text
stringlengths 198
630k
| id
stringlengths 47
47
| metadata
dict |
---|---|---|
Editor’s note: Kari Lydersen recently spent two weeks in Germany and the UK on a Climate Media fellowship from the Heinrich Böll Foundation North America
As European countries aggressively ramp up renewable energy, they face a constraint that is familiar in the Midwest: The need to expand and overhaul the electric grid.
In Germany and Britain, greatly increased reliance on wind power and distributed solar generation are dependent on building new high voltage transmission lines from ideal wind farm sites to population centers, while also making the grid smarter and more responsive.
And while there are significant differences in economics, politics and geography on either side of the Atlantic, many of the obstacles remain the same.
Who owns the grids?
In Germany and Britain, as well as in the U.S., the grid is largely owned by a number of different entities. In Europe, that often includes foreign, state-owned companies.
Major companies own both power generation – gas, nuclear, coal and renewables – and pieces of the grid, but as in many U.S. states, “unbundling” mandates in recent years have meant there must be a firewall between the generation and transmission operations.
Starting in 2010, the British government instituted grid-related reforms which pleased many renewable energy advocates, including new procedures for offshore grid connections, changes in the way generators are charged for connection to the grid, and updated requirements for gaining access to the national grid. But advocates say more planning and modernization is needed.
In Germany, elected officials with the Green Party and other energy reformers have called for a single entity that would unify ownership of the grid and be responsive to centralized planning aimed at making it more efficient and conducive to renewable energy development.
The portions of the grid that deliver electricity to consumers within municipalities were in the past usually also operated big utility companies, under franchise contracts with the municipal government. But as these contracts have expired, municipalities are increasingly deciding to run the grid themselves or sign new contracts with smaller utility companies, “which might include special obligations to integrate renewable energy sources better into the local grid,” as explained by Wibke Brems, a Green Party state legislator in North-Rhine Westphalia. This trend has much in common with the push for municipal aggregation in the U.S.
Brems described the town of Schönau in the Black Forest, where citizens who had become organized around fallout from the Chernobyl disaster turned their attention to clean energy:
“They wanted to find a way to produce all their electricity in an environmentally friendly way, so they started to invest in renewable energies and organized workshops and offered consultation on energy saving and efficiency. In the ‘90s the citizens of Schönau decided in a referendum that they wanted the local grid to be run by themselves rather than a bigger utility company. Today the utility company Schönau provides electricity provided by renewable sources – and a very small percentage by combined heat and power generating gas turbines – throughout Germany and for all of Schönau.”
Making the grid bigger
Taking a plane from Germany to London on a clear day, one sees the striking site of scores of graceful white wind turbines rising in symmetric patterns from the glistening blue sea speckled with foamy whitecaps. Those whitecaps mean that the wind turbines are also likely spinning at a healthy rate, producing power transported to shore through undersea cables.
If wind industry and clean energy proponents have their way, such offshore wind farms will sprout around the coast of the United Kingdom.
The UK already leads Europe in installed offshore wind power, with 2.67 GW of installed capacity announced in September, enough to power 1.8 million homes. A map published by the wind, wave and tidal trade group RenewableUK shows offshore wind farms in the planning and development stages circling the United Kingdom, especially off the northwest coast.
“We have the potential to become the world leader in wind, and if we get this right then the UK has the potential to be the powerhouse in this industry,” said Steve Green, director of RenewableUK’s job-training program. “To miss that opportunity would be a tragedy.”
Wind farms offshore are much more expensive than onshore wind power, given the extra structural and logistical challenges – like corrosion from saltwater, the pressure of waves and the difficulty of construction and maintenance at sea. That’s one reason major clean energy groups in the U.S. haven’t made a priority out of offshore wind in the Great Lakes or other locations with the exception of the East Coast, with its many densely-packed, power-hungry coastal cities.
“In the Midwest we have good wind in Illinois and Iowa and Michigan and Indiana that’s much closer to our load centers, where it’s so much cheaper to build onshore wind than offshore wind,” said Kevin Borgia, public policy manager for the St. Paul-based group Wind on the Wires.
Steve Green and other industry proponents think that the UK’s location means it can achieve offshore wind development, manufacturing and installation economies of scale not possible for many other countries.
However, offshore wind depends on significant expansions of transmission lines, not only undersea lines to get the power to shore but then high voltage lines from remote coastal areas to get the electricity where it needs to go.
The United Kingdom is also a world leader in research and development of wave and tidal power, which will likewise be dependent on significant transmission extensions.
A March 2011 report by RenewableUK notes that many wave and tidal projects are in a catch 22-type conundrum where they need certainty of grid access to attract investment, but it’s unlikely new transmission infrastructure will be built until these power sources have proved themselves.
Germany faces a similar situation. Wind energy proponents would like to see wind turbines in the North Sea and Baltic Sea, but there is little point unless the energy gets to population and manufacturing centers in southern Germany.
…and making the grid smarter
Even with enough transmission infrastructure in place to transport renewable energy, reliance on renewable energy means existing pieces of the grid also need to be improved, overhauled and made more responsive to large fluctuations of supply and demand.
Bundestag member Oliver Krischer noted that while Germany is miles ahead of the U.S. in various aspects of shifting to clean energy, it lags far behind the U.S. and also other European Union countries in attention and resources given to smart grid improvements. Many major U.S. cities, including Chicago, San Diego, Tempe and Washington D.C. have smart grid pilot projects underway. Though these initiatives have had their share of setbacks, they offer the promise of allowing many residents to tailor their energy use to times of day when demand is lowest and to be rewarded financially for their efforts.
“Many energy companies are asking for smart grid standards, but the [German] government doesn’t seem willing to do this work,” said Krischer, a Green Party member. “It’s not a technical problem, it’s a political problem.”
An August story in Green Tech Media explained the reluctance of European utilities to invest in smart grid technology in the near-future, but projected a positive outlook in the longer term:
Consulting firm Steria Mummert polled 100 German utility executives and found that only half of them wanted to spend money on smart grid between now and 2014. That’s compared to three-quarters who planned to spend on renewable energy, and 30 percent that planned to spend on conventional fossil fuel sources like natural gas…Over the long haul, Europe’s smart grid spending is expected to grow to €6.8 billion ($8.3 billion) per year by 2016, GTM Research predicts, as national smart meter mandates, grid improvements and utility IT overhauls grow to match the increasingly complex needs of Europe’s green power and energy efficiency mandates.
Meanwhile, clean energy advocates in Germany — where more than a million individual households and businesses have solar panels installed on their roofs and properties — say the grid must be upgraded to better facilitate two-way electricity transmission, so , for instance, a farmer with solar panels on his house and barn needs to be able to efficiently send energy back to the grid when the sun is shining, along with receiving energy when it is not.
Germany’s famous (and currently somewhat embattled) feed-in tariff program has pushed the widespread installation of solar panels that ultimately means a robust network of decentralized distributed generation.
The U.S. lacks a feed-in tariff like the one in Germany. England has a less-ambitious program, wherein people are paid a fixed rate for years for the renewable energy they generate. Some U.S. residents and institutions can essentially be paid for the solar or other renewable energy they produce through net-metering programs, which vary by state and have not been implemented as widely as many advocates would like.
Installation of solar panels and small wind turbines at individual homes or businesses is far less common in the U.S., so upgrades for more efficient two-way flow of electricity have not necessarily been a significant priority in the U.S. yet. But that could change if distributed generation continues to get more popular.
“There are upgrades required for the transmission grid regardless – the grid as it currently stands needs upgrades for reliability to make sure the lights stay on, to make sure costs stay low,” said Borgia. “Having a more robust electric grid means making sure power can be delivered to us more efficiently and more quickly – the upgrades need to be made just to make sure the grid keeps working. In addition we need these long-distance transmission lines to bring renewables into the grid, and other changes to the grid and policy, to make sure we have a clean energy future based on renewables.” | <urn:uuid:dd808593-10be-4c01-bc38-748b87e8f569> | {
"date": "2015-03-30T02:17:47",
"dump": "CC-MAIN-2015-14",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298889.70/warc/CC-MAIN-20150323172138-00030-ip-10-168-14-71.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9534390568733215,
"score": 2.953125,
"token_count": 2040,
"url": "http://www.midwestenergynews.com/2012/10/10/in-europe-as-in-the-midwest-renewable-revolutions-depend-on-a-better-grid/"
} |
Hi Mustard bite,
The /z/ was a very difficult sound for me too. I cannot tell how many hours I spent listening and repeating dialogues until the teacher accepted my pronunciation.
Here are some tips and part of a dialogue from the book “How Now, Brown Cow?” by Mimi Ponsonby.
/s/ This is a voiceless sound. Place the tip of your tongue between your teeth so that the teeth grip the sides of the tongue firmly. Now draw back the very tip and press it against the bottom teeth. There should now be a small passage over the top of the tongue through which air can pass straight from the lungs. Keep the lips spread and expel the air in a hissing sound.
/z/ This, like its voiceless equivalent /s/, is a continuous sound. The lips and tongue are in the same position as for /s/ but the vocal cords are vibrated, which will cause some tension in the tongue itself. The vibration should be very strongly felt.
DIALOGUE 15. The zoology exam´s on Thursday
EZRA: How´s things these days, Lizzie?
LIZZIE: I’m exhausted. Revising for the zoology exam!
EZRA: You´ve got bags under your eyes, Lizzie. Take it easy!
LIZZIE: It´s all very well for you to advise, Ezra, but I’m going crazy. One of those miserable Zeno boys, two houses down, plays his transistor as if he was as far away as Mars!
EZRA: Boys will be boys. These days everyone plays transistors…”
Some useful links:
YouTube - Accent Reduction: English Pronunciation of S and Z
BBC Learning English | Pronunciation Tips | <urn:uuid:9d7e5305-0c8b-4dc7-93e9-68a964940ab6> | {
"date": "2014-10-25T12:11:07",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119648148.32/warc/CC-MAIN-20141024030048-00165-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9303746819496155,
"score": 2.78125,
"token_count": 384,
"url": "http://www.usingenglish.com/forum/threads/143808-Please-help-with-the-z-and-s-sounds"
} |
Stark visuals of the ongoing genocide in the Darfur region of Sudan -- including maps showing where millions of refugees have gone -- are now available on Google Earth in a partnership with the U.S. Holocaust Memorial Museum.
The museum works to stop current genocide in addition to educating people about the history of the Jewish holocaust, and Google Earth can help the museum demonstrate the destruction in Darfur in new ways, said Sara Bloomfield, museum director.
While people can find information about the crisis in Darfur, more information in new formats is needed to spur more people to action, she said during a launch of the Crisis in Darfur project at the Washington, D.C., museum. Although information about recent and past genocides has been available, many people have had trouble comprehending and responding to the tragedies, she added.
"We learned the difference between information and understanding," she said. "Adequate response requires both understanding and empathy -- understanding of the scope and the magnitude of the situation and empathy for these victims as individuals."
The museum's partnership with Google presents a "unique opportunity" to show the scope of the problem in Darfur, she said.
Daowd Salih, a refugee from Darfur, agreed, saying more people need to be aware of the crisis. "People around the world need to see what genocide looks like," he said. "It's not about numbers, it's about people, people like my brothers and sisters who are still in Darfur. We need people to understand what is happening."
As many as 400,000 Darfurians have been killed in the conflict, according to numbers from aid organizations. The government and Janjaweed troops have killed "innocent children, women and elders," Salih said.
The Sudanese government disputes the death estimates from aid organizations and has denied backing the Janjaweed militia.
One map available on Google Earth uses flame symbols to show the location of more than 1,600 Darfurian villages that have been damaged or destroyed by Sudanese troops or the Janjaweed militia. By zooming in on the map, Google Earth users can see markers for the tens of thousands of homes that have been destroyed since mid-2003.
By selecting a 3D option, Google Earth users can see the population of camps where the 2.5 million displaced Darfurians have gone. Another map shows areas where it's too dangerous for aid workers.
Along with the maps and charts, there are photographs and videos showing the situation on the ground. One photograph shows an infant with a bullet exit wound in her lower back after being shot by raiders. The maps and other media on Google Earth also link to pages telling users what they can do to get involved.
Google sees the project as an important part of the company's social responsibility, said Elliot Schrage, the company's vice president for global communications and public affairs. Schrage called the crisis in Darfur a "global catastrophe."
"We believe technology can be catalyst for education, for understanding, and importantly, for action," he added. | <urn:uuid:ef3d97a1-3bb5-4e06-bac3-b5417c40cc94> | {
"date": "2018-10-19T15:32:46",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512411.13/warc/CC-MAIN-20181019145850-20181019171350-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9463976621627808,
"score": 3.03125,
"token_count": 632,
"url": "https://www.pcworld.idg.com.au/article/9470/visuals_darfur_tragedy_now_google_earth/"
} |
A study of the greenhouse gas emissions produced by the airline industry from 2007 to 2014 revealed none are showing a significant reduction over the seven years for those that provided the data.
In the study Finnair had the smallest carbon footprint in 2014, with TAP Portugal and Virgin Australia in the top three least polluting airlines, while American Airlines, following its merger with US Airways in 2013, had the largest footprint in the study with fellow US carriers Delta and United Airlines also large polluters in this sample.
Frederik Dahlmann, of Warwick Business School who conducted the study, said: “Finnair perform best due to the age and type of its planes, the routes it flies and the overall number of connections it offers. Plus it is probably among the most advanced when it comes to accounting for and managing its emissions over time.
“The data demonstrates that for most airlines emissions are either growing or stagnant, none are showing a significant reduction in CO2 emissions.
“This is despite many airlines introducing modern and more efficient planes to their fleet. The increasing number of flights, which is set to double by 2030, means cutting emissions is a real problem.
“Releasing details about carbon footprints is entirely voluntary, there is no obligation for airlines to disclose this data, so we have only been able to collect data for 20 major airlines. There are more than 200 international airline companies, but many would not provide the data.
“Some, such as easyJet, Etihad and Ryanair, have only just begun to make their data publicly available. This explains why there is only data for 2014 for Etihad and Ryanair.
“We need more airlines to publicly account for their emissions so passengers can take emissions into consideration when arranging their travel plans.
“Even though it is not every airline the data still represents a huge challenge to the industry to meet its CO2 targets, which have come under criticism from environmental groups for not going far enough as the UN seeks to slow global warming to below 2C.
“It shows how much needs to be done to meet the new targets set by the industry bodies.”
Dr Dahlmann says the aviation industry produces around two per cent of the world’s human induced CO2 emissions, a figure predicted to grow to about three per cent in 2050 if no action is taken.
Last December’s UN Climate Conference of Parties (COP) in Paris led to an international agreement among more than 190 countries to attempt to limit the increase in global temperatures to less than 2C and to continue efforts to limit it to 1.5C.
As a result the International Civil Aviation Organization (ICAO) has set itself the goal of reducing aviation’s net CO2 emissions to 50 per cent of what they were in 2005 by 2050. It also recently agreed the first-ever binding agreement for a four per cent cut in CO2 emissions compared to 2015 levels to all new commercial jets delivered after 2028.
Some of the airlines that have seen a spike in carbon emissions can be explained as a result of recent merger activities, particularly in the US: for example American Airlines and US Airlines, United Airlines and Continental Airlines and in Europe British Airways and Iberia, now IAG.
Dr Dahlmann added: “The data illustrates the significant growth in recent years of certain younger airlines, such as Emirates. It may also reflect those airlines using older and more inefficient planes.
“Unfortunately the data does not provide a full and completely fair picture as not all companies disclose their emissions data and given the significant variations in business models, flight destinations and aircraft used.”
Dr Dahlmann examined data taken from 20 of the world’s biggest airlines’ annual reports and the Carbon Disclosure Project – a global voluntary carbon data reporting organisation – to explore the challenges the airline industry is facing. He included scope one and two emissions, that is pollution from jet fuel plus indirect CO2 pollution from the airlines’ ground operations and services.
“It is important for the entire industry to manage the transition to a low-carbon economy through a systemic approach that covers all of their operations and the need for developing cross-industry partnerships, even with competitors,” said Dr Dahlmann.
“Given the role and importance of air travel we need to see as many activities as possible succeed to reduce the impact on the global climate and before we can experience truly ‘green flights’.”
Source: Warwick Business School | <urn:uuid:89447f8c-08b4-4fa1-8340-f7d3b117162b> | {
"date": "2017-01-24T13:07:15",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00302-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9458698630332947,
"score": 2.921875,
"token_count": 921,
"url": "https://www.pilotcareercentre.com/Aviation-Pilot-Recruitment-News-Item/6898/Finnair%20found%20to%20be%20cleanest%20airline%20in%20new%20study"
} |
From the moment a person is born, he becomes subject to the steady indoctrination of the society. Part of this indoctrination, possibly the most persuasive, holds that reality is what the hands can touch and the eyes can see. This understanding, which is quite influential in the majority of the society, is carried without question from one generation to another.
But without being subjected to any indoctrination, a moment of objective thought would make one realize an astonishing fact:
Everything we confront from the moment we come into existence—human beings, animals, flowers, their colors, odors, fruits, tastes of fruits, planets, stars, mountains, stones, buildings, space—are perceptions presented to us by our five senses. To further clarify this, it will help to examine the senses, the agents that provide us with information about the exterior world.
All of man's sensory faculties—sight, hearing, smell, taste and touch—function in the same way. Stimuli (lights, sounds, smells, tastes, textures) from objects in the external world are carried through nerves to the sensory centers in the brain. All these stimuli that reach the brain consist of electric signals. For example, during the process of vision, light rays (or photons) radiating from sources in the exterior world reach the retina at the back of the eye and, through a series of processes, are transformed into electric signals. These signals are transferred along nerves to the brain's vision center. There, a colorful, bright and three-dimensional world is perceived within the space of a few cubic centimeters.
The same system applies to other senses as well. Cells on the surface of the tongue transform chemical traces into electric signals that become tastes. Odors are transformed into electric signals by cells in the epithelium of the nose. Special sensors lodged beneath the skin transform impulses of touch (such as the sensations of hardness or softness) into electric signals, and a special mechanism in the ear does the same with sound. All these signals are sent to appropriate centers in the brain, where they are perceived.
To clarify the point, assume that you're drinking a glass of lemonade. The hard, cool surface of the glass you're holding is transformed into electric signals by special receptors under your skin and sent to the brain. Simultaneously, the smell of the lemonade, its taste, and yellowish color all become signals that reach the brain. Likewise, the clink you hear when the glass touches the table is perceived by the ear and transmitted to the brain as an electric signal. All these perceptions are interpreted in the brain's relevant centers, which work harmoniously with one another. As a cumulative result of these impulses, you sense that you are drinking a glass of lemonade.
Concerning this important fact, consider the thoughts of B. Russell and L. J. J. Wittgenstein, two famous philosophers:
For instance, whether a lemon truly exists or not and how it came to exist cannot be questioned and investigated. A lemon consists merely of a taste sensed by the tongue, an odor sensed by the nose, a color and shape sensed by the eye; and only these features of it can be subject to examination and assessment. Science can never know the physical world.50
In other words, it is impossible for us to reach the physical world. All objects we're in contact with are actually collection of perceptions such as sight, hearing, and touch. Throughout our lives, by processing the data in the sensory centers, our brain confronts not the "originals" of the matter existing outside us, but rather copies inside our brain. At this point, we are misled to assume that these copies are instances of real matter outside us.
This obvious fact has been proven by science today. Any scientist would tell you how this system works, and that the world we live in is really an aggregate of perceptions formed in our brains. The English physicist John Gribbin states that our senses are an interpretation of stimulations coming from the external world—as if there were a tree in the garden. He goes on to say that our brain perceives the stimulations that are filtered through our senses, and that the tree is only a stimulation. So, he then asks, which tree is real? The one formed by our senses, or the tree in the garden?51
No doubt, this reality requires profound reflection. As a result of these physical facts, we come to the following indisputable conclusion: Everything we see, touch, hear, and call "matter," "the world" or "the universe" is nothing more than electrical signals interpreted in our brain. We can never reach the original of the matter outside our brain. We merely taste, hear and see an image of the external world formed in our brain.
In fact, someone eating an apple confronts not the actual fruit, but its perceptions in the brain. What that person considers to be an apple actually consists of his brain's perception of the electrical information concerning the fruit's shape, taste, smell, and texture. If the optic nerve to the brain were suddenly severed, the image of the fruit would instantly disappear. Any disconnection in the olfactory nerve traveling from receptors in the nose to the brain would interrupt the sense of smell completely. Simply put, that apple is nothing but the interpretation of electrical signals by the brain.
Also consider the sense of distance. The empty space between you and this page is only a sense of emptiness formed in your brain. Objects that appear distant in your view also exist in the brain. For instance, someone watching the stars at night assumes that they are millions of light-years away, yet the stars are within himself, in his vision center. While you read these lines, actually you are not inside the room you assume you're in; on the contrary, the room is inside you. Perceiving your body makes you think that you're inside it. However, your body, too, is a set of images formed inside your brain.
Millions of Colors in a Pitch-Black Location
Considering this subject in greater detail reveals some even more extraordinary truths. Our sense centers are located in the brain, a three-pound piece of tissue. And this organ is protected inside an array of bones called the skull, which neither light, nor sound, nor odors can penetrate. The inside of the skull is a dark, silent place where all smells are absent.
But in this place of complete darkness occur millions of color shades and sound tones, as well countless different tastes and smells. So how does this happen?
What makes you perceive light in a location without light, odors in a place without smell, sounds in total silence and the objects of all other senses? Who created all of this for you?
In every moment of your life, a variety of miracles take place. As mentioned earlier, anything your senses can detect in this room you're in, are sent as electrical signals to your brain, where they then combine. Your brain interprets them as a view of a room. Put another way, while you assume that you are sitting in this room, that room is actually inside you, in your brain. The "place" where the room is assembled and perceived is small, dark, and soundless. And yet a whole room or a whole landscape, regardless of its size, can fit into it. Both a narrow closet and a wide vista of the sea are perceived in the exact same place.
Our brains interpret and attribute meaning to the signals relating to the "external world." As an example, consider the sense of hearing. It's our brain that in fact interprets and transforms the sound waves into a symphony. That is to say, music is yet another perception created by our brain. In the same manner, when we perceive colors, what reaches our eyes is merely light of different wavelengths. Again, it's our brain that transforms these signals into colors. There are no colors in the "external world"; neither is an apple red, nor the sky blue, nor the leaves green. They appear as they do simply because we perceive them to be so.
Even a slight defect in the eye's retina can cause color blindness. Some sufferers perceive blue and green as the same, some red as blue. At this point, it does not matter whether or not the outside object is colored.
The prominent thinker George Berkeley also addresses this fact:
In conclusion, the reason we see objects in colors is not because they are actually colored or have a material existence in the outer world. The truth, rather, is that the qualities we ascribe to objects are all inside us.
And this, perhaps, is a truth you have never considered before.
Mankind's Limited Knowledge
One implication of the facts described so far is that actually, man's knowledge of the external world is exceedingly limited.
That knowledge is limited to our five senses, and there is no proof that the world we perceive by means of those senses is identical to the "real" world.
It may, therefore, be very different from what we perceive. There may be a great many dimensions and other beings of which we remain unaware. Even if we reach the furthermost extremities of the universe, our knowledge will always remain limited.
Almighty God, the Creator of all, has complete and flawless knowledge of all beings who, having been created by God, can possess only the knowledge that He allows them. This fact is related in the Qur'an thus:
God, there is no god but Him, the Living, the Self-Sustaining. He is not subject to drowsiness or sleep. Everything in the heavens and the earth belongs to Him. Who can intercede with Him except by His permission? He knows what is before them and what is behind them but they cannot grasp any of His knowledge save what He wills. His Footstool encompasses the heavens and the Earth and their preservation does not tire Him. He is the Most High, the Magnificent. (Surat al-Baqara, 255)
Who Is the Perceiver?
In order to perceive, no external world is necessary. Given the right kind of stimulation to the brain, sensations of touch, sight, and sounds, can be recreated in the brain. The best example of this process is dreams.
RüDuring dreams, your body typically remains still and motionless in a dark and quiet bedroom, and your eyes remain shut. Neither light nor sound nor any other stimuli from the exterior world is reaching your brain for it to perceive. Yet in your dreams, you still perceive experiences very similar to real life. In your dreams you also get up and go to work, or go on vacation and enjoy the warmth of the sun.
Furthermore, in dreams you never feel doubts about the reality of what you experience. Only after you wake up you realize your experiences were only dreams. You not only experience such feelings as fear, anxiety, joy and sadness but also see different images, hear sounds and feel matter. Yet there is no physical source producing these sensations and perceptions; you lie motionless inside a dark and quiet room.
René Descartes, the renowned philosopher, offered the following reasoning on this surprising truth about dreams:
In my dreams I see that I do various things, I go to many places; when I wake up, however, I see that I have not done anything or gone anywhere and that I lie peacefully in my bed. Who can guarantee to me that I do not also dream at the present time, further, that my whole life is not a dream?53
We are therefore looking at a manifest truth: There is no justification for our claiming that we establish direct contact with the original of the world that we claim to exist and to be living in.
Is Our Brain Distinct from the Outside World?
If everything we know as the outside world is only perceptions produced internally, what about the brain which we think does the seeing and hearing? Isn't it composed of atoms and molecules like everything else? The brain, too, is a piece of tissue that we perceive through our senses. This being so, what is it, if not the brain, that perceives everything—that sees, hears, touches, smells and tastes?
At this point, we face the obvious fact: that man, a being of consciousness who can see, feel, think and exercise reason, is much more than a mere assemblage of atoms and molecules. What defines a human being is the "soul" granted to him by God. Otherwise, it would be highly unreasonable to attribute his consciousness and other faculties to a three-pound piece of flesh:
He Who has created all things in the best possible way. He commenced the creation of man from clay; then produced his seed from an extract of base fluid; then formed him and breathed His Spirit into him and gave you hearing, sight and hearts. What little thanks you show! (Qur'an, 32: 7-9)(Surat as-Sajda,7-9)
The Being Nearest to Us is God
Since a human being is not merely a lump of matter but a "soul," then who makes that soul feel the sum of perceptions which we call the external world? Who continues to create all these perceptions, ceaselessly?
The answer is obvious. God, Who breathed into man His spirit, is the Creator of all things. He is also the real source of all perceptions. The existence of anything is possible only through God's creation. God informs us that He creates continuously and that whenever He stops creating, everything will disappear:
God keeps a firm hold on the heavens and the Earth, preventing them from vanishing away. And if they vanished no one could then keep hold of them. Certainly He is Most Forbearing, Ever-Forgiving. (Surah Fatir, 41)
This verse is describing how the material universe is maintained under the might of God. God created the universe, the Earth, mountains, and all living and non-living things, and maintains all these under His power at every moment. God manifests His name al-Khaliq in this material universe. God is al-Khaliq, in other words, the Creator of all things, the Creator from nothing. This shows that there is a material universe, outside our brains, consisting of entities created by God. However, as a miracle and manifestation of the superior nature of His creation and His omniscience, God shows us this material universe in the form of an "illusion," "shadow," or "image." As a consequence of the perfection in His creation, human beings can never reach the world outside their brains. Only God knows this real material universe.
Another interpretation of the above verse is that God constantly maintains the images of the material universe that people see. (God knows best.) If God wished not to show us the image of the world in our minds, the entire universe would disappear for us, and we could never again make contact with it.
Faced with such facts, one must conclude that the only absolute being is God, Who encompasses everything in the heavens and the Earth:
What! Are they in doubt about the meeting with their Lord? What! Does He not encompass all things! (Surat al-Jathiyya, 54)
Both East and West belong to God, so wherever you turn, the Face of God is there. God is All-Encompassing, All-Knowing. (Surat Al-Baqara, 115)
What is in the heavens and in the Earth belongs to God. God encompasses all things. (Surat an-Nisa', 126)
When We said to you, "Surely your Lord encompasses the people with His knowledge"… (Surat Al-Isra', 60)
… His Footstool encompasses the heavens and the Earth and their preservation does not tire Him. He is the Most High, the Magnificent.(Surat Al-Baqara, 255)
God's knowledge and ability surrounds us from the front and back, from right and left—that is to say, He encompasses us completely. He observes us everywhere, at every moment. He holds absolute control over us, from inside and outside. He, the Owner of infinite might, is closer to us than our own jugular veins.
50. Orhan Hancerlioglu, Dusunce Tarihi (The History of Thought), (Istanbul: Remzi Bookstore, 6th edition, 1995) p. 447.
51. John Gribbin, In the Search of the Big Bang; Taflk›n Tuna, Uzay›n Otesi (Far Beyond the Universe), p. 194
52. Treaties Concerning the Principle of Human Knowledge, 1710, Works of George Berkeley, vol.1, ed. A. Fraser, Oxford, 1871
53. Macit Gökberk, Felsefe Tarihi (History of Philosophy), p. 263 | <urn:uuid:0c08c2ec-c736-4b5a-9eb3-68f634bb3bb0> | {
"date": "2015-01-30T14:20:23",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115857131.28/warc/CC-MAIN-20150124161057-00199-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9549258947372437,
"score": 3.4375,
"token_count": 3498,
"url": "http://www.harunyahya.com/en/books/2870/Miracle-In-The-Eye/chapter/1720/Who-sees"
} |
Check out this cool idea a reader submitted. It’s simple, but genius!
If you use a pocket chart to hold vocabulary words, you can diagram them right on the pocket! Use an overhead marker or a whiteboard marker to diagram words onto the clear front pocket of the chart! This way, you can leave it up for the week while you’re focusing on a specific principle, and you don’t have to write on the word strip.
Have any other great ideas? Send them to me (squareheadteachers at gmail dot com) and I’ll post them on this blog! Thanks! | <urn:uuid:dc3b32c8-5c7a-4192-bbf2-c852543d1dc3> | {
"date": "2018-04-22T10:16:51",
"dump": "CC-MAIN-2018-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945584.75/warc/CC-MAIN-20180422100104-20180422120104-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.83512943983078,
"score": 2.921875,
"token_count": 131,
"url": "https://squareheadteachers.com/tag/consonants/"
} |
What it is…
Last week, a nasty bug, Heartbleed, was found in OpenSSL, version 1.0.1 (released April 19, 2012). OpenSSL, allows for the encrypted transference of data (usernames, passwords, cookies, etc.) from users to website servers. There are several versions of OpenSSL, but the one I just mentioned is very popular. The actual percent of servers affected varies depending upon who you happen to read or talk to, so let’s just agree that it was a lot of servers, and certainly enough to make you concerned about the current level of security of your computer and/or local network.
Here is a very good explanation from Engadget, about how Heartbleed actually works:
“Heartbleed exploits a built-in feature of OpenSSL called heartbeat. When your computer accesses a website, the website will respond back to let your computer know that it is active and listening for your requests: this is the heartbeat. This call and response is done by exchanging data. Normally when your computer makes a request, the heartbeat will only send back the amount of data your computer sent. However, this is not the case for servers currently affected by the bug. The hacker is able to make a request to the server and request data from the servers memory beyond the total data of the initial request, up to 65,536 bytes.
The data that lives beyond this request “may contain data left behind from other parts of OpenSSL” according to CloudFlare. What’s stored in that extra memory space is completely dependent on the platform. As more computers access the server, the memory at the top is recycled. This means that previous requests may still reside in the memory block the hacker requests back from the server. Just what might be in those bits of data? Login credentials, cookies and other data that may be exploitable by hackers.”
How dangerous is it…
What is current level of risk? Again form Engadget:
“…even if hackers knew about the (Heartbleed) problem (something that hasn’t been confirmed –- aside from by our friends at the NSA, apparently), the chances of them getting your password, and being able to match up that data to your username are pretty slim. Some people claim that the encryption certificates for servers (a technology that allows us to confirm that a website is in fact what it says it is) could have been stolen, but the company CloudFlare has said it’s very difficult to do. It published a challenge to whoever could steal this key, and it appears that someone did, during a server reboot. Regardless of the probability, companies are changing encryption keys so new data is not vulnerable if somebody was able to obtain the old keys.”
Even though Hearbleed isn’t quite a scary as many of the media pundits first thought, because of the large number of sources (servers using OpenSSL v. 1.0.1), the Titanic sized gaping hole in OpenSSL security created by the bug that allowed a potential total access to zillions of bits of personal information readily available to “bad guys”, and the length of time the hole remained open (April 19th, 2012), it seems only prudent that users (you and me) take some preventative measures to protect ourselves against any exploits that may have materialized from Heartbleed.
What you should do…
The best way to protect yourself is simply to change your passwords on your internet accounts. Ouch! If you are like me, you could have a lot of internet accounts. Let the amount of concern you have for the risk of attack from a Hearbleed exploit be your guide, as to how many passwords you want to change. Here is what I did:
- I immediately changed the passwords for all my major accounts – one’s that I felt an exploit would do the most damage, i.e., online banking, PayPal, Google, Apple ID, Amazon, etc.
- Because I have a lot of online accounts, I use a password manager: LastPass. I have used LastPass for over a year now, and I have found LastPass invaluable. One of multitude of features of LastPass is a security check it will run on all the sites you have listed with passwords. To run the check, go to “Tools” from the drop down menu, and then go to “Security Check”. The security check does many things, and germane to our discussion today, it checks for sites that might be affected by Hearbleed. When the check it done, LastPass will provide a list of sites needing password changes. Pretty cool!!!
- Finally, I installed “Chromebleed Checker” from the Chrome Store, and as no surprise, the program runs on a Chrome web browser. Should you land on site that does not have a safe version of OpenSSL, Chromebleed will let you know. | <urn:uuid:344c00c9-c0fc-49b0-bdb5-98d94b1d6221> | {
"date": "2017-11-17T19:08:37",
"dump": "CC-MAIN-2017-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934803906.12/warc/CC-MAIN-20171117185611-20171117205611-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.945273756980896,
"score": 2.8125,
"token_count": 1035,
"url": "http://www.larrytalkstech.com/heartbleed-what-it-is-how-dangerous-is-it-and-what-you-should-do/"
} |
What is metadata anyway, and why do I need it? Well, I'm gonna tell ya. It's simpler than it may seem, and very useful.
Is there anything more frustrating than finding a shoe box full of old family photos with nothing written on the back? The digital equivalent of this peeve is to find a digital photo or scan with no identifying information. Learning to use metadata will insure that you don't become one of those people. Identify your photos properly, and your online friends and descendants will thank you!
Metadata is, simply, digital information that resides "inside" of your digital photo. This identifying information travels with your photo so that when you move it to another device, share it, or post it online, the data travels with the photo. Metadata also can make it easier for you to find and sort photos on your computer.
There are essentially two types of metadata: EXIF information, which is automatically captured and stored by your camera or scanner. This can include the date the photo was taken, file size and type, exposure settings, color profile, even the location if taken with a smartphone. This information is usually not editable by the user, so you don't really have to worry about it.
The second type of metadata, which is editable by you, is the important part as far as we're concerned. Called IPTC or XMP data, this is where you can add your own information to your photos: things like captions or descriptions, "tags" or keywords, copyright info, etc.
There are many different ways to add this data, depending on what software you are using, but it's a safe bet these days that any photo organization software or operating system has a way to add metadata. I will show you how it's done in three different scenarios: Photoshop, Picasa, and Windows.
Adding metadata in Photoshop or Photoshop Elements couldn't be easier. With the photo open in Photoshop, click "File Info" from the File menu. This will bring up a box with editable fields that you can type in. I usually put captions or other identifying information in the "Description" field. Save the photo, and that information becomes a permanent part of the photo. You can also add information on a batch of photos when using Adobe Bridge or Lightroom by selecting multiple photos and adding, for instance, a keyword or copyright that will appear on all the selected photos.
Picasa is a popular photo organizing tool that's a free download from Google. Although Picasa has limited metadata options, it does allow you to enter a caption beneath each photo. If you add a caption in Picasa, and then open that file in Windows, the caption will appear in the Windows "Title" field. If you open that same file in Photoshop, it will show up in the "Description" field. Cool, huh? WARNING: For some odd reason, Picasa's metadata doesn't play well with TIF files, only with jpegs. If you add a caption to a TIF file and then open it in another program, it won't display. (Strangely, if you make a jpeg copy of the tif file, the caption you added to the tif file in Picasa will then show up.) And since we advocate working with tif files for print whenever possible, we can't wholeheartedly recommend Picasa because of this.
If you don't even want to bother with any additional software, you can easily enter metadata straight into Windows Explorer.
First of all, make sure that your open window is large enough to display the metadata at the bottom. Navigate to the folder where your photos reside. Select a photo or photos, find the "Title" field at the bottom of the screen (and also the "tag" field if you want to add tags or keywords), and type in your caption. If you later open the file in another location, that caption will travel with the photo.
You can also select a range of photos in a folder, or even all of them, and type in keywords that you want to appear in all of the photos. This is a great way to add a family name or place to a bunch of photos without having to do it one by one. (I usually do this with photos that I've taken myself: select them all and put my name and copyright info in the copyright or author field.)
To Tag or Not to Tag? That is the Question
Many people, especially photographers, love to tag every photo with searchable keywords. It's a great idea, especially if you have a lot of photos that are scattered in various places across your computer.
Personally, though, I use tags selectively. I just don't have the patience to think of and type in a bunch of keywords to every photo that comes into my system. I have a very organized file folder system which makes it relatively easy to find the images I need quickly (more on that in a future post.)
However, there is one instance in which I use often tags or keywords: family photos. Although I have my ancestor's photos neatly sorted into folders by family group, there are times when a photo could belong in two different folders. Rather than duplicating the photo, I put it in one folder and add all the family names in the keyword metadata. That way I can run a search on the family name and every photo with that keyword will appear in the search results.
You can also label each individual in a group photo in the keyword section, making it searchable by individual. For instance, you may want the caption to say only "Taylor family reunion, 1990." But you also want to identify the individuals. You can add the names to the keywords, and then when you search for "Tom Taylor," all photos that have his name will appear.
As more and more photos are being stored online, getting a handle on how to identify them is crucial. Using metadata is easy to do once you get the hang of it! | <urn:uuid:97102d65-9454-4844-8e82-eadbc0b19ff1> | {
"date": "2017-02-19T11:43:33",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00056-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9380976557731628,
"score": 2.578125,
"token_count": 1228,
"url": "http://picturesandstories.com/news/2014/4/21/tags-and-captions-how-to-label-your-digital-photos-using-metadata"
} |
Kelp contains the complete spectrum of minerals needed by man, as they are contained in the ocean itself. Aside from the fact that sea water as such is a veritable treasure trove of minerals, land minerals are constantly washing into the sea, enriching it still further (Ibid.). Even more important than the minerals needed in relatively large amounts, such as calcium, iron, phosphorus, potassium, and so forth, are the trace minerals--iodine, copper, manganese, boron, zinc, etc. These minerals appear in minute quantities in food. Our bodies need only microscopically small amounts of them. Yet if that tiny amount is not there, we can die from the lack. One of the most important trace elements in Kelp is iodine. This mineral is essential for the proper functioning of the thyroid which manufactures the hormone thyroxin. If an adequate amount of iodine is not provided in the diet, the thyroid gland is forced to work overtime and becomes enlarged in an effort to make up for the deficiency. This enlargement is known as goiter. Kelp is a much better source of iodine than the much-touted iodized salt, which is chemically isolated sodium chloride to which potassium chloride has been added. Most of us should not take as much salt as might be needed to supply the needed amount of iodine. Kelp is the ideal source of iodine. To get the daily requirement of 100 micrograms of iodine estimated as the requirement for human beings you would need to consume: 10 pounds of fresh vegetables and fruits, or 8 pounds of cereals, grains and nuts, or 6 pounds of meat, fish, fowl, or 2 pounds of eggs, or 3 pounds of marine fish, or .2 pounds of shellfish. Used as a condiment, Kelp could supply easily the amount required; it contains 10 times as much iodine as American iodized salt (RodC:7 16). 100% vegetarian capsules.
|Brand: ||Christopher's Original Formulas (More Products)|
|Size: ||100 CAP| | <urn:uuid:b2b617fe-4784-41df-b7d8-7b146a47f467> | {
"date": "2013-05-25T19:41:57",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9524185061454773,
"score": 3.328125,
"token_count": 418,
"url": "http://www.nutritionaltree.com/reviews/herbs-plants-a-z/kelp/christophers-original-formulas_kelp.aspx"
} |
For North Americans, the new diet means eating 84 per cent less red meat and six times more legumes
#Foodcanfixit: an international team of scientists has made a bold promise of health and sustainability … in a hashtag. A dramatic global change in diet and food production has the power to prevent roughly 11 million deaths each year and avoid climate change, the Eat-Lancet Commission says in a report published Wednesday in the medical journal The Lancet.
The commission developed the new “planetary health diet” with the goal of feeding 10 billion people, healthfully and without damaging the planet, by 2050. In order to meet the UN Sustainable Development Goals (SDGs) and the Paris agreement, the authors say, the world must drastically change the way it eats. For North Americans, this means eating 84 per cent less red meat and six times more legumes (e.g. beans and lentils), according to The Guardian. Worldwide, the guidelines require sugar consumption to be slashed by half.
“Transformation to healthy diets by 2050 will require substantial dietary shifts. Global consumption of fruits, vegetables, nuts and legumes will have to double, and consumption of foods such as red meat and sugar will have to be reduced by more than 50 per cent,” said Walter Willett, professor at Harvard T.H. Chan School of Public Health and co-chair of the commission. “A diet rich in plant-based foods and with fewer animal source foods confers both improved health and environmental benefits.”
The proposed flexitarian diet – rich in vegetables and fruits, and light on meat and dairy – could have profound effects on both the health of humans and the planet, according to the report, which was organized by Stockholm-based non-profit EAT. Protein sources are primarily pulses and nuts, and refined grains, highly processed foods and added sugars limited.
Dietary guidelines include filling half of each plate with vegetables and fruits, and the other half with mostly whole grains, plant protein, unsaturated plant oils and “(optionally) modest amounts of animal sources of protein (fish, meat and dairy products).” The diet allows for 2,500 calories per day, with variation, and puts limitations on animal-based foods such as hamburgers (one per week), fish (two servings per week) and eggs (fewer than four per week).
While the recommended planetary health diet is substantially different from how Canadians eat, it aligns with both the 2007 Canada Food Guide and the proposed revisions, says Jess Haines, associate professor in the Department of Family Relations and Applied Nutrition at the University of Guelph.
“Our 2007 food guide recommends having beans, lentils and tofu often, as well as eating dark green and orange vegetables. So, although the reference (recommended) diet in the EAT-Lancet report represents a large shift from current dietary intake, it does align with Canada’s dietary recommendations in many ways,” says Haines.
“To meet the recommendations for a healthy diet by 2050, we will need to ensure our food environment supports Canadians to increase their intake of vegetables, fruits and plant-based proteins, such as legumes, as well as to reduce their intake of highly processed foods and animal-based proteins.” | <urn:uuid:acf760b3-11af-4a7d-b6f0-5459b91a505f> | {
"date": "2019-06-20T12:11:44",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999210.22/warc/CC-MAIN-20190620105329-20190620131329-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9530627727508545,
"score": 3.046875,
"token_count": 683,
"url": "https://lfpress.com/life/food/scientists-say-a-plant-forward-diet-could-save-millions-of-lives-and-avoid-climate-change/wcm/75e296a4-ab7e-49f3-bf54-f6cc5bf3cc75"
} |
Research that will be presented this week at the American College of Sports Medicine conference in Minnesota reveals that most amateur athletes have not incorporated polarized training into their exercise regimes as first reported by The Globe and Mail. The top endurance athletes in the world train harder on their hard days and easier on their easy days than the rest of us.
The fundamentals of polarized training are well documented. Research conducted by Stephen Seiler since the 1990s reveals that the best endurance athletes spend 80 per cent of their training going easy and 20 per cent of training going very hard. The pattern was observed in elite cyclists, runners and triathletes who spend very little time training at a moderate intensity.
On the other hand, amateur athletes train towards the middle of the spectrum more often than not because they ride easy days too hard then come hard days, they can’t train at their full potential because they are still fatigued. The observation is very instructive to athletes who want to improve their riding.
Make easy days easy, hard days hard, an important lesson for all athletes to learn! I'm known to get dropped on recovery rides 😂 https://t.co/Eo3z6AZ2L3
— Leah Kirchmann (@L_Kirch) May 29, 2018
The findings of the study that will be presented at the ACSM conference was done on collegiate distance runners through their 14-week season. Coaches assigned workouts with a difficulty rating between 10 and 1 for each days workout and the athletes were then asked to assign a rating to how hard they perceived the workouts.
What the Ball State University researchers discovered was that when coaches wanted the athletes to run at an easy intensity of 1.5, the athletes would perceive the workout to be 3.4 in difficulty. Then on hard days, coaches asked for a workout of 8.2 but the athletes could only deliver a perceived intensity of 6.2. While the coaches were aiming for a more polarized training regime, the athletes were allowing their efforts to drift to the middle instead of the extremes.
Seiler thus emphasises the importance of intensity discipline which separates the most successful athletes from more average athletes. Amateur athletes may be able to accurately identify their easy, moderate and intense training zones but lack the discipline to adhere to them. | <urn:uuid:f61a3825-097c-42ef-a3a8-a9b25915613a> | {
"date": "2018-10-16T20:55:58",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510867.6/warc/CC-MAIN-20181016201314-20181016222814-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9761452674865723,
"score": 2.734375,
"token_count": 464,
"url": "https://cyclingmagazine.ca/sections/training-guide/training/ride-recovering-easier-and-training-harder/"
} |
- FUN FEATURES
Do you have e-Edition Questions? Click Here to find your answers.
Check Your Health is a web-only feature being offered monthly by The Cheshire Herald. Each month, a professional from MidState Medical Center will offer advice on a different issue pertaining to health.
The best way to prevent cervical cancer is to get a pap smear test on a regular basis. This test is performed by having a pelvic exam done by a nurse practitioner, physician’s assistant, or doctor. The cervix is gently swabbed with a small brush and spatula. The collected cells are then sent to the laboratory to be evaluated. If the cells appear abnormal, you will most likely need further testing.
Pap smears are done to identify abnormal cervical cells and precancerous cells that, if left untreated, could lead to invasive cervical cancer. It is estimated that over 12,000 new cases of invasive cervical cancer will be identified this year in the United States. Half of these cases will occur in women who have not been adequately screened. When abnormal or precancerous cervical cells are found, additional procedures can be done to greatly reduce the likelihood of cervical cancer developing.
Cervical cancer is most common in women over the age of 30, and is usually slow growing. Almost all cervical cancer is caused by the human papilloma virus (HPV). This is a very common virus that is spread through sexual contact and intercourse. It is one of the most common sexually transmitted diseases. Over 50 percent of adolescents and young adults will be exposed to HPV. The development of cervical cancer depends on the type of high risk human papilloma virus a woman is exposed to; the number of sex partners she has had; and how long the HPV infection has been there. In most women, the virus is cleared out by the body.
There are several ways to prevent the development of abnormal cervical cells and cervical cancer. Girls (and boys) are recommended to get the HPV vaccine before any sexual exposure (ages 9-26). Always use condoms when having any sexual contact. Do not smoke cigarettes. Fewer numbers of sexual partners is best to limit exposure to HPV, and only one partner at a time. Having sex for the first time after the age of 18 allows the cervix to mature and be more resistant to the HPV.
It is best to schedule your pap test and pelvic exam when you do not have your period. In the 48 hours before your appointment, do not engage in sexual intercourse; do not use tampons; do not douche; and do not use contraceptive jellies, creams, or foams. These guidelines help make the pap test more accurate.
In the past several years, our understanding of HPV and cervical cancer has grown substantially. This has lead to changes in the screening guidelines. It is not necessary to have a pap yearly. Cervical screening should generally start at age 21. A pap smear is done yearly for three years and then can be done every two to three years until age 30, providing the test is normal.
After age 30, a pap smear and HPV test can be done every three to five years. After discussion with your health care provider, women who are over 65 or have had a hysterectomy for non-cervical disease reasons can stop having pap smears. If you have a history of abnormal pap smears, your health care provider will discuss with you how often you should be screened. Women who have HIV, in-utero exposure to DES, or are immune-suppressed may need more frequent cervical pap smears and screenings
A pap smear is done as part of a pelvic exam. Even if you do not need a pap, a pelvic exam screens for other problems and diseases. It is best to have that yearly for most women starting at about age 18. Early detection and prevention is always the best option when it comes to our health!
Deborah A. Molloy, MS, APRN
MidState Medical Group
Women’s Primary Care | <urn:uuid:dcaca2b4-e911-423b-b7d8-c76ccced7eb8> | {
"date": "2016-08-25T07:59:49",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292975.73/warc/CC-MAIN-20160823195812-00096-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9416764378547668,
"score": 2.890625,
"token_count": 828,
"url": "http://www.cheshireherald.com/node/5900"
} |
Every year, the Toy Product Design class at the University of Minnesota, taught by MIT alumnus and inventor Barry Kudrowitz, hosts an event called Playsentations.
The Playsentations are a set of presentations that combine theatrical and live demonstrations of toys created by students at the University. Utilizing the Digital Fabrication Lab, one of the most advanced workshops on the UMN campus, they are able to use 3D printers, CNC machines, laser cutters, lathes and much more to create toys that relate to the year’s theme. This year’s theme was “Making Makers.” As you can imagine, 3D printing fits in perfectly with this theme.
As an alumnus of the class, I was excited to be asked to 3D print parts this year because the Design Studio’s Stratasys Dimension 3D Printers were at capacity. When I was a student, the theme was Track Based Motion. Our team 3D printed connectors capable of creating huge marble runs by linking cans, paper, and bottles together.
Two years later, I am impressed with the ideas students came up with and how they used 3D printed models to look and function like end-use parts.
The project above is a little ironic. It is called the Chozmo and drew inspiration from a hot glue gun except instead of sticks of glue, they used sticks of chocolate! The irony comes from the fact that Scott Crump, chairman, chief innovation officer, and inventor of fused deposition modeling (FDM) 3D printing technology at Stratasys, invented this method of 3D printing from layering hot glue layers into shapes. Now, hot glue gun inspired innovations are being 3D printed with technology that came from, well, hot glue gun inspired innovations.
Below are some other Stratasys 3D printed parts from this year’s Playsentation.
The Playsentations were a great success and taught another group of tomorrow’s leaders about the fascinating possibilities of product design and 3D printing. The successful projects will now go through the Office of Technology Commercialization at the UMN and could potentially be commercialized in the near future.
The class will begin again next spring with a new theme and challenges for the students to tackle. Check out the course website. | <urn:uuid:f76518db-c688-4fac-9729-0208de778629> | {
"date": "2014-09-22T22:16:53",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137698.52/warc/CC-MAIN-20140914011217-00347-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9509149789810181,
"score": 2.5625,
"token_count": 479,
"url": "http://blog.stratasys.com/2014/07/10/toy-product-design-3d-printing/"
} |
September is National Recovery Month, with the motto: “Prevention Works. Treatment is Effective. People Recover.”-SAMHSA. Unfortunately, because children are beginning to use drugs at an earlier and earlier age, there are more and more teenagers who are already in recovery. If you have a teen who is recovering from a problem with substance abuse, here are some ideas to keep in mind.
1. Teenagers are at a point in their development when they are attempting to learn how to regulate their emotions and manage stress. Drugs can be an artificial method for accomplishing this. Drugs also impact brain chemistry in a way that affects mood and the ability to tolerate stress and frustration. Knowing this, it is essential to focus on building these skills. Learning how to identify and communicate emotions is necessary, along with developing the natural ability to self-sooth and to manage stress. When these skills aren’t learned, problems often continue. If a teenager seems to be struggling with depression or anxiety, treating those issues will be part of the process.
2. Teenagers at different stages lack the ability to effectively think through to long-term consequences of behavior. They can also lack skills such as impulse control. It’s no wonder that teenagers are susceptible to risky behaviors like substance use! Respect their lack of knowledge and maturity by providing education and support. If they are not as open to receiving information from their parent, there are many places to direct them where they will be able to learn about substance abuse and develop the skills they will use to recover. For information, visit the Substance Abuse and Mental Health Services Administration’s website at- http://www.recoverymonth.gov/Resources.aspx.
3. Becoming healthy and remaining sober may mean changing friends, which may be a major barrier to success. Teenagers are attempting to form and develop their identities, which is a process that often happens through relationships. Leaving a group of friends can be a major challenge. There is the additional concern of “so if I have to be sober, that means that I can’t even drink when I’m in college.” These are all issues that should be discussed and thought through, not avoided. Helping them to find opportunities for positive relationships and activities can be a powerful tool in treatment.
