mining industry in the Katanga province in the Democratic Republic of Congo in central Africa. The region relies heavily on mining and since September 2008 when global demand for natural resources plummeted and prices fell to all-time lows, 300,000 people have lost jobs and another 60,000 may soon lose their jobs too. The Congolese franc, the local currency, has also lost half its value, seeing an increasing number of children and beggars on the streets. MONUC, the local UN mission has been wary of security issues surrounding the crisis, and the region has recently seen an increase in violent crime. The mining crisis is beginning to affect other businesses in Katanga as well.
<urn:uuid:9cf4f9d3-1a81-4482-a389-0a5d087b4125>
CC-MAIN-2017-34
http://sparechangenews.blogspot.com/2009/02/joblessness-rises-in-congo-as-global.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886133449.19/warc/CC-MAIN-20170824101532-20170824121532-00555.warc.gz
en
0.948729
154
2.65625
3
My 5 year old wants to do his kindergarten science project on “why do balls bounce?” His hypothesis is that “balls bounce because of the stuff inside.” Can you advise how best to test this hypothesis and explain this concept on a level that a bright, but still only 5 year old, can truly understand? — MS, Bayside, New York I’d suggest finding a hollow rubber ball with a relatively thin, flexible skin and putting different things inside it. You can just cut a small hole and tape it over after you put in “the stuff.” Compare the ball’s bounciness when it contains air, water, shaving cream, beans, rice, and so on. Just drop it from a consistent height and see how high it rebounds. The ratio of its rebound height to its drop height is a good measure of how well the ball stores energy when it hits the ground and how well it uses that energy to rebound. A ball that bounces to full height is perfect at storing energy while a ball that doesn’t bounce at all is completely terrible at storing energy. You’ll get something in between for most of your attempts—indicating that “the stuff” is OK but not perfect at storing energy during the bounce. The missing energy isn’t destroyed, it’s just turned into thermal energy. The ball gets a tiny bit hotter with every bounce. You won’t get any important quantitative results from this sort of experiment, but it’ll be fun anyway. I wonder what fillings will make the ball bounce best or worst?
<urn:uuid:6e654892-5d42-4f69-b7bb-8017f140df0b>
CC-MAIN-2020-16
https://howeverythingworks.org/1999/02/18/question-1430/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371813538.73/warc/CC-MAIN-20200408104113-20200408134613-00320.warc.gz
en
0.947296
336
3.59375
4
Individuals who choose careers in science apply essential mathematics and science concepts in a real world context. Biological scientists study how living things work, how they interact with one another, and how they evolve. Physical scientists study, observe, and measure nonliving objects. Social scientists study social systems, social institutions, and social behavior by applying their knowledge of social theory and research methods, social organization, structure, and hierarchies, dynamics of social change, and family structures. Recommended Quantitative Literacy Math Courses for academic programs:
<urn:uuid:818e6fb5-1ec9-462b-b4b2-ece1b2fdecf6>
CC-MAIN-2021-43
https://www.utahmajors.org/exploratory_sub_categories/35
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585025.23/warc/CC-MAIN-20211016200444-20211016230444-00214.warc.gz
en
0.864486
105
3.015625
3
What is Embedded Software? Top Uses and Examples of Embedded Software You might have set the time in the washing machine and changed the temperature in your refrigerator to make them work as per your requirements. How could you do this all? Well it’s embedded software that helps us perform these functionalities and operate these devices with ease. Since they are embedded in a device, they are termed embedded software. Today, tens of thousands of products contain embedded software systems as their use continues to rise. Growing at a CAGR of 6.5%, by 2031, the global embedded system market is expected to reach $163.2 billion. The rising demand for ventilators and modern medical equipment due to the COVID-19 pandemic has boosted the embedded software market. Healthcare instruments such as imaging systems, glucose meters, microcontrollers, and others, are used in developing advanced ventilators and other medical equipment, boosting demand for embedded software. Let’s dive into the details of “Embedded Software” and where it fits in the spectrum of “Software”. We also look at how we can build an embedded software and what are its various examples. What is Embedded Software? Embedded software is a program that runs on custom-built special-purpose hardware and is intended to perform a single well-defined task repeatedly. Common software applications, we come across on a daily basis, such as devices ranging from electrical switchgear to building systems, and software embedded in factory machines are embedded software. Simply put, embedded software aims to manage a specific hardware device to optimize its particular requirements and maximize its usefulness to the user. Technically, embedded software can be simple, taking up only a few kilobytes of memory, or highly complex, containing thousands of lines of code. What Does Embedded Programming Mean? Embedded programming is a subset of programming that involves the creation of consumer or business-facing devices. The concept of embedded programming is one of the driving forces behind the evolution of digital appliances and equipment in today’s IT markets. Embedded programming can also be called embedded software development or embedded systems programming. The primary distinction between desktop and embedded programming is in their intended use. Because general computers are used for various purposes, their software can be installed on multiple devices and easily reconfigured. On the other hand, embedded software serves a single purpose and is designed specifically for the device on which it is intended to run. How To Build an Efficient Embedded System? Proper embedded software must be written to meet customers’ needs and bring high-quality products to market. Here are the eight steps to creating efficient embedded system software. 1. Product concept and purpose The embedded product may be required by the manufacturer or customers based on how they believe the larger product should function. Engineers will have to first think about how the embedded product might work and what benefits it might provide. They will also have to estimate how much the embedded product will cost customers or manufacturers. 2. Establish overall requirements Engineers will determine everything the product requires to function correctly. They’ll consider questions like: What functions does the embedded software need to perform? What are the size, weight, and price restrictions? They will also have to consider the hardware the product will be installed in. 3. Write down detailed technical specifications. Here, engineers create a document outlining the product’s technical specifications. These will include, among other things, the functions that the product must perform, environmental conditions in which the device is expected to work, and manufacturing requirements. 4. Determine whether the product requires a user display. Some embedded software requires simple displays to inform users about their operation. Engineers want to know if a product needs a user display to evaluate its specifications. You may be required to create a graphical user interface. 5. Create a prototype It’s a good idea to build a basic prototype to assess the hardware, identify necessary components, and see how they might work together. 6. Create the system architecture Engineers create the overall architecture for the product during this step. They’ll discuss the following issues: - How will the system be supplied with power? - How is the product going to be linked to the internet? - Will the operating system have to be embedded in the device? 7. Determine the operating system (OS), peripherals, and development platform to use Engineers determine whether the product requires a real-time operating system, which is a system that processes input within a specific time frame, often exceptionally quickly. In that case, they will select the best real-time operating system for the product. If not, they can pick the best non-real-time operating system. 