text
stringlengths
174
640k
id
stringlengths
47
47
dump
stringclasses
17 values
url
stringlengths
14
1.94k
file_path
stringlengths
125
142
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
43
156k
score
float64
2.52
5.34
int_score
int64
3
5
A new way of comparing the color andintensity changes of light reflected off of Earth's surface to the flickersfrom exoplanets may help reveal the presence of oceans, continents and ?possibly ? life on alien worlds. Researchers came up with a color scheme forhow our uniquely life-filled, ocean-soaked planet would appear to observerstens of light-years away. By comparing the changes in observed hues ofan alienplanet ?as it rotates to this distinct Earthly color palette, "we caninfer the surface composition of the [exo]planet," said Yuka Fujii, adoctoral student at the University of Tokyo and lead author of a paperpublished in the May 4 issue of the Astrophysical Journal. The method might let astronomers to soon huntfor soil, snow, seas or even plant life on exoplanets that for decades will otherwiseremain too faint to directly visualize. Little light to work with For today's mostpowerful telescopes, even a nearby exoplanet is nothing more than a pointsource of light teased out from the intense glare of its host star. Should asmall, Earth-like planet be discovered around another sun, astronomers will notbe able to simply look at it and pick out azure seas or verdant rain forests. The problem: the dearth of light particles,or photons, reflected by exoplanets that then reach across trillions of milesto our telescopes. The next generation of proposed secondEarth-hunting instruments, such as the Terrestrial Planet Finder or the NewWorlds Observer, will similarly struggle to resolve much more than just anexoplanetary flicker. "It is hard to obtain enough photons from distantplanets for detection" of surface features such as vegetation, said Fujii. Yet these rare rays of light carry with themtelltale signatures, and astronomers have detected various gases in the atmospheresof giant exoplanets using spectroscopy. The new study suggests that enoughlight may be reflecting off the ground as well to be observationally valuable. "We cannot directly identify green, blueand red spots on the surface," Fujii said. "But we can observe thetotal color average over the visible surface of the planet" and compare itto Earth's known values to take a stab at the world's geology or even biology. Peering into a planetary mirror Researchers used satellite data to model abaseline for "Earthshine," or the wavelengths of sunlight reflectedby major surface types on Earth, including oceans (which covers 71 percent ofthe planet), vegetation (14 percent), soil, such as deserts (9 percent) and snowand ice (3 percent). These types reflect different amounts oflight at certain wavelengths; snow, for instance, reflects more than 80 percentof light around 0.8 microns, while oceans bounce back photons in the low singledigits percentage-wise. As Earth (or an Earth-like exoplanet)rotates, greater and lesser expanses of these surface types come into view,changing the overall complexion of light reflected out into space in ameasurable way. In this way, astronomers can compare exoplanetarysheens to Earth's to come up with rough estimates for a patchwork of alien seasand savannahs, should they exist. The varying levels of light representingdifferent land forms are somewhat like the spices and ingredients in a soup, so"it's taking the total light, or the total taste of the soup, anddecomposing it into things we know about like soil in the way that a chef knowssalt or basil," said Ed Turner, a professor of astrophysics at PrincetonUniversity and a co-author of the paper. A work in progress For their model, the researchers assumed a twinof Earth at a distance of about 30 light-years ? close by cosmic standards ?and a space telescope with a two-meter mirror observing for an hour a day overtwo weeks. "We assumed a fairly nearby planet, butstill had to stack the data for two weeks in order to accumulate a sufficientnumber of photons," said Fujii. The model relies on many oversimplifications.Clouds, for example, with their light-scattering and ground-feature-obscuringeffects, are not yet part of the equation. Alan Boss, anastrophysicist at the Carnegie Institution in Washington, also pointed out thatpaper ignores "the problem of separating the planet's light from thestar's light," perhaps the biggest hurdle in exoplanetary investigation. Spying blue skies and the red edge? But even in its preliminary form, thecolor-detection method shows much promise and Turner said he was "surprisedat how well it worked." The technique could detect both an atmosphereand an ocean simultaneously based on Rayleigh scattering, the light-scatteringeffect that makes our sky and oceans appear blue and that would similarly tintthe light from Earth-like exoplanets. Color comparisons to Earth could also revealthe so-called red edge. Plants on Earth have evolved to reflect sunlightin the infrared range that is not energetic enough for photosynthesis but wouldotherwise heat the plant up; when viewed in infrared, plain green plants are abrilliant bright red, said Turner. This signature would jump out in the straybits of precious light collected from an exoplanet, he added. Many astronomers think the red edge is thebest shot at detecting alien life (assuming these plants are colored likeearthly ones). "Looking for evidence of the red edge isan excellent means for buttressing the case that an exo-Earth might not only behabitable, but inhabited," said Boss. Webster Cash, an astronomy professor at the Universityof Colorado, said the color variation technique is "absolutely going to beuseful" in the years ahead. He pointed out that it could be paired downthe road with other recognized ways to sniff out so-called biomarkers ofextraterrestrial life, such as the detection of oxygen and other key gases in Earth-likeexoplanetary atmospheres via spectroscopy. For now, the Kepler spacecraft, in its ongoinghunt for habitableplanets around 100,000 stars, will not be able to see the red edge ordetect surface features because the instrument "has no color information ?all photons are the same for Kepler," Boss said. Though much refinement is needed for thecolor-based method, Turner said it could be adapted for use on futureterrestrial planet finding satellites that NASA and ESA are exploring.? "I think we're really on the thresholdof being able to study earthlike planets around other stars," Turner said. And as with horseshoes and hand grenades,when it comes to scanning an exoplanet's light for signs of life, closenesscounts. "If we happen to find an Earth-likeplanet much closer than 30 light-years, say eight, this would be a loteasier," Turner said. - TheStrangest Alien Planets - Top10 Extreme Planet Facts - OutThere: A Strange Zoo of Worlds
<urn:uuid:e9d33035-6e3d-4d6c-8c74-7b3ccef7a87b>
CC-MAIN-2023-14
https://www.space.com/8404-color-changing-planets-hold-clues-alien-life.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949035.66/warc/CC-MAIN-20230329213541-20230330003541-00558.warc.gz
en
0.921278
1,468
3.578125
4
In the beginning of Monsters Inc, we are greeted with a society whose norm was to send monsters into childrens’ rooms daily to scare them. We see that Sully and the other monsters believed that the children themselves are harmful and scary. The introduction of a child named Boo helped Sully to realize their backwards way of thinking. Instead of scaring kids, the monsters could make them laugh. This story shows us that children are greatly important and have the power to make monumental change. Jesus even emphasizes the power of having faith like a child – that even adults could learn from the way that children see the world.
<urn:uuid:25e6d6a3-028c-48c9-be8a-3075b6158e3c>
CC-MAIN-2023-14
https://universitycarillon.net/kids-wednesdays/loft/loft-mar-8-2023/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00558.warc.gz
en
0.97417
124
2.828125
3
NOAA’s JPSS-2 satellite has cleared a critical testing milestone, bringing it a step closer to launch. Last week, the polar-orbiting satellite emerged from the chamber after completing its thermal vacuum testing. This test is meant to show that the spacecraft and all of its instruments will perform successfully when exposed to the harsh environments of space. “I can absolutely say with 100% certainty that the observatory is working great,” said JPSS Flight Project Manager Andre Dress. “All the instruments are performing great, and we’re going to meet all our requirements – and then some.” NOAA’s JPSS-2, the third satellite in the Joint Polar Satellite System series, will provide data that inform weather forecasts, extreme weather and climate change. It is slated to launch Nov. 1, 2022, from the Vandenberg Space Force Base in California and will be renamed NOAA-21 after reaching orbit. The thermal vacuum test simulates the vacuum of space and the harsh temperature extremes the satellite will experience while in Earth’s orbit. “The satellite has to keep itself warm enough in a cold state and cool when it’s in a hot state, and still provide the science performance as it’s going through the temperature transitions,” said Chris Brann, deputy project manager for the JPSS flight project. “If it works at the two extremes of hot and cold, it will work in between.” During testing, the Visible Infrared Imaging Radiometer Suite instrument, or VIIRS, experienced a test equipment anomaly. Engineers determined the anomaly was a result of slight movement between the test equipment and the instrument, which were caused by thermal deformation. Modifications were quickly made to the test set up, and the system was retested — this time with the expected performance. The thermal vacuum test is the most significant test the satellite will go through, short of launch, Dress said. “There’s no other test like it in the whole life of a mission,” he said. “This one is the biggie.” It also requires the most resources. Hundreds of people on the team supported this test alone. The spacecraft emerged from TVAC testing June 4 — three months after it entered the chamber. The investigation and equipment fixes delayed the completion of the test by about a month. This also resulted in a delay of the launch date, which was originally scheduled for Sept. 30, 2022. This summer, the satellite’s solar array will be installed, and the satellite will be moved into a shipping container, which is controlled for temperature and humidity. It will then be shipped to the launch site in California, where it will go through a final series of tests before getting installed on the rocket, Brann said. So much has to come together when planning for the launch, said JPSS Flight Mission Systems Engineer Lou Parkinson. “Not only do we build the satellite and test the satellite and launch the satellite, but then we need to be able to hand over a successfully operating satellite to NOAA to make sure they can continue operations.” JPSS-2 will scan the globe as it orbits from the North to the South Pole, crossing the equator 14 times a day. From 512 miles above Earth, it will observe atmospheric conditions like temperature and moisture and extreme weather, like hurricanes, floods, wildfires and drought. Once in orbit, it will continue the work of its predecessors NOAA-20 and the NOAA-NASA Suomi National Polar-orbiting Partnership (Suomi-NPP).
<urn:uuid:e7137817-54ca-481a-89f1-3cfd64f6cbeb>
CC-MAIN-2023-14
https://www.nesdis.noaa.gov/news/noaas-jpss-2-satellite-completes-critical-testing-milestone
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00558.warc.gz
en
0.941707
749
2.796875
3
Tqm research paper. Total Quality Management (TQM), Research Paper Example 2022-10-24 Tqm research paper Rating: Total Quality Management (TQM) is a management approach that aims to continuously improve the quality of products, processes, and services in order to meet or exceed customer expectations. It is a holistic approach that involves the entire organization, from top management to front-line employees, in the effort to improve quality. TQM has its roots in the early 20th century, with the work of pioneers such as Frederick Winslow Taylor and Henry Ford. However, it was not until the 1950s and 1960s, with the rise of Japanese companies such as Toyota, that TQM became widely recognized as a effective management approach. In the 1980s and 1990s, TQM was adopted by companies around the world as a way to improve competitiveness and increase customer satisfaction. TQM is based on the idea that quality is everyone's responsibility and that all employees, from top management to front-line workers, have a role to play in improving quality. TQM involves the use of various tools and techniques, such as statistical process control, process improvement teams, and customer feedback, to identify and eliminate sources of variability and defects in products, processes, and services. TQM also involves the establishment of clear goals, the measurement of performance against these goals, and the continuous improvement of processes and products based on this measurement. There are several key principles of TQM, including customer focus, continuous improvement, teamwork, and employee involvement. TQM recognizes that the customer is the most important stakeholder in the organization and that meeting or exceeding customer expectations is the key to success. Continuous improvement is a core aspect of TQM, as it involves a never-ending effort to identify and eliminate sources of variability and defects in products, processes, and services. TQM also emphasizes the importance of teamwork and employee involvement, as all employees are expected to contribute to the improvement of quality. There are numerous benefits to implementing TQM in an organization. TQM can lead to increased customer satisfaction and loyalty, improved efficiency and productivity, reduced costs, and increased competitiveness. TQM can also lead to a positive work environment and increased employee morale, as it involves the empowerment of employees and the recognition of their contributions. There are also several challenges to implementing TQM in an organization. These challenges include resistance to change, the need for strong leadership and commitment from top management, and the need for clear goals and measurements to guide the improvement process. Implementing TQM also requires a significant investment of time and resources, as it involves the development and training of employees, the establishment of new processes and systems, and the measurement of performance. In conclusion, TQM is a comprehensive management approach that aims to continuously improve the quality of products, processes, and services in order to meet or exceed customer expectations. It involves the use of various tools and techniques, the establishment of clear goals and measurements, and the continuous improvement of processes and products. TQM can lead to numerous benefits, including increased customer satisfaction and loyalty, improved efficiency and productivity, reduced costs, and increased competitiveness. However, implementing TQM also requires a significant investment of time and resources and can be challenging due to resistance to change and the need for strong leadership and commitment. TQM Research Paper .docx All things considered, TQM, as well as BPR, are applicable to all business sectors, encompassing all aspects of the business and touching upon all corners of an organization without any constrictions. Training on teamwork, trust, and decision-making must be emphasized to aid employees in adapting to their new roles. The Principles of Total Quality Management The main TQM guideline is tied in with understanding your clients and adjusting your authoritative targets to their requirements and desires. The first integrates BPR under TQM by using the former as a tool or a subset of the latter. Since employee resistance, lack of commitment, and poor engagement have a negative influence on TQM, it is obvious that human resources management plays a crucial role in TQM success. It is vital to build profound knowledge in teams about the business, customers, associates, best practices, technology, and other factors related to the organization. The methods for implementing this approach come from the teachings of such quality leaders as Philip B. . Reengineering without training and education is unthinkable. However, more so in the future, a major source for competitive advantage will come from more outward orientation towards customers and competition will focus on superior customer value delivery. It aims to achieve step improvements in performance by redesigning the critical processes through which an organization operates, maximizing their value added content and minimizing everything else. While these features are important, it might pose challenges for inexperienced managers who attempt to implement TQM. The clear focus of BPR is processes and minimizing the non-value added content in them. Some have argued that the element of continuous improvement mentality inhibits learning. This is essential because for a car to be durable and reliable, quality control has to be applied to its every component, from engine to paint. Now it is time for me to give back to the sorority that has given so much to me. According to John Jr. . Internal customers: It is used to describe the set of people and colleagues working within the same organization and institution where the services are being provided. Risk management is an inherent part of reengineering. Hence, companies that apply employee training and organizational learning strategies while also using a consistent approach to building organizational knowledge, such as codification, would benefit more from TQM than those that do not. Common Weaknesses: Nevertheless, the two approaches fail to address some common weaknesses, which, if left un-addressed, become weaknesses of the integrated model, rendering it insufficient and ineffective. Literature Review Tools and Techniques One of the fundamental notions in literature discussing TQM tools and techniques is the approach to quality measurement. The target of the organizational change is the business process, and not the organizational culture, as is the case with TQM. Furthermore, research by Mwaniki and Okibo 2014 confirmed that the involvement of top management in quality control and continuous improvement contributed to the financial performance of companies in the banking sector. Total Quality Management TQM is a management strategy aimed at embedding awareness of quality in all organizational processes. Moreover, the paper also emphasizes the importance of facilitating organizational learning, creativity, and innovation through discussion boars, such as quality circles or committees. In an attempt to examine the interaction between radical BPR and incremental TQM with respect to change management, I shall briefly discuss the two constructs and contemplate the roots and basic tenets that underlie each. It is a philosophy adopted by an organization that focuses on teamwork, process improvement, and engagement of all personnel in order to be successful. This means that quality is everybody's duty. The increased value placed on empowering employees as a means of improving productivity while simultaneously improving employee satisfaction leads to increased reliance on teams. This builds the sense of self-drive amongst the employees, and thus high-quality service delivery. These benefits include employee participation, improved quality, teamwork, customer and employee satisfaction, increased productivity, and great What many aspiring entrepreneurs need to know is that TQM is not all about quality, but also focuses on many other processes whether short, long or medium. Total Quality Management (TQM), Research Paper Example In this study, the focus will be mainly on the principles of quality management, rationale behind companies considering the implementation of total quality management, the steps of implementing TQM and the result, outcomes and benefits the company gets for implementing TQM in the system. Thus, this model shall be set up in such a way so as to present a broad framework of generic ideas applicable to all organizations. It is thus important for them to take into consideration factors such as education level, ability of the patient to communicate, age of the patient, and gender among several factors. In that reason, Total Quality Management TQM had been applied by different firms around the globe to achieve prosperity in the market. It is a method by which management and employees can become involved in the continuous enhancement of the production process of goods and services. Total Quality Management Tqm Application In Health Care. I shall treat the similarities and common grounds among the two, as well as the differences between them. Parker, J 2016, Overview: all you need to know about Toyota Motor Corporation, Web. The overall performance of the primary health care with respect to quality service provision solely depends on the performance of its top management. You may want to consider checking our Essay Writing Services, Research Paper, Thesis Writing Services, Coursework Help, among others. In the transcendent approach, quality is defined subjectively, which makes it difficult to apply this approach to products and services Kiran 2017. TQM Total Quality Management has also been claimed to have its own pros and cons. Secondly, the company actively engages its employees in the process of quality control by establishing quality circles, conducting training, and performing internal audits Toyota Motor Corporation 2012b. Practitioners can create an integrated model where both incremental and quantum improvements are possible within a continuous improvement environment. Nature of Survey The nature of the survey was structured as already specified and defined questionnaires were asked to be answered. . In this case, the tool is useful since it clarifies the vision and strategy and links the strategic objectives with the measures and further enhances the strategic feedback of the attainment of the corporate objectives.
<urn:uuid:fa053c83-2ee1-4606-93ff-5a893ceccafb>
CC-MAIN-2023-14
http://links.lfg.com/tqm-research-paper.php
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00758.warc.gz
en
0.962246
1,975
2.875
3
Allow me to tell you a short story about a long saga, both of which illustrate what the government has been doing and what the indigenous peoples have been dealing with over approximately a century and a half. St. Anne’s in Fort Albany on James Bay was opened in 1902 as a Roman Catholic mission. In 1904 it became a residential school. In 1970 the federal government took it over, closing it in 1976. In the early 1990s, after widespread complaints of sexual and physical abuse against the children, Ontario Provincial Police detectives were assigned to investigate what had happened at the school. The result was several convictions. These came out of the massive investigations lasting five years and involving hundreds of survivors. Seven thousand pages of testimony and corroborated information were assembled. For example, there was an electric chair. Edmund Metatawabin, chief of the Fort Albany First Nation in the 1990s: “Small boys used to have their legs flying in front of them…the sight of a child being electrocuted and their legs flying out in front was a funny sight for the missionaries and they’d all be laughing…the cranking of the machine would be longer and harder. Now you’re inflicted with real pain. Some of them passed out.” In 2003 the federal government asked for and received copies of these seven thousand pages. Meanwhile the country was slowly developing a method aimed at reconciliation. It was formalized as the Indian Residential Schools Settlement Process. Victims were to register and then take part in a proceeding that was to be non-adversarial. It was, after all, supposed to be a healing process. The method was simple. Our government—that is to say, you and I—admitted that wrongs had been committed. Victims were then to be listened to. Government and the churches were then to make a clean breast of what they had done. We know that this revelation/listening stage is a central part of any reconciliation process. It goes without saying that the government was expected to act honestly, to produce all information in its hands. Instead, our government withheld a great deal of essential information. There were, they said, “no known documents of sexual abuse at Fort Albany Indian Residential School. No known incident documents of sexual abuse at Fort Albany IRS.” This was a straight lie. Not only did they ignore a basic rule of our legal system—the duty to disclose—they ignored the specific requirements laid out in documents explaining the government’s responsibilities in this reconciliation process. What’s more, they used the resulting lack of documented information to throw into doubt, in an adversarial manner, the victims’ stories. They converted a reconciliation process into an attempt to re-wound the wounded. They set out to humiliate the victims. However, there was some knowledge that documents existed. The survivors asked for them and were rebuffed. Eventually they went to the courts and fought our government. In January 2014 the Ontario Superior Court forced our government to release the documents and so reveal that we—it is, after all, our government—had lied. Justice Perell wrote that the government’s refusal to admit to the contents of the seven thousand pages or to release them “had compromised the process and denied the claimants’ access to justice.” He wrote of governmental non-compliance. In a pitiful misrepresentation of reality, an individual was made to say, on behalf of Aboriginal Affairs Minister Bernard Valcourt, “We are pleased the court clarified we can disclose the documents.” Add to this an astonishing exchange of letters between the minister of justice, Peter MacKay, and an MP, Charlie Angus, and you begin to realize that our governmental attitudes have not fundamentally changed. Angus carefully points out the ministry’s improper behaviour and misleading activities. The minister replies as if nothing is wrong and avoids mentioning or dealing with the two central issues: for eleven years the government had had the information necessary for a fair process and intentionally hidden that fact or pretended they could not release it; the government’s lawyers had used this non-disclosure to undermine the First Nations victims. There is no suggestion from the minister of error. No contrition. No apology. Just a cold assertion that the department was doing its job. In circumstances such as this I have no sympathy for myself as a citizen. It is my government, my civil service. Mine and yours. It has shamed all of us by prevaricating, lying, causing suffering to fellow citizens. In this case, the word shame must be used. We and those suffering are the Crown. We are the source of Canada’s fiduciary responsibility. And we, through our government, are cheating and humiliating citizens who have already been humiliated by our governmental education system. Not surprisingly, the survivors wrote to the minister of justice asking that he withdraw the department’s lawyers from the process; they, the survivors, had “completely lost faith and trust” in them. “These lawyers, who are supposed to uphold the laws of Canada for all Canadians (including Aboriginal Canadians), have proved to be untruthful and unreliable.” This is just one story. How many others are there? Note the similarity to the Guerin case: members of the Department of Indian Affairs use their administrative power to mislead Aboriginal people. They betray the Honour of the Crown. This is one of the reasons that the then national chief, Shawn A-in-chut Atleo, insisted during the winter of 2012–2013 on a direct working relationship with the prime minister and the Privy Council. He knew that the First Nations must deal at that level because they are treaty partners, not wards of the state under the tutelage of a department. But he also knew that First Nations people must operate well above the corrupted systems of the Department of Indian Affairs as well as of Justice, systems originally created to destroy the department’s “wards” or, as they now put it, “clients.” The application of this commercial term to describe the relationship of citizens to the government they chose is both stupid and ignorant. The application of this term to indigenous peoples—treaty people—is, in addition, insulting. After all, what is a client? Someone who is buying goods or services based on the narrow self-interest of the seller on the one hand and of the buyer on the other. And so even this terminology is a constant reminder that Aboriginal peoples must rise above the paternalistic misuse of power on which the department has been built. They must negotiate at a higher level, as equals. This appeared in the December 2014 issue.
<urn:uuid:ac8887a3-abdd-4b2f-9018-5865f78f5eec>
CC-MAIN-2023-14
https://thewalrus.ca/the-comeback/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00758.warc.gz
en
0.978278
1,378
2.578125
3
"Aniridia" means "without an iris." The iris is the colored part of the eye, and is important for controlling how much light gets inside the eye. It is also important for functioning of the front of the eye, and when there is a problem with the iris other parts of the eye may also be affected. Eyes with aniridia are prone to glaucoma and clouding of the cornea. In addition, most people with aniridia have an abnormal fovea, the very center of the retina and the only place the eye can see detail. Some people have complete aniridia with all of these features and no iris at all. But others have just parts of the syndrome, and may have part of the iris. Most of the time aniridia is caused by mutations in the PAX6 gene. Sometimes it is caused by a deletion of the PAX6 gene which also includes deletion of a tumor suppressor gene next to it. People with this type of aniridia have a high risk of malignant kidney tumors, so genetic testing is important in aniridia. People with a known risk can have regular testing with treatment before there is a serious problem. Vision for Tomorrow Foundation: Aniridia Aniridia Foundation International Research to Prevent Blindness The John and Marcia Carver Nonprofit Genetic Testing Laboratory
<urn:uuid:cbc7fb61-76c8-47b1-a21c-834dd24b5b38>
CC-MAIN-2023-14
https://www.drackresearch.com/Aniridia
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00758.warc.gz
en
0.940542
295
3.640625
4
Eurasian Spoonbill Platalea leucorodia is a colonial waterbird ranging from western Europe to China and northern Africa; the northern populations are migratory while those in the south are largely resident. Globally, 175 Important Bird and Biodiversity Areas have been identified for this species covering populations during the breeding season, when on passage and in non-breeding areas. Some species, many of them migratory, congregate seasonally in large numbers at particular sites. These sites are critical to their conservation and need to be protected as a network; often individuals move between them using different sites at different times of year. For example, Eurasian Spoonbill Platalea leucorodia is a colonial species of extensive shallow marshes, rivers and flooded areas and, especially in the non-breeding season, of sheltered marine habitats such as tidal creeks and lagoons. It usually breeds on islands in lakes and rivers and has a wide distribution, ranging from western Europe to China and north and north-east Africa. The northern populations are migratory, most spending the non-breeding season in flocks in western and eastern Africa and south-east China. In the southern parts of its range birds are largely resident, and populations in these regions may be joined during the northern winter by migrant birds. Globally, 175 Important Bird and Biodiversity Areas (IBAs) have been identified where numbers of P. leucorodia regularly exceed IBA selection thresholds in either the breeding season, when on passage or during the non-breeding season (analysis of data held in BirdLife’s World Bird Database 2008). As a whole, these IBAs form a vast yet conservable network of key sites for this species throughout its range, covering all stages of its annual cycle. Compiled: 2004 Last updated: 2008 BirdLife International (2008) Important Bird Areas for congregatory species: Eurasian Spoonbill. Downloaded from http://www.birdlife.org on 22/03/2023
<urn:uuid:db015b6c-aaee-479e-b484-9824ad4b609b>
CC-MAIN-2023-14
http://datazone.birdlife.org/sowb/casestudy/important-bird-areas-for-congregatory-species:-eurasian-spoonbill
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943749.68/warc/CC-MAIN-20230322020215-20230322050215-00758.warc.gz
en
0.935204
421
3.90625
4
Paracas skulls: Mysteries of the culture of Paracas An archaeologist, in a careful study of the Paracas culture, discovered a unique find. This ancient culture of Paracs existed in the 4th-3rd century B.C., and it was located in southern Peru. The archaeologist found a large necropolis containing about 300 burials, each of which was at least 3,000 years old. But more than that, the scientist was struck by some of the unique find features. Most of the skulls had a strange, unusual shape. Studies have proven that the graves do not belong to humans, and it is worth understanding what archaeologists have found. Unique ancient graves Scientists have found strange skulls in different places, including Mexico, Syria, and Egypt, and the unnatural elongation was explained after the discovery of an infant mummy. Planks were pressed tightly against his head. This particular custom, which causes the skull to deform, is still performed by some people but in this case, scientists were confused not only by the shape of the head but also by its volume and weight. The specimens found were 25% larger in volume than the average, and the brains were half as heavy. For a long time, scientists didn’t comment on the remains found. They could not explain why the discovered skulls were so different from human skulls but attempt to unravel the mystery were constantly being made. DNA analysis of the eggheads The archaeologist named Juan Navarro, who discovered the remains, kept them in his own museum. He allowed five of the 35 skulls to have samples of material, including hair, tissue, and teeth, to be analyzed for DNA. The investigators were not told what material they would be working with to keep the results unbiased. The reports received indicated that the samples contained DNA with mutations not previously found in humans or primates. Based on the conclusion issued by the scientists, it can be concluded that the remains found are not human and did not originate from apes. It is believed that even if the species found was in contact with humans, it was not possible to produce offspring in a mixed union. The key difference between the skulls found and the normal, human skull was their unnaturally elongated shape. It has previously been noted that there was a custom where at birth, the head was firmly tied to the planks on both sides, and as a result of the individual’s growth, there was a skull deformation. So it was not so much the shape of the found remains that struck scientists but their weight and volume. The brain was heavier, and its volume was greater than that of a human. It is impossible to achieve such indicators by deliberate deformation. The researchers completely excluded the variants connected with mutation or “mistakes” of nature. All the earlier studies have led to the conclusion that more than 3000 years ago in southern Peru lived tribes that included creatures not related to humans, although they looked like them. Findings and research have led scientists to wonder what these creatures might have been and where they came from. There is no exact answer, but there are several hypotheses to explain the strangeness of the remains. Among the theories: - They are representatives of another intelligent race that was on the planet at the same time as normal humans. - A colony of beings from another planet tried to settle on Earth but failed. Whoever these creatures were, they did not manage to stay on the planet for a long time, so their species simply died out. There is a version that representatives of this race still live somewhere in remote places and try not to contact people. But this version is unlikely. Similar finds in Antarctica A team of archaeologists in Antarctica has found three skulls that look like members of the Paracas culture. Until now, scientists have not found human remains on the continent, and exact explanations for the unusual find have not yet been found. The remains found are not representative of a mutation or deformity. These creatures did exist, but it is unknown whether they were representatives of another race or came from another planet. The conducted studies allow only to note that they had nothing in common with human DNA. Let’s wait for the conclusions of “authoritative” scientists.
<urn:uuid:c6fb835c-a7e9-46b2-a2f4-c30efaed822e>
CC-MAIN-2023-14
https://afrinik.com/paracas-skulls-mysteries-of-the-culture-of-paracas/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943749.68/warc/CC-MAIN-20230322020215-20230322050215-00758.warc.gz
en
0.985802
877
3.53125
4
|Host city Innsbruck, Austria| Opening ceremony February 4 |Nations participating 37| Closing ceremony February 15 |Athletes participating 1123 (892 men, 231 women)| Events 37 in 6 sports (10 disciplines) The 1976 Winter Olympics, officially known as the XII Olympic Winter Games (French: XIIes Jeux olympiques d'hiver, German: Olympische Winterspiele 1976), were a winter multi-sport event which was celebrated February 4–15, 1976 in Innsbruck, Austria. It was the second time the Tyrolean city hosted the Games, which were awarded to Innsbruck after Denver, the original host city, withdrew in 1972. The cities of Denver, Colorado, United States; Sion, Switzerland; Tampere, Finland; and Vancouver (with the Garibaldi mountains), Canada, made bids for the Games. The games were originally awarded to Denver on May 12, 1970, but a 300% rise in costs and worries about environmental impact led to Colorado voters' rejection on November 7, 1972, by a 3 to 2 margin, of a $5 million bond issue to finance the games with public funds. Denver officially withdrew on November 15, and the IOC then offered the games to Whistler, British Columbia, Canada, but they too declined owing to a change of government following elections. Whistler was later associated with neighbouring Vancouver's successful bid for the 2010 games. Salt Lake City, Utah, a 1972 final candidate who eventually hosted in 2002, was offered by the U.S. Olympic Committee in early January 1973 as a substitute host. By the end of the month and lacking federal assistance, Mayor Jake Garn of Salt Lake City withdrew their bid, and Lake Placid was soon offered by the USOC. Still reeling from the Denver rejection, the IOC selected Innsbruck, which had recently hosted in 1964, on February 4, 1973. The chart below displays the original vote count for the 69th IOC meeting at Amsterdam, Netherlands, in 1970, before the Denver rejection and the installation of Innsbruck, Austria, as alternate host. The mascot of the 1976 Winter Olympics is a Tyrolean snowman Games of Simplicity. There were 37 events contested in 6 sports (10 disciplines). Ice dancing made its debut to the Olympics. See the medal winners, ordered by sport: 37 nations participated in the 1976 Winter Olympic Games. The games marked the final time the Republic of China (Taiwan) participated under the Republic of China flag and name. After most of the international community recognized the People's Republic of China as the legitimate government of all China, the ROC was forced to compete under the name Chinese Taipei, under an altered flag and to use its National Banner Song instead of its national anthem. Andorra and San Marino participated in their first Winter Olympic Games. (Host nation highlighted)
<urn:uuid:b9b1d5c7-942d-49b7-890d-02fdc4ab336c>
CC-MAIN-2023-14
https://alchetron.com/1976-Winter-Olympics
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943749.68/warc/CC-MAIN-20230322020215-20230322050215-00758.warc.gz
en
0.956625
633
2.546875
3
Despite recent reports suggesting the FDA’s screening process for gulf seafood contaminants leaves room for improvement, state officials remain confident in the product’s safety. Last week, the Natural Resources Defense Council, a nonpartisan environmental advocacy group, filed a petition with the FDA, demanding that the agency “recognize the hazards posed by PAHs in seafood and set a health protective standard.” Researchers with the NRDC suggest that the FDA has failed to properly assess levels of PAHs (Polycyclic Aromatic Hydrocarbons) in seafood that was likely affected by last year’s gulf oil spill. According to Jo Marie Cook, chief of the Bureau of Chemical Residue Laboratories for the Florida Department of Agriculture and Consumer Services, the FDA limits weren’t established “in a vacuum.” “There was a lot of work done to establish those levels, especially in the Southern states,” she says. “The levels of concern were established in a very open forum with a lot of scientists present to give them input. But it’s a very, very complicated issue.” The state complies with the limits set forth by the FDA and has, since August 2010, tested 358 samples of Gulf seafood — including lobster, clams, oysters, fin fish and shrimp. Cook says the state currently collects about 20 samples per week to test for PAHs and dispersants. The department intends to increase its samplings once additional staff is trained, which should occur within the year. State laboratories also plan to expand their screening of seafood to include metals sometime in the near future. A portion of BP funds given to the state will be used to add staff and to continue monitoring potentially affected seafood. “We aren’t finding anything,” says Cook. “If we find anything at all, it’s extremely low levels, like 1/1,000th of any level of concern. So most of what we do are non-detects.” When asked whether the FDA’s methods are, perhaps, not good enough, Cook says she remains so confident in the safety of Florida’s seafood that she consumes it herself. “There are certain limited populations that live right on the coast, and they may eat seafood day in and day out as part of their diet,” she says. “So that’s got to be evaluated by the statisticians that do risk assessment.” The state has had to battle the perceptions of unsafe gulf seafood since the April 2010 explosion and fire aboard BP’s Deepwater Horizon drilling unit. Though the spill occurred over a year ago, consumer confidence in seafood has remained low. An April 2011 survey found that 63 percent of Floridians had concerns over seafood safety, up from 48 percent in January. Just last month, the state’s Department of Agriculture launched an online training program for Florida restaurant workers to learn to answer common questions about the safety of gulf seafood.
