text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
Empowered by a curriculum developed by the U.S. Agency for International Development Lowering Emissions in Asia’s Forests (USAID LEAF) program, 700 professors at 63 universities in the Asia-Pacific region are rolling out education to a new generation of climate change professionals in Southeast Asia.
Working with university professors mainly from the Lower Mekong region, USAID LEAF and the United States Forest Service designed the curriculum to cover basic climate change, social and environmental soundness, low emission land use planning and carbon measurement and monitoring. The curriculum is adapted to specific country contexts, and is already being used in classrooms to teach more than 30,000 undergraduate and 700 graduate students.
“It’s easier for me to prepare lessons because the material is ready to use,” said Mrs. Somvilay Chanthalounnavong, who teaches at the National University of Laos. “There are examples, case studies and guides for the instructor about how to explain the concepts and how to use the material, including role plays, questions and answers and quizzes.”
The curriculum also works well at Thai universities. “If you show scientific evidence for climate change, students really get it,” said Dr. Pimonrat Tiansawat [pee-moan-RAHT tee-AN-swaht] from Chiang Mai University. “They get excited when I talk about ice cores and tree rings. They see the evidence and are more engaged."
Forests cover about 26 percent of the Asia-Pacific region providing livelihoods for local communities and environmental benefits such as reducing carbon and conserving biodiversity. Forests help reduce the negative effects of climate change by storing carbon and greenhouse gas emissions, but the region is experiencing a high rate of forest degradation and deforestation from agricultural expansion, unsustainable logging, urbanization and other factors.
“Taking climate change to classrooms in the region today is a powerful way to ensure that tomorrow’s leaders are already thinking about forests and the environment,” said Beth Paige, director for USAID’s Regional Development Mission in Asia, on the occasion of the International Day of Forests. “We need the energy and drive of intelligent, innovative youth to lock in climate change on national and regional agendas. That’s our collective hope for the future of our planet.” | <urn:uuid:2963a984-8a58-4e97-b0de-b1057a6d5c4a> | {
"date": "2018-04-19T13:36:37",
"dump": "CC-MAIN-2018-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125936969.10/warc/CC-MAIN-20180419130550-20180419150550-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9232006072998047,
"score": 3.203125,
"token_count": 486,
"url": "https://editorials.voa.gov/a/climate-change-education-asia-pacific/3291916.html"
} |
Connective tissue is a critical component of all organs and has special importance in the musculoskeletal system. In specialist tissues, such as bone, cartilage of muscle an in vascular structures and internal organs there is a mixture of less specialized connective tissue together with the specific tissue and organ specific cellular components. In addition to physiological function there are two other areas in which it plays a central role. Normal embryonic an postnatal growth and development, and tissue repair in response to injury. It has emerged that there are shared pathways, mediators and mechanisms in these different processes and that multifactorial tissue growth factors have an important role. In this way, these proteins can have a profound influence on multiple cell types and provide a mechanistic link in many complex chronic diseases. It is notable that pathways that are perturbed in one chronic disease, such as atherosclerosis or osteoarthritis may be similarly disrupted in different context in conditions such as lung fibrosis or scleroderma. Transforming growth factor beta family members are prototypic examples of this class of protein. This included TGFbeta isoforms but also the related bone morphogenetic (BMP) and activin family of proteins. They share chemical structure and an ability to regulate multiple cell types in a context specific way. In addition, there is remarkable complexity in their regulation with intrinsic inhibitory mechanisms to protect from inappropriate biological activity. Their role in repair means that activation of preformed protein may regulate biological effects. Proteins regulated by the TGFbeta family, such as the CCN family of matricellular proteins and some for the cardinal growth factors and cytokines share properties. There is functional and signaling redundancy and cross talk. Conceptually it is interesting to envisage dysfunctional networks of cytokines in disease that may be attenuated by extracellular blocking or antagonism. Insights for many areas of developmental biology and pathology have informed about this challenging area of molecular medicine.
Disclosure of Interest C. Denton Grant/research support from: Inventiva, CSL Behring, GSK, Bayer, Consultant for: GSK, Actelion, Inventiva, Roche
Statistics from Altmetric.com
If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways. | <urn:uuid:b611ffca-42f9-4352-a647-00876fb370f7> | {
"date": "2018-08-16T02:58:19",
"dump": "CC-MAIN-2018-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210408.15/warc/CC-MAIN-20180816015316-20180816035316-00696.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9385258555412292,
"score": 2.671875,
"token_count": 500,
"url": "https://ard.bmj.com/content/76/Suppl_2/34.1"
} |
How to Have Healthy Air At Home
One of the best things about warmer weather: throwing open the windows to let in some fresh air. But that doesn’t automatically mean that the air in your house is healthy, or even safe. If you want to keep your house a healthy place for you, your family and your pets, the American Lung Association has some suggestions:
If you haven’t already, make your home a smoke-free zone. Don’t let anyone smoke inside; if they want to inhale, they can go a safe distance away from the house, so smoke won’t blow in through your windows.
Have a radon test, the ALA says. This colorless, odorless gas, the association says, causes lung cancer and can be found in any home. Testing kits are inexpensive; if you have a high level of radon, it should be fixed right away.
Keep humidity levels under 50 percent. If you need to, use a dehumidifier or air conditioner. But, the ALA says, be sure to clean equipment regularly. Otherwise, dehumidifiers and A/C units can become pollutants themselves.
If you have a leak or a drip, fix it. The ALA points out that any kind of standing water encourages the growth of mold and other pollutants.
Keep kitchen and garbage areas clean. Store and cover food, cover your trash and control pests, like cockroaches, Put away food, cover trash and use baits to control pests, like cockroaches. Dust from cockroaches can trigger allergy and asthma attacks.
Don’t burn wood; it adds to both indoor and outdoor pollution, according to the ALA. Additionally, avoid hydronic heaters, also known as outdoor wood boilers. These devices water in a home, and they add soot to the air.
Don’t use scented candles or fragrances to hide odors, the ALA says. That won’t solve the problem. Find about the source of the odor, clean it up and ventilate.
Avoid toxic household cleaning products.
Exhaust fans should be in bathrooms. They’ll remove moisture and gases.
Your kitchen should also have an exhaust fan to move air outside. Additionally, you can open a window while cooking to eliminate any fumes.
Gas appliances should vent completely to the outside, the ALA says. The association advises against using ventless stoves.
Have a technician give annual inspections to your stove, washer, dryer, and water heater.
Install carbon monoxide detectors. That is the only way you can detect the deadly, odorless substance.
Have gas or oil stoves, dryers and water heaters inspected by a qualified technician once a year. Install a carbon monoxide detector near your bedrooms.
If you paint or use hobby supplies or chemicals in your home, add extra ventilation. Open the windows and use a portable window fan to pull the air out of the room.
Add extra ventilation if you have paint or hobby supplies or chemicals. Open the windows and have a portable window fan to pull air from the room.
Never idle your car in an attached garage, even if the garage door is open.
For more information from the American Lung Association, visit www.lung.org. | <urn:uuid:7ceb2701-8921-446a-9167-4bb628a626e8> | {
"date": "2016-12-08T02:00:06",
"dump": "CC-MAIN-2016-50",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542323.80/warc/CC-MAIN-20161202170902-00360-ip-10-31-129-80.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9077357649803162,
"score": 2.8125,
"token_count": 692,
"url": "http://thirdage.com/how-have-healthy-air-home/"
} |
One name, many books.
The history of Torah is one of interpretation. Every seemingly superfluous letter, unclear transition, and difficult phrase invites discussion, explanation, and elaboration. This interpretive tradition has produced volumes and volumes of midrash--stories, homilies, parables, and legal exegesis based on the biblical text. These texts offer a glimpse of the ways that people of various times and places have grappled to understand the biblical text and to make it meaningful for their own lives.
The body of literature known as midrash is generally divided into aggadic (narrative) and halakhic (legal) midrash. Collections that contain mostly stories, parables, and homilies are classified as midrash aggadah, while collections focused primarily on the derivation of law are called midrash halakhah.
The largest volumes of midrash aggadah are often referred to collectively as Midrash Rabbah. This name is actually a misnomer, as this group of texts comprises ten unrelated collections, compiled over the course of eight or more centuries. Each volume comments on one of the five books of the Torah (Genesis, Exodus, Leviticus, Numbers, and Deuteronomy) or of the five Megillot (Song of Songs, Ruth, Lamentations, Ecclesiastes, and Esther).
Some scholars trace the name Rabbah to the first line of B'reishit Rabbah (Genesis Rabbah), which begins, "Rabbi Oshaya Rabbah opened."
Just as books of the Bible often draw their names from the first significant word of the text, this book of midrash also seems to have acquired the name of the first rabbi quoted in it. Others argue that the title Rabbah, which means "great" or "large," is intended to distinguish this book from a smaller volume that must once have existed. Whatever its origin, the term "Rabbah" later came to be applied to the largest collections of aggadic midrash on each of the five books of the Torah and the five Megillot. In turn, shorter collections of aggadic midrashism on a few of these books acquired the designation, Zuta, which means "small" in Aramaic.
B'reishit Rabbah and Vayikra Rabbah
The oldest extant aggadic midrashimare B'reishit (Genesis) Rabbah and Vayikra (Leviticus) Rabbah. Both were probably compiled around the fifth century CE, but each includes material dating back at least to the third or fourth century. These midrashim are written in a combination of Hebrew and Aramaic, and are peppered with Greek words and expressions.
B'reishit Rabbah consists of a mixture of line-by-line commentary, parables, popular sayings, and legal principles. Many of the best known midrashim, including the story of Abraham breaking his father's idols, appear in this collection.
One notable characteristic of B'reishit Rabbah, as well as of a number of other aggadic midrashim, is the prevalence of the petihta (known to scholars as a "proem," meaning "preface"), a roundabout method of explaining a given verse. The petihta begins with a citation from elsewhere in the Bible--usually from Psalms or Proverbs--and then explicates this text so that it eventually leads back to the verse in B'reishit.
Vayikra Rabbah is classified as a "homiletic midrash," meaning that the text consists of a series of expository sermons, rather than of a line-by-line commentary. Each of these homilies introduces one parashah (weekly Torah reading) according to the ancient cycle of readings, in which the Torah was read consecutively over the course of three years.
Each homily in Vayikra Rabbah focuses on one theme that emerges from the parashah being introduced. For example, the first verse of Leviticus, "God called to Moses," inspires a long meditation on Moses' qualities and on his special relationship with God. The prohibition against drinking wine before undertaking divine service (Leviticus 10:9) prompts a discussion on the dangers of alcohol. Other verses spark discussions about poverty, reward and punishment, and appropriate interpersonal behavior. With their emphasis on topics of general interest, these homilies help ordinary people to find relevance in the book of Leviticus.
Devarim (Deuteronomy) Rabbah is made up of twenty-seven homilies, corresponding to the divisions of the book according to the ancient triennial reading cycle. Scholars have dated this text as early as 450 CE and as late as 800 CE. Each homily in Devarim Rabbah addresses a halakhic (legal) question and each generally concludes with a statement about redemption.
For example, the text begins with a reference to the first words of the book of Deuteronomy, "These are the words that Moses spoke," and then launches into a discussion about the permissibility of writing a Torah scroll in a language other than Hebrew. The midrash goes on to consider a range of other subjects, including the importance of rebuke and the value of Torah, and eventually concludes with a promise that, in the messianic era, God will bless the Jewish people directly rather than via religious functionaries.
The last section of Devarim Rabbah consists of a lengthy and sometimes astounding discussion on the death of Moses. In describing the moment of Moses' death, the midrash imagines a powerful battle of wills, in which Moses prays for life and God bolts the doors of heaven lest Moses' prayer enter and overturn the divine will. The angel of death tries and fails to kill Moses, the angels Gabriel and Mikhael refuse to participate in taking Moses' life, and Moses' soul refuses to leave his body. Finally, in accordance with the biblical text, God descends to give Moses the kiss of death and then to bury him.
Sh'mot Rabbah and Bamidbar Rabbah
The Rabbah midrashim on the books of Exodus and Numbers were probably compiled in the early medieval period, though each also includes older material and, in some cases, the vestiges of a previously-edited work of midrash.
Most scholars understand Sh'mot (Exodus) Rabbah to be a combination of two separate works, each probably written sometime between the ninth and eleventh century CE. The first half of the midrash offers a line-by-line commentary on the first ten chapters of the book of Exodus, and the second half consists of a series of homilies on chapters twelve through forty. Similarly, Bamidbar (Numbers) Rabbah comprises an exegetical commentary on the first seven chapters of the book of Numbers and a homiletic commentary on the rest of the book. The first part of Bamidbar Rabbah is notable for its inclusion of esoteric material and for its apparent familiarity with Sefer Yetzirah, an early work of Jewish mysticism. The second half of Bamidbar Rabbah is essentially identical to Midrash Tanhuma on the book of Numbers. The development of the first half of this text may have taken place as late as the twelfth century CE, while the second half may have existed as early as the fourth century CE.
The Five Megillot
Between the fifth and eighth centuries, a Rabbah developed for each of the five Megillot--the biblical books read on the holidays of Passover (Shir Hashirim/Song of Songs), Shavuot (Ruth), Tisha B'av (Eicha/Lamentations), Sukkot (Kohelet/Ecclesiastes), and Purim (Esther).
In keeping with the themes of the book of Eicha, which describes the destruction of Jerusalem in 586 BCE, Eicha Rabbah (fifth century) offers a series of homilies that elaborate on the themes of displacement, suffering, and hopelessness. Most striking are the midrashim that depict God as actively destroying Jerusalem in order to punish the Jewish people, and then mourning for the loss of the city and its people. In some of these midrashim figures including the angels, the Torah, and various biblical characters plead with God to save the Jewish people; in others, God retreats into a private mourning, refusing any consolation.
Like Eicha Rabbah, Ruth Rabbah, also composed around the fifth century, amplifies the themes of the book on which it is based. The book of Ruth includes numerous examples of tzedakah (monetary gifts to the poor) and g'milut hasadim (acts of loving kindness), and the midrash spends significant time expounding on these themes. This midrash also spends some time locating the story of Ruth within the larger biblical context by reading references to Ruth and her family into verses from the book of Chronicles.
Shir Hashirim Rabbah (sixth century)is most notable for its allegorical interpretation of the biblical text. Read literally, Shir Hashirim consists of some fairly racy poetry describing the relationship between two lovers. In the hands of the midrash writers, the book becomes a G-rated description of the love between God and the Jewish people. Consider, for example, the midrashic interpretation of the verse, "All night between my breasts my love is a bundle of myrrh (1:13)":
"My love is a bundle of myrrh." What does "a bundle of myrrh” mean? Rabbi Azariah, in the name of Rabbi Yehuda, explained that this verse refers to Abraham. Just as myrrh is first among the spices, so too is Abraham first among the righteous..."all night between my breasts." For he was considered to be halfway between an angel and the divine presence (1:14).
Thus, what seems at first like a sexy bedroom scene is transformed into a lesson about the righteousness of Abraham who, according to this midrash, achieves near-divine status.
Some have suggested that Kohelet Rabbah, written between the sixth and eighth centuries CE, may originally have served as a school textbook. Through a verse-by-verse commentary on the book of Kohelet, this midrash addresses an unusually wide range of topics, ranging from business practices to the cycles of nature to the character and limits of wisdom. This collection includes a significant amount of material taken from other midrashim and from the Palestinian and Babylonian Talmuds.
The volume known as Esther Rabbah can be divided into two sections. The first half, compiled around 500 CE, is an exegetical commentary on the first two chapters of the book of Esther. Like other midrashim of its time, this collection begins with a number of petihtaot introducing the first line of the biblical book. Given the notable absence of the name of God from the book of Esther, the midrash makes a special effort to find within the biblical text hidden references to divine intervention.
The second part of Esther Rabbah was composed significantly later, perhaps around the eleventh century. This section comments on the remaining chapters of the biblical book. Most surprisingly, this half of Esther Rabbah includes Hebrew translations of several passages of the Septuagint, the first Greek edition of the Bible, published in the third century BCE.
The Rabbahs include midrashim of a variety of styles, themes, and time periods. Though different from each other in many ways, all of these works help to bring the biblical text to life by adding stories and interpretations, and by drawing out of the biblical text lessons for everyday life. Most importantly, these midrashim remind us that the Bible has infinite meanings, and that each individual and each generation reinvigorates it by developing new interpretations.
Did you like this article? MyJewishLearning is a not-for-profit organization. | <urn:uuid:4c01d826-9998-4f0c-9211-5399535ec16f> | {
"date": "2014-11-24T18:06:24",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400380948.74/warc/CC-MAIN-20141119123300-00064-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9542613625526428,
"score": 3.5,
"token_count": 2514,
"url": "http://www.myjewishlearning.com/texts/Rabbinics/Midrash/Midrash_Aggadah/How_Midrash_Functions/Midrash_Rabbah.shtml?p=0"
} |
Evidence-Based Medicine: In Sherlock Holmes' Footsteps
April 2008, Wiley-Blackwell
Using a simple four-step approach, the author illustrates how to develop better questions and more effective searches, resulting in objective and clinically relevant information that can be evaluated and implemented in day-to-day practice. Sherlock Holmes and Dr Watson, the famous fictional detectives, assist throughout, drawing parallels between criminal and medical investigation, and simplifying the processes and themes of EBM.
Evidence-Based Medicine in Sherlock Holmes’ Footsteps is a concise, accessible and instructive introduction to EBM for medical students, health care trainees, doctors and allied health professionals, and a valuable resource for anyone wanting to improve their ability to search, access and interpret the wealth of information at the fingertips of today’s medical community.
STEP 1 FORMULATE AN ANSWERABLE QUESTION.
Choosing the Appropriate Database.
Clinical Practice Guidelines.
Critically Appraised Topics (CATs).
Primary Information Sources.
Other EBM Portals.
STEP 2 INFORMATION SEARCH.
Make a Wide Search with High Sensitivity.
Principal Database Search Strategy.
Limit Your Search Results/Increase Your Specificity.
Use a Good Hit for Further Searches.
STEP 3 REVIEW OF INFORMATION AND CRITICAL APPRAISAL.
Quality Assessment of Information.
Evaluation of the Scientific Quality.
Quality of Evidence.
STEP 4 EMPLOY THE RESULTS IN YOUR DAILY PRACTICE.
Balance between Benefit and Harm.
Strength of Recommendation.
Make a Recommendation.
Communicating the Evidence to Your Patient.
DEDUCTION, ANALYSIS AND MEDICINE.
SUMMARY OF INFORMATION SOURCES AND SEARCH ENGINES.
SHERLOCK HOLMES REFERENCES.
LIST OF ILLUSTRATIONS.
RECOMMENDED EBM LITERATURE.
- Breaks the evidence-based approach into four steps: formulating an answerable question; information search; reviewing information and critical appraisal; employing the results in daily practice
- Introduces concepts with the use of easy-to-remember acronyms, clinical examples, tables, illustrations and selective quotes from Sherlock Holmes
"Small enough to read on the bus to placement but contains enough 'meat' to keep you entertained. It is clearly set out, and using Sherlock Holmes' steps really makes it a novel and interesting read. I think it's the best evidence based decision making book I have read." (The Placebo Effect, HYMS Gazette)
“Based on a solid foundation…concise…handbook that learners and practitioners alike could easily carry around…In this regard, the book is quite a success.” (Canadian Medical Association Journal)
Reviews of the original Swedish publication
”The entertaining analogy between critical appraisal and Sherlock Holmes´detective work, with well-found and appropriate quotations, makes the reading a pure pleasure.” (Läkartidningen 2004; 40:3100-1)
”The book is a little pearl and is warmly recommended.” (Ugeskrift for Laeger 2004; 18 October:43)
”The author has succeeded in creating a comprehensive, relevant and at times witty book. It is a useful and readable introduction [to EBM] that is warmly recommended.” (Tidskrift for den Norske Laegeforening 2005;1:125)
”[The author]has written an ingenious book, a compact EBM textbook in a light format, with a twinkle in his eye. The subject has been packaged for easy digetion – fish liver oil encapsulated in candy.” (Lääkärilehti 2005;3:322)
”This book written by Surgery Professor J.N. is a little pearl! Not only is it tasteful, humorous and well structured; it is also comprehensive, nutritious and – most importantly- understandable in an area where other more voluminous books fail.” (Svensk Bibliotekstjänst 2004:15)
–Medical student, Edinburgh University
"I would almost certainly recommend it as a core text for anyone serious about scientific research and study. I would and will be using this book alongside every essay in the future that I have to prepare...A fantastic introduction on how to access the best information available using the forbidding databases and online search engines with a step by step approach to critically appraising original scientific literature...It has completely changed the way I will approach essay writing and literature searches forever. I have often been daunted by critical appraisal and no-one has ever really managed to capture and present such an important skill until now." –Medical student, Glasgow University
“Evidence-Based Medicine in Sherlock Holmes’ Footsteps presents key information within EBM in a highly original format and provides a very good introduction to the main concepts of EBM.; this book helps to further consolidate your understanding of the main concepts. This text provides an original way to focus on scientific integration of wider epidemiology with individual patient requirements. It shows how EBM can be practiced in a variety of clinical settings and gives good practical advice for accessing the best evidence quickly and effectively.”
–Medical student, Bristol University
"This is the best book I've ever read regarding how to do EBM. It teaches you how to do powerful, effective searches for medical literature and how to review the evidence. All that you know you should be learning about EBM but previously found it difficult to start - They're spelled out clearly in this tiny beautiful book."
–Medical Student, University of Edinburgh
“This small quirky book uses examples from Sherlock Holmes to demonstrate how to get the most from published journals, and how to critically appraise the quality of the information gathered from your detective work. A fascinating read that makes EBM more accessible to the masses. Learn at the hand of the master. This really is a great little book!“
–Medical student, University of East Anglia
I'm so happy that I was able to review this book. It has completely changed the way I will approach essay writing and literature searches forever. I have often been daunted by critical appraisal and no one has ever really managed to capture and present such an important skill until now. I hope this book evolves with the search engines and data management systems so that it will always be useful to current and future generations of students. It won't be long until this becomes recommended reading for many science based courses and those monotonous hours spent being shown database searches by librarians become obsolete."
–Medical Student, University of Glasgow
"This really is a great little book! Size wise it’s good- not big enough to put you off, and easy to handle and read. The format is very functional. The layout and presentation are easy to follow and the examples are clear and interesting. High quality diagrams and pictures add to the ambiance."
–Medical Student, UEA
”It is well written, covers the basics and is delightfully concise.”
–Andy Oxman, Norweigian Health Services Research Center | <urn:uuid:e0fc9ead-8958-478f-a3f9-8610b0a6318e> | {
"date": "2014-04-23T18:17:43",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203235.2/warc/CC-MAIN-20140423032003-00155-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9029909372329712,
"score": 2.890625,
"token_count": 1507,
"url": "http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470750316.html"
} |
Between the two world wars, the dominant trend in Hungarian history writing was Geistesgeschichte, as represented by the works of Gyula Szekfû, Bálint Hóman, Gyula Kornis, Tibor Joó, József Deér, and Péter Váczy. Fully versed in the works of Ranke, Meinecke, Dilthey and Lamprecht, Gyula Szekfû, the most outstanding of these historians, was also the one to conclude that Hungarian history would lend itself admirably to a consistent synthesis.
In his A magyar állam életrajza (1918), and in his Bethlen Gábor (1929), Szekfû expressly models his approach on Meinecke's, and tells the entire story from the vantage point of raison d'état and the national point of view. This meant that for him, the central issue of Hungarian history was the territorial integrity of historic Hungary, the Hungary of St. Stephen. This particular outlook is even more evident in Szekfû's Három nemzedék (1920), the veritable Bible of the period. Here, he depicts the nineteenth-century Hungarian liberals responsible for the disintegration effected by Trianon. Blinded by the political tradition of the nobility's struggle for Hungarian independence throughout the sixteenth and seventeenth centuries-ran Szekfû's indictment of the liberals-they construed the word "freedom" to mean "independence from the Habsburgs", and failed to realize that the territorial integrity of historic Hungary (i.e., Hungarian rule over the nationalities) could be maintained only with the support of an outside great power, namely, the Habsburg Empire. (This correlation was something that Széchenyi had recognized, and Szekfû, accordingly, esteemed him as by far the greatest Hungarian.)
One finds the same train of thought in all the sections that Szekfû wrote of Magyar Történet (Hungarian History, 1929--1933), a seven-volume synthesis he published together with Bálint Hóman. (Szekfû authored the period stretching from King Matthias Corvinus and the Renaissance to the date of publication). In the final analysis, at every stage of Hungary's history, we find him dividing the leading politicians into two groups: those who believed in "Small Hungary" and those who believed in "Greater Hungary". The "small Hungarians" were those whose primary goal was national independence from the Habsburgs. But this aspiration of theirs, he maintained, was motivated not by some lofty ideal, the love of freedom, for example, but by selfish "class interest" (the nobility's determination to protect its privileges), coupled with a passion for dissension and upheaval inherited from their Eastern ancestors. Another name for this "passion" was Protestantism, which, as Szekfû saw it, was ab ovo inspired by the resolve to spark denominational conflict and create disorder.
The "great Hungarians", on the other hand, had always appreciated that the great power status of the Habsburg Empire was a historical necessity. They recognized the need for political compromise, and strove to promote social reform, and the nation's material improvement and intellectual progress (naturally, with Habsburg support). Szekfû's synthesis presents the Baroque culture of the eighteenth century as the zenith of Hungarian history, a time when the country's territorial integrity had been more or less restored, when religious (Protestant vs. Catholic) and political (Estates vs. absolutism) in-fighting no longer undermined the unity of the nation, when the country's economic and cultural development picked up momentum, and its resettlement began.
Even in the late '30s, Szekfû was very much preoccupied by matters of external politics and national sovereignty. In his Állam és nemzet (State and Nation, 1942), he rejected both the French notion of a political nation and the German "ethnic nation" concept, and presented a uniquely Hungarian notion, one rooted in St. Stephen's tolerance toward the "foreigners". It was a nation concept which guaranteed the country's minorities a high degree of autonomy, while its raison d'etre was to safeguard, and/or to restore Hungary's territorial integrity.
"A népiség története" (Ethnohistory) written in 1931, was the most comprehensive formulation Mályusz would ever give of his program. The study starts with a definition of the notion of "the ethnic". As opposed to "the national", the conscious expression of a people's cultural and political aspirations, "the ethnic" was shorthand for the spontaneous ways and cultural preferences of a particular people. The best way to get started in ethnohistorical research, he went on to say, was to write "synthetic" local and/or county histories. By "synthetic" he meant just the opposite of the village by village approach of the prewar county histories: the historian was to focus on the small, organically-related historico-geographical units-estates, valleys, plains, and so on-units he would later call "cultural regions", and whose study he expected to reveal an entire network of Southern, Eastern and Northern cultural contacts.
Mályusz honed his theory by clashing swords with proponents of the most powerful historical ideology of his time. Taking a direct stab at Geistesgeschichte, its preoccupation with Western cultural influences and its exclusive reliance on the evidence of the written word, he set ethnohistory the task of concentrating on "spontaneous" cultural elements such as roads, means of transportation, architecture, systems of local political and administrative organization, and "anthropological" data of every kind that might serve to give an accurate picture of the day-to-day life of the people.
Mályusz's views on the nature and techniques of ethnohistory, were thus fully developed by the time he came to give his "Introduction to Ethnohistory" course (i.e., the series of lectures that form the core of the volume under review) in the 1936--37 academic year. (As the editor makes clear, only the lectures delivered in the second semester have been found among Mályusz's extant papers.) One of the issues addressed in the lectures was the matter of the "auxiliary disciplines" which Mályusz proposed to "modify" with a view to making them integral parts of the science of ethnohistory. He was particularly enthusiastic about the potential of ethnography and of linguistics, attaching great importance to the study of dialects (and their exact geographic mapping), and to tracing the origins of place names and personal names. He was also keen to have his students learn to use questionnaires, and to set up the institutional framework of ethnohistorical research.
Mályusz's ethnohistory was the revival of the positivist traditions of the nineteenth century. The legacy of positivism, as his contemporaries were quick to point out, was evident in his preoccupation with the collective, and with the law-like regularities of development, and in his concentration on cultural history. But ethnohistory proposed to give an account of cultural development with full regard to its grounding in economic history and historical geography. Instead of political and administrative units, it took organically related historical and/or geographic regions for its units of analysis, and investigated them at all levels and with all the tools that we have come to associate with microhistory and microgeography.
So far, so good. The picture is tainted, however, by the fact that the contemporary inspiration of Mályusz's ethnohistory was the Volkstumskunde associated with Aubin, Kötzschke, Keyser, and Spamer in the inter-war years. Volkstumskunde itself harked back to the nation concept espoused by Herder, Arndt, Fichte and the brothers Grimm, which posited race and ethnicity as the basis of nationhood, and defined national affiliation in terms of a community of descent, language and culture. It was an approach humanist in inspiration, but wide open to racist exploitation. Thus it was that by the turn of the century, the pan-German movement had made it into an ideology of world domination, oneserving to substantiate their doctrine of the Germans' racial superiority over the Slavs. Allied with Ostforschung, another fin-de-siecle intellectual trend, Volkstumskunde came to present German history as essentially a crusade to spread German culture (the German "cultural ground"), principally toward the east. Empire building and "civilizing"-founding cities, introducing the German legal system, organizing churches-was, on this view, at the very heart of German history, as was the struggle for pan-German unification. (Paradoxically, for all its chauvinism, Volkstumskunde proved to be a highly fruitful trend in German historiography. As opposed to the tradition represented by Troeltsch, Meinecke, and Below - concentrating on the state, the history of ideas and "great personalities" - Volkstumskunde explored collective phenomena and material culture for sources of historical evidence, and encouraged a basically interdisciplinary approach.)
Considered purely as a methodology, Volkstumskunde, like Mályusz's ethnohistory, would have had the potential for providing relatively impartial, in-depth depictions of particular segments of the past. There is, however, no way to disregard their political and ideological thrust. Mályusz's introductory lecture to the second semester of his course on ethnohistory (pp. 19--46) leaves absolutely no doubt as to his explicitly political agenda. His studies of the early 1930s on the new German nationalism bear this out. Post-war Europe, he noted (and would continue to reiterate for another decade), had given rise to a new kind of nationalism, one predicated not on state formations, but on ethnicity.
Perhaps the most problematic aspect of Mályusz's concept of an "ethnic nation" was that it necessitated his precluding the country's Jews from the body politic. "Let us exclude the Jewry from our nation", he wrote; "let us dismiss, in amicable accord, all those who do not, in their heart of hearts, feel that they are thoroughly Hungarian". Admittedly, Mályusz was not a racist: he did not believe that history was, in essence, the struggle of the various races for Lebensraum, with the superior races winning. In fact, in his "A népiség története" of 1931, he criticized German historians for identifying "culture" with German culture. The task facing Hungarian historians, he insisted, was to preserve for posterity what the Magyars had achieved jointly with the Slavs in the way of culture.
Mályusz's cultural nationalism was anti-German in several respects. For one thing, his very emphasis on the autonomy of Hungarian culture implied resistance to Hitler's attempts at expansionism. But there was also another side to it. Mályusz's cultural nationalism-as he himself admitted-was meant to lay the groundwork for revisionism. His resolute underscoring of the strength and autonomy of Hungarian culture was meant to provide an alternative to Szekfû's vision of a Hungary whose fortunes were irrevocably tied to that of the Habsburgs. Given the opportunity, Mályusz was suggesting, Hungary would be capable of carrying through a territorial revision on its own.
All in all, however, Mályusz might most equitably be judged as having posited-as opposed to Szekfû's concept of nation as state - the concept of nation as culture. For all its manifest ideological and political bias, in respect of methodology, ethnohistory anticipated our current approach to social history. In publishing Mályusz's lectures for the first time ever in book form, the editor of the volume under review has enabled non-historians, too, to draw their own conclusions about the more universal lessons of ethnohistory. The lesson might prove as timely as the German revisitation of Volkstumskunde has proved to be. | <urn:uuid:cf09ad27-b14f-4ff8-aa00-93a2dd1c39a5> | {
"date": "2013-05-24T08:36:45",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9583035707473755,
"score": 2.90625,
"token_count": 2629,
"url": "http://c3.hu/scripta/books/95/04/05eros.htm"
} |
Buddhism, or Buddhadharma, is Buddha’s teachings and the inner experiences or realizations of these teachings. Buddha gave eighty-four thousand teachings. All these teachings and the inner realizations of them constitute Buddhadharma.
Buddhadharma does not stay in one place but moves from one country to another. Just as gold is precious and rare, so Buddhadharma is precious and very hard to find.
Buddha taught how to examine our mind and see which states produce misery and confusion and which states produce health and happiness. He taught how to overcome the compulsively non-virtuous minds that confine us to states of discontent and misery, and how to cultivate the virtuous minds that liberate us from pain and lead us to the bliss of full enlightenment.
By learning Buddhadharma, we will have the opportunity to gain the happiness we seek and to fulfil all our temporary and ultimate wishes.
You can learn more about the mind and how to control it from Understanding the Mind. | <urn:uuid:ec584b9b-a18e-48e5-bca5-20f8e49fba72> | {
"date": "2015-10-04T09:16:48",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736673081.9/warc/CC-MAIN-20151001215753-00150-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9454943537712097,
"score": 3.09375,
"token_count": 212,
"url": "http://kadampa.org/en/reference/buddhadharma"
} |
Bud Drop: The typical sign of thrips is a bud that grows
large, turns an off-color before opening, and then falls from the plant at the
slightest pressure. Buds may sometimes fall before turning color, but often
that sort of rotten color happens before the buds fall. The reason for this change
in the big, healthy bud is that the thrips have been scratching around inside
the bud as well as laying eggs inside of it. When the bud falls, the young
thrips are then able to leave the bud and burrow into the ground where they
change into adult thrips that are capable of flying back up to new buds to
continue the cycle.
Scratch Marks: Some varieties of
hibiscus do not react to thrips by losing their buds. In that case you can see
the thrips damage as scratch marks on the flower petals. Sometimes it looks
almost natural, like the spots and markings that some of our varieties produce
as part of their interesting flower coloring. Other times you can see how it
badly mars the beauty of the flowers. Even though these varieties do not lose
their buds they can still be treated in order to obtain flawless blooms free of
COMMENTS on disease
Thrips are insects that lay their eggs inside the buds of hibiscus,
roses, and other species that make big buds before flowering. The thrip is
small but visible if you look for it. The easiest way to see thrips is to take
an open flower and shake it over a white piece of paper. Thrips will fall out
of the flower onto the paper, looking like small, black pencil lines on the
paper. They are much longer than they are wide, and their dark color stands out
against a piece of white paper.
For fast and full results, it is best to remove
all rotten buds from the plants and the ground and dispose of them in the
trash. In order to keep thrips under control, you will need to use a product
called Spinosad. This
chemical needs to be sprayed over the tops of the plants, covering the buds and
upper leaves of the plants. Use Spinosad for three treatments, 5-7 days apart.
but you may repeat this treatment series if you need to. You can also drench
the potting mix or soil around a hibiscus with a systemic pest control product.
This will kill most of the live thrips that are living in the ground in the
juvenile form, and it will speed up control of this pest.
Organic Treatment: If you don`t want to use
pesticides, an organic approach is to spray in the same way with any product
containing "Neem oil," a natural product obtained from the Neem tree.
It may require more treatments to control thrips, but is a good alternative
approach if combined with gathering up all rotten buds and spent flowers so the
thrips do not reach the ground around the plant . | <urn:uuid:b5081a7d-3e89-4aca-98f7-fd94fd8a7c4e> | {
"date": "2019-09-17T10:14:07",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573070.36/warc/CC-MAIN-20190917101137-20190917123137-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9403867721557617,
"score": 3.234375,
"token_count": 638,
"url": "http://www.the-greenexpert.com/singleDisease.aspx?disid=1379"
} |
Zebrafish model may lead to new therapies for mitochondrial disease
By Monica Frazier
Sherine Chan, Ph.D., former NIEHS trainee and current assistant professor in the Department of Pharmaceutical and Biomedical Sciences at the Medical University of South Carolina (MUSC), spoke Nov. 15 at Duke University. Her presentation was part of the fall Integrated Toxicology and Environmental Health Program (ITEHP) seminar series.
Her talk on “Environmental Toxicant Exposures, Mitochondrial Dysfunction, and Birth Defects” attracted a capacity audience to the Levine Science Research Center at Duke, which houses ITEHP.
Chan, a former postdoc in the NIEHS Mitochondrial DNA Replication Group, has been at MUSC for more than 4 years, and has developed her own group to advance the mitochondrial research interests she developed during her time at NIEHS, which has potential applications in a range of diseases linked to defects in energy production (see text box).
The need for a new animal model of mitochondrial dysfunction
Chan opened her talk by saying, “The big problem with mitochondrial dysfunction is there are no cures, and there are no good treatments that are currently available on the market.” As she went on to explain, “One of the reasons why that might be is that there are no good animal models [for drug discovery].”
To address this issue, Chan has worked to develop strains of zebrafish for mitochondrial studies. Zebrafish are extremely valuable for developmental research, Chan explained, because once fertilized, they rapidly develop and hatch within three days. Because they are transparent, her research group can use a microscope to watch embryonic development during exposure to different environmental toxicants. One toxicant the group has studied, rotenone, is a naturally occurring mitochondrial-targeting organic pesticide often used in farming.
Using zebrafish to determine mechanisms of birth defects and disease
The zebrafish model is particularly advantageous for Chan’s research, because one of her interests is looking for connections between mitochondrial dysfunction and birth defects. Since many birth defects are sourced to the heart or nervous systems, which use a lot of mitochondrial-generated energy, Chan suspects that mitochondrial dysfunction could have a significant impact on early development.
Chan also detailed her study of epilepsy using zebrafish, and her search for an improved therapy using high-throughput zebrafish screens of potential compounds. Several promising compounds are being investigated by Chan’s research group, in collaboration with MUSC chemist James Chou, Ph.D., and the National Institute of Neurological Disorders and Stroke Anticonvulsant Screening Program. Their study was just accepted for publication in Neuroscience.
(Monica Frazier, Ph.D., is an Intramural Research Training Award fellow in the NIEHS Mechanisms of Mutation Group.)
Transitioning from postdoc to lead researcher — building independence
In less than five years after leaving NIEHS, Chan and her group at MUSC have developed a new model system for studying mitochondrial disease, and successfully incorporated that system to establish new findings in the field.
Chan’s former mentor, Bill Copeland, Ph.D., head of the NIEHS Mitochondrial DNA Replication Group and chief of the Laboratory of Molecular Genetics, is not surprised by her successful transition into an independent academic career.
“Her ability and tenacity to try new systems, such as working in the zebrafish model, something that she started on her own after leaving NIEHS and without any prior training, is especially impressive,” said Copeland. Chan took advantage of a diverse range of training opportunities, while at NIEHS, and the effective transfer of those learned skills is a key component to her success.