4. There are a multitude of resources available for teenagers in recovery that are age-appropriate and specific to their needs. There are certain teen groups within NA, online groups, and professionals who specialize in this area. Family therapy can be enormously helpful. The sooner, the better. As one person in a household develops an addiction, everyone is impacted.
5. Teenagers are in a unique position in which they are able to effectively change the trajectory of their life with much less effort than it would take as an adult. If given the opportunity, many young people thrive within difficult circumstances and become stronger as a result. It is an opportunity to overcome an obstacle and learn valuable lessons. Many teenagers use the skills they learn in recovery throughout their lives, using their history of addiction as a source of knowledge and strength as opposed to a weakness.
Counseling session image available from Shutterstock.
This post currently has
You can read the comments or leave your own thoughts.
Last reviewed: 22 Sep 2013 | <urn:uuid:77e99b89-75f4-4d5f-b1cc-553feec5b957> | {
"date": "2014-09-03T04:43:35",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924501.17/warc/CC-MAIN-20140909013107-00227-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9664736986160278,
"score": 2.9375,
"token_count": 678,
"url": "http://blogs.psychcentral.com/resilient-youth/2013/09/national-recovery-month/"
} |
Process of Learning:
This is the the coming to know process. Teachers and students located their gaps and set goals to reach success. Knowing students' strengths and weaknesses can help teachers better plan what to teach and how to teach it. This part of formative assessment is a process in which teachers use a variety of tools/strategies to find out what the student knows, identifies gaps in understanding, and plans future instruciton to improve learning.
Process of Knowing:
Learner-Centered Environments, carefully pay attention to knowledge, attitudes, and skills students bring to the classroom. Careful attention is paid to the progress of each students, the teacher in these classrooms know at all times where their students are in their thinking and learning. Students value their ideas whether right or wrong, they are on a path to life long learning, and the assessment supports learning and there is always the opportunty to improve.?The teacher takes all ideas seriously, helps the student to think through
Product of Learning:
Learning is a process that enable a change in a person's knowledge that helps them have a new understand about themselves and the world around them. Assessment is any feedback that enables a learner to know when there has been a change in their understanding. Learning and assessment occurs daily. Assessment is a part of learning, whether it is in the classroom setting, at home, or even at work.
We want our students to be lifelong learners, which mean they have to have skills to know they are "learning to learn" all students need to have an awareness of how and why they are acquiring knowledge. if not we are teaching students in the dark, and they will never be able to be effective citizens in they do not develop the skills needed to be a self-regulator of their own personal knowledge | <urn:uuid:80feae87-fe78-435c-9d46-f3ad86303c27> | {
"date": "2018-06-19T12:34:21",
"dump": "CC-MAIN-2018-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267862929.10/warc/CC-MAIN-20180619115101-20180619135101-00256.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9752633571624756,
"score": 4.28125,
"token_count": 366,
"url": "http://www.madison.kyschools.us/olc/page.aspx?id=24903&s=2"
} |
To introduce the basic concept and to attract the viewer’s attention, the video begins with a shot of a water park (Sea World) where the seats close to the pool where the big mammals perform is known as “Splash Zone”. Visitors to the park may choose to sit in the splash zone and purposely get wet on a hot summer day or avoid it to keep dry. A cut to the laboratory expands the idea of a parallel splash zone in the lab. A student is working at the bench and another student is working in the vicinity on his computer without safety gear. The student at the bench accidently knocks over a bottle and the solution splashes towards the other student. The frame freezes and the drops stops in midair. An ophthalmologist (a credible person) steps into the frame and provides information about the potential damage of a chemical splash. She states that prevention is the best cure and puts safety glasses on the student who is about to get splashed. The frozen frame comes back to motion, the drops of liquid continue their movement but now they hit the safety glasses and not the naked eye. The video concludes with the advice of considering the lab as a splash zone.
This video targets a common safety problem in academic laboratories where students/workers use a shared laboratory space. Many have a false impression that only those performing experiments should wear safety gear. The video addresses a change in safety culture by introducing the idea of a “Splash Zone”, an area that carries inherent risk.
Online videos are useful tool to target young people in their natural “playground”, the Internet.
UC San Diego
9500 Gilman Dr
92093-0303 La Jolla, CA | <urn:uuid:4bb925ba-a225-4c38-b0c1-01d4e8ee82d7> | {
"date": "2018-09-19T09:13:16",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156096.0/warc/CC-MAIN-20180919083126-20180919103126-00136.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9122345447540283,
"score": 3.484375,
"token_count": 352,
"url": "http://2014.mediainprevention.org/en/player/148.html"
} |
It’s easy to romanticize the Civil War, especially around here.
Some people consider Our Late Unpleasantness a gallant time, tragic to be sure, but an era when brother fought against brother for lofty notions about honor and home.
There were, of course, other, nefarious reasons behind the war — but that isn’t why the men in the field were fighting. The politics of the day mattered little to them; they simply answered the call of their country.
And they paid for it dearly.
If you visit the Gibbes Museum of Art’s “Photography and the American Civil War” exhibition — and you really should — you may come away with a different view of this country’s defining moment.
In one photo, a woman holds a photo of a soldier, a subtle sadness in her eyes. Is it her husband? Her son? Will he come back? She doesn’t know, and neither do we.
Then there are the photos of the injured soldiers, some of them missing part of their hands or an entire leg, or with gaping wounds in their heads.
And then there is the image of a young Confederate soldier, his twisted, lifeless body lying on the battlefield at Antietam.
These images tell the sad, unvarnished truth: There is nothing glorious about war.
This exhibit — some 240 tin types, amber types, carte-de-visites and glass negatives — was organized by New York City’s Metropolitan Museum of Art, and is on display at the Gibbes through Jan. 5.
The Met gathered these photos from several sources, including private collections, for a look at the war that is personal and epic. Charleston is one of only three cities to host this exhibit.
Pam Wall, curator of exhibitions at the Gibbes, was struck by the emotional impact of the portraits in the collection. There are, to be sure, photos of famous figures from the war — Abraham Lincoln, Jefferson Davis, even Gen. George Custer — but it is the family portraits of rank-and-file soldiers, young and old, that make the conflict come alive.
In one photo, two brothers from Georgia pose together in their Confederate uniforms — uniforms not yet stained from battle.
Other photographs are simply documentary. A man named Alma A. Pelot lugged his camera gear to Fort Sumter just days after the first battle of the Civil War and captured images that show a place unlike the national monument that exists today.
This was before Sumter was reduced to rubble, when it was still a three-story fort. Those photos alone are worth the price of admission to the museum, which is $9 for adults and $5 for children 6-12 years old.
“This is really the advent of photojournalism,” Wall says. “We are looking at a history of photography. It’s remarkable this many photos were taken. Photography was barely 20 years old.”
And, as the exhibition shows, the war was the first historical event to be recorded on film.
There are disturbing images in this collection.
A series of photos show the execution of the Lincoln conspirators, up to the moment they were hanged.
The most gruesome series of photos were shot by a doctor named Reed Brockway Bontecou to document the traumatic injuries soldiers suffered on the battlefield.
Surgeons were going into the field unprepared for the horrors they would witness, so Bontecou documented what he saw for other physicians. Today, his photos offer different insights into the war.
At 6 p.m. Tuesday, Wall and a panel of surgeons and historians will discuss these photos, and on Thursday, Lt. Gov. Glenn McConnell, chairman of the state Hunley Commission, will talk about the images in the gallery at 2:30 p.m. Go to gibbesmuseum.org for more information about these talks.
Those are two good chances to take in the exhibition and appreciate its relevance.
A century and a half later, the war continues to fascinate many people, and with good reason.
The Gibbes exhibition goes a long way toward making sure we never forget that horrible period in our history.
Reach Brian Hicks at [email protected] | <urn:uuid:f01ac6b3-e050-4089-89e0-29514481758b> | {
"date": "2015-08-31T22:25:02",
"dump": "CC-MAIN-2015-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644068098.37/warc/CC-MAIN-20150827025428-00171-ip-10-171-96-226.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9600968360900879,
"score": 2.609375,
"token_count": 888,
"url": "http://www.postandcourier.com/apps/pbcs.dll/article?AID=/20131110/PC16/131119963"
} |
Department of Botany, University of Karachi, Karachi-32.
Trees, shrubs or rarely woody climbers, often aromatic; indumentum (if present) of simple or stellate hairs or scaly. Leaves alternate, mostly distichous, thin to coriaceous, entire, exstipulate, often with a glaucous sheen. Flowers usually on the young leafy shoots or on the old wood, rarely on underground suckers; terminal or axillary or extra-axillary; bisexual, rarely unisexual, regular; solitary, paired, cymose or fasciculate, sessile or stalked; mosly bracteate and bracteolate. Sepals 2-3, valvate, rarely imbricate, free or ± united, rarely accrescent. Petals 3-6-(-12), often fleshy, usually in two equal or unequal whorls, rarely in one whorl of 6, 4, or 3, valvate or imbricate, rarely open in bud; free or ± united at base, rarely absent. Stamens usually numerous, spirally (often compactly) arranged on the flat, convex or conical receptacle, rarely 6-12 and whorled; sometimes outer stamens petaloid; anther linear to rounded, dehiscence extrorse or lateral, rarely apical or introrse; connective usually broad and produced beyond the anther-locules, apex truncate, oblique, capitate, convex, conical or acute; filaments usually short and free, rarely elongate and united in a cone over the carpels. Carpels 1-numerous, free or basally united, or completely united to form a unilocular ovary with parietal placentation; ovules 1-numerous, styles short, thick, free, or rarely connate, stigma capitate or oblong. Fruit consisting of 1-several fleshy or woody, stipitate or sessile monocarps, mosly indehiscent; or fused to form aggregate fruit; or 1-locular and numerous seeded. Seeds vertical to horizontal, sometimes arillate, endosperm abundant, ruminate; embryo minute.
A family of about 120 genera and 2100 species, distributed mainly in the tropics of Old and New World, usually at lower altitudes; represented by 4 genera and 6 species in Pakistan, all except Miliusa are cultivated.
Acknowledgements: We are grateful to the authorities of Royal Botanic Gardens, Kew and British Museum (Natural History), London for sending the specimens on loan. Thanks are due to Mr. I.C. Hedge (Royal Botanic Garden, Edinburgh) for going through the manuscript. We are indebted to Dr. C.E. Jarvis (BM) for his help in the typification of some of the Annona species. The financial assistance received from U.S. Department of Agriculture under P.L. 480 with the coordination of Pakistan Agricultural Research Council, Islamabad is thankfully acknowledged. | <urn:uuid:16e3adc5-fd23-4f45-aef6-788568383faf> | {
"date": "2016-07-24T02:59:58",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823935.18/warc/CC-MAIN-20160723071023-00113-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8631357550621033,
"score": 3.015625,
"token_count": 642,
"url": "http://efloras.org/florataxon.aspx?flora_id=5&taxon_id=10047"
} |
Freezer paper applique is often used in quilting. Applique represents the process where fabric pieces are sewn together to another fabric, which is the primary fabric, in pieces of different shapes and forms which will later form some pattern or design.
To trace the patterns of the applique, it is important that you use graph paper and then wax-free paper to draw a potential design.
It's not necessary yet to trace seam allowances. For now, you need to cut the patterns and use the shapes on paper. Please remember to reverse the pattern and put it on the back side of the fabric. Put the pattern on the freezer paper and join it with the fabric. Under any circumstances, don't iron the fabric but instead gently press on to the freezer paper with a warm iron (not too hot).
After that, press the paper on the applique, because the wax will gently melt and once you can see that the wax is no longer then, you can then gently cut the points or curvatures from the applique. You could make use of a needle and thread to stitch the areas together near the seams.
As you do so, pull the thread gently from the applique work, because you don't want any damage at this point. Make a knot around the thread near one end and gather the stitches. You must still have the freezer paper in there, so make sure it is still there when you press the applique.
Also, you can prepare for this process by making use of glue sticks or you can simply manually sew the applique or use a sewing machine to do the job for you. This decision depends solely on the individual's choice.
For the glue stick manner, you have the follow similar actions but instead of freezer paper applique, you must use copy paper, which is used by printers to print documents. Use a glue stick and then fasten the seams.
At this point, you won't have to deal with the wax operations, whereas with freezer paper applique, you had to wait for it to melt. Now, add some glue on the back of the paper and in its middle; press the paper on its left side, put the seam under the paper and trace the shape you want to obtain. After that, add again some glue on the traced pattern.
Around the edges, you also need to apply some glue, so that you make sure it fixes the allowances in place and enables you to start working on other parts of the appliqué.
After these steps were followed, stitch the parts of the fabric in the backdrop one. If you want to manually stitch and arrange the applique, make sure it color coordinates with the background. Use pins to put the appliqué in the place and basting steps; as an alternative, you could glue to stitches in place to hold them there.
Remember that whatever method you choose, you need to start your work from the front to the back in order to make your applique. The overall pieces should be carefully stitched together.
Moving on, you now use the needle and thread to start sewing the design. Use coordinating thread and stitch in ladder motion the applique edges. The glue you will apply must make three quarters of an inch area near the applique. When the glue dries up, you can remove it and then complete stitching.
There is another type of applique work, besides the hand one. You could utilize the blind-stitch manner or a machine to do the quilting for you. Moreover, you could use zigzag quilting. Bear in mind that a variety of applique methods are available and that you must choose the one fitting in your case.
Learn more on using freezer paper applique to make applique quilts. | <urn:uuid:81a1e0a2-2dcc-44e3-adc4-14df4925d2f5> | {
"date": "2018-09-19T15:38:11",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156252.31/warc/CC-MAIN-20180919141825-20180919161825-00456.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9405818581581116,
"score": 3.25,
"token_count": 771,
"url": "https://www.quilthowto.com/Freezer_Paper_Applique.html"
} |
This is a preview (Copyrighted Material)
The number of sections displayed is limited
The paradox of dichotomy – The walker
a—-“In order for a walker to travel a distance, he must first cover half of it. However, it is impossible for him to get to the middle of the total distance, if he previously hasn’t covered half of the above initial half etc. Nevertheless, in this way, the walker will always be unsuccessfully seeking the primary half. Because there are certainly infinite halves before any observed half.
b—-“This means” according to Zeno, “that the walker can’t reach his target because he is unable to move”. He then adds:
c—-“The question isn’t about when the walker will cover the total distance, but how will he achieve this when he will always have to be en route. (on the way) Because he will previously have to cover the infinite halves of the halves which will be ahead of him.”
The paradox of dichotomy is Zeno’s most significant paradox, as this prohibits the start and therefore, the general movement of every material objects. Therefore, the question regarding “if” and “how” the arrow, Achilles and the turtle will move has no further meaning. As it is seen below, Zeno’s serious omission was that he did not define (determine) “where”. Taken into consideration that everything in our world moves in a direct or an indirect way, every start is impossible to take place. | <urn:uuid:22e4e2c6-553a-483f-a4db-56ac14c2630a> | {
"date": "2018-10-21T12:42:33",
"dump": "CC-MAIN-2018-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514005.65/warc/CC-MAIN-20181021115035-20181021140535-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9490816593170166,
"score": 3.1875,
"token_count": 335,
"url": "http://stamoulis.de/3-%E2%80%A8%CE%BB%CF%8D%CF%83%CE%B7-%CF%84%CF%89%CE%BD-%CE%B6%CE%B7%CE%BD%CF%8E%CE%BD%CE%B5%CE%B9%CF%89%CE%BD-%CF%80%CE%B1%CF%81%CE%B1%CE%B4%CF%8C%CE%BE%CF%89%CE%BD/%CF%84%CE%BF-%CF%80%CE%B1%CF%81%CE%AC%CE%B4%CE%BF%CE%BE%CE%BF-%CF%84%CE%B7%CF%82-%CE%B4%CE%B9%CF%87%CE%BF%CF%84%CE%BF%CE%BC%CE%AF%CE%B1%CF%82?lang=en"
} |
Search articles from 1992 to the present.
Plant Disease Clinic -- Highlights
This article was published originally on 7/14/1993Leaf Spot - turf
Leaf spot has been a common problem on turf this spring and summer. Leaf lesions are initially reddish-brown to dark brown. As they enlarge they take on an oblong shape and develop a lighter center with a dark border. Heavily infected blades may turn yellow, wither, and die. The pathogen may also move to the crown and cause plant death. This is referred to as melting out. At the melting out stage, the lawn appears to thin out; this damage is sometimes mistaken for drought injury (not in 1993!). There are a number of cultural management practices that aid in controlling this disease:
Wet spring and early summer conditions have favored the development of fungal blights of tomato. Two common foliage diseases of tomato are early blight, caused by Alternaria solani, and Septoria blight, caused by Septoria lycopersici.
Lower leaves are usually attacked first. Early blight causes brown spots (up to more than 1/2" in diameter) that contain concentric rings of darker brown. Septoria causes smaller brown spots that eventually turn light tan or gray in the center with a dark border. Both diseases cause foliage to eventually turn brown and die.
Cultural practices can help reduce disease outbreaks. Just after transplanting, apply a 2-4" layer of mulch (leaves, grass clippings, straw, etc.). This acts as a barrier against the introduction of fungal spores from the soil. Space plants adequately to allow good air circulation. Since these fungi can overwinter on infected leaves, it is also important to remove plant debris at the end of the season. Rotate away from tomatoes and potatoes for several years.
Fungicide sprays, such as Daconil 2787, may be needed. Sprays should be applied every 7 to 10 days from fruit set through harvest.
Year of Publication:
IC-465(18) -- July 14, 1993 | <urn:uuid:047a009a-7ee8-4021-9b29-264e53f4c0bd> | {
"date": "2014-11-23T11:09:05",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400379462.60/warc/CC-MAIN-20141119123259-00044-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9361594319343567,
"score": 3.328125,
"token_count": 426,
"url": "http://www.ipm.iastate.edu/ipm/hortnews/1993/7-14-1993/pclinhi.html"
} |
Beijing: Scientists have discovered a new formula that can help you win at rock-paper-scissors by predicting your opponent`s moves.
Researchers in China found that people do not play the game randomly - they follow hidden patterns that can be predicted to win games.
The study found that winners tend to stick with their winning action, while losers tend to switch to the next action in the sequence "rock-paper-scissors".
Anticipating these moves could give you a winning edge, scientists said.
In a massive rock-paper-scissors tournament at Zhejiang University in China, scientists recruited 360 students and divided them into groups of six.
Each competitor played 300 rounds of rock-paper-scissors against other members of their group.
Classical game theory suggests players should completely randomise their choices - to remain unpredictable and not be anticipated by opponents.
This pattern - where both players select rock, paper or scissors with equal probability in each round - is known as the Nash equilibrium, `BBC News` reported.
The strategy is named after game theory pioneer John Forbes Nash Jr, subject of the 2001 Hollywood film `A Beautiful Mind`.
In the Chinese tournament players in all groups chose each action about a third of the time, exactly as expected if their choices were random.
However, researchers observed that when players won a round, they tended to repeat their winning rock, paper or scissors more often than would be expected at random (one in three).
Losers, on the other hand, tended to switch to a different action. And they did so in order of the name of the game - moving from rock, to paper, to scissors.
This "win-stay lose-shift" strategy is known in game theory as a conditional response - and it may be hard-wired into the human brain, the researchers said. | <urn:uuid:bbeb7c34-53af-4423-b218-4d64a7c54f57> | {
"date": "2015-04-27T10:13:52",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246657868.2/warc/CC-MAIN-20150417045737-00201-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9714387059211731,
"score": 2.78125,
"token_count": 379,
"url": "http://zeenews.india.com/news/science/how-to-win-at-rock-paper-scissors-discovered_929843.html"
} |
A great number of rare and exotic animals exist only in the Philippines. The country's surrounding waters reportedly have the highest level of biodiversity in the world. But this distinction was soon overshadowed by the fact that the Philippines has been dubbed as the "hottest of the hotspots" by no less than the Conservation International.
The Philippines is considered as a mega diversity country and a global biodiversity hotspot. In the 2000 Red List of the International Union for the Conservation of Nature and Natural Resources (IUCN), 418 of the country's 52,177 species were listed as threatened. The country is home to about 9,000 species of flora, a third of which is said to be endemic to the country. It hosts 165 species of mammals, 121 of which can be found only in this part of the world. The Philippine Biodiversity Conservation Priority-setting Program (PBCPP) described these 165 endemic mammal species as endangered or critically endangered.
There are also 332 species of reptiles and amphibians living in the country, 215 of them endemic to the archipelago. It is said that less than 14 of the 114 total species of snakes in the country are poisonous. Several species of frogs and other reptiles remain to be documented. Unfortunately, several species were believed to have vanished without being studied.
In 1953, Albert Herre identified 2,117 species of fish in Philippine waters. These included 330 species of endemic freshwater fish. Whales, dolphins and whale sharks have also been visiting Philippine waters near the islands, allowing sightings by both marine scientists and commercial fishermen. About 500 of the 800 known coral reef species in the world are found in Philippine waters.
The country also has the highest concentration of birds and butterflies in the world. There are some 86 species of birds and 895 species of butterflies in the country. About 352 species of butterflies are endemic to the Philippines.
Many of these biological wonders are now in danger. The main culprit is human's indiscriminate use of the country's natural resources, resulting in an unabated denudation of the Philippine rainforests. In the last 500 years, the Philippines saw the destruction of over 93 percent of its original forest cover. Only about 5 percent of the country's 27,000 square kilometers of coral reefs were in excellent condition.
According to the Department of Environment and Natural Resources (DENR), the country's total forest size dwindled to 6.7 million hectares in 1990 from 30 million hectares in 1930. At the same time, the forest-to-man ratio shrank to 0.1 hectare per Filipino in 1990 from 1.13 hectares per Filipino in 1930. By 1996, experts claimed that only 1.8 million to 2.4 million hectares or 6 to 8 percent of original vegetation were remaining.
A study by the Philippine Congress said that 123,000 hectares of the country's forest cover are lost every year. The study added that by 2036, there would be no forest left in the Philippines, unless reforestation is started.
In January 2003, a study by the Green Tropics International (GTI) claimed that the Philippines would need P30 trillion to reforest country's denuded mountains in over 85 years.
Rhinoceros and Elephants
With the discovery of different animal fossils in the past century, scientists believed that elephants, rhinoceros and stegodons used to live in the Philippines. Two species of elephants and one species of rhinoceros were identified, namely: Elaphas beyeri, Elaphas cf. namadicus and Rhinoceros philippinensis. Four species of stegodons were also listed by scientists, namely: Stegodon cf. trigonocephalus, Stegodon luzonensis, Stegodon cf. sinensis and Stegodon mindanensis. All of them are now believed extinct.
One of the World's Largest Eagles
Also known as the monkey-eating eagle, the endangered Philippine eagle is one of the largest in the world. With scientific name Pithecophaga jefferyi, the Philippine eagle lives in the rainforests of Isabela, Samar, Leyte and Mindanao. It has similarities with Papua New Guinea's Harpy Eagle (Harpyopsis novaeguinea).
Measuring about one meter in height, the average Philippine eagle has a 76-centimeter highly arched, powerful bill. It lives on large snakes, hornbills, civet cats, flying lemurs and monkeys - the reason why it is also called monkey-eating eagle. It creates its nests in large trees some 30 meters from the ground.
With an estimated population of 100 to 300 today, the Philippine eagle is in danger of extinction. It is one of the 400 exotic bird species in the Philippines, which, if not protected, would disappear from the face of the Earth. Along with the Philippine cockatoo, Palawan peacock pheasant, Mindoro imperial pigeon, Sulu hornbill and Cebu black shama, the Philippine Eagle might follow the Cebu flowerpecker which is now presumed extinct.
The Philippine Eagle has come to symbolize all efforts by the Filipino people to save the remaining rainforests in the country and preserve the wealth of the nation for the future generation.
One of the most distinct creatures on Earth lives in the Philippines. It doesn't have wings but it can glide across 100 meters of space in a single leap. Like the lemurs of Asia, it moves around at night. Its head resembles that of a dog while its body has similarities with the flying squirrel of Canada.
In Mindanao, people call it "kagwang". Around the world, it is known as colugo or the flying lemur. Zoologists, however, claim that it doesn't fly and it is not a lemur, a large-eyed nocturnal mammal found only in Madagascar and Comoro Islands. The truth is that kagwang or Cynocephalus volans is one of only two species belonging to the primitive order Dermoptera. The other species is the Cynocephalus variegatus or the flying lemur of Malaysia.
An ordinary kagwang weighs from 1 to 1.7 kilogram and ranges in length from 14 to 17 inches. It has a wide head with small ears and big eyes. Its 12-inch tail is connected by a patagium, a membrane stretching from forelimbs to tail. This well-developed membrane enables kagwang to glide to a distance of 100 meters or more to escape from predators like the Philippine Eagle.
The continuous denudation of tropical forests in the country threatens the remaining population of kagwang, which used to abound in the wilderness of Basilan, Leyte, Samar, Bohol and Mindanao. The exact number of the remaining kagwangs remains to be determined. Alarmed by the situation, the Philippine government declared kagwang as an endangered species and banned its commercial exploitation.
Largest and Smallest Bats
The Philippines has at least 56 species of bats. It is home to the smallest and the largest bats among the 1,000 known species in the world.
The smallest bat in the world is the Philippine bamboo bat (vespertilionid), which belongs to the vespertilionid family. This bat measures about four centimeters (1 1/2 inches) in length and has a wingspan of 15 cm. Approximately, it weighs 1.5 grams (1/20 ounce).
The three-layered virgin forest of Subic Bay and Bataan is home to the world's largest bats: the giant flying fox (Acerodon jubatus) and the golden crown flying fox (Pteropus vampyrus). Over the years, these two species of giant fruit bats have roamed around the 10,000-hectare Subic Forest National Protected Area, which is considered the biggest roosting site of bats in the world.
An ordinary giant flying fox weighs up to 2.5 pounds (1.1 kilograms), heavier than a golden crown flying fox. The golden crown measures six feet in wingspan, the largest among all bats. The giant flying fox and the golden crown are just two of the 15 species of fruit bats in the country.
In other parts of the country, several bat species are now believed extinct. Among them were bare-backed fruit bat or Dobsonia chapmani, which reportedly disappeared from the forests of Negros and Cebu in 1964 and the Panay fruit bat or Acerodon Lucifer which was last seen in 1892. The Philippine tube-nosed bat, Nyctimene rabori of Negros is considered highly endangered. Scientists warned that this breed would disappear before 2015 unless action is taken to protect its remaining population.
Last Remnants of Dinosaur Age
Scientists call sea turtles as the only living remnants of the dinosaur age, but maybe not for long. Unless sincere efforts are undertaken, sea turtles might follow dinosaurs into extinction.
Sea turtles, popularly known in the Philippines as pawikan, belong to the sub-order Cryptodira, and to the families Dermochelyidae and Cheloniidae. There are more than 220 species of turtles in the world, but only seven are considered marine (saltwater). Five of these species are present in the Philippines, namely: Green (Chelonia mydas), Hawksbill (Eretmochelys imbricata), Loggerhead (Caretta caretta), Olive Ridley (Lepidochelys olivacea) and Leatherback turtles (Dermochelys coriacea).
A typical Philippine Sea Turtle weighs between 180 to 210 kilograms and, unlike land turtles, cannot retract its head and limbs under its streamlined shell. The most common species in the Philippines is the Green Sea Turtle, which grows up to 1.5 meters long and weighs up to 185 kilograms. The largest species is the Leatherback Turtle, which grows more than two meters in length.
World's Smallest Hoofed Mammal
South of Palawan, lies the Balabac Island, home of the world's smallest hoofed mammal - the Philippine mouse deer. Locally known as Pilandok (Tragalus nigricans), this ruminant stands only about 40 centimeters at the shoulder level.
In other countries, it is called chevrotain, or simply mouse deer. Contrary to its name, pilandok is not a member of the deer family. It belongs to the family Tragulidae in the mammalian order Artiodactyla. The male species has no antlers like those of a real deer. Instead, it uses its large tusk-like canine teeth on its upper jaw for self-defense; in the same way a deer uses its antlers.
Aside from the Pilandok, other mouse deer species include the Malay mouse deer or napu and the African water chevrotain. They are found in Southeast Asia, Sri Lanka, and India. While the mouse deer are widely distributed across Asia, their dwindling population has alarmed the World Conservation Union, which declared them as endangered in 1996.
Most Endangered Deer
One of the world's rarest mammals lives in the dwindling forest of Panay Island. It is the Philippine spotted deer (Cervus alfredi), considered by many as the most endangered deer in the planet.
The Philippine spotted deer is only about 80 centimeters in height (shoulder) and has soft and moderately long hair covering its spotted dark brown body. Its most distinct physical characteristic is its oval yellowish white spots on its back and sides. This species has long been classified as endangered, which means they have been reduced in number to a critical level, or whose habitats have been damaged, altered or reduced.
By 1985, a survey reported that only a small population of the Philippine spotted deer was found in the remote regions of Panay.
Calamian Islands, north off Palawan province, keep a species of deer that cannot be found elsewhere. Scientists referred to the hog deer in the islands as Calamian deer in order to distinguish them from other hog deer in the world.
An ordinary Calamian deer measures 105 to 115 centimeters in length and 60 to 65 centimeters high at the shoulder and weighs about 36 to 50 kilograms. It is said to have longer and darker legs, compared with other hog deer. From a relatively large number in the 1940s, the population of Calamian deer dropped to "dangerously low levels" in the 1970s. By 1996, its population further declined to only about 900, prompting conservationists to declare it as an endangered species.
Largest Endangered Animal
People used to call Mindoro as the "Land of the Tamaraws". About 10,000 heads of these unique pygmy water buffalos were roaming around the island-province of Mindoro in the 1900s. But that was a century ago. Today, the Tamaraws in the province are in danger of extinction, and Mindoro might lose the symbol that it once proudly introduced to the world.
The Tamaraw, scientifically known as Bubalus mindorensis, is endemic to Mindoro. Belonging to the family of buffalos, the same categorical group of the Philippine carabao, the Tamaraw is the largest endangered land animal in the Philippines today. In 1996, the International Union for the Conservation of Nature (IUCN) listed it as one of the ten most endangered species in the world.
The Tamaraw measures between five to six feet in length and weighs about 300 kilograms. While it shares many similarities with the carabao, the Tamaraw is most known for its horns, with a "V" form, unlike the horns of the carabao, which take a curved shape. The Tamaraw's horns grow about 14 to 20 inches long.
From 10,000 heads in the 1900's, the Tamaraw population went down to 369 heads in the late 1980's. Today, reports say there are as few as 20 heads roaming in the wild.
World's Smallest Monkey
In many respects, the Philippine tarsier (Tarsius syrichta) is different from other animals. Considered as the world's smallest primate, it measures only about twelve centimeters in length. Its two big eyes cannot move and do not have a tapetum - the upper protective tissue. Because of this, the Philippine tarsier has learned to turn its head 180 degrees. It has also two grooming claws on each foot and an almost bald tail extending about nine inches.
Found in the islands of Samar, Leyte, Bohol and Mindanao, the Philippine tarsier got its name from its elongated tarsus bone. An ordinary tarsier weighs between 117 and 134 grams. It is able to move between trees by leaping as far as three meters. It also has keen senses of hearing and sight.
Today, there are only about 1,000 tarsiers inhabiting the wilds of Corella town in Bohol province where the biggest concentration of these rare animals was once reported. Ensuring the continued existence of the Philippine tarsiers is the Philippine Tarsier Foundation Inc.
Neither A Bear Nor A Cat
Palawan bearcat is neither a bear nor a cat. Known in Southeast Asia as binturong, the bearcat is a species of its own, with population in the forests of Palawan, Borneo, Burma and Vietnam. It belongs to the family of Viverridae (civets).
The Palawan bearcat has a long body and a pointed face leading to the nose. Its head and body measure 61 to 96 centimeters in combined length while its tail is almost as long. It weighs 9 to 14 kilograms and lives up to 20 years.
It has thick black fur, which hunters use for making clothes and caps. It is usually awake at night when it finds food and uses its tail to climb tall trees where it hides among the leaves. Like other wild animals, Palawan bearcat's population is threatened by human activities.
The Philippines is home to some of the world's most exotic birds. Scientists have documented 577 bird species around the Philippine archipelago. Of this number, 185 species are endemic to the country. The Bird Life International listed 116 of them as "threatened" or "near-threatened".
One of the most endangered species is the exotic Kalangay or the Philippine cockatoo (Cacatua haematuropygia), which belongs to Psittacidae or the family of parrots. Some cockatoos can live up to 50 years. They are known for mimicking human voices. Most of them measure 33 centimeters in length and weigh 0.29 kilogram.
The remaining population of kalangays, between 1,000 and 4,000, is now restricted to Palawan, particularly in St. Paul's Subterranean River National Park, Pandanan Island and El Nido Marine Reserve.
World's Largest Fish
Donsol, a fishing town in Sorsogon province, serves as a sanctuary to a group of 40 whale sharks (Rhincodon typus), which are considered as the largest fish in the world.
Locally known as "butanding", whale sharks visit the waters of Donsol from November to May. They travel across the oceans but nowhere else have they been sighted in a larger group than in the waters of Sorsogon. They measure between 18 to 35 feet in length and weigh about 20 tons. In 1996, a marine biologist discovered that whale sharks are ovoviviparous, which means that the females produce live offspring from eggs hatched in the uterus.
The Philippine government declared whale sharks as endangered species in 1998, thereby banning its plunder and exploitation. Right now, the Department of Tourism is promoting eco-tourism to protect the whale sharks in Donsol.
World's Smallest Fish
The world's smallest freshwater fish is found in the Philippines. The dwarf goby (Pandaka pygmaea) measures 1.2 centimeters or less than half of an inch, the tiniest known vertebrate. American Ichthyologist Albert Herre first discovered it in Malabon River in 1925.
The Philippines is also the home of sinarapan, the world's smallest commercial fish. Sinarapan, scientifically known as Mistichthys luzonensis, is a goby found only in Lakes Bato and Buhi in Camarines Sur province. Sinarapan grows to an average length of 1.25 centimeters, only slightly longer than the dwarf goby. Today, unabated fishing in the two lakes threatens the population of sinarapan.
Herbivorous Marine Mammal
Dugongs or sea cows, the only herbivorous marine mammals, are often sighted in Philippine waters, particularly near Palawan province and southern Mindanao.
According to marine scientists, an ordinary dugong grows up to three meters in length and weighs 400 kilograms. It feeds on sea grass so it always reaches for the bottom of the sea. Whether dugong's appetite has something to do with its long life remains to be verified. It is said that a dugong can live more than 70 years. The Philippine government has banned the commercial exploitation of dugong since 1991.
More than 500 of the world's 700 coral species are found under the waters of the Philippines, which is a part of the Coral Triangle - a region in the Pacific Ocean.
Seahorses are small saltwater fish belonging to the Syngnathidae family (order Gasterosteiformes), which also includes pipefish and sea dragons. Most seahorse species, probably the most peculiar creatures in the water, live in the Coral Triangle. There are at least 50 known seahorse species in the world. They inhabit temperate and tropical waters but most of them are concentrated in the warm coastal waters of the Philippines.
The seahorse's scientific genus name, Hippocampus is a Greek word, which means, "bent horse." Seahorses range in length from about 2 inches to 14 inches. They are known for their small compressed body covered with 50 rectangular body plates. At least 47 nations and territories around the world are involved in buying and selling seahorses. The largest known importers are China, Hong Kong, and Taiwan. Among the largest exporters is the Philippines.
Largest and Smallest Shells
Both Tridacna gigas, one of the world's largest shells, and Pisidum, the world's tiniest shell, can be found under Philippine waters. Tridacna gigas grows as large as one meter in length and weighs 600 pounds while Pisidum is less than 1 millimeter long. A shell called glory of the sea (Connus gloriamaris) is also found in the Philippines and considered as one of the most expensive shells in the world.
World's Largest Reptile
The saltwater crocodile, which can be found in the Philippines and other Asian countries, is considered as the world's largest reptile. Scientifically known as Crocodylus porosus, it is different from Mindoro's freshwater crocodile (Crocodylus mindorensis), which is a relatively smaller species.
An adult saltwater crocodile measures between six to seven meters (20-23 feet) and weighs about two to three tons. There were tales that a 27-foot saltwater crocodile was killed near Lake Taal in Batangas in 1823. It reportedly took 40 men to bring the body ashore. When the men cut the crocodile's body open, they found the body of a horse in seven pieces. The largest crocodile ever sighted was a 33-footer in Borneo in 1920. It was believed to be 200 years old.
The Philippine archipelago also teems with different types of plants. It is said that as many as 9,000 flowering plants can be found in the country, including 200 fruit trees. Among the endemic fruit trees in the Philippines are durian, mabolo, pili and bignay.
They Were Vanishing
Vanishing were not only the animals endemic to the Philippines, but also several things and cultural traditions that Filipinos in the 1950s grew up with. Among the items that are no longer found in the Philippine market are bakya, banig and salakot (If you still remember them). Bahay kubo is also disappearing in towns and barangays and it would be hard to find a house, with a batalan today. Who still observe cultural traditions like harana, bayanihan and balagtasan. And where did the makata go? | <urn:uuid:5d8fe79b-4212-4f59-814c-f228477648fd> | {
"date": "2016-08-24T06:38:49",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982291143.22/warc/CC-MAIN-20160823195811-00268-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9435367584228516,
"score": 3.640625,
"token_count": 4721,
"url": "http://www.txtmania.com/trivia/only.php"
} |
The Gibbes recently acquired a work entitled Church Street, Charleston by Karl Zerbe (1903 – 1972). A German-born artist, Zerbe came to the United States in 1934 to escape Nazi rule. Prior to his arrival in the US, Zerbe was recognized as one of Germany’s most promising young artists. He settled in the Boston area, and in 1936 was named Head of the Painting Department at the Museum School of the Museum of Fine Arts Boston, a position he maintained until 1953. By the 1940s, Zerbe along with his contemporaries Jack Levine and Hyman Bloom achieved national recognition as leaders of the Boston Expressionists School. Zerbe frequently experimented with new painting processes and is credited with reviving the ancient technique of encaustic, a medium which became his mainstay during the 1940s.
Zerbe made his first sojourn to Charleston in 1940, undoubtedly influenced by his relationship with native Charleston artist, William Halsey. Halsey studied under Zerbe at the Museum School in Boston from 1937 to 1939 and credits Zerbe as one his most significant mentors. Painted in the figurative expressionist style, Zerbe’s depiction of Church Street is a unique interpretation of a commonly painted Charleston scene. This painting was first exhibited at the Gibbes in 1962 during a retrospective exhibition of Zerbe’s work organized and traveled by the American Federation of the Arts. Now a part of the Gibbes permanent collection, you can see this exciting new work on view in the Welcome Gallery.
Want to see more of the museum’s collection? Click here to browse our online collections search. | <urn:uuid:56482d13-5df0-43f9-991a-82c50be52a16> | {
"date": "2014-10-22T22:22:50",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507447660.26/warc/CC-MAIN-20141017005727-00074-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9771390557289124,
"score": 2.765625,
"token_count": 333,
"url": "http://www.gibbesmuseum.org/gibbes_blog/?p=217"
} |
Download Now Free registration required
Today wireless communications is acting as a major role in networks. Through year-end 2006, the employee's ability to install unmanaged access points will result is more than 50% of enterprises exposing sensitive information through the wireless Virtual Private Networks (VPN). It enables them to send the data between two computers across a shared or public network in a manner that emulates the properties of a private link. The basic requirements for VPN are User Authentication, Address Management, Data Compression, Data Encryption and Key Management. The private links are established in VPN using Point-to-Point Tunneling Protocol (PPTP) and Layer-Two-Tunneling Protocol (L2TP). These protocols are satisfies VPN requirements in five layers. In user authentication layer, multiple trusted authorities using Extensible Authentication Protocol (EAP) do the authentication process.
- Format: PDF
- Size: 70.36 KB | <urn:uuid:ca614e09-af43-4aa1-a801-8cc1eefff3ac> | {
"date": "2014-08-01T02:11:35",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273874.36/warc/CC-MAIN-20140728011753-00414-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8483756184577942,
"score": 2.921875,
"token_count": 187,
"url": "http://www.techrepublic.com/resource-library/whitepapers/a-new-type-of-network-security-protocol-using-hybrid-encryption-in-virtual-private-networking/?scname=vpns"
} |
Adverbs; Postpositions; conjunctions; particle s; interjections.
We have previously observed that there is little formal difference between nominals in their function as nouns and in their function as adjectives. The same words may also be used in adverbial uses. There are some particular endings which occur on words used adverbially, but examination reveals them to be morphemes already familiar to us, functioning differently. Study the following examples:
ilemlĕ vărman a beautiful woods
ilemlĕ tĕrlenĕ beautifully sewn
inşe şul a distant road
inşe an hur don‘ t put it far away
hurlăhlă jură a sad song
hurlăhlă julaşşĕ they sing sadly
vyrăsla jură a Russian song
vyrăsla jurlat he sings in Russian
Some additional examples of adjectives, pronouns, numerals and nouns used as adjectives are the following phrases (taken mostly from Dmitriyev & Gorskii, p. 890).
lajăh kalaşat he speaks well
tirpejlĕ tyt be careful, take care
chăvashla kalaşat he speaks Chuvash
şĕnĕlle purănat he‘s living like a new man
(turned over a new leaf)
urăhla tăvăpăr we do it differently
unchchĕn kilĕn until you come
teprechchen hăvarar let‘s stay until the next one
şavănta kaj go there
kuntan kajatpăr we are leaving here (from here)
vişşĕn purnatpăr we three live together
ikserĕn piraşşĕ they go two at a time
şurkunne kajăksem vĕşse kilchĕş the birds came flying in the springtime
kunĕpe şumăr şăvat it rains all day
The morphemes -lla of the directive, and the -la morphemeof adjectives may also be found in an adverbial function as: untalla ‘thither,‘ kilelle ‘homewards,‘ şamrăkla ‘as a youth, young,‘ şĕrle ‘by night, at night,‘ kĕtesle ‘in installments.‘ The genitive case is also often used to create adverbs, thus, irĕkkĕn ‘voluntarily, of a voluntary nature,‘ sivvĕn ‘coldly,‘ şămăllăn ‘slightly,‘ tĕplĕn ‘in detail,‘ vyrănăn ‘in places, somewhere,‘ măshărăn ‘in pairs, paired up,‘ kunĕn-şĕrĕn ‘by day and night.‘ The dative is found with some expressions of time, as kĕrkunne ‘in the fall,‘ şurkunne ‘in the spring,‘ irhine ‘in the morning.‘ The suffix -chchen or –chen is found on some expressions of time, as well as in the antecedent converb: halichchen ‘up to this time,‘ pajtahchen ‘since time immemorial,‘ nummajchchen ‘a great deal, for a long time.‘
We have previously met the prefixes -ta-/-te- with the indefinite pronouns; they occur with some adverbial words: tahşan ‘sometime,‘ taşta ‘somewhere,‘ temĕnle ‘some sort,‘ nişta ‘no where, to nowhere,‘ teple ‘somehow.‘ The compound suffix -ranpa, arising from the instrumental and ablative cases, is also used adverbially: ĕnertenpe ‘since yesterday,‘ paşărtanpa ‘since time began,‘ kilnĕrenpe ‘since I arrived, from my having arrived.‘
Some words and phrases occur only in adverbial usage:
kăşal nowadays (<>
Unlike languages with which the student may be acquainted, Chuvash does not have any prepositions, but instead uses postpositions, which get their name from the fact that they come after the word which they govern instead of before it. These words were once substantives, and for that matter, still are, although usually they occur in the function of postpositions. Some typical words which are used as postpositions are the following:
ajak side hĕr edge
um front, before pat direction, towards
vară midst şum along
aj underpart, underside hushă between; internal
şi surface hĕrri front one side ("its edge‘)
jen side ăsh(ĕ) interior, inside
tără upon tărri upon (possessive)
hyş rear, behind şyvăh vicinity, near
Case forms suffice to express some relationships, as:
shkapa kĕneke hur place the book in the book case
If it is necessary to tell in greater detail, then postpositions may be used:
kĕneke ajne tetrad‘ hur put the notebook under the book
kĕneke şine tetrad‘ hur put the notebook on the book
kĕneke hyshne tetrad‘ hur put the notebook behind the book
Some examples from the reading are the following.
juman patne towards the oak
şuni şinchchen down from his sled
tĕp şine on the ground
kashnin şinchen from off each
lashu patne towards your horse
pĕrin uri piche şine at the side of one"s leg
(on top of the side of the foot of one)
aslin puşĕ patĕnchen from the side of the eldest‘s head
In the modern literary language, the postposition words do not take possessives other than the 3rd p. ‚ and take only the dative, locative and ablative case endings, and govern the genitive of pronouns. With nouns, the absolute case is used. Nearly any word which means some sort of location or direction can be used with the practical effect of a postposition.
Some postpositions of invariable which can"t be declined, are:
urlă through, across
pĕrle together with (+ instrumental)
vitĕr through, across
taran up to
tărăh by, according to
pula thanks to
pirki by virtue of
kura thanks to
puşne except (+ ablative)
They may govern different cases, as genitive, dative and ablative.
san valli kĕneke iltĕm I bought this book for you
ku kĕneke Ivana valli this book is for John
Verukăn ivălĕnchen puşne Vera has no one except her son
urăh nikam ta şuk
şumăra pula ută tipmerĕ On account of the rain the hay did not dry out.
Some persons consider the purposive -shăn and the terminative -chen as postpositions. One could equally well consider them cases.
mĕnshĕn for what, why?
kaşchen until evening
Chuvash conjunctions function essentially the same as do their English counterparts, and may be divided into subordinating and coordinating, which, as their names imply, serve either to connect explanatory clauses with main clauses, or simply to unite words and clauses of equal (hence coordinate) status.
Coordinating conjunctions are the following:
connective: tata, -ta/-te “and, too, also“
partitive: je, te, pĕrre ... tepre, pĕr . .. pĕr “now … now;“
je . .. je “either . . or,“ “now this ... now that“
adversative: şapah, anchah “but, however“
negative: ni . .. ni “neither ... nor“ (of foreign origin)
Subordinating conjunctions are the following:
causative: mĕnshĕn tensen “because“ (‘If you say for what‘)
consequential: şavănpa, şavănpa vara, vara “since“
purposive: tese “in order to“ (lit. ‘saying‘)
conditional: tesen “if“ (‘when you say‘)
concessive: pulin te, pulsan ta “although“ (‘if it be‘)
Some examples are:
vyrăs ta, chăvash ta, irşe Both Russian, Chuvash and
te hăj chĕlhipe kalaşat Erzyan speak in their own language.
hula uramĕsem aslă ta takăr City streets are broad and flat.
epĕ şeş mar, ytisem te Not only I, but others too think so
pajan epĕ ni pahchana, Today I neither went into the
ni urama tuhmarăm garden nor onto the street.
The use of particles imparts nuances of meaning to words and clauses. They may be divided into the following general types:
-ah/-eh (strengthens the preceding word like Russian zhe or German doch, ja, or the way in English we stress with the voice, by saying “He did go there“) - this is very frequent, especially In folklore, where it is mostly written as part of the preceding word. şeş şeh “only, merely“
akă “here,“ avă “there;“văt “voici,“ veş “voilà".
-i, -shi “whether“ (often merely indicates a question is in existence, like Japanese
ka); -i-mĕn or im “really, you don‘t say“
lightly expressed command:
shăp “equally, exactly, namely, viz.“
an, mar “no, not, not any“
Most of these particles are enclitic (that is, pronounced and stressed with the preceding word), but -ah, and the other intensifying particles, together with the demonstrative and negative, may also bear accents of their own. The interrogative -i is used at the end of sentences, and only when no other interrogative word is present.
Interjections, too, function chiefly in Chuvash as In English, to insert parenthetical exclamations not essential to the sentence, but conveying a definite feeling of the speaker regarding the circumstances. Some of them are:
used in salutation and greeting
expresses dissatisfaction and indignation
alas! expresses satisfaction, but also extreme discontent, perplexity, grief and indignation
reproachful, tsk-tsk!, uh-uh!
ah-hah! derisive or ironical attitude
come on! let‘s go! get with it! plural is: atjăr. Also occurs metathetized: ajta, ajtăr
Chuvash is quite rich in onomatopoetic or sound-imitative words, and these are found frequently in literature, folklore and native songs. For our present purposes, they are not too important.
shănkăr-shănkăr shyv juhat The water babbles, gurgle-gurgle. | <urn:uuid:3411ec52-eeed-4bcf-8c0b-354c5cb11cdf> | {
"date": "2017-05-25T08:50:13",
"dump": "CC-MAIN-2017-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608058.13/warc/CC-MAIN-20170525083009-20170525103009-00330.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8672671318054199,
"score": 3.828125,
"token_count": 2775,
"url": "http://chuvashlar.blogspot.nl/2009/02/unite-ondort-adverbs-postpositions.html"
} |
Active Bacterial Core Surveillance
ABCS is an active laboratory- and population-based surveillance system for invasive bacterial pathogens of public health importance. For each case of invasive disease in the surveillance population, a case report is completed and bacterial isolates are sent to CDC and other reference laboratories for additional laboratory evaluation. Currently, ABCs conducts surveillance for 6 pathogens: group A and Group B Streptococcus, Haemophilus influenzae, Neisseria meningitidis, and methicillin-resistant Staphylococcus aureus (MRSA). ABCs currently operates in 10 Emerging Infections Programs (EIP) sites across the U.S., representing a population of approximately 41 million. Most areas restrict the population to certain pathogens to ensure complete reporting and good audit data. National estimates of cases, disease rates, and deaths are calculated from these data.
http://www.cdc.gov/abcs/index.htm and related web pages. | <urn:uuid:55202400-1ce9-41bf-9312-e5e5c0a25d85> | {
"date": "2016-08-27T03:08:34",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982297699.43/warc/CC-MAIN-20160823195817-00242-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.870490312576294,
"score": 2.546875,
"token_count": 198,
"url": "https://www.healthypeople.gov/2020/data-source/active-bacterial-core-surveillance?id=3"
} |
Treating depression can really be a very intelligent life-changing move that can improve your future. Although, it does require hard work, and quite a bit of research. You may be confused about what treatments are best and where you can start.
Seek out your friends and the social activities that you usually enjoy. Whenever you feel depressed, you may not want to do things that you normally enjoy. Friends and social contacts are important, so make the effort to keep them in your life. Make it a point to keep doing your normal activities. Shying away from your regular activities will only exacerbate your depression.
If you have depression at a sub-clinical level, you may wish to consider over-the-counter treatments. Try something like grape juice combined with St. St. John’s Wart provides some relief. It will be help you and it is much cheaper than prescription medicine.
Remember the importance of your diet, exercise and adequate sleep in preventing depression. Engaging in activity, such as a brisk walk or bike ride, may be all you need to conquer your depression. If you’re able to make a commitment to not eat foods that are processed, exercise lightly each day, and sleep well you could get the depression to go away.
Try meditating to help relieve some of your issues with depression. The health benefits of meditation have been well documented and it can improve your mood and reduce high blood pressure.
Beat your depression by realizing you are in control. Take the word “depressed” out of your vocabulary. Don’t let the stigma attached to the word depression bother you. Replace the word with another term or phrase, such as “cloudy mood”, so you can describe the feeling instead of saying it and open the door to a happier perspective.
Do not think you’re crazy. Depression is very real, and it is just as serious as other afflictions. Your body knows something is wrong, and this is a side effect. When you are depressed, your body will let you know it needs help.
Try not to use the words “depressed” or “depression” when you’re speaking about your state of mind. Depression is a very serious affliction, but if you use those words, they can make you feel worse. Restructure your vocabulary to describe your depression in terms of mood enhancement. Though downward mood swings and depression are essentially the same thing, it is sometimes easier mentally to deal with the process of elevating a temporary mood.
Surround yourself with the people you love, which will help your mood and reduce your stress level. Social interaction can help alleviate your symptoms of depression.
So, as you have seen, it is true that treating depression requires research, work, and effort to start seeing positive changes. Additionally, you must make these strategies part of your daily routine in order to really see good results. If you keep the tips from this article in mind, you will be that much closer to finding a treatment for your depression that works best for you. | <urn:uuid:80402c20-a4c7-44b7-b9b6-c8a01edd693c> | {
"date": "2019-12-14T07:31:13",
"dump": "CC-MAIN-2019-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540585566.60/warc/CC-MAIN-20191214070158-20191214094158-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9518615007400513,
"score": 2.796875,
"token_count": 631,
"url": "https://dentistclinics.info/lose-that-dark-cloud-how-to-win-over-depression/"
} |
Protecting Heritage Places
10 steps to help protect the natural and cultural significance of places
Australian Heritage Commission, 2000
Step 5: What are the issues? (continued)
Doing a SWOT analysis
One of the best ways to get an overview of the relevant management issues is to do a SWOT analysis with a group of people interested in the place. This process looks at the Strengths, Weaknesses, Opportunities and Threats for the place, based on what is known about all the issues.
