text
stringlengths
198
621k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
15
1.73k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
49
160k
score
float64
2.52
5.03
int_score
int64
3
5
By Dr. Ian C Dunican PhD, MBA, MMineEng, BA PSE Sleep Consultant It is well known that sleep is an important process for recovery and subsequent performance in athletes and non-athletes alike. In recent years podcasts, news and scientific articles have communicated the intrinsic details of sleep in different athletic populations and the importance of sleep to enable performance. So why is it that many people neglect sleep or just don’t get enough? Recent statistics from the Sleep Health Foundation in Australia in conjunction with Deloitte access economics report that 1 in 3 people do not get enough sleep . We should be aiming to achieve 7-9 hrs per night. One of the main factors contributing to this lack of sleep is that 1 in 5 people have a sleep disorder. Sleep disorders or sleep problems will affect the quantity and quality of sleep, thereby reducing the efficiency of our sleeping time. There are currently over 80 sleep disorders recognised by the American Academy of Sleep Medicine resulting in $18bn of lost productivity per year or $2,500 per person. Another factor is the societal and cultural approach to exercise and fitness, particularly with high achievers and athletes. Too many people are advocating early morning starts, just like Rocky before 5:00 am in order to get workouts done or even to catch up on email. So, whilst many of us need to go to work or are trying to carve out time before children awake, we need to ensure that we are bringing balance to our training. Such early morning starts will truncate your sleep duration. If you are exercising at this time, then to achieve 7-9 hrs per night, you will need to be in bed at a minimum by 8:30pm. This will allow for 10-20 minutes to fall asleep, followed by 8-hrs in bed for sleep that will most likely result in around 90% of sleep efficiency or approx. 7-8-hrs as we all wake throughout the night (WASO: Wake after sleep onset) which results in a reduction in total sleep duration. In my work with a top-level physiologist who specialises in recovery with elite and Olympic athletes, they always advocate that sleep for recovery is the number one modality to prioritise for subsequent performance. Therefore, these early morning training sessions (before 5:00am) truncate your opportunity for sleep duration and will also reduce the time spent in rapid eye movement (REM) sleep, which is important for cognitive performance and decision making. If you are an amateur athlete that works and has a family, then dividing your training sessions may be appropriate for you. Maybe consider a lunchtime high intensity session to augment your training or extending your evening training session. “Rise and Grind” may be replaced by “Sleep in, and Win”. Some people get by on 4-5 hrs sleep a night, can’t I just train myself to do this? The short answer is no, the vast majority of the population require 7-9 hrs per night. In a recent interview Prof. Matthew Walker on the Joe Rogan Experience said, “When you look at the number of people that sleep less than 5 hrs per night, there is a small fraction of <1% of the population, that has a certain gene that allows them to survive on 5 hrs of sleep”. So, whilst some people may be only getting 5-hrs and they might be functioning ok from day to day, they are most likely not achieving their optimal performance. But what about people like Winston Churchill, Einstein etc, they didn’t sleep much? Yes, they slept unorthodox hours and even slept a low number of hours overnight (4-6 hrs). However, they did nap at least once a day and sometimes twice. In my work with business leaders, coaches, athletes and the general population (more than 4,000 people), I have not observed anyone who functions or competes at the highest levels on less than 6-hrs per night. Those who have told me that they only need 6-hrs a night tend to have short naps during the day or in some cases experience micro-sleeps at their desks or when sitting down that they are unaware of. What is of interest is when “short sleepers” are provided with an uninterrupted period of time in bed to maximise sleep, they tend to achieve 8-hrs of sleep. If you are an athlete, non-athlete, business leader or an individual looking to optimise your day, then the cheapest, most effective solution may lie within your sleep…pun intended. With Dr. Dunican joining the PSE Team this week we are making full use of his expertise and are excited to announce the availability of the PSE Sleep Assessments and Consult. A PSE Sleep Assessment and Consult is a comprehensive service delivered by Dr. Dunican that is designed to identify and address how you can optimise your sleep for performance. To learn more, click here. 1. Robert Adams SA, Anne Taylor, Doug McEvoy, and Nick Antic. Report to the Sleep Health Foundation 2016 Sleep Health Survey of Australian Adults. Sleep Health Foundation: The University of Adelaide:The Adelaide Institute for Sleep Health2016. 2. Berry RB BR, Gamaldo CE, Harding SM, Lloyd RM, Marcus CL and Vaughn BV. Academy of Sleep Medicine. The AASM Manual for the Scoring of Sleep and Associated Events: Rules, Terminology and Technical Specifications V2.2. Darien, Illinois: American Academy of Sleep Medicine; 2015. Dr. Ian Dunican has over 20 years international professional experience in health, safety and performance/productivity improvement and commenced his occupational life in the Military. He has a PhD from the University of Western Australia (UWA), where he worked with elite sporting organisations and their athletes to optimise sleep, recovery and performance. Ian has worked with elite athletes at the Australian Institute of Sport (AIS), West Australian Institute of Sport (WAIS), professional teams in Super Rugby, Australian Rules Football, Basketball and with athletes involved in Ultra-Running, Swimming and Combat Sports like Boxing, & MMA. Read more about Ian, here.
<urn:uuid:26dba275-0940-4cfd-9b0e-618cdef0251a>
CC-MAIN-2019-09
https://powerspeedendurance.com/optimise-your-day-with-the-science-of-sleep/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247493803.26/warc/CC-MAIN-20190219223509-20190220005509-00267.warc.gz
en
0.942408
1,289
2.59375
3
If you want to learn how to draw flames you must understand that drawing flames is different from most things you have drawn so far and it’s not an easy task. Why drawing flames is so difficult? Well the reason lies in the nature of the flames themselves. They are moving, changing, dancing constantly and that’s the reason that make them so fascinating. Their color also changes dramatically according to the material burning and the intensity of the heat. You probably have figured that drawing flames and capturing their essence on paper is going to be an hard task for these reasons. The best thing you can do while drawing flames is trying to simulate them on paper (or digital medium you are using) and give the observer the illusion he is looking at hot, scorching and vivid flames! I will draw different types of flames in this tutorial but the principle to draw them will be always the same. Also the color is very important in giving the illusion of scorching flames. Let’s go to see how to draw flames! We will start with a very simple drawing of a small flame and we’ll try to get the basic principles to get it right. More complex and elaborated flames need more patience and a bit more skill but are based on the same essential principles. How to draw flames – starting out First thing, symmetry. You want your flames to be asymmetric, completely off or they’ll look static and boring. So I have drawn a vertical axis and two horizontal ones to explain what I mean. In drawing the basic shape of the flame I’ll stay away from symmetry and I’ll try to imagine the flame almost twisting around the middle axis. See what I mean? Start at the base of the flame and draw a curved line like an inverted letter s. Once at the top come back down (see the top arrow) loosely following the curvature of the first line and meet the tip of the flame at the bottom. Now, by using similar motions with your pencil, draw a smaller flame inside. This smaller flame has to be closer to the bottom, it is very important as we are using three basic colors to represent the heat emanating from the flame. The last step is drawing an even smaller flame inside the middle one, like in the drawing above. All flames are colored according to their temperature and they are hotter in the inside than the outside. Higher temperatures produce brighter colors while lower temperatures produce darker colors. In this case we are using three colors, yellow, orange and red to represent this phenomenon. So from now on the core of our flames will be yellow (white in the last drawing) while the intermediate layer will be orange and the outside of the flame will be red. You can use more colors if you like but I believe these are the bare minimum if you want to draw convincing flames. Once you’ve outlined your flame and the three parts of it you just need to fill it up with color to finish your drawing. A couple of things to notice: first, the bottom of the flame is the hottest part and should be colored yellow or white; second, when you draw the flame try to work on the sinuosity of the curves. There aren’t straight lines in a flames and all the curves connect flawlessly to each other. Let’s move now to a slightly more complicate design. How to draw flames – slightly more complex With this design we are going to learn how to add a small side flame to the main flame. The first thing you want to do is to draw a larger base for the flame. it really looks like a drop upside-down, doesn’t it? This is slightly more complex than the previous flame but really not that much. Be careful to draw sinuous lines and to create an uninterrupted flow between the tips of the flame. Once you have drawn the main outline of the flame and you are happy with it, you need to draw the intermediate and small shapes inside. These, again, represent the different levels of heat within the flames. The smaller shapes are easy to draw in fact they follow loosely the shape of the next bigger one. So the orange shape follows loosely the red shape, the main shape, while the yellow shape follows loosely the orange shape. Once the three shapes are drawn just fill them with the appropriate colors (with a technique of your choice) to get the final result. Nice isn’t it? Now let’s move on to the next step which will be a somewhat more complicated shape than the previous. However the complication comes from the increased number of flame tongues and not due to some technical or artistic problem. The basic rules are the same as for the previous flames but this time we’ll draw more tongues and the final flame will look more complex. How to draw flames – definitely more complex In this last section of the tutorial we are going to draw a complex flame using the basic principles learned so far to draw effective flames: use three basic colors, yellow, orange and red to create the illusion of the hotter center of the flame and colder outside; draw asymmetric shapes, as flames tend to have low or no symmetry; keep the curves flowing from one tongue to the following trying to avoid straight lines that would interrupt the flow of the shape. This is a larger flame so start from the bottom and draw a larger base then move upward and draw the flame tongues. Obviously they do not have to be identical to mine. As for the previous drawings once you have established the main shape or contour of the flame you can draw the smaller shapes inside the flame. You do not have to replicate the larger shapes with the small one but only loosely follow them. The drawing up here exemplify the process clearly. Again take your time to draw nice shapes and the last step, coloring, will be easy to do and your flame will look good straight away. How to draw flames – burning fire If you have taken your time to draw the shapes that form your flame nicely the final result is guaranteed. So to wrap up this first tutorial on how to draw flames remember the following: 1. start from the base of the flame and draw upward from there 2. use three colors, red, orange and yellow to simulate three different levels of heat within the flame 3. keep the curves, that form the outer shape of the flame, flowing without braking or straight lines to give your flame a realistic look 4. enjoy drawing flames! I hope this tutorial has helped you learn how to draw flames. I will soon post another tutorial to give you an head start on how to draw even more complex and big flames! If you liked the tutorial we ask you to spread the world about our site. Tell your friends about it, leave a comment underneath and tell us if you want more! We would love to hear from you.
<urn:uuid:5a600731-506b-4680-ad46-bab602178918>
CC-MAIN-2017-43
http://www.drawing-factory.com/how-to-draw-flames/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822513.17/warc/CC-MAIN-20171017215800-20171017235800-00170.warc.gz
en
0.94012
1,418
3.53125
4
The most basic fact about cell phones and cell towers is that they emit microwave radiation; so do Wi-Fi (wireless Internet) antennas, wireless computers, cordless (portable) phones and their base units, and all other wireless devices. If it’s a communication device and it’s not attached to the wall by a wire, it’s emitting radiation. Most Wi-Fi systems and some cordless phones operate at the exact same frequency as a microwave oven, while other devices use a different frequency. Wi-Fi is always on and always radiating. The base units of most cordless phones are always radiating, even when no one is using the phone. A cell phone that is on but not in use is also radiating. And, needless to say, cell towers are always radiating. Why is this a problem, you might ask? Scientists usually divide the electromagnetic spectrum into “ionizing” and “non-ionizing.” Ionizing radiation, which includes x-rays and atomic radiation, causes cancer. Non-ionizing radiation, which includes microwave radiation, is supposed to be safe. This distinction always reminded me of the propaganda in George Orwell’s Animal Farm: “Four legs good, two legs bad.” “Non-ionizing good, ionizing bad” is as little to be trusted. An astronomer once quipped that if Neil Armstrong had taken a cell phone to the Moon in 1969, it would have appeared to be the third most powerful source of microwave radiation in the universe, next only to the Sun and the Milky Way. He was right. Life evolved with negligible levels of microwave radiation. ** An increasing number of scientists speculate that our body’s own cells, in fact, use the microwave spectrum to communicate with one another, like children whispering in the dark, and that cell phones, like jackhammers, interfere with their signaling. ** In any case, it is a fact that we are all being bombarded, day in and day out, whether we use a cell phone or not, by an amount of microwave radiation that is some ten million times as strong as the average natural background. And it is also a fact that most of this radiation is due to technology that has been developed since the 1970s. As far as cell phones themselves are concerned, if you put one up to your head you are damaging your brain in a number of different ways. First, think of a microwave oven. A cell phone, like a microwave oven and unlike a hot shower, heats you from the inside out, not from the outside in. And there are no sensory nerve endings in the brain to warn you of a rise in temperature because we did not evolve with microwave radiation, and this never happens in nature. Worse, the structure of the head and brain is so complex and non-uniform that “hot spots” are produced, where heating can be tens or hundreds of times what it is nearby. Hot spots can occur both close to the surface of the skull and deep within the brain, and also on a molecular level. Cell phones are regulated by the Federal Communications Commission, and you can find, in the packaging of most new phones, a number called the Specific Absorption Rate, or SAR, which is supposed to indicate the rate at which energy is absorbed by the brain from that particular model. One problem, however, is the arbitrary assumption, upon which the FCC’s regulations are based, that the brain can safely dissipate added heat at a rate of up to 1 degree C per hour. Compounding this is the scandalous procedure used to demonstrate compliance with these limits and give each cell phone its SAR rating. The standard way to measure SAR is on a “phantom” consisting, incredibly, of a homogenous fluid encased in Plexiglas in the shape of a head. Presto, no hot spots! But in reality, people who use cell phones for hours per day are chronically heating places in their brain. The FCC’s safety standard, by the way, was developed by electrical engineers, not doctors. If you want to be learn more please click the following link.
<urn:uuid:c1698b96-cb2e-4b49-8d4d-89c6f4fe95a8>
CC-MAIN-2018-43
https://drsundardas.wordpress.com/2014/01/
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511761.78/warc/CC-MAIN-20181018084742-20181018110242-00482.warc.gz
en
0.958704
868
3.140625
3
The Unclouded Time by E. Annie Proulx A) Language Words/Terms: 1) Grouse: a medium to large game bird having a plump physique and feathered legs, the male being greater and more conspicuously colored compared to the female. 2) Briar: a Mediterranean shrub or little tree. 3) Cleave: to adhere closely; keep. 4) World: a reddish colored, swollen indicate left in flesh by a blow or pressure. 5) Imminent: likely to occur at any moment; impending. 6) Putrefy: (of a body or other organic matter) decay or decay and produce a fetid smell. 7) Rime: frost formed on frosty objects by the rapid very cold of water vapor in cloud or fog. 8) Parabola: a symmetrical open plane curve formed by intersection of any cone having a plane parallel to the side. 9) Inelegant: not elegant; with a lack of refinement, gracefulness, or good taste. 10) Confection: a sweet planning of fruits or the just like, as a maintain or candy. 11) Wastrel: a wasteful or good-for-nothing person. 12) Veneer: a thin layer of wooden or additional material intended for facing or inlaying wooden. 13) Briciola: a sparkly silicate vitamin with a split structure, found as day scales in granite and other rocks, or as crystals. 14) Mettle: a person's capacity to cope very well with problems or to encounter a challenging situation in a spirited and resilient method. 15) Sorrel: a European grow of the ipod dock family, with arrow-shaped leaves that are used in salads and cooking because of their acidic flavour. 16) Contortion: the work of turning or deforming the shape of something. 17) Tamarack: a north american larch, Larix laricina, from the pine family, having a reddish-brown bark and crowded clusters of blue-green needles and yielding a helpful timber. 18) Instinctive: caused by or perhaps resulting from or as if by instinct; natural; unlearned. 19) Portico: a structure consisting of a roof maintained columns or perhaps piers, usually attached to a building being a porch. 20) Mammoth: a large extinct elefant of the Pleistocene epoch, commonly hairy using a sloping back and long rounded tusks. 21) Carcass: the dead body of your animal. 22) Sodden: condensed with liquefied or dampness; saturated. 23) Tendril: a threadlike, leafless organ of climbing vegetation, often growing in spiral form, which connects itself to or twines round another body, so as to support the plant. 24) Foremost: first in place, order, get ranking, etc . 25) Catatonic: appearing to be in a daze or perhaps stupor; unresponsive. 26) Clod: a group or mass, especially of earth or perhaps clay. 27) Oblige: to require or constrain, while by law, control, conscience, or force of necessity. 28) Sultry: oppressively hot and close or perhaps moist; extreme 29) Veldt: the wide open country, bearing grass, shrubbery, or bushes, or very finely forested, attribute of elements of southern Africa. 30) Ocher: the color on this, ranging from light yellow to a orangish or perhaps reddish yellowish. 31) Pith: soft or spongy tissues in plants or animals, in particular. 32) Riven: divide or tear apart violently. 33) Redolent: using a pleasant scent; fragrant. B) Extended Response Questions: 1 ) Based on the author's make use of diction and syntax Santee is portrayed as a character with " traditional” beliefs. Money and materialistic things are unimportant to Santee. Once Santee noticed Earl's weapon, he " thought this overrated and overpriced, but it was a better instrument than his own field-grade Jorken with the broken stock he'd meant to substitute for years. ” (Proulx, 90) Santee is probably not as rich as Earl but this individual doesn't feel good about currently taking money from him. " Earl was spending Santee 300 dollars per week and this individual hadn't taken a single bird.... Santee, feeling more and more such as a cheating outdated whore every time they went out. ” (Proulx, 92) Santee's gun is also proof of materialistic things not mattering to Santee. " Santee's gun, like their owner, was inelegant and long inside the tooth, however it worked well. ” (Proulx, 90) Santee is a man whom keeps his word and doesn't return back on it. " Santee went because he experienced taken Earl's money. Before the fool taken a bird on his own or perhaps gave up, Santee was...
<urn:uuid:caa36437-23cd-4ef8-a538-a25b0257ffb2>
CC-MAIN-2019-51
https://lincolncharterschoolpa.com/the-unclouded-day-by-annie/39408-the-unclouded-day-by-annie.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540532624.3/warc/CC-MAIN-20191211184309-20191211212309-00014.warc.gz
en
0.941855
1,081
2.90625
3
Animal Resource Center offers a refuge for abused, abandoned, and neglected animals. Founded in 1992, Animal Resource Center is a true safety-net for potbelly and farm pigs. Animals who arrive at the Animal Resource Center often have complicated medical or emotional needs, a history of abuse, neglect, or ailments related to factory farming or genetic engineering, and are often considered “un-adoptable.” However, the Animal Resource Center seeks to find forever loving homes for some of our animals. We need your help to continue providing this life-saving refuge for animals who need us for survival. Men born in the Year of the Pig are optimistic and gentle. They are very focused, and once they decide on a goal, they’ll put everything into it. Women born in the Year of the Pig are full of excitement. They attend social events whenever possible and treat everyone genuinely. Combined with their easygoing personality, they gain everyone’s trust. It’s the Year of the Pig! A few fun facts about the pig: - Pigs are one of the smartest animals. Their intelligence ranks higher than dogs and even some primates - Pigs are very social and they form close bonds with each other and other species - In their natural state, pigs are very clean animals, as they keep their toilets far from their living or feeding areas - Pigs have very long memories and can remember things even years later! - Pigs use their grunts to communicate and the sound depends on their own personality - Pig grunts convey very important information and at times these sounds can be lifesaving - The pig snout has the highest density of tactile receptors - A pig’s sense of smell is 2000 times more sensitive than a human’s - Pigs like to get massages by rubbing on trees, other animals, or maybe a building, etc. - Pigs love to relax to music and are very curious - Pigs love enrichment toys and like being challenged
<urn:uuid:1e666bc8-8db8-4397-863a-cd3d23f66468>
CC-MAIN-2021-04
https://pigs.org/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519923.26/warc/CC-MAIN-20210120054203-20210120084203-00516.warc.gz
en
0.959147
414
3.34375
3
San Antonio, Tx How to eat Required- Read the book (25 points) Section I – Choose at least 3 of these assignments below for a maximum of 45 points - Pick a character of the book and make up the history of this character. Exp: What is his birthday? Do they have any siblings? What is their favorite sport? Anything that can make this character alive to you and your classmates. (15 points) - Watch the movie and create a van diagram comparing the book to the movie. (15 points) - Choose 15 words from the book that you do not know and create flash cards with the words definition on the front and a sentence using the word on the back. (Remember not to start the sentence with the word I) (15 Points) - Write a paragraph telling the class what you think a true friend is. Do the characters in the book match your definition of a true friend? (15 Points) - Create a new cover for the book. Make sure that the reader will be able to have some idea of what the book is about. (15 Points) - With 15 vocabulary words create a crossword puzzle. Use the definitions as the clues for the words or an example sentence from the book. (15 Points) - Re-act your favorite part of the book with a few of your classmates. All will get credit for their participation. (15 Points) Section II - Choose 1 from the list below. Worth - Pick out your favorite character and make a time line of moments when they were a true friend. - Looking at your van diagram from Section I, which part of the book that was left out should have been in the movie. What difference to the story would it have made? - Create your own cookbook of receipts for worms. Make sure there is a cover page and pictures of the finished plate. You can look at other cookbooks for ideas and change the meat product for worms. Section III - Choose 1 from the list below. Worth - Create your own character for the book. Describe them and explain which side of the challenge they would be on. - Do you think that challenges like this are given in friendship group in real life? Would you be a part of one if there was? Give examples of some challenges given that you have seen or heard and tell if you understand the reasons for them or not. Pick a side of the challenge and state your case for or against it. Must be at least
<urn:uuid:101d65aa-7b6d-4541-896a-0b9083a04c1d>
CC-MAIN-2023-40
https://help4teachers.com/MistyHowtoeatfriedworms.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506632.31/warc/CC-MAIN-20230924091344-20230924121344-00276.warc.gz
en
0.929309
565
3.515625
4
Have you ever been amazed that you can hear someone’s conversation or music on the shore of Bearcamp Pond when you are on the water or vice versa? Many people are unaware of the exceptional acoustics of water. In other environments sound is absorbed by grass, rocks, walls, trees, cars, buildings, etc. and everything else that it bumps. The pond’s water surface, however, reflects and amplifies sound. The smoother the lake, the clearer and farther sound travels; even more so in the morning and evening/at night. This can cause some problems; what some consider normal sounds may be noise pollution to everyone else who can hear them. But there are easy ways to prevent this problem. Educate family, kids, guests, and rentors that conversation which takes place on or near water can likely be heard over a long distance; shouting, screaming, loud vocalizations even more so. We all stir up noise now and again, but if we try to minimize it, it benefits good neighbor relations and the pond’s beautiful environment. Put some sound rules in place and remind folks frequently: Tell kids to hold down the screaming and shouting; especially while swimming, because someone actually calling for help may not be heard. In the summer months, try to avoid any use of chain saws, lawn mowers, or similar power tools early in the morning or late in the day. , Don’t shoot fireworks on or near the pond shoreline Target shooting during the summer is best done at the local gun club. Target shooting near water is a very dangerous proposition. You have no idea how far a bullet will go or where it will end up! Keep pets quiet. Our dogs are encouraged to alert us when they sense someone entering our vicinity. But continual barking is disruptive, especially at night. Turn down the volume when playing music outdoors or inside with the windows open. Everyone on the pond needs to pitch in with common courtesy and a handful of tolerance regarding sound and acoustics on the pond. The main reason people come to the pond is to enjoy the peace and quiet and, primarily, the sounds of nature. All of us making an effort to control noise, is an important way to preserve and protect the beauty of Bearcamp and its vicinity.
<urn:uuid:f7fc4636-6d84-4ea8-8fa6-852376bd45da>
CC-MAIN-2017-30
https://www.bearcamppond.org/lake-acoustics
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549448095.6/warc/CC-MAIN-20170728062501-20170728082501-00506.warc.gz
en
0.937589
471
2.75
3
- How do you ask the price of your product? - Can the price be negotiable? - What are the 5 stages of negotiation? - What are 5 rules of negotiation? - What is a good sentence for bargain? - What is another word for bargain? - What are the 7 basic rules of negotiating? - How do you negotiate politely? - How do you politely ask for a lower price? - How do you negotiate with a difficult person? - What are some negotiation strategies? - How do you ask for a bargain? - How do you bargain in English? - What is an example of bargaining? - How do you argue with an unreasonable person? - What are the best negotiation techniques? - What does it mean to bargain with someone? - How do you negotiate with someone more powerful than you? How do you ask the price of your product? “How much does this cost?” “How much is this?” “What does this cost?” Replace ‘this’ with ‘it’ if you’re already talking about the item. You could throw in ‘exactly’ if you wanted ex. “How much does this cost exactly?” or “What exactly does this cost?” (‘exactly’ can go in more than one place).. Can the price be negotiable? If you’re told that a price is negotiable, that means you can talk it over until you reach an agreement. So don’t start with your highest offer. Negotiable can also mean that a road or path can be used. … If you can pass on a possession to someone else, making them the owner, then it’s said to be negotiable. What are the 5 stages of negotiation? Negotiation Stages IntroductionThere are five collaborative stages of the negotiation process: Prepare, Information Exchange, Bargain, Conclude, Execute.There is no shortcut to negotiation preparation.Building trust in negotiations is key.Communication skills are critical during bargaining. What are 5 rules of negotiation? 1) SHUT UP and Listen :2) Be willing to Walk Away.3) Shift the Focus Light.4) Do Not take it Personally.5) Do Your Homework. What is a good sentence for bargain? Bargain sentence examples. Neither was willing to bargain with me for your life. Our bargain is over. You drive a hard bargain, but I agree. What is another word for bargain? In this page you can discover 61 synonyms, antonyms, idiomatic expressions, and related words for bargain, like: pact, contract, make terms, arrangement, covenant, accord, compact, dicker, haggle, secure and stipulate. What are the 7 basic rules of negotiating? Terms in this set (7)Rule #1. Always tell the truth.Rule #2. Use Cash when making purchases.Rule #3. Use walk-away power. Don’t get emotionally attached to the item.Rule #4. Shut up. … Rule #5. Use the phrase: “That isn’t good enough”Rule #6. Go to the authority. … Rule #7. Use the “If I were to” technique. ” How do you negotiate politely? Simply ask what the other side wants. Ask why they want it….Do:Frame the negotiations as a problem-solving challenge.Take the time to make small talk. It’ll build connections you can leverage later on.Stress the areas on which you agree, and use words like “we” to signal you are invested in the relationship. How do you politely ask for a lower price? 5 Tips On How To Negotiate Fair Prices Without Offending The SellerBe Reasonable When Negotiating. … If You Don’t Have the Money, Don’t Offer It. … Ask For a Lower Price. … Be Friendly. … Don’t Be Afraid to Move On. How do you negotiate with a difficult person? How to Negotiate With Difficult and Aggressive PeopleMeet in Private if Possible. When it’s safe and possible to do so, negotiate with difficult people in private where they may be more flexible. … Neutralize Their Home Court Advantage. … Be Assertive and Professional in Communication. … Bring Solutions. … Focus on Consequence. What are some negotiation strategies? Six Successful Strategies for NegotiationThe negotiating process is continual, not an individual event. … Think positive. … Prepare. … Think about the best & worst outcome before the negotiations begin. … Be articulate & build value. … Give & Take. How do you ask for a bargain? 13 ways to get to yesAssume everything is fair game. … Don’t be intimidated by a title. … Be willing to bargain for big bucks. … Give sellers a reason to negotiate. … Ask open-ended questions. … See whether the seller is anxious. … Decide on a fair price. … Be willing to walk away.More items… How do you bargain in English? Vocabulary to Help you negotiate Price in Englishfixed budget – a maximum amount you can afford to pay.tight budget – very little flexibility in what you can afford to pay.particular budget – meets your estimate of what you are willing to pay.to shop around – to look at many places.discount – reduced price.More items… What is an example of bargaining? To bargain means to discuss the details in a business transaction regarding selling, buying, or exchanging. To barter with another farmer to exchange a certain number of eggs for a certain amount of beef is an example of bargain. How do you argue with an unreasonable person? 20 Expert Tactics for Dealing with Difficult PeopleListen. Listening is the number one step in dealing with “unreasonable” people. … Stay calm. … Don’t judge. … Reflect respect and dignity toward the other person. … Look for the hidden need. … Look for others around you who might be able to help. … Don’t demand compliance. … Saying, “I understand,” usually makes things worse.More items…• What are the best negotiation techniques? 5 Good Negotiation TechniquesReframe anxiety as excitement. … Anchor the discussion with a draft agreement. … Draw on the power of silence. … Ask for advice. … Put a fair offer to the test with final-offer arbitration. What does it mean to bargain with someone? bargain with (one) To negotiate or confer with someone to reach an agreement that ultimately yields possession or custody of something. How do you negotiate with someone more powerful than you? 6 Tips for Negotiating with Someone More Powerful Than YouStay calm. Feeling nervous is a natural reaction to intimidation. … Prepare excessively. Preparation should be your mantra. … Be an optimist. One of the worst things you can do is negotiate against yourself. … Focus on the other side’s needs. … Listen. … You can always walk away.
<urn:uuid:19e149ea-0e78-4eb9-bd62-6c42a52619b2>
CC-MAIN-2021-10
https://viagrasildenafilpharma.com/qa/how-do-you-bargain-with-someone.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178359624.36/warc/CC-MAIN-20210227234501-20210228024501-00631.warc.gz
en
0.900902
1,524
2.578125
3
AN estimated 14 million root canal treatments are completed in the UK every year and, thanks to advances in new technologies and techniques, treatment success rates can be 85 to 90 per cent or better. The branch of dentistry concerned with the biology and pathology of the dental pulp and periapical tissues is endodontics. It also involves the prevention, diagnosis, and treatment of diseases and injuries in these tissues. In the broadest sense, all procedures that maintain the health and the vitality of pulpal tissues can be considered as relevant to endodontology. Once the pulp becomes diseased, practitioners in this field perform a variety of procedures, most commonly endodontic therapy or root canal treatment. They also provide endodontic retreatment, surgery, and treatment of cracked teeth or dental trauma. Patients often present as emergencies seeking relief from pain. The General Dental Council maintains a specialist list for endodontics and only registered dentists accepted onto this list can use the title “specialist” endodontist. Entry and training For those intending to undertake endodontic training leading to specialist status, the GDC’s minimum entry requirement is two years of postgraduate foundation training (or equivalent) which may include a period of vocational training (VT) and may also include a period of training in secondary care in an appropriate specialist environment. It is useful (but not essential) for budding specialty trainees to hold membership of one of the Royal Colleges including MJDF (Membership of Joint Dental Faculties RCS England), MFDS (Membership of the Faculty of Dental Surgery RCSEd and RCPS Glasg) or MFD (Membership of the faculty of Dentistry RCSI). The usual training period for endodontics will be three years (4,500 hours) full time but part-time training is also possible. The programme content is flexible but tends to be roughly 60 per cent clinical, 25 per cent academic and 15 per cent research. Training may be flexibly delivered through a variety of methods including a structured, taught masters/doctorate degree programme or through a work-place based programme (specialty practice or hospital based training). Whichever route is followed, trainees will have to demonstrate certain minimum outcomes in the range and competence in requisite skills. Development of competence will usually take a systematic path progressively building on core skills. This means the learning process has to be carefully tracked and effective guidance provided at each stage. Specialist training will take place in programmes approved by the relevant postgraduate deanery and under the supervision of a designated lead trainer (educational supervisor). Appraisals will be held every six months, to include self-reflection on progress as well as trainer assessment leading to a personal development plan. After successfully working through this programme, a certificate of completion of specialty training (CCST) is awarded by the GDC on the recommendation of the deanery in which the training took place. More information on training pathways is available on the British Endodontic Society website. Endodontic specialists can choose to practise in a variety of settings, including private referral clinics, within general dental practices (offering NHS or private treatment), in a hospital setting or in an academic/research post. Those looking to set up a practice offering endodontic treatment will require a referral base and the necessary training and will benefit from much experience gained during postgraduate training. Referral endodontic practice works side-by-side within general dentistry, however it is often necessary when patients are being treated for complex restorative work. The specialty relies on a number of key pieces of equipment including an endodontic microscope, a torque controlled motor for engine driven rotary nickel titanium instrumentation, digital X-ray equipment, an electronic apex locator and obturation devices and systems. These can involve a considerable financial outlay but are advantageous to ensure efficient endodontic treatment – it is well worth seeking advice before making any big decisions. It must be said that a good trustworthy assistant is perhaps the most valuable element of a successful practice, more so than any of these devices and pieces of equipment. Membership of professional organisations such as the British Endodontic Society offer a chance to maintain your professional skills and keep up-to-date with the latest developments in the specialty, as well as to share ideas and expertise with fellow dentists and specialists. • British Endodontic Society - www.britishendodonticsociety.org.uk • GDC specialist lists and curricula - tinyurl.com/lp7s728 Q&A - Mark J Hunter, specialist endodontist, teacher and secretary of the British Endodontic Society What attracted you to a career in endodontics? I was encouraged by a teacher who was aware that I had an aptitude for doing endo. I discovered an area of dentistry that was challenging, intriguing and captivating. To save teeth that would otherwise require extraction is matched only by the privilege we have as dentists to relieve a patient of one of the worst pains that can be suffered. What do you enjoy most about the specialty? I enjoy treating the person who owns the tooth. It is not just about doing a challenging and intricate procedure, it is about taking an often frightened patient and delivering them through the process with a positive experience. Winning the trust of another is where the greatest return is to be had. What do you find most challenging? Gaining sufficient experience to be confidently effective is one of the early challenges we all face. Once this has been achieved, the biggest continual challenge is to gain and maintain the patient’s trust. If a patient is struggling to let you get on, it can prevent you from performing at your best. This is why endodontics is very much a team effort with you, the patient and your assistant. I can’t over-emphasise the value of a good assistant. Sure, there are technical challenges such as sclerosed canals, 90 degree curvatures with a small arc of radius, previous misadventures, fractured instruments, ledges and blockages. These can be overcome, but not if the patient is unwilling to let you get on with it. Have you been surprised by any aspect of the job? I have learned that complacency can teach one a harsh lesson. Positive outcomes cannot be assumed and you should always expect the unexpected. When you see a lateral canal filled very nicely, ask yourself how much skill really went into filling this and how much was down to good luck? Doing endo can be a humbling experience. When things don’t go according to plan, don’t try to cover up, always keep the patient informed, be open, honest and realistic. What personal attributes do you feel are important in endodontics? The most important attribute for achieving good outcomes is patience, both with the patient and yourself. If you are performing urgently or under pressure, then this tends to give a poorer outcome. A better outcome can often be had by returning to a case at a later date rather than trying to complete it in a hurry. Missing or difficult to negotiate canals one day can seem much easier to manage when one is refreshed at a subsequent visit. The other great attribute for doing good endo is empathy. Letting patients know they can stop treatment if the need arises helps them to feel more relaxed and in control. What advice would you give to a student or trainee considering the specialty? Total commitment is required for endo as it can be tough. Don’t specialise too soon – I feel I’m a better endodontist because I have a facility and ability in other areas of dentistry. (It relates back to the idea that we treat the person who owns the tooth, not just the tooth.) A good endodontist will have a range of early dental experience such as extracting teeth, making dentures, recognising and treating soft tissue disorders as well as treating difficult uncooperative children to name but a few. You also have to be good at giving local anaesthetic, as well as restoring the tooth for the referring practitioner with a core or perhaps a post-retained core foundation. It helps to be a good diagnostician which means being able to listen and, when things don’t make sense, to stand back and admit that we don’t quite know what is going on. Endo is a wonderful, challenging area of medical expertise and intrigue, with ongoing scientific advances on many fronts, and countless gadgets and gizmos to help you on your way. This page was correct at the time of publication. Any guidance is intended as general guidance for members only. If you are a member and need specific advice relating to your own circumstances, please contact one of our advisers.
<urn:uuid:65f5e204-35e5-4d18-97f4-8eadaa731ee6>
CC-MAIN-2023-40
https://www.mddus.com/resources/publications/publications-library/soundbite/soundbite-issue-09/careers-the-root-of-the-problem
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00408.warc.gz
en
0.956933
1,849
2.671875
3
Roistering: 1. To engage in boisterous merrymaking,or to revel noisly.2. To behave in a blusting or swaggering manner. Printed dictionaries and other books with definitions for Roistering Click on a title to look inside that book (if available): Encyclopedia Of Freemasonry (Extended Annotated Edition) (2013) by Albert G. Mackey and these crowds began tohoot and throwstones andtorun through processions, andto break themup; and there grew upthe customof holding "mock" processions,roistering, ribald,derisive, coarse, in order toridicule somethingor somebody. The Gentlemlen's Lexicon; Or, A Pocket Dictionary, Containing Nearly Every Work in the English Language (1835) Being Also Particularly Adapted to the Use of Academies and Schools by William Grimshaw roisting, roistering ; past, roisted, roistered 8. roister. ROLL. v. To move by volutation: to move round on its axis; to wrap round upon itself ; to involve in bandage ; to run on wheels, ... The Ladies' Lexicon and Parlour Companion (1870) Containing Nearly Every Word in the English Language and Exhibiting the Plurals of Nouns and the Participles of Verbs ... Adapted to the Use of ... Schools by William Grimshaw roisting, roistering; past, roisted, roistered: s. roister. ROLL. v. To move by volutation ... Encyclopedia of the Musical Theatre (2009) by Stanley Green Music by Herman Darewski; lyric by Arthur Wimperis, Roistering march added to score of The Shop Girl for its revised version (L 1920), in which it was performed by Evelyn Laye, dressed as a drum majorette, leading a 60-piece marching band ... Encyclopedia of Iowa (1995) Online dictionaries and encyclopedias with entries for Roistering Click on a label to prioritize search results according to that topic: Scrabble value of R1O1I1S1T1E1R1I1N1G2 The value of this 10-letter word is 11 points. It is included in the first and second editions of the Official Scrabble Players Dictionary. Share this page Go to the wordplay of Roistering for some fun with words!
<urn:uuid:97db66da-7e45-4f49-82bc-0603407bc750>
CC-MAIN-2014-23
http://www.omnilexica.com/?q=roistering
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894865.50/warc/CC-MAIN-20140722025814-00036-ip-10-33-131-23.ec2.internal.warc.gz
en
0.850535
530
2.75
3
A great way to learn sight words from Fry's List. Each student takes a card from the stack and reads the word. If the word is read correctly, the student keeps the card. If read incorrectly, the card is placed at the bottom of the card stack. A Sunshine card will give the student another turn. If the student gets a Raining Cats and Dogs card, a turn is lost. The student with the most cards at the end wins! (23 pages)
<urn:uuid:ff2d4644-bdcf-4c3f-951f-154233eb0b3f>
CC-MAIN-2018-30
https://www.teacherspayteachers.com/Product/Raining-Cats-and-Dogs-Literacy-Activities-374086
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676588961.14/warc/CC-MAIN-20180715183800-20180715203800-00302.warc.gz
en
0.918696
97
3.109375
3
The state should ensure that new elementary teachers know the science of reading instruction. In its coursework requirements for all teacher candidates, Ohio requires teacher preparation programs to address the science of reading. The state requires all teachers to take at least three credit hours of coursework in reading instruction. To obtain licensure in early or middle childhood or special education, teacher candidates must complete 12 credit hours in the teaching of reading, which must include a distinct three-credit-hour course in the teaching of phonics. Programs must provide training in phonemic awareness, phonics, vocabulary and comprehension. However, Ohio does not require teacher candidates to pass a reading assessment prior to certification or at any point thereafter to verify that they have been effectively trained in the science of reading instruction. Require teacher candidates to pass a rigorous assessment in the science of reading instruction. Although Ohio is commended for requiring teacher preparation programs to address the science of reading, the state should also require a rigorous reading assessment tool to ensure that its elementary teacher candidates are adequately prepared in the science of reading instruction before entering the classroom. The assessment should clearly test knowledge and skills related to the science of reading, and if it is combined with an assessment that also tests general pedagogy or elementary content, it should report a subscore for the science of reading specifically. Elementary teachers who do not possess the minimum knowledge in this area should not be eligible for licensure. Ohio recognized the factual accuracy of this analysis.
<urn:uuid:062041ee-c5b5-4bf4-8c90-f729ce8a2f57>
CC-MAIN-2024-10
https://www.nctq.org/yearbook/state/OH-Elementary-Teacher-Preparation-in-Reading-Instruction--6
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473360.9/warc/CC-MAIN-20240221002544-20240221032544-00768.warc.gz
en
0.948043
297
2.703125
3
A new study published in the Journal of Hydrometeorology has revealed that the Northern Hemisphere has seen a significant decline in snow cover in the last 50 years, with snow presence in the Arctic and southern latitudes of the Northern hemisphere usually decreasing. Researchers used weekly satellite flyovers between 1967 and 2021 to evaluate snow cover patterns, dividing it into grid sections for analysis. The study found that snow cover is dropping in nearly twice as many grids as it is progressing, and hundreds of grids showed at least 97.5% assurance that snow cover was declining. The high albedo and insulating properties of snow play a significant role in the global energy balance, influencing regional surface temperatures and continental thermal stability. The study’s sophisticated mathematical models and statistical methodologies are believed to be the first fully reliable estimate of snow cover patterns in the Northern Hemisphere due to the precision of the researchers’ statistical methodology. However, the study also found that some satellite data collected in mountainous places were unreliable, indicating no snow in the winter and several weeks of snow in the winter. This research can serve as a resource to the scientific community for further analysis of snow cover data.
<urn:uuid:31c33e1b-7a78-444a-b806-cf1ce4f4ee68>
CC-MAIN-2023-50
https://www.theworldmonitor.com/snow-cover-in-northern-hemisphere-declines-due-to-climate-change/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100550.40/warc/CC-MAIN-20231205073336-20231205103336-00278.warc.gz
en
0.944567
238
3.515625
4
Palenque – Misty and Mystic in the Jungle of Chiapas High temperatures and humidity will accompany you when you go for a visit to the ancient Maya town Palenque. The ruins of this town were covered by jungle for more than 1000 years. When the archaeologist Stephens visited Palenque in 1841 he had to cut a path through the jungle. Today it’s quite simple to get there. The city of Palenque has a small, modern Airport, but a trip with an air-conditioned overnight-bus from Cancun or Mexico City is possible as well. (See >>> “Getting Around..”) Palenque is located in the lowlands of Chiapas, not far from the river Rio Usumacinta and close to the border to Guatemala. It was built in a landscape full of hills. Sometimes the natural structure of a hill is used in the construction of a temple. Very impressive is the surrounding sub-tropical rain forest. It’s possible to watch and hear howling monkeys. Sometimes clouds of fog rise from the forest between, adding a mystic character to the scenery with the ancient temples. The site of Palenque was inhabited for at least 400 years from 400 AC to 800 AC. But there were found inscriptions that date back to 900 BC. Having in mind, that 6% of the ruins have been examined so far, it might be that more surprising facts will be revealed in the future. Like all other Mayan centers of the classic period, Palenque was abandoned around 800 AC. It’s still an unanswered question, why the Mayas have left their cities at this time. The most famous structures in Palenque are the Temple of Inscriptions and the Palace. The Palace is located in the middle of the area. A small observation tower shows up on one side. Many reliefs can be seen there. The Temple of Inscriptions covers the grave of Pakal the Great, whose real Name was K’inich Janaab Pakal I. Pakal ruled the City from 615 – 683, for nearly 70 years. Other buildings of the site are the Temple of the Sun, the Temple of the Cross and the Temple of the Foliated Cross. In the southern area, more big structures can be found. Very beautiful is a small creek with several cascades. At the exit of the site, one can visit the site museum, that was build in 1960. Get it at Amazon!
<urn:uuid:01034151-618b-4606-9067-8daa696569a0>
CC-MAIN-2020-34
https://amazingtemples.com/en/mexico-en/chiapas-en/palenque-chiapas-mexico/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735851.15/warc/CC-MAIN-20200804014340-20200804044340-00599.warc.gz
en
0.958143
522
2.671875
3
UN reclassifies cannabis as a less dangerous drug A United Nations commission voted on Wednesday to remove cannabis for medicinal purposes from a category of the world’s most dangerous drugs, a highly anticipated and long-delayed decision that could clear the way for an expansion of marijuana research and medical use. The vote by the Commission for Narcotic Drugs, which is based in Vienna and includes 53 member states, considered a series of recommendations from the World Health Organization on reclassifying cannabis and its derivatives. But attention centered on a key recommendation to remove cannabis from Schedule IV of the 1961 Single Convention on Narcotic Drugs — where it was listed alongside dangerous and highly addictive opioids like heroin. Experts say that the vote will have no immediate impact on loosening international controls because governments will still have jurisdiction over how to classify cannabis. But many countries look to global conventions for guidance, and United Nations recognition is a symbolic win for advocates of drug policy change who say that international law is out of date. “This is a huge, historic victory for us, we couldn’t hope for more,” said Kenzi Riboulet-Zemouli, an independent researcher for drug policy who has closely monitored the vote and the position of member states. He said that cannabis had been used throughout history for medicinal purposes and that the decision on Wednesday reinstated that status. The change will most likely bolster medical research and legalization efforts around the world. The vote was a “big step forward,” recognizing the positive impact of cannabis on patients, said Dirk Heitepriem, a vice president at Canopy Growth, a Canadian cannabis company. “We hope this will empower more countries to create frameworks which allow patients in need to get access to treatment.” Marijuana for medical use has exploded in recent years and products containing cannabis derivatives like cannabidiol or CBD, a nonintoxicating compound, have flooded the wellness industry. Cowen, an investment and financial services company, estimates that the CBD industry in the United States will be worth $16 billion by 2025. Some research has suggested that CBD can protect the nervous system and provide relief from seizures, pain, anxiety and inflammation. The list of CBD-infused products — including creams, serums, soda water and juice — is also expanding rapidly. The recommendations for changing the classification of marijuana were first made by the World Health Organization in 2019. But they were politically divisive, which led to unusual delays in the United Nations commission’s vote. The reclassification passed 27 to 25, with an abstention from Ukraine. The United States and European nations were among those who voted in favor, while the likes of China, Egypt, Nigeria, Pakistan and Russia were opposed. China’s delegate said that, despite the United Nations move, the country would strictly control cannabis “to protect from the harm and abuse.” Britain’s delegate said that the reclassification was “in line with the scientific evidence of its therapeutic benefits” but that the country still strongly supported international controls for cannabis, adding that marijuana presented “serious public health risks.” The differing messages underline the complexities behind the decision. “It’s been a diplomatic circus,” said Mr. Riboulet-Zemouli, who added that some countries initially opposed to the change, like France, had since switched their position. Michael Krawitz, executive director for Veterans for Medical Cannabis Access, an advocacy group in the United States, said the change in international law would “help reduce the suffering millions of people” and could help mitigate reliance on opiates, noting that cannabis was an important medication that could provide unique pain relief. Also on Wednesday, the commission rejected a proposal to include the cannabis derivative THC in the 1961 convention, which would have tightened some controls. The overhaul of cannabis policy, particularly around legalization for medical use, has moved at a rapid pace over the last few years, said Jessica Steinberg, managing director at the Global C, an international cannabis consulting group. Industry insiders have expressed hope that the vote will open the field for more research into the therapeutic benefits of the drug. But the impact on the American and European markets was driving the issue, Ms. Steinberg noted. In the United States, where more states legalized the use of medical and recreational marijuana in the recent election, the market for both of those is expected to expand to more than $34 billion by 2025, according to Cowen. Before the vote this week and other decriminalization efforts, share prices of some cannabis companies jumped. But aside from the financial boon it could provide for American and European marijuana markets, downgrading the dangers of cannabis may have the biggest impact on countries that have more conservative policies, such as many Caribbean and Asian nations. “Something like this does not mean that legalization is just going to happen around the world,” Ms. Steinberg said. But “it could be a watershed moment.”
<urn:uuid:4ca04d72-71d0-42f9-b92a-30148ca95de4>
CC-MAIN-2022-21
https://chitralnews.com/un-reclassifies-cannabis-as-a-less-dangerous-drug/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662515466.5/warc/CC-MAIN-20220516235937-20220517025937-00299.warc.gz
en
0.958198
1,038
2.546875
3
Helmet — basic values “Helmet — headwear used to protect top of the head from falling objects, moisture impact, electric current and metal spray. Helmet secures from danger of falling sharp objects, has a high degree of shock absorption and is resistible against effects of aggressive environment. Helmet is supplied with textile size adjustable head strap with six mounting points. Helmet colors: white, yellow, red, blue, green” STATE STANDARD OF RUSSIAN FEDERATION Safety standards system Way back helmet ceased to be just a utility object designed to protect human head from the harmful effect of aggressive environment. Helmet today is essential attribute of many great moments drastically changing society’s life for the better. Whether it is construction of houses and production facilities, launching of ships, installation of power units or commissioning of whole new power plants — there’s Her Majesty HELMET everywhere. Helmet serves man of every social status, trade, nationality. Helmet is proudly tried on by leaders of state. Helmet brings together members of all world religions. Helmet is equally useful for first-grader or renown scholar. Helmet is an integral symbol of trade for power engineers.