“I was pretty open and not set on any one career path, so I explored many options, which is one of the many great things about doing a postdoctoral fellowship at the NIEHS,” Chan commented. After becoming a recipient of an NIH Pathway to Independence (K99/R00) award from NIEHS, she was excited to follow an academic path. | <urn:uuid:8613b466-3b63-4299-9a7f-d5e197e0325a> | {
"date": "2017-04-23T11:58:23",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118552.28/warc/CC-MAIN-20170423031158-00115-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9621440768241882,
"score": 2.578125,
"token_count": 856,
"url": "https://www.niehs.nih.gov/news/newsletter/2013/12/science-zebrafish/index.htm"
} |
Mythical Continent of MU A Pacific Ocean version of Atlantis,
the continent of MU also suffered the same
underground volcanic catastrophe and sunk.
of many indigenous nations, from the Polynesian natives of Hawai, the
Dogon tribe and Tuareg tribes in Africa, to the Tamil "Silappadikaran"
legend in Hindu texts, to the secret spiritual teachings handed down among the Rosicrucians, regularly mention a mythical Pacific
continent that suffered a catastophic end via volcanic activity. The magma chambers under the continent erupted and collapsed, sinking the entire continent under the Pacific Ocean forever.
Also known as the legendary Kingdom of Lemuria, MU was regarded as an Asian rival of the European subcontinent of Atlantis. Heroes of Vedic Ramayana lore may be direct descendants of this proto-modern ancient civilization, migrating to India and other parts of the world after the sinking of their homeland.
But, legend has it that the tombs, artifacts and sub-oceanic
chambers of the sunken Kingdom of Mu would be discovered in the very
near future--in this generation or so. Already, Google Earth has visually identified
every single submerged ancient city or ruins of settlements.
also a time when Earth starts a new age (2017--Fire Rooster--and 2018, where 2018 as an Earth Dog lunar year) where Wisdom of ancient
civilizations may slowly being rediscovered or recovered.
According to myths of the MU continent, the Hawaiian Islands and the Pacific islands of the Marianas, are the remaining mountain peaks of the lost continent. As an advanced ancient race predating Egypt and China lived 12,000 years ago, its location in the Pacific Ocean area is supposedly confirmed by the sacred Vedic books and Sanskrit scrolls kept in underground vaults
of Hindu temples in Tibet and India.
As the Pacific Ocean-based rival of Atlantis, which itself was located somewhere off Spain and Greece (some geo-scientists hypothesize that it is hidden under the ice of the Antarctica continent), it was home to an advanced civilization, whose survivors and refugees eventually became the colonists of the subcontinent of
India; and from there Mesopotamia and Egypt.
The survivors from Mu are said to have migrated
eastward on makeshift survival rafts, on to the prehistoric Americas, forming the racial core of the
earliest Indian tribes. In fact, California's oldest prehistoric artifacts are
found on Santa Rosa Island and are dated around
25,000 B.C., the estimated time period of the Biblical flood.
Augustus Le Plongreon Discovers MU from Mayan texts
Author Augustus Le Plongeon (1825-1908) is supposedly the first modern historian to have discovered Mu, possibly existing in ancient times and even predating the Chinese and Egyptian civilizations from translating Mayan texts referring to an ancient continent named Mu.
Hand-me-down Tales Describe an Ancient Pacific Continent
The legends of Easter Island, handed down via oral tradition folktales, describe a prehistoric kingdom of Hiva, which sank beneath the waves, The nearby Samoans called a similar tragic advanced civilization that fell to volcanic cataclysm. Bolutu. The Maoris of New Zealand still talk about arriving long ago from a sinking island called Hawaiki, a vast and mountainous place on the other side of the Pacific Ocean.
The possible remnants of MU under the Pacific Ocean, when viewed from Goggle Earth show the current islands of the U.S. state of Hawaii as seeming tips of a submerged enormous mountainous island.
A prehistoric map of the lost continent matches the exact boundaries of the Pacific Plate, a cartographic record that existed long before geologists even knew of the undersea tectonic plate's existence.
The map places the capital of Mu just north of present day Maui, near the center of a vast continent that stretched from Australia to the Rocky Mountains. Detailed renderings of the lost continent of Mu and Atlantis were found on stone tablets in almost every prehistoric ancient society in the South Americas, Mayans and the Aztecs.
The myths and traditions of India have historical scrolls accounting for "the three continents that were;" the third was home to a race called the Danavas. An immense continent, east of India was home to a race of sun-worshippers, the proto race of the prehistoric Egypt, whose country was destroyed by volcanic cataclysm and sent into the ocean depths.
The remains of the Kingdom of Mu emerged as Indonesia and the Pacific islands, while the few survivors straggled on to the Indiam subcontinent by rafts, where they evolved into the elite Brahman caste.
From American Indian Hopi legend: 'Down on the bottom of the seas lie all the proud cities, the flying patuwvotas, and the worldly treasures corrupted with evil . . ."
According to the oral tales of today's Pacific Ocean island residents, escapees of the Mu continent disaster hid inside the earth, hollow earth becoming a legendary mystery as a pocket universe or quantum dimension--which may indicate what a fourth dimension actually may be.
The earthbound survivors crossed the ocean on makeshift rafts, using the island tips of the submerged mountains as their navigational waypoints on the way to the South Americas. The same story of finding dry land among the survivors of MU is identified as the Popul Vu epic of the Quiche Maya and the Modoc tribe near Mt. Shasta.
Archaeologist Churchward Popularizes Pulp MU
Researcher James Churchward used to serve as a soldier in British-occupied India and was befriended by a Hindu priest (rishi). Getting the confidence of the holy man, Churchward was shown ancient tablets that described the existence of an ancient society located in what is now the Pacific Ocean and was described as the “motherland of mankind.” Churchward wrote speculative books on the subject like ‘The Children of Mu’ (1931), ‘The Lost Continent of Mu’ (1933) and ‘The Sacred Symbols of Mu’ (1935) all hypothesizing the possibility of the Mu people as an ancient Vedic-Asian race.
Churchward claimed that Mu was the common origin of the great civilizations of Egypt, Greece, Central America, India, Burma and others, including Easter Island, and was creator of ancient megalithic architecture like the pyramids and the stone fortresses in Asia and in the Indo-Thai geographical area.
Modern Science Covers Up for Existence of MU
Geological science refutes the existence of any Pacific
Ocean submerged secret continent because of the supposed geological
traces that should be detected if volcanic activity did occur to cause
any continent-size land mass to sink into the ocean.
The closest thing
that anyone can put together to scientific fact is looking at the
islands now in the Pacific as tips of what used to be larger land masses
if the seas rose 350 meters to their current levels.
There should be traces of all the ancient cities underneath the water if they were
submerged around the current location of the Marianas and Hawaii. The
fact that some submerged ancient cities do show up, like the Yogisuki pyramid
steps. This makes it plausible that the
surrounding undersea sediment swallowed most of the physical evidence—so
a deep earth, radar scan of the ocean should come up with something of made in the future.
A radar scan revealed that the giant heads of Easter island were actually connected to a submerged stone body and more stone formations buried underneath eons of earth embankments. The end of the last ice age we know now was a very rapid event, and 12,000 years ago the world’s oceans were 350 meters lower than they are today, thus, low lying land from that time would now be submerged.
Radical science-geologists (called Catastrophists) believe a continent called Pacifica existed within the last 100,000 years, and that its fairly rapid submersion caused mountains on the perimeter to rise and created hundreds of volcanoes called the Ring of Fire. Sea levels worldwide were disrupted as water rushed in to fill an enormous basin created by the sinking and caused oceans to drop hundreds of feet.
If it is possible to get any more detailed evidence about the lost continent of MU, the last repository of texts may be the library vaults of the Tibetan monks and their Hindu counterparts in India. Until then, only a radar scan that can be open source utilized by the public and amateur researchers just like Google Earth is used by amateur and pro archaeologists for finding buried pyramids in the Middle East and in other parts of the world may finally prove if the continent of MU or the Kingdom of Lemuria is a fictional tale or an actual account, still remembered via oral tradition by the current descendants of that ancient society. | <urn:uuid:9c61f064-8b31-4663-8191-f3ae3b749961> | {
"date": "2018-10-19T11:28:38",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512395.23/warc/CC-MAIN-20181019103957-20181019125457-00296.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9333035349845886,
"score": 3.203125,
"token_count": 1826,
"url": "http://reach-unlimited.com/p/549067706/the-lost-continent-of-mu--ancestors-of-egypt-and-greece"
} |
by Staff Writers
Paris (ESA) Oct 09, 2015
How astronauts adapt to the stresses of living in space is helping researchers to pinpoint the causes of common disorders on Earth. From the brain's point of view, living in space is very stressful. The signals from an astronaut's body in space go haywire as they float in weightlessness. The inner ear reports that it is falling, but the eyes show that nothing is moving.
As fluid shifts to the head, the brain usually interprets this extra pressure as a sign it is upside down - but in space there is no up or down. The body clock might signal that it is tired after a day's work on the International Space Station, but astronauts experience 16 sunrises and sunsets every 24 hours.
Despite all these conflicting signals the brain adapts and within a few days astronauts float through their home in space as if born there. The amazing ability of our brains to adapt to new experiences is what makes us survive and thrive, but brains also seem to benefit from the past. Experienced astronauts need less time to readapt to weightlessness than rookies, even if the missions are years apart.
Before and after their flights, up to 16 astronauts will be put in an advanced MRI scanner. The images show the brain's neural networks and how the connections change after the astronauts' experiences in space.
The research has far to go but it is already revealing some areas of the brain that are involved in adapting to new experiences based on conflicting signals from the body - and pointing to areas of interest for people on Earth.
Research for people closer to Earth
Medical researchers now have a starting point to look for problem areas in the complex brain structure in people who suffer from such disorders.
Principle investigator Professor Floris Wuyts explains: "The research on astronauts is an ethical way to look at people's brains before and after a stressful incident.
"Ideally, we would have brain scans of people when they were healthy and after they started suffering from a disorder, because then we can see where the changes have taken place. But such an ideal situation does not exist, and neither can we give subjects a traumatic experience on purpose, of course."
For the first time a controlled study using advanced MRI methods is showing researchers where to look in the brain's complex neural network to target areas for further study and cures.
Floris concludes: "The scans from the astronauts are like lighthouses, illuminating points where problems can be in patients on Earth."
The Brain-DTI study should finish collecting data in 2018 but the first paper, including also data from recent ESA parabolic flight campaigns, has already been published.
Human Spaceflight at ESA
Space Medicine Technology and Systems
|The content herein, unless otherwise known to be public domain, are Copyright 1995-2016 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.| | <urn:uuid:c261a839-a380-4bd8-91c7-fd07b624b0a2> | {
"date": "2016-05-26T12:36:55",
"dump": "CC-MAIN-2016-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275836.20/warc/CC-MAIN-20160524002115-00196-ip-10-185-217-139.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9413048028945923,
"score": 3.421875,
"token_count": 780,
"url": "http://www.spacedaily.com/reports/Astronaut_brains_as_beacons_for_researchers_999.html"
} |
The Obama administration is planning a decade-long scientific effort to examine the workings of the human brain and build a comprehensive map of its activity, seeking to do for the brain what the Human Genome Project did for genetics.
The project, which the administration has been looking to unveil as early as March, will include federal agencies, private foundations and teams of neuroscientists and nanoscientists in a concerted effort to advance the knowledge of the brain’s billions of neurons and gain greater insights into perception, actions and, ultimately, consciousness.
Scientists with the highest hopes for the project also see it as a way to develop the technology essential to understanding diseases like Alzheimer’s and Parkinson’s, as well as to find new therapies for a variety of mental illnesses.
Moreover, the project holds the potential of paving the way for advances in artificial intelligence.
The project, which could ultimately cost billions of dollars, is expected to be part of the president’s budget proposal next month. And, four scientists and representatives of research institutions said they had participated in planning for what is being called the Brain Activity Map project. | <urn:uuid:1a963e55-8080-4c12-ab8b-f349a9f2b44e> | {
"date": "2014-08-20T12:43:55",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500808153.1/warc/CC-MAIN-20140820021328-00124-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9626531004905701,
"score": 3.078125,
"token_count": 230,
"url": "http://littlegreenfootballs.com/pages/tag/Private+Foundations"
} |
|Photo Credit: Franco Folini|
Sadly, the more I've learned about American poverty and inequality, the more I've learned that, yes, in absolute terms it's not the same as in "developing" countries, but in relative terms, it's an endemic crisis of injustice. One out of three Americans live at 150% of the poverty line or below; ~50 million don't get three square meals a day; we have the highest rate of incarceration in the world (25% of all prisoners in the world are in the US); the average black household has one-tenth the wealth of a white household; and on and on and on.
But what is perhaps most striking is the extent to which financial injustice is at the core of inequality in America, especially as it pertains to the legacies and ongoing realities of racism. In his provocative article in the Atlantic, The Case for Reparations, Ta-Nehisi Coates argues that racism in housing has, since the 1930s, been as much of a scourge in the North as Jim Crow was in the South. He notes that "In 1934, Congress created the Federal Housing Administration [which] insured private mortgages, causing a drop in interest rates and a decline in the size of a down payment required to buy a house...[But] neighborhoods where black people lived...were usually considered ineligible for FHA backing. They were colored in red...Redlining went beyond FHA-backed loans and spread to the entire mortgage industry, which was already rife with racism, excluding black people from the most legitimate means of obtaining a mortgage."
|The September 1966 Cicero protest against housing discrimination (AP)|
Financial Ford Pintos
Mr. Starkman goes on to say that "Rather than consigning African Americans to subprime mortgages, payday loans, and other financial Ford Pintos, the government should instead dramatically increase support for Community Development Financial Institutions..." Well guess what? We are a CDFI! We aim to put those predatory companies out of business. To help the poor and people of color build assets. To give them the tools to take charge of their finances and their health. And to offer them access to affordable loans that unlock their potential, whether it's a loan for a safe apartment, a new car of simply getting caught up on utilities.
This was not the first time Dr. King spoke of financial injustice, of course. Let me conclude with the following passage from his I Have A Dream Speech:
"In a sense we've come to our nation's capital to cash a check. When the architects of our republic wrote the magnificent words of the Constitution and the Declaration of Independence, they were signing a promissory note to which every America was to fall heir...It is obvious today that America has defaulted on this promissory note, insofar as her citizens of color are concerned. Instead of honored this sacred obligation, America has given the Negro people a bad check, a check which has come back marked "insufficient funds."
But we refuse to believe that the bank of justice is bankrupt. We refuse to believe that there are insufficient funds in the great vaults of opportunity of this nation. And so, we've come to cash this check, a check that will give us upon demand the riches of freedom and the security of justice." | <urn:uuid:b7d58084-bc5e-4003-bcac-604fb1cc2c98> | {
"date": "2017-07-27T14:10:30",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549428257.45/warc/CC-MAIN-20170727122407-20170727142407-00576.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9710906744003296,
"score": 2.890625,
"token_count": 678,
"url": "https://cgfund.blogspot.com/2014/07/financial-injustice-and-racism.html"
} |
The Physics of Off-Roading
One of the most important factors for success in off-roading is traction, or the grip your tires have on whatever surface you're driving on. Traction is largely affected by the type of tires you're using, their size, and their air pressure, as well as whether you're using four-wheel drive (4WD). For instance, some tires have bigger treads meant to give you better traction when driving in mud. And using 4WD gives all four of your tires better grip and control on the ground. Lowering the air pressure of your tires also increases traction because it allows more of your tire surface to grab onto whatever you're driving over.
Momentum also factors into off-roading. Momentum -- the mass of your vehicle multiplied by its velocity (speed) -- gets you to the top of a hill. Although the mass of your vehicle is fixed (mostly), you can control your speed. Friction with the ground and the force of gravity acting on your vehicle kill your momentum. And you don't want that to happen, unless you like being stuck on a hill.
Before going off-roading, you'll want to be familiar with three different angles on your car: the approach angle, the departure angle and the break-over angle. Knowing your vehicle's angles will help to keep you from scraping it on rocks and other obstacles or getting stuck.
If you're going off-roading, you first need to understand some basic principles about how your car interacts with the outside world. Traction, momentum and your car's angles each play a part in getting you over, or through, the obstacles in front of you.
Picture yourself driving a car toward a ramp. If the ramp is too steep, your front bumper will hit the ramp, like a wall, before your tires are able to reach it. The maximum angle (from the ground) that a hill or obstacle can have and that the front of your car can still clear is called the approach angle. The same principle applies to the rear bumper and wheels on your car; this is the departure angle.
Likewise, when coming down off, say, a rock, you have to know how much clearance you have in your car's midsection so that it won't scrape the rock. The angle between your tires and the middle of your car's underside is dubbed the break-over angle. If you don't know the break-over angle of your car, you can wind up balancing on a rock like a teeter-totter with all your wheels off the ground.
All of these factors are important to off-roading, but they differ depending on where you're driving. We'll address that next. We'll also find out what kind of off-roading you're into. | <urn:uuid:5a2ccbdd-2ae0-4694-9b4d-ee9be5a2a371> | {
"date": "2019-10-18T09:32:23",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986679439.48/warc/CC-MAIN-20191018081630-20191018105130-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.966465175151825,
"score": 3.109375,
"token_count": 575,
"url": "https://adventure.howstuffworks.com/outdoor-activities/off-roading/off-roading1.htm"
} |
Teach, Review, or Discuss Christ's Temptation by Satan in the Desert.
Ten statements are presented to recall that Jesus was tempted in the desert by Satan based on Mark 1:12-13. Children are to fill-in the appropriate faces to represent agreement or disagreement with the statements presented.
An answer sheet is provided that allows students to check their own work. Incorrect answers can be used as good discussion starters.
You can use this activity as a mini-lesson to be completed as a class, or utilize it as a pre-lesson check or a post lesson review.
This resource is appropriate to use when teaching about temptation, Christ's temptation in the desert, Lent, Satan; it corresponds to the 1st Sunday of Lent in liturgical cycle B.
Theme: Christ's temptation in the desert; Lent
Biblical Reference: Mark 1:12-13 | <urn:uuid:2e1473aa-c80d-4022-95f3-d15838b45824> | {
"date": "2019-06-18T17:44:47",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998808.17/warc/CC-MAIN-20190618163443-20190618185443-00016.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9185055494308472,
"score": 4.4375,
"token_count": 183,
"url": "https://thatresourcesite.com/thatresourcesite/catholic-education/temptation-of-christ-in-the-desert-fill-in-the-faces-worksheet/"
} |
One common point that many people think about when it comes to music and education involves how the instruments they choose are going to work. The need to choose the right instrument for music education purposes is important and it can be influential in terms of figuring out if a person is capable of enjoying it or if that student is going to succeed with it.
There are many points to think about when it comes to choosing an instrument to play. This is especially important for parents who are looking to get their kids to learn how to engage in the world of music.
How Complex Is the Instrument?
There is a need to think about how the instrument is played based on such things as its components, how it generates sounds and how easy it may be for someone to recall how to manage an instrument. For instance, a violin is clearly easier to learn how to play than a guitar because the violin does not have very many pieces that are required to make it work perfectly.
How Strong Is the Person?
The strength of a person is critical with regards to some instruments. Larger instruments, particularly massive string or brass instruments that require some physical support for them to work right, can be a challenge for some people to use because they are far too big. The need to actually be able to handle an instrument in particular is important for all people to explore when finding out what they can do when performing music. This is especially the case for children when some of the heaviest instruments around are considered.
How Does It Sound?
The sounds that come from the instrument are important to pay attention to as well. Anyone who wants to play an instrument should stick with one that sounds great and has a style that will not be too bothersome or hard to bear with. More importantly, the player must have an instrument that has a sound that fits in with the musical ear that the person might have. This is to give the player an easier time with using it and to help with having a little more fun while playing.
Playing It With Care
The last tip is to think about how the instrument is to be cared for. This includes taking a look at how the instrument can be managed with different materials like strings, lubricants and cleaning items. Being able to maintain and take care of an instrument without any problems is just as important as the ability to actually play it as desired.
Choosing the right instrument is important to do when it comes to entering a music education program. If a person plays the right instrument then that student will certainly have more fun and want to keep on learning how to use it. That person just might even excel with that instrument over a period of time. This has to be used well to give off a better sense of excitement in terms of playing any kind of instrument that one wants to get into. | <urn:uuid:d65d5d98-b132-4cd8-bb94-79279b5516de> | {
"date": "2017-04-28T12:08:35",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122955.76/warc/CC-MAIN-20170423031202-00001-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.973681628704071,
"score": 3.265625,
"token_count": 564,
"url": "http://www.mgraymusicacademy.com/choosing-the-right-instrument-for-music-education-isnt-hard-to-do/"
} |
|Part of the American Indian Wars|
An Arikara warrior, by artist Karl Bodmer
|Commanders and leaders|
Chief Grey Eye|
Chief Little Soldier
|Casualties and losses|
|12 members of Ashley's company killed Seven people from the Army drowned in Missouri River.:64||Likely more than 10 warriors and villagers, among them chief Grey Eye.|
The Arikara War was an armed conflict between the United States, their allies from the Sioux (or Dakota) tribe and Arikara Native Americans that took place in the summer of 1823, along the Missouri River in present-day South Dakota. It was the first Indian war west of the Missouri fought by the U.S. Army and its only conflict ever with the Arikara. The war came as a response to an Arikara attack on trappers, called "the worst disaster in the history of the Western fur trade".
When Lewis and Clark reached Arikara settlements in 1804, the inhabitants did not show hostility to the expedition. In 1806, during a trip to the United States capital, an Arikara leader died, and many Arikara believed that Americans were involved in his death. Later, as a result of the growing activity of fur trading companies, contact between Arikara and white merchants became more frequent, and skirmishes eventually followed. In the start of 1823, the Arikara "attacked the Missouri Fur Company's Fort Recovery [a trading post for the Sioux] and killed two traders".
The Sioux, both Yankton and Yanktonai east of the Missouri and Lakota on the west side, had for long been at war with the Arikara, interrupted by short truces on Sioux terms. The Arikaras in question were living in a double village on the west shore of the Missouri, six or seven miles upstream from the mouth of Grand River. A small creek separated the two fortified villages of earth lodges, each with a heavy frame of wood.
The assault and the Arikara war
On 2 June 1823, Arikara warriors assaulted trappers working for General William Henry Ashley's Rocky Mountain Fur Company on the Missouri River, killing about 15 people. The surviving trappers retreated down the river and hid in shelters, where they stayed for more than a month. The United States responded with a combined force of 230 soldiers of the 6th Infantry, 750 Sioux allies, and 50 trappers and other company employees under the command of Lieutenant Colonel Henry Leavenworth, Fort Atkinson, present-day Nebraska. "The forces thus organized, including regular troops, mountaineers, voyageurs and Indians, were styled the Missouri Legion". The 750 warriors were part Yankton and Yanktonai Sioux, part western Sioux from the Brule, the Blackfeet and the Hunkpapa divisions. The Lakotas "... appeared anxious to join us". The Indian force received promises of Arikara horses and spoils, and with the enemy's villages fallen new ranges would open for the Sioux.
Leavenworth arrived at the Arikara villages on 9 August and commenced the attack using his Sioux cavalry, but this was held off by the Arikara. On 10 August Leavenworth ordered an artillery bombardment. This was largely ineffective, the shots falling beyond the villages, at which point Leavenworth ordered an infantry attack. Like the Sioux auxiliaries, the regular infantry also failed to break into the villages. They left the battlefield with some captured horses and laden with corn taken from the farming Indians' fields. On 11 August Leavenworth negotiated a peace treaty. "In making this treaty, I met with every possible difficulty which it was in the power of the Missouri Fur Company to throw in my way." Fearing further attacks, the Arikara left the village that night. Leavenworth set off to return to Fort Atkinson on 15 August. The Arikara village was burned behind him by resentful members of the Missouri Fur Company, much to Leavenworth's anger.
The US Army suffered the first casualties in the West during the Arikara War. Seven people drowned in the Missouri.:64
The causes of the war are not well recorded, but the trading relationship of the Arikara with white traders was certainly a factor. The Arikara lived in permanent settlements for most of the year where they farmed, fished and hunted buffalo on the surrounding plains. However, this was insufficient to sustain them and they relied on being a center of trade with neighboring tribes to survive. Ashley's expedition to directly acquire furs and pelts cut out the Arikara in their role as trading middle-men and was thus a direct threat to their livelihood. There was also the issue of their desire to have a trading post on their territory so that they could have easy access to manufactured goods. They resented the fact that their long-time enemies, the Sioux, had such posts, but they did not. Ashley had been asked to set up a trading post when he was in the area in 1822. Not wishing to limit his operations by having to maintain a permanent base, Ashley instead promised the Arikara that he would have the goods they asked for shipped to them directly from St. Louis. Ashley had not made good this promise at the time of his 1823 expedition, and possibly never intended to. A further source of resentment, although probably not a direct cause of the war, was the death of the Arikara chief Ankedoucharo during a visit to Washington in 1806. Ankedoucharo died of natural causes, but it was widely believed among the Arikara that he was deliberately murdered.
The initial episode at the Arikara villages on 2 June reached international level when some hinted, that the British Hudson's Bay Company was the mastermind behind it all. The plot, so some believed, was to put a wedge between the American fur traders and the Arikaras. The British denied this.
The Arikara refugees returned the following spring, restoring the villages.
The hostility between the United States and the Arikara ended officially on 18 July 1825, when the two opponents signed a peace treaty. The U.S. Army and the Arikara never engaged in battle again.
As for the Sioux, "the result of the [Leavenworth] expedition ruined the reputation of all whites in the eyes of the Indians". The Sioux continued to attack the Arikaras and press them north, from one village to another. In 1851, the western Sioux claimed the 1823 battleground as Lakota territory and later received formal treaty recognition on the former Arikara land.
Although brief, the conflict was noted for two reasons: it was the first military conflict between the United States and Native Americans in the West, setting the tone for future encounters between whites and other Native American groups; and since Leavenworth did not completely defeat the Arikara, his leniency toward them sparked a great debate between white Americans demanding subjugation of the natives and those advocating for peaceful cohabitation.
Archaeological work at the location of the Arikara villages (Leavenworth site (39CO9)) in 1932 gave a clue to the futile shelling of the earth lodges more than 100 years earlier. The upper stratums of earth hid a number of unexploded shells.
In the media
- History.com "Ashley’s fur trappers attacked by Indians"
- Serial 89, 18th Congress, 1st Session, Senate Document No. 1, pp. 94-95.
- Roger L. Nichols, "Backdrop for Disaster: Causes of the Arikara War of 1823", South Dakota History, vol. 14, no. 2, pp. 93–113, Summer 1984, South Dakota State Historical Society.
Reprinted as ch. 9 in, Roger L. Nihols (ed), The American Indian: Past and Present, University of Oklahoma Press, 2014 ISBN 0806186143.
- Ney, Virgil: "Daily Life at Fort Atkinson - On the Missouri, 1820-1827." Military Review. Vol. 57 (1977), pp. 50-66.
- Marley, David (1998). Wars of the Americas: a chronology of armed conflict in the New World, 1492 to the present. ABC-CLIO. pp. 464–465. ISBN 978-0-87436-837-6.
- Meyer, Roy W.: The Village Indians of the Upper Missouri. The Mandans, Hidatsas, and Arikaras. Lincoln and London, 1977, p. 53.
- Viola, Herman J.: Diplomats in Buckskins. A History of Indian Delegations in Washington Ciry. Washington, D.C., 1981, p. 159.
- Jensen, Richard E. & James S. Hutchins: Wheel Boats on the Missouri. The Journals and Documents of the Atkinson-O'Fallon Expedition, 1824-26. Helena and Lincoln, 2001, p. 18.
- Meyer, Roy W.: The Village Indians of the Upper Missouri. The Mandans, Hidatsas, and Arikaras. Lincoln and London, 1977, pp. 39-40.
- Meyer, Roy W.: The Village Indians of the Upper Missouri. The Mandans, Hidatsas, and Arikaras. Lincoln and London, 1977, p. 38.
- Nichols, p. 143
- James A. Crutchfield, Candy Moutlon, Terry Del Bene, The Settlement of America: An Encyclopedia of Westward Expansion from Jamestown to the Closing of the Frontier, p. 62, Routledge, 2015 ISBN 1317454618.
- Robinson, Doane: Official Correspondence Pertaining to the Leavenworth Expedition into South Dakota in 1823 for the Conquest of the Ree Indians. South Dakota Historical Collections, Vol. 1 (1902), pp. 179-256, quote p. 212.
- Robinson, Doane: Official Correspondence Pertaining to the Leavenworth Expedition into South Dakota in 1823 for the Conquest of the Ree Indians. South Dakota Historical Collections, Vol. 1 (1902), pp. 179-256, quote p. 211
- Serial 89, 18th Congress, 1st Session, Senate Document No. 1, p.100.
- Serial 89, 18th Congress, 1st Session, Senate Document No. 1, p. 94 and p. 103.
- Serial 89, 18th Congress, 1st Session, Senate Document No. 1, p. 95
- Jensen, Richard E. & James S. Hutchins: Wheel Boats on the Missouri. The Journals and Documents of the Atkinson-O'Fallon Expedition, 1824-26. Helena and Lincoln, 2001, p. 19.
- Nichols, pp. 149-150
- Nichols, p. 147
- Nasatir, A.P.: The International significance of the Jones and Immell Massacre and the Aricara Outbreak in 1823. Pacific Northwest Quarterly, Vol. 30 (Jan. 1939), pp. 77-108.
- Meyer, Roy W.: The Village Indians of the Upper Missouri. The Mandans, Hidatsas, and Arikaras. Lincoln and London, 1977, p. 276, note 61.
- Kappler, Charles J.: Indian Affairs. Laws and Treaties. Washington, 1904. Vol. 2, pp. 237-239.
- Jensen, Richard E. & James S. Hutchins: Wheel Boats on the Missouri. The Journals and Documents of the Atkinson-O'Fallon Expedition, 1824-26. Helena and Lincoln, 2001, p. 20.
- Kappler, Charles J.: Indian Affairs. Laws and Treaties. Washington, 1904. Vol. 2, p. 594.
- Strong, William Duncan: From History to Prehistory in the Northern Great Plains. Smithsonian Miscellaneous Collections, Vol. 100. Washington, 1940, pp. 353-394, unexploded shells p. 366.
- Roger L. Nichols, The American Indian: Past and Present, University of Oklahoma Press, 2014 ISBN 0806186143.
- Roger L. Nichols. Warrior Nations: The United States and Indian Peoples. Norman, OK: University of Oklahoma Press, 2013.
- Nester, William R. The Arikara War: The first Plains Indian war, 1823. — Mountain Press Publishing Company, 2001. — 257 p. | <urn:uuid:fec87624-1f32-43d3-8ceb-0e904ba41176> | {
"date": "2019-12-10T07:35:19",
"dump": "CC-MAIN-2019-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540527010.70/warc/CC-MAIN-20191210070602-20191210094602-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9046342372894287,
"score": 3.21875,
"token_count": 2596,
"url": "https://thcscience.wiki/colab/legality-of-cannabis-by-u-s-jurisdiction/?rdp_we_resource=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FArikara_War"
} |
Beating the Odds
Follow these steps for a cooler future
by Carrie Madren
It’s a high-stakes game of roulette that determines our world in 50 years. Will polar bears go extinct? Will Bay waters rise over City Dock? Will permafrost lose its permanence up north?
In a game of numbers, percentages and chance, global warming takes its house cut out of our wagers.
There’s now a 50 percent chance that Greenland will melt if we can manage to stabilize our carbon dioxide emissions at 450 parts per million, says Environment Maryland director Brad Heavener. We’re at 380 now. Go higher than 450ppm, and Greenland’s chances go down.
Our only chance to hold back the floodgate on global warming is to start cutting our greenhouse gas emissions. Now.
Crafting a Plan
Staging an action plan to help us get there is Environment Maryland’s Blueprint for Action: Policy Options to Reduce Maryland’s Contribution to Global Warming released this month.
“We will be affected much more drastically than other states around the country,” says Maryland state Sen. Paul Pinksy. “The Eastern Shore is barely above sea level.” Farmers across the Shore would lose land, says Pinsky, as would tourist destinations like Ocean City and urban centers like Baltimore and Annapolis.
That’s soundly based on what we already know: that average global temperatures rose 1.4 degrees in the last century.
The game plan is to curb our release of carbon dioxide, the biggest greenhouse gas that we emit. The biggest carbon polluters in Maryland are electricity generation and transportation, each accounting for 38 percent of our total emissions. The other 24 percent of our carbon comes from residential, industrial and commercial sources.
Maryland has already passed laws that will give us known carbon cuts. The Clean Cars bill will cut our carbon dioxide emissions by 0.1 million metric tons by 2010; 3.5 million metric tons by 2020.
More policies like the nine championed in the new report can save us more. If we follow these nine steps, say Environment Maryland and other supporters, then by 2020, Maryland’s emissions of carbon dioxide would fall 23 percent below 2006 levels.
So the new plan would surpass by three percent our state goal of 20 percent reductions by 2020.
We’re fighting an uphill battle, though. Maryland’s carbon emissions grew 16 percent from 1990 to 2004, as our human numbers continue to grow.
“One of our greatest challenges continues to be growth,” says Secretary of the Environment Shari Wilson. “We want to have growth but in an environmentally responsible way. We’ll have to change the way we do some things.”
Environment Maryland suggests these nine ways to slash our carbon emissions by 23 percent by 2020.
First, we should require that 20 percent of electricity come from renewable sources not just 9.5 percent.
Second, up to 10 percent of our motor fuel should come from sources other than gasoline or diesel.
Third, we need to cut vehicle miles traveled by curbing sprawl and strengthening mass transit.
Fourth, we need to spend at least three percent of electric utility revenues on energy efficiency.
Fifth, commercial buildings should combine heat and power, using the same energy to generate both electricity and heat.
Sixth, Maryland government should increase energy efficiency in buildings and transportation. “We should only be using gas-efficient vehicles in the state fleet,” says Heavener.
Seventh, we need to shorten our commutes. Perhaps, suggests the report, large employers should be required to develop programs to discourage single-passenger commuting.
Eighth, strengthening our building energy codes would reduce both energy use and the amount of pollutants emitted to supply that energy.
Finally, we should be driving on energy-saving replacement tires, which are not always available for consumers now. “It’s pretty ridiculous that we don’t do it now,” says Heavener.
The Blueprint’s role, then, is to let us know that “it’s realistic to say we can follow science,” says Heavener. “So here is one set of options that would get us there.”
Making It Law
This decisive action plan may soon influence, even become, law. Pinsky plans to introduce the Global Warming Solutions Act again in 2008, after it stalled this year. Many of those solutions will parallel points of this blueprint.
“The bill next year will be similar,” Pinsky says, to this year’s. “Over time you reflect on something and improve it.” Exact percentages may not translate into next year’s Global Warming Solutions bill, but the momentum and ideas from the blueprint will. | <urn:uuid:8e1ec794-92d6-4f50-b30b-1e6845f01533> | {
"date": "2016-10-20T19:46:47",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717783.68/warc/CC-MAIN-20161020183837-00056-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9156791567802429,
"score": 2.65625,
"token_count": 1012,
"url": "http://bayweekly.com/old-site/year07/issuexv25/leadxv25_3.html"
} |
St. Mary the Virgin
Cerne Abbas was once one of the most important towns in Dorset. It owes its origins to the presence of the great abbey founded there in 987 by Ethelmar, Earl of Devon and Cornwall, but during the C19 the railways went elsewhere with the inevitable result that it withered commercially.
Nevertheless, the town is a most appealing place set in its own beautiful fold in the chalk hills and blessed with some exquisite half-timbered buildings, which nowadays attract tourists from all over the world. All that remains of the great abbey, which was dissolved in 1539, is a gate house with a most impressive oriel window. Slightly outside the settlement is the famous Cerne Giant cut into the chalk on the side of a hill.
The Trust gratefully acknowledges images and text by Robin Adeney ©
- Next >> | <urn:uuid:cbfd3749-ab13-4371-969e-2b3f27abc8cc> | {
"date": "2018-05-20T23:32:15",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863811.3/warc/CC-MAIN-20180520224904-20180521004904-00576.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9689450860023499,
"score": 2.578125,
"token_count": 178,
"url": "http://dhct.co.uk/index.php/our-churches/27-dorchester-deanery/248-cerne-abbas"
} |
Image credit: https://research.usc.edu/usc-symposium-on-digital-media-research-education-and-innovation/
So how would one define digital leadership? I think it is important to first look at the concept of leadership in general. Wikipedia defines leadership as a process of social influence in which one person can enlist the aid and support of others in the accomplishment of a common task. Kevin Kruse defines it as a process of social influence, which maximizes the efforts of others, towards the achievement of a goal. Both of these definitions highlight the importance of social influence. This leads me to ascertain that social media can be an invaluable tool that educators can harness to move schools, learning, and the profession forward.
Leadership is no different today than it was years ago. The only difference is that style and focus need to change with the times if we are to accomplish the lofty task of preparing students for a dynamic world that is more social and connected as a result of technology. Leading in a way that supports the status quo, standardization, outdated practices, and misconceptions related to technology, not only does a disservice to our students, but also renders our schools and profession as irrelevant.
Digital leadership takes into account recent changes such as ubiquitous connectivity, open-source technology, mobile devices, and personalization. It represents a dramatic shift from how schools have been run and structured for over a century, as what started out as a personal use of technology has become systemic to every facet of leadership. Digital leadership can thus be defined as establishing direction, influencing others, and initiating sustainable change through the access to information, and establishing relationships in order to anticipate changes pivotal to school success in the future. It requires a dynamic combination of mindset, behaviors, and skills that are employed to change and/or enhance school culture through the assistance of technology.
The basic tenets of leadership are still valuable and needed for our schools to succeed. However, the changing times as well as society’s reliance on technology demand an evolution of leadership practices to create schools that our learners deserve, and need, to succeed in today's world. It all begins with trust. Digital leaders must give up control and trust students and teachers to use real-world tools to unleash creativity and a passion for learning. The time is now, whether you are a building level or teacher leader, to boldly move schools forward in the digital age. What have you done and/or changed to become a digital leader? Where did you begin? How have things changed since this shift?
For those looking to begin this journey or take your work to the next level please check out my book that will be out this January. You can pre-order now and it will be available for Kindle about a week after it has been published. The forward was written by Yong Zhao and the book itself has been endorsed by some of today's most prominent thought-leaders. | <urn:uuid:8e446712-8603-459e-8af6-a6516b74363b> | {
"date": "2017-06-26T08:54:08",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00057.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.96339350938797,
"score": 3.125,
"token_count": 592,
"url": "http://esheninger.blogspot.com/2013/11/leading-in-digital-age.html"
} |
Last week, the U.S. power sector marked a sober milestone: an anonymous Western utility became the first to report a malicious "cyber event" that disrupted grid operations.
The hack itself occurred two months ago, on March 5, when a "denial-of-service" attack disabled Cisco Adaptive Security Appliance devices ringing power grid control systems in Utah, Wyoming and California, according to multiple sources and a vague summary of a Department of Energy filing.
There were no blackouts, no harm to power generation and evidently very little effect on the Western transmission grid, according to multiple sources and officials. The most direct impact was likely a temporary loss of visibility to certain parts of the utility's supervisory control and data acquisition (SCADA) system, though all major transmission operators in the regions affected denied having been hit by the denial-of-service attack.
The "cyber event that causes interruptions of electrical system operations," as the attack was categorized in the jargon of DOE electric disturbance forms, made waves in critical infrastructure security circles as a first-of-its-kind case study.
No U.S. electrical utility is known to have experienced any disruptive cyberattack in the past, a surprising fact given that utilities routinely find themselves in the crosshairs of the world's most sophisticated hackers and can face millions of more run-of-the-mill hacking attempts every day (Energywire, July 20, 2018).
Fears that a bona fide cyberattack would be blown out of proportion among the general public have fueled a culture of secrecy around anything filed under "cyber" in the electricity sector.
At the most recent GridEx security exercise in 2017, utilities practiced how word would get out about a blitz of simulated cyber and physical attacks. The exercise modeled how misinformation about the incident could spread quickly over social media.