You can draw up this simple grid on a board or on paper, then write under the four headings:
You will need to think of the current strengths and weaknesses as well as future opportunities and threats.
SWOT analysis is a very effective tool to use once you have a reasonable amount of information about the issues. The results of this analysis will be used in the future steps.
Remember - problems or weaknesses can sometimes be turned into opportunities! | <urn:uuid:65b21a5b-dad0-42ce-8d18-62331b0094ad> | {
"date": "2014-07-14T09:11:17",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776440175.84/warc/CC-MAIN-20140707234040-00016-ip-10-180-212-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9340654015541077,
"score": 2.75,
"token_count": 198,
"url": "http://www.environment.gov.au/node/19393"
} |
1. The problem statement, all variables and given/known data A 7400 kg rocket blasts off vertically from the launch pad with a constant upward acceleration of 2.15 m/s^2 and feels no appreciable air resistance. When it has reached a height of 560 m, its engines suddenly fail so that the only force acting on it is now gravity. a. What is the maximum height this rocket will reach above the launch pad? b. How much time after engine failure will elapse before the rocket comes crashing down to the launch pad? c. How fast will it be moving just before it crashes? 2. Relevant equations 560=.5(2.15)t^2. v0=2.15t ht=560Tv0t-.5(2.15)t^2 3. The attempt at a solution I got 1115 meters and it's wrong. | <urn:uuid:3fecf251-8544-4970-a433-fb92838b487c> | {
"date": "2017-01-16T13:01:53",
"dump": "CC-MAIN-2017-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279176.20/warc/CC-MAIN-20170116095119-00478-ip-10-171-10-70.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9086396098136902,
"score": 3.296875,
"token_count": 184,
"url": "https://www.physicsforums.com/threads/constant-vertical-acceleration.211029/"
} |
Alright, so the title of the post is a little cheeky, but right now it appears that the eruption of Grímsvötn that started last Saturday (May 21) is for all intents and purposes over (at least for the time being). Although there is still some minor explosive activity from 3-4 tephra cones near the crater, it appears that larger plumes (>3 km) have not been seen at Grímsvötn for over 24 hours. A group of geologists ventured to the crater region (see below) and found upwards of 130 cm of ash deposited in some places near the vent.
The IMO has posted a great collection of images from the Grímsvötn eruption - starting with the big bang on May 21 through to today - it is almost like a timelapse of the changes in the volcano over the 4-5 days of eruption. You can also get a close up of the crater itself in another IMO post. In the main image you can see the multiple tephra cones surrounded by the remains of the crater lake, suggesting the main thrust of the eruption might have been from multiple vents. There is now plenty of video as well of the eruption both when it was a towering 20 km plume producing its own lightning to the smaller surtseyan explosions of the last few days.
Ash deposits near the vent at Grímsvötn seen on May 26, 2011. Image courtesy of the IMO.
I've seen a lot of information on the atmospheric effects of the Grímsvötn eruption - including a great sequence showing how the sulfur dioxide from the plume spread across the northern latitudes as seen by the NASA Aqua satellite and how the ash plume grew during the eruption as seen by the NASA Terra satellite. I also liked the weather radar images of the ash plume during its last gasp (see below), where the thick, hot plumes sticks out through the clouds as the radar swept across southern Iceland.
Weather radar showing the last tall ash plume from Grímsvötn seen on May 25, 2011 at 2:10 AM. Image courtesy of the IMO.
As for European air travel, almost everything is back to normal. There will still beash in the atmosphere over the North Atlantic even into the weekend as it swirls in the winds, but most air traffic has resumed. *Volcan01010 *does a nice job debunking any claims that the ash wasn't a threat to air travel in the region as well. Not surprisingly, the verdict is split on whether EU officials handled the ash hazard better or worse than in 2010, but it seems like more changes in the ash rules are on the way (by letting aircraft fly underneath the ash ... gulp). However, this does seem like an ideal situation to test the AVOID (Airborne Volcanic Object Identifier and Detector) system and easyJet will do just that. In Iceland, clean up and recovery has begun in the regions hardest hit by the ash and it seems that little damage was done to the tourism economy of the island nation from the flight disruptions.
Now, should we expect this to be the end of the eruption? That is an excellent question. There is still minor seismicity under the volcano, which isn't too surprising as magma moves in the magmatic system under Grímsvötn. Jon Frimann wonders how over is the eruption considering the persistent volcanic tremor that hasn't reached background levels yet, but as of right now, things are fairly quiet at Grímsvötn.
Check out all the posts on the Grímsvötn eruption to find all the details:
Top left: An image of the ash plume and ash-covered glacier seen a few days after the eruption began, taken by Árni Sigurðsson. Click here to see the originals, courtesy of the IMO. | <urn:uuid:43d31ae9-d493-4733-8223-6d3e2163fcbd> | {
"date": "2018-11-22T11:04:25",
"dump": "CC-MAIN-2018-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746205.96/warc/CC-MAIN-20181122101520-20181122123520-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9622886776924133,
"score": 2.578125,
"token_count": 809,
"url": "https://www.wired.com/2011/05/that-about-wraps-it-up-for-the-grimsvotn-eruption/"
} |
Legal Services Corporation
|Founder||United States Congress|
|Focus||Promoting equal access to justice and providing grants for high-quality civil legal assistance to low-income Americans|
|Origins||LSC Act of 1974|
|Method||Many state-level grantee programs|
|Expenses||$375 million budget|
|Slogan||America's Partner for Equal Justice|
The Legal Services Corporation (LSC) is a publicly funded, 501(c)(3) non-profit corporation established by the United States Congress. It seeks to ensure equal access to justice under the law for all Americans by providing civil legal assistance to those who otherwise would be unable to afford it. The LSC was created in 1974 with bipartisan congressional sponsorship and the support of the Nixon administration, and is funded through the congressional appropriations process.
LSC has a board of eleven directors, appointed by the President of the United States and confirmed by the United States Senate, that set LSC policy. By law the board is bipartisan; no more than six members can come from the same party. LSC has a president and other officers who implement those policies and oversee the corporation's operations.
For Fiscal Year 2015, LSC had a budget of $375 million to fund civil legal aid. LSC is the largest single funder of civil legal aid in the country, distributing more than 90 percent of its total funding to 134 independent nonprofit legal aid programs.
LSC is one of the organizational descendants of the former Office of Economic Opportunity (OEO). The Economic Opportunity Act of 1964, a key part of President Lyndon B. Johnson's Great Society vision, established the OEO. From 1965 on, starting with a budget of $1 million, the OEO created 269 local legal services programs around the country, such as California Rural Legal Assistance, which made a name for themselves suing local officials and sometimes stirring up resentment against their federal funding.
By the early 1970s the Nixon administration began dismantling the OEO; funding for legal services for the poor began to wither, and supporters looked for an alternative arrangement. In 1971 a bipartisan congressional group, including Senators Ted Kennedy, William A. Steiger, and Walter Mondale, proposed a national, independent Legal Services Corporation; at the same time, administration officials such as Attorney General John N. Mitchell and chief domestic advisor John Ehrlichman were proposing their own somewhat similar solution.
Creation and the Ford era
The idea behind the LSC was to create a new corporate entity that would be funded by Congress but run independently, with eleven board members to be appointed by the president subject to senate confirmation.
LSC was created by the Legal Services Corporation Act of 1974 (Pub.L. 93–355). The LSC Act contains certain rules and restrictions regarding what LSC grantees can do. The initial budget was set at $90 million.
Naming and confirmation of the first LSC board was delayed by inaction and opposition, but by July 1975 President Gerald R. Ford had named, and the Senate approved, the first board, with Cornell University Law School Dean Roger Conant Cramton as its first chair. Debate existed from the start among the board members as to whether LSC's role should be the OEO's one of using lawsuits and other means to attack broad underlying difficulties of the poor, or whether the focus should be more narrowly defined to addressing small, specific situations. The LSC Act said that the organization was to pursue "equal access to justice," but Cramton wrote that while the law was intended to proscribe the blatantly political objects of the 1960s OEO work, it was worded ambiguously.
In December 1977, President Jimmy Carter nominated Hillary Rodham to the board of directors of the LSC, for a term to expire in July 1980. Rodham, an attorney with Rose Law Firm in Little Rock, Arkansas and the wife of Arkansas Attorney General Bill Clinton, had a background in children's law and policy and had worked in providing legal services for the poor while at Yale Law School. She had also done 1976 campaign coordination work for Carter in Indiana. This was a recess appointment, so Rodham took her place on the board without immediate Senate confirmation. Rodham was nominated again in January 1978 as a regular appointment. In mid-1978, the Carter administration chose the thirty-year-old Rodham to become chair of the board, the first woman to become so. The position entailed her traveling monthly from Arkansas to Washington, D.C. for two-day meetings.
During Rodham's Senate confirmation hearings, she subscribed to the philosophy that LSC should seek to reform laws and regulations that it viewed as "unresponsive to the needs of the poor." Rodham was successful in getting increases in Congressional funding for LSC, stressing its usual role in providing low-income people with attorneys to assist them in commonplace legal issues and framed its funding as being neither a liberal nor a conservative cause. By her third year on the LSC board, Rodham had gotten the LSC budget tripled. Opposition to LSC during this time came from both Republican Congressman James Sensenbrenner, who favored a "judicare" approach of compensating private lawyers for work done for the poor, and Conservative Caucus head Howard Phillips, who objected to LSC representing gays.
LSC funding was at its highest-ever mark, in inflation adjusted dollars, in fiscal 1980, with a budget of $303 million. Some 6,200 poverty lawyers filed suits using its funds on behalf of 1.5 million eligible poor clients; the lawyers won almost 80 percent of their cases, which mostly involved divorces, evictions, repossessions, and interrupted payments from federal agencies. For fiscal 1981 it was budgeted at $321 million.
In June 1980, Carter renominated Rodham for another term on the board, to expire in July 1983. Sometime between about April 1980 and September 1980, F. William McCalpin replaced her as chair of the board. He would remain chair through late 1981.
LSC was strongly opposed by some political groups. As Governor of California in the 1960s, Ronald Reagan had advocated elimination of all federal subsidies for free legal services to the poor in civil cases, and had tried to block a grant to California Rural Legal Assistance in 1970. Indeed, Time magazine would state, "Of all the social programs growing out of the Great Society, there is none that Ronald Reagan dislikes more than the Legal Services Corporation." CRLA's executive director would characterize Reagan's attitude towards the organization as akin to that of Darth Vader.
When President Reagan took office in January 1981, he attempted to eliminate the LSC by zero funding it. Supporters of LSC rallied to defend it; American Bar Association president W. Reece Smith, Jr. led 200 lawyers to Washington to press its case. The U.S. House Judiciary Committee blocked Reagan's zero-funding action in May 1981, but did cut financing to $260 million for both of the next two years as well as place additional restrictions on LSC lawyers. By the following month, the now Republican-controlled U.S. Senate Labor and Human Resources Committee had cut proposed financing to $100 million, as part of what The New York Times deemed an "increasingly bitter ideological struggle". Moreover, Reagan administration officials accused LSC of having "concealed and understated" its lobbying activity and support for politically motivated legislation.
In November 1981, the Reagan administration, although still hoping to eliminate LSC, decided to replace all eleven LSC board members with nominations of their own. For the new chairman they chose Ronald Zumbrun, president of the ideologically opposite Pacific Legal Foundation, which had previously defended the state of California against several legal aid lawsuits. For fiscal 1982, LSC's budget was reduced by 25 percent to $241 million, with new rules prohibiting most class action suits and lobbying. Zumbrun's nomination was sufficiently controversial that in January 1982, the Reagan administration dropped it, and instead made a recess appointment of William J. Olson to be chair. Olson had headed the Reagan transition team dealing with LSC and had personally recommended its abolition, so LSC advocates were not mollified.
At the same time, the Reagan administration had named six other board members as recess appointments. In February 1982, the Carter-appointed members of the previously existing board filed suit to against the recess appointments, claiming they were unlawful and that they should be enjoined from holding meetings. Rodham hired fellow Rose Law Firm associate Vince Foster to represent her in the case and to seek a restraining order against Reagan. The Reagan nominees may have been prohibited from meeting with the Legal Service Corporation before confirmation.
Rodham also prodded Senate Democrats to vote against Reagan's nominees. The nominees did undergo heavy criticism in Congress, with one labeled a bigot and Olson lambasted for his transition position. In March 1982, yet another new chair was named, Indiana University law professor William F. Harvey, although Olson would remain on the board. Harvey and Rodham had a conference call in which Rodham reiterated her desire for the lawsuit. That action, McCalpin v. Dana, was decided in favor of the defendants by summary judgment in October 1982.
By December 1982, the Senate was willing to confirm six of Reagan's more moderate nominees, but not Harvey, Olson, and another; the Reagan administration instead pulled the names of all of them. This board then closed its last meeting in a public debacle, with Olson lambasting LSC as full of "abuses and rampant illegality" and a "waste of the taxpayers' money through the funding of the left," while being harangued by a hostile audience. And too, the Reagan appointees to the board were being criticized for collecting substantially higher fees than previous board members.
In September 1983 the General Accounting Office found that in early 1981, LSC officials and its local affiliates had used federal funds in assembling opposition to Reagan's efforts to eliminate LSC, and that this use had been in violation of the LSC Act's restrictions against such political activity. Such actions against the LSC Act were not crimes, and the GAO report did not claim any crimes had taken place. The investigation had been initiated by the LSC of 1983 ordering a series of "raids" on their own offices to attempt to discover evidence of LSC of 1981 actions questionable, prompting Time magazine to declare LSC "an organization at war with itself."
More recess appointments were made by Reagan in late 1983, in 1984, and in early 1985, with again none of them being confirmed by the Senate. Indeed, LSC's board would go a total of three and a half years populated by recess appointments. Finally in June 1985 the Senate confirmed the latest batch of Reagan nominations. The Carter board lawsuit, since renamed and appealed as McCalpin v. Durant to the United States Court of Appeals, District of Columbia Circuit, was then decided later in June 1985 as moot.
George H. W. Bush era
Overt White House hostility towards LSC ended with the George H. W. Bush administration, with calls for level funding rather than decreases. Under board chair George Wittgraff, LSC began to ease relations with private lawyers and with state grantees. In fiscal 1992, LSC saw a funding increase back to $350 million.
The first two years of the Clinton administration saw more growth for LSC, as former chair McCalpin returned to the board and the previous former chair was now First Lady of the United States Hillary Rodham Clinton. Funding rose to a high mark in absolute terms of $400 million for fiscal years 1994 and 1995.
Things turned upon the advent of the Republican Revolution. In fiscal 1996, once the Republican party had taken over Congress the year prior, LSC had its funding cut again, from $400 million to $278 million. A new set of much more extensive restrictions were added to LSC grantees. The organization's supporters expressed disappointment that the Clinton administration did not make LSC a critical priority in its budget battles with the Republican Congress, especially given Hillary Clinton's former role in it.
As part of a comprehensive "welfare reform" of federal welfare laws beginning in 1996, most significantly the Personal Responsibility and Work Opportunity Act, Congress imposed restrictions on the types of work that LSC grantee legal services organizations could engage in. For example, LSC-funded organizations could no longer serve as counsel in class action lawsuits challenging the way public benefits are administered. Additionally, LSC grantees faced tightened restrictions on representing immigrants, specifically those illegally in the country. However, in 2001, the restriction on welfare advocacy was ruled unconstitutional in Legal Services Corp. v. Velazquez.
However, non-LSC funded organizations are not subject to these restrictions leading the legal services community to adopt a two-track approach: LSC restricted counsel taking on individual clients but not engaging in class actions, and non-restricted counsel (using private donor funding) both taking on individuals as well as engaging in otherwise restricted litigation. Poverty lawyers in both tracks still work together where they can, being careful not to run afoul of LSC restrictions.
George W. Bush era
According to LSC's 2005 report "Documenting the Justice Gap in America: The Current Unmet Civil Legal Needs of Low-Income Americans," all legal aid offices nationwide, LSC-funded or not, were together able to meet only about 20 percent of the estimated legal needs of low-income people in the United States.
For 2007, LSC had a budget of some $350 million.
By fiscal 2011, the annual budget amount for the LSC was $420 million. In early 2011, House now-majority Republican proposed a $75 million reduction in that current-year amount, while Obama's suggestion budget proposed a $30 million increase for the subsequent year.
On December 16, 2014, the President signed into law the Consolidated and Further Continuing Appropriations Act for FY 2015 that includes $375 million for LSC.
Due to the up-and-down nature of LSC’s political history, there are many restrictions on lobbying, advocacy, and general impact work which apply to LSC-funded organizations. Here they are broken into categories of expressly forbidden, forbidden with LSC funds, and expressly permitted.
Recipients may never:
- Publicly identify LSC or the recipient with any partisan or nonpartisan political activity or a candidate for office, or encourage others to do so (45 CFR 1608.4)
- Staff attorneys may not use their position or authority to influence elections or coerce anyone to contribute to a political cause (45 CFR 1608.5)
- Run for office (45 CFR 1608.5(c))
- Register, transport to polls, or otherwise assist voters in election-related activities (45 CFR 1608.6)
- Use non-LSC funds for anything prohibited by the LSC Act, unless it is specifically allowed in 45 CFR 1610.4, 1610.6, or 1610.7 (45 CFR 1610.3)
- Lobby. In the language of the regulation, recipient organizations may not attempt to influence the passage or defeat of a bill, constitutional amendment, initiative, referendum, executive order, or provision which appropriates funds or defines the functions or authority of LSC or the recipient (45 CFR 1612.3).
- This includes using resources from a recipient organization to support lobbying efforts on employees’ own time – don’t even take an envelope! (45 CFR 1612.3(c))
- The caveat is that organizations may lobby at the State and local level with non-LSC funds regarding funding for their organization (45 CFR 1612.6(f)).
- Grassroots lobby (45 CFR 1612.4)
- During working hours or with resources provided by an LSC-funded organization, employees may not participate or encourage others to participate in public demonstrations, boycotts, picketing, or strikes. This must be on personal time (45 CFR 1612.7(a)).
- Employees of recipients may never engage in rioting or civil disturbances, actions which violate a court-imposed injunction, or take part in illegal activity of any kind (45 CFR 1612.7(b))
- Support or conduct training sessions which advocate particular public policies, encourage or facilitate prohibited political activities, disseminate information about such policies or activities, or train participants to engage in prohibited activities (45 CFR 1612.8(a))
- Form or organize an association, labor union, or other similar organization. This is distinct from holding informational meetings for attorneys or forming organizations of eligible clients for advice on service delivery (both of which are allowed). You may also advise your clients on the legal procedures for forming these types of organizations themselves, and even help them with documents like bylaws (45 CFR 1612.9).
- Represent clients in criminal proceedings (unless you are appointed by a court or a situation arises out of your representation of the client in a civil case) (45 CFR 1613)
- Initiate or participate in a class action suit (45 CFR 1617.3), although you may represent individuals who want to remove themselves from the suit or have not received the settlement ordered by the court (45 CFR 1617.2(b)(2)).
- Provide legal assistance to ineligible aliens (45 CFR 1626.3; see 45 CFR 1626.5 to judge eligibility), unless the alien in question is, or is the parent of someone subject to battery or extreme cruelty by a spouse, parent, or member of their spouse’s or parent’s family residing in the same household. In this case, non-LSC funds must be used for the case (45 CFR 1626.4).
- Participate in any activity related to the redistricting of a legislative, judicial, or elective district at any level of government (45 CFR 1632.3)
- Defend clients in eviction proceedings from a public housing unit if that client has been charged with or convicted of the sale, distribution, or manufacture of controlled substances, or of possession with the intent to sell or distribute (45 CFR 1633.3)
- Participate in civil litigation on behalf of an incarcerated person, as plaintiff or defendant, nor any administrative hearing challenging the conditions of incarceration (45 CFR 1637.3)
- Represent, nor refer for representation by another recipient any client gained through in-person, unsolicited advice (45 CFR 1638.3)
- Participate in legislation, lobbying, or rulemaking involving efforts to reform Federal or State welfare systems (45 CFR 1639.3)
Recipients may, with non-LSC funding:
In many of their regulations, LSC only states activities that their funding cannot be used to support. In 45 CFR 1610.2(c)-(h), however, several different types of non-LSC funding are defined:
- “(c) IOLTA funds means funds derived from programs established by State court rules or
- legislation that collect and distribute interest on lawyers’ trust accounts.
- (d) Non-LSC funds means funds derived from a source other than the Corporation.
- (e) Private funds means funds derived from an individual or entity other than a
- governmental source or LSC.
- (f) Public funds means non-LSC funds derived from a Federal, State, or local government or
- instrumentality of a government. For purposes of this part, IOLTA funds shall be treated in
- the same manner as public funds...
- (h) Tribal funds means funds received from an Indian tribe or from a private nonprofit
- foundation or organization for the benefit of Indians or Indian tribes.”
With these definitions in mind, 45 CFR 1610.4 goes on to specify what each type of funding can be used for:
- Tribal funds can be used for whatever purpose they were granted (45 CFR 1610.4(a))
- Public, IOLTA, and Private funds can be used for whatever purpose they were granted, as long as it doesn’t violate LSC’s regulations (45 CFR 1610.4(b)-(c))
- Non-LSC funds generally can be used to assist clients who are not financially eligible under LSC guidelines (45 CFR 1610.4(d))
In addition, the category of general non-LSC funds may be used to:
- Support a political party, association, candidate, ballot measure, initiative, or referendum – but not during working hours or at the recipient’s office location (45 CFR 1608.3(b))
- Respond to a written request from an agency, legislative body, elected official, etc. to participate in rulemaking or to provide oral or written testimony in order to provide information which may include analysis and/or comments on legislation (45 CFR 1612.6(a))
- Recipients may also provide oral or written comments to an agency in a public rulemaking session without having been requested (45 CFR 1612.6(e))
- Lobby at the State or local level regarding the recipient’s funding (45 CFR 1612.6(f))
- Assist an ineligible alien or his or her child who has been subjected to battery and/ or extreme cruelty by the alien’s parent, spouse, or a member of the parent’s or spouse’s family residing in the same household as the alien. To qualify, the alien him- or herself cannot have participated in the abuse, and the representation must be related to preventing or ending the abuse (45 CFR 1626.4(a)).
- Comment in a public rulemaking proceeding or respond to a written request for testimony in a legislative session or committee meeting concerning welfare reform (45 CFR 1639.5)
- Participate in legal activity which seeks to obtain or compel an individual or institution to provide or assist with euthanasia or assisted suicide (45 CFR 1643.3) or a “nontherapeutic abortion” (term not defined) (LSC Act §1007(b)(8) or the 1996 Appropriations Act §504(a)(14))
- Participate in legal activity seeking to desegregate elementary or secondary schools (LSC Act §1007(b)(9))
- Participate in legal activity relating to violation(s) of the Military Selective Service Act or desertion from the Armed Forces of the United States (LSC Act §1007 (b)(10))
Recipients may, with any funding:
- Accept fee-generating cases in situations in which local pro bono attorneys or the referral service are not viable options (45 CFR 1609.3)
- In terms of accounting, fees garnered from these services must go into the same category as the recipient’s LSC grant in the same proportion that LSC funds supported the activity (versus other funds) (45 CFR 1609.4)
- This regulation was changed in Section 533 of the 2010 Appropriations Act from a statutory prohibition (which had been implemented in the 1996 Appropriations Act Section 504(a))
- Accept reimbursement from clients for out-of-pocket expenses related to their case, if the client has agreed to pay ahead of time and in writing (45 CFR 1609.5(a))
- Represent eligible clients at the administrative level (45 CFR 1612.5(a))
- Initiate or participate in litigation challenging a governmental agency’s rules, regulations, policies, etc. (45 CFR 1612.5(b))
- Communication with an agency to receive information (45 CFR 1612.5(c)(2))
- Informing clients, other recipients, etc. about new or proposed statutes, executive orders, or administrative regulations. Note that legislation is not listed here (45 CFR 1612.5(c)(3)).
- Contact LSC to comment on its rules (45 CFR 1612.5(c)(4))
- Advise a client of his or her right to contact an elected official (45 CFR 1612.5(c)(6))
- Provide assistance to eligible aliens (45 CFR 1626.5; also lists criteria for eligibility), as well as specific categories of other aliens (45 CFR 1626.10 and 1626.11)
Board of Directors
LSC is headed by an 11-member Board of Directors appointed by the President and confirmed by the Senate. By law, the Board is bipartisan: no more than six members may be of the same political party. The current composition of the board is:
- Board Chair: John G. Levi
- Vice Chair: Martha Minow
- Members: Robert J. Grey Jr., Charles N.W. Keckler, Harry J.F. Korrell III, Victor B. Maddox, Laurie Mikva, Father Pius Pietrzyk, O.P., Julie A. Reiskin, and Gloria Valencia-Weber. Sharon L. Browne resigned from the board in December 2014.
The chairs of the LSC board throughout its history have included:
- Roger Conant Cramton
- Hillary Rodham
- F. William McCalpin
- William F. Harvey
- Robert Emmett McCarthy
- William C. Durant III
- George W. Wittgraf
- Douglas S. Eakeley
- Frank B. Strickland
By law, LSC's headquarters is located in Washington, D.C. In the 1970s and 1980s, LSC also had regional offices. LSC currently has one office in Washington D.C. that administers all of LSC's work. LSC itself does not provide legal representation to the poor.
- State Justice Institute, another government-established non-profit that awards grants to improve the justice system
- "Board of Directors Profiles". Legal Services Corporation. Retrieved 2008-02-03.
- "Office of the President". Legal Services Corporation. Retrieved 2008-02-03.
- "LSC Funding | LSC - Legal Services Corporation: America's Partner for Equal Justice". Legal Services Corporation. Retrieved 18 May 2013.
- Brock, David (1996). The Seduction of Hillary Rodham. The Free Press. ISBN 0-684-83451-0. pp. 96–97.
- "Corporation for the Poor". Time. 1975-07-28. Retrieved 2009-02-03.
- "Bipartisan Group in Congress Urges a Legal Services Corporation for the Poor" (fee required). The New York Times. 1971-03-18. Retrieved 2008-02-03.
- "LSC Act and Other Statutes". Legal Services Corporation. 1974-07-25. Retrieved 2008-02-02.
- "Jimmy Carter: Nominations Submitted to the Senate, Week Ending Friday, December 16th, 1977". American Presidency Project. Retrieved 2007-09-03.
- Hillary Rodham Clinton, Living History, Simon & Schuster, 2003, ISBN 0-7432-2224-5, pp. 77–78.
- Carl Bernstein, A Woman in Charge: The Life of Hillary Rodham Clinton, Knopf, ISBN 0-375-40766-9. pp. 132–133.
- "Jimmy Carter: Nominations Submitted to the Senate, Week Ending Friday, January 27th, 1978". American Presidency Project. Retrieved 2008-02-18.
- Brock, Seduction of Hillary Rodham, p. 98.
- Brock, Seduction of Hillary Rodham, p. 99–100.
- Brock, Seduction of Hillary Rodham, pp. 104–105.
- "Long Climb to Justice". Equal Justice Magazine (Legal Services Corporation). Fall 2004. Archived from the original on 2008-04-05. Retrieved 2008-03-10.
- "Hybrid Help". Time. 1980-04-21. Retrieved 2008-02-03.
- Bennett H. Beach (1981-11-23). "One More Narrow Escape". Time. Retrieved 2008-02-03.
- Jackson, David S.; Serrill, Michael S. (1983-10-03). "An Organization at War with Itself". Time. Retrieved 2008-02-03.
- "Jimmy Carter: Nominations Submitted to the Senate, Week Ending June 27th, 1980". American Presidency Project. Retrieved 2008-02-18.
- House Committee on Appropriations, Subcommittee on Departments of State, Justice, Commerce, the Judiciary, and Related Agencies Appropriations. U.S. House of Representatives. 1980. Rodham is still chair after having given birth "a few weeks ago"; Chelsea Clinton was born on February 27, 1980.
- "Hearings Before the Subcommittee on Courts, Civil Liberties, and the Administration of Justice, of the Committee of the Judiciary, House of Representatives". Background release, Legal Services Corporation, September 1980. U.S. House of Representatives. September 21–27, 1979. pp. 388–403, exact reference p. 398 shows McCalpin as chair in September 1980.
- Neil A. Lewis (1990-12-31). "Still No End to Turmoil at Legal Services". The New York Times. Retrieved 2008-02-19.
- "FMCCALPIN". Lewis Rice Attys. Retrieved 2008-02-19.
- Mary Thornton (1982-12-31). "July Memo Warned Legal Services Officials on Fees" (Fee required). The Washington Post. Retrieved 2008-03-08.
- Stuart Taylor Jr. (1981-05-14). "House Panel Rebuffs Reagan and Backs Keeping Legal Aid For Poor". The New York Times. Retrieved 2008-02-18.
- Stuart Taylor Jr. (1981-06-18). "House Action Near in Fight Over Legal Aid". The New York Times. Retrieved 2008-02-18.
- Stuart Taylor Jr. (1981-11-08). "Coast Lawyer Reported As Legal Aid Choice". The New York Times. Retrieved 2008-02-18.
- Irvin Molotsky (1982-01-01). "Reagan Chooses Lawyer as Chief of Legal Aid Agency for the Poor". The New York Times. Retrieved 2008-02-19.
- Brock, Seduction of Hillary Rodham, pp. 110–111.
- "Legal Services Chief Picked". The New York Times (United Press International). 1982-03-06. Retrieved 2008-01-23.
- Stuart Taylor Jr. (1982-12-09). "Reagan Withdraws 9 Nominees to Legal Unit". The New York Times. Retrieved 2008-03-08.
- "McCALPIN v. DURANT". United States Court of Appeals, District of Columbia Circuit. 1985-06-25. Archived from the original on August 4, 2009. Retrieved 2008-02-19.
- Stuart Taylor Jr. (1982-12-19). "Politics and Perks Revive Reagan Fight on Legal Aid". The New York Times. Retrieved 2008-03-08.
- Stuart Taylor Jr. (1983-09-21). "Ex-Legal Aid Officials Accused of Fund Abuse". The New York Times. Retrieved 2008-02-18.
- William Booth (1996-06-01). "Attacked as Left-Leaning, Legal Services Suffers Deep Cuts" (fee required). The Washington Post. Retrieved 2008-02-07.
- Documenting the Justice Gap in America: The Current Unmet Civil Legal Needs of Low-Income Americans, pages 4 and 9. Legal Services Corporation, September 2005.
- "FY 2007 Appropriation". Legal Services Corporation. Retrieved 2008-02-03.
- Sharyl Attkisson (July 28, 2009). "Legal Services Investigated for Waste". CBS News.
- Obama Proposes Legal Services Corp. Budget Increase - The BLT: The Blog of Legal Times
- LSC Regulations CFR 45 Part 1600 et. seq. | LSC - Legal Services Corporation: America's Partner for Equal Justice
- LSC Act | LSC - Legal Services Corporation: America's Partner for Equal Justice
- Legal Services Corporation, "2014 Annual Report."
- Legal Services Corporation, 2014, "By the Numbers: The Data Underlying Legal Aid Programs."
- Remarks by Hillary Rodham Clinton on 25th Anniversary of Legal Services Corporation
- Shepard, Kris "Rationing Justice: Poverty Lawyers and Poor People in the Deep South". BAton Rouge, LA.:Louisiana State University Press, 2009 ISBN 978-0-8071-3416-0 | <urn:uuid:6da91bdd-9d4b-443c-ae9a-dec71f99b760> | {
"date": "2016-07-30T17:35:10",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469258936356.77/warc/CC-MAIN-20160723072856-00326-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.93479984998703,
"score": 2.59375,
"token_count": 6760,
"url": "https://en.wikipedia.org/wiki/Legal_Services_Corporation"
} |
Net metering is a billing mechanism that credits solar array owners for the electricity they add to the grid. For example, if a residential customer has a PV system on the home’s rooftop, it may generate more electricity than the home uses during daylight hours. If the home is net-metered, the electricity meter will run backward to provide a credit against what electricity is consumed at night or other periods when the home’s electricity use exceeds the system’s output. Customers are only billed for their “net” energy use.
Investor-owned utilities (IOU) such as Alliant Energy and Mid-American Energy in Iowa are mandated by the Iowa Utilities Board to offer net metering. Rural Electric Co-Ops and Municipal utilities do not fall under the same IUB mandates so their policies vary from utility to utility. | <urn:uuid:80377fa0-243c-4df0-a1b0-a23b208cc3f4> | {
"date": "2019-01-19T23:29:07",
"dump": "CC-MAIN-2019-04",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583684033.26/warc/CC-MAIN-20190119221320-20190120003320-00616.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9204186201095581,
"score": 2.75,
"token_count": 173,
"url": "https://www.simpleray.com/resources-and-informations/net-metering"
} |
Elena Kagan’s confirmation hearings are underway in the Senate Judiciary Committee, a rite of passage for Supreme Court nominees. Right? Not so fast. There’s actually no constitutional or legal requirement that nominees to the Supreme Court testify before the Senate.
The Constitution merely states that the president “shall nominate, and by and with the Advice and Consent of the Senate, shall appoint . . . Judges of the Supreme Court.” The first confirmation hearings were held in 1925, a voluntary gesture by President Coolidge’s nominee, attorney Harlan Fiske Stone. Before then, nominees were often confirmed quickly, as quickly as the same day in the case of President Harding’s nominee in 1922, Sen. George Sutherland of Utah.
History and the debates of our Founders offer some sound reasons why any vetting of court nominees should become more limited and less political. Senators should consider nominees for their general fitness for the court, not pressure them for ideological confessions.
Last week, nearly 11,000 of Kagan’s e-mails were made public as part of an unprecedented release of nominee records, and for months both parties have been scouring her past to get ready for this week’s hearings. Still, no real surprises are expected. Republican senators want to corner Kagan as a liberal wishing to make law from the bench, while Democratic senators will portray Kagan as a consensus builder and an “empathic” counterweight to the conservative block on the court. Still, the show must go on.
Elena Kagan is the first nominee since William Rehnquist, nominated in 1971, who has never served as a judge. The resulting lack of judicial opinions by Kagan makes it even more difficult for those trying to ascertain her ideology, so there are calls for Kagan to answer questions about her opinions on issues likely to come before the court. The Founding Fathers did not think this wise.
In his Virginia Plan, the basis for debates at the Constitutional Convention of 1787, James Madison proposed that Congress be given the power to write laws, but that then a joint “council of revision,” made up from the executive and the judicial branches, be allowed to review the laws. Many delegates supported the idea out of fear that without the support of the judicial branch the president would not have the “firmness” to stand against attempts by Congress to expand its power.
[poll id=”28″]While Madison’s proposal was not accepted, the council of revision debates reveal why many of the Founders thought judges should not be asked about legal issues not yet formally presented for review in court. John Rutledge, later a Supreme Court justice himself, expressed the view that members of the judiciary should never be asked “to give their opinion on a law till it comes before them.” He, like other delegates, argued that any involvement in lawmaking or any pronouncement of prior opinions could jeopardize a judge’s ability to evaluate an issue fairly when it was brought before his court.
The Constitution gives the president the power to nominate judges for the Supreme Court. A majority Senate vote is required to confirm the nominee. The president can nominate whomever he chooses, and historically many have chosen friends and confidants.
With the expanding influence of the court in everyday life since the early 1900s — from social issues to credit card regulation — presidents have increasingly selected nominees reflecting their own views on the role of government. More recently they have selected nominees who can simply be confirmed.
Today’s elaborate, partisan confirmation hearings make a nominee’s fate more a test of presidential power than an opportunity to send the best candidate to our highest court. Alexander Hamilton’s assurances in the Federalist Papers that only the most highly qualified individuals would serve as federal judges are increasingly in jeopardy.
Agreeing upon a definition of “highly qualified” for the Supreme Court would be difficult for members of the highly partisan Senate, but even that debate would prove more fruitful than trying to read a nominee’s ideological tea leaves. (The American Bar Association evaluates nominees, and it deemed Kagan “highly qualified.”)
During his 2005 confirmation hearings, Chief Justice John Roberts avoided any specific opinions and instead gave his conciliatory “umpire speech” about justices needing to leave their ideologies out of decisions. Yet he has issued some surprisingly activist opinions.
Combine the Senate’s weak record of drawing any substantive ideological matter from nominees with the concerns of prejudice raised by the Founders, and we can see what’s wrong with Kagan’s confirmation hearings before they start.
Kagan herself has said that confirmation hearings should be more straightforward. They should be — but by developing the record of a nominee’s character and legal acumen, rather than by chasing ideological clues and highlighting political postures.
Kathleen Gronnerud is a writer/historian specializing in the Constitutional Convention and the presidency who writes for the History News Service. E-mail: [email protected].
Republished with permission from the History News Network. | <urn:uuid:c2037a6b-eec0-4f8a-b186-bbb0de7c4ea4> | {
"date": "2015-04-19T14:19:18",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246639121.73/warc/CC-MAIN-20150417045719-00103-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9586971998214722,
"score": 2.671875,
"token_count": 1061,
"url": "http://www.laprogressive.com/wrong-kagans-confirmation-hearings/"
} |
Elizabeth Renter/Activist Post
It’s super cheap—cheaper than sugar—and that means processed food manufacturers can load up on it, sweetening their goodies at rock-bottom prices and further driving our waistlines out. It’s high fructose corn syrup (HFCS) and it’s found in some pretty surprising places. In fact, the foods with high fructose corn syrup may be foods you eat every single day.
While this Huffington Post article on the hidden presence of HFCS says “the jury is still out” on whether it’s dangerous or any more dangerous than sugar, we know differently. This cheap sweetener has been linked to obesity, learning ability and memory, and high blood pressure, to name a few health issues. As if that isn’t enough, it has also been shown to contain toxic mercury.
So, while some would have you believe HFCS is no more dangerous than white sugar (as if that isn’t bad enough), we know differently.
Big money is made in the corn industry—big, big money—and therefore big money is spent counteracting every study and inkling that suggests any product of the industry is less than great for you (HFCS included). Of course consumers are increasingly realizing that HFCS and foods with high fructose corn syrup can be health-damaging, so manufacturers decided to change things up.
As the morbid health effects of high fructose corn syrup continue to be brought to the forefront of the media, the Corn Refiners Association has decided in the past to give their cheap product a new name – corn sugar.
Staying informed on the latest research and watching your foods like a hawk can help keep you and your family safe.
Foods with High Fructose Corn Syrup
Here are some foods with high fructose corn syrup that you may have never expected to contain the ingredients – foods you may be eating every day. | <urn:uuid:a96b3fdc-367c-4c3b-b4ba-8327bce0ea5e> | {
"date": "2014-04-23T09:11:31",
"dump": "CC-MAIN-2014-15",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223202457.0/warc/CC-MAIN-20140423032002-00147-ip-10-147-4-33.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.953061044216156,
"score": 2.71875,
"token_count": 401,
"url": "http://truthisscary.com/2012/09/top-10-foods-that-contain-high-fructose-corn-syrup/"
} |
The Internet is fundamentally changing how we practice some of our most basic everyday activities, and challenging how we perceive and use architectural space. Yet the nature of these information-driven changes and their desirability for architecture and society is hotly contested. This course provides a basic orientation to these fundamental changes and the implications of new Internet-based concepts, such as online identity, personalization, open source, peer-to-peer networks, virtual communities, cyberspace, on the architecture of buildings and vice versa. It explores the possibility of a new architecture that converges the physical and virtual by focusing on two tightly interconnected topics: (1) information architecture: the application of architectural concepts like spatial configuration, proportional systems, circulation, scale and texture to the design of virtual space, and (2) architecture as interface: examining the possibility of physical architecture and architectural elements, such as walls, ceilings, floors, doors and furniture to act as elements of connectivity and mediate between the virtual world and everyday physical activity. The seminar consists of lectures, discussions, software workshop, demos, and a final project in which new designs of physical/virtual architecture will be developed and prototyped. | <urn:uuid:19fc4ff3-0323-4313-9e07-1abf2e88298a> | {
"date": "2017-12-14T15:03:45",
"dump": "CC-MAIN-2017-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948544677.45/warc/CC-MAIN-20171214144324-20171214164324-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9166539311408997,
"score": 2.546875,
"token_count": 235,
"url": "https://www.gsd.harvard.edu/course/internet-and-architecture-fall-2005/"
} |
So here we are again, to continue what we dared to begin: challenging Machine Learning.
Before we move on, let’s spend a minute to look back on the last post. You now know what Machine Learning is, it’s something that contains a Model, some (Features, Labels) as inputs (remember we needed many Dog’s images?) and some Activations as outputs (Dog or Not a Dog). You also know what exactly Learning means. It’s the process of Trial-and-Error repeatedly. Trial makes big mistakes in the first time, but help the computer (as well as human’s brain) to learn faster, to become more confident on the next time.
Learning is doing something repeatedly, guys. So don’t be ashamed to do some revision until you’re ready to move on. You can find the last tutorial here: What is Machine Learning?
So, let’s get down to business. I’ll make it easy for you today. It means today’s post won’t be such long as the previous one. Even Cristiano Ronaldo needs some recovery-day, right?
Types of Machine Learning
What I want to talk to you today, is about types of Learning. So why the hell must we know about it. So imagine you’re trying to learn piano in a mathematical way, it means that you treat those beautifully composed repertoires as some kind of, let’s say those annoying matrices you saw yesterday. You’ll soon realize it doesn’t make any sense, logically. And even if you can play through it, but actually you just can’t get it (if you’re listening to classical music, then you will know what I mean). So we have to admit that, different things require different learning approaches. If you choose an inappropriate way of learning, then it’ll likely result in some unpleasant tragic.
Sounds like a headache here, right? But don’t worry, it’s not that complicated in the case of Machine Learning. Above I told you that you won’t be able to get progressed in learning piano with some mathematical approach. In the case of Machine Learning, piano repertoires can be treated as Inputs. So different Input types do require different approach of learning. It does make some sense, right? So, based on Input types, we can divide Machine Learning into three categories like below:
- Supervised Learning
- Unsupervised Learning
- Reinforcement Learning
First, as you may know (in fact I think you don’t even care), that I’m currently living in Japan (I’m not Japanese, though). When I tried to learn some Machine Learning’s vocabularies in Japanese, I discovered some couple of interesting things. One of those is Supervised Learning term. Why am I telling you this? Because I think it may help you understand this term easily. They call it “Learning with a teacher” in Japanese. Does it make some sense to you? When your parents sat by your side and taught you each picture was about, they acted just like you teachers. When you tried to learn for you SAT or GMAT, it was not you who learned by yourselves! Where did you get those vocabularies from? From your teachers? From you instruction books? Doesn’t matter, at least you learned from some sources. Or I can say, you were learning under the supervision of something. It means you knew what were right and what were wrong at the time you were learning. Everything is exactly the same in Machine Learning, Supervised Learning indicates that the computer knows whether it made a right guess or not, using the Label along with each Feature. Remember the Dog Recognition example on the previous post? Yep, it used the Labels to evaluate its work. So, whenever you see a Machine Learning problem where Labels provided along with Features, that’s definitely Supervised Learning.
Obviously, Unsupervised Learning is the opposite of Supervised Learning. It means that you will be given a mess of Features without any Labels on them. So it doesn’t make any sense here, you may suppose. How can the computer actually learn without knowing whether it’s doing right? A picture is worth of thousand words. Let me show you:
As you can see in the picture above. We have two set of points (just ignore the axises’ names, I just want you to focus on the points). Some are red, and some are blue. And it’s obvious that we can draw a line between them, let’s say the green one. As you might get, it’s exactly an another example of Supervised Learning, where the Labels are Red & Blue. (For ones who find it hard to understand. Just imagine the Red points are images of “Dog”, and the Blue ones are images of “Not a Dog”. But don’t worry, I’ll make it more concrete when we come to Logistic Regression!) So, what about this one:
I just simply made them all Blue! So what’s the computer supposed to do now? As you could see from the previous example, the Labels may help in the learning process, but they’re not something which we can’t live without. It’s the distribution of Features which matters! For example, the computer may not see the “Dog” label (or the “Not a Dog” label, either), but it can put things with four-leg features, black-nose features, long-tail features, long-tongue features in the same group. So in the end, we can have the same result with what we got from Supervised Learning. (Of course, actually it can’t be always the same! Imagine that the computer will also have a group for things with two-leg features, two-swing features (for birds’ images); a group for things with no-leg features, long-tongue features (for snakes’ images) and so on. That’s because Unsupervised Learning is not limited by the Input Labels, so the result may vary depending on how the computer learns)
It may be too long to write all about these two types of Learning. Actually in this tutorial, I will mainly focus on Supervised Learning because it’s very common, not only on research but also in real life projects. And via Supervised Learning you will understand the algorithms much faster, much deeper without hurting your enthuasiasm.
To be honest, I rarely talk about something I don’t know much about. Actually at the time of writing, I’m just in the beginning of my research on Reinforcement Learning. So for the sake of simplicity, Reinforcement Learning is the learning through the interaction with Environment. Supervised Learning and Unsupervised Learning are not. Why are they not? Remember the way they actually learn? We give them a set of Input for them to learn from. And they use what they learned from that Input to make predictions (another way of saying “Guess”, I guess). So the way they predict depends entirely on the Input they learn from. We may see the disadvantage here, right? So Reinforcement Learning appears as a solution to eliminate that disadvantage. You can simply think that the computers will actually learn from dynamic Input, it makes them much more robust, precise and confident. But the trade off, that kind of learning is very complicated, especially for Machine Learning’s newcomers. So just put it in the list, OK?
So, now you know about three main types of Machine Learning (there’s a lot out there but you only need to focus on these three, I think). I hope after this post, you can have a (slightly) deeper thought about Machine Learning. In the next post, I’ll talk about Linear Regression, the most common and basic algorithm (let’s say for almost advanced algorithms). And we’ll finally get our hands dirty with some coding (sounds cool?). So stay updated, and I’ll see you there. See ya! | <urn:uuid:23140b67-4e06-4826-9a01-1911d11f5032> | {
"date": "2017-07-26T08:29:34",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426086.44/warc/CC-MAIN-20170726082204-20170726102204-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9530209898948669,
"score": 2.609375,
"token_count": 1740,
"url": "https://chunml.github.io/ChunML.github.io/tutorial/Types-Of-Learning/"
} |
U.S. Naval Base Guantanamo Bay Pier C Replacement
The U.S. Naval Base in Guantanamo Bay is the oldest overseas military installation. Located on the southeast corner of Cuba, the base is approximately 400 miles from Miami. The U.S. Navy planned to demolish Pier C, a fuel pier and access ramp constructed in 1929, and replace it with a new single-deck fuel pier, ramp, and independent mooring structures. The project also included planned improvements to the causeway and roadway.
S&ME provided a geotechnical exploration of the Pier C site. A truck-mounted CME-55 drill rig conducted soil test borings. Five additional borings occurred over water by mounting the rig on a Navy YC barge. This proved quite an engineering challenge. To reach depths of 120 ft. below the water line, the team utilized mud-rotary drilling techniques. The team also performed split-spoon sampling with standard penetration testing in general accordance with ASTM D 1586. In addition, S&ME collected two undisturbed Shelby-tube samples in general accordance with ASTM D 1587.
- Geotechnical exploration and testing of naval base pier
- Geotechnical recommendations on earthwork, seismic, foundations and pavement | <urn:uuid:f548cdd2-e169-4373-a1dd-2c04a275f7a0> | {
"date": "2018-09-26T06:54:39",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163704.93/warc/CC-MAIN-20180926061824-20180926082224-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9129003286361694,
"score": 2.65625,
"token_count": 263,
"url": "http://www.smeinc.com/projects/transportation/u-s-naval-base-guantanamo-bay-pier-charlie-replacement/"
} |
We hear so much about calories when it comes to our body weight and how much food we should have. The importance of calories is underscored by the amount being prominently displayed just under the serving size at the top of the Nutrition Facts label on food packages.
Simply put, a calorie is a unit of measure of energy. Purely scientifically, a calorie is the amount of energy it takes to raise one cubic centimeter (think of a little box with half-inch sides all around) of water one degree Celsius.
Why we need calories
Our bodies are essentially an internal combustion engine. The greatest majority of our calorie needs come from just being alive, otherwise known as our basal metabolism. Remember, we are warm blooded, and need calories to keep our bodies at a normal temperature of about 98.6° F, for our hearts to pump blood and for our lungs to breathe.
Two more reasons we need calories
The second is called the Specific Dynamic Effect (SDE) of food or the calories needed to digest the foods that we eat. Yes, we do burn some calories just by eating!
The third component of our calorie needs depends upon how much physical activity we get and how regular that activity is. I say regular because a person who is physically active on a regular basis usually has more lean muscle mass than someone of the same height and age that is not regularly active.
Lean muscle mass is more metabolically active (needs more calories) than fat mass. This is one of the reasons it is so important to be physically active, it gives us a body that needs more calories to maintain body weight than that same body would if it were not physically active. The ability to consume more calories gives us the opportunity to get more health benefit and enjoyment from foods.
I really want to make a point here regarding burning calories and physical activity. Yes, you can walk longer and harder to ‘burn’ off that dessert you just ate with your meal. But, I believe we’ve got this calorie burning stuff all backwards when we look at it on an individual food (or indulgence) basis.
The exercise and weight loss industry provides educational tools and products that will measure how many calories we need to ‘burn’ or what we need to do for exercise and for how long to equal the calories contained in particular foods and beverages that we have just recently consumed. It is a way to entice us to use those products. We somehow need an immediate result for our efforts. The way to think about it holistically is a body that is exercising regularly has a composition that consists of more lean muscle mass to fat mass and this body is more metabolically active, thus requiring more calories from food. Pretty good news, if you like food.
Back to the calories from foods… The table below shows how many calories are provided by each macronutrient per gram (1 gram = 1/5 of a teaspoon), what is recommended for a percent of calories each day from each macronutrient and an 1,800 calorie per day example broken down by the calories needed from the macronutrients.
Carbohydrate455 percent calories from carbohydrates990 calories each day
|Macronutrient||Calories per gram||Percent of calories each day||1,800 cal/day example|
|Protein||4||20 percent calories from proteins||360 calories each day|
|Fat||9||25 percent calories from fats||450 calories each day|
To find out your daily calorie needs, the amount of each food group you need each day, and to receive a customized food guide, go to MyPyramid Plan. Have fun! Next week we’ll get the whole truth about simple, then complex carbohydrates.
About our Nutrition Expert
Lori Kaley MS, RD, LD, MSB is a member of the Guiding Stars Scientific Advisory Panel. Lori has 30 years of combined experience working in healthcare and public health creating policies and environments to help families and children have access to healthy foods and beverages. She is currently Policy Associate at the University of Southern Maine’s Muskie School of Public Service.
Lori’s greatest achievement and joy has been in raising her three daughters to be healthy and productive young adults, each with their own particular love of food, cooking and being physically active. Lori’s passion for nutritional community outreach has been a cornerstone of the Guiding Stars Scientific Advisory Panel. Lori regularly contributes to the Guiding Stars blog. | <urn:uuid:d7afe435-55d0-4f27-9850-5e7c9c36ebfc> | {
"date": "2016-09-30T05:07:54",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662022.71/warc/CC-MAIN-20160924173742-00182-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9386761784553528,
"score": 3.296875,
"token_count": 917,
"url": "https://guidingstars.com/nutrition-science/what-the-heck-is-a-calorie/"
} |
The importance of soil health was recently emphasized by Robert Kremer in his presentation to the Cover Crop Research Symposium in Columbia, Missouri. During a day long seminar devoted to cover crops and the No Till methods of Agriculture, the importance of the subsurface ecosystem for plant health and crop yields was highlighted.
This USDA Soil Food Web graphic shows the importance of microbes in the soil.
Soil microbes provide numerous benefits to plants. These include suppression of pathogenic bacteria and fungi, and absorption of nutrients. If your soil is in poor condition as a result of chemical farming, or industrial agriculture, in addition to increasing organic matter, you may want to consider giving your soil a boost by adding local indigenous microbes. The recipe for creating a brew of your own batch of microbes is given below and is a chance to introduce you, and if you have them, your kids to the subject of microbiology.