8. Create the final prototype After designing the system’s architecture, engineers will proceed ahead to create a final prototype. This activity ensures that architectural design choices will work on the finished product. Examples of Embedded Software Today, embedded system applications can be found in almost every industry and sector. Embedded software development is critical to the operation of interactive kiosks, medical devices, home appliances, cars, and other everyday items. For example, Athenahealth, a healthcare IT service provider has launched an embedded EHR telehealth tool for physicians, which has significantly streamlined their daily operations. It enables them to perform HIPAA-compliant telehealth visits more efficiently within practice workflows such as scheduling, patient messaging, invoicing, video conferencing, and concurrent-encounter documentation. So, across sectors, there are numerous areas where embedded software systems are being leveraged, as we look at some examples where embedded software is used. Embedded software in modern printers helps convert incoming data into instructions for applying ink to paper. They can also scan documents for storage or copying and communicate with other devices via various protocols (fax, Bluetooth, Wi-Fi, Ethernet, and USB). In IoT ecosystems, multiple connected devices sense environmental or industrial parameters and capture data of diverse forms. Thanks to embedded software present in these devices. The convenience that Bluetooth speakers/earphones offer to users is all due to embedded software, which enables the Bluetooth device to convert digital data to analog sound signals. Forget self-driving cars; modern automobiles are almost entirely controlled by embedded software. Complex software manages many automotive components, including climate control, active suspension, power and energy management, and engine and transmission control. Embedded software controls modern devices such as dryers, clothes washers, refrigerators, microwaves, and K-cup coffeemakers. This software monitors operations to improve performance and reduce energy consumption. The Future of Embedded Software Embedded software will continue to find its way into more devices. As computing power and storage density improves, it will also grow in capability and sophistication. Let’s look at the embedded software trends for the coming decade. - Artificial intelligence (AI) is a significant development in embedded software. Security video systems, for example, will soon be able to not only record a person approaching your property but also determine whether the person poses a threat. This can result in an early warning system or the activation of additional security measures. - The rise of 5G, the Internet of Things (IoT), and edge computing will propel the industry forward. - One noteworthy trend is that Python is rapidly gaining popularity among Embedded Systems Engineers and appears poised to take the lead in embedded programming for electronics over the next decade. - With seemingly limitless potential applications, the automotive and medical markets are expected to be significant drivers of the embedded software industry. Still, there are few industries where embedded software is not already a factor but is gaining increasing traction. For example, we see embedded software becoming increasingly important in the marine technology sector as the transition to autonomous products, robotics, and AI accelerates. Furthermore, embedded software systems can be highly customized. This is significant because it allows for new applications and innovation in other industries. Embedded software can be found all around us. It will become more common, making our devices more innovative, capable, and valuable. If they haven’t already, embedded software devices will soon outnumber those running application software. In any case, it’s safe to say that software is no longer just for computers. Creating and delivering a safe and secure embedded software system is a delicate balancing act that necessitates expertise and skill sets to meet competing criteria in a system with limited computing resources. Of course, not only is a fully operationally secure software system required, but so are its components, availability, and performance. For a company with ambitions to be at the forefront of advanced manufacturing, embedded software is today’s critical new frontier. Contact us to learn more about our embedded software programming services, technologies, devices, client success stories, and tech partnerships. What is Embedded Software? It is a code that runs on the hardware designed to perform a single well-defined duty repeatedly. What is the difference between Embedded Software and Embedded Systems? The hardware components within a device running embedded software are called an “embedded system.” At the same time, embedded software is developed from scratch to run exclusively on that hardware in that precise configuration. What are the benefits of embedded application development? - Embedded software is designed for small and particular tasks. - Practical uses with various tasks in domestic, industrial, entertainment, communication, automobile, agricultural and medical domains. - Faster to load. - Simple to manage the general-use embedded devices. What are embedded systems used for? Home appliances, smartphones, and the heating and security systems that operate without interference in our homes use embedded system technology. Is Finoit, a reliable performer of integration of embedded system software? Finoit has a professional team of specialists – Business Analysts, project managers, frontend and backend developers, and QA specialists. We find a suitable and individual approach to every customer and lead the project to a successful launch. Book a Free consultation Drop in your details and our analyst will be in touch with you at the earliest. 6565 N MacArthur Blvd, STE 225 Irving, Texas, 75039, United States
<urn:uuid:3a5a11bf-992d-4ad9-8fb4-cb06b2cbb5af>
CC-MAIN-2023-23
https://www.finoit.com/articles/what-is-embedded-software/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647895.20/warc/CC-MAIN-20230601143134-20230601173134-00683.warc.gz
en
0.9172
2,144
3.453125
3
Article provided by Fr. Thien Duc Vu Vietnamese Lunar New Year or Tet holiday is the most significant festival in Vietnam. Tet holiday is calculated according to the lunar calendar. The Lunar New Year is later than the New Year’s Day. This year, Lunar New Year is on January 25th, 2020. Tet is the longest holiday in Vietnam, at least two weeks for the Tet holiday. Thus, Tet is the most wonderful time for all foreign tourists to spend their vacation in Vietnam enjoying the festive atmosphere and enjoying traditional Vietnamese dishes. In particular, Tet holiday is an opportunity for members in the family to gather together, eat meals together. During Tet members of the family express gratitude to their parents and grandparents who sacrificed to nourish them. Tet Holiday traditionally lasts for ten days. People often stay at home to welcome guests to their house or go to relative and neighborhood houses. The elderly receive good wishes for health. Adults receive wishes for fortune and success, while the young and children receive lucky money. Laughs and talks appear everywhere on Tet holiday. Tet holiday 2020 is the year of the Mouse. Each Lunar New Year will have a symbolic animal. There are twelve animals used to calculate the year, each of which is the symbol of a year. Since each of these animals will bring unique luck in its year they are seen everywhere in Vietnam, on decorations, advertisements, and in other ways. Peach blossom trees in Northern Vietnam and apricot blossom trees in Southern Vietnam are also symbols of the Tet holiday. Vietnamese people believe that the light red of peach blossoms will bring the luck and the yellow of apricot blossom will bring fortune to the owners. Thus, peach blossom tree or apricot blossom tree will be displayed indoors or in front of their homes. Vietnamese and Chinese students (priests, brothers, seminarians, and sisters) celebrated Lunar New Year at Holy Apostles College and Seminary on February 1st, 2020. Celebration of Lunar New Year included Mass, a banquet, musical presentations and a few traditions of the Vietnamese New Year. About 250 people including priests, brothers and sisters, professors, the members of staff, and laity, celebrated Lunar New Year together. All of us celebrated Mass to give thanks to God, because of His blessings in the passing year. We prayed that this new year the holiness of God will be more evident in our lives as we engage in learning, teaching and working at Holy Apostles College and Seminary. We also prayed for a year of peace and health for people throughout the world. After Mass, we had a banquet, traditional Vietnamese music and dance. Everyone received lucky money from Father Rector Peter, Vice-Rector Monsignor Albert, Father Martin Rooney (Chief Operating Officer), and Father Michael Nam. Lucky money is a symbol of success in the New Year. Father Rector Peter gave us the meaning of the year of the mouse 2020. He said that “Mice love living with other mice. Mice are social. I recently read that mice are so social that they will cuddle with non-mice, such as squirrels to keep warm when it is cold. During this new year, may we learn from our brother mouse to love community life; may we learn from brother mouse to invite others into our social spheres of Christian living with the hope that all will be warmed by the perfect, true love of Jesus Christ.” May God bring good luck to everyone in Holy Apostles College and Seminary this new year.