<urn:uuid:f792bb87-fe1f-4d21-b624-a7c6e9faf2d4>
CC-MAIN-2020-16
http://www.tgc1.ru/fileadmin/ir/reports/annual/2006/web/eng/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371883359.91/warc/CC-MAIN-20200410012405-20200410042905-00353.warc.gz
en
0.881463
252
2.859375
3
File Name: difference between crisp set and fuzzy set .zip Skip to search form Skip to main content You are currently offline. Some features of the site may not work correctly. Classical sets are sets with crisp boundaries. Usually an ordinary set a classical or crisp set is called a collection of objects which have some properties distinguishing them from other objects which do not possess these properties. Unable to display preview. Fuzzy set and crisp set are the part of the distinct set theories, where the fuzzy set implements infinite-valued logic while crisp set employs bi-valued logic. Previously, expert system principles were formulated premised on Boolean logic where crisp sets are used. This gave commencement to the development of the fuzzy set theory to imitate human thinking. For an element in a universe, that comprise fuzzy sets can have a progressive transition among several degrees of membership. While in crisp sets the transition for an element in the universe between membership and non-membership in a given set is sudden and well defined. Defined by precise and certain characteristics. Property Elements are allowed to be partially included in the set. The comparison could be made on very different levels, that is, mathematically, semantically, linguistically, and so on. Fuzzy set theory is not or is no longer a uniquely defined mathematical structure, such as Boolean algebra or dual logic. It is rather a very general family of theories consider, for instance, all the possible operations defined in chapter 3 or the different types of membership functions. In this respect, fuzzy set theory could rather be compared with the different existing theories of multivalued logic. Unable to display preview. Download preview PDF. PDF | Fuzzy set theories facilitate the extensions of today's Web structure, especially in the context of Web data. Currently, the increase or. In mathematics , fuzzy sets a. Fuzzy sets were introduced independently by Lotfi A. In classical set theory , the membership of elements in a set is assessed in binary terms according to a bivalent condition — an element either belongs or does not belong to the set. Crisp logic identifies a formal logics class that have been most intensively studied and most widely used. Before talking about how to use fuzzy sets for pattern classification, we must first define what we mean by fuzzy sets. A great source of information on fuzzy sets and fuzzy logic can be found in a collection of frequently asked questions and corresponding answers. Crisp sets are the sets that we have used most of our life. In a crisp set, an element is either a member of the set or not. In the present literature on fuzzy sets and fuzzy information, there is much confusion between entropies of fuzzy sets and fuzzy sets of entropies. After a thorough critical review of this question, proposes a unified approach based on the theory of deterministic functions. One must carefully distinguish between index of fuzziness, uncertainty of fuzziness and uncertainty of randomness on the one hand; and uncertainty of fuzzy sets and uncertainty of possibility on the other hand. This new framework could provide new approaches to management of uncertainty originating from both probability and possibility distributions. Key Differences Between Fuzzy Set and Crisp Set A fuzzy set is determined by its indeterminate boundaries, there exists an uncertainty about the set boundaries. On the other hand, a crisp set is defined by crisp boundaries, and contain the precise location of the set boundaries.Reply
<urn:uuid:74d44b97-5b41-440f-9977-7d57055dfdb3>
CC-MAIN-2022-05
https://rcthi.org/and-pdf/192-difference-between-crisp-set-and-fuzzy-set-pdf-111-406.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306181.43/warc/CC-MAIN-20220129122405-20220129152405-00286.warc.gz
en
0.934093
771
3.28125
3
by Robert Lowell Stanza 7 Summary Get out the microscope, because we’re going through this poem line-by-line. only skunks, that search in the moonlight for a bite to eat. - So there are no people around, only "skunks" – stinky little scavengers, looking for something to eat. - This is another bleak description of the place. It's also the first connection we get to the title. They march on their soles up Main Street: white stripes, moonstruck eyes' red fire - They walk up the main part of the town. This seems important – like there are no people in the place, so skunks just have free reign over the night. Total zombie, horror movie stuff. - Then the speaker describes the skunks' white stripes and how their eyes look red when the light shines on them – another seemingly normal image turned scary. - It's definitely no mistake that Lowell echoes "soles," as in bottoms of their feet, with the "spirit" kind of soul that is still in our heads from the previous lines. under the chalk-dry and spar spire of the Trinitarian Church. - "Spar" is like a mast on a boat. So Lowell is still clinging to the nautical imagery. Here he uses it to describe the spire – the pointy top of the church. - So the skunks are walking under the night shadows of this big, Gothic-looking church. Lowell probably uses this description to enhance the spookiness of the scene. People who Shmooped this also Shmooped...
<urn:uuid:1a052d01-dc21-4c21-aaf7-1fc47cc86bc6>
CC-MAIN-2015-35
http://www.shmoop.com/skunk-hour/stanza-7-summary.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645396463.95/warc/CC-MAIN-20150827031636-00230-ip-10-171-96-226.ec2.internal.warc.gz
en
0.926815
343
2.671875
3
Recognized globally as a highly biodiverse region, Bhutan is also home to vast specimen collections of flora and fauna, held at environmental agencies such as the National Biodiversity Centre (NBC), Royal University Bhutan (RUB) and Department of Forests and Park Services. Led by NBC, this project aims mobilize approximately 4,000 records of plants, invertebrates, birds, fishes and mammals from the collections of the Royal University of Bhutan and Department of Forests and Park Services. Data from the project will help enrich the Bhutan Biodiversity Portal (BBP), collecting information on all of Bhutan's flora and fauna, while also contributing to GBIF. Digitization will provide insights into biodiversity hotspots within the country and possible research gaps in field data collections. The project team also plans to accompany published datasets with data papers to increase visibility and usage. A planned workshop will also help inform participating agencies about the processes involved in data mobilization and the importance of sharing data.
<urn:uuid:d4ccc3d9-e670-4d4f-b1ce-0e6f5b454aac>
CC-MAIN-2020-34
https://www.gbif.org/project/7gXiH4Eulp3oXAMmltDNPG/enriching-the-bhutan-biodiversity-portal-through-digitization-and-mobilization-of-specimen-collections
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735964.82/warc/CC-MAIN-20200805183003-20200805213003-00090.warc.gz
en
0.925388
206
3.015625
3
Britain’s Day-flying Moths: A Field Guide to the Day-flying Moths of Britain and Ireland by David Newland, Robert Still, & Andy Swash This concise photographic field guide will help you identify any of the 100 or so day-flying moths found in Britain and Ireland. Combining stunning photographs, authoritative text, and an easy-to-use design, this book makes a perfect traveling companion–one that will increase your enjoyment of these colorful and intriguing creatures. Like butterflies, some moths fly regularly in sunshine, whereas others that usually fly only at night are readily disturbed from their resting places during the day. This guide describes all of these species, with at least one photograph of each in its natural, resting pose. The text includes a brief description of each moth, with details of its life history, where and when to look for it, its status, the food plants of its caterpillars, and its special features. Introductory sections cover many topics, including how to distinguish moths from butterflies; classification; life cycle and behavior; ecological importance; the impact of habitat and climate change; recording and monitoring; and conservation.
<urn:uuid:0871f6e9-f7fb-4052-bfc5-7268aa3c0d82>
CC-MAIN-2017-30
http://www.britishbutterflies.co.uk/wp/product/britains-day-flying-moths-a-field-guide-to-the-day-flying-moths-of-britain-and-ireland-1st-edition/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424910.80/warc/CC-MAIN-20170724202315-20170724222315-00626.warc.gz
en
0.928794
237
2.875
3
Grant to let scientists monitor global warming at UC reserves Published 4:31 pm, Sunday, December 14, 2014 Scientists at UC Santa Cruz are creating a statewide “climate change observatory” where researchers and students will monitor the impact of global warming on plant and animal life throughout the university’s statewide network of protected natural reserves — nearly 40 areas set aside for study in widely varied environments. The scientists have enlisted more than 60 faculty researchers on the nine UC campuses to detect and forecast the effects of the world’s rapidly changing climate on one of the most varied landscapes in America, said evolutionary biologist Barry Sinervo, a UC Santa Cruz professor. “Our university has the largest set of natural reserves in the world,” Sinervo said. “They include the state’s highest mountains, the hottest deserts, inland valleys, rivers, coastlines, redwoods, bays and more. We can study the impact of climate change on almost every ecological system there is.” The project, announced Friday, is being paid for with a three-year grant of $1.9 million from university President Janet Napolitano. LATEST TRENDING VIDEOS: Story continues below Each of UC’s reserves represents part of a “gradient” of climate effects, said UC Santa Cruz Professor Laurel Fox, who is also an evolutionary biologist and Sinervo’s principal colleague in establishing what Sinervo calls the nation’s first “statewide climate change observatory.” “For the first time we’ll be able to see how the university’s system of reserves responds to these changing gradients of climate,” Fox said. Fox is currently studying how animals like deer and wood rats respond to changes in the climate of the fog-swept coastal chaparral inside the university’s Fort Ord Natural Reserve. Sinervo has been studying the effects of the climate on animal behavior, including reptiles and amphibians, around the world. The project will begin with researchers from each of UC’s campuses working at 24 of the university’s 39 reserves. The scientists will gather data and conduct experiments with graduate students, as well as teach undergraduates at the sites. The UC Santa Cruz project, called the Institute for the Study of the Ecological Effects of Climate Impacts, will operate from the largest of five grants totaling $10 million for what Napolitano has called the President’s Research Catalyst Awards. Other awards are going to UCSF to address the state’s prison health care crisis; to UC Berkeley for quantum physics studies; to UCLA for “tapping big data” to help solve poverty issues; and to UC San Diego for studies linking music and brain behavior.
<urn:uuid:114ffce8-2308-432f-af22-025cde0fce91>
CC-MAIN-2017-17
http://www.sfgate.com/science/article/Grant-to-let-scientists-monitor-global-warming-at-5956914.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120001.0/warc/CC-MAIN-20170423031200-00315-ip-10-145-167-34.ec2.internal.warc.gz
en
0.920362
581
3.234375
3
Build anticipation for Thanksgiving Day by working with the children to prepare for the following activities. You can do steps 1-3 any day this week. Keep this guide on hand for the holiday. • Place a small plant or arrangement as a centerpiece for your table. • Cut leaf shapes out of the construction paper or trace/cut a child’s hand to make a special leaf. Punch a hole in the paper and run ribbon through it. Place the papers in a basket with pencils/crayons. • Tell the children that on Thanksgiving Day each family member and guest who arrives will be invited to write out what they are thankful for on one or more of the leaves. Younger children will be invited to draw a picture or cut/paste something out of a magazine. • Before you begin eating the Thanksgiving meal place each of the leaves on the centerpiece “tree.” • During the meal, take turns allowing everyone at the table to share what they wrote on their leaf. • Read 1 Chronicles 29:13 together: “Now therefore, our God, we thank You, and praise Your glorious name.” • End your time together by asking the oldest person to thank God for His abundance and the many blessings He has given your family. Optional: When the meal is over, take the thankful leaves and record the items of thanks that were written down in a Thankful Journal to update each Thanksgiving and review the prior years’ blessings together. Optional: When you are finished, have any children draw on a poster a tree trunk, grass, flowers, etc. Take the leaves and attach them. Hang the poster during the next couple of weeks to remind you of the things you are thankful for. Going Further: Visit the Faith-Filled Holidays page to download a guide to this and other ideas to use throughout the holiday season. You can also download the free Intentional Holidays episode of our podcast and a holiday memory book template for the kids.
<urn:uuid:9e368091-8471-4e85-8e65-b112e981f726>
CC-MAIN-2021-31
https://www.hillcrestbc.com/2016/11/tree-of-thankfulness/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154099.21/warc/CC-MAIN-20210731172305-20210731202305-00223.warc.gz
en
0.948369
409
2.6875
3
Working Principles: The filtered titanium dioxide hydrolysate is sent to the tail of titanium dioxide rotary kiln with certain inclination. The combustion mixing chamber at the end of kiln head can send clean flame and hot air into the kiln body to dehydrate and calcine filter cake. After the hydrolyzed titanium dioxide filter cake has been hydrated at a temperature more than 1000, and calcined, under the help of titanium dioxide rotary kiln, it can roll along the circumferential direction as well as move along the axial direction from the high end to lower end until it finally finishes dehydration and calcination. Finally, the dehydrated and calcined titanium dioxide will be sent to a cooler through the double hydraulic discharge valve. The cooled and screened material is final titanium dioxide products. Industrial pigments play an important role in the performance and durability of many products. In addition to serving as a coloring agent, pigments can also offer protection against corrosion and even UV rays; pigments are all around us, from building materials and concrete, to textiles, papers, printing inks, artists paints, and more. An increasing demand for specialty products, combined with prolific use in plastics, paints, coatings, and other applications has experts estimating that the pigment market will see a CAGR of 4.5% between 2016 and 2024. While there are many potential avenues used to produce pigments, many of these processes have one piece of equipment in common: the rotary kiln. Rotary kilns play an integral role in producing many of the high quality pigments industries rely on today. Rotary kilns are a high temperature thermal processing device used throughout many of these processes to cause a physical change or chemical reaction in the material in order to impart the intended pigment properties. They are often used to carry out the diverse objectives pigment producers require, such as thermal decomposition, oxidation, calcination, reduction, and more. Processing conditions can have a significant impact on the properties of the pigment and must be carefully controlled to achieve the desired results. This careful control is one of the advantages of the rotary kiln, which can be engineered to create the exact processingatmosphere and conditions required to influence pigment properties such as color, particle size, and even tinting strength. Typical customized design considerations include: Titanium dioxide (TiO2) is the most commonly used material for creating white pigments. In producing TiO2 pigments, the rotary kiln is critical to carrying out one of two primary methods of production: The Sulfate Process. The Sulfate Process is typically used for lower grade ores. In this process, the titanium ore goes through various steps in order to extract the titanium dioxide and produce it in a hydrated form that can be calcined. The direct process relies first on reducing a zinc-containing raw material or metal. This is carried out in a rotary kiln at high temperatures with coal as the reducing agent. Once the material is reduced to zinc, the metal vapor can be oxidized to produce zinc oxide. There are a few variations on the indirect process, which involves the melting and vaporization of zinc-containing metals, followed by oxidative combustion. In one variation on this process, the rotary kiln is used to carry out these objectives. The advantage in this setting is that the heat of combustion can be utilized elsewhere in the plant. Calcination of Filter Cake: Barium sulfate and zinc salt are mixed to create a uniform solution. Crystallites of raw lithopone are formed and the resulting filter cake is calcined in a direct-fired rotary kiln. Upon calcination, the mixture goes through a number of additional steps including quenching, classification and separation, thickening, filtering, washing, drying, and grinding in order to produce a suitable pigment. Iron oxides provide a diverse range of earth tone hues to the pigment industry. In the production of iron oxide pigments (IOPs), rotary kilns can be used to carry out a variety of different objectives. The rotary kiln is used in the production of IOPs in the Laux process, and can also be used after any of the three main IOP production methods in order to carry out calcination on the pigments to produce a variation of red hues. Testing is first carried out at batch scale to gather initial process data and define the parameters that will produce the desired product. This may include any number of factors, but generally includes gathering data on residence time, temperature profile, airflow, and more. Samples may also be produced for field testing needs. The data gathered during batch testing can then be used in continuous, pilot-scale testing trials to develop the data necessary for process scale-up. Various test kilns are available in the FEECO Innovation Center to accommodate all pigment testing possibilities. Our thermal testing capabilities are also complemented by our agglomeration (particle size enlargement) testing services and system expertise. The examples listed here represent just a few of the methods in which the rotary kiln provides a key processing medium to produce an ideal pigment product. The customizability of the rotary kiln to carry out various objectives makes the rotary kiln an ideal process setting for both the production and enhancement of many types of pigments. To find the ideal process solution, testing at batch and pilot scale are often a necessity. In addition to our thermal testing capabilities offered in the Innovation Center, FEECO provides custom rotary kilns and calciners for all of your pigment processing needs. Our highly engineered systems are designed around your exact specifications and requirements to provide optimal processing. In addition to our rotary kilns, we also offer a variety of agglomeration equipment for improving the handling qualities of pigments, as well as a wide range of material handling equipment. For more information on our pigment processing capabilities, contact us today! A rigorous one-dimensional dynamic model of a rotary kiln for calcination of titanium dioxide white pigment is developed. The regenerative heat transfer in the kiln wall is described by a new mixed numerical/analytical approach. The model is validated by means of a dynamic test case representing a 15-day period of plant operation. The required process data are captured within a measurement campaign on a kiln run by TRONOX Pigments GmbH, Krefeld-Uerdingen, Germany. The predictive accuracy of the model is estimated by means of a sensitivity analysis considering uncertainties of model parameters and measured input values. The actual agreement between simulation and measurement results is significantly better than indicated by the sensitivity analysis. Development of a dynamic model of a rotary kiln and extensive validation by means of a measurement campaign on industrial plant. Simulation results in better agreement with measurements than suggested by steady-state sensitivity analysis. Results indicate that simulation of kiln behavior with quantitative accuracy is possible. Titanium dioxide, white solid or powdered amphoteric oxide, widely used in coatings, plastics, paper, printing inks, chemical fiber, rubber, cosmetics and other industries. It has a high melting point and is also used in the manufacture of fire-resistant glass. Titanium dioxide, white solid or powdered amphoteric oxide, widely used in coatings, plastics, paper, printing inks, chemical fiber, rubber, cosmetics and other industries. It has a high melting point and is also used in the manufacture of fire-resistant glass, glazes, enamels, clays, and high temperature resistant experimental vessels. Titanium dioxide is an important white pigment and porcelain glaze. Used in paints, inks, plastics, rubber, paper, chemical fiber, watercolor paints and other industries. The air is filtered and heated into the air distributor at the top of the dryer, and the hot air enters the drying chamber in a spiral shape evenly. The liquid is sprayed into a very fine misty liquid droplet through a high-speed centrifugal atomizer at the top of the tower body, and it can be dried into a finished product in a short time by cocurrent contact with hot air. The finished product is continuously discharged from the bottom of the drying tower and the cyclone, and the exhaust gas is evacuated by the fan. 1. The drying speed is fast, the surface area of the material increases greatly after atomization. In the hot air flow, 95% - 98% of the moisture can be evaporated instantaneously, and the drying time is only a few seconds. It is especially suitable for the drying of heat sensitive materials. 3. The production process is simplified and the operation and control are convenient. For the liquid containing 40-60% moisture (90% of special materials), it can be dried into powder products at one time without crushing and screening after drying, which can reduce the production process and improve the product purity. The particle size, bulk density and moisture of the product can be adjusted by changing the operating conditions in a certain range, so the control and management are very convenient. JIANGSU JINGYI ENVIRONMENTAL PROTECTION SCIENCE AND TECHNOLOGY CO., LTD. High-tech environmental protection enterprises integrating installation, commissioning and operation have passed ISO 9001, ISO 14001 and OHSAS 18001 International Quality, Environmental Protection and Occupational Health and Safety "Three Standards One" Barrel Diameter: 1200-4700mm Barrel Length: 25000-72000mm Application: suitable for chemical, mining, metallurgy and other industries large particles, dry than major materials Materials: titanium dioxide, blast furnace slag, light calcium carbonate, phosphate fertilizer, metal powder Titanium dioxide is considered to be a kind of white pigment with better performance in the world. It is widely used in coating, plastic, paper making, printing ink, chemical fiber, rubber, cosmetics and other industries.Ceramic industry is an important application field of titanium dioxide, ceramic grade of titanium dioxide with high purity, uniform particle size, high refractive index, has excellent resistance to high temperature, our company according to the material properties of titanium dioxide, on the basis of digesting and absorbing foreign advanced equipment and technology, independent research and development of a professional drying equipment - titanium dioxide rotary kiln. 4. Titanium dioxide rotary kiln is a combustion equipment. The pulverized coal is sprayed into the kiln by the kiln head blower, and the heat generated by combustion is transmitted to the material by radiation, convection and conduction. The kiln head of titanium dioxide rotary kiln is sealed by shell and cover type. Titanium dioxide rotary kiln has the function of heat exchange. The temperature field in titanium dioxide rotary kiln is fairly uniform, which can meet the heat transfer requirements of various stages of cement clinker formation process, especially the requirements of alite mineral formation. Titanium dioxide rotary kiln has reliable combined scale seal at both ends.
<urn:uuid:5f7f8770-c252-453a-8dae-04814e965a9d>
CC-MAIN-2021-39
https://www.bahcesehirroyal.com/titanium-dioxide-rotary-kiln.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056572.96/warc/CC-MAIN-20210918184640-20210918214640-00118.warc.gz
en
0.925798
2,264
2.53125
3
Let’s discuss the question: 6 pints equals how many quarts. We summarize all relevant answers in section Q&A of website Activegaliano.org in category: Blog Marketing. See more related questions in the comments below. How many pints Makes 1 qt? How many pints in a quart? There are 2 pints in 1 quart. Does 4 pints make 1 quart? Four pints is equal to two quarts. Looking at the conversion rates above, we know that there are two pints in every quart. How to Measure Cups, Pints, Quarts, and Gallons Images related to the topicHow to Measure Cups, Pints, Quarts, and Gallons Which is more 16 pints or 1 gallon? 1 gallon equals 8 pints because 1×8=8. 2 gallons equals 16 pints because 2×8=16. Does 1 qt equal 1 pint? There are 2 pints in a quart. Does 8 cups equal 1 quart? There are 4 cups in a quart. Does 2 cups equal 1 pint? If we remember, 8 ounces = 1 cup, 2 cups = 1 pint (or 16 ounces = 1 pint). There are generally 2 cups in 1 pint, however depending on the ingredient, this may change. Are there 4 cups in 1 quart? There are 4 cups in a quart. How many 8 oz glasses are in a quart? You may notice that many recipes call for cups. There are 4 cups in one quart, 8 oz per cup. There are 4 quarts in one gallon (literally a ‘quarter’ of a gallon apiece, which is where the name comes from). And there are 2 pints in one quart, 16 fluid ounces in one pint. How many cups are in a liquid pint? Cups to Pints Simply said, there are two cups in one U.S. pint. How many liquid quarts are in a gallon? Answer: There are 4 quarts in a gallon. Does 2 cups equal 4 pints? Here’s the basic breakdown of how the U.S. does it: 1 Gallon = 4 quarts, 8 pints, or 16 cups. 1 quart = 2 pints, or 4 cups. 1 pint = 2 cups. What is 2 gallons equal to in pints? There are 16 pints in 2 gallons. Cups, Pints, Quarts, Gallons Images related to the topicCups, Pints, Quarts, Gallons What is in a quart? 1 US liquid quart is equal to ¼ gallon, 2 pints, 4 cups, and 32 ounces. Note that a dry quart is equal to 4.6546 cups, which is important when doing conversions for any dry ingredient. How many PT is 2 QT? |1 qt||2 pt| |2 qt||4 pt| |3 qt||6 pt| |4 qt||8 pt| How may oz in a pint? 1 fluid Pint (U.S.) = 16 fluid Ounces (US) 1 fluid Pint (U.K.) = 20 fluid Ounces (UK) How large is a quart? |=||1⁄4||US liquid gallons| |=||32||US fluid ounces| |≈||33.307||imperial fluid ounces| What is 4 quarts equal to in cups? (Spoiler alert: 16 cups are in 4 quarts!) We’ll teach you: The math formula for converting cups to quarts. What is a quart of water? A quart is a liquid unit of measurement that’s equal to a quarter of a gallon. A gallon is the largest unit of liquid measurement. That means that there are four quarts in a gallon, like there are four quarters in a dollar. This also means that things like milk may come in quarts as well as gallons. How much is a quart of liquid? The U.S. liquid quart is equal to two liquid pints, or one-fourth U.S. gallon (57.75 cubic inches, or 946.35 cubic cm); and the dry quart is equal to two dry pints, or 1/32 bushel (67.2 cubic inches, or 1,101.22 cubic cm). Is 16 oz half a pint? (A liquid pint, such as a pint of cream, is a measure of fluid ounces. One liquid pint equals 16 fluid ounces). What makes a gallon? A gallon is equal to 8 pints, 4 quarts, or 16 cups. There are 128 fluid ounces in a gallon and this number will differ depending on whether you use Imperial or Metric measures. How cups are in a gallon? According to US standards, a gallon has 16 cups, so half of a gallon will have 16/2 cups. How to convert gallons to quarts, quarts to pints, pints to cups, and cups to ounces | Khan Academy Images related to the topicHow to convert gallons to quarts, quarts to pints, pints to cups, and cups to ounces | Khan Academy What is bigger a pint or a cup? Show a pint measure and explain that a pint is a unit of measurement that is larger than a cup. Ask a student to pour 2 cups into the pint measure to demonstrate that 2 cups are equal to 1 pint. How do you measure a quart in cups? How to Convert Quarts to Cups. To convert a quart measurement to a cup measurement, multiply the volume by the conversion ratio. The volume in cups is equal to the quarts multiplied by 4. - how many quarts is 7 pints - how much is 6 pints of water in quarts - 60 pints equals how many quarts - how many quarts are in 12 pints - how many pints are in 6 1/2 quarts - how many gallons are in 6 pints - 6 pints is how many cups - 6.5 pints equals how many quarts - convert 5 quarts to an equivalent volume in pints - half 8 quarts - 6 quarts and 1 pint equals how many pints - 6.25 quarts equals how many pints - 5 quarts to pints - 61 quarts equals how many pints - 6.9 pints equals how many quarts - how many pints in a quart - 6.6 pints equals how many quarts Information related to the topic 6 pints equals how many quarts Here are the search results of the thread 6 pints equals how many quarts from Bing. You can read more if you want. You have just come across an article on the topic 6 pints equals how many quarts. If you found this article useful, please share it. Thank you very much.
<urn:uuid:45d30fd2-7d04-4f96-859d-d012ff1a2f05>
CC-MAIN-2023-06
https://activegaliano.org/6-pints-equals-how-many-quarts-update-new/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500076.87/warc/CC-MAIN-20230203221113-20230204011113-00369.warc.gz
en
0.89002
1,513
2.9375
3
Inventory, 50 ct : 0 Pear blossoms first appear on the dark brown branches of the pear tree as small, oval to oblong, tightly closed green buds. As the weather becomes warmer in the spring, the buds open, uncurling broad and flat, white petals. Each petal has a delicate, slightly wavy appearance with a soft, smooth, and velvety texture. Pear blossoms typically grow in clusters of 5 to 7 blooms and average 2 to 3 centimeters in diameter, comprised of five petals with several filaments, anthers, and a stigma found in the center of the bloom. The flowers bear a subtly sweet aroma and offer a mild, fresh, and slightly vegetal flavor. While fruiting pear tree blossoms are favored for their neutral flavor, some ornamental pear tree blossoms will carry an unpleasant fragrance, described as a musky, fish-like odor, and are not commonly used in culinary preparations. Pear blossoms are available in the spring. Pear blossoms are the seasonal blooms of pear trees belonging to the Pyrus genus, members of the Rosaceae family. There are many different varieties of pear trees, generally categorized either as an Asian or European pear. Both types of pears produce blossoms in the spring, and the white flowers are favored for their romantic and delicate appearance. Pear blossoms have been recognized for centuries as a symbol of spring, and the flowers are primarily used for ornamental purposes. While not commonly used for culinary purposes, Pear blossoms are sometimes incorporated as garnishes for main dishes, desserts, and mixology. It is important to note that there are also ornamental pear trees that do not bear notable fruit and instead produce blooms with an offensive aroma. These blossoms are not typically used in culinary preparations. Care should also be taken to ensure the blossoms have not been sprayed with pesticides if using in edible dishes and beverages. Pear blossoms have not been studied for their nutritional properties, but the thin, crepe-like petals are traditionally used in natural medicines. Pear blossoms were a favorite flower to combine with honey, a mixture used as a potion to promote energy flow within the body. Similar to other flowers, Pear blossoms may also contain low amounts of antioxidants to promote immunity and protect against free radical damage to cells. Pear blossoms are not a common culinary element and are rarely eaten as a stand-alone ingredient. The blooms are primarily utilized whole as an elegant garnish to decorate cakes, tarts, poached fruits, and other desserts. Pear blossoms are also sometimes used as individual focal points on appetizers and savory-sweet main dishes. When used whole as a garnish, the flowers are not eaten in their entirety as the stamens, stigma, and anthers can impart a bitter flavor. The petals are the only part of the flower consumed. Pear blossom petals are harvested from fruit-producing varieties and can be sprinkled over salads, harvest bowls, ice cream, sauces, and pudding, or they can be incorporated into salts, vinaigrettes, and syrups. The petals can also be steeped into teas or used as a cocktail garnish. In some orchards with many blooming pear trees, beekeepers can extract Pear blossom honey from local hives that visit the pear trees. Pear blossom honey is generally mild with a subtly floral, citrus-like taste. Pear blossoms pair well with young cheeses, fruits such as apples, raspberries, and peaches, sweet flavors including caramel, vanilla, and chocolate. The flowers should be used immediately for the best quality and flavor. Pear blossoms traditionally represent purity, love, and longevity in Chinese culture and are used as ornamental additions to centerpieces, bouquets, and flower arrangements. The delicate white flowers are often seen at weddings as a promise for a lasting, loving marriage and the hope of a new life. When used in decorations, Pear blossoms are frequently still attached to their branches, giving the flowers a whimsical, earthy appearance. In Chinese folklore, Pear blossoms are also considered one of the mo beautiful flowers when they are kissed with raindrops, sometimes used to describe attractive women, further promoting the flower’s feminine nature. Beyond beauty, pear trees are historically viewed as a tree that can survive for many years, leading the fruits and flowers to be associated with the notion of immortality and long life. Pears are one of the oldest domesticated fruits that have been cultivated since ancient times. The trees thrive in temperate climates and are believed by experts to be native to Asia, specifically China. Some scientists also list the Middle East and AsiMinor as a secondary site of origin for different pear varieties. Over time, pears were spread across Asia and Europe and became a staple fruit tree grown in home gardens. Pears were also referenced throughout ancient literary works, including Homer’s The Odyssey, and Chinese cultivation documents discussed the art of pear grafting dating back to around 5000 BCE. Pear trees were introduced into North America with early European colonists and were brought to the Pacific Northwest sometime in the 1800s. In the modern-day, pear trees are cultivated worldwide, especially in Europe, Asia, North America, and Australia, and Pear blossoms can be harvested when in season from multiple varieties of pear trees. Pear blossoms have a short shelf life and are typically foraged by hand from trees or sold in decorative bunches at local markets.
<urn:uuid:371d68d3-895c-4f3a-bec7-3ef3709c8f64>
CC-MAIN-2022-27
https://specialtyproduce.com/produce/flowers/pear_blossoms_10157.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104678225.97/warc/CC-MAIN-20220706212428-20220707002428-00472.warc.gz
en
0.949162
1,165
3.28125
3
Sceptre of Númenor In Númenor, the power of the Kings and Queens was symbolised not by a crown, but by a Sceptre, held by Elros Tar-Minyatur and all his ruling descendants to the time of Ar-Pharazôn. Among the early Kings, it was normal to voluntarily surrender the Sceptre to an Heir, but this tradition was abandoned in later years. Ar-Pharazôn carried the Sceptre with him when he sailed to attack Blessed Realm, and it was lost with the King and all his armies. In Middle-earth, the exiled Númenóreans maintained this tradition, and their High King held the Sceptre of Annúminas, which had been the symbol of the Lords of Andúnië in Númenor.
<urn:uuid:fea572ca-24c9-4a79-8fbe-70b825440840>
CC-MAIN-2013-48
http://tolkiengateway.net/wiki/Sceptre_of_N%C3%BAmenor
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163996785/warc/CC-MAIN-20131204133316-00009-ip-10-33-133-15.ec2.internal.warc.gz
en
0.972046
177
3.359375
3
Physics Principles & Popsicle Racecars at Engineer Camp 16 Aug 2018 UGI believes in investing in young generations so that the importance of innovation and inventions will extend into the future. As a proud sponsor of the National Museum of Industrial History’s Engineer Camp for ages 7-14, we particularly commend the camp’s emphasis on safety while teaching engineering skills. Safety is a value that UGI takes seriously and we believe it should go hand-in-hand with any building project. During this week long STEM immersion program, campers spend their time learning how engineers analyze problems, experiment to discover solutions, and ultimately how to engineer their own creations, all while keeping safety in mind. Creativity and excitement abounds amidst the construction of popsicle racecars, as the students are tasked with building a car that will hold a plastic egg safely as it speeds down an incline. What is so incredible, is that kids are given the time to try and fail and then try again, each time learning how to better improve their car. Earlier in the day, basic physics principles are introduced that explain force and machinery. Campers are taught, through visual and interactive activities, the characteristics of the pulley, wheel and axel, inclined plane, lever, and screw. They then put these principles into practice as they piece together popsicle sticks, wheels, rubber bands, glue, and a paper cup that will act as the seat for their egg. Campers work together or separately, whichever they prefer, and are encouraged to continually test their cars and ask questions along the way, in order to make their car the safest and fastest it can be. The National Museum of Industrial History, located in Bethlehem Pennsylvania, tells the story of the rise and fall of the steel industry, featuring engaging exhibitions that are appealing for all ages. The museum aims to create a narrative centered around innovation, transformation, and scale, and also includes a section dedicated to the recent boom of the gas industry.
<urn:uuid:56d2a60f-280b-4491-889d-f25f5d5dffd0>
CC-MAIN-2019-26
https://www.ugi.com/blog/physics-principles-popsicle-racecars-at-engineer-camp/
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998475.92/warc/CC-MAIN-20190617123027-20190617145027-00390.warc.gz
en
0.954058
405
3.296875
3
If your cat's battling FIV, or feline immunodeficiency virus, you want to help him in any way you can. While he can't be cured, the right treatment might keep him symptom-free for a long time. Interferon therapy could keep Fluffy relatively healthy and around longer. Feline Immunodeficiency Virus FIV is the feline version of the human immunodeficiency virus responsible for AIDS. FIV destroys your cat's T-lymphocytes, the white blood cells protecting his immune system. As his immune system wanes, all kinds of opportunistic infections that a healthy cat's system could overcome take their toll. Eventually, the cat succumbs from infections, cancer, anemia or other diseases. Cats usually contract the virus through bite wounds, so tomcats fighting outdoors are at especially high risk. Infected mothers can pass it on to nursing kittens. Interferon are cytokines. As described by Veterinary Partner.com, this means they are "biochemicals secreted by cells of the immune system to regulate other cells of the immune system." In some FIV-positive cats, interferon might reduce the virus' ability to replicate. It doesn't work in every cat treated with the drug, but there's always a chance it could work with your pet. Certain cats treated with interferon become more active, eat better and live longer. It might also improve your cat's red and white blood cells counts. Cats receive interferon orally, with the drug mixed in a saline solution. You can also mix it in his food. Low dose administration of interferon, as given to cats with FIV, generally incurs no side effects. Not only is it very safe for your immune-compromised kitty, but it doesn't interfere with other medications he might require, such as antibiotics and drugs to combat viruses. You can rest assured that even if interferon doesn't help your cat, it isn't going to hurt him. However, because cats soon develop antibodies to interferon, you can't give him the drug for much more than seven weeks. If interferon doesn't work for Fluffy, don't despair. Certain drugs called immunomodulators can aid his immune system. Azothiouridine, known as AZT, has proven beneficial in human AIDS patients and also helps felines. If you can afford it and your vet gives the go-ahead, a bone marrow transplant might your improve your cat's neutrophil level, a type of white blood cell that fights inflammation. However, even after the surgery your cat still has FIV. - Wedgewood Pet Pharmacy: Interferon Alpha-2B for Veterinary Use - Animals of Eden Veterinary Hospital: Feline Immunodeficiency Virus - Veterinary Partner: Feline Immunodeficiency Virus (FIV) - National Center for Biotechnology: Therapeutic Effects of Recombinant Feline Interferon-omega on Feline Leukemia Virus (FeLV)-infected and FeLV/feline Immunodeficiency Virus (FIV)-coinfected Symptomatic Cats - Veterinary Partner: Interferon (Roferon, Intron A, Alferon N) - Photodisc/Photodisc/Getty Images
<urn:uuid:91ffb203-bff0-4f50-a928-d84544e8d7e1>
CC-MAIN-2018-39
https://pets.thenest.com/interfuron-cat-fiv-treatment-10160.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156513.14/warc/CC-MAIN-20180920140359-20180920160759-00285.warc.gz
en
0.94493
684
2.859375
3
Phytoplankton - sometimes called microscopic algae - can seem a bit like Jekyll and Hyde. Some produce much of the air we breathe and nourish the ocean's food chain, while others form harmful algal blooms that range from annoying to hazardous for people and animals. The fact is, phytoplankton are really diverse, with lots of scientific groupings having a wide variety of traits ranging from helpful to harmful. Mote Staff Scientist Dr. Vince Lovko tells Hayley and Joe about the phytoplankton in our "backyard," the Gulf of Mexico, including the kinds you might wade through at the beach and never notice, along with one kind that draws Floridians' attention: the harmful algal bloom Florida red tide. The really fun part: Dr. Lovko is planning to test flying drones to monitor algal blooms from the air. Check out the red tide monitoring app mentioned in the show by searching "CSIC Mote" in the App Store or Google Play. CSIC stands for Citizen Science Information Collaboration.
<urn:uuid:28e486a2-6687-428e-80d8-f6520e43255a>
CC-MAIN-2018-13
https://mote.org/podcasts/item/take-a-breath-thank-the-phytoplankton
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648431.63/warc/CC-MAIN-20180323180932-20180323200932-00481.warc.gz
en
0.912673
223
2.875
3
PART 3: Day-To-Day Living Living at Home Assistive-care facilities are meant to provide a higher level of care than some individuals with disabilities can receive at home. However, Dr. Weigel says that some of the assistive-care facilities she has seen may not be appropriate for younger people. “In such instances, the level of activity and social interaction isn’t the same as it is for elderly people. This can cause depression and social isolation.” For this reason, she recommends taking the steps needed to allow a loved one to live at home longer. These steps include ensuring that the appropriate level of care may be given and that the home-living situation is as safe as possible. Assistive devices, and for some, a service dog, may also be very helpful. In addition, individuals may consult their local Centers for Independent Living for more information. Assistive Devices are Available to Help At some point, some people with MS may benefit from using assistive devices. These can range from mobility devices, such as canes, walkers, wheelchairs, and scooters… to communication devices, which include items such as voice-activated word-processing software, ergonomic computer keyboards, and adaptive trackballs. Even everyday devices – such as reminder ringtones on cell phones – can be used as assistive technology to prompt people to perform such functions as to take their medication at the same time each day. Learning about what items are available to help with one’s exact needs is vital. Physical and occupational therapists can be of much assistance in directing people to specific devices that can enable someone to perform activities that they might otherwise be unable to do. These can include items that not only assist with computers, communications, and a wide range of safety and mobility devices, as mentioned, but also a full array of aids for daily living, plans and products for adapting the home for greater accessibility, and more. A great deal of information is available on the internet. Each state has an office of assistive technology, which may be able to provide a grant or loan assistance to obtain needed equipment, and possibly allow someone to try out an assistive device in advance. Another resource is AbleData at www.abledata.com. Sponsored by the National Institute on Disability and Rehabilitation Research (NIDRR), part of the United States Department of Education, AbleData maintains an extensive database of objective information on more than 36,000 assistive products. For each product, they provide a detailed description of the product’s functions and features, price information (when available), and contact information for the product’s manufacturer and/or distributors. Information is also given on customized products and do-it-yourself designs. Searching through the products on this website gives browsers information on items from virtually every category that could require assistive technology and equipment. For example, individuals can easily locate information on vision and hearing devices, computers, daily living, housekeeping, recreation, environmental adaptations (home, office, and outdoor), transportation, walking, wheeled mobility, and more. If you have questions or need assistance, you may call the AbleData offices at (800) 227-0216 to speak with an information specialist who can assist you with a database search. MSAA also provides information on walking and mobility. This may be found at mymsaa.org/about-ms/symptoms/mobility. The information includes a three-part article titled “Mobility Independence and Safety,” which includes a full section on wheeled mobility. Adjusting to Assistive Devices that Help with Mobility, Safety, and Comfort Dr. Weigel says it can be hard for some people with MS to give up walking unassisted and transition to using assistive devices. This transition can change one’s perception of oneself to someone who is dependent. It can also be a reminder that MS is progressing, so it can bring up feelings of sadness. However, assistive devices increase independence because they enhance safety and conserve energy. Dr. Weigel explains, “A man with MS who used a cane fought me when I told him he should use a power chair. When he went to Disney World with his family, he used a scooter. He came back and said it changed his life, because he could keep up with his grandkids, daughter, and wife. Nobody was afraid of him falling and he didn’t get fatigued.” Since some individuals with MS may be resistant to using an assistive device, Ms. Krawchuk emphasizes, “Make it clear to the person with MS that an assistive device won’t take away from who they are as a person. It will potentially add, since assistive devices allow a person to be more social instead of staying in the house all of the time.” Some individuals with MS use service dogs, who are more than just pets. A service dog is trained to perform duties that specifically address the disability of the dog’s owner. Since each person experiences his or her own specific disabilities and has different needs for assistance, each dog is custom-trained for the person it will help. For instance, a dog might be taught to pick up dropped items, open and close doors, and turn on and off lights for an individual using a wheelchair. A service dog might even pull a wheelchair. Canine Companions for Independence (CCI) in Santa Rosa, California states that a service dog can also push buttons for elevators or automatic doors, and even assist with business transactions by transferring money, receipts, and packages. CCI has regional training centers across the country. Applicants who meet all CCI requirements attend a two-week team-training course before going home with their dog. Ms. Krawchuk states that a service animal adds a level of comfort for both the person with MS and their care partner. “The care partner feels better when leaving the person with MS at home with a service animal. Doing so helps relieve feelings of guilt and also helps alleviate fear. It provides company and a feeling of security for the person with MS. The service animal becomes part of the family.” Creating a safe living environment for a care recipient is crucial. Therefore, after carefully evaluating the surroundings in the home, care partners should take the necessary steps to prevent any dangers that could result from accidents, fire, and other hazards. Since fire prevention is of utmost importance, smoke detectors should be installed on each level of the house and checked regularly to assure they are working properly. Frayed electrical cords should be replaced, and electrical outlets must never be overloaded. Electrical cords should not be hidden under rugs, where they can wear down over time and cause the rug to catch fire. Care providers need to plan emergency escape routes, especially when mobility is affected. This route should be practiced with the individual with MS. Falls and other accidents can occur as a result of some of the changes experienced with MS, and this presents extra challenges. Care partners should take preventive measures to help minimize the risk of injury for their loved one. For instance, simple changes can be made to reduce the risk of falls. Electrical cords and cables should never be placed where someone can trip over them. Wiping up spills immediately can prevent slipping. Shoes and other objects should be put away, rather than left lying on the floor. Grab bars can be installed wherever necessary, not just in the bathroom. Also lowering the water temperature can help avoid burns. Plastic cups and containers can replace glassware to prevent cuts from broken glass. Shoes and slippers should have non-skid soles and should be replaced when they start to fray or lose support. Using stairs can be difficult and even dangerous for some people with MS. One option is to have a stair lift installed. Some individuals may need to avoid stairs altogether, which involves moving their bedroom into an existing room on the first floor of their house or possibly adding a room onto the first floor. Other options include moving to a ranch-style house or a first-floor apartment or condo. For people who can’t afford to make big changes, care partners should be sure that stairways have sturdy railings on both sides that reach from top to bottom. At the top of stairways, small-diameter grab bars (about five inches long) should be available for people with MS to grab. These are also useful directly inside exterior doors. Dr. Weigel emphasizes that making a house accessible can help the individual with MS to stay in his or her home as long as possible. “This can be costly, but it has such benefits. Most people want to stay in their homes. But, depending on the level of disability, they are at a greater risk for falls and complications if there isn’t the right level of care at home. So, doing everything to make a home accessible is best.” In addition, maintaining a medication list, a first-aid kit, and a list of doctors as well as emergency numbers is important in a crisis. A working knowledge of cardiopulmonary resuscitation (CPR) can save a care recipient’s life when an emergency strikes. The American Red Cross offers CPR classes in many areas. Go to www.redcross.org to find a local class. Knowing When to Stop Certain Activities Care partners should always show respect to the individual being cared for and expect the same from others. Still, at some point, certain activities may have to be limited or discontinued. How does a care partner recognize when the time has come, and how should he or she handle this? Dr. Weigel says, “Approach it before a problem happens, such as a burn, dropping dinner, falling, a car accident, or getting lost while driving. If a person has more trouble with balance, then you could assume that he or she would have more problems bathing. If having trouble with arm coordination, he or she will have cooking problems.” Dr. Weigel talks about the benefits of approaching the situation with concern rather than blame. “Instead of saying, ‘You can’t do this anymore,’ say, ‘I worry about you bathing when home alone because I love you and don’t want an accident to happen.’ Assure the person that asking for additional help won’t put an undue burden on the care partner. People often don’t ask for help because they feel like a burden.” If an individual has cognitive or visual problems, “then they can’t drive,” says Dr. Weigel. “Honesty is the best policy. Say, ‘I’ve noticed your right foot drop is getting worse. Are you still comfortable driving? I’d be happy to drive,’ or ‘Maybe we should look into hand controls.’ Things like driving can be touchy and sometimes you need to enlist the help of a healthcare provider to discuss this with your loved one with MS.” People with MS and their care partners often experience financial difficulties. Medical expenses combined with loss of income can wreak havoc on a family’s finances. Phil says he and Shelley haven’t gone out to dinner in three years. “Money is an issue and we need a new car. We have bills to pay off. We owe tens of thousands of dollars for ER visits and ambulance rides. She has fallen several times and we have had to call 911.” Shelley began receiving SSI (Supplemental Security Income) and Medicaid benefits eight years before marrying her husband. When she married, she lost all her benefits. As a woman who had spent years raising children at home, she hadn’t earned enough money to qualify for SSDI (Social Security Disability Insurance) and Medicare. “Society advocates American values with getting married, and then you are penalized. It makes no sense,” says Phil. “It caused an incredible amount of anxiety. We had to pay for all her doctor visits in full. We went through nearly all of our savings.” Phil searched for assistive programs, which he describes as being “like a full-time job.” Shelley’s various MS medications cost up to $3,000 a month, so Phil located a patient assistance program that she qualified for. Shelley now gets her medication free of charge. Eighteen months ago, Phil found a physician outreach program for his wife that pays for primary care and referrals to specialists, but not for diagnostic tests. “We have so many unpaid bills. We can’t go to MS clinics in the area because of having no insurance. All the stress makes the MS worse.” Dr. Franco says, “MS can threaten financial, emotional, and time resources. If this occurs, heightened stress as well as vulnerability result, leaving both the person with MS and the care partner feeling overwhelmed, frightened, and drained, especially if other needs go unmet.” Families facing such challenges should seek help, both financially and emotionally. In addition to local and government assistance, the Department of Housing and Urban Development (HUD), at HUD.gov, provides counseling on housing and credit issues. Readers may also contact an MSAA Client Services Specialist at (800) 532-7667. Independence and Dignity Providing care for a person with MS, while allowing the individual to retain his or her independence and dignity, can be a juggling act for care partners. For instance, a care partner may wonder how to assist his or her loved one with dressing, bathing, and bathroom time while allowing for autonomy and privacy. One way to work this out is to involve the person with MS in decision-making about their capabilities. Dr. Weigel states that discussing goals is a good way to help provide balance and include the person with MS in making decisions. “Sit down and go through a day’s activities and figure out what the person with MS can accomplish on his or her own, even if certain things take longer. Then figure out which activities the person would like to at least try before asking for help. Safety has to be considered first, of course.” Phil realizes that his wife fears losing her self-sufficiency, so he does everything with this in mind. “I don’t want her to lose herself, so I try to balance helping her and letting her do what she can do. Those two things sometimes clash. Also, I find that validating my wife is important to maintaining her dignity. Saying positive things about her and the things she can do helps to boost dignity.” Diana’s daughter Jennifer assists her mother with those things she truly cannot do on her own – such as driving and transferring in and out of her power chair – while ensuring that her mother does the rest. When she takes her mother out after physical therapy, her mother chooses where to eat, orders her meal, and feeds herself. After eating, Diana decides where she wants to go. “If we visit the mall, she decides which stores to stop in, and she makes her own purchases. This way, she retains as much independence as possible.” Diana’s children regularly acknowledge the things Diana does for her family. Jennifer frequently thanks her mother for being the family’s spiritual leader who prays for them, advises them, and teaches them about faith. Her sister Christina consistently acknowledges the emotional and verbal support their mother gives to family members and how she cheers on her grandchildren for their accomplishments. Enjoying Life Together Having fun as an individual, a couple, or a family can take some resourcefulness when MS is involved. Often, a reduction in outside activities is necessary to accommodate a person’s health. Sometimes, old activities can be adapted, but other times, finding or creating new activities is necessary. Dr. Franco emphasizes focusing on activities the individual can do, including volunteer work. “The important thing is to do something you like that keeps you connected to others in a meaningful way.” She also notes the value of associating with others online. “The internet offers a new array of connection for many. Facebook, MS blogs, support groups, and forums are all easily available.” Dr. Weigel urges individuals with MS and their care partners to socialize, regardless of logistical challenges. “Spending time with friends and family and being part of a spiritual community are ways to help prevent social isolation.” Ms. Krawchuk states that creativity is key to wellbeing and having fun together. “I realize how challenging all of this is. But, the more creative you are, the more you can succeed in finding hope and joy. Look for things in common beyond the illness that you like and can do together. It could be movie nights, game nights, wheelchair dance parties, binge-watching your favorite show, or cooking, to name just a few examples.” Diana’s daughter Jennifer found a new way to have fun with her mother. “It dawned on me that she can’t dance anymore. She loves dancing and is the one who taught me to dance. So, I picked her up from her wheelchair and danced with her. She loved it! When we get home from shopping now, I put on music and we dance together. I lift her from her chair and hold her up, and we dance.” Diana’s family ensures that she is able to be at most major family events, no matter what they must do to accomplish that. Sometimes, the event comes to Diana. The family annual New Year’s Eve party used to be held at various family members’ homes. The party is now always held at Diana’s house, with everyone pitching in to ready Diana and her home, and to provide whatever is needed for the party. “It takes time to do these things, but we do it for her quality of life and so that we and our kids get to spend quality time with her,” says her daughter Christina. Despite the financial and socialization challenges the Sissers face, Phil states, “Shelley is as devoted to me as I am to her, regardless of anything that comes our way. MS has allowed us to express our love in new and different ways. That is the sustaining force for me.” Ms. Krawchuk notes, “Actively seeking out big and small moments of joy, hope, and laughter is so important. These moments may look different than they used to, but they are still there.”