Soil amendments are often peddled as a magic bullet. When it comes to building soil thee are no shortcuts. In order to increase the organic content of the soil, the research presented at the Cover Crop Symposium indicates that it takes 10 years to increase organic matter by one percent. A test of compost tea, soil microbes, and a control plot showed no difference in productivity as detailed in an research paper in the February, 2009 issue of HortScience Journal but there was no testing of nutrient values after harvest. A soil scientist that I spoke with at the conference suggested that just spraying the soil with a molasses solution, which provides and excellent food for soil microbes, would probably produce the same results. There is a possibility that local, indigenous, soil microbes might be of more benefit than commercially viable microbe preparations. Here is a recipe we tested at the Creek House Norganic Community Garden in Kansas City.
Make Your Own Soil Microbe Mix!
- Molasses - unsulphered – (Our tests of every brand we could get our hands on found that Plantation Blackstrap brand produced the most active cultures) For bulk orders contact Organic Fertilizers Inc.
- Water - filtered or distilled
- Dirt from undisturbed pasture, bottom land, prairie, Harvested every six inches from a 3 foot deep hole.
- When soil temperature reaches 60 degrees or more, using post a hole digger make a hole 3 feet deep, taking a dirt sample every six inches.
- Clean Gallon Jug with Hot Water and Soap, Rinse well.
- Add 2 cups hot to the touch water.
- Add 2-1/2 oz molasses - = 2-1/2 shot glasses - this yields an approximate 2% solution.
- Fill the bottle ½ full with cool non chlorinated water.
- Mix the soil samples, add 1 cup dirt to the bottle, shake, then fill bottle with water 2 inch below neck.
- Wait until foaming stops - about 2 weeks at 90 F, or pH = 3.5 - 4.0 (pH test papers widely available)
Using Homemade Soil Microbe Mix
One part Microbe Mix to 20 parts water. Use as foilar spray, on new and established seed beds
The photo shows typical leaf sizes from our test of local, indigenous microbes on 100 foot row of sweet potatoes. After brewing as described, the microbe mix was applied without dilution using 4 gallons on half the row. The other half of the row was not treated. No other fertilizers or soil amendments were applied. The treated side of the row produced larger leaves.
Sustainable Agriculture Research and Education Cover Crop Symposium
Application of Two Microbial Teas Did Not Affect Collard or Spinach Yield | <urn:uuid:89d18ad4-7934-44ed-9497-b6cb1ce8cdb9> | {
"date": "2014-11-25T01:10:32",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416405325961.18/warc/CC-MAIN-20141119135525-00024-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9164040684700012,
"score": 3.328125,
"token_count": 757,
"url": "http://www.motherearthnews.com/organic-gardening/probioticsfor-the-soilbrew-your-own-local-indigenous-microbes-zbcz1402.aspx"
} |
More than 90 percent of older adults diagnosed with mild Alzheimer’s would be re-diagnosed as having the less serious condition of mild cognitive impairment, according to a study that looks at newly revised diagnosis criteria.
The new criteria for diagnosing mild Alzheimer’s were issued last year by experts with the National Institute on Aging and the Alzheimer’s Association.
John C. Morris, M.D., director of the Knight Alzheimer’s Disease Research Center at Washington University in St. Louis, decided to look at how the new criteria would affect those diagnosed under the older criteria.
He studied the neurological evaluations of 17,535 adults — average age about 75 — who were diagnosed as having normal cognition, mild cognitive impairment or Alzheimer’s disease.
He found that that 99.8% of the people currently diagnosed with very mild Alzheimer’s disease and 92.7% of people currently diagnosed with mild Alzheimer’s disease could be reclassified as having mild cognitive impairment under the new guidelines.
So what difference does a new diagnosis make?
A lot, Morris contends.
Without the new criteria, there is too much overlap between people with mild cognitive impairment (MCI), who are simply having trouble performing some daily tasks, and those with early stage Alzheimer’s with mild dementia. Deciding whether a person is diagnosed with MCI or Alzheimer’s is often “artificial and arbitrary,” Morris writes in the current issue of the journal Archives of Neurology.
The result has been that people with MCI are unnecessarily prescribed drugs that are more appropriate for people with Alzheimer’s because doctors “often do not distinguish the two conditions when faced with issues of medical management,” Morris says.
The new criteria, writes Morris, allows for better patient care and a better way for doctors to categorize mild cognitive problems from early-stage Alzheimer’s. | <urn:uuid:43eaa01a-34a7-4597-80ef-1fafe21a6d38> | {
"date": "2016-05-04T11:44:29",
"dump": "CC-MAIN-2016-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860123023.37/warc/CC-MAIN-20160428161523-00070-ip-10-239-7-51.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.954980194568634,
"score": 2.828125,
"token_count": 392,
"url": "http://blog.aarp.org/2012/02/08/is-it-mild-cognitive-impairment-or-alzheimers/print"
} |
Species / Location
Lahontan cutthroat trout (LCT), Oncohrhynchus clarki henshawi, is one of three trout subspecies (the other two are Eagle Lake rainbow trout and Paiute cutthroat trout) endethemic to the east side of the Sierra Nevada (Figure 1). This species’ range extends from northeastern California and northern Nevada into southern Oregon. Now listed as federally threatened, LCT populations have declined and work is underway to conserve the species.
An out-of-basin population of LCT is known to inhabit Austin Meadows Creek in Nevada County (Figure 2). The source of these fish was from Macklin Creek, Nevada County, from which trout had been collected and stocked into Austin Meadows Creek in 1970 and 1971. Because the Macklin Creek LCT population is considered to be a genetically pure strain from the Truckee River System, biologists consider the LCT in Austin Meadows Creek to be important for the conservation of the species.
Need for Drought Stressor Monitoring
Austin Meadow Creek is a very small creek that provides approximately 1.3 miles of habitat for LCT and is isolated from other fishes by barrier waterfalls. During the recent drought, California Department of Fish and Wildlife (CDFW) staff monitored conditions of the LCT population and were concerned that there was potential for this very small creek to go dry, imperiling the continued existence of Truckee River strain of LCT.
Figure 3. Austin Meadow Creek on October 20, 2015. Photo: John Hanson, CDFW.
Figure 4. Austin Meadow Creek on October 20, 2015. Photo: John Hanson, CDFW.
Figure 5. Austin Meadow Creek on October 20, 2015. Photo: John Hanson, CDFW.
Beginning in July 2015, CDFW conducted four monthly surveys of Austin Meadow Creek to understand conditions for the LCT population. During these surveys, water quality and quantity were measured and LCT were counted. In September, the crew located a non-permitted water pump that was depleting the already critically low flows of the creek, and CDFW took protective action for the LCT.
Monthly survey information is as follows:
The first survey occurred on July 13, 2015, and CDFW documented that flow was continuous throughout the entire stream. A total of 81 juvenile (less than six inches in length) LCT and five adult LCT were observed. Water temperature ranged from 54º to 64º F.
The second survey occurred on August 11, 2015. CDFW observed that the stream was becoming intermittent in the section that drains through the meadow. A total of 49 juvenile and three adult LCT were recorded. Water temperatures were slightly warmer, ranging from 57 to 67º F.
A third survey occurred on September 24, 2015. At that time, Austin Meadows Creek had dried to six isolated pools that contained approximately 50 juvenile and two adult (both greater than 14 inches in length) LCT. Approximately 20 LCT were observed in one large pool directly below the culvert of the upper road crossing. Although stream flow into the pool was documented, CDFW noticed that approximately 50 feet downstream of this location, the stream went dry with only isolated pools remaining. Additionally, the crew identified a non-permitted pump which had been withdrawing a significant amount of water from a pool, putting the survival of the LCT at risk. Further investigation with other agencies and operators identified the source of the diversion, and CDFW took actions to rectify the situation. This action restored water flow in this section of stream, providing enough habitat for LCT survival. CDFW reported that water temperature maintained at 60º F.
The fourth trip occurred on October 20, 2015. By this time, the crew confirmed that the water withdrawal was no longer occurring and that flow had returned to the upper meadow, increasing the amount of habitat for LCT. Although the majority of the stream within the meadow was dry, flow had returned to the upper part of the meadow and was continuous from that point to the upper road crossing (Figures 3-5). LCT were observed but numbers were lower (42 juvenile and two adult LCT) than that recorded during earlier surveys. Flow returned to the upper part of the meadow and was continuous from that point to the upper road crossing. Water temperature decreased to 41º F.
Monitoring status and trend of sensitive trout populations and habitat is a critical tool for our evaluation of the health of the population so that conservation actions can be implemented. Monitoring this past year resulted in cessation of the water withdrawal, increasing the amount of habitat available to the LCT during the driest part of the year. Without this drought monitoring effort, the non-permitted water withdrawal may not have been discovered and stopped. Other key information gained is that while the Austin Meadow Creek population is very small, it appears that it can persist in under drought conditions as long as the stream does not completely dry. As part of both localized and statewide efforts to maintain LCT populations within California, it is CDFW’s vision that the monitoring effort at Austin Meadow Creek be continued during and long after the drought. | <urn:uuid:015f240b-2857-4f88-9af2-04419323537b> | {
"date": "2018-12-11T23:02:29",
"dump": "CC-MAIN-2018-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823705.4/warc/CC-MAIN-20181211215732-20181212001232-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9739795923233032,
"score": 3.15625,
"token_count": 1057,
"url": "https://www.wildlife.ca.gov/Drought/Projects/Austin-Meadow-Creek"
} |
HiFocus SlimJ is a straight electrode of small diameter. Such electrode build facilitates preservation of functional hearing and inner ear structures during its insertion. Use of such electrode in combination with a minimally traumatic insertion method through the round window developed by H. Skarżyński, made it possible to extend the criteria of qualification for cochlear implant to patients with partial deafness, which means people with good, or slightly weakened hearing in low frequencies and significant hearing loss in high frequency range. Using the H. Skarżyński method, insertion of an electrode into a cochlea does not damage its normally functioning segments.
Skarżynski’s method, so called ‘Round Window Approach’, is the topic of the training course ‘Window Approach Workshop WAW’, organized in Kajetany since 10 years ago, with participation of ear surgeons from the whole world. The first in CEE cochlear implantation with the HiFocus SlimJ electrode was one of eight demonstration surgeries performed on 24 Oct. in the World Hearing Center during the WAW workshop. It has been observed by 18 workshop participants – surgeons from the Czech Republic, Italy, Belgium, United Kingdom, Bulgaria, Romania and Russia, as well as several doctors and residents from the Institute. | <urn:uuid:9017ff7c-acd1-4204-b5ae-4f9e5e6cdf17> | {
"date": "2019-04-26T13:49:28",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578806528.96/warc/CC-MAIN-20190426133444-20190426155444-00176.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9471809267997742,
"score": 2.59375,
"token_count": 270,
"url": "http://henrykskarzynski.pl/en/news/the-first-in-central-and-easter-europe-cochlear-implantation-using-hires-ultra-device-with-new-hifocus-slimj-straight-thin-electrode.html"
} |
Game of Life board game involves players choosing a career and making wise financial moves as they navigate the game board towards retirement.
Monopoly board game (and now, app!) was invented in the 1930s and is still teaching players basic money management and cash flow principles as they move around the board, buying and developing real estate.
Payday board game teaches players how to manage monthly income and expenditure, including how to handle loan payments, cash windfalls, and other budgeting basics.
Cashflow 101 board game by Robert T. Kiyosaki, creator of ‘Rich Dad, Poor Dad’ is aimed at those aged 14+. Players discover the fundamentals of personal finance, and how to make wise investing and real estate decisions.
Charge Large board game teaches sensible use of credit as players navigate the board and build wealth.
Acquire is a board game where players place tiles on the board, strategically creating corporations and mergers. When corporations merge, players holding stock in the acquired company can cash out their stocks or receive stocks in the take-over company. The game ends when the market (board) is full, and the winner is the player with the strongest portfolio of stock and cash. | <urn:uuid:ffaa2d2c-f81a-4915-b361-cffd1e396d8b> | {
"date": "2018-08-17T05:45:29",
"dump": "CC-MAIN-2018-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211719.12/warc/CC-MAIN-20180817045508-20180817065508-00616.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9748963713645935,
"score": 2.578125,
"token_count": 244,
"url": "https://www.kidsfinancialeducation.com/resources/board-games/"
} |
(topic: Symmetry) - In his passion for symmetry, Dr. Marbles has created Symmetria, a harmonious cyberplace where everything is made symmetrical by a symmetrizer. Hacker steals the machine and reprograms it so that he can undo symmetry. The kids must master the properties of symmetry before Hacker destroys beauty, balance and harmony throughout all of cyberspace! The Big Idea: Symmetries are patterns you can find hidden within many objects that create balance, order, and a pleasing regularity in the world around us.
Visit the Website: http://pbskids.org/cyberchase
Episode #110 / Length: 28 minutes | <urn:uuid:1af942a0-53c3-4205-b039-6c59464bed59> | {
"date": "2017-02-23T03:15:50",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00280-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9178524017333984,
"score": 2.890625,
"token_count": 142,
"url": "http://www.klru.org/schedule/episode/188342/"
} |
PennLive today publishes a story that peels away the layers of high school sports, uncovering beneath the veneer of wholesome competition and athleticism, a troubling tolerance for racial intimidation.
Racial taunts and slurs, say many black student athletes and coaches, are often an accepted part of playing sports.
In the wake of this report, PennLive will continue to strive to foster inclusion and understanding on any sports field marred by racial insensitivity.
No one expects racism to be eradicated with one conversation or one interaction, but even an initial coming together of groups and individuals who find themselves divided by racial tension can go a long way to fostering understanding and change behavior.
That, says Shannon Powers, of the Pennsylvania Human Relations Commission, is the guiding principle behind a slew of initiatives with community partners, including schools and law enforcement, aimed at addressing racial incidents and tension among school communities.
“Virtually everyone who works in this field finds that interaction and listening to each other’s perspectives is one of the most important things in helping to foster understanding,” Powers says.
The lack of a dialogue -- and of a coming together -- exacerbates stereotypes and negative opinions among individuals and groups torn apart by racial tension, she said.
“Creating that opportunity for dialogue and interaction is very important,” Powers said. “Having those difficult conversations about differences, and listening to one another so you don’t automatically lead to conclusions that someone is a certain way because of how they look. To be willing to have the difficult conversation and be willing to listen just is a huge step in the right direction.”
The commission every year investigates complaints from within school communities of racial incidents and harassment, which under law, are forms of racial discrimination. The initial complaint can be brought by an athlete, a parent or member of the school.
Under the Human Relations Law, Powers points out, schools are responsible for providing an atmosphere that is free of racial harassment or discrimination.
The commission every year offers training to schools to help educators and students address issues concerning race matters. This includes racial incidents and taunts at high school sports venues.
Partners include the Pennsylvania Interagency Task Force on Community Relations and Activities, State Police, the Department of Education, the state Attorney General’s office and the Department of Justice. | <urn:uuid:4550208f-17f7-416a-be95-beedd663f917> | {
"date": "2016-08-24T19:54:39",
"dump": "CC-MAIN-2016-36",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292608.25/warc/CC-MAIN-20160823195812-00182-ip-10-153-172-175.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9435456991195679,
"score": 2.625,
"token_count": 479,
"url": "http://www.pennlive.com/midstate/index.ssf/2014/05/high_school_sports_racism_solu.html"
} |
The Bystander Effect is the phenomoneon that the more people present, the less likely they are to help a person in distress.
Experiments by Bibb Latane and John Darley show this effect. Their experiments had three situations a subject was put into: alone in a room, room with two other participants, or a room with two people aware of the study. In each room, smoke began to fill the room. Their results were that 75% of participants reported the smoke when they were alone in a room. 38% of subjects who were in a room wth two other subjects reported the smoke. 10% of participants in the room with two others (aware of the study) reported the smoke (two others ignored the smoke). This experiment shows the Bystander Effect that people are less likely to report a distressful situation if they are in the presence of others.
Two theories try to explain the Bystander Effect. First, diffusion of responsibility. When there are other people present, individuals feel less pressue to react. Next, people don't react when in the presence of others because they feel it is socially inappropriate. If others don't take action, individuals feel it is not necessary to take action because no one else before them did.
The Bystander Effect is an aspect of social conformity. Specifically, it relates to the phenomoneon that people are less likely to take action to a distressful situation if they are in the presence of others. This effect was proven by Latane and Darley when they performed experiements that showed the above results. Lastly, this effect is caused by diffusion of responisibility and social norms.
Below is a vido clip that further illustrates the Bystander Effect | <urn:uuid:d99efa22-115f-4fae-bf97-df499792b81f> | {
"date": "2014-10-30T18:47:07",
"dump": "CC-MAIN-2014-42",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637898644.9/warc/CC-MAIN-20141030025818-00153-ip-10-16-133-185.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9672631025314331,
"score": 3.890625,
"token_count": 355,
"url": "http://blog.lib.umn.edu/paldr001/myblog/2011/12/the-bystander-effect.html"
} |
Building an Application
In these chapters, we will discuss the basic concepts of GStreamer and the most-used objects, such as elements, pads and buffers. We will use a visual representation of these objects so that we can visualize the more complex pipelines you will learn to build later on. You will get a first glance at the GStreamer API, which should be enough for building elementary applications. Later on in this part, you will also learn to build a basic command-line application.
Note that this part will give a look into the low-level API and concepts of GStreamer. Once you're going to build applications, you might want to use higher-level APIs. Those will be discussed later on in this manual.
The results of the search are | <urn:uuid:fd165daf-a25c-4ca1-8f3c-42af16236e71> | {
"date": "2019-08-24T11:10:36",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027320734.85/warc/CC-MAIN-20190824105853-20190824131853-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.945026695728302,
"score": 2.71875,
"token_count": 154,
"url": "https://gstreamer.freedesktop.org/documentation/application-development/basics/index.html"
} |
Introducing natural and non-chemical safety against frequent backyard pests like aphids and grasshoppers is the best solution to keep your backyard alive and effectively. As a substitute of using dangerous chemical and caustic, unnatural strategies, opt for approaches like physical removing of pests, erecting fences, nets, or protecting boundaries, or botanical pesticides. Use natural weed killers. Weed killers commonly contain poisonous and noxious chemical compounds. These can get into the soil and contaminate your groundwater. An incredible and low cost various to the cruel chemicals is to use vinegar. On a sunny day, spray cider vinegar onto any weeds you have got. They are going to soon die with out hurting the environment.
Domesticate your soil to enhance the quality of your soil. Whenever you cultivate, or till, your soil, you loosen up parts that could be compacted. Compacted soil does not take in water properly, and it discourages soil micro-organisms from rising in it. When your soil is properly tilled, seeds can thrive and develop. When planting new crops, make sure you know when one of the best instances are to plant them in your natural gardens. Strive planting your new plants throughout the late evening or during a cloudy day. These plants have a better probability of surviving if you plan them throughout cloudy days, in rainy climate versus dry, or in sunny weather.
An awesome first step to having a successful natural backyard is to check the acidity of the soil in your garden. The best quantity is 6.5, if your soil is on the low finish, it’s too acidic and if it’s on the excessive end it is too alkaline. Neither of those situations lends itself to a successful garden. So by purchasing a soil testing kit before planting, you will assure your self an exquisite natural backyard in the summertime.
This helps soil preserve its moisture by lowering the speed of evaporation.
Natural meals do not possess any pesticides on them. This supplies advantages for your family, but you ought to double check for pests. Learn to water your backyard effectively. A soaker hose can be laid within the backyard and left on with low water stress. This frees you up from having at hand-water the plants, so you can do other gardening work. Take care with seedlings, although — they’re nonetheless delicate and must be watered by hand.
Keep out of your garden after it has rained or whenever it’s moist. Illnesses and micro organism thrive and spread more simply in damp environments. Bacteria can easily connect to your shoes as you walk by means of the wet garden and be transferred from plant to plant. Instead, wait until the soil is dry to enter your garden. If you are fully new to the world of organic gardening, then you’re in all probability thinking that some recommendations on natural gardening will enable you immensely in an effort to begin growing your individual organic crops. Listed below are some tricks to get you started along with your natural gardening endeavors.
Weed management in your organic garden might be more challenging than a standard garden because you possibly can’t use chemical herbicides. Among the finest ways to regulate weeds without utilizing chemical substances is creating ground cowl with mulch. Save tree trimmings and grass clippings from elsewhere in your backyard and spread them around your vegetation to a depth of about 3 inches. This ought to be enough to forestall weeds from germinating and growing.
Cowl bare spots whenever you plant. Whenever you put a brand new plant into your natural garden, do not depart the earth naked the place you planted. Be sure you mulch the realm throughout your new plant. It will protect it while it begins to grow. It will also maintain the ground moist. To make sure that your tomatoes in your organic backyard develop as massive and wholesome as they can, you must at all times eliminate the non-fruiting branches of the tomato crops. The reason is as a result of these specific branches will lower your tomato vegetation’ energy, which can negatively impression your vegetation’ growth and health.
In selecting plants to your garden, this zone information will let you know if the plant is suited for your geographic region. Do you’ve got some gardening methods? | <urn:uuid:315ddf66-4248-4f3e-863d-38ad517b4f39> | {
"date": "2019-04-23T22:54:13",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578613888.70/warc/CC-MAIN-20190423214818-20190424000818-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9341765642166138,
"score": 2.515625,
"token_count": 876,
"url": "http://www.homedesignhartford.tk/the-skinny-on-natural-gardening-like-a-pro.html"
} |
*From Forbes, contributed by an MD.
Could Ebola Virus Become A Threat In The U.S.?
As the Ebola virus continues to spread throughout West Africa, with increasing concern among both health officials and the public alike, recent media reports about a death of a man who traveled to Lagos, Nigeria having been in an area rife with Ebola Virus, recently caught the world’s attention–and for good reason.
As we live in an interconnected world–and not just by the internet- we have to come to grips with the fact that hopping on a plane may potentially spread any virus–not just Ebola–to another country.
Thus, the importance of enforcing proper infectious screening procedures of those who plan to board an aircraft in an endemic area such as West Africa becomes critical to containing the spread of the Ebola virus. Enforcing a “Do Not Board List” would be critical to preventing any spread of such a virus.
While the Ebola virus could potentially be transported by travelers to another country by a plane ride, according to officials at the CDC, the actual chance of this developing in a serious public health risk to those living in the US is small.
One of the main reasons, officials believe, that the virus has a low public health risk is related to the conditions which would be favorable to allow spread of the virus. Poor and crowded living conditions, along with improper sanitation seem to be an important element that contribute to the spread of the virus. Such are not the living conditions, in general, throughout most modernized countries in the Western world
[caption id="" align="" width="670"]English: Transmission Electron Micrograph of t... English: Transmission Electron Micrograph of the Ebola Virus. Hemorrhagic Fever, RNA Virus. Français : Virus Ebola. Italiano: Fotografia al microscopio elettronico della trasmissione del virus Ebola. Русский: Изображение вируса Эбола полученное с помощью просвечивающей электронной микроскопии. 中文: 電子顯微鏡下的伊波拉病毒結構. Türkçe: Ebola virüsü. Føroyskt: Ebola virus, eitt (-)ssRNA virus, undir elektronmikroskopi. (Photo credit: Wikipedia)[/caption]
Ebola, comprised of 5 strains, was first identified in 1976 in the Western Democratic Congo along the Ebola river. Four of the strains can be spread to humans. The fifth resides only in primates. The fruit bat, considered a delicacy in West Africa, is typically considered a natural reservoir of the Ebola virus.
Ebola is spread directly, human-to-human, by secretions such as saliva, sweat, but also by blood and feces. It can be spread directly by a break in the skin or mucous membranes or indirectly after touching your nose, mouth or eyes after having contact with the virus. It is not transmitting by coughing or sneezing (droplet spread)- as would be the case for someone with influenza or measles.
Ebola virus, a member of the family of filoviruses, is one of the most deadly viruses known to man, owing to its ability to constantly undergo changes or mutations in its viral proteins. Symptoms begin suddenly–often with an intense headache and fatigue, sore throat and chills–followed by vomiting, and diarrhea with onset of a hemorrhagic rash in the upper roof of the mouth and the skin that appears to be blister-like. The virus attacks the immune system, releasing inflammatory mediators, which lead to collapse of the coagulation pathway, ending in massive external and internal bleeding.
While the virus incubates from 2-21 days, its important to know that only those who are symptomatic–generally after 8-9 days–having fever along with diarrhea, vomiting and potentially a hemorrhagic rash can transmit the virus to others.
As a result, if someone on a plane with active symptoms–including vomiting and diarrhea –soils a restroom, another person who is not aware could theoretically touch a contaminated area, and then acquire the virus.
That said, its important to know that the majority of those who have become infected with the Ebola virus have been primarily healthcare workers in close contact with patients as well as family members caring for sick family members. In addition, the risk of transmission from family members touching an infected corpse prior to burial represents another potential mode of transmission.
As a caveat, its also important to know that early on its course, persons with Ebola may have symptoms that are nonspecific (headache, chills fever) making identification of the virus nearly impossible. It could be easily be mistaken for other illnesses including malaria, cholera or even typhoid fever. Only many days into the illness–after the onset of profuse vomiting and diarrhea–will a patient exhibit the telltale signs of Ebola with bleeding from the mouth and nose along with rectal bleeding concurrent with shock, liver and renal failure, followed by continued bleeding and fulminant cardiovascular collapse.
As a result, a heightened awareness, proper education, and a recent travel history from West Africa are vital for for healthcare providers who are on the front lines.
The public should be assured that medical providers in all US emergency departments are on high alert for persons with active symptoms and who have a concerning travel history. Prompt isolation using universal precautions, (gown, gloves, mask, eye protection) by providers is essential to preventing spread of the virus.
At this time, there is no vaccine or antiviral medication available to treat the disease. Only supportive care, with intravenous fluids, platelet and blood transfusions are available to patients. While there have been some promising experimental treatments in animal models,(monoclonal antibodies), there are no treatments that are currently available for humans.
With obvious technical issues regarding the high mutability of the virus–related to the proteins on its surface—preventing researchers from being able to produce a vaccine or viable antiviral medication, larger issues such as the danger of handling the virus (Biosafety Level 4) often have prevented more intense efforts to aggressively pursue research. With few patients having the disease and far fewer surviving, research efforts have likely been compromised.
However, one recently discovered compound, BCX 4430, reported by researchers in a paper in Nature (April, 2014), may hold promise for not only treating Ebola, but other deadly viruses such as Marburg, as well as MERS, SARS, dengue and measles.
Developed by US Army’s highly specialized biolaboratory in Fort Detrick, Maryland, the compound is a RNA dependent RNA polymerase that has shown promise in nonhuman primate models, as well as some in vitro activity against the virus in human cells. In their experiment, 18 Macaque monkeys who were exposed to the deadly Marburg virus, but then given post exposure treatment (1, 24, and 48 hrs) with BCX4430 exhibited near complete survival. 17 of the 18 treated monkeys survived based on results of the trial. There have been no human trials reported to date. | <urn:uuid:fd2842fc-e053-41a8-ba0f-1b7595c84fee> | {
"date": "2016-07-25T08:57:32",
"dump": "CC-MAIN-2016-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824217.36/warc/CC-MAIN-20160723071024-00208-ip-10-185-27-174.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9383717775344849,
"score": 3.0625,
"token_count": 1580,
"url": "http://forum.blackhairmedia.com/ebola-outbreak_topic372595_post10957787.html"
} |
Eolie Islands, Italian Isole Eolie, Latin Insulae Aeoliae, also called Aeolian Islands or Lipari Islands, Giovanni from Catania, Sicilyvolcanic island group in the Tyrrhenian Sea (of the Mediterranean) off the north coast of Sicily, Italy. The group, with a total land area of 34 square miles (88 square km), consists of seven major islands and several islets lying in a general “Y” shape. The base of the Y is formed by the westernmost island, Alicudi, the northern tip by Stromboli, and the southern tip by Vulcano. The other major islands are Lipari, Salina, Filicudi, and Panarea.
© Luca Pinello/FotoliaThe islands represent the summits of a submerged mountain chain rising to 3,156 feet (962 metres) on Salina. Seismic and volcanic activity has been known since ancient times, and the Greeks believed the islands to be the home of Aeolus, king of the winds, whence their name. Vulcano and Stromboli are active, and there are fumaroles on Lipari and Panarea.
© Mario Guarrella/FotoliaExcavations in the 20th century established an uninterrupted archaeological record from the Neolithic Period (New Stone Age; 7000–3000 bce). Obsidian, the islands’ principal export in prehistoric times, has been detected as far east as Crete. Panarea has remains of a Bronze Age village (dating from 3000 bce). The Greeks established themselves in the islands early in the 6th century bce. Later there was a Carthaginian naval station, until the Romans took over in 252 bce. In Roman times, as in the Fascist era prior to World War II in the 20th century, the islands served as a place of banishment for political prisoners. In early medieval times they were conquered by the Saracens, who were expelled by the Normans in the 11th century. The Eolie Islands frequently changed hands between the Angevins of Naples and the Sicilian kings in the 14th century. Alfonso V of Aragon annexed them to Naples, but Ferdinand II of Aragon finally united them to Sicily in the late 15th century.
Pumice is exported from the islands, and the principal agricultural product is a heavy malmsey-type wine from Lipari. There are alum quarries on Vulcano. Lipari, the chief town of the islands, is the seat of a bishop and of the important Aeolian archaeological museum; much of the remaining population is concentrated in the three towns on Lipari. Stromboli’s continuously active volcano is a noted tourist attraction. There is regular steamer service to Milazzo, Messina, and Naples and in summer a hydrofoil service to Palermo. | <urn:uuid:147d8453-5cf3-41b8-be63-c09b2ccf4b48> | {
"date": "2015-01-30T19:22:44",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115926735.70/warc/CC-MAIN-20150124161206-00068-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.953369677066803,
"score": 3.453125,
"token_count": 600,
"url": "http://www.britannica.com/print/topic/189371"
} |
Russell Cave National Monument
|Russell Cave National Monument|
|IUCN Category V (Protected Landscape/Seascape)|
|Location:||Jackson County, Alabama, USA|
|Nearest city:||Bridgeport, AL|
|Area:||310 acres (1.25 km²)|
|Established:||May 11, 1961|
|Visitation:||23,496 (in 2005)|
|Governing body:||National Park Service|
The Russell Cave National Monument is a United States National Monument in northeastern Alabama, United States, just south of the Alabama-Tennessee border. With a mapped length of 7.2 miles (11.6 km), Russell Cave is the third longest mapped cave in Alabama. It is ranked ninetieth on the United States Long Cave List, and is currently listed as number 314 on the World Long Cave List. The cave is named for Thomas Russell, a veteran of the American Revolutionary War who owned the land above it.
In 1958, the cave and site area–310 acres (1.3 km²) of land–were donated by the National Geographic Society to the American people. The Monument was established on May 11, 1961 and is maintained by the National Park Service. The National Monument was listed on the National Register of Historic Places on October 15, 1966.
Its exceptionally large main entrance was used as a shelter by prehistoric Native Americans from the earliest known human settlement in the Southeastern United States, through to the era of European colonization. The surrounding forest provided food, tools and fuel for fires. The site contains the most complete record of prehistoric cultures in the Southeast, offering a nearly continuous record of human habitation dating to at least 7000 B.C.E., including artifacts from the Archaic, Woodland, and Mississippian cultures.
The rock from which Russell Cave was carved was formed over 300 million years ago at the bottom of an inland sea covering the region. Due to continental drift, the area that is now northeast Alabama was located very close to the Equator at the time this limestone was forming. This area is now located in a temperate climate, but 300 million years ago it was a shallow, tropical sea. Carbonaceous deposits of skeletons and shells were slowly transformed into limestone. Rainwater, mildly acidic from atmospheric carbon dioxide, slowly dissolved a portion of the limestone rock resulting in the formation of the cave. About 9000 to 12,000 years ago, the collapse of a cavern roof beneath a hillside near Doran's Cove created a sinkhole and exposed Russell Cave.
Until shortly before the first occupation by Native Americans, the cavern was uninhabitable due to the presence of a large stream which occupied the entirety of the cavern. A fortuitous rockfall from the cavern roof diverted the stream to one side, however, exposing a portion of the cave floor. The first occupants dwelled on this irregular floor of rock slabs. Debris from occupants and deposits falling from the ceiling slowly raised the floor. The floor ultimately was raised an additional seven to eight feet (2.0 to 2.5 m) and up to 30 feet (9.0 m) near the upper entrance. In the 1960s, the United States Bureau of Mines installed bolts with a length of 15 feet (4.5 m) to prevent additional collapses of limestone rock.
The cave mouth faces to the east preventing the ingress of cold north and northwest winds and allowing in the morning sun. According to a published cave map, the cave has five entrances in addition to the Main Entrance. Three of the entrances are referred to as Canoe Entrances while the other two are named the Picnic Entrance and Pig Entrance.
A natural spring flows into the cave and travels underground for 1.5 miles (2.5 km) before joining Widow's Creek and, ultimately, the Tennessee River.
Studies of historical geology and paleobotany have shown that the flora and fauna of the Eastern Forest Region remained essentially unchanged for thousands of years. This began to change with the arrival of European settlers who removed trees for timber and to open land for subsistence farming and commercial farming.
The cave is populated by both the brown bat and northern long ear bat. The cave stream contains fish known as sculpin. Snakes of the surrounding area include the copperhead, timber rattlesnake, rat snake, and kingsnake. Over 115 species of birds have been identified by researchers at Russell Cave, a site on the North Alabama Birding Trail. Although the site is now below the southern boundary of their range, porcupine bones have been found in digs at the earliest occupational levels. The peccary, also hunted by the occupants, is no longer found in this region.
Archaic period (before 1000 B.C.E.)
Chipped flint points and charcoal from campfires provide evidence that occupation of Russell Cave began nearly 9000 years ago by Archaic period Native Americans. The charcoal remains of the first fires in the cavern date to between 6550 and 6145 B.C.E. based on radiocarbon dating. As they maintained their existence as hunter-gatherers, it is likely that the cave was only occupied during the autumn and winter seasons. According to John Griffin, the issue of seasonality (during what season or seasons the cave was utilized) remains to be determined. Evidence indicating inhabitation in autumn and winter include deer bones and passenger pigeon remains. The presence of shellfish artifacts clouds the determination somewhat since shellfish would have been easier to procure during periods of dry weather in mid-spring and late summer. However, William Clench has suggested that the occupants may have brought mussels and snails to nearby bodies of water (Dry Creek and/or Crownover Springs) for use as needed including in autumn or winter. Based on the existing information, Griffin is "strongly inclined" to view Russell Cave as a place of winter occupancy.
In addition to serving as a shelter (presumably for several related families totaling 15 to 30 individuals), the cave would have provided a constant source of water due to the lack of freezing temperatures in the cavern. The surrounding hardwood forest and nearby Tennessee River served as sources of food throughout the year. The food sources would have included aquatic animals (fish, turtles, shellfish), birds (including turkey), small mammals (squirrels, raccoons, rabbits, gray foxes, skunks, bobcats, porcupines, peccaries), nuts (including acorns), seeds, and roots. Larger animals such as deer and black bears were also commonly hunted when the seasons permitted. The dominant animal food sources for these occupants were deer and turkey. As gatherers, these occupants also would have consumed fruits and berries although these plant foods may have been scarce or unavailable during the seasons of cave occupancy. Generally speaking, hunter-gathers relied more heavily on plant foods than they did animals. Indirect evidence of gathering includes pits for storage of nuts and seeds, mortars and pestles, and nut stones.
Goosefoot, also referred to as Chenopodium, is a small flowering plant with edible seeds that may have been cultivated in small gardens. The evidence for this is uncertain, however. This also leads to an uncertainty in the timeframe of the suspected cultivation (believed to be during Archaic or Woodland periods).
These early cave dwellers were efficient consumers of game. Flesh was roasted or stewed while hides were made into clothing and bones were made into tools.
The chief weapon of these occupants was a short spear (tipped with stone point) propelled by an atlatl (throwing stick). The points were chipped from chert which occurs as nodules and veins in limestone near the cave.
Chert was also utilized to fashion knives and scrapers. They turned bones into awls and needles indicating the production of clothing from hides or manufacturing of baskets. Small pieces of bone were also used to make fish hooks. No ornamental works have been found in this layer of deposits.
Other items such as baskets and articles fashioned from wood and hides were probably produced but have not been preserved by the soil.
Woodland period (1000 B.C.E. to 500 C.E.)
Around 1000 B.C.E., the implements of the Native Americans utilizing Russell Cave underwent a dramatic change. Pottery appeared for the first time. Smaller weapon points indicate that the bow and arrow had replaced the atlatl. Tools fashioned from bone were more refined. Other domestic implements provide the first evidence of gardening at the site. Additionally, bone and shell appear in ornamental artifacts. Evident throughout the Woodland period is an increase in the amount of hunting at the expense of other activities. During this period, it is clear that the cave had become simply a hunting camp. In the seasons away from the cave, the natives probably joined other groups at summer villages larger than those of the Archaic period.
These changes occurred in groups throughout the eastern United States marking the beginning of the Woodland period. During this period, burial mounds were first built, the population increased, and trade became important.
Changes in the shape and style of artifacts at Russell Cave during the Woodland period serve as a basis for identifying cultural subdivisions within the period. For example, early pottery of the period is decorated with fabric impressions while later pottery is decorated with impressions made by carved wooden paddles.
Mississippian period (after 500 C.E.)
After the close of the Woodland period (around 500 C.E.), Native Americans made less and less use of Russell Cave. Occasionally, small parties of hunters left objects distinct from those of the Woodland period occupants. These visitors (Mound Builders of the Mississippian period) came from permanent villages which had successfully implemented agriculture near the rich river bottomlands. The last occupants departed around 1000 C.E.
Centuries later, Cherokee occupied this part of the Tennessee Valley. They and the subsequent European settlers made little use of the cave. The few objects that they left were found very close to the surface. The only modern historical artifact found at the site was a metal fishing hook.
The expedition of Hernando de Soto passed within 100 miles (160 kilometers) of Russell Cave in 1540.
Russell Cave was named after Colonel Thomas Russell, a veteran of the American Revolutionary War from North Carolina, who owned the property at the time when maps of the area were drawn. The surrounding land called Doran's Cove is named after Major James Doran, the brother-in-law of Russell and the original owner of the land. The land was purchased by the National Geographic Society and donated to the American people. The area was designated as a U.S. National Monument in 1961 during the presidency of John F. Kennedy.
Archeological field surveys have uncovered the records of the cave's occupants. Approximately two tons of artifacts have been recovered from the site. These discoveries include charcoal from fires, bones of animals (as remains of hunted game and as bone tools), spear and arrow points, sherds of pottery, and the remains of several adults and children buried at the site. The bodies, ranging in age from infant to 50 years, were buried in shallow pits in the cave floor and were not accompanied by artifacts.
The first relics were discovered in 1953 when four members from the Tennessee Archeological Society and University of Chattanooga began digging in the cave. This first excavation reached a depth of six feet (1.8 m). Upon realizing the extent and importance of the site, they contacted the Smithsonian Institution which conducted three seasons (1956-1958) of archeological digs in cooperation with the National Geographic Society, reaching a depth of more than 32 feet (9.8 m). An additional excavation was performed in 1962 by the National Park Service to a depth of 10.5 feet (3.2 m). This final excavation completed the archeological record and established an on-site exhibit.
Analysis of the distribution of the artifacts among functional categories (fabricating and processing tools, domestic implements, weapons) using an experimental technique proposed by Howard Winters reveals that the ratio of non-weapon artifacts to weapons was very low. This is indicative of a hunting camp with lack of permanent occupancy. It should be noted that the picture of prehistoric life gained from Russell Cave is incomplete due to the incomplete nature of archeological records and because Russell Cave only represents a portion of the annual life cycle of the inhabitants.
Russell Cave National Monument was established on May 11, 1961. The archaeological site contains the most complete record of prehistoric cultures in the Southeastern United States. Russell Cave is one of the most extensive cave systems in Alabama with over seven miles (11 km) of mapped passageways.
Due to the discovery of several rare species (including a species of scorpion that exists nowhere else in the world other than Russell Cave) recreational caving is no longer allowed. Guided tours of the cave shelter are conducted by National Park Service Interpretative Rangers. Only the cave's entrance chamber can be visited without special permission. The cave is entered through a sinkhole, formed by the collapse of the cave's roof. A light and sound show in one of the excavations, explains the stratas of the dig.
The cave shelter includes the areas that were occupied by the ancient groups and features a diorama depicting activities of the occupants. Scenes of the life of the Prehistoric Indians with life-size mannequins portray the knowledge gained by archaeological excavations.
The Gilbert H. Grosvenor Visitor Center at the monument, dedicated in 1967, is named after Gilbert Hovey Grosvenor, the editor of National Geographic Magazine from 1903 to 1954 and president of the National Geographic Society from 1920 to 1954. The center operates as a small museum with displays of artifacts and relics from the cave, accompanied by documentary films educating the public on the lifestyles of prehistoric peoples who used Russell Cave.
There are two walking trails on the acreage surrounding Russell Cave: the Nature Trail, a 0.6-mile (1.9-km) paved trail, and the Backcountry Trail, a 1.2-mile (1.9-km) dirt trail. Both trails provide good opportunities to experience the forest and wildflowers in the area. Points along the trails feature plants utilized for food, tools, and other daily necessities.
Native American Festival
Each year during the first weekend in May, the Russell Cave National Monument hosts a Native American Festival. The festival includes performances of storytelling, dancing, and Native American flute playing. A historical reenactment of a Cherokee encampment is conducted. At this event and at other times throughout the year, demonstrations of Native American lifestyles and weaponry are conducted. Weapons demonstrations include flintknapping to produce points (arrowheads), use of the atlatl for spear throwing, and use of a bow and arrow. Other demonstrations feature wood carving, handbuilding of pottery, and fire building.
North Alabama Birding Trail
Russell Cave National Monument is Site 44 on the Northeastern Loop of the North Alabama Birding Trail. This is not a "trail" in the traditional sense of the word but a series of mostly roadside stops throughout northern Alabama selected for their birdwatching characteristics. Although many types of birds are present, this site is known for its tanagers (Summer Tanager and Scarlet Tanager) and the Yellow-billed Cuckoo. During migration, almost any species of eastern warbler and vireo can be spotted in the park. The prime seasons for watching the songbirds include spring, summer, and autumn.
- ↑ John T. Hack. 1974. "Geology of Russell Cave" in Investigations in Russell Cave. (Publications in Archeology 13). (National Park Service, U.S. Department of Interior.)
- ↑ 2.0 2.1 2.2 GORP. Monuments - The Story of Russell Cave Retrieved December 9, 2008.
- ↑ 3.0 3.1 3.2 3.3 U.S. National Park Service. Russell Cave National Monument - Frequently Asked Questions Retrieved December 8, 2008.
- ↑ Larry E. Matthews, 2007. Caves of Chattanooga. (Huntsville, AL: National Speleological Society. ISBN 978-1879961272)
- ↑ 5.0 5.1 U.S. National Park Service. Geology Fieldnotes - Russell Cave National Monument Retrieved December 9, 2008.
- ↑ 6.0 6.1 6.2 6.3 6.4 6.5 John Wallace Griffin and Patricia C. Griffin. 1996. Fifty years of Southeastern archaeology: selected works of John W. Griffin. (Gainesville, FL; Tallahassee, FL; Tampa, FL: Univ. of Florida Pr. ISBN 0813014204)
- ↑ William J. Clench. 1974. "Mollusca from Russell Cave" in Investigations in Russell Cave (Publications in Archeology 13). National Park Service, U.S. Department of Interior.
- ↑ Richard Borshay Lee and Irven DeVore. 1968. Man the Hunter, edited by Richard B. Lee and Irven DeVore; with the assistance of Jill Nash-Mitchell. (New York: Aldine De Gruyter. ISBN 020233032X)
- ↑ Elman Rogers Service. 1966. The hunters. (Englewood Cliffs, NJ: Prentice-Hall.)
- ↑ Osterweis Selig, Ruth, and Marilyn R. London. 1998. Anthropology explored: the best of Smithsonian AnthroNotes. (Washington, D.C.: Smithsonian Institution Press. ISBN 1560987901)
- ↑ Jay K. Johnson, 1993. The Development of southeastern archaeology. (Tuscaloosa: University of Alabama Press. ISBN 0817306005)
- ↑ Carl F. Miller. 1960. "The Use of Chenopodium Seeds as a Source of Food by the Early Peoples in Russell Cave, Alabama" in Southern Indian Studies 12
- ↑ Bruce D. Smith. 1985. "The Role of Chenopodium as a Domesticate in Pre-Maize Garden Systems of the Eastern United States" in Southeastern Archeology 4
- ↑ 14.0 14.1 Jochen Duckeck. Russell Cave National Monument Show Caves of the United States. Retrieved December 9, 2008.
- ↑ Kenneth A. Rosenberg. 1994. Wilderness preservation: a reference handbook. (Contemporary world issues.) (Santa Barbara, CA: ABC-CLIO. ISBN 087436731X)
- ↑ Lucille B. Griffith. 1987. Alabama: a documentary history to 1900. (University of Alabama Press. ISBN 0817303715)
- ↑ Howard D. Winters. 1963. "The Archaic Period" in Illinois Archaeological Society Bulletin. volume 1.
- ↑ Harvey Chipkin, November 23, 1992, "State aims to lure ecotourists with its natural attractions" in Travel Weekly.
- Chipkin, Harvey. November 23, 1992. "State aims to lure ecotourists with its natural attractions" in Travel Weekly.
- Griffin, John W. 1964. Preliminary Report on Excavations at Russell Cave National Monument. Southeastern Archaeological Conference Bulletin 1: 3335.
- Griffith, Lucille B. 1987. Alabama: a documentary history to 1900. University of Alabama Press. ISBN 0817303715.
- Grosvenor, M. B. 1958. "National Geographic Society Presents Russell Cave to the American People." National Geographic 113: 438.
- Hack, John T. 1974. "Geology of Russell Cave" in Investigations in Russell Cave. (Publications in Archeology 13). National Park Service, U.S. Department of Interior.
- Johnson, Jay K. 1993. The Development of southeastern archaeology. Tuscaloosa: University of Alabama Press. ISBN 0817306005.
- Lee, Richard Borshay, and Irven DeVore. 1968. Man the Hunter, edited by Richard B. Lee and Irven DeVore; with the assistance of Jill Nash-Mitchell. New York: Aldine De Gruyter. ISBN 020233032X.
- Matthews, Larry E. 2007. Caves of Chattanooga. National Speleological Society, 141–160. ISBN 978-1879961272.
- Miller, Carl, "Life 8,000 Years Ago Uncovered in an Alabama Cave." National Geographic 10(4)(1956): 542—558.
- Miller, C. F. 1957. "Radiocarbon Dates from an Early Archaic Deposit in Russell Cave, Alabama." American Antiquity 23: 84.
- Miller, C. F. 1958. "Russell Cave: New Light on Stone Age Life." National Geographic 113: 426–437.
- Rogers, William W. 1994. Alabama: The History of a Deep South State. University of Alabama Press. ISBN 0817307141. OCLC 28634588.
- Rosenberg, Kenneth A. 1994. Wilderness preservation: a reference handbook. (Contemporary world issues.) Santa Barbara, CA: ABC-CLIO. ISBN 087436731X.
- Winters, Howard. 1963. "The Archaic Period" in Illinois Archaeological Society Bulletin. volume 1.
All Links Retrieved December 8, 2008.
- Russell Cave National Monument (Official National Park Service website)
- Official North Alabama Birding Trail website
New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here:
Note: Some restrictions may apply to use of individual images which are separately licensed. | <urn:uuid:fd430040-013f-4275-86ab-01a63f5ecbbd> | {
"date": "2014-10-02T02:22:48",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663637.20/warc/CC-MAIN-20140930004103-00262-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9264079332351685,
"score": 3.1875,
"token_count": 4593,
"url": "http://www.newworldencyclopedia.org/entry/Russell_Cave_National_Monument"
} |
New Virus Means More Suffering for Animals Raised for Food
In addition to being forced to endure unnatural conditions, farmed animals are also denied the right to fulfil their natural instincts – things as basic as building family bonds and nursing their young. Factory farms are a breeding ground for new strains of dangerous bacteria and viruses, which is why animals are fed a steady diet of drugs to keep them alive in such unsanitary and stressful conditions. This, in turn, increases the chance that drug-resistant superbugs will develop, some of which are capable of being transmitted to humans, such as swine flu and bird flu. Many animals already have weakened immune systems, allowing disease to spread quickly in the filthy conditions. Hans-Gerhard Wagner of the UN Food and Agriculture Organization, has called the “intensive industrial farming of livestock” an “opportunity for emerging disease”.
Whilst for farmers, deformities and miscarriages are a concern for profit, they mean pain, suffering and sadness for the animals. The best thing that any of us can do to help animals raised for food, at the mercy of diseases borne from the horrific conditions in which they live, is to switch to a vegan diet. That way, you can enjoy your food, safe in the knowledge that you are not contributing to cruelty to animals. And why not let us give you a hand getting started? Order your free vegetarian/vegan starter kit today! | <urn:uuid:f3024d31-1823-4873-810e-7bd2e1991fbb> | {
"date": "2015-10-06T03:52:28",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736678409.42/warc/CC-MAIN-20151001215758-00244-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9585832953453064,
"score": 2.703125,
"token_count": 293,
"url": "http://www.peta.org.uk/blog/new-virus-means-more-suffering-for-animals-raised-for-food/"
} |
Looks like you are using an old version of Internet Explorer - Please update your browser
During the radioactive decay of uranium and thorium contained in rocks, lots of helium is produced. Because helium is the second lightest element and a noble gas—meaning it does not combine with other atoms—it readily diffuses (leaks) out and eventually escapes into the atmosphere. Helium diffuses so rapidly that all the helium should have leaked out in less than 100,000 years. So why are these rocks still full of helium atoms?
While drilling deep Precambrian (pre-Flood) granitic rocks in New Mexico, geologists extracted samples of zircon (zirconium silicate) crystals from different depths. The crystals contained not only uranium but also large amounts of helium.1 The hotter the rocks, the faster the helium should escape, so researchers were surprised to find that the deepest, and therefore hottest, zircons (at 387°F or 197°C) contained far more helium than expected. Up to 58% of the helium that the uranium could have ever generated was still present in the crystals.
The helium leakage rate has been determined in several experiments.2 All measurements are in agreement. Helium diffuses so rapidly that all the helium in these zircon crystals should have leaked out in less than 100,000 years. The fact that so much helium is still there means they cannot be 1.5 billion years old, as uranium-lead dating suggests. Indeed, using the measured rate of helium diffusion, these pre-Flood rocks have an average “diffusion age” of only 6,000 (± 2,000) years.3
These experimentally determined and repeatable results, based on the well-understood physical process of diffusion, thus emphatically demonstrate that these zircons are only a few thousand years old. The supposed 1.5-billion-year age is based on the unverifiable assumptions of radioisotope dating that are radically wrong.4
Another evidence of a young earth is the low amount of helium in the atmosphere. The leakage rate of helium gas into the atmosphere has been measured.5 Even though some helium escapes into outer space, the amount still present is not nearly enough if the earth is over 4.5 billion years old.6 In fact, if we assume no helium was in the original atmosphere, all the helium would have accumulated in only 1.8 million years even from an evolutionary standpoint.7 But when the catastrophic Flood upheaval is factored in, which rapidly released huge amounts of helium into the atmosphere, it could have accumulated in only 6,000 years.8
So glaring and devastating is the surprisingly large amount of helium that old-earth advocates have attempted to discredit this evidence.
One critic suggested the helium didn’t all come from uranium decay in the zircon crystals but a lot diffused into them from the surrounding minerals. But this proposal ignores measurements showing that less helium gas is in the surrounding minerals. Due to the well-established diffusion law of physics, gases always diffuse from areas of higher concentration to surrounding areas of lower concentration.9
Another critic suggested the edges of the zircon crystals must have stopped the helium from leaking out, effectively “bottling” the helium within the zircons. However, this postulation has also been easily refuted because the zircon crystals are wedged between flat mica sheets, not wrapped in them, so that helium could easily flow between the sheets unrestricted.10 All other critics have been answered.11 Thus all available evidence confirms that the true age of these zircons and their host granitic rock is only 6,000 (± 2,000) years. | <urn:uuid:7acf551d-7b69-4e77-afe8-f316fe0e52b2> | {
"date": "2015-05-29T04:27:15",
"dump": "CC-MAIN-2015-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929869.17/warc/CC-MAIN-20150521113209-00144-ip-10-180-206-219.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9462544918060303,
"score": 4.40625,
"token_count": 759,
"url": "https://answersingenesis.org/age-of-the-earth/6-helium-in-radioactive-rocks/"
} |
The American south. 福清侨中 陈柳菁. Fill in the blanks with new words:. ormer. 1. Clinton is the f_____ president of the USA. 2. He tried to save his son from drowning, but in v___. 3. The city was destroyed and there was no money for r____________. ain.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
1. Clinton is the f_____ president of the USA.
2. He tried to save his son from
drowning, but in v___.