<urn:uuid:afacab8c-b8b2-4b58-b083-53ace6515221>
CC-MAIN-2022-27
https://holyapostles.edu/lunar-new-year-2020-tet-holiday/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103922377.50/warc/CC-MAIN-20220701064920-20220701094920-00048.warc.gz
en
0.957296
721
2.703125
3
Oxidative Stress in Plants Causes, Consequences and Tolerance by Shahid Umar, Naser A Anjum And Altaf Ahmed Oxidative stress is a central factor in a number of biotic and abiotic stress phenomena that occurs when there is a serious imbalance in any plant cell compartment between the production of reactive oxygen species (ROS) and antioxidant defense, leading to physiological and metabolic changes. The presence of high concentration of ROS in cells causes oxidative damage to photosynthetic functions and vital bio-molecules, and disrupt cellular metabolism. Thus, it is important for plant cells to have tight control on the concentration of ROS. Plants possess to a variable extent antioxidant metabolites, enzymes and non-enzymes that have the ability to detoxify ROS thus, to protect the photosynthetic- and cellular functions against ROS-caused oxidative stress and to maintain optimum growth, development and productivity under changing environment. Audience of the Book : |This book useful for advanced students, researchers, faculty of both plant and animal sciences, and environmentalists and policy makers.| The main features of the book are as follows: 1.Deals with the causes of oxidative stress, its consequences and the biological significance of various antioxidant molecules in plants. 2.Chapters are provided with an abstract and keywords in the beginning, and summary or conclusions at the end. 3.Contributed by 46 eminent researchers and scientists from across the globe. Table of Contents: 1. An Introduction to Oxidative Stress in Plants and the Role of Non-Enzymatic Antioxidants 2. Environmental Factors Affecting Components of Ascorbate-Glutathione Pathway in Crop Plants. 3. Regulatory Role of Components of Ascorbate-Glutathione (AsA-GSH) Pathway in Plant Tolerance to Oxidative Stress. 4. Ascorbate and Glutathione: Saviours Against Oxidative Stress. 5. Ascorbate-Glutathione and Plant Tolerance to Various Abiotic Stresses 6. Ascorbate-Glutathione Related Redox Regulation in Plant Stress Tolerance 7. Detoxification of Heavy Metal Induced Oxidative Stress in Plants – Enzymatic- and Non-Enzymatic Mechanisms—A Mini Review 8. Significance of Glutathione in Higher Plants for Combating Abiotic Stress-Effects. 9. Heavy Metals and Oxidative Stress in Plants. 10. Ascorbate and Glutathione: A Defence System Against Heavy Metal Stress in Plants. 11. The Role of Ascorbate Peroxidase and Glutathione in Higher Plants to Abiotic-Induced Oxidative Stress. 12. Defence Strategies of Plants Against UV-B-Induced Oxidative Stress 13. Role of Ascorbate-Glutathione During Salt Stress-Induced Oxidative Stress Tolerance in Plants. 14. Secondary Metabolites as Non-Enzymatic Plant Protectors from Oxidative Stress. 15. The Role of Ascorbate in Growth and Development of Cells During the Formation of Annual Rings in Coniferous Trees. 16. Modulation of Glutathione, its Redox Couple and Related Enzymes in Plants Under Abiotic Stresses. 17. Heavy Metals in Soil and Plants: An Overview of Arsenic, Cadmium, Chromium and Mercury. Subject Index.
<urn:uuid:dd5efcaf-3617-4b3c-af51-d23b090342a1>
CC-MAIN-2019-09
https://www.kopykitab.com/Oxidative-Stress-in-Plants-Causes-Consequences-and-Tolerance-by-Shahid-Umar-Naser-A-Anjum-And-Altaf-Ahmed
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247492825.22/warc/CC-MAIN-20190219203410-20190219225410-00457.warc.gz
en
0.836841
740
2.734375
3
When you rifle around in your purse for some change soon, you might be lucky enough to pull out a new 50 cent coin, launched today by the Royal Australian Mint to celebrate the International Year of Indigenous Languages. The coin, developed in consultation with Indigenous language custodian groups and designed by the Mint’s Aleksandra Stokic, features 14 different words for “money” from Australian Indigenous languages. But where do these words come from? Old words for new things Money, or an object which abstractly represented the value of goods and services, did not exist in Australia before European colonisation. Trade occurred, but it was between items deemed to be of similar worth, for example, pearl shell, quartz, food or songs. With the entry of money into the Indigenous economy, new words were needed to refer to coins and later, notes. Most Indigenous words for money come from words for “stone”, “rock” or “pebble”, no doubt in reference to the size and shape of coins. On the new 50 cent coin, you’ll find words for “stone” from across Australia: - from the Northern Territoy, wumara (from the Gurindji language), wangarri (Warumungu), gudaru (Alawa) and awarnda (Anindilyakwa) - from Western Australia, boya (Nyungar) and tjimari (Yankunytjatjara) - and from Queensland, bakir (Meriam), mulu (Yugambeh) and nambal (Guugu Yimithirr). Gathang, from the Central New South Wales coast, uses dhinggarr “grey”, perhaps due to the colour of most coins, and walang “head”, presumably in reference to the monarch’s head on the coin. Wiradjuri, from the same area, also uses walang, but in this case it means “stone”. Other words for ‘money’ from Indigenous languages The diversity of Indigenous words for money on the new coin is an attempt to reflect the linguistic tapestry of Australia, a nation of over 300 languages and many more dialects. However, the words on the coin are just a small sample of Indigenous terms for money. Some languages differentiate between coins and paper money. Murrinh-patha, spoken in the Daly River region of the Northern Territory, uses palyirr “stone” for coins and we “paperbark” to mean notes. Other languages have words that vary by denomination. Alyawarr, spoken just north of Alice Springs, uses aherr-angketyarr “lots of kangaroos” to refer to the A$1 coin, and rnter-rnter “red” in reference to $20 notes. Alyawarr people also say kwert-apeny “like smoke” for $100 notes. This is perhaps confusing at first, until you recall the original light blue and grey $100 note (1984-1996) depicting Sir Douglas Mawson. Borrowed words for money In some cases, terms for money have been borrowed from other languages. The English word “money” has been given a local flavour by different languages, for example: mani/moni (Kriol) and maniyi or tala (Warlpiri). Another borrowing comes from Australia’s close neighbours. The legacy of 18th century Macassan traders from present-day Indonesia remains in words for “money” originally derived from rupiah (Indonesia’s word for currency). These include rrupiya (Mawng, Burarra, Djinang) and wurrupiya (Tiwi). (And note that Tiwi also uses wurrukwati “mussel shell” for “money”). Probably the most innovative borrowing for money, still used throughout south-western Queensland, is banggu. The word derives from bank and –gu, the latter being used to express ownership. So banggu literally means “of the bank”, and perhaps emerged during the period in Queensland history when the state government was withholding wages from Indigenous people. These stolen wages are now thought to be worth as much as A$500 million in banggu. Indigenous representation on Australian currency Indigenous Australians have not always been well represented on Australian currency. Take the bark painting by David Malangi on the back of the old $1 note released in 1966, which was used without consent or acknowledgement, or the first polymer $10 note, released in 1988, which featured an anonymous Indigenous man painted up for ceremony. Contrast this to 1995, when the Indigenous man on the $50 note was named as the first published Indigenous author, Ngarrindjeri writer David Unaipon, or 2017 when a commemorative 50 cent coin was designed by Boneta-Marie Mabo and released for National Reconciliation Week. The use of multiple words for money on the new coin challenges the myth of a single Australian language. It also represents a shift to naming and individuation: from depicting Australian Indigenous people and their languages as a single group, to recognising the diversity of these groups and their languages. Felicity Meakins, Associate Professor and ARC Future Fellow, The University of Queensland and Michael Walsh, Honorary Associate, Linguistics, The University of Sydney, University of Sydney