<urn:uuid:d3542645-99ce-478e-933a-71682efb2f52>
CC-MAIN-2019-18
https://mymsaa.org/publications/motivator/summer-fall14/cover-story/part3/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578531462.21/warc/CC-MAIN-20190421120136-20190421142136-00541.warc.gz
en
0.964586
3,870
3.046875
3
Crete’s strategic location at the crossroads of the ancient civilizations of the Mediterranean is the main reason for the continuous claim of the island by many occupants. Crete managed to keep its unique and strong character till today. Religion, glorious history and the wild Cretan terrain formed the personality of Cretans, who held their Greek soul after many centuries of slavery. Apart from the scattered archaeological sites and monuments of spiritual wealth, the visitor has the chance to see the rare and priceless findings of excavations at the various museums and collections throughout the island. Crete is the birthplace of Zeus, the ruler of the gods, people and hospitality. Even today the hospitality of the Cretans is more than a ritual. The first European civilization, the Minoan, emerged here between 2800 BC and 1400 BC. Even today, the palaces of Knossos, Phaestus, Malia and Zakros reflect the splendor of the Minoan civilization through the masterpieces of architecture, pottery, gold, silversmithing and painting. The most powerful fleet in the then known world, as evidenced by the different findings across the Mediterranean, brought wealth to Crete from trading the famous Cretan cypress and its agricultural products. This brilliant course was terminated in 1400 BC when the Achaeans and the Dorians made their presence on the island, founding new towns (eg Lato, Polyrineia) and gave the baton to the Classical Greek civilization. After the conquest of Crete by the Romans, the capital moved to Gortys, which subsequently became the capital of the Roman province of Crete and Cyrene. During his journey to Rome, St. Paul stopped in Crete and proclaimed Christianity, beginning a century-old monastic tradition in more remote areas. The island became an important Christian center as depicted in hundreds of religious monuments, scattered everywhere. In 824AD Crete was conquered by the Arabs, who turned Candia (today’s Iraklion) to a base for pirate attacks in the Mediterranean Sea. After many failed attempts, the Byzantines managed to release Crete in 961, under the commands of the later emperor Nikiforos Fokas, giving a new impetus in Christian tradition on Crete. After the conquest of Constantinople by the Crusaders in 1204, the Venetian became the new rulers of Crete until 1669. During this period Crete experienced a great economic and spiritual wellbeing. The big cities were rebuilt, decorated with amazing monuments and fortified with massive walls. Moreover, the art reached its apogee with great personalities from the field of hagiography, as El Greco (El Greco) and Michael Damascinos. Moreover, literature, music and theater thrived and produced masterpieces, like Erotokritos and Erofili. All these were abruptly interrupted in 1669 when Candia, Crete’s last stronghold, surrendered after the longest siege in history by the Ottomans. Successive revolutions and bloody battles led to the autonomy of Crete in 1897. In 1913 Crete became part of the Greek territory, honoring the longed dream of all Cretans for the Union. During the Union of Crete, the politician Eleftherios Venizelos came into foreground, who would later become the greatest leader that ever ruled Greece. The struggles, however, of the Cretans did not end here, as the Cretan glory emerged in the Battle of Crete in 1941 and from the ashes of the dozens of villages burnt by the Germans. Thousands of Cretans were executed with their fearless gaze towards the barrel of the German guns, helping to turn the scales in favor of the Allies. - West Crete - Central Crete - East Crete - Chania Prefecture - Chora Sfakion - Rethymnon Prefecture - Agia Galini - Heraklion Prefecture - Agia Pelagia` - Kokkinos Pirgos - Lassithi Prefecture - Agios Nikolaos - Lassithi Plateau - Get Prepared
<urn:uuid:3e11ffe7-c558-4310-8a40-edb20a676190>
CC-MAIN-2020-10
https://www.cretanbeaches.com/en/history-of-crete
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146665.7/warc/CC-MAIN-20200227063824-20200227093824-00339.warc.gz
en
0.940428
861
3.15625
3
ingredient focus: sake the bottom line Sake is well-known as the national alcoholic beverage of Japan, but it also has a long tradition in beauty. Sake, or nihonshu, has been produced since 300 AD. Japanese head brewers, or toji, of sake are renowned for their soft, smooth hands, even into their old age, which has been attributed to the submergence of their hands into fermented rice during the brewing ritual. One traditional Japanese beauty regimen includes the use of sake baths which are believed to contribute to moisturized skin. Geisha use sake as a lotion to soften, brighten, and hydrate their skin. Keep reading to learn more about the science behind the beauty of sake. first layer: the history What is sake? Sake is a Japanese liquor which has been produced for centuries, with approximately 1800 breweries still in operation. Sake production begins with rice that has been polished, washed, soaked and steamed. A portion of this steamed rice is used to produce koji. Koji spores are added to the rice, which is mixed by hand regularly over three days. The result is koji, an enzyme-rich cultured grain. Some of the koji is then combined with additional steamed rice, water, and yeast. Two weeks later, the result is shobu which acts as a yeast starter. Using shobu as the base, small amounts of rice, water and koji are added in stages and fermented over 18-32 days. This mixture is finally filtered, leaving both a liquid sake and a solid sake kasu (or dregs). Other products derived from the sake production process include fermented rice water, also known as ferment filtrate. Galactomyces ferment filtrate, trademarked as Pitera, is rich in vitamins, minerals, amino acids, and organic acids. second layer: the science Sake has been shown in scientific studies to possess significant activity at the cellular level. - inhibition of melanin* production: Sake extract treatment has been shown to significantly inhibit the production of melanin, the dark brown to black pigment which occurs in the hair and skin. Tyrosinase, the rate-limiting enzyme of melanogenesis, is also decreased. In one study, topical application of a product with sake extract improved skin lightness significantly within 7 days. Skin redness and yellowness also decreased to a lesser degree. - activation of natural moisturizing factors: Galactomyces ferment filtrate (GFF) has been shown to upregulate the expression of filaggrin* in epidermal keratinocytes*. Filaggrin is a filament-aggregating protein which undergoes further processing in the stratum corneum to release free amino acids which assist in water retention. - antioxidant: GFF has also been shown to activate nuclear factor erythroid-2-related-factor 2 (NRF2), the antioxidative master transcription factor. It exhibits potent activity against oxidative stress induced by ultraviolet radiation and pro-inflammatory cytokines*. Moisturizers with GFF have been shown to increase skin hydration and decrease transepidermal water loss. Other trials have demonstrated that the topical application of GFF improves facial redness, skin roughness, and pore size. - permeability barrier augmentation: GFF has been shown to enhance attachment between keratinocytes by increasing the production of the tight-junction molecules claudin-1, claudin-4, occludin, and ZO-1. - anti-inflammatory: GFF is known to increase production of anti-inflammatory cytokine IL-37. IL-37 is able to inhibit the pro-inflammatory process induced by a range of stimuli. third layer: sake in skincare Reported benefits of sake and products from the fermentation process include the following: - brightening: kojic acid, a fungal metabolic product derived from koji, is an antioxidant which helps to brighten skin by inhibiting the production of melanin. It has been shown to decrease discoloration of skin and hyperpigmentation while evening skin tone. - acne: sake acts as a natural astringent by decreasing the production of sebum and decrease the appearance of pores. - hydration: the amino acids contained within sake, including glutamic acid, help to maintain hydration of the skin. - exfoliation: Sake contains alpha hydroxy acids, well-known for their ability to minimize the appearance of enlarged pores and minimize fine lines. The high concentration of amino acids helps to smooth skin texture and maintain skin elasticity. - antioxidant: sake contains ferulic acid, an antioxidant demonstrated to neutralize free radical damage secondary to ultraviolet light and pollution. - elasticity: another compound produced during the fermentation process is alpha ethyl D-glucoside, or alpha-EG, which helps to stimulate collagen* production. Studies have also demonstrated that it suppresses skin roughness following ultraviolet radiation, decreases transepidermal water loss, and promotes skin moisturization. - skin barrier protection: both alpha-EG and GFF protect the skin barrier by enhancing the junction between keratinocytes and decreasing transepidermal water loss. fourth layer: how we do it We love the history and science of sake, and have incorporated it into our men’s skin range, anokha man. Our sake & sandalwood lotion is a gentle facial lotion for sebum-rich, testosterone-charged skin that layers sake filtrate, rice bran, allantoin, sandalwood, and bergamot to deeply nourish and visibly refresh skin. Consider it a stiff drink to combat skin dryness. All this and more at www.anokhaskincare.com . - Hwang J, Goh M, Kim E, et al. Identification of sake extract as a new anti-melanogenic ingredient by in vitro and clinical trials. Nat Prod Commun 2013; 8(11): 1605-1608. - Kitagaki H, Kitamoto K. Breeding research on sake yeasts in Japan: history, recent technological advances, and future perspectives. Ann Rev Food Sci Tech 2013; 4: 215-235. - Yan X, Tsuji G, Hashimoto-Hachiya A, Furue M. Galactomyces ferment filtrate potentiates an anti-inflammaging system in keratinocytes. J Clin Med 2022; 11: 6338-6352. - Miyamoto K, Dissanayake B, Omotezako T, et al. Daily fluctuations of facial pore area, roughness and redness among young Japanese women; Beneficial effects of Galactomyces ferment filtrate containing antioxidative skin care formula. J Clin Med 2021; 10: 2502. - Uno, T, Itoh, A, Miyamoto, T, et al. Ferulic Acid Production in the Brewing of Rice Wine (Sake). J Instit Brew 2009; 115: 116-121. collagen: a fibrous protein that forms part of the dermal matrix, connective tissue, cartilage, and bone cytokine: a substance secreted by cells of the immune system, which in turn affects other cells filaggrin: a filament-aggregating protein which undergoes further processing in the stratum corneum to release free amino acids which assist in water retention keratinocytes: the primary cell of the epidermis, which constitutes 90% of epidermal skin cells. keratinocytes form a barrier against environmental damage and are shed every 45-60 days. melanin: a dark brown to black pigment which occurs in the hair, skin, and iris of the eye. It’s also responsible for the skin’s ability to tan when exposed to sunlight. what is sake? sake is a Japanese liquor which has been produced for centuries. it has numerous skincare benefits which include skin brightening, acne control, exfoliation, and skin barrier protection.
<urn:uuid:c0b65967-997a-4204-8759-4a9e7ebe3055>
CC-MAIN-2024-10
https://www.anokhaskincare.com/blogs/journal/sake
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474853.43/warc/CC-MAIN-20240229202522-20240229232522-00283.warc.gz
en
0.920084
1,696
2.53125
3
Hemolytic jaundice is a type of jaundice where the skin takes on a yellowish hue due to released blood pigments. It occurs after many red blood cells have been destroyed (by hemolysis ) by antibodies From the BioTech Dictionary at http://biotech.icmb.utexas.edu/. For further information see the BioTech homenode.
<urn:uuid:a2184eb8-20d1-4bf0-a955-1c618050cf3c>
CC-MAIN-2018-09
https://everything2.com/user/BioTech/writeups/hemolytic+jaundice
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812841.74/warc/CC-MAIN-20180219211247-20180219231247-00142.warc.gz
en
0.837889
83
2.65625
3
On Tuesday 2nd November at 11am (UK time), Prof Catherine Tamis Le-Monda (NYU Steinhardt) and Dr Catalina Suarez-Rivera (UCL) will talk about Principles of Embodied Language Learning: Active Infants in Structured Physical, Social, and Cultural Environments. What are the developmental principles that guide early word learning? And what must researchers know to advance the science of language learning? In this talk, we begin by presenting four principles of embodied language learning that frame our work: (1) Environments are rich, structured, and characterized by regularities that contain the necessary information for infants to learn; (2) Learning and development unfold in real time as behaviors in one domain cascade to behaviors in another domain, and affect other people and contexts; (3) Infants build knowledge by actively engaging with the world; and (4) Language learning is socially and culturally embedded. We next illustrate how our research is grounded in these principles through a set of studies that highlight rich environments, temporal structure, the active infant, and the social and cultural embeddedness of learning. Study 1 highlights the richness of environmental experiences around language inputs, including how caregivers coordinate multimodal behaviors in time in interactions with infants. Specifically, we show that caregivers jointly engage with the objects of infant action through touch, gesture, language, and physical proximity. Study 2 highlights temporal structure of language interactions, including coordination and entrainment among mother and infant behaviors. Using proximity as a model system, we show that bodies in space alter the language experiences of infants. Study 3 further showcases temporal structure of and entrainment in exchanges between infants and mothers, by showing the tight temporal alignment of mother utterances and infant vocalizations. Study 4 spotlights the active infant, showing how infants’ exuberant play—characterized by immense amounts of interactions with objects in brief varied episodes—reliably elicits tactile and verbal inputs from caregivers in the form of multimodal joint engagement. In turn, as mothers jointly engage, infants’ bouts of play are extended in real time. Study 5 reveals the cascading effects of infant play to multimodal joint engagements to infant word learning, in real-time infant production of words and item-level growth in vocabulary. We close by extending basic principles of language learning to infants and caregivers from different cultural, language, and educational backgrounds, highlighting the robustness of learning principles across communities. How to join the seminar Our seminars are free to attend & booking isn't required, just get in touch to request the zoom link or to join the seminar mailing list.
<urn:uuid:c0fc867a-9e8c-42c2-bce3-109182b681c2>
CC-MAIN-2023-14
http://lucid.ac.uk/seminars-news-events-blog/events/online-seminar-principles-of-embodied-language-learning-active-infants-in-structured-physical-social-and-cultural-environments/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00784.warc.gz
en
0.916934
531
2.734375
3
We have to evaluate many things almost every day, starting from books and movies up to someone's work, ideas, etc. If you are not sure about the right way to evaluate something, writing an evaluative essay will be a useful experience. By the way, in the great majority of cases, evaluative essays (also called evaluation essays) that you will have to write in school will be devoted to either books or some films. Purposes of writing evaluative essays might be different. You can write an essay that will make the reader think about his/her own values and ideas on the matter. Your evaluative essay can also be designed to convince the reader to accept your position on the issue. In this case, you need to provide arguments to back up your opinion. Below, we list several components that a good evaluative essay should include. Description of the main subject This is how you start your evaluative essay. Provide as much background information about your subject as you think is necessary. Make sure it is enough for the reader to get this subject. Your judgment in the evaluative essay, in other words, can be called a thesis statement. Arguments will be introduced in the body paragraphs of the evaluative essay. They will support your judgment. Mind that all your arguments should be reasonable. For instance, if you are evaluating a mystery novel, it will be unwise to refer to supporting arguments used for the evaluation of some other genres of literature. Or, if you say that your mystery story has features that are not typical for this genre, prove it with examples taken from the text. If you have no examples, such arguments will not work. At the end, let us say a few words about evaluative essay format. You can follow a standard five-paragraph format. You will also be interested in the principles of evaluating an essay. Essays are the most common academic paper that looks might seem easy to writer. Our free tips will help you to get through any kind of essays. Still, if you are stuck on writing, you can always ask us for help! Our custom written essays are well-structured, professional, and cover the material in-depth. Simply place an order with our custom writing service, purchase the essay using any payment method from available ones (PayPal is available) and get your A+ papers. Buying an essay is easy! Buy your paper now and secure yourself an excellent grade!
<urn:uuid:a266d7a4-6b39-4ea1-8bea-1fdac7a12c03>
CC-MAIN-2017-17
https://custom-writing.org/blog/writing-tips/free-essay-writing-tips/3125.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125849.25/warc/CC-MAIN-20170423031205-00166-ip-10-145-167-34.ec2.internal.warc.gz
en
0.930753
512
2.65625
3
Much has been in the news over the past couple of months about the security vulnerability known as Heartbleed. It is of vital interest to businesses and consumers, but especially so for businesses with products intended to provide security for their users. There are some specific and unique impacts to companies who are planning or are in the midst of obtaining a security certification for any of their products. Here is a quick summary of what the issue is and how it potentially affects your certification activities. What is Heartbleed? Heartbleed is a vulnerability that allows an attacker to access a server’s memory, where sensitive information such as usernames, passwords, encryption keys and other sensitive data may be stored. It does so by exploiting a weakness in OpenSSL, a widely used open-source software used to encrypt web communications. This vulnerability is one of the most significant and disruptive in recent years. How long has Heartbleed been an issue? Even though the issue only came to public attention via media reports in April 2014, the Heartbleed bug dates back to December 2011. It affects OpenSSL version 1.0.1 (released in March 2012) and all subsequent versions to and including 1.0.1f (released Jan. 6, 2014). Beta versions of OpenSSL, version 1.0.2, are also vulnerable. Earlier versions of OpenSSL (0.9.8, 1.0.0) are not affected, nor is OpenSSL 1.0.1g. How widespread is the effect of Heartbleed? OpenSSL is commonly used on servers running Apache and nginx. It’s been estimated that up to half of the active Internet servers in the world use Apache, with another 14 percent using nginx. Websites that were affected by Heartbleed include such prominent names as Yahoo!, OK Cupid, Imgur and Eventbrite. Unaffected were Google, Microsoft, Twitter, Facebook and Dropbox, among others. Beyond https servers, Heartbleed could affect anything that has an OpenSSL dependency, such as VPN implementations, instant messaging clients, email and more. If we are seeking a security validation, do we need to assure evaluators that our product or system is not vulnerable to Heartbleed? Yes, if your product or system uses an affected version of OpenSSL, and your certification work is In Process or In Evaluation. If you determine that it is vulnerable, you will need to mitigate or fix the issue before the evaluation effort can move forward. Each validation process has a different set of requirements for addressing Heartbleed. You will need to check with your specific certification authorities as to how they want you to handle the issue from an engineering standpoint, document the changes you have made, if required, or demonstrate why no changes were needed, if applicable. We have already completed certification for our product. Do we need to recertify? If your product uses an affected version of OpenSSL and it has already been certified or validated, you are not required to recertify. However, we would strongly urge you to demonstrate to your customers, potential customers and other stakeholders that you are committed to information security, and have thoroughly reviewed if your product or system is vulnerable to the Heartbleed bug. You should be prepared to take whatever steps are necessary to remediate the situation, up to and including recertification. If you want direct assistance from Corsec in determining if your product(s) is vulnerable to Heartbleed, we are more than happy to help. Please click here, or email us at [email protected] to request an assessment.
<urn:uuid:55f87ed2-7527-4b99-aa5f-ff8dd5309796>
CC-MAIN-2022-49
https://www.corsec.com/how-heartbleed-affects-your-security-certifications/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710533.96/warc/CC-MAIN-20221128135348-20221128165348-00642.warc.gz
en
0.948451
745
2.75
3
New insights into how diet and medication impact the influence of gut bacteria on our health Research published in Cell on 29th August by the groups of Filipe Cabreiro from the MRC London Institute of Medical Sciences and Imperial College and Christoph Kaleta from Kiel University in Germany has demonstrated that diet can alter the effectiveness of a type-2 diabetes drug via its action on gut bacteria. Bacteria that reside in our gastrointestinal tract, referred to as the gut microbiome, produce numerous molecules capable of influencing health and disease. The function of the gut microbiome is known to be regulated by both diet and drugs such as the drug metformin, which is used to treat type-2 diabetes and has been shown to extend the lifespan of several organisms. However, understanding the complicated, multi-directional relationships between diet, drugs and the gut microbiome represents a considerable challenge. “Disentangling this network of interactions is of utmost importance since the specific mechanism of action of metformin is still unclear,” says Filipe Cabreiro. Video: © MRC London Institute of Medical Sciences A new screening technique Cabreiro and his team developed an innovative four-way high-throughput screening technique to better understand how diet, drugs and the gut microbiome interact to influence host physiology. They used the nematode worm Caenorhabditis elegans colonized with the human gut bacteria Escherichia coli as a simplified host-microbiome model and exposed it to metformin in the presence of hundreds of different nutritional compounds. They found that metformin treatment altered the metabolism and lifespan of the C. elegans host and that these effects could be either enhanced or suppressed by specific nutrients. Crucially, it was revealed that the gut bacteria played a key role in mediating this phenomenon. The importance of the diet and gut bacteria explain why metformin was previously shown to have no effect on the lifespan of another commonly studied organism, the fruit fly. Helena Cochemé, who collaborated on this study says “As it turned out, the typical laboratory food of fruit flies is rich in sugars. After taking away the sugar we also saw positive effects of metformin in fruit flies colonized with E. coli.” Bacterial nutrient signaling is a central modulator of microbe-host-drug interactions Further analysis revealed that bacteria possess a sophisticated mechanism that enables them to coordinate nutritional and metformin signals and to rewire their own metabolism accordingly. As a result of this adaptation, the bacteria accumulate a metabolite called agmatine which was shown to be required for the positive effects of metformin on host health. What about humans? Cabreiro collaborated with Christoph Kaleta from Kiel University to investigate whether the results found in C. elegans could also be observed in the more complex microbiota of humans. They analysed data related to the microbiome, nutrition and medication status of a large cohort of type-2 diabetic patients and healthy controls. “Intriguingly, we found that metformin treatment was strongly associated with an increased capacity for bacterial agmatine production,” says Kaleta. Importantly, they could reproduce their findings in several independent cohorts of type-2 diabetic patients across Europe. Moreover, the bacterial species found to be major producers of agmatine were those known to be increased in the gut microbiome of metformin-treated type-2 diabetic patients. Implications for metformin treatment “Our results shed light on how the complex network of interactions between diet, microbiota and host impacts the efficacy of drugs,” says Cabreiro. “With our high-throughput screening approach we now finally have a tool at hand that allows us to tackle this complexity”. The findings of this study may help to inform dietary guidelines or the development of genetically engineered bacteria that could be used to enhance the beneficial effects of metformin. They may also provide a valuable insight into the evidence that suggests that metformin-treated type-2 diabetic patients are healthier and live longer than non-diabetic individuals. Rosina Pryor, Povilas Norvaisas, Georgios Marinos , Lena Best, Louise Bruun Thingholm, Leonor Quintaneiro, Wouter De Haes, Daniela Esser, Silvio Waschina, Celia Lujan, Reuben L. Smith, Timothy Scott, Daniel Martinez-Martinez, Orla Woodward, Kevin Bryson, Matthias Laudes, Wolfgang Lieb, Riekelt H. Houtkooper, Andre Franke, Liesbet Temmerman, Ivana Bjedov, Helena M. Cochemé, Christoph Kaleta and Filipe Cabreiro (2019): Host-Microbe-Drug-Nutrient Screen Identifies Bacterial Effectors of Metformin Therapy. Cell Published August 29, 2019 Host-Microbe Co-Metabolism Group MRC London Institute of Medical Sciences (LMS) Imperial College London Contact: [email protected] / +44 (0)20-8383-3768 Research Group Medical Systems Biology Institute of Experimental Medicine Kiel University / University Medical Center Schleswig-Holstein Contact: [email protected] / +49-(0)431-50030340 Host-Microbe Co-Metabolism Group MRC London Institute of Medical Sciences (LMS), Imperial College London Medical Systems Biology, Institut für Experimentelle Medizin, Kiel University / UKSH - Filipe Cabreiro’s work was supported by the Sir Henry Dale Fellowship from Wellcome and The Royal Society and the MRC-London Institute of Clinical Sciences at Imperial College London. - Christoph Kaleta’s work was supported by the Collaborative Research Centre 1182 “Origin and Function of Metaorganisms” and the Cluster of Excellence “Precision Medicine in Chronic Inflammation” at Kiel University. MRC London Institute of Medical Sciences is a core biomedical research Institute funded by the Medical Research Council, part of UK Research and Innovation. Based in West London at the Hammersmith Hospital, it is a vibrant research environment in which scientists, clinicians and patients collaborate to advance the understanding of biology and its application to medicine. The LMS pursues world-leading discovery science, and aims to address major health challenges (such as obesity, diabetes, heart disease and cancer), investigate the interplay between genes and environment, and understand the molecular basis of disease, development and ageing. LMS research programmes are supported in their delivery of world-class science by state-of-the-art facilities. LMS research is focused in three sections: Epigenetics, Genes and Metabolism, and Quantitative Biology. The Collaborative Research Centre (CRC) 1182 “Origin and Function of Metaorganisms” is an interdisciplinary network of 80 researchers investigating associations between specific microbial communities and their multicellular hosts. Funded by the German Research Foundation (DFG), it is working on the issue of how plants and animals, including humans, form functional units (metaorganisms) together with highly specific microbial communities. The aim of the CRC 1182 is to understand why and how microbial communities enter into these long lasting connections with their hosts, and what functional consequences these interactions have. In total, the CRC 1182 includes researchers from five faculties at Kiel University, the GEOMAR Helmholtz Centre for Ocean Research Kiel, the Max-Planck-Institutes for Evolutionary Biology in Plön and for Marine Microbiology in Bremen. The Cluster of Excellence “Precision Medicine in Chronic Inflammation” (PMI) is being funded from 2019 to 2025 through the German Excellence Strategy (ExStra). It succeeds the “Inflammation at Interfaces” Cluster, which was already funded in two periods of the Excellence Initiative (2007-2018). Around 300 members from eight institutions at four locations are involved: Kiel (Kiel University, University Medical Center Schleswig-Holstein (UKSH), Muthesius University of Fine Arts and Design, Kiel Institute for the World Economy (IfW), Leibniz Institute for Science and Mathematics Education (IPN)), Lübeck (University of Lübeck, University Medical Center Schleswig-Holstein (UKSH)), Plön (Max-Planck Institute for Evolutionary Biology) and Borstel (Research Center Borstel – Leibniz Lung Center). The goal is to translate interdisciplinary research findings on chronic inflammatory diseases of barrier organs to healthcare more intensively, as well as to fulfil previously unsatisfied needs of the patients. Three points are important in the context of successful treatment, and are therefore at the heart of PMI research: the early detection of chronic inflammatory diseases, the prediction of disease progression and complications, and the prediction of individual responses to treatment.
<urn:uuid:b5a7cdda-86e3-4f97-94f7-b898087f77cd>
CC-MAIN-2021-10
https://www.metaorganism-research.com/news/press-release-new-insights-into-how-diet-and-medication-impact-the-influence-of-gut-bacteria-on-our-health/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178367949.58/warc/CC-MAIN-20210303230849-20210304020849-00108.warc.gz
en
0.891781
1,870
3.078125
3
An image of the original Gewandhaus concert hall KUSC’s Alan Chapman has a lot to say about music, but can he say it in 60 seconds? That’s the Chapman Challenge. We ask a question and Alan has a minute to answer it. Today’s question is from Ken in New Haven, CT, who writes, “Could you please explain the name of the Gewandhaus Orchestra?” Hit play below to listen to this week’s Chapman Challenge on Arts Alive. I’d be glad to and I’ll do it with the accompaniment of this famous orchestra from Leipzig. They’re playing Mendelssohn’s Violin Concerto. Mendelssohn was the conductor of the orchestra from 1835 to 1847 and he wrote the concerto for his concertmaster, Ferdinand David. But the question was about the name of the orchestra. Gewandhaus means “garment house” or “garment hall.” The original Gewandhaus was built in Leipzig in 1501 as a center for the textile trade. When a new Gewandhaus was built in 1781, there was quite a bit of unused space. The mayor of Leipzig suggested that it be turned into a concert hall, understandable in light of Leipzig’s long musical tradition. And the orchestra that performed there soon became known as the Gewandhaus Orchestra. By the time Mozart came there to give a concert in 1789, the Gewandhaus had become the musical center of the city. Since then the orchestra has had two newer homes, one that opened in 1884 and was destroyed during the Second World War, and the current one, opened in 1981. That’s today’s Chapman Challenge. Is there a question you’d like to have answered in 60 seconds? Send it to us at [email protected]
<urn:uuid:eb086859-48af-4abc-95b7-1e7efde5b1e6>
CC-MAIN-2020-40
https://www.kusc.org/culture/arts-alive-blog/chapman-challenge-gewandhaus-orchestra/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400241093.64/warc/CC-MAIN-20200926102645-20200926132645-00480.warc.gz
en
0.956468
416
3.09375
3
LAST year, America's Defence Advanced Research Projects Agency, DARPA, thought it would be a wizard wheeze to organise a robot race across the Nevada desert. The idea of the Grand Challenge, as DARPA grandiosely dubbed it, was for autonomous robot vehicles to steer a 227km (142-mile) course and claim a $1m jackpot. This would be a first step towards DARPA's ultimate goal of being able to build unmanned self-driving military vehicles and thus keep American troops out of harm's way on the battlefield. At the time, the Grand Challenge seemed an embarrassing flop. None of the 13 entrants finished. Indeed, none got more than 12km from the starting line. But, if at first you don't succeed, try, try, try again. And 18 months after the first Grand Challenge ended, the second one set off on October 8th. This year's crop of 23 entrants were offered an even greater incentive—a $2m prize for the winner. That, plus the intervening 18 months, seems to have done the trick. This time, five vehicles finished the 211km course. The winner, a modified Volkswagen Touareg dubbed Stanley by its makers, a team from Stanford University, did it in a mere six hours and 54 minutes. Stanley was, of course, specially hardened by its designers for the rough terrain of the Nevada desert. The clever bit, however, was the vehicle's brain. This was designed and built by the Stanford Artificial Intelligence Laboratory (SAIL). Stanley's brain consists of six top-of-the-range Pentium chips wired collaboratively together. It is programmed with special software that is able to learn from its mistakes. This software mastered the tricks of collision-avoidance in a series of desert test runs conducted before the race started. Like all brains, Stanley's has a range of sensory inputs to process. A global positioning system (GPS) receiver tells it where on the Earth's surface it is. Television cameras, radar and four laser-based distance monitors tell it what its surroundings are like. By comparing its GPS location with its pre-programmed destination (announced only a few hours before the race began, to avoid shenanigans), it knew which way it wanted to go. And, by studying its surroundings, it could work out what looked like the safest route that was also in approximately the right direction. Although Stanley carried off the laurels, the other four finishers did respectably. Sandstorm managed a time just ten minutes behind the winner while her sister vehicle H1ghlander came in ten minutes after that. GrayBot and TerraMax, the other two course-completers, came in at seven hours 30 minutes and 12 hours 51 minutes, respectively. So smart, autonomous vehicles can, indeed, find their way across several hundred kilometres of desert. The question is, what next? DARPA's answer, of course, will be to go down the military route. But this sort of technology has obvious civilian applications as well, as Sebastian Thrun, the head of both SAIL and the Stanford racing team, is keen to emphasise. Dr Thrun thinks that it could lead to self-driving road vehicles within 30 years and—more immediately—to greatly improved collision-avoidance systems. Whether the freeways of California will prove as easy to navigate as the gulches of Nevada, though, remains to be seen.
<urn:uuid:4d45ff7c-d0bd-445c-8ac6-f600eb8f006e>
CC-MAIN-2015-06
http://www.economist.com/node/5017190
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122108378.68/warc/CC-MAIN-20150124175508-00031-ip-10-180-212-252.ec2.internal.warc.gz
en
0.960241
704
3.09375
3
The fight of satyagraha is for the strong in spirit, not the doubter or the timid. – Mahatma Gandhi Civil Obedience Movement: On the historic day of 12th March 1930, Gandhi inaugurated The Civil Disobedience Movement by conducting the historic Dandi Salt March, where he broke the Salt Laws imposed by the British Government. On 5th April 2011 Veteran social activist Anna Hazare started his indefinite fast unto death to press for the demand to involve civil society in formulation of the anti-graft Lokpal (ombudsman) bill. He broke the impasse of 42 years in getting the laws of the land to bring the public official to book – to enact Lokpal Bill. Jamnalal Bajaj (4 November 1884 – 11 February 1942) was a Rajasthani industrialist, a philanthropist, and Indian independence fighter. He was also a close associate and follower of Mahatma Gandhi. Gandhi is known to have adopted him as his son. Several institutions in India bears his name, including the Jamnalal Bajaj Institute of Management Studies. Continue reading →
<urn:uuid:7e716c07-c312-4ab1-9461-ae9630eac379>
CC-MAIN-2017-26
https://jayaribcm.wordpress.com/tag/mohandas-karamchand-gandhi/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00421.warc.gz
en
0.954319
233
3.15625
3
ERIC Number: ED435903 Record Type: RIE Publication Date: 1999-Aug Reference Count: N/A Anthropomorphism in Psychology. This article presents an address on anthropomorphism in psychology. Anthropomorphism assures that human beings are given human characteristics when participating in psychological research. This is significant because the research community does not often report results of studies in the language of feelings, thoughts, or desires, which has led to the pathology of psychology. The paper gives the historical perspective on why this pathology has developed in the profession, and concludes that psychology must be tolerant of the unknown, or the mystery of life. (JDM) Publication Type: Opinion Papers; Speeches/Meeting Papers Education Level: N/A Authoring Institution: N/A Identifiers: American Psychological Association; Anthropomorphism; Aristotle; Hume (David); Kant (Immanuel); Skinner (B F) Note: Paper presented at the Annual Convention of the American Psychological Association (107th, Boston, MA, August 20-24, 1999).
<urn:uuid:4257b218-10f6-4825-8c60-c457db039544>
CC-MAIN-2016-30
http://eric.ed.gov/?id=ED435903
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469258951764.94/warc/CC-MAIN-20160723072911-00118-ip-10-185-27-174.ec2.internal.warc.gz
en
0.859584
224
2.734375
3
Income Tax Basics Every taxation system requires assessment. So does the Income Tax Laws of India. Assessment simply means determination of Tax. This tax is determined as per Taxation laws existing in that particular Assessment Year. What constitutes income is a very dynamic concept – as that is determined through mix of legislation, court judgement, custom, business practice etc. Many times, there are retrospective amendments in law that leads to change in amount of income for particular assessment year (AY), and consequently change in tax liability. Here we may remember that the process of Assessment comes when income has already been earned or accrued. Consequently first the income year comes and the year next to income year is the assessment year. For example the Assessment Year 2009-10 would relate to income year 2008-09. Here in common parlance, the income year might be called ‘financial year’. However, the Income Tax Act of India prefers to call it ‘Previous Year’. Person – One who earns Income The ‘Person’ who is under assessment is called the Assessee. The Person / Assessee can be an Individual / HUF / Firm / LLP / Cooperative / Company / AOP / BOI / Artificial Juridical Person. Types of Income Tax is assessed (ie. determined) under the following heads of income: 2) House Property 3) Business / Profession 4) Capital Gain 5) Other Sources Now it is understood that these heads of income would be applicable depending on type of assessee. For example a Company or Firm etc cannot earn salary. – only an individual can earn it. Types of Assessment Here we focus on the various procedures of assessment. Under Income Tax Act 1961, there are the following types of assessment: 1) Sec 140 A – Self Assessment 2) Sec 143 (3) – Regular / Scrutiny Assessment 3) Sec 144 – Best Judgment Assessment 4) Sec 147 – Assessment / Reassessment of Income Escaping Assessment Here we shall not deal with search and seizure situations. Normal Procedure of Taxation The usual process of Taxation is: 1) The assessee earns income 2) He deposits tax – based on self calculation – or as determined by his Tax Consultant 3) The assessee fils Income Tax Return (ITR) Income Tax Return (ITR) Here it may be noted, that just paying tax is not enough. The ultimate thing is the ITR. This ITR can be called a self declaration of information containing various sources of income earned and tax paid. The Government requires ITR because, in absence of that, it would not be able to understand as to what amounts and from what sources the assessee has earned in the year, and what taxes has to been paid by the assessee. Here without going into details, it might be added, that the ITR under normal course should be filed u/s 139(1). This section describes the normal time limit of filing the ITR – which is for non-audit cases is July 31 of the Assessment year, and for audit cases September 30 of the Assessment year. Generally, a person who has income above the minimum exemption limit (without giving effect of any sections of IT Act) is obligated under law to file ITR. However assessee eg a Company has to file ITR compulsorily whether it earns profit or not. Also, a person, who has income below the minimum exemption limit, though not required by law, is not barred from filing ITR. Often people having income below the minimum exemption limit also file ITR – and the motivation for filing it varies – it can be that someone wants a Credit Card or a loan from some Bank or NBFC, or has to produce the ITR for getting some contract. Many of those who return such income are genuine cases. However, there are others who would try to manipulate law for their ends. For example, some people who are in receipt of black money – file ITR in name of their wives or other relatives – showing that these relatives have earned it through some activity like coaching or teaching or sewing center! This way they make some of it white – without paying any tax! It is even possible that such an assessee is not in receipt of the amount that is being shown in ITR – it is just to get benefit of Credit Card or a personal loan that they file ITR. Also, sometimes, ITR is filed for the purpose of getting refund of TDS. Had there been no TDS, the person might not have required filing ITR. Legally one should return only that much income which s/he earns. However our Income Tax laws are so complicated – that people would take advantage of it in different ways and sometimes in a wrong way. Need for Checking by IT Dept Often people may think that IT Dept would not be concerned if any person files ITR showing income of Rs. 85,000 – when the exemption limit is Rs. 150,000. But I have seen that even Assesses returning such low level of income as Rs. 83,000 come under net of scrutiny assessment! Then there are also mal-practice in case of many assesses who earn high income. The usual tendency is to show less income so as to pay less tax. This is quite prevalent among Company assesses and Trusts. Often, such malpractice of returning less income is deliberate. But sometimes, it can even be due to ignorance of law or mis-application of law. Given this situation – where the culture of honesty is not there in society – whether deliberate or by design or by ignorance of law – the IT Department has come out with its own ways and procedures of assessement. Every year it comes out with a list of assesses – which is a certain percentage of assesses – of which it does detailed scrutiny. The list is generated by computer (Computer Assisted Scrutiny System (CASS)) based on certain pre-defined criteria, as determined by the IT Dept from time to time. Examples of such criteria: 1) All returns where deduction claimed under Chapter VIA of the Income tax Act is Rs. 25 lakhs or above in stations other than the cities on computer network. 2) All cases where total value of International Transactions (as defined u/s 92 B of the Income tax Act) exceed Rs.15 crores) etc. Usually every year, the IT Dept comes out with number of such criteria – which it considers fit cases for detailed scrutiny. Here it may also be added that u/s 2(7) Assessee means a person by whom income tax or any other sum of money is payable under this Act, and includes (a) every person in respect of whom any proceeding under this Act has been taken for the assessment of his income or of the income of any other person in respect of which he is assessable, or of the loss sustained by him or by such other person, or of the amount of refund due to him or to such other person ; (b) every person who is deemed to be an assessee under any provision of this Act ; (c) every person who is deemed to be an assessee in default under any provision of this Act ; Consequently the department can issue assessment notice to any person – including non-asessees and non residents – if in opinion of department such person is liable to tax. The other thing is that the above-mentioned types of assessments are assessment under different conditions or (legal) situations or stages. It would be even more appropriate to call them different procedures of assessment. Because ultimately – and simply stated – assessment is determination of tax. One cannot determine different tax for same income at different times (till one is following the same law for the particular AY). It is basically the kind of information that the IT Dept has with itself that it undertakes to assess the tax liability under the different provisions. 1) Self Assessment u/s 140 A: This simply means that the person is calculating his own tax liability and thereafter filing ITR after payment of self-calculated tax. Since assessee himself calculates the tax and income returned – it is called self-assessment. However, the system of self-assessment is only to make the work of IT Dept easier – it is not the end of assessment. It is simply paying tax and filing of Return by the assessee. The IT Dept only gives an acknowledgement / intimation u/s 143(1). The assessee can file ITR as Self assessment under the different sections of 139 (Return within due date / Belated Return / Return of Loss etc.) or in response to notice u/s 142(1) or 148 or 153A The Self Assessment also covers case where one has filed IT Return – and some Refund is due. Then when the IT Dept processes the Return and sends the Refund Cheque (Income Tax Refund Order) – it is sent under cover of ‘Intimation u/s 143(1)’ There is no assessment order by the Dept. under Self Assessment simply because, the assessment is not being done by the department. In my opinion the self-assessment should only be considered an exercise in filing of ITR – and just – the first step in the process of assessment(s) that are undertaken by the department. If the Dept does not take up the case for any further assessment – then there is nothing else to do. Since the assessment is not being done by the IT Department, for legal purpose the acknowledgment / intimation by IT Department is not considered as ‘Assessment’. 2) Regular / Scrutiny Assessment u/s 143(3): For this notice is issued u/s 143(2). The salient features are: This notice can be issued only when the assessee has furnished Return of Income u/s 139(1) or 142(1) The notice u/s 143(2) has to be served on the assessee within six months of expiry of financial year in which the return was furnished. Only 3% to 5% cases are taken for scrutiny assessment The Assessing Officer (AO) is not required to possess any ‘reason to believe’. In this assessment AO is charged with the duty to ensure that the assessee: - has not understated income - has not computed excessive loss - has not under paid taxes Also, the AO may require documents / proof from the assessee – on which the AO would make his assessment and calculate the tax liability. Sometimes, AO may also wish to physically verify the Creditor etc! Also while the scrutiny assessment is in process, the assessee can also put forth claims that he had not done in the ITR – and these have to be considered by the AO. Consequently, in his assessment u/s 143(3) the AO can even reduce income below the returned income or assess loss higher than the returned loss. The assessment u/s 143(3) is completed with an assessment order in writing – which should contain the tax computed under the signature of AO. Under this AO can also do protective assessment – ie. assess the same income in hands of more than one person till it becomes clear in whose hand the income should be assessed. Protective assessment is undertaken so that there is no loss to Revenue. If assessment u/s 143(3) is done on basis of invalid return – the assessment order continues to operate – till it is invalidated by the court. On remand (ie. if the cases goes to ITAT on some points, and ITAT sends it back to AO for reconsideration or correction on question of fact or law) only the specific point can be dealt by the AO. On remand, the AO cannot bring in new sources of income or open new issues. Assessment made under this section would be final and the department cannot open the case again – unless there are valid reasons (‘reasons to believe’). These are dealt in reassessment proceedings. Best Judgment Assessment 3) Best Judgement Assessment u/s 144: Conditions: - Assessee fails to furnish ITR u/s 139(1) and has not furnished it u/s 139(4) - fails to comply with all terms of notice u/s 142(1) - fails to comply with direction issued u/s 142 (2A) - fails to comply with terms of notice u/s 143(2) Then the AO to the best of his judgment can determine the income and tax payable by assessee based on records possessed by AO. Prior to proceeding on assessment u/s 144, the AO should give a show cause notice to the assessee. However if the AO has already issued notice u/s 142(1)(i) and the assessee has not complied with its terms, then AO can go ahead with assessment and no show cause notice is required. U/s 144 AO cannot assess income below returned income and cannot assess loss higher than the returned loss. Even in case there is no return for the year, the AO has to base his calculation on certain logical/rational/scientific and reasonable ways viz. based on ratios, growth rate of industry / sector. The assessment order should therefore be a speaking order. Assessment u/s 144 can also be resorted to if AO is not satisfied with the correctness / completeness of Books of Accounts. Also the AO can reject Books of accounts u/s 145 if assessment proceedings are in process u/s 143(3) / 144 / 147 / 153A – and in such case, the AO shall assess the income and tax to the best of judgement (ie. as per the requirements / procedure of sec 144) and complete assessment proceedings under the particular section under which the proceedings are going on. 4) Assessment / Reassessment of Income Escaping Assessment u/s 147: To undertake assessment u/s 147, notice has to be issued u/s 148. Before issuing notice u/s 148 the AO shall ‘record his reasons’ for issuing the notice. The notice has to be issued separately for each AY for which proceedings are to be taken up u/s 147. The assessee has to file Return in response to notice u/s 148 – even if he has filed the return previously within due date. Also, the AO is duty bound to provide the assessee the reasons recorded by him – if the assessee requests for it after filing Return of Income in response to the notice. If on request the reasons are not supplied – then the AO cannot proceed u/s 147. If there has been no previous assessment u/s 143(3) or 144, then proceedings u/s 147 is called assessment, else it is called re-assessment. Also assessment / re-assessment u/s 147 cannot be undertaken for any AY, if assessment proceedings are already underway under any other section of IT Act. In this the most important thing is that the AO should have ‘reasons to believe’ that income chargeable to tax has escaped assessment. In proceeding under this sections, the AO can also consider any other income under any head of income that comes to his detection subsequent to issue of notice u/s 148. However, u/s 147 can only relate to issues of underassessment – and unlike assessment u/s 143(3), the AO cannot reduce income or increase losses.. This assessment can be undertaken whether the Assessee has filed return or not – or whether any assessment has been undertaken previously or not. This is because, the section 147 speaks both of assessment and also reassessment. Reasons to believe includes: 1) There has been retrospective change of law – either by legislation or due to court order (usually Supreme Court)– and the AO finds that the assessee needs to be re-assessed in light of the new law / rule that is to be applied retrospectively. 2) Evidence that has come to notice of AO. This evidence can be from any source – including any other assessment proceedings or information received from revenue intelligence etc. 3) Mistake apparent from records The interesting thing is that it is only necessary that there is prima facie some material on basis of which the case can be reopened. The sufficiency or even correctness of material is not to be considered at the stage of opening / reopening of caseu/s 147. However reasons to believe does not include – rumors, gossips, suspicion or change of personal opinion of AO. Now, the assessment u/s 147 and 143(3) (and also 144) is sort of linked. After all, any assessment can be done only on scrutiny of records. Now as previously mentioned – to take up assessment u/s 143(3) – notice u/s 143(2) has to be served on the assessee within six months of expiry of financial year in which the return was furnished. Now take an example – the assesse “X” has filed Return for AY 2006-07 based on income for the FY 2005-06 within due date of 31-July-2006. For doing scrutiny assessment u/s 143(3), Notice u/s 143(2) can be issued upto 30-Sept-2007. Now suppose there is no action by the department and no assessment proceedings are undertaken by the department. Now suppose, in the May 2009, the AO concerned while doing assessment of some other case comes to understand that for “X”, for the AY 2006-07, certain amount of income has escaped assessment. Now in May 2009, the AO cannot issue “X” notice u/s 143(2) for doing assessment u/s 143(3). But now he can do the assessment u/s 147. So, he would issue him notice u/s 148 on 30-May-2009 for opening assessment proceedings u/s 147. Now in response to this notice – “X” files return in 5-June-2009. Now this return is treated as return u/s 139. Now AO can issue him notice u/s 143(2) till 30-Sept-2010 to call for various documents and records and undertake to scrutinize the documents and compute/recomputed assessable income and tax. The assessment shall be considered to have been carried out u/s 147. If the AO issues notice u/s 143(2) after 30-Sept-2010, then the proceeding u/s 147 would be void. Now consider, that in the above case – in response to notice u/s 147, the assessee “X” does not file any return. Then AO shall proceed u/s 147 to the Best of his Judgment to assess the income and tax. In doing assessment as per Best Judgement, the AO shall be bound by the procedures of Sec 144. U/s 148 notice can be issued till the end of six years from the end of relevant AY. There are various criteria laid down as to whose sanction is required and the monetary limits etc. But suffice here to say that notice u/s 148 cannot be issued after expiry of 6 years from the end of relevant AY – whatever may be the income escaping assessment. What has been described above is to explain how the assessment procedure works in Income Tax Law. There are also assessment procedures relating to cases under search / seizure. But that has not been dealt here – that would take up another article to write about. As such, for any case that is undertaken for assessment by the department– there are various issues relating to date of issue / receipt of notice, assessee approaching CIT (Appeals) or filing writ petition in High Court, changes happening in IT laws/ regulations through Court proceedings in other similar cases, and various circumstantial ‘ifs and buts’. All these tend to complicate the assessment proceedings. And that is apart from – at times – illegal gratification for ‘satisfaction’ of AO – which at times happen (In one of the seminars, a popular Income Tax author commented that the ‘satisfaction’ of AO was more important than the correctness of accounts!). All these things tend to influence a case under assessment. However, in matter of illegal demands by AO, I would say, that in one of the case I saw (as trainee) u/s 143(3), the AO was ‘asking’ for certain ‘large’ amount. The Assessee initially was ready to pay upto Rs. 5000 – but refused to pay more. As no bargain could be struck, the Assessee did not pay anything. And thereafter the assessee struck to his point that he would not pay anything – even telling the AO that he could do whatever assessment he wished to do! Finally the assessment happened without any exchange of money – and the assessment order made tax demand of around Rs. 850 (only!). So if one is correct in his stand and has disclosed his income properly – then there is nothing to fear. Also, as such, there are honest officers in IT Department. It is just another department of government (or just another organisation) having mix of good and bad. The assessment is feared by people who hide income, and it is they who try to bribe IT officials to get a favourable assessment. Sometimes ‘black-sheep’ AOs can also demand money – but then one should not pay up if one is correct. To be honest does cause some procedural harassment – but end result is usually in favour of the honest.