<urn:uuid:3fea3bcf-a43c-40a9-9531-459cb41fc5df>
CC-MAIN-2023-14
https://floridaindependent.com/state-officials-defend-florida-seafood-against-charges-of-inadequate-testing/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943749.68/warc/CC-MAIN-20230322020215-20230322050215-00758.warc.gz
en
0.958728
625
2.515625
3
Universal Design for Learning (UDL) is a curriculum design, development and delivery framework used to create inclusive and accessible learning environments. UDL Guidelines are based on three primary brain networks: Affective (the why of learning), Recognition (the what of learning), and Strategic (the how of learning). Each network is identified by a principle to provide multiple means of engagement, representation, and action and expression. The curriculum, as referenced in the literature on UDL, has four parts: instructional goals, methods, materials, and assessments. UDL is intended to increase access to learning by reducing physical, cognitive, intellectual, and organizational barriers to learning, as well as other obstacles. UDL principles are connected to implementing inclusionary practices in the classroom. Learners differ in the ways that they perceive and comprehend information that is presented to them. For example, those with learning disabilities (e.g., dyslexia); language or cultural differences, etc. may all require different ways of learning the content. Learning occurs when multiple means representations are used because it allows students to make connections within, as well as between, concepts. In short, there is not one means of representation that will be optimal for all learners so providing options for representation is best (CAST UDL Guidelines, 2018). How learners are affected by content is essential to the learning process. People differ markedly in the ways in which they can be engaged or motivated to learn. There are a variety of sources that can influence individual variation in affect such as neurology, personal relevance, and background knowledge. Some learners are highly engaged by spontaneity and novelty while others are disengaged by those aspects, preferring routine. Some learners might like to work individually, while others prefer to work in groups. There is not one means of engagement that will be optimal for all learners; providing options for engagement is essential (CAST UDL Guidelines, 2018). Learners differ in the ways they navigate a learning environment and express what they know and have learned. For example, some individuals may be able to express themselves well in written text but not speech, and vice versa. It should also be recognized that action and expression require significant strategy, practice, and organization; this is another area where learners can differ. There is not only a single means of action and expression that will be optimal for all learners; providing options for action and expression is necessary (CAST UDL Guidelines, 2018).
<urn:uuid:a64bbdb5-56a0-4a26-b00b-46f4b8250ac7>
CC-MAIN-2023-14
https://libguides.royalroads.ca/accessibilityresources/udl
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943749.68/warc/CC-MAIN-20230322020215-20230322050215-00758.warc.gz
en
0.95318
493
4.03125
4
Mixed numbers inquiry Mathematical inquiry processes: Verify; analyse structure; find more examples; generalise and prove. Conceptual field of inquiry: Subtraction and division of mixed numbers by integers. This prompt comes from division = subtraction? on Don Steward's website. Students notice the properties of the prompt: the mixed and whole numbers are the same on each side of the equation, but the operation is different. Finding another example of the same type, however, can prove challenging for students. By focusing on the mathematical structure of the equation, the teacher can support the search process. minuend – subtrahend = difference dividend ÷ divisor = quotient The quotient equals the difference, which means, in the case of the prompt, the subtrahend is three times greater than the quotient. In general, if you divide the subtrahend by one less than the divisor, you get the quotient. Students have asked in classroom inquiry: Is the equation true? How do you subtract and/or divide mixed numbers by whole numbers? Are there other examples that work the same? Does it work with addition and multiplication? In the next phase of the inquiry, students might verify the equation is true before using its structure to search for more examples. The inquiry might conclude with an attempt to form an algebraic generalisation of these types of equation.The teacher could lead a class discussion to manipulate the algebraic forms with the aim of showing that the two sides simplify to the same expression.
<urn:uuid:bf7e018e-1ed8-43bd-ad71-c6fe8b72c39c>
CC-MAIN-2023-14
https://www.inquirymaths.org/home/number-prompts/mixed-numbers
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943749.68/warc/CC-MAIN-20230322020215-20230322050215-00758.warc.gz
en
0.895241
332
4.4375
4
The most precious thing someone can give is their time. Reignite your love of giving with these time-giving activities. There are also some donation suggestions for used objects. This worksheet, 31 Days of Giving, can be used any 31 days of the year! Do you want your students to have confident, informative discussions? Build student discourse and writing confidence with these comparison sentence frames! Students will use sentence and paragraph frames to practice comparing two nouns of their choice. Use the game Two Truths and One Lie to help your students research facts about a famous person. Learners will research an important figure and then write down two true statements and one false statement.
<urn:uuid:bc27acb8-e374-442a-8372-34a5f4b970b3>
CC-MAIN-2023-14
https://www.education.com/worksheets/fifth-grade/writing/CCSS/?q=chinese-new-year
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945144.17/warc/CC-MAIN-20230323100829-20230323130829-00758.warc.gz
en
0.935581
135
3.578125
4
Five things to know about smell and taste loss in COVID-19May. 21, 2020, 10:01 AM by Kelsey Herbers While fever, cough and shortness of breath have characterized the disease caused by the novel coronavirus, the Centers for Disease Control and Prevention (CDC) updated its list of common symptoms in late April to include a new loss of smell or taste. According to Justin Turner, MD, PhD, associate professor of Otolaryngology-Head and Neck Surgery and medical director of Vanderbilt University Medical Center’s Smell and Taste Center, it’s not uncommon for patients with viral upper respiratory infections to experience a temporary — or sometimes permanent — loss of taste or smell, but these symptoms appear to be particularly prevalent in COVID-19. Since COVID-19 is a new disease, little is known about the long-term outcomes of patients with these symptoms, but ongoing studies have provided insight into when these symptoms arise and who experiences them. Q: How common is smell and taste loss in COVID-19? Up to 80% of people who test positive for COVID-19 have subjective complaints of smell or taste loss. That percentage rises when these patients are tested using objective methods that measure smell function. Most patients first notice problems with their sense of smell, but because smell is necessary to taste flavor, the symptoms are often connected. Q: What is known about the COVID-19 cases where these symptoms occur? A recent study based on retrospective data showed that patients who had normal smell function in COVID-19 appeared to have a worse disease course and were more likely to be hospitalized and placed on a ventilator. This suggests patients who experience smell dysfunction may have a milder infection or disease. The data we have so far also suggest that in a substantial percentage of the COVID-19-infected population, smell loss can be one of the first — or only — signs of disease. It may precede symptoms that are more commonly associated with COVID-19, such as cough and fever. It has even been proposed that smell and taste loss could be a screening tool since these symptoms appear so early. Q: How can a virus cause smell and taste loss? One possibility is that people with upper respiratory infections often have congestion, drainage and other nasal symptoms that can block odor’s ability to reach the smell nerve, which sits at the top of the nasal cavity. But, we believe the primary cause, particularly for people with extended or permanent loss of smell function, is that the virus causes an inflammatory reaction inside the nose that can lead to a loss of the olfactory, or smell, neurons. In some cases, this is permanent, but in other cases, the neurons can regenerate. That’s likely what determines which patients recover. In COVID-19, we believe smell loss is so prevalent because the receptors for COVID-19 that are expressed in human tissue are most commonly expressed in the nasal cavity and in the supporting cells of the olfactory tissue. These supporting cells surround the smell neurons and allow them to survive. Q: Should people with smell and taste loss in the absence of other symptoms be concerned about COVID-19? While smell and taste loss can be caused by other conditions, it warrants a conversation with your physician to determine whether you should be tested for COVID-19. We know smell loss is one of the first — and sometimes only — symptoms in up to 25% of people diagnosed with COVID-19. It could be unrelated, but it’s important to seek care, especially if these symptoms are prolonged. The Vanderbilt Smell and Taste Center can objectively test, evaluate and treat patients, whatever the cause, and can offer interventions that can potentially recover loss that could otherwise be permanent. Go here for more information. Q: What questions about these COVID-19 symptoms still need answering? We plan to watch the recovery rate for these patients. We encourage people who have prolonged smell and taste dysfunction to be evaluated to help us understand if and when these symptoms resolve. There is also concern that COVID-19 and its ability to enter the olfactory tissue could be a conduit for infection in the brain. I think we’ll learn more about that as we follow these patients over time.
<urn:uuid:7102b9cc-c97e-4337-8ec8-be673b5a486c>
CC-MAIN-2023-14
https://news.vumc.org/2020/05/21/five-things-to-know-about-smell-and-taste-loss-in-covid-19/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945381.91/warc/CC-MAIN-20230326013652-20230326043652-00758.warc.gz
en
0.952891
893
3.390625
3
The modern form of taking an oath is by placing the hands on the Gospels or on the Bible. The corporate, or corporal both, is the name of the linen cloth on which, in the Roman Catholic Church, the sacred elements consecrated as “the body of our Lord” are placed. Hence the expression corporal oath originated in the ancient custom of swearing while touching the corporal cloth. Relics were sometimes made use of. The laws of the Allemanni (chapter 657), direct that he who swears shall place his hand upon the coffer containing the relics. The idea being that something sacred must be touched by the hand of the jurator to give validity to the oath, in time the custom was adopted of substituting the holy Gospels for the corporal cloth or the relics, though the same title was retained. Haydn (Dictionary ok Dates) says that the practice of swearing on the Gospels prevailed in England as early as 528 A.D. The laws of the Lombards repeatedly mention the custom of swearing on the Gospels. The sanction of the church was given at an early period to the usage. Thus, in the history of the Council of Constantinople, 381 A.D., it is stated that “George, the well-beloved of God, a Deacon and Keeper of the Records, having touched the Holy Gospels of God, swore in this manner,” etc. A similar practice was adopted at the Council of Alice, fifty-six years before. The custom of swearing on the Book, thereby meaning the Gospels, was adopted by the Medieval Gild of Freemasons, and allusions to it are found in all the Old Constitutions. Thus in the York Manuscript, No. 1, about the year 1600, it is said, “These charges . . . you shall well and truly keep to your power; so help you God and by the contents of that Book.” And in the Grand Lodge Manuscript No. 1, in 1583 we find this: “These charges ye shall keep, so help you God, and your haly dome and by this book in your hand unto your power.” The form of the ceremony required that the corporal oath should be taken with both hands on the book, or with one hand, and then always the right hand. The practice of kissing the book, which became so well established in England, appears in the Middle Ages (see J. E. Tyler, Oaths, pages 119 and 151). the source: Mackey’s Encyclopedia of Freemasonry
<urn:uuid:b7fc5770-6baa-4cea-a05d-a6ec9d7bcd9c>
CC-MAIN-2023-14
https://freemasonry.network/masonic-rules/masonic-obligations/corporal-oath/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948620.60/warc/CC-MAIN-20230327092225-20230327122225-00758.warc.gz
en
0.956373
537
3.1875
3
|Abstract: The current study evaluated a training protocol in which educators learned to use direct methods of functional behavior assessment. Educators recorded A-B-C (Antecedent-Behavior-Consequence) data, developed hypotheses regarding the function of the behavior, calculated conditional probabilities, and identified functional interventions. Participant's accurate recording of A-B-C data and accurate analysis of the data served as the dependent measure. A multiple-baseline design across groups of participants (i.e., ten teachers) provided assessment of skill acquisition during baseline and training phases. During baseline and training phases, participants watched videotaped scenarios depicting a student displaying disruptive behaviors in a classroom setting. Following the baseline phase, the primary investigator provided a training presentation and verbal performance feedback. The training phase provided a measure of the effect of the training presentation and verbal performance feedback. During baseline, most participants did not exceed 95% accuracy when recording A-B-C data. Seven participants achieved at least 95% accuracy following training. There are limitations of the current study. For example, data collection following the training presentation and verbal feedback was limited to two data points. The results of the current study provide empirical support to the effectiveness of verbal performance feedback in training participants to collect functional assessment data.|
<urn:uuid:00b421ac-f999-4807-ad0c-b01f71ff432a>
CC-MAIN-2023-14
https://abainternational.org/events/program-details/event-detail.aspx?&sid=26688&by=Area
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948868.90/warc/CC-MAIN-20230328170730-20230328200730-00758.warc.gz
en
0.917689
258
2.8125
3
Standing Bear's Quest For Freedom Chief Standing Bear of the Ponca Nation faced arrest for leaving the U.S. government's reservation, without its permission, for the love of his son and his people. Standing Bear fought for his freedom not through armed resistance but with bold action, strong testimony, and heartfelt eloquence. He knew he and his people had suffered a great injustice. Standing Bear wanted the right to live and die with his family on the beloved land of his Ponca ancestors, located within the Great Plains of Nebraska. In telling his story, Standing Bear's Quest for Freedom relates an unprecedented civil rights victory for Native Americans: for the first time, in 1879, a federal court declared a Native American to be a "person"-a human being with the right to file an action for a redress of grievances in a federal court, like every other person in the United States. Standing Bear's victory in Standing Bear v. Crook began a national movement of reforming Native American rights-albeit a slow one. Because of the courage and leadership of Chief Standing Bear, the pervasive spirit of indifference of most Americans toward Native Americans was disrupted by this historic decision. America would never be the same.
<urn:uuid:d51a08b2-98f9-4554-a784-e5d75f42451e>
CC-MAIN-2023-14
https://www.dubraybooks.ie/product/standing-bears-quest-for-freedom-9781496232465
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948868.90/warc/CC-MAIN-20230328170730-20230328200730-00758.warc.gz
en
0.959351
264
3.546875
4
Are Chemical Pollutants Altering the Behaviour of Wildlife and Humans? International scientists from around the world are warning that chemical pollutants in the environment have the potential to alter animal and human behaviour. A scientific forum of 30 experts formed a united agreement of concern about chemical pollutants and set up a road map to help protect the environment from behaviour-altering chemicals. The conclusions of their work have been published today in a paper led by Professor Alex Ford, Professor of Biology at the University of Portsmouth, in Environmental Science and Technology. Until now the effect of chemical pollutants on wildlife has been studied and risk assessed in relation to species mortality, reproduction, and growth. The effect on behaviour has been suspected, but never formally tested or assessed – the scientists say this needs to change. The world-leading experts came from a variety of relevant disciplines including environmental toxicology, regulatory authorities, and chemicals risk assessors. Professor Alex Ford explains: ‘The group were in no doubt that pollution can impact the behaviour of humans and wildlife. However, our ability to regulate chemicals for these risks, and therefore safeguard the environment, is rarely used. For example, chemicals that are deliberately designed as pharmaceutical drugs to alter behaviour, such as antidepressants and anti-anxiety medications, have been shown to alter the behaviours of fish and invertebrates during laboratory experiments. These medications, like many prescribed drugs, enter the environment through wastewaters.’ History shows us there are other examples of behavioural alterations from chemicals. During the 19th century, the phrases ‘Mad as a hatter’ and ‘Crazy as a painter’ were coined when those in these trades were found to have changed behaviour, from the use of lead and mercury. In more recent times concerns over metal toxicity resulted in the enforcement of unleaded fuels. The scientists are not just concerned about the obvious pollutants, such as pharmaceutical drugs leaking into the environment, but they also warn about the potential unknowns, such as chemicals in plastics, washing agents, fabrics, and personal care products. The forum has come up with a road map they are urging policymakers, regulatory authorities, and environmental leaders to act upon. The recommendations are: - Improve the mechanisms of how science studies contaminated-induced behavioural changes. - Develop new and adapt existing standard toxicity tests to include behaviour. - Develop an integrative approach to environmental risk assessment, which includes behaviour. Not just mortality, growth, and reproduction. - Improve the reliability of behavioural tests, which need to allow for variation in behavioural reactions. - Develop guidance and training on the evaluation of reporting of behavioural studies. - Better integration of human and wildlife behavioural toxicology. Professor Ford said: ‘We know from human toxicology and pharmaceutical drug development that regulatory authorities and industry have advanced with confidence in the use of behavioural endpoints, either in chemical risk assessment or drug development. We are yet to see this used fully when addressing the health of the environment and the impacts chemicals may have on wildlife behaviours. There is a real concern around our lack of knowledge of how pollutants affect wildlife and human behaviour and our current processes for assessing this are not fit for purpose.’ Dr Gerd Maack, from the German Environment Agency (UBA) and host of the forum, added: ‘We know that chemicals affect human and wildlife behaviours, especially hormones are affecting the mating behaviour of vertebrates. However, this knowledge is still not reflected in the regulation of chemicals in Europe, partly due to a lack of standardised methods, but also due to a non-understanding of the more complex study designs by many regulators. As one of the first of its kind, this workshop brought together behavioural scientists and regulators underpinning the importance of behavioural studies for regulation. The results of this paper will serve as a road map for a better acceptance and integration of behaviour studies in regulatory practices.’ Joel Allen, from the US Environmental Protection Agency, said: ‘Along with my US EPA colleagues, Jim Lazorchak and Stephanie Padilla, and as participants in the workshop and the preparation of this manuscript, we are excited about being part of a ground-breaking area in the potential use of behavioural responses to chemicals in chemical risk assessments as well as being co-authors on this topic in the prestigious Environmental Science and Technology journal.’ Dr Marlene Agerstrand, an expert on chemicals risk assessment from the University of Stockholm said: ‘The regulation of chemicals is constantly evolving, as the scientific basis improves. A workshop like this, where researchers and regulators meet, could be the starting point for a change in how behavioural studies are looked upon in the regulatory sphere. In this paper, we have identified knowledge gaps and regulatory needs with the purpose to continue the discussion with a wider stakeholder group.’ The forum took place at the German Environment Agency (UBA).
<urn:uuid:51155db8-6e01-4e9a-8152-653b33d34bb9>
CC-MAIN-2023-14
https://www.hobbsonlinenews.net/chemical-pollutants-altering-behaviour/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948868.90/warc/CC-MAIN-20230328170730-20230328200730-00758.warc.gz
en
0.953296
994
3.640625
4
The real Noah’s Ark? Dr Irving Finkel is an Assyriologist at the British Museum in London and an expert in ancient cuneiform scripts. In recent months he has become something of a celebrity, following the publication of his book, The Ark Before Noah: Decoding the Story of the Flood,1 and the Channel 4 documentary, The Real Noah’s Ark.2 The source of this media hype is his recent translation of a small Babylonian tablet, named the Ark Tablet. It is about the size of a mobile phone and has been dated to around 1750 BC. According to Finkel, the Ark Tablet contains the original Flood story, upon which the biblical version was based centuries later. Moreover, he claims, this new tablet reveals that the real Noah’s Ark was not as described in Genesis. The Ark was round, he says, having a diameter of approximately 68m, and was constructed with ropes made from palm fibres and palm leaves. He believes it was a giant version of the guffas (circular coracles) commonly seen in Iraq up until the 1970s, and known from Assyrian carvings dating back to 850 BC.3 In the Channel 4 documentary, Tom Vosmer, a world-renowned maritime archaeologist, joined a group of boat builders who, using these same materials, constructed a mini version of Finkel’s Ark, having a diameter of just 13m (fig. 2). Vosmer expressed grave doubts as to whether this much smaller vessel would hold together in the water. One wonders, then, quite what would be the feasibility of something five times larger. In contrast, the Ark described in Genesis has been shown to be a design which would have been particularly stable in rough seas and whose wooden structure could have withstood the bending stresses applied by the cargo and waves.4 Moreover, historical documents describe wooden vessels approaching the size of the Genesis specification, providing further confirmation of both its sea-worthiness and the ability of ancient peoples to construct it.5 Despite the absurdity of Finkel’s preferred Flood story, he freely ridicules the Genesis account. As is usual, however, he knocks a straw man, suggesting that Noah would have needed to take over a million species aboard the Ark. Most of the animals listed by Finkel, however, are insects, which very likely survived the Flood on floating vegetation mats. According to the Bible, the Flood wiped out land animals that breathed through nostrils. Insects breathe through tiny pores in their exoskeletons. The animals taken aboard the Ark probably included only birds, mammals and reptiles. Moreover not every species known today would have been required—only one pair of each kind of unclean animal and seven pairs of each kind of clean animal.6 Different species within each kind would have arisen in the centuries following the Flood.7 (Note that, because this would have been from sorting of existing genetic information and would not have required new genetic information, it gives no support to the idea of evolution.) Despite Finkel’s assertions to the contrary, there would have easily been enough room for all these animals, along with the food needed to sustain them for the duration of the Flood.8 The Genesis account—just revamped Babylonian myth? According to Finkel, the biblical version of the Flood story was derived from Babylonian myths and incorporated into Jewish writings during the Babylonian exile, around the sixth century BC. Hence, in his view, the Ark Tablet was written over a thousand years before the Genesis text and is therefore the more authentic version. Moreover, consistent with liberal tradition, he argues that the biblical account was written by two different authors, ‘J’ and ‘P’. This latter claim is easily refuted as the symmetrical pattern evident in the Genesis narrative clearly points to a single author:9 A - Noah and his family: the only righteous people on earth (6:9–10) B - God promises to destroy the earth and its inhabitants by a global Flood (6:11–22) C - God instructs Noah, his family and the animals to enter the Ark (7:1–10) D - The floodwaters come upon the earth (7:11–16) E - The floodwaters rise and cover the earth (7:17–24) F - God remembers Noah (8:1a) E’ - The floodwaters recede from the earth (8:1b–5) D’ - The floodwaters disappear and the earth is dry (8:6–14) C’ - God instructs Noah, his family and the animals to leave the Ark and fill the earth (8:15–9:7) B’ - God promises to never again destroy the earth and its inhabitants by a global flood (9:8–17) A’ - Noah and his family: the only people on earth (9:18–19) [Author’s note May 2021: this final section has been revised based on further information indicating a later date for the Nippur Flood tablet than originally claimed.] It is difficult to see how it can be asserted that the biblical narrative was derived from the Babylonian version when another cuneiform tablet, possibly at least as old as Finkel’s Ark Tablet, provides an account so much closer to Genesis.10,11,12 The tablet in question was discovered at Nippur during an expedition by the University of Pennsylvania.13,14 Its text is shown below beside the biblical version. |(2) … I will loosen||Gen. 7:11 – “all the fountains of the great deep burst forth, and the windows of the heavens were opened.”| |(3) … it shall sweep away all men together;||Gen. 6:13 – “I will destroy them with the earth.”| |(4) … [l]ife before the deluge cometh forth;||Gen. 6:17 – “But I will establish my covenant with you … ”| |(5) … as many as there are, I will bring overthrow, destruction, annihilation||Gen. 6:18 – “I will bring a flood of waters destruction, annihilation upon the earth to destroy all flesh in which is the breath of life under heaven. Everything that is on the earth shall die.”| |(6) … Build a great ship and||Gen. 6:14 – “Make yourself an ark … ”| |(7) … total height shall be its structure.||Gen. 6: 15 – “and its height 30 cubits.”| |(8) … it shall be a houseboat carrying what has been saved of life.||Gen. 6:16 – “Make a roof for the ark … and set the door of the ark in its side.”| |(9) … with a strong deck cover (it).| |(10) …. [The ship] which thou shalt make| |(11) … [br]ing the beast of the field, the birds of heaven,||Gen. 6:19 , 20 – “And of every living thing of of heaven, all flesh, you shall bring … into the ark … Of the birds according to their kinds, and of the animals according to their kinds … ”| |(12) … instead of a number,| |(13) … and the family …||Gen. 6:18 – “ … you shall come into the ark, you, your sons, your wife, and your sons’ wives with you.”| Of great significance is that this Nippur tablet appears monotheistic, with the singular pronoun, “I” being used in both lines 2 and 5. Moreover, it does not deviate from the biblical account in any way, with even the order of the narrative being similar. Its discoverer, Dr. Hermann Hilprecht, believed it to have been produced around 2100 BC13—a date considered plausible by Professors Robert Rogers15and Fritz Hommel.16 (although according to conventional modern chronology this period would now be understood to be closer to 1800 BC.) Other scholars assign the tablet to a later date: possibly 1700 BC,15 fifteenth century BC17 or even as late as 1000 BC.18 All these estimates, however, predate the exile by centuries, providing strong evidence that the original Genesis version existed well before the period when the Israelites became immersed in Babylonian culture. Does Finkel’s Ark Tablet really specify a round vessel? Finkel is adamant that the real Noah’s Ark was round. This is based primarily on his interpretation of the instructions given in lines 6 to 9 of the Ark Tablet: Draw out the boat you will make on a circular plan; let her length and breadth be equal, let her floor area be one field, let her sides be one nindan high. However, lines 13 to 17 continue: I set in place thirty ribs which were … ten nindan long; I set up 3,600 stanchions within her … half a nindan high; I constructed her cabins above and below. A ‘field’ is around 3,600m2.19 Hence, if circular, the Ark’s base would have had a diameter of A ‘nindan’ is around 6m.19 So, if Finkel is correct, the Ark Tablet specifies a vessel with a base diameter of 67.7m and a height of 6m. This, however, clearly does not fit the facts. Firstly, “a circular plan” does not necessarily specify a circular base. Draftsmen often construct circles as an aid to drawing straight-sided shapes, and the Babylonians were undoubtedly familiar with such principles.20 Secondly, the tablet specifies that the “length and breadth be equal”, suggesting a square rather than a round base. Thirdly the ribs were 10 ‘nindan’ long, i.e. 60m. This is 7.7m short of what would be required for a base with a diameter of 67.7m. However it is the perfect length for a square base having an area of 3,600m2, as this would have sides of length Fourthly, the Ark Tablet specifies a coating of bitumen on both the inside and outside surfaces of thickness one ‘finger’ (i.e. around 1.667cm = 0.01667m)21 and states that 28,800 ‘sutu’ (288m3)22 of bitumen were loaded into the kilns. A square-based design, 60m long x 60m wide x 6m high, would have a surface area of 8,640m2 including the base and roof; thus the volume of bitumen required would be 8,640 x 0.01667 x 2 = 288m3 i.e. 28,800 ‘sutu’. Hence the volume of bitumen specified is, again, entirely consistent with a square-based vessel. In contrast, using Finkel’s envisaged Ark shape and his own calculations of its surface area, a bitumen volume of 29,296 ‘sutu’ would be required.23 Similar calculations relating to rope requirements also show the square based design to be more consistent with the data provided.24 Was the Gilgamesh Ark round? Finkel also argues that the Ark described in the Epic of Gilgamesh had a circular base, rather than being a cube as is traditionally held. Lines 28 to 30 of the Gilgamesh Flood tablet read, The boat that you are going to build, her dimensions should all correspond: her breadth and length should be the same. Lines 57 to 59 continue, On the fifth day I set in place her [outer] surface: one ‘acre’ was her area, ten rods each her sides stood high, ten rods each, the edges of her top were equal. According to Finkel the word, “area”, is mistranslated and should read, “circle”; but if so then the dimensions would not “all correspond”. One ‘acre’ is again 3,600m2 and a ‘rod’ is 6m.19 So, an Ark with a round base of area one ‘acre’ and a height of 10 ‘rods’ would be 67.7m in diameter and 60m high. However, an Ark with a square base of area one ‘acre’ would have dimensions 60m x 60m x 60m—a cuboid with dimensions that do “all correspond”. Moreover, the use of the plural terms, “sides” and “edges”, seems inconsistent with a circular base. Such an Ark would have one continuous peripheral face and one continuous edge at the top. Hence, it would seem more reasonable to understand the Gilgamesh Ark to have been a cube—as has been held by the majority of scholars for many years. Either way, the design would be far less stable than the vessel described in Genesis, supporting the view that the biblical account is the true one. References and notes - Finkel, I., The Ark Before Noah: Decoding the Story of the Flood, Hodder & Stoughton, UK, 2014. Return to text. - Channel 4, The Real Noah’s Ark: Secret History, UK, first broadcast 14 September 2014. Return to text. - Agius, D.A., Classic Ships of Islam: From Mesopotamia to the Indian Ocean, Koninklijke Brill NV, Netherlands, p. 130, 2008. Return to text. - Hong, S.W. et al., Safety investigation of Noah’s Ark in a seaway, J. Creation 8(1):26–36, April 1994; creation.com/safety-investigation-of-noahs-ark-in-a-seaway. Return to text. - Woodmorappe, J., Noah’s Ark: A Feasibility Study, Institute for Creation Research, USA, p. 50, 1996. Return to text. - Batten, D., ed., The Creation Answers Book, 3rd ed., ch. 13, Creation Book Publishers, 2009. Return to text. - Wieland, C., Darwin’s finches: Evidence supporting rapid post-Flood adaptation, Creation 14(3):22–23 June 1992. Return to text. - Ref. 5. Return to text. - Holding, J.P., Debunking the Documentary Hypothesis: a review of The Inspiration of the Pentateuch by M.W.J. Phelan, J. Creation 19(3):37–40 December 2005; creation.com/debunking-the-documentary-hypothesis. Return to text. - Cooper, W.R., The Authenticity of the Book of Genesis, Creation Science Movement, UK, pp. 390 – 402, 2011. Note, however, that the date for the tablet of 2100 BC is disputed.Return to text. - Statham, D.R., See also Statham, D.R., Genesis confirmed in clay: A review of The Authenticity of the Book of Genesis by Bill Cooper, J. Creation 27(1):39–41, April 2013. Return to text. - Adamthwaite, M., Gilgamesh and the biblical Flood—part 2, J. Creation 28(3):80–85, 2014. Return to text. - Hilprecht, H., The Babylonian Expedition of the University of Pennsylvania, Series D; Researches and Treatises, Vol V, Fasciculus I; The Earliest Version of the Babylonian Deluge Story and the Temple Library of Nippur, University of Pennsylvania, 1910; archive.org/stream/babylonianexped04archgoog#page/n12/mode/2up Return to text. - University of Pennsylvania Museum of Archaeology, CBS 13532; www.cdli.ucla.edu/search/archival_view.php?ObjectID=P268565, last accessed 12 November 2014. Return to text. - Rogers, R.W., Cuneiform Parallels to the Old Testament, 2nd ed., Wipf & Stock, USA, p. 108, 2005, first published 1926. Return to text. - The Oldest Library in the World and the New Deluge Tablet, Expository Times 21(8):364–369, 1910. Return to text. - Ref. 16, p. 368. Return to text. - Barton and Gordon argue for the Middle Babylonian period which ended around 1000 BC. Lambert, W.G. and Millard, A.R., eds., Atra-hasis: The Babylonian Story of the Flood, Oxford University Press, p. 126, 1969. Return to text. - en.wikipedia.org/wiki/Ancient_Mesopotamian_units_of_measurement, last accessed 17 November 2014. Return to text. - In fact Finkel himself provides an illustration of a tablet showing a circle inscribed within a square. Return to text. - Ref. 1, Appendix 3. Return to text. - 1 sutu = 2,160 fingers3 = 0.01 m3 since 1 finger = 0.01667 m. See ref. 21. Return to text. - Ref. 1, Appendix 3. Finkel’s Ark would have had a surface area of 8788.859m2 (31,639,880 fingers2) and, using his assumptions, a bitumen volume of 8788.859 x 0.01667 x 2 = 292.96m3, i.e. 29,296 sutu. Return to text. - The Ark Tablet specifies a rope volume of 14,460 sutu. However, again using Finkel’s own calculations, for a coracle shaped vessel with a circular base, a rope volume of 14,648 sutu would be required, an error of 1.3%. Calculations for a square based vessel using similar assumptions indicate a rope volume of 8,640 x 0.01667 = 14,400 sutu, an error of only 0.4%. Return to text. Comments are automatically closed 14 days after publication.