"The grid runs everything. Forget how robust it is. How many other critical infrastructure sectors rely on electricity?" said John Hultquist, director of intelligence analysis at cybersecurity firm FireEye Inc.
"It's the best way to cause cascading effects across society — the public knows that. They don't know anything about how hard that would be."
Utility executives have pointed to the bulk power grid's complexity — the United States really has three separate "interconnections" linked up to thousands of utilities — as contributing to its defense against new hacking threats. Large power companies practice what it would take to run the grid in "manual mode" if hackers succeeded in blinding operations centers or hijacking digitized equipment, according to Scott Aaronson, vice president of security and preparedness at the Edison Electric Institute, in congressional testimony this February.
"Our companies take a 'defense-in-depth' approach with several layers of security strategies, which are designed to eliminate single points of failure," he said, less than one week before the anonymous Western grid operator was hit by the denial of service.
U.S. grid operators picked up on the importance of manual backstops in the wake of a December 2015 cyberattack on Ukraine's power grid. In that event, hackers briefly knocked out power to customers of three distribution utilities in western Ukraine for several hours — the first time a cyberattack is known to have caused a blackout anywhere in the world.
The three utilities targeted by the attack — Prykarpattyaoblenergo, Kyivoblenergo and Chernivtsioblenergo — were able to bring the lights back on quickly by sending workers to flip high-voltage circuit breakers by hand.
In the Ukraine hack, the utilities not only lost their visibility but also ceded control of their networks to remote attackers later linked to Russia. The hackers knew whom they were hitting and paired their grid hijacking with a flood of telephone calls to overwhelm the utilities' phone networks and hamper restoration.
The more recent "denial of service" on U.S. Cisco equipment isn't known to have involved any hostile takeover of operational networks. It's possible the hacker or hackers in that case didn't even realize they were interfering with power grid equipment, sources said, perhaps having found the Cisco firewalls exposed online via specialized internet search tools.
While the incident marked a first in the annals of DOE grid cyber events, loss of view into utilities' control systems is a frequent hazard, whether from power outages or communications glitches.
The danger "depends on how much SCADA visibility is lost," noted Patrick Miller, managing partner at Archer Energy Solutions. "The system is more like an ecosystem where you can infer what is happening in one area by the way another reacts."
DOE electric disturbance reports are littered with reports of "complete loss of monitoring or control capability" at utility control centers, the vast majority of which never led to any power outages.
It's not even clear the March 5 event led to a complete loss of visibility during its 9 a.m. to 7 p.m. duration. As Miller pointed out, many utilities maintain alternative means of control system communications in case of emergency.
The Department of Energy and the Federal Energy Regulatory Commission are both restructuring rules for utilities to report grid cyberattacks to regulators. FERC commissioners, frustrated by years of radio silence from utilities despite a stream of warnings about growing cyberthreats, moved last year to broaden the definition of what constitutes a reportable incident.
The March 5 event is listed publicly because it cleared a certain bar of severity, said Sam Feinburg, executive director of Helena, which is working on a "Shield Project" to boost U.S. grid defenses. "There are undoubtedly many more such events that don't breach that bar and therefore don't become public knowledge."
Feinburg said such events, even when carried out by unsophisticated hackers, don't get enough attention.
"[Grid] infrastructure is getting more complicated, and because of that, it's getting harder and harder to defend each part of it," he said. "The ability to conduct these attacks is only being distributed across a wider and wider set of folks."
"It does not take a sophisticated attacker to deal damage to critical electrical infrastructure, and that's scary," Feinburg said.
Want insightful, digestible cybersecurity coverage from a trusted source? Sign up for the free weekly cyber news brief from the E&E News reporting team of Blake Sobczak and Peter Behr.
Like what you see?
We thought you might.
Start a free trial now. | <urn:uuid:152863dd-76fd-4c9f-b1be-a9787894a539> | {
"date": "2020-01-23T14:35:37",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250610919.33/warc/CC-MAIN-20200123131001-20200123160001-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9596085548400879,
"score": 2.5625,
"token_count": 1329,
"url": "https://www.eenews.net/stories/1060281821/"
} |
The Brief New Century, Fourth Edition, meets students where they are--as writers and researchers in an electronic age. While providing clear, comprehensive coverage of handbook basics--writing, grammar and usage, research, and documentation--this handbook also shows students how to use new technologies to make appropriate rhetorical choices and to become more successful college writers in all of their courses. THIS TITLE INCLUDES THE 2009 MLA UPDATED DOCUMENTATION AND STYLE GUIDELINES. Authors Christine Hult and Tom Huckin bring their expertise in research, computers and writing, grammar, and linguistics and their extensive experience in teaching first-year composition to this remarkable handbook--a handbook that is accessible, flexible, comprehensive, and current, and that speaks to students in today's language. More than any other handbook, The Brief New Century addresses the primary concerns of composition students: how to understand and avoid plagiarism, how to write for courses beyond English, how to make correct grammatical and stylistic choices, and how to use technology to help them become better writers. | <urn:uuid:21b1c932-3391-495e-b213-a23209b35c34> | {
"date": "2014-09-16T11:25:34",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657114926.36/warc/CC-MAIN-20140914011154-00232-ip-10-196-40-205.us-west-1.compute.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9129289984703064,
"score": 2.515625,
"token_count": 219,
"url": "http://www.paperplus.co.nz/book/Brief-New-Century-Handbook?i=9780205744046"
} |
This camp, constructed to house three thousand men, received the first German prisoners of war in June, 1943. Most of the soldiers were members of the Afrika Korps. The prisoners were allowed to work on farms and ranches in the area and received a wage guaranteed by the Geneva Convention. Their labor was boon to Nebraska's war-depleted agricultural work force. This camp closed in September 1945, but some former prisoners found sponsors among their captors and returned to become U.S. citizens.
Nebraska State Historical Society
Ft. Robinson State Park,
3 miles west of Crawford
More about Fort Robinson Museum | <urn:uuid:7e90df55-97b5-47bf-9dbc-089bdcbd48e2> | {
"date": "2016-02-09T11:47:07",
"dump": "CC-MAIN-2016-07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701157075.54/warc/CC-MAIN-20160205193917-00143-ip-10-236-182-209.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9830741882324219,
"score": 3.25,
"token_count": 127,
"url": "http://www.nebraskahistory.org/sites/fortrob/pwtext.htm"
} |
Learn something new every day More Info... by email
The main difference between an aneurysm and stroke has to do with how the two conditions affect blood vessels. An aneurysm is a bulging of a blood vessel that may rupture. Conversely, a stroke is caused when oxygen and nutrients cannot get to parts of the brain because a vessel breaks or because of a blockage in the vessel. Despite the differences, an aneurysm and stroke have several characteristics in common. Both an aneurysm and stroke have to do with blood vessels and blood flow, and both can be fatal.
Both aneurysms and strokes have to do with blood vessels and how they carry blood. An aneurysm can occur with many arteries but most commonly is associated with the aorta, the primary artery that transports blood from the heart into the rest of the body. An aneurysm occurs when a part of the artery becomes weak and bulges. Over time, blood pressure and other factors can cause the bulge to become bigger and weaker. Should it rupture, an aneurysm can cause internal bleeding and death.
A stroke, on the other hand, can occur when a blood vessel bursts or when a vessel becomes clogged. An aneurysm can lead to a stroke if the bulge is in one of the brain’s arteries and it ruptures. A blood vessel can also break and cause a stroke without an aneurysm present. In addition, a stroke can result if a blood clot forms in a brain vessel and obstructs blood flow. Another type of stroke can be caused if a piece of a blood clot forms in another location, breaks off, and travels to the brain where it gets stuck in one of the brain’s vessels.
The area in which the two conditions can cause damage is another difference between an aneurysm and stroke. An aneurysm can occur in any artery, but usually occurs in the aorta. Many times, the aorta can rupture in the chest or in the abdomen. A stroke, however, usually occurs in the brain. Both aneurysms and strokes can result in internal bleeding and death.
Symptoms of aneurysm and stroke also present another difference. A stroke usually occurs with symptoms such as numbness of the face, confusion, and trouble seeing. An aneurysm that hasn’t burst usually does not show any symptoms. If the bulge is big enough, however, it may press on a nerve and cause headache, swelling, pain, or difficulty seeing, depending on where the aneurysm is located. Symptoms of an aneurysm that has burst in the brain can include nausea, difficulty seeing, stiff neck, and numbness.
One of our editors will review your suggestion and make changes if warranted. Note that depending on the number of suggestions we receive, this can take anywhere from a few hours to a few days. Thank you for helping to improve wiseGEEK! | <urn:uuid:aa14e913-44f3-44f2-9d87-dc745b00d26a> | {
"date": "2014-09-22T06:26:09",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657136896.39/warc/CC-MAIN-20140914011216-00143-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9482907056808472,
"score": 3.890625,
"token_count": 621,
"url": "http://www.wisegeekhealth.com/what-is-the-difference-between-an-aneurysm-and-stroke.htm"
} |
Saturday, April 9, 2011
Pecan trees breaking bud
As sunlight hits the silvery bud and it continues to expand in length, the bud will begin to green up (right hand twig in photo at left). On mature trees, you will note that the inner bud is actually made up of three buds--the two smaller buds surrounding a larger central bud. The buds on the outside will develop into catkins while the central bud will become a new shoot that will eventually terminate in a pistillate flower cluster.
Vegetative shoots on young trees produce buds that contain only a single vegetative inner bud.
The next stage in bud development is called inner scale split (photo at right). As green buds continues to enlarge, the inner scale splits open to reveal either catkins or a new shoot. At this point, the emerging plant structures are still compressed but you can easily recognize what they will become.
As pecan buds continue to grow you be able to distinguish between protandrous and protogynous cultivars. Protandrous cultivars release pollen early in the pollination season and before their pistillate flowers become receptive. Protogynous cultivars shed their pollen late in the pollination season while producing receptive female flowers early, before they shed their pollen.
In the photo below, the twig on the left has well defined catkins emerging while the vegetative buds have just begun leaf burst. This twig was cut from a Pawnee tree, a protandrous cultivar. The twig below and to the right was cut from the protogynous cultivar, Kanza. Notice that the two buds on either side of the enlarged, central vegetative bud are still relatively small. Kanza catkins will develop later, well after new leaves start emerging. Look closely at the Kanza vegetative bud (large bud at the top) and you will see that the inner scale has split. | <urn:uuid:89e8dcac-e5fa-420f-8d23-1b070d729505> | {
"date": "2014-10-31T21:58:02",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637900397.29/warc/CC-MAIN-20141030025820-00019-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9394797682762146,
"score": 3.53125,
"token_count": 392,
"url": "http://northernpecans.blogspot.com/2011/04/pecan-trees-breaking-bud.html"
} |
Topped by a 37-foot bronze statue of William Penn, City Hall was Philadelphia's tallest building until 1987; you can study the trappings of government and also get a panoramic view of the city here. With 642 rooms, it's the largest city hall in the country and the tallest masonry-bearing building in the world: no steel structure supports it. Designed by architect John McArthur Jr., the building took 30 years to build (1871–1901) and cost taxpayers more than $23 million. The result has been called a "Victorian wedding cake of Renaissance styles." Placed about the facade are hundreds of statues by Alexander Milne Calder, who also designed the statue of William Penn at the top. Calder's 27-ton cast-iron statue of Penn is the largest single piece of sculpture on any building in the world.
Not only the geographic center of Penn's original city plan, City Hall is also the center of municipal and state government. Many of the magnificent interiors—splendidly decorated with mahogany
paneling, gold-leaf ceilings, and marble pillars—are patterned after the Second Empire salons of part of the Louvre in Paris. On a tour each weekday at 12:30 you can see the Conversation Hall, the Supreme Court of Pennsylvania, the City Council chambers, and the mayor's reception room. You can attend the frequently heated City Council meetings, held each Thursday morning at 10.
To top off your visit, take the elevator from the seventh floor up the tower to the observation deck at the foot of William Penn's statue for a 30-mile view of the city and surroundings. The elevator holds only six people per trip and runs every 15 minutes; the least crowded time is early morning. The 90-minute building tour, including a trip up the tower, steps off weekdays at 12:30. The tour office is in Room 121. | <urn:uuid:61767266-854e-4dd6-ac7a-6d1ff974ec61> | {
"date": "2017-03-23T17:40:35",
"dump": "CC-MAIN-2017-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187144.60/warc/CC-MAIN-20170322212947-00071-ip-10-233-31-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9502182006835938,
"score": 2.546875,
"token_count": 391,
"url": "http://www.fodors.com/world/north-america/usa/pennsylvania/philadelphia/things-to-do/sights/reviews/city-hall-106678"
} |
“HIGH RATE AND HIGH EFFICIENCY HYDROGEN GENERATION VIA WATER ELECTROLYSIS CATALYZED BY NANO POWDERS.”©
Over 90% of all hydrogen used today is made from steam-reformed petroleum. This process produces greater than 5 kg of carbon dioxide for each kg of hydrogen if using methane and even more if using natural gas. Hydrogen made from this process is about 70% energy efficient and costs about $4.50 per kg of hydrogen . Hydrogen from electrolyzed water dates to 1800; however, the process has been very energy inefficient and expensive. This Whitepaper discusses a three-dimensional electrode used for water electrolysis. The surface of the metallic reticulate electrode is coated on all surfaces with a plurality of nano catalysts adhered by a unique electrochemical process that produces excellent electrical contact with the powders while allowing them to interact with the electrochemical boundary layer. The result is a very high rate, solid-state, three-dimensional (3D) electrode. Data shared here is first in the half-cell, then in the full cell and shows consistently high rates and high energy efficiencies.
Keywords: water electrolysis, hydrogen, energy, high efficiency, HHO, browns gas, electrolyzer, high efficiency, hydrogen from water, nano catalyst, kWh/kg, gge | <urn:uuid:30de2cc5-8d70-4ab5-b5a4-a5555bca4688> | {
"date": "2015-05-27T17:41:01",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929023.5/warc/CC-MAIN-20150521113209-00009-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8929665684700012,
"score": 3.171875,
"token_count": 289,
"url": "http://www.grid-shift.com/white_papers/docs/3D_Water_Electrolysis_Abstract%202.htm"
} |
Ardross (Scottish Gaelic: Àird Rois, high-point of [Easter] Ross) is a rural area in the Highland region of Scotland, 30 miles (48 km) north of the nearest city, Inverness. Ardross lies near the B9176, 10 miles (16 km) inland from the east-coast town of Alness and progressively becomes more mountainous to the west and north.
The area is populated by a small rural community mainly confined to the more fertile lower slopes to the east and the glacial glens of Strathrusdale and Strathy (Ardross). The total area comprises about 30 square miles (78 km2), most of which is lower slope farming, commercial pine forest on foothills and open mountain to the north and west. The largest concentration of dwellings are in the village of Dublin comprising about 30 houses and a church, so named as it was founded by Irish immigrant workers who built Ardross Castle.
The earliest inhabitants of Ardross were the Picts (6-10th century), and there are still recognisable remains of Pictish roundhouses at various locations in the area. The most notable surviving artefacts of their time in Ardross are two carved stone slabs depicting a wolf and a deer, some of the finest surviving Pictish animal symbols ever discovered, which are now displayed at Inverness Museum. The carvings were recovered from a drystone wall in Stittenham, Ardross in 1891. After the 10th century, habitation of the area became progressively more influenced by the Norse.
Matheson improved the estate and placed it under the supervision of factor William MacKenzie, an engineer by profession. By 1875 the number of agricultural tenants had increased fivefold to over 500, with around 1,200 acres (4.9 km2) of arable land being improved. The architect Alexander Ross was commissioned to re-design Ardross Castle in the Scots Baronial style and following Sir Alexander's death, his son, Sir Kenneth Matheson, sold the estate in 1898 to Charles William Dyson Perrins, a Captain in the Highland Light Infantry, with interests in the Worcester Royal Porcelain Company and Lea & Perrins (Worcester) sauce. The estate was broken up and sold in 1937. Mr and Mrs Austin Mardon purchased Ardross Castle and 80 acres (320,000 m2) of associated land and lived there until 1983, when the castle and grounds were sold to the McTaggart family, who began a program of restoration work.
Famous people from Ardross include Sir John McKenzie, who emigrated to New Zealand and became a prominent politician. He is remembered in New Zealand as the Minister of Lands and Agriculture who developed a policy which disfavored large landowners. This stemmed from his experience in Ardross where he was deeply moved by the misery he witnessed among tenants on Ardross Estate. Some of his near relatives suffered in this way and were forced to emigrate to Canada and the United States. Many years later McKenzie related how, when once walking home with his father, he came upon a number of dispossessed tenant farmers who had been forced to camp in the local cemetery at Ardross Church as there was nowhere else to go. Many years earlier, in 1792 tenants at Strathrusdale, which forms the western area of Ardross, led a famous revolt against landowner's such as the Duke of Sutherland who were pursuing a policy of clearing land.
The community has its own primary school with a roll of about 35 pupils and a recently built well-founded village hall for hosting local community activities and social events. Other local services can be found in the nearby town of Alness. Most inhabitants of the area today are employed in the North Sea oil industry, agriculture or the provision of local services.
- Place Names of Ross & Cromarty, R J Watson (1904)
- Historic Environment Scotland. "ARDROSS CASTLE (GDL00023)". Retrieved 28 February 2019.
- 'KENZIE, Sir John, K.C.M.G.', An Encyclopaedia of New Zealand
|Wikimedia Commons has media related to Ardross, Highland.| | <urn:uuid:7892e162-9238-4cd2-897e-2919f87a63a5> | {
"date": "2020-01-29T00:16:13",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783342.96/warc/CC-MAIN-20200128215526-20200129005526-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9736924171447754,
"score": 2.875,
"token_count": 872,
"url": "https://en.wikipedia.org/wiki/Ardross,_Highland"
} |
This book provides parents with a comprehensive, scientifically based guide to the facts, myths, problems and solutions associated with raising a vaccine free child. It helps parents protect their children both from the wiles of the vaccine industry and from harmful germs. There are no trendy anti-vaccination myths in this book. The information is fully referenced and factually based. Readers will learn that immunization is not the reason for the absence of some infectious diseases, that insidious, long-term side effects of vaccination are very common, and that there is a media blackout on the topics of vaccine damage and vaccine failures.
Understanding the difference between childhood diseases and the other infectious diseases is the key to understanding immunisation. Modern medicine fails to recognise that childhood illnesses are self-resolving, and prescribes interventions that increase the risk of complications. Raising a Vaccine Free Child explains why the self-resolving diseases, like measles, mumps, chickenpox and rubella, do not need intervention, but do need proper care to prevent complications from developing. It also advises parents on how to bring children safely through childhood diseases, and discusses the prevention and treatment of the malevolent infectious diseases that are not self-resolving, such as polio and tetanus.
Raising a Vaccine Free Child helps parents of vaccine free children cope with aggression from individuals and with intimidation from the medical authorities, and by revealing how the myth of herd immunity was concocted, it empowers parents to withstand the accusation that they are spoiling herd immunity. The book demonstrates that the long-term side effects of vaccination have not been assessed at any time in any country. A look at the history of vaccination reveals that it is an unscientific procedure that is based on falsehood, cruelty and supposition. | <urn:uuid:bd214b6f-b14e-4e2b-9e82-4fecf8b3dd5f> | {
"date": "2016-05-31T03:54:08",
"dump": "CC-MAIN-2016-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051165777.94/warc/CC-MAIN-20160524005245-00231-ip-10-185-217-139.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.954361617565155,
"score": 3.34375,
"token_count": 357,
"url": "http://www.vaccinefreechild.com/"
} |
What Does it Mean to use Family Centered Practice?
Utilizing family centered practice means utilizing services and programs that focus on the family as whole and support its culture, networks and community. As such, PSF partners with families to help define problems and identify solutions customized to the family. We work to ensure that investigators, case managers and other service providers interact with families in a way that evokes trust, respect and empathy and treats families as partners in the assessment, planning and decision-making processes.
The cornerstone of a Family Centered Practice is family inclusion, accommodation and participation.
How is the Family Included in the Process?
With family centered practice, we engage families in every aspect of care, problem-solving and guided support, treating the family and its support system as a unified team instead of separating the interests of adults, children and service providers. Recognizing that each person is aiming for the same goal enables us to employ proven-effective methods to help establish a safe, supportive and permanent home for children.
What Are the Roles of Members of a Family Centered Practice Model?
Child welfare experts have identified key approaches, activities and services that must be employed both within and outside a family to establish a strong partnership. A short list includes:
- Families & Caregivers should help decide the placement of a child when removal is necessary and work to reunite the family when possible, arrange for removed children to have placement in close proximity to parents/family, decide who should attend family team conferences, encourage a positive relationship between biological parent(s) and caregiver(s), and involve friends/family in overall assistance.
- Investigators should engage the family as early as possible, commit sufficient time to interact with all members, establish clear expectations with the family and perform frequent follow-up and joint visits.
- Case Managers should trust and believe in the family, maintain value neutrality, encourage families to be part of the decision-making, provide comprehensive methods to address issues, encourage partner family and biological parent interaction and discuss issues with court liaisons and FTC Facilitators.
- CPI/CM Supervisors should seek to identify underlying causes of problems, provide coordination with court actions, create a comprehensive assessment of all family members and work with the FCC as soon as possible and as often as needed.
- Service Providers include resources such as participating community members, the FCP, Medicaid, funding and training programs and other elements that assist families in developing skills, solving problems and creating a safe environment for all. | <urn:uuid:71ebd843-9e70-455e-b211-2efa9b77a5ab> | {
"date": "2017-11-19T06:57:06",
"dump": "CC-MAIN-2017-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805417.47/warc/CC-MAIN-20171119061756-20171119081756-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9504427909851074,
"score": 2.515625,
"token_count": 514,
"url": "http://www.pfsf.org/innovative-practice/initiatives/family-centered-practice/"
} |
Significance of Succot Sacrifices
From: Sam in LA
What is the significance of the different sacrificial offerings that were offered during Succot? Why are they different each day, and does the fact that there were seventy mean anything? Thanks.
The Torah prescribes special sacrifices for each of the days of Succot. On the first day, 13 oxen were offered. The number was reduced by one each day of the festival such that on the seventh day, 7 oxen were offered. The total number of these sacrifices was thus 70 (13+12+11+10+9+8+7=70).
These seventy oxen correspond to the original seventy nations of the world enumerated in the Torah who descended from the sons of Noah, and are the ancestors of all of the nations till this day. Israel brought these sacrifices as atonement for the nations of the world, and in prayer for their well-being; as well as for universal peace and harmony between them.
Thus our Sages taught, "You find that during the Festival [Succot], Israel offers seventy oxen for the seventy nations. Israel says: Master of the Universe, behold we offer You seventy oxen in their behalf, and they should have loved us. Instead, in the place of my love, they hate me (Psalms 109)." Further, they remarked: "If the nations of the world would have known the value of the Temple for them, they would have surrounded it with a fortress in order to protect it. For it was of greater value to them than for Israel [instead, they destroyed it]" (Bamidbar Rabba 1).
The power that was given to Noahs sons to become the founders of the seventy original nations was later vested in the descendants of Abraham, of whom it is written, "For I have made you the father of a multitude of nations." From then on, all the seventy nations were to draw their sustenance through Abrahams descendents. First, Ishmael was made head of the seventy nations, but after the birth of Esau to Isaac, the flow of Divine sustenance for the nations was divided between Ishmael and Esau. Each of whom became the head of thirty-five of the nations.
G-d appointed Israel a kingdom of priests to atone for all these nations, and appointed Jerusalem a house of prayer for all the peoples. Therefore, when Israel came to sacrifice seventy oxen during the seven days of Succot as an atonement for the seventy nations of the world, they sacrificed thirty-five oxen in behalf of the nations under Ishmaels dominion, and thirty-five in behalf of those under Esaus dominion.
The Vilna Gaon discovered this secret hidden in the Torah itself. In the verses describing the number of oxen each day, he noticed that the accompanying sin offering is sometimes referred to as a kid of goats and sometimes as just a kid. Based on the tradition that kid of goats refers to Ishmael, he determined that some of the oxen and their respective sin offering correspond to Ishmael, and the others correspond to Esau. Amazingly, the oxen offered on the days whose sin offering is slated as kid of goats [days 1,2,4] equals 35 [13+12+10]. Similarly, those offered on the days noted only by kid [days 3,5,6,7] also equal 35 [11+9+8+7].
We pray for the day when Israel will be fully restored to its land, rebuild the Holy Temple in Jerusalem, and bring peace between G-d and man, and between all peoples. Amen.
Shana Tova, Chatima Tova and Chag Sameach to all! | <urn:uuid:6b50c92e-2e14-4ffe-a987-1e59b4af0c2d> | {
"date": "2019-04-19T21:18:16",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528058.3/warc/CC-MAIN-20190419201105-20190419223105-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9671288728713989,
"score": 2.796875,
"token_count": 778,
"url": "https://ohr.edu/holidays/succos/laws_and_rituals/2349"
} |
Earth System Analysis - Research Domain 1
Our goal is to study the coupled dynamics of the geosphere, biosphere and anthroposphere under natural and human forcing. Results should shed light on the implications of future human perturbations to the Earth system.
Earth as a planet is currently in an unusually long and stable interglacial period. The dominant force for change in the present anthropocene is human activity, which is altering the atmosphere, oceans and land surfaces. This activity consists not only of the emission of greenhouse gases but also of direct large-scale impacts on the land and marine biosphere.
The analysis of Earth system dynamics focusses on four lines of research:
- Analysis of past climate change in order to understand the processes that amplify or dampen driving factors, leading to gradual or rapid change in system components.
- Analysis of data and scenarios of current and future climate change and its system-wide consequences.
- Analysis of the impacts of anthropogenic actions on the environment, most notably on climate, oceans, ecosystems and the spatial structure of the land surface.
- Analysis of the role of human activities as major drivers of global climate and environmental change. | <urn:uuid:ac397e64-871e-436c-b083-7a45ec60ad82> | {
"date": "2014-04-24T13:16:39",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206120.9/warc/CC-MAIN-20140423032006-00507-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9060257077217102,
"score": 2.734375,
"token_count": 237,
"url": "https://www.pik-potsdam.de/research/earth-system-analysis"
} |
The 4th and Fireworks
By Health Day
Just one week until the 4th of July so it's the perfect time to talk about ways to play it safe this red, white and blue holiday.
The American College of Emergency Physicians strongly recommends you let the PROs take care of the pyrotechnics
But If fireworks are legal where you live, and you're planning to use some at home, start by buying from a reputable dealer.
Make sure an experienced adult handles things on the big day and that all warning labels and instructions are read and followed.
Young children should not be given anything to hold...including sparklers, which can burn as hot as a blow torch. Older children should be supervised by a responsible adult.
When setting off the fireworks, make sure you light the fuse...and immediately back up. Never try to re-light or pick up fireworks that have not ignited fully.
Keep a bucket of water or fire extinguisher on hand in case of emergency and to cool off any hot spots.
Almost half of fireworks injuries are to a person's hands or fingers while, a-third impact the eyes, head, face and ears.
The best way to make sure you don't add to these
statistics celebrate this Independence Day by watching a professional fireworks display put on by experts.
I'm Dr. Cindy Haines of HealthDay TV with the news doctors are reading health news that matters to you. | <urn:uuid:86470d9e-99a3-4390-bd38-4eb6e951a5f5> | {
"date": "2014-10-20T21:12:42",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507443438.42/warc/CC-MAIN-20141017005723-00361-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9508767127990723,
"score": 2.515625,
"token_count": 296,
"url": "http://www.wncftv.com/health/earnosethroat/?feed=bim&id=213414931"
} |
Several scientific studies show that respiratory problems of urban citizens have a high correlation with the presence or absence of certain species of lichens in the cities. The last Global Burden of Desease (GDB) shows that at least 15,000 deaths a year are attributable to air pollution.
During the workshop we will:
- Show how to identify the most common lichen species in the city of Barcelona.
- Explain the relationship between the presence of each species and the air pollution level.
- Show how to use a citizen science platform to monitor the presence and abundance of lichen species in your city.
- Conduct a field trip to practice with the platform Natusfera before planning your future activities with students.
The event takes place at Centre Cultural Casa Orlandai, Barcelona.
Natusfera is a citizen science platform created to record, organise and share naturalistic observations. Natusfera want to foster participation of nature enthusiasts, knowledge of the natural world and its exploration.
The workshop is organised and facilitated by CREAF (Ecological and Forestry Application Research Centre), an ECSA member based in Barcelona (Spain).
"Training the trainers" workshops aim to build capacity in biodiversity monitoring to facilitate youth participation in citizen science activities. | <urn:uuid:a69e3a7a-d96f-4b57-a179-a0ce5a6779f6> | {
"date": "2018-11-14T21:40:01",
"dump": "CC-MAIN-2018-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742316.5/warc/CC-MAIN-20181114211915-20181114233915-00296.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8888626098632812,
"score": 3.828125,
"token_count": 257,
"url": "http://togetherscience.eu/events/teacher-training-workshop-phase-2_lxwms"
} |
LA: Know and apply grade-level phonics and word analysis skills in decoding words.
LA: Read with sufficient accuracy and fluency to support comprehension.
LA: Ask and answer such questions as who, what, where, when, why, and how to demonstrate understanding of key details in a text.
LA: Write informative/explanatory texts in which they introduce a topic, use facts and definitions to develop points, and provide a concluding statement or section.
LA: Participate in collaborative conversations with diverse partners about grade level topics and texts with peers and adults in small and larger groups.
LA: Recount or describe key ideas or details from a text read aloud or information presented orally or through other media.
SS: Describe ways in which language, stories, folktales, music, and artistic creations serve as expressions of culture and influence behavior of people living in a particular culture.
SS: Describe the unique features of one's nuclear and extended families.
SS: Analyze a particular event to identify reasons individuals might respond to it in different ways.
VA: Use different media, techniques, and processes to communicate ideas, experiences, and stories.
VA: Use visual structures of art to communicate ideas.
VA: Identify specific works of art as belonging to particular cultures, times, and places. | <urn:uuid:8d2c5ab0-1509-49a8-870d-fc088ecad872> | {
"date": "2018-06-23T14:16:20",
"dump": "CC-MAIN-2018-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865081.23/warc/CC-MAIN-20180623132619-20180623152619-00616.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8979465961456299,
"score": 4.09375,
"token_count": 273,
"url": "https://www.crayola.com/lesson-plans/christmas-treat-bag-lesson-plan/"
} |
Dress Of Women - Hair Dressing: Caps And Hats
( Originally Published 1902 )
THROUGHOUT the Eighteenth Century, the arrangement of the hair was eccentric. In 1711, Addison de-voted an essay to the subject of the head-dress, declaring that " there is not so variable a thing in nature," and asserting that "within my own memory I have known it rise and fall above thirty degrees. About ten years ago it shot up to a very great height, in so much that the female part of our species were much taller than the men." The witty satirist is, of course, referring to the commode, or fontange, that originated with Mademoiselle Fontange at the court of Louis XI V. in 1680. This head-dress, which was sometimes also called a "tower," was composed of two or three tiers of lace arranged very stiffly above the forehead and kept in place by a knot of ribbon behind. It was popular in England during the reigns of Mary and Anne. The hair itself was simply arranged, often in curls.
In 1729, "gauze heads" were very fashionable and, after a short period when a low coiffure was worn, the arrangement of the hair became more and more elaborate until George III.'s reign, when it developed into the complicated structure which remained in vogue until 1780, ever increasing in height and eccentricity. From 1749 to 1776, there were no fewer than forty-one wig-makers and hair-dressers registered among the freemen of New York. The advertisements of several of these are given in the chapter on the costume of men. Not a few of them made a business of dressing the hair of the ladies and furnishing them with fashionable towers, tetes or heads, perrukes, etc. There was evidently much competition among these barbers for the patronage of the fair sex.
"Simon Franks from London makes and sells all sorts of perukes, after the best and newest fashion, cuts and dresses ladies' wigs and towers after a manner performed much better than is pretended to be done by some others. (1748.)
During this age, it was impossible for ladies to dress their hair themselves. The great erection on their heads had to be "composed " or built up with pads, cushions, puffs and curls before it was ornamented with lappets, gauze, lace, poufs, feathers, ropes of pearls or beads, jewels, ornamental pins and various fantastic gewgaws. With a plentiful supply of pomatum, powder and false hair, as well as crisping and curling tongs and pins, the barber "works all into such a state of confusion, that you would imagine it was intended for the stuffing of a chair-bottom ; then bending it into various curls and shapes over his finger, he fastens it with black pins so tight to the head that neither the weather nor time have power to alter its position. Thus my lady is dressed for three months at least ; during which time it is not in her power to comb her head."
As a rule, this head was retouched every day and anointed with strong essences. Every few weeks, it was taken to pieces and built up again. The descriptions of " opening a lady's head " in the contemporary magazines do not bear quotation. Satirists found the lady's head a theme for attack ; but their verses and essays had no effect upon fashion. The Universal Magazine in 1768 published the following stanzas to a belle of the day :
"When he views your tresses thin
"When he scents the mingled steam
This was published only a few months after the following had appeared in a New York paper :
"It is now the mode to make a lady's head of twice the natural size by means of artificial pads, bolsters, or rolls over which their hair is carefully combed, or frizzled to imitate the shock head of a negro."
In 1773, we gain a good idea of the appearance of one of these fashionable tetes in these lines
White as the covered Alps, or wintry face
Hannah More referred to this ridiculous fashion in one of her letters of 1777, and described eleven ladies who had among them on their heads an acre and a half of shrubbery, besides grass-plots, tulip-beds, kitchen gardens, peonies, etc. She also says some of these head-dresses, with their decorations, cost hundreds of pounds !
Not only did the barbers and peruke-makers advertise everything that was needed in their line, but other people were constantly importing powders, pins, pomatums and essences. As early as 1734, Peter Lynch, near Mr. Rutger's Brew-house, had for sale " very good Orange butter ; it is excellent for Gentle-women to comb up their Hair with." Hair-pins, hair-bags, powder-boxes and puffs, wig-springs and brushes, hair-dyes, best grey powder for mourning, hair powder plain and perfumed, and pomatum came in great quantities in 1760-'1. We notice hair-fillets in 1764; tupee combs in 1765 ; and, if we turn to the milliners' announcements, everything that can be thought of in the way of ribands, beads, feathers, lace, lappets, gauze, aigrettes and ornaments of all sorts for the decoration of the monstrous " tete."
This brings us to a consideration of hats, bonnets, caps and hoods of the period. These, naturally enough, varied in shape and style to suit the arrangement of the hair. The commode, which held its place during the reign of Queen Anne, was in itself a kind of cap and admitted no other covering upon the head. The hood was, however, very frequently worn and was susceptible of graceful arrangement. In 1711-'12 the Spectator humorously ordered : " All ladies who come to church in the new-fashioned hoods, are desired to be there before divine service begins, lest they divert the attention of the congregation." The ladies wore these when travelling and frequently when walking in gardens and parks.
One of the favourite varieties of hood was the Nithsdale, worn for many years after 1715, particularly by elderly women. This got its name from the ruse of Lady Nithsdale in effecting her husband's escape from the Tower, in 1715, by dressing him in female clothes and wrapping her ample riding-hood around his head and shoulders. Hoods were still being worn in 1751-'3, as the following advertisement will show :
" Margaret St. Maurice, cap-maker, from London, informs her customers that she has removed from Mr. Bayard's Wharf to the house of Mr. Vandike, opposite the Old Dutch Church, where she makes all sorts of Men's, Women's, and children's Velvet and Silk Jockey Caps, do. Hats, Bath Bonnets, Hoods, and Pullareens for Ladies in the most neat and fashionable manner as in London. She likewise makes Bags and Tossels for Gentlemen's Wiggs, also silk and velvet hats for Boys, all done at very reasonable Rates."
The pullareen was, of course, the pelerine, a kind of tippet. In 1749, she advertises " masks for ladies."
In 1750, the horsehair hat was introduced and long remained popular. We notice importations of horse-hair hats, black horsehair hats and black and white silk hats, in 1750 ; women's masquerade hats ; black horsehair and Leghorn hats, women's capuchines, gauze snail shades with hoods, new fashioned gauze caps, hoods, ladies' paduasoy hats, bonnets, gauze caps, caps and ruffles made after the newest fashion, 1751 ; and coloured silk and horsehair hats, 1754.
The capuchine was a cloak with a hood, modelled on the garment worn by the Capuchin friars. It long continued to be popular, and was often made of beautiful materials. Simple straw hats modelled after those of milkmaids and shepherdesses in the affected rusticity of the day, Leghorn and chip hats, turbans, and brims without crowns, convenient for slipping over the increasing " head " of hair, now arrived in bewildering numbers. Every year, indeed, every sea-son, brought some new style in trimmings. Some-times it was a turban, with all its trimming piled on top of the crown ; sometimes a chip or Leghorn with a low crown and a wide brim having a pouf and a spray of flowers and a bunch of ribbons with ends hanging down the back ; sometimes, a beaver or castor ; sometimes, a horsehair hat ; and sometimes, a " shade."
The popularity of the chip hat was due to its adoption by the beautiful Gunnings, who drove London wild with their beauty. One of their rivals said all she needed to make her as charming as either of those lovely sisters was an " elegant cocked chip hat, with a large rose on the left side, and tied under the chin with cherry-coloured ribbons."
The varieties and names for the trimmings for both hats and caps are legion ; there are ribbons plain and flowered, paduasoy, taffety and lutestring ribbons, figured ribbons, gauze ribbons and satin ribbons. Then there are plain and flowered gauzes of all kinds, black and white lace, and silver lace. It may be interesting to examine a typical assortment in 1754:
" M. Derham, milliner from London, by way of Philadelphia in the Rachel, Capt. Joy, at her shop near Alderman Livingston's in South Street, has brought a genteel and new assortment of figur'd ribbons, plain ducapes, satten do., gauzes, cat-gut, Paris net, white and coloured blond lace, silk edgings, thread do., striped and plain gauze handkerchiefs, Dresden ditto, aprons, ruffles both for gentlemen and ladies, French gloves, neat tanned, glazed and satten gloves, necklaces and earrings, fans, patches and court plaster, lavender, hungary and honey waters, Chip hats, French silks for capuchines, black silk laces and fringes, hollands, long lawns, clear flower'd and minionet ditto, fine book and other muslins. Likewise, an assortment of hosiery and haberdashery ; fine green and bohea tea, ladies shoes, an assortment of cutlery, cards and ink-powder. Everything in the millinery way is made up in the newest fashion, such as lappet heads, caps, French handkerchiefs, ruffles, stomachers, ruffs, sleeve and glove knots, shades, capuchines, hats, bonnets, etc., at the very lowest prices."
About 1755, a very extraordinary decoration for the head was introduced. It appears to have taken the ladies by storm and to have furnished caricaturists and satirists with some material for amusement. It was known as the cabriole, cabriolet, or capriole, and the best idea we can give of it is to refer to a contemporary number of The Connoisseur, in which there is a letter ridiculing the new fashion. This must have been more of an ornament than a headdress, for the author, when looking at one of these equipages de-signed for the head of a lady of quality, placed it in the palm of his hand and remarked that he could not help fancying himself " Gulliver taking up the Empress of Lilliput in her state coach. The vehicle itself " he continued, "was constructed of gold threads and was drawn by six dapple greys of blown glass, with a coachman, postillion and gentleman within of the same brittle manufacture." A few current lines speak of it thus :
" Here on the fair one's headdress sparkling sticks Swinging on silver springs a coach and six ;
There on a sprig or slop'd poupon you see, A chariot, sulky, chaise, or vis-a-vis."