<urn:uuid:55d03976-c357-453b-ad97-bfd94d4ece51>
CC-MAIN-2019-39
https://www.themandarin.com.au/107139-the-14-indigenous-words-for-money-on-our-new-50-cent-coin/
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572964.47/warc/CC-MAIN-20190916220318-20190917002318-00176.warc.gz
en
0.937689
1,178
3.265625
3
Need to make a run to the hardware or paint store this summer? Be sure to take your children along, or at least go with them in mind. Why? Because then you can have fun writing together creating paint chip poetry. What’s paint chip poetry? Basically, its poetry written using words from a paint chip. There are several variations on the process. Step 1: Gather Paint Chips As I said, take the kids along and let them select their own paint chip cards, or, if that’s not possible, select a few paint chip cards for each child, keeping in mind their favorite colors and interests–the colors of their favorite stuffed animal, school, or team. Don’t forget to grab a few cards for yourself. Modeling your interest in writing and literacy is one of the best ways to encourage your kids to engage in literacy activities. Step 2: Choose a Process Since I lost the link for the article I read on this, I researched a few paint chip writing activities, and there were several variations on the process available. Here’s three to choose from: - You and your kids can make up similes (statements using the words “like” or “as”) for each color name on their selected card. You can even write the similes directly over the swatch of color. - You and your kids can write a patterned poem using a paint chip color. - You and your kids can select from grade/age appropriate options and write your poems accordingly. Be sure to have plenty of paper and writing utensils on hand. Step 3: Explain and Write - Give you children their paint chip cards. - Explain what you are going to do. Maybe even do a sample together from one of your cards. - Turn your kids loose to write for a set period of time. (For children not yet old enough to write, let them dictate their thoughts, and you write them down. Then read the “poem” back to your child, pointing to each word as you read it to reinforce the one-to-one correspondence between the written and spoken word.) Step 4: Gather and Read Call your kids back to a central area and have fun reading your poems to each other. Step 5: Celebrate! Maybe afterwards you can have a colorful snack, like rainbow sherbert, cupcakes with multi-colored sprinkles, or 9 layer bean dip and multi-colored tortilla chips. Try using your color words in conversation over the next few days. Have fun with these words. The links above were written with the classroom in mind. Also, if you search “Paint Chip Poetry” you will find still more options to take with you back to school in September. How did your paint chip poetry session go? Please use the comments section to share some of the poems you or your children created. Now’s your chance to brag on those little ones! Did you find some interesting color words on your paint chips? Share the color names that caught your fancy. It would be so cool to end up with a list of delightful names.
<urn:uuid:26736e23-4ebe-4e02-b552-01f90910a576>
CC-MAIN-2018-26
https://literatelives.wordpress.com/2017/07/17/family-literacy-and-fun-paint-chip-poetry/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863119.34/warc/CC-MAIN-20180619193031-20180619213031-00513.warc.gz
en
0.944948
662
3.296875
3
The Republican Platform (1856) The new Republican Party, accused of being a sectional rather than national organization by the Democrats, held its convention in Philadelphia. The party’s emphasis on the containment of slavery, as well as the composition of its membership, did give some validity to the charge. Many of its members had been Whigs, and their influence was seen in the economic planks that advocated internal improvements financed by the federal government. Abolitionists and Free Soilers, coming from the Whig and Democratic parties, also influenced the creation of the party’s platform and the nomination of candidates. The Republicans elected John Fremont of California, formerly a Free Soil Democrat, as their presidential candidate and William Dayton of New Jersey, a former Whig, as his running mate. This convention of delegates, assembled in pursuance of a call addressed to the people of the United States, without regard to past political differences or divisions, who are opposed to the repeal of the Missouri Compromise, to the policy of the present administration, to the extension of slavery into free territory; in favor of admitting Kansas as a free state, of restoring the action of the Federal government to the principles of Washington and Jefferson; and who purpose to unite in presenting candidates for the offices of President and Vice-President, do resolve as follows: Resolved, That the maintenance of the principles promulgated in the Declaration of Independence, and embodied in the federal constitution,is essential to the preservation of our Republican institutions, and that the federal constitution, the rights of the states, and the union of the states, shall be preserved. Resolved, That with our republican fathers we hold it to be a self-evident truth that all men are endowed with the inalienable rights to life, liberty, and the pursuit of happiness, and that the primary object and ulterior design of our Federal government were, to secure these rights to all persons within its exclusive jurisdiction; that as our republican fathers, when they had abolished slavery in all our national territory, ordained that no person should be deprived of life, liberty, or property, without due process of law, it becomes our duty to maintain this provision of the constitution against all attempts to violate it for the purpose of establishing slavery in any territory of the United States, by positive legislation, prohibiting its existence or extension therein. That we deny the authority of Congress, of a territorial legislature, of any individual or association of individuals, to give legal existence to slavery in any territory of the United States, while the present constitution shall be maintained. Resolved, That the constitution confers upon Congress sovereign power over the territories of the United States for their government, and that in the exercise of this power it is both the right and the imperative duty of Congress to prohibit in the territories those twin relics of barbarismolygamy and slavery. Resolved, That while the constitution of the United States was ordained and established, in order to form a more perfect union, establish justice, insure domestic tranquillity, provide for the common defense, promote the general welfare, and secure the blessings of liberty, and contains ample provisions for the protection of the life, liberty, and property of every citizen, the dearest constitutional rights of the people of Kansas have been fraudulently and violently taken from them; their territory has been invaded by an armed force; spurious and pretended legislative, judicial, and executive officers have been set over them, by whose usurped authority, sustained by the military power of the government, tyrannical and unconstitutional laws have been enacted and enforced; the rights of the people to keep and bear arms have been infringed; test oaths of an extraordinary and entangling nature have been imposed, as a condition of exercising the right of suffrage and holding office; the right of an accused person to a speedy and public trial by an impartial jury has been denied; the right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, has been violated; they have been deprived of life, liberty, and property without due process of law; that the freedom of speech and of the press has been abridged; the right to choose their representatives has been made of no effect; murders, robberies, and arsons have been instigated or encouraged, and the offenders have been allowed to go unpunished; that all these things have been done with the knowledge, sanction, and procurement of the