<urn:uuid:9f35750e-50a5-46fd-9851-cd78583c259d>
CC-MAIN-2023-14
https://creation.com/real-noahs-ark
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949093.14/warc/CC-MAIN-20230330004340-20230330034340-00758.warc.gz
en
0.929168
3,928
3.734375
4
Laboratory Report Format Here are the following parts and description that a laboratory report should have by each group after every experiment/laboratory activities. Experiment Title Group _: Member 1*, Member 2, Member 3, Member 4, Member 5 Grade – Section Introduction/Abstract A concise description of the entire experiment (purpose, relevance, methods, significant results and conclusions). Objectives A concise and summarized list of what needs to be accomplished in the experiment. Background An account of the experiment intended to familiarize the reader with the theory, related research that is relevant to the experiment itself. Methods A description of what was performed, which may include a list of equipment and materials used and procedure in order to pursue the objectives of the experiment. Results A presentation of relevant measurements convincing the reader that the objectives have been performed and accomplished. Discussion of Results The interpretation of results directing the reader back to the objectives. Conclusions Could be part of the previous section but is not intended solely as a summary of results. This section could highlight the novelty of the experiment in relation to other studies performed before. References Cite your references here in APA format. NOTE: Title font size is 14 pt. and should be bold. The rest of the report should have a font size 11 pt. and the headings of each part should be bold. Font style is Arial. Paragraph should be justified. Each paragraph should have an indent of 1 inch. Pictures or images should be placed in between paragraphs with labels and caption (e.g. Image 1. The slides showing the sample from the bottom layer of the hay infusion.) Abstract should have margins that are 1 inch more on both sides, justified. Group members and section should be 10 pt. font size, bold. The laboratory report should be 4 pages maximum. Member with asterisk is the leader of the group.
<urn:uuid:764729fa-54a2-4be5-a947-7b167d260a54>
CC-MAIN-2023-14
https://studylib.net/doc/25457887/laboratory-report-format
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949093.14/warc/CC-MAIN-20230330004340-20230330034340-00758.warc.gz
en
0.935731
371
3.046875
3
Genetic reasons, environmental factors such as infection or old age cause eye problems. Diseases that occur in the eyelids, the eye membrane known as the transparent layer that protects the eye against external influences, the tear ducts, the lens of the eye or the nerve tissues surrounding the eye are eye diseases. Symptoms of eye diseases can easily notice. Heaviness and pain in the eyes, tearing in the eyes, itching and stinging in the eyes, decreased vision, eye itching and swelling of the eyelids are among the symptoms of eye diseases. Eye diseases can be environmental and genetic. Correct diagnosis and treatment is important! Side effects of sinusitis, headache, flu, cold and febrile diseases, congestion in the tear ducts and dry eyes, diabetes and heart disease, and genetic features are the most common symptoms of eye diseases. Eye problems can treate effectively when correct examination and correct eye treatment apply. What are the types of eye diseases? Glaucoma (Eye Pressure) Structural obstruction in the channels that release the intraocular fluid causes the fluid not to be discharged sufficiently and increases the intraocular pressure. Increased eye pressure also causes loss of eye nerves, leading to problems such as blurred vision, severe headache and eye pain. Cataract (Curtain Stroke on the Eye) Cataract, which has a higher incidence in advancing ages and in diabetics, is an eye disease in which the lens of the eye loses its transparency. With the loss of transparency of the eye lens, painless and rapidly progressive vision loss, glare, and severe sensitivity to light develop. It is a hereditary vision problem that develops due to the absence of special pigments that allow color discrimination in the visual center or the lack of sufficient amount of pigment. Color blindness is usually caused by the inability to distinguish one or more of the colors red, green, and blue. Strabismus, which is often congenital or may occur as a result of accident or febrile diseases, can define as an eye problem that prevents the two eyes from looking parallel to one point. It can be said that the most common eye diseases in the society are caused by eye allergies. Contact Eye Allergy developing against drugs and make-up products, Spring Eye Allergy caused by hot and dry climate… In additions; Seasonal Allergic Conjunctivitis known as hay fever are the most common allergic eye diseases. Eyelid drooping, which develops due to old age, is a common eye problem, also known as eyelid inversion.
<urn:uuid:2abcd078-f44a-4487-b11d-5fff924340a1>
CC-MAIN-2023-14
https://obesityandbeauty.com/eye-diseases/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00758.warc.gz
en
0.938854
554
3.265625
3
Image Description: Amanda Gorman at Biden’s inauguration On the 20thJanuary 2021, people all over the world rejoiced as Joe Biden was sworn in as the 46thPresident of the United States and Kamala Harris became the first ever black, South-Asian and female vice-president. Another, subtler piece of history was made during the ceremony as Amanda Gorman performed her poem “The Hill We Climb”, becoming the youngest-ever inaugural poet. Gorman garnered much-deserved attention with her beaming confidence, striking words, powerful delivery – and with a piece of jewellery. The jewellery in question was a gold ring which, Gorman later explained on Twitter, was gifted to her by Oprah Winfrey and depicted a caged bird to symbolize the late poet, Maya Angelou, the first black and female poet to perform at a US presidential inauguration. The ring thereby became a symbol not only of Angelou but, as Gorman herself wrote, ‘the women who have climbed my hills before.’ Gorman’s ring is not the first piece of fashion to act both aesthetically and symbolically. In the 1960s, Mary Quant’s loud, super-short miniskirts materialised (literally) women’s sexual liberation; in the same decade, black berets became synonymous with the Black Panther movement and indeed made a more recent appearance on model Adwoa Aboah’s head for the front cover of British Vogue. In 2019 Lady Hale’s spider brooch became a surprising news story, as the press shifted their attention away from the Supreme Court’s verdict on Johnson’s proroguing of Parliament and towards what could Hale’s brooch possibly mean?! While Hale insisted that the brooch had no symbolic significance, social media speculated whether it carried a hidden political statement, some tending towards the idea of “web-weaving” and the item later came to symbolise the rule of law and anti-Brexit campaigns. Without saying a single word, Hale – like Gorman – had said a thousand. Fashion can go further in its role as symbol by both popularizing socio-economic campaigns and acting as a source of monetary profit for charities associated with the cause. The student-run charity SolidariTee, for instance, raises awareness of the refugee crisis by encouraging students to wear (and consequently publicise) their distinctive and eco-friendly t-shirts while also raising money for charities supporting refugees and asylum seekers. Referring back to Hale’s infamous brooch, embroidery firm Balcony Shirts in Uxbridge – which is, rather fittingly, Johnson’s constituency – raised over £15,000 for the homelessness charity Shelter by selling t-shirts with the design of the iconic spider. Fashion, therefore, is not merely a passive visual symbol but an active one which effectively raises awareness and incites actual social or economic change. It is important to bear in mind that fashion is a commodity, and part of an industry that ultimately aims to profit. We should, however, be careful with fashion-orientated activism: there is a marked difference between fashion items that actively empower the group they claim to support and pieces that appear political simply to encourage larger profits for the retailer. Take the 2014 collaboration between the high street brand Whistles, feminist campaign group The Fawcett Society and Elle magazine which sold the popular “This Is What a Feminist Looks Like” shirts, photographed on figures such as Ed Miliband and Emma Watson. There were two issues with this campaign: first, it was made to “celebrate” the mission of empowering women, but it was not clear if profits were actually going to charities supporting the women they claimed to empower. Yet the most glaring issue was the fact that the shirts were made in a Mauritian sweatshop paying their workers 62p an hour in prison-like conditions – the majority of whom were in fact women. It is important to bear in mind that fashion is a commodity, and part of an industry that ultimately aims to profit. This is where we turn to ‘commodity activism’ where companies incorporate political movements as part of their branding with the sole aim of increasing sales rather than supporting a cause. As consumers, we must be aware of where our fashion is sourced and, of course, who our money is profiting. For example, purchasing a “Feminism” top from ASOS is not an effective political act since it does not empower women, but only profits ASOS executives while possibly exploiting women and girls who make the items. Fashion does not, therefore, need to be loud to be symbolic. Kamala Harris’s outfit at the inauguration showcased fashion labels Pyer Moss, Christopher John Rogers and Sergio Hudson, all headed by black designers. This is a far more effective way of promoting social causes than modelling a mass-produced slogan shirt that largely benefits rich, white CEOs and their shareholders. 2021’s inauguration demonstrated that our outfit choices can indeed be a political symbol – whether it be a bold display such as Lady Gaga’s dove-and-olive-branch brooch, a subtler but politically-active statement such as Harris’s label choices, or a personal tribute to the battles won by those who fought before us such as Gorman’s ring. We must, however, be careful that fashion does not come to symbolise empty words. Movements which fight for the rights of the oppressed are not trends, and nor should the clothing that claims to support them be. The most powerful symbol is one that does not merely represent a movement but is actively part of it until the end. Photo credit: Amanda Gorman via Facebook
<urn:uuid:b2a05751-7385-46ed-93fd-8aba77061050>
CC-MAIN-2023-14
https://www.oxfordstudent.com/2021/01/29/when-is-fashion-activism-more-than-a-trend/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00758.warc.gz
en
0.963719
1,195
2.578125
3
What is vitamin D? This vitamin is a fat-soluble nutrient found naturally in certain foods and added to several health supplements. Unlike water-soluble vitamins, any excess is retained in the body rather than washed away with urine. The body may manufacture this vitamin when exposed to UV radiation from the sun, and it is essential for good bones and teeth. While it is not found naturally in many foods, you may increase your vitamin D levels by simply stepping outside in the sun. According to the recent Centers for Disease Control and Prevention (CDC) data, far more people have insufficient levels of vitamin D in their bodies. Vitamin D’s Benefits This vitamin increases phosphorus and calcium absorption in bones and teeth, making them stronger. It aids in preventing bone loss and the onset of skeletal illnesses such as osteoporosis. In addition, vitamin D: - Helps to balance the amount of calcium in your bloodstream, which helps with heart function, among other things. - Helps the immune system by combatting dangerous germs and viruses. - Maintains kidney health by correcting mineral abnormalities. - Improves muscle function. - Maintains the health of neurons and nerve receptors to promote effective brain-body connections. - Reduces inflammation With all of these benefits, a deficiency of this essential vitamin in the body can lead to a variety of issues, including – - Osteoporosis and other bone problems, lead to weak bones and an increased risk of fractures. - Muscle weakness in seniors increases their risk of falling. How to Get vitamin D Sources in Your Body It is an unusual vitamin in that it is likely to be deficient even in a well-balanced diet. According to the Office of Dietary Supplements, exposing your sunscreen-free face, arms, legs, or back to the sun for five to ten minutes between 10 a.m. and 3 p.m. twice a week will provide adequate vitamin of D group. However, such suggestions have their own concerns, particularly skin cancer. Even if sun exposure was not connected to skin cancer and other health hazards, it is not a reliable way for everyone to get enough vitamin D supplements, since there are various gene variations that can disrupt the mechanism that transforms the vitamin of D group into a form that the body can use. Vitamin D Foods While getting all your vitamin needs through diet is difficult, consuming good vitamin D-containing foods does not carry the health hazards associated with excessive sun exposure. According to the Office of Dietary Supplements, the following are some of the best vitamin D sources: - Fish liver oil - Orange juice - Milk with added this vitamin. - Yoghurt enriched with this vitamin. - Liver of beef - Eggs (including the yolk). - Cereal enriched with this vitamin. - Cheese from Switzerland How Much vitamin D per Day is required? The vitamin D normal range you require is based on your age. |Age group||Recommended intake international units (IU)/day||Stay below IU/day*| |0-6 months old||400||1000| |7-12 months old||400||1500| |1-3 years old||600||2500| |4-8 years old||600||3000| |9-70 years old||600||4000| |Over 71 years old||800||4000| |Pregnant and Breastfeeding Women||600||4000| Supplementation of vitamin D If you are learning how to increase vitamin D, you must ensure that you start taking a supplement. Vitamin D supplementation is generally safe when taken carefully, typically in conjunction with other minerals like magnesium and vitamin K12, and under the supervision of a health professional. However, like any other supplement, vitamin D capsules might interfere with other prescriptions, so it is crucial to discuss any supplements you are taking or any medications with your doctor. Low vitamin D Problems Low vitamin D symptoms can take a toll on your health. You can have a number of negative health effects. In addition to rickets in children, adults can suffer from Osteomalacia, a bone-weakening illness. Some vitamin D deficiency diseases are more subtle. For example, you may be getting enough vitamins to avoid major illnesses but not enough to prevent infections, discomfort, and weakness. Increased consumption of this vitamin may help relieve depression and increase strength in people who are deficient. When exposed to sunshine, your skin creates vitamin D. The ultraviolet rays help form this vitamin in your skin. It is found in meals such as fish oil, fatty fish, and liver, as well as in some fortified foods and supplements. Due to restricted solar exposure and a limited variety of rich food sources, vitamin D deficiency is rather frequent. Consider supplementing if you don’t spend much time in the sun and infrequently consume fatty seafood. Getting enough vitamins can help improve your health. Vitamin D is usually regarded as safe when taken at appropriate levels. Taking too much vitamin D in the form of supplements, on the other hand, can be dangerous. Muscle weakness, discomfort, weariness, and sadness are all symptoms of vitamin D deficiency. There is no perfect time of day to take vitamin D tablets. Increasing vitamin D intake has minimal influence on weight gain or loss. The most prevalent cause of vitamin D deficiency is a lack of exposure to sunshine, which occurs when the diet lacks vitamin D, although various illnesses can also cause vitamin D deficiency. Low Vitamin D – the Bane That Grows Worse With Age Taking Vitamins Can Improve Your Health
<urn:uuid:9a7d162b-e883-4a5d-aba3-8ca767cfd5a7>
CC-MAIN-2023-14
https://emoha.com/blogs/nutrition/vitamin-d-all-you-need-to-know?noamp=mobile
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950110.72/warc/CC-MAIN-20230401160259-20230401190259-00758.warc.gz
en
0.917702
1,184
3.390625
3
In this article, we will answer the question “Do betta fish bite?”. We will also discuss if they have teeth and how strong their bite is. Do betta fish bite? Betta fish do bite, and they have teeth that allow them to do so. Whether or not your betta bites you is mostly determined by their disposition. Depending on how relaxed or afraid the betta is, they may not attack you if you stick your finger in their aquarium. Bettas with a higher level of aggression, on the other hand, may view your hand as a danger and attempt to bite it. Remember that a betta can bite anything that enters its tank, so it’s not just your fingers it’s seeking. Do betta fish have teeth? Rows of little white teeth can be seen in your betta’s mouth if you look attentively, especially on its bottom jaw. However, because their teeth are so small, you may have problems seeing them unless you use a magnifying glass or your phone’s magnification feature. As a result, you shouldn’t be concerned if you can’t see them. Your betta has these, but they’re probably too small for you to notice. Yes, the teeth of a betta are razor-sharp. What do bettas use their teeth for? The teeth of a betta come in handy for a variety of reasons. The majority of a betta’s diet consists of meat (but they are extremely gutsy and will eat some vegetables if given the opportunity). As a result, they require fangs to attack and kill their prey. Because little insects make up the majority of their meal in the wild, their teeth make it easier for them. Teeth not only fight them but also assist them in chewing up anything they’ve managed to kill. Your betta may be munching on betta pellets and other food in a similar manner to how you feed it. Siamese fighting fish aren’t called that for no cause. They require their teeth to help them fight because they’re so ferocious. This is especially true if there are other men in the vicinity. Their razor-sharp teeth rip through the tails, scales, and fins of their prey, shredding them to pieces. Therefore, you should never group male betta fish together, and in some cases, you should avoid grouping your betta fish with other fish altogether. It’ll attack anyone if it’s feeling extremely angry. Any fish that is brightly coloured or has a long, moving tail and fins must not be housed with your betta, on the other hand, if it is. What is the strength of a betta fish bite? If you compare the bite of a betta to that of other species, it is stronger than that of a great white shark. This is remarkable until you consider the size of its mouth. A betta can bite you, yet its mouth isn’t strong enough to break your skin. Does betta fish bite hurt? Being bitten by a betta fish isn’t painful since their teeth and mouths are so little. Your skin is too tough to be broken even by a betta fish, as previously said. What it feels like to be bitten varies depending on who you ask. Some people describe it as a tiny tickle or a sensation that is felt but not painful. Others have described it as a peculiar pinch. In any event, while it may take you off guard, it isn’t going to injure you. If you want to know what it’s like to have a betta bite you, try placing some food on the fingertips and watching your betta bite it off with its teeth. If it’s feeling brave, it’ll bite both your finger and the food. Make careful you don’t do it too often, though. What causes betta fish to bite and refuse to let go? On rare occasions, you may discover that your betta has bitten you and is refusing to let go of the bite. If this is the case, it’s not because it’s trying to hurt you; rather, its jaw has been caught. This is one of the explanations for why you should prevent allowing your betta to bite you in the first place. If its jaw becomes caught and it is unable to release it, it may injure itself. Why do bettas bite people? There are a variety of reasons why your betta fish may bite you. And, if at all possible, you should avoid the majority of them, as they may cause your betta to get stressed. Your betta may bite you for a variety of reasons. The first is that it is curious. It’ll be inquisitive about what’s going on if it sees your hand-looming into the tank. Bettas don’t have hands as we do, so they have to grip objects with their mouths and find out what they are. Your betta may bite you for a second reason: defence. Consider how you’d react if you saw a huge hand approaching you. You’d probably assault it as well. As one of the factors that would distress your betta, you must avoid putting the water in the tank with your hand at all times. Finally, if you place food on your finger in order to feed it, it may accidentally bite your finger off. When it’s hungry, it can get a little carried away, even if it’s generally very exact. You will be bitten! If you put your hand in your betta’s tank, make sure you’re ready to be bitten. It may make you jump if you aren’t aware of the bite. And if you react too rapidly while holding your betta, you risk hurling it into the air. Not only would this startle it, but if it does not return to the water, it may suffer catastrophic consequences. Betta fish biting during spawning Unfortunately, bettas aren’t amorous fish, and even when they’re spawning, they can be antagonistic toward one another. However, depending on the type of bite, it could be a favourable indicator or cause major concern. It is possible that your betta is giving you a dependable indication, no matter how hard it bites. A betta biting another, but the other one merely backs away a little or doesn’t move, indicates that one of them isn’t quite ready or certain about mating with the other, but they aren’t completely averse to it either. Check to see if the bite is causing any damage. It should be a little nip rather than a full-fledged bite. Even if bettas do not bite, this does not rule out the possibility that they are attracted to each other. Biting can sometimes occur as a result of aggressive behaviour. You may need to separate the bettas if you observe bites on the tail and fins. This is a hint that they aren’t going to be good friends and are being openly hostile to each other. Remember that violent behaviour is not limited to males; ladies can be hostile as well. You can tell whether or not it was an aggressive bite based on the recipient’s reaction. It’s not the nice sort of bite if they flee and try to avoid the culprit. If you detect this type of biting, you should take a break from breeding your bettas for a while. In this article, we answered the question “Do betta fish bite?”. We also discussed if they have teeth and how strong their bite is. If you have any questions or concerns, please let us know in the comments section below! Frequently Asked Questions (FAQs): Do betta fish bite? Does betta fish bite hurt? No. A betta fish bite will not damage you, although it may frighten you if it happens unexpectedly. If it bites you hard enough, it may become lodged on your skin. What is the betta fish lifespan? In captivity, a betta fish can survive for about 3-5 years. Simply feeding it properly, keeping it in ideal conditions, and pairing it with the appropriate tank mates can help you avoid unwanted fights on your hands. Is it possible for betta fish to kill other fish? Yes, they have the capability to kill. This occurs when an opponent refuses to give up. It nips and nibbles the opponent’s fins till it dies. Do betta fish bite tails? Yes, they do. The exact cause for why they bite their tails is still up for discussion. Many people believe that strange conduct is caused by hunger, stress, or boredom. Others claim it is inherited or caused by aggressiveness. In any event, your betta fish is likely to bite its tail. Do betta fish show affection for their keepers? Yes, especially if you’re the one who provides the food for the animals. They are clever animals that can be taught to follow a finger, move decorations, and so on. Is it possible to go close to a betta fish? It is not advisable to touch any fish at all. Because the slime coat on your finger may rub off, exposing them to infection. Furthermore, touching them may spread hazardous microorganisms. Do Betta Fish Have Teeth And Can They Bite? https://www.bettacarefishguide.com/do-betta-fish-have-teeth-and-bite/ Kumar, S. Do Betta Fish Bite? (Do Betta Fish Have Teeth?). https://fishtankmaster.com/do-betta-fish-bite-do-they-have-teeth/ Do Betta Fish Have Teeth? Will They Bite? https://bettasource.com/do-betta-fish-have-teeth
<urn:uuid:3d3d7cc1-f9bf-45f2-afb9-c3cfb17daa38>
CC-MAIN-2023-14
https://petigloo.com/do-betta-fish-bite/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950110.72/warc/CC-MAIN-20230401160259-20230401190259-00758.warc.gz
en
0.945028
2,137
2.859375
3
Victory Gardens Throughout World Struggle II Gardening is the practice of growing and cultivating crops as part of horticulture In gardens, decorative vegetation are sometimes grown for their flowers , foliage , or total look; helpful vegetation, resembling root vegetables , leaf vegetables , fruits , and herbs , are grown for consumption, for use as dyes , or for medicinal or cosmetic use. A delight for gardeners who get pleasure from attracting birds to their yards. Native crops are undoubtedly one of the best supply of meals for pollinators, as a result of plants and their pollinators have coevolved. Individuals who have tiny gardens will need to develop as many crops as potential on vertical supports, and gardeners who’ve a variety of space will still must lend physical assist to a few of their greens, akin to climbing sorts of peas and pole beans. Plant carrots now that can be successfully overwintered as younger plants and harvested at their sweetest by way of spring. Until and prepare new planting beds when soil is workable. Dwelling gardeners can easily overpower and upset the delicate balances of nature. The Master Gardener Help Desk has closed for the winter and will reopen on February 20, 2019. For more information about turning into a Master Gardener, please call 702-257-5501. These crops have to look after themselves a number of the time. Studies have proven that fifth, sixth, and seventh grade students developed higher interpersonal relationship abilities after collaborating in a college or community backyard program. We invite you to be taught from URI Extension Grasp Gardeners by the assorted educational choices within the menu beneath. Gardens of the nineteenth century contained plants such as the monkey puzzle or Chile pine. Tidy the garden by removing spent summer time annuals, pruning dead bloom spikes off heat season perennials, and re-shaping overgrown perennials later in the season. Market Gardening Tools — The Market Gardener UVM Extension Master Gardener Program October to January is the time to plant trees and shrub that are ‘balled & burlap’. Study extra about plants and gardening and how to establish and manage pests and issues. gardening gloves amazon, gardening zones tennessee, gardening tools list, gardening gifts for women, gardening zones alabama Vegetable Gardening For Rookies Listed below are only a few suggestions I’ve learnt about the way to go about Guerrilla Gardening, a primary twelve step information of things to consider. Since 1993, we’ve got skilled 1,337 Grasp Gardener volunteers who’ve served 1,744,269 Los Angeles County residents and earned seventy four,291 continuing schooling hours. You may even interplant crops that grow shortly (radishes) alongside other vegetables that require an extended season (carrots or parsnips), sowing their seeds together. Some crops, corresponding to pansies and kale, tolerate cold, so you may plant them in autumn or late winter. You will need to learn the basics of gardening, all about illness, the best way to regulate weeds and pests, the all vital watering and when and tips on how to fertilize.
<urn:uuid:f2d04aa9-e49f-4e31-b4cc-b1668b7ee2d0>
CC-MAIN-2023-14
http://www.rendonhouse.com/tag/struggle
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943589.10/warc/CC-MAIN-20230321002050-20230321032050-00158.warc.gz
en
0.932657
673
2.65625
3
A spark is defined as small fiery particle of burning substance thrown out by a body in combustion. In some cases the spark starts another fire nearby. Spark is also defined as anything that activates or stimulates; inspiration or catalyst (www.dictionary.com). The goal of the Hardin County Ohio Spark Lab is to instill that inspiration or “spark” that youth and adults need to discover, learn, and grow in a creative environment. This setting is more than just a futuristic classroom or makerspace. It is center of innovation in a rural county framed through the education lens of a land grant university system. The Spark Lab is located in Hardin County, Kenton, Ohio. This project was funded in part by an Innovation grant from eXtension foundation. We were one of nine grants awarded nationally focused on new ideas within Extension. We have also received funding from the Columbus Foundation. Locally the space is provided to us by the Hardin County Commissioners. Explore with us as this space develops.