" Shades lorrains," bonnets, and " hives " were advertised in 1757 ; and castor hats in 1760. In 1761, among the newest fashions in head-gear were stamped shades, trolly and catgut hoods, gauze caps, Chinese bonnets, felt hats, silk hats and bonnets, blown lace, French trimmings, and newest ribbons of a la mode, óblue, green, white, buff and figured. The cap that came into fashion about 1762 was the " fly," modelled after a butterfly. It was edged with semi-precious stones, more often paste brilliants or garnets. As it made a very bright frame for the face and head, it was adopted with fervour and New York ladies could have procured it from the very prosperous milliner who made the following bid for custom :
" Elizabeth Colville, in Hanover Square, takes this method to inform her Friends and Customers that she intends carrying on the Business of a Milliner in all its Branches; having a young Woman just come over from England, who is well acquainted therewith, where Ladies and Gentlemen may be supplied with everything in the genteelest Taste and greatest Despatch.
"She has now by her a fashionable assortment of Caps, Ruffs, Handkerchiefs, Ruffles, Aprons, Muffs and Tippets, and sundry other Things in the Millinery Way, and continues the Business of Shop-Keeping as Usual.
" N. B. She has to sell a House and three Lots of Ground on the College Ground."
The "fly cap " is advertised among the goods of Nicholas William Stuyvesant in 1764, in which year we find that silk umbrellas, ivory fans, fancy stomachers, "egrets and breast-flowers," and "common sable, squirrel and feather muffs and tippets and ermine" are imported.
About this time, the flat hat was particularly ad-mired. A contemporary remarks that it " affords the ladies that arch roguish air which the winged hat gives to Mercury ; it animates their faces with a degree of vivacity which is not natural to them." The arch, roguish air was exactly what the coquettes of the day affected, and naturally, the flat hat with its variety of ornaments was reluctantly given up. We still find the same ribbons, gauze catgut net, Paris net, silver and gold blond and bone lace, and paduasoy and lute-string ribbons ; but novelties were constantly invented to tempt the purse and set off the charms of the fair. We may note the new importations of turbans, chip hats and bonnets, Italian head-dresses, new fashioned caps, Leghorn, Dunstable and fine chip hats, in 1769 ; feathers for riding hats in 1764 ; black and white feathers for ladies' riding hats, 1767 ; Italian and French flowers, 1767 ; and black and blue feathers, 1769. We must not omit the new and fashionable " calash," introduced by the Duchess of Bedford in 1765. This was an enormous hood, made some-thing like the hood of a carriage. It was ribbed with whalebones, thus enabling it to fold, and it was tied with ribbons under the chin. A string was attached to the front, which the wearer could pull and therefore draw the hood over her head. The calash was only worn by the women of fashion with their enormous piles and towers of hair. Two of these remarkable concoctions appear upon page 213. One is of dark blue and the other of dark green silk. Both are lined with silk. Close caps, very much laughed at as night-caps, made with wings, appeared in 1773, and were considered very correct for undress.
An interesting and fashionable cap is worn by Mrs. James Duane (Maria Livingston), in her portrait that is shown on page 218.
Feathers were in great demand in 1775, for the fashion came in to sweep the hair off the forehead and draw it high above the face. The back was ornamented in rolls and two curls were placed below the ears. Three large ostrich plumes were stiffly arranged upon the top of the head for full dress. | <urn:uuid:e89f47d3-975f-43e5-a4e8-735c2cff0f1c> | {
"date": "2016-09-26T10:31:24",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660746.32/warc/CC-MAIN-20160924173740-00214-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9700210690498352,
"score": 2.890625,
"token_count": 3515,
"url": "http://www.oldandsold.com/articles21/new-york-18.shtml"
} |
Ask someone what they think the future of driving is, and the most likely response involves self-driving cars. And it's true that sensing and autonomy are dramatically changing the modern car, but there's another information revolution taking place outside the windows. Cheap sensors and network availability are not only making individual cars smarter, but they're also boosting the brainpower the environment cars drive in.
Networks of sensors connected by the Web are making it possible to monitor traffic, parking availability, air pollution, road quality, and more in real time and across large distances. Traffic monitoring in particular has been revolutionized by these changes. This kind of data gives drivers real-time travel time predictions, makes it possible to create smart roads where tolls and signals can adapt to changing conditions, and provides urban planners with accurate and detailed pictures of traffic usage and its effects, improving city layout and planning for the future.
One of the most widespread and powerful sensors is the mobile phone. Equipped with GPS and connected to the Internet, modern smartphones are an important source of information that many companies use to provide traffic data. Google Maps, for example, makes extensive use of data collected from users on mobile phones.
Mobile Millennium was one of the first large-scale phone-based traffic monitoring projects in the US. An ongoing pilot project run by Nokia, NAVTEQ, and UC Berkeley started in 2007, its goal is to develop and demonstrate technologies needed for large-scale data collection for traffic monitoring. The project combines data from a smartphone app distributed to the public and traditional traffic sensors to provide accurate real-time monitoring of traffic conditions in the San Francisco Bay Area.
Designing and running these sensor networks is no trivial task. Data is flooding in from many different sources in many different places, and useful data has to be separated from noise. Algorithms and models are needed to fuse the incoming data into a comprehensible whole, and protecting individual privacy is also a major challenge. Yet the potential gains are huge, so there is an unceasing demand for more and better data.
In this article, Ars goes behind the scenes at Mobile Millennium to examine the technology behind a distributed sensor network. We'll look at how the system is designed to protect user privacy, examine how data from thousands of mobile phones and hundreds of static sensors are combined to measure traffic flow, and look at how this technology will impact the future of driving.
An intelligent highway
The most obvious use of traffic data is to give drivers options for reducing the effects of traffic jams and accidents, either by taking alternate routes or simply by changing their travel times. Trip-planning software already can use traffic speed information to minimize travel time or fuel usage over a trip, and future hybrids and electric vehicles might use traffic predictions to help the onboard computer optimize battery usage.
This kind of real-time data also lets civil engineers create traffic control schemes that react intelligently; for example, smart signals could eliminate the need to wait at red lights and empty intersections. Larger scale efforts might involve roads that actively change direction in response to changing traffic flows.
The data is also of more than just immediate importance. Having good data on current traffic and road usage is vital to predicting future patterns of traffic, which is important for planning purposes. Ars recently explored the issues related to congestion pricing, one of the most popular tools for alleviating congestion. Congesting pricing uses dynamic tolls that are adjusted according to road usage to try to reduce traffic during peak conditions. The success of such schemes is heavily dependent on being able to measure the effects of pricing changes on driving patterns.
Finally, accurately measuring traffic is also useful beyond the immediate realm of driving. Cars and roads have a huge impact on our societies, and traffic has many secondary effects. For example, traffic is a major source of potentially harmful noise, and the generation of noise maps of the city is one of several projects underway that piggybacks on the Mobile Millennium data and network. By correlating noise patterns to population maps, it's possible to assess the impact of noise on the city's people. Cars are also a major source of air pollution, and traffic data can be correlated and combined with measurements taken by pollution sensors to build a map of pollutants produced by cars around the city.
For a long time, traffic sensing was mostly reliant on static sensors. Inductive loop detectors—metal rings embedded in the road—detect the metal in cars that pass over them. Traffic cameras are another common sensor type, and the RFID tags used for electronic toll payment can be tracked to provide data.
These types of sensors are generally pretty accurate, but fixed infrastructure is expensive to deploy and operate. When these sensors break, they're also expensive to repair and replace, so they're typically placed at key places like intersections and highway on- and off-ramps. This means that when traffic conditions change, like when an accident occurs, the changes aren't detected until their effects propagate back through the traffic flow upstream to a sensor.
The need for ever more data from ever more widespread sensors has meant that going to mobile sensors is a necessity, and mobile phones are an obvious choice. It's an oft-quoted statistic that worldwide, there are more cell phones in use than toothbrushes. And an ever-growing fraction of those phones, especially in the US, are smartphones, equipped with GPS and Internet connectivity. | <urn:uuid:0a86fe48-d676-4075-92d8-9a1f4e348f58> | {
"date": "2017-09-22T12:12:38",
"dump": "CC-MAIN-2017-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688940.72/warc/CC-MAIN-20170922112142-20170922132142-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9507954120635986,
"score": 3.140625,
"token_count": 1091,
"url": "https://arstechnica.com/gadgets/2011/02/calling-all-cars-measuring-traffic-using-cell-phone-data/"
} |
Hypersomnia: Causes, Symptoms, Treatments
Hypersomnia is a word used to describe excessive sleepiness at times when you should actually be feeling well rested. If you consistently feel drowsy in spite of a good night's sleep, there are several possible causes and many potential treatments.
It makes sense to feel tired and feel the need for a nap if you didn't sleep well or at all the night before. When this happens night after night, over a period of time, you're simply exhausted. You may not know what to do about it, but you know why you are tired. And that's the difference between insomnia and hypersomnia. If you have hypersomnia, there may not be an obvious cause.
With hypersomnia, you may sleep as many as 10, 12, 14, or even more hours each night, and still feel drowsy and disoriented when you wake up and at times throughout the day. You may take naps during the day and still feel no relief. You may also feel many of the same symptoms experienced by people who suffer from a lack of sleep, namely, anxiety, low energy levels, impaired thinking and speech, and memory problems.
Hypersomnia can be a symptom of another sleep disorder, such as sleep apnea, or restless leg syndrome, and you may not even be aware you have the underlying condition. Some medications can cause hypersomnia, as can drug and alcohol abuse. Hypersomnia is also associated with a wide variety of physical and psychological conditions, including central nervous system disorders, head injury, multiple sclerosis, epilepsy, obesity, tumor and depression. If your doctor rules out all of these conditions, you may have what is known as idiopathic hypersomnia, or excessive sleepiness with no apparent cause. You could have a genetic predisposition to hypersomnia and you may have been suffering from some form of this condition since you were a teenager.
Getting to the root of the problem is the first step toward appropriate diagnosis and treatment. Although lifestyle modifications such as keeping a regular sleep schedule, and avoiding alcohol can help, your doctor may have to treat an underlying condition in order to resolve your sleep difficulties, or prescribe stimulant medications to help you stay away during the day. Hypersomnia and any conditions associated with such extreme tiredness will probably have to be monitored over time.
National Institute of Neurological Disorders and Stroke: Hypersomina Web. 20 June 2011.
University of Maryland Medical Center: Idiopathic Hypersomnia. Web 20 June 2011.
Sign Up for Free Newsletters
Ask Your Doctor the RIGHT Questions!
the most from your doctor visit.
Emailed right to you!
The Ask Your Doctor email series
may contain sponsored content.
18+, US residents only please. | <urn:uuid:33d9bf41-615e-44b3-90bb-b697be588f86> | {
"date": "2017-04-26T17:33:50",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121528.59/warc/CC-MAIN-20170423031201-00235-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9478580355644226,
"score": 2.953125,
"token_count": 570,
"url": "https://www.qualityhealth.com/sleep-articles/hypersomnia-causes-symptoms-treatments"
} |
The year was 480 BC and the Battle of Thermopylae was about to commence. King Leonidas I was dispatched from Sparta with only his royal bodyguard of 300 men to help him stop the oncoming Persian invasion, led by Xerxes I.
Fortunately Leonidas was not entirely alone. He was able to procure more soldiers: an additional number of support troops, including 1,000 Phocians, drawn from other parts of Lacedaemon. He was also able to reinforce his army en route, taking contingents from cities as he passed through. Eventually, he amassed around 7,000 men to block the pass at Thermopylae.
When he arrived, Leonidas camped out at the ‘middle gate’, the narrowest section of the pass. Unfortunately, news arrived from Trachis, the local town, that there was, in fact, a mountain track. It wasn’t large, but it could be used to outflank the Greeks, and therefore destroy their strategy. Leonidas quickly sent the Phocians troops to protect the spot.
Finally, in mid-August the Persian army was spotted. But how many men were the Peloponnesians and their allies up against?
The most fascinating aspect about the Battle of Thermopylae is the numbers, yet the actual figures are highly contended. The first writer to throw in his hat was Herodotus… and his calculations were some of the most amazing of them all.
The ‘Father of History’ described the scene as 6,100 Greeks, including 300 Spartans, 700 Thespians and 400 Thebans in comparison to an impressive 5.2 million Persians. Simonides, a near contemporary poet, estimated 4 million in Xerxes’ army. Modern scholars, however, say these figures were exaggerations, but still consider at least 70,000 to 300,000 in the invading forces.
Either way, the Greeks were clearly outnumbered.
At this time, Xerxes sent an emissary to negotiate with Leonidas. Their terms were that if the Greeks got out of their way, they would be offered their freedom and the title of “Friends of the Persian People”. In addition, they would be given land which was considered even better than what they already had.
Leonidas refused completely.
The ambassador then, more forcefully, demanded that the Greek troops lay down their arms.
Leonidas, once again refused. He only replied: “Come and take them”.
A messenger was then sent to Leonidas’ general, reporting the refusal and threatening, “Our arrows will block out the sun”.
Leonidas’ general retorted, “Then we shall have our battle in the shade!”
War was inevitable.
Xerxes waited four days for the opposing troops to disperse, and when they didn’t, they began to attack.
First Xerxes ordered 5,000 archers to fire a barrage of arrows at the Greeks, but their bronze helmets and shields deflected the attack. No real damage was done. Then Xerxes sent a force of 10,000 men which soon turned into a full frontal assault.
Meanwhile, Leonidas’ army stayed at the smallest section of the pass and spanned the opening with a standard Greek phalanx. They stood shoulder to shoulder to create a wall of overlapping shields, with their spear points dangerously protruding outwards. He rotated different units from each city to prevent battle fatigue. They also used a tactic where they would feign retreat, then turn and kill the soldiers as they tried to run after them.
The Persians, with their inferior weaponry, were not able to effectively engage the Greek soldiers. It was said that Xerxes jumped out of his seat three times as he watched his men get slaughtered. According to Ctesias, this first wave only resulted in two or three Spartans dead.
For his second assault on the same day, Xerxes sent in his elite forces, ‘the immortals’ to do what his previous men could not. Unfortunately for the Persians, ‘the immortals’ fared no better. The Spartans were just that good.
On the second day of battle, Xerxes sent his infantry, supposing that the much smaller Greek army would be weakened, tired and at least a little wounded from yesterday’s onslaught. However, once again Leonidas’ men triumphed, and Xerxes at last deceased the assault. He returned to camp, “completely perplexed”.
It was then that Xerxes received his first bit of good news.
While thinking of what to do next, a Trachinian traitor named Ephialtes (a name which became synonymous with the word ‘nightmare’), told Xerxes of the secret mountain pass. Moreover, he promised to lead the army there. Xerxes immediately sent the rest of his dear ‘immortals’ to check it out.
It was now the third day, at dawn, when the Persian forces surprised the Phocians who were meant to be guarding the mountain track. Unprepared, the Phocians began to retreat when Xerxes’ men bombarded them with arrows. They marched past the wounded Phocians with the goal of encircling the Greek army.
Leonidas’ mission was now doomed.
The Spartan king heard the unfortunate news from a runner and called for a council of war. Leonidas told them that he would not leave, but most of his contingents decided otherwise. All Leonidas had left was his own 300 royal bodyguards, 400 Thebans, as well as 700 Thespians. The Thespian general, Demophilus, refused to desert, but instead choose to fight to the death. This was all the more incredible, as the 700 men were all the hoplites the city could muster.
And so on the third day, the battle came to an end. Xerxes waited just long enough for his ‘immortals’ to descend the other side of the mountain, and then poured 10,000 men into the fight. The few remaining Greeks left their position at the wall in attempt to kill as many Persians as possible.
Many great men fell, including Leonidas who was brought down by archers. The two sides fought over his body, but eventually the Greeks were able to get possession. The dwindling army fought with their spears, until they were all shattered. Then they battled with their short swords. Eventually, according to Herodotus, “they defended themselves to the last, those who still had swords using them, and the others resisting with their hands and teeth”.
Finally, the very last defenders were surrounded, and died under a rain storm of arrows. In 1939, a large numbers of Persian bronze arrowheads were excavated on the spot.
Xerxes’ army won the battle of Thermopylae, with the estimated loss of 20,000 men. The Greek rearguard, however, suffered in total around 2,000 deaths over the course of the three day battle.
Many have asked, why the self-sacrifice? Why did those remaining Greek soldiers stay, and not depart with the others?
Of course no one can know for sure, but one favorable interpretation is that it was a clever tactic by Leonidas. If all the contingents had stayed, then everyone would have been killed. Likewise, if they all left, the Persians would have been able to follow after them and finish the Greek army. Only with a small group of valiant warriors could they protect the Greek retreaters, who would live to fight another day.
And so, the battle of Thermopylae was decided… but the war was yet to end.
You can read more of the Prelude to the Battle of Thermopylae Here: https://classicalwisdom.com/battle-of-thermopylae
“Thermopylae The Battle in the Shade” was written by Anya Leonard | <urn:uuid:fc1715e8-01f5-4e62-a7b3-a8a6336f0134> | {
"date": "2018-07-18T01:05:20",
"dump": "CC-MAIN-2018-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589980.6/warc/CC-MAIN-20180718002426-20180718022426-00136.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.982691764831543,
"score": 3.8125,
"token_count": 1674,
"url": "https://classicalwisdom.com/thermopylae-battle-in-the-shade/"
} |
Software > Multidimensional Scaling
Description | Pros
and Cons | Applications | Details
| Usage Hints | References
Small, H.: Visualizing science by citation mapping, 1999.
Small examined 36,720 multidisciplinary documents for a 15-year sampling window from 1981 through 1995. A combination of fractional citation counting and co-citation clustering via Multidimensional Scaling (MDS) was used to extract four nested levels of clustering via single and complete linkage. The documents have been arranged in 2D using an order-dependent, geometric triangulation process that produces a unified ordination of a hierarchical arrangement of documents.
Multidimensional scaling (MDS) attempts to find the structure in a set of proximity measures between objects. This is accomplished by assigning observations to specific locations in a conceptual low-dimensional space such that the distances between points in the space match the given (dis)similarities as closely as possible. The result is a least-squares representation of the objects in that low-dimensional space, which, in many cases, will help you to further understand your data.
See http://www.analytictech.com/borgatti/mds.htm for an example input of distances between cities and the resulting MDS plot. MDS attempts to arrange "objects" (e.g. major cities) according to their distances in a space with a particular number of dimensions (e.g. two-dimensional) so as to reproduce the observed distances. As a result, we can "explain" the distances in terms of underlying dimensions (e.g. geographical dimensions: north/south and east/west). Note that the actual orientation of axes in the final solution is arbitrary (i.e. you can rotate the geographic map, the distances between cities remain the same). Thus, the final orientation of axes in the plane or space is mostly the result of a subjective decision by the researcher, who will choose an orientation that can be most easily explained.
Thus, MDS moves given objects around in the space defined by the requested number of dimensions, and checks how well the distances between objects can be reproduced by the new configuration. It uses a function minimization algorithm that evaluates different configurations with the goal of maximizing the goodness-of-fit.
The more dimensions we use in order to reproduce the distance matrix, the better is the fit of the reproduced matrix to the observed matrix (i.e., the stress is smaller). In fact, if we use as many dimensions as there are variables, then we can perfectly reproduce the observed distance matrix. However, the goal is to reduce the observed complexity of nature, that is, to explain the distance matrix in terms of fewer underlying dimensions. See (StatSoft, 2001) for details.
Pros & Cons
The "beauty" of MDS is that we can analyze any kind of distance or similarity matrix. These similarities can represent people's ratings of similarities between objects, the percent agreement between judges, the number of times a subjects fails to discriminate between stimuli, etc. For example, MDS methods used to be very popular in psychological research on person perception where similarities between trait descriptors were analyzed to uncover the underlying dimensionality of people's perceptions of traits. They are also very popular in marketing research, in order to detect the number and nature of dimensions underlying the perceptions of different brands or products (StatSoft, 2001).
Note that no relationships (links) are displayed.
- Cartia Themescape. NewsMaps.com
- Author co-citation analysis
in information science (White & McCain, 1998) - 12 key journals
between 19972 and 1995 were analyzed and INDSCAL (Individual differences
MDS) was used to identify trends in terms of top-cited authors.
- Map of Science (Small,
1999) - see Figure.
- XGvis: Interactive Data
Visualization with Multidimensional Scaling (Guja et al., 1998). Source
code & link to ArcView available.
by Wojciech Basalaj (Jan 2001) Proximity Visualization of Abstract
Data - Website devoted to visualization of abstract data collections,
like graphs, multivariate data tables, or sets of multimedia objects.
Icons representing objects from a collection are positioned such that
proximity relationships within the collection are preserved, i.e.
icons for similar objects are clustered, and separated from the dissimilar
ones. Examples used include MDS (multidimensional scaling).
- Interactive Visualization
of Hierarchical Clusters Using MDS and MST (Kim et al., 1998) code
- Multidimensional Scaling
for Group Memory Visualization (McQuaid et al., 1999)
MDS demo, University of Arizona http://ai.bpa.arizona.edu/go/viz/mds.html
The MDS procedure is as follows:
- Determine all objects and their distances.
- Use MDS to produce a scatterplot of the objects in a n-dimensional space (typical 2-D).
- Interpret the dimensions keeping in mind that the actual orientations of the axes from the MDS analysis are arbitrary, and can be rotated in any direction. In addition, look for clusters of points or particular patterns and configurations (such as circles, manifolds, etc.).
Recently, the code by Morrison et al. (2003) was integrated into the repository.
You can use SPSS's Multidimensional
Scaling. Load data and choose from the menus: Analyze -> Scale -> Multidimensional Scaling.
As an example, you may use MDS to visualize the slis-courses.sim matrix created via LSA.
- Morrison, A., G. Ross,
and M. Chalmers (2003). Fast multidimensional scaling through sampling, springs
and interpolation. Information Visualization, 2, 68-77.
- Buja, A., Swayne, D.
F., Littman, M. L., Dean, Nathaniel. (1998) XGvis: Interactive Data
Visualization with Multidimensional Scaling. http://lib.stat.cmu.edu/general/XGobi/
- Kim, Sung Soo, Kwon,
Sunhee, and Cook, Dianne (1998) Interactive Visualization of Hierarchical
Clusters Using MDS and MST. pdf
- Kruskal, J.B. (1964)
Multidimensional scaling: A numerical method. Psychometrica, 29, 115-129.
- Kruskal, J.B. and M.
Wish (1978) Multidimensional scaling. Beverly Hills, CA: Sage
- McQuaid, M., Ong, T.,
Chen, H., & Nunamaker, J. F. (1999) Multidimensional scaling for
group memory visualization. Decision Support Systems, 27, 163-176.
- StatSoft (2001) Multidimensional
M. (2000) Nonmetric Multidimensional Scaling (MDS) software, http://boreas.psych.indiana.edu/Matlab/nonmetricmds.htm
- Small, H. (1999) Visualizing
science by citation mapping. Journal of the American Society for Information
Science, 50(9), 799-813.
- White, H. D. and McCain,
K. W. (1998) Visualizing a discipline: An author co-citation analysis
of information science, 1972-1995. Journal of the American Society
for Information Science, 49(4), 327-355.
- Young, F.W. & Hamer,
R.M. (1987) Multidimensional Scaling: History, Theory and Applications.
New York: Erlbaum.
Matthew Chalmers and Alistair Morrison provided the fast non-linear MDS algorithm. The code was integrated into the XML toolkit by Sriram Raghuraman.
Visualization Cyberinfrastructure @ SLIS,
Last Modified January | <urn:uuid:5c7e1bbc-92f6-4f18-a8ba-45d2488d93fd> | {
"date": "2013-05-19T10:03:00",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.812836766242981,
"score": 2.984375,
"token_count": 1684,
"url": "http://iv.slis.indiana.edu/sw/mds.html"
} |
If you try checking the cupboards or medicine cabinets of every household in the neighborhood, you’ll probably find an ear thermometer or a regular thermometer. That’s because these medical tools are easy to use and considered a necessity by parents. But aside from a thermometer, do you think there are other medical devices or tools that you need to have in your own home?
Below are some of them:
If you or a loved one has been diagnosed with diabetes, having a glucometer at home will become a necessity. People with diabetes need to make some important changes in their lifestyle and habits. Also, they need to keep an eye on their blood-glucose levels on a regular basis. That’s because diabetes does not have clear symptoms. By constantly monitoring your blood glucose levels, you can protect yourself from the complications of diabetes.
A nebulizer is a piece of equipment used for changing liquid medication into some form of vapor that one can inhale. It is highly recommended for those who are taking asthma medications. Having this medical device at home is beneficial and can give parents peace of mind knowing that it is accessible for their children in case they have an asthma attack.
A pulse oximeter can be used at home to monitor a person’s oxygen level and pulse. This is beneficial for those people with conditions like asthma, chronic obstructive pulmonary disease, and congestive heart failure among others. This way, their pulse and oxygen levels can be checked regularly. Any abnormalities will be recorded and made known to physicians.
Also known as blood pressure monitor, a sphygmomanometer is one of the most popular medical devices used at home. This device is composed of an inflatable rubber cuff that’s wrapped around the arm. It also comes with a measuring device indicating the pressure in the cuff. A bulb is used to inflate the cuff, and then a valve is in place for the release of the pressure. The sounds of the arterial blood flow can be listened to using a stethoscope.
Investing in medical devices that you can keep in your home is a smart decision when it comes to preparing for emergencies. While it’s not necessary that you purchase several tools, a sphygmomanometer and the other ones mentioned above can be considered a “must-have” for homes. To find reliable and top quality medical supplies and devices, check out Philippine Medical Supplies. | <urn:uuid:77f01cf4-ab38-4e3b-80c8-5478b5cfe97f> | {
"date": "2018-06-24T04:43:11",
"dump": "CC-MAIN-2018-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866358.52/warc/CC-MAIN-20180624044127-20180624064127-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9565975069999695,
"score": 2.546875,
"token_count": 501,
"url": "https://philmedicalsupplies.com/makes-sense-glucometer-devices-home/"
} |
Pope Benedict in a very comprehensive message for the world day of peace stresses that religious freedom is the path to peace. Some highlights from Pope Benedict’s message are set out below and a link to the full text of the message has been added
Pope Benedict expresses the fact that Christians suffer most from persecution on account of their faith and that this persecution is two fold, one level being at the risk of life and liberty and the other being subjected to more subtle and sophisticated forms of prejudice and hostility.
According to Pope BenedictI have felt it particularly appropriate to share some reflections on religious freedom as the path to peace. It is painful to think that in some areas of the world it is impossible to profess one’s religion freely except at the risk of life and personal liberty. In other areas we see more subtle and sophisticated forms of prejudice and hostility towards believers and religious symbols. At present, Christians are the religious group which suffers most from persecution on account of its faith. Many Christians experience daily affronts and often live in fear because of their pursuit of truth, their faith in Jesus Christ and their heartfelt plea for respect for religious freedom.
The right to religious freedom is rooted in the very dignity of the human person, whose transcendent nature must not be ignored or overlooked. God created man and woman in his own image and likeness (cf. Gen 1:27). For this reason each person is endowed with the sacred right to a full life, also from a spiritual standpoint. Without the acknowledgement of his spiritual being, without openness to the transcendent, the human person withdraws within himself, fails to find answers to the heart’s deepest questions about life’s meaning, fails to appropriate lasting ethical values and principles, and fails even to experience authentic freedom and to build a just society[...]
Pope Benedict considered various aspects of freedom such as the origin of religious and moral freedom and asserted that freedom and respect are actually inseperable. He also looked at the issues surrounding a freedom which is hostile to God which he described as self negating
Religious freedom is at the origin of moral freedom. Openness to truth and perfect goodness, openness to God, is rooted in human nature; it confers full dignity on each individual and is the guarantee of full mutual respect between persons. Religious freedom should be understood, then, not merely as immunity from coercion, but even more fundamentally as an ability to order one’s own choices in accordance with truth.Freedom and respect are inseparable; indeed, “in exercising their rights, individuals and social groups are bound by the moral law to have regard for the rights of others, their own duties to others and the common good of all [...]
The family founded on marriage according to Pope Benedict is the first school for the social, cultural, moral and spiritual formation and growth of childrenA freedom which is hostile or indifferent to God becomes self-negating and does not guarantee full respect for others. A will which believes itself radically incapable of seeking truth and goodness has no objective reasons or motives for acting save those imposed by its fleeting and contingent interests; it does not have an “identity” to safeguard and build up through truly free and conscious decisions. As a result, it cannot demand respect from other “wills”, which are themselves detached from their own deepest being and thus capable of imposing other “reasons” or, for that matter, no “reason” at all. The illusion that moral relativism provides the key for peaceful coexistence is actually the origin of divisions and the denial of the dignity of human beings. Hence we can see the need for recognition of a twofold dimension within the unity of the human person: a religious dimension and a social dimension. In this regard, “it is inconceivable that believers should have to suppress a part of themselves – their faith – in order to be active citizens. It should never be necessary to deny God in order to enjoy one’s rights”. [...]
Link to full textThe family founded on marriage, as the expression of the close union and complementarity between a man and a woman, finds its place here as the first school for the social, cultural, moral and spiritual formation and growth of children, who should always be able to see in their father and mother the first witnesses of a life directed to the pursuit of truth and the love of God. Parents must be always free to transmit to their children, responsibly and without constraints, their heritage of faith, values and culture. The family, the first cell of human society, remains the primary training ground for harmonious relations at every level of coexistence, human, national and international. Wisdom suggests that this is the road to building a strong and fraternal social fabric, in which young people can be prepared to assume their proper responsibilities in life, in a free society, and in a spirit of understanding and peace. | <urn:uuid:0d7107fb-da7a-42e1-9215-261759b005b8> | {
"date": "2018-06-22T09:08:08",
"dump": "CC-MAIN-2018-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864387.54/warc/CC-MAIN-20180622084714-20180622104714-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9611039161682129,
"score": 2.734375,
"token_count": 998,
"url": "http://europeanlifenetwork.blogspot.com/2010/12/"
} |
1. We began by breaking the machine down into smaller sections and designed them using vector graphics, mostly in After Effects
2. Then to prepare for Newton, we dramatically simplified the composition, creating proxy version of the objects used in the animation.
This made it possible to for Newton to calculate our simulations in real time with no errors or glitches.
We also created new dummy objects that we hand animation, these wouldn’t be seen in the final composition but they helped ‘guide’ the physics simulation.
Ultimately we were creating a something that had to look good, not something that actually functioned, so a lot of little tweaks were made by hand that broke the laws of physics.
3. The project in Newton.
The vast majority of the animation and 100% of the ball animation was created by Newton simulations.
There was a lot of back and forth between After Effects and Newton to get the design right.
We found it very easy to ‘test’ a design in Newton, make modifications where needed and then re-test to see if it worked.
4. Once the simulation was exported from Newton we replaced all the proxy objects with the complex machine elements.
This was done by linking the complex objects to the proxy objects and then turning the proxy objects off.
The smaller sections were then all re-timed in the master composition so the animation would flow from one section to the next and time with the voice over.
5. We also found Newton extremely useful when animating cogs and pistons.
Constant motion of interlinking cogs is easy to animate in AE, but realistic acceleration from a standstill was almost impossible.
The same goes for animating a piston or any rigid body machine with a number of moving parts.
AE is just not set up for it.
We essentially used Newton as an Inverse Kinematics (IK) solver and our workflow was very similar to if we’d been using 3D software.
6. Once again we used proxy and dummy objects.
We found the ‘Star’ shape tool in AE very useful for creating proxy objects for the cogs that allowed for much tighter interlocking teeth.
We then set up links between in the piston and gave them limits just like an IK solution.
Note: We did not use a spring joint in out piston like the Newton tutorial, we had more moving parts and wanted more control.
Thanks to Stuart van Eysden & Jason McFadyen at Resolution Media | <urn:uuid:648cd59f-4c23-45ef-872b-43238ab24af4> | {
"date": "2018-12-15T03:12:11",
"dump": "CC-MAIN-2018-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826686.8/warc/CC-MAIN-20181215014028-20181215040028-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9541798830032349,
"score": 2.765625,
"token_count": 519,
"url": "https://www.motionboutique.com/lets-amazing-breakdown/"
} |
What if life could be easier?
What if things like getting good nutrition and regular exercise could be effortless? Building good habits will help you achieve your short term and more importantly long term health goals. Many people don’t become overweight overnight. Years of bad habits help to slowly add pounds of fat around the their belly. Now imagine what years of good habits can do!
Programming new behaviors into habits is a way to minimize the struggle of getting the little things accomplished. A bit of self-discipline will yield new, low-maintenance habits that produce long term results. Many small good habits can combine to help achieve ones goals on auto-pilot.
Experts suggest that it takes about a month to make a habit stick. Three or four weeks is a relatively short amount of time, but it is long enough to get through the newness of a habit. Once conditioned, habits become automatic. In the space of a calendar page, habits become routine.
Being consistent is essential. Habits are more likely to stick when they are cultivated on a daily basis. Going to the gym, for example, becomes much more likely when it becomes a part of each day, whereas going to the gym only a few times compromises consistency and makes locking in the habit difficult.
Doing the same thing the same way at the same time sounds boring but it is essential. Cues like time of day and location reinforce a habit. If you intend to work out, pick a gym and a time and make sure you get to that place at the same time each day.
Rome wasn’t built in a day and the same is true of habits. Doing too much too soon can be daunting and, ultimately, can prevent one from sticking to the 30-day habit commitment. Start small: begin by running a quarter-mile and build from there to reach the end goal of a two-mile run.
Two weeks into working on a habit, it may begin to feel like the habit is routine. However, don’t be fooled. Keep reminding yourself—use sticky notes, phone memos, voicemails, whatever it takes—to stick to your new habit. Be diligent. Without diligence, you may miss a day or two, which defeats the initial purpose and the hard work you already committed.
Accountability is important. It is easy to slack on a habit when going it alone. When there is another person involved it makes staying vigilant easier. Asking your family or friends to help is a great way to insure a habit becomes permanent.
A trigger precedes the execution of a habit. It is a ritual. For example, a smoker may choose to wear a rubber band on his or her wrist. When the urge to smoke arises, the smoker snaps the band against the wrist, offering a trigger—in this case a painful one—that reminds them to avoid lighting up.
Expect to stumble. Every attempt to change a habit or to start a new routine is a challenge. So, do not be discouraged if there are struggles or rough times. Occasional challenges are part of the road to self-improvement. And, when you aren’t perfect or when things seem particularly challenging don’t hesitate to reach out to friends or family to provide encouragement and support.
A good tip if starting a new habit involves removing something from your life, be certain to replace what you lost. If you are trying to eat less sweets find something that can replace that bad habit. Instead of eating desert after dinner try non caffeinated tea or taking a walk. Whatever you do, be sure that you replace the need with something positive and helpful.
Remember to use your “but”. Negative thought patterns threaten to derail your best efforts toward habituation. When negative thoughts surface, and they will, interrupt the negativity with “but.” So, the thought might go like this: “I can’t run a full two miles. But, I run a bit further each day and I will get where I want to be.” “But” is the tool that helps cross the bridge from negative, self-defeating thoughts to positive, self-affirming thoughts.
Make your surroundings work for you. Being around a lot of junk food when attempting to cultivate a healthy diet threatens to derail your habit. Get rid of the junk food and eliminate temptation.
The company you keep is important. In this case, choosing to be around peers who have habits you seek to emulate is essential. Going to the gym lets you mingle with people who like fitness and encourages to maintain your fitness.
Look at your month-long efforts objectively. Science tells us that there are no failed experiments. There are just different experiments that yield different results. The same is true here. Nothing you do is a failure. But everything you do will give you ideas about how to change and improve in the future.
Visualize yourself performing the bad habit, then see yourself push the bad habit aside in favor of a positive alternative. Visualize the positive state that results from casting aside the bad habit. Practice this routine of visualizing the positive overtake the negative until it becomes second nature.
Writing down your intentions to change a habit provides clarity and focus. The intention becomes a physical, tangible thing. This provides added accountability through the journey. Posting your before picture on your refrigerator can help remind you of your goal to creating healthy habits.
Be aware of how changing a habit benefits you. Research health and wellness topics in order to reinforce why dietary changes can be helpful. Notice how your body feels—stronger, more energized—after a workout.
Know that pain accompanies growth. Expect to be sore after starting an exercise regimen. Also, appreciate that the downsides of not making a change can be a source of motivation.
Change the things that feel right to you, rather than the things that you feel pressured to change. Don’t “should” yourself to death. Your habits and goals are uniquely yours. They need to feel authentic. By pursue the changes that keep you motivated you will easily create the habits that lead to a long and healthy life. | <urn:uuid:70b84b28-8eed-4319-ade2-75180b7789a8> | {
"date": "2017-06-23T13:48:13",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320063.74/warc/CC-MAIN-20170623133357-20170623153357-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9363277554512024,
"score": 2.875,
"token_count": 1268,
"url": "https://innutra.com/healthy-living/building-good-habits/"
} |
A robot being developed by Blue Ocean Robotics uses ultraviolet light to disinfect rooms. The Danish company is targeting the product first at hospitals, where there's a high danger of patients contracting infections. In a 2011 study, the U.S. Centers for Disease Control said patients acquired 722,000 infections during treatment at health-care facilities in the U.S. that year and 75,000 of those patients died in the hospital.
It's a problem that Blue Ocean hopes to resolve with its UV disinfection robot. The robot uses large ultraviolet lamps to kill bacteria. Basically, it zaps the nucleic acids within bacteria and disrupts their DNA, making it impossible for them to reproduce and carry out essential life functions. Currently, cleaning hospital rooms is a very manual process, but because these bots are autonomous, they'll be able to go in and disinfect a room without much help from humans.
Blue Ocean Robotics is not the only company to come up with the idea of disinfecting robots. Xenex, in San Antonio, Texas, has its own version of a UV disinfection robot, as does Tru-D, based in Tennessee.
The disinfection robot is being tested in two hospitals in Denmark. According to John Erland Østergaard, co-CEO of Blue Ocean, it likely to be sold to medical facilities as a service rather than a hardware purchase. | <urn:uuid:4ecf94cd-30f6-414d-a783-9d4608dfd7f0> | {
"date": "2017-02-26T22:57:34",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172077.66/warc/CC-MAIN-20170219104612-00200-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9643835425376892,
"score": 2.59375,
"token_count": 278,
"url": "http://www.goodgearguide.com.au/article/608842/disinfection-robot-can-light-way-cleaner-hospitals/"
} |
Monday, February 11, 2008
Carnegie Science Center recognizes Prof. Di Matteo with Emerging Female Scientist Award
“[Di Matteo] has proven herself to be an integral part of understanding the physics behind the planet Earth and its surrounding galaxies. Thanks to her research, scientists have gained a deeper understanding of how galaxies evolve over time and how to help uncover additional mysteries of the universe,” stated a press release from the Carnegie Science Center. “Di Matteo has proven herself to be a revolutionary female in the field of physics. Her motivation and academic excellence have solidified her place in the world of physics research and guarantee future scientific success.”
An essential part of Carnegie Mellon’s growing cosmology program, Di Matteo is perhaps best known for developing the most detailed computer simulations of galaxy formation to date. These simulations are giving scientists deeper understanding into how galaxies evolve over time and have the potential to unravel the mysteries of the universe.