present national administration; and that for this high crime against the constitution, the Union, and humanity, we arraign the administration, the President, his advisers, agents, supporters, apologists, and accessories, either before or after the facts, before the country and before the world; and that it is our fixed purpose to bring the actual perpetrators of these atrocious outrages, and their accomplices, to a sure and condign punishment hereafter. Resolved, That Kansas should be immediately admitted as a state of the Union with her present free constitution, as at once the most effectual way of securing to her citizens the enjoyment of the rights and privileges to which they are entitled, and of ending the civil strife now raging in her territory. Resolved, That the highwayman’s plea that “might makes right,” embodied in the Ostend circular, was in every respect unworthy of American diplomacy, and would bring shame and dishonor upon any government or people that gave it their sanction. Resolved, That a railroad to the Pacific ocean, by the most central and practicable route, is imperatively demanded by the interests of the whole country, and that the Federal government ought to render immediate and efficient aid in its construction, and, as an auxiliary thereto, the immediate construction of an emigrant route on the line of the railroad. Resolved, That appropriations of Congress for the improvement of rivers and harbors of a national character, required for the accommodation and security of our existing commerce, are authorized by the constitution, and justified by the obligation of government to protect the lives and property of its citizens. Resolved, That we invite the affiliation and cooperation of the men of all parties, however differing from us in other respects, in support of the principles herein declared; and believing that the spirit of our institutions, as well as the constitution of our country, guarantees liberty of conscience and equality of rights among citizens, we oppose all proscriptive legislation affecting their security.=
<urn:uuid:e8e4526d-d8f5-4154-93de-bc7de81e28d5>
CC-MAIN-2019-43
http://www.errvideo.com/research/the-original-gop-platform/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986685915.43/warc/CC-MAIN-20191018231153-20191019014653-00557.warc.gz
en
0.963331
1,313
3.421875
3
"The properties of an orbital are those of an electron contained in it. It is normal practice, illogical though it may sound, to talk of 'vacant orbitals'. The properties of vacant orbitals are those calculated for electrons occupying them." I consider this a bit of a truism, especially the last sentence. IUPAC defines as an orbital: Wavefunction depending explicitly on the spatial coordinates of only one electron. which as noted in this answer falls short of considering spin. So let's use that definition for spatial orbitals. (For a spin-orbital, the analogous definition would be: depending explicitly on the spatial coordinates and spin coordinate ...) At this point, let us point out that a spin-orbital is a one-electron wavefunction. It is not an observable. One can observe the density or even the spin-density by means of X-ray diffraction, indirectly by NMR, ESR etc. (Another truism: orbitals of a single-electron systems, such as the hydrogen atom, are an important, but also somewhat trivial exception.) The density can be calculated from a many-electron wavefunction (WF) and a popular way of obtaining such a WF is combining several orbitals. This involves a lot more theory and mathematics than introductory chemistry courses can show. So one can decide that if no electron is present, there is no orbital and stand on sound mathematical ground. Then again, I can just put an electron there by means of mathematics. Depending on the "computation-chemistry-method", for instance when employing a basis set (which is by far the most common approach), one can calculate properties even for empty orbitals such as the orbital energy (not an observable), which can be used to (approximately) describe electronic excitations (an observable). Computational chemists have resolved to call the empty orbitals "virtual" to bridge the gap between the two opposing views and use them as mathematical tools to describe excited states or to improve the quality of the description of the ground state. Since an orbital isn't defined until it is occupied by an electron, would it still be correct to say that an empty orbital (such as a LUMO) can interact with other filled orbitals? Let's consider the formation of a bond between two hydrogen atoms in a special way: reversing a heterolytic splitting, which we will briefly compare with one reversing a homolytic splitting. In order to decide this question, one needs to split the non-existent hair dividing the following two views: a) Since there are no empty orbitals, in the heterolytic case, the proton will distort the orbitals on the anion until the bond is formed. Does the orbital on the former proton now magically appear? b) There is an empty orbital on the proton. However, at large distance, its effect on the anion can be simulated by an electric field, which should not carry orbitals (one can assume that the metal plates creating the field are far away and crank up the charge). If a situation involving an empty orbital cannot be distinguished from one where there isn't one, is it really there? Of course, the end result of either way of looking at things is the same hydrogen molecule that we also get from combining two hydrogen atoms the standard way. I thus suggest to abandon the view of orbitals carried around by atoms (except in the computational chemist way, as will be outlined below). Rather, I suggest to think of the effective potential felt by a newly added electron - where would it go? Regardless of how the nuclei got to where they are now, where do the electrons go? "Unoccupied orbital" is then a useful shorthand for the relevant regions. (At this point, I consider the original question answered. I will elaborate a bit on how I got here.) The last question of the previous paragraph is one way of looking at the algorithm of the Hartree-Fock procedure (the first step of wavefunction-based quantum chemistry, which is comparable to density functional theory, DFT, in this regard). We have some "basis set" (and we do not care what is looks like right now) containing candidates for orbitals, nuclei (i.e. charges and positions) and a number of electrons. The first step is to evaluate the potential/the forces acting on the candidate orbitals, which is nuclei only at this point$^1$. One then linearly combines the candidate orbitals (that's LCAO right there) to form the best choice one can make. Obeying the aufbau principle, one fills the candidate orbitals until all electrons have got an orbital. One then updates the potential (which now also considers the electrons), combines again, fills the new candidates, updates the potential again and so forth until the changes between iterations are small. The result is then evaluated in terms of energy, and possibly electron density or other observables. By doing it this way, one arrives at the familiar MO picture without assuming an electron distribution or specific orbitals filled in a certain way on certain atoms. Let's get back to the basis set. In the previous paragraph, no assumption was made on its nature. The initial candidate orbitals could be any shape (as long as they are reasonable from a mathematical point of view, for instance, they must be twice differentiable, square-integrable etc.) and many different choices exist. Experience shows that using functions resembling the exact orbitals of hydrogen are very useful for molecular chemistry$^2$. This is because they combine results of decent accuracy with computational efficiency and chemist-friendly starting points of interpretation - such as HOMOs and LUMOs that can be related to individual atoms, flawed though as that line of reasoning may be (as I have hoped to show with this wall of text). $^1$ A bit of a white lie: this is only the special situation of the so-called core guess. But done here for illustration. $^2$ Solid state chemistry is a different matter, where standing waves are the norm.