<urn:uuid:4117a8a9-1401-4647-9bd1-92d0d86c7948>
CC-MAIN-2023-14
https://u.osu.edu/sparklab/2016/05/22/welcome/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00158.warc.gz
en
0.965302
208
3.359375
3
Volume 24, Number 4—April 2018 Influence of Population Immunosuppression and Past Vaccination on Smallpox Reemergence We built a SEIR (susceptible, exposed, infected, recovered) model of smallpox transmission for New York, New York, USA, and Sydney, New South Wales, Australia, that accounted for age-specific population immunosuppression and residual vaccine immunity and conducted sensitivity analyses to estimate the effect these parameters might have on smallpox reemergence. At least 19% of New York’s and 17% of Sydney’s population are immunosuppressed. The highest smallpox infection rates were in persons 0–19 years of age, but the highest death rates were in those >45 years of age. Because of the low level of residual vaccine immunity, immunosuppression was more influential than vaccination on death and infection rates in our model. Despite widespread smallpox vaccination until 1980 in New York, smallpox outbreak severity appeared worse in New York than in Sydney. Immunosuppression is highly prevalent and should be considered in future smallpox outbreak models because excluding this factor probably underestimates death and infection rates. Smallpox virus was eradicated in 1980 but remains a category A bioterrorism agent (1). The only official stocks of the virus are in the United States and Russia (2), but unofficial stocks could be present elsewhere. Advances in synthetic biology of poxviruses and availability of the full variola genome sequence make synthesis of smallpox virus in the laboratory possible (3). Smallpox could reemerge as a result of bioterrorism or a laboratory accident (4); thus, smallpox is a high priority for preparedness planning (5). Given that smallpox is eradicated, mathematical models enable researchers to predict the effects of a smallpox epidemic, but these predictions depend critically on the assumptions of the mathematical model. Many researchers who have developed smallpox models have been optimistic about residual vaccine-induced immunity and assumed a case-fatality ratio (CFR) of 30%, whereas estimates of outbreaks in nonimmune populations suggest a CFR of 50%–70% (6). Given the absence of smallpox in the world for nearly 40 years and loss of immunologic boosting from wild-type infection, the CFR of an epidemic today might be higher. The immunologic status of the population has also changed dramatically in the decades since smallpox eradication. A larger proportion of the population today is unvaccinated, and residual immunity in persons who were vaccinated before 1980 is waning (7). In addition, the prevalence of HIV, advances in transplantation, and therapies for cancer and many autoimmune conditions have resulted in unprecedented rates of immunosuppression (8). In 1980, when smallpox was eradicated, HIV had not yet manifested a high global burden of disease. Similarly, bone marrow transplantation was in its infancy, and heart–lung transplantations had not yet occurred. The fact that the proportion of unvaccinated and immunosuppressed persons in the population is increasing has not yet been adequately considered in estimations of the effect of reemergent smallpox. Persons born after 1980 have no immunity to smallpox because they have never been exposed to wild-type virus or been vaccinated. For vaccinated cohorts, immunity wanes over time, and the highest protection is present during the first 5 years after vaccination, possibly waning to zero within 5–10 years (9). Furthermore, immunosenescence is a predictable, exponential decline in immune function that occurs after 50 years of age (10) and reduces the body’s ability to fight infection and respond to vaccines (11). This phenomenon further adds to immunosuppression in countries with an aging population. The aim of this study was to estimate the effect of reemerging smallpox in New York, New York, USA, and Sydney, New South Wales, Australia, 2 large cities with different vaccination histories for which estimates could be made on the population’s immunologic status. We used Sydney’s population in 2015 (12), which was estimated using data from the state of New South Wales (13). The New York population of the same year was derived from the relevant statistical collection (14). We divided both populations into 5-year age groups up through ages 80–84 years and combined the eldest (persons >84 years of age) into a single group (Figure 1, panel A). Each age group was divided into vaccinated and unvaccinated compartments, which were then further subdivided into 3 categories of immunity: immunocompetent, mildly immunosuppressed, and moderate-to-severely immunosuppressed. We assumed that immunosuppressed persons had no residual immunity from vaccination. We considered common types of immunosuppression estimated in an influenza study (15). We classified persons into 2 categories of immunosuppression: moderate to severe (called severe in our model) and mild. Severe immunosuppression was defined as a condition in which quantifiable data existed to demonstrate a risk for infection more than twice that of an immunocompetent person. This classification was left as a single category in the absence of reliable methodology to subdivide it. Mild immunosuppression was defined as a condition in which immunosuppression was documented but susceptibility to infection was estimated to be less than twice that of an immunocompetent host. For the analysis, persons with severe immunosuppression were assumed to have 2× and mild immunosuppression 1.5× the susceptibility to infection of a healthy person (16). We sourced data for each city, and when only countrywide data were available, we attributed rates from the countrywide data set to the respective fraction of the population in the city. When age-specific immunosuppression prevalence data were not available, we used yearly age-specific incidence data instead to calculate prevalence age distribution (17,18). We estimated the populations living with cancer (17,19), HIV (20,21), organ transplants (22,23), respiratory syndromes such as asthma (24,25) and chronic obstructive pulmonary disease (26,27), dialysis (28,29), and autoimmune diseases (30,31) and divided these populations into the 2 immunosuppression categories for each city (Technical Appendix Table 1). We acknowledge that many other diseases are associated with immunosuppression. Our method underestimates the amount of immunosuppression in the population. Vaccine-Induced Residual Immunity In the United States, including New York, widespread smallpox vaccination occurred until 1970 (32). In contrast, in the geographically isolated island continent of Australia, quarantine was used to protect the population because smallpox was never endemic (32). Widespread vaccination never occurred in Australia; only the armed forces and healthcare workers were vaccinated, which occurred until 1979, although reactive vaccination campaigns had been conducted during a smallpox outbreak in Sydney in 1917 (33). For New York, we assumed 80% of the healthy population 40–69 years of age (born before 1975) were previously vaccinated. For Sydney, we estimated the proportion of persons vaccinated by estimating those born before 1980 in the following groups: healthcare workers in Sydney in 2015 (34), members of the defense forces, and migrants (>30% in the Sydney population) (35), who might have been vaccinated in their country of origin (≈80,000 persons). We estimated that, in Sydney, at most 30% of the total population born before 1980 (persons 35–69 years of age) had been vaccinated. On the basis of a mathematical model (36) that estimated waning immunity against severe smallpox as 1.41% per year after vaccination, we calculated the age-specific residual protection for vaccinated persons 40–69 years of age by multiplying that percentage by the number of years from vaccination and subtracting it from 100% starting protection. In our model, we used the heterogeneous age-specific contact rates from the European mixing patterns study (37). We assumed that persons would greatly reduce their social contacts after becoming symptomatic with smallpox (38). To account for this change in social contact, we modified the normal contact matrix, multiplying the matrix by a factor (0 < x < 1) to reduce the number of contacts per day (39). Because of the lack of studies quantifying this reduction, we assumed x to be 0.5, as in a previous study (39). Considering severe smallpox types are more substantially prostrating, we applied the reduced contact matrix to hemorrhagic and flat smallpox infections from the first day of illness. For ordinary smallpox, we assumed the behavior change started on the second day and for vaccine-modified smallpox, on the third day. We categorized smallpox disease into 4 different types defined by infectivity (R0) and CFRs: hemorrhagic, flat, ordinary, and vaccine-modified. Age-specific and other model parameters (Technical Appendix Table 2) as well as further model details are explained in the Technical Appendix. Smallpox Disease Type Distribution We assumed infected persons had different probabilities of developing each disease type, depending on their age and immunologic status. The incidence of each disease type within each age group for healthy unvaccinated persons was drawn from historical outbreaks (9) (Technical Appendix Table 3). For healthy unvaccinated persons, hemorrhagic smallpox ratios ranged from 7 cases/1,000 persons infected (in the 5–9-year age group) to 200 cases/1,000 persons infected (in the >85-year age group). Flat smallpox age-specific rates were lowest for the 10–14-year age group (30 cases/1,000 persons infected) and reached 180 cases/1,000 persons infected for the oldest age group. For the mildly immunocompromised population, we doubled the age-specific probability of hemorrhagic and flat smallpox. We assumed 100% of severely immunocompromised persons would develop hemorrhagic disease. We assumed the vaccinated subgroup had reduced susceptibility and rates of severe smallpox types. We estimated that 25.3% of vaccinated persons would get vaccine-modified smallpox (9). We applied a waning immunity function over time at a rate of 1.41% per year from vaccination (36) and assumed the rates of hemorrhagic and flat smallpox would increase with time from vaccination while rates of vaccine-modified smallpox would decrease with time from vaccination (Technical Appendix Table 4). We constructed a modified SEIR (susceptible, exposed, infected, recovered) model for smallpox transmission (Technical Appendix Table 2). The population was divided into vaccinated and unvaccinated compartments, which were then further subdivided into 3 categories of immunity: immunocompetent, mildly immunosuppressed, and moderate-to-severely immunosuppressed. The model used ordinary differential equations to move populations into epidemiologic states related to their smallpox infectious status: susceptible, infected, prodromal, infectious, recovered, or dead. Once infected, populations were moved into the next state on the basis of disease duration rates. To obtain the age-specific force of infection (i.e., the rate at which susceptible persons acquire smallpox), we used the Euler approximation to make discrete contact rates, assuming the rates were proportional to the patterns observed in the United Kingdom. Then, to account for the different infectivity rates of different smallpox types, we estimated the transmission parameter β (i.e., the probability of getting infected from a contact) for each smallpox disease type to calculate the R0 for hemorrhagic, flat, ordinary, and vaccine-modified smallpox. Finally, we multiplied the force of infection by a parameter (α1, α2, α3, α4; Technical Appendix Table 2) to account for the different susceptibility levels of different populations. The model ran for 100 simulated days. We assumed an attack in a crowded public space, such as an airport, and started the epidemic with 51 infected in New York and 29 in Sydney to reflect the same attack rate for each population. We assumed a dynamic population updated each day using the birth (40) and age-specific death rates (41,42) from 2014 for both cities. We conducted a sensitivity analysis on the assumption of waning immunity, reducing immunity by 0.7% per year (approximately half the value used in the base case scenario [i.e., the first scenario discussed]). We present results for 3 different assumptions about residual vaccine immunity: no residual immunity, base case immunity (1.41% waning immunity per year), and high residual immunity (0.7% waning immunity per year). We also conducted a sensitivity analysis to test the model outputs without considering population immunosuppression, which has been the approach in most past models (43). Population and Immunity Levels We examined the population age distributions of New York and Sydney. Sydney has a higher percentage of persons <20 and >55 years of age than New York (Figure 1, panel A), whereas New York has a higher proportion of persons 20–39 years of age than Sydney. We estimated that 4.54% of New York’s population and 3.76% of Sydney’s population are severely immunocompromised, 14.81% of New York’s population and 12.95% of Sydney’s population are mildly immunocompromised, 59.14% of New York’s population and 72.56% of Sydney’s population are healthy unvaccinated, and 21.51% of New York’s population and 10.73% of Sydney’s population are healthy vaccinated. Similar proportions of the 2 cities’ populations (19% in New York and 17% in Sydney) are immunosuppressed (Figure 1, panel B). New York has a higher proportion of the population vaccinated (21%) than Sydney (10%). Base Case Scenario We analyzed age-specific infection (Figure 2, panel A) and death (Figure 2, panel B) rates using the base case scenario (medium immunity level) including the immunosuppressed population. Persons 5–19 years of age are at highest risk for smallpox infection in both cities (Figure 2, panel A). Although the proportion of persons infected in both cities is similar among the 0–19-year age groups, ≈25% more persons in New York than Sydney become infected among the 20–39-year age groups. Cumulative deaths per 1,000 population increase with age starting with persons >20 years of age (Figure 2, panel B). Deaths peak in the 65–69-year age group in both cities, reaching 1.2 deaths/1,000 population for New York and 0.9 deaths/1,000 population for Sydney 60 days after the start of the outbreak; rates increase again in those >80 years of age. The New York population also has a smaller peak in deaths in the 35–39-year age group. Although the spread of infection is mostly driven by higher contact rates among persons of young age groups, the peaks in death reflect the distribution of the immunosuppressed population (Figure 1, panel B; Figure 2, panel B). The effect of residual immunity is more apparent in New York trends, which show a greater decrease in infections and cumulative deaths in the age groups that were previously vaccinated (40–65 years of age). Looking at total rates over time, New York (Figure 3, panels A, C) and Sydney (Figure 3, panels B, D) have similar exponential growths of infection rates, with slightly higher trends for New York. The rate of infection reaches 0.094 infected/1,000 population for New York and 0.084 infected/1,000 population for Sydney 50 days after the smallpox introduction and increases to 0.496 infected/1,000 population for New York and 0.452 infected/1,000 population for Sydney by 70 days. The death rates are 0.028 deaths/1,000 population for New York and 0.025 deaths/1,000 population for Sydney after 50 days and reach 0.151 deaths/1,000 population for New York and 0.133 deaths/1,000 population for Sydney by 70 days. Residual Immunity Analysis Infection and death rate estimates for New York, where vaccine coverage is more than double that of Sydney, are more sensitive to assumptions of residual immunity. New York (Figure 3, panel A) has lower rates of infection than Sydney (Figure 3, panel B) only in the scenario of high residual immunity. At day 50 of the outbreak, rates are ≈15% (base case residual immunity) and 31% (high residual immunity) lower in New York and 10% (base case residual immunity) and 17% (high residual immunity) lower in Sydney with residual immunity than without residual immunity. Differences in infection and death rates among different residual immunity assumptions increased with time. Regarding the impact on age-specific rates in New York (Figure 4, panel A) and Sydney (Figure 4, panel B), the assumption of high residual immunity produced lower death rates for the older age groups. Infection and death rates increase when including (vs. excluding) immunosuppression parameters in the model; greater differences are seen between New York’s infection rates (Figure 3, panel C) and Sydney’s infection rates (Figure 3, panel D). The difference in rates increases with time, reaching ≈20% in New York and 18% in Sydney at day 50 from the start of the outbreak and 28% for New York and 25% for Sydney at day 70. Although including immunosuppression estimates into the model produced similarly higher infection rates for each age group (less for the 0–4-year age group), differences in death rates increased with age (Figure 4). With each passing year, population immunosuppression is a more influential determinant than residual vaccine immunity of the severity of a smallpox epidemic. Although the spread of disease is highest in younger age groups, driven mostly by their higher contact rates, higher death rates were seen in older populations, reflecting the prevalence of immunosuppression. The differences between New York, which has high vaccination coverage (an estimated ≈22% of the population), and Sydney, which has low (≈10%) vaccination coverage, demonstrate that residual immunity assumptions are not as influential in Sydney as in New York. However, the consideration of population immunosuppression, from medical conditions to iatrogenic factors, strongly affects disease transmission and deaths in both cities. This large population subset must be considered when modeling the impact of any infectious disease outbreak. We estimated conservatively that almost 1 in 5 persons in New York and 1 in 6 persons in Sydney (and higher for the 60–64-year age group) are living with some degree of immunosuppression. Although New York has higher rates of immunosuppression for the 25–84-year age groups, Sydney has higher rates than New York for the youngest (0–19 years) and the oldest (>85) populations. Residual immunity affects age-specific infection and death rates, with both cities showing the highest infection rates for unvaccinated young persons 5–19 years of age. However, death rates rise after 40 years of age, despite higher vaccination coverage in this age group. For Sydney, even an assumption of higher immunity does not affect the infection or death rates greatly because of the low vaccine coverage before 1980. However, residual immunity becomes more influential if we use more optimistic assumptions of waning immunity. Note that persons who have been vaccinated would mount a more robust and rapid response to revaccination in the event of an outbreak and might be better protected after postexposure vaccination. Obtaining a vaccination history and checking for a consistent scar are necessary parts of outbreak management. Although immunosuppression is a major determinant of the size and distribution of a smallpox outbreak, this fact should not be a major determinant of vaccination policy. Immunosuppression should continue to be an absolute contraindication for vaccination of persons who are not true contacts. Ensuring that persons with immunosuppression (including healthcare workers) avoid contact with persons with smallpox (if possible) should be a priority. Smallpox would always be more pathogenic than vaccinia virus, so any patient with a bona fide exposure to smallpox should be vaccinated with a fully potent vaccinia strain, such as ACAM2000 (44). If such patient develops a serious complication, such as eczema vaccinatum or progressive vaccinia, the patient can be treated with ST-246 (Siga Technologies, New York, NY, USA) (45). Our study is subject to some limitations. We used an underestimate of immunosuppression; other conditions causing immunosuppression, such as diabetes, were not considered. We also used conservative estimates for the increased risk for infection in immunosuppressed persons and grouped persons with severe and moderate immunosuppression into single categories because of the absence of more specific data to categorize them further by degree of immunosuppression. The contact matrix we used was estimated in a study conducted in the United Kingdom in 2006, which might not necessarily reflect New York or Sydney social contact patterns (37). Furthermore, contacts with symptomatic infectious patients will probably drop to near zero once an outbreak has been confirmed and patients are well isolated, assuming adequate health system capacity for isolation and treatment of smallpox patients. The data in the model on age-specific rates of smallpox were obtained from hospitalized patients (9), which might overestimate the rates of severe disease in the model outputs. The speed and vigor with which smallpox control efforts are implemented should be major aspects of control efforts and need to be tested in a model that accounts adequately for immunosuppression. Ensuring adequate hospital care and isolation facilities will also help in epidemic control. During the Ebola epidemic in West Africa, lack of beds resulted in widespread community transmission, and modeling showed that 70% of patients needed to be in treatment facilities to control the epidemic (46). The response to severe acute respiratory syndrome, with its rapid control despite the lack of a vaccine or antiviral agent, showed that patient isolation can be very successful (47). Experiences with severe acute respiratory syndrome, Ebola, and Middle East respiratory syncytial coronavirus also illustrate the heavy toll on healthcare workers (48), who should be assumed to be at high risk for infection in the event of a smallpox outbreak. Given waning smallpox vaccine immunity (nearly 4 decades since eradication and a dwindling vaccinated population), the influence of population immunosuppression is greater than that of residual vaccine immunity, yet has not been adequately considered in smallpox epidemic modeling. Advances in medicine and new endemic diseases, such as HIV, have resulted in almost 1 in 5 persons living with immunosuppression in large metropolitan cities. Immunosuppression must be considered in preparedness planning and poses a challenge for vaccination strategies during potential smallpox outbreaks. Dr. MacIntyre is Professor of Infectious Diseases Epidemiology at the University of New South Wales, Sydney, and leads a research program on biosecurity, bioterrorism, and emerging infectious diseases, which are her primary research interests. - Centers for Disease Control and Prevention. General fact sheets on specific bioterrorism agents. 2017 May 9 [cited 2017 Jan 24]. https://emergency.cdc.gov/bioterrorism/factsheets.asp - Fenner F, Henderson DA, Arita I, Ježek Z, Ladnyi ID. Smallpox and its eradication. Geneva: World Health Organization; 1987. - Koblentz GD. The de novo synthesis of horsepox virus: implications for biosecurity and recommendations for preventing the reemergence of smallpox. Health Secur. 2017;15:620–8. DOIPubMedGoogle Scholar - MacIntyre CR. Biopreparedness in the age of genetically engineered pathogens and open access science: an urgent need for a paradigm shift. Mil Med. 2015;180:943–9. DOIPubMedGoogle Scholar - MacIntyre CR, Seccull A, Lane JM, Plant A. Development of a risk-priority score for category A bioterrorism agents as an aid for public health policy. Mil Med. 2006;171:589–94. DOIPubMedGoogle Scholar - Gelfand HM, Posch J. The recent outbreak of smallpox in Meschede, West Germany. Am J Epidemiol. 1971;93:234–7. DOIPubMedGoogle Scholar - World Health Organization. Smallpox [cited 2017 Feb 28]. http://www.who.int/csr/disease/smallpox/en/ - Parrino J, Graham BS. Smallpox vaccines: Past, present, and future. J Allergy Clin Immunol. 2006;118:1320–6. DOIPubMedGoogle Scholar - Rao AR. Smallpox. Bombay (India): Kothari Book Depot; 1972. - Montecino-Rodriguez E, Berent-Maoz B, Dorshkind K. Causes, consequences, and reversal of immune system aging. J Clin Invest. 2013;123:958–65. DOIPubMedGoogle Scholar - Raina MacIntyre C, Menzies R, Kpozehouen E, Chapman M, Travaglia J, Woodward M, et al. Equity in disease prevention: Vaccines for the older adults - a national workshop, Australia 2014. Vaccine. 2016;34:5463–9. DOIPubMedGoogle Scholar - Australian Bureau of Statistics. Australian demographic statistics. 2017 [cited 2018 Feb 8]. http://www.ausstats.abs.gov.au/ausstats/subscriber.nsf/0/0DEC5B368C5C2D72CA2581F5001011EB/$File/31010_jun 2017.pdf - Australian Bureau of Statistics. Australian historical population statistics, 2014. 2014 Sep 18 [cited 2017 Mar 14]. http://www.abs.gov.au/AUSSTATS/abs@.nsf/mf/3105.0.65.001 - Baruch College. New York City (NYC) age and sex distribution—by county. 2015 [cited 2017 Mar 17]. http://www.baruch.cuny.edu/nycdata/population-geography/age_distribution.htm# - Kunisaki KM, Janoff EN. Influenza in immunosuppressed populations: a review of infection frequency, morbidity, mortality, and vaccine responses. Lancet Infect Dis. 2009;9:493–504. DOIPubMedGoogle Scholar - Finin P, Kosaraju A, Rose E, Rubin H. The role of vaccination, antiorthopoxvirus drug, and social cooperativity in a mathematical model of smallpox control. Biosecur Bioterror. 2013;11:59–72. DOIPubMedGoogle Scholar - Australian Government. Cancer in Australia statistics. 2017 [cited 2017 Feb 15]. https://canceraustralia.gov.au/affected-cancer/what-cancer/cancer-australia-statistics - New York State. Cancer incidence and mortality by age group, New York State, 2010–2014. 2016 [cited 2017 Mar 17]. https://www.health.ny.gov/statistics/cancer/registry/table6/tb6totalnys.htm - New York State, Department of Health. NYS cancer registry and cancer statistics. 2017 [cited 2018 Feb 8]. https://www.health.ny.gov/statistics/cancer/registry/ - New South Wales Ministry of Health. NSW HIV strategy 2012–2015. 2015 [cited 2017 Feb 15]. http://www.health.nsw.gov.au/endinghiv/Documents/q4-2015-and-annual-hiv-data-report.pdf - Centers for Disease Control and Prevention. Diagnoses of HIV infection in the United States and dependent areas, 2015. HIV Surv Rep. 2015;27 [cited 2017 Mar 22]. https://www.cdc.gov/hiv/pdf/library/reports/surveillance/cdc-hiv-surveillance-report-2015-vol-27.pdf - New South Wales Ministry of Health. Increasing organ donation in NSW, government plan 2012. 2012 Aug [cited 2017 Feb 15]. http://www.health.nsw.gov.au/organdonation/Publications/increasing-organ-donation.pdf - United Network for Organ Sharing. Annual reports. A look back at UNOS’ achievements. 2015 [cited 2017 Mar 16]. https://www.unos.org/about/annual-report/ - Australian Institute of Health and Welfare. Who gets asthma? 2016 [cited 2017 Feb 15]. https://www.aihw.gov.au/reports/asthma-other-chronic-respiratory-conditions/asthma/contents/who-gets-asthma/ - Centers for Disease Control and Prevention. Most recent asthma data. 2017 [cited 2017 Mar 16]. https://www.cdc.gov/asthma/most_recent_data.htm - Australian Institute of Health and Welfare. Chronic diseases data. 2016 [cited 2018 Feb 8]. https://www.aihw.gov.au/reports/life-expectancy-death/grim-books/contents/grim-books#page2 - Centers for Disease Control and Prevention. Chronic obstructive pulmonary disease. COPD among adults in New York. 2012 [cited 2017 Mar 17]. https://www.cdc.gov/copd/maps/docs/pdf/NY_COPDFactSheet.pdf - McDonald S, Chang S, Excell L, editors. Australia and New Zealand dialysis and transplant registry. Adelaide (South Australia, Australia): The Queen Elizabeth Hospital; 2008. - Dialysis Patient Citizens. New York. 2015 [cited 2017 Mar 22]. http://www.dialysispatients.org/advocacy/state-resources/new-york - Australasian Society of Clinical Immunology and Allergy. Autoimmune diseases. 2017 [cited 2017 Mar 24]. https://www.allergy.org.au/patients/autoimmunity/autoimmune-diseases - Cooper GS, Bynum ML, Somers EC. Recent insights in the epidemiology of autoimmune diseases: improved prevalence estimates and understanding of clustering of diseases. J Autoimmun. 2009;33:197–207. DOIPubMedGoogle Scholar - Kennedy RB, Lane JM, Henderson DA, Poland GA. Smallpox and vaccinia. In: Plotkin SA, Orenstein WA, Offit PA, editors. Vaccines, 6th ed. Amsterdam: Elsevier Inc.; 2012. p. 718–45. - Australian Government Department of Health. Guidelines for smallpox outbreak, preparedness, response and management. 2004 [cited 2017 Apr 4]. http://www.health.gov.au/internet/main/publishing.nsf/content/health-pubhlth-publicat-document-metadata-smallpox.htm - Australian Institute of Health and Welfare. Australia's medical workforce 2012. 2014 Jan 24 [cited 2017 Apr 4]. https://www.aihw.gov.au/reports/workforce/medical-workforce-2012/contents/summary - Australian Bureau of Statistics. Migration, Australia, 2009–10. 2011 Jun 16 [cited 2017 Aug 3]. http://www.abs.gov.au/AUSSTATS/abs@.nsf/DetailsPage/3412.02009-10?OpenDocument - Eichner M. Analysis of historical data suggests long-lasting protective effects of smallpox vaccination. Am J Epidemiol. 2003;158:717–23. DOIPubMedGoogle Scholar - Mossong J, Hens N, Jit M, Beutels P, Auranen K, Mikolajczyk R, et al. Social contacts and mixing patterns relevant to the spread of infectious diseases. PLoS Med. 2008;5:e74. DOIPubMedGoogle Scholar - Van Kerckhove K, Hens N, Edmunds WJ, Eames KTD. The impact of illness on social networks: implications for transmission and control of influenza. Am J Epidemiol. 2013;178:1655–62. DOIPubMedGoogle Scholar - Del Valle SY, Hyman JM, Chitnis N. Mathematical models of contact patterns between age groups for predicting the spread of infectious diseases. Math Biosci Eng. 2013;10:1475–97. DOIPubMedGoogle Scholar - Mundi I. Historical data graphs per year. 2015 Jun 30 [cited 2017 May 8]. http://www.indexmundi.com/g/g.aspx?v=25&c=as&l=en - Australian Bureau of Statistics. Deaths, year of occurrence, age at death, age-specific death rates, sex, states, territories and Australia. 2017 [cited 2017 May 8]. http://stat.data.abs.gov.au/Index.aspx?Queryid=457 - Kochanek KD, Murphy SL, Xu J, Tejada-Vera B. Deaths: Final Data for 2014. Natl Vital Stat Rep. 2016;65:1–122.PubMedGoogle Scholar - Ren Y, Ordóñez F, Wu S. Optimal resource allocation response to a smallpox outbreak. Comput Ind Eng. 2013;66:325–37. DOIGoogle Scholar - Berhanu A, King DS, Mosier S, Jordan R, Jones KF, Hruby DE, et al. Impact of ST-246® on ACAM2000™ smallpox vaccine reactogenicity, immunogenicity, and protective efficacy in immunodeficient mice. Vaccine. 2010;29:289–303. DOIPubMedGoogle Scholar - Grosenbach DW, Jordan R, Hruby DE. Development of the small-molecule antiviral ST-246 as a smallpox therapeutic. Future Virol. 2011;6:653–71. DOIPubMedGoogle Scholar - Meltzer MI, Atkins CY, Santibanez S, Knust B, Petersen BW, Ervin ED, et al.; Centers for Disease Control and Prevention (CDC). Estimating the future number of cases in the Ebola epidemic—Liberia and Sierra Leone, 2014-2015. MMWR Suppl. 2014;63:1–14.PubMedGoogle Scholar - Guan Y, Zheng BJ, He YQ, Liu XL, Zhuang ZX, Cheung CL, et al. Isolation and characterization of viruses related to the SARS coronavirus from animals in southern China. Science. 2003;302:276–8. DOIPubMedGoogle Scholar - Heymann DL. Smallpox containment updated: considerations for the 21st century. Int J Infect Dis. 2004;8(Suppl 2):S15–20. DOIPubMedGoogle Scholar FiguresCite This Article Table of Contents – Volume 24, Number 4—April 2018 |EID Search Options| |Advanced Article Search – Search articles by author and/or keyword.| |Articles by Country Search – Search articles by the topic country.| |Article Type Search – Search articles by article type and issue.| Please use the form below to submit correspondence to the authors or contact them at the following address: Valentina Costantino, University of New South Wales Faculty of Science, SPHCM, Kensington Gate 9, Sydney, New South Wales 2052, Australia
<urn:uuid:75b833d5-a9b6-475f-b836-6cf6513c75b2>
CC-MAIN-2023-14
https://wwwnc.cdc.gov/eid/article/24/4/17-1233_article
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00158.warc.gz
en
0.894338
7,564
2.8125
3
Atmospheric Diving Suit (JIM Suit) JIM suit in the collection of the U.S. Naval Undersea Museum. An atmospheric diving suit (ADS) maintains surface pressure internally, protecting a diver from underwater pressure and eliminating the need for decompression. Treasure hunters developed early atmospheric diving suits to dive on shipwrecks. Commercial diving and oil drilling industries resurrected ADS in the 1960s. The JIM suit, named for test diver Jim Jarrett, was the first modern-day commercial ADS. It weighed 910 pounds and operated to 1,500 feet. The Navy began using ADS after testing the JIM suit in 1975. - United States Naval Undersea Museum - 1 Garnett Way - United States
<urn:uuid:5b25e727-9306-4a57-a841-2ebdefccf133>
CC-MAIN-2023-14
https://collections.arck-project.org/view/ARCK3D0000000185/atmospheric-diving-suit-jim-suit?q=facet,parents_recursive,equals,10215&q=facet,typology,equals,1&q=filter,record_type,equals,1&offset=9&limit=10
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945182.12/warc/CC-MAIN-20230323163125-20230323193125-00158.warc.gz
en
0.842981
276
2.546875
3
The Virtues of a Biblically Accurate Angel If you’re looking for a Biblically accurate angel, you have come to the right place. In this article, we’ll cover Seraphim, Cherubim, Virtues, and Zadkiel. And we’ll discuss how they relate to God. After that, we’ll look at the history of angels and how these descriptions may differ from modern interpretations. Finally, of course, whether you believe in the existence of angels is a matter of personal opinion. Still, it’s worth knowing if you’d like to know more about them. There are three main types of angels in the Bible: the Seraphim, Cherubim, and Ophanim. While the latter is more significant in Judaism, the former has a middle-ground importance in Christianity. They are described as six-winged creatures that have wings over their heads, feet, and faces. Some sources describe them as being like oxen, lions, or eagles. The word seraph comes from the Hebrew verb sarap, which means “to burn with fire.” In some texts, seraphim can be seen as purification agents. In some interpretations, their proximity to God makes them particularly significant for revelation. They are often the first to hear about events in heaven. Although they are not directly involved in the creation of the universe, they may be present when God sends the angels to earth. Whether or not they exist is another matter. Some believe the seraphim covers their faces and feet to show reverence. Others believe that these angels hide the unclean aspects of their being. Whatever their origins, the presence of these creatures in the Bible is important, as they represent God. However, there are many misconceptions surrounding this concept of angels. For this reason, there is an ongoing debate about whether seraphim are Biblically accurate angels. A closer look at the role of the seraphim in the Bible may also help us understand God’s holiness. Isaiah, for example, is shown the effect of seraphim worship on the world. The Bible says that they “proclaim” God’s holiness and power. There were also earthquakes and smoke during Biblical times to signal the presence of the divine. So, what exactly are these angels doing in our world? The cherubim are the second-highest-ranking angels in Christianity, described in several Bible books. They have four faces and, despite their name, are not all human. They also have the faces of an ox, lion, man, and eagle. According to the Bible, cherubim live in a specific area of heaven that is not subject to the attacks of Iblis or other demons. The cherubim first appear in Ezekiel 1, where they transport the throne of God. Though this name does not call them until the tenth chapter, they are described as having four faces, including one of the lion-like animals, another an ox, and a human face. Some scholars believe that the name ‘cherubim’ refers to a tetramorph and have suggested that cherubs are the same thing. In the Old Testament, angels acted on God’s behalf, and in the New Testament, they served as messengers. The angel Gabriel, for example, told Mary that she was conceived of a child. Still, in the New Testament, angels are mentioned as messengers who perform various duties at God’s request. In the Bible, there are also descriptions of angels called Malakim, who resemble humans but do not have wings. The Cherubim are the second-highest-ranking angels after the Seraphim. They are the senior angels of the other angels, and they serve as God’s helpers and praise providers. While the Seraphim serve as the protectors and guardians of the earth, the Cherubim serve as a visual reminder of the presence of God. If we are to believe the Bible, we must believe the words of God, which are written in the Bible. Biblically accurate angels are those who possess virtues. They are agents of divine perfection and work miracles on earth. Their names are derived from the Latin word vertus, which means “perfect” and translates to excellence and courage. Virtues are not merely traits; they are qualities that angels possess in order to work for God’s will. The following verses describe some of the virtues of biblically accurate angels. The Powers angels are the most powerful and dominate the second triad. They command all the angels to fight the forces of hell and are responsible for overseeing the power of humanity. They are typically depicted holding swords and armor and garlands of flowers. Finally, virtuous angels are the most similar to humans. They help the lower ranks of angels remain organized and complete their work. The Bible describes the role of Biblically Accurate Angels as messengers of God. They often act on God’s behalf, as when the angel of death wiped out the first-born sons of the Egyptians in the Passover story. Similarly, the angel of death was responsible for the deaths of 70,000 Israelites and eighty-five thousand Syrian soldiers in a single night. The virtues of Biblically Accurate Angels are based on the attributes of God-like creatures who are faithful to their benevolence and obedience to His will. As a result, these two classes of angels are ascribed distinct names in the Bible. The first class is the Thrones, while the second class, the Throne angels, are the chief princes of the New Testament. The throne angels were also given the title of archangels. In Judaism, they were called ophanim, “chief” angels. The third class, the throne angels, are rarely mentioned in the Bible but are equal to their counterparts in Judaism. In Colossians, Paul mentions them. If you’re interested in connecting with God and learning more about the angels, Archangel Zadkiel may be perfect. He encourages people to seek God’s mercy and forgiveness and brings divine power to those who seek it. His presence can help people open up to their true self and heal from the past, and his spirit can help them find their true purpose in life. Zadkiel can act as a compass and guide you towards healing when you feel lost and overwhelmed. You can invoke Archangel Zadkiel by performing spiritual work in front of an altar. First, sit or lie on the floor and breathe in and out through your nose. Focus on your breathing and visualize pushing away any negative energy from your body. Once you’ve completed this step, you can ask Zadkiel to grant you a wish. Your wish will come to life when it’s in your best interest. Zadkiel is also known as the angel of memory. By channeling his energy into you, he can improve your memory and help you remember important information. In addition, the angel’s divine power will prevent negative energy and evil from taking hold in your life. If you’re looking for an angel, contact Zadkiel! This mighty angel can help you achieve your goals and fulfill your spiritual destiny. You’ll feel better about yourself and your life once you’ve connected with Zadkiel. While the other angels are known as the heavenly messengers, Zadkiel’s distinctive energy makes him one of the most essential angels in the Bible. His presence can help you achieve your goals and overcome obstacles. Zadkiel’s signature sign helps people renew their minds and focus on positive attitudes. This angel helps the Earth’s population find forgiveness, a step toward spiritual evolution. Zadkiel also leads angels that are associated with the color purple. The term “angels” is often used to describe the superhuman intermediaries between the divine and human realm. Various theological traditions describe angels in varying ways. Most of us are familiar with the angel Gabriel, who is described in the Hebrew scriptures as God’s messenger. In the New Testament, angels serve as messengers, and they are also mentioned in the Koran. The role of angels varies with each tradition, but all share the exact basic definition of an angel. According to the Bible, the archangels are the first angelic order to come into human form. They are primarily responsible for responding to matters of concern to humankind. The biblically-accurate descriptions of these angels have their own names. Listed below are some of the most prominent angels in the Bible. Read on to learn more about these important figures. What is the Dominance of Biblically Accurate Angels?
<urn:uuid:1ec4667b-e496-4dd2-8620-e663d05f1f4c>
CC-MAIN-2023-14
https://webnews21.com/the-virtues-of-a-biblically-accurate-angel/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945182.12/warc/CC-MAIN-20230323163125-20230323193125-00158.warc.gz
en
0.956052
1,840
2.59375
3
It Takes a Village to Raise a Child By Heather Miller, LCSW, Courier & Press, August 15, 2017 – “It takes a village to raise a child.” This African proverb seems to be even more relevant in 2017, with working parents and single parents (and the accompanying family “busyness” that has become the norm) trying to raise a family. And yet, even though it seems that the support of a “village” is so desperately needed, it often seems like this concept has somewhat disappeared from our society. Raising children is a difficult task for which no one is ever completely prepared. There are situations where support from others is not only warranted but also desired by the parent. Often in our individualistic society, offering support to a fellow parent is considered improper and viewed as “stepping on toes.” However, this mindset can lead to lonely, stressed parents, which then leads to stressed children. Often risk factors are examined to explain why some children are more likely than others to “be successful” and overcome challenges. Coupled with risk factors are protective factors, which can help the child take steps toward success. Offering support to a fellow parent does not have to be time-consuming or overly personal. Following are simple ways in which support can be given: - Invite the family to a social function you are planning to attend such as a church event or neighborhood picnic. Such events give adults the ability to connect with one another and form friendships that can lead to additional support. - Offer a kind word and a smile to a parent that has a child having a meltdown at the store, park or other place. An empathetic response and assurance that every parent has experienced a public meltdown by a child is likely to be appreciated. - Focus on the big picture by recognizing that people parent in different ways but the ultimate goal is to raise happy, healthy children. Getting hung up on differences such as appropriate consequences can lead to additional division rather than support. No two parents will likely agree about how to handle every situation involving a child, but accepting that there are numerous ways to parent is important. - If you know the family and feel comfortable, offer to set up a carpool system or swap babysitting services. Thirty minutes of child-free house cleaning can be a huge support to a parent and not overly burdensome for you.
<urn:uuid:98ee4637-f0d3-408b-ba33-e29b0c46e86d>
CC-MAIN-2023-14
https://youthfirstinc.org/takes-village-raise-child/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945182.12/warc/CC-MAIN-20230323163125-20230323193125-00158.warc.gz
en
0.973201
497
2.75
3
Since the beginning of this century both nutrition and orthomolecular medicine, have been extensively researched. Orthomolecular medicine describes the practice of preventing and treating disease by providing the body with optimal amounts of nutritional supplements which are natural to the body. ‘Ortho’ means ‘right’, so ‘orthomolecular’ simply refers to supplying the cells with the right mix of nutrients. Orthomolecular medicine is possibly the branch of alternative medicine that has been the subject of most scientific research. It has certainly been validated by that research Medicine has accepted and documented that the brain is dependent on adequate exercise and suitable nutrition, that certain foods can actually produce mental illness, and that an individual’s state of mental and physical health and quality of diet must be taken into account to achieve optimum mental functioning Orthomolecular research is based strongly on such scientific fields as biochemistry, physiology, psychology, psychiatry, pharmacology and toxicology and was originally brought to the attention of the natural and orthodox medical professions in 1968 by Linus Pauling. Linus Pauling was undoubtedly one of the most distinguished scientists of the 20th Century, with over 400,000 research papers and scientific documents recording his findingsHis research showed that illness and disease, mental and physical, can be helped with corrective nutritional supplementation – vitamins, amino acids, trace minerals, electrolytes, fatty acids and so on (links to more on ortho med / linus pauling) Orthomolecular Medicine In Psychological Therapy Proper functioning of the mind is known to require the presence in the brain of molecules of many different substances. For example, mental illness, often associated with underlying physical illness, can result from a low concentration in the brain of any one of the following vitamins: thiamine (B1), nicotinic acid or nicotinamide (B3), pyridoxine (B6), cyanocobalamin (B12), biotin (H), ascorbic acid (C) and folic acid. For more information please read the article “The Critical Role of Nutrients in Severe Mental Symptoms“.