3. The city was destroyed and there
was no money for r____________.
5. The failure caused his d________.
6. Parents often make s_______ for their children.
7. We got up before d____. It’s still dark outside.
The United States of
In North America
New York City
9,429,091 sq km
Do you know the following cities?
The Great Lakes
Tick the things which are mentioned in the passage.
( ) Segregation & Civil Rights Movement
( ) Geography & climate
() Society & economy
( ) Hardships & sufferings of the South
() Sports & culture
( ) Custom & films
Read the passage and try to find out how many parts we can divide it into:
Parts Paragraphs Main ideas
the troubled past in the South
Part 1 Para.1
Part 2 Para.2--5
hope and success of the South
a new beginning of the South
Part 3 Para.6
1.Why does the author say that “ But the
story of the South is also one of hope and
Because there are signs that a new, different
South is coming out of its dark past.
It was ending segregation.
The South is known for its hospitality./
Modern Atlanta is a booming business centre
and the home of some largest and most
Read Para.1 and match each event with the time and find out what hardships or sufferings each event caused.
Unemployment & civil unrest
The Great Depression _______________________
The Civil Rights Movement _______________________
Pains of slaves
The slave trades _______________________
The arrival of European
Native American’s being killed or driven off
Death & poverty
The Civil War _______________________
The arrival of European settlers
The American South after the Civil War
Unemployment & civil unrest
(In the 1960s)
Atlanta’s rebuilding and Reconstruction
host Olympic Games
Task 1: T or F questions
( ) 1.The wounds from the past are quick to heal .
( ) 2. The fighters between blacks and whites in the 1960s were fierce.
( ) 3. It took a long time for Atlanta recover from the destruction caused by the Civil War.
( ) 4. The fight against segregation was widely supported.
( ) 5. The South has taken a chance to display its new image to the whole world.
( ) 6. Till now the South has settled all the problems.
( ) 7. The story of the South is also about hope and success.
( )8. The south began to rebuild nearly from nothing.
3. People of many different backgrounds live and work together in Atlanta. What are the advantages of living together with people who are different with people from you? Are there any disadvantages?
★ People with different backgrounds have different ideas and knowledge,which makes the population more creative.
★It is good for people to learn about other cultures.
★Life is more interesting if people are different.
★ People from different cultures may treat each other badly.
★Life can be more difficult if people are different. | <urn:uuid:865e5d6f-6d5c-4697-bae8-b2c5b24b46a5> | {
"date": "2018-06-23T22:17:11",
"dump": "CC-MAIN-2018-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865250.0/warc/CC-MAIN-20180623210406-20180623230406-00056.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9096781611442566,
"score": 3.328125,
"token_count": 847,
"url": "https://www.slideserve.com/betha/the-american-south"
} |
|Yael Shrager and Larry R. Squire (2008), Scholarpedia, 3(8):2789.||doi:10.4249/scholarpedia.2789||revision #90957 [link to/cite this article]|
Amnesia (neurological amnesia and functional amnesia) refers to difficulty in learning new information or in remembering the past. Neurological amnesia is characterized by a loss of declarative memory. Declarative memory refers to conscious knowledge of facts and events. In contrast, nondeclarative memory, which refers to a collection of non-conscious knowledge systems, is largely thought to remain intact. The terms explicit and implicit memory are sometimes used and have approximately the same meanings as declarative and nondeclarative, respectively. Neurological amnesia occurs following brain injury or disease that damages the medial temporal lobe or medial diencephalon. Neurological amnesia causes severe difficulty in learning new facts and events (anterograde amnesia). Patients with neurological amnesia also typically have some difficulty remembering facts and events that were acquired before the onset of amnesia (retrograde amnesia). Functional amnesia is rarer than neurological amnesia and can occur as the result of an emotional trauma. It presents as a different pattern of anterograde and retrograde memory impairment than neurological amnesia. Functional amnesia is characterized by a profound retrograde amnesia with little or no anterograde amnesia. In some cases, patients fully recover. Functional amnesia is a psychiatric disorder, and there is no particular brain structure or region whose damage is known to underlie this condition.
Etiology of neurological amnesia
Neurological amnesia results from a number of conditions including Alzheimer’s disease or other dementing illnesses, temporal lobe surgery, chronic alcohol abuse, encephalitis, head injury, anoxia, ischemia, infarction, and the rupture and repair of an anterior communicating artery aneurism. In all of these conditions, the common factor is the disruption of normal function in one of two areas of the brain - the medial aspects of the temporal lobe, and the diencephalic midline. Bilateral damage results in amnesia for all types of material, and unilateral damage results in material-specific amnesia. Specifically, left-sided damage especially affects memory for verbal material, while right-sided damage especially affects memory for nonverbal material (e.g., memory for faces and spatial layouts).
Anatomy of neurological amnesiaWell-studied cases of human amnesia and animal models of amnesia provide information about the neural connections and structures that are damaged. In humans, damage limited to the hippocampus (a structure within the medial temporal lobe) is sufficient to cause moderately severe amnesia. The severity of memory impairment is exacerbated by additional damage to medial temporal lobe structures outside of the hippocampus. (Animal studies later elucidated the critical anatomical components of this memory system. See Below.) One well-studied case (H.M.) had surgery in 1953 to treat severe epilepsy. Most of the hippocampus and much of the surrounding medial temporal lobe cortices were removed bilaterally (the entorhinal cortex and most of the perirhinal cortex). Although the surgery was successful in reducing the frequency of H.M.’s seizures, it resulted in a severe and persistent amnesia. To understand the anatomy of human amnesia, and ultimately the anatomy of normal memory, animal models of human amnesia have been established in the monkey (Mishkin 1982, Squire and Zola-Morgan 1983) ( Figure 1) and in the rodent.
Following lesions of the bilateral medial temporal lobe or medial diencephalon, memory impairment is exhibited on the same kinds of tasks of new learning ability that human amnesic patients fail. The same animals succeed at tasks of motor skill learning, and they also do well at learning pattern discriminations, which share with motor skills the factors of incremental learning and repetition over many trials. Systematic and cumulative work in monkeys, using the animal model, succeeded in identifying the system of structures in the medial temporal lobe essential for memory (Squire and Zola-Morgan 1991). The important structures are the hippocampal region (hippocampus proper, dentate gyrus, and subicular complex) and adjacent, anatomically related structures (entorhinal cortex, perirhinal cortex, and parahippocampal cortex). Damage limited to the hippocampal region causes significant memory impairment, and damage to the adjacent cortex increases the severity of memory impairment. It is also important to note that the discovery that larger medial temporal lobe lesions produce more severe amnesia than smaller lesions is compatible with the idea that structures within the medial temporal lobe might make qualitatively different contributions to memory function. The amygdala, although critical for aspects of emotional learning (Davis, 1994; LeDoux, 1996) and for the enhancement of declarative memory by emotion (Adolphs et al., 1997), is not a part of the declarative memory system itself. The consistency between the available neuroanatomical information from humans and the findings from monkeys have considerably illuminated the description of memory impairment and its anatomical basis. These lines of work have also made it possible to pursue parallel studies in simpler animals like rats and mice. As a result, one can now study memory in rodents and have some confidence that what one learns will be relevant to the human condition. Another important brain area for memory is the diencephalon. The structures important for memory include the mediodorsal thalamic nucleus, the anterior thalamic nucleus, the internal medullary lamina, the mammillary nuclei, and the mammillo-thalamic tract. Monkeys with medial thalamic lesions exhibit an amnesic disorder, and monkeys with mammillary nuclei exhibit a modest impairment. Because diencephalic amnesia resembles medial temporal lobe amnesia in the pattern of sparing and loss, these two regions likely form an anatomically linked, functional system.
The nature of neurological amnesia
Impairment in declarative memory
It is important to appreciate that amnesic patients are not impaired at all kinds of long-term memory. The major distinction is between declarative and nondeclarative memory. Declarative memory is the kind of memory impaired in amnesia, and it refers to the capacity to remember the facts and events of everyday life. It is the kind of memory that is meant when the term “memory” is used in ordinary language. Declarative memory can be brought to mind as a conscious recollection. Declarative memory provides a way to model the external world and in this sense it is either true or false. The stored representations are flexible in that they are accessible to multiple response systems and can guide successful performance under a wide range of test conditions. Lastly, declarative memory is especially suited for rapid learning and for forming and maintaining associations between arbitrarily different kinds of material (for example, learning to associate two different words).
Amnesia is characterized by profound difficulty in new learning, and this impairment is referred to as anterograde amnesia. In the circumscribed form of amnesia (when damage is restricted to the medial temporal lobe or midline diencephalon), patients have intact intellectual functions and intact perceptual functions, even on difficult tests that require the ability to discriminate between highly similar images containing overlapping features (Levy et al., 2005; Shrager et al., 2006). In some patients with memory impairment, visual perceptual deficits have been described (Lee et al., 2005a,b). In these cases, damage might extend laterally, beyond the medial temporal lobe, and quantitative brain measurements are needed in order to understand what underlies these deficits.
Amnesic patients are impaired on tasks of new learning, regardless whether memory is tested by free (unaided) recall, recognition (e.g., presenting an item and asking whether it was previously encountered or not), or cued recall (e.g., asking for recall of an item when a hint is provided). For instance, in a standard test of free recall, participants are read a short prose passage containing 21 segments. They are then asked to recall the passage immediately and after a 12-minute delay. Amnesic patients with damage to the medial temporal lobe do well at immediate recall but are impaired at the delay, usually recalling zero segments (Squire and Shimamura, 1986). Amnesic patients are also impaired on recognition tests where a list of words is presented, and participants try to decide (yes or no) if each word had been presented in a recent study list (Squire and Shimamura, 1986). Similarly, recognition is impaired when items are presented together, and participants decide which of the items had been presented previously (Bayley et al., 2008). Lastly, in a cued recall task, individuals study a list of word pairs, such as ARMY-TABLE. During test, they are presented with one word from each pair (ARMY), and they are asked to recall the word that was paired with it (TABLE). Amnesic patients are impaired on this task as well.
The memory impairment in amnesia involves both difficulty in learning factual information (semantic memory) as well as difficulty in learning about specific episodes and events that occurred in a certain time and place (episodic memory). The term semantic memory is often used to describe declarative memory for organized world knowledge (Tulving, 1983). In recalling this type of information, one need not remember any particular past event. One needs only to know about certain facts. Episodic memory, by contrast, is autobiographical memory for the events of one’s life (Tulving, 1983). Unlike semantic memory, episodic memory includes spatial and temporal landmarks that identify the particular time and place when an event occurred. Both episodic memory and semantic memory are declarative. The memory deficit in amnesia is global, in that it encompasses all sensory modalities (e.g., visual, auditory, olfactory). That is, memory is impaired regardless of the kind of material that is presented and the sensory modality in which information is presented.
In addition to impaired new learning, damage to the medial temporal lobe also impairs memories that were acquired before the onset of amnesia. This type of memory loss is referred to as retrograde amnesia. Retrograde amnesia is usually temporally graded. That is, information acquired in the distant past (remote memory) is spared relative to more recent memory (Ribot, 1881). The extent of retrograde amnesia can be relatively short and encompass only one or two years, or it can be more extensive and cover decades. Even when retrograde amnesia is extensive, memories for the facts and events of childhood and adolescence are typically intact. Indeed, severely amnesic patients can produce detailed autobiographical narratives of their early life (Bayley et al., 2003; 2005b; Kirwan et al., 2008).
The severity and extent of retrograde amnesia is determined by the locus and extent of damage. Patients with restricted hippocampal damage have limited retrograde amnesia covering a few years prior to the onset of amnesia. Patients with large medial temporal lobe damage have extensive retrograde amnesia covering decades. When damage occurs beyond the brain system that supports declarative memory, which can result from conditions such as encephalitis and head trauma, retrograde amnesia sometimes can be ungraded, extensive, and include the facts and events of early life. Such extensive deficits can occur from damage to cortical storage sites or cortical regions that are critical for retrieval.
Because the study of human retrograde amnesia is based almost entirely on findings from retrospective tests, the clearest data about retrograde amnesia gradients come from studies using experimental animals, where the delay between initial learning and occurrence of damage can be manipulated directly. Findings from such studies make three important points. First, temporal gradients of retrograde amnesia can occur within long-term memory. Second, after a lesion, remote memory can be even better than recent memory. Third, lesions can spare old weak memories while disrupting strong recent ones, showing that it is the age of the memory that is critical.
The sparing of remote memory relative to more recent memory illustrates that the brain regions damaged in amnesia are not the permanent repositories of long-term memory. Instead, memories undergo a process of reorganization and consolidation after learning, during which time the neocortex becomes more important. During the process of consolidation, memories are vulnerable if there is damage to the medial temporal lobe or diencephalon. After sufficient time has passed, storage and retrieval of memory no longer require the participation of these brain structures. Memory is at that point supported by neocortex, such that memory is intact even when there is damage to the medial temporal lobe. The areas of neocortex important for long-term memory are thought to be the same regions that were initially involved in the processing and analysis of what was to be learned. Thus, the neocortex is always important, but the structures of the medial temporal lobe and diencephalon are also important during initial learning and during consolidation.
Since the discovery of hippocampal place cells in the rodent (O’Keefe and Dostrovsky, 1971), an influential idea has been that the hippocampus creates and uses spatial maps and that its predominant function is to support spatial memory (O’Keefe and Nadel, 1978). As a result, discussions of amnesia have focused especially on the status of spatial memory. It is clear that spatial memory is impaired in human amnesia. Amnesic patients are impaired on tests that assess their knowledge of the spatial layout of an environment, and they are also impaired when asked to navigate to a destination in a virtual environment (Maguire et al., 1996; Spiers et al., 2000). Similarly, the noted patient H.M. was impaired at recalling object locations (Smith, 1988). It is also clear, though, that amnesic patients are impaired on memory tests that have no obvious spatial component, such as recall or recognition of items (Squire and Shimamura, 1986). Furthermore, formal experiments that directly compared spatial and nonspatial memory in amnesic patients showed that the patients were similarly impaired on tests of spatial memory and tests of nonspatial memory. There was not a special difficulty with tests of spatial memory (Cave and Squire, 1991).
As is the case with nonspatial memory, remote spatial knowledge is intact. One well-studied patient with large medial temporal lobe lesions and severe amnesia (E.P.) was able to mentally navigate the neighborhood where he grew up, use alternate and novel routes to describe how to travel from one place to another, and point correctly to locations in the neighborhood while imagining himself oriented at some other location (Teng and Squire, 1999). These findings show that the medial temporal lobe is not needed for the long-term storage of spatial knowledge and does not maintain a spatial layout of learned environments that is necessary for successful navigation. Accordingly, the available data support the view that the hippocampus and related medial temporal lobe structures are involved in learning new facts and events, both spatial and nonspatial. Further, these structures are not repositories of long-term memory, either spatial or nonspatial.
Spared learning and memory abilities
It is a striking feature of amnesia that many kinds of learning and memory are spared. Memory is not a unitary faculty of the mind but is composed of many parts that depend on different brain systems. Amnesia impairs only declarative memory and spares immediate and working memory as well as nondeclarative memory.
Immediate and working memory
Amnesic patients have intact immediate memory. Immediate memory refers to what can be held actively in mind beginning the moment that information is received. It is the information that forms the focus of current attention and that occupies the current stream of thought. The capacity of immediate memory is quite limited. This type of memory is reflected, for example, in the ability to repeat back a short string of digits. Intact immediate memory explains why amnesic patients can carry on a conversation and appear quite normal to the casual observer. Indeed, if the amount of material to be remembered is not too large (e.g., a 3-digit number), then patients can remember the material for minutes, or as long as they can hold it in mind by rehearsal. One would say in this case that the patients have carried the contents of immediate memory forward by engaging in explicit rehearsal. This rehearsal-based activity is referred to as working memory, and it is independent of the medial temporal lobe system. The difficulty for amnesic patients arises when an amount of information must be recalled that exceeds immediate memory capacity or when information must be recalled after a distraction-filled interval or after a long delay. In these situations, when the capacity of working memory is exceeded, patients will remember fewer items than their healthy counterparts.
Nondeclarative memorycerebellum, and on processes intrinsic to neocortex ( Figure 2).
Motor and perceptual skills
One can learn how to ride a bicycle but be unable to describe what has been learned, at least not in the same sense that one might recall riding a bicycle on a particular day with a friend. This is because the learning of motor skills is largely nondeclarative, and it has been shown that amnesic patients can learn skills at a normal rate. In one experiment, amnesic patients and control participants performed a serial reaction-time task, where they responded successively to a sequence of four illuminated spatial locations. The task was to press one of four keys as rapidly as possible as soon as the location above each key was illuminated. The amnesic patients learned the sequence, as did the normal participants, as measured by their decreased reaction times to press a key when it was illuminated. When the sequence was changed, the reaction times increased for both groups. Strikingly, the amnesic patients had little or no declarative knowledge of the sequence, though they had learned it normally (Reber and Squire, 1994).
Perceptual skills are also often intact in amnesic patients. These include such skills as reading mirror-reversed print and searching a display quickly to find a hidden letter. In formal experiments, amnesic patients acquired perceptual skills at the same rate as individuals with intact memory, even though the patients did not remember what items were encountered during the task and sometimes did not remember the task itself. For example, amnesic patients learned to read mirror-reversed words at a normal rate and then retained the skill for months. Yet, after they had finished the mirror-reading task, they could not remember the words that they had read and in some cases could not remember that they had ever practiced the mirror-reading skill on a previous occasion (Cohen and Squire, 1980).
Priming refers to an improved ability to identify or produce a word or other stimulus as a result of its prior presentation. The first encounter with an item results in a representation of that item, and that representation then allows it to be processed more efficiently than items that were not encountered recently. For example, suppose that a line drawing of a dog, hammer, and airplane, are presented in succession, with the instruction to name each item as quickly as possible. Typically, about 800 milliseconds are needed to produce each name aloud. If in a later test these same pictures are presented intermixed with new drawings, the new drawings will still require about 800 milliseconds to name, but now the dog, hammer, and airplane are named about 100 milliseconds more quickly. The improved naming time occurs independently of whether one remembers having seen the items earlier. Amnesic patients exhibit this effect at full strength, despite having poor declarative memory of seeing the items earlier.
Adaptation-level effects refer to the finding that experience with one set of stimuli influences how a second set of stimuli is perceived (e.g., their heaviness or size). For example, experience with light-weighted objects subsequently causes other objects to be judged as heavier than they would be if the light-weighted objects had not been presented. Amnesic patients show this effect to the same degree as healthy individuals, even when they experience the first set of objects with one hand and then make judgments with the other hand. However, they have difficulty remembering their prior experience accurately (Benzing and Squire, 1989).
Classical conditioning refers to the development of an association between a previously neutral stimulus (CS) and an unconditioned stimulus (US) and is a quintessential example of nondeclarative memory. One of the best-studied examples of classical conditioning in humans is delay conditioning of the eyeblink response. It is reflexive and automatic and depends solely on structures below the forebrain, including the cerebellum and associated brainstem circuitry (Thompson and Krupa, 1994). In a typical conditioning procedure, a tone repeatedly precedes a mild airpuff directed to the eye. The tone overlaps the airpuff, and they terminate together. After a number of pairings, the tone comes to elicit an eyeblink in anticipation of the airpuff. Amnesic patients acquire and retain the tone-airpuff association at the same rate as healthy individuals. In both groups, awareness of the temporal contingency between the tone and the airpuff is unrelated to successful conditioning.
In trace conditioning, a brief interval of 500-1000 msec is interposed between the CS and the US. This form of conditioning requires the hippocampus (McGlinchey-Berroth et al., 1997). Formal experiments suggest that trace conditioning is hippocampus-dependent because it requires the acquisition and retention of conscious knowledge during the course of the conditioning session (Clark and Squire, 1998). Only those who became aware of the CS-US relationship acquired differential trace conditioning. There was a correlation between measures of awareness taken after the conditioning and trace conditioning performance itself, whereas there was no correlation between awareness and conditioning performance on a delay conditioning task.
Habit learning refers to the gradual acquisition of associations between stimuli and responses, such as learning to make one choice rather than another. Habit learning depends on the neostriatum (basal ganglia). Many tasks can be acquired either declaratively, through memorization, or nondeclaratively as a habit. For example, healthy individuals will solve many trial-and-error learning tasks quickly by simply engaging declarative memory and memorizing which responses are correct. In this circumstance, amnesic patients are disadvantaged. However, tasks can also be constructed that defeat memorization strategies, for example, by making the outcomes on each trial probabilistic. In such a case, amnesic patients and healthy individuals learn at the same gradual rate (Knowlton et al., 1996). It is also true that severely amnesic patients who have no capacity for declarative memory can gradually acquire trial-and-error tasks, even when the task can be learned declaratively by healthy individuals. In this case they succeed by engaging habit memory. This situation is nicely illustrated by the 8-pair concurrent discrimination task, which requires individuals to learn the correct object in each of eight object pairs. Healthy individuals can learn all eight pairs in one or two test sessions. Severely amnesic patients acquire this same task over many weeks, even though at the start of each session they cannot describe the task, the instructions, or the objects. It is known that this task is acquired at a normal (slow) rate by monkeys with medial temporal lobe lesions, and that monkeys with lesions of the neostriatum (basal ganglia) are impaired. Thus, humans appear to have a robust capacity for habit learning that operates outside of awareness and independently of the medial temporal lobe structures that are damaged in amnesia (Bayley et al., 2005a).
Functional amnesia, also known as dissociative amnesia, is a dissociative psychiatric disorder that involves alterations in consciousness and identity. Although no particular brain structure or brain system is implicated in functional amnesia, the cause of the disorder must be due to abnormal brain function of some kind. Its presentation varies considerably from individual to individual, but in most cases functional amnesia is preceded by physical or emotional trauma and occurs in association with some prior psychiatric history (Kritchevsky et al., 2004). Often, the patient is admitted to the hospital in a confused or frightened state. Memory for the past is lost, especially autobiographical memory and even personal identity. Semantic or factual information about the world is often preserved, though factual information about the patient’s life may be unavailable. Despite profound impairment in the ability to recall information about the past, the ability to learn new information is usually intact. The disorder sometimes clears and the lost memories return. Sometimes, the disorder lasts longer, and sizable pieces of the past remain unavailable.
- Adolphs, R., Cahill, L., Schul, R., and Babinsky, R. 1997. Impaired declarative memory for emotional material following bilateral amygdala damage in humans. Learn Mem 4(3), 291-300.
- Bayley, P. J., Hopkins, R. O., and Squire, L. R. 2003. Successful recollection of remote autobiographical memories by amnesic patients with medial temporal lobe lesions. Neuron 38(1), 135-144.
- Bayley, P. J., Frascino, J. C., & Squire, L. R. 2005a. Robust habit learning in the absence of awareness and independent of the medial temporal lobe. Nature 436, 550-553.
- Bayley, P. J., Gold, J. J., Hopkins, R. O., and Squire, L. R. 2005b. The neuroanatomy of remote memory. Neuron 46(5), 799-810.
- Bayley, P. J., Wixted, J. T., Hopkins, R. O., and Squire, L. R. 2008. Yes/no recognition, forced-choice recognition, and the human hippocampus. J Cogn Neurosci 20(3), 505-512.
- Benzing, W. C. and Squire, L. R. 1989. Preserved learning and memory in amnesia: intact adaptation-level effects and learning of stereoscopic depth. Behav Neurosci. 103(3), 538-547.
- Cave, C. B., Squire, L. R. 1991 Equivalent impairment of spatial and nonspatial memory following damage to the human hippocampus. Hippocampus 1, 329-340.
- Clark, R. E. and Squire, L. R. 1998. Classical conditioning and brain systems: the role of awareness. Science 280(5360), 77-81.
- Cohen, N. J. and Squire, L. R. 1980. Preserved learning and retention of pattern-analyzing skill in amnesia: dissociation of knowing how and knowing that. Science. 210(4466), 207-210.
- Conroy, M. A., Hopkins, R. O., and Squire, L. R. 2005. On the contribution of perceptual fluency and priming to recognition memory. Cogn Affect Behav Neurosci 5(1), 14-20.
- Damasio, A. R., Eslinger, P. J., Damasio, H., Van Hoesen, G. W., and Cornell, S. 1985. Multimodal amnesic syndrome following bilateral temporal and basal forebrain damage. Arch Neurol. 2(3), 252-259.
- Davis, M. 1994. The role of the amygdala in emotional learning. Int. Rev. Neurobiol. 36, 225-266.
- Hamann, S. B. and Squire, L. R. 1995. On the acquisition of new declarative knowledge in amnesia. Behav. Neurosci. 109, 1027-1044.
- Hamann, S. B. and Squire, L. R. 1997. Intact perceptual memory in the absence of conscious memory. Behav Neurosci. 111, 850-854.
- Janowsky, J. S., Shimamura, A. P., and Squire, L. R. 1989. Source memory impairment in patients with frontal lobe lesions. Neuropsychologia. 27(8), 1043-1056.
- Kim, J. J., Clark, R. E., and Thompson, R. F. 1995. Hippocampectomy impairs the memory of recently, but not remotely, acquired trace eyeblink conditioned responses. Behav Neurosci. 109(2), 195-203.
- Kirwan, C. B., Bayley, P. J., Galvan, V. V., and Squire, L. R. 2008. Detailed recollection of remote autobiographical memory after damage to the medial temporal lobe. Proc Natl Acad Sci U S A 105(7), 2676-80.
- Knowlton, B. J., Ramus, S. J., and Squire, L. R. 1992. Intact artificial grammar learning in amnesia: Dissociation of classification learning and explicit memory for specific instances. Psychol Sci. 3, 172-179.
- Knowlton, B. J. and Squire, L. R. 1993. The learning of categories: parallel brain systems for item memory and category knowledge. Science. 262(5140), 1747-1749.
- Knowlton, B. J. and Squire, L. R. 1994. The information acquired during artificial grammar learning. J Exp Psychol Learn Mem Cogn. 20(1), 79-91.
- Knowlton, B. J. and Squire, L. R. 1995. Remembering and knowing: two different expressions of declarative memory. J Exp Psychol Learn Mem Cogn. 21(3), 699-710.
- Knowlton, B. J. and Squire, L. R. 1996. Artificial grammar learning depends on implicit acquisition of both abstract and exemplar-specific information. J Exp Psychol Learn Mem Cogn. 22(1), 169-181.
- Kritchevsky, M., Chang, J., and Squire, L. R. 2004. Functional amnesia: clinical description and neuropsychological profile of 10 cases. Learn Mem 11(2): 213-26.
- LeDoux, J.E. 1996. The Emotional Brain. New York, Simon and Schuster.
- Lee, A. C., Buckley, M. J., Pegman, S. J., Spiers, H., Scahill, V. L., Gaffan, D., Bussey, T. J., Davies, R. R., Kapur, N., Hodges, J. R., and Graham, K. S. 2005a. Specialization in the medial temporal lobe for processing of objects and scenes. Hippocampus 15(6): 782-97.
- Lee, A. C., Bussey, T. J., Murray, E. A., Saksida, L. M., Epstein, R. A., Kapur, N., Hodges, J. R., and Graham, K. S. 2005b. Perceptual deficits in amnesia: challenging the medial temporal lobe 'mnemonic' view. Neuropsychologia 43(1): 1-11.
- Levy, D. A., Hopkins, R. O., and Squire, L. R. 2004. Impaired odor recognition memory in patients with hippocampal lesions. Learn Mem. 11(6), 794-796.
- Levy, D. A., Shrager, Y., and Squire, L. R. 2005. Intact visual discrimination of complex and feature-ambiguous stimuli in the absence of perirhinal cortex. Learn Mem. 12(1), 61-66.
- Maguire, E. A., Burke, T., Phillips, J., Staunton, H. 1996. Topographical disorientation following unilateral temporal lobe lesions in humans. Neuropsychologia 34, 993-1001.
- Manns, J. R., Hopkins, R. O., Reed J. M., Kitchener, E. G., and Squire, L. R. 2003. Recognition memory and the human hippocampus. Neuron 37(1), 171-180.
- McGlinchey-Berroth, R., Carrillo, M. C., Gabrieli, J. D., Brawn, C. M., and Disterhoft, J. F. 1997. Impaired trace eyeblink conditioning in bilateral, medial-temporal lobe amnesia. Behav Neurosci 111(5), 873-882.
- Mishkin, M. 1982. A memory system in the monkey. Philos Trans R Soc Lond B Biol Sci 298, 83-95.
- Nosofsky, R. M. and Zaki, S. R. 1998. Dissociation between categorization and recognition in amnesic and normal individuals: An exemplar-based interpretation. Psychol Sci 9, 247-255.
- O’Keefe, J. and Dostrovsky, J. 1971. The hippocampus as a spatial map. Preliminary evidence from unit activity in the freely-moving rat. Brain Res. 34(1), 171-175.
- O'Keefe J, Nadel L (1978) The Hippocampus as a Cognitive Map. Oxford, UK: Oxford Univ. Press.
- Parkin, A. J. and Walter, B. M. 1992. Recollective experience, normal aging, and frontal dysfunction. Psychol. Aging 7, 290-298.
- Reber, P. J. and Squire, L. R. 1994. Parallel brain systems for learning with and without awareness. Learn Mem. 1(4), 217-229.
- Reed, J. M. and Squire, L. R. 1998. Retrograde amnesia for facts and events: findings from four new cases. J Neurosci. 18(10), 3943-3954.
- Rempel-Clower, N. L, Zola, S. M., Squire, L. R., and Amaral, D. G. 1996. Three cases of enduring memory impairment after bilateral damage limited to the hippocampal formation. J Neurosci. 16(16), 5233-5255.
- Ribot, T. 1881. Les Maladies de la Memoire [English translation: Diseases of Memory]. New York: Appleton-Century-Crofts.
- Rutishauser, U., Mamelak, A. N., and Schuman, E. M. 2006. Single-trial learning of novel stimuli by individual neurons of the human hippocampus-amygdala complex. Neuron 49(6), 805-813.
- Schacter, D. L. and Tulving, E. 1994. Memory Systems. Cambridge, MA: MIT Press.
- Shrager, Y., Gold, J. J., Hopkins, R. O., and Squire, L. R. 2006. Intact visual perception in memory-impaired patients with medial temporal lobe lesions. J Neurosci. 26(8), 2235-2240.
- Smith, M. L. 1988. Recall of spatial location by the amnesic patient H.M. Brain Cogn 7, 178-183.
- Spiers, H. J., Burgess, N., Maguire, E. A., Baxendale, S. A., Hartley, T., Thompson, P. J., O'Keefe, J. 2001b. Unilateral temporal lobectomy patients show lateralized topographical and episodic memory deficits in a virtual town. Brain 124, 2476-2489.
- Squire, L. R. 1992. Memory and the hippocampus: a synthesis from findings with rats, monkeys, and humans. Psychol. Rev 99(2), 195-231.
- Squire, L. R. and Shimamura, A. P. 1986. Characterizing amnesic patients for neurobehavioral study. Behav Neurosci. 100(6), 866-77.
- Squire, L. R. and Zola, S. M. 1998. Episodic memory, semantic memory, and amnesia. Hippocampus 8, 205-211.
- Squire, L. R. and Zola-Morgan, S. 1983. The neurology of memory: The case for correspondence between the findings for human and nonhuman primate. In: The Physiological Basis of Memory (ed. J. A. Deutsch). Academic Press, New York.
- Squire, L. R. and Zola-Morgan, S. 1991. The medial temporal lobe memory system. Science 253, 1380-1386.
- Stefanacci, L., Buffalo, E. A., Schmolck, H., and Squire, L. R. 2000. Profound amnesia after damage to the medial temporal lobe: A neuroanatomical and neuropsychological profile of patient E. P. J Neurosci. 20(18), 7024-7036.
- Suzuki, W.A. and Amaral, D.G. 1994a. Perirhinal and parahippocampal cortices of the Macaque monkey: Cortical afferents. J. Comp. Neurol. 350, 497-533.
- Suzuki, W.A. and Amaral, D.G. 1994b. Topographic organization of the reciprocal connections between the monkey entorhinal cortex and the perirhinal and parahippocampal cortices. J. Neurosci. 14, 1856-1877.
- Teng, E. and Squire, L. R. 1999. Memory for places learned long ago is intact after hippocampal damage. Nature 400, 675-677.
- Thompson, R. F. and Krupa, D. J. 1994. Organization of memory traces in the mammalian brain. Annu Rev Neurosci. 17, 519-549.
- Tulving, E. 1983. Elements of Episodic Memory. Oxford University Press, New York.
- Tulving, E. 1985. How many memory systems are there? Am. Psychol. 40, 385-398.
- Wais, P. E., Wixted, J. T., Hopkins, R. O., and Squire, L. R. 2006. The hippocampus supports both the recollection and the familiarity components of recognition memory. Neuron 49, 459-466.
- Zola-Morgan, S., Squire, L. R., and Amaral, D. G. 1986. Human amnesia and the medial temporal region: enduring memory impairment following a bilateral lesion limited to field CA1 of the hippocampus.J Neurosci. 6(10), 2950-2967.
- Peter Redgrave (2007) Basal ganglia. Scholarpedia, 2(6):1825.
- Valentino Braitenberg (2007) Brain. Scholarpedia, 2(11):2918.
- Nestor A. Schmajuk (2008) Classical conditioning. Scholarpedia, 3(3):2316.
- Mark Aronoff (2007) Language. Scholarpedia, 2(5):3175.
- Howard Eichenbaum (2008) Memory. Scholarpedia, 3(3):1747.
- S. Murray Sherman (2006) Thalamus. Scholarpedia, 1(9):1583. | <urn:uuid:51274f95-1568-47af-ae8b-e01494326449> | {
"date": "2019-10-21T05:03:11",
"dump": "CC-MAIN-2019-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987756350.80/warc/CC-MAIN-20191021043233-20191021070733-00296.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.8851836919784546,
"score": 3.609375,
"token_count": 8279,
"url": "http://scholarpedia.org/article/Amnesia"
} |
It's easy at first glance to envision the Caribbean islands as all being the same sunny, sandy vacation destinations, but they are different in as many ways as they are similar. Just as political and economic factors determine the personality of the islands, so do various landforms that may, or may not, be shared from island to island.
The islands of the Caribbean, like all other islands, have water that surrounds them on every side. Individual islands and groups of islands belong to various nations. Puerto Rico and the American Virgin Islands belong to the United States. Among the territories of Britain are Bermuda and the British Virgin Islands. The islands range widely in size, with Cuba being the largest, followed by Hispaniola and Jamaica. Many of the smaller islands are uninhabited. Some of the uninhabited islands, such as the Isla de Ratones just off the shore of Puerto Rico, are available for day trips and are reached by ferries, boats or kayaks.
The larger islands of the Caribbean have enough land space to support rivers. Hispaniola has four primary rivers: Yaque del Norte, Yuna River, Yaque del Sur and the Artibonite River. Cuba's important rivers are the Rio Cauto, which is the longest, Rio Almendares and Rio Yurimi. Smaller rivers contribute to these three main rivers. The Grande de Arecibo is Puerto Rico's longest river. This river, along with several others such as the Cibuco, Loiza and La Plata, run north. One river runs westward: the Grande de Añasco. The Bahamas have no rivers.
Many of the Caribbean islands have mountainous areas. Most of Puerto Rico's mountains are located on the island's interior. Jamaica has mountains that cover almost all of its surface. The Dry Harbour Mountains run east-west along the northern part of the island, with the Blue Mountains on the east. Cuba is not a very mountainous country, but it has a few mountain ranges. The Sierra Maestra in Cuba are on the easternmost diagonal coastline, and the Cordillera de Guaniguanico is on the west coast. The Grupo Guamuhaya are in the center and south-center of the island.
Because the Caribbean consists of islands, one of the prevalent landforms is the beach. Temperate weather and access to sand and surf have helped the Caribbean islands thrive as tourist destinations. The sand on the beaches of the Caribbean come in many different colors. Beaches in Bermuda and the Bahamas are known for their pink sands, formed by the shells of certain tiny sea creatures. Some Caribbean beaches are the result of volcanic matter breaking down. Black sand is not as smooth as typical white, tan or pink sand, and many black sand beaches are pebble beaches. These beaches are found on Montserrat, St. Kitts and Granada, among others.
Salt flats form when salt water evaporates, leaving the salt behind on large, flat areas of land. The salt flats of Puerto Rico, located in the Cabo Rojo region in the southwest part of the island, are protected as a part of the U.S. Fish and Wildlife Service's Cabo Rojo National Wildlife Refuge. Another place in the Caribbean that has salt flats is the small island of Bonaire. The salt is harvested from the flats that lie on the southern tip of the island, but a portion of the salt flats of Bonaire is set aside as a sanctuary for flamingos. The central coastline is the tourist area of Bonaire which is a frequent port of call for Caribbean cruise ships.
- World Atlas: Caribbean Landforms
- Cabo Rojo Puerto Rico: Isla de Ratones
- Hispaniola.com: Geography of the Dominican Republic
- Havana-Guide.com: Major Rivers in Cuba
- Welcome to Puerto Rico: Geography of Puerto Rico
- The Bahamas Guide: Bahamas Geography and Geology
- Sol Boricua: Geography of Puerto Rico
- Geography and History of Jamaica: Physical Features
- Hicuba.com: Geography of Cuba
- Caribbean Magazine: Types of Caribbean Beaches--White, Pink and Black
- DC Productions/Photodisc/Getty Images | <urn:uuid:a241520e-3432-491a-bc33-eadc0c1d869b> | {
"date": "2013-05-21T10:34:37",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9369907975196838,
"score": 3.578125,
"token_count": 869,
"url": "http://traveltips.usatoday.com/physical-landforms-caribbean-islands-105228.html"
} |
5 THINGS TO KNOW ABOUT PIAZZA DUOMO (CATHEDRAL SQUARE) IN MILAN
Piazza Duomo (Cathedral square) is the heart of Milan, and it is dominated by the majestic cathedral of the archdiocese which is the symbol of the capital of Lombardy as well the symbol of Italy: Milan Cathedral.
The cathedral facade is the representation of a very long story and looks at the square rectangular in shape that covers an area of 17,000 square feet. There are many stories to be told.
5 things to know about Piazza Duomo (Cathedral Square)
The square was planned by the Italian architect and engineer Giuseppe Mengoni in 1865.
This place has always been the central point of the city of Milan and the meeting point for the inhabitants to celebrate the most important events.
In 500 BC on the area of the square there was probably a sacred wood, which was the religious and political centre during the Celtic domination.
READ ALSO: Biscione as a symbol of Milan.
During the Roman age in the area was erected a temple dedicated to Minerva and there converged the network of roads of the City.
In the 4th century AD the Basilica Nuova was built on this area, later named Basilica of Santa Tecla, and in the 9th century AD the Basilica of Santa Maria Maggiore was added.
In 1330, under the domination of Azzone Visconti, the space between the two buildings was named “Arengo”.
In 1458 the Basilica of Santa Tecla was demolished in order to build the Cathedral and to create the square.
In 1528 the new parvise of the Cathedral and the pavement of the square were made. In 1990 the line number 3 of the subway was activated. | <urn:uuid:fce39e8d-7f34-499c-8afa-7d3fb2c41a7d> | {
"date": "2019-09-23T03:27:15",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575860.37/warc/CC-MAIN-20190923022706-20190923044706-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9737240076065063,
"score": 3.015625,
"token_count": 384,
"url": "https://www.theartpostblog.com/en/cathedral-square-in-milan/"
} |
Safety at Work
Make electrical safety part of your job. Learn about the electrical hazards in your work environment. Be aware of the risks of electrical shocks and burns. Be prepared for emergencies. Share your knowledge with everyone you work with.
Practice safe limits. Electricity can arc or “jump” from a wire to a conducting object like a ladder or a truck. Remember to keep away:
- 3 metres (10 feet) between you and an overhead power line
- 6 metres (20 feet) between you and a high voltage transmission line
A downed power line is deadly.
Play it safe, even if a line doesn’t appear to be live.
- 10 metres (30 feet). That’s the minimum distance you want to keep between you and the fallen wire.
- Stay inside your vehicle. If a line falls on your vehicle, stay put. Once you step outside and touch ground, you could become a path for electricity.
- Hop and Shuffle. If you have to leave the vehicle (fire, gas leak), hop out clear of the vehicle and land on both feet. Keep your feet close together and shuffle until you clear the vehicle by 10 metres (30 feet). Do not touch the vehicle and the ground at the same time or the electricity may run through your body.
Look down carefully!
Before you dig, check to be sure you know where the cables and service lines are. NTPC and the gas company should be contacted prior to digging.
Look up and live!
Make sure you and your crew are aware of all overhead lines. Ladders, cranes and pipes are all good conductors of electricity, and remember:
You hold their lives in your hands.
If you’re a supervisor or foreman, take full responsibility for your crew. Get proper safety training, and make sure your crew also has the critical safety training that they need to go home to their families. | <urn:uuid:248caeb1-4da6-4163-bb75-0667885176e3> | {
"date": "2019-04-24T12:35:19",
"dump": "CC-MAIN-2019-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578641278.80/warc/CC-MAIN-20190424114453-20190424140453-00176.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9442974925041199,
"score": 3.671875,
"token_count": 399,
"url": "http://www.ntpc.com/safety-outages/safety/safety-at-work"
} |
|MadSci Network: Physics|
The particles in clouds do fall, as other particles do, but very,very slowly. Air currents often move them upward far quicker than they could fall. Usually, the particles in clouds are ice rather than liquid water. And they are very small. The size range is roughly between 1 and 10 microns (i.e. millionths of a metre.) In American units, that means between about 40 millionths of an inch, and one 2000th of an inch. When a small object falls, it reaches a "terminal velocity" when the forces of gravity are matched by the forces of air resistance (which get larger as the object moves faster). Physicists have a formula for calculating this terminal velocity for spherical particles, which would work for falling water droplets. Ice crystals are not spherical. They would fall a fair bit slower than the formula says -- probably about half as fast. Here are the results the formula gives: particle diameter 10 micron: terminal velocity 2.8 mm/s = 10 m/hr particle diameter 1 micron: terminal velocity 0.028 mm/s = 10 cm/hr Let us now compare these velocities with the velocities of typical air currents. Suppose air blows in off the sea at a steady 5 knots (a gentle breeze -- roughly 2.5 m/s) and climbs to pass over a range of hills 2000 ft high (600 m) during the first 5 miles (8 km). Even if the flow is perfectly steady, with no turbulence, the air must rise at an average velocity of around 190 mm/s, or 670 m/hr. So it is not hard to see that what really keeps cloud particles up is air currents. The speeds involved in even gentle air currents are way larger than the speeds at which cloud particles could settle downward. Clouds are always changing. Sometimes air currents go downward rather than upward. If you think about it, they would have to, or we would lose all of our air down at the surface! What usually happens when the air currents carry cloud particles downward is that the air gets warmer, and the ice crystals simply evaporate. And of course the other thing that can happen in clouds is that the particles can join together to form larger ice crystal masses or water droplets, which fall faster, and produce snow or rain showers.
Try the links in the MadSci Library for more information on Physics. | <urn:uuid:9b4ff9cc-2596-4fc7-87e4-8f1e4c59cf09> | {
"date": "2014-11-27T14:10:17",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931008720.43/warc/CC-MAIN-20141125155648-00188-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9430182576179504,
"score": 4.09375,
"token_count": 496,
"url": "http://www.madsci.org/posts/archives/feb99/917571193.Ph.r.html"
} |
Summary: Aarhus researchers provide new insight into the workings of the calcium pump.
Source: Aarhus University.
Our cells are capable of moving energy and material around to the places where they are required, and ensuring that the body works properly. But how do the cells do this in real time from the perspective of the individual molecule? A Danish research team has succeeded in revealing basic insights into this previously unknown world by carrying out the first experiments that show the workings of an individual molecule in the molecular ‘motor’ – known as the calcium pump. The discovery has just been published in the leading journal Nature.
It has now become possible for the first time to look into the body’s absolutely fundamental ‘engine compartment’, and observe the ion pumps that activate cell transport and signal systems. This function ensures that you and me, and all other biological creatures on Earth, work the way they should with the right biomolecular mechanisms.
The calcium pump may not look like a lot. Each pump only measures a few nanometres, millionths of millimetres, in each direction, and sits in the cell membranes of our bodies. But despite its diminutive size, it is crucial to life. This pump is the reason that our muscles can contract, and that neurons can send signals. If the tiny pump stopped working, cells would stop communicating. Without it, we could neither move nor think. This is why cells use so much of their energy – about a fourth of the body’s fuel known as ATP – to keep the pumps running.
There are many things that we still do not know about the structure and function of this vital pump. Knowledge about the pump is essential to understand the energy balance and other important functions in the body.
A Danish research group has just published a new study that for the first time shows how the pump functions at the level of a single molecule, and how it ensures that ions are pumped in the right direction. In other words, how the pump works as a molecular one-way street. The discovery has just been published in the prestigious journal Nature.
“This work represents the next step of a profound and important quest to understand the pump’s atomic structure and function. We are now one step closer to understanding how the ion pumps ensure the functions of the cells. We have characterised how it pumps ions out of the cell at an unprecedented level of detail. The importance of such basic knowledge of biophysical processes can only be underestimated. It will have a great influence on our understanding of the processes of life and, in time, on disease treatment,” says Professor Poul Nissen, head of both the PUMPkin Centre of Excellence and the DANDRITE neuroscience centre. Professor Nissen is one of the world’s leading experts on this family of pumps and a co-author of the paper.
The molecular backstop
To some extent, the story began in the 1950s, when Professor Jens Christian Skou did his pioneering work at Aarhus University, which uncovered the pumping functions in our cells. The calcium pump is a close cousin of the sodium-potassium pump Skou worked on, and they use a similar pumping mechanism. Skou’s work earned him a Nobel Prize in chemistry in 1997. Since then, numerous researchers have dedicated their working lives to uncovering the mechanism and function of these pumps, including many at the Centre for Membrane Pumps in Cells and Disease – PUMPkin – at Aarhus University.
A key insight in the new publication concerns the one-way nature of the ion transport. Previously, it was assumed that the one-way nature of the pumping arose in the cleavage of the energy-rich molecule ATP. The hypothesis was that when ATP was cleaved, the pump could not backtrack and reform ATP. That turned out to be far from true.
“We have identified a new closed state in the pumping cycle, which the pump can only enter if the calcium ion comes from the intracellular fluids and the pump has cleaved ATP. It cannot reach this state if the ion comes from the cell’s surroundings. When calcium is released from this state, it is the ‘point of no return’. This is the mechanism that explains that the pump works as a pump and not just a passive channel.
This really unique insight is based on highly advanced experiments. These experiments enable us to directly see the pump doing its job for the first time,” explains Postdoctoral Fellow Mateusz Dyla, who is the first author of the new paper, and who has been the main driving force of the project that started out as his PhD project.
The calcium pump needs energy, which it gets from cleaving a molecule of ATP as explained earlier. The energy released is converted into the work of the pump. This explains how large concentration gradients build up between the inside and the outside of the cell. The concentration difference can be more than 10,000-fold, and this large difference is essential to the communication between cells such as in nerve signalling.
Smoke and mirrors
The reason the experiments are so complex is pretty clear. The pump is so small that it cannot be imaged directly in a light microscope. So far, and with great difficulty, researchers have created molecular models of stable states of the pump using a technique known as X-ray crystallography. This is analogous to a stop motion movie. The scientists have jokingly referred to their visualisation of the pump’s movement between these states as ‘Pump Fiction’. The new study, which has been five years in the making, moves the visualisation from stopped motion to live images of the functional movements of the pump. Technical improvement in microscopic techniques has allowed the new state to be observed.
The technique used is known as single-molecule fluorescence spectroscopy and uses a phenomenon known as Förster resonance energy transfer, in short FRET. Here, intense laser light and ultra-sensitive cameras are combined to allow the direct observation of a single molecule through the tiny amount of light each molecule emits.
The research group has taken advantage of a calcium pump from the bacterium Listeria, which was prepared for the studies through protein engineering. The engineering of the protein alone took several years to complete.
In the FRET experiments, two dye molecules are attached to the protein, which is then illuminated by laser light. One dye, the donor, will absorb the laser light and either emit it with a characteristic colour, or alternatively transfer the energy to the other dye, the acceptor. This will then emit light with another colour. Light will thus be emitted from the two dyes, and scientists can measure the distance between the two dyes by measuring how much light is emitted of each colour. Because the dyes have been carefully inserted in two specific positions in the pump, these distance changes track the pumping movements of the pump.
The single molecule technique is what has enabled the new discoveries, as explained by Fellow Magnus Kjærgaard, Aarhus Institute of Advanced Studies (AIAS), who also contributed to the discovery.
“We have moved from ‘Pump Fiction’ to ‘Pump Live’. Previously, we always recorded the signals from many molecules at the same time, which blurs the movements. Using single-molecule FRET techniques, we can focus on one molecule at a time, which allows us to observe the structural changes directly. This provides us with a video of the pump in action with fewer gaps. Our Pump Fiction movie initially got its name because we knew the transitions between the different states of the cycle were fictional, and that there could be additional insights hiding in the gaps between the known states. We have now demonstrated this in abundance, and at the same time revealed critical new insights into how the pump works,” he says.
Besides adding to our knowledge of the basic processes of life, the understanding of these pumps may also have practical applications. Mutations in the pumps can cause defects in brain cells, and this can cause neurological disorders such as migraine, temporary paralysis or neurodegenerative disorders.
The mechanisms of these ion pumps are thus pivotal to understanding the errors in the pump, especially with a view to developing new drugs targeting the pump.
“We haven’t yet reached the stage where we can transfer our ion pump research into treatment of disease! However, the new insights have led to ideas that may be used to develop treatment of defects in neuronal signalling, for example. But this is work for the future. Right now, there is every reason to celebrate the revelation of the intimate details of one of the most important enzymes of life. The work has built on great collaborations here at the university, and with researchers in the USA. We have already started new exciting collaborations that will allow us to take the next steps,” says Professor Poul Nissen.
Source: Poul Nissen – Aarhus University
Publisher: Organized by NeuroscienceNews.com.
Image Source: NeuroscienceNews.com image is credited to Mateusz Dyla.
Original Research: Abstract for “Dynamics of P-type ATPase transport revealed by single-molecule FRET” by Mateusz Dyla, Daniel S. Terry, Magnus Kjaergaard, Thomas L.-M. Sørensen, Jacob Lauwring Andersen, Jens Peter Andersen, Charlotte Rohde Knudsen, Roger B. Altman, Poul Nissen & Scott C. Blanchard in Nature. Published online November 8 2017 doi:10.1038/nature24296
Dynamics of P-type ATPase transport revealed by single-molecule FRET
Phosphorylation-type (P-type) ATPases are ubiquitous primary transporters that pump cations across cell membranes through the formation and breakdown of a phosphoenzyme intermediate. Structural investigations suggest that the transport mechanism is defined by conformational changes in the cytoplasmic domains of the protein that are allosterically coupled to transmembrane helices so as to expose ion binding sites to alternate sides of the membrane. Here, we have used single-molecule fluorescence resonance energy transfer to directly observe conformational changes associated with the functional transitions in the Listeria monocytogenes Ca2+-ATPase (LMCA1), an orthologue of eukaryotic Ca2+-ATPases. We identify key intermediates with no known crystal structures and show that Ca2+ efflux by LMCA1 is rate-limited by phosphoenzyme formation. The transport process involves reversible steps and an irreversible step that follows release of ADP and extracellular release of Ca2+.
“Dynamics of P-type ATPase transport revealed by single-molecule FRET” by Mateusz Dyla, Daniel S. Terry, Magnus Kjaergaard, Thomas L.-M. Sørensen, Jacob Lauwring Andersen, Jens Peter Andersen, Charlotte Rohde Knudsen, Roger B. Altman, Poul Nissen & Scott C. Blanchard in Nature. Published online November 8 2017 doi:10.1038/nature24296 | <urn:uuid:9794c47b-adbb-44de-bce5-a077f04ea6dc> | {
"date": "2019-05-25T23:21:54",
"dump": "CC-MAIN-2019-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258453.85/warc/CC-MAIN-20190525224929-20190526010929-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9392727017402649,
"score": 3.4375,
"token_count": 2338,
"url": "https://neurosciencenews.com/calcium-pump-7909/"
} |
Here is a great tool that is underused and not understood by many. The STRETCH command will allow you to adjust/move objects like a window or door opening without having to do much effort on your part. The hard part is remembering that it requires a “crossing window.”