<urn:uuid:6ab49547-1f22-4226-8800-86596dade3dd>
CC-MAIN-2014-41
http://indiapoint.net/finance/2009/12/03/assessment-income-tax/
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663711.39/warc/CC-MAIN-20140930004103-00286-ip-10-234-18-248.ec2.internal.warc.gz
en
0.956712
4,528
3.578125
4
American Flags in Wheatland WY 82201 – Made in USA Unlike other countries, USA only has 2 nationwide symbols: the bald eagle, and the American flag. While the bald eagle is worldwide recognized, the American flag is an icon recognized worldwide. The American flag includes thirteen alternating horizontal stripes of equivalent size, of which seven are red in color and 6 are white. In the upper-left edge, also known as the canton, is a blue rectangular shape, on which are laid out fifty white five-pointed stars. Although the American flag was adopted officially in 1777, back then there was no definition connected to the colors. The same colors were used in developing the Seal of the United States of America in 1782, having specific meaning. The meaning behind the colors of the flag are as complies with: “White represents purity and also virtue. Red, hardiness & valor. Blue, represents watchfulness, determination & justice”. Ever since 1777 when it was first taken on officially, the American flag has gone through several modifications to reach its current style. Quick History of the American Flag The history of our flag is as fascinating as that of the country itself. It has survived fights, influenced songs and also advanced in response to the growth of the country it represents. The following is a collection of intriguing facts as well as customs about the American flag and just how it is to be presented: - The flag is usually displayed from sunup to sunset. In stormy weather condition, the flag must not be flown. - The flag ought to be presented everyday and on all vacations, weather permitting, on or near the primary administration buildings of all public organizations. It needs to also be presented in or near every polling place on election days and also in or near every schoolhouse throughout school days. - When shown flat against a wall surface or a window, or in an upright orientation, the “Union” area of stars must be uppermost and also to the left of the viewer. - When the flag is raised or lowered as part of a ceremony, and as it passes by in parade or review, everybody, other than those in attire, must deal with the flag with the right hand over the heart. - The United States flag ought to never be dipped towards any person or things, nor needs to the flag ever touch anything under it. Over the years, lengthy guidelines have been put in place for how to take care of the flag. You may observe some individuals are even brought to tears when the flag is honored at ceremonies and events. The flag may be embellished with golden edge surrounding the border of the flag as long as it does not deface the flag proper. Ceremonial displays of the flag, such as those in parades or on indoor places, usually make use of fringe to improve the appearance of the flag. Likewise, when the flag is fastened to the right side of an automobile of any kind (e.g. cars), it must be placed to ensure that the “Union” is towards the front of the vehicle, as if the flag were streaming in reverse from its hoist as the automobile moves forward. Therefore, American flag decals on the right sides of cars may appear to be reversed, with the union to the viewer’s right instead of left as even more commonly seen. On June 14, 1777, the Continental Congress passed an act establishing an official flag for the new nation. The resolution specified: “Resolved, that the flag of the United States be thirteen stripes, alternating red as well as white; that the union be thirteen stars, white in a blue field, standing for a new constellation.” On Aug. 3, 1949, President Harry S. Truman officially proclaimed June 14 as Flag Day. Retiring your Old American Flag Most American Legion Posts consistently conduct a sensible flag burning ceremony, typically on Flag Day, June 14th. Numerous Cub Scout Packs, Boy Scout Troops, and also Girl Scout Troops retire flags routinely. Get in touch with your neighborhood American Legion Hall or Scout Troop in Wyoming to inquire about the accessibility of this service. Which Flag is Right for You? There is a huge selection of American flags to pick from consisting of hand flags, interior flags, banner flags and exterior flags from different vendors. Whether you’re looking for an excellent deal on hand flags to offer out throughout a parade or would certainly like to spend in a top notch outside flag to display at your company, there’s definitely a flag fit for you. Printed vs Fully Sewn Flag – A printed flag is an image that is printed on the nylon product. An attached flag is made by joining the individual pieces of colored textile with string. Chain vs Lock Stitch – A chain sewed flag will totally untangle if one string is torn, however that will not happen with a lock sewed flag. G-SPEC Flag – The G-SPEC flag is for use by the U.S. federal government. The dimensions are made to the main government hoist fly proportion of 1:1.9. The star areas are larger and they are primarily bought for display at army bases. American Flags made in America Look for flag suppliers that are members of the Flag Manufacturers Association of America which developed the “Certified Made in the U.S.A” accreditation program of American Flags. Based on the FMAA website,” ‘Certified Made in the U.S.A.’ accredits that your American flag has been made in the United States of products that are residential in origin and that all processes in every action of its manufacture were finished in U.S. centers with U.S. labor”. ZIP codes in Wheatland we serve: 82201
<urn:uuid:c3205707-5b4b-409d-b6c5-3a6041f5b30e>
CC-MAIN-2017-39
http://americanflagnet.com/buy-american-flag-wheatland-wy-82201.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689897.78/warc/CC-MAIN-20170924062956-20170924082956-00361.warc.gz
en
0.955574
1,205
2.828125
3
9. Marine Tenure and Precedence Contestation: A Village Destroyed1 This chapter will discuss a conflict between Sather and Tutrean villages on the northern coast of Kei Besar Island (Map 1-2). This conflict is very important for a comprehensive understanding of the problem of communal marine tenure in the Kei Islands. This is not only because the conflict was very cruel and had persisted through almost a century, but because the conflict questions the very foundation of traditional communal marine tenure. By looking at the history of the conflict and examining the failure of attempted solutions initiated by the Dutch and Indonesian governments, this chapter will argue that even in the context of tradition, the concept and practice of communal marine tenure are problematic. This is because controls over territorial and political domains are two main points of contestation over precedence between different traditional segments of the community. Thus, although the triggering factor has been associated mostly with the sea territory, the core issue of the conflict between Tutrean and Sather villages was a traditional contestation over precedence between the mel and the ren.2 For the noble of Tutrean, controlling the sea territory of Sather Village is a symbol of their precedence over the free people of Sather. For Sather villagers, having their own sea territory was a symbol of their freedom. Since tradition has taught them that fighting for their territory is a legitimate reason for ‘war’, conflict was inevitable. When a Village was Burned to Ashes In the beginning of this book, I described an incident involving the burning of Sather Village by Tutrean villagers in 1988. (See Plates 9-1 and 9-2 for images of the reconstruction) This is not an isolated conflict between the two villages and is one example from a limitless series of incidents that have occurred during almost a century of conflict. Conflict over coastal boundaries alone can be traced back as far as 1935. From that time on, particularly when the Trochus shell became economically valuable in the 1950s, rarely did a year go by without a fight. The climax was the incident I described. Plate 9-1: A Sather elder standing in front of the foundation of a destroyed house. A new house was built in the back of the foundation. Source: Author’s photograph. Plate 9-2: A house (with accompanying clothing line) now resides on the foundation of a home that was destroyed during the 1988 Sather village fire. Source: Author’s photograph. Ironically the destruction of Sather Village did not stop the ‘war’, as it is commonly called. Spears, stones and curses are still exchanged between the people of these villagers. For example, during a year-long research excursion in the Kei Islands from February 1996 until March 1997, I heard that four fights broke out between the two villages, all of them triggered by fishing activities conducted by either party in the disputed area. Several attempts have been made to settle this conflict. On 20 February 1936, the Dutch representative arranged a meeting of the committee consisting of the Dutch representatives and prominent kings in the Kei Islands. The meeting, held in Weduar Village (Figure 9-1), discussed the conflict between Sather and Tutrean. At the end of the meeting, a conclusion concerning the boundaries of the two villages was reached and a legal decision was then issued.3 However, at least one of the parties was not satisfied with this decision and the conflict continued. A second attempt was made in 1939 when the Dutch cancelled the 1936 ruling and signed another decision establishing the boundaries between the two villages. As with the first decision, the second ruling was not strong enough to restrain both parties from violent behaviour. Another attempt was initiated by the Maluku Tenggara head of regency in 1990, two years after the village of Sather was burned to ashes. The head of regency—a Keiese— arranged a customary court in Elat on Kei Besar Island. After his attempt to resolve the conflict between the two villages failed, the head of regency urged the Sather villagers to bring the case to the Maluku Tenggara regency court in 1993.4 This was the third attempt to solve the conflict. The Sather villagers brought the case to the court in Tual in 1995 who decided that Sather villagers and the descendants of Kapitan Liberth Rahantoknam both shared use right over various territories. However, all parties were not satisfied and they appealed the case to the provincial high court. In 1997, just before I finished my fieldwork, the decision from the high court was handed down in the regency court. I do not know how the villagers responded to this decision but judging from the distribution of the disputed sea territory in the decision, the Sather and Tutrean villagers will appeal to the Supreme Court and the conflict will continue. The following discussions will examine the nature of the conflict by looking at its development over time. I will start by looking at the narratives of origin that describe relations between these two villages. As we will see, the narratives of origin were the starting point for conflict between the two villages. I will then discuss the conflict during the Dutch period examining the interventions of the Dutch and the reactions of the Sather and Tutrean villagers toward these interventions. Finally, I will discuss the controversy surrounding the customary court that took place in 1990, the Maluku Tenggara Regency court hearing, and the Maluku provincial court hearing. Narratives of Origin and the Conflict Conflict between the Sather and Tutrean villages was present even in the narratives of origin. This is very obvious if we listen to the narratives told by the noble of Tutrean and the free people of Sather. Although the narratives from both parties address the same issue—the ‘history’ of the current Sather domain—the two versions are very different. The narrative told by the Tutrean villagers goes as follows: In the ancient time, Sather and Tutrean were two separate villages. Each was autonomous: each controlling its own territory and governing its own domain. At a particular time, conflict broke out between these two villagers. The conflict led to a war. Many people from Sather village were killed. Fearing for their lives, the rest of the Sather villagers fled to the island of Dullah in the Kei Kecil Archipelago. So, the Tutrean villagers won the war and, since there was no one left in Sather Village, [the] Tutrean claimed ownership over the territory. They called this territory as the ‘land of victory’ (tanah kemenangan). This particular segment of the Tutrean narrative was used as the basic reference of their argument that the Tutrean territory covered two units of territory. The first unit was their own while the other unit was the ‘land of victory’—the former Sather village territory. When they were asked about their sea territory boundaries, the Tutrean villagers would point to Yewukil which marked their coastal boundary to the north. This was the boundary between Tutrean and Weduar villages. In defining their boundary to the south, the Tutrean villagers would point to Wautkowar. This was the coastal boundary between the current Sather and Kilwat villages. The Tutrean narrative also recounts the followings: Some time later, two groups of people came to the former Sather territory. These groups were seen by Yayat Rahabeat who reported their arrival to Tabal Tanlain, the leader of Tutrean village. Tabal Tanlain met them at the shore where they had landed. He asked these people who they were and their intentions. These people answered that they were ren Waer Waw and ren Waer Rat, from Waer,5 a village on the northern coast of Kei Besar. Their intention was to find a place where they could live. When these meeting[s] were concluded, Tabal Tanlain decided to allow them to live in a place named Ohoi Twu. In return these people were asked to take care of the ‘land of victory’ (tanah kemenangan). These people were the ancestors of the present Sather villagers. In the course of their life, members of the Waer groups and their descendants often committed serious mistakes that were subject to severe punishment. For example, one of the mistakes involved some people from Ohoirenan who were taking a rest and having a meal on their way to Elar. Six people of the Waer, who were collecting seashells and fish in the coastal area, called them suanggi.6 The people of Ohoirenan got angry and brought these six people to Ohoirenan. They reported to the head of their village that the six people had humiliated them. The head of Ohoirenan Village held a customary court that decided that these people had violated the customary rules. They were fined in the form of traditional wealth.7 The head of Ohoirenan Village sent a courier to Tutrean to inform them about the case. Having been informed of what had happened; Tabal Tanlain paid the fine in the form of a gong, an antique canon (lela), and an elephant tusk. When the fine was paid, the six persons were sent back to their houses. Similar events directed to people from different villages occurred again and again. And the noble of Tutrean were forced to pay the fines. For the noble of Tutrean, the above narrative fragment clearly shows that the current population of Sather is descended from free outsider people. The narrative implies that the ren of Sather are ‘bought people’ whereas the original meaning of ren means free people (see Chapter Four). This is because, according to the narrative, the ancestors of these people were those who were bailed out when the Tutrean noble paid their fines. It was a common belief that those who were bailed out became dependant or were ‘owned’ by the person who paid for them. Therefore, although the noble of Tutrean have never referred to the Sather villagers as the iri, they treated them as such because they believed that their ancestors bought them like slaves. These descriptions were used as the basic argument of the mel at Tutrean when they said that the ren of Sather had no political rights on their domain. According to the mel, it was clear that by definition, the ren were excluded from taking part in the political life of the domain (see Chapter Four). In fact, the ren of Sather as dependant ren, were considered to be almost equivalent to the iri. Therefore at the very least, the Sather villagers had no right to have a village head from among their own people. Regarding territory, the narrative also notes that the ren of Sather are very different to the ren who sprung from the land or from animals living on the land—that is, the ren who hold the title of lord of the land. Thus from the mel point of view, the ren of Sather have no special attachment to the place where they live. Therefore they are not entitled to posses the land and sea. They only live there because Tabal Tanlain was generous enough to allow their ancestors to live at Sather. The ren of Sather reject this narrative, of course, and propose their own version instead. Their narrative says that their territory was part of a large kingdom called Tabab Yam Lim. The kingdom was led by Tabal Tamangil, who lived at the current Tamangil Nuhuten Village and divided his territory into five distinct territories. These are the current Tamangil, Kilwat, Sather, Tutrean, and Weduar Village territories. The first, the territory of the current Tamangil Village, was given to Rahanar, Ohoiner, and Badmuar.8 The second, the current Weduar village territory, was given to Wowoa and Rahawarin. The third, the current Sather village territory, was given to Jamco and Jamlaai. The fourth, the Tutrean territory, was given to Safik. The last, Weduar territory, was handed over to Rahajaan, Limduan, and Rafo. Each of these people then became the lord of the land in each territory. This narrative was used by the ren of Sather in opposition to the narrative of the mel of Tutrean. It was the basic reference point for their claim that their village was a separate territory from that of Tutrean and the other three villages of Tabab Yam Lim. Therefore, they argued that the Tutreans’ claim over Sather territory had no ‘historical’ basis. The owners of Sather territory, Jamco and Jamlaai, were the lords of the land (see Plate 9-3). Concerning the immigrants Waer Waw and Waer Rat, the Sather narrative states that they were accepted by the lord of the land of Sather, not by the Tabal Tanlain in Tutrean. Therefore their arrival had nothing to do with the mel in Tutrean. From the point of view of the ren in Sather, this again is proof that any claims that the Waer groups were the dependants of the Tutrean mel were false. Plate 9-3: An elder of Yamko fam showing an antique betel nut container which serves as proof of his authenticity as land lord of the Sather village. Source: Author’s photograph. In brief, the narratives told by the Sather villagers justify two claims: first, that their village is a distinct domain and is independent from Tutrean, except that they were once both within the domain of Tabab Yamlim. Second, that the people of Sather are independent ren who do not belong to or under the control of another group of people. For the ren of Sather, these two claims demonstrate that they hold full rights over their territory as well as the right to govern their own domain. The Dutch and the Conflict The people of Maluku have experienced many changes since their first contact with the VOC and the Dutch colonisers back in 1605. The changes mostly arose from attempts by the VOC and the Dutch colonisers to achieve the economic and political goals of their occupation, such as the incorporation of local traditional social organisations into the Dutch political organisation. This was the colonisers’ way of creating connections to the local people without making new structures that could be economically expensive and perhaps ineffective. This strategy was designed not to change the local political structure, given that such changes could have created disturbances in the community which would have caused problems for the Dutch. However, this incorporation did lead to noticeable changes in the community. First, the Dutch government became involved in appointing traditional leaders and their treatment of these leaders was based on Dutch political assumptions rather than on the principles of traditional social organisation. Second, local people used the incorporation of their traditional structures into the Dutch political organisation in order to pursue their own political needs in the community. In Chapter Two, I discussed a case where a leader in Faan village used the Dutch government and the Catholic mission to appoint him as a king in opposition to the King of Tual. The following case concerning conflict between Sather and Tutrean villages is another example and in examing it, we will see that both villages manipulated Dutch involvement in their struggle. The beginning of the conflict between Tutrean and Sather villagers, as people remember it, dates back to some time between 1910 and 1920 when the people of Sather began to demand that they be able to govern their own domain.9 The people of Tutrean refused their proposal and it was decided that one of the leaders in Tutrean, Kapitan Liberth Rahantoknam, would be sent to live in Sather and be appointed leader of this village. Thus, although Sather became a separate village, they were still controlled by the noble of Tutrean. Sather villagers felt cheated by the decision. At that time, the leaders of Sather were divided into two groups. At a meeting which was mediated by nobles from Weduar and Ohoinangan villages, the leaders were asked to discuss whether they would accept the appointment of Kapitan Liberth Rahantoknam as their village leader. Each of these groups was told that the other group had accepted the proposal. Understanding that their fellow villagers in the other group had agreed, the Sather village leaders in both groups accepted the proposal. The Dutch government issued a letter of appointment for Kapitan Liberth Rahantoknam as the traditional village head of Sather in 1917. This was good news for the Tutrean villagers because this appointment meant that the Dutch government accepted the ‘truth’ of their narrative of origin. This also led to the belief that the Tutrean nobles had won the contestation about the village leadership. From the point of view of the people of Sather, Kapitan Liberth Rahatoknam’s appointment was disadvantageous. First, it signalled that they had lost their contestation on the issue of the village leadership, and second, this appointment brought about a new notion regarding the position of traditional village head. Traditionally, at least from the noble’s point of view, there was a distribution of power between the village leader or traditional village leader and the lord of the land. The former held power on political issues in the village, while the latter controlled issues of territory. The Dutch notion of village leadership did not distinguish between these two issues. In the Dutch conception, a traditional village head controlled both political and territorial issues. For example, the traditional village head was appointed as tax collector on land use and harvest—a position previously controlled by the lord of the land. This was interpreted by the Sather villagers as loss on the second battleground of their contestation, which was control over village territory. Having been discredited by this new arrangement, the people of Sather moved to reject it. In 1927, they killed Kapitan Liberth Rahantoknam. This incident was even more controversial and profound because it was conducted by the Sather war commander who was considered to be representing the entire village. The killing was also carried out in Tual, the capital city of the region just as a big festival to welcome a Dutch official arriving from Ambon was occurring. It is not clear whether the killing of the traditional village leader represented only a rejection of his appointment or whether it was a well-planned effort to remove the connection between Sather and Tutrean. Either way, the action was effective. The death of Kapitan Liberth Rahantoknam left the position of the traditional village head vacant which led to the appointment of the former traditional settlement head as the acting traditional village head. The dream of the Sather villagers came true. The former traditional settlement head was Constantinus Domakubun, a Sather villager. With Constantinus Domakubun in the position of traditional village head, Sather was free from the domination of the noble in Tutrean. Sather became a distinct village with its own political domain. Half of the contestation had been won. Figure 9-1: Tutrean and Sather coastal boundaries and sea territories, 1939. Source: Adapted from Dutch Resumé (1939). In 1935, the Sather villagers pursued the other half of their dispute with the Tutrean village by contesting the village’s coastal boundaries. The dispute led to an open conflict resulting in the second Dutch involvement in 1936.10 In 1939, the Dutch again became involved in attempting to resolve the conflict. The 1936 legal decision was cancelled and a new one dated 11 September 1939 was issued. This legal decision stated that before the two villages reached an agreement on both the land and sea boundaries of their villages, they should comply with the following arrangement (Figure 9-1): The area marked Zone A on the map,11 an area on the southern side of Matbur is for Sather. Zone C, the area on the northern side of Nurnar is for Tutrean. Zone B is a shared territory for both Sather and Tutrean with the following conditions. All private property in the house gardens and cultivated fields in Zone A and C that have been acknowledged should be considered as they are. The use of uncultivated land in Zone B is only permitted after the approval of the Dutch representative in Elat who will consider the matter based on the information from the village functionaries of both villages. Rights over meti Taat12 are taken from the two villages. A special committee consisted of the Dutch Domestic Administrator of Kei Islands, the Dutch representative in Elat, and a representative of the King of Fer who were responsible for arranging the use of this zone. The benefits taken from meti Taat will be distributed to both villages proportionally based on the size of population. Since the population of Tutrean is 473 and Sather has 346 people, the proportion will be 57.75 per cent and 42.25 per cent for Tutrean and Sather respectively. If both villages comply with this arrangement, an official will measure Zone B to identify the existing ownership over the garden. The committee will decide the ownership of the garden. It is not permitted for Sather to choose a traditional village head of their own, if they do not follow this arrangement seriously. It should be emphasised that these arrangements should be considered as a temporary settlement. It will be invalid once both villages reach a new agreement of their land and sea boundaries. The new agreement can be strengthened with a legal formal decision by the Grooten van Hoofden (translated and adapted from the Indonesian translation of the legal decision, legalised by the Maluku Tenggara Regency Court). It is interesting that this legal decision not only concerns the boundaries of the two villages, but also the internal politics of Sather village. In terms of sea boundaries, the decision verified the assumption that as a distinct village, Sather had its own territory. Regarding the village leadership however, the legal decision reverted to the environment that existed prior to the killing of Kapitan Liberth Rahantoknam in 1927. Although the legal decision does not explicitly state that if Sather did not comply with the new arrangement it would be under the leadership of the noble of Tutrean, this is the clear implication. Indeed, this became the reality when Gotlief Rahantoknam, a son of Kapitan Liberth Rahantoknam, was installed as traditional village leader in Sather in 1942. As with previous interventions by the Dutch, this one did not satisfy the Sather villagers either. In fact, they considered the legal decision to be that of the Tutrean noble and legalised by the Dutch government. All of the decisions were made by prominent leaders in Kei Kecil and Kei Besar who were noble and who probably had affinal relationships with the noble of Tutrean. Thus, from the perspective of the Sather noble, the decision was unlikely to be fair. The Indonesian State and the Conflict The incorporation of the Kei Islands and all of Southeast Maluku into the modern Indonesian state also led to many changes in rural communities. However, the most rapid changes occurred during the New Order Regime (1966–98) when former President Soeharto carried out various economic development projects based on centralisation and homogenisation. Centralisation refers to government policies that were mostly crafted by central government agencies based in Jakarta. Homogenisation refers to government policies that were applied indiscriminately in all regions of Indonesia and paid little attention to the heterogeneity of Indonesian communities. These policies introduced new structures to local communities. For example, state policy introduced the concept that every citizen is the same before the law. For those communities that have relatively strict systems of social stratification—such as in the Kei Islands—this is new and contrary to their traditional norms. The Indonesian government also formally replaced the traditional village with the modern village, and state courts with traditional courts.13 The policies also provided an additional new context to the conflict between Sather and Tutrean. For the Sather villagers, the history of the conflict had taught them that tradition had almost always marginalised them given that traditional institutions were mostly considered to be the privilege of the noble. The involvement of the Dutch was also seen to favour the noble because the Dutch relied on traditional institutions to pursue their interests and actively made use of the influence of the noble, adopting them as collaborators. So for the Sather villagers, the application of modern state norms and institutions that did not discriminate between the noble and free people created the hope that a new door had opened which might lead to victory in their conflict with Tutrean. Interestingly, the noble did not view the introduction of these new norms and institutions as a threat. For the noble, the new arrangements were not regarded as replacing tradition but enriching it. Since newly introduced state ‘traditions’ mostly dealt with power and resource distribution, they believed that this ‘new tradition’ would operate to their advantage. I mentioned earlier that Gotlief Rahantoknam, son of the first traditional village head Kapitan Liberth Rahantoknam, was appointed the traditional village leader of Sather in 1942. Interestingly, during his leadership Gotlief Rahantoknam seemed to distance himself from the noble of Tutrean. In fact, according to some Tutrean informants, Gotlief’s acts were in accordance with the will of Sather villagers. For example, he allowed some Sather villagers to open new gardens and cut trees in the disputed territory without any consultations with Tutrean. For the noble of Tutrean, these actions amounted to Gotlief’s betrayal of his position as a representative of Tutrean nobility. This period was the beginning of the split between the Tutrean noble and the descendants of Kapitan Liberth Rahantoknam. The Sather villagers were happy with what Gotlief did as traditional village leader. This was the behavior they had been hoping for since Kapitan Liberth Rahantoknam’s leadership. A descendant of Sather’s war commander even told me that if Kapitan Liberth Rahantoknam had governed as his son did, he would not have been murdered. In the beginning the villagers resisted Gotlief’s appointment, but when he began to serve the people well, they changed their mind and supported his leadership.14 Gotlief was the first traditional village head in the period of the Indonesian government. In 1957, the Indonesian official in Elat issued a letter appointing him the traditional village head of Sather Village. Sather villagers supported his appointment and in fact, wrote a letter to an Indonesian official at a similar level to the subdistrict head in Elat that nominated Gotlief for the position. The letter stated that Gotlief Rahantoknam was the descendant of the first traditonal village head, thus the proper candidate from the perspective of tradition. Gotlief was also considered to be a man who had good relations with villagers and others, was capable of leading people in development programs, and was prepared to take responsibility for dealing with the problems of land and sea boundaries between Sather and Tutrean. This time, it was the Tutrean villagers who protested. In 1959, a petition signed by 13 noble leaders in Tutrean was sent to the Indonesian government representative in Elat. The petition explained their objections to the appointment of Gotlief Rahantoknam and demanded that the Indonesian government freeze the position of the traditional village head in Sather until they had settled the boundaries between the two villages as per the Dutch legal decision of 1939. The letter also said: The position of Gotlief Rahantoknam as the traditional village head of Sather does not mean that he is an original Sather villager, he only fills the vacuum of Sather village organisation, replacing his dead father who was a living historical fact [that the village organisation of Sather] is from, by and for Tutrean [the traditional village head] represents the right of Tutrean over the Sather village and its people for both internal and external matters. [This explanation] means that [the people of Tutrean] cancel their mandate to Gotlief Rahantoknam to represent their interest at Sather. (translated from a letter signed by 13 members of the committee of leaders in a village (saniri) 10 July 1959). According to the statement above, the noble of Tutrean considered Gotlief Rahantoknam to have acted more as a Sather villager than a Tutrean noble. Therefore, he did not represent the interests of Tutrean any more. These circumstances might lead us to conclude that conflict between the noble and the free people was not relevant anymore because Rahantoknam and his descendants who are noble joined the free people of Sather. However, this is not the case and this becomes evident if we follow the development of the conflict. In fact what happened is that the conflict became even more complex because this situation marked the beginning of the split within the noble group. Previously, the conflict was only between the free people of Sather and the noble of Tutrean but at this stage the noble came to be divided into two groups—the noble of Tutrean and the descendants of Kapitan Liberth Rahantoknam.15 Therefore, the conflict eventually came to be between three parties, and while the conflict between the two noble factions was significant, the longstanding conflict between the noble and the free people continued. Since Gotlief Rahantoknam retired in the early-1960s,16 no one among his descendants was interested in taking his position, but neither did they allow any of the other Sather villagers to take the position. Interestingly, the Maluku Tenggara regency leaders supported their objections most of the time. Therefore, from Gotlief’s retirement until I finished my fieldwork in 1997, Sather Village was for the most part without a formal leader. I was unable to locate any information on who organised the village from the 1960s until the implementation of the Village Law No. 5, 1979, but after the village law was implemented, the village was mostly led by an administrative caretaker from the Kei Besar sub-regency office. The above account indicates that despite the popularity of Gotlief’s leadership, the Rahantoknam fam was not on the side of the Sather villagers. Their actions in preventing Sather villagers from taking over the leadership was made easier because Gotlief’s son (Mr FL) was the leader of the ‘village government’ division at Maluku Tenggara Regency Office, which was responsible for village head elections. He told me that in the course of his leadership in the division, he had cancelled the village head election at Sather twice. The reason was that no Sather villagers had consulted him on the matter as they should have because he was a descendant of the first traditional village head. This is one example that illustrates the amount of control the nobles had over the local bureaucracy. Furthermore, if we check the leading positions in the local regency and sub-regency government offices, we find that these positions are in the hands of the noble or outsiders who because of their positions, become colleagues of the noble. This has not happened by chance and in fact there has been a continuous effort by the noble to maintain the status quo. To give an example, in the 1980s, the governor of Maluku appointed the sub-regency head of Kei Besar, who happened to be a free person. As a newly appointed official, the sub-regency head arranged a meeting in his office to introduce himself to all of the village heads under his control. When the time came, not one of the village heads turned up. The reason for their absence was, as some informants told me, because he was a free person. ‘How can a free person lead nobles?’ an informant told me, quoting the reason uttered by a village head. Another informant explained, ‘If he needs us, it is him that should come, not expecting us to see him. That is not the way it should be’. This incident was repeated several times before the sub-regency head gave up. Within six months of his appointment, he’d signed a letter of resignation and sent it to the Governor of Maluku Province. The Governor transferred him to another place outside the Kei Islands. In light of the political circumstances discussed, I will now examine the issue of sea boundaries. From the petition signed by the Tutrean leaders, it was evident that conflict over sea boundaries was still an issue in the 1950s, and conflicts in the decades that followed resulted in the intervention of the sub-regency head of Kei Besar in 1987. On 20 July 1987, the sub-regency head invited the leaders of the two villages to discuss a possible solution to the dispute. The group agreed that the conflict would be brought before the court. Sather villagers would lay claim to the territory while the Tutrean villagers would be the defendants. However, this agreement was not implemented due to the burning of Sather Village in April 1988 which was detailed in the first page of this monograph. As the conflict developed into a ‘war’, the regency head of Maluku Tenggara regency was prompted to intervene. Interestingly, he still tried to deal with the conflict in terms of tradition. The regency head via the head of the social and political division in his office, requested the head of the sub-regency in Elat to arrange a customary court which was held from 22 to 27 January 1990. The customary court was led by a committee consisting of prominent leaders from both the nine group and the five group, most of whom were kings (see Chapter Two). Several hearings were held to question the representatives from both villages and examine evidence. Finally, on 27 January 1990, after several hearings and a field trip to the disputed coastal region, the committee reached the following decisions (detailed in Figure 9-2):17 1. The boundary between Tutrean and Weduar up to Sarwarin is controlled by Tutrean. 2. From Lestar to the boundary between Sather and Kilwat is controlled by descendants of Kapitan Liberth Rahantoknam and Sather. 3. From Sarwarin up to Lestar is controlled by descendants of Kapitan Liberth Rahantoknam (Customary Court Decision, Elat, 27 January 1990). Figure 9-2: Tutrean and Sather coastal boundaries and sea territories, 1990. Source: Adapted from Customary Court Descision (27 January 1990). These decisions were based on the following considerations:18 - That the main issue of the conflict was the location of meti Taat. According to Sather representatives, the location of meti Taat was from Nurnar to Lestar while Sather representatives pointed to a location from Sarwarin to Lestar. - Tutrean representatives recognised the right of Kapitan Liberth Rahantoknam’s descendants by explaining that when leaders of Tutrean requested Kapitan Liberth Rahantoknam to live and lead Sather village, they gave him an area from a point called Year Karwin to Lestar within meti Taat. Therefore, they believed that Kapitan Liberth Rahantoknam’s descendants owned this area. - Since both villagers acknowledged that Kapitan Liberth Rahantoknam was the traditional village head of Sather,19 the Tutrean sea territory boundaries that formerly bordered with Weduar on the north side and Kilwat on the south side changed. [This was taken to mean that because Sather village had a traditional village head, they had their own territory.] The decision by the customary court was disputed. Sather villagers were the most upset with the decision and if we examine the basic arguments of the decision, it is possible to understand why. The last two arguments were consistent with the Tutrean narrative that Sather Village was once under their control. From the perspective of the Sather villagers, the acceptance of the Tutrean version misled the committee in deciding the boundaries between the two villages as well as the location of Meti Taat. The effect of the decision was that Sather Village was not given control of any part of the territory. In reality, Sather villagers had refused to attend the customary court. When the regency head of Kei Besar Island informed them of his plan to organise a customary court, they objected. In a letter dated 18 February 1990 and directed to the head of the Maluku Tenggara regency, the leaders of Sather explained that their objections were based on their desire to see those who burned their houses brought to justice.20 They also informed the regency head that soldiers were pressuring them to attend the customary court by coming to their homes on the morning of the first day of the court sitting. In accordance with their agreement with the Tutrean villagers which had been arranged by the sub-regency head before the incident, the Sather villagers appointed a lawyer to bring their boundary dispute case to the regency court. I believe they must have known that the outcome of the customary court would be in favour of the Tutrean noble. Before I continue discussing the regency head’s response to the Sather villager’s objection, I will discuss the links between the customary court and the political circumstances of the conflict. I mentioned earlier that the appointment of Gotlief Rahantoknam marked the beginning of the split between the noble of Tutrean and the descendants of the traditional village head. The decision of the customary court—led by a good friend of Gotlief’s son— to allocate a section of sea territory to Kapitan Liberth Rahantoknam’s descendants illustrates the split. In fact, the customary court’s decision was used to gain an even greater portion of the disputed sea territory when Rahantoknam’s descendants brought the case to court. The case was brought to Maluku Tenggara Regency Court in October 1993. Sather villagers initiated the case claiming that Tutrean villagers21 had violated their sea territory. Later on, the descendant of Kapitan Liberth Rahantoknam lodged another claim that as the descendants of the first traditional village head, they had the right to the disputed sea territory. Origin narratives, written documents, and witness evidence were discussed in the various hearings of the case. Finally after almost 18 months, the judges handed down their decision on 19 April 1995. As illustrated in Figure 9-3, it was ruled that: 1. Tutrean villagers have the right over the sea territory between Ohoimel and the boundaries with Weduar sea territory. 2. The descendants of Kapitan Liberth Rahantoknam controlled the territory between Sarwarin and Lestar. 3. Sather villagers and the descendants of Kapitan Liberth Rahantoknam shared use right over the territory between Ohomel and Sarwarin as well as from Lestar to the village sea boundary with Kilwat (translated from Maluku Tengara Regency Court Decision, 19 April 1995, No.20/pdt.G/1993 /PN.TL). Figure 9-3: Tutrean and Sather coastal boundaries and sea territories, 1995. Source: Adapted from Regency Court Descision (15 April 1995). Like the previous decisions, this court decision was also rejected. The three parties appealed the case to the hight court in Ambon on May of the same year. In August 1996, the High Court in Ambon cancelled the regency court decisions and stated the following (see Figure 9-4): Figure 9-4: Tutrean and Sather coastal boundaries and sea territories, 1996. Source: Adapted from High Court Descision (5 September 1996). That Sather villagers owned the sea territory from Lestar to the sea border with Kilwat, and That meti Taat (from Nurnar to Matbur) was owned by Kapitan Liberth Rahantoknam’s descendants as an inheritance (author translation from Maluku Province High Court Decision 5 September 1996). I do not know how the three parties responded to this decision because when I finished my fieldwork, the regency court had just received the decision. None of the parties involved were aware of it. However, judging from the distribution of the territory, my guess is that Sather and Tutrean villagers would not be satisfied. This is because from their perspective, the distribution of the sea territory was worse than that of the disputed Dutch legal decision in 1939. The legal decision of 1939 decided that Zone B was under the control of a special committee with the harvest distributed proportionally to both villages, but the High Court decision ruled that the territory called Zone B belonged to the Rahantoknam descendants. Therefore, it was likely that the Sather free people and the Tutrean noble would appeal to the Supreme Court. The conflict, both in terms of legal pursuit and practical resource use on the disputed sea territory, was likely to continue. The conflict between Tutrean and Sather villages demonstrates that the concepts and practice of marine tenure are embedded in the social structure of the community. The question of who owned what had a lot to do with the perceived owner’s position in the community. In particular, the ‘who’ being referred to here are the social entities—the noble and free people. If the question of communal ownership was directed to the noble, they would respond that the free people were excluded from ownership.22 The free people had a different perspective of communal property and would argue that it was the free people who were the lord of the land of their territory. We would also likely find different definitions of communal ownership if we asked different factions within the noble, which is demonstrated by the conflict between Kapitan Liberth Rahantoknam’s descendants and the noble of Tutrean (see also Chapter Six). In addition, the embeddedness of marine tenure in the social structure of the community is also illustrated by its inseparability from the political issues of the domain. If the political domain was not in the hands of the noble, questions about control of the territory would be answered differently. I believe that was why the first movement of the free people at Sather was towards gaining a traditional village head of their own. This movement was their political strategy to demonstrate that their village was a distinct and independent domain. If they had succeeded in removing the connection with the noble of Tutrean, their ability to pursue their own approach to communal property would have been enhanced. In conclusion, I should also say that communal sea and land territory, as well as control over political domains were fields of contestation between the noble and the free people over precedence. On one hand, the noble insisted on defining their relationship with the free people as hierarchical, which was why they insisted on control over both the political and communal property domains. On the other hand, the free people assumed that their relationship with the nobles was a form of precedence—the noble controlled the domain of politics and the free people controlled the territorial domain. Even if they were both in the same domain, from the free people’s point of view, there should have been a distribution of power. Given that they were actually in different domains, the free people should have been completely independent from the noble. Finally, these conflicts revolve around tradition. The division of the Kei people into three social strata is a tradition. It is tradition that puts territorial and political domains as indexes of social status. And it is tradition that is the root of the Kei people’s belief that no discussion of tradition is valid unless it concerns the narrative of origin. Adherence to tradition will perpetuate the conflict between Tutrean and Sather because of their conflicting narrative of origin. 1 A shorter Indonesian version of this chapter was published in Adhuri (1998b). 2 At the latter stage of the conflict, the mel broke up into two factions, which caused the conflict to then involve three different parties. Yet, it did not eliminate the hierarchical dimension of the conflict between the mel and the ren. 3 Unfortunately, this legal decision was not available and no one knows what the outcome was. 4 Actually the head of sub-regency at Kei Besar had urged both villagers to bring the case to court before Sather village was burned. 5 This narrative assumes that these people were free people driven away from their homeland. Thus, this narrative is not the same as the narrative that explains the history of social rank formation (see Chapter Four). 6 Van Hoëvell (1890: 127) noted that suanggi was a bad spirit in the shape a person who had magical power to cause disease and illness. Those who were proven to be suanggi were killed and their corpses thrown into the sea. Therefore, the accusation of being a suanggi was the worst accusation that could be made. 7 The traditional wealth consists of gong, antique cannon and plate, and gold ornaments of different kinds. 8 All the names mentioned as those who received the distribution of the territory were considered to be the original inhabitants of the villages. 9 It seems that prior to this period, Tutrean and Sather were organised as a single village with a single leader based in Tutrean. Thus, the narrative of ownership by the Tutrean nobles might hold some historical truth. 10 Due to the Japanese invasion in World War II, the struggle for Indonesian independence, inclimate weather and other factors, many legal and historical documents have been lost or destroyed. I was unable to locate the 1936 legal decision so I can not explain what exactly the decision was, but neither party agreed with the decision and conflict between the two villagers continued. 11 I did not find the original map related to the legal decision. Therefore, the map produced to clarify this legal decision was based on the contemporary information. 12 The location of meti Taat is disputed. Sather villagers refer to zone B, while Tutrean villagers point to the coastal area between Sarwarin and Lestar. 13 See Chapters Two and Six where the relationships between traditional and modern structures are discussed in detail. 14 The people of Sather believed that Gotlief Rahantoknam’s actions indicated he had adopted the mel’s perspective of his leadership. This understanding was explicitly mentioned in their legal debate at a session in the Southeastern Maluku Regency Court. They argued that the appointment of Rahantoknam as traditional village leader of Sather not only meant that Rahantoknam lived at Sather, but also that he socialised as a mel. 15 There were Rahantoknam fam members at Tutrean as well, but they were on the side of the Tutrean noble. 16 I could not verify whether his retirement was because of the petition of the mel of Tutrean or for other reasons. 17 The regency head who initiated the customary court strengthened the previous customary court decision with his decree No. 116/KDS/1990, dated 5 April 1990. 18 The considerations were not expressed in the exact way as done in this list, but because I am attempting to analyse the issues, I have paraphrased what is stated in the decision letter. 19 The committee of customary court had arranged for both villages to sign a letter stating that they accepted that Kapitan Liberth Rahantoknam was the traditional village head of Sather. 20 The burning of the village was brought to a criminal court. The regency court judge who handled the case sentenced 16 out of the 21 suspects to two years in jail. However, they appealed to the high court in Ambon and the Supreme Court in Jakarta. They were freed on appeal until the Supreme Court on 13 February 1996 decided to support the criminal court’s decision. 21 Actually, some other parties were mentioned in the legal document prepared by Sather villagers but in the court hearings they were not discussed. 22 I should note that parts of a territory are distributed to fam or families for ownership. Therefore, the term communal property refers to areas that are not subject to fam or family ownership.
<urn:uuid:2188ad6e-3a09-4697-ac38-4bbf6c5f3fd9>
CC-MAIN-2014-23
http://press.anu.edu.au/apps/bookworm/view/Selling+the+Sea,+Fishing+for+Power/10391/ch09.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510261249.37/warc/CC-MAIN-20140728011741-00305-ip-10-146-231-18.ec2.internal.warc.gz
en
0.980809
10,040
2.859375
3
What treatment methods are most appropriate for various contaminations When the water starts boiling, it is foolish to turn off the heat. Nelson Mandela There are a number of ways to make water palatable in the field, each with different merits on ease and effectiveness of decontaminating water. Often, it’s worth having a few options available in case one fails. Editor’s pick: Lightweight UV radiation pen with a backup of chemical tablets. Heat How to use heat to treat water The boiling method is used for killing living contaminants (bacteria, viruses and protozoa) found in a water supply. It does not sterilise the water, but instead, damages living pathogens enough to kill or prevent them from replicating. Water must be heated to boiling point 100℃ at sea level then have a rolling boil for at least one minute, and three minutes if above 2000 metre altitude. Since water boils at a lower temperature at higher altitudes, the extra time accounts for the difference in temperature. Advantage: no specialised equipment required since billy and stove is already part of usual multi-day bushwalking gear. Disadvantages: Water takes time and fuel to treat, and time to cool down enough to drink or decant to other containers. Hard to do efficiently in large quantities quickly. Extra fuel is needed. Chemical How to use chemicals to treat water Chemical treatments are effective against viruses, bacteria, protozoa. Examples of chemical treatments include Iodine denatures proteins in any living matter. 2% formulation five drops per litre, ten drops per litre if cloudy. Allow to stand for 30 minutes before drinking. Advantages: Likely to be already carrying this in your first aid kit. Lightweight. Disadvantages: takes time to be effective. Unpleasant chemical taste, potential adverse health effects if used for prolonged periods. Chlorine Dioxide products sterilizes water by disrupting critical processes by living matter. Micropure tablets – use one tablet for 1 litre of water and take 30 minutes for bacteria and viruses, 2 hours for Giardia in clear water. Aquamira drops require two solutions to be mixed and take 15 minutes to treat water. Advantages: Generally accepted to be more effective than iodine, better tasting and better for health. Lightweight. Disadvantages: Must be careful to pack the tablets so that they don’t get crushed. Takes time for water to be safe to drink (30 minutes – 2 hours). May have to pre-filter water if organic substances are present because they will inactivate many chemical treatments. Radiation (UV) How to use radiation (UV) to treat water Radiation treatment is effective against viruses, bacteria and protozoa. UV light sterilizes water by damaging the nucleic acids of pathogens that are involved in reproduction. Cellular RNA and DNA absorb UV energy, which breaks necessary bonds in these molecules. Without the ability to reproduce the pathogens cannot spread and infect. So UV light do not kill or remove pathogens, but rather de-activates them. The steripen can sterilise 0.5 L water in a minute. It is generally most effective against bacteria and viruses, and less so against Protozoa because of their thicker cell wall. The water source is preferably as clear as possible because any organic matter in the water reduces the effectiveness of the UV treatment by absorbing UV light. Users must remember to recharge for every trip, and carry spare batteries for extended trips. Advantages: Water immediately ready to drink; doesn’t taste funny. Disadvantage: Need to carry backup water purification methods in case of machine failure or batteries running out in the field. Filtration How to use filtration Filtration can be used to remove macroparticles using cloth fabric or microparticles using specialised pumps. 1 Macro-filter using fabric Most simply, fabric-filtering removes large sediments include floating leaves, sticks, mud and other debris, but no harmful pathogens. Water can be effectively filtered through a clean t-shirt, handkerchief, bandana, coffee filter paper or a commercial pre-filter. Advantage: no specialised equipment required other than clothes! Disadvantage: doesn’t remove harmful pathogens 2 Microfilter using a pump Microfilter pumps remove bacteria, protozoa, cysts and sediments, and sometimes but not always viruses. In general, water is pumped through pores of 0.2-0.3 µm diameter depending on the model, leaving bacteria, protozoa, cysts and sediments behind. The Katadyn Hiker Pro does 1 L/min. Filters and cartridges may need regular replacement depending on how dirty the water is. Advantage: Water is ready very quickly (the “Katadyn Hiker Pro” does 1 L/minute). Disadvantages: Need to carry backup water purification methods in case pump breaks in the field; does not necessarily remove viruses. Technical support from Katadyn says: “Due to their tiny size, viruses can theoretically not be removed with a 0.2 micron (or any physical) filter. Nevertheless, long-term experience in the field has indicated that Katadyn Filters can retain viruses. This surprising fact can be explained: Viruses have an electrical surface charge that attaches them to other particles or materials. Therefore, the tight pore structure of the Katadyn Filters removes the viruses attached to particles from your drinking water.” 3. Microfilter by sucking A much cheaper form of filtration is the LifeStraw, where the user sucks clean water through a filter before drinking. This method removes bacteria, protozoa, cysts and sediments, but not microscopic minerals, chemicals and viruses. Water is pumped through pores (0.2-0.3 µm diameter depending on model) leaving bacteria, protozoa, cysts and sediments behind. This lasts for 1000 litres (approximately a year of drinking water). Advantages: Water immediately drinkable. Filter lasts for approximately a year. Disadvantages: Doesn’t remove microscopic minerals, chemicals, or viruses. Only can be used by one person at a time. Short straw length means that you need to be at the water source to drink. That is, clean water cannot be carried to camp. Alternatively, stick it into a wide-brimmed water bottle, but this can be fiddly. An alternative is the Sawyer bottle. Desal How to make salt water drinkable While humans cannot drink salt water straight, it’s possible to use a de-sal unit to make the water palatable. Portable reverse osmosis units are available and can be used in emergency situations. They work by manually pumping water through a semipermeable membrane that removes enough salt to make it palatable. The size of the pores are so small that extremely pure drinking water is produced, but the process is slow. Katadyn claims to have the world’s smallest desal unit called the Survivor 06, which produces 0.89 litres of water per hour at a pumping frequency of 40 pumps per minute. While this is achievable in an emergency situation, it’s not that practical on a multi-day coastal bushwalk.
<urn:uuid:8f4aa25c-9d5a-466a-a11c-e905dd470ad6>
CC-MAIN-2023-40
https://www.bushwalking101.org/water-treatment-methods/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510520.98/warc/CC-MAIN-20230929154432-20230929184432-00545.warc.gz
en
0.906259
1,525
3.265625
3
Paul Dirac receives the Max Planck Medal. Paul Dirac publishes “The Principles of Quantum Mechanics”. Paul Dirac receives the Nobel Prize in Physics, with Erwin Schrödinger, for the discovery of new productive forms of atomic theory. Paul Dirac receives the Copley Medal. Paul Dirac dies in Tallahasse, Florida. Paul Dirac attends the Merchant Venturers’ Technical College (later Cotham School), where his father teaches French. Paul Dirac becomes an honorary fellow of the Institute of Physics in London. Paul Dirac publishes “The Quantum Theory of the Electron”. Paul Dirac marries Margit, Eugene Winger’s sister, from Budapest. Margit already has two children, Judith and Gabriel, who Dirac adopts. The couple have two children together, Mary Elizabeth and Florence Monica. Paul Dirac becomes an honorary fellow of the American Physical Society. Paul Dirac completes his primary education at Bishop Road Primary School. Paul Dirac is accepted to study mathematics in St John’s College, in Cambridge, and is awarded a scholarship. The amount of money, however, is not enough to pay for the living costs in Cambridge, and the foreign nationality of Dirac’s father prevents him from further financial support. Dirac frequents a Bachelor of Arts degree at the University of Bristol instead, with no tuition fee. He skips the first year of the course due to his former education in engineering. Paul Dirac becomes a Fellow of the Royal Society. Paul Dirac is born in Bristol at his parents’ home, and grew up in Bishopston. His father, Charles Dirac, is originally from Saint-Maurice, Switzerland, and works in the UK as French teacher. His mother, Florence Holten, comes from Cornwall and works as a librarian at Bristol Central Library. The couple had a daughter, Betty, and another son, Felix, who committed suicide in 1925. Dirac will later comment on their parents characteristic negligence and his father’s authoritarianism. Paul Dirac holds a 1851 Research Fellowship from the Royal Commission for the Exhibition of 1851. Paul Dirac, after graduating from Bristol, receives a scholarship from the Department of Scientific and Industrial Research. This allows him to finally move to St John’s College in Cambridge, where he studies the theory of general relativity and quantum physics, under the supervision of Ralph Fowler. He completes his PhD in 1926, with the first thesis on quantum mechanics worldwide. Paul Dirac retires from Cambridge and moves to Florida, USA, where he carries on his research at the Florida State University and at the University of Miami. Paul Dirac finishes his studies on electrical engineering at the University of Bristol, co-located with the Merchant Venturers’ Technical College. Paul Dirac becomes professor of physics at the Florida State University. Paul Dirac visits the Institute for Advanced Study in Princeton, where he meets Eugene Winger, whose sister he would marry at a few years later. Paul Dirac lectures on cosmology and non-dimensional combinations of world constants at the Physical Engineering Institute in Leningrad. His connection to Russia dates back to 1929, and he has visited the country several times, except during the period between World War II and 1957, when he is forbidden to travel to the Soviet Union by the British government, due to his work in atomic energy. Paul Dirac is appointed Lucasian Professor of Mathematics at the University of Cambridge, where he remained for 37 years.