<urn:uuid:f7f50b88-b42d-410e-9bfa-eec35640f11c>
CC-MAIN-2023-14
https://www.consultinghealth.com/article_72-html/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945292.83/warc/CC-MAIN-20230325002113-20230325032113-00158.warc.gz
en
0.932989
447
2.953125
3
In our endeavour to become more self-aware of our mental health and take care of ourselves, Positive Psychology can work hand in hand with the process of diagnosis and treatment to help make us more resilient and happy people. Positive Psychology is all about focussing on the positive things within our control and our strengths so that we can build a life of meaning and purpose. This is a wonderfully empowering idea. It asks, “What’s already great about you that you can improve on to make you a happier person?” We walk you through the PERMA model of Positive Psychology, an abbrieviation for 5 components we can take ownership of and pay attention to towards happiness. Image by Vonecia Carswell, from Unsplash. Relationships don’t have to be romantic. We have relationships with the people we interact with, including our family, friends, colleagues and community. Positive relationships are ones that make us feel supported, loved and valued by others. This is based on the idea that human beings are inherently social creatures, and that social connections become more important to us as we age. Here are some ways we can build relationships! Image by Mathilde Langevin, from Unsplash. Joining a class or group that interests us A baking class, a book club or a language exchange meet up: the possibilities abound! Besides being able to nurture our interests, we’ll also get to meet other individuals who share these interests. Common interests are a great foundation for building relationships that add value to our lives. This is an accessible and effective way to nurture relationships, new or existing. Doing so allows us to understand the person on the other end better towards finding common ground and appreciating differences. Image by Priscilla Du Preez, from Unsplash. It’s not uncommon to get swept up as we enter different phases of life, such as a new school, focussing on a new interest or new job responsibilities. Getting in touch with people we have not connected with in a while may prove worthwhile as we relive positive memories and revisit shared interests. Thank you to Alexandra, our contributor in the psychology field, for your expertise! To find out more about Positive Psychology, read the other parts of our Positive Psychology series: (Positive Psychology Series: Part 1/6) What is Positive Psychology? Can It Make Me Happy? (Positive Psychology Series: Part 2/6) P for Positive Emotions (Positive Psychology Series: Part 3/6) E for Engagement (Positive Psychology Series: Part 5/6) M for Meaning (Positive Psychology Series: Part 6/6) A for Accomplishments Sherrie is the resident writer, programmer, marketing wizard and snack curator of Co.'s community team. Her favourite things about being at Co. include sharing calories with community members, meeting new friends in the Duxton neighbourhood (and sharing more calories) and getting lost in Littered with Books across the street. Alexandra is a vibrant Mental Wellbeing Psychologist who graduated with BSc (Hons) in Psychology from Michigan State University and a Master’s in Counselling (Distinction) from Monash University. She has more than 10 years of experience, including extensive training in various positive psychology, mental resilience and counseling techniques. Alexandra’s diverse work is driven by her firm belief that humans have far more that can bring them together than should bring them apart.
<urn:uuid:cb304a0a-2e64-4b40-9de5-b8372045e455>
CC-MAIN-2023-14
https://www.jointhe.co/post/positive-psychology-series-part-4-6-r-for-relationships
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945292.83/warc/CC-MAIN-20230325002113-20230325032113-00158.warc.gz
en
0.941688
733
2.71875
3
On New Zealand People and Culture It deserves to be remarked, that the people of New Zealand spoke the language of Otahitee with but very little difference, but so much as is found between many counties in England; a circumstance of the most extraordinary kind, and which must necessarily lead us to conclude, that one of these places was originally peopled from the other, thought they are at near two thousand miles distance, and nothing but ocean intervenes, which we should hardly believe they could navigate so far in canoes, the only vessels that they appear to have ever possessed; for as there is no natural relation between sounds and the ideas they are made to convey by speaking; so it must be evident, that neither the suggestions of reason or of nature, would ever lead two distinct, separate people, having no communication with each other, to affix the same meaning to the same words, and employ them as the medium of communication. It must, therefore, be inferred, that the inhabitants of one of these islands originally migrated from the other, though, upon comparing the manners, dress, arms, *c. of the people of Otahitee with those of New Zealand, as far as they have fallen under our observation, we shall find them disagree in several important particulars, but in several others they have an apparent analogy. The New Zealanders . . . mark their bodies in spiral circles, buy introducing blue paint under the skin after it has been punctured according to the manner of Otahitee; they have likewise beards and long hair, which they tie at the top of the head, like the natives of Otahitee. They differ, however, in complection, being much browner than those of George's Island, though both seem to agree in their propensities to knavery; but in martial courage the New Zealanders are much superior; and indeed it is impossible to see, without astonishment, the degree of madness to which they will elevate themselves even in their harangues, that are preparatory to a feigned battle. Their cloaths are made from the fibres of a species of silk grass, wove by knotting or tying the woof together in lines, commonly about a quarter of an inch different; and are curiously embroidered at the corners and edges with black and brown figures, and fringed with dogs hair; and when worn are tied over the shoulders with strings, and depend below the loins. They likewise wear belts made from a kind of strong grass braided together. Like the people of George's Island, they never boil their meat, but always bake it in subterraneous ovens. Their weapons are the Patty Petow, which is made either of wood, bone or stone and consists of a handle joined to a broad flat two edged blade. The battle axe, which is made from a species of very hard, heavy wood, and has a very long handle. They have likewise wooden spears, with hair tassels near their points, which are sometimes wood, and at others the spear of the sting ray-fish. It is remarkable, however, that, notwithstanding the natives of Otahitee use bows and arrows with great dexterity, those of New Zealand were wholly unacquainted with them, until we first taught them their use; a circumstance which renders it probable that the migration was from New Zealand to George's Island, and that the inhabitants of the latter discovered the use of bows by some accident, after their separation; as it cannot be supposed the New Zealanders would have lost so beneficial an acquisition, if they had ever been acquainted with it. Their trumpets are near two feet in length, having a large broad flat belly or concavity, with a large hole about the middle; these produce a shrill hoarse sound. They commonly wear a small wooden whistle tied about the neck, which is open at both ends, and has two other perforations or holes. Their combs are made from bone or wood, and have very long coarse teeth. Many of them wear an image carved from a greenish stone, made into an odd half human figure, which is tied about the neck. They likewise wear small images of wood or stone, and sometimes the teeth of a deceased relation, which depend from their ears. Their axes and fish-hooks are like those of Otahitee.
<urn:uuid:eaadbcb9-d5b4-4856-b0e8-fc35815b52be>
CC-MAIN-2023-14
http://gallery.lib.umn.edu/exhibits/show/captaincook/young-navigators/on-new-zealand-people-and-cult
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00158.warc.gz
en
0.985539
893
3.09375
3
Foraging and nest relocation forming a bi-directional traffic of outbound and inbound individuals in one-lane organization are two main activities in an ant's life. In this paper, we conducted an experiment on nest relocation of loaded and unloaded ants, moving back and forth between the old nest and the new one. In the experiment, we observed both uni- and bi-directional traffic flow. The headway–speed relationships indicate that the ants showed the same sensitivity to the distance headway in the two types of flow. For bi-directional traffic flow, head-on encounters and giving-way behavior between ants moving in opposing directions were a common occurrence. It took one unloaded ant 2.61 s to solve a head-on encounter with another unloaded ant. Compared with unloaded ants, loaded ants had a lower moving speed, but were less likely to be impacted by a head-on encounter. In the observation region, both sudden stop and head-on encounters contained two phases: deceleration and acceleration. Our analysis indicates that the relaxation time in the deceleration process is less than that in the acceleration process. The reduction of movement efficiency of encountering two discontinuous ants is larger than that when encountering two successive ants (0.18). This is owing to the absence of head-on encounters with following ants. The bi-directional traffic of ants under experimental conditions investigated in this study may inform future studies of high-efficiency movement in collective behavior and traffic systems. An ant colony, containing a few dozen to millions of individuals (Oldroyd, 1968), consists of one or more fertile females called queens, fertile males, workers and soldiers (Oster and Wilson, 1978). Ants show a strong division of labor; for example, workers are responsible for establishing buildings, enlarging their nest, collecting food and larvae. All ants residing in one colony are regarded as a unified entity and support their colony by collectively working (Flannery, 2011). Thus, collective motion is the main pattern in an ant’s life (Hölldobler and Wilson, 1990). In recent years, the collective behavior of ants under emergency conditions has been widely studied (Dias et al., 2013; Haghani and Sarvi, 2017; Wang et al., 2015). Experimental evidence for a ‘faster is slower’ effect comes from an evacuation experiment of ants under stressed conditions (Soria et al., 2012), but jamming and clogging were not observed near the exit (Boari et al., 2013). In the wild, bi-directional traffic of inbound and outbound individuals is formed in ants’ foraging activities (Gravish et al., 2015; John et al., 2004), which differs from that of most animals, whose movements are uni-directional. The formation of a foraging trail benefits from the pheromone that ants deposit it on the ground. This pheromone can attract subsequent ants to follow the trail and ultimately find the food resource, and the final destination of this trip is their nest (Norman and Hughes, 2016; Wilson, 1990). Before workers carry food to the nest, cleared physical trails are built, which can facilitate load transport and increase the rate of foraging efficiency (Bruce et al., 2017). Certainly, it takes time and energy for workers to build and maintain physical trails (Bochynek et al., 2017; Howard, 2001). Thus, wider trails could take workers more time and energy, which decreases foraging efficiency. As in vehicle traffic, some degree of lane segregation in ant traffic spatial organization is observed, i.e. the trails of inbound and outbound ants are not intermingled completely. This is good for reducing the rate of head-on encounters. In some ant traffic, three-lane trails are common, such as in the army ant Eciton burchelli (Couzin and Franks, 2003). Compared with the two-lane organization, three-lane traffic would probably increase flow because there would be fewer head-on encounters (Fourcassié et al., 2010). Moreover, the three-lane organization is useful from a functional point of view as it can protect the loaded ants from being robbed. However, because of width limitation of their trails, such as for arboreal ants traveling on small branches or lianas, or litter ants walking on fallen branches or using structural guidelines (natural cracks, furrows or walls), one-lane organization also occurs in ant trails (Dussutour et al., 2005a). Taking Atta colombica as an example, the inbound and outbound trails show a weak degree of lane separation (Dussutour, 2004). One hypothesis for explaining the intermingled trail is that the high rate of head-on encounters observed in forging trails of A. colombica is beneficial for information exchange and helps outbound workers to find food easily. Furthermore, it is not necessary to take more time and energy to build and enlarge the trail and clear the obstacles in it. Additionally, narrow paths can maintain the pheromone in a high concentration, which can select following ants strongly for foraging. In this way, it contributes to improving foraging efficiency. Alternatively, in one-lane bi-directional traffic, the outbound ants make head-on encounters with loaded ants but not with unloaded inbound ants. These head-on encounters result in the transfer of food between workers and this multistage transport is called ‘bucket brigades’ (Anderson et al., 2002; Lee and Kim, 2017). This suggests that the foraging efficiency is greater with a narrow path than with a wide path (Dussutour et al., 2007). One-lane organization in ant traffic is common. The associated foraging or nest relocation efficiency is higher than that with wide paths in which lane segregation occurs. In bi-directional ant traffic, head-on encounters, as the main pattern for ants moving in opposite directions, play an important role in foraging and nest relocation efficiency. In previous studies (Couzin and Franks, 2003; Dussutour et al., 2004; Schultheiss et al., 2015), the researchers were interested in qualitative analysis of the spatial organization of trails. In this paper, the main goal was to study the bi-directional flow of ants (Camponotus japonicus) in a narrow path quantitatively. We conducted nest relocation experiments and ants were stimulated to emigrate from their nest by changing the environmental conditions (illumination and humidity) and supplying food. MATERIALS AND METHODS Nest relocation experiments were performed on Camponotus japonicus Mayr 1866, a species of black ant native to East Asia, to investigate the collective behavior of ants; 427 worker ants from one colony (without a queen) were collected in Shaanxi Province of China and transported to the laboratory. They were placed in a plaster box with a plastic lid and the wall of the box was painted with Fluon to prevent the ants from escaping. The box was kept at room temperature (24±2°C) under natural light/dark cycles with sufficient water and honey provided. When the experiment started, the ants had been raised in the laboratory for 3 months and the average length of their bodies was 1.03±0.11 cm (mean±s.d.). Fig. 1A shows the arena for the experiments. Two polypropylene boxes of the same size (41 cm long×29 cm wide×23 cm high), with walls coated with Fluon, were used as the new and the old nests. A transparent plastic pipe (100 cm long and 0.8 cm in diameter) connected the two nests from the bottom corners; its width allowed two ants to move side by side. The old nest had no food or water in it and it was placed in a well-lit environment, whereas the new nest was in a comfortable environment (dark and damp surroundings) with an adequate supply of food (honey) and water. Thus, the ants were easily persuaded to move from the old nest to the new one. A digital video camera with a frame rate of 25 frames s−1 placed over the pipe was used to record the experiment. A 20 cm-long area located at the middle of the pipe was selected as the observation region (see Fig. 1B). When the experiment began, we put the whole colony including dead ants into the old nest. Time, speed and distance headway in ant traffic The old nest was in a poor environment, whereas the new nest was suitable for ants to live in. The strong contrast made ants relocate from their old nest to the new one spontaneously. When the ants were introduced into the old nest, they became active and displayed irregular movements within the box. Those near the entrance to the pipe spent less time finding it and arrived at the new nest through this pipe. The first ant entered the observation region 2.23 min after the experiment began. As time elapsed, most ants in the old nest were attracted by pheromones deposited by the pioneer ants and eventually found the new nest as shown in Fig. 2. In order to exchange information with ants in the old nest, ants in the new nest returned to the old one. Thus, outbound and inbound ants encountered each other at some point within the pipe. After a period of time, a stable concentration of pheromone was formed, so that workers began to carry the dead bodies of ants to the new nest through the pipe. The first of these ‘loaded’ ants (see below) appeared in the observation region at 64.28 min. No inbound loaded ant was observed. Because of the division of labor, some ants are just responsible for exploring trails whilst carrying nothing, i.e. they are unloaded ants. In contrast, the main job for others (the loaded ants) is carrying dead bodies from the old nest to the new one in this nest relocation experiment. In the observation region, the free speed of unloaded ants was 2.87±0.76 cm s−1 while that for loaded ants was 2.22±0.43 cm s−1, as displayed in Fig. 3. There was a significant difference in the average free speed of loaded and unloaded ants (t-test: T=8.32, P<0.05). In the process of nest relocation, two interactions were observed among ants: following behavior for homodromous ants (uni-directional traffic) and head-on encounters with ants moving in the opposite direction (bi-directional traffic). Experiments with pedestrians (Cao et al., 2016; Jelić et al., 2012) revealed that speed is dependent on distance headway with several linear relationships. Here, we also investigated the relationship between distance headway and speed. Here, distance headway is defined as the available distance between neighboring ants, i.e. the distance between the head of the following ant and the tail of the preceding one in uni-directional traffic and the distance between the heads of two opposite-moving ants in bi-directional traffic. In uni-directional ant traffic, several ants moving in the same direction passed through the observation region, and the relationship between distance headway and speed is plotted in Fig. 4A. Similarly, the distance headway in bi-directional traffic also affects the speed of ants, as shown in Fig. 4B. However, according to the fitted curve, there are two linear regimes (a strongly constrained regime and a free regime) with different slopes for uni-directional traffic and three linear regimes (a strongly constrained regime, a weakly constrained regime and a free regime) for bi-directional traffic. Comparison of the slope and intercept for uni-directional and bi-directional traffic flow shows that they have the same slopes (0.095, 0.094), while the intercept (0.306) of uni-directional traffic is larger than that of bi-directional traffic (0.0723). In the free regime, the average values of speed were 3.0 and 2.85 cm s−1 for uni-directional and bi-directional traffic, respectively. At 9.73 min, the first inbound ant entered the observation region. Gradually, more and more inbound ants moved in the pipe, which induced more head-on encounters between outbound and inbound ants in the observation region (see Fig. 2). Their trajectories were displayed in Fig. 5. When the ants moving in opposite directions encountered each other, they gave way by shifting to the left or the right side. The trajectories clearly present a wavy form, and a remarkable detour emerged when the ants gave way to those from the opposite direction. Deceleration and acceleration Fig. 6A,C,E,G depicts the temporal–spatial diagram of ant movement in the observation region for one outbound unloaded ant encountering another, inbound unloaded ant, two inbound discontinuous unloaded ants (decreasing speed twice), two inbound successive unloaded ants (just decreasing speed once) and one inbound loaded ant, respectively. Correspondingly, the evolution of speed with position in the observation region is shown in Fig. 6B,D,F,H. In this experiment, we observed that when two unloaded ants encountered each other, their antennae were in contact for a period of time. We hypothesize that the purpose of antennae contact is information exchange. As can be seen from Fig. 6, the head-on encounter of unloaded ants resulted in a decrease of their speed. After opposite-moving ants separated completely, unloaded ants restored their speed rapidly. Fig. 6B,D,F shows that the head-on encounter process consists of three phases: deceleration due to the encounter, stop for information exchange and then acceleration to free speed. In the deceleration phase, unloaded ants decrease their speed from free speed to zero. Correspondingly, during the acceleration phase, the ants regain their speed. In addition, the time spent in the deceleration phase is less than that in the acceleration phase. In this work, we tracked 49 loaded ants, involving 23 encounters with other ants. As shown in Fig. 6G,H, the speed of the outbound loaded ant did not decrease significantly, unlike that of unloaded ants when they make head-on encounters with others. Thus, head-on encounters have less effect on the motion of loaded ants. This may be because loaded ants have a higher mass; therefore, head-on encounters may have less effect on the speed of loaded ants due to inertia. Furthermore, loaded ants utilize their two strong jaws, which are attached to the head below the antennae, when they carry dead bodies (Borror et al., 1989); thus, dead bodies of large size may affect the function of the antennae to some degree. Additionally, the presence of a dead body meant that the process of antennae contact, i.e. information exchange, was not observed clearly. Furthermore, without external interference, loaded ants did not stop suddenly. In the observation region, some ants stopped suddenly without any external interference and then started moving again. Fig. 7B shows the deceleration and acceleration phases for these sudden stops. The results show that τ=0.17 s for the deceleration phase and τ=0.42 s for the acceleration phase. Comparison of the head-on encounter process and sudden stops shows the mean relaxation time of the deceleration phase is similar, but ants took less time to restore their speed from zero in the sudden stop condition. Reduction of movement efficiency In this ant nest relocation experiment, because of division of labor, the first ‘explorer’ worker went into the observed region at 2.23 min and then found the new nest. The first inbound ant appeared in the observation region at 9.73 min. However, the first loaded ant carrying a dead body appeared at 64.28 min, which was regarded as the beginning of nest relocation. Ants are eusocial insects; therefore, when they relocate their nest, the dead bodies of ants are also carried by workers from the old nest to the new one. It took 62.05 min for nest relocation using the accumulated pheromone trail. In a sealed space, this is enough for pheromone accumulation because of its 30–60 min lifetime (Camazine et al., 2003). We assume that, during this period, a stable concentration of pheromone had been formed in the pipe and the safe state of the environment was ensured. Only under these conditions did the ants begin to relocate the nest. The path from the old nest to the new nest was a 1 m long, sealed transparent pipe, which is effective at reducing the evaporation of pheromone. The formation of a foraging or nest relocation trail would be expected to take more time in nature. There are two basic types of traffic in nest relocation experiments: uni- and bi-directional. In these two traffic flows, the adaptation times (Jelić et al., 2012), i.e. the slope of the relationship of headway–speed in a strongly constrained regime, are the same, which means that ants have the same sensitivity to the distance headway not only for the tail of the preceding ant but also for the head of the opposite-moving ant. As interpreted in Cao et al. (2016) and Jelić et al. (2012), the intercept can be seen as a minimal individual space. The intercept in uni-directional traffic is 0.306, which is larger than that in bi-directional traffic (0.0723). The reason is that there is no overtaking behavior for following ants as found in John et al. (2009), and they decreased their speed with the distance headway. However, in bi-directional ant traffic, opposite-moving ants made head-on encounters and passed each other. In this way, when the speed was zero, the distance headway could approximate to zero before the ants gave way to each other. In addition, in bi-directional traffic, there is a weakly constrained regime. It is possible that the antennae of opposite-moving ants impacts their speed. In this work, we recorded three free speeds for unloaded ants: 2.87 cm s−1 in the observation region without following and head-on encounters, and 3 cm s−1 and 2.85 cm s−1 in the free regimes of uni-directional and bi-directional traffic, respectively. It was found that the free speed in uni-directional traffic (following behavior) is the greatest of these. This is because the following ants move with high speed owing to the high concentration pheromone deposited by the preceding one. In contrast, in the other two cases, the concentration of pheromone may be low relatively. Moreover, if the types of outbound pheromone (from the old nest to the new nest) and inbound pheromone (from the new nest to the old nest) are different, this would also result in a discrepancy in free speed. In ant traffic, head-on encounters frequently occur in foraging (Farji-Brener et al., 2010). Similarly, in our experiment, not only head-on encounters but also sudden stops were observed. Sudden stops manifest as single individuals stopping abruptly and quickly without any external interference in the observation region. Both head-on encounters and sudden stops contain phases of deceleration and acceleration. The relaxation time of the deceleration phase is the same for head-on encounters and sudden stops. The reason is that ants are not harmed by collision and a collision avoidance strategy is therefore not required (Moffett, 1987). Furthermore, unlike the behavior of pedestrians, ants have the ability to stop and regain their speed rapidly. In this experiment, the relaxation time of deceleration was 0.16–0.17 s, which means that ants can stop quickly and control themselves effectively. In the acceleration phase, the relaxation time of head-on encounters is larger than that in sudden stops. This may be because in head-on encounters, opposite ants have to share the channel in the initial stage before they accelerate to their former speed, which limits the increase of speed. The relaxation time of deceleration is shorter than that of acceleration for both head-on encounters and sudden stops. The probable reason is that deceleration is a random or sudden procedure, which is mainly determined by the ants’ ability to control their bodies. In contrast, the acceleration phase is arbitrary without any urgency. As plotted in Fig. 3, there was a significant discrepancy in speed of loaded and unloaded ants. The moving speed was influenced by the mass of the load that the ants carried (Burd and Aranwela, 2003) and their body size (Wang and Song, 2016). For some ants, head-on encounters cost them more time than carrying load in foraging. Taking A. colombica as an example, a quantitative analysis showed that the time cost for head-on encounters was twice as that for carrying things (Dussutour et al., 2009). In this experiment, the speed of loaded ants was smaller than that of unloaded ants as displayed in Fig. 3. However, the reduction of movement efficiency of loaded ants was smaller than that of unloaded ants when two opposite-moving ants encountered each other (see Fig. 9). One possible reason is that the higher mass of loaded ants means that their speed is less affected by head-on encounters. Another reason may be that loaded ants take less time for information exchange because of the influence of the dead body. When a loaded ant encountered an unloaded ant, it was observed that the unloaded ant stopped and gave way to the loaded ant (see Fig. 6G,H). This behavior of unloaded ants embodies the social attribute of collective cooperation, which can ensure high movement efficiency in nest relocation traffic. Compared with bi-directional pedestrian and vehicle traffic, an ant with weak sight would not decelerate on the basis of vision as pedestrians or drivers would. Ants stop rapidly when they perceive the presence of others through their antennae. In the pedestrian experiment, when a interferer (pedestrian or obstacle) appeared in the planned route, the pedestrian adjusted their speed and direction to avoid collision (without physical contact) (Ma et al., 2010; Moussaïd et al., 2009). However, in ant bi-directional traffic, head-on encounters between opposite-moving ants are a common occurrence for information exchange, which takes ants 2.61 s. Thus, the decrease in speed due to the limits of space and time on information exchange lead to a reduction of movement efficiency. From this point of view, the pedestrian motion has higher efficiency than ant in bi-directional traffic. In the observation region, one ant may meet one or more opposite-moving ants. The reduction of movement efficiency was 0.71 and 0.53 when one unloaded ant encountered two discontinuous ants and two successive ants, respectively. The reason for this smaller reduction of movement efficiency for encountering two successive ants is that the ant just decreased speed once and made a head-on encounter with the leader of the two successive ants, as the subsequent ant followed the leader one closely. In ant traffic, the following phenomenon is common, and it is beneficial to improving movement efficiency because of the attraction of the pheromone. In addition, the following ants can avoid head-on encounters with opposite-moving ants which gave way to them in bi-directional traffic. Thus, the following behavior for successive ants can improve movement efficiency in bi-direction traffic. Like workers of the black garden ant Lasius niger, they can maintain a high foraging efficiency in a narrow path with alternating clusters of inbound and outbound ants (Dussutour et al., 2005b). Furthermore, in the control experiment with pedestrians, the same phenomenon that clusters of pedestrians rather than single individuals passed the bottleneck from one side to the other was observed. After a period of time, pedestrians from the other side had a chance to pass this bottleneck (Helbing et al., 2005). Analogous to pedestrian or vehicle traffic in daily life, in some places, because of limitations of the environment, there are parts of the road that only one vehicle or pedestrian can pass at a time. In this case, the best way to enhance transportation efficiency is by giving way to opposite-moving vehicles or pedestrians at a particular time, and then exchange. This embodies the importance of cooperation. Conceptualization: W.S.; Methodology: Q.W.; Software: Q.W.; Formal analysis: Q.W.; Investigation: Q.W.; Resources: Q.W.; Data curation: Q.W.; Writing - original draft: Q.W.; Writing - review & editing: J.Z., W.S., S.L.; Visualization: J.Z.; Supervision: W.S., S.L.; Project administration: W.S. This research was supported by Key Research and Development Program of China (2016YFC0802508), and Fundamental Research Funds for the Central Universities (WK2320000035). The authors declare no competing or financial interests.
<urn:uuid:85a87e11-be42-4e79-b517-0e7b4555a357>
CC-MAIN-2023-14
https://cob.silverchair.com/jeb/article/221/18/jeb181669/19462/Bi-directional-movement-characteristics-of
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00158.warc.gz
en
0.949116
5,283
3.34375
3
Resources for Teachers - Television This lesson introduces students to the theory behind television ratings and encourages them to explore the commercial pressures driving the medium. This lesson is part of a unit that explores news journalism across the media. “Television Newscasts” helps students develop a critical awareness of how television news is shaped and manipulated and how they, as audience members may be affected by this. Teachers who include media literacy in their classrooms often face issues that don’t arise in other subjects. Nothing illustrates this better than the issue of diversity in media. It’s not unreasonable for teachers to see the topic as a can of worms and be concerned about offending students and their parents – not to mention worrying about what the students themselves might say. At the same time, it’s a topic that is simply too important to be ignored: what we see in media hugely influences how we see others, ourselves and the world. As a result, an ability to analyze media depictions of diversity is not only a key element of being media literate, it’s essential to understanding many of the social issues and concerns that we face as citizens. That’s why Media Awareness Network has developed That’s Not Me – a new online tutorial for professional development to help educators and community leaders approach this issue through key concepts of media literacy. In this lesson, students identify the differences between TV families and real families by analyzing the conventions used by TV shows; and by comparing the problems and actions of television families to real world families.
<urn:uuid:26d7c429-ebac-4ec8-be35-af50b95ecc4d>
CC-MAIN-2023-14
https://mediasmarts.ca/television/resources-teachers-television?page=7
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00158.warc.gz
en
0.951643
315
4.15625
4
University of New Mexico researchers who combed through a "library" of previously approved drugs believe they have identified a medication with the potential to help speed a patient's recovery from SARS-CoV-2 infection. "The gist of it is we think we found a drug that is on par with remdesivir and is much cheaper," said Tudor Oprea, MD, Ph.D., professor of Medicine and Pharmaceutical Sciences and chief of the UNM Division of Translational Informatics. Remdesivir is a relatively new antiviral medication that has been shown to shorten hospital stays for those recovering from the novel coronavirus. In a paper published this week in ACS Pharmacology & Translational Science, Oprea and his colleagues, in partnership with a team at the University of Tennessee Health Science Center led by professor Colleen Jonsson, Ph.D., reported that an older antimalarial drug called amodiaquine was effective in eradicating the virus in test-tube experiments. Tudor Oprea, MD, PhD, was one of three promising candidates identified in a process that entailed studying the molecular characteristics of about 4,000 drugs approved for human use by the Food and Drug Administration and other agencies. The researchers hoped to find drugs that would target known vulnerabilities in the virus. The other two drugs - an anti-psychotic called zuclophentixol and a blood pressure medication called nebivolol also cleared the virus in the experiments, said Oprea, who served as the corresponding author on the new paper. The researchers think any of these three drugs could be combined with remdesivir or a related antiviral drug called favipiravir to mount a more potent attack on the virus. Combining two drugs could mean that lower doses of each could be administered, lessening the likelihood of adverse reactions, he said.s Administering two drugs also makes it less likely that the virus would develop a mutation rendering it immune from the treatment. "Think of it as a whack-a-mole game," Oprea said. "Instead of having one hammer, you have two hammers, which is more effective. We're trying to give the scientific community two hammers instead of one." Many compounds that show antiviral activity in a laboratory setting don't have the same effect in living organisms, Oprea notes, so the next step is to mount clinical trials to see whether the medications work in COVID-positive patients. The UNM drug screening process started with Oprea and his colleague Larry Sklar, Ph.D., Distinguished Professor in the Department of Pathology. They used computational methods to identify candidate drugs by gauging their similarity to hydroxychloroquine, a since-discredited antimalarial medication that had been widely touted as a COVID-19 treatment. Because of molecular variations in some of the drugs, more than 6,000 combinations were assessed. Likely candidates were forwarded to Steven Bradfute, Ph.D., assistant professor in the Center for Global Health, who tested the compounds against samples of the virus in his Biosafety Level-3 laboratory. Later, the experiments were repeated by the University of Tennessee scientists to provide independent confirmation of the findings - and they used an additional test that reveals the drugs' potency against the virus, Oprea said. Amodiaquine, first made in 1948, is on the World Health Organization's List of Essential Medicines. It has a good safety profile and is widely used in Africa to treat malaria. Zuclophentixol has been used to treat schizophrenia since the 1970s, while nebivolol has been used for hypertension since the late 1990s.