<urn:uuid:34ba12b3-819c-481f-be2b-3826b444e368>
CC-MAIN-2019-30
https://chemistry.stackexchange.com/questions/86469/is-it-correct-to-talk-about-an-empty-orbital
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525402.30/warc/CC-MAIN-20190717201828-20190717223828-00009.warc.gz
en
0.937411
1,261
3.3125
3
A Young Rabbit and Partridge Hung by the Feet The painting’s depiction of hunted animals for the use of sport and food is a fine example of the still lifes Oudry executed late in his career. As one of France’s leading dead game painters, both noblemen and kings commissioned his works to be hung in dining rooms or hunting lodges—an appropriate place for them to be viewed, especially during meals, for his images depict food waiting to be stripped and/or plucked for cooking. Oudry was an extremely successful and prolific painter, often exhibiting in France’s most prestigious public exhibition space, the Salon, where he showed twice as many paintings as any other artist of his time. He displayed this work at the Salon, which is said to have formed a pair with another now-lost painting of a jay and an oriole hung by the feet. Although initially intending to become a portraitist, Oudry’s signature work began to take form when he painted dead birds with insects under the tutelage of Nicolas de Largillière (1656–1746). Largillière, a Flemish-trained painter, helped transmit to France the Dutch still life tradition from the previous century, thus explaining the close observation of nature seen in Oudry’s work. Oudry, one of the foremost illusionistic painters of his time, also mastered the skill of trompe l’oeil (tricking the eye). A Young Rabbit and Partridge Hung by the Feet is misleadingly simple with its neutral background that displays Oudry’s interest in the principles of relative color and naturalistic shadows, which help to create the spatial illusion of the figures hanging a few inches away from their hook. Oudry uses no imposed structure or framing device for this suspended game, and he presents no contrasting colors in the background to enhance the subtle grays and browns of the animals. Oudry’s assured style, smooth brushstrokes, and close attention to details, such as in the subtle whiskers of the rabbit, all help to create an intensely quiet, harmonious and calm image. Viewers of the painting can thus easily envision themselves touching the fluffy rabbit fur, or plucking a feather from the partridge’s plumage. Audio: Mirella Brussani, Oberlin College
<urn:uuid:05b1d231-49ea-4598-947e-01bd845b8084>
CC-MAIN-2015-32
http://www.clevelandart.org/art/behind-the-scenes/featured-gallery-installation/beyond-oberlin/a-young-rabbit-and-partridge-hung-by-the-feet
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438044160065.87/warc/CC-MAIN-20150728004240-00075-ip-10-236-191-2.ec2.internal.warc.gz
en
0.950742
494
2.96875
3
Laboratory automation is a multi-disciplinary strategy to research, develop, optimize and capitalize on technologies in the laboratory that enable new and improved processes. Laboratory automation professionals are academic, commercial and government researchers, scientists and engineers who conduct research and develop new technologies to increase productivity, elevate experimental data quality, reduce lab process cycle times, or enable experimentation that otherwise would be impossible. The most widely known application of laboratory automation technology is laboratory robotics. More generally, the field of laboratory automation comprises many different automated laboratory instruments, devices (the most common being autosamplers), software algorithms, and methodologies used to enable, expedite and increase the efficiency and effectiveness of scientific research in laboratories. The application of technology in today's laboratories is required to achieve timely progress and remain competitive. Laboratories devoted to activities such as high-throughput screening, combinatorial chemistry, automated clinical and analytical testing, diagnostics, large scale biorepositories, and many others, would not exist without advancements in laboratory automation. Some universities offer entire programs that focus on lab technologies. For example, Indiana University-Purdue University at Indianapolis offers a graduate program devoted to Laboratory Informatics. Also, the Keck Graduate Institute in California offers a graduate degree with an emphasis on development of assays, instrumentation and data analysis tools required for clinical diagnostics, high-throughput screening, genotyping, microarray technologies, proteomics, imaging and other applications. At least since 1875 there have been reports of automated devices for scientific investigation. These first devices were mostly built by scientists themselves in order to solve problems in the laboratory. After the second world war, companies started to provide automated equipment which had become more and more complex. Automation was spreading in laboratories steadily through the 20th century, but then a revolution took place: in the early 1980s, the first fully automated laboratory was opened by Dr. Masahide Sasaki. In 1993, Dr. Rod Markin at the University of Nebraska Medical Center created one of the world's first clinical automated laboratory management systems. In the mid-1990s, he chaired a standards group called the Clinical Testing Automation Standards Steering Committee (CTASSC) of the American Association for Clinical Chemistry, which later evolved into an area committee of the Clinical and Laboratory Standards Institute. In 2004, the National Institutes of Health (NIH) and more than 300 nationally recognized leaders in academia, industry, government, and the public completed the NIH Roadmap to accelerate medical discovery to improve health. The NIH Roadmap clearly identifies technology development as a mission critical factor in the Molecular Libraries and Imaging Implementation Group (see the first theme - New Pathways to Discovery - at https://web.archive.org/web/20100611171315/http://nihroadmap.nih.gov/). Despite the undeniable success of Dr. Sasaki laboratory and others of the kind, the multi-million dollar cost of such laboratories has prevented most laboratories to adopt it. This is all more difficult because usually devices made by different manufactures cannot communicate with each other. However, recent advances based on the use of scripting languages like Autoit have made it possible the integration of equipment from different manufacturers. Using this approach, many low-cost electronic devices, including open-source devices, become compatible to common laboratory instruments. Low-cost laboratory automationEdit A large obstacle to the implementation of automation in laboratories has been its high cost. Many laboratory instruments are very expensive. This is justifiable in many cases, as such equipment can perform very specific tasks employing cutting-edge technology. However, there are devices employed in the laboratory that are not highly-technological but still are very expensive. This is the case of many automated devices, which perform tasks that could easily be done by simple and low-cost devices like simple robotic arms, universal (open-source) electronic modules, or 3D printers. So far, using such low-cost devices together with laboratory equipment was considered to be very difficult. However, it has been demonstrated that such low cost devices can substitute without problems the standard machines used in laboratory. It can be anticipated that more laboratories will take advantage of this new reality as low-cost automation is very attractive for laboratories. The technology that enables the integration of any machine regardless of their brand is scripting, more specifically, scripting involving the control of mouse clicks and keyboard entries, like AutoIt. By timing clicks and keyboard inputs, different software interfaces controlling different devices can be perfectly synchronized. Benchtop automation consists in the use of machines of reduced size compared to large automation units found in the most resource-rich laboratories. Benchtop automation are often flexible, meaning that they can deal with many different tasks. Since many laboratories do not need to employ full-scale automation, benchtop automation can be an attractive solution for them. Also, the low-cost devices presented in the previous subsection could easily be employed as benchtop solutions in many cases. Automation is the use of control systems and information technologies to reduce the need for human work in the production of goods and services Laboratory automation is the use of instrument and specimen processing equipment to perform clinical assay with only minimal involvement the technologist Automation in clinical laboratoryEdit There are several individual steps in the analysis process as a whole in a laboratory such as: 1. Identifying the patient 2. Getting the correct sample 3. Identifying and proper labeling of the sample 4. Delivery of sample in proper storage condition and within time 5. Preparation of sample for test 6. Sample loading/aspirating 7. Analysis 8. Reporting—Entering the result manually 9. Entering in register Automation has a lot of benefits for the laboratory personnel. 