A crossing window is the green selection window that starts at the right side and finishes at the left (as seen below)
Here’s the rule to remember how this tool works. Whatever is completely within the crossing window gets moved. And whatever the crossing window is crossing gets stretched.
If you keep ortho on or are able to snap to something in the desired direction, you will find this tool to be very helpful.
- STR <enter> or STRETCH <enter> to start the STRETCH command
- Select objects using and crossing window (default) or CP <enter> for crossing polygon.
- You can also use C <enter> to make a crossing window in any direction as explained HERE.
- Specify a base point anywhere along the direction in which you you plan on stretching.
- move your cursor in the direction and either click to end or type in a distance.
The following animation shows how you can use any number of selection methods when selecting objects as I have mentioned before HERE. Notice that When prompted to “select objects” I enter C <enter> and then now matter which direction the window I make, it is always a “crossing window” (green window). | <urn:uuid:86d57f46-17fa-4adc-a797-1b15fead5685> | {
"date": "2015-04-28T14:24:23",
"dump": "CC-MAIN-2015-18",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246661675.84/warc/CC-MAIN-20150417045741-00193-ip-10-235-10-82.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9266241788864136,
"score": 2.9375,
"token_count": 317,
"url": "http://autocadtips1.com/2011/06/06/how-to-use-stretch/"
} |
Welcome, once again, to Tarquinius W. Peterson’s Fantastical Guide to the World of Art.
This week we are uncovering …
One of the most amazing frescoes ever, clings to the wall of Milan’s Church and Convent of Santa Maria delle Grazie. The original monastery, built for Dominican Monks over six-hundred years ago, includes a large refectory for dining. Leonardo Da Vinci, a successful street artist of the time, broke in to the monastery, just after its completion, and daubed graffiti into the fresh plaster to one end of the monk’s dining room.
Monks attending a late night prayer session dedicated to patron Saint Augustine of Hippo caught Leonardo multi-coloured handed. The penance given to Da Vinci included painting a food themed mural over his “Leonardo era qui!” tag.
Such it is, The Last Supper is old. We can see thus in the aged quality of the plaster, but this is not strictly a true account. Put simply, in creating the original artwork, Leon–as I prefer to call him–blended the composition through clouds of smoke and cheap stucco.
To establish a painting of such realism, Leon, according to an entry in his diary, created a live smokey ‘tabernacle’ atmosphere. The last supper took place around the Easter holiday and as we know it can be cold that time of year. Two other facts to note: open fires were fashionable in this period, fresh wood has tendency to smoke. With the dry wood burnt during the winter, damp wood produced thick smoke and drew several of the disciples to complain about the smokey stench of their togas during the sitting.
The green wood became a problem as painting proceeded, the more wood burnt, the greener the stockpile became, the smokier the atmosphere.
Being well known in science and technology circles, Da Vinci was a skilled inventor and creator of wizard-like creative inventions; the helicopter for example. Sketches of Leon’s copter are found all over the web, what isn’t realised is why it exists.
With the smoke getting out of control, hams and cheeses underwent a second process of smoking in the refectory. De Vinci required an extractor fan. One afternoon, following a particularly smokey session, the artist, painter, inventor, scientist, God-fearing man, disappeared into a local olive grove, only to reappear with his whirly “aerial screw” fan, which he paid a servant to fly around the dining room to keep the smoke away from the disciples.
Before we look in further detail, can I just confirm that the arched shape to the centre beneath the table is a stone arch to a store at the back of the refectory. It is not the top of the painter’s chair, as those less-educated have maintained.
Critic Jean-Luc Cliffman once incorrectly stated that the painter, Leon obv’s, included the back of his own chair, because when he took a pinhole camera picture for reference and stood behind it to get the whole table in the picture, he forgot to move his chair. Naturally, Jesus wasn’t too pleased because the chair masked his feet, and he took a pedicure especially for the painting.
Painting alfresco on a wall is never an easy task, however, this was an inside fresco, but just as hard. Imagine painting a monster picture in a refectory with bench seating and long tables in the way, not to mention tempting food aromas.
With these complexities considered, it is no surprise Leon d’Vee–as I now prefer to call him–misjudged the composition height. As a result the tablecloth draped lower than the apex of the door archway. A sketch, added to the indented archway panel, portrayed Jesus’s feet and ankles, but the appendages appeared too distorted from the best seats in the feasting congregation, and later omitted. Jesus mouthed obscenities, following the absence of his freshly pedicured tootsies. Mary of Bethany, pissed-off too, hurled abuse as she’d spent that morning polishing Jesus’s nails with expensive nard.
The archway is still in existence, but the doorway remains blocked-up, under order of a past abbot following one Christmas (see below for more fantastical art guidance). The door lead to a cellar where a small sect of silent monks attended to brewing the monastery’s own brand grappa. It is believed distilling equipment sits gathering dust in the sealed chamber.
The importance of alcohol to the celibate monks, lead to the survival of Leonardo’s masterpiece. In protecting the house Grappa, the cellar and wall above were reinforced to deter looters. Chemical fumes from the distilling process permeated the low-grade plaster too, forming a protective layer. In August 1943, an Anglo-American bomb landed on the Refectory destroying all but the rear frescoed distillery entrance wall.
A UNESCO World Heritage site, monastery church and convent of Santa Maria delle Grazie, owned by Roman Catholic monks. One Christmas Day, several centuries ago, these same monks, became embroiled in an almighty food fight. Consequence of said food fight resulted in the deformation of The Last Supper, engraining gravy, cranberry sauce, and brandy butter into the fresco; adding to its misty quality. Needless to state the abbot was unpleased and put a stop to Christmas dinners in the Refectory. All religious dining celebration now takes place in Carluccios, in Milan’s City centre.
Returning to the world famous wall painting we note Jesus in the centre of the table with six of his disciples to either side. These sixes, split into groups of three. Not the usual row of thirteen forward-facing diners. Earlier painters assembled the disciples regimentally, Leon d’Vee chose a new way to represent the well-known supper and broke a relaxed real life rendition of restaurant dining with drama.
Leftover bread and crackers from the cheese board scatter the table as the gathering awaits coffee (thick Arabian type, not your oat-milk latte). Many believe, as Leon intimated to the Dominicans, that the Last Supper painting depicts the moment after Jesus told his disciples one of them would betray him. In reality, the scene shows the mayhem following Jesus announcing that he’d already paid the bill with his Amex, on the quiet, when he last went to the loo.
The disciples, annoyed that once again their messiah had beaten them to it, just because daddy is all-seeing and gave his son the nod when it’s the best time to pay unseen. A furious St Peter is shouting in the ear of St John, above the noise of the ruckus, and pushing Judas Iscariot aside. It had long been noted that Judas was a skinflint and never put his hand in his pocket for anybody. Whilst his fellow apostles are arguing over Jesus’s generosity the stingy Iscariot performs a sleight of fingers grab at the Tyrian silver shekels on the tipping plate. The nonchalant Judas catches the eye of Jesus which influences the prophet’s later speech to the twelve men.
“… the one who has dipped his hand into the tips bowl with me will betray me …”
Other points to note in the painting is Da Vinci’s skills of perspective. Blacked out windows to both side walls and intricate checkered ceiling are in perfect alignment with the vanishing point of the refectory when seated at the head of the centre table, a place reserved for the abbot. On my last visit, whilst enjoying a rather splendid ciborium of cracker breads and cheese, I observed these pleasing lines and angles. Sadly, I’ve no selfie of this, as photography is forbidden in the convent’s refectory (even for Tarquinius W. Peterson), so you’ll have to take my word for it.
Leonardo was also a stickler for health and safety detail; seen by the inclusion of the white alarm box featured to the left of the rear fire door. This door often remained open, propped by several empty wine pitchers, to clear the atmospheric green wood smoke. | <urn:uuid:4e98b320-89df-4153-87db-7cb23e292772> | {
"date": "2019-11-14T18:37:44",
"dump": "CC-MAIN-2019-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668534.60/warc/CC-MAIN-20191114182304-20191114210304-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9578445553779602,
"score": 2.875,
"token_count": 1788,
"url": "http://www.melucas.uk/2018/04/18/tarquinius-w-petersons-fantastical-guide-to-the-last-supper-by-leonardo-da-vinci/"
} |
The Canadian Special Interest Group is one of our Society's successful affinity groups for sharing the trials and triumphs of genealogical research. We hope that they and others will find useful information in our new handbook entitled French-Canadian Sources : a guide for genealogists. Published by Ancestry Publishing in 2002, the book has 8 co-authors who were members of the publications committee of the French-Canadian/Acadian Genealogists of Wisconsin.
Introductory chapters cover material unique to French Canada, including a brief history of the settlement of the area, and a timeline of events. In the chapter on French-Canadian naming patterns we learn about the persistent use of the maiden name for married women in official records (useful!), and the unique practice of the "dit name" (alternative surname). The final introductory chapter covers the feudal system as practiced in New France.
Secondary sources constitute the largest section of the book, but there are also several chapters on primary sources. Also covered are specialized areas of research: the Filles du Roi (marriageable women subsidized by Louis XIV to settle in the new world), fur-trading ancestors, military records, and internet genealogy.
Lastly, much helpful information can be found in the Appendices, including maps, vocabularies, census descriptions, and useful addresses. There is also an index.
This book is now available in the section of the CCGS Library on Handbooks, and we hope you'll come have a look at it. | <urn:uuid:6694bd88-73fe-4908-85a8-1fe3a56f637a> | {
"date": "2014-07-24T19:21:23",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997890773.86/warc/CC-MAIN-20140722025810-00096-ip-10-33-131-23.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9384337067604065,
"score": 2.84375,
"token_count": 308,
"url": "http://blog.capecodgensoc.org/2013/09/french-canadian-sources-featured.html"
} |
The conference inspired building industry professionals to lead the built environment toward Net Zero Carbon, equipping them with the latest tools, resources and programs to help firms thrive in a Net Zero Carbon future. It was attended by architects, structural engineers, contractors, real estate developers, materials manufacturers and policy makers. Learn more.
Global CO² emissions are currently at 37 gigatons (billions of tons) per year. Our historic challenge is to dramatically reduce carbon emissions to zero by 2050, in order to keep global warming to less than 1.5 degrees centigrade compared with pre-industrial historical averages. However, all the commitments made by every country are not nearly enough to avert climate disaster. To hold global warming to less than 1.5 degrees, we must also remove CO2 from the atmosphere and oceans.
We believe CO² is a valuable resource that presents an opportunity for innovative businesses to profit and contribute to solving the climate challenge. Business, city and state leaders, and citizens can chart a path to a “carbon smart” future. | <urn:uuid:54d46add-ca2f-4579-bbfb-4922a78d1446> | {
"date": "2019-11-20T14:43:56",
"dump": "CC-MAIN-2019-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670559.66/warc/CC-MAIN-20191120134617-20191120162617-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9415091276168823,
"score": 2.671875,
"token_count": 212,
"url": "http://carboninnovations.net/"
} |
As you go through the decision-making process, you will be gathering information to learn more about options for your child. From what you already know — and from the information provided in this CD-ROM — you might be ready to start making some decisions.
However, many families will want to learn more about their options. In fact, you will probably continue to gather information as your child grows, your family changes, and the choices of options and what professionals recommend changes over the years.
Think of gathering information as a journey.
Good places to start include:
- Support networks.
- Adults who are deaf and hard-of-hearing.
- Other parents.
- Spending time with children who are deaf or hard-of-hearing and their families.
- Reading information on the Internet, books, pamphlets, and brochures.
Never forget — you make the final decision on what is right for your child.
- Page last reviewed: July 28, 2015
- Page last updated: July 28, 2015
- Content source: | <urn:uuid:f3df44a2-4380-4f70-bbc4-9aedebdd440f> | {
"date": "2015-12-01T07:42:28",
"dump": "CC-MAIN-2015-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398465089.29/warc/CC-MAIN-20151124205425-00354-ip-10-71-132-137.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9318104386329651,
"score": 2.84375,
"token_count": 217,
"url": "http://www.cdc.gov/ncbddd/hearingloss/parentsguide/decision/gathering-info.html"
} |
What Do Nesting Birds Do With All That Poop?
I don’t know how many of you ever raised chickens but the old joke went something like this. Question: “Hey, do you know what that white stuff is on the top of the chicken shit?” Answer: “Nope.” Reply: “That’s chicken shit too!”
Well, as it turns out, it’s really uric acid (the white part of the poop). The dark part is undigested feces.
So how do nesting birds deal with the excrement of all those nestlings until they fledge? Here’s a photo of a House Finch nest before the eggs hatch and the hatchlings start producing fecal sacs.
The fecal sac is a translucent gelatinous membrane containing the excrement of nestling birds. In the case of the House Finch, both the male and female eat the fecal sacs of young as they are voided until about the fifth day after hatching. At this point the chicks begin depositing the fecal sacs on the rim of the nest.
Fecal sac removal then stops and fecal sacs accumulate around the rim of the nest, creating a characteristic appearance1 as you can see in this photo of the chicks nearing fledging age.
This system would never due for cavity nesting birds. The nest would be heavily soiled inside the cavity long before the birds were ready to fledge.
You see, nestlings defecate immediately after being fed. Cavity nesting birds bring food into the nest, then wait a moment and grab the fecal sac as it emerges from the nestling. They carry the enclosed excrement out from the nest and discard it some distance away.
This is what they look like, demonstrated nicely by this male Western Bluebird.
Other nesting birds, most notably raptors, herons and some sea birds, defecate by backing up to the edge of the nest and producing a projectile poop squirt like this Red-tailed Hawk nestling.
This adult Bald Eagle politely moves away from the nest to defecate (watch out).
But the eaglet is just beginning to branch. Besides, it has just been fed. So I will leave you with the classic way to tell if a nesting bird is getting ready to poop. They will back up to the edge of the nest and let ‘er rip!
References: 1 Birds of North America Online
Poop Week is a week of themed posts on 10,000 Birds that cover the intersection of poop and birding, a fertile precinct if there ever was one. Rather than just discuss the horror of a pigeon dropping droppings on someone’s head we decided to really get down the nitty-gritty details of poop, to the point where it is squishing up between our toes. Not only is Poop Week a fascinating way to spend seven days in June it is also a serious attempt to elevate the level of discourse in the bird blogosphere, which, as we all have no choice but to admit, is far too low. Enjoy, and make sure to wipe up afterwards, would you? | <urn:uuid:a89d8a40-8bd3-4230-9b92-1e8249d8a333> | {
"date": "2018-07-21T15:44:23",
"dump": "CC-MAIN-2018-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592636.68/warc/CC-MAIN-20180721145209-20180721165209-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9356988072395325,
"score": 3,
"token_count": 663,
"url": "http://www.10000birds.com/what-do-nesting-birds-do-with-all-that-poop.htm?replytocom=125763"
} |
Stroke has traditionally been thought to strike older individuals. But now a new study in the Lancet medical journal shows a growing number of young and middle-aged adults being affected by it.
Researchers from around the globe analyzed data from 1990 to 2012, specifically looking at new cases of stroke, its prevalence, and deaths.
What they found is that over the past 20 years, strokes have increased 25% in people ages twenty to 64. In addition, 83,000 people affected by stroke each year were 20 years old and younger.
Zeroing in on the numbers further, the study shows that people ages 74 years old and younger make up 62% of stroke deaths, and 72% of stroke related illnesses and disability.
Startling as these numbers may sound, Dr. Magdy Selim, neurologist at Beth Israel Deaconess Medical Center, says they are not surprising. “This study confirms what other studies in the US have shown,” he says. “The rates of stroke in relatively young people across the US have risen over the past 10-20 years. This study shows that this is also the case all around the world at a global level."
Dr. Selim explains there are many factors behind the increase. “To name a few: better diagnosis of stroke in several parts of the world; increased prevalence of obesity, increased use of recreational drugs, and increased social stressors,” he says.
If the current trend continues, researchers expect the amount of disability, illness and premature death caused by strokes to double worldwide by 2030.
So are there steps younger adults can take to prevent stroke before it strikes?
“Maintaining a healthy lifestyle is key,” says Dr. Selim. “This includes eating well, regular exercise, and avoiding smoking and illegal drug use", he says.
He also urges people of all ages to be aware of important risk factors for stroke, such as high blood pressure, diabetes, and high cholesterol and make sure they are being treated appropriately. | <urn:uuid:cbe51f68-5608-47da-825b-280d8152ddbd> | {
"date": "2015-01-27T18:59:54",
"dump": "CC-MAIN-2015-06",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115856041.43/warc/CC-MAIN-20150124161056-00027-ip-10-180-212-252.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9689961671829224,
"score": 3.078125,
"token_count": 415,
"url": "http://m.wcvb.com/beth-israel/stroke-strikes-growing-number-of-young-adults/22667200"
} |
Prambanan is a ninth century Hindu temple compound in Central Java, Indonesia, dedicated to the Trimurti, the expression of God as the Creator (Brahma), the Sustainer (Vishnu) and the Destroyer (Shiva). The temple compound is located approximately 18 km east ofYogyakarta city on the boundary between Yogyakarta and Central Java province.
The temple, a UNESCO World Heritage Site, is the largest Hindu temple in Indonesia, and is one of the largest Hindu temples in south-east Asia. It is characterised by its tall and pointed architecture, typical of Hindu temple architecture, and by the towering 47m high central building inside a large complex of individual temples.
Prambanan is the largest Hindu temple of ancient Java, and the construction of this royal temple was probably started by Rakai Pikatan as the Hindu Sanjaya Dynasty’s answer to the Buddhist Sailendra Dynasty’s Borobudur and Sewu temples nearby. Historians suggest that the construction of Prambanan probably was meant to mark the return of the Hindu Sanjaya Dynasty to power in Central Java after almost a century of Buddhist Sailendra Dynasty domination. Nevertheless, the construction of this massive Hindu temple signifies that the Medangcourt had shifted the focus of its patronage from Mahayana Buddhism to Shivaist Hinduism.
A temple was first built at the site around 850 CE by Rakai Pikatan and expanded extensively by King Lokapala and Balitung Maha Sambu the Sanjaya king of the Mataram Kingdom. According to the Shivagrha inscription of 856 CE, the temple was built to honor Lord Shiva and its original name was Shiva-grha (the House of Shiva) or Shiva-laya (the Realm of Shiva). Indeed, some archaeologists propose that the statue of Shiva in the garbhagriha (central chamber) of the main temple is modelled after King Balitung, serving as a depiction of his deified self after death. The present name Prambanan, was derived from the name of Prambanan village where the temple stood, this name probably being the corrupted Javanesepronunciation of “Para Brahman” (“of the brahmins“), doubtless an echo its heyday when the temple was filled with great numbers of brahmins.
The temple compound was expanded by successive Mataram kings such as Daksa and Tulodong with the addition of hundreds of perwara temples around the chief temple. Prambanan served as the royal temple of the Hindu Kingdom of Mataram, with most of the state’s religious ceremonies and sacrifices being conducted there. At the height of the Mataram kingdom, scholars estimate that hundreds of brahmins with their disciples lived within the outer wall of the temple compound. The urban center and the court of Mataram were located nearby, somewhere in the Prambanan Plain.
In the 930s, the court was shifted to East Java by Mpu Sindok, who established the Isyana Dynasty. An eruption of Mount Merapi volcano, located north of Prambanan in central Java, or a power struggle probably caused the shift. That marked the beginning of the decline of the temple. It was soon abandoned and began to deteriorate.
The temples themselves collapsed during a major earthquake in the 16th century. Although the temple ceased to be an important center of worship, the ruins scattered around the area were still recognizable and known to the local Javanese people in later times. The statues and the ruins become the theme and the inspiration for the Loro Jonggrang folktale. After the division of Mataram Sultanate in 1755, the temple ruins and the Opak River were used to demarcate the boundary between Yogyakarta and Surakarta (Solo) Sultanates.
In 1811 during Britain’s short-lived rule of the Dutch East Indies, Collin Mackenzie, a surveyor in the service of Sir Thomas Stamford Raffles, came upon the temples by chance. Although Sir Thomas subsequently commissioned a full survey of the ruins, they remained neglected for decades, with Dutch residents carting off sculptures as garden ornaments and native villagers using the foundation stones for construction material.
Half-hearted excavations by archaeologists in the 1880s merely facilitated looting. Reconstruction of the compound began in 1918, and proper restoration only in 1930. Efforts at restoration continue to this day. The main building was completed around 1953. Since much of the original stonework has been stolen and reused at remote construction sites, hampering restoration and since a temple can be rebuilt only if at least 75% of the original masonry is available, only the foundations of most of the smaller shrines are now visible with no plans for their reconstruction.
In the early 1990s the government removed the market that had sprung up near the temple and transformed the surrounding villages and rice paddies into an archaeological park. The park covers a large area, from Yogyakarta-Solo main road in the south, encompassing the whole Prambanan complex, the ruins of Lumbung and Bubrah temples, and as far as the Sewu temple compound in the north. In 1992 the Indonesian government created a State-owned Limited Liability Enterprise (PERSERO) of PT Taman Wisata Candi Borobudur, Prambanan, dan Ratu Boko. This enterprise is the authority for the park management of Borobudur Prambanan Ratu Boko and the surrounding region.
The open-air and indoor stages on the west side of the temple right across the Opak river, were built to stage the Ramayana ballet. This traditional Javanese dance is the centuries old dance of the Javanese court, performed every full moon night in the Prambanan temple since the 1960s. Since then, Prambanan has become one of the major archaeological and cultural tourism attractions in Indonesia.
After the reconstruction of the main temples in 1990s, Prambanan once again reclaim its status as an important religious center for Hindurituals and ceremonies in Java. The religious significance revival of Prambanan was due to Balinese and Javanese Hindu communities in Yogyakarta and Central Java that annually perform their sacred ceremonies in Prambanan, such as Galungan, Tawur Kesanga, and Nyepi.
The temple was damaged during the May 2006 Java earthquake. Early photos suggested that although the complex was structurally intact, the damage was significant. Large pieces of debris, including carvings, were scattered over the ground. The temple was closed to visitors until the damage could be fully assessed. Eventually, the head of Yogyakarta Archaeological Conservation Agency stated that it would take months to identify the precise extent of the damage. However, some weeks later in 2006 the site was re-opened for visitors. As of 2009, the interior of most of the temples remains off-limits for safety reasons.
Roro Jonggrang complex
- This information does not take account of damage caused by the 2006 Java earthquake
The Prambanan compound also known as Loro Jonggrang complex, named after the popular legend of Loro Jonggrang. There are 237 temples in this Shivaite temple complex, either big or small. But the majority of them have deteriorated, what is left are only scattered stones. The Prambanan temple complex consists of three zones; first the outer zone, second the middle zone that contains hundreds of small temples, and third the holiest inner zone that contains eight main temples and eight small shrines.
The outer zone is a large space marked by a rectangular wall (destroyed). The original function is unknown; possibilities are that it was a sacred park, or priests’ boarding school (ashram). The supporting buildings for the temple complex were made from organic material; as a consequence no remains occur.
The middle zone consists of four rows of 224 individual small shrines. There are great numbers of these temples, but most of them are still in ruins and only some have been reconstructed. These concentric rows of temples were made in identical design. Each row towards the center is slightly elevated. These shrines are called “Candi Perwara” guardian or complementary temples, the additional buildings of the main temple. Some believed it was offered to the king as a sign of submission. The Perwara are arranged in four rows around the central temples, some believed it has something to do with four castes, made according to the rank of the people allowed to enter them; the row nearest to the central compound was accessible to the priests only, the other three were reserved for the nobles, the knights, and the simple people respectively. While another believed that the four rows of Perwara has nothing to do with four castes, it just simply made as meditation place for priests and as worship place for devotees.
The inner zone or central compound is the holiest among the three zones. Its the square elevated platform surrounded by square stone wall with stone gates on each four cardinal points. This holiest compound is assembled of eight main shrines or candi. The three main shrines, called Trimurti (“three forms”), are dedicated to the three gods: Brahma the Creator, Vishnu the Keeper, andShiva the Destroyer.
The Shiva temple is the tallest and largest structure in Prambanan Loro Jonggrang complex, it measures 47 metres tall and 34 metres wide. The Shiva temple encircled with galleries adorned with bas-reliefs telling the story of Ramayana carved on the inner walls of the balustrades. To follow the story accordingly, visitors must enter from the east side and began to perform pradakshina or circumambulating clockwise. The bas-reliefs of Ramayana continued to Brahma temple galleries.
The Shiva shrine located at the center and contains five chambers, four small chambers in every cardinal direction and one bigger main chamber in central part of the temple. The east chamber connect to central chamber that houses the largest temple in Prambanan, a three meter high statue of Shiva Mahadeva (the Supreme God). The statue bears Lakçana (attributes or symbol) of Shiva such as skull and sickle (crescent) at the crown, and third eye on the forehead, also four hands that holds Shiva’s symbols: a prayer beads, feather duster, and trisula (trident). Some historians believe that the depiction of Shiva as Mahadeva also meant to personify king Balitung as the reincarnation of Shiva. So, when he died, a temple was built to commemorate him as Shiva. The statue of Shiva stands on lotus pad on Yoni pedestal that bears the carving of Nāga serpents on north side of pedestal.
The other three smaller chambers contain statues of Hindu Gods related to Shiva; his consort Durga, the rishi Agastya, and Ganesha, his son. Statue of Agastya occupy the south chamber, the west chamber houses the statue of Ganesha, while the north chamber contains the statue of Durga Mahisasuramardini depicting Durga as the slayer of Bull demon. The shrine of Durga is also called the temple of Lara Jonggrang (Javanese: slender virgin), after a Javanese legend of princess Lara Jonggrang.
Brahma and Vishnu temple
The two other main shrines are that of Vishnu on the north side of Shiva shrine, and the one of Brahma on the south. Both temple facing east and each contain only one large chamber, each dedicated to respected gods; Brahma temple contains the statue of Brahma and Vishnu temple houses the statue of Vishnu. Brahma and Vishnu temple measures 20 metres wide and 33 metres tall.
The bas-reliefs along the balustrades on the gallery around Shiva and Brahma temple depict the Ramayana legend. They illustrate how Sita, the wife of Rama, is abducted by Ravana. The monkey king Hanuman brings his army to help Rama and rescue Sita. This story is also shown by the Ramayana Ballet, regularly performed at full moon at Trimurti open air theatre in west side of the illuminated Prambanan complex. On the balustrades in Vishnu temple there is series of bas-relief depict Krishnayana, the story of lord Krishna.
The other three shrine in front of three main temples is dedicated to vehicle (vahana) of the respective gods – the bull Nandi for Shiva, the sacred swan Hamsa for Brahma, and Vishnu’s Eagle Garuda. Precisely in front of Shiva temple stands Nandi temple which contains a statue of Nandi bull, the vehicle (vahana) of Lord Shiva. Besides it, there is also other statues, the statue of Chandra the god of moon and Surya the god of sun. Chandra stands on his carriage pulled by 10 horses, and the statue of Surya also standing on a carriage pulled by 7 horses.Facing Brahma temple is the temple of Hamsa or Angsa (sacred swan). In the chamber of this temple contains no statue. But it seems likely that there was once a statue of the sacred swan, vehicle of god Brahma. In front of Vishnu temple is the temple dedicated for Garuda, however just like the Hamsa temple, Garuda temple contains no statue. Probably this temple once contains the statue of Garuda, the vehicle of Vishnu. Garuda holds important role for Indonesia, which serves as the national symbol of Indonesia, also to the airline Garuda Indonesia.
Between these row of main temple, on north and south side stands two Candi Apit. Beside these 8 main temples, there’s also 8 smaller shrines; 4 Candi Kelir on four cardinal direction of the entrance, and 4 Candi Patok on four corner.
The architecture of Prambanan temple follows the typical Hindu architecture traditions based on Vastu Shastra. The temple design incorporated mandala temple plan arrangements and also the typical high towering spires of Hindu temples. Prambanan was originally named Shivagrha and dedicated to god Shiva. The temple was designed to mimic Meru, the holy mountain the abode of Hindu gods, and the home of Shiva. The whole temple complex is a model of Hindu universe according to Hindu cosmology and the layers of Loka.
Just like Borobudur, Prambanan also recognize the hierarchy of the temple zones, spanned from the less holy to the holiest realms. Each Hindu and Buddhist concepts has their own terms, but the concept’s essentials is identical. Either the compound site plan (horizontally) or the temple structure (vertically) are consists of three zones:
- Bhurloka (in Buddhism: Kāmadhātu), the lowest realm of common mortals; humans, animals also demons. Where humans still binded by their lust, desire and unholy way of life. The outer courtyard and the foot (base) part of each temples is symbolized the realm ofbhurloka.
- Bhuvarloka (in Buddhism: Rupadhatu), the middle realm of holy people, rishis, ascetics, and lesser gods. People here began to see the light of truth. The middle courtyard and the body of each temples is symbolized the realm of bhuvarloka.
- Svarloka (in Buddhism: Arupadhatu), the highest and holiest realm of gods, also known as svargaloka. The inner courtyard and the roof of each temples is symbolized the realm of svarloka. The roof of the Prambanan temples is adorned and crowned with ratna (sanskrit: jewel). In ancient Java temple architecture, ratna is Hindu counterpart of Buddhist stupa, and served as the temple’s pinnacle.
During the restoration, a well which contains pripih (stone casket) was discovered under the center of the Shiva temple. The main temple has a well of 5.75 m depth in which a stone casket was found on top a pile of charcoal, earth and remains of burned animal bones. Sheets of gold leaves with the inscription Varuna (god of the sea) and Parvata (god of the mountains) were found here. The stone casket contained sheets of copper mixed with charcoal, ashes and earth, 20 coins, jewels, glass, pieces of gold and silver leaves, seashells and 12 gold leaves (5 of which in the shape of a turtle, Nāga serpent, padma, altar and egg). | <urn:uuid:b825dd5b-3c97-47a7-b8f4-78190b5a0148> | {
"date": "2014-08-31T08:13:27",
"dump": "CC-MAIN-2014-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500837094.14/warc/CC-MAIN-20140820021357-00360-ip-10-180-136-8.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9559712409973145,
"score": 3.625,
"token_count": 3496,
"url": "http://worldtourismplace.wordpress.com/2011/07/25/prambanan-temple/"
} |
An isolated mountain hallowed by association with St. Francis of Assisi, situated in the centre of the Tuscan Appenines, and rising about 4000 feet above the valley of the Casentino. Its name (Latin, Alverna) is said to come from the Italian verb vernare , to make cold or freeze. On 8 May, 1213, La Verna was given to St. Francis by Count Orlando of Chiusi as a retreat "specially favourable for contemplation ". Thither the siant withdrew in August, 1224, to keep a forty days fast in preparation for Michelmas, and it was while praying on the mountain-side that he received (on or about 14 Sept.) the stigmata. Thenceforth La Verna became sacred ground. Pope Alexander IV took it under his protection. In 1260 a church was consecrated there in presence of St. Bonaventure and several bishops. A few years later the Chapel of the Stigmata was erected, through the munificence of Count Simone of Battifole, near the spot where the miracle took place. An older chapel, S. Maria degli Angeli, which was built 1218 for St. Francis by Orlando, is approached from the sacristy of the Chiesa Maggiore, which was begu in 1348, but not finished until 1459. From the latter church the friars dwelling on La Verna go in solemn procesion twice daily (at 2 P.M. and at midnight) to the Chapel of the Stigmata. On the Feast of the Stigmata (17 Sept.) and on other festivals, large crowds of priests with their people from neighbouring parishes, as well as strangers, visit the mountains, and on sch occasions the friars often accommodate and entertain between 2000 and 3000 pilgrims. The convent was partly destroyed by fire in the fifteenth century; it suffered desecration also during the war of this century. In 1810, and again in 1866, the friars were expelled in consequence of the suppression of religious orders. At present they are in possession of La Verna which belongs, however, to the municipality of Florence.
The Catholic Encyclopedia is the most comprehensive resource on Catholic teaching, history, and information ever gathered in all of human history. This easy-to-search online version was originally printed between 1907 and 1912 in fifteen hard copy volumes.
Designed to present its readers with the full body of Catholic teaching, the Encyclopedia contains not only precise statements of what the Church has defined, but also an impartial record of different views of acknowledged authority on all disputed questions, national, political or factional. In the determination of the truth the most recent and acknowledged scientific methods are employed, and the results of the latest research in theology, philosophy, history, apologetics, archaeology, and other sciences are given careful consideration.
No one who is interested in human history, past and present, can ignore the Catholic Church, either as an institution which has been the central figure in the civilized world for nearly two thousand years, decisively affecting its destinies, religious, literary, scientific, social and political, or as an existing power whose influence and activity extend to every part of the globe. In the past century the Church has grown both extensively and intensively among English-speaking peoples. Their living interests demand that they should have the means of informing themselves about this vast institution, which, whether they are Catholics or not, affects their fortunes and their destiny.
Copyright © Catholic Encyclopedia. Robert Appleton Company New York, NY. Volume 1: 1907; Volume 2: 1907; Volume 3: 1908; Volume 4: 1908; Volume 5: 1909; Volume 6: 1909; Volume 7: 1910; Volume 8: 1910; Volume 9: 1910; Volume 10: 1911; Volume 11: - 1911; Volume 12: - 1911; Volume 13: - 1912; Volume 14: 1912; Volume 15: 1912
Catholic Online Catholic Encyclopedia Digital version Compiled and Copyright © Catholic Online | <urn:uuid:e924420a-0b27-4e43-897a-06239d2635be> | {
"date": "2015-10-08T16:39:20",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737896527.58/warc/CC-MAIN-20151001221816-00132-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9618722200393677,
"score": 3.078125,
"token_count": 822,
"url": "http://www.catholic.org/encyclopedia/view.php?id=11984"
} |
Notes From The Road:
Yellow Mountains of China
In the Yellow Mountains (also known as Huangshan) of Anhui Province, a harmonious way of life flourishes as it has for centuries, unperturbed by the distant din of modern China. When we cycle and hike our way through these serene fields, forests, and villages, we are immersed in the mystique of hidden China, as ephemeral and beautiful as the mist that veils the surrounding peaks on a sunny morning.
Indeed, this is the China that inspired the makers of the film Crouching Tiger, Hidden Dragon, which was shot in several locations in the Yellow Mountains. This is also the origin of the archetypal Chinese mountain vista depicted in prints and brush paintings. Modern artists come here too, to set up studios and soak in the surroundings that have inspired countless generations of artists.
Here are just a few of the ways that the Yellow Mountains bring us in touch with the essential character of China!
A rich and well-preserved history
The Yellow Mountains can lay claim to a founding myth of Chinese civilization. They are thought to be named after the legendary Yellow Emperor, progenitor of the Han Chinese (a sort of analogue to Britain’s King Arthur), who is said to have ascended to heaven from these lofty mountaintops 4,500 years ago. Intervening millennia have brought gentle change through successive dynasties. The region became a vibrant trading centre under the Ming dynasty (1368-1644), and many of the villages date from even earlier. The picturesque village of Xidi, for example, was founded almost 1,000 years ago.
Colourful historical characters such as “Mr. Lu Millionaire”, an entrepreneur who arose from one of these villages in the late Qing dynasty, are revered by the locals. Pictures of ancestors, and shrines to their memory, can be found throughout the villages. Day-to-day life in this area is inextricable from its long history.
Though rooted in centuries-old principles and practices, the locals of the Yellow Mountains enjoy a vibrant and contemporary life. For example, on narrow streets in these villages, one can find interesting shops selling books and local art, among others stocked with more practical daily goods.
Harmony with nature
The landscape of the mountains is rugged and majestic. Rivers rush beneath craggy outcroppings of rock so finely balanced that they look like they were artificially constructed. Weathered stone steps, hewn and dragged into place through hard labour untold years ago, lead us from the valley floors up into airy forests, where birdsong echoes in the shaded sanctuaries between the trees (remember the bamboo forest scene in Crouching Tiger?). We wind our way over the ridge, taking our pick of tiny footpaths that lead off to fantastic destinations.
As we descend into another valley, we find ourselves on the banks of a glassy stream, a favourite of local fishermen, forded every now and then by a perfectly placed stone bridge. We emerge once more into the flat plain, and come across tethered water buffalo, curious about onlookers. Here, intricate irrigation channels quench the thirst of patchwork fields of yellow canola flowers, rice paddies, and fruit orchards. This labour-intensive way of small-scale farming uses the existing landscape to allow a truly sustainable form of agriculture.
Architecture and artistry
Houses in the villages are unchanged since their construction centuries ago, though some interiors bear the scars of Mao’s Cultural Revolution: carved wooden figures on intricate relief friezes have their faces scraped off, a literal “defacing” intended to fulfill the letter, not the spirit, of the Communist Party edict. The beauty of the carvings is undiminished. They depict scenes both realistic and fantastical: in some, dragons swoop down upon cowering swordsmen, while in others, bearded elders converse beneath minutely-detailed cherry trees in a quiet village square.
The houses are laid out according to the Chinese design principles of feng shui (literally, “air and water”). The architecture of the houses channels the elements and energies within, so that all are in concert. Sunlight reflects on large rectangular pools in the generous courtyards. In the alleyways outside, water flows through deep stone channels, sometimes into a central pond in the village centre, sometimes to a nearby river. The footbridges in the villages are works of art in themselves, each with its own character, and one of them featured prominently in the opening shots of Crouching Tiger, Hidden Dragon.
We step out of the courtyard through a round doorway into the heart of the family home: the dining room. A wood-beamed ceiling soars high above the round table, ringed with chairs for a large gathering. The box-shaped chandelier shines a warm but unobtrusive light into the expressive shadows. A great fireplace spans almost an entire wall, with colourful vases and wood-framed tapestries placed with care on the mantle. Higher on the wall, brushwork blessings on tall narrow bands of fabric reach towards heaven and cast an aura over those seated at the table.
The aromas begin to waft to the table as the feast is served, one dish at a time: the fish, shrimp and shellfish from the streams, steamed and fried vegetables grown in the rich soil, along with beef, pork and chicken from nearby pastures and farms. The diverse cuisine of Anhui Province is hearty and healthy, nourishing enough to sustain the local people in their long days of physical labour. And I have to admit, there’s nothing better after a day of biking or hiking through the splendid countryside than to taste its finest expression in every dish, prepared in time-honoured fashion.
Tea and tofu
Local artisans and entrepreneurs thrive, nurtured by this beautiful and isolated region. Ms. Fang Xin Yu is a local producer of fermented tofu who became a national celebrity when she was featured on Chinese cooking shows. We visit her small building, full of bustling workers, where the tofu is produced and aged. Once ready, it is sold to cooks as another delicious staple, which we of course sample while we visit.
Of course, no visit to the Yellow Mountains would be complete without an exploration of the local tea farms, particularly those that produce the Huangshan Maofeng green tea, one of the finest in China. On the rolling slopes, tea farmers cultivate and select the tea with great discernment. The buds and certain leaves are picked only during a short period in springtime, then gently heated and cooled to capture the aromas. Our bike route leads us to a beautiful farm where we walk among the tea bushes to see how tea is cultivated, picked, and prepared. Then, of course, we can relax and enjoy the complex flavours of the final product. Refined by time and care, with a refreshing flavour of fruit and flowers, the tea is redolent of the peaceful yet always surprising region from which it comes. | <urn:uuid:c2f3b22b-adb8-4f59-a013-beefee6b6c19> | {
"date": "2018-09-26T06:47:10",
"dump": "CC-MAIN-2018-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163704.93/warc/CC-MAIN-20180926061824-20180926082224-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9496656060218811,
"score": 2.984375,
"token_count": 1472,
"url": "https://www.butterfield.com/blog/2018/05/16/quintessential-china-yellow-mountains/"
} |
Multiple myeloma is a cancer of plasma cells in the bone marrow that often leads to bone destruction and bone marrow failure.1,2 According to the American Cancer Society, more than 26,800 new cases of multiple myeloma were diagnosed in 2015, and 11,240 deaths were attributed to the disease.3
Representing approximately 1% of all cancers, multiple myeloma is the second most common hematologic malignancy after non-Hodgkin lymphoma.4 The incidence of multiple myeloma is higher among men than among women.1 Individuals aged ≥65 years, those with a family history of multiple myeloma, and those with a personal history of monoclonal gammopathy of undetermined significance are at an increased risk for multiple myeloma.1 Several common complications of multiple myeloma include bone pain, kidney dysfunction, bone loss, impaired immunity, and anemia.5
Although the overall incidence of multiple myeloma continues to increase, the mortality rates associated with this malignancy have declined in the past 20 years.1,6 Specifically, the advent of novel therapeutic options for multiple myeloma, as well as improvements in high-dose therapy and supportive care have contributed to extended survival for this patient population.6
New anticancer drugs and novel combinations have emerged in part as a result of improved understanding of the bone marrow microenvironment and the biology of multiple myeloma.7 Immunomodulators and proteasome inhibitors now represent the cornerstones of initial treatment for multiple myeloma based on their proved ability to enhance the overall response rates and survival.2,7
Because novel agents for multiple myeloma have had a considerable impact on the healthcare budget, understanding their relative cost-effectiveness is important for ensuring efficient use. Overall, 2 recent evaluations of the economics of these new agents in multiple myeloma resulted in similar conclusions.8,9
One of the studies used claims data from more than 2600 US-based patients with multiple myeloma, and found that the 1-year costs of bortezomib-based therapy were similar to the costs of non-novel combinations (approximately $112,000 each), whereas the costs of thalidomide- and lenalidomide-based regimens were significantly higher (approximately $130,500 and $159,200, respectively) than non-novel combinations.8 This study also found that patients taking thalidomide and lenalidomide had higher out-of-pocket costs in light of Medicare Part D’s coverage gap for outpatient drugs.8
The second study modeled the cost-effectiveness of novel agents combined with melphalan and prednisone in patients with newly diagnosed multiple myeloma who were ineligible for a transplantation.9 The researchers concluded that adding bortezomib to melphalan and prednisone was more cost-effective than adding thalidomide or lenalidomide to that regimen.9
Despite strides in the treatment of multiple myeloma, patients will experience disease relapse after initial treatment and multiple lines of therapy are typically required.10
Treatment considerations for patients with relapsed and/or refractory multiple myeloma include the duration of response to previous treatment and the risk for toxicity. Therefore, there is a marked need for additional therapeutic options for this patient population.10
Elotuzumab Second Monoclonal Antibody Approved for Relapsed Multiple Myeloma
On November 30, 2015, the US Food and Drug Administration (FDA) approved elotuzumab (Empliciti; Bristol-Myers Squibb) for use in combination with lenalidomide and dexamethasone for the treatment of patients with multiple myeloma who have received 1 to 3 previous therapies.11
Elotuzumab is the first monoclonal antibody that targets the signaling lymphocytic activation molecule family (SLAMF) 7 protein, and the second monoclonal antibody approved for patients with relapsed multiple myeloma.11 The approval of elotuzumab was based on a 2-year analysis of the ELOQUENT-2 study, a randomized phase 3 clinical trial that showed a 30% improvement in progression-free survival (PFS) when elotuzumab was added to lenalidomide and dexamethasone compared with lenalidomide plus dexamethasone alone.11-13
Richard Pazdur, MD, Director of the FDA’s Office of Hematology and Oncology Products, said, “We are continuing to learn about the ways the immune system interacts with different types of cancer, including multiple myeloma. Today’s approval is the second monoclonal antibody approved to treat patients with multiple myeloma and works with another approved therapy to provide additional benefit.”11
Mechanism of Action
Elotuzumab is a humanized immunoglobulin (Ig) G1 monoclonal antibody that specifically targets the SLAMF7 protein. SLAMF7 is a receptor present on immune cells, including natural killer cells, plasma cells, and specific immune-cell subsets of differentiated cells within the hematopoietic lineage. Elotuzumab is also expressed on multiple myeloma cells regardless of cytogenetic abnormalities.12
Elotuzumab directly activates natural killer cells through the SLAMF7 pathway and Fc receptors on immune cells. Elotuzumab targets SLAMF7 on multiple myeloma cells and facilitates interactions with natural killer cells to mediate the killing of tumor cells through antibody-dependent cellular cytotoxicity.12
Dosing and Administration
The recommended dose of elotuzumab, when given in conjunction with lenalidomide and low-dose dexamethasone, is 10 mg/kg via intravenous infusion weekly for the first 2 cycles and every 2 weeks thereafter until disease progression or until unacceptable toxicity. Treatment with the elotuzumab-based regimen should be continued until disease progression or until unacceptable toxicity.12
Patients should be premedicated with 4 agents, including dexamethasone; an H1 blocker, such as diphenhydramine; an H2 blocker, such as ranitidine; and acetaminophen given 45 to 90 minutes before the elotuzumab infusion.12
Elotuzumab is available in 300-mg and 400-mg vials, each with a postreconstitution dilution of 25 mg/mL.12
Clinical Trials: ELOQUENT-2
The efficacy and safety of elotuzumab were demonstrated in the ELOQUENT-2 study, a multinational, randomized, open-label, phase 3 study comparing elotuzumab plus lenalidomide and low-dose dexamethasone with lenalidomide plus low-dose dexamethasone in patients with multiple myeloma who had received 1 to 3 previous therapies, and who had documented disease progression after their most recent therapy.11-13
A total of 646 patients were randomized to the elotuzumab-based regimen (N = 321) or to lenalidomide plus low-dose dexamethasone alone (N = 325) in 4-week treatment cycles until disease progression or until unacceptable toxicity. Patients randomized to the elotuzumab-based regimen received elotuzumab (10 mg/kg intravenously) weekly for the first 2 cycles, followed by every 2 weeks for subsequent cycles. Tumor response assessments were conducted every 4 weeks.12
The primary efficacy end points in ELOQUENT-2 included progression-free survival as assessed by hazard ratio (HR) and overall response rate as determined by a blinded Independent Review Committee using the European Group for Blood and Marrow Transplantation response criteria.12
The demographic and baseline characteristics were similar between the 2 treatment arms in the ELOQUENT2 trial. The majority of patients had an Eastern Cooperative Oncology Group performance status of 0 or 1 (91%). The patients’ median age was 66 years (range, 37-91 years).12
The majority (75%) of patients enrolled in ELOQUENT-2 had stage I or stage II multiple myeloma according to the International Staging System; 21% of patients had stage III disease. Cytogenetic abnormalities of deletion 17p and t(4;14) were documented in 32% and 9% of patients, respectively.12
Patients received a median of 2 previous therapies, including bortezomib (70%), stem-cell transplantation (55%), melphalan (65%), thalidomide (48%), and lenalidomide (6%).12 Overall, 65% of patients had relapsed multiple myeloma (ie, disease that progressed after more than 60 days from their last therapy), and 35% of patients had disease that was refractory to their previous regimen.12
The PFS and overall response rates were significantly improved in patients with relapsed and/or refractory multiple myeloma who received the elotuzumab-based regimen compared with patients who received lenalidomide plus low-dose dexamethasone alone (Table 1).12
The median PFS was 19.4 months among the elotuzumab-based regimen cohort compared with 14.9 months for the lenalidomide plus dexamethasone group, a significant difference (HR, 0.70; 95% confidence interval, 0.57-0.85; P = .004).12 After 2 years, 41% of patients had PFS in the elotuzumab-based arm, and 27% of patients had PFS in the lenalidomide plus dexamethasone arm.12
The overall response rate in the elotuzumab-based arm was 79% compared with 66% in the lenalidomide plus dexamethasone group, representing a significant difference (P = .002).12
The extended 3-year follow-up data from ELOQUENT-2 demonstrated that the elotuzumab-based regimen delayed the need for subsequent therapy by a median of 1 year compared with lenalidomide plus dexamethasone alone.14,15 The prespecified interim analysis of the overall survival data showed a positive trend in favor of the elotuzumab-based regimen, but the results did not reach significance. Patients in the ELOQUENT-2 trial will continue to be followed.14,15
Patients in the elotuzumab-containing arm of the ELOQUENT-2 study received a median of 19 treatment cycles compared with 14 treatment cycles in the lenalidomide plus dexamethasone group (minimum follow-up, 2 years).12
The proportion of patients who discontinued any component of their treatment regimen because of adverse reactions was similar in both arms: 6.0% for patients in the elotuzumab arm, and 6.3% for patients in the lenalidomide plus dexamethasone arm.12
Serious adverse reactions were reported in 65% of patients who received the elotuzumab-based regimen, and in 57% of patients who received lenalidomide plus dexamethasone.12 The most frequent serious adverse reactions in the elotuzumab arm compared with the lenalidomide plus dexamethasone arm included pneumonia (15% vs 11%, respectively), pyrexia (7% vs 5%), pulmonary embolism (3% in both arms), acute renal failure (3% vs 2%), anemia (3% vs 2%), and respiratory tract infection (3% vs 1%).12
Adverse reactions (all grades) occurring at a frequency of ≥25% in the elotuzumab arm, and ≥5% in patients receiving lenalidomide plus dexamethasone included fatigue or asthenia (62% vs 52%, respectively); diarrhea (47% vs 36%); pyrexia (37% vs 25%); constipation (36% vs 27%); cough, including grouped terms (34% vs 19%); peripheral neuropathy, including grouped terms (27% vs 21%); and nasopharyngitis (25% vs 19%).12
Laboratory abnormalities (grade 3 or 4) that occurred at a frequency of ≥15% in the elotuzumab arm and at a rate of ≥5% more than in patients receiving lenalidomide plus dexamethasone included lymphopenia (77% vs 49%, respectively), leukopenia (32% vs 26%), and hyperglycemia (17% vs 10%).12
Vital sign abnormalities were assessed in the treatment arm cohort in the ELOQUENT-2 study (Table 2). The data reflect the percent of patients with at least 1 on-treatment vital sign abnormality at any time during their course of treatment.12
Elotuzumab has no contraindications.12
Warnings and Precautions
Infusion reactions. Grade 1, 2, or 3 infusion reactions were reported in approximately 10% of patients who received elotuzumab, most often during the first dose. Grade 3 infusion reactions occurred in 1% of patients, and 1% of patients discontinued elotuzumab because of infusion reactions.12
Premedications should be administered before each elotuzumab infusion. If a grade ≥2 infusion reaction occurs, the infusion should be interrupted and medical management should be instituted.12
Infections. Infections were reported in 81% of patients receiving elotuzumab; treatment discontinuations because of infections occurred in 3.5% of patients in the elotuzumab arm. Patients should be monitored for infections.12
Second primary malignancies. Invasive second primary malignancies were reported in 9% of patients receiving elotuzumab. Patients should be monitored for second malignancies.12
Hepatotoxicity. Elevations in liver enzymes consistent with hepatotoxicity were reported in 2.5% receiving elotuzumab. Overall, 6 of 8 patients were able to continue treatment with elotuzumab after their hepatotoxicity had resolved. Elotuzumab should be discontinued if grade ≥3 liver enzymes elevations occur, and can be reinitiated after values return to baseline.12
Interference with determination of complete response. Elotuzumab, a humanized IgG kappa monoclonal antibody, can be detected on serum protein electrophoresis and immunofixation assays used to monitor endogenous M-protein levels. The determination of complete response and disease progression can be affected in patients with IgG kappa myeloma protein.12
Use in Specific Populations
Pregnancy. There are no studies with elotuzumab in pregnant women to inform any drug-associated risks.12
Lactation. Breastfeeding is not recommended while receiving elotuzumab therapy.12
Reproductive potential. Pregnancy testing is required before starting treatment with lenalidomide in women of reproductive potential. There is a risk for fetal harm when elotuzumab is used with lenalidomide, including life-threatening birth defects.12
Pediatric use. The safety and effectiveness of elotuzumab have not been established in pediatric patients.12
Geriatric use. Of the 646 patients in the ELOQUENT-2 trial, 57% were aged ≥65 years.12 No overall differences were observed with elotuzumab between patients aged ≥65 years or <65 years.12
Elotuzumab is the first immunostimulatory monoclonal antibody targeting SLAMF7 to receive FDA approval for the treatment of patients with multiple myeloma who have used previous treatments. When used with lenalidomide and dexamethasone, elotuzumab significantly enhanced PFS and response rates. Many clinical trials are under way to determine the role of elotuzumab in patients with multiple myeloma, including ELOQUENT-1, which is comparing elotuzumab plus lenalidomide and dexamethasone versus lenalidomide plus dexamethasone in patients with newly diagnosed disease, as well as studies of elotuzumab in the relapsed or refractory setting.16 Clinical trials in the latter group are assessing the combination of elotuzumab, pomalidomide, and dexamethasone; and the combination of elotuzumab with nivolumab, a PD-1 inhibitor.16
- National Cancer Institute. A snapshot of myeloma. November 5, 2014. www.cancer.gov/researchandfunding/snapshots/myeloma. Accessed December 15, 2015.