<urn:uuid:386e244c-cbcc-4070-9ba1-1a25e2fc90e7>
CC-MAIN-2023-14
https://reachmd.com/news/drug-repurposing-unm-researchers-find-existing-medications-may-fight-coronavirus-infection/1705762/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00158.warc.gz
en
0.96574
775
2.765625
3
Project 4: Memory Allocator This project focuses on one of the major themes of Machine Organization and Programming classes taught for many years at Universities all over the world and has gained a reputation for being a challenging project. The hard part of this project for most students is understanding how memory allocators work. The code required to complete the project doesnt have to be long but it can be a little tricky. We strongly recommend making sure you are caught up on lecture and have studied section 9.9 to 9.9.6 of the CSAPP book before beginning. The memory allocator we will develop for this project is very similar to the implicit free list model from the lecture and the book. However, we use a struct as the block header to store the size, allocated bit, and some extra information that we can use to analyze performance. All of the performance analysis has been done for you in the Mem_Dump function. Corrections and Additions None yet. The purpose of this project is to help you understand the nuances of building a memory allocator and further increase your C programming skills by working more with pointers. Memory Allocator Specifications for the Project • Header size is 8 bytes as BLOCK_HEADER struct (see below) • Minimum block size = 16 (block size is header size + payload size + padding size) • Block sizes must be multiples of 16. • Pointers returned to users must be addresses that are divisible by 16. • Headers are located 8 bytes before user pointers • Use the First Fit model to allocate blocks. • Use Immediate Coalescing for both blocks after and blocks before the one being freed. • Your mem_functions.c file may not contain the word -malloc-, even in comments. • The project is divided across four files o a template file mem_functions.c where you will do your work to implement Mem_Alloc and Mem_Free. o mem.h the header file with the BLOCK_HEADER struct definition and all function prototypes o mem_init.c contains code provided to you for initializing the heap and setting up the first and last headers as well as the Mem_Dump function which prints out the contents of the heap. o Several sample drivers that call the memory allocator functions for testing. • mem.h Download mem.h • mem_init.c Download mem_init.c • mem_functions_template.c Download mem_functions_template.c(rename this to mem_functions.c) • driver_alloc_8.c Download driver_alloc_8.c • driver_alloc_1.c Download driver_alloc_1.c • driver_alloc_1_24.c Download driver_alloc_1_24.c • driver_alloc_8_free.c Download driver_alloc_8_free.c • driver_free.c Download driver_free.c Compiling and Running the code Download and move all of the files to the CSL machines. You will need three .c files when you compile every time to link together all of the pieces: mem_init, mem_functions, and one of the drivers. Test your code with the driver files in the order listed above. The first three only require Mem_Alloc and the last two require both functions. gcc -g mem_init.c mem_functions.c driver_alloc_8.c -Wall ./a.out Please find the declaration for BLOCK_HEADER in mem.h. The block headers struct contain three pieces of data, packed into two variables. Extracting the information from this struct can be a little tricky. I recommend writing helper functions so you only need to get this right once and can reuse this code. The first data member is int size_alloc. Size_alloc contains the total block size, which must be divisible by 16. That means the last four bits will always be zero, which allows us to borrow one of those bits (the least significant bit) to store the allocated bit. This works the same way as in the lecture and the textbook. Were also storing a second int payload. This is the exact amount of bytes requested by the user. Memory allocators use meta information stored in the heap to find and free blocks. Were using this extra payload data to compute how efficiently our memory allocator manages the heap. For free blocks the payload contains the total bytes available to be allocated in this block. Mem_Alloc and Mem_Free Write the code to implement Mem_Alloc() and Mem_Free(). Use the first fit algorithm when allocating blocks with Mem_Alloc(). When freeing memory, always coalesce both adjacent memory blocks if they are free. void *Mem_Alloc(int size); Mem_Alloc() is similar to the library function malloc(). Mem_Alloc() takes as an input parameter the size in bytes of the memory space to be allocated, and it returns a pointer to the start of that memory space (i.e, this means, a pointer to the start of the first useful byte, after the header). The function returns NULL if there is not enough contiguous free space to satisfy this request. Mem_Alloc() is required to return a memory address aligned to 16-byte data. This means that the address returned to the user should be divisible by 16. Once the appropriate free block is located, we could use the entire block for the allocation. However, the disadvantage is that it causes internal fragmentation and wastes space. So, if possible, we will split the block in two. The first part becomes the allocated block, and the remainder becomes a new free block. Before splitting the block, verify that there is enough space left over for a new free block, i.e. 16 bytes; otherwise, do not split the block. The payload variable of the BLOCK_HEADER stores the exact size requested by the user. Note that this is different than the allocator blocks we saw in the lecture. We use this to analyze memory usage. int Mem_Free(void *ptr): Mem_Free() frees the memory object that ptr points to. First, traverse the list of blocks to verify that the pointer could have been allocated with Mem_Alloc. If the pointer could not have been allocated with Mem_Alloc, return -1. Then free the block. For the block being freed, always coalesce with its adjacent blocks if either or both of them are free. Return 0 upon success. Mem_Init() This function is provided for you and creates sets up the heap. Study this function to see how the BLOCK_HEADERS are created and used. Mem_Dump() This function prints a table of all blocks in the heap managed by our memory allocator. Study this code for more clues about accessing the data. If you see an infinite loop when the table is printed - edit this function to break out of the loop after the first few lines are printed. Test the Code We are providing a limited test suite of drivers for this project. Please write more drivers to completely test your code. Make sure you test allocations that are too big, almost too big, small enough to require splitting, big enough to require not splitting, and coalescing before, after, and both. The Infinite Loop The number one mistake you are most likely to see is an infinite loop that manifests during when the Mem_Dump is called. This function prints out the status of the heap. The blocks in our memory allocator work like a linked list and if there is an error finding the next block you may visit the first block over and over again. If you see Mem_Dump printing in an infinite loop - edit the function to break out of the loop when the variable ID is greater than a small number (like 5). That will allow you to see the first few lines of the table which will help you identify your error. 1. Invest the time to understand the BLOCK_HEADER struct and the data that it stores. 2. BLOCK_HEADER vs BLOCK_HEADER* vs void*. 1. Remember the C treats all pointers as the base address of an array of that type. 2. So if you have a pointer to a BLOCK_HEADER, it treats this as an array of BLOCK_HEADERS 3. means that C will “help” you with your arithmetic and include the size of the header for you. 4. new_header = header + 16 will result in new_header containing an address that is 128 bytes larger – not 16 bytes larger 5. To get around this use casting. To do the arithmetic yourself without the compiler “helping” cast all pointer addresses to (unsigned long) before doing math and then cast them back to (BLOCK_HEADER *) when finished. 6. Check out the examples in Mem_Init and Mem_Dump 3. Write helper functions so you only need to get the hard stuff correct once. Here are some suggested function names: 4. Mem_Init() and Mem_Dump() are provided for you. There are significant clues as to how to work with the headers within these functions. One of the first things you should do is study these functions to see how they access the data. • Upload your mem_functions.c file to Canvas
<urn:uuid:caac0f23-c2d2-47fc-986e-5d441ccb57dc>
CC-MAIN-2023-14
https://www.australianbesttutors.com/recent_question/71837/project-4-memory-allocatorthis-project-focuses-on-one
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00158.warc.gz
en
0.883862
2,047
2.65625
3
Falls are the number one cause of fatal accidents in construction, with these deaths accounting for 36.9 percent of construction fatalities in 2013. Many of these deaths occur in residential construction, and beginning in 2010, OSHA began enforcing its fall protection standard for all residential construction sites, not just commercial construction sites (see 29 CFR 1926.501(b)(13)). To assist residential construction companies in achieving compliance with this standard, OSHA has published helpful guidance documents. To further educate contractors and their workers, a new website produced by researchers at Washington University in St. Louis and supported by the Center for Construction Research and Training (CPWR) and the National Institute for Occupational Safety and Health (NIOSH) catalogs fall protection for residential construction. The website, called Fall Protection Equipment Resource for New Home Construction, provides two methods for looking at fall protection options: type of fall protection and phase of construction. If, for example, workers know they will be working with scaffolds, they can go right to the scaffolds section of the site and learn about the different types of scaffolds. Information provided includes when each type of scaffold would be used during a construction project, how to install it and links to manuals, vendors and even informational videos. Plenty of photos are provided so website visitors can see the differences between each type of fall protection. Instead, if users want to research what kind of fall protection might be needed during a particular phase of construction, they can explore the website that way. For example, if someone selects the phase of construction about installing windows and doors, the catalogue will provide links to over 70 types of equipment that might be used. A contractor could use this function to evaluate options for fall protection at a worksite, while construction workers could learn more about the specific devices they’ve been assigned to use at work. Overall, the site covers many types of fall protection including personal fall arrest systems, guardrails, hole covers, safety nets, scaffolds, lifts and ladders. It also includes products from a variety of manufacturers so users can explore potential fall protection options (although the site notes that the researchers do not specifically endorse any of these products). The Fall Protection Equipment Resource for Home Construction website takes fall protection and breaks it down into pieces to help people understand the equipment they need for their jobs. It could prove useful for workers, but perhaps also for business decision makers who want to explore the options they can use to achieve OSHA compliance. Visit the site to see if it could help you or your workers. Interested in learning more about personal fall arrest systems? Read How to Use a Personal Fall Arrest System or take a look at the infographic below. - Fall Protection in the Workplace: OSHA’s Guidelines– creativesafetysupply.com - Workers Still Ignoring Fall Protection– safetyblognews.com - An Employer’s Introduction to Fall Protection for Residential Construction Projects– blog.creativesafetysupply.com - Construction Fall Safety Stand-Down – Pt 1– creativesafetypublishing.com - How to Use a Personal Fall Arrest System– realsafety.org - What is PPE? – 10 Ways to Protect Workers– blog.labeltac.com
<urn:uuid:05248d3f-7ee4-45a2-8b5f-f6010b99e9cd>
CC-MAIN-2023-14
https://www.babelplex.com/new-fall-protection-website-for-residential-construction-workers/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00158.warc.gz
en
0.910062
672
2.578125
3
Are you looking for activities and ideas for interactive read alouds? Look no further! Whether you’re a first year teacher or a veteran, I have quick, easy activities to make your interactive read alouds more engaging and fun for your students and for you while still teaching the standards? Why Interactive Read Alouds? More like, “Why NOT?” Am I right? Interactive read alouds do much for your students even if they are not the ones who are reading aloud. A little counterintuitive? Take a look at some of these blog posts about why you NEED to use interactive read alouds in your instruction. - Why Interactive Read Alouds Fail - Why You Should be Doing Interactive Read Alouds - At What Age Should Interactive Read Alouds STOP? Looking for Books to Read? Here are some lists for a variety of subjects and celebrations to help you find the perfect book for any occasion. I provide ideas for interactive read alouds for each book in the list! - Back to School - Veterans Day/Memorial Day - September 11th / Patriots’s Day - Hispanic Heritage Month Biographies - Hispanic Heritage Month Fiction - Black History Month – February - Presidents’s Day - Women’s History Month – March - Earth Day - Growth Mindset - Character Education / SEL Make Your Interactive Read Alouds Better We can always find ways to improve. I’ve tried a lot of things in my interactive read alouds. I’ve had a lot of success and also made a lot of mistakes. Learn from my mistakes and get some ideas for interactive read alouds that you can start implementing in a pinch! Planning Interactive Read Alouds - How to Plan Interactive Read Alouds Part 1 - How to Plan Interactive Read Alouds Part 2 - Using Google to Improve Interactive Read Alouds Student Discussion and Discourse - 3 Way to Get Your Students Talking - Ways to Get Your Quiet Students to Participate - Measuring Student Discussion - Increasing Student Talk - Improving Discussion Quality - Decreasing Teacher Talk I hope this gives you some ideas for interactive read alouds to really make yours better! There’s always time for a read aloud and there’s a book for every occasion. I hope this helps you turn reading into a celebration in your classroom!
<urn:uuid:cc9802dc-2537-41a5-9076-ed4f75b135e6>
CC-MAIN-2023-14
https://www.picturebookbrain.com/ideas-for-interactive-read-alouds/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00158.warc.gz
en
0.877933
520
2.859375
3
According to the Bulletin’s statement, the decision does not suggest that the situation has stabilized: “On the contrary, the Clock remains the closest it has ever been to civilization-ending apocalypse because the world remains stuck in an extremely dangerous moment.” “The Doomsday Clock is holding steady, but steady is not good news,” said Sharon Squassoni, professor at George Washington University and co-chair of the Bulletin board that sets the clock. “We are stuck in a perilous moment—one that brings neither stability nor security. Positive developments in 2021 failed to counteract negative, long-term trends.” In their decision, the Bulletin cited disinformation, global security threats including ‘nuclear saber rattling,’ lack of actionable climate policies, disruptive technology and insufficient worldwide COVID-19 response. The Bulletin of the Atomic Scientists was created 77 years ago by a group of concerned Manhattan Project scientists, many based at the University of Chicago, shortly after the atomic bombings of Hiroshima and Nagasaki. Two years later, in 1947, artist and Bulletin member Martyl Langsdorf created the iconic Doomsday Clock to signal how close humanity was to self-destruction. Today, the Doomsday Clock is located at the Bulletin offices in the Keller Center, home to the University of Chicago Harris School of Public Policy. Though it was first created in response to nuclear weapons, the clock reckoning now includes climate change and “disruptive technologies,” such as bio- and cybersecurity. However, the Bulletin has always emphasized that the clock is not intended to make people fearful, but rather to spur them to action. The full statement lists a number of actions needed to make the world safer, and urges people to press their governments for action. “There is no more time to waste,” said board member and University of Oxford Prof. Raymond Pierrehumbert. The full 2022 statement is here.
<urn:uuid:c27e3fc2-42ad-4f8a-a3ab-2c0a621bed51>
CC-MAIN-2023-14
https://news.uchicago.edu/story/doomsday-clock-remains-100-seconds-midnight-closest-ever-apocalypse
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948900.50/warc/CC-MAIN-20230328232645-20230329022645-00158.warc.gz
en
0.952305
398
2.796875
3
HyperNAV Hyperspectral Radiometer As remote sensing satellites orbit Earth, Sea-Bird Scientific and NASA are developing a tool to drift with ocean currents. The HyperNav, a combination of hyperspectral radiometers and a Navis profiling float, provides in-situ calibration and verification for ocean color satellites. Unlike fixed location radiometers, the HyperNav travels through optically diverse environments allowing for greater matchups with satellite measurements. HyperNav, an amalgam of “hyperspectral radiometers” and “Navis profiling float,” is a tool in development by Sea-Bird Scientific in partnership with NASA to calibrate and verify the next generation of ocean color satellites. The idea is straightforward—a high-resolution hyperspectral radiometer installed on a Navis profiling float provides an autonomous, in-situ drifting radiometer to ground truth remote-sensing satellites as they orbit the earth. As the HyperNav drifts with the current, it travels through optically diverse environments. Unlike standard moored radiometers, which are fixed in a single location, the HyperNav provides measurements from optically diverse environments for correlation with ocean color data from satellites. This provides more robust calibration data for satellite verification. Of course, a profiling float also provides a robust sensor platform capable of housing more than a radiometer; along for the ride is the typical Sea-Bird CTD package and biogeochemical sensors for comprehensive data collection. Sea-Bird has tested the HyperNav in various conditions and locations, including The Marine Optical BuoY (MOBY) off the Hawaiian island of Lanai for comparison to another in-situ radiometer designed for satellite calibration. Watch the HyperNAV Hyperspectral Radiometer Development video. What is the UN Ocean Decade? Did you get a chance to read about the HyperNAV program that we support in partnership with NASA? Sea-Bird Scientific is proud to be part of the NASA PACE Mission, which contributes to the UN Ocean Decade's 7 Outcomes. On December 5, 2017, the United Nations declared... World Oceans Week at Sea-Bird Scientific: The HyperNAV Program A New Paradigm for Ocean Color Satellite Calibration The HyperNAV program is part of the NASA PACE (Plankton, Aerosol, Cloud, Ocean Ecosystem) Mission, set to launch in 2024. The NASA PACE Mission is an initiative aimed at helping scientists understand how carbon... Pride Month 2022 Celebrating and honoring our LGBTQIA+ communities At Sea-Bird Scientific, we are proud to stand with members of the LGBTQIA+ community during Pride Month 2022. This year, you may have noticed we changed our logo on social media to feature a rainbow throughout the...
<urn:uuid:563f4b5f-e8de-4b4e-8d48-cd5c798b2da3>
CC-MAIN-2023-14
https://blog.seabird.com/hypernav-hyperspectral-radiometer/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00158.warc.gz
en
0.834712
579
2.515625
3
In this article, you will learn what data leakage is and how to avoid it. If you don’t know how to prevent it, leaks will frequently occur and ruin your models in subtle and dangerous ways. It is, therefore, one of the most important concepts for all machine learning practitioners. What is Data Leakage? Data leakage generally occurs when our training data is fed with the information about the target, but similar data is available when the model is used in predictions. This leads to high performance on the drive assembly, but the model will perform poorly in production. In simple words, data leakage makes a machine learning model look very precise until you start making predictions with the model and then the model becomes very inaccurate. Data Leakage is of two types: target leakage and train-test contamination. A target leak occurs when your predictors include data that will not be available at the time you make the predictions. It’s important to think of the target leak in terms of the timing or chronological order of data availability, and not just whether a feature makes good predictions. A different type of leak occurs when you are not careful to distinguish training data from validation data. Validation is meant to be a measure of how well the model performs on data it has not previously considered. You can subtly corrupt this process if the validation data affects preprocessing behaviour. This is referred to as train-test contamination. Data Leakage in Action Here you will learn one way to detect and remove target leaks. I will use credit card apps dataset and ignore the master data setup code. The result is that the information about each credit card application is stored in an X DataFrame. I will use it to predict which applications have been accepted in a y series. You can download the dataset from here: import pandas as pd # Read the data data = pd.read_csv('AER_credit_card_data.csv', true_values = ['yes'], false_values = ['no']) # Select target y = data.card # Select predictors X = data.drop(['card'], axis=1) print("Number of rows in the dataset:", X.shape) X.head()Code language: PHP (php) Number of rows in the dataset: 1319 reports age income share expenditure owner selfemp dependents months majorcards active 0 0 37.66667 4.5200 0.033270 124.983300 True False 3 54 1 12 1 0 33.25000 2.4200 0.005217 9.854167 False False 3 34 1 13 2 0 33.66667 4.5000 0.004156 15.000000 True False 4 58 1 5 3 0 30.50000 2.5400 0.065214 137.869200 False False 0 25 1 7 4 0 32.16667 9.7867 0.067051 546.503300 True False 2 64 1 5 Since this is a small dataset, I will use cross-validation to ensure accurate measures of model quality: from sklearn.pipeline import make_pipeline from sklearn.ensemble import RandomForestClassifier from sklearn.model_selection import cross_val_score # Since there is no preprocessing, we don't need a pipeline (used anyway as best practice!) my_pipeline = make_pipeline(RandomForestClassifier(n_estimators=100)) cv_scores = cross_val_score(my_pipeline, X, y, cv=5, scoring='accuracy') print("Cross-validation accuracy: %f" % cv_scores.mean())Code language: PHP (php) Cross-validation accuracy: 0.979525 With experience, you will find that it is very rare to find accurate models for 98% of the time. It does happen, but it’s quite rare that we have to inspect the data more closely to detect any target leaks. Here is a summary of the data, that you will observe: card: 1 if credit card application accepted, 0 if not reports: Number of major derogatory reports age: Age n years plus twelfths of a year income: Yearly income (divided by 10,000) share: Ratio of monthly credit card expenditure to yearly income expenditure: Average monthly credit card expenditure owner: 1 if owns home, 0 if rents selfempl: 1 if self-employed, 0 if not dependents: 1 + number of dependents months: Months living at current address majorcards: Number of major credit cards held active: Number of active credit accounts Some variables seem suspicious. For example, does an expense mean an expense on this card or cards used before the application? At this point, baseline data comparisons can be very helpful: expenditures_cardholders = X.expenditure[y] expenditures_noncardholders = X.expenditure[~y] print('Fraction of those who did not receive a card and had no expenditures: %.2f' %((expenditures_noncardholders == 0).mean())) print('Fraction of those who received a card and had no expenditures: %.2f' %(( expenditures_cardholders == 0).mean()))Code language: PHP (php) Fraction of those who did not receive a card and had no expenditures: 1.00 Fraction of those who received a card and had no expenditures: 0.02 As noted above, all of those who did not receive a card had no spending, while only 2% of those who received a card had no spending. It is not surprising that our model appears to have high accuracy. But it also appears to be a case of goal leakage, where spending likely means spending on the card they requested. Since the share is partly determined by expenditure, it should also be excluded. The active and major variables are a little less clear, but from the description, they look worrisome. In most of the situations, it’s better to play safe than sorry if you can’t track down the people who created the data to find out more. I will run a model with no target leak as follows: # Drop leaky predictors from dataset potential_leaks = ['expenditure', 'share', 'active', 'majorcards'] X2 = X.drop(potential_leaks, axis=1) # Evaluate the model with leaky predictors removed cv_scores = cross_val_score(my_pipeline, X2, y, cv=5, scoring='accuracy') print("Cross-val accuracy: %f" % cv_scores.mean())Code language: PHP (php) Cross-val accuracy: 0.830924 This accuracy is a bit lower, which can be disappointing. However, we can expect it to be correct about 80% of the time when used on new applications when the leaky model would likely do a lot worse than that. Also, Read – XGBoost Algorithm in Machine Learning. Data Leakage can be a million-dollar mistake in many Machine Learning tasks. I hope you liked this article on how to handle data leakage in machine learning tasks. Feel free to ask your valuable questions in the comments section below. You can also follow me on Medium to learn every topic of Machine Learning. Hi! First of all, great article! Can you give me an example of train-test contamination? Also, every time we have to look for data leakage after the accuracy score? Thank you very much and keep going! Sure, You will get it soon.
<urn:uuid:2dcc64f6-77da-4afb-b881-6417cd4e7d75>
CC-MAIN-2023-14
https://thecleverprogrammer.com/2020/09/05/data-leakage-in-machine-learning/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00158.warc.gz
en
0.908708
1,630
3
3
How secure are your passwords? Maybe you think they are good enough, or you don’t see any reason someone would try to hack little ole you. Yet, in this modern society everything has basically turned over to digital. We live in a world of computer code, and things like access to our bank account and our identity are guarded by a few characters punched in on a keyboard. The least we can do to keep ourselves safe is to try to make those keys as secure as possible. So, what can we can we do to keep our passwords secure? - Create a strong password - Use different passwords for different accounts - Change passwords regularly - Password managers - Don’t share your password and disable auto-complete. Create a Strong Password So you think that your password is strong? A lot of people probably do, and unfortunately, a lot of them are probably wrong. You could put it to the test. Though I don’t recommend putting your password in random places to test it, there are some trusted websites you could use to test your password making abilities. Though you probably shouldn’t use any real passwords that you are currently using. To create as secure of a password as possible, there are some thing that you probably should do, and some things you should not. It’s recommend that your passwords do not contain words that can be found in the dictionary. Which might seem like a bit of an oxymoron, but you should be able to work around it. You could $pe11 l!k3 th1s, or create an anagrams or memory aids, or just use words that only you will know. Your passwords should not be in a certain sequence or have repeated characters. Your password should not contain any documented details about you, like social security or phone numbers, passports, drivers license, birthdays or family member’s names. If I just excluded everything you think your capable of remembering, don’t worry, we have some suggestions for that later on. What you should do, is try to include 12-16 character, but 8 at the very least. You should also use at least one letter and at least one symbol, and preferably at least one capital letter and a space if the website allows. The idea is to create a code that someone is not going to be able to easily guess. Use Different Passwords For Different Accounts I know you want to be able to remember your passwords. It’s a pain having to go and re-set your password every time you need to log in, especially for websites that lock you out for a designated amount of time. But using the same password for every account sets you up for vulnerability. You don’t want someone gaining access to your credit cards or checking account because they were able to get into your Instagram. You may think that this is something that is never going to happen to you, but there are numerous kinds of hackers who can be different levels of nefarious. You’re information is valuable for all kinds of reasons, even information that you may think is harmless. So you should try to make each password as unique as possible, and defiantly don’t use words or phrases that are common, or used often among certain groups. Change Passwords Regularly I know, another pain. How will you ever remember them all if they are constantly changing? But the longer you use the same password for, the more vulnerable it becomes. Changing passwords on the regular adds another level of security to keep your data safe. Which brings us to point four. The one downside to password managers is pretty obvious, that if someone hacks into the password manager, they may get access to all the passwords. This though, seems to be a pretty rare occurrence, and honestly, you are probably taking less risk with a password manager than you would be by not following the other suggestions in this article. If you can actually remember all those secure passwords and change them regularly without forgetting, then by all means have at it! But password managers are quite safe. There is a reason that they have become fairly popular. It’s a great low-risk way to have a plethora of secure passwords, without having to struggle to remember them all the time. You just have to remember the master password for the password manager. Some multi service platforms even seem to be offering their own built in password managers now. And some have taken security a step further, by just asking for a code it sent to your phone when you sign in. Don’t Share Your Password And Disable Auto-Complete It should go without saying, but keep in mind that you should never share your password with any one, even if it seems fairly harmless. Think about this, you share a password with a trusted friend by text message, but what if someone else somehow gets access to that text message? If you use the same password for everything, you put yourself at risk. You should also disable the auto complete and password memory in your web pages, especially if you share your computer with others. While the danger of being hacked is always there, and you should hire professional cyber security folks for your business to keep it safe and protected, doing at least these 5 things should help protect your accounts password to some degree.
<urn:uuid:5ebab13e-05e7-4af5-9a49-d887a443698d>
CC-MAIN-2023-14
https://flocksy.com/resources/how-to-have-secure-passwords/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950363.89/warc/CC-MAIN-20230401221921-20230402011921-00158.warc.gz
en
0.964665
1,099
3.171875
3
Determining the exact value of a 1952 penny can be a difficult task, as it is dependent on a variety of factors such as initial mintage number, coin grade, and demand. Understanding the different values of cents is essential when making purchases or receiving payment. In this article, we will explore the value of 1952 pennies. 1. 1952 d penny - Value: $0.85 – $2.28 - Grade: MS 63RB - Sold: $5.00 The 1952 Lincoln cent, produced by the Denver Mint, is a highly sought-after item among collectors. Its obverse features a detailed portrait of Abraham Lincoln, dominating the center section. The “D” mint mark beneath the date indicates that the coin was struck at the Denver Mint. In 1952, the Denver Mint achieved remarkable efficiency in the production of Lincoln coins, with a total of 746,130,000 coins produced. Unfortunately, many of these coins have since been lost or destroyed, making them difficult to find. The design of coins features the inscription “Liberty” placed to the left of the profile of Abraham Lincoln, with the minting year inscribed on the opposite side. Above Lincoln’s profile is the standard phrase “In God We Trust”. On the reverse of the coin are two inscriptions. The top half of the coin features the nominal value of “One cent,” while the bottom half displays the words “United States of America.” 2. 1952 s penny - Value: $2.28 – $4.52 - Grade: MS - Sold: $6.00 The 1952-S Lincoln Cent is the least available of the three varieties of Lincoln Cents minted that year, with examples of good condition and quality being particularly difficult to find. The “S” mint mark beneath the date indicates that the coin was struck at the San Francisco Mint, and while San Francisco coins are generally rare, this particular variety is especially so. As such, it commands a higher value among collectors. The San Francisco Mint produced a mere 137,800,004 cents in the given year, the lowest number of any year. Despite being in circulation, some of these coins can still be found in excellent condition. A 1952 s coin of above-average quality is sure to make a strong impression, however faint and indistinct text along the contour may detract from its eye appeal. Collectors typically prefer coins with clear and crisp details. 3. 1952 Canadian penny - Value: $0.03 CAD - Grade: MS-65 - Sold: $1,95 In 1858, the first Canadian penny was issued, and the last George VI Canadian coin, issued in 1952, is now available in an uncirculated state. The Royal Family is highly esteemed in Canada, where King George VI is particularly beloved. The Royal Canadian Mint issued the 1952 Canadian penny. This coin, minted during the reign of King George VI, has a unique place in Canadian monetary history. The value of the 1952 penny is determined by a variety of factors, including quality and wear, demand, supply, rarity, and finish. At the time of its issue, the minimum value of one coin was 0.03 CAD, based on the worth of its metal components. The 1952 Canadian penny features 1 cent engraved with two maple leaves on the same branch, with the date printed on the left and the word “Canada” on the bottom. This design is similar to the 1937 coin, with one exception in 1967. To identify the value of this penny, consult a coin collector’s guide or online resource. 4. 1952 Australian penny coin - Value: $19.10 – $106 - Grade: Fine - Sold: 75AU$ The Australian coin, a small circulating currency of the Australian Pound, is of the same size and constitution as its British decimal counterpart. In 1938, George Kruger Gray’s design replaced the original, which featured only text on its reverse side. This new design featured the iconic dancing kangaroo. Issued in 1952 at the Perth Mint, the Australian penny coin bore the portrait of King George VI facing left on its left side, surrounded by the legend “Georgivs VI D:G:BR:OMN:REX FIDEI DEF”. This coin was released in the same year as King George VI’s passing and Queen Elizabeth II’s ascension to the throne. 5. 1952 British penny - Value: $0.25 – $100 - Grade: HIgh Grade - Sold: 0,25 US$ – 100.000,00 US$ The passing of George VI in 1952 due to lung cancer, after a lifetime of heavy smoking, may have had an effect on the production of coins that year. However, coin production had been plentiful since 1949, with some coins being produced in 1950 and 1951. The amount of coins released each year is dependent on demand. In 1952, four denominations were issued: sixpence, threepence, farthing and halfpenny. Of these, the sixpence is considered to be scarce or “critical” due to its low turnover rate compared to the other six cent denominations. The 1952 British penny features a portrait of King George VI’s bare head facing left, with the artist’s initials HP inscribed in small letters below the cutout. Engraved around the coin is the legend of the monarch: GEORGIVS VI D:G:BR:OMN:REX FIDEI DEF. George VI, by the Grace of God, King of all England and Protector of the Faith, is depicted on the obverse of the coin. The reverse features Britannia, the female embodiment of Great Britain, seated right-facing and wearing a Corinthian crested helmet pushed back to reveal her face and fluttering skirt, all within a beaded border. The figure of a woman stands prominently in the foreground, her right hand resting on a shield emblazoned with the combined crosses of the Confederate Flag, her left hand gripping a trident. In the background, ocean waves lap against a lighthouse on the right, while the words “ONE PENNY” encircle the scene. 6. 1952 german penny - Value: $0.66 - Grade: VF - Sold: 0,24 US$ – 2,50 US$ Franz Paul Krischer was responsible for the engraving of the 1952 German penny. The two sides of the coin feature a hammer and compass, symbolizing the union of the working class with intelligent workers and peasants. The date is located beneath the images. On the reverse of the coin, the text “DEUTSCHLAND” is inscribed, with the mintmark “PFENNIG” below. The 1952 penny is a valuable coin, with each one having its own unique value and meaning. Depending on the grade of the coin, it can be sold for a certain price. To determine the exact value of a 1952 penny, it is recommended to seek the opinion of an expert. Bài Viết này thuộc quyền sở hữu của NDASignal chúng tôi không đồng ý bất kì hành vi sao chép nào, những thông tin sau đây chỉ là nguồn thông tin tham khảo, và không phải là lời khuyên đầu tư. THAM GIA NHÓM TELEGRAM ĐỂ NHẬN CÁC TÍN HIỆU TRADEDING VỚI TỈ LỆ THẮNG LÊN ĐẾN 80% CHANEL TELEGRAM NDA CHANEL GROUP VIP SIGNAL NDA CRYPTO SIGNAL FUTURES GIPHY App Key not set. Please check settings
<urn:uuid:0c3bbab1-a360-45af-8c73-c0f4612ffc8c>
CC-MAIN-2023-14
https://ndasignal.com/uncover-the-value-of-a-1952-penny
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950363.89/warc/CC-MAIN-20230401221921-20230402011921-00158.warc.gz
en
0.921514
1,768
2.71875
3
What does SPF Mean? SPF – Short for ‘Sender Policy Framework’, it’s a DNS record that says on whose behalf an IP or domain sends email. Sender Policy Framework (SPF) is utilized to validate the sender of an email. With a SPF record set up, Internet Service Providers can confirm that a mail worker is approved to send email for a particular space. A SPF record is a DNS TXT record containing a rundown of the IP delivers that are permitted to send email for your area. How does SPF work? To exploit SPF, you distribute a SPF record in the DNS. The record is a rundown of all the IP delivers that are permitted to send email for the space. The SPF system utilizes the space in the return-way address to distinguish the SPF record. At the point when a sender attempts to hand-off an email to an email “getting” worker for conveyance, the worker verifies whether the sender is on the area’s rundown of permitted senders. Assuming this is the case, at that point a connection has been set up between the piece of email and the email space. In the event that not, the worker keeps handling the email as normal without this connection, as quite a few things could be going on. The email may be genuine, however the rundown of senders probably won’t be exact. Genuine email may have been sent which implies the email might have come from anyplace and the rundown of permitted senders doesn’t help excessively. Or then again, the email is phony and undesirable. An excessive number of potential results makes it hard to join importance to the shortfall of the connection that SPF can give. DKIM fills the hole in the DMARC specialized framework as an extra method to attempt to connect a piece of email back to a space. Is your company in need of help? MV3 Marketing Agency has numerous Marketing experts ready to assist you. Contact MV3 Marketing to jump-start your business.« Back to Glossary Index
<urn:uuid:9b4630d5-7726-4606-afef-3caebbb6d3e1>
CC-MAIN-2023-14
https://www.mv3marketing.com/glossary/spf/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950363.89/warc/CC-MAIN-20230401221921-20230402011921-00158.warc.gz
en
0.936129
436
2.671875
3
INVENTING THE WHEEL The earliest records we have of the word wheel are from the 800s, when it was spelled hweol. Around the 1400s, it started to be spelled without the o and with a wh- at the beginning, although it still had a soft (voiceless) w sound for a while until the modern pronunciation was adopted. The word comes from Proto-Germanic hwehla, and we can tell this comes from Proto-Indo-European kwel (meaning "revolve") because, according to Grimm's Law, the kw in PIE became a hw sound in Proto-Germanic. Meanwhile, it stayed the same in other families like Latin, which is why some other descendants of kwel include words with hard-k sounds like collar and colony. The word wheel first started getting used as a verb in the 1200s and peaked in usage in 1906. Leave a Reply. Hello! I'm Adam Aleksic, a senior studying government and linguistics at Harvard University, where I co-founded the Harvard Undergraduate Linguistics Society. In addition to etymology, I also really enjoy trivia, politics, vexillology, geography, board games, conlanging, art history, and law.