<urn:uuid:061e2a11-6487-4d3a-a3d6-ca24aac2a6ff>
CC-MAIN-2016-40
http://www.mediatheque.lindau-nobel.org/life-paths/laureate-dirac
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660992.15/warc/CC-MAIN-20160924173740-00006-ip-10-143-35-109.ec2.internal.warc.gz
en
0.952572
741
2.75
3
What factors affect the color of meat and poultry? Myoglobin, a protein, is responsible for the majority of the red color. Myoglobin doesn't circulate in the blood but is fixed in the tissue cells and is purplish in color. When it is mixed with oxygen, it becomes oxymyoglobin and produces a bright red color. The remaining color comes from the hemoglobin which occurs mainly in the circulating blood, but a small amount can be found in the tissues after slaughter. Color is also influenced by the age of the animal, the species, sex, diet, and even the exercise it gets. The meat from older animals will be darker in color because the myoglobin level increases with age. Exercised muscles are always darker in color, which means the same animal can have variations of color in its muscles. In addition, the color of meat and poultry can change as it is being stored at retail and in the home (see explanation in question 5). When safely stored in the refrigerator or freezer, color changes are normal for fresh meat and poultry. Does a change in color indicate spoilage? Change in color alone does not mean the product is spoiled. Color changes are normal for fresh product. With spoilage there can be a change in color -- often a fading or darkening. In addition to the color change, the meat or poultry will have an off odor, be sticky or tacky to the touch, or it may be slimy. If meat has developed these characteristics, it should not be used. If the color of meat and poultry changes while frozen, is it safe? Color changes, while meat and poultry are frozen, occur just as they do in the refrigerator. Fading and darkening, for example, do not affect their safety. These changes are minimized by using freezer-type wrapping and by expelling as much air as possible from the package. What are the white dried patches on frozen meat and poultry? The white dried patches indicate freezer burn. When meat and poultry have been frozen for an extended period of time or have not been wrapped and sealed properly, this will occur. The product remains safe to eat, but the areas with freezer burn will be dried out and tasteless and can be trimmed away if desired. Provided by the United States Department of Agriculture
<urn:uuid:8a241a86-25d5-45cb-bcb8-e643b12ce3a2>
CC-MAIN-2014-10
http://www.wtoc.com/story/4685992/meat-and-poultry
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010746376/warc/CC-MAIN-20140305091226-00010-ip-10-183-142-35.ec2.internal.warc.gz
en
0.941025
471
3.484375
3
The UK will be the first country to roll out a Covid-19 vaccine beyond stage-three clinical trials with 800,000 doses to be given to high-priority people, including healthcare workers and the vulnerable, from next week. The Pfizer/BioNTech vaccine is the same one Australia will roll out from March. The two-shot vaccine is also being assessed by the US drug regulator, and a similar authorisation is expected to be made shortly for a rollout in mid-December. Why, then, are Australian authorities saying the 10m doses of the vaccine it has secured will not be available until March? Why is the UK distributing the vaccine so quickly? The UK is still reporting more than 10,000 cases every day and is fast approaching 60,000 deaths, a very different situation from Australia where there has barely been any community transmission for more than a month. Many British hospitals are overwhelmed. In Australia, as of 3 December, there were 13 active community cases – 10 in South Australia and four in New South Wales. The UK has authorised the vaccine without complete data from clinical trials, which is still being assessed by Pfizer/BioNTech. That is why the UK decision is an emergency authorisation, not a full regulatory approval for distribution to everyone. Given the situation is urgent in the UK, it makes sense to approve the vaccine for the elderly and health workers while regulators wait for the rest of the data. It’s a cost/benefit decision – waiting is likely result in thousands more deaths, and sick and furloughed health workers. The risk of an unforeseen, serious adverse reaction to the vaccine is low compared with the risk of many more people becoming infected and essential services reaching breaking point. In Australia, teams of doctors, scientists, toxicologists, engineers, facility inspectors, pharmaceutical industry experts and other staff working with the Therapeutic Goods Administration are already looking at the available data, which amounts to tens of thousands of pages. Regulators expect to receive the full data by late January and will wait to analyse this as well. The UK uses a catchment system to determine where citizens should seek medical treatment. Given its smaller geographical size, the logistics of large-scale vaccination will not be as complex. Even so, the UK prime minister, Boris Johnson, has said there will be “immense logistical challenges”, especially because the vaccine must be stored at minus 70C. Australia has time to sort out these logistics and learn from the UK’s experience. “Any break in the cold chain can render a vaccine ineffective,” says Prof Lyn Gilbert, an infectious diseases physician on Australia’s infection control expert group. “We also need improved vaccine safety monitoring as these are brand new vaccines, and sometimes rare side-effects only become apparent post-licensure, because clinical trials may not be powered to detect very rare side-effects.” Does this mean the UK is a guinea pig? The vaccine has already been tested on tens of thousands of people in clinicial trials. And while the full data isn’t available, there is enough to have convinced UK regulators the vaccine is generally safe and effective, especially when weighed against the impact of the virus. The CSIRO’s health and biosecurity director, Dr Rob Grenfell, says after stage-three clinical trials, drugs are usually rolled out in a “limited phase release” or a “limited community release” to certain population groups. “Regulators will watch what happens in that population carefully and they can stop the rollout at any time if they are concerned.” In the UK, the vaccine is first being given to groups well studied during clinical trials, such as elderly people and health workers. A similar situation occurred in Australia for the Gardasil cervical cancer vaccine, which is now available worldwide. After stage-three trials, it was first tested in Australian girls and later boys, before being broadened to a national and then global immunisation program. “If Australia can get this vaccine out by March that’s going to be the fastest it’s ever been done in this country,” Grenfell says. “The TGA should be allowed to have their independence to make decisions according to their own standards and timing, rather than have any external pressures because of what’s happening elsewhere.” Isn’t it a risk for Australia to wait? There is no regulatory process or law in Australia for an “emergency use authorisation” in the way that the UK and US have. In the UK, the Medicines and Healthcare products Regulatory Authority was given power to approve the vaccine by the government under special regulations. Regulators should only resort to such measures in extreme situations. It will give Australians much more confidence in the vaccine if the TGA has time to examine the full dataset, and it will also give regulators more time to educate the public about the vaccine. But there are other reasons to wait. The chair of epidemiology at Deakin University, Prof Catherine Bennett, says we will learn more about vaccine effectiveness in population subgroups in high-exposure settings such as the UK. “We will hopefully be rolling out the vaccine in Australia with no community transmission, so it’s important to know it is working in the general population and we will only know that from similar countries that have the virus circulating at the time,” Bennett says. “We talk about vaccine ‘efficacy’ under trial conditions but in the real world it is never as straightforward. Some people can’t or won’t want to be vaccinated. And with billions of doses being delivered there is a risk that some batches won’t work as well, or the cold chain will be broken if the vaccine is not kept at the right temperature and therefore won’t work in those recipients. “What we learn about the vaccine effectiveness in other countries will help us to determine which vaccines we use for particular subgroups and make sure the logistics are designed to minimise any new risks.” The head of the TGA, John Skerritt, says experts will be working through the holiday period to ensure the data analysis and safety approval is finished as quickly as possible. “Our situation … is different from the UK,” he says. “By late January or February we will not only have the data from the clinical trials of 10,000 to 40,000 people, but we will also have the real-world experience of several hundred thousand people [in the UK] having had the vaccine.” Does Australia’s government support the strategy? The prime minister, Scott Morrison, said on Thursday Australia would not change its timeline based on UK regulators. “In Australia we put our confidence in the Therapeutic Goods Administration … as we do not just on this vaccine but on every vaccine,” he said. “It is about getting the balance right, on the timing, and there are lots of different views that you have to take into account to ensure the best health outcomes for Australians.”
<urn:uuid:c83abf06-10b0-4d89-98d5-2e2114fc5ae5>
CC-MAIN-2022-33
https://www.theguardian.com/society/2020/dec/03/the-uk-is-about-to-start-vaccinating-against-covid-19-why-isnt-australia
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00106.warc.gz
en
0.958223
1,483
2.640625
3
To be built high on the Chajnantor desert plateau in the Chilean Andes, the ALMA array is destined to be the world’s most powerful radio telescope. When it becomes fully operational, its 66 high-precision, giant antennas — which act as a single, giant telescope — will gather vast volumes of radio wave data from the distant universe with unprecedented sensitivity and resolution. Despite numerous observers maintaining that designing a system for such an extreme environment was almost impossible, Fujitsu created a bespoke supercomputer, Atacama Compact Array Correlator for ALMA, to make sense of the huge data stream. Using diskless storage and a sophisticated cooling system, the correlator can perform interference processing in real time at 88 trillion operations per second under hostile desert conditions at a pressure of 0.5 atmospheres. Fujitsu also developed the correlator control system based on PRIMERGY Linux servers. Both the correlators and correlator control system built by Fujitsu are installed on the desert plateau at an altitude of 5,000 m. Read the Full Story.
<urn:uuid:106df976-4521-405e-9318-228c59553650>
CC-MAIN-2015-27
http://insidehpc.com/2012/03/fujitsu-powers-high-altitude-super-for-alma-telescope/
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098685.20/warc/CC-MAIN-20150627031818-00217-ip-10-179-60-89.ec2.internal.warc.gz
en
0.90029
219
3.109375
3
There were 3,744 drug poisoning deaths involving both legal and illegal drugs in England and Wales registered in 2016; this is 70 higher than 2015 (an increase of 2%) and the highest number since comparable statistics began in 1993. Of these 3,744 deaths, 69% (2,593) were drug misuse deaths. There has been an increase in the rate of deaths related to drug misuse in Wales from 58.3 deaths per 1 million population in 2015 to 66.9 per 1 million in 2016; deaths in England have remained comparable between 2015 and 2016. People aged 40 to 49 years had the highest rate of drug misuse deaths in 2016, overtaking those aged 30 to 39 years. Over half (54%) of all deaths related to drug poisoning in 2016 involved an opiate (mainly heroin and/or morphine). The highest mortality rate from drug misuse was in the North East with 77.4 deaths per 1 million population, a 13% increase from 2015; the lowest rate (29.1 deaths per 1 million population) was in the East Midlands, which remained stable. Drug use and drug dependence are known causes of premature mortality, with drug poisoning accounting for 16% of deaths among people in their 20s and 30s in 2016. Drug-related deaths occur in a variety of circumstances, each with different social and policy implications. Consequently, there is considerable political, media and public interest in these figures. Figures are presented for deaths related to drug poisoning (involving both legal and illegal drugs) and drug misuse (involving controlled drugs) in England and Wales from 1993 onwards. The definition of a drug poisoning death is based on the International Classification of Diseases (ICD) code assigned as the underlying cause of death. A list of the ICD codes included in the definition can be found in the Quality and Methodology Information (QMI) report. The majority of this release focuses on drug misuse deaths. The definition of a drug misuse death is either: a death where the underlying cause is drug abuse or drug dependence, or a death where the underlying cause is drug poisoning and where any of the substances controlled under the Misuse of Drugs Act 1971 are involved. This definition is used across the UK and more details can be found in the Quality and Methodology Information report. The figures include accidents and suicides involving drug poisonings, as well as deaths from drug abuse and drug dependence. They do not include other adverse effects of drugs (for example, anaphylactic shock), or other types of accidents (for example, a car crash) where the driver was under the influence of drugs. Drug poisoning deaths involve a broad spectrum of substances, including legal and illegal drugs, prescription type drugs (either prescribed to the individual or obtained by other means) and over-the-counter medications. Some of these deaths may also be from complications of drug abuse, such as deep vein thrombosis or septicemia from intravenous drug use, rather than an acute drug overdose. It is important to be aware that over half of all drug poisoning deaths involve more than one drug and/or alcohol, and it is not possible to tell which substance was primarily responsible for the death. The figures presented show deaths registered each year, rather than deaths occurring each year. Almost all drug-related deaths are certified by a coroner. Due to the length of time it takes a coroner to complete an inquest, around half of drug-related deaths registered in 2016 will have actually occurred prior to 2016. See the “Impact of registration delays on drug-related deaths” section for more information. Nevertheless, at an England and Wales level, general trends in drug-related deaths are broadly equivalent, regardless of whether the data are analysed by year of occurrence or year of registration. Figures based on registration year for smaller geographical areas (for example, Wales, English regions and local authorities) can be influenced by variations in registration delays and should be treated with caution. Extra information is provided in the commentary where differences in the trends do exist.Nôl i'r tabl cynnwys There were 3,744 drug poisoning deaths (involving both legal and illegal drugs) registered in 2016 in England and Wales. In line with previous years, most of the drug-related deaths registered in 2016 in England and Wales were males (2,572 male deaths and 1,172 female deaths). As shown in Figure 1, the mortality rate for all drug poisoning deaths for males has increased from 51.5 deaths per 1 million population in 1993 to 91.4 deaths per 1 million population in 2016 (a 78% increase). For females, the mortality rate for all drug poisonings has increased from 34.2 deaths per 1 million population in 1993 to 40.6 deaths per 1 million in 2016 (a 19% increase). For all persons, the mortality rate for all drug-poisoning deaths did not increase significantly between 2015 and 2016 and remained stable, with 65.8 deaths per 1 million population in 2016 compared with 65.1 deaths per 1 million population in 2015. Figure 1 shows that the male mortality rate for drug misuse deaths increased sharply from 2012 to 2015. The rate for 2016 was 67.1 deaths per 1 million population compared with a rate of 65.5 per 1 million in 2015; however, despite being the highest rate since records began, this is not a significant increase. The female mortality rate also remained stable with no significant increase between 2015 and 2016, though the rate of 24.2 deaths per 1 million population in 2016 was the highest since records began in 1993. Of the total number of drug-related deaths registered in 2016 in England and Wales, 2,593 (69%) were from drug misuse. Deaths from drug misuse account for 74% of all male drug-related deaths and 59% of all female drug-related deaths registered in 2016. The difference in trends between males and females suggests that different factors are involved in deaths related to drug misuse between the sexes. The Crime Survey for England and Wales 2015 to 2016 showed that men are more likely to take drugs than women. Almost 12% of men aged 16 to 59 years had taken an illegal drug in the last year, compared with 5% of women. This partly explains the higher mortality rate for drug misuse in males. However, this cannot be the only explanation, as more than 30% of drug poisoning deaths are not related to drug misuse. There are also differences in the types of controlled substances used by males and females, which may also influence the trends in drug misuse deaths.Nôl i'r tabl cynnwys For both males and females, the greatest proportion of drug misuse deaths registered in 2016 were from accidental poisonings, with 1,561 male deaths and 501 female deaths (82% and 72% of all drug misuse deaths respectively). In females, accidental poisonings due to drug misuse increased between 2015 and 2016 from 428 deaths to 501 deaths, whereas in males accidental poisoning deaths remained stable in 2016. Deaths from mental and behavioural disorders due to drug use only account for about 5% to 6% of drug misuse deaths and this has remained stable since 2012. These deaths are essentially deaths from drug dependence or abuse, but they may involve an acute overdose of drugs similar to an accidental poisoning (see the Quality and Methodology Information report for further information on the coding of drug misuse deaths). The proportion of drug misuse deaths with an underlying cause of suicide (defined as intentional self-poisoning or poisoning of undetermined intent) is higher in females than males; 23% for females compared with 11% for males in 2016. The number of female drug misuse suicides decreased from 175 deaths in 2015 to 161 deaths in 2016, the lowest recorded since 2013. See the Suicides in the UK: 2015 registrations bulletin for more information on how methods of suicide vary between men and women, with women more often opting for poisoning as a less violent mode of dying. Nôl i'r tabl cynnwys In 2016, as in previous years, people aged 30 to 49 years had the highest rate of drug misuse deaths – significantly higher than any other age group. This follows a trend of sharp increases in this age group since 2012, with mortality rates of 97.5 and 108.0 in 2016 for those aged 30 to 39 years and 40 to 49 years respectively. The sharp increase in deaths registered in 2016 in people aged 40 to 49 years means that this age group has now overtaken people aged 30 to 39 years and is now the age group with the highest rate of drug misuse deaths. The mortality rate from drug misuse has also increased in people aged 50 to 69 years since 2012 but remained stable in 2016, whereas the rate in people aged 20 to 29 years has not changed significantly since 2013. Figure 4 shows that the mortality rate for deaths relating to the youngest and oldest age groups (those aged under 20 years and aged 70 and over) has remained relatively stable in 2016, with 2.2 deaths per 1 million population for those aged under 20 years and 10.7 deaths per 1 million for people aged 70 and over.Nôl i'r tabl cynnwys Table 1 shows a list of selected substances that were mentioned on the death certificate. A list of all substances can be found in the reference table 6a. Table 1: Number of drug-related deaths where selected substances were mentioned on the death certificate, deaths registered in England and Wales, 2012 to 2016 |Number of deaths| |All drug poisoning deaths||2,597||2,955||3,346||3,674||3,744| |- Heroin and/or morphine||579||765||952||1,201||1,209| |Any new psychoactive substance||55||63||82||114||123| |Source: Office for National Statistics| |1. Cause of death was defined using the International Classification of Diseases, Tenth Revision (ICD-10) (see the Quality and Methodology Information for more details).| |2. Figures are for deaths registered, rather than deaths occurring in 2012 to 2016.| |3. Figures for England and Wales include deaths of non-residents.| |4. Figures for opioids exclude opioids contained in a paracetamol compound, ie co-codamol, co-dydramol and co-proxamol.| |5. Figures exclude dextropropoxyphene mentioned without paracetamol.| Download this table Table 1: Number of drug-related deaths where selected substances were mentioned on the death certificate, deaths registered in England and Wales, 2012 to 2016.xls (29.2 kB) In line with 2015, over half (54%) of all deaths related to drug poisoning in 2016 involved an opiate (mainly heroin and/or morphine). Heroin and/or morphine deaths remain stable As can be seen in both Figure 5 and Figure 6, at a national level, deaths involving heroin and/or morphine remained stable in 2016. Figure 6 shows that the number of deaths registered in 2016 involving heroin and/or morphine was 1,209 compared with 1,201 deaths registered in 2015. The number of heroin and/or morphine deaths in males fell for the first time since 2012, with 935 deaths registered in 2016 compared with 957 in 2015. Female deaths involving heroin and/or morphine increased to 274 deaths in 2016 compared with 244 deaths in 2015, an increase of 12% and the highest level recorded since records began. Figure 5 shows the sharp increase in the rate of heroin and/or morphine deaths from 2012 to 2015 following the “heroin drought”, which occurred in 2010 to 2011 and was followed by increased purity of heroin and associated overdoses. See the Deaths related to drug poisoning in England and Wales: 2015 registrations bulletin for more information on the heroin drought and the effect it had on trends in heroin purity. However, despite the marked increase seen over the years, the mortality rate for deaths relating to heroin and/or morphine in 2016 remained the same as in 2015, at 21.3 deaths per 1 million population. This trend was also seen in both sexes with the mortality rate for deaths relating to heroin and/or morphine in 2016 for males and females staying stable (33.1 deaths per 1 million population for males and 9.5 deaths per 1 million for females). In contrast to 2015, increases in the number of deaths involving heroin and/or morphine were not seen across all ages in 2016. The biggest increase was seen in people aged 40 to 49 years; however, the number of deaths remained stable in the remaining age groups (see Reference Table 7 in the downloadable datasets for deaths involving selected substances broken down by age for more detail). Public Health England’s (PHE’s) Adult Substance Misuse report, published in 2016, states that the number of people in treatment for opiate misuse has been declining in recent years and has decreased again from 152,964 in 2014 to 2015 to 149,807 in 2015 to 2016. The number of opiate users aged 40 and over starting treatment has shown an upward trend and PHE note in their report that “a large proportion of heroin/opiate users in treatment in 2015 to 2016 will have started using heroin in the epidemics of the 1980s and 1990s and are now over 40 years of age, having been using heroin for a significantly long period of time.” The ageing cohort of heroin users often have a range of complex physical illnesses as a result of long-term drug use, which may make them particularly vulnerable to death from drug misuse. As well as the long-term health and psychosocial problems associated with heroin dependence, there is also a significant risk of users dying from a heroin overdose. A drug called naloxone can be used to reverse the life-threatening effects of a heroin overdose, such as depressed breathing. In “take-home naloxone” programmes, naloxone and training is provided to people who use drugs and people close to them, to enable them to administer naloxone in an emergency overdose situation. In October 2015, following advice from the Advisory Council on the Misuse of Drugs (ACMD), the government eased the restrictions on who can be supplied with naloxone, paving the way for local authorities to make take-home naloxone more widely available to drug users and their families and in facilities where drug users tend to gather (for example, hostels). According to a 2017 survey by the Local Government Association, 90% of local authorities now make available take-home naloxone, mainly through drug-treatment services. This change in legislation that resulted in the majority of local authorities providing take-home naloxone may be a contributing factor for the number of heroin-related deaths remaining stable in 2016. Tramadol-related deaths decrease to lowest level since 2012 The number of drug-related deaths involving tramadol (a synthetic opioid analgesic) fell again from 208 deaths registered in 2015 to 184 deaths in 2016, a decrease of 12% and the lowest level recorded since 2012. Tramadol was controlled under the Misuse of Drugs Act 1971 as a class C substance in June 2014, and this, along with a decrease in the number of prescriptions for tramadol dispensed in the community may explain the downward trend in tramadol-related deaths. Deaths involving cocaine continue to rise There were 371 deaths involving cocaine in 2016, a 16% increase from the 320 deaths registered in 2015. Cocaine-related mortality rates have been increasing year-on-year and reached a record high of 6.4 deaths per 1 million population; although this increase in rate was not significantly different from the rate of 5.6 deaths per 1 million population in 2015. The majority of cocaine-related deaths occur in men aged 30 to 49 years and increases in male cocaine-related deaths were observed in those age groups in 2016. However, the number of cocaine-related deaths remained relatively stable for men across the remaining age groups and women across all age groups. Evidence to distinguish the form of cocaine taken (crack or powder) is rarely provided on death certificates; therefore the figures for cocaine will include some deaths where cocaine was taken in the form of crack cocaine. The Home Office Crime Survey for England and Wales 2015 to 2016 suggests that powder cocaine is the second most commonly used drug (after cannabis) with 2.2% of adults aged 16 to 59 years using cocaine in 2015 to 2016. Despite the increase in cocaine-related deaths registered in 2016, this is a similar usage proportion to 2014 to 2015. The National Crime Agency (2017) reports that there was a significant increase in both crack and powder cocaine purity at all levels in 2016, including user-level, which may partly explain the increase in deaths relating to cocaine. Deaths involving fentanyl increase There were 58 deaths involving fentanyl in 2016, a large increase from the 34 deaths registered in 2015. Fentanyl is a powerful synthetic opioid analgesic used to treat or manage severe pain. After the recent fentanyl crisis in America and Canada, which saw significant increases in the number of deaths from fentanyl overdoses, Public Health England issued a warning to heroin users and health officials regarding the contamination of heroin with synthetic opiates, especially fentanyl due to its potency. Oxycodone-related deaths increase There were 75 deaths involving oxycodone in 2016, the first increase after deaths had remained stable at 51 for the past 3 years. Oxycodone is an opioid pain medication used to treat moderate to severe pain. Prescriptions for oxycodone have seen an upward trend year-on-year since 2006 according to NHS Digital. Deaths involving paracetamol increase in 2016 There were 219 deaths involving paracetamol and its compounds in 2016 compared with 197 deaths in 2015, an increase of 11%. Of these deaths, 72% involved paracetamol not from a compound and the remaining involved a paracetamol compound, mostly co-codamol (paracetamol and codeine). Propranolol deaths decrease to lowest level since 2012 Propranolol is a beta blocker that is used to treat a range of conditions such as hypertension, angina, migraine and anxiety. Deaths involving propranolol had been increasing since 2009 and reached a peak of 55 deaths in 2015 but have decreased to 45 deaths in 2016, the lowest recorded since 2012. In contrast to the decrease in the number of propranolol-related deaths seen in 2016, between 2015 and 2016, according to NHS Digital prescriptions for propranolol have risen.Nôl i'r tabl cynnwys New psychoactive substances (NPS) contain chemicals that produce similar psychoactive effects to “traditional” illegal drugs like cocaine, cannabis and ecstasy. They started to become more popular on the UK drugs scene around 2008 to 2009, with synthetic stimulants such as benzylpiperazine (BZP) and mephedrone, and synthetic cannabinoids (such as “spice”), among the first to gain popularity. NPS are sometimes referred to as “legal highs”, but the majority are controlled under the Misuse of Drugs Act 1971, so are no longer legal. The mortality rate from deaths involving NPS is very low compared with heroin and/or morphine (2.1 deaths per 1 million population compared with 21.3 per 1 million respectively). However, deaths involving NPS have increased sharply over the past 5 years, with 123 deaths registered in 2016 (up from 114 deaths registered in 2015 and an 8% increase). Moreover, 39 of the NPS-related deaths in 2016 involved NPS drugs that were not controlled under the Misuse of Drugs Act at the time of death. The government introduced the Psychoactive Substances Act in 2016, which established a blanket ban on the importation, production or supply of most psychoactive substances. However, it is likely to be several years before our data shows whether this ban has had any effect on deaths involving NPS. Deaths involving mephedrone decrease whilst deaths involving synthetic cannabinoids increase in 2016 Reference table 8 gives the number of deaths involving specific types of NPS. Deaths involving mephedrone decreased from 44 deaths in 2015 to 15 deaths in 2016, the lowest recorded since 2012. Public Health England’s 2016 Adult Substance Misuse report shows that the number of people presenting to drug treatment services for mephedrone misuse decreased from 2,024 in 2014 to 2015 to 1,647 in 2015 to 2016. In addition, the Home Office Crime Survey for England and Wales 2015 to 2016 states that mephedrone use fell in those aged 16 to 59 years, largely driven by a fall in use among young adults aged 16 to 24 years. There is a more detailed discussion of the relationship between mephedrone use and mephedrone deaths in our special article on Deaths involving legal highs in England and Wales. There has been growing concern in recent years about the harms caused and violence linked to the use of synthetic cannabinoids, such as “spice”, particularly in prisons, as detailed in the HM Chief Inspector of Prisons for England and Wales annual 2015 to 2016 report. Our data shows there being only a small number of deaths mentioning synthetic cannabinoids. There is no officially agreed list of substances that are categorised as NPS, but we include the following types of substances: gamma-hydroxybutyrate (GHB) and its precursor gamma-butyrolactone (GBL) cathinones such as mephedrone prescription-type drugs, for example, benzodiazepine analogues All drugs included in our definition for the purposes of this bulletin are listed in the “Definition” tab of the reference tables. Additional NPS will be added to the list in future years, as and when they are identified in the drug-related deaths data. We welcome comments on the drugs included in this category.Nôl i'r tabl cynnwys Although none of the geographical trends observed in 2016 were statistically significant, in England, the mortality rate from drug misuse has been increasing year-on-year since 2012. In 2016, the rate increased by 3% compared with 2015 from 42.9 deaths per 1 million population to 44.1 deaths per 1 million population (an increase to 2,383 deaths). The mortality rate for drug misuse in Wales continued to increase from 58.3 deaths per 1 million population in 2015 to 66.9 deaths per 1 million in 2016, with Wales now having a higher rate of deaths from drug misuse than eight of the regions of England (Figure 7). Since 2014, the number of drug misuse deaths in Wales has increased from a rate of 39.0 deaths per 1 million population to 66.9 deaths per 1 million, a significant increase. This is driven by the number of deaths increasing from 113 in 2014 to 192 in 2016. Nôl i'r tabl cynnwys In England and Wales, almost all drug-related deaths are certified by a coroner following an inquest. The death cannot be registered until the inquest is completed, which can take many months or even years, and we are not notified that a death has occurred until it is registered. In common with most other mortality statistics, figures for drug-related deaths are presented for deaths registered in a particular calendar year, rather than deaths occurring each year. This enables figures to be published in a timelier manner, but can make the trends more difficult to interpret, especially for smaller geographical areas. Out of the 2,593 deaths related to drug misuse registered in 2016, just under half (1,221) occurred in years prior to 2016. Figure 8 shows that the average (median) registration delay for deaths relating to drug misuse differs between England and Wales, with England showing a smoother pattern compared to Wales (due to the larger population and greater number of drug misuse deaths). After rising steadily over the years and peaking in 2013, registration delays in England for deaths relating to drug misuse began to fall and have stayed stable with an average delay of 158 days in 2016. In Wales, registration delays peaked in 2006 but then generally decreased sharply until 2014. This was followed by an increase and average registration delays for deaths related to drug misuse in Wales are now in line with England’s figures, with an average registration delay of 160 days in 2016. These fluctuations in registration delays in Wales have made it difficult to interpret trends in drug misuse deaths in recent years as, unlike in England, the trend based on registration year is inconsistent with the trend based on occurrence year (see Figures 9 and 10). Figure 10 shows that, for Wales, trends in drug misuse deaths by registration year and occurrence year began to differ substantially from 2010 onwards. In 2014, the trend based on registration year suggested a fairly large decrease in drug misuse deaths, but when the data were analysed by occurrence year, deaths were actually increasing in 2014. However, in 2015 the difference between deaths based on registration year and occurrence year in both England and Wales levelled out. Deaths in 2016 are not shown in Figures 9 and 10, as occurrences data are too incomplete for 2016. Once we have the late registrations, we would expect that occurrences data will show that drug misuse deaths continued to rise in 2016.Nôl i'r tabl cynnwys Statistics on drug-related deaths are used by a range of public bodies, such as Public Health England (PHE), the Department of Health (DH), the Home Office, Public Health Wales and the Welsh Government, to evaluate the effectiveness of various strategies in reducing drug-related deaths. They are also used by The European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) to compare trends in drug-related deaths across Europe. The Deaths relating to drug poisoning Quality and Methodology Information report contains important information on: - the strengths and limitations of the data and how it compares with related data - uses and users of the data - how the output was created - the quality of the output including the accuracy of the data - policy context and uses of the data - comparability between countries of the UK Cause of death is coded using the World Health Organisation’s (WHO) International Classification of Diseases (ICD). All deaths where the underlying cause is drug-related are included on a special database and additional processing is carried out to identify the specific substances involved in the death. Further details about the drug poisoning database, including the ICD codes used to define a drug-related death can be found in the Quality and Methodology Information report. Age-standardised mortality rates were calculated using the number of drug-related deaths registered in each year as the numerator and the mid-year population estimate for that year as the denominator. Please see the Quality and Methodology Information report for more details about the calculation of confidence intervals and the interpretation of age-standardised rates. In common with most other mortality statistics, figures for drug-related deaths are presented for deaths registered in a particular calendar year, rather than deaths occurring each year. Due to the length of time it takes to complete a coroner’s inquest, there can be a considerable delay between when the death occurred and when it was registered. See the “Effect of registration delays on drug misuse deaths statistics” section for more information. The User guide to mortality statistics provides further information on the collection, production and quality of the underlying mortality data on which drug-related death statistics are based. The Revisions policy for mortality statistics is available on our website. Manylion cyswllt ar gyfer y Bwletin ystadegol Ffôn: +44 (0)1633 456490
<urn:uuid:432f91e1-d50b-4616-b06a-d69367f45e72>
CC-MAIN-2020-45
https://cy.ons.gov.uk/peoplepopulationandcommunity/birthsdeathsandmarriages/deaths/bulletins/deathsrelatedtodrugpoisoninginenglandandwales/2016registrations?:uri=peoplepopulationandcommunity/birthsdeathsandmarriages/deaths/bulletins/deathsrelatedtodrugpoisoninginenglandandwales/2016registrations
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107881640.29/warc/CC-MAIN-20201024022853-20201024052853-00611.warc.gz
en
0.951926
5,730
2.5625
3
As I reflect on this class I must say reflecting on the most interesting topic or area is a difficult one because I do have so many, climate vs culture, dirt vs digital world, citizenship etc. but most of all really enjoyed differentiating between bullying and discriminatory harassment. As a teacher I never considered discriminatory harassment in school or online for that matter, I always had one broad term, bullying. I will definitely incorporate this in my teaching and ensuring my students understand the difference between the concepts etc. I found Generation Text’s Eight Essential Questions most useful. The method of questioning helps students listen, react and respond. It allows students to think about the action, the affective and alternative solutions. Using the Eight essential questions fosters the 4’C’s, communication, critical thinking, collaboration and creative thinking. Having all this knowledge and strategies will promote a positive climate and culture in my classroom and the school community. Students will feel safe and supported as I will not be just teaching them the do’s and the don’ts but through collaboration we will all explore and share with each other making learning more meaningful.
<urn:uuid:0e6024d4-afe3-46ad-8756-8a850e68bdf6>
CC-MAIN-2021-10
https://generationtextonline.com/2016/08/25/i-really-enjoyed-differentiating-between-bullying-and-discriminatory-harassment/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178367183.21/warc/CC-MAIN-20210303165500-20210303195500-00009.warc.gz
en
0.950812
229
3.46875
3
A woman engineer who worked on the moon landing spoke this week of how she was once told the control room was no place for women. Things have changed a lot in 50 years, but not as fast as some had hoped. BBC News spoke to five scientists from different generations who are breaking barriers in their field. The Pioneer: Prof Jocelyn Bell Burnell Famous for discovering the first pulsar more than 50 years ago, Prof Dame Jocelyn Bell Burnell has also been a lifelong advocate of women in science. As a school pupil in Northern Ireland in the 1950s, like other girls she was not permitted to study science until her parents (and others) protested. “The boys got sent to the science lab and the girls got sent to the domestic science room because everybody knew that girls were only going to get married so they needed to learn how to make beds,” she recalls. Currently visiting professor of astrophysics at the University of Oxford, she was one of a group of female scientists whose efforts led to awards recognising commitment to advancing the careers of women in science. The Athena Swan scheme requires universities and colleges to address gender equality. “That went slowly to begin with until some of the bodies that give funding to universities took notice and said you have to hold one of these Athena Swan awards if you want our money,” she says. “And that focused minds remarkably.” More stories you might like to read: - Four women who changed the face of physics - Physics star gives away £2.3m prize - Fund boosts female and black physicists The gender divide in science is cultural rather than anything to do with women’s brains and some countries do much better than others, she says. In astrophysics southern European countries like France, Spain and Italy do much better than northern European countries like Germany and The Netherlands, for instance. “In all those countries the proportion of women is going up but the pattern has stayed the same, which is interesting,” she says. “The progress is slow, things are changing gradually.” Her advice to women in science? “Don’t be daunted, hang in there, work hard, of course, be courageous.” The research leader: Dr Nicola Beer Dr Nicola Beer’s interest in science developed at an early age; one of her earliest memories is of watching her teacher demonstrate the concept of sound waves using a paper plate filled with rice and a portable speaker at primary school. Of the first generation in her family to go to university, her biochemistry degree at Bristol led to a PhD at Oxford and a Fulbright scholarship in the US at MIT and Harvard before she swapped the research bench for leading a research team. As senior head of department for Discovery Biology & Pharmacology at the Novo Nordisk Research Centre Oxford, she is both head of department and scientist. “It’s about setting the strategic direction, helping people mature their ideas, deliver, also support them in their career,” she says. She believes with fewer women in leadership roles, women have an obligation to support each other, as mentors, by passing on knowledge, or by simply being “generous and opening the door”. “That is something I think we should be doing across the board whether it’s women, whether it’s younger people, whether it’s people in their career journey. We have an obligation to pave the way of how it should be rather than protecting our own position, and generosity is quite important in that,” she says. As a female leader, she notices that people often try to suggest a uniform way for women to be leaders, such as being louder or more assertive in a situation or to respond to things in a set way. “I think we should make a concerted effort to encourage women to be the best leader they can be, rather than a stereotype of how we perceive that should be,” she says. For her, this means avoiding the preconceptions we can have about one other, such as limits to what we can achieve and what work we can do. “I’m passionate about smashing glass ceilings and glass walls and I really think we should break down silos between us and boxes and preconceptions,” she says. The trailblazer: Gladys Ngetich When Gladys Ngetich was told in a meeting, ‘You don’t look like an engineer,’ she went home wondering what an engineer was supposed to look like. As a research student studying mechanical engineering she has got used to fighting stereotypes and being something of a trailblazer. Studying for a degree in mechanical engineering in Kenya, she was one of eight women in a class of 80. - Why are there so few female engineers? She says of her first year, “most of the guys in our class thought we would not make it”, but she graduated with a first class degree. Currently completing her PhD in aerospace engineering at the University of Oxford, she has just won a 2019 Schmidt Science Fellowships to investigate space science technologies that support sustainable development. More stories like this: - ‘We want to be accepted into the club’ - Breaking the mould in a male-dominated industry - The woman behind first black hole image. Inspired by women like Prof Bell Burnell, she wants to help inspire a new generation of engineers. “What keeps me going is the fact that someone has to scribe a new path, someone has to start walking to pave the way for someone else,” she says. “I’m hoping there will be a trail of women coming after me – and hoping they won’t have to prove themselves so much.” Pushing boundaries: Dr Megan Wheeler How do you solve the big challenges facing the world? Science holds the solutions, but only if you look at problems through multiple lenses. That’s the view of Dr Megan Wheeler, who, as executive director of the HSchmidt Science Fellows programme, is on a mission to train the next generation of science leaders. Dr Wheeler has dual doctorates in neuroscience (University of Oxford) and clinical psychology (The Catholic University of America). She is now leading a programme aimed at harnessing the brightest and best in science to tackle global challenges Efforts like the human genome project have shown the value of working across traditional boundaries in science to advance discovery, she says. “I think that it is critical that we have scientists who both have a real depth of experience but also who can step across those boundaries,” she explains. Being a scientist today means having an ability to step outside of the lab and to communicate why the work is important, she says. This requires a broad skill set to engage the public, funding bodies and policymakers, but also to work with scientists from other disciplines to “see solutions to problems that one of you could not see alone”. The rising star: Elina Aino Johanna Pörsti The daughter of a physics teacher and a medical doctor, Elina Aino Johanna Pörsti grew up in Finland in a family where scientific dialogue was second nature. When there was thunder, her father would explain the physics behind it, while her mother would explain the human body. As a child she showed her entrepreneurial spirit, when she set up her own pharmacy on the beach. “Stones were the different medicines – and then people had to come to me and then tell what is wrong and then I would give them the right medicine,” she says. At school she did a biology course in gene editing, which set the course for her future career. “It’s amazing that you could extract DNA and work in a lab and I thought it sounded super cool and something I’d be able to do,” she says. “For me personally I’m fascinated by science because I like to understand and there’s always more to understand and there is always more to read and learn.” She studied molecular science at the University of Helsinki and gained an MBA from Copenhagen. She is now a scientist at the Novo Nordisk Research Centre Oxford working on the discovery of new diagnostic tools. She says at school in Finland, everyone was treated the same, which is critical for enhancing women’s position in science. “In thinking how we can enhance women’s position in science generally I think the work should start early on,” she says. Follow Helen on Twitter.
<urn:uuid:9b61f1d7-045e-4bc7-a632-7d3b0db1831b>
CC-MAIN-2021-25
https://newsfortomorrow.com/index.php/2019/07/22/women-in-science-smashing-glass-ceilings-and-glass-walls/
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487621273.31/warc/CC-MAIN-20210615114909-20210615144909-00610.warc.gz
en
0.96943
1,812
3.21875
3
Each state's legislature sets up time limits within which lawsuits must be filed. These are called statutes of limitations. Time limits are different for different types of cases. If you wait too long, your right to sue will be barred by these statutes. Why have a statute of limitations? Because unlike wine, lawsuits don't improve with age. Memories fade, witnesses die or move away, and once-clear details become blurred. In other words, disputes are best settled relatively soon after they develop. Statutes of limitations are almost always at least one year, so if you file promptly, you should have little to worry about. Act fast for claims against a government agency. To sue a city, county, state, or governmental agency (for example, a school district), you first must promptly file a claim with the people in charge (for example, the school board, county board of supervisors, city council). Once your claim is rejected–and it usually will be–you can file in small claims court. Often, your administrative claim must be filed within three to six months after your loss occurred, or you'll be out of luck. Once you know what the applicable statute of limitations period is for your claim, you still need to know when the clock starts ticking on filing your claim. Here's the general rule: Start with the day the injury to your person or property occurred, or, if a contract is involved, start with the day the contract was broken. When a contract to pay in installments is involved, start with the day each payment was missed. There are certain exceptions to this general rule. With some types of cases, such as medical malpractice, the limitations period starts from the date the harm was discovered or reasonably should have been discovered. This rule protects people who don't know they have a problem until well after it has occurred. EXAMPLE: During an operation, a doctor leaves a small clamp in your abdomen. It isn't until a year later that you experience extreme pain and see a different doctor, who orders an X-ray that shows the clamp. In most states, the statute of limitations for suits based on medical malpractice (often three years) begins from the date you learn of the problem, not the date of the original operation. However, if you walked around in pain for several years before seeing a second doctor and getting an X-ray, chances are a court would rule that the limitations period would start before actual discovery, based on the theory that you could and should have discovered the problem sooner. When an installment contract is involved, the statute of limitations normally applies separately to each installment. For example, assume you loan Larry $5,000 and he agrees in writing to pay back the loan in five installments of $1,000 each beginning on January 1, 2012, and continuing on January 1 of each following year through 2016. If Larry fails to make his first payment, then you can't sue him in small claims court until January 1, 2016. (Note that you can sue him for only the $1,000 payment he missed, not for the entire $5,000.) From Larry's point of view, if you don't sue by January 1, 2016, then you cannot sue him for the first missed $1,000 payment because the lawsuit is barred by the statute of limitations. Because Larry's second installment payment isn't due until January 1, 2013, you have until January 1, 2017 to sue him if he misses that payment, and so on. There is, however, one important exception to this rule: If the written contract contains an "acceleration clause" stating that if one installment payment is missed, all immediately become due, the statute of limitations expires for a lawsuit to collect all installments on January 2, 2013. What if the following occurs: After the statute of limitations runs out (say two years on an oral contract to pay for having a fence painted), the debtor voluntarily starts to make payments. Does the voluntary payment have the effect of creating a new two-year statute of limitations period, allowing the person who is owed the money to sue if the debtor again stops paying? In most states, the answer is no. Simply starting to pay on an obligation after the time to sue has passed doesn't create a new period for suit. All the creditor can do is to keep his toes crossed and hope that the debtor's belated streak of honesty continues. However, if the debtor signs a written agreement promising to make the payments, this does reinstate the contract and create a new statute of limitations period. In legal slang, this is called "reaffirming the debt." EXAMPLE: Doolittle borrows $1,000 from Crabapple in 2010 under the terms of a written promissory note. The next month he loses his job and never pays back a penny. Crabapple doesn't file a lawsuit within the four-year statute of limitations. In 2015, Doolittle experiences a burst of energy, gets a job, and resolves to pay off all of his old debts. He sends Crabapple $50. A week later, suffering terrible strain from getting up before noon, Doolittle quits his job and reverts to his old ways of waking up a few minutes before race time. Is the four-year statute of limitations allowing Crabapple to sue reinstated by Doolittle's payment? No. As we learned above, once the four-year limitation period for written contracts runs out, it can't be revived by simply making a payment. However, if after Doolittle sent Crabapple the $50, Crabapple coaxed him into sending a letter saying that he would pay the remainder of the debt, Crabapple would again be able to sue and get a judgment if Doolittle failed to pay. Why? Because a written promise to pay a debt that would otherwise be barred by the statute of limitations has the legal effect of reestablishing the debt. Debtors–beware of waiving statutes of limitations. If a creditor and debtor discuss an unpaid bill and the debtor asks for more time to pay, to lower payments, or to make some other accommodation, the creditor, assuming he or she is willing to agree, will almost always require that the debtor waive the statute of limitations in writing. This means that if the debtor fails to pay, the creditor will have more time to sue. In a few situations, the statute of limitations is suspended for a period of time (lawyers say tolled instead of suspended). This can occur if the person sued is in prison, living out of the state, insane, or a minor, or occasionally for other reasons. If one of these events suspends the statute of limitations, then the time period that the event lasts doesn't count towards the statute of limitations, and the counting begins again when the event (prison term, absence from state, and so on) ends. Example 1: Jack borrows money from Tim under a written contract. Jack fails to pay the money back on the day required. Six months later, Jack is sentenced to a year in jail. The four-year statute of limitations would be suspended during this period and Tim would still have three-and-a-half years after Jack gets out of jail to file suit. Example 2: Ed, age 12, stars in a TV series. Just before he turns 18, an accountant for the show tells Ed's family that Ed wasn't paid all the money due under his contract. Ed wonders if he can still sue the TV production company. The answer is yes. Ed's time to sue is measured from his 18th birthday (that is, the statute of limitations period would be suspended or tolled while he was a minor). If he lives in a state with a four-year statute of limitation for disputes based on written contracts, this means that Ed could file suit at least until his 22nd birthday. What should a defendant do if he or she believes that the statute of limitations period on the plaintiff's lawsuit has run out? Tell the judge. Do this in court as part of stating your defense. Or, if your state is one of the few that requires a defendant to make a written response to the plaintiff's claim before the hearing date, then include in your response a statement that the statute of limitations bars the plaintiff's claim. Sometimes, a judge will figure this out without a reminder, but often he or she won't. Don't ever assume that because the clerk has filed the papers and you have been properly served, this means that the suit was started on time. Clerks rarely get involved in statute of limitations questions.
<urn:uuid:afc0c6dc-01fa-4bb6-ad76-5fd0f0eae92c>
CC-MAIN-2017-17
http://www.nolo.com/legal-encyclopedia/free-books/small-claims-book/chapter5-3.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125654.80/warc/CC-MAIN-20170423031205-00325-ip-10-145-167-34.ec2.internal.warc.gz
en
0.972732
1,765
2.65625
3
Most pregnant women assume they will deliver a healthy baby at term. However, 8% of women deliver their baby preterm (before 37 weeks of pregnancy). This figure is higher in the developing world and in certain subgroups of women with medical conditions affecting their health or that of their baby. Impact of preterm birth Preterm birth can devastate families. Seeing your baby in an intensive care unit, wondering if they will survive, and if so, whether there has been lifelong damage to their vision, hearing, movement or capacity to learn is every parent’s nightmare. Sadly, in many cases involving early preterm birth (less than 34 weeks of pregnancy), fears are justified. World-wide, preterm birth remains the leading cause of death and disability in children under five years of age (1,2,3,4). However, recent developments in our understanding of preterm birth now offer hope to families. This blog briefly covers a few simple interventions that have been proven to lower rates of preterm birth and some other strategies under investigation. Causes of preterm birth Nearly half of all preterm births are spontaneous. The other 50% of cases arise due to a need for elective early delivery due to a pregnancy complication. These may include hypertensive disorders, multiple pregnancy, placental bleeding and diabetes. The greatest hopes to reduce the devastation of preterm birth lies in discovering why so many babies spontaneously deliver early. New technologies, spontaneous preterm birth and infection One common link identified in many spontaneous preterm births is infection (3). Our published systematic review identified infection as a common final pathway in many cases of preterm birth and as a causal factor in long term neurological damage in children (3). Infection leads to preterm birth in a complex way (5). Bacteria can enter the intra-uterine space directly by ascending from the vagina. They can also access the intra-uterine space by the blood stream or rarely through invasion from a source of infection elsewhere in the abdominal space or by being directly inoculated following an invasive procedure such as an amniocentesis. (5,6). Early detection and treatment of infection can reduce preterm birth. Meta-analyses of antibiotic administration to women with bacterial vaginosis have found significant decreases in the rate of preterm birth (7). However, many bacteria cannot be cultured, so identifying infectious causes of preterm birth can be difficult. However, the use of innovative new technologies is creating new opportunities.Our research group have been employing 16S rRNA gene technology to identify bacterial taxa in the vagina of women with complicated pregnancy. Our recent case reports have identified unusual bacterial taxa such as Acinetobacter, Bacteroides, Hafnia, Campylobacter and Haemophilus as being implicated in extremely preterm, very preterm and preterm births (8-10) There is hope modern technologies will help unravel the infectious precursors and causes of preterm birth. Fish oil to prevent preterm birth Another large research project we have underway is called ORIP (11). This is one of the largest randomised research trials in the world in pregnancy and is designed to reduce early preterm birth using a nutritional supplement called DHA that is found in some fish oils. Our previous trial DOMINO (12) involving more than 2500 women, found DHA supplements in pregnancy were associated with lower rates of spontaneous early preterm birth. In order to formally determine if DHA can prevent early preterm birth, we have embarked on the ORIP trial. Currently we have recruited over 3000 women into ORIP. Eventually we plan to recruit more than 5500 women to confirm whether DHA supplements are effective. It is important to also understand that some very simple measures significantly reduce the risk of preterm birth. The first of these is immunisation against influenza virus infection in pregnancy. Sadly, many pregnant women are either not offered vaccination, or else decline vaccination (13). These women remain vulnerable to a severe viral infection that can precipitate preterm birth. QUIT Stopping smoking Another simple and obvious fix to preterm birth is to quit smoking. Smoking is a leading independent risk factor for preterm birth. It can act as a direct risk, and also indirectly, through damage to the placenta, resulting in poor growth of the baby or bleeding that means babies must be delivered early to avoid death in utero. All pregnant women who smoke should ask for help to stop smoking. Many services are available to help – just ask. Cervical length screening and treating with progesterone Another new strategy to prevent preterm birth is to measure the length of the cervix using ultrasound. This measurement can be easily undertaken when women have their 18-20 week ultrasound of the baby’s anatomy. If the cervix is shorter than expected, there is an increased risk of preterm birth (14). A number of studies have linked the length of the cervix in mid pregnancy to the risk of preterm birth. For population purposes, women with a cervix of 15mm or less at 18 to 24 weeks gestation, have a 50% chance of having a preterm delivery at less than 33 weeks of gestation (14-17). Women identified with a short cervix on ultrasound can be offered intervention with progesterone therapy or cerclage to reduce the risk of preterm birth. The evidence for progesterone therapy is promising. Several trials have reported a reduction in preterm birth in women with a short cervix (14-17). The largest trial was called the PREGNANT trial. In this trial 30,000 women were screened for cervical length and women with a short cervix were prescribed vaginal progesterone gel (90 mg). There was a 45% reduction in the rate of early preterm birth (18). Cervical cerclage has also been reported to be effective in treating women with short cervical length (19,20).Cervical cerclage is a small surgical procedure where a tape is inserted and tied around the cervix to strengthen the cervix and prevent premature dilation. Preterm birth is a terrifying reality for many families. However, we now have several promising interventions that can hopefully reduce this devastating outcome. Any woman who has had a preterm baby should seek help early in her next pregnancy in order to take advantage of emerging therapies. 1. Lawn, J. E., Cousens, S. & Zupan, J. (2005). 4 million neonatal deaths: When? Where? Why? Lancet 365, 891-900. 2. Goldenberg, R. L., Culhane, J. F., Iams, J. D. & Romero, R. (2008). Preterm birth 1: Epidemiology and causes of preterm birth. Lancet 371, 75-84. 6. Romero, R, & Mazor, M. (1988). Infection and preterm labor. Clin Obstet Gynecol 31, 553-584. 7. Smaill. F. (2001). Antibiotics for asymptomatic bacteriuria in pregnancy. Chocrane Database Syst. Rev 2, CD000490. 8. Mendz, G. L., Petersen, R., Quinlivan, J. A. & Kaakoush, N. O. (2014). Potential involvement of Campylobacter curvus and Haemophilus parainfluenzae in preterm birth. Br Med J Case Rep pii, bcr2014205282. doi: 10.1136/bcr-2014-205282. 12. Makrides M, Gibson RA, McPhee AJ, Yelland L, Quinlivan J, Ryan P, DOMInO Investigative Team, Effect of DHA supplementation during pregnancy on maternal depression and neurodevelopment of young children: a randomized controlled trial. JAMA: The Journal Of The American Medical Association, 2010 Oct 20; Vol. 304 (15), pp. 1675-83; PMID: 20959577 ISSN: 1538-3598. 14. Hassan SS, Romero R, Berry SM et al. Patients with an ultrasonographic cervical lengh < or = 15 mm have nearly 50% risk of early spontaneous preterm delivery. Am J Obstet Gynecol 2000; 82(6): 1458-1467 15. Heath VC, Southall TR, Souka AP et al. Cervical length at 23 weeks of gestation: prediction of spontaneous preterm delivery. Ultrasound Obstet Gynecol1998; 12(5),312-317. 16. Grimes D, Berghella V. Cervical length and prediction of preterm delivery. Curr Opin Obstet Gynecol 2007; 19(2): 191-195. 17. Romero R. Vaginal progesterone to reduce the rate of preterm birth and neonatal morbidity: a solution at last. Women’s Health 2011; 7(5): 501-4. 18. Hassan SS, Romero R, Vidyadhari D et al. Vaginal progesterone reduces the rate of preterm birth in women with a sonographic short cervix: a multicenter, randomised, double blind, placebo-controlled trial. Ultrasound Obstet Gynecol 2011; 38(1): 18-31. 19. Bennett P. Preterm Labour. In: Dewhurst’s Textbook of Obstetrics & Gynaecology, Blackwell Publishing, 2008. 20. Alfirevic Z, Owen J, Carreras Moratonas E et al. Vaginal progesterone, cerclage or cervical pessary for preventing preterm birth in asymptomatic singleton pregnant women with history of preterm birth and a sonographic short cervix. Ultrasound Obstet Gynecol 2012 18 sept epub ahead of print. DOI : 10.1002/uog.12300.