Her previous research published in Nature in 2005 showed that growing black holes release a blast of energy that fundamentally regulates galaxy evolution and growth of the black hole itself. This finding allowed Di Matteo to incorporate black hole physics into a highly sophisticated model of cosmic evolution, a simulation called BHCosmo. BHCosmo is the largest cosmological simulation to be completed to date, studying galaxy formation over the past 13 billion years. Data collected from this simulation will allow researchers to determine where and when in the history of the universe black holes are assembled, what affect they might have on their host-protogalaxies and what the next generation of telescopes, which will probe the structure of the early universe, might expect to find.
“When I heard about the award I was extremely pleased, as although I have only lived and worked here for a few years, the institutions and people of Pittsburgh have been very supportive of my research,” said Di Matteo. “I’ve had the sense that people here are genuinely interested in what I have been doing — even though it involves studying fairly unusual things like supermassive black holes — and getting this award is a wonderful culmination of that.”
See also the MCS news item. | <urn:uuid:d85e8d48-cde3-482e-b9a1-f7b4a7fb8e56> | {
"date": "2016-02-06T07:26:44",
"dump": "CC-MAIN-2016-07",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701146196.88/warc/CC-MAIN-20160205193906-00009-ip-10-236-182-209.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9494791030883789,
"score": 2.671875,
"token_count": 448,
"url": "http://www.cmu.edu/physics/news/2008/dimatteo-award.html"
} |
Our culture has a lot of knee-jerk anger, righteous angry, religious anger, and indignant anger. While anger has its place, it also can be very unproductive. Wellokaythen thinks it’s because of our news cycles and political culture which encourages people to be full of stubborn rage.
This is a comment by wellokaythen on the post “The Sensitive But Angry Man“.
I think one factor at work here is the political culture in the U.S. today, which encourages righteous indignation. The people who get the most attention are the people who are outraged, and the more people who act outraged the bigger the story is. A happy news story without anyone outraged is just not going to make the lead story. In our coverage of events, in our working lives, and in our private lives, the angry people get the most attention. A little whining just doesn’t cut it anymore. An attempt to examine pros and cons just bores everybody. Contentment just can’t hold our interest. Anger brings attention and entitlement, so why would anyone give it up?
Possibly this is because there are many of us who just can’t stand it if someone else is unhappy. Everyone needs to be happy in an ideal society. If you’re angry, that means you’re unhappy, so something is wrong, so I need to fix it. If someone is mad or offended, that means society has done something wrong to that person, and social justice must prevail. Present-day American culture gives a lot of voice to anger and outrage, all the while being afraid of it.
There are many valid reasons to be angry at the current state of affairs. That doesn’t mean all the expressions of anger are equally important. Every bit of anger has a cause, but that doesn’t mean anyone is supposed to fix “the problem.”
Want to nominate a comment of the day? Email the comment and the post it was on to [email protected]
Photo credit: Flickr / ed100 | <urn:uuid:75e12017-7594-4522-8e60-4639d9fd8219> | {
"date": "2014-12-18T17:24:46",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802767301.77/warc/CC-MAIN-20141217075247-00043-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9552465677261353,
"score": 2.546875,
"token_count": 430,
"url": "http://goodmenproject.com/comment-of-the-day/present-day-american-culture-gives-a-lot-of-voice-to-anger-and-outrage-all-the-while-being-afraid-of-it/"
} |
Definition of kissing disease in English:
A disease transmitted by contact with infected saliva, especially mononucleosis.
- Spread by saliva, the energy-sapping state is also known as the kissing disease.
- Say hello to glandular fever, infectious mononucelosis, kissing disease.
- They call it the kissing disease because that's a pretty damn easy way to get someone else's spit in your head.
Definition of kissing disease in:
- US English dictionary
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed. | <urn:uuid:3eafef83-75e8-423b-b3fd-48a7f0f46453> | {
"date": "2015-08-31T09:02:18",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065910.17/warc/CC-MAIN-20150827025425-00289-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9040219187736511,
"score": 2.796875,
"token_count": 129,
"url": "http://www.oxforddictionaries.com/definition/english/kissing-disease"
} |
Soon after William Shakespeare’s death in 1616, John Heminge and Henry Condell, colleagues of Shakespeare in the King’s Men acting company, compiled “Mr. William Shakespeare’s Comedies, Histories, & Tragedies” commonly known as the “First Folio”. It was printed during 1622 and 1623 in the Jaggard family’s busy London workshop. The first copies were sold in late 1623.
Heminge and Condell wanted to make a standard version of Shakespeare’s plays because while Shakespeare was alive the plays had many different versions in manuscripts, prompt books, and pirated copies. They wanted to make the best copies available to their public. The First Folio contains 18 plays published before 1623, and, marvelously, contains 18 plays that up until 1623 had not been published anywhere before. Even if we include the few plays later added to Shakespeare’s whole published work, The First Folio is the primary printed record of nearly half of all Shakespeare’s plays!
Scholars believe that approximately 750 copies of the First Folio were printed. Only 233 survive today, and 82 are in the Folger Shakespeare Library, the largest collection of First Folios in the world. For a look at pictures of the whole book, a complete digital reproduction of First Folio no. 68 is online in the Folger Library’s digital library collection. Folger also maintains a site that discusses how various Folios are different from each other First Folios Online: The Collation
About the Tour
The First Folio! fifty-state national tour is part of the Folger Shakespeare Library’s 2016 Wonder of Will celebration of 400 years of Shakespeare. The tour offers those from Ohio a fabulous opportunity to experience this unique work that truly gave us Shakespeare. The book will be on display in the library, opened to Hamlet’s famous “To be or not to be” speech, and visitors are invited to visit and encounter the original 1623 First Folio text for themselves.
Cleveland Public Library will be the site for the Ohio First Folio! tour stop. The book will be on display in the Treasure Room within the Special Collections on the third floor of the Main Library, 325 Superior Avenue in downtown Cleveland from June 20 to July 30, 2016 during regular Library hours. Visitors are encouraged to explore Shakespeare-themed displays, activities, performances, spoken word events, crafts classes, and technology in Brett Hall, The John G. White Corridor, the third floor displays, Tech Central, and the Cleveland Digital Public Library before viewing the First Folio in the Treasure Room. See our calendar for a full list of events. | <urn:uuid:6e60f62f-89ca-4e55-97c5-6a4306994b87> | {
"date": "2016-10-23T01:17:01",
"dump": "CC-MAIN-2016-44",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719136.58/warc/CC-MAIN-20161020183839-00448-ip-10-171-6-4.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9334127902984619,
"score": 3.234375,
"token_count": 561,
"url": "http://cpl.org/firstfolio/"
} |
Chimpanzees get AIDS.
This is an important discovery, but what intrigues me most about it is how the discovery was made. It is a story of two kinds of science, both of which are essential to getting a deeper understanding of life, but which today are staggeringly out of balance.
In the 1960s, Jane Goodall carried out some of the first long-term studies on chimpanzees in the wild. Goodall made important observations, noting that chimpanzees can be surprisingly cooperative but also quite violent, with troops engaging in war-like conflicts.
Goodall’s research was part of a long tradition of going to where the animals are, and tracking them for years on end. Goodall didn’t take giant crates of lab equipment with her to Tanzania; instead, she brought patience and careful observation.
Of course, doing this sort of science poses some serious challenges. Field biologists often end up studying relatively few individual animals, because they’re so hard to find. Small sample sizes always make sweeping generalizations risky. Animals in the wild are also embedded in a marvelously complex environment. They are influenced by a vast number of variables–the weather, the food supply, the latest disease outbreak, the latest kerfuffle between the top male and his younger rivals. The state of an animal at any moment may be influenced by many of these variables, making it even harder to uncover important underlying rules of its natural history. And since this kind of science takes so long, it can seem meager if you only learn about it through the papers that the scientists publish.
The contrast between Goodall’s kind of science and, what goes on in, say, a virology lab is enormous. Instead of just watching viruses, scientists can run experiments to test hypotheses–experiments that are controlled with exquisite precision. Scientists can genetically alter viruses to discover how each bit of its genetic material helps (or doesn’t help) it infect its host. They can carefully select the hosts to infect, comparing two sets of hosts for instance that might differ only in one particular cell receptor. They can trace the virus’s journey through the cell and out again; they can sequence viral genes as easily as you might crack open a fortune cookie. And they can churn out many papers a year on what they discover.
The divide between these different kinds of biology has existed for decades, as I wrote in this essay for PLOS Computational Biology. That divide has led to some unfortunate biases. Natural history is sometimes treated like glorified butterfly-collecting. Meanwhile, lab-based molecular biology is sometimes seen as sterile and pointlessly reductionist. But it would be a mistake for one side to think it could live without the other. Understanding the origin of AIDS is a case in point.
In 2007, an estimated 33 million people worldwide had HIV infections, and an estimated 3.1 million people were dying of AIDS-related causes every year. Yet, as diseases go, HIV is a latecomer. Scientists only became aware of it in the early 1980s, when it was still relatively rare, after which it swiftly became a global epidemic. Scientists have tried to search through medical records and blood samples for earlier cases of HIV infection that might have been overlooked. The earliest sample of HIV comes from a blood sample taken from a patient in Kinshasa, the capital of the Democratic Republic of Congo, in 1959.
The mysterious appearance of HIV led to many speculations about where it came from–including accusations that vaccination campaigns introduced it into people with vaccines contaminated with a monkey virus. But when scientists reconstruct the evolutionary tree of the virus and its relatives, they can reject those claims.
As soon as scientists discovered HIV, it was clear that it belonged to a group known as the lentiviruses. Lentiviruses are small particles with spiky knobs on their surface, and they encode their genes in RNA. They infect mammals, such as cats, horses, and primates, typically invading certain types of white blood cells. Genetic studies revealed that HIV is most closely related to strains of lentivirus that infect monkeys and apes–known as simian immunodeficiency virus, or SIV for short. HIV is not actually a single lineage. It is several different strains with different origins.
There are two main forms of HIV, HIV-1 and HIV-2. HIV-2, which is relatively mild, evolved from SIV that live in a monkey called the sooty mangabey. The story of HIV-1, which causes the vast majority of AIDS cases, is more complicated, as this diagram shows. (It comes from my upcoming book, The Tangled Bank: An Introduction to Evolution.) This tree reveals that it is actually several strains, all of which jumped from chimpanzees.
Scientists first discovered SIV in chimpanzees by looking at captive animals. But in order to get a sense of the true diversity of the virus, they had to leave the relative comforts of laboratories and head out to the places where chimpanzees live. Wild chimpanzees don’t take very well to a blood draw, so scientists developed methods for extracting virus DNA from the feces chimpanzees leave behind. But in order to find those chimp feces, you have to find the chimps (and the trees in which they spend the night).
These studies showed that two subspecies of chimpanzees carry SIV, but HIV-1 has only evolved from one, P. troglodytes trogloydytes, found in west Africa around Kinshasa (marked Ptt on this tree). Goodall’s central African chimpanzees, Pan troglodytes schweinfurthii, have SIV of their own (Pts).
These studies indicate that SIV evolved into HIV as hunters killed apes and monkeys to sell in a growing “bush-meat” industry. Viruses in the blood of the primates could have entered cuts in the skin of the hunters, where a few of them mutated and evolved adaptations to their new host.
Knowing the structure of the HIV tree allows scientists to pinpoint those adaptations. It turns out, for example, that as all three strains of HIV-1 evolved from chimp virus ancestors, they all acquired the same new amino acid in the same position in the same protein. No strain of SIV in chimpanzees produces that amino acid. This mutation altered a gene encoding the shell of the virus, and experiments suggest that it was crucial to the success of the new HIV strains in humans. It’s possible that the mutation allowed the virus to do a better job of manipulating its new hosts into building new copies of itself.
Of course, AIDS is more than just a virus. Once a person is infected with HIV, it may take years for the virus to wipe out his or her immune system, allowing a menagerie of parasites to move in. When scientists studied captive chimpanzees infected with SIV, they didn’t see anything that looked like AIDS. This was intriguing to say the least. Perhaps the chimpanzees and the viruses had coevolved to a peaceful coexistence. When HIV-1 jumped to humans, its evolution took a nasty turn.
But what about chimpanzees out in the real world? Do they get AIDS? That’s a very short question that has taken a very long time to answer. A team of scientists set up shop at Jane Goodall’s study site in Gombe National Park, and took advantage of her decades of field work to track 94 individual chimpanzees for nine years. They searched chimpanzee feces for SIV, and then kept track of the chimpanzees themselves, observing their health, their offspring, and their lifespan. When the chimpanzees died, the scientists autopsied them to see what effect, if any, SIV had on them.
The results, published today in Nature, are stark. Out of the 94 chimpanzees, 17 had SIV. The SIV-infected chimpanzees had a mortality rate 10 to 16 times higher than the uninfected chimpanzees. Fewer infected female chimpanzees gave birth than uninfected ones, and none of their babies survived to a year. Pathologists found that dead infected chimpanzees looked like they had AIDS, with a lower level of immune cells called CD4+ T cells and damaged lymph tissue.
This discovery raises all sorts of questions. The Gombe chimps get sick, but not as sick as humans do from HIV-1. Why? There’s no evidence that SIV jumped into humans from P. t. schweinfurthii. Instead, it jumped three or more times from P. t. troglodytes. As far as anyone knows, those chimpanzees don’t get AIDS. But, then again, nobody has yet published a study like the one that has just come out on the Gombe chimps. What will that study reveal, if anyone ever carries it out? Is P. t. trogolodytes the source of a recent infection of both humans and the Gombe chimps?
And what’s particularly interesting, to me at least, is the fact that scientists had not noticed chimp AIDS before. Robin Weiss, an HIV researcher at University College London, and Jonathan Heeney of the University of Cambridge, published a commentary in Nature in which they suggest that the artificial conditions in which captive chimpanzees live protect them from AIDS. Out in the real world, where chimpanzees face an onslaught of pathogens, infections may activate the immune system in a way that brings on the virus’s attack and, ultimately, AIDS.
In other words, only the slow-cooked science pioneered by Jane Goodall allowed scientists to discover one of the most fundamental facts about a virus that has become one of the most devastating scourges humanity has faced in modern history. Slow-cooked science may provide more clues in the future–but only if its value is recognized, and only if chimpanzees can survive SIV and all the other threats to their survival these days.
Links to this Post
- New Publication: Chimpanzee “AIDS” | July 23, 2009
- curtas « ciência na mídia | July 27, 2009
- Nice, Thoughtful Piece on Chimpanzee Research at Gombe | July 29, 2009
- Ardipithecus: We Meet At Last | The Loom | Discover Magazine | October 1, 2009
- The One-Ton Turkey: Further Adventures in Slow-Cooked Science | China News Center | April 5, 2012 | <urn:uuid:11ad8794-001e-4b50-aa84-c5e52dd9fc25> | {
"date": "2015-08-04T14:27:50",
"dump": "CC-MAIN-2015-32",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990900.28/warc/CC-MAIN-20150728002310-00215-ip-10-236-191-2.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9614818096160889,
"score": 3.265625,
"token_count": 2165,
"url": "http://blogs.discovermagazine.com/loom/2009/07/22/aids-and-the-virtues-of-slow-cooked-science/"
} |
La idea de un diccionario universal "egecutada" en la jurisprudencia civil de Mayans: Léxico y fuentes.
This study analyses the work called Idea de un diccionario universal egecutada en
la jurisprudencia civil (Idea for a universal dictionary developed in civil
jurisprudence), a terminological dictionary griten by Gregorio Mayans and published
in 1768. This work is a clear example of the multifaceted dimensions around which
the linguistic and reformist thought of this Valencian writer from the Enlightenment is
Gregorio Mayans thought it was necessary, within the Hispanic domain, to
elaborate an encyclopaedia or integrating and comprehensive dictionary collecting and
classifying the full range of the most varied scientific disciplines. The elaboration of
the work conceived by Mayans should be carried out by Antonio Bordazar de Artazu,
a Valencian printer who shared several projects and concerns with the author.
Nevertheless, apparently Bordazar did not manage to understand the method
suggested by Don Gregorio in order to carry out his task, so the Enlightened writer
from Oliva decided to write a model so as to guide his disciple, that is the so-called
Idea de un diccionario universal egecutada en la jurisprudencia civil.
Our analysis of the Idea, on the one hand, is based on approaches of a philological
nature, closely related to the field of Linguistic Historiography. The first one of them
aims to explain a series of issues regarding the gestation and publication of the work,
particularly its possible connection with projects of a universal language. The second
approach, also based on Linguistic Historiography, intends to point out and discuss
what were Gregorio Mayans? lexicographic ideas, in order to explain possible
peculiarities of his work.
On the other hand, other criteria which are rather lexicographic in nature have also
been taken into account when writing the analysis of this work.
Finally, another objective of this study has also been to carry out an analysis of the
sources of this dictionary.
Document Full Text
Advisor:Echenique Elizondo, Mª Teresa; Martínez Alcalde, Mª José
School:Universitat de València
Source Type:Master's Thesis
Date of Publication:01/18/2007 | <urn:uuid:c7ecfac5-152c-4421-8674-083a7addaf5e> | {
"date": "2016-09-29T06:45:56",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661779.44/warc/CC-MAIN-20160924173741-00082-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8406139016151428,
"score": 2.515625,
"token_count": 530,
"url": "http://www.openthesis.org/documents/La-idea-de-un-diccionario-574956.html"
} |
For this week’s blog I will be discussing the ins and outs of companies merging or acquiring other companies and the reasons behind them.
The term Mergers and Acquisitions is general term used to refer to the consolidation of companies. A merger is a combination of two companies to form a new company, while an acquisition is the purchase of one company by another in which no new company is formed.
There are several different reasons why a company may want to merge with another and these can all be categorised into 4 sub categories: Synergy, Superior Management, Managerial Motives and Third Party Motives.
The term synergy refers to when the value of a completed merger or takeover is larger than the sum of the two companies when separate. Value is created from a merger or takeover when the transaction costs are lower than gain made.
Market power is one example of a synergy through a merger or takeover. With companies merging to gain market power and possibly become part of an oligopoly or monopoly in the market place, it allows them to have a lot more control over the price that they set for products. However there are regulations that are in place to stop companies that have a lot of market power from setting too high a price tag. In my opinion this is highly necessary! Especially in industries such as the phone industry, where the likes of Orange and T-Mobile have merged to make EE. With there being only a few phone companies, it would be very easy for them to set as high a price as they wish and consumers would have very little choice other than to pay it. So in this case it is very important that they are regulated on what prices they are allowed to charge.
There is also the fact that a company would benefit from economies of scale if they were to merge with another company. This is due to larger companies generally having lower cost per unit output. This comes about as the company does not need to share the central services that both companies will have had, such as the human resources department.
Mergers and Acquisitions do not always occur for the benefit of a company! Like so many other things managerial agreed has been the main driving force behind it! From a manager’s perspective if they acquire or merge with a smaller company, it gives them the opportunity to give themselves a larger salary, as they are seen to have a lot more power and status!
A merger or acquisition driven my managerial greed seems ridiculous in my opinion. If the merger does not create any synergy then surely there is no point in it, as only a few individuals will benefit and the company would incur unnecessary costs!
It is often the case that there is a smaller company involved in the movement of an acquisition and they do not always want to be bought out, which can lead to a hostile takeover. One way that a company is able to defend itself is by selling off its assets that the hostile company want to purchase, so that it leads the attention away from them. However, this may not be feasible if the assets are too large for a company to sell without it becoming financially unstable.
This is just a brief overview of why mergers and acquisitions occur and in my opinion why they seem so appealing for some companies.
If you can think of any other motivations behind a merger or takeover or have anything else to add, please comment.
Until next time fellow bloggers... | <urn:uuid:741ef180-35ed-414d-98da-4cbaef9cddcf> | {
"date": "2018-05-24T23:36:26",
"dump": "CC-MAIN-2018-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866894.26/warc/CC-MAIN-20180524224941-20180525004941-00576.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9805622100830078,
"score": 2.578125,
"token_count": 683,
"url": "http://dentsdrivel.blogspot.com/2016/01/mergers-and-acquisitions.html"
} |
Robert Minhinnick was born in South Wales in 1952 and still lives there. He visited Iraq in 1998 to make a film. He sets the poem in Palestine Street, a major Baghdad street, named after the Arab-occupied region of Israel. Baghdad was at the centre of the first Gulf War, defended by Saddam Hussein’s Imperial Guard in what he called ‘the Mother of all Battles’. The title of the poem relates to a type of date-producing palm tree that is frequently mentioned in the Qu’ran. The tree’s leaves, bark and fruit are used for a variety of purposes including timber, rope, food and fuel.
The poem describes what the narrator sees as he walks along a main street in Baghdad. Some of the scenes the narrator ses as he walks along the street are violent, whilst others are peaceful. The following videos and PowerPoint gives you key information about the poem. Use this to help with your comparison essay – due in on Monday. | <urn:uuid:f2927a0c-8b1f-491e-aa49-3bda74272f76> | {
"date": "2018-08-20T23:09:50",
"dump": "CC-MAIN-2018-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217354.65/warc/CC-MAIN-20180820215248-20180820235248-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9629500508308411,
"score": 2.953125,
"token_count": 203,
"url": "https://missthedogatemyhomework.wordpress.com/2014/02/06/the-yellow-palm/"
} |
Sue & Wayne Trivelpiece
A colony of Adélie penguins on the West Antarctic Peninsula.
By Govert Schilling, LiveScience
MCMURDO SOUND, Antarctica — Suppose someone monitors your whole life, from the moment you were born through childhood, puberty, adolescence and your midlife crisis, all the way to your ultimate death — recording what you eat, where you go, who you make love to, when you raise children and how your body ages. Pretty scary, right?
But that's exactly what biologist David Ainley is doing. Not with humans, but with Adélie penguins in Antarctica. If he could put TV cameras in the birds' master bedrooms, he wouldn't hesitate.
No detail too private
For 17 years now, Ainley has studied three penguin colonies in and around McMurdo Sound, located at the southern extent of the Ross Sea. "It's rare in science to collect data throughout the whole age structure of a population," Ainley told LiveScience, noting Adélie penguins live, on average, about 20 years. Some of the sedate, elderly colony members were just "screaming" newborn chicks when he first arrived here in 1996.
Back then, the three colonies were growing rapidly, at a rate of about 10 percent per year. "My original goal was to find out what caused this increase, and why the smaller colonies grew even faster than the larger ones," said Ainley, who is a biologist at H.T. Harvey & Associates, an ecological consultancy in San Jose, Calif.
Surprisingly, the baby boom
Along the way, penguin privacy has gone out the window: To keep track of a representative selection of individual penguins, Ainley has banded them on one of their flippers, making it easy to identify each from afar through binoculars. [ Image Gallery: Private Sex Lives of Penguins ]
turned out to be a side effect of the Antarctic ozone hole (an opening in the protective atmospheric layer), which reached huge dimensions in the 1990s. "A larger ozone hole means a cooler stratosphere, a more powerful polar vortex and, as a result of stronger winds, more open water in the immediate neighborhood of the colonies," he said. The penguins need the open water for finding their favorite foods — krill and fish.
With funding from the U.S. Antarctic Program, through the National Science Foundation, Ainley has discovered a lack of competition for scarce food resources is what drives the smaller colonies to grow faster than larger ones. Also, predator leopard seals, which aren't very efficient hunters, are more interested in the bigger colonies, where they have a better chance to catch their nourishing penguin snack.
Moreover, at the exit of the colonies, Ainley has mounted electronic weigh bridges, over which the penguins have to pass when they go foraging in the open sea, and again when they return to feed their newborn chicks from their own stomachs. Radio-frequency chips identify the penguins, and the automatic measurements provide a detailed record of their foraging and feeding behaviors during the austral summer season.
An icy obstacle
All was going well with Ainley's research. But in March 2000, catastrophe struck. A huge part of the Ross Ice Shelf broke loose. The iceberg, nearly the size of the state of Connecticut, blocked access to the open waters of the Ross Sea, effectively cutting off the penguins' preferred route to their winter habitat, farther away from the pole. To reach these slightly warmer and less gloomy regions with their fish and krill in tow, the poor birds now had to take a 50-mile detour. Eventually, the iceberg would remain stuck for a period of five years, and the penguin colonies diminished markedly. [ Album: Stunning Photos of Antarctic Ice ]
"At first, I was very disappointed," said Ainley, as it looked as if the iceberg had wrecked his research program. "But then it turned out that there was a lot of new information to gain from the whole episode." In particular, Ainley discovered many penguins from the small colony at Cape Royds did not return home at all in the summer season, but started a new life at one of the other two Adélie colonies at Ross Island — at Cape Crozier and Cape Bird.
This was completely unexpected, said Ainley. "The scientific gospel was that penguins live in the same colony for their entire life, and that they never migrate elsewhere. But the gospel was written by people who had never witnessed an iceberg event like this one."
Contemplating the universe
By now, everything is pretty much back to normal again. Together with his colleague Jean Pennycook, Ainley started his 17th field expedition in early December. Every other day at Cape Royds, he walks through the penguin colony, armed with a pair of binoculars, keeping track of what the birds are doing. "There's not very much to do, really,” he said. “Actually, I spend most of my time at my laptop." Research results, as well as daily pictures from breeding nests, are published at a special website, www.penguinscience.com, partly for educational reasons.
The small colony at Cape Royds has a population of about 2,000 penguin pairs, as opposed to Cape Bird, with some 50,000 pairs, and Cape Crozier, the biggest colony in the world, with a staggering 280,000 pairs. "At the other colonies, there's more than enough work to keep two people busy for seven days a week," he said.
But despite the cold, Ainley doesn't seem to mind the relative lack of work. Pointing at the male penguins that are solemnly breeding two fresh-laid eggs each, he notes: "They're just sitting there, contemplating the universe."
To many researchers in Antarctica, the combination of utter remoteness and overwhelming natural beauty is the main atttraction of the frozen continent. In fact, Ainley admits he choose penguin research for his doctoral work just to get a chance to go to Antarctica. "I just had to go there," he said. "I could've chosen geology instead, since I also majored in that discipline."
Then again, monitoring the full life cycle of a mountain or a glacier, from birth to death, is a bit beyond human scope. In the case of the Adélie penguins, Ainley almost accomplished this feat. "I'll return two more times on my current grant," he said. "If I'm creative enough to come up with a new research project, I may receive another five-year grant."
The penguins aren't likely to mind. Who knows, they might start to miss their human friend if he weren't to show up anymore.
Dutch freelance science writer Govert Schilling visited McMurdo Station and the Amundsen-Scott South Pole Station in early December as a selected member of the National Science Foundation's Antarctic media visit program.
- Image Gallery: One-of-a-Kind Places on Earth
- Antarctic Album: Chinstrap Penguins of Deception Island
- Infographic: 100 Years of Antarctic Expedition
© 2012 LiveScience.com. All rights reserved | <urn:uuid:6559e4de-6832-4206-b8f7-9af502a06273> | {
"date": "2017-04-28T14:08:10",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122992.88/warc/CC-MAIN-20170423031202-00354-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9678589105606079,
"score": 3.546875,
"token_count": 1501,
"url": "http://science.nbcnews.com/_news/2013/01/06/16382476-penguins-private-lives-recorded-in-antarctica?lite"
} |
Economic goods and Free goods
It has been difficult for people to differentiate economic and free goods.
Economic good is a good which is produced by paying for the resources
Example of Economic good would be a computer
Free good is a good which is available without using any resources
Example of Free good would be air | <urn:uuid:bb1c55a7-b14e-4767-b2d3-7af81da9cdc3> | {
"date": "2017-01-22T08:00:25",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281419.3/warc/CC-MAIN-20170116095121-00330-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.975752055644989,
"score": 2.609375,
"token_count": 63,
"url": "http://www.fetsystem.com/economic/economic-goods-free-goods"
} |
Second Grade Informative Writing 19 Oct This week, second graders read an article about what makes dogs mammals.
Of all the arts, writing should be among the most democratic: The goal is for students to improve their writing and simultaneously develop myriad approaches to writing that empower students to effectively evaluate and improve their own writing and thinking. To this end, students will participate in writing workshops of at least forty-five minutes three to five times a week.
The writing workshop begins with a mini-lesson of five to thirty minutes and continues with independent writing, during which time I circulate among writers and meet with individuals or small groups. At any point during the writing workshop, students may share their written work in progress and receive constructive feedback from their peers and me.
MLA Format for Essays and Research Papers Introduction The Modern Language Association (MLA) specifies a standard format for essays and research papers written in an academic setting. An introductory paragraph: On March 4, , John Smith was born to Anna Bradcock Smith and James Smith. Although certainly not of humble origins, John was acquainted with several prominent and influential men of politics with whom he discussed matters of . Microsoft Word is a tyrant of the imagination, a petty, unimaginative, inconsistent dictator that is ill-suited to any creative writer's use. Worse: it is a near-monopolist, dominating the word processing field.
The writing workshop may conclude with this oral student sharing of written work, with a group discussion of what writers accomplished or what problems emerged, with my observations, or with a follow-up to the mini-lesson.
The writing workshop is a quiet and productive period. Writing is thinking so silence is needed to help all writers think and write well. The only noise besides pencils moving across paper is the quiet talking that occurs during writing conferences.
During the writing workshop, students develop most of their own writing projects, even during genre studies, writing passionately about what matters most to them. The writing workshop mini-lessons provide a writing course of study.
They draw on a combination of impromptu lessons based on student need and lessons that incorporate key writing instruction critical for every sixth grade student.
The mini-lessons fall into four distinct categories: Students will also create a mini-lessons table of contents for ease of later reference. Some, but by no means all, of the writing mini-lessons are posted here.MLA Format for Essays and Research Papers Introduction The Modern Language Association (MLA) specifies a standard format for essays and research papers written in an academic setting.
Microsoft Word Is The Unites States Political System A Legitimate Democracy? Prepare A 1, To 1,Word Autobiographical Research Paper That Analyzes The Influences Of Race As It Relates To Your Community. Nov 14, · Short essay on harmful effects of junk food five 10 page essay on pollution class 7 how to write a unique college essay scholarship recommendation letter how to write an amazing college essay hook hookup college essays street essay about fast and furious 8 movies online in tamilrockers, english essay pdf diwali essay abortion body paragraphs what does word essay .
Footnotes appear at the bottom of the page and endnotes come at the end of the document. A number or symbol on the footnote or endnote matches up with a reference mark in the document.
How to write essay for college pdf on a book short speech on good eating habits hindi how to make a paper airplane that flies very far what should i write my argumentative essay on one sided word essay questbridge days is a word essay a lot really words essay about trends baisakhi in hindi.
Essay kata serapan bahasa portugis. 2 thoughts on “ Novel and Short Story Word Counts ” Velvet in Dupont October 11, at am. Incredibly timely for me, thanks for posting this. I have been looking for word counts and couldn’t even find this information you’ve given by using the all-knowing Google. | <urn:uuid:36d8ec96-d4bb-4056-b848-fe8229b11466> | {
"date": "2019-12-15T03:05:11",
"dump": "CC-MAIN-2019-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541301014.74/warc/CC-MAIN-20191215015215-20191215043215-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9227166175842285,
"score": 3.1875,
"token_count": 825,
"url": "https://jaqyrixigacyvek.regardbouddhiste.com/short-essay-on-ms-word-58116lb.html"
} |
445: Evolutionary biology: Channels of resistance
The softshell clam (Mya arenaria) occurs around the Atlantic coast of North America. The clams can become contaminated with saxitoxin, the cause of paralytic shellfish poisoning in humans and economic losses to the shellfish industry. The toxin is produced by 'red tide' algae and finds its way into the clams when the algae are ingested. V. Monica Bricelj et al. (Nature 434, 763–767; 2005) show that clams from areas subject to recurrent red tides are relatively resistant to the toxin and tend to accumulate it in their tissues. But clams from unaffected areas have low resistance when exposed to the toxin in the laboratory. These differences were mirrored by the sensitivity of isolated clam nerve-trunks exposed to the toxin in vitro.
To investigate the underlying molecular mechanism, Bricelj et al. sequenced the genomic region encoding a putative voltage-gated sodium channel. Such channels sit in cell membranes and regulate ion flow. The authors found a single mutation that correlated with resistance to the toxin, and that results in replacement of a glutamic acid by aspartic acid at a site previously implicated in the binding of saxitoxin. When introduced into a channel from rat brain, this mutation did not affect ion conductance. But the sensitivity of the channel to saxitoxin was greatly reduced owing to a large decrease in the binding affinity of the toxin at the channel pore.
Saxitoxin produced by red-tide algae probably acts as a potent selective agent on the clams, leading to genetic adaptation, the target of selection being genetic variation at a single site in an ion channel.
This is a similar mechanism to the garter snake's response to newt toxin. Evolution at work. Testable evolutionary hypotheses, being tested. | <urn:uuid:0b3f3163-75d2-4ef0-a3ca-70941652d5f6> | {
"date": "2017-04-25T16:29:23",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120694.49/warc/CC-MAIN-20170423031200-00646-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9429881572723389,
"score": 3.3125,
"token_count": 378,
"url": "http://evolutionproject.blogspot.com/2005/04/445-evolutionary-biology-channels-of.html"
} |
The science journal Nature is making headlines this week with news of the largest hole in the ozone layer over the North Pole in history, rivaling the size of its well known Antarctic cousin. Researchers credit this "unprecedented Arctic ozone loss" to "unusually long-lasting cold conditions" in the stratosphere at a time when their colleagues are in turmoil over melting Arctic sea ice a few miles below, supposedly caused by man-made global warming. Of course, humans are also responsible for the chilly stratosphere, they say. With sky-is-falling overtones the article's authors warn, "We cannot at present predict when such severe Arctic ozone depletion may be matched or exceeded."
Nor do they know when such levels have been matched or exceeded in the past. The NASA satellite record goes back only to 1979, according to meteorologist and weather technology expert Anthony Watts. That amounts to little more than 30 years of data, which can hardly be considered a baseline for making doomsday predictions and framing public policy.
Yet that is exactly what has happened since 1985 when scientists first spied a hole in the ozone layer over Antarctica and immediately blamed humans and their aerosol cans. S. Fred Singer, professor of environmental science at the University of Virginia, recounts the U.S. Environmental Protection Agency's (EPA) knee-jerk hysteria.
Click here to read the entire article. | <urn:uuid:b5560fbd-c8ed-48ce-a3ea-a38219a31c17> | {
"date": "2015-01-27T18:57:24",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115856041.43/warc/CC-MAIN-20150124161056-00027-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9259247779846191,
"score": 3.46875,
"token_count": 281,
"url": "http://www.jbs.org/action-tools/huge-arctic-ozone-hole-leaves-scientists-gaping"
} |
Reflections: the effects of September 11 are still being felt by educators and students a year later. Here some of your colleagues share their feelings about the repercussions of this event.The events that unfolded on September 11 last year were nearly beyond comprehension. We can all remember how every hour, or sometimes every minute, our perception changed on what was happening, who may have did it, and to the impact it would have on us and the rest of the country.
While the year since has clarified many of these issues, in some ways the bigger picture remains as changeable as the events of that day. Just as it was hard to measure our shock, grief and outrage, so has it been hard to measure the loss of innocence for some children, the loss of loved ones loved ones npl → seres mpl queridos
loved ones npl → proches mpl et amis chers
loved ones love npl for others, and the near overwhelming desire of children to be able to understand an event that most adults are still sorting out.
What is undeniable, though, is that the events of last year did bring changes. The most obvious ones may lie in the textbooks your district has, or will soon buy. Of the four major textbook publishers, each has a few paragraphs on the event, and the picture of the firefighters raising the flag at Ground Zero Raising the Flag at Ground Zero is a photograph by Thomas E. Franklin of The Bergen Record, taken on September 11, 2001. The picture shows three firefighters raising the American flag at ground zero of the World Trade Center following the September 11, 2001 attacks. .
But for many, these mentions don't come close to explaining, or making sense of, the events of that day.
Help is available for educators in a variety of ways. A new survey taken in New York City New York City: see New York, city.
New York City
City (pop., 2000: 8,008,278), southeastern New York, at the mouth of the Hudson River. The largest city in the U.S. about the effects of September 11 show that girls are more likely to experience psychological problems than boys; the fourth- and fifth-graders were more affected than older children, and about 75,000 of the city's 1.1 million students have suffered from post-traumatic stress disorder post-traumatic stress disorder (PTSD), mental disorder that follows an occurrence of extreme psychological stress, such as that encountered in war or resulting from violence, childhood abuse, sexual abuse, or serious accident. . The study, "Effects of the World Trade Center Attacks on NYC NYC
New York City
NYC New York City Public School Students," suggests that districts expand existing mental health services health services Managed care The benefits covered under a health contract within schools, and develop a citywide system for routine screening and referral for major mental health problems.
San Francisco State University • • [ created a professional development program, called Understanding the World After September 11, for teachers. And Brown University created a five-day curriculum on terrorism, which more than 1,000 high schools say they will follow, according to according to
1. As stated or indicated by; on the authority of: according to historians.
2. In keeping with: according to instructions.
3. a report in The New York New York, state, United States
New York, Middle Atlantic state of the United States. It is bordered by Vermont, Massachusetts, Connecticut, and the Atlantic Ocean (E), New Jersey and Pennsylvania (S), Lakes Erie and Ontario and the Canadian province of Times.
What follows are the thoughts of educators around the country on the fallout from that day, how it has impacted their lives and school district policies.
Shelley Harwayne Superintendent, Community School District No. 2, New York City Collector of works for Messages to Ground Zero: Children Respond to September 11th (Heinemann, 2002)
In any district you have trauma and tragedy ... the loss of a parent, a teacher getting ill. To have a situation with such big numbers swept us off our feet.... I think it has caused us to reexamine re·ex·am·ine also re-ex·am·ine
tr.v. re·ex·am·ined, re·ex·am·in·ing, re·ex·am·ines
1. To examine again or anew; review.
2. Law To question (a witness) again after cross-examination. all our safety plans, our crisis teams, our environmental issues. District 2 is a district where instructional issues are on our front burner Noun 1. front burner - top priority; "the work was moved to the front burner in order to meet deadlines"
precedence, precedency, priority - status established in order of importance or urgency; "... . This has been a year where we've had to add other things to our agenda.
We had to get very good at taking care of all aspects of children's lives. ... [We realized] how important it is to have smart people at the helm of every school. I have smart principals who are not only brilliant but brave.
I think [the Messages to Ground Zero book] will be a powerful closure. The section on hope is important. It would be a lovely book to read aloud on September 11--to tell kids what the children close to Ground Zero were thinking.
People all over the country have asked me to talk about what I've learned. Kids need art more than ever. We can't ever eliminate the arts from our schools. So many children couldn't talk about their reactions, but they could [express through art and words] what they were feeling.
When I looked at the [messages sent to New York City children] from all over the country, kids were using writing for so many more reasons than we thought possible. Clearly our New York City kids were writing to bear witness. I think it was incredible to see that children could write to lift others' spirits. These were not fill-in-the-blank stories. Kids had important things to say, and they had the voice to say it.
Joanne McDaniel Director for the Center for Prevention of School Violence Raleigh, N.C.
In some ways, the terrorism of September 11 was less of a shock to school districts across the country than it was to others. With Columbine columbine, in botany
columbine (kŏl`əmbīn), any plant of the genus Aquilegia, temperate-zone perennials of the family Ranunculaceae (buttercup family), popular both as wildflowers and as garden flowers. and other violent incidents prompting districts to pay attention to physical security prior to September 11, the new national emphasis on such security required districts to revisit and update security plans rather than create new ones. Importantly, many districts tried to balance physical security with the provision of learning environments that communicated a sense of normalcy nor·mal·cy
Noun 1. normalcy - being within certain limits that define the range of normal functioning
normality and safety. Many districts did take actions to ready themselves to handle bioterrorism and similar types of threats.