1. Reduces the workload 2. Increases turnaround time (Saves time used per analysis) 3. Increases total number of tests done in less time 4. Eliminates repetition and monotony from human life so decreases human error, improves accuracy 5. Improves reproducibility (repeatability) 6. Uses minimum amount of sample and reagent - Olsen, Kevin (2012-12-01). "The First 110 Years of Laboratory Automation Technologies, Applications, and the Creative Scientist". Journal of Laboratory Automation. 17 (6): 469–480. doi:10.1177/2211068212455631. ISSN 2211-0682. PMID 22893633. - Felder, Robin A. (2006-04-01). "The Clinical Chemist: Masahide Sasaki, MD, PhD (August 27, 1933–September 23, 2005)". Clinical Chemistry. 52 (4): 791–792. doi:10.1373/clinchem.2006.067686. ISSN 0009-9147. - Boyd, James (2002-01-18). "Robotic Laboratory Automation". Science. 295 (5554): 517–518. doi:10.1126/science.295.5554.517. ISSN 0036-8075. PMID 11799250. - LIM Source, a laboratory information management systems resource - Clinical Chemistry 46, No. 5, 2000, pgs. 246-250 - Health Management Technology magazine, October 1, 1995 - Clinical and Laboratory Standards Institute (formerly NCCLS) - Felder, Robin A (1998-12-01). "Modular workcells: modern methods for laboratory automation". Clinica Chimica Acta. 278 (2): 257–267. doi:10.1016/S0009-8981(98)00151-X. - Carvalho, Matheus C. (2013-08-01). "Integration of Analytical Instruments with Computer Scripting". Journal of Laboratory Automation. 18 (4): 328–333. doi:10.1177/2211068213476288. ISSN 2211-0682. PMID 23413273. - Pearce, Joshua M. (2014-01-01). Chapter 1 - Introduction to Open-Source Hardware for Science. Boston: Elsevier. pp. 1–11. doi:10.1016/b978-0-12-410462-4.00001-9. ISBN 9780124104624. - Carvalho, Matheus C.; Eyre, Bradley D. (2013-12-01). "A low cost, easy to build, portable, and universal autosampler for liquids". Methods in Oceanography. 8: 23–32. doi:10.1016/j.mio.2014.06.001. - "Robotics-assisted mass spectrometry assay platform enabled by open-source electronics". Biosensors and Bioelectronics. 64: 260–268. doi:10.1016/j.bios.2014.08.087. - "Dual robotic arm "production line" mass spectrometry assay guided by multiple Arduino-type microcontrollers". Sensors and Actuators B: Chemical. 239: 608–616. doi:10.1016/j.snb.2016.08.031. - "Universal electronics for miniature and automated chemical assays". - "Open hardware: Self-built labware stimulates creativity". Nature. 532: 313. doi:10.1038/532313d. - Carvalho, Matheus (2017). Practical Laboratory Automation: Made Easy with AutoIt. Wiley VCH. ISBN 978-3-527-34158-0.
<urn:uuid:ca1a7f3a-aeaf-44f0-abe4-3a5447d57a2f>
CC-MAIN-2018-13
https://en.m.wikipedia.org/wiki/Laboratory_automation
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648404.94/warc/CC-MAIN-20180323161421-20180323181421-00764.warc.gz
en
0.865536
1,974
3.0625
3
It’s now some years since I restored this map, but I feel like sharing it anyway. This map represents the typical school posters: with its wooden slats to roll and hang, lined on the back. It was very common to varnish them with shellac to waterproof and protect them from abrasion. This one was made of two pieces of printed paper, sticked together along the central horizontal stripe. It is from 1936, spanish civil war was barely breaking. The main degradation was the varnish layer (shellac) which causes cracks and dries paper fibres. At the end this oxidizes and turns yellow the object. Its relatively large scale (121 x 117 cm) does not help on its conservation either. Removing the old varnish has allowed to repare other minor damages: tears, gaps and wrinkles. But most important is that the new varnish is not oxidizing nor yellowing. As it is very flexible it will not crack in the future. Countless microfissures eroded the formerly smooth surface of the printed paper. The image above, raking lighted, shows how the removing of the original varnish allowed to hydrate the paper again, restoring its elasticity. Damp stains were also a minor damage (in terms of physical and chemical stability of the object), though at first glance they were very annoying. Once they were cleaned, tha map can be best enjoyed. Micro cracking of the varnish affected the clarity of the work, dampening colours and blurring lines. After the old varnished has been removed, colours recover intensity and definition. The restoration has eliminated harmful aspects and healed the main damages, respecting the map’s original characteristics and appearance: gloss, presentation with the wooden slats, cloth on the back and ribbons. The products applied are reversible and long term preservation. How we did it: - Removing the canvas from the back. - Separation of the two printed paper pieces. - Water cleaning and deacidification. Yes, the papers are washed in water! - The two separate parts of the map, clean and without varnish, that has been removed by immersion too. - Sizing, consolidation of tears and gaps. - Adding tissue reinforcement on the reverse (japanese paper lining). - Retouching gaps on the front. - Mounted on canvas, slats and ribbons.
<urn:uuid:fd57e6d2-1bf5-4823-8635-ad48c36d1b54>
CC-MAIN-2019-39
https://ritaudina.com/en/2014/08/14/restoration-of-scholar-map-poster/
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572439.21/warc/CC-MAIN-20190915235555-20190916021555-00531.warc.gz
en
0.951381
507
3.296875
3
- Annotations are introduced in java 5.0. - Annotations allow us to provide metadata (data about data) information into our source code. - In java all annotations are interfaces only. - Already in Java to provide metadata already we have comments right? then what is the need of Java Annotations? In any programming language, compilation is work from following 4 machines - Loader / Link editor In Java compilation phase pre-processor is not existed. Because in java #include statements are not available. Compiler phase existed 6 number of phases. 1. Lexical Analyzer Lexical analyzer phase is the first phase of compilation process. It takes source code as input. It reads the program and converts it into tokens. It converts a stream of lexemes into a stream of tokens. Tokens are defined by regular expressions which are understood by the lexical analyzer. It also removes white-spaces and comments. 2. Syntax Analysis Syntax analysis is the second phase of compilation process. It takes tokens as input and generates a parse tree as output. In syntax analysis phase, the parser checks that the expression made by the tokens is syntactically correct or not. 3. Semantic Analysis Semantic analysis is the third phase of compilation process. It checks whether the parse tree follows the rules of language. Semantic analyzer keeps track of identifiers, their types and expressions. The output of semantic analysis phase is the annotated tree syntax. 4. Intermediate Code Generation In the intermediate code generation, compiler generates the source code into the intermediate code. Intermediate code is generated between the high-level language and the machine language. The intermediate code should be generated in such a way that you can easily translate it into the target machine code. 5. Code Optimization Code optimization is an optional phase. It is used to improve the intermediate code so that the output of the program could run faster and take less space. Optimization can be assumed as something that removes unnecessary code lines and arranges the sequence of statements in order to speed up the program execution without wasting resources (CPU, memory). 6. Code Generation Code generation is the final stage of the compilation process. It takes the optimized intermediate code as input and maps it to the target machine language. Code generator translates the intermediate code into the machine code of the specified computer. So, in lexical analysis phase the specified complete meta data in the form of comments would be removed from our source program. If you open the .class file then meta data is not available. But my requirement is I want bring my meta data to up to .java file, up to .class file and up to run time (to debug or test our application). So, if you want test or debug your application then comments are not sufficient. So, we must go for annotations.