<urn:uuid:f09adf9f-d5a3-476d-a4d2-0ee70b508a58>
CC-MAIN-2023-14
https://www.etymologynerd.com/blog/inventing-the-wheel
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943625.81/warc/CC-MAIN-20230321033306-20230321063306-00358.warc.gz
en
0.962104
296
3.359375
3
3 Proven Approaches to Measure the Performance of Your Out-Of-Home Advertising Campaign By definition, Out-of-Home (OOH) advertising is when a person or business will make its adverts out in public or away from the consumers' homes, such as on public transport, buildings, and billboards. It is also known as outdoor advertising or away from home advertising. When doing an OOH, one should take into consideration that the consumers are constantly in motion. Mostly OOH is practised at petrol stations, airports, bus stations, etc. When measuring the performance of OOH, one should take into account: - The Advertisements Physical Visibility This is how the ad is presented to the common eye of the consumers. It should be pleasing and beautiful to the beholder's eye. - The Advertisements Impression For you to capture the attention of a person in motion, whether in a vehicle or by foot, you must have an eye-catching display. In literally 3 seconds it should communicate a comprehensive and discernable message to the moving consumer. Creativity is vital for making impressions. One must give a good understanding of a product hence improving the consumption of your product. - Advertisements Graphics This is the visual presentation of the product on a surface or screen. It comprises the colours and illustrations of an advert. Have you ever seen a picture or video with unpleasant colours? What comes into your mind when an image is discoloured? Graphics should act as a backbone for OOH, this is because, with good graphics, one can increase the probability of the ad reaching your audience with ease. Graphics can be used on a stationary surface such as a billboard. For you to achieve good graphics there are some key factors you should follow. These are; - Well combined colors that spark emotion and interest from the viewer. - The size of the graphics should creates contrast of an object - The lines which are the stress words and they connect important phrases. - The value. This is how darker or lighter a place is, it creates emphasis on the displayed What are the approaches you need to measure the Out-of-Home performance of your media campaigns? - Attribution Analysis OOH, attribution relies greatly on Ad Exposures. In matters of digital media, these Ad exposures may be looked at as being similar to impressions. Today, these Ad exposures can be easily monitored on a unit level using the location data. This location data also comes in handy as the advertisement can use it to monitor offline conversion events. An example of such an event is the physical visits to a retail store by customers. Attribution is very useful in giving you insights that you can use to optimize your advertising campaigns. Here, you can determine what aspects of your campaign performed well and which ones came up short. Afterwards, you can improve your campaign's specific parts that fell short of your expectations while strengthening the well-functioning segments. - Lift Analysis Lift Analysis is the process that involves assessing the impact of your Out-of-Home Advertising campaign. It provides you with clear facts and details about the Return On Investment of the aspects of your advertising campaigns that worked best. The conversion rates and the click rates are significant measures of how well your advertising campaign performs but does not give the entire picture. ROI is not easily perceived by simply looking at these two metrics. Lift Analysis enables you to establish if users' conversion rates will occur at the current rates or even higher rates. This methodology is very valuable in helping you to perceive whether the investment and effort that you put in your advertising are justified by bearing the desired engagement levels, retention rates, and revenues. The standard procedure involved in Lift Analysis compares the users who receive your campaign and the group of users who do not receive the campaign. The latter group here is also referred to as the “control group”. This comparison is made to see which of the two groups is better when it comes to the impact created by the existing advertising campaign. Is the group that encounters the campaign in a better situation? Is the one that does not come across the campaign better off? This is the question that Lift Analysis will help you to address. Benefits of this method - It can help you optimize your advertising campaign more effectively. - You can read which exact actions of your advertising campaigns give you more revenues. - You can monitor the repeat conversions of users. - You can gauge the value that your advertising campaign adds to your business in the bigger picture. - Halo Effect This approach measures the indirect impact of your OOH advertising campaign. The OOH mode of advertising often boosts the overall effectiveness and the efficiency of the other marketing strategies and marketing avenues that you have put in place. It can surprisingly help your digital marketing strategy in boosting your brand's credibility, increasing the awareness of your brand, and driving more offline purchases and enabling you to promote your online engagement. How is this possible though? Most people tend to trust messages that are portrayed by OOH advertising. It presents a very credible source of valuable marketing information. OOH, advertising also interacts more closely with the intended target market. This is important in reinforcing the messages that they are trying to put across. This is what the Halo Effect is all about. It is an excellent measure of the subsequent effects that your OOH advertising efforts create in other aspects of your marketing. In conclusion, OOH, advertising is a great way of advertising. Billions of dollars are put aside to be invested in OOH advertising. Some of the world's biggest and most popular brands today are actively involved in this advertising form. Even with the growth and dominance of digital marketing, companies such as Apple, Amazon, McDonald's, and Coca-Cola still find this “ancient” form of advertising a valuable marketing tool. With the correct measurements of their performance, you will get to learn how to best use them for your marketing objectives. Leave A Comment
<urn:uuid:bf6215ce-c63b-4a64-9096-920b71d2be7e>
CC-MAIN-2023-14
https://alleasolutions.com/3-proven-approaches-to-measure-the-performance-of-your-out-of-home-advertising-campaign/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00358.warc.gz
en
0.950879
1,220
2.65625
3
Story and some photos by Bernice Shepherd Above: Step 5 is the finished hugelkultur (hill culture) garden bed. In recent years there has been bit of a buzz around hugelkultur and how it can benefit your soil – so what is it? The term originated in Germany and means hill culture. Hugelkultur is the practice of filling a trench with logs, branches and compostables such as leaf litter, straw, grass clippings or food scraps and covering it with soil, creating a mound or hill. It can also be done on flat ground if you don’t want to dig a trench. Vegetables can be planted into it straight away or the mound can be left for several months before using it. The mound ingredients will break down over some years as well as being used up by your garden plants So your hill will end up a lot lower than when you started. Over time hugelkultur creates a rich, fertile soil for growing anything you like. Although generally done on open ground, this method can also be used to fill a raised bed. Instead of filling the entire bed with garden soil you can start with logs, branches and twigs, adding leaf litter, mulch and compost to fill. So why use hugelkultur? 1 While it is a hill it creates a greater surface area to plant in, meaning you can grow more. 2 One of the greatest benefits is water conservation. While they are breaking down, the logs retain water, which is then available during dry times. A raised bed filled with soil will usually dry out more quickly than a raised bed with a base of logs and branches. 3 It is an easy way to create a rich, healthy and fertile soil. Microorganisms, fungi and tiny critters feed on the logs, breaking them down into nutrient-rich food for your plants. 4 It is a great way to use up all the prunings from your garden and put them to good use. 5 Hugelkultur is an effective way of rejuvenating soil that is poor and compacted. 6 It costs far less to fill a raised bed using compostable material you have around, especially larger items like logs, than to fill it with garden soil. There are some things to bear in mind before rushing out to create your mound: Use wood that will break down relatively easily and does not resist rot. Dead and already rotting wood is good to go. Fresh prunings are fine, they will just take longer to break down. Try to avoid allelopathic wood – wood that gives off chemicals that inhibit growth, such as pines, camphor and eucalypt. If you are making a mound on the ground, orient the bed north–south so it gets relatively equal amounts of sun. An east–west bed will have a hot side and a shady side. A mound built in a trench conserves more water than a mound on flat ground – so much better for drought resistance. When planting, place heavy drinkers toward the bottom of the mound and plants that like it dry toward the top. Likewise, plants that prefer a lot of sun go at the top and those that like some shade do better at the bottom. It is best to start with plants herbs or legumes. A lot of nitrogen is used in the process of composting hard material like wood and straw so it is not as available for plants that need higher amounts of nitrogen. As the wood rots and the mound becomes lower, more nitrogen will be available for the heavy feeders such as tomatoes and brassicas. Hugelkultur beds should last eight or more years. Once you have created your bed you can sit back and reap the benefits as your plants thrive and your soil improves.
<urn:uuid:b01b2558-e0b3-415d-aa35-25b6796ff7d3>
CC-MAIN-2023-14
https://indynr.com/what-the-hill-hugelkultur-makes-a-mound-of-sense-for-vegie-gardeners/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00358.warc.gz
en
0.940588
791
3.09375
3
Fall is Great for Planting. Really. by Beth Monroe, Public Relations and Marketing Director, Lewis Ginter Botanical Garden While most people think of spring as the best time for planting, avid gardeners know fall can actually be the best. First of all, it helps to know the difference between an annual and a perennial. Annuals typically only last one season, while perennials come back year after year. Since they last more than one season, perennials are attractive to many gardeners because they don’t have to be replanted, which saves time and money. Fall is good for planting perennials because the cooler temperatures and increased rainfall help the plant’s roots become well-established. The soil is still warm in the fall and allows roots to grow until the ground freezes. (With mild weather, roots may even continue to grow throughout the winter.) If the same plant is put in the ground in the spring, it gets a slower start because soils are cooler. If planted in the summer, it may become extremely stressed due to heat, drought and an insufficient root system. For the same reasons, turf grasses are often planted in the fall. Fall is also the time to plant spring-blooming bulbs and “cool crop” vegetables. And just because mid-September is not the beginning of the spring season, don’t rule out annuals. They can be used to give your garden a “boost” and can be enjoyed until frost hits. In our area that can sometimes be until late October or early November.
<urn:uuid:1923897f-e7ad-47af-8af3-d506db768ee9>
CC-MAIN-2023-14
https://www.lewisginter.org/fall-is-great-for-planting-really/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00358.warc.gz
en
0.949648
323
2.5625
3
The gut is dwelling to a cast of microbes that influence overall health and illness. Some sorts of microorganisms are believed to contribute to the improvement of inflammatory circumstances, such as inflammatory bowel illness (IBD), but the precise cascade of events that leads from microbes to immune cells to illness remains mysterious. A new study by investigators from Brigham and Women’s Hospital explores specifically what leads to the generation of Th17 cells — an crucial subtype of cells in the intestine — and uncovers some of the underappreciated molecular players and events that lead to cell differentiation in the gut. One particular of these players is the purine metabolite xanthine, which is identified at higher levels in caffeinated foods such as coffee, tea and chocolate. Final results of the study are published in Immunity. “One of the ideas in our field is that microbes are necessary for Th17 cell differentiation, but our study suggests that there might be exceptions,” mentioned co-lead author Jinzhi Duan of the Division of Gastroenterology, Hepatology, and Endoscopy in the Division of Medicine at BWH. “We studied the underlying mechanisms of Th17 cell generation in the gut and identified some surprising benefits that might support us to superior comprehend how and why illnesses like IBD might create.” Although illuminating the methods top to Th17 cell differentiation, the researchers unexpectedly found a function for xanthine in the gut. “Sometimes in investigation, we make these serendipitous discoveries — it is not necessarily a thing you sought out, but it is an intriguing acquiring that opens up additional places of inquiry,” mentioned senior author Richard Blumberg, also of the Division of Gastroenterology, Hepatology, and Endoscopy. “It’s as well quickly to speculate on regardless of whether the quantity of xanthine in a cup of coffee leads to beneficial or damaging effects in a person’s gut, but it offers us intriguing leads to comply with up on as we pursue strategies to create a protective response and stronger barrier in the intestine.” Interleukin-17-making T helper (Th17) cells are believed to play a crucial function in the intestine. The cells can support make a protective barrier in the gut, and when a bacterial or fungal infection happens, these cells might release signals that bring about the physique to generate much more Th17 cells. But the cells have also been implicated in illnesses such as numerous sclerosis, rheumatoid arthritis, psoriasis, and IBD. Duan, co-lead author Juan Matute, Blumberg, and colleagues utilised numerous mouse models to study the molecular events that lead to the improvement of Th17 cells. Surprisingly, they identified that Th17 cells could proliferate even in germ-totally free mice or mice that had been provided antibiotics wiping out bacteria. The group identified that endoplasmic reticulum tension in intestinal epithelial cells drove Th17 cell differentiation via purine metabolites, such as xanthine, even in mice that did not carry microbes and with genetic signatures that recommended cells with protective properties. The authors note that their study was restricted to cells in the intestine — it is achievable that crosstalk among cells in the gut and other organs, such as the skin and lungs, might have an crucial influence on outcomes. They also note that their study does not recognize what causes Th17 cells to turn into pathogenic — that is, play a function in illness. They note that additional exploration is required, such as research that concentrate on human-IBD Th17 cells. “While we do not however know what’s causing pathogenesis, the tools we have created right here might take us a step closer to understanding what causes illness and what could support resolve or avert it,” mentioned Blumberg. Funding: This function was supported by the National Institutes of Wellness (grants DK044319, DK051362, DK053056, DK088199, DK117565, DK110559, DK015070), the Harvard Digestive Illnesses Center (DK034854), CCF Analysis Fellowship Award (#707702), the Pediatric Scientist Improvement System (K12HD000850), Austrian Science Fund (FWF J 4396), the Wellcome Trust (senior investigator award 106260/Z/14/Z and 222497/Z/21/Z), the European Analysis Council (HORIZON2020/ERC grant agreement no. 648889), the DFG person grant (SO1141/ten-1) DFG Analysis Unit FOR5042 “miTarget — The Microbiome as a Target in Inflammatory Bowel Diseases” (project P5) the DFG Cluster of Excellence 2167 Precision Medicine in Chronic Inflammation the BMBF project iTREAT (SP5) and the EU H2020 grant SYSCID (contract no. 733100). The Day-to-day Gazette Sign up for everyday emails to get the most up-to-date Harvard news. One thought on “Study probes caffeine’s function in gut overall health, IBD – Harvard Gazette” Casper Ice Dam Removal Services Dr Glickman Supplements What is the best way to avoid water damage Get your gutters cleaned by us We Get Gutters Clean Las Vegas Google Tabellen What is lurking in your gutters Get a professional cleaning today Pink Talon Stun Gun For Women Attending Night Classes We Get Gutters Clean Akron Photos – Google Drive Insect Spray Diversion Safe ShellmoForums Profile of bomberhate2
<urn:uuid:6ed0567c-bfef-49db-87bc-ae3425df52fa>
CC-MAIN-2023-14
https://newsqwe.com/study-probes-caffeines-function-in-gut-overall-health-ibd-harvard-gazette/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00358.warc.gz
en
0.917211
1,187
3
3
At the beginning of the pandemic, disinfecting wipes were a coveted item and difficult to find. Now, they're finally making their way back to store shelves. But how much do we really need to be disinfecting surfaces? Microbiologists say the coronavirus doesn't usually survive on surfaces. “You actually go into hospitals where they're treating COVID-19 patients and you check the surfaces, and there's no infectious virus, none,” said Dr. Emanuel Goldman, a microbiology professor at Rutgers New Jersey Medical School. Whenever the coronavirus is found on a surface, it's usually the RNA. Think of it as the corpse or skeleton of the virus. It usually means the virus is no longer there and it's unlikely that you will become infected by touching that surface. Goldman says because of that, it's not really necessary to constantly disinfect surfaces. Instead, we should focus on other preventative measures, like hygiene. “Really all you need to do is wash your hands because even if you happen to touch something, it's not going to go through the skin of your fingers. You wash your hands and you're done with it,” said Goldman. Goldman reminds people to remember the three Ws – wear a mask, watch your distance, and wash your hands.
<urn:uuid:e733fc6f-24de-49fb-8c96-31530d727f5f>
CC-MAIN-2023-14
https://www.kjrh.com/news/national/coronavirus/microbiologists-say-its-not-really-necessary-to-constantly-disinfect-surfaces
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00358.warc.gz
en
0.969777
275
2.984375
3
Study finds first transmission of covid in wild white-tail deer Wis. (WBAY) - For the first time since the beginning of the pandemic, researchers have found covid-19 spreading in wild animals, specifically white-tail deer. Wisconsin was not part of the multi-state study, but the DNR said it’s waiting for its own results after sending in dozens of samples this past year. “We don’t have any results back yet, but hopefully we will soon. They have to be reported back to us if any positives do occur, which is very possible,” said Natanya Hayden, Wildlife Health Section Manager with the DNR. While the DNR waits for results from the lab, plans are already in place for more testing this year. “We’ll be doing monitoring throughout the state next year with a minimal of 500 deer that we’re hoping to sample and it may be upwards of 1,000 deer,” said Hayden. An increase in sampling size will give wildlife professionals a better understanding of how widespread covid-19 is in wild white-tail deer. “I think the concern with wild deer is that you know, we just don’t have much control over that. You know, the idea of trying to control a wild deer population because they have a specific disease hasn’t been overly successful,” said Dr. Jeff Pothof, Chief Quality Officer and Emergency Medicine Physician at UW-Health. Dr. Pothof said it’s still too early to really know what this spread means when it comes to covid and the potential for new variants. “The concern would be that the white-tailed deer population becomes this kind of reservoir of COVID-19 that can spread pretty easily amongst the deer that they would give the virus a chance to mutate into a variant that then could at a later date, infect a human that could kick off like another surge with a new variant,” said Dr. Pothof. “We don’t know that this will happen. There isn’t evidence that it’s happened already, but with deer being so easily infected with COVID 19 it’s a theoretical risk that’s out there. And we’ll just have to wait to see if anything becomes of this.” The idea that a virus can mutate in an animal and then transfer to a human has happened before. “This isn’t uncommon. I mean, a lot of our flu variants, influenza variants come from poultry. So there definitely is this historical record of zoonotic infection, so infections that are mutating, changing within an animal, and for whatever reason, they get lucky and now are infectious and can actually cause disease in humans. So it’s not necessarily a new thing.” said Dr. Pothof. “Lyme disease is a good example where like the deer doesn’t much care at all that it’s carrying Lyme disease because it doesn’t cause any problems. But that tick then bites us and we get Lyme disease, it can be a big deal.” As for hunters and the future of deer hunting in the state, Hayden said don’t panic. “At this time, it’s not believed that COVID would be transferred from hunters processing game meat or consuming game meat,” said Hayden. While more research is needed, Hayden said the DNR is using the initial data biosecurity at rehab facilities to reduce the spread of covid from humans to deer that are being reintroduced to the wild after rehabilitation. “Most of those are orphan fawn situations, but again, you know, the more knowledge that we have... the more informed decisions we can make and it’s going to be better for the population overall,” said Hayden. Copyright 2022 WBAY. All rights reserved.
<urn:uuid:7070bf01-9107-4710-a2b3-971954b24c62>
CC-MAIN-2023-14
https://www.northernnewsnow.com/2022/02/10/study-finds-first-transmission-covid-wild-white-tail-deer/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00358.warc.gz
en
0.95421
837
2.90625
3
Better Absorption of Nutrients. Diet is key to health in general, and each person is unique and requires unique nutrients for optimal functionality. Tannins (complex chemical substances derived from phenolic acids) found in caffeine may possibly inhibit some of the absorption of calcium, iron, and B vitamins from the diet you are eating. This may be a bigger possibility for those who have a very high caffeine intake daily, an imbalanced diet, or older age. A Healthier Digestion. Coffee may create a laxative effect on some individuals, stimulating bowel movements, and consuming large amounts may lead to loose stools or even diarrhea. From a population based study, researchers have found that caffeinated beverages may play a role in gastroesophageal reflux disease (GERD). Lower Blood Pressure + Less Anxiety. Caffeine has been shown to increase blood pressure levels due to the stimulatory effect it has on your central nervous system. The energy that comes with caffeine often stimulates our fight or flight hormones and may cause anxiety, nervousness, heart palpitations, etc. Getting Better Sleep. Drinking caffeine may affect your sleeping cycle, causing restless sleep, which then leads to daytime drowsiness (this can be especially true if you consume caffeine less than six hours before you go to sleep). Those who are not consuming caffeine may find it easier and takes them less time to fall asleep.
<urn:uuid:0abbf26a-c53b-4619-bc4b-3f39608ee22d>
CC-MAIN-2023-14
https://letgoandgrow.com/community/topic/the-health-benefits-of-limiting-caffeine-intake/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00358.warc.gz
en
0.917031
284
3.015625
3
Anger is a natural human emotion that can be triggered by various stimuli, including frustrating or threatening situations, perceived injustices, or feeling out of control. It is typically associated with tension, irritation, and an urge to retaliate or express dissatisfaction. Further, anger can be expressed in various ways, ranging from mild irritation to intense rage. When experiencing anger, people may feel increased heart rate, tensed muscles, and rapid breathing. They may also experience a surge of adrenaline that can prepare them for fight or flight. While anger can be a normal and healthy emotion, it can also become problematic if expressed inappropriately or excessively. Uncontrolled anger can lead to physical violence, verbal abuse, or other harmful behaviors. Additionally, frequent or chronic anger can lead to health problems such as high blood pressure, headaches, and digestive issues. After all, you can look for anger management therapy for professional assistance. Keep reading to learn more. How to Deal with Anger? You should try to deal with anger because it is not good for your relationships. Feeling angry with someone can be a difficult emotion to deal with. Here are ten things to do when you are feeling angry with someone. - Take A Step Back - Identify The Source Of Your Anger - Talk It Out - Write It Down - Practice Mindfulness - Practice Self-Care - Seek Support - Let It Go Take a step back: Sometimes, when you are getting angry at someone, then you should take a deep breath. And try to remove yourself from the situation. This will give you some time to calm down and gather your thoughts. Identify the source of your anger: People often express their anger differently, but they usually share four common triggers including frustrations, irritations, abuse, and unfairness. Try to pinpoint what is causing your anger. Is it something the person said or did, Or is it something deeper? Talk it out: When you are feeling angry with someone, then, if possible, try to communicate your feelings to the person calmly and respectfully. This will help you to express your emotions and potentially resolve the issue. Write it down: Sometimes, writing down your thoughts and feelings in a journal or notebook can be helpful. This can be a safe space to release anger and work through emotions. Practice mindfulness: Mindfulness techniques such as meditation and deep breathing can help calm your mind and alleviate anger. Exercise: Physical activity can help release suppressed energy and reduce anger. Take a walk, go for a run, or hit the gym to work off your frustration. Practice self-care: Engage in activities that make you feel good, such as taking a bath, reading a book, or watching a movie. This will help you to relax and reduce feelings of anger. Seek support: Talk to a trusted friend, family member, or therapist about your feelings. They can provide a listening ear and help you to process your emotions. Forgive: Forgiveness, in simplest terms, is letting go of angry feelings and thoughts toward somebody who hurt you and replacing them with positive feelings and thoughts. When you forgive, you accept that something bad happened to you and want to move on. If possible, try to forgive the person who has put you in trouble. This can be a powerful tool for letting go of negative emotions and moving forward. Let it go: Sometimes, despite your best efforts, we may be unable to resolve the issue or reconcile with the person. In this case, it may be best to let go of the anger and move on with your life. These are common tips to manage your anger in case you are hurt by someone. Consider going for anger management therapy or seek professional help if these tips can’t help. Thank you for reading.