Christie Winkelmann Kyrene District Spokeswoman Kyrene Elementary School elementary school: see school. District 28 Phoenix, Ariz. area
After 9/11, a subsequent bomb threat affected several of our schools simultaneously. Kyrene took several more steps to ensure the safety of its schools. These additional efforts involved a parent working committee, two safety audits and a written agreement for how schools and police departments will work together in the event of a crisis.
First, the Kyrene Safety Committee--a group of parents that assisted district schools in developing more comprehensive emergency communication plans--was created. Parents on this committee provided feedback about how they would like to be kept informed in a crisis. The committee recommended district-wide emergency communication parameters that were later accepted and implemented in all schools as well as in the district's athletic and on-site childcare programs.
David Weiss There are several individuals of note named David Weiss, including:
Obviously the events of 9/11 have created a new focus in the classroom. We find that students are very interested in learning more about the Mideast and Arab world “Arab States” redirects here. For the political alliance, see Arab League.
The Arab World (Arabic: العالم العربي; Transliteration: al-`alam al-`arabi) stretches from the Atlantic Ocean in the . As a department, [we may] develop an elective for students that would deal with the influence of the Muslim or the Arab world.... Of the 31 workshops scheduled [at NSSSA's convention in November], at least five of them are going to deal directly with the aftermath of 9/11.
[The terrorist attacks have also] provided social studies teachers with the vehicle to [teach] tolerance. Our country was ready for rejuvenation Rejuvenation
in extreme old age, restored to youth by Medea. [Rom. Myth.: LLEI, I: 322]
apples of perpetual youth
by tasting the golden apples kept by Idhunn, the gods preserved their youth. [Scand. Myth. in that area. We'd become a very cynical nation, into our own world and not the greater world and the greater good.
[In U.S. history,] the focus has not been on the influence of the Arab world in our country. Now it will. When the curriculum gets to the period immediately following World War II, we can take a look at the me of Israel. The students can see how that one event has implications 50 years later.
I started teaching in the late '60s--those were tough times.... It wasn't cool [for students] to be patriotic. I am a Vietnam veteran This article is about veterans of the Vietnam War. For the French psychedelic musical group, see Vietnam Veterans.
Vietnam veteran is a phrase used to describe someone who served in the armed forces of participating countries during the Vietnam War. . Students now have a clear focus. They understand why our country has done things in the past. Why was there a Vietnam? Why did our country get involved? They can see [that] through terrorism, our country has now become vulnerable. They see it's imperative that our country unites again--to understand that we are a country of many. From many come one, e pluribus unum E Pluribus Unum (ē plr`ĭbəs y`nəm) [Lat. .
Mary Minner Former school counselor A school counselor is a counselor and educator who works in schools, and have historically been referred to as "guidance counselors" or "educational counselors," although "Professional School Counselor" is now the preferred term. Rosemary Hills Primary School, Silver Spring, Md.
In my experience of being with children who have felt stressed in a variety of circumstances, including 9/11, I've seen how important it is to teach them how to be "quiet on the inside." [This] is a feeling of calmness no matter what is going on.... Fear can become an emotion that overcomes and overwhelms us. Crisis can be an opportunity to see what we're thinking about. What we think about grows. And we become what we think about."
Genie Stowers Associate Dean, College of Behavioral and Social Sciences, San Francisco State University Organizer of "Understanding the World After September 11," a summer academy for K-12 teachers
Terrorism] certainly is a current event, but I think it's going to go beyond that. Students want to understand what they're hearing in the media everyday. [It's] really pointing out the importance of understanding social studies. The approach we took [with the academy] was interdisciplinary. We [had] people from a variety of different disciplines come and speak. This cannot really be understood from the point of view within one discipline.
Kenneth Roy Director of Science and Safety, Glastonbury (Conn.) Public Schools
Several years ago, districts fell victim to their own form of domestic-type terrorism--Columbine. With this event, we developed terrorist action and workplace violence protocols. After the tragedy of 9/11, workplace safety/security was again addressed and upgraded; e.g., security audits to determine weaknesses in facilities, employee security training, security drills in the form of lockdowns and evacuations, and ID badges for all employees and students, to name a few. Safety/security of the four walls with the future inside is our mission.
Gregory Thomas Executive Director of the Student and Safety Prevention Services division New York City's Board of Education.
As the events unfolded on the morning of Sept. 11, 2001, students and staff in schools across New York City were forced to make split-second decisions to ensure their safety. That we were successful in safely evacuating over 9,000 students and hundreds of staff from eight schools in the vicinity of the World Trade Center complex and were able to reunite re·u·nite
tr. & intr.v. re·u·nit·ed, re·u·nit·ing, re·u·nites
To bring or come together again.
[-niting, -nited the other students in New York City to their families, is a credit to all of the administrators and students and to proper planning at the school level. While no school district can ever imagine or plan for a disaster of this magnitude, a very important lesson was learned in the midst Adv. 1. in the midst - the middle or central part or point; "in the midst of the forest"; "could he walk out in the midst of his piece?"
midmost of going through this experience; proactive planning and creativity are essential elements in ensuring the safety of staff and students during an emergency.
Stanley Teitel Principal, Stuyvesant High School Stuyvesant High School, commonly referred to as Stuy, is a New York City public high school that specializes in mathematics and science. The school opened in 1904 on Manhattan's East Side and moved to a new building in Battery Park City in 1992. (located three blocks from Ground Zero)
Our south windows faced the twin towers. Many of the students witnessed things on the morning of 9/11 that weren't pleasant. We evacuated just before the second tower collapsed. After that, we had to vacate To annul, set aside, or render void; to surrender possession or occupancy.
The term vacate has two common usages in the law. With respect to real property, to vacate the premises means to give up possession of the property and leave the area totally devoid of contents. the building for four weeks. The result is that some students have had difficulty coping with day-to-day living. The same is true for some of the staff. For example, a fire alarm went off late in the spring, and three students ended up in the guidance office very upset. It was a false alarm, but they were shaken. We've had counselors come in and meet with individual students and talk to groups. We've also established new security measures Noun 1. security measures - measures taken as a precaution against theft or espionage or sabotage etc.; "military security has been stepped up since the recent uprising"
security . Now all students must present a photo ID to enter the building in the morning. We've put security cameras on every door to monitor the comings and goings of every one in the building. | <urn:uuid:f1235a0a-858d-403d-8f42-c02a6db462e8> | {
"date": "2013-05-24T16:03:49",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9650569558143616,
"score": 3.390625,
"token_count": 3233,
"url": "http://www.thefreelibrary.com/Reflections%3A+the+effects+of+September+11+are+still+being+felt+by...-a097117264"
} |
How to: Validate Against a Data Type for ASP.NET Server Controls
You can validate a user's entry in an ASP.NET Web page against a specific data type to be sure that what the user has entered is a number, or a date, and so on. For example, if you want to collect birth date information on a user registration page, you can use acontrol to make sure that the date is in a recognized format before it is submitted.
To validate against a data type
Add a CompareValidator control to the page and set the following properties:
The ID of the control for which you are checking the data type.
Properties that specify the text and location of the error or errors that will display if the validation fails. For details, see.
Set the data type to compare to by setting the following properties:
The data type to check against. The type is specified using theenumeration, which enables you to use the type names , , , , or .
If the user leaves a control blank, the control passes the comparison validation. To force the user to enter a value, add acontrol as well. For details, see .
Add a test in your ASP.NET Web page code to check for validity. For details, see How to: Test Validity Programmatically for ASP.NET Server Controls. | <urn:uuid:394a5142-3ce5-4b99-87dc-56e5fc8d21d7> | {
"date": "2014-11-28T15:58:32",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931010590.31/warc/CC-MAIN-20141125155650-00148-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8390729427337646,
"score": 2.734375,
"token_count": 279,
"url": "http://msdn.microsoft.com/en-us/library/ad548tzy(d=printer,v=vs.85).aspx"
} |
South Shetland Islands (The name as it would appear in a gazetteer)
South Shetland Islands (The name as it would appear on a map)
If this information is incorrect, please e-mail [email protected]
Feature type: Island
This name originates from United Kingdom. It is part of the Gazetteer of the British Antarctic Territory and the SCAR Composite Gazetteer of Antarctica.
Names that other countries have for this feature:
between 61°00'S and 63°00'S, 54'00'W and 62°45'W, comprising from W to E Smith Island, Snow Island, Livingston Island, Deception Island, Greenwich Island, Robert Island, Nelson Island, King George Island, Gibbs Island, Elephant Island, and Clarence Island, with offliers, were sighted by William Smith at Livingston Island, 19 February 1819; roughly charted by Smith later in the same year and taken into possession in the name of King George III, 16 October, at King George Island. In his proclamation, Smith called the islands New South Britain, 1821, but later changed the name to South Shetland or New South Shetland, because the islands lie in about the same latitude as the Shetland Islands in the N Hemisphere. New or South Shetland (GBR chart, 1822). South Shetland Islands (GBR chart 1839; APC, 1953). For further information see British Antarctic Territory Gazetteer.
No images of this place could be found. | <urn:uuid:a33c6204-c297-42e1-99ed-3d95ab38c38d> | {
"date": "2019-09-15T20:51:00",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572289.5/warc/CC-MAIN-20190915195146-20190915221146-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8025321960449219,
"score": 3.375,
"token_count": 318,
"url": "https://data.aad.gov.au/aadc/gaz/display_name.cfm?gaz_id=111296"
} |
Working memory refers to the process by which small amounts of information relevant to the task at hand are retained for short periods of time. For example, before cellular phones became so ubiquitous, calling someone usually involved first finding the number and then remembering it for a just few seconds by repeating it to oneself several times. Once the digits had been dialled, they are immediately forgotten.
Very little is known about the neural mechanisms underlying working memory, but very recently some advances have been made. Last month, a group from the University of Texas Medical Center described a novel mechanism by which the response of single cells in the prefrontal cortex to a stimulus can persist for many seconds after the stimulus has been removed. They suggested that this could be how cells encode information for short periods of time.
And now, researchers from Vanderbilt University have made another important finding. In an advance online publication in the journal Nature, they report that the parts of the visual cortex which carry out the earliest stages of visual processing play an important part role in retaining simple images in working memory, and demonstrate that the contents of visual working memory can be accurately predicted by decoding neural activity from those parts of the brain.
In the new study, Stephanie Harrison and Frank Tong of the Vanderbilt Vision Research Center focused on the visual cortical areas V1-V4, which contain cells that respond selectively to the simplest characteristics of objects within the visual field, such as contrast and the orientation of bars and edges. They also developed an algorithm to decode the activity associated with perception of two grating patterns, each consisting of diagonal lines of a different orientation.
While in the scanner, participants were presented with these two patterns, one after the other and in a random order. Immediately afterwards, they were cued to remember one of them. A few seconds later, they were presented with a third grating pattern, and asked to indicate the direction in which it was rotated relative to the one they had remembered.
Harrison and Tong isolated the activity correlated with visual working memory by analyzing the data obtained during the 11-second remembering period. Their algorithm enabled them to distinguish between the activity patterns associated with each stimulus and thus to predict, with an accuracy of about 80%, which of the two grating patterns was being retained in visual working memory. It seems that a trace or echo of the activity elcited by the stimuli can maintain an on-going representation of the image viewed seconds earlier.
Thus perception of a stimulus and the temporary retention of that stimulus in visual working memory seem to involve the same subpopulation of neurons. Retention of the images was not related to the overall levels of activity in those groups pf cells- in half of the participants, activity during the remembering period decreased below the baseline level, but could still be decoded accurately. The activity was also very robust: the decoding was equally effective regardless of whether participants retained the first and second pattern, showing that the working memory representations of the images did not interfere with each other.
This study therefore reveals a mechanism by which images can be retained in working memory, and reveals that the visual cortex, whose activity is normally thought of as being driven by external stimuli, is also involved in cognitive function. However, different types of information can be stored in working memory, and it is unlikely that working memory representations of non-visual information would be stored in the visual cortex.
The findings also represent an advance in neuroimaging technology, but their implications should not be exaggerated. The researchers could make their predictions because their algorithm enabled them to distinguish between two different patterns of activity, each associated with the working memory of one of the grating patterns. In the real world, we simutaneously perceive enormous numbers of elaborate visual stimuli, each of which is likely encoded by extremely complex patterns of activity. Our state-of-the-art techniques are therefore nowhere near sophisticated enough to decipher such real world stimuli, let alone the rich and incredibly detailed memories which are stored permanently within the brain.
- Visual images reconstructed from brain activity
- An eye-opening view of visual development
- The eye tells the brain when to plasticize
- Single neurons have RAM-like activity
- Memory lessons from Homer Simpson
- Tracing memories
Harrison, S.A. & Tong, F. (2009). Decoding reveals the contents of visual working memory in early visual areas Nature. DOI: 10.1038/nature07832 | <urn:uuid:51b396b9-3c10-4931-aecf-ce3aa45154dd> | {
"date": "2017-04-29T21:40:20",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123590.89/warc/CC-MAIN-20170423031203-00002-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9638841152191162,
"score": 3.75,
"token_count": 891,
"url": "http://scienceblogs.com/neurophilosophy/2009/02/19/reading-the-contents-of-working-memory/"
} |
Kansas State University family therapist suggests parents relearn to play
Tuesday, April 14, 2015
Play encourages children to be brave, to feel capable, to connect with a caregiver and to feel valued, says Nancy O'Conner, family therapist in the College of Human Ecology at Kansas State University. An early childhood education student plays one-on-one with a preschooler at Hoeflin Stone House on the university campus in Manhattan. | Download the following photo.
MANHATTAN — A Kansas State University family therapist has one word for parents who want to raise a healthy, happy child: Play.
"We find that parents lose the ability to play," Nancy O'Conner said.
O'Conner is director of the Kansas State University Family Center, which provides clinical services to the Manhattan community. She supervises graduate student interns in the marriage and family therapy program. She also is a play therapist and a licensed clinical marriage and family therapist.
"Learning the ABCs is important and children need the opportunity for free play. That's where parent and child interact, make noises, play dress up, chase each other in games of tag, get down on the floor together and play," she said.
Why is play so important?
O'Conner said play encourages the mastery and development of the crucial C's: courage, capable, connect, count.
"We want parents to help their children feel brave, to feel that they can do things, that they belong and that they matter," she said.
Children who have courage believe they can face challenges and are resilient, the therapist said. They feel more positive about themselves, that they matter because they count.
From these very first relationships, children learn to treat others how they are treated and to feel they belong. That feeling of attachment is one of the most important criteria for being a mentally healthy adult, she said.
With these tools, a child will be more adept at handling potential future problems such as bullying, peer pressure and transitions. Children will have the internal resources to handle many situations that they may encounter, O'Conner said.
She suggests how can parents can relearn to play and why:
• Focus attention on the child. Turn off the electronics. Ignore the dirty dishes or briefcase full of work. "It doesn't matter how busy you are, don't sacrifice playtime with your child," she advised. "When a child gets full, undivided attention, he learns he is valued and he will grow up valuing others."
• Enjoy each other. Create traditions for yourself and your child that are specially yours. "Playtime should be joyful," she said. "Play is a time when a child doesn't have to perform so use other time to learn colors."
• Use the child's language. For example, a baby's language is sounds, gestures and expressions. "Pay attention to what the baby is telling you by crying, or smiling, or turning away," she said. Learn to understand that language and meet the baby's needs. When a parent reacts to a baby's language, the baby feels safe and loved.
When a child feels secure, he will believe he can accomplish more — walking, singing, throwing a ball, reading a book — and continue to develop. He will take that feeling of security with him into adulthood, O'Conner said.
"When we give children the tools very early in life, they will feel connected, learn how to treat others and how to respond to others, feel challenged," O'Conner said.
Week of the Young Child, sponsored by the National Association for the Education of Young Children April 12-18, focuses on the foundation for a child's success in school and later life.
Through research, scholarship, teaching and outreach, the faculty in the College of Human Ecology continually seeks ways to nurture healthy children and families. The Family Center, part of the School of Family Studies and Human Services, is one of the college's facilities for training graduate students in marriage and family therapy.
(Part 4 in the series on Raising a Healthy Child will focus on developing tolerance and empathy.) | <urn:uuid:47c45065-bab1-44e7-9784-3c86602434ad> | {
"date": "2018-04-20T22:10:46",
"dump": "CC-MAIN-2018-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944742.25/warc/CC-MAIN-20180420213743-20180420233743-00576.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9635900259017944,
"score": 2.625,
"token_count": 850,
"url": "http://www.k-state.edu/media/newsreleases/apr15/youngchild341415.html"
} |
John M. Schofield
September 29, 1831 – March 4, 1906
John McAllister Schofield began his very successful military career after graduating seventh from the United States Military Academy in 1853. He briefly served in Florida, and then taught philosophy at West Point. In 1860, Schofield took a leave of absence from the army and began to teach at Washington University in St. Louis.
At the outbreak of the war, Schofield first served as mustering officer for the state of Missouri, received the promotion of major of the 1st Missouri Infantry, and served as chief-of-staff under General Nathaniel Lyon at the battle of Wilson’s Creek. On November 21, 1861, Schofield was promoted to brigadier general, and placed in charge of all the Union militia in Missouri. He was placed in charge of the Army of the Frontier, and was promoted to major general on November 29, 1862, though the Senate did not confirm the appointment until May 12, 1863.
He was given command of the XIV Corps in Tennessee, but returned to Missouri in May of 1863 to command the Department of the Missouri. In January of 1864, Schofield led the Army of the Ohio during the Atlanta Campaign under William T. Sherman. When Sherman set off on his infamous “March to the Sea,” Schofield and his command were left under George H. Thomas to stop the invasion of Tennessee led by Confederate General John B. Hood. On November 30, 1864, Schofield successfully repulsed John Bell Hood during the battle of Franklin, and effectively crippled Hood’s army. Two weeks later, during the battle of Nashville, General Thomas used Schofield and his XXIII Corps to effectively destroy what was left of Hood’s army. Schofield received a promotion to brigadier in the regular army for his actions at Franklin.
Schofield was again moved to fight under Sherman in North Carolina. He captured Wilmington, and fought at the battle of Kinston before meeting up with Sherman on March 23, 1865 in Goldsboro. Working together with Sherman, Schofield led the Department of North Carolina until the surrender of Joseph E. Johnston at Durham Station. For his service, he was brevetted to major general in the regular army.
After the war, Schofield went on to become the Secretary of War under President Johnson. He helped with the recommendation of making a naval base a Pearl Harbor, Hawaii, and eventually was promoted to lieutenant general. | <urn:uuid:48f3ee6c-06e3-4fa0-b9e8-ee9bdd3e20e5> | {
"date": "2014-11-26T07:29:55",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931006593.41/warc/CC-MAIN-20141125155646-00236-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9796196818351746,
"score": 3.078125,
"token_count": 518,
"url": "http://www.civilwar.org/education/history/biographies/john-schofield.html"
} |
JUST HOW TO DESIGN AN ESSAY: AVOIDING MAJOR WEAKNESSES IN DOCUMENTS
Inadequate or unfocused sentences that are topic
Usually do not, away from passion, haste, or laziness, abandon the rules of paragraph framework for paragraphs subsequent to your thesis statement. From beginning to end the paper should follow a constant development leading coherently to an acceptable, well orchestrated summary. consequently, make certain each and every paragraph in your paper contains its very own plainly stated subject sentence in addition to the particular details to guide each, though definitely not for the reason that order–the following instance, as an example, begins with a example and concludes with a sentence that is topic
At George Washington Junior senior school, after pupils have been using uniforms just five months, categories of pupils whom previously https://essay-911.com occupied split regions of the meal garden started sitting nearer to one another and speaking with each other more. School administrators determined that the sporting of school uniforms had obscured the socioeconomic differences when considering pupils and triggered more mixing that is social the teams.
Compare the above mentioned instance using the following too-general claim:
Using college uniforms is socially best for junior senior school pupils.
Simply speaking, fuzziness in subject sentences indicates Here, http://alldrugs24h.com/, http://allpills24h.com/, http://buycialisonline24h.com/, http://buypills24h.com/, http://buypillsonline24h.com/, http://buysildenafilonline24h.com/, http://buytadalafilonline24h.com/, http://buyviagraonline24h.com/, http://cheapviagraonline.com/, http://help-essay.info/, http://orderviagracheap.com/, http://tadalafilsildenafil.com/, here, here, here, here, here, here, here, here, here, here, here. fuzziness in reasoning. You will be more likely to write off-topic or jump around from topic to topic if you settle for vagueness in your topic sentences. Making clear your subject sentence–clarifying your thinking–will help toward creating an arranged and persuading paper.
Your thesis statement is just a vow to your audience by what you will protect in your paper. Do not compose “off” this topic; don’t consist of sentences which do not help or elaborate with this idea that is main. For example, if your thesis statement for an expository “process” paper is “Making a collection of bookshelves calls for exact skills,” do not add sentences explaining your author that is favorite or types of publications you want to position into the bookshelves. When your thesis statement for the descriptive paper is “My space is really an accepted spot of refuge,” don’t add a lot more than incidental sources to another components of your house or even to town.
A narrative often appears especially hard to include in the confines of a thesis declaration. Start thinking about, as an example, a narrative paper about the fish that is biggest you ever caught. “the greatest seafood we ever caught at Bass Lake hit to my free home key in the really end of an extended day’s fishing.” a mistake that is common to share with the storyline of this whole fishing journey: whenever you left house, where you stopped for gasoline and bait, a description associated with scenery, an such like. Keep in mind that everything you have actually promised to inform your audience is all about getting the fish that is biggest ever; every sentence and paragraph should relate genuinely to this.
Failing woefully to anticipate objections
Specifically for an argumentative or paper that is persuasive you need to acknowledge and try to over come objections to your thesis. As an example, look at the after thesis statement: “Courses in Western Civilization ought not to be expected of American university students. If they choose Asian, African, or indigenous American Studies, as an example, these should always be appropriate options to Western Studies.” Here are two plausible objections to your statement that is preceding
Western civilization represents the culture that is core of pupils; to reach your goals in this tradition, they have to comprehend it.
The research of Western tradition should really be needed as well as Asian, African, or other countries, to be able to foster comprehension of the current worldwide community.
Objections like these may be merely acknowledged-“Although some individuals assert that most pupils in United states should learn Western tradition. “–or broken down and talked about at length, point by point. Determine whether your topic–or the objection itself–is strong enough to justify step-by-step conversation of opposing viewpoints.
An conclusion that is inadequate
Frequently, pupil article writers should compose a paragraph that is concluding summarizes this issue phrase (in terms distinctive from those used earlier in the day) and restates the thesis (again, in numerous terms). The final outcome will include the essential idea that is important your paper, usually the one you many want visitors to keep in mind. (Some documents may vary; in conclusion to an essay that is narrative for instance, might not follow this pattern.)
My space is just one of the quietest, many gorgeous, and a lot of rooms that are spacious have experienced. Inside the confines of my space, i will work, i could think, i will sleep. It is, certainly, a location of refuge in a loud, crowded, and frequently unsightly globe.
An effective summary “returns” to your product within the introduction–the imagery, metaphor, or analogy Here, http://alldrugs24h.com/, http://allpills24h.com/, http://buycialisonline24h.com/, http://buypills24h.com/, http://buypillsonline24h.com/, http://buysildenafilonline24h.com/, http://buytadalafilonline24h.com/, http://buyviagraonline24h.com/, http://cheapviagraonline.com/, http://help-essay.info/, http://orderviagracheap.com/, http://tadalafilsildenafil.com/, here, here, here, here, here, here, here, here, here, here, here. discovered here, for example. a satisfying conclusion may additionally include one final anecdote to illustrate the thesis. Select a method that appears appropriate to your matter that is subject and tone of one’s paper.
Although novices should adhere to the strategies outlined above, experienced authors usually do one more thing-they draw a summary beyond the true points already made.
I might never be where i will be today if I experienced perhaps maybe not been obligated to see my entire life within an manner that is honest. Liquor nearly killed me times that are many and I have always been nevertheless only 1 beverage far from a life of hell. I have already been sober for nearly 2 yrs, and I also have not experienced happier or maybe more serene. With Jesus’s elegance, i shall remain today that is sober. Tomorrow will require proper care of it self.
This kind of conclusion both summarizes and points out more far-reaching consequences, gives a warning, or offers an alternative suggested by or based on the ideas already put forth while not introducing new material.
In addition to your major weaknesses above, small mistakes can reduce the strength that is apparent of argument and bring about a paper this is certainly merely sufficient. After fixing problems that are major look for some associated with the errors below:
- Fragile, obscure or badly developed introduction
- Sentence errors including
- Unintentional fragmentary sentences
- Run-on sentences, particularly the “comma splice”–using a comma to split up two sentences
- Quick, choppy sentences or not enough phrase variety
- Poor or nonexistent transitions
- Embarrassing sentences because of not enough synchronous structure or as a result of dangling or misplaced modifiers
- Word errors such as for example
- Utilization of the incorrect term or expression, for instance, its or it really is
- Nonstandard English–”they was,” “he don’t,”-use of double negatives, and so forth
- Trite expressions such as “hit the hay,” “gave me personally a turn,” “acid test”
- Monotonous or inadequate repetition
- Incorrect term option for the design, tone, or content: formal language in a casual paper, for instance, or casual language in a paper that is formal.
- Verb tight disagreement
- Incorrect utilization of subjunctive verb types, such as for instance in conditional statements
- Subject/verb non-agreement
- Mistakes in pronoun reference
- “Padding”–using terms in order to fill room
- Plagiarizing, this is certainly, failing continually to cite supply product
Finally, proofread acceptably to improve punctuation, spelling, and errors that are typing | <urn:uuid:57cf3113-07f5-4766-8453-724c0c445de7> | {
"date": "2019-12-11T01:17:55",
"dump": "CC-MAIN-2019-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529516.84/warc/CC-MAIN-20191210233444-20191211021444-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9317663908004761,
"score": 2.6875,
"token_count": 1926,
"url": "http://labscs.com.br/2019/08/just-how-to-design-an-essay-avoiding-major/"
} |
Take a virtual tour of the Deepest Cave in the US
Located in Carlsbad, New Mexico, Lechuguilla Cave holds the record for being the deepest cave in the United States.
The deepest cave in the world is in the western Caucasus mountains of the Georgian Republic. The cave has been named Voronja, or "Crow's Cave" and has officially been verified to be 2140 meters (7,021 feet) deep. You can visit the online resource that has photographs taken inside the cave by the Greek exploration team who plumbed the awesome depths!
Gem Among Caves
Ever since it was discovered, Lechuguilla has been explored and mapped by teams of enthusiastic cavers thrilled by the prospect of discovering things never before seen by human eyes. But not just anybody can go in. The cave is strictly protected because of all the delicate, never-before-seen crystal formations that could be damaged by inexperienced and careless people. There's always the danger of careless humans polluting and destroying the pristine beauty of the caves. Special permits and authority are required for anyone to go in. Not only that, you have to be an experienced caver because just getting into the cave at the entrance can be treacherous. Extreme Science will now take you on a virtual tour, so put on your helmets and let's go down....
The Lechuguilla Experience
We climb down an almost vertical 118 feet of rope, canal, ladder, and culvert before we are officially inside the cave. Now that we're here, you'll notice that it's a pleasant 68°F/20°C inside, a lot cooler than the broiling 105°F/41°C temperatures outside the cave today. As we move forward into the cave you start to feel the oppressive humidity - nearly 100%. Even the slightest movement makes you sweat and there's no breeze in your face to cool you. Down here in the depths of Lechuguilla silence takes on a new meaning. When we stop and sit to take a much needed break, all we hear is the beating of our hearts, our own breathing, the blood rushing in our ears. This is what it means to hear LOUD silence.
We press on and you become aware of all the earth above that lies between you and blue sky, how long it will take you to get back. We climb further on through some incredibly tight spaces, spaces so small we have to squeeze our bodies through lying down. You become keenly aware of how incredibly BLACK the darkness is in the cave, your only light the small lamp attached to your helmet. You begin to wonder, "What will I do if my light goes out?" But you are prepared. Being down here with experienced cavers, we have brought back-up batteries, bulbs, lamps, plenty of fluids and emergency supplies. You are now deep inside the cave and there is only one way out - the way we came in.
It's about time we saw some cool crystals - that is what we came in here to see, after all.... Now, let's move forward with the virtual tour and look at this really cool Bottle Brush Crystal - >
Copyright © 1998-2013. Extreme Science is a registered trademark. All rights reserved. | <urn:uuid:2dea6df0-812f-453c-9994-aaaba53ceace> | {
"date": "2014-08-01T01:40:07",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273874.36/warc/CC-MAIN-20140728011753-00414-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9497509002685547,
"score": 2.71875,
"token_count": 663,
"url": "http://www.extremescience.com/cave-tour.htm"
} |
After Higgs Boson, scientists prepare for next quantum leapFebruary 13th, 2013 in Physics / General Physics
A graphic distributed on July 4, 2012 by CERN in Geneva shows a representation of traces of a proton-proton collision measured in the search for the Higgs boson. Seven months after its scientists made a landmark discovery that may explain the mysteries of mass, Europe's top physics lab will take a break from smashing invisible particles to recharge for the next leap into the unknown.
Seven months after its scientists made a landmark discovery that may explain the mysteries of mass, Europe's top physics lab will take a break from smashing invisible particles to recharge for the next leap into the unknown.
From Thursday, the cutting-edge facilities at the European Organisation for Nuclear Research (CERN) will begin winding down, then go offline on Saturday for an 18-month upgrade.
A vast underground lab straddling the border between France and Switzerland, CERN's Large Hadron Collider (LHC) was the scene of an extraordinary discovery announced in July 2012.
Its scientists said they were 99.9 percent certain they had found the elusive Higgs Boson, an invisible particle without which, theorists say, humans and all the other joined-up atoms in the Universe would not exist.
The upgrade will boost the LHC's energy capacity, essential for CERN to confirm definitively that its boson is the Higgs, and allow it to probe new dimensions such as supersymmetry and dark matter.
"The aim is to open the discovery domain," said Frederick Bordry, head of CERN's technology department.
"We have what we think is the Higgs, and now we have all the theories about supersymmetry and so on. We need to increase the energy to look at more physics. It's about going into terra incognita (unknown territory)," he told AFP.
Theorised back in 1964, the boson also known as the God Particle carries the name of a British physicist, Peter Higgs.
He calculated that a field of bosons could explain a nagging anomaly: Why do some particles have mass while others, such as light, have none?
That question was a gaping hole in the Standard Model of particle physics, a conceptual framework for understanding the nuts-and-bolts of the cosmos.
One idea is that the Higgs was born when the new Universe cooled after the Big Bang some 14 billion years ago.
It is believed to act like a fork dipped in honey and held up in dusty air.
Most of the dust particles interact with the honey, acquiring some of its mass to varying degrees, but a few slip through and do not acquire any. With mass comes gravity—and its pulling power brings particles together.
Supersymmetry, meanwhile, is the notion that there are novel particles which are the opposite number of each of the known particle actors in the Standard Model.
This may, in turn, explain the existence of dark matter—a hypothetical construct that can only be perceived indirectly via its gravitational pull, yet is thought to make up around 25 percent of the Universe.
At a cost of 6.03 billion Swiss francs (4.9 billion euros, $6.56 billion dollars), the LHC was constructed in a 26.6-kilometre (16.5-mile) circular tunnel originally occupied by its predecessor, the Large Electron Positron (LEP).
That had run in cycles of about seven months followed by a five-month shutdown, but the LHC, opened in 2008, has been pushed well beyond.
"We've had full operations for three years, 2010, 2011 and 2012," said Bordry.
"Initially we thought we'd have the long shutdown in 2012, but in 2011, with some good results and with the perspective of discovering the boson, we pushed the long shutdown back by a year. But we said that in 2013 we must do it."
Unlike the LEP, which was used to accelerate electrons or positrons, the LHC crashes together protons, which are part of the hadron family.
"The game is about smashing the particles together to transform this energy into mass. With high energy, they are transformed into new particles and we observe these new particles and try to understand things," Bordry explained.
"It's about recreating the first microsecond of the universe, the Big Bang. We are reproducing in a lab the conditions we had at the start of the Big Bang."
Over the past three years, CERN has slammed protons together more than six million billion times.
Five billion collisions yielded results deemed worthy of further research and data from only 400 threw up data that paved the road to the Higgs Boson.
Despite the shutdown, CERN's researchers won't be taking a breather, as they must trawl through a vast mound of data.
"I think a year from now, we'll have more information on the data accumulated over the past three years," said Bordry. "Maybe the conclusion will be that we need more data!"
Last year, the LHC achieved a collision energy level of eight teraelectron volts, an energy measure used in particle physics—up from seven in 2011.
After it comes back online in 2015, the goal is to take that level to 13 or even 14, with the LHC expected to run for three or four years before another shutdown.
The net cost of the upgrade is expected to be up to 50 million Swiss francs.
CERN's member states are European, but the prestigious organisation has global reach. India, Japan, Russia and the United States participate as observers.
(c) 2013 AFP
"After Higgs Boson, scientists prepare for next quantum leap." February 13th, 2013. http://phys.org/news/2013-02-higgs-boson-scientists-quantum.html | <urn:uuid:d348472a-a0ad-45b4-ac28-b6f820112b17> | {
"date": "2013-06-19T06:09:41",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9535569548606873,
"score": 3.1875,
"token_count": 1222,
"url": "http://phys.org/print279980191.html"
} |
Last summer, a man in Kansas went to the hospital with symptoms of a tick-borne disease, including high fever, fatigue and a lack of appetite.
Despite the doctors' best efforts to treat him, within 10 days he suffered organ failure and died.
Now, researchers say that they have identified a new virus found in the patient's blood stream.
The virus, named Bourbon virus after Bourbon County, Kansas, where the man was from, is part of a family of viruses called the orthomyxoviruses, which includes influenza. This particular virus seems to be from a smaller group of viruses called thogotoviruses, which tend to be transmitted by ticks.
In a video posted by the University of Kansas Hospital, Dr. Dana Hawkinson, who treated the patient, talks about some of the stranger aspects of the virus. Its closest known relatives are in Eastern Europe, Africa, and Asia, but none have been found in the Western Hemisphere, until now. Oddly, those related viruses have only ever infected a handful of animals and humans.
This week, the Kansas Department of Health and Environment announced that they are working closely with the CDC to test blood samples and see if this virus has shown up anywhere else.
"I think we have to assume this has been around for some time, and we haven't been able to diagnose it," Dr. Hawkinson told the New York Times. "We suspect there have been milder cases and people have recovered from them, but we don't have a lot of information."
Because the virus is so newly identified and has only caused one confirmed case, there is no vaccine, and no known course of treatment. Experts are encouraging people to avoid being bitten by ticks. That's easy enough in winter, when ticks aren't generally active, but could be a challenge for people who enjoy hiking in the woods in warmer months.
The CDC's recommendations for preventing tick bites includes avoiding walking through thick underbrush, using an insect repellent that contains DEET, and checking yourself, your clothing and your pets for ticks as soon as you come inside.
This article originally appeared on Popular Science | <urn:uuid:303b0dfd-e744-4758-9ed3-bfcf26c449e1> | {
"date": "2018-12-15T07:49:13",
"dump": "CC-MAIN-2018-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826800.31/warc/CC-MAIN-20181215061532-20181215083532-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9757022857666016,
"score": 3.171875,
"token_count": 438,
"url": "https://www.businessinsider.com/deadly-tick-borne-bourbon-virus-discovered-2014-12"
} |
The Johnson County School System Administration and Board of Education meets annually to develop and refine the school system’s mission and beliefs. Sub-committees have been assigned annually and include school system employees, students, parents and other stakeholders to develop the system’s beliefs, mission, goals and shared visions. The retreats include an in-depth look at the data input from stakeholders and trends in education. Various meetings have included an ongoing and comprehensive analysis of system data and have encouraged input from all stakeholders as well as attention to current research-based trends in education.
Johnson County School System will provide a rigorous and relevant education for all students in a safe, positive environment that enables students to develop and successfully pursue lifelong learning goals.
- All students have an equal right to a quality education in a safe, positive environment.
- All students can achieve their potential if provided with appropriate opportunities.
- Education can empower each student to achieve an optimum level of social, emotional, intellectual and academic success.
- A strong partnership between school, home and community is essential.
- Innovation in education is imperative to meet the needs of our youth and society.
All Johnson County Schools’ students will meet or exceed national standards and will be college or career ready upon high school graduation.
- The Johnson County Schools’ Board of Education will continue to pursue credentials to maintain status as a TSBA Board of Distinction
- Infrastructure that supports innovative technology will be provided to increase effectiveness and efficiency of instruction, assessment and evaluation of students.
- All students will be reading at grade level.
- There will be an increase in stakeholders actively participating in shared decision-making.
Equal opportunity employment and Auxiliary aids and services are available upon request to individuals with disabilities.
Johnson County Schools, as an Equal Opportunity Institution, complies with federal and state laws prohibiting discrimination and harassment, including Title IV and Title VII (with amendments) of the 1964 Civil Rights Act, Title IX of the Educational Amendment of 1972, Section 504 of the Rehabilitation Act of 1973, Veterans Readjustments Act of 1974 as amended 38 USC 20-12 and the Americans with Disabilities Act of 1990. It is the policy that no person, on the basis of race, sex, height, weight, color, national origin or ancestory, age, marital status, disability, or veteran status, shall be discriminated against in educational programs or activities, employment and admission.
Copyright 1997 - 2014 Johnson County Department of Education. All Rights Reserved. | <urn:uuid:b7593bab-19da-4263-bd2b-1ad04a5442f1> | {
"date": "2014-08-22T05:53:52",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823169.67/warc/CC-MAIN-20140820021343-00170-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9361977577209473,
"score": 2.578125,
"token_count": 509,
"url": "http://www.jocoed.k12tn.net/"
} |
Ethics is a system of moral principles which govern a person’s behaviour or the conducting of an activity.
Professional Ethics in Lawyer’s perspective
Professional ethics means the code of rules which regulates the behaviour and conduct a practicing lawyer towards his client, opposite party, court and himself. The moral principles which are applied to normal citizens in the society shall be applied to the lawyers too.
Ethics is very important in law, it is the corner stone of Legal Practice. Lawyers come across with many poor-illiterate clients. They don’t know what is good for them, what is the bad for them. If the lawyers start misusing their position to make quick material gains, then the profession per se would be tainted. Legal practice without ethics, would be an abomination.
Professional ethics consists of those fundamental values on which the profession has been built. Legal ethics is one of the professional ethics which lays down the duties for the observations of members, which he owes to the society, court, profession, client, opposition and himself.
The practicing lawyer shall have social responsibility and dignity of this profession and high standard of integrity. | <urn:uuid:2a60e6b6-5009-40f8-a187-9503fc18f521> | {
"date": "2019-11-19T13:42:19",
"dump": "CC-MAIN-2019-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670151.97/warc/CC-MAIN-20191119121339-20191119145339-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9661096930503845,
"score": 3.171875,
"token_count": 235,
"url": "http://lawbaba.in/legal-ethics/"
} |
There is nothing “natural” about a disaster. Nature provides the hazards – earthquakes, volcanic eruptions, floods and so on – but humans help create the disaster. We cannot prevent a volcanic eruption but we can prevent it from becoming a disaster.
A volcano that erupts in a middle of the wilderness, for example, is a natural hazard. But if it erupts near a large city it has the potential to turn into a disaster, threatening the lives of hundreds of thousands of people and their communities.