<urn:uuid:ee84e887-6758-4219-b8db-d16532b6c90b>
CC-MAIN-2020-29
https://www.waytoeasylearn.com/learn/java-annotations/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655919952.68/warc/CC-MAIN-20200711001811-20200711031811-00598.warc.gz
en
0.865722
583
3.390625
3
Brief History of Ghana The Republic of Ghana is located in West Africa. It borders Cote d’Ivoire to the west, Burkina Faso to the north, Togo to the east and the Gulf of Guinea to the south. Ghana was inhabited in pre-colonial times by a number of ancient, predominantly Akan Kingdoms, including the Akwamus on the eastern coast, the inland Ashanti Empire and various Fante and non-Akan states like the Ga and Ewe states along the coast. Trade with European states flourished after contact with the Portuguese in the 15th century, and the British established a Crown Colony, the Gold Coast, in 1874. Ghana became the first sub-Saharan African country to gain its independence in 1957. Dr. Kwame Nkrumah, who was responsible for the successful negotiations with the British and declared independence, became the first Prime Minister and then President of Ghana. Recognising the significant role Dr. Kwame Nkrumah played in modern Ghana’s development, the FPSO was named after him by the Jubilee Integrated Project Team. In 2009, John Evans Atta Mills took office as President with a difference of about 40,000 votes (0.46%) between his party, the National Democratic Congress, and the New Patriotic Party, marking the second time that power had successfully been transferred from one legitimately elected leader to another, and securing Ghana’s status as a stable democracy. Ghana’s economy has been strengthened by a quarter century of relatively sound management, a competitive business environment, and sustained reductions in poverty levels. Ghana is well endowed with natural resources and agriculture accounts for roughly one-quarter of GDP and employs more than half of the workforce, mainly small landholders. The services sector accounts for 50% of GDP. According to the 2018 Budget Statement and Economic Policy, the summary of Ghana’s Macroeconomic performance, under the theme “Putting Ghana Back to Work”, is as follows: Overall real GDP grew at an estimated 7.8 percent in the first half of 2017 (6.6% in quarter one and 9.0% in quarter two) against 2.7 percent in same period in 2016. Overall GDP growth is provisionally estimated at 7.9 percent at the end of 2017, up from the original forecast of 6.3 percent; ? Non-Oil real GDP grew at an estimated 4.0 percent in the first half year of 2017 (4.0% in quarter one and 3.9% in quarter two) compared to 5.9 percent in the same period in 2016. Non-oil GDP growth is provisionally estimated at 4.8 percent at the end of 2017; ? End-period inflation was 11.6 percent in October, 2017 compared to 15.8 percent at the same period in 2016; ? The overall budget deficit on cash basis was 4.5 percent of GDP in September, 2017 against a target of 4.8 percent of GDP and an outturn of 6.4 percent in the same period in 2016; ? The primary balance posted a surplus of 0.3 percent of GDP in September, 2017, as targeted and is a significant improvement over a deficit of 1.6 percent realized during the same period in 2016; ? The current account balance registered a deficit estimated at 0.2 percent of GDP in August, 2017 compared with 2.6 percent in August, 2016; and ? The country’s Gross International Reserves (including petroleum funds and encumbered assets), which stood at US$6.9 billion by end-September 2017, could cover 3.9 months of imports compared to the US$4.8 billion or 2.5 months import cover recorded in the same period of 2016.
<urn:uuid:cad6bd82-8f21-4496-bd6d-1020deaedd49>
CC-MAIN-2023-50
https://mfa.gov.gh/index.php/about-ghana/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102637.84/warc/CC-MAIN-20231210190744-20231210220744-00327.warc.gz
en
0.959306
778
3.515625
4
Take your propaganda elsewhere. The certainty that you display is not backed up by the facts. Here's just one unbiased source: http://lamar.colostate.edu/~grjan/kosovohistory.html The earliest known inhabitants of Kosovo were called Illyrians by both Greeks and Romans. Albanians today claim to be direct descendants of the Illyrians. Serbian scholars claim that Albanians appeared on the scene in the early Middle Ages as a result of intermarriage between nomadic shepherds and unromanized remnants of Illyrians and Dardanians from Thrace. Tracing such descents is difficult but the people living in the region before the arrival of the Serbs from the North are likely to have some genetic relationships to Albanians, but DNA data would be needed to definitively settle the claim, which in any case is hardly germane to the current conflict. The region was conquered by Alexander the Great 300 years before Christ and became part of the Roman province of Dardania in the 4th century A. D. Notice that the facts of who the first inhabitants were is in dispute, not cut and dry like you said. Similarly, these disputed facts are not germaine, so your claim that Kosovo belongs to the Albanians based on their being the first inhabitants is not relevant. Again, I say if you want to propagandize, find a different forum to do it on. That of the Serbs, who sometimes have the gall to say that they were the first inhabitants of Kosovo whereas they are only its third known invaders. That of the Romanians, who know that their language is related to Albanian, and want to claim as their ancestors the Dacians, a Thracian tribe north of the Danube, notably to bolster their territorial claims on Transylvania. You didn't mention the Thracian thesis, dear to 19th century balkanologist Gustav Weigand, but it is the only alternative to the claim that the Albanians are indeed the descendants of the Illyrians. Or used to be, since it is now established that the Bessi, the only Thracian tribe which had retained its language in the 6th century, were exposed to Christianity in their own language, whereas it is obvious that the proto-Albanians received it in Latin. There is much more evidence, notably archaeologic, that the Illyrians were indeed the ancestors of the Albanians, and those who deny it now are acting in bad faith. Now if you consider first ownership to be irrelevant to the issue of legitimate property, it only proves that you are a bad political philosopher as well as an ignorant in Balkan history. The fact that I am not does not make me a propagandist: it only enables me to refute you without using any documentation. To paraphrase your arrogant formula: take your incompetence elsewhere. What is wrong about knowing what one is talking about?
<urn:uuid:65ef9c48-887e-477c-8833-3c804e0e17b4>
CC-MAIN-2015-48
http://freerepublic.com/focus/f-news/1533017/replies?c=39
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398456289.53/warc/CC-MAIN-20151124205416-00013-ip-10-71-132-137.ec2.internal.warc.gz
en
0.975767
606
2.578125
3