- National Comprehensive Cancer Network. NCCN Clinical Practice Guidelines in Oncology (NCCN Guidelines): multiple myeloma. Version 3.2016. January 15, 2016. www.nccn.org/professionals/physician_gls/pdf/myeloma.pdf. Accessed December 15, 2015.
- American Cancer Society. Multiple myeloma: what are the key statistics about multiple myeloma? Revised January 19, 2016. www.cancer.org/cancer/multiplemyeloma/detailedguide/multiple-myeloma-key-statistics. Accessed December 8, 2015.
- Smith L, McCourt O, Henrich M, et al. Multiple myeloma and physical activity: a scoping review. BMJ Open. 2015;5:e009576. Erratum in: BMJ Open. 2016;6:e009576corr1.
- Mayo Clinic staff. Diseases and conditions: multiple myeloma: treatments and drugs. December 4, 2015. www.mayoclinic.org/diseases-conditions/multiple-myelomabasics/treatment/con-20026607. Accessed December 15, 2015.
- Kumar SK, Rajkumar SV, Dispenzieri A, et al. Improved survival in multiple myeloma and the impact of novel therapies. Blood. 2008;111:2516-2520.
- Andrews SW, Kabrah S, May JE, et al. Multiple myeloma: the bone marrow microenvironment and its relation to treatment. Br J Biomed Sci. 2013;70:110-120.
- Teitelbaum A, Ba-Mancini A, Huang H, Henk HJ. Health care costs and resource utilization, including patient burden, associated with novel-agent-based treatment versus other therapies for multiple myeloma: findings using real-world claims data. Oncologist. 2013;18:37-45.
- Garrison LP Jr, Wang S-T, Huang H, et al. The cost-effectiveness of initial treatment of multiple myeloma in the U.S. with bortezomib plus melphalan and prednisone versus thalidomide plus melphalan and prednisone or lenalidomide plus melphalan and prednisone with continuous lenalidomide maintenance treatment. Oncologist. 2013;18:27-36.
- Munshi NC, Anderson KC. New strategies in the treatment of multiple myeloma. Clin Cancer Res. 2013;19:3337-3344.
- US Food and Drug Administration. FDA approves Empliciti, a new immune-stimulating therapy to treat multiple myeloma. Press release. November 30, 2015. www.fda.gov/NewsEvents/Newsroom/PressAnnouncements/ucm474684.htm. Accessed December 15, 2015.
- Empliciti (elotuzumab) for injection [prescribing information]. Princeton, NJ: Bristol-Myers Squibb Company; November 2015.
- Lonial S, Dimopoulos M, Palumbo A, et al; for the ELOQUENT-2 Investigators. Elotuzumab therapy for relapsed or refractory multiple myeloma. N Engl J Med. 2015;373:621-631.
- Dimopoulos MA, Lonial S, White D, et al. Eloquent-2 update: a phase 3, randomized, open-label study of elotuzumab in combination with lenalidomide/dexamethasone in patients with relapsed/refractory multiple myeloma—3-year safety and efficacy follow-up. Blood. 2015;126. Abstract 28.
- Bristol-Myers Squibb. New longer-term data for Empliciti (elotuzumab) showed a continued progression-free survival benefit in patients with relapsed or refractory multiple myeloma. Press release. December 5, 2015. news.bms.com/press-release/new-longer-term-data-empliciti-elotuzumab-showed-continued-progression-free-survival-b. Accessed December 19, 2015.
- ClinicalTrials.gov. Elotuzumab. Search results. https://clinicaltrials.gov/ct2/results?term=Elotuzumab&Search=Search. Accessed February 16, 2016. | <urn:uuid:2f566083-f715-478b-96b2-c970b539aeda> | {
"date": "2019-09-16T11:07:49",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572517.50/warc/CC-MAIN-20190916100041-20190916122041-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9170689582824707,
"score": 2.703125,
"token_count": 4484,
"url": "http://jhoponline.com/2016-first-annual-oncology-guide-to-new-fda-approvals/16734-empliciti-elotuzumab-first-slamf7-antibody-therapy-approved-for-the-treatment-of-patients-with-previously-treated-multiple-myeloma"
} |
The quotes from Gary Mull pretty much sum up why "hull speed" shouldn't be called "maximum hull speed". Let me just add a bit to why hull speed works as a concept. As a displacement hull moves through the water it creates a wave, which boaters/sailors usually call the "bow wave" or "bow wake". This bow wave initially has a celerity equal to the velocity of the vessel. The celerity of a wave actually slowly increases with time, but we only need to worry about what happens when the wave is first created. The wavelength of a surface wave is proportional the celerity of the wave; the faster the wave, the longer the wavelength. There is actually a fairly complicated formula for this relationship, involving the celerity, the force of gravity, and the density, viscosity, and surface tension of the water. But, since everything is pretty much constant except celerity and wavelength, the whole thing boils down to C = 1.34*sqrt(wavelength).
Now, what exactly does that mean? As the boat moves through the water the wavelength of the bow wave gets longer as the boat moves faster. The first crest is always at the bow, with the next crest being one wavelength aft of the bow. When the speed of the boat (and hence the celerity of the bow wave) increases to the point that the next crest is near the stern of the boat this crest is often called the "quarter wave", but it is really just the second crest of the bow wave; the stern quarter isn't causing the wave, it's being cause by the bow. The velocity at which this crest is right at the stern is called the "hull speed" or HS, and is described simply by substituting HS for C and length at the waterline (LWL) for wavelength in the above equation, to get, HS = 1.34*sqrt(LWL). The important thing here is what happens when the boat is going fast enough (and hence the bow wave has a high enough celerity) that the wave has a wavelength longer than the dynamic waterline of the boat? Now the stern of the boat will no longer be riding on the second crest of the bow wave (or on the quarter wave, if you prefer), and the boat will have to pitch up slightly. This takes a power input to maintain speed and so the power/speed ratio of the boat increases due to this added factor. The power/speed ratio has been increasing with speed all along due to other factors, but now this increased pitch of the hull and the forces generated by the bow having to push "through" more of the initial crest of the bow wave causes a sharp increase in the relationship.
So, it always takes more power (energy/time) to make a boat go faster, but above hull speed the relationship between power and boat speed gets steeper and steeper. This is essentially because above hull speed the boat is forced to climb is own wake. Next time you're in a planing boat you can actually demonstrated this. Give the boat a bit of gas and initially the bow will pitch up, the stern will squat down, and it will feel like the boat is trying to climb out of a hole. Give it enough gas and the boat will "jump" onto a plane and the rules will suddenly change; once the hull is actually planing you can ease the throttle back a bit (lower the power) and stay on the plane fairly easily. But, kill the engine (or go to idle) and the boat will plane for a bit then suddenly slow as it can't maintain a plane anymore and has to crawl up its bow wake, until it gets below hull speed again and more easily glides along as a "true" displacement hull again.
Never forget them. Do something to prevent it from happening again.
Charlotte Bacon, Daniel Barden, Rachel Davino, Olivia Josephine Gay, Ana M. Marquez-Greene, Dylan Hockley, Dawn Hochsprung, Madeleine F. Hsu, Catherine V. Hubbard, Chase Kowalski, Jesse Lewis, James Mattioli , Grace McDonnell, Anne Marie Murphy, Emilie Parker, Jack Pinto, Noah Pozner, Caroline Previdi, Jessica Rekos, Avielle Richman, Lauren Rousseau, Mary Sherlach, Victoria Soto, Benjamin Wheeler, Allison N. Wyatt
Last edited by SlowButSteady; 10-17-2011 at 01:57 AM. | <urn:uuid:4563a006-38ab-4f16-863f-c7659138b60c> | {
"date": "2016-09-28T20:01:04",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661763.18/warc/CC-MAIN-20160924173741-00182-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9520079493522644,
"score": 2.875,
"token_count": 931,
"url": "http://www.sailnet.com/forums/general-discussion-sailing-related/79825-hull-speed-2.html"
} |
Transportation Geography and Network Science/Network formation
- 1 Models of Network Formation
- 2 Preferential Attachment
- 3 Vertex Copying Models
- 4 Network Optimization Models
- 5 Further Reading
- 6 See Also
- 7 References
Models of Network Formation
This section will discuss Models of Network Formation also referred to as “Generative Network Models.” These models offer an explanation to the question of why a network should have a certain set of predetermined parameters (e.g. power-law degree distributions). That is, they model the mechanisms by which networks are created and explore the resultant network structures of certain hypothesized generative mechanisms. “If the structures are similar to those of networks we observe in the real world, it suggests-though does not prove-that similar generative mechanisms may be at work in real networks.” (Newman, 2010)
Many networks are observed to have degree distributions that approximately follow power laws, at least in the tail of the distribution. In the 1970s, Derek Price first proposed a network formation model that explained this observation which was inspired by the work of economist Herbert Simon and statistician Udny Yule (Yule Process). Price expanded Simon’s mathematical explanation of how the “rich-get-richer” (also a power-law distribution) to the network context, calling it “cumulative advantage” (more well known as preferential attachment coined by Barabasi and Albert in 1999).
Price specifically applied this process to a model of a citation network. In this model, papers are published continually (added one by one), yet not necessarily at a constant rate and newer papers cite older papers. The edges in this network are directional and are created but never destroyed. The central assumption of Price’s model is that a newly appearing paper cites previous ones chosen at random with probability proportional to the number of citations those previous papers already have plus a constant a, where a>0. Consider a price model network where denotes the in-degree of vertex i. Now suppose a new vertex is added to the network. Then the probability of the citation made to a particular vertex, say i is proportional to . Normalizing the above term, we get the probability of citing a vertex, say i by a newly introduced vertex is given by,
If average number of citations for a given paper is c, with certain variance according to the properties of the network then as as the network size becomes very large, the fraction of vertices in the network that have in-degree q becomes: (Newman, 2010 pp- 490-494)
c=average out-degree of network (or average bibliography size)
where beta function is defined as
and gamma function as
Furthermore, the Beta function falls off as a power law for large values of x, with exponent y. Applying this, we find that for large values of q (q>>a) the degree distribution goes to:
Thus Price’s model for citation network gives rise to a degree distribution with a power-law tail. More generally speaking, each paper could be considered a node and each citation a link. Here, links are added to existing nodes at a probability proportional to the number of links already reaching that node.
Model of Barabasi and Albert
Developed independently in the 1990s, the Barabasi-Albert model is the best known generative network model in use today. Similar to Price’s model, vertices are added one by one to a growing network and connected to existing vertices. However, these connections are undirected and the number of connections made by each vertex is exactly c (unlike Price’s model where c is allowed to vary from step to step). Connections are made in proportion to the undirected degree, k. By treating the Barabasi and Albert model as a special case of Price’s model, Newman, 2010 shows that:
for k ≥ c
c=number of connections made by each vertex
k=degree of vertex
is the proportion of vertices with k degrees.
In this case, when k becomes very large the degree distribution becomes:
Extensions and Further Properties of Preferential Attachment Models
|Model Property/Extension||Intuitive Rationale||Resultant Distribution||Contributor|
|Incorporating Time of Creation||By preferential attachment, older vertices will have more time to acquire links.||Contains leading algebraic factor, does not follow power-law distribution||(Dorogovsev, Mendes, & Samukhim, 2000)|
|Sizes of In-Components||Distribution of the set of vertices from which vertex i can be reached by following a directed path||For component sizes << network size, follows power-law distribution||(Newman, 2010)|
|Addition of Extra Edges||Connections added between two existing vertices||Power-law distribution||(Krapivsky, Rodgers, & Redner, 2001)|
|Removal of Edges||Considered reverse preferential attachment, higher degree are more likely to lose an edge||Power-law distribution to a point, then stretched exponential||(Moore, Ghoshal, & Newman, 2006)|
|Non-Linear Preferential Attachment||Considers a non-linear attachment process rather than a linear process in the degree of the vertex||Stretched exponential||(Krapivsky, Redner, & Leyvraz, Connectivity of Growing Rrandom Networks, 2000)|
|Vertices of Varying Quality or Attractiveness||Quality and attractiveness are incorporated into attachment process||Depends on distribution of “fitness” values||(Bianconi & Barabasi, 2001)|
What other networks’ formation could be accurately described using preferential attachment (considering either Price’s model or Barabasi-Albert)?
Vertex Copying Models
Though preferential treatment offers a plausible explanation for power-law degree distributions, it is not the only means by which networks can grow (Newman, 2010). Suppose newly added vertices copied a fraction of the connections of an existing vertex and the remainders are filled out by other existing vertices (e.g. a new paper copied a fraction the bibliography of an existing paper). As analyzed by Newman, 2010, the degree distribution of a large network under this model will asymptotically follow a power-law distribution (Newman, 2010).
Network Optimization Models
Previous network structures are based, for the most part, on successive random processes, which are blind to the large-scale structures that are being created. A network growth mechanism that may be more suited to transportation networks is structural optimization. The optimization in this case involves a trade-off between travel time and cost. One of the simplest forms of this type of mechanism was developed by Ferrer i Cancho and Sole in 2003. This model seeks to minimize the following quality function (Ferrer i Cancho & Sole, 2003):
e=number of edges in a network
l=mean geodesic distance between vertex pairs (dissatisfaction measure)
λ=a parameter in the range 0≤λ≤1
In this model, the cost of maintaining the network is represented by the variable m. This is the same as saying the cost of operating an airline is proportional to the number of routes it operates, for example. Following the airline example, the variable l would be the average number of legs required to journey from one point to another. This is obviously a simplification of a complex network. The parameter λ provides a balance between a network with the minimum number of edges possible and a fully connected network. From this model it can be seen that by placing a moderate weight on λ, l is minimized and the optimal result is a star graph. This offers a simple explanation of why the hub-and-spoke system is so efficient (Newman, 2010). As it turns out, a non-star graph solution only appears when: .
The degree distributions of this model, as determined by Ferrer i Cancho and Sole, ranged from an exponential distribution to a power-law distribution as the value of λ changes. This was proposed only for local minima.
Gastner and Newman, 2006 generalizes the model presented by Ferrer i Cancho and Sole by considering not only the number of legs in a journey but also the geographic distance traveled (Newman, 2010). The term l is replaced by t, where t=u+vr (Newman, 2010). In this expression u and v are constants associated with a fixed time and pace (1/speed) on a link and r is the distance traveled on the link. For example, u could be considered the check in, waiting, taxiing, etc. time at an airport and pace would be the reciprocal of the average velocity traveled during a flight. This introduces a spatial aspect into the model where before only topological considerations were accounted for. However, this model also produces only numerical results.
By changing the values of u and v in Gastner and Newman’s model, what assumptions could be drawn about the geometry of the resultant network?
A Survey of Models of Network Formation: Stability and Efficiency by Matthew O. Jackson
A General Theory of Bibliometric and Other Cumulative Advantage Processes by Derek de S. Price
The Emergence of Hierarchy in Transportation Networks by Bhanu M. Yerra and David M. Levinson
Barabasi, A.-L., & Albert, R. (1999). Emergence of Scaling in Random Networks. Science , 286, 509-512.
Bianconi, G., & Barabasi, A.-L. (2001). Bose-Einstein Condensation in Complex Networks. Physics Review Letters , 86, 5632-5635.
Dorogovsev, S. N., Mendes, J. F., & Samukhim, A. N. (2000). Structure of Growing Networks with Preferential Linking. Physics Review Letters , 85, 4633-4636.
Ferrer i Cancho, R., & Sole, R. V. (2003). Statistical Mechanics of Complex Networks (Vol. 625). (R. Pastor-Satorras, M. Rubi, & A. Diaz-Guilera, Eds.) Berlin: Springer.
Gastner, M. T., & Newman, M. E. (2006). Optimal Design of Spatial Distribution Networks. Physics Review E , 74, 016117.
Jackson, M. O. (2005). A Survey of Models of Network Formation: Stability and Efficiency. In G. Demange, & M. Wooders (Eds.), Group Formation in Economics: Networks, Clubs, and Coalitions (p. Chapter 1). Cambridge: Cambridge University Press.
Krapivsky, P. L., Redner, S., & Leyvraz, F. (2000). Connectivity of Growing Rrandom Networks. Physics Review Letters , 85, 4629-4632.
Krapivsky, P. L., Rodgers, G. J., & Redner, S. (2001). Degree Distributions of Growing Networks. Physics Review Letters , 86, 5401-5404.
Moore, C., Ghoshal, G., & Newman, M. E. (2006). Exact Solutions of Models of Evolving Networks with Addition and Deletion of Nodes. Physics Review E , 74 (3), 036121.
Newman, M. E. (2010). Networks: An Introduction. New York, NY: Oxford University Press Inc.
Price, D. d. (1976). A General Theory of Bibliometric and Other Cumulative Advantage Processes. Journal of the American Society for Information Science , 27, 292-306.
Rodrigue, J.-P., Comtois, C., & Slack, B. (2009). The Geography of Transport Systems (2nd Edition ed.). New York, NY: Routledge.
Simon, H. A. (1955). On a Class of Skew Distribution Functions. Biometrika , 42 (3/4), 425-440.
Wilensky, U. (2005). NetLogo Preferential Attachment model. http://ccl.northwestern.edu/netlogo/models/PreferentialAttachment. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL
Wilensky, U. (1999). NetLogo. http://ccl.northwestern.edu/netlogo/. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL.
Yerra, B. M., & Levinson, D. M. (2005). The Emergence of Hierarchy in Transportation Networks. Annals of Regional Science , 39, 541-553. | <urn:uuid:deeb6cbb-066e-4364-b4cc-9d7beb9755c3> | {
"date": "2014-09-24T04:39:45",
"dump": "CC-MAIN-2014-41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410665301782.61/warc/CC-MAIN-20140914032821-00130-ip-10-234-18-248.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8690604567527771,
"score": 2.796875,
"token_count": 2693,
"url": "http://en.wikibooks.org/wiki/Transportation_Geography_and_Network_Science/Network_formation"
} |
The theory of “mineral evolution” — the idea that the Earth’s rocks are dynamic “species” which emerged over time, sometimes in concert with living things — is a radical new idea introduced by this paper. The theory, called Mineral Evolution, states that:
Biochemical processes may be responsible, directly or indirectly, for most of Earth’s 4300 known mineral species.
According to this theory, life is a geological force. Life has shaped the physical shape and form of the rocky planet we live on. Life, a standing wave of ephemeral organisms, each one who lives a nano-second in geological time, shapes the seemingly eternal rocks beneath them. It is not just layers of pre-living organisms in marble and limestone, but the very mountains may be influenced by life.
The paper offers a brief timeline of the accumulation of species on Earth in geological time might look like this.
60 species of mineral >4.56 Ga (mostly chondrites — the material found in meteorites)
250 species of mineral 4.56 — 4.55 Ga (achondrites and iron)
350 species of mineral 4.55 — 4.0 Ga (igneous rock)
1000 species of mineral 4.0 – 3.2 Ga (granitoids, primitive granites)
1500 species of mineral 3.2 — 2.8 Ga (new sulfate ores, due to plate tectonics and first life)
4000 species of mineral 2.5 — 1.9 Ga (great oxidation)
4300 species of mineral 0.54 > now (calcites, dolomite, opal and clays)
By this account, there are 3 stages to mineral evolution. (The primary author Robert Hazen uses the term evolution to mean progressive change, rather than natural selection. )The first is the progressive separation of elements from the primordial mix of the original gas nebula before the planets and sun formed. Elements like carbon, silicon separate and recombine to form basic building blocks. The second stage is geological pressure and temperature and chemical oxidation upon these blocks, which produced new minerals. The third stage is “the generation of far-from-equilibrium conditions by living systems” which unleash a multitude of new mineral forms.
Thus biology began to affect the Earth’s surface about 3.8 Ga when life changed its atmosphere and ocean chemistry, precipitating out carbonate and iron formations. Later around 2.2 to 2.0 Ga, during the “great oxidation event” the rise of multicellular life yielded massive amounts of skeletal biomineralization (limestone, dolomites, marbles, shales, etc.), which in turn, transformed the surface minerals on the planet.
An example of pre-oxidation life making minerals are these Iron banding rocks formed 2.5 to 4 billion years ago (Ga). Image from Hazen.
According to this article about Hazen’s theory,
As the materials that formed Earth “clumped” together and were subject to thermal pressures and other forces, the number of distinct minerals increased to about 250, the study says. Then, due to volcanic activity, plate tectonics and other processes that churned the surface of the planet before life emerged, the population of mineral “species” had grown to about 1,500 by four billion years ago. That’s when changes to ocean chemistry and atmospheric conditions, coupled with the emergence of life, sparked an unprecedented diversification of the world’s minerals.
“For at least 2.5 billion years, and possibly since the emergence of life, Earth’s mineralogy has evolved in parallel with biology,” Mr. Hazen added. “One implication of this finding is that remote observations of the mineralogy of other moons and planets may provide crucial evidence for biological influences beyond Earth.”
In other words, one might be able to detect life on other planets by looking at the planet’s mineral diversity, which, like its atmosphere, may be detectable from a great distance.
But if the mineralogy of a terrestrial planet evolves as a consequence of a range of physical, chemical, and biological processes, then why should it stop with natural life?
We should expect that over the very long term, if technology continues to increase its presence and scope, our planet will see anthropogenic rock. Technology will produce species of minerals birthed via technological pollution, or by products of agriculture and manufacturing. Indeed, since agriculture has been affecting the Earth for at least 10,000 years, we may be able to find the first evidence of anthropogenic minerals in soils disturbed by tilling, or layers of dust liberated by constant plowing or over-grazing, or in deposits from salt generated by over-irrigation. In the long-term perhaps layers of plastic in landfills, or exposure to acid rain, or sulfur particulates may clump into some new kind of mineral under pressure. These minerals can also form far from the centers of technology, because the lithosphere, like the biosphere, is a complex system of interacting forces.
Just as it may be possible for us to learn how to detect life on a planet by the detecting the presence of certain biogenic minerals, it may also be possible to detect technology by the presence of technogenic minerals. In some cases, the technogenic minerals may be all that is left of a technological civilization. | <urn:uuid:baae64c4-dbfd-436e-b030-51002d190440> | {
"date": "2014-07-28T12:38:41",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00288-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9089539647102356,
"score": 3.875,
"token_count": 1133,
"url": "http://kk.org/thetechnium/2008/12/technology-a-ge/"
} |
Albert Einstein Quotes
Who was Albert Einstein?
Albert Einstein was born in 1879 in Ulm, Wurttemberg, Germany. Einstein was slow in developing his speaking ability, not talking until after the age of two. One of Einstein’s schoolmaster's said that he would never amount to much due to his slow verbal ability and his rebellious attitude.
Albert Einstein received the Nobel Prize in 1921 for his 1905 work on the photoelectric effect, not for his relativity theory, and is considered to be the most accomplished and famous scientist of the 20th century.
Albert Einstein stayed at Princeton, where he worked for the Institute for Advanced Study, until his death in 1955. He was working on a theory of physics which unified gravity with the other forces of nature at the time of his death. Albert Einstein was named Person of the Century by TIME magazine in 1999.
Carlton's Quote Corner
Quotes by Einstein
~ The faster you go, the shorter you are. ~
~ The only real valuable thing is intuition. ~
~ The only source of knowledge is experience. ~
~ If the facts don't fit the theory, change the facts. ~
~ Weakness of attitude becomes weakness of character. ~
~ Reality is merely an illusion, albeit a very persistent one. ~
~ Time is what prevents everything from happening at once. ~
~ A person starts to live when he can live outside himself. ~
~ Anyone who has never made a mistake has never tried anything new.~
~ The true sign of intelligence is not knowledge but imagination. ~
~ You can never solve a problem on the level on which it was created. ~
~ The difference between stupidity and genius is that genius has its limits.~
Ron White ~ Stupid is Forever
~ Only two things are infinite, the universe and human stupidity, and I'm not sure about the former. ~
~ Intellectual growth should commence at birth and cease only at death.~
~ Love is a better teacher than duty. ~
~ Anger dwells only in the bosom of fools. ~
~ Force always attracts men of low morality. ~
~ Once we accept our limits, we go beyond them. ~
~ Imagination is more important than knowledge. ~
~ Strive not to be a success, but rather to be of value. ~
~ Make everything as simple as possible, but not simpler. ~
~ Information is not knowledge.~
~ Intellectuals solve problems, geniuses prevent them. ~
~ It is a miracle that curiosity survives formal education. ~
~ I used to go away for weeks in a state of confusion. ~
~ Imagination is everything. It is the preview of life's coming attractions. ~
~ If you can't explain it simply, you don't understand it well enough. ~
~ Sometimes one pays most for the things one gets for nothing.~
~ Logic will get you from A to B. Imagination will take you everywhere. ~
~ Insanity: doing the same thing over and over again and expecting different results. ~
~ Education is what remains after one has forgotten what one has learned in school. ~
~ Few are those who see with their own eyes and feel with their own hearts. ~
~ Common sense is the collection of prejudices acquired by age eighteen. ~
~ The secret to creativity is knowing how to hide your sources. ~
~ Everyone should be respected as an individual, but no one idolized. ~
~ A man should look for what is, and not for what he thinks should be. ~
~ I have no special talent. I am only passionately curious.~
Albert Einstein Quotes Video
~ No amount of experimentation can ever prove me right; a single experiment can prove me wrong. ~
~ Technological progress is like an axe in the hands of a pathological criminal. ~
~ We cannot despair of humanity, since we ourselves are human beings.~
~ The monotony and solitude of a quiet life stimulates the creative mind. ~
~ The most incomprehensible thing about the world is that it is comprehensible. ~
~ Try not to become a man of success, but rather try to become a man of value. ~
~ The value of a man should be seen in what he gives and not in what he is able to receive. ~
~ Any man who can drive safely while kissing a pretty girl is simply not giving the kiss the attention it deserves. ~
~ Any man who reads too much and uses his own brain too little falls into lazy habits of thinking.~
~ The important thing is not to stop questioning. Curiosity has its own reason for existing. ~
~ We shall require a substantially new manner of thinking if mankind is to survive.~
~ There comes a time when the mind takes a higher plane of knowledge but can never prove how it got there. ~
~ I believe that a simple and unassuming manner of life is best for everyone, best both for the body and the mind. ~
~ Whoever is careless with the truth in small matters cannot be trusted with important matters. ~
~ We still do not know one thousandth of one percent of what nature has revealed to us.~
~ The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it. ~
~ Any intelligent fool can make things bigger and more complex... It takes a touch of genius - and a lot of courage to move in the opposite direction.~
~ He who can no longer pause to wonder and stand rapt in awe, is as good as dead; his eyes are closed. ~
~ If people are good only because they fear punishment, and hope for reward, then we are a sorry lot indeed. ~
~ You have to learn the rules of the game. And then you have to play better than anyone else. ~
~ There's a Genius in all of us.~
~ You can't blame gravity for falling in love. ~
~ If I had my life to live over again, I'd be a plumber. ~
~ If you want to live a happy life, tie it to a goal, not to people or things. ~
~ Wisdom is not a product of schooling but of the lifelong attempt to acquire it. ~
~ Life is like riding a bicycle. To keep your balance you must keep moving. ~
~ Know where to find the information and how to use it - That's the secret of success. ~
~ In order to be an immaculate member of a flock of sheep, one must above all be a sheep oneself. ~
~ Setting an example is not the main means of influencing another, it is the only means. ~
~ The true value of a human being can be found in the degree to which he has attained liberation from the self. ~
~ It is every man's obligation to put back into the world at least the equivalent of what he takes out of it. ~
~ The intuitive mind is a sacred gift and the rational mind is a faithful servant. We have created a society that honors the servant and has forgotten the gift. ~
~ We all try to escape pain and death, while we seek what is pleasant. ~
~ To know is nothing at all; to imagine is everything . ~
~ The only mistake in life is the lesson not learned. ~
~ Education is the progressive realization of our ignorance. ~
~ People love chopping wood. In this activity one immediately sees results. ~
~ It has become appallingly obvious that our technology has exceeded our humanity. ~
~ The horizon of many people is a circle with zero radius which they call their point of view. ~
~ Put your hand on a hot stove for a minute, and it seems like an hour. Sit with a pretty girl for an hour, and it seems like a minute. THAT'S relativity. ~
Nick Griffin reveals a little-known fact about Einstein's married life.
More for Quote Lovers
- Life Quotes from Country Music Singers
Country music speaks to many listeners through the heart. Songs about real life, along with the ups and downs everyone faces at some point or another. Just as individuals can relate to quotes that they feel...
- Great Quotes from Famous '80s Icons
The 80s were a wonderful time to be a child. Playing outside could be done without the worries of today, it was a more innocent time. Playing Atari and Pac Man, or figuring out how to solve the Rubik's Cube,...
- Life Quotes from Hollywood
Quotes can be an inspiration for everyone, and with so many versions of quotes about life from so many sources, everyone can find at least one quote that they have to agree is relevant to their life in some...
- Don't Take Life So Seriously
Laughter can have a positive effect on the mind and body, and it has been found that a good sense of humor is essential in helping to make sure that your mood and emotional state support good health. Laughter...
- Great Quotes about Love and Marriage
Humans are born with a need to be free, loved, and secure. Some people are fortunate enough to find love, while others may search their whole lives to never find that one true love. Love is as unique as every...
- Great Quotes about Life, Love, and Men from Mae West
Mae West was born in in Brooklyn, New York on August 17, 1893 as Mary Jane West. Famous for her outspoken and provocative demeanor, Mae West was known by many as a sex goddess. She began her career at the age...
- Words of Wisdom from Winston Churchill
Sir Winston Leonard Spencer Churchill was born in 1874 in Blenheim Palace, Oxfordshire, England. He was well known for his leadership of the United Kingdom during WWII, and widely regarded as a great wartime...
- Quotes about Change
Change is inevitable and occurs throughout a person's lifetime. It can be change for the better, or for the worse, depending on the affected individual's perception and willingness to change. Change can be...
- Great Quotes about Men and Women
It's a known fact that since the beginning of time men and women have disagreed on many different topics. Let's face it, men and women have very different points of view on many of the same subjects. Research...
- Great Quotes by Mark Twain
Samuel Langhorne Clemens was born on November 30, 1835 in a small town in Missouri by the name of Florida. At the age of four, Samuel's family moved to Hannibal, a port city along the banks of the Mississippi....
- Quotes by Marilyn Monroe
Marilyn Monroe was a '50s sex goddess and perhaps the most famous woman of the 20th Century. Born Norma Jeane Mortenson to Gladys Baker on June 1, 1926 in Los Angeles, California, and baptized as Norma Jeane...
- Oprah Winfrey Quotes
Oprah Gail Winfrey was born in Kosciusko, Mississippi on January 29, 1954. Showing signs of an exceptional IQ by the age of three, Oprah Winfrey was able to recite from the Bible and children's books. She was...
- Life Quotes from Famous Comedians
They say that laughter is the best medicine, and research studies have proven this to be true. A sense of humor and plenty of laughter has been shown to have positive health effects and strengthens the immune...
- Celebrity Christmas Quotes
Quotes can be funny, inspirational, political, and can burn into your memory when they reveal an inherent truth. Many people relate to quotes as if they are a personal reflection of themselves. Quotes have... | <urn:uuid:67902329-855e-46fd-ad48-a1748e900508> | {
"date": "2017-04-23T15:09:57",
"dump": "CC-MAIN-2017-17",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118707.23/warc/CC-MAIN-20170423031158-00468-ip-10-145-167-34.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9709221720695496,
"score": 2.640625,
"token_count": 2434,
"url": "https://hubpages.com/literature/AlbertEinsteinQuotes"
} |
Enameling is an incredible art form. It uses the heating and cooling of silica (particulate glass) to treat the surfaces of metals, creating a thin layer of color and shine by mixing materials and elements which effect the glass glaze. Enameled glass has been used in place of rare gemstones to add color for thousands of years, so it is no wonder that it is thought to have first been discovered in the birthplace of the Bronze Age, the Eastern Mediterranean islands of Crete and Cyprus.
Sometime around 3200 BC, a young person, low on the “totem pole” presumably, discovered an unexpected yet sophisticated craft, alchemy. She would have either witnessed or been a part of a ritual one evening in the dark of night, when her group’s spiritual leader would have taken a piece of malachite and thrown it into the fire, turning the flames a bright green as the stone burned away, serving as a metaphor for some spiritual understanding. The next morning, this young alchemist would have been tasked with cleaning the cinders from the fire, only to find a melted and cooled puddle of solid copper, the residual remains of the malachite. This would have been the beginning of the alchemy that led mankind into the age of bronze, a process that we now refer to as smelting, later done in a more kiln-conducive stone basin.
These new materials and techniques were also applied to jewelry, and for the first time, in most cultures, jewelry became more than strung beads. Jewelry became a form of communication. It allowed people to understand who was important and why, without having to ask, and was used as a social device to keep the divide among the wealthy and the working classes, as well as for the garb of the religious and armor for warriors.
During this new age, the liberation of thought flourished and peoples across the globe became more aware of their fragility, community, mortality and therefore their belief systems which derived from their pursuit of an afterlife. This allowed for a convergence of cultures and god-figures to be tasked with specificity, which led to a blending of materials for ritual, like the amazing rhyton (or drinking vessel) pictured below, used in celebratory ritual by the Minoan people. The bull is a common antique imagery in almost all cultures, from Shiva in India, to this example from Crete, made of soapstone, with gilded wooden horns, a shell snout and glowing rock crystal eyes, representing a hurdle of power, triumph and sacrifice. In Knossos there are frescos depicting bulls being leaped over in what is thought to be a sport. Bull-leaping would have been a celebratory occasion, heavy with harvests, libations and ritual, much like bull racing is throughout the Mediterranean.
These rituals included sacrifice of both bull and sometimes man. In most of the Bronze Age cultures of the Mediterranean, cultural leaders and the shamans would have been held in high regard and might have even been one in the same. They would have worn the finest clothing depicting their importance, complete with jewelry made of the rarest materials; with stones brought from far away lands; golds mined from the earth; and craftsmanship of the finest artisans in all the lands and overseas. For this reason, the specific home of the first enamelists is unclear, except to say that they were the early Greek jewelers and craftsmen, with the earliest being entombed in the 1950’s (AD) as evidenced during an excavation on the island of Cyprus where 6 rings were found in the Mycenaean tomb of Koklia (Kouklia). These rings are the first examples employing the technique of vitreous enameling that archeologists and historians have found. They were done in a style of cloisonné as coins that sit atop beautiful cannetille ring designs, with granulated-lined bezels holding them in place, all in pure gold. The glass surface may have worn away, but the composition of such chemistry is still in place. These 6 rings are the earliest known form of enameling in the world and date to having been crafted over 4000 years ago.
Of course this blog post isn’t a story of ancient Greece, but rather a story about the art of enameling. There are several types of enameling processes that have been utilized in different cultures and styles of jewelry design. In our realm, we cover Georgian to Retro eras of jewelry, which ranges in years from the late 1700’s through the late 1960’s, with design influences dating back to the 15th century. With this in mind, I am going to go through those eras of design with examples of enameling techniques and styles that were popular at those times.
In the 15th-17th century, enameling was used to coat the surface of an entire wire to give it a thick, almost bone-shaped figure, as well as by pooling it with a brush between wires that are soldered onto a surface which is referred to as cloisonné, (from french meaning “partitioned.”) A few of my personal favorite pieces from this time period came from the Cheapside Hoard, a huge cache of jewelry found under the streets of London in 1912. Because of the burial of the chest that they were stored in, the enameling has been under climate control and is in exquisite condition - a real rarity to behold.
Grisaille (from french meaning grayness) is another method often referred to at that time, which is a style of Limoges (referring to painted imagery in vitreous enamel from the French town of Limoges where it was developed,) enameling that works only in shades of grays or tonal mixtures that give the appearance of blacks and whites. Grisaille was often used to depict scenes of Greco-Roman myth placing the characters in contemporary, recognizable locations or situations, but with classical characters, to comment on the times that told a narrative by delivering an image without any confusion of color or abstracting of the line. It was also used for portraiture and is a term that can also be used outside of vitreous enameling, such as with ceramics and watercolor painting.
18th century enameling really spearheaded and finessed the technique that we refer to as Basse Taille (from the French, meaning “low size.”) This technique refers to the engraving of a metal surface with a low relief, in most cases thick silver or gold plate, engraved with a pattern and then glazed with several layers of transparent, tinted enamels on top of the engraved surface to give the effect of depth. It was used in many Georgian era rings, lockets and backings of rose-cut diamonds. The use of cobalt was very popular as a color at this time, so most of those pieces are a deep, intense cobalt blue. With the revolutionary war, a dark side of design and jewelry imagery crept up with the lover’s eye, painted on porcelain, surrounded by frames of woven hair and enameled backings and stones set in a plethora of configurations.
The 19th century was an incredibly important time for jewelry, with the technology evolving to include details that were so specific to the wearer and the era of Victoria and the entire aesthetic, as well as the boom of a middle class and the fall of autocratic society around the globe. Sweet flowers, intended to mean one thing or another, were painted in a Limoges style, and set with pearls and diamonds, like the pansy pictured below. These were sweet gifts often given amongst lovers, friends and family alike, and enamelists all over Europe, England and the United states made a lot of jewelry.
These sweet images represented the optimism that Victoria lived for the first third of her reign, prior to the passing of Prince Albert. These depictions often referred to anima and flora, and since she was known as the Empress of India (which was a colony of the United Kingdom at the time,) the image of snakes also became very important as it represented the power of Shiva, who wore a cobra around his neck and limbs, and was therefore used in jewelry to support the Queen and her colonial kingdom, and great fodder for enamelists to work with!
Upon the passing of Prince Albert in 1861, Queen Victoria fell into what we now refer to as the mourning period, the prolonged and dark 20 years of her reign that influenced fashions of the mid-1800’s, making dark and moody statements with jewelry of black stones, such as jet, agates, onyx and jaspers oftentimes outlined with mizpahs and/or statements of poetic sentiments in black enameling. Most enameled jewelry of the mourning period was simple - outlines of black or white details on floral and geometric motifs that were once colorful and cheerful but now decorative en sol.
This was also a time of revivals on the continent, and with the discovery of Etruscan tombs filled with artifacts in Tuscany, Italia, the Castellani family began a huge revival movement of archeological jewelry with granulation, cannetille and enameling styles done in the Etruscan style. Designers across Europe followed suit with Gothic, Renaissance, and Egyptian styles, heavily using enameling along with other techniques to represent those time periods and appeal to the look of the 1870’s.
By the 1880s, the Victorian look had returned to its adoration of the almost saccharine, floral and romantic styles before the mourning period. The Art Nouveau movement had just began, in a style that was more modern and visual exciting than all other styles that had come before, emerging from Paris and Vienna. Artists like Alphonse Mucha, Gustav Klimt and Antoni Gaudi had taken the world by storm, but more importantly for jewelers René Lalique and Louis Comfort Tiffany began their companies, making some of the most exquisite enameled object d’art and jewelry that the world had ever seen. Both men worked in glass blowing, so their understanding of the enameling process and science behind it made a language that both floated through. Their amazing works focused on thin, gradient enameling in all styles afore mentioned, from Cloisonné to the Pliqué a Jour (from the French, meaning “Light of Day”) which has a stained glass effect when held up to the light and was, specifically, Lalique’s signature technique.
Tiffany and Lalique really were the leaders in enameling from the 1890s through the entire Art Deco period of the 1920’s. Enameling after the Art Deco period began to focus more on the minimal side of enamel which were mostly coating an entire surface, or sifted and stenciled. These are the most common type of enameling techniques practiced today, as with many new styles that employ the use of imagery transfers and more involved imagery.
Something that I did not touch on was that of one designer at the turn of the century who influenced enameling more than any other enamelist prior. His name was Carl Faberge. His story with enameling is long and involved, so I will leave that for another blog post focused on the turn of the century in Russia and the amazing works that he made for the last of the autocratic social networks and the fall of the Tzars. | <urn:uuid:62151bd0-8ea6-4a92-b3ea-b7b092f99f8d> | {
"date": "2019-05-25T23:54:09",
"dump": "CC-MAIN-2019-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258453.85/warc/CC-MAIN-20190525224929-20190526010929-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9738575220108032,
"score": 3.296875,
"token_count": 2403,
"url": "http://www.victorianajewelry.com/blog/tag/enameling"
} |
In the Chinese tradition, the autumn season is associated with the color white, the sound of weeping, the emotions of both courage and sadness, the lung organ, the metal element, and a white tiger. Autumn is also connected in Chinese thought with the direction west, considered to be the direction of dreams and visions.
The 2014 September equinox is September 22-23. Everything you need to know about this year’s autumnal equinox
What does all this mean? It’s a system – a cosmology if you will – that describes how nature works.
To the Chinese, nature means more than just the cycling of the seasons. Nature is within us and around us, in all things. The basic cycles of nature, as understood by the ancient Chinese, are easily comprehensible by Western students of nature. They ring true. After all, Chinese civilization flourished for 15 centuries before the Roman Empire came to be. Today we know it’s part of Chinese culture to maintain and add to ancient wisdom. In contrast, we in the Western world tend to replace old ideas with new ideas. So – although our Western way of thinking encourages advances in things like technology and economics – the Chinese understanding of natural cycles remains far deeper than ours.
Here’s a quick and easy lesson on a Chinese way of thinking about nature and its cycles. We all experience the fact that things sprout and begin to grow (spring). They fire up or ignite or bloom (summer) and reach completeness (late summer). They begin to dry and wither (autumn). They rest (winter). In Chinese thought, these five seasons – or five “elements” or five “phases” – include an inherent understanding that the cycle continues endlessly, with each period of rest or winter followed by new growth, or spring.
Each of the five phases or seasons of ancient Chinese philosophy carries associations with specific things: directions, colors, sounds, organs in the body, fundamental elements such as water or fire or metal, real or mythological beasts.
Here’s another simple example. While summer is associated with the the emotion of joy, autumn is associated with both courage and sadness. Of course it is, because, in autumn, things are dying. The light is dying, for one thing, as Earth’s orbit around the sun and tilt on its axis combine to carry us in this hemisphere further away from receiving the sun’s rays most directly. The days are getting shorter. Plants and trees are winding down their cycle of growth. Sadness – and courage – are natural emotions as these changes are taking place.
That’s part of what the Chinese philosophy of the five phases or five elements is trying to convey: for example, sadness is part of the autumn season. Sadness isn’t an emotion to be avoided at all costs. Instead, sadness is simply part of nature.
So to celebrate the autumn equinox as the Chinese philosophers did, you might …
Stand facing west, considered the direction of autumn in ancient Chinese philosophy. Just stand for a few moments and honor the “westness” of autumn. Consider your dreams and visions, and the path on which you’re moving forward through your life.
Light white candles against the growing darkness of the season. Or place white flowers on your table. White is the color of autumn in the Chinese tradition.
Allow yourself to weep for things you have lost. Weeping is the sound of this season, according to Chinese philosophy.
Find the courage to face what’s ahead.
The Chinese understanding of nature’s cycle seems fanciful, but once you begin to consider the five elements or phases of Chinese philosophy, you see them cycling in and around everything. You can recognize these phases in the course of relationships, over a workday, in the progress of a play or novel, in the process of aging, while eating a meal, in the growth of a garden, in a scientific or political or business enterprise, while playing a game. All things sprout, bloom, reach completeness, become brittle and die, then rest. Then the cycle begins anew.
Once you learn this basic fact of nature, the dry and brittle phase of autumn, when things are dying – or periods of loss in your life as a whole – become easier to bear. | <urn:uuid:b02d0c5d-e197-4073-a2db-6a92bc109eb4> | {
"date": "2014-11-23T02:05:42",
"dump": "CC-MAIN-2014-49",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400378956.26/warc/CC-MAIN-20141119123258-00124-ip-10-235-23-156.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9331716299057007,
"score": 3.109375,
"token_count": 900,
"url": "http://earthsky.org/earth/autumn-equinox-cycles-of-nature-and-chinese-philosophy"
} |
When American Express established the first private corporate pension plan in the United States in 18751, corporations in the following decade soon followed suit as the economy was booming and private sectors became competitive. Businesses had to create an incentive to keep workers loyal to their business and not jump ship to competitors.
Pension Plans then became the norm until the Great Depression hit millions of people. This prompted President Franklin D. Roosevelt to introduce the Social Security Act of 1935. This act provided a "general welfare by establishing a system of Federal old-age benefits" 2 which derived from American tax payers as a supplement for retirement.
The Economic Policy Institute showcased a study based on the data from the Federal Reserve Board's Survey of Consumer Finance Accounts, which reflects troubling signs of anyone thinking they have time to save for retirement. From 1989 to 2013, Defined-Benefit Plans, such as corporate pension plans, have seen a steady decline while Defined-Contribution Plans, e.g., 401(k)s, 403(b), and profit-sharing plans, have seen only a mild increase over this 24-year period. Americans are simply not saving enough and with the mindset of Social Security being readily available to all U.S. citizens when set to retire. According to the Social Security Administration, in 2010, we saw a $48.9 billion deficit with the forecast of reaching negative$344B in the next 17 years.
The point is clear that one cannot rely on public assistance alone for retirement and it is highly imperative that everyone takes action to start saving and start saving as much as they can because unless one wants to work for the rest of his or her life, then drastic savings for retiring need to occur.
1 Employee Benefit Research Institute, https://www.ebri.org/publications/facts/index.cfm?fa=0398afact
2 Social Security Act, https://www.ssa.gov/history/35act.html | <urn:uuid:5f9d35f6-dc0f-441e-88bc-9fd9db1feced> | {
"date": "2019-11-19T04:05:43",
"dump": "CC-MAIN-2019-47",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669967.80/warc/CC-MAIN-20191119015704-20191119043704-00336.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9556896090507507,
"score": 2.703125,
"token_count": 400,
"url": "https://www.dollarotter.com/blank-2/2018/02/22/Americans-Arent-Saving-for-Retirement"
} |
Instructors: Andrea Dykstra, Curt Van Dam, Kelli Ten Haken and Tami De Jong
1. Students will gain interest in the Unit on Alaska.
2. Students will be introduced to Alaska and the Iditarod race that takes place
in Alaska every year.
3. Students will be able to appreciate the beauty of Godís creation in Alaska.
4. Students will be able to see Godís majesty and power in their personal experiences.
In this lesson, the students will discuss what they know about Alaska. They will watch
a movie and then discuss how God shows His power and majesty through creation. Next,
they will be introduced to the Iditarod race by reading a story and then the teachers will
explain the game the students will play about the Iditarod through the unit. At the end of
class, students will have a chance to start work on their maps of Alaska and then the
teachers will end in closing prayer.
- Psalm 19:1-
The Heavens declare the glory of God; the skies proclaim the work of His hands.
- Other Scripture references that can be used through out the unit:
The Creation story in Gen. 1 and 2
Alaska: Spirit of the Wild
2. DVD player
5. Learning center and trade books
6. Example of the Iditarod Game
7. Book: Iditarod Dream by Ted Wood
8. Overhead projector, overhead and pen
9. Construction paper
10. Markers, crayons, colored pencils
1. On the first day of this unit, teachers should enter the room dressed in parkas,
snowshoes, scarves, mittens; anything that looks like what people in Alaska would
wear. Motion for the student to sit down. Once they are quiet, ask them where
they think the teachers are from and how they came to this conclusion. We would
expect conclusions such as the Artic, Antarctica, and possibly Alaska.
2. Have students take out a sheet of paper and write five things down that come to
their minds when they think of Alaska. Have them get into groups of three and
share what they wrote with their group. The students will be encouraged to share
the combined ideas from their group with the whole class. The teacher will write
down these ideas on the overhead.
3. Explain to the students that they are going to be learning about all of these of
these things and even more about Alaska in the upcoming unit.
4. Have each student write down one or two things about Alaska they would like
to know more about. Suggest ideas such as: What sports do they play in Alaska?
How many people live there? Is it really cold and snowy year round? Take these
ideas into consideration when planning the rest of the unit.
1. Put in the DVD Alaska: Sprit of the Wild. Students will watch the movie. It is forty
minutes long. Before they watch it, share with them the beauty that can be found in
Alaska. Tell them to look specifically for how they can see God in the things that are
shown on the film.
2. After the movie, discuss with the students what they thought of the movie. Ask them
questions such as what surprised you about this film? What did you learn about Alaska
that you didnít know before? What can we discover about God by watching this movie?
How can we get to know God better by studying Alaska?
3. Read Psalm 19:1 aloud. Read it again, this time have the students say it after you. Ask
them how this verse relates to Alaska. Hopefully they will make the connection that
creation shouts Godís praise. Alaska is so beautiful; this reflects on Godís majesty,
creativity and mercy. God loves us enough to give us beautiful creation simply so we
can enjoy it. We can see his fingerprints in Alaska.
4. Read Psalm 8 aloud. Again, ask them how this verse relates to Alaska. They will probably
have similar responses as above in step three. Share a personal experience of how he/
she has seen Godís power and majesty in His creation.
- For example, this is my own experience; you could share something similar to it:
One time I climbed the highpoint of Colorado with my dad. We started hiking
before the sun was up. As we were walking along the ridge of the mountain, the
sun began to rise; the colors were brilliant! We kept on hiking and hiking. I was
getting tired and hungry but soon we came close to the top. As I climbed up the
last little peak and the top of the mountain, I looked out and the view was
breathtaking!!! I had never seen so many snow capped mountains before. Sitting
up there on the mountaintop, I felt such a joy and peace. What a great God I
serve! He created all of this; His creation alone is enough to tell of His majesty.
5. Ask the students if any of them have had an experience like this; encourage them to
share if they would like.
6. Encourage them to find other verses that could relate to our study of Alaska and bring
them to class tomorrow to share.
1. Introduce the Iditarod race the studentís will be learning about by reading the book
Iditarod Dream by Ted Wood. As you are reading, stop periodically through out the
book and ask them to jot down a few of their thoughts. At the end of the book ask
them to share a few thoughts they wrote down about the book.
2. Introduce the game the students will be playing throughout the unit. Tell the students
they will be having their own Iditarod race in the classroom. Each student will make a
map of Alaska on construction paper. On this map, they will draw the trail of the
Iditarod race. They will have to map out the different checkpoints of the race on their
trails. It is their job to find out how many miles are between each checkpoint and how
many miles they can travel in one day.
3. Each day the students will move their markers on their maps how ever many miles we
decide as a class they can travel in one day. Every morning the students will receive
a ďracerís fateĒ card. These cards will say various things such as, ďyour dog has broken
a leg, move back twenty milesĒ, or ď you have found an extra bundle of food on the trail,
move ahead twelve milesĒ. The students will have to keep track of where they are on
the trail on their own maps and on a large map on the classroom bulletin board.
4. Each afternoon, students will have an opportunity to receive another card if they got
their homework done on time that day. This card could be good or bad, but the students
get to decide if they want to take it.
5. This activity will be incorporated into language arts. The students will be keeping a
race journal. As they play this game they can write their feelings about the race in the
journal as if they were an actual racer.
6. This game will also be incorporated into math. Students will need to do calculations to
play the game correctly. They will also discover how to find median, mean and
using the game.
1. The students will begin making their maps of Alaska for the Iditarod game. The
outline of the map of Alaska will be projected on the overhead so the students have
something to follow when they draw. Copies of the outline of this map will be available
for students to trace if they do not want to draw the map freehand.
2. The students can use crayons or colored pencils to make their maps on.
3. The trail outline and check points will be labeled on the overhead map, but the students
will need to research how many miles are in between each check point in a later class
1. Read Psalm 8 one more time and end in prayer, thanking God for His creativity that
is evident in all of creation, especially as it has been seen in Alaska today.
1. Students can do more research about the real Iditarod race on the Internet.
2. Students can read one of the many books about Alaska set up in the learning center.
3. Students can complete any activity set up in the learning center, including: math
story problems, language arts writing activities, and social studies and science
1. Observe how much students participate in the lesson. Have one teacher walk
around with a checklist and put checks by the names of the students who are
on task and participating by sharing, asking questions, diligently listening.
2. Observe how diligently students work on their maps. Check the next day to see
if they have completed them. Give them a check if they are finished and are done
Lesson Plans Unit Outline Home Page
Trade Books Learning Center | <urn:uuid:d07cc3a6-5c93-4a54-aa41-e4364927c35f> | {
"date": "2013-05-18T06:30:43",
"dump": "CC-MAIN-2013-20",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9499552845954895,
"score": 3.671875,
"token_count": 1899,
"url": "http://center.dordt.edu/266.543units/Alaska%20unit/intro.les.html"
} |
What is Digital Payment?