Here are many ways to prevent or lessen the impact of a disaster: by integrating volcano risk in urban planning; reducing the number of people living close to a volcano; educating and alerting them about the dangers; preparing them to evacuate when the volcano erupts and; identifying shelters to protect them. These are all
measures covered within disaster risk reduction.
Once we understand that there is a difference between “natural hazard” and “disaster”, we then understand that disasters are mostly human-induced, and increasingly triggered by human activities such as deforestation, rapid urbanization, environmental degradation and climate change. | <urn:uuid:b4016eba-6963-45c7-a0b9-a2e4889d1d7f> | {
"date": "2017-12-12T04:23:24",
"dump": "CC-MAIN-2017-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948515165.6/warc/CC-MAIN-20171212041010-20171212061010-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9520951509475708,
"score": 4.0625,
"token_count": 230,
"url": "http://www.enhanceproject.eu/news/articles/42"
} |
Human genes for pulmonary emphysema
Pulmonary emphysema [DOID:9675]
Emphysema is a long-term, progressive disease of the lungs that primarily causes shortness of breath. In people with emphysema, the tissues necessary to support the physical shape and function of the lungs are destroyed. It is included in a group of diseases called chronic obstructive pulmonary disease or COPD (pulmonary refers to the lungs). Emphysema is called an obstructive lung disease because the destruction of lung tissue around smaller sacs, called alveoli, makes these air sacs unable to hold their functional shape upon exhalation. It is often caused by long-term exposure to air pollution or smoking.
Synonyms: pulmonary emphysema, DOID:9675 | <urn:uuid:cd8b3b80-6176-4752-ac9d-dd436284bbea> | {
"date": "2014-09-21T18:08:49",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657135777.13/warc/CC-MAIN-20140914011215-00243-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9425472617149353,
"score": 3.328125,
"token_count": 170,
"url": "http://diseases.jensenlab.org/Entity?network=10&textmining=10&type1=-26&type2=9606&id1=DOID:9675"
} |
The Newberry Library’s Dr. William Scholl Center for American History and Culture hosted a four-week summer 2014 NEH seminar for college and university faculty that explored the history of North America’s border and borderlands, providing participants with a stipend of $3,300. In keeping with the recent work in the field and the collection strengths of the Newberry Library, this seminar took a broad geographic approach, framing borderlands as distinct places at particular moments in time where no single people or sovereignty imposed its will. The organizing theme is the process of border-making. We examined three aspects of this theme: how nation-states claiming exclusive territorial sovereignty re-drew the continent’s map; the intersection and sometimes collision of these efforts with other ways of organizing space and people; and the social and political consequences of the enforcement of national territoriality. Two questions guided our examinations of these developments: how did diverse peoples challenge national borders, or use or alter them for their own purposes? And, how does consideration of these topics recast our understanding of the national and intertwined histories of Mexico, the United States, and Canada?
Please see the following for more information:
- About the Institute
- Institute Schedule
- Borderlands Research at the Newberry
- Eligibility Requirements
- Application Instructions
Any views, findings, conclusions, or recommendations expressed here do not necessarily reflect those of the National Endowment for the Humanities. | <urn:uuid:6b0db383-e107-48c1-b2d0-3027353a2247> | {
"date": "2015-03-28T14:22:53",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131297587.67/warc/CC-MAIN-20150323172137-00038-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9022005796432495,
"score": 2.953125,
"token_count": 295,
"url": "http://newberry.org/06022014-bridging-national-borders-north-america"
} |
If the biblical account of history is true, then man and dinosaurs lived at the same time. Some believe that this accounts for the almost universal legends of dragons. In many parts of the world, these legends were passed orally from generation to generation. Unfortunately, it takes only a few hundred years for such legends to become distorted. America was already a country when Europeans got around to settling in Australia. There they found that the local Aborigines had oral accounts of monsters. The Aboriginal people insisted these were real flesh-and-blood creatures.
Aborigines in the northern and eastern parts of Australia tell of the burrunjor. Their descriptions matched that of the allosaurus. As late as 1961 in this part of Australia a tracker reported a bipedal reptile 25 feet long. Aborigines in central Australia tell of the kulta, which is described very much like a diplodocus or apatosaurus. Like these dinosaurs, kulta lived in swamps and ate plants. Cave drawings in northern Australia depict similar creatures. Aborigines refused to settle on Lake Galilee in western Queensland because a monster lived in the lake. This creature, which they called a bunyip, sounds like a plesiosaur.
The fact that the Aboriginal descriptions so accurately match dinosaurs known to the rest of the world show that these are recent memories – exactly what we would expect if the biblical history is accurate. | <urn:uuid:e4533aec-acb4-4e74-b3e8-c528cefd9670> | {
"date": "2014-12-19T11:58:57",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768425.151/warc/CC-MAIN-20141217075248-00171-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9577813148498535,
"score": 3.265625,
"token_count": 289,
"url": "http://www.creationmoments.com/node/2352"
} |
C++ Programming: C++ code
Code is the string of symbols interpreted by a computer in order to execute a given objective. As with natural languages, code is the result of all the conventions and rules that govern a language. It is what permits implementation of projects in a standard, compilable way. Correctly written code is used to create projects that serve as intermediaries for natural language in order to express meanings and ideas. This, theoretically and actually, allows a computer program to solve any explicitly-defined problem.
- undefined behavior
It is also important to note that the language standard leaves some items undefined. Undefined items are not unique to the C++ language, but can confuse unaware newcomers if they produce inconsistent results. The undefined nature of these items becomes most evident in cross-platform development that requires the use of multiple compilers, since the specific implementation of these items is the result of the choices made by each compiler.
The task of programming, while not easy in its execution, is actually fairly simple in its goals. A programmer will envision, or be tasked with, a specific goal. Goals are usually provided in the form of "I want a program that will perform...fill in the blank..." The job of the programmer then is to come up with a "working model" (a model that may consist of one or more algorithms). That "working model" is sort of an idea of how a program will accomplish the goal set out for it. It gives a programmer an idea of what to write in order to turn the idea into a working program.
Once the programmer has an idea of the structure their program will need to take in order to accomplish the goal, they set about actually writing the program itself, using the selected programming language(s) keywords, functions and syntax. The code that they write is what actually implements the program, or causes it to perform the necessary task, and for that reason, it is sometimes called "implementation code".
What is a program?
To restate the definition, a program is just a sequence of instructions, written in some form of programming language, that tells a computer what to do, and generally how to do it. Everything that a typical user does on a computer is handled and controlled by programs. Programs can contain anything from instructions to solve math problems or send emails, to how to behave when a character is shot in a video game. The computer will follow the instructions of a program one line at a time from the start to the end.
Types of programs
There are all kinds of different programs used today, for all types of purposes. All programs are written with some form of programming language and C++ can be used for in any type of application. Examples of different types of programs, (also called software), include:
- Operating Systems
- An operating system is responsible for making sure that everything on a computer works the way that it should. It is especially concerned with making certain that your computer's "hardware", (i.e. disk drives, video card and sound card, and etc.) interfaces properly with other programs you have on your computer. Microsoft Windows and Linux are examples of PC operating systems.
- Office Programs
- This is a general category for a collection of programs that allow you to compose, view, print or otherwise display different kinds of documents. Often such "suites" come with a word processor for composing letters or reports, a spreadsheet application and a slide-show creator of some kind among other things. Popular examples of Office Suites are Microsoft Office and OpenOffice.org
- Web Browsers & Email Clients
- A web-browser is a program that allows you to type in an Internet address and then displays that page for you. An email client is a program that allows you to send, receive and compose email messages outside of a web-browser. Often email clients have some capability as a web-browser as well, and some web-browsers have integrated email clients. Well-known web-browsers are Internet Explorer and Firefox, and Email Clients include Microsoft Outlook and Thunderbird. Most are programmed using C++, you can access some as Open-source projects, for instance (http://www.mozilla.org/projects/firefox/) will help you download and compile Firefox.
- Audio/Video Software
- These types of software include media players, sound recording software, burning/ripping software, DVD players, etc. Many applications such as Windows Media Player, a popular media player programmed by Microsoft, are examples of audio/video software.
- Computer Games
- There are countless software titles that are either games or designed to assist with playing games. The category is so wide that it would be impossible to get in to a detailed discussion of all the different kinds of game software without creating a different book! Gaming is one of the most popular activities to engage in on a computer.
- Development Software
- Development software is software used specifically for programming. It includes software for composing programs in a computer language (sometimes as simple as a text editor like Notepad), for checking to make sure that code is stable and correct (called a debugger), and for compiling that source code into executable programs that can be run later (these are called compilers). Oftentimes, these three separate programs are combined in to one bigger program called an IDE (Integrated Development Environment). There are all kinds of IDEs for every programming language imaginable. A popular C++ IDE for Windows and Linux is the Code::Blocks IDE (Free and Open Source). The one type of software that you will learn the most about in this book is Development Software.
Types of instructions
As mentioned already, programs are written in many different languages, and for every language, the words and statements used to tell the computer to execute specific commands are different. No matter what words and statements are used though, just about every programming language will include statements that will accomplish the following:
- Input is the act of getting information from a keyboard or mouse, or sometimes another program.
- Output is the opposite of input; it gives information to the computer monitor or another device or program.
- All computer processors (the brain of the computer), have the ability to perform basic mathematical computation, and every programming language has some way of telling it to do so.
- Testing involves telling the computer to check for a certain condition and to do something when that condition is true or false. Conditionals are one of the most important concepts in programming, and all languages have some method of testing conditions.
- Perform some action repeatedly, usually with some variation.
Believe it or not, that's pretty much all there is to it. Every program you've ever used, no matter how complicated, is made up of functions that look more or less like these. Thus, one way to describe programming is the process of breaking a large, complex task up into smaller and smaller subtasks until eventually the subtasks are simple enough to be performed with one of these simple functions.
Execution control or simply control, means the process and the location of execution of a program, this has a direct link to procedural programming. You will note the mention of control as we proceed, as it is necessary concept to explain the order of execution of code and its interpretation by the computer.
Core vs Standard Library
The Core Library consists of the fundamental building blocks of the language itself. Made up of the basic statements that the C++ compiler inherently understands. This includes basic looping constructs such as the if..else, do..while, and for.. statements. The ability to create and modify variables, declare and call functions, and perform basic arithmetic. The Core Library does not include I/O functionality.
The Standard Library is a set of modules that add extended functionality to the language through the use of library or header files. Features such as Input/Output routines, advanced mathematics, and memory allocation functions fall under this heading. All C++ compilers are responsible for providing a Standard Library of functions as outlined by the ANSI/ISO C++ guidelines. Deeper understanding about each module will be provided on the Standard C Library, Standard input/output streams library and Standard Template Library (STL) sections of this book.
How the instructions of a program are written out and stored is generally not a concept determined by a programming language. Punch cards used to be in common use, however under most modern operating systems the instructions are commonly saved as plain text files that can be edited with any text editor. These files are the source of the instructions that make up a program and so are sometimes referred to as source files but a more exclusive definition is source code.
When referring to source code or just source, you are considering only the files that contain code, the actual text that makes up the functions (actions) for computer to execute. By referring to source files you are extending the idea to not only the files with the instructions that make up the program but all the raw files resources that together can build the program. The File Organization Section will cover the different files used in C++ programming and best practices on handling them.
Keywords and identifiers
Identifiers are names given to variables, functions, objects, etc. to refer to them in the program. C++ identifiers must start with a letter or an underscore character "
_", possibly followed by a series of letters, underscores or digits. None of the C++ programming language keywords can be used as identifiers. Identifiers with successive underscores are reserved for use in the header files or by the compiler for special purpose, e.g. name mangling.
Some keywords exists to directly control the compiler's behavior, these keywords are very powerful and must be used with care, they may make a huge difference on the program's compile time and running speed. In the C++ Standard, these keywords are called Specifiers.
Special considerations must be given when creating your own identifiers, this will be covered in Code Style Conventions Section.
ISO C++ keywords
The C++98 standard recognized the following keywords:
Specific compilers may (in a non-standard compliant mode) also treat some other words as keywords, including
typeof. Old compilers may recognize the
overload keyword, an anachronism that has been removed from the language.
The current revision of C++, known as C++11, added some keywords:
C++11 also added two special words which act like keywords in some contexts, but can be used as ordinary identifiers most of the time:
It would be bad practice to use these as identifiers when writing new code.
The C++98 keywords auto, default, delete and using have additional or changed uses in C++11.
Some old C++98 compilers may not recognize some or all of the following keywords:
C++ reserved identifiers
Some "nonstandard" identifiers are reserved for distinct uses, to avoid conflicts on the naming of identifiers by vendors, library creators and users in general.
Reserved identifiers include keywords with two consecutive underscores (__), all that start with an underscore followed by an uppercase letter and some other categories of reserved identifiers carried over from the C library specification.
A list of C reserved identifiers can be found at the Internet Wayback Machine archived page: http://web.archive.org/web/20040209031039/http://oakroadsystems.com/tech/c-predef.htm#ReservedIdentifiers
- Source code
Source code is the halfway point between human language and machine code. As mentioned before, it can be read by people to an extent, but it can also be parsed (converted) into machine code by a computer. The machine code, represented by a series of 1's and 0's, is the only code that the computer can directly understand and act on.
In a small program, you might have as little as a few dozen lines of code at the most, whereas in larger programs, this number might stretch into the thousands or even millions. For this reason, it is sometimes more practical to split large amounts of code across many files. This makes it easier to read, as you can do it bit by bit, and it also reduces compile time of each source file. It takes much less time to compile a lot of small source files than it does to compile a single massive source file.
Managing size is not the only reason to split code, though. Often, especially when a piece of software is being developed by a large team, source code is split. Instead of one massive file, the program is divided into separate files, and each individual file contains the code to perform one particular set of tasks for the overall program. This creates a condition known as Modularity. Modularity is a quality that allows source code to be changed, added to, or removed a piece at a time. This has the advantage of allowing many people to work on separate aspects of the same program, thereby allowing it to move faster and more smoothly. Source code for a large project should always be written with modularity in mind. Even when working with small or medium-sized projects, it is good to get in the habit of writing code with ease of editing and use in mind.
C++ source code is case sensitive. This means that it distinguishes between lowercase and capital letters, so that it sees the words "hello," "Hello," and "HeLlO" as being totally different things. This is important to remember and understand, it will be discussed further in the Coding style conventions Section. | <urn:uuid:9334655e-ec34-40ea-82d3-4e577e3419e4> | {
"date": "2017-11-20T17:43:10",
"dump": "CC-MAIN-2017-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806086.13/warc/CC-MAIN-20171120164823-20171120184823-00656.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9318458437919617,
"score": 4.0625,
"token_count": 2779,
"url": "https://en.wikibooks.org/wiki/C%2B%2B_Programming/Programming_Languages/C%2B%2B/Code"
} |
Late in the afternoon of February 1, 1960, four young black men — Ezell Blair Jr., David Richmond, Franklin McCain, and Joseph McNeil, all students at North Carolina Agricultural and Technical College in Greensboro — visited the local Woolworth’s five-and-dime store. They purchased school supplies and toothpaste, and then they sat down at the store’s lunch counter and ordered coffee.
“I’m sorry,” said the waitress. “We don’t serve Negroes here.”
The four students refused to give up their seats until the store closed. The local media soon arrived and reported the sit-in on television and in the newspapers.
The four students returned the next day with more students, and by February 5 about 300 students had joined the protest, generating more media attention. Their action inspired students at other colleges across the South to follow their example. By the end of March sit-ins had spread to 55 cities in 13 states. Many students, mostly black but also white, were arrested for trespassing, disorderly conduct, or disturbing the peace.
In hundreds of cities across the country, Americans of conscience — led by churches and synagogues, unions, and college students — demonstrated their support for the sit-ins by picketing in front of Woolworths stores, urging people to boycott the national chain until it desegregated its Southern lunch counters.
The Greensboro Woolworths ended its policy of segregation a few weeks after the North Carolina A&T students began their protest. Within months, hundreds of other lunch counters, department stores, and other retail businesses throughout the South announced plans to serve all customers equally. The sit-ins, the picketing by allies, the consumer boycott, and the negative publicity had worked.
Most conservatives and even some liberals — black and white — thought that the student activists were too radical. But their actions galvanized a new wave of civil rights protest.
At the invitation of organizer Ella Baker, over Easter weekend — April 16-18 — several hundred sit-in activists and their allies came to Shaw University, a black college in Raleigh, North Carolina, to discuss how to capitalize on the sit-ins’ growing momentum and publicity.
This gathering became the founding meeting of the Student Nonviolent Coordinating Committee (SNCC). Its growing base of supporters played key roles in the freedom rides, marches, and voter registration drives that eventually led Congress to enact the Civil Rights Act of 1964 and the Voting Rights Act of 1965.
Many SNCC activists became key leaders in subsequent battles for social justice. One was Marion Wright Edelman, founder of the Children’s Defense Fund. Another was Congressman John Lewis, who courageously risked his life many times for social justice, but whom Donald Trump, in one of his recent twitter tantrums, criticized as “all talk, no action.”
Two weeks ago, over four million Americans took to the streets to resist Donald Trump’s assault on women’s rights, immigrants, Muslims, civil liberties, workers’ rights, environmental justice, and the basic tenets of our democracy. Last weekend, Americans again took to the streets (and airports) to oppose Trump’s ban on admitting refugees and immigrants to this nation of immigrants. Every day since Trump took office, Americans have taken to the streets, and will continue to take to the streets, to challenge Trump’s threat to our democracy.
The struggle continues. This is how people make history. | <urn:uuid:c36bcede-e304-4c9b-af1b-44a01c8389c2> | {
"date": "2018-09-25T11:52:02",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267161501.96/warc/CC-MAIN-20180925103454-20180925123854-00136.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9662899971008301,
"score": 3.53125,
"token_count": 726,
"url": "https://www.commondreams.org/views/2017/02/01/57-years-ago-today-how-four-college-students-started-revolution"
} |
from The American Heritage® Dictionary of the English Language, 4th Edition
- n. A compound of hydrogen with another, more electropositive element or group.
from Wiktionary, Creative Commons Attribution/Share-Alike License
- n. a compound of hydrogen with a more electropositive element
from the GNU version of the Collaborative International Dictionary of English
- n. A compound of the binary type, in which hydrogen is united with some other element.
from The Century Dictionary and Cyclopedia
- n. See hydrid.
from WordNet 3.0 Copyright 2006 by Princeton University. All rights reserved.
- n. any binary compound formed by the union of hydrogen and other elements
Sorry, no etymologies found.
Helium hydride is the simplest heteronuclear molecule (besides HD), yet its spectrum had not been observed.
LoGrasso and Wright tackled the main question on everyone’s mind: why lithium-ion when nickel metal hydride is a battery technology that, according to LoGrasso, is “nearing maturity in cost and performance.”
Price is one of them: lithium-ion batteries currently cost twice as much as nickel-metal-hydride, which is why GM says its plug-in Chevy Volt could cost nearly $40,000 when it hits the streets in late 2010.
REINER: No, it is called a hydride -- whatever it is.
Secondly, additional amounts of tritium placed in the proper location nearby the fission device - called a "primary" in this case - begin a fusion reaction There are other ways of doing this, of course The chemicals of choice are lithium-deuteride and lithium-hydride, which is more stable, but tritium is still extremely useful for certain weapons applications '
But Hayasaki said Nissan's unique system enables it to better control the motor by using a lithium-ion battery instead of nickel-metal hydride, which is slower in capturing and discharging energy.
In particular, the team identified that the first step of the FTDS-catalyzed reaction involves the transfer of a proton and two electrons, known as a hydride, from a flavin co-factor molecule to dUMP whereas the first step of the TS-catalyzed reaction involves an amino acid from the enzyme's active site forming a bond with dUMP.
Under the steeply raked hood, the Prius v hosts the now-familiar Prius gas-electric drivetrain, consisting of a 1.8-liter gas engine working with two motor/generators and the nickel-metal hydride battery pack, sluicing mechanical force and regenerated electrons back and forth through the car's power-splitting planetary gearset.
Toyota's Hybrid Synergy Drive, the energy management system first deployed in the Prius, has proven to be dead reliable, and the nickel-metal hydride battery packs have outlasted even the most optimistic estimates.
Toyota The Prius v hosts the now-familiar Prius gas-electric drivetrain, consisting of a 1.8-liter gas engine working with two motor/generators and the nickel-metal hydride battery pack. | <urn:uuid:36d15725-d744-4cee-a2f3-2041d46e3a7d> | {
"date": "2015-07-07T18:11:53",
"dump": "CC-MAIN-2015-27",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375099758.82/warc/CC-MAIN-20150627031819-00226-ip-10-179-60-89.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.889170229434967,
"score": 2.9375,
"token_count": 678,
"url": "https://www.wordnik.com/words/hydride"
} |
An educational resource for students and teachers studying Earth's history, fossils, and evolution.
Unlike almost all other sites, this site uses plants as the key organisms for studying the evolutionary changes on Earth. As we all learned, photosynthesis is basis to almost all life on Earth. This was especially true in the past, and therefore plants (i.e. photosynthetic organisms) serve as the perfect lens with which to study evolutionary change.
This website is organized to provide this information in several different approaches.
- What is Paleobotany? What is a fossil? What are researchers trying to decipher? What problems do they encounter?
- Mini-sessions: The evolution of land plants is divided into four time periods for easy comprehension. This was a short course taught at The New York Botanical Garden.
- Narrative: If you are new to the evolutionary history of plants, you may want to explore the section. This section is divided into 10 successive phases of Earth's history. The learning approach of this section is for people who prefer a factual story-based explanation of how things have changed.
- Geologic Periods: This section provides detailed information about the Earth's history from a climate, geology, and geography perspective. It will also mention the origins of major groups through the lens of the Earth's timescale.
- Plant Classification: This section provides detailed information about the evolutionary relationship and taxonomic groups of plants both living and extinct. This section provides information about the structural and physiological changes that appear throughout the evolutionary history of plants.
- Terminology: This is a reference section for clarification about technical terms that appear throughout the website and paleobotanical literature | <urn:uuid:e5a2b197-9544-494e-8876-2d60e12cc772> | {
"date": "2015-04-01T18:26:34",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131305143.93/warc/CC-MAIN-20150323172145-00058-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9294158816337585,
"score": 3.84375,
"token_count": 343,
"url": "https://sites.google.com/site/paleoplant/"
} |
There are all sorts of findings and experiments that could have falsified evolution. In the century-and-a-half since Darwin published his theory, not one has
To count as science, hypotheses and theories should make predictions that might turn out to be wrong. In other words, it should be possible to falsify these ideas. Some claim this is not true of evolution, but this is simply because we find it hard to imagine how different life might have been if it had not evolved.
When asked what would disprove evolution, the biologist J. B. S. Haldane reportedly growled: "Fossil rabbits in the Precambrian". What he meant is that the progression over time seen in the millions of fossils unearthed around the world is exactly what evolutionary theory predicts.
Unicellular organisms, for example, appear before multicellular ones. Jawless fish precede jawed fish. Lunged fish precede amphibians. Amphibians precede reptiles. Reptiles with scales precede mammals and birds with modified scales (fur and feathers). Apes precede humans. All it would take is one or two exceptions to seriously challenge the theory.
Clearly if the first fossil amphibians were older than the first fossil fish, it would show that amphibians could not have evolved from fish. No such exceptions have ever been found anywhere. There have been a few claims to this effect, of course, but even most creationists admit that these claims are fraudulent.
Rabbits with feathers could also disprove evolution. There are animals with a mixture of mammalian and reptilian features, such as echidnas, and there are fossils with a mixture of bird and reptilian features, such as the toothy archaeopteryx. However, no animals have a mixture of mammalian and bird features.
This is just what would be expected if birds and mammals evolved from separate groups of reptiles. There is no reason why an "intelligent designer" would not have mixed up features, such as creating mammals with feathers and efficient bird-like lungs, or furry, breast-feeding ostriches.
Furthermore, if all organisms were created to fulfil particular roles, they might be unable to evolve. Instead countless experiments, both planned and unplanned, show that organisms of all kinds evolve and adapt to changing conditions, providing the changes are not too abrupt. The breeding of plants and animals, or artificial selection, has produced an incredible range of forms in just a few thousand years, such as turning wolves into chihuahuas and great danes. In the laboratory, researchers have been able to produce bacteria, plants and animals with all kinds of novel characteristics. They have even produced entirely new species .
In the wild, too, there are numerous examples of evolution in action. Many viruses and bacteria have changed dramatically in the space of a human lifetime, from HIV adapting to humans to H5N1 bird flu. Several fish species are becoming smaller, thanks to the selection pressure exerted by humans catching all the large fish. Weeds like Crepis sancta are adapting to cities by changing their seeds.
If Earth was very young, that would also be a problem for evolution, because evolution by natural selection requires vast stretches of time - "deep time" - as Darwin realised. Some thought evolution had been falsified in the 19th century, when physicist Lord Kelvin calculated that the Earth was just 30 million years old. That's far younger than Darwin's 300-million-year estimate, which Darwin based on how long it would have taken to erode a rock formation called the Weald in the UK. But both were wrong. Several lines of evidence, including lead isotopes, show that Earth is far older than even Darwin imagined: about 4 billion years.
Darwin also proposed that all life has descended from a common ancestor. This idea, originally based on studies of anatomy and development, is being confirmed by genome sequencing. All life on Earth has turned out to work in essentially the same way: organisms store and translate information using the same code, with only a few minor variations between the most primitive organisms. Huge chunks of this information are identical or differ only slightly even between species that appear very different. Some key developmental genes in the fly can be replaced by the mouse versions without any ill effect, for instance.
Had life been designed, though, even organisms that look similar could have turned out to have very different inner workings, just as an LCD screen has a quite different mechanism to a plasma screen. Human designers are already creating a range of new life forms whose molecular underpinnings will be very different from those of existing life forms.
Some argue that it would have made sense for a "designer" to make all species variations on the same theme, but wouldn't this apply only to a designer with limited resources or imagination? An all-powerful creator could have made a world in which every single species was entirely unique and unrelated to any other.
If you would like to reuse any content from New Scientist, either in print or online, please contact the syndication department first for permission. New Scientist does not own rights to photos, but there are a variety of licensing options available for use of articles and graphics we own the copyright to. | <urn:uuid:f8729de4-58b9-4517-b5a3-c1a95c0ffab1> | {
"date": "2014-12-21T15:56:23",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802771592.49/warc/CC-MAIN-20141217075251-00027-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9630878567695618,
"score": 3.5625,
"token_count": 1066,
"url": "http://www.newscientist.com/article/dn13675-evolution-myths-evolution-cannot-be-disproved.html"
} |
While unit, integration and system tests - especially combined with the methodology of Test Driven Development (TDD) - are great ways to push the technical correctness of an application forward, they miss out one important aspect: the customer. None of these methods verify that developers actually implement what the customer desires. Behavior Driven Development (BDD) can help to bridge this gap.
The introduce some of the basic concepts behind behavior driven development and include an example of a Gherkin-formatted test example checking a page to ensure if has the correct content. They briefly define the structure of the test then take it into a Behat context and show how it would be implemented.
Of course, the examples shown above are only very rudimentary, missing e.g. variables and other advanced features. However, they should have explained what BDD is all about: Communication | <urn:uuid:2a4162e9-2dea-4321-97ee-8820ac6207fd> | {
"date": "2017-02-28T12:41:53",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174159.38/warc/CC-MAIN-20170219104614-00116-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8962182998657227,
"score": 3.046875,
"token_count": 174,
"url": "http://phpdeveloper.org/tag/rationale"
} |
ALLAHABAD, India: Tens of millions of Hindus have gathered to bathe in India's sacred River Ganges on the most auspicious day of one of the world's largest religious festivals.
Ash-smeared naked sadhus, or holy men, led the ritual bathing before dawn - which is said to cleanse pilgrims of their sins - with millions following them into the swirling river waters at the festival site in Allahabad in northern India. The population of the city increased from its normal 1.2 million to about 40 million on Sunday morning, with about 20 million packed inside the vast bathing area on the banks of the river, a government spokesman, Ashok Sharma, said.
Amid the crush, thousands of volunteers and police were urging pilgrims to take one short dip and then leave the freezing waters to make space for the flow of humanity behind them.
Bathing on a grand scale ... a Hindu holy man joins up to 20 million other pilgrims on Sunday in ritual washing in the Ganges River in Allahabad. Photo: AP
''Aerial surveys by choppers, flying cameras and our estimates put the figure at around 20 million people taking a holy dip in the rivers,'' Mr Sharma said. ''Public address systems are asking people to leave the ghats [steps] after bathing to avoid a crush.''
The Maha Kumbh Mela, which began last month and ends in March, takes place every 12 years in Allahabad. Smaller, similar events are held every three years in other locations around India. The bathing takes place at an area called Sangam, the confluence of the Ganges and Yamuna rivers and a third, mystical, waterway called the Saraswati.
Devotees believe entering the mighty rivers cleanses them of sin and frees them from the cycle of rebirth. Despite the hardships of waking early, plunging into the freezing and heavily polluted water and the crush of the crowds, pilgrims described being spiritually uplifted.
''One dip in the river has the power to change life forever,'' said 65-year-old Malti Devi, of London, who was taking part in the festivities for the first time.
The festival has its origins in Hindu mythology, which describes how a few drops of the nectar of immortality fell on the four places that host the festival: Allahabad, Nasik, Ujjain and Haridwar. Most devotees dunk their heads under the water, some drink it and others bottle it and take it home. | <urn:uuid:01049ad5-28c1-422e-885e-6b29c9cb0637> | {
"date": "2015-05-27T06:51:11",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928907.65/warc/CC-MAIN-20150521113208-00079-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9492062330245972,
"score": 2.609375,
"token_count": 509,
"url": "http://www.watoday.com.au/world/millions-cleanse-their-sins-in-the-freezing-ganges-20130210-2e6ja.html"
} |
Gallstones are small lumps of hard material that are formed inside the gallbladder (found underneath the bottom of the ribs on the right side of the body) as the result of the accumulation of cholesterol and bile salts from bile.
Gallstones can range in size from being as small as a grain of sand to three to four centimetres in width.
What types of gallstones are there?
Cholesterol stones are mainly made up of hardened cholesterol and account for over 75% of gallstones. It is believed these are formed when bile contains too much cholesterol or too much bilirubin, not enough bile salts or when the gallbladder does not empty as it should for some other reason. They are usually yellow-greenish in colour when removed.
Pigment stones are small, dark stones made of bilirubin.The exact reason they form is unclear. These tend to develop in people who have cirrhosis, biliary tract infections and hereditary blood disorders such as sickle cell anaemia in which too much bilirubin is formed.
Mixed stones are a common type of gallstone and as their name suggests they are not made up of one thing, but a combination - usually cholesterol and salts.
What are the risk factors for developing gallstones?
Being female. Women between 20 and 60 years of age are twice as likely to develop gallstones as men.
Being obese. Obesity is a major risk factor for gallstones, especially in women.
Having diabetes. People with diabetes can have high levels of fatty acids called triglycerides, which are a risk factor.
Rapid weight loss. As the body metabolizes fat during rapid weight loss, it causes the liver to secrete extra cholesterol into bile, which can cause gallstones.
What are the symptoms of gallstones?
Many people with gallstones have no symptoms at all – this is called 'asymptomatic', and these stones called 'silent stones'.
If there are symptoms, they are often confusingly similar to those of problems such as a heart attack, appendicitis, ulcers, irritable bowel syndrome, hiatal hernia, pancreatitis, and hepatitis, so making an accurate diagnosis is very important here.
Symptoms can often follow eating a fatty meal and can occur during the night. Typical symptoms include abdominal bloating, a nasty sharp pain in in the upper abdomen that increases rapidly and lasts from 30 minutes to several hours, and can go to the back between the shoulder blades or under the right shoulder.
There may also be nausea, vomiting and belching.
How are gallstones diagnosed?
The best way to identify if gallstones are present is to have an ultrasound scan – this is the most sensitive and specific test for gallstones.
Other diagnostic tests may include a computed tomography (CT) scan that can show up any gallstones or complications or an endoscopic retrograde cholangiopancreatography (ERCP) .
Here, the patient swallows an endoscope - a long, flexible, lighted tube connected to a computer and TV monitor – that a doctor guides into the stomach and into the small intestine.
The doctor then injects a special dye that temporarily stains the ducts in the biliary system.
With prompt diagnosis and treatment, the outcome for someone with gallstones is usually very good.
Can gallstones cause complications?
Yes. If there is obstruction caused by gallstones, this can lead to biliary colic, inflammation of gall bladder (known as cholecystitis) and occasionally cirrhosis due to scarring of the liver.
There may also be a nasty complication called cholangitis, where infection of the common bile duct occurs.
What is the treatment for gallstones?
Gallstones that do not cause any problems can be left alone. Surgery to remove the gallbladder is the most common way to treat gallstones that are causing symptoms.
The most common operation here is a laparoscopic cholecystectomy, where several tiny cuts are made in the abdomen and surgical instruments and a miniature video camera inserted.
The camera sends a magnified image from inside the body to a video monitor, giving the surgeon a close up view of the organs and tissues.
While watching the monitor, the surgeon uses the instruments to carefully separate the gallbladder from the liver, ducts, and other structures.
If any gallstones are in the bile ducts then endoscopic retrograde cholangiopancreatography (ERCP) can be done to locate and remove them before or during the gallbladder surgery.
Other people also read:
Gallbladder disease: The gall bladder is a small pear-shaped organ on the underside of the liver that is used to store bile.
Obesity: Obesity is more than just a few extra pounds or simply being overweight.
Preparing for an operation: If the operation involves staying in the hospital, you may be asked to come in between a day or two and several weeks beforehand for a few investigations. | <urn:uuid:7732825b-c2a2-4454-9ac1-23327e10d325> | {
"date": "2018-09-20T04:22:44",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156416.22/warc/CC-MAIN-20180920041337-20180920061337-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9509360790252686,
"score": 3.46875,
"token_count": 1048,
"url": "https://www.netdoctor.co.uk/conditions/digestive-health/a4934/gallstones-1/"
} |
For many students, third grade is when everything starts to come
together - where the light bulbs begin to shine. While they are
still building on the skills they learned previously, they are
also learning to work on their own and analyze how things work.
Third graders have a stronger understanding of the concepts of
time and how things change, and thus, many of their subjects will
focus on these concepts. For example, applicable worksheets review
the phases of the moon or more complex cause and effect sequencing.
Welcome to the world of reading!
The language and literacy skills of third graders are more developed, and they
are able to figure out words that they do not understand using
context clues or pictures. Homeschool worksheets may start to
include discussions on what they have read or questions about
Third grade teachers start to introduce different book genres,
as well as different places where they can find information, such
as newspapers, magazines, or printable worksheets from websites.
Students will also be required to complete more writing assignments,
such as reports and personal narratives, which now include proofreading
and editing. They may also start using charts and diagrams to
compare concepts and data.
Bigger numbers - not a problem
In third grade, math assignments become more complex. Larger
numbers are used, as well as fractions and decimals. Teacher worksheets
may include addition, subtraction, multiplication, and division.
Third graders are also expected to start solving problems in their
heads or on paper, instead of using counting tools.
Everything in the world is related
Science also becomes more detailed, introducing the intricate
workings of biology and earth science. Third graders will start
to evaluate the relationship between physical science, such as
how the Earth interacts with the moon and the sun, or how plants
and animals interact on the food chain. Third grade students learn
about different land and water masses on a map, and they have
a firmer understanding of identifying states, countries, and oceans.
They will start conducting more experimentation and observations,
as well as make educated guesses on what reactions will happen
next in science. Students also learn the difference between gases,
liquids, and solids, and how sound and light behave in different
Changes in time and communication
This year, third graders will start to expand how they see world.
Students can learn how people have adapted to different environments,
and how travel or communication has changed throughout the different
In the classroom, students can understand consequences for their
actions. Friendships (and enemies) are more lasting, and thus,
teaching conflict resolution is important. Students may be required
to do group work in their classes. This will both help their needs
for social interaction as well as get them to work through conflict
Most third graders are eager to explore the world and see how
things work around them. They may be developing preferences for
one subject or another. Many third graders also strive for independence,
and they may not be as open to talk to their parents about their
life at school. When they do talk, third graders are rapidly developing
complex language skills, and thus, they can debate, protest, or
explain concepts quite eloquently.
As independence and a sense of self begin to develop in third
grade, some students may create unrealistic expectations for themselves.
This may lead to anxiety and a fear of failure, which previously
did not appear in the lower grade levels. Classes are starting
to become more competitive, causing children that have learning
struggles to feel insecure about their ability.
During third grade, it is important to nurture healthy social
and personal perceptions, monitoring attitude changes to ensure
that no child falls through the cracks of developing critical | <urn:uuid:a64b05bb-e72c-4568-ba15-674c1852506c> | {
"date": "2014-12-19T21:01:48",
"dump": "CC-MAIN-2014-52",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768957.83/warc/CC-MAIN-20141217075248-00059-ip-10-231-17-201.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.946696400642395,
"score": 3.796875,
"token_count": 794,
"url": "http://www.worksheetlibrary.com/teachingtips/studentslearninthirdgrade.html"
} |
>I will try answering this profound question “WHY DO WE HAVE TO SHOUT AT EACH OTHER”???
A professor of theology was teaching about Anger and he asked his students the questions:
“Why do we shout in anger?
“Why do people shout at each other when they are upset”?
The students thought for a while.
One of them said:
Because we lose our calm.
“But why shout when the other person is just next to you”? asked the professor.
“Isn’t it possible to speak to him or her with a soft voice”?
“Why do you shout at a person when you are angry”?
The students gave other answers but none satisfied the professor.
Finally he gave the Psychological, Physiological, and Practical Explanation for shouting:
“When two people are angry at each other, their hearts psychologically distance themselves”.
To cover this perception of distance, they think they must shout to be able to hear each other.
The angrier they are, the louder and stronger they will shout to hear each other based on “The Greater Distance”.
The professor then asked:
“What happens when two people fall in Love”?
They don’t shout at each other but talk softly to one another.
“Because their hearts are Psychologically, Physiological very close”.
The distance between them is very small.
The professor continued, “When they love each other even more, what happens”?
“They speak, only in whispers as they even get even closer to each other in Love”.
Finally they even need not whisper, they only look at each other and that’s all….
So next time you shout to a “Supposed Loved One”, know that you are creating distance between your hearts.
ADJUST AND DO THE RIGHT THING. | <urn:uuid:aae25b98-7b56-4630-b4ee-ec03ba2c4e8d> | {
"date": "2018-03-18T05:45:33",
"dump": "CC-MAIN-2018-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645538.8/warc/CC-MAIN-20180318052202-20180318072202-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9602553844451904,
"score": 3.0625,
"token_count": 415,
"url": "https://kevinwithanl.wordpress.com/2010/06/13/why-shout/"
} |
In class Year 3A have been learning about 'Teddy Bears'. The children have been
finding out the similarities and differences between old and new teddy bears.
Year 3A brought in their own teddy bear and made a time line. They also wrote a story about their teddy bear.
The children have also been learning about famous bears such as Paddington, Super Ted and Rupbert.
In class the children drew a story board using famous bears and then wrote about it. They thought about the characters, setting and the plot.
The OLDEST bear!
The YOUNGEST bears! | <urn:uuid:078d5371-6cba-433a-bf99-ded5465548a3> | {
"date": "2019-08-18T18:00:23",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313987.32/warc/CC-MAIN-20190818165510-20190818191510-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.974270761013031,
"score": 3.296875,
"token_count": 127,
"url": "https://www.millingtonps.com/topic-teddy-bears/"
} |
It's an alarming statistic that 66-million girls are out of school globally, and that there are 33-million fewer girls than boys in primary school. Back in September 2009, Plan Canada's Because I am a Girl initiative launched an online petition advocating for a Day of the Girl. They fiercely believed there was an urgent need to stand up for girl's rights, as they face unique barriers to survival and development like early and forced marriage, domestic slavery, lack of access to healthcare and education. They were, and continue to be, 100 per cent right.