<urn:uuid:5391ff81-6324-43a4-b945-87f9e32d0f9d>
CC-MAIN-2017-47
https://pregnancyandwomenshealth.com/category/pregnancy/preterm-birth/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806447.28/warc/CC-MAIN-20171122012409-20171122032409-00080.warc.gz
en
0.900234
2,074
3.46875
3
Germany is a nation known for engineering excellence and progress through technology. In a past era, leaders demanded that youth develop to serve the purposes of the state. Since barriers came down Germany’s young people have enjoyed remarkable freedom on all levels, which is why the recent call by the Confederations of German Industry and of German Employers for more German MINT students surprised the academic minds of many. In fact, if these well-intended organizations have their way, the minds of Germany’s young people might be influenced to serve the nations greater good again. The logic behind all this is that German industry is facing a shortage of an estimated 117,000 employees trained in Mathematics, Informatics, Natural Sciences, and Engineering (or MINT for short (where “T” is for Technology). This shortage increased by approximately 21,000 in February 2011 alone, and this lack of German mint graduates is what set alarm bells ringing, according to Hans-Peter Klös, Managing Director of the Cologne Institute for Economic Research. Germany’s engineering industries employ a quarter of all successful MINT students. Industry leaders have concluded they need to take a proactive approach to ensure continuity of supply to universities, and they have very definite ideas of how the German education system will achieve this for them too. According to Deutsche Telekom board member Thomas Sattelburger, the solution is as simple as ensuring that German secondary students take two compulsory natural science and engineering subjects through to school-leaving certificate level. In addition, this must include tapping the valuable resource of girls and young women as well. Whether or not this well-conceived engineering solution will succeed is open to speculation, because the German MINT high school dropout rate is already high. Twenty-eight percent of MINT students fall along the wayside, with 40% in total leaving school or switching courses. Main reasons given by them are that hurdles are too high, and that the workload is too great. Some say that this will not change with a forced curriculum. Alternatively, could it be that vorsprung durch technik mints more technical students for German universities this time round with proverbial teutonic efficiency.
<urn:uuid:5eff28fe-eac1-44ab-b186-fc8d5911e78f>
CC-MAIN-2019-43
https://www.scholaro.com/pro/News/Should-the-German-Education-System-Mint-More-Technical-Students-159
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987835748.66/warc/CC-MAIN-20191023173708-20191023201208-00279.warc.gz
en
0.963464
449
2.71875
3
Could this gene explain the male infertility crisis? Scientists discover DNA errors that hamper sperm in mice – and it could provide answers for humans - The gene, XRCC1, is crucial for sperm development, to ensure a high sperm count, swift motility, normal shape, and solid concentration - Chinese scientists show it is lacking in infertile mice Scientists have found infertile male mice lack a crucial ‘repair gene’ – and they hope it could provide answers for drops in sperm counts and sperm quality being recorded across the world in humans. The gene, XRCC1, is crucial for sperm development, to ensure a high sperm count, swift motility, normal shape, and solid concentration. Previously, it wasn’t clear how important XRCC1 was to male fertility. But a new study by Chinese researchers found it was the one thing that determined sperm quality in a batch of male mice. Experts say the finding warrants research in humans as data show a concerning rise in male infertility. It’s unclear, however, what might cause a deficiency in XRCC1. The gene, XRCC1, is crucial for sperm development, to ensure a high sperm count, swift motility, normal shape, and solid concentration. Chinese scientists show it is lacking in infertile mice (file image) ‘Even modest DNA damage in human spermatozoa can reduce fertility and increase the risk of disease in offspring,’ said Aihua Gu, a researcher at State Key Laboratory at the Ministry of Education School of Public Health in China. ‘Now that we know XRCC1 plays a crucial role in maintaining normal spermatogenesis in mice, further study should explore potential treatments that could reverse male infertility caused by XRCC1 deficiency.’ Concerns about male infertility hit headlines globally in 2017, when researchers in Israel and the US published shocking data that sperm counts among men living in Western countries had fallen by 59.3 percent in the last 40 years. By reviewing the previous studies, the researchers found that, since 1973, sperm concentration for Western men had fallen by more than 52 percent, declining by 1.4 percent each year on average. Overall sperm count fell by 1.6 percent each year, resulting in a cumulative decline of nearly 60 percent in the last 40 years. Last year, another study by researchers in Spain and the US added weight to that warning, with data from two major fertility centers between 2002 and 2017. They found the number of men in their cohort went up seven-fold, from 8,000 to 60,000 in that time, with an increasing number diagnosed with oligospermia, a type of male infertility. Among those men with fertility issues, an increasing number had a sperm count so low they have a higher risk of needing IVF to conceive, while the number of men with a ‘normal’ sperm count dropped. What’s more, in July 2017 fertility in the US reached an all-time low. Dr Thoru Pederson, editor-in-chief of the Federation of the American Societies for Experimental Biology (FASEB) journal, hailed the XRCC1 finding. ‘XRCC1 has long been known as a guardian of genome integrity in many cell types, and this new study moves its role into the important context of spermatogenesis,’ Dr Pederson said. Source: Read Full Article
<urn:uuid:1ede24ad-ee33-43c3-94bf-f3ba4b252d59>
CC-MAIN-2022-27
https://crunchtime-records.com/health-news/scientists-discover-a-gene-that-could-explain-male-infertility-crisis/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103850139.45/warc/CC-MAIN-20220630153307-20220630183307-00026.warc.gz
en
0.943003
721
3
3
Chocolate industry driving deforestation of Ivory Coast: report The chocolate industry is indirectly driving massive and illegal deforestation in Ivory Coast, fuelling a catastrophic decline in wildlife, a green group said Wednesday. "In several national parks and other protected areas, 90 percent or more of the land mass has been converted to cocoa," the group Mighty Earth said in its investigation. "Less than four percent of Ivory Coast remains densely forested," it said. "The chocolate companies' laissez-faire approach to sourcing has driven extensive deforestation in Ghana as well." Habitat loss has been disastrous for protected species, ranging from chimpanzees and leopards to pygmy hippos and elephants, it said. The animals are forced into ever-smaller areas, making it easier for them to be tracked down and slaughtered by poachers. In Ivory Coast, the world's biggest cocoa producer, accounting for 40 percent of world output, "deforestation has pushed chimpanzees into just a few small pockets, and reduced the country's elephant population from several hundred thousand to about 200-400," the report said. It said major chocolate brands were indirectly involved in a "shocking" trade, in which growers produced cocoa in national parks, who sold it to middle men, who then sold it on to a handful of firms that control roughly half of the world's market. From there, it was sold to big chocolate companies. "According to our analysis, 291,254 acres (117,900 hectares) of protected areas were cleared between 2001 and 2014," Mighty Earth said. Over the same period, Ghana, another big West African producer, lost 7,000 square kilometers (2,700 square miles) of forest, or about 10 percent of its entire tree cover. Around a quarter of that deforestation in Ghana was connected to the chocolate industry, the report charged. Traders Cargill, Olam and Barry Callebaut, which are named in the report, say on their websites that they are aware of the problem of deforestation in the cocoa sector, and have set up to programmes for deforestation-free supply chains. Their project is due to be unveiled for the world climate conference in Bonn in November. Deforestation is not only destroys habitat, but is also a major contribution to global warming. The world demand for chocolate stands at around three million tonnes annually, a figure that rises between two and five percent each year, in a market worth around $100 billion (84 billion), according to the report. Most of it is is manufactured and consumed in Europe and North America. © 2017 AFP
<urn:uuid:bfd4ae51-d8d4-4eb5-86b6-27a47078fc28>
CC-MAIN-2020-45
https://phys.org/news/2017-09-chocolate-industry-deforestation-ivory-coast.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107904039.84/warc/CC-MAIN-20201029095029-20201029125029-00043.warc.gz
en
0.965307
534
2.75
3
Paternity In Arizona What is Paternity? Paternity means fatherhood. Establishing paternity means that a court or a government agency has ruled as to who is a child’s father. How to Establish Paternity The easiest way to establish paternity in Arizona is by signing a Voluntary Acknowledgement of Paternity form. If both the mom and dad agree who the father is, signing this form will make it official and establish the child’s legal and biological father. If the mom and alleged father don’t agree about who the father is, under Arizona law, a paternity matter can be started by: the child’s mother a man who believes he is the father (also known as the “putative father”) the child’s guardian or the person the child is living with also called a “custodian,” or a government agency that is providing welfare or health insurance benefits for the child. A paternity case can be initiated in the superior court where the mother, the putative father or the child lives. A government agency can also start paternity proceedings out of court. Both a court ruling and an agency ruling are equally valid with regard to determining paternity. Both the court and the agency have the power to order genetic testing or blood testing. To be considered valid, the test result must show that there is at least 95 percent likelihood that the putative father is the biological father. When to File a Paternity Case Generally speaking, a paternity action can be started before the child’s birth, but at least prior to the child’s 18thbirthday. When the case is started before the child’s birth, the court will delay the trial until after the birth. For the adult who wants to determine who his or her biological father is, the law allows only that person to start a case after his or her 18th birthday. What are the Benefits or Drawbacks to Establishing Paternity? When paternity is determined, Arizona courts can order one parent to pay child support and can determine a parenting plan that sets forth both custody and visitation. Obviously, for the person who is raising the child, be it the child’s mother or a guardian, it is helpful to get financial support for the child. For a father who may want to be part of the child’s life, the court can order a set parenting schedule as well as rule on the father’s rights to be involved in the child’s major life decisions such as medical choices, educational issues and the like. The child may benefit from having a dad in his or her life as well. The child may also realize an inheritance upon the bio dad’s death. If the dad is disabled and collecting Social Security benefits, the child may also be eligible for benefits as the disabled dad’s dependent. For the man who is unable or unwilling to pay child support, having a paternity order forced on him could be unwelcome. The court has the power to order child support retroactively to three years before the case was started. The judge can order a reluctant father to pay the costs of the pregnancy and childbirth as well. If a government agency has started the case, the agency may seek the father to reimburse the agency for welfare and other benefits paid out on the child’s behalf. On the other hand, some mothers do not want the dads entangled in their kids’ upbringing. If a court finds that either the mother or the putative father has acted unreasonably in the process, the judge could order the difficult party to pay the other side’s attorney’s fees as well as the cost of the genetic testing. The Arizona Department of Economic Security has a community outreach project for paternity. Go to the website,www.azdes.gov and click on the “voluntary paternity program” link for more information.
<urn:uuid:6b81a40f-8706-4285-baaa-36c37501c9ea>
CC-MAIN-2018-39
https://azdivorcelaw.org/2018/04/paternity-in-arizona-2/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158633.40/warc/CC-MAIN-20180922182020-20180922202420-00128.warc.gz
en
0.957774
817
2.609375
3
Franz Ferdinand, eldest son of Carl Ludwig, the brother of Emperor Franz Josef, was born in 1863. Educated by private tutors, he joined the Austro-Hungarian Army in 1883. His military career included service with an infantry regiment in Prague and with the hussars in Hungary. While in the army Ferdinand received several promotions: captain (1885), major (1888), colonel (1890) and general (1896). In 1889, Crown Prince Rudolf, the son of Franz Josef, shot himself at his hunting lodge. The succession now passed to Franz Ferdinand's father, Carl Ludwig. When he died in 1896, Franz Ferdinand became the new heir to the throne. Franz Ferdinand had first met Sophie von Chotkovato at a dance in Prague in 1888. The couple fell in love but although Sophie came from a noble Bohemian family, she was not considered a suitable woman to marry Franz Ferdinand. To be an eligible partner for a member of the Austro-Hungarian royal family, you had to be descended from the House of Hapsburg or from one of the ruling dynasties of Europe. Franz Ferdinand insisted he would not marry anyone else. Emperor Wilhelm II of Germany, Tsar Nicholas II of Russia and Pope Leo XIII all made representations to Franz Josef on Franz Ferdinand's behalf arguing that the the disagreement over Ferdinand's marriage was undermining the stability of the monarchy. In 1899 Emperor Franz Josef agreed a deal with Franz Ferdinand. He was allowed to marry Sophie von Chotkovato but it was stipulated that her descendants would not be allowed to succeed to the throne. It was also pointed out that Sophie would not be allowed to accompany her husband in the royal carriage nor could she sit by his side in the royal box. Franz Josef did not attend the wedding. Nor did his brothers or their families. The only people of the royal family who went to the ceremony was Franz Ferdinand's stepmother, Maria Theresia, and her two daughters. Over the next few years the couple had three children: Sophie (1901), Maximilian (1902) and Ernst (1904). In 1913 Franz Ferdinand was appointed Inspector General of the Austro-Hungarian Army. A promoter of naval expansion and military modernization, Ferdinand was popular with the armed forces and in the summer of 1914 General Oskar Potiorek, Governor of the Austrian provinces of Bosnia-Herzegovina, invited the Inspector of the Armed Forces, to watch his troops on maneuvers. When Potieoek made it clear that his wife, Dutchess Sophie would also be made welcome, Franz Ferdinand agreed to make the visit. Franz Ferdinand knew that the journey would be dangerous. A large number of people living in Bosnia-Herzegovina were unhappy with Austro-Hungarian rule and favoured union with Serbia. In 1910 a Serb, Bogdan Zerajic, had attempted to assassinate General Varesanin, the Austrian governor of Bosnia-Herzegovina, when he was opening parliament in Sarajevo. Zerajic was a member of the Black Hand (Unity or Death) who wanted Bosnia-Herzegovina to leave the Austro-Hungarian Empire. The leader of the group was Colonel Dragutin Dimitrijevic, the chief of the Intelligence Department of the Serbian General Staff. Dimitrijevic considered Franz Ferdinand a serious threat to a union between Bosnia-Herzegovina and Serbia. He was worried that Ferdinand's plans to grant concessions to the South Slavs would make an independent Serbian state more difficult to achieve. When it was announced that Franz Ferdinand was going to visit Bosnia in June 1914, Dimitrijevic began to make plans to assassinate the heir of the Austro-Hungarian throne. Dimitrijevic sent three members of the Black Hand group based in Belgrade, Gavrilo Princip, Nedjelko Cabrinovic and Trifko Grabez, to Sarajevo to carry out the deed. Unknown to Dragutin Dimitrijevic, Major Voja Tankosic, a senior member of the Black Hand group, informed Nikola Pasic, the prime minister of Serbia, about the plot. Although Pasic supported the main objectives of the Black Hand group, he did not want the assassination to take place, as he feared it would lead to a war with Austro-Hungary. He therefore gave instructions for Gavrilo Princip, Nedjelko Cabrinovic and Trifko Grabez to be arrested when they attempted to leave the country. However, his orders were not implemented and the three man arrived in Bosnia-Herzegovina where they joined forces with fellow conspirators, Muhamed Mehmedbasic, Danilo Ilic, Vaso Cubrilovic, Cvijetko Popovic, Misko Jovanovic and Veljko Cubrilovic. Just before 10 o'clock on Sunday, 28th June, 1914, Franz Ferdinand and Sophie von Chotkovato arrived in Sarajevo by train. General Oskar Potiorek, Governor of the Austrian provinces of Bosnia-Herzegovina, was waiting to take the royal party to the City Hall for the official reception. In the front car was Fehim Curcic, the Mayor of Sarajevo and Dr. Gerde, the city's Commissioner of Police. Franz Ferdinand and Duchess Sophie were in the second car with Oskar Potiorek and Count von Harrach. The car's top was rolled back in order to allow the crowds a good view of its occupants. At 10.10, when the six car possession passed the central police station, Nedjelko Cabrinovic hurled a hand grenade station at the archduke's car. The driver accelerated when he saw the object flying towards him and the grenade exploded under the wheel of the next car. Two of the occupants, Eric von Merizzi and Count Boos-Waldeck were seriously wounded. About a dozen spectators were also hit by bomb splinters. Franz Ferdinand's driver, Franz Urban, drove on extremely fast and other members of the Black Hand group on the route, Cvijetko Popovic, Gavrilo Princip, Danilo Ilic and Trifko Grabez, were unable to fire their guns or hurl their bombs at the Archduke's car. After attending the official reception at the City Hall, Franz Ferdinand asked about the members of his party that had been wounded by the bomb. When the archduke was told they were badly injured in hospital, he insisted on being taken to see them. A member of the archduke's staff, Baron Morsey, suggested this might be dangerous, but Oskar Potiorek, who was responsible for the safety of the royal party, replied, "Do you think Sarajevo is full of assassins?" However, Potiorek did accept it would be better if Duchess Sophie remained behind in the City Hall. When Baron Morsey told Sophie about the revised plans, she refused to stay arguing: "As long as the Archduke shows himself in public today I will not leave him." In order to avoid the city centre, General Oskar Potiorek decided that the royal car should travel straight along the Appel Quay to the Sarajevo Hospital. However, Potiorek forgot to tell the driver, Franz Urban, about this decision. On the way to the hospital, Urban took a right turn into Franz Joseph Street. One of the conspirators, Gavrilo Princip, was standing on the corner at the time. Oskar Potiorek immediately realised the driver had taken the wrong route and shouted "What is this? This is the wrong way! We're supposed to take the Appel Quay!". The driver put his foot on the brake, and began to back up. In doing so he moved slowly past the waiting Gavrilo Princip. The assassin stepped forward, drew his gun, and at a distance of about five feet, fired several times into the car. Franz Ferdinand was hit in the neck and Sophie von Chotkovato in the abdomen. Princip's bullet had pierced the archduke's jugular vein but before losing consciousness, he pleaded "Sophie dear! Sophie dear! Don't die! Stay alive for our children!" Franz Urban drove the royal couple to Konak, the governor's residence, but although both were still alive when they arrived, they died from their wounds soon afterwards. Soph is a treasure, I am indescribably happy. She looks after me so much, I am doing wonderfully. I am so healthy and much less nervous. I feel as though I had been born again. The most intelligent thing I've ever done in my life has been the marriage to my Soph. She is everything to me: my wife, my adviser, my doctor, my warner, in a word: my entire happiness. Now, after four years, we love each other as on our first year of marriage, and our happiness has not been marred for a single second. Our hearts are full of happiness over the most gracious visit with which Your Highnesses are pleased to honour our capital city of Sarajevo, and I consider myself happy that Your Highnesses can read in our faces the feelings of our love and devotion, of our unshakable loyalty, and of our obedience to His Majesty our Emperor and King, and to the Most Serene Dynasty of Hapsburg-Lorraine. All the citizens of the capital city of Sarajevo find that their souls are filled with happiness, and they most enthusiastically greet Your Highnesses' most illustrious visit with the most cordial of welcomes, deeply convinced that this stay in our beloved city of Sarajevo will ever increase Your Highnesses' most gracious interest in our progress and well-being, and ever fortify our own most profound gratitude and loyalty, a loyalty that shall dwell immutably in our hearts, and that shall grow forever. It gives me special pleasure to accept the assurances of your unshakable loyalty and affection for His Majesty, our Most Gracious Emperor and King. I thank you cordially for the resounding ovations with which the population received me and my wife, the more so since in them an expression of pleasure over the failure of the assassination attempt. As I was drawing out my handkerchief to wipe away the blood from the Archduke's lips, her Highness cried out: "For God's sake! What happened to you?" Then she sank down from her seat with her face between the Archduke's knees. I had no idea that she had been hit and thought that she had fainted from shock. His Royal Highness said "Sophie, Sophie, don't die. Live for my children." I seized the Archduke by the coat collar to prevent his head from sinking forward and asking him: "Is your highness in great pain?" To which he clearly answered: "It is nothing." His face was slightly distorted, and he repeated six or seven times, every time losing more consciousness and with a fading voice: "It is nothing." Then came a brief pause followed by a convulsive rattle in his throat, caused by a loss of blood. This ceased on arrival at the governor's residence. The two unconscious bodies were carried into the building where their death was soon established. The Archduke Francis Ferdinand of Austria, nephew of the aged Emperor and heir to the throne, was assassinated in the streets of Sarajevo, the Bosnian capital, yesterday afternoon. His wife, the Duchess of Hohenberg, was killed by the same assassin. Some reports say the Duchess was deliberately shielding her husband from the second shot when she was killed. One victim was struck in the body and the other in the face; the telegrams are contradictory about which wound the Archduke suffered and which his wife. Two attempts were made on the Archduke's life during the day. He was in Bosnia inspecting the manoeuvres of the Austrian Army Corps stationed in the province, and had devoted yesterday to a procession through the capital. During the morning a bomb was thrown at the Imperial motor car, but its occupants escaped unhurt. In the afternoon in another part of the town a Serb student fired a revolver at the car, killing both the Archduke and the Duchess. We thought that only people of noble character were capable of committing political assassinations. We heard it said that he (Archduke Franz Ferdinand) was an enemy of the Slavs. Nobody directly told us "kill him"; but in this environment, we arrived at the idea ourselves. I would like to add something else. Although Princip is playing the hero, and although we all wanted to appear as heroes, we still have profound regrets. In the first place, we did not know that they late Franz Ferdinand was a father. We were greatly touched by the words he addressed to his wife: "Sophie, stay alive for our children." We are anything you want, except criminals. In my name and in the name of my comrades, I ask the children of the late successor to the throne to forgive us. As for you, punish us according to your understanding. We are not criminals. We are honest people, animated by noble sentiments; we are idealists; we wanted to do good; we have loved our people; and we shall die for our ideals.
<urn:uuid:7a56c4f4-9139-42ec-8851-e1258aa83676>
CC-MAIN-2020-24
https://spartacus-educational.com/FWWarchduke.htm
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347425481.58/warc/CC-MAIN-20200602162157-20200602192157-00322.warc.gz
en
0.978477
2,818
3.15625
3
Certainly given Oak Island's long history it is not impossible that a tar kiln was established by the British for the production of this substance. However, the size and nature of a tar kiln is far and removed from the scope and scale of the Oak Island workings. This theory concludes that the Money Pit was not a location of buried treasure, but instead a pumping station for a pirate drydock, making Oak Island one of the first shipyards in North America. The works discovered on Oak Island, from the tunnels to the shafts, resemble known dry-docks found in the West Indies. Although there is no proof of a windmill structure or remnants on the island, the theory was well considered and drawn by its proponent. As pirates were headquartered in the nearby mouth of the LaHave river during the 1690s and beyond, Oak Island made for a sheltered and feasible option for a shipyard. The supposed windmill would work to pump the lower chamber dry, the vessel would then enter the dry dock and the seaward locks are closed. A tunnel is then opened for water to leave the dry dock area and fill the lower chamber, as the windmill continues to pump that water into the upper chamber, where it is tunneled back to the sea by gravity. As others have suggested, while this theory is possible, it seems to represent an enormous undertaking when considering the far simpler practice of careening a vessel for maintenance and repairs. Nova Scotia's geology certainly allows for sinkholes and examples have been documented in the general area of Oak Island. They can vary in size from a few feet to hundreds of feet deep. Some suggest that if there are natural caverns in the islands' bedrock, it can account for the deep shafts, flood tunnels, and even the "tiers of oak logs" could simply occur from the forest caving into the holes. One Oak Island candidate would be the "Cave-In Pit", referring to the spot where Mrs. Sophia Seller's oxen had fallen into a well-like hole in 1878. Later investigations of this pit presented convincing evidence that its original role was as an air-shaft for the construction of the flood tunnel from Smith's Cove, directly below. If the Money Pit is indeed a natural phenomenon, let us simply say that "nature works in very mysterious ways".
<urn:uuid:f7980e93-0d9a-45b3-86ac-eaf9117168b9>
CC-MAIN-2020-29
https://www.oakislandmystery.com/the-mystery/popular-theories/other-theories
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897027.14/warc/CC-MAIN-20200708124912-20200708154912-00560.warc.gz
en
0.96547
482
3.671875
4
There are 100 or even more in a big park, and about 10,000 different variety of birds on the planet, including over 900 in The United States north of Mexico, possibly as much as 300-500 inside your condition or land. Just how many different types of chickens arrived at your yard depends upon your geographical area. If you focus on them and create your lawn desirable by gardening and incorporating perhaps a birdbath, nest boxes, or feeders, you’ll see a lot more than you imagined possible. Aside from the fundamental items of conduct and their beauty, your garden birds could offer you a traditional treasure hunt: What new birds can I see? Maybe there is a variety that’s not visited the lawn since last winter, or-a lot more fascinating-may there be considered a variety I’ve never seen everywhere whatsoever? Baltimore Orioles, for instance and Bullock’s Orioles, enable us to determine their spectacular beauty only throughout the summertime. By early fall they’ve left on the long journey southward to spend in the tropics. While fall comes within the southern U.S., they’ll be replaced by vibrant but nonetheless dapper species for example White-crowned Sparrows and Bright-throated. Some find rest in viewing them; others concentrate intently on the vocal and visible beauty. In a nature of preservation, some support the birds thrive by giving protection and food. Frequently, people become motivated to explore natural heritage, reading books that cope with ornithology, bird study’s technology. Everywhere live, also within the greatest deserts as well as in the greatest Arctic latitudes -but which birds you will find inside your lawn depends mostly on where you live. Of the species identified within this book, be prepared to view just wherever so when the number maps show the ones that happen. Each species has time and its unique place. Animals are beautiful. Certainly, any route you take enjoying birds may be the right one.
<urn:uuid:2195b47c-8552-4e7e-9503-dc1c9b3ccf27>
CC-MAIN-2018-05
http://www.samcef.org/birds-and-birdwatching
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888113.39/warc/CC-MAIN-20180119184632-20180119204632-00545.warc.gz
en
0.936071
413
2.71875
3
If Mesopotamian, Ancient Egyptian, Greek and Roman art were looked together you would be able to identify the change from each other. The form of art depicted ranges from the worshiping of Gods to showing the potential of human beings. Each of these civilizations influences each other which shows change and adaptation in both society and art. First of all, in Mesopotamia one art showing worshiping is the Statue of Gudea in 2150 BCE in Neo Sumeria. The small stone figure is made to be durable and last a while. It can also be seen as a someone with a high status worshiping their religion or praying to a God due to their composure being seated and his hands together with a humble look. Moving on to Ancient Egypt is another example of worshiping. However, the pharaohs were looked upon as rulers are praised highly. Their social status was at the peak and were known to have a form of communication to the gods. They were the chain which connected the people to the many gods. The statue shown below is Menkaure and Queen 2491-2472 BCE which are the pharaoh and queen standing next to each other. It looks like it has been made through a similar material as the previous art, the Gudea. Their posture shows the superiority and power of the two. They are posed in an ideal posture. Their feet are close to each other while standing up vertically. Their are similarities to Mesopotamia and Egyptian art as seen between these two statues. The stiffness in their poses to the chunky like construction give it’s durability and strength. Also, they are posing as if they were prepared to be frozen in this moment. One Greek statue that displays a young male is Kuros. The figure is nude, which represents its appreciation of the body in Greek art. The statue shows the physique of a young adult while displaying the softness of a human body at the same time. Kuros is standing straight, facing forward with two feet almost together, meaning the equal distribution of weight of the entire body. The curves in the facial features such as eyebrows and eyelid down to the knee caps resonate to a natural human body. Humanism is a cultural and intellectual movement of the Renaissance that emphasized human potential to attain excellence and promoted direct study of the literature, art, and civilization of classical Greece and Rome. Greek humanism is the beauty of the human form and essence. It puts the human experience at the center of events. In this statue of the Doryphoros is shows an adult male body with a muscular somewhat bulky body with a blocked shaped torso. The positioning of his feet are in a stance where one leg takes all the weight of the body and the other is merely a support. In this position he is standing in a relaxed state in which he can look around him easily without breaking form. On the other hand Kouros is a teenager or young adult standing in a symmetrical pose. He has a defined body which seems more realistic than Doryphoros and a calm posture. In Roman humanism statues were more symbolic and focused on singular characteristics likes the face or body. In the Marble bust of a man sculpture it shows an elder aged man with a serious look on his face. Usually in Roman sculptures they depict signs of aging and reflecting on the character of the individual where as in Greek sculpture it shows the youth and strength. From the Brooklyn Museum I chose Bird Lady figurine from the Predynastic Period 3500-3400 BC. This pottery was made during the Badarian period (4400-3800 BC) and was named after the village of Badari where it was first found. My first impressions were the subtle details that stood out. First, the shape of the body and arms are curvy which gives off the portrait of a feminine body. Her hands are in the air giving a peaceful vibe as if she was dancing or celebrating in joy. In deeper look, her face and arms resemble the beak and wings of a bird along with her legs which aren’t there as it was a tail. There can also be another meaning since she is so bird like it can resemble freedom or flying. Back in Ancient Egypt women didn’t have many rights. This figurine can represent what women wanted to achieve or feel like because their was a hierarchy where women had to listen to obey men. The Bird Lady has body parts of both a woman and bird. Another aspect I saw was the two toned color. The top part of the woman has a copper like color which could be made up of clay where the bottom has a sandstone color which makes it look like a rock. The bottom half of the figurine can also resemble a dress or skirt. What shocked me the most was the nudity shown on the upper body because I wouldn’t expect ancient Egypt to include it in art. When I browsed around the Soul Of The Nation exhibit, I stumbled upon this painting that caught my attention. This artwork, Did The Bear Sit Under a Tree, by Benny Andrews spoke to me with such intensity. The first thing I noticed was the sloppiness in the execution. I saw that there were multiple colors on the flag and man. For example, the stripes are red and orange and the stars have a light and dark blue background. Also, the entirety of the flag is filled with flaws such as imperfect sizes of the stars followed up with cracks in the stripes. The flag also seems to be rolled up away from the man as if he is fighting for something against what the flag represents. The colored man’s facial expression shows confusion or an undecided look along with anger. His hand gesture clearly shows he is ready to fight or resist against the flag. Meanwhile, his face expresses uncertainty and indecisiveness whether or not to carry out the action. Regardless, the flag is rolled up covering about a third of the portrait as the man is pushing it away from him. The caption for the painting is a representation of a colored man during the civil rights movement with a shaking fist at the flag which was supposed to protect him. The painter portrays a sense of betrayal and anger in the man because of his unhappiness of how the United States treats colored people. Throughout unit 1 we discussed the ideas of formal analysis and critical pedagogy. These concepts were good stepping stones in understanding the meaning of an artwork. This allowed us to comprehend the artist’s meaning and purpose for their work and what they were trying to say. I remember during the first two weeks I could only see what was literally in front of me. For example, when we analyzed the painting of the women, I only noticed what was there. I didn’t see the details and precision put into certain parts of the artwork. One concept we learned was formal analysis. It is an explanation of structure in ways which visual elements function with a piece of work. The purest form of formal analysis is defined to what the viewer sees because that’s how the eye looks at art. Visually speaking there are numerous of ideas and images we see off a piece of art. We use different components such as line, shape and form, space, color, and texture to evaluate what the art means. These components break down the significance of what the artist is truly trying to depict. Also, there are different characteristics and concepts in the components that can describe what is happening. The color, line, scale, space and mass all effect how interpret a piece. According to Anne D’Alleva, “Formal analysis means looking at the work of art to try to understand what the artist wants to convey visually.”D’Alleva is telling us to consider the reason for the creation of the piece and not to focus on what we only see through vision. Using the other concepts can give us a grasp of the true meaning of an piece of work. Another concept we talked about was critical pedagogy which can be found in Paulo Freire’s well known “The Pedagogy of the Oppressed.” This text talks about the “banking model of education” where it treats students as empty vessels to be filled with knowledge. Freire argues that the traditional education system lacks critical thinking and a loss of creativity. How Freire describes this education is educators and teachers deposit information and knowledge into students, or in other words filling up your piggy bank with coins. This method taught students how to memorize information rather than understand what they are being taught. Instead of teaching students the what if, why, and how’s, they simply state facts and expect students to retain that information. Formal analysis is an explanation of structure in ways which visual elements function with a piece of work. The purest form of formal analysis is defined to what the viewer sees because that’s how the eye looks at art. Visually speaking there are numerous of ideas and images we see off a piece of art. We use different components such as line, shape and form, space, color, and texture to evaluate what the art means. These components break down the significance of what the artist is truly trying to depict. Also, there are different characteristics and concepts in the components that can describe what is happening. Formal analysis can help us understand a piece of art better by asking us questions and thinking about things we usually wouldn’t. What is art? Art is complicated and has endless meanings. For example, the Mona Lisa by Leonardo da Vinci. It is a questionable piece of work which is interpreted differently by everyone. There’s an old saying “One person’s trash is another person’s treasure.” To the average person this painting is seen as old piece of artwork that became famous overtime because of the image portrayed during the time period. Five centuries ago it was not common to showcase emotions through a painting and a smile was no exception. To me I see a new style of art, one that expresses creativity and possibilities. Art is subjective to the viewer. In art there is no wrong or right. As a famous man, Bob Ross, once said “We don’t make mistakes, just happy little accidents.” These words of wisdom encourage people to not think of mistakes as a bad thing, but as a natural part of the work. Art is about the journey to create a greater picture that is meaningful with emotion and personality.
<urn:uuid:6c7f0f11-4649-4b7f-b135-ff1b44f6441c>
CC-MAIN-2019-43
https://art1010shawfall18.commons.gc.cuny.edu/author/haley1/
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986688674.52/warc/CC-MAIN-20191019013909-20191019041409-00127.warc.gz
en
0.974837
2,137
3.78125
4
The Health of America: How Healthy is Your State? Drastic decline in America's health, but some states are healthier than others. With a number of initiatives pushing healthy diets and increased physical activity over recent years, prevention of chronic diseases and improvement of overall health has been a key goal for the United States. We now realize that our sedentary, stressful modern lives have not been good to our bodies, and we strive to move in a healthier direction that will impact generations to come. So what many of us are wondering is: How have we been doing? Unfortunately, reports from the 22nd edition of America’s Health Rankings are not encouraging. On the whole, experts report that America’s health has declined by 69% compared to the 1990s — mostly attributable to a drastic increase in obesity and diabetes, among other conditions. In fact, despite the 25% decrease in smoking in the U.S. since 2001, this triumph is swiftly overshadowed by the 37.5% increase in obesity over the same period. Nearly 1 in 3 people are obese in the United States and nearly 1 in 10 have diabetes. Together, the high prevalence of obesity and diabetes contributes to significantly increased risk for heart disease, heart attack, stroke and certain types of cancer. Yet equally concerning are the drastic health disparities between the 50 U.S. states. In general, the Northeast is healthier than the rest of the nation, with Vermont coming out on top for the fifth year in a row. But Southern states, particularly those falling within the so-called “stroke belt,” did not fare as well. Mississippi was the least healthy state for the tenth year in a row, which experts attribute in part to high obesity and poverty rates. Close behind were Louisiana, Oklahoma and Arkansas. Based on this report, the U.S. has a long way to go in improving the health of the nation. Not only is it important to raise the “ceiling,” striving to achieve better health over the years, it is equally as critical to raise the “floor” and focus on bringing the health of the lowest ranking states up to snuff. Questions for You to Consider What criteria were used in evaluating the health of America? A number of core measures were taken into account in measuring the health of America, with the most common being obesity, smoking, diabetes, immunization coverage and cardiovascular deaths. Supplemental measures were also used, such as physical activity rates, healthy diet, and rates of heart attack and stroke.
<urn:uuid:f6170424-c279-425c-8cb1-35d12a264367>
CC-MAIN-2016-22
https://www.cardiosmart.org/News-and-Events/2012/01/The-Health-of-America
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275181.24/warc/CC-MAIN-20160524002115-00209-ip-10-185-217-139.ec2.internal.warc.gz
en
0.96651
517
2.828125
3
Skip to main content Back to Results Earthquakes, Plate Tectonics, Earth Structure - 12 of 11 Earthquakes, Plate Tectonics, Earth Structure FAQs - 11 Found Where can I find earthquake educational materials? What is an earthquake and what causes them to happen? What is surface faulting or surface rupture in an earthquake? What do we know about the interior of the Earth? How can I find out about earthquakes in my area? USGS Spotlight Questions
<urn:uuid:c9f539ec-e2d1-4c68-887c-d1a4c1660562>
CC-MAIN-2014-42
http://www.usgs.gov/faq/categories/9827/3423_home
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646425.54/warc/CC-MAIN-20141024030046-00003-ip-10-16-133-185.ec2.internal.warc.gz
en
0.798336
104
3.15625
3
In 1949, classics professor Joseph Campbell published The Hero with a Thousand Faces. He compared hundreds of different stories and myths from all over the world — from Gilgamesh to Perseus, Beowulf to Odysseus, Jesus to Mohommad — identifying common elements and structures that seemed to serve some universal psychological need. The hero is introduced in his Ordinary World; he is Called to Adventure but Refuses the Call, only to change his mind after a Meeting with the Mentor. Then he Crosses the Threshold into an unfamiliar world, meets Allies and faces Tests, which ultimately lead to a journey into the underworld where he faces an Ordeal and gains a Reward. But the Road Back is fraught with danger (usually a big chase scene), often resolved by a Leap of Faith, leading to a Resurrection, when the hero comes back from the brink of (or, in the case of Jesus, actual) death, to Return home, where he assumes his place in society as a wise and strong leader. George Lucas read Campbell's work while a student at USC, and he applied Campbell's ur-structure to Star Wars. By the mid-'80s, the secret was out, and everyone in Hollywood was creating self-conscious versions of what Campbell called the "monomyth." In as much as the Hero's Journey got filmmakers to pay attention to story structure, it has been a good thing. But its ubiquity and the belief that it was a magic formula for success has created a stultifying sameness in screenplays. The other problem with the Hero's Journey is that it's always about a he. There are goddesses aplenty, but female mythological heroes, such as the Greek huntress Atalanta, are rare. What happens when you test the monomyth by setting a woman on the Hero's Journey? Wonder Woman is the third-oldest surviving comic book hero. She made her debut as a Nazi-punching feminist eight years before Campbell's book. And yet, 40 years after Christopher Reeve donned the Superman tights and 28 years after Tim Burton brought Batman to the big screen, we are only now seeing a Wonder Woman feature film. Swamp Thing got a movie before Wonder Woman, but maybe we had to wait for the stars to align for Diana Prince to get a treatment as good as Patty Jenkins' film. - Chris Pine (left) tries to keep up with Gal Gadot in Wonder Woman, the first feature film about the Amazing Amazon. The only bright spot in the turgid Batman v Superman was Gal Gadot's cameo as the Amazing Amazon. Now that she's carried a $143 million production on her chiseled back, it's clear Gadot is a movie star of the first water. Her jawline is more heroic than Ben Affleck, and her face is friendlier and more expressive than Henry Cavill. She's just as great when she's wrapping boy toy Steve Trevor (Chris Pine) in her magic lasso as when she's storming across no man's land in 1917 Belgium, but Gadot's best scene is when the Amazon princess tries ice cream for the first time. Diana's confident, determined gaze melts away for a moment, and we can see her think "maybe the World of Men isn't so bad after all!" Wonder Woman was formed from clay and given life by Zeus, but godlike perfection is boring, so Jenkins and writer Allan Heinberg use Diana's naive wonder to endear her to the audience. Wonder Woman is a Hero's Journey, but with its multiple flashbacks, it's not a conventional one. Diana doesn't Refuse the Call to heroism in the beginning — she waits until after she has seen the destruction of war and the corruption of men. For Diana's Ordeal in the underworld, Jenkins and Heinberg turn to the Gospel of Matthew. Ares (David Thewlis) shows her the world and points out, correctly, that she's not like these puny humans. If she wants to end suffering and impose order, she can do it by force and rule as the awesome queen she is. Diana, like Jesus, rejects the temptation. Despite the fact that these humans — these men — don't deserve her perfection, she's got to do things the hard way. The difference between a tyrant and a hero is that a hero leads by example, and men — humans — follow willingly. That's what it takes to bring about a paradigm shift, and that's what the Hero's Journey has always been about. Making the Hero with a Thousand Faces a woman proves the primal power of the oldest story by opening it up to half the world. After untold thousands of years, it still works. As we filed out of a packed matinee screening, I heard a teenage girl exclaim, "I'm ready to go kick some ass!"
<urn:uuid:32fac2bc-0f8d-4650-930b-ad9e76ed7342>
CC-MAIN-2017-47
https://m.memphisflyer.com/memphis/wonder-woman/Content?oid=6798301
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807084.8/warc/CC-MAIN-20171124031941-20171124051941-00278.warc.gz
en
0.963338
995
2.515625
3
The Andean Initiative pursues a collaborative and demand-driven direction for research and development. It specifically seeks to address the threats of agrobiodiversity loss, climate change, and malnutrition in an integrated manner: Agrobiodiversity: The Initiative will promote interactive in-situ conservation in biocultural hotspots, as well as biodiscovery, bioeconomy, and differential market systems based on the Andes’ unique species and varietal diversity. Climate action: The Initiative will produce a range of science-based solutions to strengthen the climate resilience of mountain communities, while assuring sustainable management and restoration of carbon stocks in high-altitude peat and grasslands. Food for health: By keeping the focus on people, we can uncover important breakthroughs on diet, food chains, and consumer behavior, compiling evidence to build systems that provide healthy diets to fight the double burden of malnutrition – stunting and obesity. Closing the gap: All thematic areas of the Andean Initiative will proactively address social barriers to achieve inclusive development and to maximize the potential of digital tools and communication technologies to boost accessibility, portability, and coverage of information for mountain agriculture. Through our science for co-innovation, we will integrate the needs and perspectives of youth, women and indigenous people within all our research and interventions to ensure we support social transformation, youth entrepreneurship, gender equality, and indigenous people’s empowerment. Working closely with a range of stakeholders from universities, the private sector and civil society, the Andean Initiative offers a rare opportunity to combine the applied scientific research to ensure the on-farm conservation of agrobiodiversity, innovative climate action and adoption of healthy diets.
<urn:uuid:2c4eace2-020e-429f-bee1-5c77a2618e3d>
CC-MAIN-2022-33
https://cipotato.org/andeaninitiative/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00044.warc.gz
en
0.886247
343
2.5625
3
Have you ever had a meeting, or a brain storming session, that involved a lot of coffee and enthusiasm, with everyone throwing out ideas at a breakneck pace, and quickly becoming convinced of their brilliance? I had just such a meeting one morning not too long ago. Everything moved really, really fast, and we were convinced that we’d hit upon a really good idea. Later that evening, everything about the idea that we’d come up with began to fall apart. The next morning, I woke up to an email from one of the meeting’s participants with the subject heading, “Maybe this is why we thought it was such a good idea.” The email had no text, only an attached paper by Emily Pronin and Dan Wegner titled “Manic Thinking: Independent Effects of Thought Speed and Thought Content on Mood”1. Pronin and Wegner note that the psychiatric illness, mania, is associated with both increased thought speed and elevated mood, along with delusions of grandeur, and the feeling of heightened creativity and inspiration. However, the effect of thought speed has not been studied independent of clinical mania. To explore this relationship, they had college undergrads read out loud a series of emotion-inducing statements (58 in all) in at either a fast or slow pace. The statements, which have been used to manipulate mood for a few decades, start out emotionally neutral, and then become more and more emotionally positive or more and more emotionally negative. The idea is that reading a series of progressively more positive or negative statements will affect the reader’s mood accordingly. The letters in the statements were presented one at a time, either for 40ms per letter (fast thinking condition) or 170 ms per letter (slow thinking). A pilot study indicated that the 40ms per letter reading time was about twice the normal reading speed for college undergrads, with 170 ms being about half the normal speed. The time between statements also varied, with only 320 ms between statements in the fast condition, and 4 seconds between statements in the slow condition. After reading all 58 statements, participants were asked to answer a series of questions designed to assess their mood, energy level, feelings of power, creativity and inspiration, and “grandiosity or inflated self-esteem,” along with their own perceptions of their speed of thought. Not surprisingly (and confirming that the manipulation was working), participants in the fast thought condition reported faster thought speeds than those in the slower condition. Consistent with the hypothesis that faster thought speeds affected mood and mania-related feelings, participants in the fast thought condition reported being happier, had higher energy levels, experienced greater senses of power and creativity, and higher levels of grandiosity (though self-esteem did not differ between conditions). Furthermore, these effects were independent of the mood manipulation (positive or negative statements). Here is Pronin and Wegner’s graph presenting the effects of slow and fast thinking as a function of the type of sentence (positive or negative; from their Figure 1, p. 810): So there you have it. Thinking fast produces effects on mood and self-view similar to those of clinical mania. Of course, nothing in these results says that thinking faster doesn’t actually lead to more creativity and inspiration, but my colleague was probably right: the fact that we’d been thinking so fast during our meeting likely had something to do with the fact that we thought what turned out to be a bad idea was so good. I wonder how much of a role coffee played in this. While I don’t know of any research on the effect of caffeine on the speed of thought, it is a stimulant, and the fact that we were drinking it in large amounts (the meeting took place at a local coffee house) couldn’t have helped. The implications are clear, then. It’s important, when you’re dealing with something important, to slow down now and then (and cut off the supply of coffee) in order to be able to objectively evaluate the ideas your producing. Otherwise, you might end up like we did, with hours of work that produce only bad ideas. 1Pronin, E., & Wegner, D. M. (2006). Manic thinking: Independent effects of thought speed and thought content on mood. Psychological Science, 17(9), 807-813.