As in our daily routine, If we want to buy something or give money to someone what we usually do is, we give the cash which we carry in our wallet for day to day activities. Just like that, after the digitalization of payment methods, the digital payments is used for making the transaction online and digitally. How does it work is, we first have to transfer money to the virtual wallet account which can be done through card payments or internet banking and you’re all set to do you your digital transactions anywhere and anytime. It has the vast range of connectivity with any platform, hence making it globally acceptable worldwide. They also have the perk of having the connectivity with the variety of bank accounts for the bank to bank transactions.
The digital payments are implemented by technologies such as Bluetooth, NFC, Blockchain and QR code.
Bluetooth and iBeacon also identify your nearby users for making the payments transfer. It helps in making the payment transfer with full security and in a quick way.
Near Field Communication, the technology that is used for sharing the data and transactions the funds with a really easy method.
Its an evolving trend for making the digital transfer highly secured, mostly used by the governmental organizations and banks as they involve a large amount of transaction.
This is used for making the transactions with the users you frequently meet or the ones who are the part of the social community. Its just required to scan the QR code of the other user’s device, to whom you want to transfer in a really quick and easy way.
Top Digital Payment Methods in India
- Card Payments:
You must be very well aware of the banking card as everybody holds one, with them every time, these have been the most used digital payment modes till now. It's basically used for transferring money and making digital transactions. Credit cards, debit cards, prepaid cards, and Rupay debit card are the main types of cards.
Unstructured Supplementary Service Data (USSD) banking is an internet banking based digital transaction mode. There's no need to have a smart mobile phone or internet access to use USSD banking. USSD banking is as convenient as checking your balance in mobile. It can be used as services such as checking account balance, money transfer, enhancing and getting MPIN.
Aadhaar Enabled Payment Service(AEPS) is Aadhaar Card based online digital transaction gateway. Only Aadhaar number is required to pay for any kind of transaction. It benefits by the bank to bank digital transactions mode.
Unified Payment Interface is a digital payment mode used for fund transfers digitally through smartphones. You have the privilege of transaction desired amount between two bank accounts through UPI. Currently, It is only for Android users.
Mobile Wallets is the digital version of your physical wallet but with more functionality and are an easy and faster way to make payments. When you perform a transaction using your wallet money you do not need any PIN or password. You can use your money in an E-wallet as and when needed. Applications such as Paytm, Freecharge, Tez comes under mobile wallets. The biggest advantage is you can also. perform bank to bank transactions through mobile wallet app.
- Internet Banking:
Internet Banking or Virtual Banking is an electronic payment system that lets customers of a specified bank conduct transactions through the bank's website.
- Mobile Banking:
Mobile banking is the process of making digital transactions on a smart device. It can be used anytime and anywhere. It also includes concern of security and limited usage when compared to banking in person.
Bharat Interface for Money (BHIM) is the most popular and used UPI application. It excelled other UPI apps and mobile wallets. It has the minimal interface for this app.
Here are some basic and self-explanatory features which every digital payment application consists of
- Data synchronization
- Booking calendar
- In-app camera
- Cloud operations
- Wearable integration
- Create virtual cards
- Push Notifications
- QR code
- Digital Receipt
- Categorization and portability
- Loyalty Program
Its mostly depends on the man working hour they dedicatedly invest in developing the application. Different regions charge differently around per hour.
India provides the most affordable services for developing the quality digital payment mobile apps at the price $25 -$ 80/hr everywhere in the country.
The cost of developing a digital payment Mobile app such as Paytm can cost up to $100,000 to $150,000. | <urn:uuid:28733c2b-52ed-4a23-b980-968fdf3a0331> | {
"date": "2018-12-15T20:37:13",
"dump": "CC-MAIN-2018-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827097.43/warc/CC-MAIN-20181215200626-20181215222626-00256.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9338467717170715,
"score": 2.59375,
"token_count": 928,
"url": "https://www.starkdigital.net/digital-payment-mobile-app-development-cost-and-features"
} |
When it comes to losing weight, it’s important to know the difference between healthy and unhealthy weight loss. The Centers for Disease Control and Prevention (CDC) defines safe weight loss as 1 to 2 lb. per week. This is the ideal rate of weight loss you should average per week to allow your body ample time to adjust to the changes and to help you stick to your weight loss plan over the long term.
Exercise Weight Loss Average
Certified personal trainer Christian Finn says exercise alone will not produce significant weight loss results. He refers to several university studies on exercise versus weight loss, and in each case, the weight loss results were far below the CDC’s recommended average of 1 to 2 lb. per week; many showed results of less than 0.5 lb. per week. The type of exercise used in most of these studies was moderate aerobic activities, such as jogging or biking, up to four times weekly.
Diet Weight Loss Average
Diet seems to play a more critical role in the weight loss equation than exercise. Cutting out a daily sugary snack cake and a 20 oz. bottle of soda can easily cut 500 calories a day. To burn 500 calories through exercise, a 155 lb. person would have to walk at 3.5 mph for nearly 2 hours, according to Harvard Medical School. Dieting alone can help people lose an average of nearly 1 lb. per week if they cut 500 calories from their daily diets per day.
Increasing Your Weight-Loss Rate
The most effective way to increase your average rate of weight loss is by combining exercise and diet. Eating healthier includes cutting back on sugar, salt and saturated fat. Eat more vegetables, fruits, whole grain foods, low-fat dairy, seeds/nuts/legumes and lean protein sources. To lose 2 lb. per week, you must eliminate 1,000 calories a day. Aim for cutting about 750 calories per day from your diet and get the remaining 250 calories burned by exercising at a moderate pace for 30 to 60 minutes each day.
Things to Consider
As you lose weight, you also need to consider the fact that your body requires fewer calories each day. If you were to maintain the same 2,000 calorie per day diet you had 20 lb. ago, you will find yourself slowly gaining that weight back. Use the U.S. Department of Agriculture’s free MyPyramid tool to find out how many calories your body needs each day to lose or maintain your current body weight. Also, consider increasing the intensity of your workout as you become more physically fit to ensure you don’t reach a fitness plateau.
- Jupiterimages/Pixland/Getty Images
This article reflects the views of the writer and does not necessarily reflect the views of Jillian Michaels or JillianMichaels.com. | <urn:uuid:f34fd224-b41d-4a0e-bfa0-82c9e48e5dbd> | {
"date": "2017-12-12T19:41:10",
"dump": "CC-MAIN-2017-51",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948517917.20/warc/CC-MAIN-20171212192750-20171212212750-00656.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9442430138587952,
"score": 2.796875,
"token_count": 578,
"url": "https://getfit.jillianmichaels.com/average-weight-loss-per-week-2344.html"
} |
|John F. Kennedy|
President: January 20, 1961 to November 22, 1963
The Atlantic Wire article on the demographic dynamics of the 50th Anniversary of the John F. Kennedy assassination is linked below.
The Atlantic Wire: About One-Third of Living Americans Today Were Alive on November 22, 1963
"The Kennedy assassination is one of America's where-were-you-when moments. But with its 50th anniversary on Friday, there are fewer and fewer Americans who can say where they were. In fact, Census data suggests that only about a third of America's current population was alive on that day in 1963 — and less than 30 percent might actually remember."
---Philip Bump, Atlantic Wire | <urn:uuid:54d5db50-045b-4e08-9b56-6ea496498113> | {
"date": "2017-08-20T08:04:16",
"dump": "CC-MAIN-2017-34",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106358.80/warc/CC-MAIN-20170820073631-20170820093631-00216.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9339670538902283,
"score": 3.046875,
"token_count": 146,
"url": "http://demographicsandamerica.blogspot.com/2013/11/the-atlantic-wire-on-50th-anniversary.html"
} |
By Gavroche Allen.
O, de next morning such condition our village
So late do seems of confusion, riot and pillage.
-Hard Scrabble, from an 1824 pamphlet
This 1824 broadside phrase illustrates the aftermath of a race riot that destroyed a predominately African-American community in Providence called Hard Scrabble. Few today know of the events that took place in this neighborhood nearly two centuries ago, but the riot that occurred there was a major controversy back in its day. This conflict illuminated the stark racial, social, and political divisions that split the town at that time.
The riot was sparked when a group of black men walking in Providence refused to give up the “inside walk” to a number of white individuals coming from the opposite direction on an autumn evening. The next night, on October 18, 1824, violence broke out. A mob of white residents from all parts of Providence attacked a section of North Main Street. About twenty African-Americans’ homes and that of one white resident were destroyed during the riot. Only four rioters were tried after the Hard Scrabble incident, and all but one was eventually acquitted.
Race, of course, played a huge part in the incident. Although Rhode Island contained one of the highest percentages of free blacks throughout the U.S., there was still a sharp racial divide, and at the time of the riot, suffrage was only allowed to white male land owners. A couple of days before the riot, Chief Justice William Spear contributed an editorial to the Providence Beacon in which he commented that blacks in Providence were “naturally vicious and wicked.” Before the riot, Hard Scrabble was known as that part of the city where people of “ill repute” resided; it was deemed a place plagued with “criminal elements.” It was no wonder, then, that Joseph Tillinghast, the defense attorney in the “Hard Scrabble Riot” trial, stated that the reason the accused caused such destructive mayhem to that section of Providence was that they were protecting “the morals of the community.”
Racial violence unfortunately continued in Providence in later years. An integrated working-class community, Snow Town, was malevolently assaulted by white rioters in 1831 when a black resident shot and killed a white sailor for throwing stones at his home. The “Snow Town Riots” resulted in four whites being killed by the local militia. As a result of the tragic events of Snow Town, the General Assembly granted the town of Providence a city charter in November of 1831, giving the presiding mayor the power to imprison anyone who carried out any sort of disorderly conduct in the municipality.
After the Civil War, the memory of Hard Scrabble and Snow Town and the violence the residents there had endured began to fade away. Ironically, the shadow of the State House still falls upon the sites of this chapter in the city’s dark and almost forgotten past. Although both neighborhoods were cursed by rumors of crime and seedy activities, they also housed a vibrant working-class community composed of all races that lived together in harmony. While we shouldn’t forget the racial hatred and violence that marred this chapter in Providence’s history, we should also remember the diversity and solidarity that characterized our own 99% in these neighborhoods, too. | <urn:uuid:c78f17b5-6313-42a0-8636-897a2a7b8a1c> | {
"date": "2019-08-22T17:34:55",
"dump": "CC-MAIN-2019-35",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317339.12/warc/CC-MAIN-20190822172901-20190822194901-00016.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9767115712165833,
"score": 3.359375,
"token_count": 694,
"url": "https://occupiedprovidencejournal.wordpress.com/2013/04/15/the-tragedy-of-hard-scrabble/"
} |
A mass driver is a device that uses a linear motor to accelerate a mass to high-speed, hence the name. Electromagnetic catapult is another name for mass driver and refers to physical principles behind this system.
Two different but related applications of mass drivers have been proposed in spaceflight. The first is as a method of non-rocket space launch. Here a mass driver is located at the surface of a celestial body, such as the Moon, and remains stationary.
In theory mass drivers could be used on Earth to launch stuff into space. But given terrestrial gravity this would require very large structures and the costs might be prohibitive. Since the escape velocity of the Moon is much lower, lunar mass drivers are a common trope in discussions on lunar activities.
A second application of mass drivers is to propel spacecraft in space. Small pellets of mass are expelled by the mass driver from the spacecraft and due to Newton’s third law of motion, this will cause the spacecraft to be accelerated in the opposite direction. This is similar to rockets.
O’Neill has proposed to use mass drivers as method of propulsion for “space tug boats”, which would accelerate space ships towards the asteroid belt. (The tug boats themselves would stay in near earth space.) As propellant the waste from lunar mining activity would be used.
A problem with this method is, however, that the exhaust particles will increase the amount of space debris. Given the high velocity of these particles, they will constitute a serious threat to satellites, probes and space habitats. Though this might not seem a big problem as the solar system is quite large, but increased human activity in space will also increase the probability that the exhaust of mass drivers will cause serious damage.
This problem might be avoided if instead of mass drivers solar sails are used. Solar sails use the Sun’s radiation pressure to accelerate. The benefit of solar sails is that they do not contribute to space debris.
A disadvantage of solar sails is that a large surface is needed to acquire is relatively low amount of thrust. Depending on the purpose of the spacecraft, this might be a problem. For a scientific unmanned probe this does not seem a real issue, but it might be for a manned commercial trip.
A second issue with solar sails is that the solar radiation pressure falls as an inverse square function of the distance from the Sun (i.e. if the distance is doubled, the pressure will be one-fourth). Again this does not have to be a big concern, depending on circumstances.
Space-based, high-power lasers could overcome these issues. Since lasers concentrate energy in a relative small area, “solar” sails can be accelerated at a higher rate. An additional benefit of beam-powered propulsion is that spacecraft can be accelerated at great distances.
Since solar radiation is pointed away from the Sun, solar sails have little value of spacecrafts with an inward direction – except for deceleration. Lasers located in the asteroid belt can be used to decelerate outward spacecraft and to accelerate inward ones. | <urn:uuid:59955fd0-98af-450a-9ab7-aa4e57a8f97c> | {
"date": "2019-06-17T23:15:37",
"dump": "CC-MAIN-2019-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998581.65/warc/CC-MAIN-20190617223249-20190618005249-00056.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9521455764770508,
"score": 3.890625,
"token_count": 623,
"url": "https://republicoflagrangia.org/2015/04/26/solar-sails-or-mass-drivers/?replytocom=44601"
} |
Two years ago, 11 men lost their lives as a backlash of gas exploded into the night from the Deepwater Horizon drilling rig in the Gulf of Mexico. In the ensuing months, roughly 5 million barrels of oil and more than 6 billion cubic feet of natural gas spewed into the ocean from the Macondo well more than a kilometer underwater. It took the combined efforts of the U.S. government, the world's major oil companies and, finally, a lonely hydrologist working through the night from a cellphone picture of pressure reading graphs to cap the spill on July 15, 2010.
Two years later, Gulf seafood remains suspect in consumers' minds, despite the "sniff test." Fishermen and scientists report an excess of deformed or sickly sea life, and more than a million barrels of spilled oil remain "missing," likely never to be found. The Gulf's dolphins have been dying, deepwater corals remain coated in hydrocarbons and many people involved in the clean-up complain of poor health.
It will take decades to fully reckon the toll of BP's 2010 oil spill. In fact, science is still grappling with the after effects of the 1989 Exxon Valdez oil tanker spill. It took three years for Prince William Sound in Alaska's herring fishery to collapse and 20 years to reach a legal settlement.
Meanwhile, an invisible leak of natural gas is ongoing in the North Sea from an offshore platform operated by French oil company Total. Oil spills occur weekly in the Niger Delta of Nigeria. And the oil industry has resumed deep water drilling in the Gulf of Mexico as well as prospecting in the melting Arctic, without adequate oversight or the resources to contain or clean up any future spills in the frigid north.
BP can and should bear legal consequence for its negligence, but the ultimate blame for the Macondo well spill falls squarely on us Americans and our way of life. We consume roughly a quarter of the world's oil to fuel our cars, trucks and just-in-time shipping. The world consumes a barrel of oil every second. Sadly, more oil runs off U.S. parking lots after rainstorms in a year than spewed into the Gulf of Mexico from BP's Macondo well during the three-month blow-out. Oil addiction ain't pretty.
Image: Fire boat response crews battle the blazing remnants of the off shore oil rig Deepwater Horizon on April 21, 2010. A Coast Guard MH-65C dolphin rescue helicopter and crew document the fire, while searching for survivors. Multiple Coast Guard helicopters, planes and cutters responded to rescue the Deepwater Horizon's 126 person crew. (U.S. Coast Guard photo) | <urn:uuid:ba0764bc-95ce-4f8b-9366-6ca933b464ce> | {
"date": "2015-10-10T16:33:34",
"dump": "CC-MAIN-2015-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737958671.93/warc/CC-MAIN-20151001221918-00020-ip-10-137-6-227.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9479947686195374,
"score": 3.140625,
"token_count": 543,
"url": "http://blogs.scientificamerican.com/observations/oil-addiction-two-year-anniversary-bp-gulf-oil-spill/"
} |
Loge Family History
14-Day Free Trial
Loge Name Meaning
Dutch: nickname from Middle Dutch logghe ‘heavy’. German: topographic name from log ‘marshy ground’, or a habitational name from Loga or Logum, derived from the same word. Possibly Norwegian, a habitational name from any of several farmsteads in southeastern Norway, from the earlier form Leikvin (see Loken). French: topographic name for someone living in a small cottage or temporary dwelling, from Old French loge ‘lodge’. Stonemasons in particular lived in such dwellings while engaged on major construction projects such as churches or cathedrals, and the surname may therefore in some cases may have denoted a mason. French: habitational name from any of the places in northern France called La Loge or Les Loges, derived from a Germanic word laubja ‘(hut covered with) leaves’.
Source: Dictionary of American Family Names ©2013, Oxford University Press
Similar surnames: Lage, Lodge, Love, Loges, Voge, Lore, Longe, Hope, Loga, Loye | <urn:uuid:366121db-d0d2-4039-98ca-64856865d663> | {
"date": "2019-05-20T17:35:52",
"dump": "CC-MAIN-2019-22",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256082.54/warc/CC-MAIN-20190520162024-20190520184024-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.8838230967521667,
"score": 2.546875,
"token_count": 251,
"url": "https://www.ancestry.com/name-origin?surname=loge"
} |
In 1979, the Food and Agriculture Association of the United Nations (FAO) proclaimed October 16th as World Food Day.
Today is a global observance designed to raise awareness and understanding of different approaches to ending hunger. Food is a wonderful thing, and thanks to new technology and innovation in farming practices, farmers today are able feed around seven billion people globally! However, because our population is growing at such a fast pace, there are still roughly a billion people around the world that do not get enough food. This means that almost 1 in 7 people go to bed hungry every night. As our population has grown, hunger has become an increasingly prevalent issue. World Food Day seeks to remind us of this challenge, and also spotlight the different ways in which we can help the farmers tasked with overcoming it. Every year, World Food Day is accompanied with a theme. Last year, the theme was “Food prices- from crisis to stability.” This year, the theme is “Agricultural Cooperatives- key to feeding the world.” As many farmers know, an agricultural cooperative is a member owned organization which allows farmers to pool all of their resources into different areas of activity. According to the FAO, agricultural Co-ops are fundamental in providing solutions to the hunger problem because they allow smallholder farms to negotiate better prices for resources such as seed, fertilizer, and equipment. Take for example one of AGCO’s customers, Agrifirm. Agrifirm is a Dutch cooperative that serves over 17,000 Dutch farmers and horticulturists. They offer “maximum purchasing advantage of high quality products like animal feeds, seeds, fertilizers and pesticides.” In addition to product purchasing power, Agrifirm also offers knowledge and sustainable solutions to its members. Cooperatives such as Agrifirm allow farmers to access to knowledge and equipment that will help boost farm productivity at a lower cost. The more that small scale farms are able to produce, the better they will be able to support their local regions. This is why the U.N believes agricultural cooperatives to be a key element in providing for our world. It is no secret that farmers are faced with a huge task in supplying food, fiber and fuel for a rapidly growing population. It will not be easy—but with the proper resources, continued advances in technology, and widespread participation—it will be possible. Learn more about world food day, and see how you can help make a difference! | <urn:uuid:ba5b47d5-ab93-4463-926f-8e749b6c46a7> | {
"date": "2014-07-29T12:45:22",
"dump": "CC-MAIN-2014-23",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267330.29/warc/CC-MAIN-20140728011747-00324-ip-10-146-231-18.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9638122916221619,
"score": 3.3125,
"token_count": 506,
"url": "http://blog.agcocorp.com/2012/10/world-food-day/"
} |
What is social economy?
Social economy puts people before profits. It invests in people, in their capacities and creativity, and empowers them, creating quality jobs and providing training as well as prioritizing social objectives, like helping people far from the labour market access work.
In a market economy, enterprises are meant to generate a profit. They operate in the market, providing goods and services and looking for customers’ satisfaction. This is also true for the social economy. But the difference being that in a social economy, the profit gained goes toward meeting social objectives, not primarily toward generating individual wealth.
By prioritising social objectives, social economy contributes, in an innovative way, to tackling social, economic and environmental needs in society that have been overlooked or inadequately addressed by the private or public sectors. With this understanding in mind, Caritas are actively creating and implementing a variety of different types of social economy projects throughout Europe.
How does social economy work?
- It invests profit into social objectives (i.e. via free professional training for unemployed people, including vulnerable people in the functioning of the enterprise, raising awareness on specific topics, etc.);
- It creates spaces for participating and sharing ideas within a social economy enterprise;
- It promotes cooperation, awareness and engagement among the community;
- It contributes to protecting the environment.
What is the added value of social economy for the different actors involved?
- Individuals are empowered as they learn about starting their own business. Others benefit from gaining access to more quality jobs and gaining a sense of community belonging.
- Communities become more cohesive, since social economy can facilitate the development of inclusive local policies and contribute the common good of the local community.
- The whole society benefits from innovative ideas and solutions that answer society’s needs and contribute to changing mind-sets.
Caritas helps thousands of people out of poverty and exclusion by supporting and running hundreds of social economy initiatives across Europe. It makes sense that social economy is one solution toward building a stronger, more cohesive Europe! | <urn:uuid:93179ad6-3738-4b32-99ac-9d8ef99e61ae> | {
"date": "2017-07-26T04:51:05",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425766.58/warc/CC-MAIN-20170726042247-20170726062247-00096.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9400209188461304,
"score": 2.90625,
"token_count": 414,
"url": "http://www.caritas.eu/functions/policy-advocacy/social-economy"
} |
Long-billed Curlew (Numenius americanus)
- The long-billed curlew reaches a height of 18 to 26 inches (45 to 66 cm), with a 36- to 40-inch (91 to 101 cm) wingspan. They have speckled brown and buff backs and upper wings, buff colored bellies and breasts, and cinnamon-colored underwings. Their legs and feet are bluish-gray, and the feet have webbed front toes. The long, thin, down-curved bill is dark and fades to a flesh tone at the base. Its bill can be more than 8 inches (20 cm) long and has a droplet-shaped tip.
- Life History
- When inland, long-billed curlews eat mostly insects and worms. In coastal areas, they probe in the mud with their long bills for shellfish, crabs, and fish. They will also eat other nesting birds. Predators hawks, badgers, coyotes, weasels, and snakes feed on long-billed curlews. Sexual maturity is reached at three to four years. Mating season is from mid-April through September. Nests are built on the ground in flat, open areas with clumps of grass. The nests are simple depressions in the ground, usually lined with grass. Females typically lay four greenish or buff-colored, pear-shaped eggs with brown spots, which incubate for 27 to 30 days. The chicks can fly within 45 days of hatching. Life span is up to ten years.
Curlews frequently build nests near cow patties or bushes to help hide the nests from predators. The females incubate the eggs during the day and the males incubate at night. The females will abandon the nest and their mate two to three weeks after the eggs hatch. Predators destroy 10 to 16 percent of long-billed curlew nests. If a nest is only partially destroyed, the parents will still abandon the remaining eggs.
Long-billed curlews are also called "sicklebills", "big curlews" or "hen curlews." The genus name, Numenius, is Greek and refers to its crescent-shaped bill. Long-billed curlews can swim if they need to - their front toes are webbed. They can fly as fast as 50 miles (80 km) per hour.
- Long-billed curlews prefer prairies and pastures with short grass during breeding season. After breeding, they seek seashores, lakes, rivers, mudflats and salt marshes.
- Long-billed curlews can be found from southwestern Canada to the western half of the United States. They winter in the southern United States and south to Guatemala, but can be found along the Texas Gulf Coast during the summer as well.
- Not surprisingly, the long-billed curlew has a long, downward curving bill. Look for it on the seashore where it spends its winters or in fields and prairies where it breeds. Habitat loss has forced it to exist almost exclusively in the western half of North America. The long-billed curlew was once common along the Great Plains and in the eastern United States. In the late 1800s and early 1900s, these and other shorebirds were hunted in large numbers as game; long-billed curlew was a menu item in many restaurants. By the time they were finally protected by the Migratory Bird Treaty Act, much of their crucial breeding habitat had been destroyed for agriculture. Populations in the eastern United States never recovered, but curlews remain fairly common in the western United States. Although pesticides may have also contributed to declining populations of curlews, the main reason for the species' continued decline is habitat loss. The long-billed curlew is listed on the Audubon Society's Blue List of decreasing bird populations. It is also listed as endangered, threatened, or species of special concern in several states. | <urn:uuid:5a54aba6-b55a-41ad-b77d-1191a68a4f3b> | {
"date": "2019-07-23T01:25:21",
"dump": "CC-MAIN-2019-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528635.94/warc/CC-MAIN-20190723002417-20190723024417-00016.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9706944823265076,
"score": 3.640625,
"token_count": 837,
"url": "https://tpwd.texas.gov/huntwild/wild/species/curlew/"
} |
Boston College’s Physician of Training (EdD) program for Special Training is designed to increase and expand the data and expertise of enrolled graduate students to assume roles as leaders in the area as teacher educators, program administrators, and researchers. Talk with the college administrators, teachers and your kid’s trainer to assist design the perfect options to your baby. Students benefit from inclusion by means of the supply of a broad vary of programs and companies that help our primary purpose of training students of their home college neighborhood with their identical age friends, at any time when doable. Different packages require potential lecturers to take lessons in training earlier than they will start to teach. For information about trainer preparation applications and certification necessities, visit or contact your state’s board of training. You may study extra about working in collaborative groups to assist all learners to succeed in an inclusive training system. Special training academics assess college students’ progress and use that information to adapt classes to help them study.
There’s lots to know in regards to the course of by which children are recognized as having a incapacity and in want of special training and related companies. To assist schools in preparing functions for SAC, we have now prepared some resources that define the SAC course of and suggestions for making ready an alternative proof application.
Different students may spend a part of the day mainstreamed” usually education classrooms reminiscent of for art and P.E. Each state should keep the same stage of economic help for special training every year. In that case, and the scholar’s conduct is suitable, full inclusion may very well be one of the best answer.
During scholar educating, they gain expertise in preparing lesson plans and educating students in a classroom setting, below the supervision and guidance of a mentor teacher. Schools can request a review of the instructor aide useful resource allocated to a scholar or youngster within the Ongoing Resourcing Scheme (ORS) or the School Excessive Well being Wants Fund (SHHNF). A wide range of stand-alone Particular Training certifications are also supplied online at Saint Joseph’s University. Then there are various bodily disabilities that may cause the scholar to want extra extensive assistance for his or her special training curriculum. They adapt common schooling lessons and train various topics, comparable to reading, writing, and math, to students with delicate and average disabilities.
Our philosophy of inclusion is also supported by means of common design for studying to help the creation of quality applications for all students utilizing a differentiated instruction framework. A particular education trainer and a basic education teacher share equal accountability for instructing the class. Some special education lecturers want to complete a interval of fieldwork, commonly known as pupil teaching, earlier than they’ll work as a instructor. In Scotland the Further Assist Needs Act locations an obligation on training authorities to satisfy the wants of all college students in consultation with other businesses and fogeys. Extra minors embrace utilized behavior evaluation, autism, and early childhood special training. | <urn:uuid:39968a09-14fd-4327-9603-08bc16c485a5> | {
"date": "2019-09-19T00:42:42",
"dump": "CC-MAIN-2019-39",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573385.29/warc/CC-MAIN-20190918234431-20190919020431-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9546036720275879,
"score": 2.765625,
"token_count": 607,
"url": "http://www.justfoxprojobs.com/special-schooling-graduate-diploma-applications.html"
} |
Geological and buried manmade features or objects can cause local variations in the earth’s magnetic field which can be measured with a magnetometer. Detailed magnetic survey can be used to effectively define areas of past human activity. It is a quick, cost effective technique which has become the industry standard for archaeological surveys.
Objects that have been heated have their magnetic properties markedly changed. These are called 'thermoremanent' effects. These effects can be very large and strong such as an igneous dyke, through to a horse shoe nail in the top soil causing a 'ferrous' spike. Features with thermoremanent magnetisation can be easily found with gradiometers so that objects such as brick walls, foundations, steel or clay pipes, hearths, kilns and ferrous artifacts associated with archaeology will stand out from the background magnetic levels.
In addition to thermoremanent effects more subtle changes in magnetisation can be detected. Silting and deliberate infilling of ditches and pits with magnetically enhanced soil creates a relative contrast against the much lower levels of magnetism within the subsoil into which the feature is cut. Material such as subsoil and non-magnetic bedrock used to create former earthworks and walls may be mapped as areas of lower enhancement compared to surrounding soils.
Factors affecting the magnetic survey may include soil type, local geology, previous human activity, disturbance from modern services etc.
The new SUMO cart system
The new SUMO cart system utilises four Bartington gradiometers combined with a Trimble RTK GPS. With improved resolution and each data point positioned with the survey-grade GPS, the system represents a significant step forward in data acquisition.
The SUMO cart system produces improved results when compared to traditional Magnetic Surveys, with: -
- 50% Better In-line Resolution
- Greater Positional Accuracy
When used with our all terrain vehicle, it also provides digital terrain models for direct comparison of magnetic anomalies against earthworks.
Contact us now to find out how the system can improve the quality of the survey data that we can provide. | <urn:uuid:6de8158a-a8d9-421a-bc96-cf4cbbdc0e32> | {
"date": "2017-10-22T22:43:07",
"dump": "CC-MAIN-2017-43",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825473.61/warc/CC-MAIN-20171022222745-20171023002745-00856.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9182637929916382,
"score": 3.078125,
"token_count": 431,
"url": "https://www.sumoservices.com/magnetic-survey"
} |
posted by pocholo .
An aluminum wing on a plane is 30.6 m long when the temperature is 20 oC. At what temperature would the wing be 0.06 m shorter
(T - 20)*(thermal expansion coeff.)* 30.6 = -0.06
Look up the thermal expansion coefficient of aluminum, and solve for T. It will be less than 20 C. | <urn:uuid:7fb3f6ab-6935-446e-9db2-137f870e16e0> | {
"date": "2017-07-28T03:09:44",
"dump": "CC-MAIN-2017-30",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549436321.71/warc/CC-MAIN-20170728022449-20170728042449-00536.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.7900773882865906,
"score": 2.671875,
"token_count": 84,
"url": "https://www.jiskha.com/display.cgi?id=1367109723"
} |
Opposite to the convictions of many enthusiasts, "burn in" can only have deleterious long-term affects on a processor's performance, Burin in is not a temporary condition, because its' effects are permanent. And immediately following burn-in, the microprocessor is only stressed further in its overclocking. It’s possible enthusiasts have confused the term, burn-in with the manufacturing version, and there-by believe it is safe. But do not be mislead those claiming burn-in is safe "because manufacturers" put all their chips through these rigors. There is a significant difference in the semantics of burn-in as it is applies to industry standards, the methodologies are completely different, for example:
There is burn-in and then there is burn-in. In semiconductor manufacturing terminology "burn-in" is a stage of the production flow after packaging in which the CPU is placed in an elevated temperature environment and is stressed at atypical operating conditions. The end goal of this is to dramatically reduce the statistical probability of "infant mortality" failures of product on the street. "Infant mortality" is a characteristic of any form of complex manufacturing in that if you were to plot device failures in the y-axis and time in the x-axis, the graph should look like a "U". As the device is used, initially quite a few fail but as time goes on this number drops off (you are in the bottom of the "U" in the graph). As the designed life of the product is reached and exceeded, the failure count rises back up again. Burn-in is designed to catch the initial failures before the product is shipped to customers and to put the product solidly in the bottom section of the "U" graph in which few failures occur. During this process there is a noticeable and measurable circuitry slow-down on the chip that is an unfortunate by-product of the process of running at the burn-in operating point. You put a fast chip into the burn-in ovens and it will always come out of the ovens slower than when it went in - but the ones that were likely to fail early on are dead and not shipped to customers...There are two mechanisms that cause the circuitry in CMOS - particularly modern sub-micron CMOS - to slow down when undergoing the burn-in process: PMOS bias-temperature instability (PMOS BTI) and NMOS hot-electron gate-impact ionization (known as "NMOS hot-e"). Both of these effects are complex quantum-electrical effects that result in circuitry slowing down over time.
I believe NMOS hot-e gate impact is relative to SSOI, or SOI, while PMOS BIT is an industry standard test. Regardless one wonders what the innate potential of a newly fabricated CPU would be, if it were set aside from the burn-in criteria? It seems logical to theorize from the stress they endure during burn-in, their life potential is essentially cut in half, at least a third. I surmise if one were able to source processor's prior to burn-in, they would out-perform anything else in their class. If you were to ask manufacturers to give synopsis of their burn-in criteria, the following would best describe those processes:
Accelerated testing--increases the usage of a component in a short time...if a relay must operate 10 times a day in a certain application, and the required operating life is estimated at 10 years, the relay must operate 36,500 times. You can test a relay and estimate the life expectancy of a batch of the same type of relays by performing 1000 operations per day within 36.5 days...Accelerated tests apply temperatures in the range of 75° C to 225° C, depending on the failure mechanisms you want to test for, and depending on the type of device you are testing. In many cases, you will apply a nominal voltage to the component...You may also want to test components under conditions of high humidity, in the region of 50% relative humidity (RH) to 90% RH, and under temperatures ranging from 85° C to 150° C.
Albeit essential for physical stressing of the product, burn-in seems almost a barbaric manner in which to treat processors. I imagine as micro circuitry continues to evolve so will the QC, and back-line criteria for testing. In fact there have already been advances in QC methodologies for .13 and .09 micron die's:
As 130- and 90-nanometer processes move deeper into production, new statistical techniques are replacing the go/no-go orientation of traditional ASIC testing. LSI Logic Corp. this week announced an example of the trend: a technique that completely replaces go/no-go fault testing with a series of statistical analyses performed after the wafer has left the tester....The reasons for the technique, which LSI calls statistical post-processing (SPP), are several...They include the increasing importance of delay or other "soft" faults compared with "hard'' stuck-at faults, the growing problem of achieving adequate test coverage on multimillion-gate designs, and the gradual breakdown of silver-bullet parametric techniques such as IDDq tests....IDDq-the measurement of quiescent supply current-is a case in point. Comparing measured against nominal supply current has in the past been an excellent indicator of defect-caused faults in ICs, even when those faults didn't appear as a hard short or open circuit. But with 130- and 90-nm processes, the intrinsic leakage current is so large that minor variations in IDDq may be tiny in comparison. Worse, cross-wafer process variations may cause IDDq variations that far exceed those caused by a genuine defect. So screening dice based on IDDq both rejects dice that are probably defect-free and passes dice that probably have defects. The result is lower-than-necessary yield and higher early field failures.
These and other methodologies under consideration, should significantly improve defect detection, and perhaps the actual "stressing" of the microchip will soon become a thing of the past. It seems only logical this would extend the life of the processor, and most likely improve performance out of the box! In this scenario, I'd be more inclined to (as would industry experts) to measure the effects of "Burn-in" as defined by the enthusiast segment. In this respect, those first instances of junction capacitance, and raised voltages, would certainly have a greater effect, then on a processor which has already been stressed to near the point of failure. It would certainly come closer to meeting the criteria for my microelectronic tabula rasa theory, where the circuitry is unalloyed, or unaltered by the presence of electrons. We may never see these specific tests developed, however; brighter minds may extrapolate much more intelligible data then I.
In summation, I would like to point out one semantic oddity which piqued my interest. I'd come across the following statement in the Anandtech "Burn-in" article; "There may be some effect that people are seeing at the system level, but I'm not aware of what it could be
." These final qualifications really stuck in my craw, as to completely negate the entire piece, or perhaps more accurately, leave open a "back door".
During the writing and more importantly research of this article, I realized based upon the large numbers of those who swear by the attributes of burn-in, there must be some type of occurrence? The problem lies in isolating where exactly the phenomenon exists. Is it in the microprocessor, at the system level, or in the belief system of the enthusiast? In fact the term "enthusiast" may denote a predilection to "believe" something positive is occurring, although it is not. Then again this is as random as believing an "overclocker" has a predilection for over winding his/her watch.
In order to have an intelligent discussion, we need to have a common frame of reference, so when the statement above is uttered (or printed) we have a clear definition for "system level occurrence." I cannot, therefore, in good faith recommend any type of burn-in, albeit the end-user, or the manufacturer. I can only wait, while manufacturing technology rapidly progresses. There may come a time, when some type of back-propagation "smart" electrons, perhaps a product of nanotechnology, can enter the processor mimicking precisely the attributes of DC, and tell us if any anomalies or propensity for failure exists in the device.
What I'm "enthusiastic" about is such technology is not only feasible, but foreseeable.
Comments, questions and suggestions can be placed in this thread @ our forums (no registration) | <urn:uuid:d4e90658-8e30-4176-9085-e60ac7a12aaf> | {
"date": "2015-11-28T15:00:59",
"dump": "CC-MAIN-2015-48",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398453553.36/warc/CC-MAIN-20151124205413-00206-ip-10-71-132-137.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9573230743408203,
"score": 3.125,
"token_count": 1826,
"url": "http://www.madshrimps.be/articles/article/88/Tabula-Rasa-Semantics-in-Microprocessor-Burn-in.-Part-III/1"
} |
A joint railway is a railway operating under the control of more than one railway company: those companies very often supplying the traction over the railway.
There are many examples of joint railway working in the United Kingdom. The more important ones included:
- Midland and Great Northern Joint Railway (M&GN): Midland Railway and Great Northern Railway (MR/GNR), latterly London and North Eastern Railway and London, Midland and Scottish Railway (LNER/LMS). This was the UK's biggest joint railway system at 183 miles (295 km) and operated with its own locomotives and rolling stock. The system stretched mainly east-west from Great Yarmouth via South Lynn to Bourne and Peterborough and thence via the parent companies' systems to Leicester and the Midlands and to London King's Cross. A north-south route ran from Norwich City to Cromer. The two routes crossed at Melton Constable, the joint railway's main engineering centre.
- Cheshire Lines Committee: Great Northern, Great Central and Midland Railways (GNR/GCR/MidR), 140 miles (230 km) operated with its own rolling stock.
- Great Northern and Great Eastern Joint Railway: the Great Northern and Great Eastern Railways. From Huntingdon and Spalding to Doncaster, with a branch to Ramsey. 123 miles (198 km)
- Somerset and Dorset Joint Railway: London and South Western Railway (LSWR) and Midland Railway. 101 miles (163 km) operated, with its own locomotives and rolling stock until 1930.
- East London Railway: the Great Eastern, London, Brighton and South Coast, South Eastern and Chatham, Metropolitan and District Railways (GER/LBSCR/SE&CR/MetR/District) 7 miles (11 km)
- Metropolitan and Great Central Joint Committee: the Metropolitan and Great Central Railways
- Manchester South Junction and Altrincham Railway: LNWR/GCR. 9 miles (14 km). Electrified in 1931
- Portpatrick and Wigtownshire Joint Railway: the Caledonian, Glasgow and South Western, London and North Western and Midland Railways. 82 miles (132 km)
- Preston and Wyre Joint Railway: L&YR/LNWR. 45 miles (72 km)
- Great Western and Great Central Railways Joint Committee: the Great Western and Great Central Railways. 41 miles (66 km)
- Severn and Wye Joint Railway: Great Western Railway and Midland Railway. 39 miles (63 km)
- Shrewsbury and Hereford Railway: the Great Western and London and North Western Railways. 56 miles (90 km)
- Shrewsbury and Wellington Railway: the Great Western and London and North Western Railways. 10.5 miles (16.9 km)
- South Yorkshire Joint Railway: GCR/GNR/L&YR/MidR/NER. 20 miles (32 km)
- Furness and Midland Joint Railway: 9 1⁄2 miles (15.3 km)
- Metropolitan and Metropolitan District Joint Committee: Metropolitan and Metropolitan District Railway, Mansion House to Aldgate on the Circle Line. 1 mile (1.6 km)
- Norfolk and Suffolk Joint Railway (N&S): the Midland and Great Northern and the Great Eastern Railway). There were two stretches of line: the most important ran along the East Anglian coast from Lowestoft to Yarmouth, while a much shorter stretch ran from Cromer to Mundesley on the North Norfolk coast. This line was a unique joint railway in that one of its parents was itself a joint railway.
- Axholme Joint Railway : North Eastern and Lancashire and Yorkshire Railways (NER/LYR) 27.5 miles (44.3 km)
- Forth Bridge Railway: the North British, Great Northern, North Eastern and Midland Railways. 2,765 yd (2,528 m)
- County Donegal Railways Joint Committee: the Northern Counties Committee and Great Northern Railway (Ireland). 111 miles (179 km) of 3 ft (914 mm) narrow gauge track in Northern Ireland and the Republic of Ireland, with its own locomotives and rolling stock.
"Joint railways" are called terminal railroads in the United States. Most true example of joint railways are in terminal areas, including union stations. Terminal railways are often co-owned by the railroads that connect with them. Among the more prominent joint operations were:
- Belt Railway of Chicago (BRC), the largest terminal switching railroad in the U.S., co-owned by all the "Big Six" American Class I railroads: Union Pacific Railroad, CSX Transportation, Norfolk Southern Railway, BNSF Railway, Canadian National Railway and Canadian Pacific Railway.
- Terminal Railroad Association of St. Louis (TRRA), with extensive operations in East St. Louis, Illinois and St. Louis, Missouri, and co-owned by all the Big Six except the Canadian Pacific.
- Conrail Shared Assets Operations (CSAO), the last corporate remnant of Conrail, which was formed from the remains of several bankrupt railroads in 1976; that company was split between CSX and Norfolk Southern, which formed CSAO in northern New Jersey, greater Philadelphia, Pennsylvania and greater Detroit, Michigan. Unlike the BRC and TRRA, CSAO uses crews and locomotives from its two parent companies, though the former Conrail paint scheme is still seen on numerous locomotives and freight cars that CSX and NS inherited.
- The Powder River basin joint line, co-owned by BNSF and Union Pacific to serve the area's numerous coal mines.
The concept of trackage rights is more common than joint railways in the United States. The railroad that owns the track permits trains from another railroad to use the line. The owner railroad normally charges a fee, but sometimes there is no charge because the arrangement results from a merger or sale of a line. For instance, when the Louisville and Nashville Railroad acquired the Monon Railroad a condition of the sale imposed by government regulators was a trackage rights arrangement over the southern part of the Monon for the Milwaukee Road, an agreement that was handed down to successive owners of the Milwaukee Road and finally the Indiana Rail Road.
Variations on trackage rights include "direction running" agreements between two railroads with parallel lines through an area, usually done to facilitate greater traffic volume. For instance, CSX and NS have a directional-running agreement between downtown Cincinnati, Ohio and nearby Hamilton, where northbound trains generally use NS trackage and southbound trains (with the exception of Amtrak's Cardinal) use CSX tracks. North of Hamilton, NS trains use CSX tracks on a traditional trackage-rights agreement for a two-mile (3 km) section.
- List of early British railway companies
- List of railway companies involved in the 1923 grouping
- Joint station (UK), Union station (USA) | <urn:uuid:ce469251-846f-4adf-9104-f31a76826511> | {
"date": "2019-03-18T17:12:22",
"dump": "CC-MAIN-2019-13",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201455.20/warc/CC-MAIN-20190318152343-20190318174343-00496.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.938694953918457,
"score": 3.25,
"token_count": 1450,
"url": "https://en.wikipedia.org/wiki/Joint_railway"
} |
A UC Berkeley theory on how dinosaurs became extinct -- that an asteroid started a chain reaction that ultimately doomed the dinosaurs -- was confirmed in a review by the journal Science.
The theory, first put forward by a team of researchers at Berkeley led by geologist Wilson Alvarez, argues that an asteroid slammed into Earth near the northeast corner of the Yucatan peninsula, causing massive earthquakes and sending massive amounts of sulfur into the atmosphere -- and leading to global cooling and, ultimately, the extinction of the dinosaurs.
However, some scientists believe that a massive volcanic eruption in India, not an asteroid, led to the mass extinction of the massive animals, and they're sticking to their guns.
Both can agree on one thing -- the massive event, be it a volcano or an asteroid, happened hundreds of thousands of years before the actual extinction.
In the intervening 65 million years, mammals have evolved to the point where a particularly clever cousin of the monkey has figured out how to warm the planet by burning massive amounts of dinosaur remains that had been quietly fermenting under the earth's crust -- maybe causing another global mass extinction.
Jackson West hopes one day to be cloned from the DNA found in a mosquito trapped in amber. | <urn:uuid:dc197a09-e7e8-49cb-87ac-24f317d386c2> | {
"date": "2016-09-30T00:07:09",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661962.7/warc/CC-MAIN-20160924173741-00082-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 4,
"language": "en",
"language_score": 0.9418950080871582,
"score": 3.8125,
"token_count": 244,
"url": "http://www.nbcbayarea.com/news/local/Asteroid-Not-Volcanoes-Doomed-Dinosaurs-Says-Science-jw-86654452.html"
} |
Classroom management may be the most critical part of your teaching job.
Classroom management… really that important? Well, if you can’t manage your classroom, nothing else you do may even matter.
While there have been thousands of books and articles published over the years about classroom management, I think these four simple tips can make a big difference.
1. Be consistent with classroom rules and keep them visible throughout the year.
Make rules clear from day one, and make sure they are easy for your students to remember. Post classroom rules and behavior guidelines in obvious places, and make a copy to distribute to every student. TIP: There are all sorts of game-playing apps you might want to use to “make a game” out of the rules, and get your students involved in learning about them that way. Check out Kahoot: Games for Review and Assessment and 5 Learning Games for Little Learners for some interesting ideas and simple apps that help you create classroom games.
2. Create an atmosphere that’s conducive to individualized attention.
Make it your mission to get to know each student individually – their likes and dislikes, their strengths and weaknesses, their dreams, and more about how they learn best.
3. Encourage classroom discussion amongst all students.
Practice moderating a discussion and be gently encouraging with the shy students. Call on different students, but don’t make it into an experience that’s frightening or nerve-racking for any individual student. See the links above in item #1 for some game tips that can help your introverted students.
4. Don’t beat yourself up if you’ve had a hard day. It comes with the territory of teaching.
Even the seasoned pros have challenges. Take it one day at a time, and don’t get discouraged from a bad day, or even a bad week. We’ve all been there!
Classroom management, when done well, is probably the single biggest factor in determining how effective we are as teachers. | <urn:uuid:1a3fddd7-2bcf-4af9-af55-9d3cdda104aa> | {
"date": "2017-02-22T01:42:19",
"dump": "CC-MAIN-2017-09",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170875.20/warc/CC-MAIN-20170219104610-00452-ip-10-171-10-108.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9483457803726196,
"score": 2.515625,
"token_count": 425,
"url": "http://www.simplek12.com/classroom-management/4-classroom-management-tips-for-teachers/"
} |
Want to know the secret to being a productive, functioning adult? It’s naps. Naps all day, every day.
At least, that’s what we’re telling ourselves. Napping helps you do things. Napping restores your emotional, physical, and mental wellbeing. It doesn’t count as procrastinating or relaxing because it’s good for you, right?
We have some bad news.
A new study has found that taking long naps isn’t quite the health-helper we thought it was. In fact, if you’re napping for too long, you could actually be doing some serious damage to your health.
The study, by Dr Tomohide Yamada, tracked data from 300,000 people from around the world. Analysis of the results revealed that taking frequent naps that are longer than 40 minutes can significantly increase the risk of developing metabolic syndrome; a collection of health conditions such as high blood pressure, high cholesterol, high blood sugar, and excess fat around the waist.
Taking 90 minute naps increased the risk of type two diabetes by 50%.QUIZ: Should you take a nap right now?
All of which sounds pretty scary, we know. But there’s really no need to panic.
Short naps can have all kinds of benefits, and there’s no evidence to suggest that naps of 20 to 30 minutes will do you any harm. The study also appears to focus on people who frequently have longer naps, so if you ever need a one-off after going too big the night before, it’s probably okay.
Our advice is pretty simple. Aim to get your eight hours at night. If you don’t manage that and feel exhausted during the day, set an alarm for half an hour of shut-eye.
But you shouldn’t be relying on naps to make up for lost sleep. Make sleeping at night your priority, and resort to a quick (meaning under forty minutes) nap when you need one – any longer and you’ll just feel groggy, not just stressed about your longterm health. | <urn:uuid:7017e96d-e1b3-4b6f-8a35-221453e62ab7> | {
"date": "2018-06-20T00:28:36",
"dump": "CC-MAIN-2018-26",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863259.12/warc/CC-MAIN-20180619232009-20180620012009-00416.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9419795870780945,
"score": 2.796875,
"token_count": 449,
"url": "https://metro.co.uk/2016/06/21/taking-long-naps-could-be-bad-for-your-health-5957707/"
} |
Try to avoid triclosan. Read labels (especially soaps, personal care, and household cleaning products) and avoid anything that says it contains triclosan, or is anti-bacterial, anti-fungal, anti-microbial, or anti-odor. We easily absorb triclosan into our bodies, and it has been detected in our urine, blood, and breast milk. Among its many negative effects (e.g., here and here) is that it is now linked to disruption of gut bacteria.
The gut microbiome performs vital functions in our bodies. Deviation from the normal microbiome (our microbial communities being out of whack) is known as dysbiosis. Dysbiosis has been associated with human diseases, including diabetes, heart disease, arthritis, and malnutrition. The researchers used zebrafish because they are commonly used to study impacts of various chemicals on gut microbial communities. So yes, the findings are valid and match what other studies have found. So please try to avoid triclosan. From Science Daily:
A new study suggests that triclosan, an antimicrobial and antifungal agent found in many consumer products ranging from hand soaps to toys and even toothpaste, can rapidly disrupt bacterial communities found in the gut.The research was published in PLOS ONE by scientists from Oregon State University. It was based on findings made with zebrafish, which researchers believe are an important animal model to help determine possible human biological and health impacts of this antimicrobial compound.
Triclosan was first used as a hospital scrub in the 1970s and now is one of the most common antimicrobial agents in the world, found in shampoos, deodorants, toothpastes, mouth washes, kitchen utensils, cutting boards, toys, bedding, socks and trash bags. It continues to be used in medical settings, and can be easily absorbed through the skin.
"However, there's now a growing awareness of the importance of the bacteria in our gut microbiome for human health, and the overuse of antibiotics that can lead to the rise of 'superbugs.' There are consequences to constantly trying to kill the bacteria in the world around us, aspects we're just beginning to understand."
In the new study, researchers found that triclosan exposure caused rapid changes in both the diversity and composition of the microbiome in the laboratory animals. It's not clear what the implication may be for animal or human health, but scientists believe that compromising of the bacteria in the intestinal tract may contribute to the development or severity of disease. Some bacteria were more susceptible to the impact of triclosan than others, such as the family Enterobacteriaceae; and others were more resilient, such as the genus Pseudomonas.
The gut-associated microbiome performs vital functions for human health, prevents colonization with pathogens, stimulates the development of the immune system, and produces micronutrients needed by the host. Dysfunction of this microbiome has been associated with human disease, including diabetes, heart disease, arthritis and malnutrition, the scientists pointed out in their study.
Triclosan has been a concern in part because it is so widely used, and it's also readily absorbed through the skin and gastrointestinal tracts, showing up in urine, feces and breast milk. It also has been associated with endocrine disruption in fish and rats, may act as a liver tumor promoter, and can alter inflammatory responses. | <urn:uuid:142d7a35-463f-487b-bfb3-c5d2abe870fa> | {
"date": "2020-01-23T22:45:51",
"dump": "CC-MAIN-2020-05",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00376.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9537568092346191,
"score": 2.875,
"token_count": 707,
"url": "https://lactobacto.com/tag/gut-bacteria/"
} |
Tuesday, January 08, 2013
Definitions for pseudology
- Lying considered as an art.
Get the Word of the Day Email
Citations for pseudology
For example, listening to the life history account of András Albert, a Transylvanian lumberman, the outsider may wonder how to distinguish fact from fiction, poetry from lie, and how to regard the relationship between pseudology and storytelling.
So many people would love to get their hands on a machine that can inhibit pseudology, mendacity and falsehood. The police, Intelligence services, all sorts and conditions of interested agencies and institutions.
Origin of pseudology
Pseudology comes from two Greek roots, pseudo- meaning "false" and -logy meaning "study of." The word does not literally mean "the study of lying" but has come to embody the sense of "the art of lying." | <urn:uuid:5e0467f0-3ec5-4d35-95ab-191ca1af2bb9> | {
"date": "2016-09-30T10:48:35",
"dump": "CC-MAIN-2016-40",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662159.54/warc/CC-MAIN-20160924173742-00282-ip-10-143-35-109.ec2.internal.warc.gz",
"int_score": 3,
"language": "en",
"language_score": 0.9313564300537109,
"score": 2.734375,
"token_count": 183,
"url": "http://www.dictionary.com/wordoftheday/2013/01/08/pseudology"
} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.