Enforcing basic human rights for millions of girls would mean they would be six times less likely to be married as children, have 2.2 fewer, yet healthier, children, and if they attend school can raise a countries GDP. The overarching belief is that investing in girls is a key to eliminating poverty and creating a safer and brighter future for everyone.
The Girl Effect, created by the Nike Foundation used these statistics below to point out that an investment in girls is one that the world can't afford to overlook:
• In India, adolescent pregnancy results in nearly $10 billion in lost potential income per year
• In Uganda, 85 per cent of girls leave school early, resulting in $10 billion in lost potential earnings
• By delaying child marriage and early birth for one million girls in Bangladesh, the country could potentially add $69 billion to the national income over these girls' lifetimes
"It has been shown that an educated girl will reinvest 90 per cent of her future income in her family, compared with 35 per cent for a boy. And yet 250-million adolescent girls live in poverty and are more likely than boys to be uneducated, to be married at a young age, and to be exposed to HIV/AIDS. Today, less than two cents of every international development dollar goes to girls -- the very people who could do the most to end poverty. As long as girls remain invisible, the world misses out on a tremendous opportunity for change." -- from the Girl Effect website -- Why girls? Why not boys too?
Over the course of two years, Because I am a Girl battled through levels of Parliament, eventually presenting them with a petition signed by 15,000 people and in December 2011, the United Nations chose October 11 as "International Day of the Girl." The theme of this year's observance is "Innovating for Girls' Education," which recognizes the need for, "...fresh and creative perspectives to propel girls' education forward." - from the United Nations website -- Theme for 2013: Innovating of Girls' Education.
So how can you help?
One thing that we're doing at GoVoluntouring is screening the film Girl Rising within our local community. The film is part of a global action campaign for girls' education, using the power of storytelling to drive change. Other ideas include hosting an awareness day/week at your company or school, holding an event or fundraiser that supports the movement, mentoring a girl within your community, committing to a long-term project or volunteer trip.
You could also consider donating to an organization that supports girls. Below is a short list of organizations that have effective programs that assist with girls' education but there are more options on GoVoluntouring.com, idealist.org, and handsonnetwork.org.
"Empowering girls, ensuring their human rights and addressing the discrimination and violence they face are essential to progress for the whole human family. One of the best ways to achieve all of these goals is to provide girls with the education they deserve." - Ban Ki-moon, the United Nations Secretary-General.
Women's Earnings As A Percentage Of Men's: 100.3% Women's Median Weekly Earnings: $397 Men's Median Weekly Earnings: $396
Women's Earnings As A Percentage Of Men's: 100.3% Women's Median Weekly Earnings: $656 Men's Median Weekly Earnings: $654
Women's Earnings As A Percentage Of Men's: 102.3% Women's Median Weekly Earnings: $1,127 Men's Median Weekly Earnings: $1,102
Women's Earnings As A Percentage Of Men's: 102.7% Women's Median Weekly Earnings: $501 Men's Median Weekly Earnings: $488
Women's Earnings As A Percentage Of Men's 105.4% Women's Median Weekly Earnings: $1,326 Men's Median Weekly Earnings:$1,258 Operations research analysts use computer software to solve problems, according to the Bureau Of Labor Statistics.
Women's Earnings As A Percentage Of Men's 106.1% Women's Median Weekly Earnings: $951 Men's Median Weekly Earnings:$896
Women's Earnings As A Percentage Of Men's 106.4% Women's Median Weekly Earnings: $1,028 Men's Median Weekly Earnings: $966
Follow Aaron Winston Smith on Twitter: www.twitter.com/@awrsmith | <urn:uuid:03b3b5dc-aee6-47a9-b8d3-a9d18f089401> | {
"date": "2015-09-01T10:19:53",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645171365.48/warc/CC-MAIN-20150827031251-00053-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9504162073135376,
"score": 3.546875,
"token_count": 1024,
"url": "http://www.huffingtonpost.ca/aaron-winston-smith/day-of-the-girl_b_4080378.html"
} |
Be the first to like this
Computer networks have redundant links between machines so that if one fails others can take over to guarantee deliverability. However, as we move up the stack to Person to Person communication protocols via the net, this redundancy gets dropped. Fallback messaging is a means to allow communication between two people to continue even if some of the underlying service providers fail.
Opensource clients like ayttm, eb, gaim, kopete, and transports like jabber have the edge here, let's find out how and why.
More info here: http://tech.bluesmoon.info/2004/09/fallback-messaging.html
Clipping is a handy way to collect important slides you want to go back to later. | <urn:uuid:d356f5e1-8bb0-4c22-88d5-8d7d2affc751> | {
"date": "2015-09-02T09:33:27",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645258858.62/warc/CC-MAIN-20150827031418-00170-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8949990272521973,
"score": 2.703125,
"token_count": 157,
"url": "http://www.slideshare.net/bluesmoon/fallback-messaging"
} |
How Many More Whales Must Japan Kill to Find Out What They Already Know They Eat?
On January 23, the Australia newspaper the Daily Telegraph ran an article under the heading "Japan's Lies to Justify Whaling."
The Japanese government and whaling industry have been claiming that their whaling in the Antarctic and in the North Pacific is necessary for the pursuit of scientific research on whale populations and behavior.
It is an argument that few outside of Japan given any credence to, especially the scientific community.
Whale expert Nick Gales, from the Australian Antarctic Division in Hobart, said the information Japan is collecting from whales they kill is useless.
"We don't need that type of science data to manage whale stocks," Dr Gales said.
Institute of Cetacean Research in Tokyo councilor Dan Goodman claims Australia, New Zealand, and other anti-whaling nations should "strongly support" Japan's commitment to scientific research.
Japan announced at last year's meeting of the International Whaling Commission (IWC) that this summer it would double its slaughter of piked whales (minke) to 935 and target 10 endangered fin whales. In 2007-08, Japan will raise its self-imposed kill quotas to include 935 piked whales, 50 fin whales, and 50 humpbacks whales.
Mr. Goodman said Japan had to kill the whales because certain kinds of data - including how old whale populations are, how old whales are when they reach sexual maturity, how long whales live for, and what they eat - cannot be obtained using non-lethal methods.
"These are the kinds of data required to improve management measures for the resumption of commercial whaling," Mr. Goodman said. "Of course the anti-whaling scientists don't believe this kind of data is required because they do not want to see a resumption of commercial whaling."
Dr Gales, who is also head of Australia's delegation to the scientific committee for the IWC, said after years of research the Japanese should have concluded by now that piked whales eat krill.
"They're asking for support for science that has no support." He said.
The "scientific research" is yielding hundreds of millions of dollars in profit to the Japanese whaling industry. Without this profit, there would be no "research"
"Japan is fooling no one with their lies," said Captain Paul Watson. "The only research they are doing is marketing research. They have not published a single peer-reviewed credible paper on their so-called research. We know what the whales eat so how many more thousands of whale stomachs and intestines must they rip open to find out what they already know they eat? They could obtain all the DNA data they need from non-lethal tissue samples taken with biopsy darts. One of the most laughable ‘research' goals is to discover if whale populations are in decline. The answer is obvious - they are in decline because of Japanese ‘research.' The only thing they are discovering with their mass slaughter of the whales is profit from the sale of the ‘research' materials to markets and restaurants. This is bogus science and it should be condemned by legitimate scientists in Japan because it makes a humiliating mockery of the Japanese scientific community."
Japan should do some DNA research in Japanese fish markets where endangered whales including orcas and humpbacks are being sold disguised as piked whales.
Next year, Sea Shepherd Conservation Society intends to return to the Southern Ocean Whale Sanctuary in Antarctica to do some research of our own. We need to research more effective law enforcement measures to shut down this criminal operation that is posing as a "research" project.
Next year, the stakes are higher because Japan will target 40 more endangered fin whales and 50 endangered Humpback whales in addition to another 935 piked whales.
"The Japanese are playing nations like Australia and New Zealand for fools," said Captain Watson. "They are getting quite a chuckle I imagine, every time some foreign politician defends Japanese ‘research' or expresses political and diplomatic impotence at stopping it."
The full story can be read at the Daily Telegraph's website. | <urn:uuid:7e7278f0-b1fd-413c-8e34-0a9949bfc028> | {
"date": "2014-10-23T04:45:15",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507450097.39/warc/CC-MAIN-20141017005730-00026-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9577969312667847,
"score": 2.75,
"token_count": 849,
"url": "http://www.seashepherd.org/news-and-media/2006/01/25/how-many-more-whales-must-japan-kill-to-find-out-what-they-already-know-they-eat-880"
} |
Making yogurt at home for you and your family is fun, easy and can save you a lot of money in the long run! To make yogurt at home, all you need is bacteria (also known as a yogurt starter culture) and milk.
Even better, yogurt making does not require any specialized equipment. (If just starting out making yogurt, this basic supply list can be helpful.)
1. Choose a Yogurt Starter and Milk
You have several options when it comes to selecting a yogurt starter culture and type of milk to use to make yogurt at home. While the basic process for making yogurt at home is the same for all types of yogurt starters and milk (simply add the bacteria to the milk and let it culture) there are some nuances to using different yogurt starters and milk.
When choosing a yogurt starter, consider how each type works, and choose the one that best fits your lifestyle. Some starter cultures are direct-set or single-use, meaning each packet of starter will make one batch of yogurt. Other starter cultures are heirloom or reusable, meaning that you can make yogurt over and over again by using a bit of yogurt from your previous batch as a starter.
When choosing milk for making yogurt, take into consideration how the milk will interact with the yogurt starter culture and affect the yogurt's final thickness and texture. For non-dairy milks you will need to use a Vegan Starter Culture (or a Vegan Yogurt Starter Kit).
2. Prepare the Milk for Making Yogurt
Depending on the yogurt starter culture you select, you may need to apply heat to your milk to prepare it for culturing. The procedure for culturing a batch of mesophilic yogurt with pasteurized milk does not require any heat, but for pasteurized thermophilic yogurt, the milk must be heated to 160º F, then cooled to a culturing temperature of 110º F, before adding the yogurt starter culture.
To make raw milk yogurt, with any type of culture, there are special considerations, and an extra step may be required.
3. Inoculate the Milk
Using the correct proportion of culture to milk is important. The proper amount of milk will provide a nutritious environment for the bacteria to culture and thicken the milk properly. For best results, follow the instructions included with your yogurt starter culture or one of our Yogurt Making How-To Videos below.
Instructions & How-to Videos for Culturing Yogurt at Home
4. Let the Milk Culture
As yogurt cultures, its temperature should remain fairly constant, and the yogurt should not be disturbed.
- For thermophilic yogurt starters (Greek, Bulgarian, Traditional Flavor, Mild Flavor, and Vegan), maintain a temperature of 105-112º F. You will need a yogurt maker or similar appliance to control the temperature.
- For mesophilic yogurt starters (Viili, Filmjölk, Matsoni, and Piimä), maintain a temperature of 70-77º F. You can culture these yogurts right on your counter top.
Keeping a Consistent Temperature
Try these tips for Maintaining Temperature when Culturing Countertop Yogurt or learn How to Culture Thermophilic Yogurt without a Yogurt Maker.
How Long to Let Your Yogurt Culture
Culturing time is an important factor in making good yogurt. The amount of time the yogurt cultures depends on your taste and texture preference. In general, the longer yogurt cultures, the more tart and thick it will become. You can also refer to the instructions included with your yogurt starter for culturing times.
Natural Separation During the Yogurt Culturing Process
Toward the limit of culturing time, the yogurt may begin to separate into solid (curds) and liquid (whey). The whey is quite nutritious and can be strained off to use in cooking or culturing, or it can be stirred back into the yogurt.
Separation is usually the result of yogurt's culturing either too long or too fast. Once yogurt begins to separate, it is not long before the bacteria will begin to die off so be sure to keep an eye on your yogurt as it cultures.
Our Yogurt Starter Troubleshooting FAQ features several tips for dealing with yogurt that doesn't turn out exactly as expected.
5. Refrigerate Your Homemade Yogurt
Thermophilic yogurt requires a 2-hour cooling-off period to help ease the transition between culturing temperature and refrigerator temperature.
Finished yogurt should be refrigerated for at least 6 hours to halt the culturing process. Once the fermentation has been stopped, it will not restart even if the milk is brought back to room temperature.
Now that you know more about making yogurt at home, make sure you have all the supplies you need and grab a yogurt starter culture. With our How-To Videos and collection of expert advice on culturing yogurt, you'll be on your way to delicious homemade yogurt in no time.
You Can Do This. Happy Yogurt Making! | <urn:uuid:fe1df3fa-15a1-49c8-9331-3c9e65088d3d> | {
"date": "2017-02-25T20:28:31",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00372-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8956520557403564,
"score": 2.640625,
"token_count": 1031,
"url": "http://www.culturesforhealth.com/learn/yogurt/how-to-make-homemade-yogurt/"
} |
Definition of plagiarize:
hook, words, come up, recite, countermand, revoke, pinch, quote, sneak, raise, plagiarise, elevate, snarf, crib, give, face-lift, copy, bring up, rise, arise, move up, nobble, lift, wind, rescind, paraphrase, rear, repeal, repeat, cite, airlift, vacate, extract, overturn, excerpt, annul, reverse, get up, uprise, appropriate, go up, purloin, hoist, cabbage.
- "From Sail to Steam, Recollections of Naval Life", Captain A. T. Mahan.
- "Là-bas", J. K. Huysmans.
Without some effectual criticism on their many false positions, prosodists may continue to theorize, dogmatize, plagiarize, and blunder on, as they have done, indefinitely, and knowledge of the rhythmic art be in no degree advanced by their productions, new or old.- "The Grammar of English Grammars", Goold Brown. | <urn:uuid:7cf6c3fa-933a-4aab-aac4-657abb324798> | {
"date": "2019-04-18T21:26:17",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526807.5/warc/CC-MAIN-20190418201429-20190418223429-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8567876219749451,
"score": 2.53125,
"token_count": 226,
"url": "http://www.dictionarylink.com/plagiarize"
} |
One of the rulers of the kingdom of Israel during the interregnum between Zimri and Omri; son of Ginath. When Zimri, after a reign of seven days, had ended his life, the people of Israel were divided into two factions, one siding with Omri, and the other with Tibni. Omri's followers gained the upper hand; and, finally, Tibni having died, Omri was declared king (I Kings xvi. 21-22). From a comparison of verses 15 and 23 of the chapter just cited, it appears that Tibni was regent over half the kingdom of Israel for a period of four years. According to the Septuagint (ad loc.), Tibni had a brother named Joram, who seconded him in the dispute over the throne and who died at the same time as himself, probably at the hands of Omri's party. | <urn:uuid:20db7857-69b8-4267-954e-cc8d1f208e33> | {
"date": "2015-05-22T08:29:02",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207924799.9/warc/CC-MAIN-20150521113204-00054-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9876368641853333,
"score": 3.390625,
"token_count": 187,
"url": "http://jewishencyclopedia.com/articles/14389-tibni"
} |
You're looking at the first ever 3-D model of a supernova entering into the initial phase of its cataclysmic death throes. This is part of a new computer simulation that's radically changing our notions of what happens inside stars just before they explode.
The 3D model was put together by W. David Arnett, Regents Professor of Astrophysics at the University of Arizona, along with Casey Meakin and Nathan Smith at Arizona and Maxime Viallet of the Max-Planck Institut fur Astrophysik. It shows the turbulent mixing of elements inside of these massive stars which cause them to expand, contract, and spew out matter just prior to their detonation.
Looking at the top image, the white lines represent the simulated outer boundary of a stratified burning oxygen shell. The yellow portions are ashes of sulphur which are being dredged from the underlying orange core.
Previously, 2D models showed stars as a series of concentric circles, with heavier elements like iron and silicon in the center and lighter elements like carbon helium and oxygen up at the surface. These models suggested that stars would get all scrunched-up, increasing pressures and driving temperatures high enough to create neutrinos. But as neutrinos go, so too does the star's energy, causing the star to cool down and contract even further.
But the new model — a three-dimensional time-dependent numerical simulation of the flow of matter inside stars — shows something a bit different: a near-chaotic interior that ejects star remnants prior to the final explosion.
"We still have the concentric circles, with the heaviest elements in the middle and the lightest elements on top, but it is if someone put a paddle in there and mixed it around. As we approach the explosion, we get flows that mix the materials together, causing the star to flop around and spit out material until we get an explosion," noted Arnett in a statement.
This explains the strange composition of supernova remnants — the ring of heavy and light elements that form nebulas around stars that went supernova. "That's what see in supernova remnants. We see those ejections of star material, and how they mix with material expelled from the star during its final explosion. Other models cannot explain this."
Relatedly, using NUSTAR data of an actual supernova, NASA put together this simulation:
And this is what a red giant looks like just prior to going supernova:
Read the entire study at AIP Advances: "Chaos and Turbulent Nucleosynthesis Prior to a Supernova Explosion." | <urn:uuid:cf5a94f1-9070-47d7-82bf-4f8f15a3253e> | {
"date": "2019-05-22T05:09:49",
"dump": "CC-MAIN-2019-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256763.42/warc/CC-MAIN-20190522043027-20190522065027-00456.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9245927333831787,
"score": 4.0625,
"token_count": 538,
"url": "https://io9.gizmodo.com/what-a-supernova-looks-like-just-as-its-about-to-blow-1546372224"
} |
Goals of Computer Network
Posted Date: 21-May-2010
They may have a number of computers performing different jobs in different departments of same organization.
There are many organization which use computer for management of various fields. They may have a number of computers performing different jobs in different departments of same organization. They can have many branches of that organization in different cities. Now some times it becomes necessary to load same program files. Software's and some times same data file on all the computers with same information. This wastes time as well as memory space. Starting from the basic needs these computers were connected to each other resulting into a computer network. Various transmission media channels were used to make a network. The main goals of these networks are as follows :
Resource Sharing :
This is the main aim of a computer network. It means to make all programs peripherals and data available to any one computer on the network to all other computers in the network without regard to the physical locations of them. Thus a user at a large distances can share the resources or can see data of a computer in the same way that a local user uses them. Another aspect of resource sharing is load sharing. That is if required, a job can be performed using various computers in network by portioning it which reduces time consumption and load both for a particular computer.
Cost Reduction :
Another goal of networking is reduction of cost. Resource sharing automatically reduces cost and hence money can be saved. One more aspect is that the price of small computers is very less as compared to main frames. Though main frames are roughly ten times faster as compared to micro computers but even then the price to performance ration is much better for small computers as compared to large computers. The large computer cost thousand times more than small computers. Because of this imbalances more powerful personal computers are developed and are able to share data and other resources kept on one or more shared file server machines. Thus one goal of network is to do same job in minimum cost in terms of money when is possible on large computers only which are very expansive.
Communication Medium :
The goal of a computer network is to provide a powerful communication medium among widely separated people. It is easy for two or more people living far apart to work on same project by portioning it using a network. They can make programs, can discuss or can even write a report using a network while they are far off. Some times a change is required in some data file or document. It is done on fine, others can see them immediately which is possible only through network, otherwise they can have to wait for this several days through letter or some other media. Thus it makes speedy co-operations and enhances human to human communication.
Improve Performance :
The goal of a network is to improve accessibility as well as performance of a system. The performance of a computer can be improved by adding one or more processors to it as the work load on it grows. For example if the system is full instead of replacing it buy a larger one at large expansive it is better to add more processors to it on less cost and less disruption to the user. This improve both accessibility as well as performance of a system.
Did you like this resource? Share it with your friends and show your love!
Responses to "
Goals of Computer Network
Notify me by email when others post comments to this article.
Do not include your name, "with regards" etc in the comment. Write detailed comment, relevant to the topic.
No HTML formatting and links to other web sites are allowed.
This is a strictly moderated site. Absolutely no spam allowed.
to fill automatically.
(Will not be published, but
to validate comment)
Type the numbers and letters shown on the left.
Subscribe to Email
Get Jobs by Email
Forum posts by Email
Articles by Email
Awards & Gifts
j r kumar
Last 7 Days
j r kumar
Hafeezur Rahman P
ISC Technologies, Kochi - India. Copyright © All Rights Reserved. | <urn:uuid:e7943c46-f5e7-4c33-86aa-a04fa86a2d2c> | {
"date": "2014-09-22T18:16:02",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137145.1/warc/CC-MAIN-20140914011217-00045-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9306142330169678,
"score": 3.109375,
"token_count": 831,
"url": "http://www.indiastudychannel.com/resources/114636-Goals-Computer-Network.aspx"
} |
The first Buddhist temple in China was built here in Sichuan Province in the 1st century A.D. in the beautiful surroundings of the summit Mount Emei. The addition of other temples turned the site into one of Buddhism's holiest sites. Over the centuries, the cultural treasures grew in number. The most remarkable is the Giant Buddha of Leshan, carved out of a hillside in the 8th century and looking down on the confluence of three rivers. At 71 ...
Source: UNESCO TV / © NHK Nippon Hoso Kyokai | <urn:uuid:a115943b-cb91-4e73-a153-2c22ae03b60f> | {
"date": "2014-10-23T00:11:18",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507448169.17/warc/CC-MAIN-20141017005728-00312-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.907117486000061,
"score": 2.953125,
"token_count": 116,
"url": "http://whc.unesco.org/en/list/779/video"
} |
… was established by presidential proclamation on December 19, 1919. The ruins remain unexcavated.
Yucca House is one of the largest archeological sites in southwest Colorado, and acted as an important community center for the Ancestral Puebloan people from A.D. 1150-1300. On July 2, 1919, Henry Van Kleeck deeded 9.6 acres of land, including most of Yucca House, to the federal government. Due to its significance as an excellent example of a valley pueblo, Woodrow Wilson made Yucca House a National Monument by Presidential Proclamation on December 19, 1919.
Yucca House National Monument is one of our earliest examples of public/private stewardship of our cultural resources and will remain protected well into the future. The long-term preservation of Yucca House ensures that archeologists will be able to continue studying Ancestral Puebloan society and what caused them to migrate from this region in the late 1200s. | <urn:uuid:e760bda7-37ee-44bc-84bb-e8d8df12ee90> | {
"date": "2016-07-27T15:24:11",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826908.63/warc/CC-MAIN-20160723071026-00052-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9506641030311584,
"score": 3.75,
"token_count": 200,
"url": "http://newmexiken.com/2012/12/yucca-house-national-monument-colorado-2/"
} |
Future extreme wildfires may be fueled by climate change
Climate change may favor larger and more destructive wildfires in the American West in the future, according to new research led by Michigan State University scientists.
Fires showing erratic behaviors are often harder to contain and result in catastrophic damage and loss of property and life.
“Our findings suggest that future lower atmospheric conditions may be conducive to larger and more extreme wildfires, posing an additional challenge to fire and forest management,” said Lifeng Luo, MSU assistant professor of geography and lead author on the study.
The study appears in the Journal of Applied Meteorology and Climatology.
The researchers analyzed current and future climate patterns projected by multiple regional climate models and the effect of those patterns on an operational fire-weather index that is used for assessing the atmospheric potential for extreme or erratic wildfires. The study focused on mountainous western United States including Arizona, Idaho, Nevada, New Mexico, Utah and Wyoming, and focused on the month of August, the most active month for wildfires in the region.
August 2012 saw 3.6 million acres burn in the region, the most of any August since 2000. However, there were only 6,948 fires in August 2012 – the second fewest in that 12-year timeframe – meaning the fires were much larger.
Large wildfires are mainly driven by natural factors including the availability of fuel (vegetation), precipitation, wind, the location of lightning strikes and anthropogenic factors. In particular, the researchers found that exceptionally dry and unstable conditions in the earth’s lower atmosphere may be more frequent in the future, thus contributing to more “erratic and extreme fire behavior.”
“Global climate change may have a significant impact on these factors, thus affecting potential wildfire activity in the western United States,” the study says.
Co-authors of the MSU-led study include Ying Tang and Shiyuan Zhong from MSU, and Xindi Bian and Warren Heilman from the USDA Forest Service. | <urn:uuid:eaf1857c-9904-48b3-b115-b6be74fc647a> | {
"date": "2013-12-05T15:32:55",
"dump": "CC-MAIN-2013-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163046759/warc/CC-MAIN-20131204131726-00002-ip-10-33-133-15.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9382006525993347,
"score": 3.40625,
"token_count": 412,
"url": "http://msutoday.msu.edu/news/2013/future-extreme-wildfires-may-be-fueled-by-climate-change/"
} |
Coming from the Greek word for “water”, hydro applies to rivers and oceans. IEC standardization work for the first covers both large-scale and small-scale river projects, while ocean power is new for us as we began considering the subject recently for its potential to require standards (the market for this is still largely in the research and development stage).
Some of the world’s biggest hydroelectric power plants, in terms of both total installed capacity and annual average power generation volume, produce millions of kilowatts and billions of kilowatt hours. At the other end of the scale are small, micro- and pico-hydro stations. For us, “small” means up to 15 MW. Microhydro schemes can be as large as 500 kW and are generally run-of–the-river developments for villages. Pico-hydro systems have a capacity of 50 W to 5 kW and are generally used for individuals or clusters of households.
IEC Technical Committee 4, Hydraulic turbines, set up in 1913, prepares standards and technical reports for designing, manufacturing, commissioning, testing and operating hydraulic machines. Its focus has been, and at present remains, river projects. These include turbines, storage pumps and pump-turbines of all types as well as related equipment such as speed governors and performance evaluation and testing. For now it focuses on river power.
The two main forces driving much of TC 4’s work are, on one hand, new large-scale hydroelectric river projects in Asia, the Russian Federation and South America and, on the other, refurbishment and up-rating of existing plants in North America and Europe. As a result, the work programme focuses on turbine runners and pump impellers, acceptance tests of hydro turbines, control systems testing, and evaluating both cavitation pitting and discharge measurement methods, as well as hydraulic turbine efficiency, vibration, stability, upgrading and rehabilitation. Particle erosion is a potential future topic for TC 4.
Ocean energy devices work with tides or with waves, although ocean currents are another potential source of power. These devices are either floating or fixed and, to generate electrical energy, they tend either to oscillate or to rotate.
Research appears to have started in Japan in the 1940s, the technology for it has been around since the 1970s and functioning units have been deployed in various countries in the 1990s, mostly as prototypes. In 2007 the IEC created TC 114, Marine energy - Wave, tidal and other water current converters, to begin preparing standards for this emerging field of technology. | <urn:uuid:5dd94e23-30c6-4236-a3d7-f0230e76d8ea> | {
"date": "2015-10-05T11:02:44",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736677221.11/warc/CC-MAIN-20151001215757-00054-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9488847851753235,
"score": 3,
"token_count": 530,
"url": "http://www.iec.ch/renewables/water_power.htm"
} |
MUSCLES OF MASTICATION
The masticatory system is a functional unit
of the teeth; their supporting structures, the
the temporomandibular joints; the muscles
or indirectly in mastication (including the muscles
of the lips and tongue); and the vascular and
systems supplying these tissues. Functional and structural
disturbances in any one of the components of the
masticatory system may be reflected by functional or
structural disorders in one or more of its other components
Mastication is the action of
breaking down of food,
preparatory to deglutition.
This breaking-down action is
highly organized complex of
digestive activities that, in
normal individuals, integrate
various components of the
masticatory system, such as
the teeth and their investing
structures, the muscles, the
temporomandibular joints, the
lips, the cheeks, the palate,
the tongue, and the salivary
MASTICATION- ORAL BEHAVIOUR
Mastication is oral motor behavior reflecting central
nervous system commands, and many peripheral
inputs to modulate the rhythmic jaw movements.
The action of masticatory muscles during chewing
varies between subjects in amplitude, onset timing, and
duration of the chewing cycle. However, it is possible to
recognize similarity between muscle actions. These wide
variations (within and between individuals) can be
by differences related to individual occlusal contact
features and specific musculoskeletal morphology.
Since tooth guidance has an enormous influence on
muscle activity during chewing and swallowing, it is
to make restorations compatible with the functional
movement patterns of the patient rather than expect
the patterns of the mastication to adapt to the new
The masticatory sequence is the whole set
from ingestion to swallowing. It is made up
cycles that change in form as the food is
moved backward to the molar
teeth, then broken
down and prepared for
re-opening of jaw via
periodontal and soft
To create precise mandibular
movements, inputs from
various sensory receptors must be
received by the central
nervous system through afferent
nerve fibers. The
brain assimilates and organizes these
inputs and elicits
appropriate motor activities through
the efferent nerve
fibers. These motor activities involve
the contraction of
some muscle groups and the
inhibition of others. Chewing
is a subconscious activity, yet can be
conscious control at any time
MUSCLES OF MASTICATION
The muscles of mastication help in mastication.
All supplied by the mandibular division of the Trigeminal nerve.
Additional muscles of mastication supplied by trigeminal nerve
Anterior belly of digastric
Tensor tympani (attaches to the malleus - 1st arch bone - part of the reptilian jaw joint)
Also referred to as the ‘Masseteric Fascia’.
A strong layer of fascia derived from the deep
Above it, the lower border of zygomatic arch is
Behind, it invests the parotid gland.
Arises by thick, tendinous
aponeurosis from zygomatic
process of maxilla and 2/3 of
lower border of zygoma.
Fibres pass downwards and
Inserted into the angle and
lower half of lateral surface of
ramus of mandible.
Arises from posterior 2/3 of
lower border and whole of
medial surface of zygomatic
Fibres pass downwards and
Inserted into the upper half of
ramus and lateral surface of
coronoid process of mandible.
Superficial Layer Deep Layer
Deep layer is partly concealed in front by superficial layer and behind
by parotid gland.
A thick, quadrilateral muscle and it consists of two
Covers the temporalis muscle.
It is a strong, fibrous investment covered
laterally by auricularis anterior and superiorly
by galea aponeurotica and by part of orbicularis
It consist of two layers:-one of which is inserted
into the lateral and other into medial border of
Between these two layers- a small quantity of fat,
orbital branch of superficial temporal artery and
a filament from zygomatic branch of zygomatic
nerve are present.
Arises from whole of the temporal fossa and from
deep surface of temporal fascia.
Fibres converge as they descend and end in a
tendon which passes which passes deep to the
Inserted into the medial surface, apex and
anterior border of coronoid process and anterior
border of ramus of mandible nearly as far
forward as last molar teeth.
Broad, radiating muscle situated at the side of the head.
Arises from lower part of
lateral surface of greater
wing of sphenoid and from
It is active during various
jaw closing movements
Arises from lateral surface
of lateral pterygoid plate.
It is active during jaw
opening movements and
Upper Head Lower Head
Short, thick muscle, conical in form.
Extends horizontally between infratemporalfossa and condyle of mandible.
Arises by two heads:- upper and lower
Fibres pass horizontally backwards and laterally.
Inserted into a depression in front of neck of
condyle of mandible, and into front margin of
articular disc of temporomandibular articulation.
Suited for Protraction, Depression and Contralateral Abduction.
Arises from medial surface of lateral pterygoid
plate and grooved surface of pyramidal process of
Fibres pass downward, lateral and backwards.
Inserted by strong tendinous lamina, into the
lower and back part of medial surface of ramus
and angle of mandible, as high as the mandibular
Thick, quadrilateral muscle.
Principle functions are elevation and lateral positioning
ADDITIONAL MUSCLES WHICH ARE
SUPPLIED BY TRIGEMINAL NERVE
Tensor veli palitini
Attachment is at or near lower border of
mandible and near midline.
Anterior digastric muscle covered by platysma
muscle, beneath lie the mylohyoid and
Mylohyoid branch of mandibular division of fifth
nerve innervates anterior digastric.
Digastric branch of facial nerve innervates
posterior digastric muscle.
Lies superior to mylohyoid muscle and adjacent
to the midline.
Arises from mental spine on posterior aspect of
symphysis menti of mandible.
Inserts on anterior surface of hyoid bone.
Innervation is from C1 to C2 and hypoglossal
The tensor tympani, the larger of the two muscles of the tympanic cavity, is
contained in the bony canal above the osseous portion of the auditory tube. Its
role is to dampen sounds, such as those produced from chewing.
When tensed, the action of the muscle is to pull the malleus medially, tensing the tympanic
membrane, damping vibration in the ear ossicles and thereby reducing the amplitude of
It arises from the cartilaginous portion of the auditory tube and the adjoining part of the
great wing of the sphenoid, as well as from the osseous canal in which it is contained.
Inserted into the handle (manubrium) of the malleus, near its root.
Passing backward through the canal, it ends in a slender tendon which enters the
tympanic cavity, makes a sharp bend around the extremity of the septum, known as the
TENSOR VELI PALITINI
The tensor veli palatini (tensor palati) is a broad, thin, ribbon-like muscle in the head
that tenses the soft palate.
It arises by a flat lamella from the scaphoid fossa at the base of the medial pterygoid
plate, from the spina angularis of the sphenoid and from the lateral wall of the cartilage
of the auditory tube.
The tendon then passes medially and is inserted into the palatine aponeurosis and into
the surface behind the transverse ridge on the horizontal part of the palatine bone.
The tensor veli palatini is innervated by the medial pterygoid nerve, a branch of
mandibular nerve, the third branch of the trigeminal nerve (CN V).
The tensor veli palatini tenses the soft palate and by doing so, assists the levator veli
palatini in elevating the palate to occlude and prevent entry of food into the
nasopharynx during swallowing.
IMPORTANCE TO DENTISTS
The knowledge of this system is important in removable
Information based on this system was used in the
setting of articulators, and in the design of the dentures
and denture teeth themselves. Today the importance of
jaw movements has become apparent in fixed
periodontics, orthodontics, and in the diagnosis and
treatment of pain disorders of the masticatory system.
The most important reason why dentists maintain and
replace missing teeth should be to provide patients with
good masticatory abilities. Therefore, it is important
that dentists know how mastication normally occurs.
Horner's syndrome can be produced by lesions of the nasociliary
nerve as it runs with the ophthalmic division.
Lesions of the ganglion: herpes zoster infection, primary and
Trigeminal root lesions: adjacent tumors and vascular
malformations, especially acoustic neurinoma and
cholesteatomas. These lesions are prone to produce facial pain
that is often misdiagnosed as tic douloureux or tooth pain.
Clinically there is atrophy and flaccid paralysis of the muscles of | <urn:uuid:00e51da1-1c5d-41b5-a1a1-7a0fb96fecba> | {
"date": "2017-06-28T05:24:02",
"dump": "CC-MAIN-2017-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322320.8/warc/CC-MAIN-20170628032529-20170628052529-00057.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8551908135414124,
"score": 3.390625,
"token_count": 2181,
"url": "https://www.slideshare.net/chaturvedipooja69/muscles-of-mastication-34732346"
} |
This article was published in Australian Dictionary of Biography, Volume 13, (MUP), 1993
Daniel Alexander Daley (1916-1949), grazier and soldier, was born on 6 August 1916 at Moree, New South Wales, only son and youngest of four children of James Joseph Daley, labourer, and his wife Ethel Maud, née Smith, both native-born. James established himself as a grazier and acquired two properties, The Point, and Springfield, near Biniguy, on which the family lived. Educated at Pallamallawa Public School and The King's School, Parramatta, Dan left in December 1932 to work with his father. Tall and dark, a good boxer and a skilled horseman, young Daley became widely known in show rings and at rodeos in the State's north-west. He was a 'very popular man in the community'.
In March 1939 he joined the 24th Light Horse Regiment (Militia) and on 27 June 1940 enlisted in the Australian Imperial Force. With other light horsemen, Daley volunteered for the 20th Infantry Anti-Tank Company in July and in October sailed for Palestine. In February 1941 his unit moved to Cyrenaica, Libya, where it was involved in the withdrawal to and the defence of Tobruk. There Daley knocked out several enemy tanks and was appointed lance corporal.
After returning to Palestine in September, his company was absorbed into the 2nd/3rd Anti-Tank Regiment. Daley was made lance sergeant in April 1942. Back in the Western Desert in July, he had charge of a 2-pounder (0.9 kg) gun at El Alamein. On 17 July he supported the 2nd/32nd Infantry Battalion in the fighting for Makh Khad Ridge. Through heavy shelling and machine-gun fire, he kept his gun and crew in action, but suffered a slight wound. German tanks then attacked. Although under a hail of armour-piercing bullets which seriously wounded him and his gunlayer, he put six of the tanks out of action. 'By his courage and determination he materially assisted in breaking up the counter-attack, and in no small degree inspired the gunners of the troop in rear of him.' While recovering in hospital, Daley was awarded the Distinguished Conduct Medal. He rejoined his regiment on 27 October during the climactic battle of El Alamein.
Promoted acting sergeant, Daley arrived in Sydney with the 9th Division in February 1943. He served in Papua and New Guinea from August, but, as there were no Japanese tanks, his battery was used as labour and in coastal defence near Finschhafen. The great days were over. At home, his father (whose health was failing) struggled to keep the properties going. Obtaining release on compassionate grounds, Daley returned to Australia in April 1944 and was discharged on 22 May. He then took over management of Springfield and The Point.
Dan Daley's enjoyment of life as a grazier in the postwar boom was brief. In the early hours of 20 August 1949, while driving five friends to Moree, he and four of his companions were killed when the motorcar failed to take a bend. Daley was buried in Moree cemetery with Anglican rites. He was unmarried.
A. J. Hill, 'Daley, Daniel Alexander (1916–1949)', Australian Dictionary of Biography, National Centre of Biography, Australian National University, http://adb.anu.edu.au/biography/daley-daniel-alexander-9890/text17505, published first in hardcopy 1993, accessed online 24 August 2016.
This article was first published in hardcopy in Australian Dictionary of Biography, Volume 13, (MUP), 1993 | <urn:uuid:14cd01f6-8844-4c09-be1f-d97a34261d1e> | {
"date": "2016-08-24T13:53:40",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292330.57/warc/CC-MAIN-20160823195812-00076-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9858152866363525,
"score": 2.625,
"token_count": 794,
"url": "http://adb.anu.edu.au/biography/daley-daniel-alexander-9890"
} |
Ferdinand is a very small, dark moon (about 20 km in diameter) which orbits Uranus at a greater distance than any other known satellite of that planet. Its orbit is highly eccentric and in the opposite direction from the regular
moons and the rotation of the planet, itself -- known as a retrograde
orbit. This suggests that it was an independent body that was captured by Uranus' gravity. Little else is known about it.
Ferdinand was discovered on 13 August 2001 by Dan Milisavljevic, Matthew J. Holman, John J. Kavelaars, and Tommy Grav, at the Cerro Tololo Inter-American Observatory.
How Ferdinand Got its Name:
Originally called S/2001 U2, Ferdinand was named for the son of Alonso, king of Naples in William Shakespeare's play, "The Tempest." Ferdinand eventually marries Miranda, daughter of Prospero, and aids his father-in-law in regaining his Dukedom in Milan.
Moons of Uranus are named for characters in Shakespeare's plays and from Alexander Pope's "Rape of the Lock." | <urn:uuid:12980b88-b54e-409e-afc7-088999e15e9b> | {
"date": "2014-03-09T19:03:13",
"dump": "CC-MAIN-2014-10",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010213406/warc/CC-MAIN-20140305090333-00006-ip-10-183-142-35.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9703277945518494,
"score": 3.0625,
"token_count": 231,
"url": "https://solarsystem.nasa.gov/planets/profile.cfm?Object=Ura_Ferdinand"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.