<urn:uuid:a2e512ed-b32a-4cec-8efd-9a0ed28b06d7>
CC-MAIN-2016-07
http://scienceblogs.com/mixingmemory/2007/02/06/thinking-faster-makes-you-feel/
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701164289.84/warc/CC-MAIN-20160205193924-00251-ip-10-236-182-209.ec2.internal.warc.gz
en
0.969914
913
2.609375
3
How is learning to speak different from learning to read and write? – Richard Olsen's Blog Time to read: 6 minutes It appears de rigueur at the moment to make bold proclamations, usually based on flimsy evidence, about what students need to know, in order to learn this or that. For example, people pushing phonics make claims about the essential knowledge readers need to have about reading. Proponents of direct instruction make claims about the incompatibility of using play or inquiry to learn specific scientific concepts of mathematics, while others outline the non-negotiable knowledge that student writers apparently need to know in order to write. Recently, I’ve encountered people trying to justify their beliefs in specific essential learning by citing “biological primary and secondary knowledge,” ignoring that fact that Vygotsky, Piaget, and others have differentiated spontaneous and non-spontaneous concepts for eighty years! Even the most devout direct instructionists admit that everyone learns to talk spontaneously. Jane's Pick of the Day: 25 places to find instructional videos Recently I have received a number of emails asking about places that offer free instructional videos (on all subjects), so I thought I would put together a posting of the main ones that I know about: 5min Life Videopedia - instructional and how-to videos Academic Earth - Thousands of video lectures from the world's top scholarsblip.tv - next generation TV networkGoogle Video - videos on all topics Graspr - The instructional video network Howcast - How-to videos iCue - A fun, innovative, learning environment built around video from the NBC News ArchivesInstructables - Make, HowTo and DIY iTunes U - Faculty are using iTunes U to distribute digital lessons to their students, e.g Stangord, Trinity College Dublin, etc. 6 Must-Have Creation Tools for the BYOD Classroom Providing opportunities for students to make and create is essential in 21st-century classrooms. Children of all ages should experience the joy of seeing their work shared and celebrated. Classrooms with access to a variety of different tools have plenty of tech tool options. A Technology Integration Planning (TIP) Model For Teachers Teachers are the ones that decide on instructional strategies and how to carry them out. When teachers create an instructional design for technology integration, they need to consider the characteristics of their topic and the needs of their students and then decide on a course of action that will meet both needs within the constraints of their classroom environment. When deciding on teaching/learning methods the first distinction a teacher must make is whether or not to use directed strategies or constructive strategies. After determining whether integration strategies will be primarily directed or constructive, also consider content approach. Should the approach be single subject or interdisciplinary? A few other questions that a teacher will need to answer while developing instruction is: Should students work individually, in pairs, in small groups, or as a whole class? How Teachers Can Change the Future of Educational Technology - InformED These days, it’s hard not to overhear a conversation about a new app on the market or software product development. Some creations are superfluous—do people really need another photo-sharing app? But the burgeoning world of technical tools is solving real, important problems in society, from healthcare to environmental preservation to education. Educational technology, or edtech, is one such industry that is receiving increasing attention and investment, and entrepreneurial individuals are taking note of this. The principles of learning to design learning environments The OECD Handbook for Innovative Learning Environments The principles of learning to design learning environments DOI: This site is powered by Keepeek 360, Logiciel de Photothèque for business. How to Turn a Classroom Research Project into an Infographic Conveying information in a striking, concise way has never been more important, and infographics are the perfect pedagogical tool with which to do so. Below, you’ll find my experience with designing an infographic-friendly classroom research project, explained in a step-by-step process you can implement in your own classroom. Familiarize Students With the Infographic Concept Photo credit: visual.ly After hearing all the buzz about infographics in education, I thought I’d experiment with the concept in my seventh-grade accelerated English class. I wanted to ease my students into the idea, so we first spent time researching infographics — what they are, how they work, and what kind of information is best conveyed by the medium. Behaviourist models linking stimulus and response - Pavlov Drag the boxes onto the matching gaps. temporalconditionedStimulusResponseBellneutralfoodClassicalsalivationunconditionedassociatereflex10-12salivate Pavlovian Conditioning Pavlov (1902) started from the idea that there are some things that a dog does not need to learn. For example, dogs don’t learn to whenever they see food. OLCreate: Dyslexia and Inclusive Practice Introduction to Dyslexia and Inclusive Practice Introduction to Dyslexia and Inclusive Practice is the first of three free online modules developed to complement the 2015 Education Scotland Route Map for Dyslexia and Inclusive Practice and support the professional standards from the General Teaching Council for Scotland. This free module aims to provide teachers and local authority staff with an awareness of what dyslexia is, its impact and how it can be supported within an inclusive school community. It may also be of interest if you work in the voluntary sector or simply have an interest in dyslexia and inclusive practice. Hippocampus: Homework and Study Help Can I take a course at HippoCampus for credit? How do I enroll in a course at HippoCampus? Are there any fees to take your courses? How do I make a comment or ask a question? Allocating Student Study Time: "Massed" versus "Distributed" Practice How does the mind work—and especially how does it learn? Teachers make assumptions all day long about how students best comprehend, remember, and create. These assumptions—and the teaching decisions that result—are based on a mix of theories learned in teacher education, trial and error, craft knowledge, and gut instinct. Such gut knowledge often serves us well. But is there anything sturdier to rely on? Cognitive science is an interdisciplinary field of researchers from psychology, neuroscience, linguistics, philosophy, computer science, and anthropology that seek to understand the mind.
<urn:uuid:0ac7b5a2-d77b-40a4-a511-6bcc18529fd0>
CC-MAIN-2021-43
http://www.pearltrees.com/u/147541075-matrix
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585504.90/warc/CC-MAIN-20211022084005-20211022114005-00285.warc.gz
en
0.92564
1,319
3.484375
3
SYLLABUS Previous: 1.4.3 Finite elements Up: 1.4 Numerical discretization Next: 1.4.5 Harmonic functions Starting from an approximation on an inhomogeneous mesh, the idea of splines is to provide a global interpolation that is continuous up to a certain derivative. For example, take a cubic Hermite spline with the 4 parameters , which completely determine all 4 coefficients of the cubic polynomial It is straight forward to calculate the first and second derives Starting with only sampled values and no information about the curvature, are usually calculated so as to guarantee a smooth interpolation. Most common is to require that be continuous from one interval to the next, leading to a tridiagonal system that holds for and can be solved efficiently with operations. Two free parameters at the boundaries are used to impose the boundary conditions by choosing and (1.4.4#eq.2). 1.4.4#fig.1) illustrates the procedure and shows the excellent quality of a cubic approximation until it breaks down at the limit of 2 mesh points per wavelength. |Copyright © Lifelong-learners at 03:27:25, March 22nd, 2019|
<urn:uuid:794880ed-f368-4c42-82e7-cae2ab1093c3>
CC-MAIN-2019-13
http://www.lifelong-learners.com/pde/SYL/s1node20.php
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202589.68/warc/CC-MAIN-20190322014319-20190322040319-00076.warc.gz
en
0.895268
254
4.03125
4
When I first started writing, I wrote a piece called 10 Things I Wish my White Teacher Knew. I took some time to reflect on my school years as a black girl with mostly white teachers in Metro Detroit. I got a lot of positive feedback. One teacher said, “I loved your piece!” I thanked her and I told her she was a remarkable teacher, and our students were lucky to have her. She responded,“I don’t see color, I just see kids.” I knew she meant no harm, so I smiled. But it bothers me to this day I didn’t ask her to reevaluate her approach. So, I have been thinking about the eleventh thing I wish my white teacher knew: You need to see color. You need to see color because there is nothing wrong with color. The cure for racism in education is not colorblindness. Colorblindness erases the student’s individuality in the educational space. The statement is a microaggression, or a statement with an undercurrent of prejudice, which says that your racial and cultural identity is not a factor. Our students are grappling with their identity and race is a part of that. The way our world is set up, black and brown kids have to be taught self-love on purpose. So, provide opportunities which allow them to broadcast their racial and ethnic identities, and be proud of it! It’s okay to say things like “black is beautiful,” and for a white educator to facilitate a discussion on race. It just has to come from the right place. You need to see color so that you can lift up students’ perspectives. If you are a white teacher in a minority classroom, you may not understand your students’ perspective on certain issues. For example, the flag demonstration #takeaknee—Kaepernick says he is taking a knee to bring light to police brutality and injustice. However, there is another loud voice which says he is disrespecting troops. This “narrative switching” is very popular tool for white supremacists. Historically, when people of color stepped “out of order” people in power changed the narrative. So much that minorities were branded as troublemakers, even to their own people. Teachers, it is important that you understand the dichotomy of your reality and theirs, and color is necessary for that. You don’t have to agree with your students’ perspectives. However, it is necessary that we understand black and brown children may experience and interpret events differently than yourself. When you try to change that narrative, you erase their unique experiences which shape them—you whitewash them. Do not find yourself on the wrong side of this issue. Allow open conversations so children can speak truth to power. Model how in America people can have different perspectives and coexist. You need to see color because your black and brown students do not have the luxury to unsee color. Minority students are taught to be constantly aware of themselves and others. I remember when I had my first job interview. My mom took me shopping. We had a hard time finding a nice suit that was professional, but that didn’t appear too aggressive. Then a harder time wearing ballet flats because I did not want to appear to be domineering. Every person of color has a similar story where an elder takes time to talk about the way their physical appearance is interpreted by white people. Do white people talk about how to make themselves appear more culturally aware in interviews? Too often we minorities quiet ourselves to not appear too black or ethnic out of fear that we will be seen as undesirable. As a white teacher of minority students you should create a space where your students are not worried about you judging them for being themselves; i.e getting loud, laughing infectiously, even blowing hot air out of their mouths. Take their words at face value and adopt a policy of assuming positive intent, even if your logic or history has taught you otherwise. Teachers need to see color because it is one of the things that make your students unique. Every time a white teacher says, “I don’t see color,” you abandon a child in an educational void by refusing to recognize them for who they are. Additionally you fail to prepare them to enter a world who will see their color as a factor to their success and abilities. As more white teachers travel into predominantly black schools to teach, and students of color migrate into affluent white communities to learn, I get excited about the possibilities. On the other hand, I fear they will become less self-aware of their cultural significance and asked to blindly assimilate. So, if this is going to work, it is time to kill the idea of the colorblind white teacher for minority students. Join us in our WeAreTeachers HELPLINE group on Facebook to talk about your teaching questions, including those around teaching and race.
<urn:uuid:51e39ba4-ed08-4906-868f-ab794db63250>
CC-MAIN-2021-21
https://www.weareteachers.com/white-teachers-need-to-see-color/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988793.99/warc/CC-MAIN-20210507120655-20210507150655-00269.warc.gz
en
0.974625
1,020
2.875
3
CARPENTER, noun An artificer who works in timber; a framer and builder of houses, and of ships. Those who build houses are called house-carpenters, and those who build ships are called ship-carpenters. In New England, a distinction is often made between the man who frames, and the man who executes the interior wood-work of a house. The framer is the carpenter and the finisher is called joiner. This distinction is noticed by Johnson, and seems to be a genuine English distinction. But in some other parts of America, as in New-York, the term carpenter includes both the framer and the joiner; and in truth both branches of business are often performed by the same person. The word is never applied, as in Italy and Spain, to a coach-maker.
<urn:uuid:11c51482-b541-410b-a750-e888237fcd7f>
CC-MAIN-2021-43
http://webstersdictionary1828.com/Dictionary/carpenter
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585504.90/warc/CC-MAIN-20211022084005-20211022114005-00250.warc.gz
en
0.98303
176
3.140625
3
Issue Date: March 25, 2013 ACS Guidelines For Teaching High School Chemistry Fostering the development of the most innovative, relevant, and effective chemistry education in the world is an important goal in the American Chemical Society’s Strategic Plan for 2013 & Beyond. The Society Committee on Education (SOCED) is charged with strengthening the science education infrastructure at all educational levels to meet the changing needs of the science community. SOCED fulfills its charge in part by developing and disseminating outward-facing reports, recommendations, and policy. In the spring of 2012, SOCED released “ACS Guidelines and Recommendations for the Teaching of High School Chemistry,” a publication it had last revised in 1984. The document provides guidance on teaching high school chemistry to all students. It recognizes the professional integrity of chemistry educators who are devoted to sharing and upholding best teaching practices and providing optimal facilities to achieve excellence. The goals of the revision are to reflect changes in pedagogy, assessment, and technology; offer recommendations for improving the environment for teaching and learning by all students; and gain broad acceptance within the high school chemistry teaching community. Throughout the writing process, the SOCED-appointed team sought and incorporated feedback from a variety of constituencies: high school teachers and administrators; faculty at two- and four-year postsecondary institutions; and select ACS committees, task forces, and working groups. Divided into three segments, the document addresses areas critical for consideration in any high school chemistry program. The “Pathways to Learning” section provides guidance on expected student outcomes, the big ideas that should be explored in a high school chemistry course, and effective student-centered strategies for optimal engagement and learning. Recognizing that one size does not fit all, this segment also provides recommendations for teaching students of diverse backgrounds and various levels of academic ability. It explores other topics including assessment, the role of technology, and the laboratory experience. The “Physical Plant” section of the guidelines includes recommendations for creating a safe and dynamic learning environment that is student-centered and curriculum-driven. The segment explores classroom features, such as the laboratory, teacher work spaces, and chemical storage facilities. Important considerations include safety equipment, laboratory equipment, room arrangement, and technology. This section of the document strongly recommends the development of a comprehensive and responsible chemical management program by teachers and administrators together. Finally, the document speaks to the “Professional Preparations and Responsibilities” of high school chemistry teachers. It identifies strategies enabling teachers to create teaching and learning environments that promote equal opportunities for all students to learn chemistry. This segment discusses the ethical considerations, such as ensuring a safe and productive classroom along with an unbiased presentation of content, that exist at the intersection of science and teaching. Recognizing that teaching is a complex and intellectually challenging profession, this section also addresses the importance and characteristics of effective professional development. And it lists examples of professional organizations and resources that support professional development. The guidelines have been disseminated broadly through distribution channels including networks of high school chemistry teachers; Listservs; and numerous local, state, and national conferences. Additionally, members and staff of ACS have directly contacted more than 6,000 school district science supervisors across the U.S. with information about this important document. Symposia and presentations have been held at conferences including the fall 2012 ACS national meeting in Philadelphia; the 2012 Biennial Conference on Chemical Education at Pennsylvania State University; and the 2012 National Science Teachers Association Area Conferences in Atlanta, Louisville, and Phoenix. These facilitated sessions have provided the opportunity to raise awareness of the guidelines and collect important feedback that will inform supplements and future revisions of the document. Additional symposia and presentations are slated for 2013. Members of the high school teaching community have provided positive feedback on the guidelines. Many have emphasized the importance of the document in advocating for the continuation and support of chemistry programs at their institutions. Others have noted the usefulness of the guidelines in informing administrators about best practices in chemistry instruction, particularly as they pertain to the laboratory setting. We hope that the entire ACS membership will join us in broadly disseminating the guidelines to high school chemistry teachers in their communities. You can visit www.acs.org/hsguidelines to view the full report and download a PDF of the document. Please send e-mail requests for hard copies to [email protected]. Views expressed on this page are those of the author and not necessarily those of ACS. - Chemical & Engineering News - ISSN 0009-2347 - Copyright © American Chemical Society
<urn:uuid:3ed3b8ae-ddbb-448e-afd0-5592e79c2d6a>
CC-MAIN-2015-27
http://cen.acs.org/articles/91/i12/ACS-Guidelines-Teaching-High-School.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094662.41/warc/CC-MAIN-20150627031814-00013-ip-10-179-60-89.ec2.internal.warc.gz
en
0.929059
930
3.171875
3
Although not particularly difficult, cutting a slot in wood is one of the less intuitive projects you can take on as an amateur woodworker. Professionals use specialised--and often expensive, tools for the job. However, you can cut slots effectively using standard home workshop tools. Buy extra wood the first few times you try this, since you can expect to make a few mistakes. Mark the borders of the slot you want to cut. If you have a template, position it and trace the template with your pencil. Without a template, use your straight edge and measuring tape to make the mark. Drill a hole through your lumber in one corner of your slot. If possible, use a drill bit that matches the width of your slot. For wide slots, you may want to start with a narrower bit and work your way up to avoid splitting the wood. Drill a second hole in the opposite corner of your slot. Use the same drill bits you did for the first hole. Attach a narrow blade to your jigsaw, one that will fit through the holes you drilled. If none of your blades will fit, drill a second hole that overlaps one of your original holes like a figure eight. Slide your jigsaw blade into one hole and cut your wood along the line you marked. Follow the line all the way to the hole in the opposite corner. Repeat Step 5 to drill along the remaining line. - "Step by Step Basic Carpentry"; Ben Allen; 1997 - These instructions are for cutting slots all the way through wood. For slots that don't pass through, use a Dremel or similar tool to carve the slot.
<urn:uuid:5775d32f-7efd-4434-9f0d-51eb8dbb444c>
CC-MAIN-2019-43
https://www.ehow.co.uk/how_7666597_make-slots-wood.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986673250.23/warc/CC-MAIN-20191017073050-20191017100550-00418.warc.gz
en
0.934595
340
2.5625
3
- President Donald Trump's administration has dramatically reduced the size of Bears Ears National Monument and Grand Staircase-Escalante National Monument — the largest reduction of protected land to date. - Some presidents have made conserving land a priority, while others have opted not to use their power to do so. - Here are the presidents who have protected the most land — and the ones who haven't. President Donald Trump's administration has shrunk two protected areas in Utah: Bears Ears and Grand Staircase-Escalante National Monuments. The size of Bears Ears was reduced by 85%— a loss of 1.1 million acres — and Grand Staircase-Escalante was cut by half. The reductions were based on recommendations from Secretary of the Interior Ryan Zinke, who suggested changes to 10 monuments in September 2017. Various environmental and indigenous groups are now fighting the decision in court. Bears Ears was declared a national monument by former President Barack Obama in 2016. The area is sacred to local Navajo tribes. But Utah Senator Orrin Hatch criticized Obama's decision to protect the area as a "federal land grab." Unlike national parks, which are created through Congress, national monuments are designated by US presidents under the Antiquities Act, which gives them the power to set aside public land for conservation. Former President Theodore Roosevelt signed the act into law in 1906 and used it to protect Muir Woods and the Grand Canyon (which has since become a national park), along with 16 other areas. While each monument is subject to its own rules, most don't allow any motorized vehicles and forbid using the land for mining or drilling operations. Trump isn't the first president to shrink a national monument — Eisenhower, Truman, Taft, Wilson, and Coolidge all did so, but their reductions accounted for much less land area than Trump's. US courts haven't ruled on whether presidents actually have the power to shrink monuments, so a future legal decision could impact protected lands across the country. Trump has yet to establish any new national monuments, though Zinke has proposed three options: the Civil War-era Camp Nelson in Kentucky, Medgar Evers' home in Mississippi, and a swath of the Lewis and Clark National Forest in Montana. Obama, on the other hand, used the Antiquities Act to protect more than 550 million acres throughout his time in office, significantly more than any of his predecessors. His first monument designation came two years into his presidency, on November 1, 2011, when he established a 325-acre park around Fort Monroe in Hampden, Virginia. Here's a ranking of the presidents who protected the most land since the inception of the Antiquities Act: National monument acreage designated by Roosevelt: 3 million acres Like his distant cousin Theodore Roosevelt before him, FDR was instrumental in protecting the US wilderness. Joshua Tree in California, and Jackson Hole in Wyoming, are some of his most famous designations. National monument acreage designated by Roosevelt: 1.5 million acres Roosevelt can be seen as instrumental in the creation of all national monuments in the US, since he signed the Antiquities Act into law in 1906. Of the 18 National Monuments he designated, Muir Woods, which is near San Francisco, is perhaps the most famous. National monument acreage designated by Obama: 553.5 million acres Obama protected more land than any other president during his term, though Trump has rolled some of that back by shrinking Bears Ears National Monument, by 85%. The majority of Obama's addition to the nation's protected acreage was sea ecosystems, since he created and expanded several large marine national monuments in the Atlantic and Pacific oceans. As is clear from the data above, the number of national monuments that a president established doesn't tell the whole story, since monuments vary greatly in size. Obama, however, created the most monuments and preserved the biggest land area of all US presidents.
<urn:uuid:a027c903-7b66-48cb-bc9d-243362ebf07f>
CC-MAIN-2018-39
https://www.businessinsider.com/us-presidents-who-preserved-most-public-lands-antiquities-act-2017-10
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156724.6/warc/CC-MAIN-20180921013907-20180921034307-00459.warc.gz
en
0.958446
812
3.453125
3
Grow a sustainable garden for your chickens to save money on their feed bill. Planting a variety of herbs, shrubs and trees provides food for your chickens and therefore is a great step for a holistic, permaculture homestead. In this post we're going to talk about the layers in a chicken garden. By layers I mean growing plants of varying heights. So you have the short ones like groundcovers and herbs, all the way up to the towering pecan trees and everything in between. We are going to divide these layers based upon their height. The tallest layer, the mid-tall layer, the mid-short layer and the shortest layer. In each section I'll give you a list of several varieties you can choose from for each layer. Then you can pick a plant from each section and plant them together for a food forest for your chickens. Disclosure: Some of the links on this page may be affiliate links, meaning I may get a small commission if you make a purchase. Read the full disclosure here. Make It Holistic It is important to note that as you have fewer species of the tallest layer, you want more and more species in each of the succeeding layers until you reach the lowest layer where you’ll want as many as you can possibly get. This diversity provides a beautifully sustainable garden with a multitude of insects and microbes (in the soil). This is a truly holistic and therefore healthy garden. The Tallest Layer, Overstory or Canopy The tallest layer consists of the really tall fruit and nut trees. This layer will provide the lower layers of your garden with shade and protection. Before planting, think about where the shade is going to be cast from these trees. See how you can use that shade to your advantage. Do you have a chicken coop or outbuilding that needs shade? If not, you may want to plant them on the North side of your planting area (unless you live South of the equator, in which case you'll want them on the South side of your planting area). By planting like this your garden will have some needed sunlight. This layer can include: The Mid-Tall Layer This layer consists of shorter trees. Dwarf fruit trees or regular fruit trees that are pruned and kept small fall into this layer. Before planting, think about what shade is being created by the canopy layer and try to keep the sun-loving trees on the outside of the tallest layer’s canopy. Again about the shade these trees will create. Think about which shorter plants you’d like to grow under here and see how you can plant to the best advantage of the whole system. A few ideas for this layer are: - Moringa (edible leaves and flowers) The Mid-Short Layer This layer may contain things like bushes, shrubs, short trees and vines. Try to choose ones that bear fruit like blueberries, figs, blackberries, elderberries, etc., or edible leaves like Siberian Pea Shrub, Moringa, etc. Before planting, keep in mind what shade is being created by the higher layers and what you want to plant beneath. This layer is more flexible and not as crucial as the higher ones. - Goji berry - Siberian Pea Shrub (edible leaves) - Moringa (edible leaves and flowers) Vines: (Support vines by letting them grow up a tree or trellises.) - Passion fruit - Akebia (edible fruit) - Chayote (a perennial squash) - Groundnuts (perennial root crop) The Shortest Layer In this layer you’ll find a multitude of short-growing species. Herbs, flowers, and groundcovers are all important in this layer. Before planting, see where all the shade is going to be cast by all the taller trees and plant lots of shade-loving plants there. Find the pockets of shade and try planting a few of the herbs that like a little more sun. Plant ideas for this layer: - Herbs (another blog post is coming soon to give even more details about herbs.) - Flowers (attracts beneficial insects) - Annual vegetables (lettuce, beets, mustard, kale, spinach, etc.) - Groundcovers (clover, buckwheat, oats, alpine strawberries, etc.) Root Vegetables & Microbes This is the layer under the soil, the only one you can’t see. By growing a diverse combination of species (listed above) you’ll be growing happy and healthy microbes. Here are also a few root vegetables you can add to your chicken garden. Before planting, know when it comes time to dig up your root vegetables, you’ll need to be careful digging because of all the other roots that are growing around your vegetables. A few things you can include: - Sweet potatoes - There are a lot of uncommon root vegetables that you might look into and try as well. How to Choose Pick a few species from each list. Pick them based upon… Your climate. Find ones that are known to thrive in your climate. It there are others you would like to grow as well, get some of the hardy ones growing first before experimenting. The other plants you have chosen for your system. When choosing, try to look at all the ones you’d like to plant and make sure they have similar needs as far as, things like water requirements. You’re going to have a hard time if you plant a desert cacti next to a rainforest tree. Growing a chicken garden is a great way to get your homestead on the path to sustainability. In the next few weeks I’ll have a post on how to start a chicken garden and which herbs you should include in it. If you’re interested in cutting your chicken’s feed bill, check out this page to learn more: 10+ Ways to Save on Your Feed Bill
<urn:uuid:66ec98ed-544a-47ad-b682-6500296b9551>
CC-MAIN-2023-40
https://www.reformstead.com/how_to_grow_a_sustainable_permaculture_diy_chicken_garden_for_sustainable_chicken_feed.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510179.22/warc/CC-MAIN-20230926075508-20230926105508-00232.warc.gz
en
0.942142
1,352
2.796875
3
Hot pepper spray, typically made with cayenne pepper and garlic, has become an increasingly popular natural pesticide. It is believed to repel all manner of pests, including caterpillars, aphids, and Japanese beetles. Pepper sprays are also thought to repel wildlife such as deer, squirrels and rabbits, and cure common plant diseases such as powdery mildew and blight. Ingredients and Equipment The two primary ingredients used to make hot pepper spray are garlic and cayenne pepper. You'll need two medium sized bulbs of garlic and four large cayenne peppers, either fresh or dried. Mineral oil, hot water and natural liquid soap are also required. Mineral oil can be found in your local drug store or hardware store, and natural liquid soap can be found in natural health stores. Dr. Bronner's Castile Soap is one such brand, but any type available may be used. You'll also need some common kitchen equipment, including a blender, cheesecloth, rubber gloves, a pint-sized canning jar with lid for storage and a spray bottle for application. It's best to use a blender that will not be used for food preparation. However, if you don't have a spare blender, make sure to wash thoroughly to remove any mineral oil residue before using again. If cheesecloth is not available, you can use nylon pantyhose to strain the liquid. Making Hot Pepper Spray Coarsely chop the four garlic cloves, leaving the peel intact. Place them in a blender with the cayenne peppers. Add 2 tbsp. of mineral oil, 2 cups hot water and 3 tsp. of natural liquid soap. Place the lid on the blender and process on high speed for two to three minutes, or until pureed. Allow the hot pepper spray mixture to stand overnight, which will increase the heat and effectiveness of the solution. In the morning, put on a pair of rubber gloves to protect your hands. This mixture can irritate the skin, so be careful while handling. Strain the liquid through a piece of cheesecloth (or nylon pantyhose) into a glass pint-sized canning jar. Secure the lid tightly and store in a cool, dry place for up to 90 days. Using Hot Pepper Spray To use, measure 1/4 cup of the mixture and transfer to a clean spray bottle. Add about 5 cups of water and shake well to combine. Spray directly onto plants as necessary, being careful not to get any of the liquid on your skin. It's a good idea to wear gloves any time you are handling the hot pepper spray. You can make a larger batch to use in a garden sprayer for larger pest problems. Just stick to the formula above of 1/4 cup of solution to every five cups of water.
<urn:uuid:2d0d9c12-cc15-43d1-ad9c-415cbbf045ae>
CC-MAIN-2018-51
https://www.gardenguides.com/way_5194858_hot-pepper-spray-recipe.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376832330.93/warc/CC-MAIN-20181219130756-20181219152756-00020.warc.gz
en
0.930862
569
2.71875
3
The Legislature finds and declares all of the following: (a) The public library is a supplement to the formal system of free public education, a source of information and inspiration to persons of all ages, cultural backgrounds, and economic statuses, and a resource for continuing education and reeducation beyond the years of formal education, and therefore deserves adequate financial support from government at all levels. (b) It is in the interest of the people and of the state that there be a general diffusion of information and knowledge through the continued operation of free public libraries. This diffusion is a matter of general concern inasmuch as it is the duty of the state to provide encouragement to the voluntary lifelong learning of the people of the state. (c) Many existing public library facilities are not safe, efficient, or accessible for use, adequate for the size of the communities they serve, or otherwise capable of providing the public library services needed by the communities they serve. (d) Many communities that are populous enough to require a public library facility do not have one. (e) Local public library authorities do not have sufficient funds to construct or rehabilitate necessary public library facilities. (f) Funding to meet the need for public library facilities, which is beyond the ability of local government to supply, is most appropriately met by a partnership of state and local governments. (Added by Stats. 1988, Ch. 49, Sec. 1.)
<urn:uuid:5963df0d-a4f5-45b9-86c9-b46181a6358b>
CC-MAIN-2022-40
http://www.gamutonline.net/district/moragaesd/DisplayPolicy/130099/3
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00675.warc.gz
en
0.938605
290
2.828125
3
by Martha Rogers Every year, thousands of people across our country celebrate what many call "St. Paddy's Day" and have parades and drink green beer to celebrate a man about whom most people know little. So many aren't even aware of the origins of the holiday or the true meaning. All they know is the fun of wearing green, going to parades, eating Irish food, wearing shamrocks of some kind, and having fun at local pubs. I remember getting pinched if I didn't wear something green on March 17. Just who was St. Patrick and how did he manage to have a holiday named for him? Curiosity drove me to the internet and the number of websites telling the history of the holiday and the story of St. Patrick amazed me. The legend has him driving snakes out of Ireland, but did he really drive them out? What was his background? How did all the celebrations surrounding him get started? St. Patrick, who wasn't Irish by birth or descent, was a Catholic priest whose birth name is believed to have been Maewyn Succat. He changed it to Patricius or Patrick, derived from the Latin term for "father figure." Born in Briton at the time it was part of the Roman Empire, he was taken to Ireland as a slave. Whether he escaped or was released is all speculation, but he later returned to Ireland and became involved with converting Druids to Christianity. As far as the snake legend is concerned, Ireland never really had snakes like that and it is believed snakes had become the symbol for the Druids. However, St. Patrick didn't convert all of Ireland to Christianity, so tale is believed to be simply a myth or legend. Another myth associated with St. Patrick is the use of the shamrock, a three leaved clover, to teach the concept of the Holy Trinity, but nothing like that was ever discovered in his writings, so it joined the ranks of myth and legends. However, the shamrock became associated with St. Patrick and thus a part of the celebration of St. Patrick's Day. Patrick and his four disciples traveled all over Ireland converting clan chiefs, building churches, opening schools and monasteries and convincing many Irish to become monks and nuns. For forty years he preached throughout Ireland. Most of his life was spent in poverty. He died on March 17, 461 A.D. and that became the day to celebrate his life. He died in his Church in Sabhall, County Down. The first St. Patrick's Day parade took place in 1737 in Boston to celebrate the Irish culture in the new colonies. The idea took hold and made it back to Dublin as well as spread to other parts of the colonies. Eventually it spread to other countries and became a popular holiday. In Ireland, it is a national holiday and has been celebrated since the beginning of the 20th century, but they didn't hold a parade in his honor until 1930. In 1848, several Irish Aid Societies in New York decided to band together for one big parade. That parade has grown into the world's oldest civilian parade and the largest in the U.S. Other large parades are held in Boston, Chicago, Savannah, and Philadelphia. Chicago is even known to dye the river green as it flows through the area. Today, St. Patrick's Day isn't seen as a religious holiday, but as a day to have fun and drink Guinness beer and dress like Leprechauns. Celtic music, dancing and wearing green are a part of the holiday. It's now largely symbolic, but it's a great day to have fun with your friends. Erin Go Braugh. To learn more about this day, visit https://www.history.com/topics/st-patricks-day/history-of-st-patricks-day Martha Rogers is a multi-published author and writes a weekly devotional for ACFW. Since receiving her first novel contract at age 73, Martha has written and published over 50 books. Martha and her husband Rex live in Houston, Texas where they are active members of First Baptist Church. They are the parents of three sons and grandparents to eleven grandchildren and great-grandparents to five. Martha is a retired teacher with twenty-eight years teaching Home Economics and English at the secondary level and eight years at the college level supervising student teachers and teaching freshman English. She is the Director of the Texas Christian Writers Conference held in Houston in August each year, a member of ACFW, ACFW WOTS chapter in Houston, and a member of the writers’ group, Inspirational Writers Alive. Find Martha at: Twitter: Martharogers2 Facebook: https://www.facebook.com/MarthaRogersAuthor
<urn:uuid:4dc706e3-233a-4fe1-b4a0-05f0b2de6a51>
CC-MAIN-2020-29
https://www.hhhistory.com/2020/03/wearing-of-green-irish-for-day.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657129257.81/warc/CC-MAIN-20200711224142-20200712014142-00591.warc.gz
en
0.984215
985
2.78125
3
Croton oil is extracted from the seeds of a tree called Croton tiglium. Although, it is highly toxic, it has several uses when used in appropriate quantity. The first use of Croton oil was as a medicine by the ancient Chinese. At the end of the 16th century, traders brought this oil to Europe from the East. Croton oil is extracted from the seeds of the Asiatic tree, Croton tiglium Linn, which belongs to the family, Euphorbiaceae. The tree is native to India and Malay Archipelago. The oil is popularly called oleum tiglii. It is extracted from croton seeds by cold pressing method. It was initially used by the Chinese as a medicine. Since then, it is being used as medicine. However, as croton oil is highly toxic and a violent irritant, this oil is not as much in use currently as it was in the ancient times. At present, it is mostly used as an ingredient in many facial peels used for skin rejuvenation. The oil is unpleasant in taste and has a nauseating odor. It is a viscid and translucent substance. It is yellow to pale brown in color. The ingredients of the oil differ as per the method of extraction. It contains fatty acids like oleic acid, linoleic acid, myristic acid, arachidic acid, palmitic acid, formic acid, acetic acid, stearic acid, and less amounts of butyric acid, lauric acid, tiglic acid and valeric acid. The oil also contains crotin, croton resin, crotonoside, and an unsaturated fatty acid. In Ghana, people know croton seeds as a toxic substance, and hence was used as fish poison or for criminal activities. In Sudan, the seeds are taken as a purgative by combining its powder with dates. In South-east Asia, roots of croton are used as purgative and to induce abortion. In Malaysia, the oil is used in soaps and to light up lamps. Croton oil is used in different phenol-based facial peel products. It has a rejuvenating effect on the skin. It peels off the thin layer of epidermis, which is the outermost layer of the skin and regenerates it. This causes removal of wrinkles, fine lines and various scars. Dermatologists and plastic surgeons vary the amount of the oil used depending upon the skin type of a specific area like neck, eyes etc. Croton oil is used in the treatment of various ailments like dropsy, apoplexy, convulsions, obstinate constipation, intestinal obstruction, lead poisoning, intense fever, and high blood pressure. Croton oil is used as a preliminary laxative in leprosy. Croton oil functions as a counter irritant and provides relief from irritation. However, it can cause inflammation in the part of the body where it is applied. Thus, it’s not completely safe to use for all skin types. Croton oil is used as a liniment and acts as a stimulant. It is also used to cure inflammation caused by skin wounds, chronic rheumatism, neuralgia (acute nerve pain), glandular swellings, chronic bronchitis, asthma, laryngitis and other pulmonary problems. Croton oil is used for the treatment of schistosomiasis and other intestinal parasites. Croton seed oil and bark are used in medicines to treat cancerous cells, paralysis, sore throat, teething troubles, snakebite and many others. The seed oil is also used in the making of soap and candles. Croton oil is used for the extraction of biodiesel fuel. Croton oil is used for illuminating lamps. However, it is used outdoors as the smoke is toxic. Croton oil is a strong irritant. It causes itching, blistering and lesions of skin even if a small amount of it is applied to the skin. Croton oil can cause severe or permanent damage to tissues, nerves and blood vessels when used as a facial peel if the concentration of the peel is not proper. Croton oil has a compound known as phorbol esters, which has tumor promoting effects. The consumption of croton oil causes diarrhea and stomach aches if taken even in small amounts internally. An overdose of the oil can cause gastro-intestinal inflammation followed by pain, vomiting, restlessness, heart palpitation, headache, and dizziness. It could even be fatal. - The oil has to be used in very small amount as it is toxic. The recommended usage of the oil is just two to three drops. However, consult a trained specialist before usage. - The dosage of croton seeds varies from individual to individual depending on factors like the user’s age, health, and many other conditions. - Children and pregnant women should avoid using croton oil at all costs. Disclaimer: Use the product as directed. The information provided in this article is solely for educating the reader. It is not intended to substitute the advice of a specialist.
<urn:uuid:48084fec-8f9c-4014-af66-b2c614c283fe>
CC-MAIN-2020-16
https://holisticzine.com/croton-oil-uses-side-effects
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371637684.76/warc/CC-MAIN-20200406133533-20200406164033-00015.warc.gz
en
0.956444
1,069
2.890625
3
13 Sep Getting to Know What We Do Not Know A new study by the Council on Foreign Relations and National Geographic outlines how much American university students don’t know about the world around them. If we were grading, most of us would get a solid F (PDF). Earlier this year, CFR and National Geographic commissioned a survey to gauge what young people educated in American colleges and universities know about geography, the environment, demographics, U.S. foreign policy, recent international events, and economics… …On the knowledge questions asked, the average score was only 55 percent correct. Just 29 percent of respondents earned a minimal pass—66 percent correct or better. Just over 1 percent—17 of 1,203—earned an A, 91 percent or higher. Respondents exhibited limited knowledge of issues critical to the United States. Only 28 percent of respondents knew that the United States is bound by treaty to protect Japan if it is attacked. Just 34 percent knew this about South Korea. Meanwhile, only 30 percent knew that the constitutional authority to declare war rests in the legislative branch of the U.S. government. Basic conditions and realities about the world are also relatively poorly understood. Over the past five years, the number of Mexicans leaving the United States and returning to Mexico has been greater than the number of Mexicans entering the United States. However, only 34 percent of respondents recognized this fact; 49 percent said it was false. Our assumption is older folk wouldn’t do any better. Ignorance isn’t always bliss, though. We see this first-hand as we tumble through our current fact-free presidential election. Interesting is a piece from the Washington Post’s Margaret Sullivan who reported this weekend on various news literacy programs and efforts that target our information environments. “‘There’s a cacophony of untrue information out there,’ and it’s drowning out what’s dependable and accurate,” Leonard Downie Jr., former Washington Post executive editor, tells her. While we have more information at our disposal, she writes, we’re not better informed. Instead, we trend towards news that fits our biases or throw our hands up trying to make sense of the barrage of “facts” that come our way. Sullivan name-checks programs and efforts — the News Literacy Project, The Lamp and the Center for News Literacy among them — that are doing serious, heavy-lifting for younger news consumers but more needs to be done. What needs to be done, though, is a difficult nut to crack when we exist in an age where spin, half-truths and outright fabrications cross our daily social feeds. Ignorance has consequences. As Sullivan writes, “Citizens who don’t know much, and don’t care to find out, will get the government they deserve.” Let’s deserve better. As the Council on Foreign Relations, National Geographic study shows, we’re not very good with current or historical events. We need to help ourselves help ourselves. At the very least, check in with the likes of Factcheck.org, Politifact or The Washington Post’s own Fact Checker as the election draws closer. More important, dig through claims, and discover how, if and where they’re sourced before passing them along. Related: Looking for more on news literacy? The FJP has a tag for that.
<urn:uuid:554d826d-2098-40b1-83e0-8107c5a3b33d>
CC-MAIN-2018-22
https://michael.cervieri.com/2016/09/knowing-what-we-do-not-know/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864544.25/warc/CC-MAIN-20180521200606-20180521220606-00602.warc.gz
en
0.931459
716
2.515625
3
From Tennessee, USA: My doctor tested me and ruled out diabetes and thyroid problems, but she prescribed Glucophage to treat me for obesity. If I don't have diabetes, and I am taking diabetes medication, will I be putting myself at risk for sickness later on? Taking Glucophage [metformin, a pill for Type 2 diabetes] now even though you don't have diabetes will not put you at increased risk for developing diabetes. Your doctor put you on this for obesity, likely to decrease insulin resistance that is often associated with obesity, and often leads to diabetes. Use of Glucophage for this is controversial, but there is increasing evidence that reducing insulin resistance may help prevent cardiovascular disease. Glucophage is also used to help treat the polycystic ovary syndrome that is often associated with obesity and causes irregular menses. Glucophage is usually a very safe drug, but you should be monitored for kidney and liver problems. It sometimes causes side effects such as upset stomach and diarrhea. Original posting 19 Jun 2000 Posted to Medications: Pills for Diabetes Last Updated: Tuesday April 06, 2010 15:09:10 This Internet site provides information of a general nature and is designed for educational purposes only. If you have any concerns about your own health or the health of your child, you should always consult with a physician or other health care professional. This site is published by T-1 Today, Inc. (d/b/a Children with Diabetes), a 501c3 not-for-profit organization, which is responsible for its contents. © Children with Diabetes, Inc. 1995-2016. Comments and Feedback.
<urn:uuid:787057b2-2a06-4b9a-b1cc-bcb6e592e31e>
CC-MAIN-2016-07
http://www.childrenwithdiabetes.com/dteam/2000-06/d_0d_4y0.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701158811.82/warc/CC-MAIN-20160205193918-00167-ip-10-236-182-209.ec2.internal.warc.gz
en
0.941318
344
2.625
3
WHAT DO THE DEAD SEA SCROLLS SAY ABOUT JESUS? The short answer: Nothing. Nothing, and the last of the scrolls have been dated to approximately 68 AD, 35 years after the year ascribed to the Crucifixion. The scrolls were discovered in 1948, and the Vatican, after a Church Father was put in charge of the translation, suppressed the publication of the Scrolls for many years. So, what DO the Dead Sea Scrolls say about Jesus? Again: They don’t say anything about Jesus (or Christ). Nevertheless, some scholars have sought to find evidence about early Christianity among the scrolls. For example, Robert Eisenman (The Dead Sea Scrolls and the First Christians) sees a possible reference to Jesus in the Damascus Document, and believes “Teacher of Righteousness” may have been James the Just.Read more: http://wiki.answers.com/Q/What_do_the_Dead_Sea_Scrolls_say_about_Jesus#ixzz1yu8E2sAQ “He (Professor Eisenman) never answered the faxes until one day his assistant called and everything was made crystal clear. There was no mention of Jesus in the Dead Sea Scrolls because Jesus as a living historical figure, in their theory, did not exist. They could not state that publicly because of the fear of an outcry, but that was the situation.” What did Pope Leo X say about Jesus? Pope Leo X (1513-1521 Some believe that he considered Jesus to be a mere legend. The Catholic Encyclopedia refers to a widely circulated remark: “How much we and our family have profited by the legend of Christ, is sufficiently evident to all ages.” http://www.religioustolerance.org/chr_jcno.htm Pope Paul III expressed similar sentiments, saying “there were no valid documents to demonstrate the existence of Christ.” “Historically, it is quite doubtful whether Christ ever existed at all, and if He did we do not know anything about Him.“ –Bertrand Russell
<urn:uuid:6eed2761-0c5d-4dd2-bed8-80794ebfbd72>
CC-MAIN-2019-35
https://beyondallreligion.net/2012/06/29/what-do-the-dead-sea-scrolls-say-about-jesus/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313936.42/warc/CC-MAIN-20190818145013-20190818171013-00402.warc.gz
en
0.949108
447
2.734375
3
5.2 - Module 2: Energy This module extends the study of energy encountered within unit F322: Chains, Energy and Resources. This module provides candidates with a deeper knowledge and understanding of chemical energy and also considers ways in which scientists are working to provide cleaner and more efficient energy. Practical Skills are assessed using OCR set tasks. 5.2.1 - Lattice Enthalpy 5.2.2 - Enthalpy and Entropy 5.2.3 - Electrode Potentials and Fuel Cells Links AS Unit F321: Atoms, Bonds and Groups AS Unit F322: Chains, Energy and Resources |<< previous||about us||IsisSoft||faq||ibchem||next >>|
<urn:uuid:4befc88c-fd5b-4e79-a68c-f0653a44f0ff>
CC-MAIN-2017-22
http://alevelchem.com/ocr_a_level_chemistry/ocra/F325/Module2.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607648.39/warc/CC-MAIN-20170523163634-20170523183634-00173.warc.gz
en
0.77177
156
2.6875
3
A complete conversion from a gasoline powered go kart into an electric go kart featuring a full control system with feedback. Pictured here are the four motors powering the vehicle, motorcycle batteries, brake lights, electronic speed controllers, and various other components of the control system. The dashboard of the vehicle is outfitted with an LCD screen that displays current power being sent to the left and right drives. A potentiometer inserted into the steering shaft allows the system to dynamically alter motor speed based on turning. Reprogramming the software running onboard the system. The system uses a modified set of steering wheel/pedals from a racing video game. The system has variable speed control by use of this method. The electronic bits that make everything actually work. In episode #5 of The Tech Junkies, Ben and Eric modify a $15 R/C car from Radio Shack into an autonomous, GPS navigated car. At the end of the episode the car must navigate down multiple roads using only the microcontroller and GPS module. First off, if you haven’t watched episode #5 of The Tech Junkies, I’d have to insist you do that now: Okay, so let’s get onto the details. As seen in the video, we hacked apart a $15 Radioshack R/C car for the purpose of outfitting it with a GPS chip. We ripped out the motor that was being used for steering and replaced it with a low-cost $10 servo. We also cut out the existing electronics so that only the wires coming from the battery and running to the drive motor we’re left. From here we took a breadboard and connected up our H-Bridge drive chip. First I have to start with a quick explanation for people who don’t know what OpenGL is. OpenGL is NOT a language. In fact, OpenGL is merely a specification which is implemented in various languages. I have always used C++ and the GLUT library, it simplifies some things. Anyway, more info can be found with a quick google search if you are interested. Today I am going to focus primarily on getting started using OpenGL on OS X instead of doing fancy things. A couple months ago I took a course on Computer Graphics at my university. The problem was that this professor was pretty much Windows only. Needless to say I was in trouble, I didn’t know C++ and had never worked with it. Here is what I learned about setting up a usable environment For my latest project I wanted to build a microcontroller powered device I could hang on my wall (or pin to at the time of writing this). I decided to build a Twitter reader, but not just any old “LCD connected to a PC” setup. No, I wanted this thing to be computer independent. In this episode of The Tech Junkies, Ben and Eric discover a large wasp nest in Ben’s shed. Rather than taking the risk of taking down the nest themselves, The Tech Junkies build a remotely operated robot armed with cans of RAID that drives into the shed and takes the nest down. Episode #4 of The Tech Junkies has finally been completed and will be hitting the site on June 25th (this Thursday). For this episode we built a wasp killing robot that can take down an entire nest via remote operation. Make sure to hit up the site to grab/watch the new episode! We’ve also got some other footage filmed and are actively working on episode #5. Oh and if you haven’t checked it out yet, make sure to visit the TTJ forums (on the nav on the right). We’re looking for show ideas or any other general discussion you have about the show. In this episode we take a look at WiFi extension methods and put various methods to the test to see how much of a boost you can get from home-made projects. In this episode of The Tech Junkies we show various lock hacks including bump keys, lock raking, lock picking, and the masterlock shim. We also give a tour of Control Our Junk and go behind the scenes to show you how it works. Our first episode features building an Internet controlled airsoft gun and what happens when you plug speakers into a wall outlet.
<urn:uuid:563f635f-dda2-4f39-bea1-72a68cd55fe1>
CC-MAIN-2022-27
https://ttjcrew.com/page/3/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103941562.52/warc/CC-MAIN-20220701125452-20220701155452-00571.warc.gz
en
0.950125
889
2.59375
3
How does the OligoScan work? The OligoScan utilises Spectrophotometry, an instrument that measures the amount of light emitted by a light source. In this case the light is reflected from the skin, which determines the concentration of minerals and toxic elements in the underlying tissues. From one sample, the OligoScan is able to determine the presence of minerals and toxic elements being mobilised in the tissues of the individual. Because each mineral has a different wave length of light, Spectrophotometry works by calculating the amount of light absorbed or reflected at a given wave length. Using the hand cradle, four different areas of skin are measured from the hand to assess the status of minerals and toxic elements currently present in the tissues. Why do we use it? Every day we are exposed to toxic metals and other elements in our surrounding environment either through contamination or occupational exposure. Also, nutritional deficiencies are becoming more widespread due to an increase in consumption of highly processed and poor quality foods among other damaging lifestyle practices. Most people have some level of toxic metal burden in their body, which may be dependent on the following: - The level of exposure to toxic metals during their lifetime, including congenital exposure - Their ability to eliminate toxins through detoxification channels, e.g. kidney, liver, bowel, skin (perspiration) - Their mineral intake and status Benefits of OligoScan vs HTMA - Results are instant and easy - No waiting - The scan is taken by hand - No hair sample needed - Real time analysis of mineral status - Tells you what toxic elements are being mobilised currently - Price is comparable to HTMA
<urn:uuid:e2631aae-7095-4aff-8d48-518b0c788c55>
CC-MAIN-2018-22
https://biotrace.co.nz/services/oligoscan/
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867217.1/warc/CC-MAIN-20180525200131-20180525220131-00365.warc.gz
en
0.926286
346
2.9375
3
The effectiveness of applying silent discharge plasmas (SDP) for destroying and removing volatile organic compounds (VOCs) from gas streams is experimentally evaluated with a laboratory-scale reactor. The VOCs selected for study include toluene and methyl ethyl ketone (MEK). Direct collision with energetic electrons and reaction with generated gas-phase radicals are two major mechanisms responsible for destruction and removal of VOCs from gas streams. Operating parameters investigated include applied voltage, gas residence time, and temperature and composition of the gas stream. Experimental results indicate that the removal efficiency of toluene and MEK achieved with SDP can be enhanced by operating the system at a higher gas temperature and applied voltage due to the generation of more energetic electrons and radicals. O2 is essential for removing VOCs from gas streams with SDP. More than 80% removal efficiencies were achieved with this system for both toluene and MEK. SDP can potentially serve as an alternative control technology for removing VOCs from gas streams.
<urn:uuid:4e82f7cf-79b2-4b2c-9da0-8eb3a640658c>
CC-MAIN-2017-51
http://onlinelibrary.wiley.com/doi/10.1002/aic.690430521/abstract
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948588420.68/warc/CC-MAIN-20171216181940-20171216203940-00745.warc.gz
en
0.938784
210
2.921875
3
Calculus I Assignment 1 This assignment is designed to give you practice with the equation editor. Since all homework is to be turned in electronically, you must learn how to send me your work via e-mail. Attaching a Word document is the easiest way to do this. However, it is essential that you learn the editor so you can add “mathematics” to your document. There is a tutorial associated with this Here is an example of how to submit a homework problem. Notice that I add a narrative within the solution so it is not merely a list of equations. I want you to demonstrate that you understand the material: Section 1.3 #49 Find the limit: First, evaluate at x = 5, to get: This tells me to factor top and bottom. Here is your assignment It must be submitted electronically using the Digital Drop Box tool within BlackBoard. You may want to practice using this with a simple Word document. 1) Consider the following graph of the function, g: a) Explain why the does not exist. Try to add some colored arrows and such to the graph to aid in your explanation. I would suggest to cut and paste the graph and try to work with it in Power Point or b)Explain why does the limit as x approaches 2 exits even though a “hole” occurs in the graph at this point. 2) Use the ε-δ definition to prove that the limit is L for
<urn:uuid:87581fc2-3689-406e-b6c3-b21b30c054e3>
CC-MAIN-2014-52
http://www.olc.edu/~jtinant/webfolder/MFredenberg/Calc_I_Online/CI_Assign_1.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802771592.49/warc/CC-MAIN-20141217075251-00114-ip-10-231-17-201.ec2.internal.warc.gz
en
0.93539
317
3.0625
3
Did the Democratic-Republicans ever really break ties? Or is it one all inclusive, elusive, illusion foisted upon the American People? Via Wikipedia it would appear that the what’s old is new… again The Democratic-Republican Party was the political party organized by Thomas Jefferson and James Madison in 1791-93. It stood in opposition to the Federalist Party and controlled the Presidency and Congress, and most states, from 1801 to 1824, during the First Party System. It split after the 1824 presidential election into two parties: the Democratic Party and the short-lived National Republican Party (later succeeded by the Whig Party, many of whose adherents eventually founded the modern Republican Party). and reunited as bastard cousins, once removed.
<urn:uuid:0b147019-0281-4546-bf86-51ad1bd531b0>
CC-MAIN-2017-26
https://eyesinthenorthwest.wordpress.com/2013/08/20/who-supports-the-republic-one-would-think-republicans/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320443.31/warc/CC-MAIN-20170625064745-20170625084745-00268.warc.gz
en
0.953667
153
2.890625
3
Texas Gov. Rick Perry and Virginia Gov. Bob McDonnell have signaled an openness to lifting bans that make schools gun-free zones. First, his China policy is showing the right mix of openness and toughness. “Women bring an interest in transparency and openness in government, and there may be a reluctance toward doing that,” says Walsh. She is in a field of flowers that can be seen to represent the openness that she is allowed within this community. openness, transparency—these are among the few weapons the citizenry has to protect itself from the powerful and the corrupt. Presently he was speaking with a simplicity and openness that he had not yet used with Katherine. But has she had the candour, the openness, to acknowledge that love? Still there was something in the frankness and openness of the sailor's manner, which pleased him very much. openness of mind will do much, but there must be the seeing eye behind it. Our side trades the advantage of surprise for the advantage of openness. Old English open "not closed down, raised up" (of gates, eyelids, etc.), also "exposed, evident, well-known, public," often in a bad sense, "notorious, shameless;" from Proto-Germanic *upana, literally "put or set up" (cf. Old Norse opinn, Swedish öppen, Danish aaben, Old Saxon opan, Old Frisian epen, Old High German offan, German offen "open"), from PIE *upo "up from under, over" (cf. Latin sub, Greek hypo; see sub-). Related to up, and throughout Germanic the word has the appearance of a past participle of *up (v.), but no such verb has been found. The source of words for "open" in many Indo-European languages seems to be an opposite of the word for "closed, shut" (e.g. Gothic uslukan). Of physical spaces, "unobstructed, unencumbered," c.1200; of rooms with unclosed entrances, c.1300; of wounds, late 14c. Transferred sense of "frank, candid" is attested from early 14c. Of shops, etc., "available for business," it dates from 1824. Open-handed "liberal, generous" is from c.1600. Open door in reference to international trading policies is attested from 1856. Open season is first recorded 1896, of game; and figuratively 1914 of persons. Open book in the figurative sense of "person easy to understand" is from 1853. Open house "hospitality for all visitors" is first recorded 1824. Open-and-shut "simple, straightforward" first recorded 1841 in New Orleans. Open marriage, one in which the partners sleep with whomever they please, is from 1972. Open road (1817, American English) originally meant a public one; romanticized sense of "traveling as an expression of personal freedom" first recorded 1856, in Whitman. early 13c., "an aperture or opening," from open (adj.). Meaning "public knowledge" (especially in out in the open) is from 1942, but cf. Middle English in open (late 14c.) "manifestly, publicly." The sense of "an open competition" is from 1926, originally in a golf context. Old English openian "to open, open up, disclose, reveal," also intransitive, "become manifest, be open to or exposed to," from Proto-Germanic *opanojan (cf. Old Saxon opanon, Old Norse opna "to open," Middle Dutch, Dutch openen, Old High German offanon, German öffnen), from the source of open (adj.), but etymology suggests the adjective is older. Open up "cease to be secretive" is from 1921. Related: Opened; opening.
<urn:uuid:d493637b-33e9-4989-8894-63ce439142d1>
CC-MAIN-2015-40
http://dictionary.reference.com/browse/openness
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736676547.12/warc/CC-MAIN-20151001215756-00030-ip-10-137-6-227.ec2.internal.warc.gz
en
0.958751
827
2.53125
3
Whether you’re 13 or 53, this may affect you In most cultures, it’s rare to talk about menstruation—which downplays the universal role it has in the lives of women. It’s very important for women to understand their own cycle, because abnormal bleeding may be the first warning sign of a deeply concerning health problem she may otherwise be unaware of. Between menarche and menopause, a woman has an average of 400 to 500 periods. That is a lot. Back in the time when it wasn’t uncommon for women to have 8–10 babies, they would have perhaps 80 to 100 menstrual periods in their lifetimes. This is because when pregnant and during breastfeeding, periods do not occur. Now we only have from zero to two babies, meaning that for most women bleeding occurs almost every month. Because menstruation is so frequent, it can be difficult to know when abnormal bleeding happens. There are many things that cause it, but the most common causes differ widely between the various age groups—from as young as 20 to 40 years old; after 40 years old; and beyond 50 years of age. It also ranges from benign causes—such as a slightly shorter or longer period, or the early stages of a perfectly normal pregnancy—to lifethreatening causes such as cervical cancer, endometrial cancer, or ectopic pregnancy (which happens when the fetus develops outside of the womb). For the 20–40-year-old age group, the common causes of abnormal bleeding are usually fertility related—such as spotting in the early stages of pregnancy, conditions such as PCOS (polycystic ovary syndrome), medicines such as birth control pills or the IUD (intrauterine device) used for contraception, or an infection of the pelvic organs. Excessive bleeding can be a sign of problems such as miscarriages and ectopic pregnancy. The worst case scenario for this age group is cervical cancer—caused by the human papillomavirus (HPV), which is a preventable condition. I recommend that young women and girls receive an HPV vaccination before they are sexually active, as it is the most reliable, accessible, and economical option to avoid infection and a higher risk of cervical cancer. For women over 40 years old but who have not yet experienced menopause, the most serious cause of abnormal bleeding can often be endometrial cancer. In post-menopausal women, abnormal bleeding can be caused by hormone therapy such as tamoxifen for breast cancer, or hormone replacement therapy used to treat menopausal issues—or it can be a sign of cancer itself of the cervix or endometrium. Frustratingly, it is tricky to recognize when bleeding is out of the norm, as there is a high level of variance in period frequency and the volume of blood loss during a period between individual women. What is a normal period for one woman may be too long or too much for another. Outside of excessive bleeding, there is little to clearly distinguish between normal and abnormal bleeding, as they have mostly the same texture and consistency. For that reason, it’s advisable for women to keep a detailed record of their normal periods. Information such as the frequency of their menstruation or how many tampons or pads they usually use can be very valuable for a doctor. This will also help women to identify when bleeding happens at an unusual time. If this happens, it should be taken seriously and women should consider a check-up, especially if the bleeding is excessive. For all age groups, excessive bleeding is a definite call for an immediate visit to your gynecologist. Knowing what to do when a woman has determined that her bleeding is not normal is the next important step. I have read worrying research that indicates as many as 50 percent of college-aged women are unaware of dangerous conditions such as cervical cancer. They may know even less about what signs to look out for and what to do if they recognize the signs. Tests such as Pap smears, which can help pinpoint a woman’s health issues in the very early stages, are now standard in most Asian countries. I would recommend yearly testing, as it is relatively accessible in most countries. HPV testing is a good option also, especially in countries which are relatively advanced with their HPV vaccination programs. Menstruation, bleeding, period pain, and related issues are often hard topics for women to discuss even among themselves, as many cultures still view them as taboo. Many women are taught that it is shameful to discuss their own bodies in such a way. It is nonetheless important to recognize that each woman has a right and obligation to take care of her body and health, and that starts with becoming more aware of what your body is telling you, and making sure you have the necessary knowledge and vaccinations.
<urn:uuid:05b3d666-1946-41dd-b0af-a2123e88dd26>
CC-MAIN-2020-24
http://oivietnam.com/2020/01/abnormal-uterine-bleeding/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413406.70/warc/CC-MAIN-20200531120339-20200531150339-00483.warc.gz
en
0.963693
992
2.890625
3
Mar. 29, 2007 Researchers at Rutgers, The State University of New Jersey, have unlocked some of the physical and chemical secrets of plutonium, an element known for its use in atomic weapons and power plant fuel. While the complex nuclear characteristics of plutonium are well-known, it has properties as a metal or a chemical compound that have often left scientists scratching their heads. Writing in this week's issue of Nature, a prestigious international scientific journal, Rutgers physicists report that the valence electrons -- those which control how atoms bond with each other -- fluctuate among different orbitals in solid plutonium metal on a very short time scale. In contrast, earlier theories specified fixed numbers of valence electrons in those orbitals. The Rutgers findings help explain some contrary characteristics of plutonium: Unlike many metals, plutonium is not magnetic and not a good conductor of electricity, and it shows greater changes in volume under small changes in temperature and pressure. While the authors' findings and study methods are mainly of interest to other researchers seeking clear explanations of complex materials, the knowledge may someday help scientists create safer and more versatile nuclear materials for energy, industry and medicine. "Previous theories about plutonium's makeup placed a fixed number of valence electrons in the particular orbital we examined, known as the 5f orbital," said Kristjan Haule, an assistant professor of physics and astronomy at Rutgers. "Different theories assigned different numbers of electrons to that orbital -- some four, others five and yet others, six. But whatever number the theory prescribed, it remained constant. Each theory could explain some of the element's characteristics, but none could account for all the experimental evidence." The Rutgers approach abandoned the idea of a fixed or unique number of valence electrons in the 5f orbital. "We revisited the notion of valence in a solid," Haule said. "While it happens rarely in nature, we thought it should be possible for the number of valence electrons to fluctuate among orbitals in atoms that are part of a solid structure." It turns out that plutonium is especially suited to exhibiting this behavior. The Rutgers physicists determined that almost 80 percent of the time, there are five electrons in the 5f orbital. Almost 20 percent of the time, there are six, and less than 1 percent of the time, there are four. "A theory that permits fluctuating valence electrons consistently explains properties that scientists observe in laboratory experiments," Haule said, citing recent results using X-ray absorption and electron energy-loss spectroscopy. "In addition, the theory accurately predicts the properties of two neighboring elements, americium and curium, which have similar atomic structures but show greatly differing magnetic and electric properties." The new approach involves a merger of two existing theories, known as local density approximation and dynamical mean field theory, or LDA+DMFT. Taken separately, they and others fell short in accounting for all of plutonium's observed physical characteristics. The work done by Haule and his colleagues is in a branch of physics known as condensed matter physics, which deals with the physical properties of solid and liquid matter. In particular, their work focuses on strongly correlated materials, which have strongly interacting electrons and, therefore, can't be described using theories that treat electrons as largely independent entities. The radioactive metals, such as plutonium, and their periodic table neighbors, known as rare earth elements, are examples of strongly correlated materials, with highly localized electrons in their f orbitals. In these elements, most of the physical properties such as electrical resistivity and magnetic characteristics depend on the f-orbital electrons. The findings reported in Nature strengthen methods for predicting characteristics of all of these complex materials. Collaborating with Haule were Ji-Hoon Shim, a postdoctoral fellow, and Gabriel Kotliar, Board of Governors Professor of Physics. The Division of Basic Energy Science of the U. S. Department of Energy and the Rutgers Center for Materials Theory supported their research. Shim received postdoctoral research funding from the Korean Research Foundation. Other social bookmarking and sharing tools: Note: Materials may be edited for content and length. For further information, please contact the source cited above. Note: If no author is given, the source is cited instead.
<urn:uuid:f7a2e343-1058-4f95-9c28-8809dd9cac1b>
CC-MAIN-2013-48
http://www.sciencedaily.com/releases/2007/03/070328155602.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052912/warc/CC-MAIN-20131204131732-00028-ip-10-33-133-15.ec2.internal.warc.gz
en
0.934833
858
3.703125
4
What was once the I-95 landfill near Lorton, Virginia, is now dozens of acres of rolling green fields – dotted by more than 200 metal pipes emerging from the grass. The pipes are wellheads for natural gas, and they are collecting the methane generated by more than 10 million tons of decomposing garbage dumped by Washington, D.C.-area residents over the course of 30 years. A vacuum pump draws the gas from underground, through the wellheads, and connects it to roughly 14 miles of pipeline that run throughout the landfill. Under each wellhead, says Mike Malfitano, an environmental technical specialist for Fairfax County, “there’s a three-foot bore hole that goes 110 feet down into the waste mass.” Although it closed in 1995, county officials expect the landfill to keep emitting gas for at least the next decade. On its best days, says Fairfax County environmental engineer Chris Meoli, the landfill generates 2,000 cubic feet per minute of gas – enough to create 4.9 megawatts of electricity. It’s more than enough to power the Noman M. Cole wastewater treatment plant three miles down the road, saving the county as much as $500,000 a year in power costs, according to a 2015 county report. What’s left over is sold to the grid. According to the Environmental Protection Agency (EPA), landfills are among the nation’s largest sources of methane, accounting for nearly one-fifth of all methane emissions generated by human activity in 2012. That’s why advocates of landfill gas projects like the one in Fairfax County say these efforts have enormous environmental benefits – first, by capturing harmful methane emissions that would otherwise contribute to climate change and second, by replacing more carbon-heavy fuels for power and transportation. Moreover, there’s no shortage of garbage. According to the group Energy Vision, Americans dump about 250 million tons of municipal solid waste per year – including 70 million tons of food and yard waste. It’s a clean energy opportunity the nation is literally throwing away. Advances in waste management, along with recent changes in federal and state policy, are now prompting a potential boom in bio-methane opportunities – not just involving landfills but sewage treatment plants, dairy farms and other sources of organic waste. Companies are also showing greater interest in renewable natural gas as an alternative to gasoline and diesel, further stoking interest and demand. In May 2015, UPS announced an agreement with natural gas fuels maker Clean Energy Fuels to use renewable natural gas from bio-methane in its delivery fleet. UPS said it expects to use 1.5 million gallon equivalents of renewable natural gas a year, making it the nation’s largest user of renewable natural gas vehicle fuel in the shipping industry. Mike Whitlatch, Vice President of Global Energy and Procurement at UPS, says the transition to biogas is “an obvious one” because so much of the company’s fleet already uses conventional, fossil-based natural gas. “We’re trying to reduce our impact on the environment – customers are simply demanding it,” says Whitlatch. “For us to remain competitive, we have to remain sustainable in a future carbon-constrained world.” But Whitlatch also says it was only recently that renewable natural gas vehicle fuel became available and affordable enough to be economically worth the shift. This natural gas wellhead is capturing methane emissions from a closed landfill in Fairfax County, Virginia Perhaps the biggest boosts have been California’s new “low-carbon fuel standard,” which includes renewable natural gas, as well as recent regulatory changes to the renewable fuels standard under federal law. First established in 2007, California’s low-carbon fuel standard requires a 10 percent reduction in the carbon intensity of petroleum-based fuels by 2020 and uses a cap-and-trade approach to achieve these reductions. To meet the state’s requirements, gasoline and diesel producers can either develop their own lower carbon fuels or buy “credits” from producers of lower carbon fuels recognized under the standard. In turn, companies that produce lower carbon fuels – such as Clean Energy Fuels – can use the revenues from selling carbon credits to lower the price of their products and make them more competitive. Similarly, the federal renewable fuels standard, last amended in 2007, requires the nation’s transportation fuel supply to include 36 billion gallons of renewable fuel by 2022. In 2010, federal regulations were expanded to recognize renewable natural gas as a fuel eligible for tradable credits under the program. According to its publicly filed 2014 annual report, Clean Energy Fuels earned $4.8 million in 2013 and $3.5 million in 2014 from sales of state-level carbon credits generated by its production of renewable natural gas. The company also earned a total of $5.9 million in 2013 and 2014 from credits generated under the federal renewable fuels standard. These carbon credit revenues are in fact the only reason renewable natural gas is economically viable right now, says Harrison Clay, President of Clean Energy Renewable Fuels, a Clean Energy Fuels subsidiary. Even though renewable natural gas is already cheaper than gasoline or diesel, its production costs are still at least twice that of fossil natural gas. “California has the best carbon pricing and carbon regulation in the world, and it’s a great market for a product like ours,” says Clay. “But where there isn’t effective carbon pricing, it’s a more difficult economic proposal with natural gas fuel being so cheap. If there’s no way to monetize the carbon benefit, it’s a challenge.” Nevertheless, there’s plenty indication that demand for renewable natural gas will continue to grow. Based on a “life-cycle” analysis – that is, taking into account the carbon intensity of production, distribution, etc. – renewable natural gas has a carbon footprint that’s up to 90 percent lower than that of gasoline, according to analyses by the Argonne National Laboratory. By comparison, conventional natural gas vehicle fuel has a carbon footprint that’s only 6 percent to 11 percent lower than gasoline. In July 2015, the Santa Monica bus system – the Big Blue Bus – announced it was switching to 100 percent renewable natural gas, and the Los Angeles County Metropolitan Transportation Authority is considering a similar switch. Oregon and Washington State have also recently passed “clean fuels” programs, which could also spur future demand and put more carbon credits on the market. UPS’ Whitlatch says renewable natural gas meets a long-awaited industry need for a less carbon-intensive fuel. “Electricity has many more options, such as wind, solar, geothermal and hydro,” he says. “Heavy duty transportation only has a few viable with lower carbon intensity and the supply at scale.” Clay says his company has already seen significant growth. According to the company’s annual report, Clean Energy Fuels sold 20.3 million gallons of renewable natural gas in 2014, a 39 percent increase over 2013, when the product first launched. Clay says he expects to get to 40 million gallons in annual sales soon. To meet demand, the company owns and operates biogas production facilities at landfills in Canton, Michigan and in Millington, Tennessee. It also buys bio-methane through third-party contracts at other landfills and facilities across the country. But Clay also says there’s enormous untapped potential. “We could do 10 times what we’re doing today without any significant technology breakthrough or change in how we operate our waste management practices,” says Clay. “There’s certainly adequate waste streams out there to get to billions and billions of gallons of bio-methane.” For one thing, the vast majority of landfills in the United States aren’t currently capturing landfill gas emissions for either power or for fuel. Of the 2,400 or so operating or recently closed landfills in the United States, the Environmental Protection Agency (EPA) estimates that about 645 of them have landfill gas projects. At least 440 more sites across the country could support a project, says the EPA, but many are instead “flaring” the methane they generate – simply burning it – to comply with federal regulations that now prohibit “fugitive” landfill gas emissions. Capturing the gas from these 440 landfills, the EPA says, could generate 7 million megawatt hours – enough to heat 1.1 million homes – and save emissions from 86 million barrels of oil. Moreover, it’s not just landfills that are generating potentially useable bio-methane, but sewage treatment plants and even dairy farms. According to Energy Vision, only about 1,300 of the nation’s more than 17,000 wastewater treatment plants have “digesters” that can efficiently turn organic waste into biogas. Some of the newest and biggest digesters, such as one in Sacramento, are being built with fuel production in mind – a trend that will likely continue. Johannes Escudero, Executive Director of the industry-led Coalition for Renewable Natural Gas, says there’s potential to produce more than 7 billion diesel gallon equivalents of renewable natural gas vehicle fuel per year, if all viable sites could be developed. “That would eliminate the equivalent of more than 10 million cars off the road,” he says. But for this to happen, policymakers need to stop overlooking bio-methane in favor of what seem to be more glamorous alternatives. “We put a lot of our investment dollars and policy focus on wind and solar,” says Escudero. “But if we were to cap every landfill today, we’re talking about methane emissions for another 30 to 100 years. We need to incentivize development projects that capture those gases and put them to good use, whether it’s electricity, heating, or transportation fuel.”
<urn:uuid:7dd203f2-5a39-4def-ab18-53eecab71e64>
CC-MAIN-2019-13
https://washingtonmonthly.com/2015/08/11/garbage-to-gas/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202326.46/warc/CC-MAIN-20190320105319-20190320131319-00538.warc.gz
en
0.942056
2,100
3.25
3
Abstract: China is characterized by a long history, vast land, huge population and diversity unprecedented in world history. In addition, she is a unique case that has successfully completed the transition from empire to the nation-state. Therefore, her historical independence and her continuity become very important subject areas for research, and the concept “empire” re-emerges as a major means of explanation. The essential defining features of empire are tolerance and expansion. I have been reviewing discourses on “China as Empire,” looking at studies of the tributary system, the civilization-state, and the Tianxia view raised from both inside and outside of China. A common characteristic of these discourses is the perception that the past, present and future of China cannot be fully explained by Western concepts such as nation-state. They also reveal that the supposed continuity with the past, which is overemphasized in many studies, does not necessarily always correspond with historical reality. The key focus of the empire discourses is the project of future China. Finally, I put a particular emphasis upon the “perspective of peripheries” in order to find ways to demonstrate the benefits of viewing China as an empire, while also overcoming the weaknesses of empire theory. It is the reason why I apply to the analysis of the empire discourses the “compound state” theory incubated as a way of reunification of the Korean Peninsula. Bibliographical notePublisher Copyright: © 2015 Taylor & Francis. All Science Journal Classification (ASJC) codes - Cultural Studies
<urn:uuid:922d9d41-0793-4ca8-baf2-52a7829ea173>
CC-MAIN-2021-49
https://yonsei.pure.elsevier.com/en/publications/implications-of-chinese-empire-discourses-in-east-asia-critical-s
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358842.4/warc/CC-MAIN-20211129194957-20211129224957-00199.warc.gz
en
0.952331
324
2.765625
3
Santiago de Cuba, city, eastern Cuba. The second largest city in the country, it nestles in a valley of the Sierra Maestra that is pierced by a pouch-shaped bay on the Caribbean Sea. The bay’s entrance, cutting into high bluffs that rise from the sea, is nearly invisible offshore. The chief bluff, about 200 feet (60 metres) high, is El Morro, crowned by a colonial fortress, Morro Castle. Santiago de Cuba was founded in 1514 by Diego Velázquez de Cuéllar, first governor of Cuba; it was moved a few miles to the present site in 1522. The settlement commanded a strategic location on the northern Caribbean in the early colonial period, and it served as the capital of Cuba until 1553. With its development as a fortified city, along with a shift of population toward the western end of the island, Santiago de Cuba lost its leading position to Havana. The conquistador Hernán Cortés was the first mayor of Santiago de Cuba, and it was from there that he set out in 1518 on the expedition that culminated in the conquest of Mexico. Santiago de Cuba was a focal point of the Spanish-American War, and many reminders of that conflict are found in the area. Decisive engagements were fought near the city on the hills of El Viso (in the village of El Caney) and San Juan. The harbour was partially blocked by the scuttled collier Merrimac, and the principal naval action of the war was fought along the coast near the port on July 3, 1898. On July 26, 1953, the revolutionary leader Fidel Castro led an attack against the Moncada Barracks in the city. The attack was repulsed by government troops, but the name the 26th of July Movement became attached to Castro’s cause. In 1956, after his release from prison, he led a small group of supporters back into the Sierra Maestra. Although they isolated the city from the rest of the island, it remained in government hands until Castro’s final victory in 1959. During the next two decades the city experienced a rapid growth of population and services. Santiago de Cuba is the centre of an agricultural and mining region. The city exports copper, iron, manganese, sugar, and fruit, and it is the southern terminus of the country’s Central Highway and Cuba’s major railway. The University of Oriente (founded 1947), a medical school, a sports stadium, a cathedral, and several museums are located in the city, which is a cultural and tourism centre. The city has a multiethnic population and is home to the largest number of descendants of Africans in Cuba. It hosts one of the oldest and most authentic street carnivals in Latin America. A short drive from Santiago de Cuba is Cobre, an old copper-mining town that houses Cuba’s most important shrine—dedicated to the Virgen de la Caridad (Virgin of Charity), proclaimed to be the protectress of Cuba. It attracts hundreds of thousands of visitors per year seeking blessings and healings. Pop. (2002) 423,392; (2011 est.) 425,851.
<urn:uuid:8bd2ca5f-1bb6-440c-a065-f766a1c2df4d>
CC-MAIN-2018-09
https://www.britannica.com/place/Santiago-de-Cuba-Cuba
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811794.67/warc/CC-MAIN-20180218062032-20180218082032-00030.warc.gz
en
0.962863
670
3.5625
4
The Legacy-Tree system is a containerization and planting method that works with a tree's physiology instead of against it. Many trees in our urban forests have significant and often fatal issues created by the issue of deep planting. These trees live shortened lives, unable to put proper growth into structure and energy into immunities. The Legacy-Tree system addresses these issues by creating an environment that focuses on outstanding root health and development at the proper depth. No Legacy-Tree is planted without expert consultation to ensure proper species selection to site conditions and to encourage consideration of our biodiverse range of trees. Legacy-Tree is the culmination of the life's work of Ronald Zillmer, an industry leading expert of tree development and physiology.
<urn:uuid:33bb138b-874f-4efc-984d-7b3dd96e5a17>
CC-MAIN-2023-40
https://arborwisemn.com/legacy-trees
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00184.warc.gz
en
0.944232
144
2.53125
3
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers. Intrusion detection and prevention has been a hot topic in the technology-related circles since shortly before the turn of the century, and especially after the introduction of various compliance acts such as Sarbanes-Oxley. To verify compliance and the reliability of their intrusion detection controls, a stampede of corporations rushed into the acquisition of systems and installed them on their networks. Intrusion Detection Systems evolved logically into Intrusion Prevention Systems. Several years have passed, so what do we know now about Intrusion Detection and Prevention systems? The common opinion in industry is that Intrusion Detection Systems (IDS) will be disuse very soon. In its place is something much more capable, an Intrusion Prevention System (IPS). IPSs are not a new technology; they are generally a new version of IDS supplanted by firewalls and network layer filtering to provide a more active filtering of malicious content. Our goal is to understand both IDS and IPS systems, the evolution from IDS to IPS in industry. Intrusion Detection Systems An Intrusion Detection System, IDS, is developed to detect malicious attacks on systems. IDSs are the computer network which is equal to home security systems. The primary responsibility of IDS is to detect unwanted and malicious network traffic. This can be done by using different techniques. There are two main types of Intrusion Detection (ID) systems - ID systems which operate on a host are called host-based ID systems (HIDS), and ID systems which operate on network data flow are called network-based ID systems (NIDS). Network Based IDS A Network Based Intrusion Detection System (NIDS) has one or more networks based sensors which scan and filter all network traffic. A sensor is generally just a network interface that has been set to wakeful mode to sniff all the traffic going through the network. The sensors filter network traffic and generate trigger when suspicious or malicious traffic has been detected. There are mainly two types of detection strategies signature matching, and statistical anomaly detection. Signature filters is the most widespread type of filter. A signature detection system just monitors the data which is transmitting through the system. In general, signature may be the pattern of bits which is transmitting through the network in the form of packets. If that pattern matches with the predefined pattern then the filter will generate trigger stating that an attack has occurred. This technique is very simple to implement. However, the drawback of this technique is that we must know the signature of the malicious packet to detect them. This requires an additional amount of overhead to continually update the system with the most current malicious signatures. In addition, the attacker can slightly modify the attack in order to avoid matching the pre-existing signature rules for the original attack. The alternative approach is to use a statistical anomaly filter. Statistical anomaly filters are meant to monitor a system and detect if something abnormal occurs. The normal behavior of a system is determined under normal, safe operating conditions, and then "exceptional" events are identified. When the systems behavior deviates far from the "normal" behavior, alerts are generated. For instance, one way to determine normal behavior would be to monitor user's network usage. If it is later perceived that a user is using much more bandwidth than previous measurements, this might be a signal that something abnormal is happening. The major problem with this is that systems' behaviors change with time. As a result, the system's behavior will deviate more and more from the "normal" reference model initially determined. As a result, there is a need for the reference model to evolve. However, if the reference model is updated too often, an attacker could spread out the attack over a longer period of time and possibly go unnoticed in the system. The reference model will learn the attacker's behavior and incorporate that into the reference model. As NIDS inspect all network traffic, generally HIDS will detect abnormal behavior with in the host and also inspect its behavior. As an example, HIDS may monitor which program accesses which resources and might trigger an alert when a program abnormally starts draining system resources or modifying the file. A HIDS can also monitor the state of the system and make sure everything makes sense, which is very analogous to the statistical anomaly filter. The principle behind the effectiveness of HIDS is that attacker leaves traces of their activities. For instance, they might install software on a computer they have taken over. In general, a HIDS will maintain a database of system objects it should monitor. The database contains important information about these system objects - attributes, modification time, size, etc. In addition, the database may contain a checksum or hash of the system objects. These objects will later be used for comparison to the current system objects. If at some point an object becomes inconsistent, the system can generate an alert. However, the attacker may somehow be able to gain access to the database. As a result, simply matching a hash doesn't guarantee that an intruder has not tampered with the file in question. For files which are very dynamic, this checksum technique will not be effective. There are many other techniques available, however our focus on HIDS ends here. Intrusion Prevention Systems Intrusion Detection Systems (IDS) are products designed to detect unwanted accesses or manipulations of a system. However, they typically do not prevent or protect from attacks. IDS systems are also the oldest systems available. On the contrary, the purpose of an Intrusion Prevention System (IPS) is to not only detect that an attack is occurring, but also to stop it. To do so, it can be considered to be an advanced combination of a firewall and an ID. To illustrate this, we first consider what a firewall does. The idea behind firewalls comes from their use in building construction to prevent the spread of fires. In a networking sense, they perform a similar function. Instead of preventing fire from spreading from one building to another, they prevent certain network traffic from traveling from one network section to another (or in an organization, usually from the outside network to the internal network). It typically does this by examining portions of the IP packets (including source and destination IP addresses and port numbers) and decides whether or not to let the packet pass. Firewalls can work in both directions, preventing traffic both into and out of a network. A firewall can be considered a very simple type of IPS in that it operates using IP addresses and ports and other header information, but it does not look into the contents of the packet. An IPS is more advanced in that it can use application-layer information to attempt to determine intent of the packet. As mentioned, it combines the power of filtering that a firewall has, with the power of detection like an IDS has, along with the ability to prevent attacks. For these reasons IPSs are considered to be among the promising of network technologies. Similar to IDSs, IPS can be divided into several types. Also like IDSs, these include Network Based IPS (NIPS) and Host Based IPS (HIPS). The distinction is very similar to that of IDSs and so will not be discussed further. IPS compared to IDS Recent trends in industry show that more and more companies are choosing IPS based solutions over IDS based solutions, primarily due to the need to actively block worm and hacker attacks, instead of passively monitoring them as an IDS system would do. Although legitimate traffic is often blocked just as malicious traffic is, most system administrators believe that the benefits certainly outweigh the downsides, especially when considering the significant damage that a successful worm or hacker can have on an organization. It should be noted that the blocking of legitimate traffic is not a unique problem in IPS systems. This problem occurs in any type of system that blocks traffic, including firewalls. The ability to determine with 100% accuracy whether a packet is malicious or not is simply not possible. For this reason, any security implementation will suffer from false positives. However, a system administrator must weigh the benefits of blocking good traffic (false positive) versus allowing some bad traffic (false negatives) to determine how strictly to check data. Attacks on IDS There are many different type of attacks which can corrupt a system. Those attacks can be generally grouped into the following categories: • Confidentiality- this type of attack gives access to the information with out Authorization. • Integrity - This type of attack allows the unauthorized attackers to change state of the system. That means changing state of the system or changing the data on the system or the data passing between systems. • Availability - This principle violated when authorized user is not allowed to access system resources by attacker. • Control - If the attack grants an unauthorized attacker a privilege in violation of the access control policy of the system, the attack is on the control principle. This attack can give means to further attacks on confidentiality, integrity, and/or availability. Scanning attack is a form of attacking technique through which attacker scans the information about the system, gains topology information, and the type of network traffic allowed through the firewall, active hosts on the network, OS and kernel of hosts on a network, server software running, version number of software, and much more, . Using this information, the attacker may launch attacks aimed at more specific exploits. For instance, if a host on the network is running a version of sshd which is susceptible to a buffer overflow, and the attacker determines this via a network scan, the attacker can immediately abuse this exploit. Denial of Service Attacks There are two main types of denial of service (DoS) attacks: flooding and flaw exploitations. Flooding attacks can often be very simply implemented. For example, one can launch a DoS attack by just using the ping command: ping -f victim. This will result in sending the victim an overwhelming number of ping packets. If the attacker has access to greater bandwidth than the victim, this will easily and quickly overwhelm the victim. As another example, a SYN flood attack sends a flood of TCP/SYN packets with a forged source address to a victim. This will cause the victim to open half open TCP connections - the victim will send a TCP SYN/ACK packet and wait for an ACK in response. Since the ACK never comes, the victim eventually will exhaust available resources waiting for ACKs from a nonexistent host. Penetration attack is attack on the system through which an unauthorized user gets the ability to change the system data and privileges to access system resources. One common way for this to happen is by exploiting a software flaw. For instance, in July of 2002 an exploit was found in sshd challenge response handling code which allowed the attacker to execute arbitrary code as the user running sshd. This attack would be considered a penetration attack. Being able to arbitrarily execute code as root easily gives an attacker to whatever system resource imaginable. In addition, this could allow the user to launch other types of attack on this system, or even attack other systems from the compromised system. • Input Validation Error - The two most common errors of input validation error are buffer overflow and boundary condition error, this type of errors occurs when program does not properly checks the input data which has entered by the user or data received from the system. A buffer overflow attack exploits the boundaries of some buffer, resulting in some data overwriting adjacent memory locations. A boundary condition error occurs when input to a program causes the program to exceed some boundary. For instance, the input may cause the system to run out of memory. • Access Validation Error - The access control policy of the system is flawed. As a result, the attacker can utilize this to gain control of the system. • Exceptional Condition Handling Error - The system becomes vulnerable because some type of exception has arisen. This exception could either not be caught, or handled incorrectly, thus allowing the attacker to exploit the system. • Configuration Error - This error results as a fault of the end administrator whom is responsible for configuring the system. This is not a fault of how the system was designed, but a fault of the user who incorrectly configured the system. • Race Condition - A flaw in a system where the output exhibits unexpected dependence on the timing of events. Attackers can exploit race conditions with respect to denial of service attacks. Also, attackers can take advantage of programs which reach race conditions while stuck in a privileged state. While in this privileged state, the attacker could convince systems to perform illegal operations. Many organizations use multiple IPSs products, usually from different vendors. By default, these products function completely independently of each other. This has some notable benefits, such as minimizing the impact that a failure or compromise of one IPS product has on other IPS products. However, if the products are not integrated in any way, the effectiveness of the entire IPS implementation may be somewhat limited. Data cannot be shared by the products, and IPS users and administrators may have to expend extra effort to monitor and manage multiple sets of products. IPS products can be directly integrated, such as one product feeding alert data to another product, or they can be indirectly integrated, such as all the IPS products feeding alert data into a security information and event management system. More and more everyday intelligent and creative people are finding new ways to attack computer systems. Until recently, system administrators were limited to choosing from a small variety of protection mechanisms, including the useful, yet limited, firewalls and Intrusion Detection System solutions. These systems combine the benefits of both firewalls and IDSs to block traffic and detect malicious behavior. They also add the power of preventing attacks by looking at the application-layer information within the packet. This powerful combination will certainly serve the industry well over the next several years. Karen Scarfone and Peter Mell. Guide to Intrusion Detection and Prevention Systems, NIST Special publication 800-94, 2007. Avolio, F. Putting It Together. Net Worker, Volume2 Issue 2, pp 15-22 (1998, May). Cabrera, J., Lewis, L & Mehra, R. Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management. Journal of Network and Systems Management (2002, June). Comer, D. Computer Networks and Internets, 4th ed. Upper Saddle River, NJ: Pearson Prentice Hall. (2004). Crothers, Tim, Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network, 2002.
<urn:uuid:f302bde5-1105-41c8-921b-bfc65ae5ad07>
CC-MAIN-2017-13
https://www.ukessays.com/essays/computer-science/study-on-intrusion-detection-and-prevention-systems-computer-science-essay.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218194600.27/warc/CC-MAIN-20170322212954-00152-ip-10-233-31-227.ec2.internal.warc.gz
en
0.936588
3,009
2.71875
3
Examines how mandated and voluntary course-specific math tests that give quick, detailed feedback on the strengths and weaknesses of individual students and entire classes affect student achievement. Outlines district- and state-level policy implications. - Successful Strategy: Mandatory MDTP testing boosted scores on the California Standards Test enough to move students up several percentile points. - Successful Strategy: When students were given an MDTP test two years in a row, the benefits that accrued the year following the first test strengthened in the second year. - Observation: When students were given an MDTP test in one year but not the next, the benefits of MDTP testing decayed over time. - Observation: In contrast with district-mandated testing, the voluntary use of MDTP tests by teachers had no detectable relation with students' gain in math achievement during the year.
<urn:uuid:135b8196-0c4f-4e2e-8038-86bcc32436c6>
CC-MAIN-2021-04
https://www.issuelab.org/resource/does-diagnostic-math-testing-improve-student-learning.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703547475.44/warc/CC-MAIN-20210124075754-20210124105754-00679.warc.gz
en
0.931982
175
3.046875
3
The desert locust (a type of grasshopper), much like Dr Jekyll/Mr Hyde, goes from being an innocuous solitary-living individual to become a voracious gregarious animal that destroys everything on its path (and back). These two very different "personas" are remarkable adaptations of a single genome to distinct environments. But apparently, this flexibility is even more impressive says Patricio Simōes, Jeremy Niven and Swidbert Ott from the Champalimaud Neuroscience Programme, the Instituto Gulbenkian de Ciência in Portugal and the University of Cambridge, as they reveal that the locust' solitarious and gregarious forms also have different memory and learning abilities to suit the needs of the two life stages. The work, out in Current Biology, looked into the mechanism that allowed gregarious locusts to change their diet surprisingly fast -- just a few hours after solitarious locusts are crowded they are eating toxic plants which they previously avoided because of bad taste. To Simōes and colleagues' surprise it was found that this was due to an incapacity by newly gregarious locusts to acquire negative/aversive memories, that made them on encountering toxic plants see these as appetitive. Although gregarious animals later recover this capacity, their diet is not affected because at this point the food taste is no longer an important deciding factor. In fact, in a swarm of millions of individuals competing for little food, taste is probably the least essential criteria. The research provides new insights on how the environment can affect gene expression, and on insects' extraordinaire adaptability. Most importantly, to understand better how the desert locust adapts is to get a step closer to find a way to stop the swarms that every year endanger as much as 10% of the world food resources. Locusts in the wild tend to live solitary lives until it rains and enough food becomes available to trigger their multiplication. Then, as their numbers increase, food exhaustion and physical contact with other locusts as result of their crowding, triggers a cascade of metabolic and behavioral changes that lead to their transformation into the gregarious form that goes to form the swarms. These solitarious and gregarious forms are so distinct in aspect, behavior and even physiology that were once thought to be even different species in an impressive show of adaptability. But if this plasticity in response to the environment (in this case population density) is remarkable, what is even more impressive is how fast it all occurs with new behavior present after only 4 hours of crowding. The changes in diet were particular puzzling to scientists since food is a crucial survival tool and an adaptation to the animal's specific life story and ecology. Although the new diet improved the survival chances of the animal in the swarm by increasing the range of food available and its protection against predators (toxic plants make locusts unpalatable), how could such major adaptation occur in just a few hours? To try to answer this Simōes and colleagues exploited the locust's ability to associate an odour with a reward -- which in the wild allows it to make quick food choices -- to study the memory and learning abilities of its three stages/forms -- solitarious, gregarious and transiens (an intermediate stage, when locusts only just started to aggregate but already show the behaviors of gregarious animals). They used a protocol similar to the one in Pavlov's dog experiments (where a dog is conditioned to associate a bell with being fed) using vanilla (the locusts' favourite) and lemon odours. But in this case the locusts were taught to link a vanilla odour with unpalatable nicotine food (so with a negative/ aversive stimulus), or, instead, lemon with a nutritious diet (positive stimulus). Since locusts prefer the smell of vanilla to lemon, if after training they chose lemon the conditioning had been successful. What the researchers found was truly curious -- while solitarious and gregarious locusts had no problem gaining negative memories (so being conditioned to link vanilla to the unpalatable diet), although it took much longer to gregarious animals, transiens locusts could not do it. In contrast, all 3 stages gained without problems the positive/appetitive memories (to link the lemon odour to nutritious food). On the other hand, if the animals were first trained, then crowded and only after tested, crowding had no effect on (old) memories, whether these were positive or negative. This showed that during the locusts' initial period of gregarization/crowding (transiens form) the animals can not acquire new negative memories. While both solitarious and gregarious locusts can do it, they seem, nevertheless, to use different learning mechanisms, as revealed by the different times it takes them to gain the aversive memory (4 hours for solitarious locusts and 24 hours for the gregarious). These are interesting results but they still did not explain how the gregarious animals changed their diet so fast. So next Simōes and colleagues used hyoscyamine -- a toxic alkaloid substance present in plants of the locust's natural habitat that are avoided by solitarious forms (because of their bad taste) but eaten by gregarious and transiens forms. The idea was to see how these preferences would now affect the locusts' training. To start the animals were taught to associate vanilla with hyoscyamine, but this time while solitarious locusts learned to avoid vanilla -- so gained the negative memory -- neither transiens nor gregarious locusts could do it. In fact, to these two forms hyoscyamine seemed to even be neutral or appetitive. While this was clearly advantageous when in a swarm, how could a previously negative stimulus become suddenly a positive one? Since crowding blocks new negative memories could the old negative memory be simply replaced by a positive one? To test for this possibility the researchers used a slightly different protocol -- solitarious locusts were trained to associate hyoscyamine, not with a vanilla, but with the lemon odour. The idea being that since locusts normally chose vanilla, they will only go for lemon if hyoscyamine has a strong appetitive value. After training animals were divided into two groups -- one half was kept in a cage, the other half crowded- , and after 4 hours trained again and tested. So all locusts are double trained, but only half are crowded between the two training episodes. Remarkably, now the majority of transiens locusts (so those that have been crowded) chose lemon over vanilla, in comparison with only one third of solitarious, non-crowded, locusts showing that they in fact see hyoscyamine as appetitive. These results show is that even if crowding cannot eliminate a previous memory, by temporarily blocking new aversive memories, it permits an update of it when locusts are re-exposed to the toxic plants. This capacity to override previous memories, which only occurs during the initial stages of gregarization/crowding, is crucial for survival in the swarm because with increasing numbers of individuals also raises not only competition for food but also exposure to predators. The reason why later gregarious locusts continue to eat toxic plants despite being able to gain aversive memories lies in their learning mechanism. In fact, while solitarious locusts acquire aversive memories in about 4 hours, most probably through a taste-controlled mechanism, gregarious animals take 24 hours to show a reaction (and transiens never do). This suggest that the gregarious' learning mechanism is post-ingestive, and most probably dependent on food toxicity instead of taste. Transiens locusts appear to have none of these two mechanisms since they simply do not acquire new negative memories, suggesting that they are even more resilient to toxicity than gregarious. Simōes and colleagues' research shows for the first time how the same animal can adapt its learning and memory abilities to suit different life stages in a remarkable show of insects' survival skills. After all their first record goes back 400 million years (in comparison with humans' 200 thousand). But the results also open new doors to maybe one day be able to control the swarms. And when we think that a swarm of desert locusts can reach 1200 square kilometres with 40 to 80 million individuals per square kilometre, and travel 200 kilometres a day while eating everything at its passage, it is easy to understand why it is so crucial to find new ways to stop them. Luckily, swarms only last days with those locusts not eaten by predators turning back to their solitarious form. And it is in this conversion to an innocuous life that might lay a way to stop them, and where the new research might help. By pushing them back into "Mr Hyde" mode. The above post is reprinted from materials provided by Ciência Viva - Agência Nacional para a Cultura Científica e Tecnológica. The original item was written by Catarina Amorim. Note: Materials may be edited for content and length. Cite This Page:
<urn:uuid:0dc33016-1f69-405a-992e-56b63c8d8ec7>
CC-MAIN-2015-27
http://www.sciencedaily.com/releases/2014/01/140114090818.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375097354.86/warc/CC-MAIN-20150627031817-00230-ip-10-179-60-89.ec2.internal.warc.gz
en
0.953232
1,934
3.21875
3
[amsat-bb] Phase shift keying question grant at ghengineering.co.uk Mon Jun 22 06:05:43 PDT 2009 I/Q modulators don't work that way, no free lunch and all that. In newbie terms, an I/Q modulator can be thought of as a special mixer that can modulate a carrier signal with an arbitrary modulation format - i.e. any type of modulation you want - literally. An I/Q modulator has a Local Oscillator input (carrier), an I input and a Q input, and an RF output. The modulation signal (FM, CW, AM, SSB, FSK, PSK or whatever) is applied to both the I and Q inputs, which in turn modulate the LO signal to produce the output signal. The type of modulation is determined by the phase relationship between the I and Q inputs. Couple of simple examples - lets say the modulation signal is a 1kHz sine wave, and we have an LO signal of 144.100MHz. If both I and Q inputs are fed with this signal - in phase - then the output of the I/Q modulator will be AM, at 144.100MHz, modulated at 1kHz - you will hear a 1kHz tone on an AM receiver. If the I and Q inputs are fed 90 degrees out of phase with the same 1kHz tone, then the output of the modulator will be either LSB or USB depending on whether the I signal leads or lags the Q signal. If the receiver is set to 144.100 kHz you will hear a 1kHz tone when set to the appropriate sideband. With slightly more complex phase relationships between the I and Q signals it is possible to generate any type of modulation you want, and from a receiver's point of view you will not know how the modulation was generated. But you can't feed different modulation channels into the I and Q inputs - the output would be a complex mixture of the two which would be un- You could try Googling 'IQ modulation' for more information, although some of the explanations are aimed at professional engineers with good maths skills. Could anyone please explain, in newbie terms, if it is possible to split a telemetry data stream from a satellite OBC into two data streams, sent simultaneously on two nbfm channels, each PSK with the phase difference I have in mind a conversation which I don't fully understand, about these the I and Q components, and this offering a doubling of the data rate with using one nbfm channel. Grateful for any pointers on or off the -bb More information about the AMSAT-BB
<urn:uuid:a762d147-fceb-430c-b734-80464e6b1621>
CC-MAIN-2015-14
http://amsat.org/pipermail/amsat-bb/2009-June/019736.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131304412.34/warc/CC-MAIN-20150323172144-00260-ip-10-168-14-71.ec2.internal.warc.gz
en
0.912604
590
2.765625
3
Researchers at Cornell University have isolated a protein that could prevent roughly 90% of cancer-related deaths. According to their study, "TRAIL-Coated Leukocytes that Kill Cancer Cells in the Circulation," which was published online last week in Proceedings of the National Academy of Sciences, the team, led by Cornell professor of biomedical engineering Michael King, has isolated a protein that causes metastasized tumors to implode at contact. Because the majority of death caused by cancer are the result of metastasized tumors, this development could go a long way in treating cancer. "We've found a way to dispatch an army of killer white blood cells that cause apoptosis — the cancer cell's own death — obliterating them from the bloodstream. When surrounded by these guys, it becomes nearly impossible for the cancer cell to escape," said King. The protein, Tumor Necrosis Factor Related Apoptosis-Inducing Ligand (or TRAIL), is combined with an adhesive protein called E-selective and injected into the blood stream to latch onto white blood cells. As cancer cells try to metastasize and spread through the blood stream, TRAIL infects them and causes the cancer to literally kill itself. In laboratory testing, TRAIL was injected into the circulating blood of mice with cancer and produced a 100% success rate in killing the cancer. What's more, TRAIL leaves healthy cells alone. Though surgery, radiation and chemotherapy are often effective at treating a solid tumor, their efficacy decreases dramatically when the cancer spreads to the rest of the body. But with the discovery of TRAIL, we've taken a major step in the fight against cancer.
<urn:uuid:6a7af0f1-91f7-4caf-b27a-8d5e5b4ddcba>
CC-MAIN-2017-51
https://mic.com/articles/78699/big-scientific-breakthrough-could-prevent-90-of-cancer-related-deaths
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948572676.65/warc/CC-MAIN-20171215133912-20171215155912-00182.warc.gz
en
0.956817
340
3.1875
3