<urn:uuid:413ee163-8af7-458f-84bc-ac809ae62f15>
CC-MAIN-2023-14
https://www.dignital.com/do-external-factors-or-someone-make-you-angry-try-these-things-before-seeking-medical-advice/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00358.warc.gz
en
0.939938
791
3.6875
4
A postal system is a system wherein written documents typically enclosed in envelopes, and also small packages containing other matter, are delivered to destinations around the world. Anything sent through the postal system is called mail or post. In principle, a postal service can be private or public. Governments often place restrictions on private postal delivery systems. Since the mid-nineteenth century, national postal systems have generally been established as government monopolies with a fee on the article prepaid, often in the form of adhesive stamps. In general, government monopolies only extend parcel (non-mail) delivery to courier services, which provide express delivery. Postal systems often have functions other than sending letters. In some countries, the postal system also has some authority over telephone and telegraph systems. In others, postal systems allow for savings accounts and handling applications for passports. The evolution of the postal system to the collection of national organizations that work together internationally, coordinated by the Universal Postal Union, allowing the transfer of printed and other materials around the world is a tremendous achievement. Although the postal system may appear to be outdated when compared with the more modern technologies such as the telephone, fax, and internet, it still has an advantage through its ability to send written documents as well as other items to any location, no matter how remote and lacking in modern technology. Such an interconnected set of systems, operating relatively smoothly despite the conflicts and barriers that have existed both within and between nations, represents a significant step toward the unification of all people as one human family, able to communicate and send all kinds of materials efficiently. The postal system allows people to send letters or packages nationally or internationally. For the most part, they are run by the government and paid for through taxes and some federal funding. The word "mail" comes from the Medieval English word male, which was the term used to describe a traveling bag or pack. The French have a similar word, malle for a trunk or large box. In the 1600s the word mail began to appear as a reference for a bag that contained letters: "bag full of letter" (1654). Over the next hundred years the word mail began to be applied strictly to the letters themselves, and the sack as the "mailbag." In the nineteenth century the British usually referred to "mail" as being letters that were being sent abroad (on a ship), and "post"' as letters that were for localized delivery. The term "e-mail" (short for "electronic mail") first appeared in 1982. The term "snail-mail" is a retronym that originated in 1983 to distinguish it from the quicker e-mail. Communication by written documents carried by an intermediary from one person or place to another almost certainly dates back nearly to the invention of writing. However, development of formal postal systems occurred much later. The first documented use of an organized courier service for the diffusion of written documents is in Ancient Egypt, where Pharaohs used couriers for the diffusion of their decrees in the territory of the State (2400 B.C.E.). This practice almost certainly has roots in the much older practice of oral messaging and may have been built on a pre-existing infrastructure. The first credible claim for the development of a real postal system comes from Persia (present day Iran) but the point of invention remains in question. The best documented claim (Xenophon) attributes the invention to the Persian King Cyrus the Great (550 B.C.E.), while other writers credit his successor Darius I of Persia (521 B.C.E.). Other sources claim much earlier dates for an Assyrian postal system, with credit given to Hammurabi (1700 B.C.E.) and Sargon II (722 B.C.E.). Mail may not have been the primary mission of this postal service, however. The role of the system as an intelligence gathering apparatus is well documented, and the service was (later) called angariae, a term that in time turned to indicate a tax system. The Hebrew Bible (Esther, VIII) makes mention of this system: Ahasuerus, king of Medes, used couriers for communicating his decisions. The Persian system worked on stations, where the message carrier would ride to the next post, whereupon he would swap his horse with a fresh one, for maximum performance and delivery speed. Herodotus described the system in this way: It is said that as many days as there are in the whole journey, so many are the men and horses that stand along the road, each horse and man at the interval of a day’s journey; and these are stayed neither by snow nor rain nor heat nor darkness from accomplishing their appointed course with all speed. The next credible claimant to the title of first postal system is China. Claims concerning the origins of this mail system also conflict somewhat, but it is clear that an organized postal infrastructure was put in place during the Qin Dynasty (221 B.C.E.–207 B.C.E.) and was substantially expanded during the subsequent Han Dynasty. The first well documented postal service in Europe is that of Rome. Organized at the time of Augustus Caesar (62 B.C.E.–AD 14), it may also be the first true mail service. The service was called cursus publicus and was provided with light carriages called rhedæ with fast horses. Additionally, there was another slower service equipped with two-wheeled carts (birolæ) pulled by oxen. This service was reserved for government correspondence. Another service for citizens was later added. By the name of the stations in which mail was distributed and messengers' routes crossed, derives the Latin name of mail, posta (originally posata or pausata, "place of rest") because in these stations messengers used to rest during their voyages. The communications revolution of the early modern period was the result of the first reliable infrastructure of communication introduced at the beginning of the sixteenth century in central Europe. Postal systems were basically systems of portioning the space to create reliable channels of communication. Many religious orders had a private mail service, notably the Cistercians connected more than 6,000 abbeys, monasteries, and churches. The best organization however was created by Teutonic Knights. The newly instituted universities too had their private services, starting from Bologna in 1158. In 1505, Holy Roman Emperor Maximilian I established a postal system in the Empire, appointing Franz von Thurn und Taxis to run it. The Thurn and Taxis family, then known as Tassis, had operated postal services between Italian city states from 1290 onwards. Following the abolition of the Empire in 1806, the Thurn and Taxis postal system continued as a private organization, continuing to exist into the postage stamp era before finally being absorbed into the postal system of the new German Empire after 1871. It was around this time nationalization and centralization of most postal systems took place. In colonial times, post offices were established to bring mail back and forth between the American colonies to England. They differed from modern post offices because they were usually a part of local pubs and taverns, places where people generally frequent. Following this, a postal route was established between New York City and Boston. This was the first route established between the colonies, and today is known as U.S. Route 1. A centralized postal system came in 1693, when Thomas Neale received a grant from Britain. He appointed the governor of New Jersey, Alexander Hamilton, his deputy postmaster general. The position was succeeded by Hamilton's son, and in 1737, by Benjamin Franklin, who would improve the postal system in many ways. He improved old routes and laid newer, shorter routes, laid down new milestones on the route, and had mail traveling overnight between Philadelphia and New York. 1760 saw a surplus for the postal service in the colonies, a first for the organization. Following the American Revolutionary War, the United States established a postal system under the Constitution in 1789. George Washington appointed Samuel Osgood as the first postmaster general of the United States on September 26, 1789. Different acts and addenda in the following decade improved upon the duties of the postmaster and the postal system. Philadelphia was home to the postal headquarters until 1800, when it moved to Washington D.C. In 1872, the post office was established as an executive department. Many countries use their postal systems, along with the traditional exchanges of letters, for new services that have little to do with original forms of postal systems. Post offices are set up in areas that may see low traffic in order to make a complete system. With this, a banking service is brought with the post office into areas that may not see many banks. Various government benefits can be cashed through post offices, and some countries have post offices collect taxes. Different African postal services help distribute different vaccinations or medicines to those in need. Modern mail is organized by national and privatized services, which are reciprocally interconnected by international regulations, organizations, and international agreements. Paper letters and parcels can be sent to almost any country in the world relatively easily and cheaply. The Internet has made the process of sending letter-like messages nearly instantaneous, and in many cases and situations correspondents use electronic mail where previously they would have used letters, although the volume of paper mail continues to increase. Some countries have organized their mail services as public limited liability corporations without a legal monopoly. Nevertheless, mail is economically a natural monopoly, and so only few competitors surface, and even they offer a more specialized service. The world-wide postal system comprising the individual national postal systems of the world's self-governing states is coordinated by the Universal Postal Union, which among other things sets international postage rates, defines standards for postage stamps and operates the system of International Reply Coupons. In most countries a system of codes has been created (called "ZIP Codes" in the United States, "postcodes in the United Kingdom and Australia, and "postal codes" in most other countries), in order to facilitate the automation of operations. This also includes placing additional marks on the address portion of the letter or mailed object, called "bar coding." Bar coding of mail for delivery is usually expressed either by a series of vertical bars, usually called POSTNET coding, or a block of dots as a two-dimensional barcode. The "block of dots" method allows for the encoding of proof of payment of postage, exact routing for delivery, and other features. The ordinary mail service was improved in the twentieth century with the use of airplanes for a quicker delivery (air mail). The first scheduled airmail service took place between the London suburbs of Hendon and Windsor on 9 September 1911. Some methods of airmail proved ineffective, however, including the United States Postal Service's experiment with rocket mail. Worldwide the most common method of prepaying postage is by buying an adhesive postage stamp to be applied to the envelope before mailing; a much less common method is to use a postage-prepaid envelope. Franking is a method of creating postage-prepaid envelopes under license using a special machine. They are used by companies with large mail programs such as banks and direct mail companies. In 1998, the U.S. Postal Service authorized the first tests of a secure system of sending digital franks via the Internet to be printed out on a printer, obviating the necessity to license a dedicated franking machine and allowing companies with smaller mail programs to make use of the option; this was later expanded to test the use of personalized postage. The service provided by the U.S. Postal Service in 2003 allows the franks to be printed out on special adhesive-backed labels. In 2004 the Royal Mail in the United Kingdom introduced its "SmartStamp" Internet-based system, allowing printing on ordinary adhesive labels or envelopes. When the pre-paid envelope or package is accepted into the mail by an agent of the postal service, the agent usually indicates by means of a cancellation that it is no longer valid for pre-payment of postage. The exceptions are for stamps that are pre-canceled and thus do not require cancellation and for, in most cases, metered mail. Rules and etiquette Documents cannot be read by anyone other than the receiver. However, exceptions do exist, such as postcards, which can be read by the mail carrier for the purpose of identifying the sender and receiver. The privacy of correspondence was argued for and often ignored in European countries since the sixteenth century, and is alluded to in the Universal Declaration of Human Rights According on the laws in the relevant jurisdiction, correspondence may be openly or covertly opened or the contents determined via some other method, by the police or other authorities in some cases relating to their relevance to an alleged or suspected criminal conspiracy, although black chambers (largely in the past, though there is apparently some continuance of their use today) opened and open letters extra legally). Control of private citizens' mail is called censorship and concerns social, political, and legal aspects of civil rights. Even though often illegal, there have been cases over the centuries of governments illegally opening and copying or photographing the contents of private mail. While in most cases this censorship is exceptional, in the military, censorship of mail is routine and almost universally applied, particularly with respect to soldiers near a battlefront. The use of mail is subject to common rules and a particular etiquette. Modern alternatives such as the telegraph, telephone, and e-mail have reduced the attractiveness of paper mail for many applications. Sometimes these more modern alternatives can be easier to use. Modern alternatives can be better than paper mail because vandalism can occur with mailboxes (although it can also be argued that paper mail does not allow for computer viruses). Also, hazards exist for mail carriers, though some are the resident's fault (such as dog bites). Due to hazards or inconveniences postal carriers may refuse, officially or otherwise, to deliver mail to a particular address (for instance, if snow buildup obstructs the clear path to the door or mailbox). Postal mail is, however, still widely in use for business (due to the particular legal standing of signatures in some situations and in many jurisdictions, etiquette, or transmission of things that cannot be done by computer, as a particular texture, or, obviously, items in packages) and for some personal communication. For example, wedding invitations in Western countries are customarily sent by mail. Several countries, including Sweden (1993), New Zealand (1998 and 2003), and Argentina have opened up the postal services market to new entrants. In the case of New Zealand Post Limited, this included (from 2003) its right to be the sole New Zealand postal administration member of the Universal Postal Union, thus the ending of its monopoly on stamps bearing the name New Zealand. Rise of electronic correspondence In modern times, beginning in the twentieth century, mail has found an evolution in vehicles using newer technologies to deliver the documents, especially through the telephone network; these new vehicles include telegram, telex, facsimile (fax), e-mail, and short message service (SMS). There have been methods which have combined mail and some of these newer methods, such as INTELPOST, which combined facsimile transmission with overnight delivery. These vehicles commonly use a mechanical or electro-mechanical standardized writing (typing) that on the one hand makes for more efficient communication, while on the other hand makes impossible characteristics and practices that traditionally were in conventional mail, such as calligraphy. With the advent of eBay and other online auction sites and online stores, postal services in industrialized nations have seen a major shift to item shipping. This has been seen as a relief to the system due to the lowered level of paper mail due to the accessibility of e-mail. Types of mail Letter-sized mail comprises the bulk of the contents sent through most postal services. These are usually documents printed on A4 (210×297 mm), Letter-sized (8.5×11 inches), or smaller paper and placed in envelopes. While many things are sent through the mail, personal letters are often thought of first in reference to postal systems. Handwritten correspondence, while once a major means of communications between distant people, is now used less frequently due to the advent of more immediate means of communication, such as the telephone or e-mail. Traditional letters, however, are often considered to hearken back to a "simpler time" and are still used when someone wishes to be deliberate and thoughtful about his or her communication. Bills and invoices are often sent through the mail, such as regular billing correspondence from utility companies and other service providers. These letters often contain a self-addressed, envelope that allows the receiver to remit payment back to the company easily. While still very common, many people now opt to use online bill payment services, which eliminate the need to receive bills through the mail. Bulk mail is mail that is prepared for bulk mailing, often by presorting, and processing at reduced rates. It is often used in direct marketing and other commercial solicitations sent by advertisers, although it has other uses. The senders of these messages sometimes purchase lists of addresses (which are sometimes targeted towards certain demographics) and then send letters advertising their product or service to all recipients. Other times, commercial solicitations are sent by local companies advertising local products, like a restaurant delivery service advertising to their delivery area or a retail store sending their weekly advertising circular to a general area. Bulk mail is also often sent to companies' existing subscriber bases, advertising new products or services. There are a number of other things almost without any exception sent exclusively as letters through postal services, like wedding invitations and bank statements. Postal cards and postcards are small message cards which are sent by mail without an envelope. The distinction often, though not invariably and reliably, drawn between the two forms is that "postal cards" are issued by the postal authority or entity with the "postal indica" (or "stamp") preprinted on them, while postcards are privately issued and require affixing an adhesive stamp (though there have been some cases of a postal authority's issuing non-stamped postcards). Postcards are often printed today to promote tourism, with pictures of resorts, tourist attractions or humorous messages on the front and allowing for a short message from the sender to be written on the back. The postage required for postcards is generally less than postage required for standard letters. Postcards are also used by magazines for new subscriptions. Inside many magazines are postage-paid subscription cards that a reader can fill out and mail back to the publishing company to be billed for a subscription to the magazine. In this fashion, magazines also use postcards for other purposes, including reader surveys, contests or information requests. Larger envelopes are also sent through the mail. These are often made of sturdier material than standard envelopes and are often used by businesses to transport documents that are not to be folded or damaged, such as legal documents and contracts. Due to their size, larger envelopes are sometimes charged additional postage. Packages are often sent through some postal services, usually requiring additional postage than an average letter or postcard. Many postal services have limits on what can and cannot be sent inside packages, usually placing limits or bans on perishable, hazardous, or flammable materials. Additionally, because of terrorism concerns, the U.S. Postal Service subjects their packages to various security tests, often scanning or x-raying packages for materials that might be found in mail bombs. Magazine subscriptions are also sent through postal services. Many magazines are simply placed in the mail normally (but in the U.S., they are printed with a special bar code that acts as pre-paid postage, but many are shipped in shrink-wrap to protect the loose contents of the magazine. A postage stamp is evidence of pre-paying a fee for postal services. Usually a small paper rectangle that is attached to an envelope, the postage stamp signifies that the person sending the letter or package may have either fully, or perhaps partly, pre-paid for delivery. Postage stamps are the most popular way of paying for retail mail; alternatives include prepaid-postage envelopes and Postage meters. Postage stamps were first introduced in the United Kingdom in May 1840 as part of the postal reforms promoted by Rowland Hill. With its introduction the postage fee was now to be paid by the sender and not the recipient as heretofore, though sending mail prepaid was not a requirement. The first postage stamp, the Penny Black, first issued on the 1st of May for use from May 6, and two days later, the Two pence blue, with an engraving of the young Queen Victoria, were an immediate success though refinements, like perforations were instituted with later issues. Other countries followed suit by introducing their own postage stamps; the Canton of Zürich in Switzerland issued the Zurich 4 and 6 rappen; although the Penny Black could be used to send any letter weighing less than 15 grammes within the United Kingdom, the Swiss postage still calculated mail rates based on the distance traveled. Brazil issued the Bull's Eyes stamps in the 1843, using the same printer as that used for the Penny Black. The Brazilian government opted for an abstract design instead of an image of emperor Pedro II in order that his image would be not disfigured by the postmark. In 1845 some postmasters in the USA issued their own stamps, but the first officially issued stamps came in 1847, with the 5 and 10 cent stamps depicting Benjamin Franklin and George Washington. A few other countries issued stamps in the late 1840s, but many more, such as India, started in the 1850s and by the 1860s most countries of the world had issued postage stamps. Following the introduction of the postage stamp in the United Kingdom the number of letters mailed increased from 82 million in 1839 to 170 million in 1841. Postage stamp design Stamps have been issued in other shapes besides the usual square or rectangle, including circular, triangular, and pentagonal. Sierra Leone and Tonga have issued self-adhesive stamps in the shape of fruit; Bhutan has issued a stamp with its national anthem on a playable record, and so forth. Stamps have also been made of materials other than paper, commonly embossed foil (sometimes of gold); Switzerland made a stamp partly out of lace and one out of wood; the United States produced one made of plastic, and the German Democratic Republic once issued a stamp made entirely of synthetic chemicals. In the Netherlands a stamp was issued made of silver foil. In the United States, the introduction of Information Based Indicia (IBI) technology has allowed newer ways to sell stamps. IBI is an encrypted 2-dimensional bar code that makes counterfeiting more difficult and easier to detect, offering value beyond postage. Unlike traditional postage meter indicia, each IBI is unique. The IBI contains security critical data elements as well as other information, such as point of origin and the sender. The IBI is human and machine-readable. Prior to IBI being introduced, postage vault devices were used on personal computers to allow postage stamps to be printed from one's computer. The postage vault device is a tamper resistant postal security device to disable postage equipment when tampered with. The postage vault can be also identified as the means to store (and keep track of) monetary funds in the postage vault. This is essentially prepaying for the right to print postage from your personal computer. The Internet is used to reset or replenish funds in the postage vault. The push towards using IBI technology aids the United States Postal Service in finding new venues to sell stamps. It also reduces the burden of maintaining the mechanical machines to sell stamps. The United States Postal Service still relies on co-signing stamps to retailers and banks (via automatic teller machines (ATMs). They must be the same size and thickness as currency in order to be dispensed by the ATM. Similarly, Royal Mail in the United Kingdom launched a "Print-your-own-postage" service allowing the general public to purchase IBI-style codes online, and print them onto address stickers or directly onto envelopes, in lieu of using First Class postage stamps. This was much remarked-upon in the press as the first time a consumer "stamp" has not featured an image of the reigning monarch. It joins the existing "Smart Stamp" subscription service, which performed the same function but which was aimed at business customers. Postage stamps are also object of a particular form of collecting, and in some cases, when demand greatly exceeds supply, their commercial value on this specific market may become enormously greater than face value. Stamp collecting is commonly known as philately, although strictly the latter term refers to the study of stamps. For some postal services the sale of stamps to collectors who will never use them is a significant source of revenue. This has been condoned by the collecting community for places such as Liechtenstein and Pitcairn Islands that have followed relatively conservative stamp issuing policies. Abuses of this policy, however, are generally condemned. Among the most notable abusers have been Nicholas F. Seebeck in the 1890s and the component states of the United Arab Emirates. - ↑ The Quotations Page. Herodotus. Retrieved Janyar 17, 2018. - ↑ Online Etymology Dictionary. Post. Retrieved January 17, 2018. - ↑ Jonathan DeWald, Europe 1450 to 1789: Encyclopedia of the Early Modern World. (Charles Scribners Sons, 2003. ISBN 978-0684312002) - ↑ Luisa Anderloni and Roberto Ruozi, Modernisation and Privatization of Postal Systems in Europe: New Opportunities in the Area of Financial Services. (Springer, 2002. ISBN 978-3540427773) - ↑ 5.0 5.1 History of the United States Postal Systems ThoughtCo. Retrieved January 17, 2018. - ↑ 6.0 6.1 David Kahn, Back When Spies Played by the Rules The New York Times, January 13, 2006. Retrieved July 12, 2007. - ↑ 7.0 7.1 Donald Lehnus, Angels to Zeppelins: A Guide to the Persons, Objects, Topics, and Themes on United States Postage Stamps, 1847-1980. (Greenwood Press, 1982, ISBN 978-0313234750). - ↑ Bill Olcheski, Beginning Stamp Collecting. (New York, NY: Henry Z. Walck, Inc. 1976 ISBN 0809824299) ReferencesISBN links support NWE through referral fees - Anderloni, Luisa and Roberto Ruozi (eds.). Modernisation and Privatisation of Postal Systems in Europe: New Opportunities in the Area of Financial Services. Springer, 2002. ISBN 978-3540427773. - DeWald, Jonathan. Europe 1450 to 1789: Encyclopedia of the Early Modern World. Charles Scribners Sons, 2003. ISBN 978-0684312002 - John, Richard. Spreading the News: The American Postal System from Franklin to Morse. Harvard University Press, 1998. ISBN 978-0674833425. - Lehnus, Donald. Angels to Zeppelins: A Guide to the Persons, Objects, Topics, and Themes on United States Postage Stamps, 1847-1980. Greenwood Press, 1982. ISBN 978-0313234750. - Olcheski, Bill. Beginning Stamp Collecting. New York, NY: Henry Z. Walck, Inc., 1976. ISBN 0809824299. - Silverstein, Adam. Postal Systems in the Pre-Modern Islamic World. Cambridge University Press, 2007. ISBN 978-0521858687. All links retrieved November 30, 2022. - U.S. Postal rates through the years - History of postage stamps and collecting of stamps - Postal Services History - History of the United States Postal Service ThoughtCo. New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here: The history of this article since it was imported to New World Encyclopedia: Note: Some restrictions may apply to use of individual images which are separately licensed.
<urn:uuid:ec60e086-5e57-4352-a64b-9abd0dd025ce>
CC-MAIN-2023-14
https://www.newworldencyclopedia.org/entry/Stamp
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00358.warc.gz
en
0.950312
6,031
3.71875
4
Home » Social Thinkers » Ferdinand Tonnies Ferdinand Tönnies (1855- 1936) was a German sociologist. He was a major contributor to sociological theory and field studies. His distinction between two types of social groups - Gemeinschaft and Gesellschaft - is what Tönnies is best known for. He was, however, a prolific writer and also co-founder of the German Society for Sociology. Tönnies distinguished between two types of social groupings. Gemeinschaft often translated as community refers to groupings based on a feeling of togetherness. Gesellschaft often translated as society on the other hand, refers to groups that are sustained by an instrumental goal. Gemeinschaft may by exemplified by a family or a neighbourhood; Gesellschaft by a joint-stock company or a state. His distinction between social groupings is based on the assumption that there are only two basic forms of an actor's will, to approve of other men. Following his "essential will" ("Wesenwille"), an actor will see himself as a means to serve the goals of social grouping; very often it is an underlying, subconscious force. Groupings formed around an essential will are called a Gemeinschaft. The other will is the "arbitrary will" ("Kürwille"): An actor sees a social grouping as a means to further his individual goals; so it is purposive and future-oriented. Groupings around the latter are called Gesellschaft. Whereas the membership in a Gemeinschaft is self-fulfilling, a Gesellschaft is instrumental for its members. In pure sociology theoretically these two normal types of will are to be strictly separated; in applied sociology empirically they are always mixed. Types of social norms stated by Tonnies: Law, Moral rules, Mores and Conventions.
<urn:uuid:ef6558fc-a139-4138-9cb0-b36a6cc233f4>
CC-MAIN-2023-14
https://www.sociologyguide.com/thinkers/Tonnies.php
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00358.warc.gz
en
0.966564
405
3.453125
3
Plants yield a variety of beautiful foliage, but you must always be careful since many petals are poisonous. Plants produce toxic leaves and fruits as a way of fending off predators. Many of these toxic petals are not that harmful to humans, but they can be to plants and children. If you are growing any indoor plant, then you may want to place plants out of reach from children and pets. If your pet has eaten poisonous petals, there are warning signs. Excessive panting and lethargy are all signs of poisoning. If a pet has been poisoned, it must be taken to a veterinarian as soon as possible. Children should be taken to an emergency room if they have also eaten poisonous petals. Always research to see if your plants produce any poisonous foliage. Some petals also produce bacteria and could need cleaning. Willow trees are one tree that requires some cleaning since they not only provide poisonous petals but bacteria as well. Calcium Bicarbonate is one chemical that will keep the leaves free of harmful bacteria. Since weeping willow trees shed lots of petals, it is essential to watch animals or children that may eat them. If you are growing plants indoors, then be sure to clean up any shed leaves or foliage that falls to the floor. This will prevent animals or children from placing it in their mouths. This is especially important if you have a puppy since they are known to chew on just about anything. Place poisonous plants outdoors or high up where pets and children cannot reach them. This will not only benefit them but your plant as well. Though toxic plants are not harmful to adult humans, some plants can cause complications or be fatal if digested. Many berries are toxic and should not be eaten unless satisfied that the fruit is edible. If hiking in any area, always be aware of your surroundings and know which plants are safe. If ingested, poisonous plants can use stomach complications and could shut down the respiratory system. Flowers are beautiful, but behind that beauty are poisonous agents that could be harmful to your children and pets. If a plant is poisonous, it does not mean that you have to get rid of it, but be careful in making sure that pets and children cannot reach them. Source of Information on Poisonous Foliage Plants
<urn:uuid:b6ccd704-fbd7-459a-9b95-7a8f9c5fe58b>
CC-MAIN-2023-14
https://www.tnnursery.net/blogs/tn-nursery-blog/blog-be-aware-of-poisonous-petals-what-to-watch
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00358.warc.gz
en
0.955639
484
3.34375
3
Internationalist solidarity is part of a political commitment to support struggles against oppression anywhere in the world, as if they were our own. They are struggles that strengthen the self-determination of the peoples as protagonists of their own history, and they engage collective political subjects who pledge to organize to promote systemic change in our societies. In the experience of La Via Campesina, the World March of Women, and Friends of the Earth International, internationalist solidarity is a fundamental political practice. Practicing solidarity out from social movements means coordinating actions to demand justice and advocate for the sovereignty of the peoples and their grassroots political projects for emancipation and self-determination. It means organizing to raise our voices, to denounce imperialism, authoritarianism, and violence, and to effectively support those whose lives and communities are threatened and persecuted, who have their rights violated and their struggles criminalized. If a people anywhere in the world suffers an injustice, then there is a struggle to be carried on by all peoples in the world. All around the globe, the history of the peoples is the history of the struggle against domination. In communities, women spearhead the struggle to defend their land, water, decent work, and collective organization. This is in defiance of the powers that be: transnational corporations and their projects to hijack nature; the walls and borders that segregate peoples and militarize territories; reactionary governments interested in dismantling democracies. In times when an increasingly authoritarian version of capitalism advances, defending those who defend life is crucial for the process of grassroots resistance and social change. The solidarity processes of social movements emerge from the need to produce an international response to the attacks against sovereignty and to the systematic violations of the rights of communities and social fighters. By sharing these struggles and making them known, assembling resistance with ally organizations, and organizing brigades and vigils, these organizations make solidarity a political practice: horizontal class solidarity. In order to write this text, we spoke with Nalu Faria and Miriam Nobre, of the World March of Women; Karin Nansen, of Friends of the Earth International; and Tchenna Maso, of La Via Campesina. These social movements have accumulated so many experiences in solidarity throughout time. This way a network is created, capable of protecting people while also exposing conflicts. In 2020, more than 300 social leaders and former FARC fighters have been murdered in Colombia, which has led this life protection mechanism to be revived. Solidarity is a principle underlying the building of the World March of Women. One of the strategies of the movement is to identify similar demands in different countries marked by police brutality, strengthening international pressure and the integration between struggles. As a result, in 2005, the 2nd International Action of the WMW sewed a Solidarity Quilt which then traveled the world. The quilt was a token, but also a way to demonstrate the encounter of women from around the globe. The Action ended in Burkina Faso, a country where the independence process and a women workers’ strike have gained a lot of exposure thanks to internationalist solidarity actions. Also, every year since 2013, April 24th is celebrated as an international day of feminist solidarity against transnational corporations, in memory of the more than one thousand women workers who died in the Rana Plaza collapse in Bangladesh. Solidarity comes together with the denouncement of the precarious labor conditions provided by big transnational corporations. Since the 2008 crisis, the world has witnessed the strengthening of conservative ideologies, which have taken on a peculiar neofascist, authoritarian character. As these right-wing forces rise to power, they foster political instability and actively dismantle or erode democracies. Meanwhile, the ongoing development and expansion of the neoliberal economic system has intensified the privatization, commodification, and financialization of common public goods around the world. Moreover, imperialism has restored its offensive against people’s sovereignty in countries such as Cuba and Venezuela. Via Campesina is part of an articulation called “Solidarity, Resistance, Hope”, a mechanism with the participation of, so far, 16 organizations and social movements, including WMW and FoEI. Examples of this work include the Colombia peace process and also the defense of the Palestinian territory, a symbolic resistance in a territory that the Israeli occupation and its allies insist to claim doesn’t exist. An intense vigil is then organized to make sure the peoples and leaders who are constantly threatened with arbitrary imprisonment and all kinds of violence can be safe and sovereign. The Internationalist Solidarity System of Friends of the Earth works with a decentralized team that operates on local/domestic, regional, or international levels. Based on regional focal points (in four regions: Latin America, Europe, Africa, and Asia-Pacific) and the international secretariat of the Federation, it organizes political education, documentation, and assessment of threats. Practicing solidarity is about creating effective paths in the world that we live today toward the world that we want to build. This is why the mechanisms of fast action are not detached from political mobilization and organizing. Conversely, they strengthen each other. And so, campaigns for the right to struggle also build the struggles themselves, and vice-versa. And from these calls by the organizations, they build and strengthen strategic alliances, like the one between these three movements. Some of the toughest, most necessary experiences of solidarity are those that demand the release of militants who are incarcerated for political reasons. First, the actions start by disclosing information about the cases and, from that, by mobilizing legal counseling and making sure comrades are guaranteed basic safety and protection in prison. One example was the episode in the Democratic Republic of the Congo a few days prior to the closing of the 3rd International Action of the WMW in 2010. These are arbitrary arrests, as are all political incarcerations. And this is a growing reality in all regions, especially in territories of conflict. Every case where someone is persecuted and criminalized requires a different answer and strategy of exposure, depending on its political, social, and legal context, as well as on the way things may escalate in the daily lives of local communities. For La Via Campesina, this continuous monitoring of militants who are political prisoners is called the Alert System. The system includes a number of measures to monitor the risk of imprisonment, persecution, or even murder that a militant or a group of militants faces in their territories. Organizing this monitoring is a difficult task, which becomes more and more complex with the growing surveillance and digital data under big tech control. In face of authoritarian offensives and the corporate capture of democracy that strangle processes of grassroots resistance, political education and grassroots internationalism converge as a permanent strategy for these three organizations. This way, they expand political and class awareness, building on the understanding and tackling of the structural causes of violations. The convergence of communications between social movements—which counter the silence of mainstream corporate media when it comes to resistance—and Political Education Schools—like the Feminist School, the Florestan Fernandes National School, and the Sustainability Schools—are also key strategies for internationalist solidarity. These joint efforts for solidarity aim to guarantee survival, freedom, and protection of rights, but that is not all. They expand the ability of grassroots movements to build alternatives and new emancipatory political realities. Solidarity means standing up and mobilizing and organizing against all forms of oppression, such as patriarchy, racism, colonialism, and the brutality committed against our peoples to try to take away from us our ability to organize and struggle. Our movements have a long history and experience, with practices, methodologies, and political accumulation in building internationalist solidarity. But that is not enough, as the policy of criminalization and death is widespread and advances wherever people dare to organize their ways of living in a sovereign way and stand up to say ‘no’ to the offensive of capital. This text is an invitation and a call to action for effective, internationalist, feminist, and grassroots solidarity.
<urn:uuid:86c58e70-a08d-489e-bb12-4565f757850d>
CC-MAIN-2023-14
https://capiremov.org/en/experience/solidarity-an-internationalist-practice/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945472.93/warc/CC-MAIN-20230326111045-20230326141045-00358.warc.gz
en
0.947766
1,625
2.65625
3
shown in other instead. The built-in terrain editor allows to change the terrain relief on the spot with the help of brushes. In the editing mode you can draw various terrain features, such as rocky ground and other craggy details, and cut holes. All brushes modify only the refined arean (0-3 LODs). To start editing the current terrain, click the Edit terrain button on the Parameters tab. After finishing the editing, click either Apply to apply all changes and exit the editor, or Cancel changes. - To modify the diffuse color, a surface should have a diffuse texture assigned. - To modify the detail mask, a surface should have a mask texture assigned. - If there are already 4 detail materials present on the surface, new materials cannot be added. - To draw with a brush, press ALT + LMB. - To grab the height / color / material (depending on the brush type) at the current height of terrain and set it as a brush value, use CTRL + LMB. - To change the brush size, use [ and] hotkeys or themouse wheel. The following set of brushes with their specific modes is used to modify the terrain. A Heights brush adds hills and cavities of different sizes. The available Modes for Heights brush are the following: - Replace — replace the current terrain height with the specified Height value. Lower height values will lower the surface down and create cavities, while higher values will raise the terrain height. If a surface has different heights, the brush will level them. - Add — add the specified height to the current height and raise it till the maximum height of a terrain is reached. - Subtraction — subtract the specified height from the terrain current height and lower it till the minimum height of a terrain is reached. - Smooth — level the difference between the neighboring heights. - Dilate — raise the current terrain height up to the level of its highest point (regardless to brush Height). - Erode — lower the current terrain height down to the level of its lowest point (regardless to the brush Height). A Holes brush cuts the holes in the terrain grid (Add mode) or restores the non-cut terrain relief (Remove mode). Holes can be seen only on patch levels (0-3 LODs). A Diffuse brush modifies the color of a diffuse texture that is assigned to the surface. Its Modes are: - Replace — paint the color specified by the brush Color over the terrain diffuse color. - Add — add the color specified by the brush Color to the terrain diffuse color thus lightening it. The lighter the color, the lighter the result will be. Completely black color value does not change anything. - Subtract — subtract the color from the terrain diffuse color thus darkening it. The lighter the color, the darker the result will be. Completely black color value does not change anything. - Smooth — blur diffuse colors blending and softening color transitions. - Multiply — multiply the terrain diffuse color by a Color value. The result is darker than both colors. Completely white color value does not change the diffuse texture at all; completely black color value provides a black color. A Mask brush controls the clarity and spreading of detail materials across the terrain. The Value allows to choose a material from the list of available ones for the current terrain. The brush Modes are: - Replace — apply the chosen material to the terrain current height and erase all other present detail materials present (clear values of all other channels of the mask texture). - Add — increase intensity and clarity of the chosen detail material. - Subtract — decrease intensity and clarity of the chosen detail material. - Smooth — blur spreading boundaries of the chosen material. Detail materials are seen only on patch levels (0-3 LODs). Diffuse + Mask A Diffuse + Mask brush simultaneously modifies the spreading of material texture across the terrain and overpaints its diffuse colors. The brush Modes are: - Replace — overpaint the diffuse color with the brush Color and apply the chosen material to the terrain current height. It also erases all other present detail materials (clears values of all other channels of the mask texture). - Add — ads the color to diffuse one (thus lightening it) and at the same time increases intensity of detail material. The lighter the brush color, the darker the result will be. Completely black color value does not change anything. - Subtract — subtract the color from diffuse one (thus darkening it) and decreases intensity of detail material. - Smooth — blur both diffuse colors and mask texture, making the spreading boundaries of the material softer. - Shape — shape of the brush: - Circle — circular shape - Square — a square oriented along the terrain grid - Diamond — a square oriented at 45° to the terrain grid - Texture — texture-based brush. (The texture is loaded using the additional button.) - Radius — size of the brush - Sharpness — tip of the brush. The lower the value, the sharper and smaller the tip; the higher the value, the flatter and bigger the tip. - Opacity — the rate to apply the brush - Height — height value - Color — color of the brush The terrain palette allows to save all the current brush parameters to be used as pre-set later. For that, drag a Save icon onto the palette. The palette is shared by all terrain objects (except for materials).
<urn:uuid:8796153c-5cf0-4d20-a88a-fa164da1e5fe>
CC-MAIN-2023-14
https://developer.unigine.com/en/docs/2.4.1/editor/terrain_editor/?rlang=cpp
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945472.93/warc/CC-MAIN-20230326111045-20230326141045-00358.warc.gz
en
0.784095
1,191
2.5625
3
Key to Subverting the Violence of Faction: America’s Founding Design of the United States Constitution Against Disunion In his First Inaugural Address, Abraham Lincoln argued that “the Union is much older than the Constitution.” What did Lincoln mean when he spoke of the Union? The Declaration of Independence explains that the Americans were “one people” because they were providentially, philosophically, and hence politically united. In addition to referring to the Americans as one people, it also references the American people using the collective “We.” Furthermore, the document calls itself a “unanimous” declaration of the “united” States of America. The authors saw the separate colonies as previously united, and unanimity implied that they were “of one mind.” In short, the Declaration expressed that the Americans were one people capable of governing themselves. Because the Americans were united as one people and were arbitrarily ruled by another, the Declaration asserts that they have a duty to assert their independence by appealing to their Creator and natural laws of justice. Therefore, the principle of union, the rallying cry of Abraham Lincoln, Daniel Webster, Henry Clay, and George Washington, is one of the bedrock principles of the American founding. Whereas the Declaration expresses the existence of unity at the time of the founding, many of the Federalist Papers contemplate the importance of a strong or firm union. For example, Federalist 9 asserts in its first line that “A FIRM Union will be of the utmost moment to the peace and liberty of the States, as a barrier against domestic faction and insurrection.” Additionally, Federalist 10 asserts that “Among the numerous advantages promised by a well-constructed union, none deserves to be more accurately developed than its tendency to break and control the violence of faction.” In other words, at the time of ratification, one of the most salutary effects of the United States Constitution was that it bolstered the existing unity between the American people and thereby combated faction and disunion. As discussed in previous essays, in Federalist 9 and 10, Publius argued that the particular kind of union created by the Constitution was the key to subverting the violence of faction, the primary vice of the political system under the Articles of Confederation. But union was not only an important principle at the time of the signing of the Declaration and the ratification of the Constitution. The Declaration sets forth “self-evident truths” that are meant to guide the American people through time. The principles explicitly enumerated are “life, liberty, and the pursuit of happiness.” However, in Washington’s Farewell Address he emphasized the principle of “union” as that which secured the principles of the Declaration. In the Farewell Address, Washington counseled the American people: “The unity of government which constitutes you one people is also now dear to you. It is justly so; for it is a main pillar in the edifice of your real independence, the support of your tranquility at home, your peace abroad, of your safety, of your prosperity, of that very liberty which you so highly prize.” He told the people that “it is of infinite moment that you should properly estimate the immense value of your national Union to your collective and individual happiness; that you should cherish a cordial, habitual, and immovable attachment to it; accustoming yourselves to think and speak of it as of the palladium of your political safety and prosperity; watching for its preservation with jealous anxiety; discountenancing whatever may suggest even a suspicion that it can in any event be abandoned; and indignantly frowning upon the first dawning of every attempt to alienate any portion of our country from the rest, or to enfeeble the sacred ties which now link together the various parts.” In other words, Washington argued that union was the principle that secured the self-evident truths for which the Americans had fought in the Revolutionary War. According to Washington, the principle of union was necessary to secure the rights to life and liberty as well as the freedom to pursue happiness. Washington believed that if union failed, then the American experiment failed, and if the American experiment failed, then the prospect of liberty and self-government everywhere was in danger. Therefore, he urged the people to cherish the principle of union. But why cherish union? Washington believed that patriotism and a dedication to union were necessary to preserve the blessings of the Revolution. For example, when he wrote to a society of Quakers who refused to defend the country in war, he told them that religious liberty was contingent upon the maintenance of the union. He wrote, “We have Reason to rejoice in the prospect that the present National Government, which by the favor of Divine Providence, was formed by the common Counsels, and peaceably established with the common consent of the People, will prove a blessing to every denomination of them. To render it such, my best endeavours shall not be wanting.” In the Farewell Address, Washington argued that the people ought to remain dedicated to the principle of union because “Citizens by birth or choice of a common country, that country has a right to concentrate your affections.” In other words, Washington argued that America was the common country of North, South, East coast, and unsettled West. Patriotism was a necessary virtue for men of all sections and all religious sects. Washington worried the rights for which men fought and died in the Revolution may be short lived without the virtue of patriotism and self-sacrifice for the principle of union. Furthermore, Publius argued that the Americans were destined to become united. In Federalist 2, Publius argued that “Nothing is more certain than the indispensable necessity of Government.” But what kind of government was necessary? Publius argued that “It is well worthy of consideration therefore, whether it would conduce more to the interests of the people of America, that they should, to all general purposes, be one nation, under one federal government, than that they should divide themselves into separate confederacies, and give to each the head of each, the same kind of powers which they are advised to place in one national Government.” Publius believed that if the Constitution and the principle of union was rejected, then they would become like the “petty republics of Greece and Italy… kept in a state of perpetual vibration, between the extremes of tyranny and anarchy.” Publius foresaw that unless the Constitution be ratified and the principle of union secured, the country would become a loose confederacy like the European Union instead of a firm band of friends. Instead of creating a system of petty republics on the basis of confederacy, Publius argued that the Constitution would create a great republic on the basis of union. The Federalists argued that the constitutional union was fitting because the Americans had a common destiny, a common philosophy, and a common goal. But why should the sections, which had different and contradictory economic interests, agree to subject themselves to a common government which would wield power? Isn’t it true that one section would, upon election, sometimes be given the opportunity to abuse their fellow country-men in different quarters, comprising different interests? Publius dealt with this problem in two ways. First, he argued that the American people were more similar than different. Second, the principle of federalism allowed the states to embrace their particular interests through state law, while allowing the federal government to legislate according to the “great and aggregate interests” of the country. Publius argued that among the sections, the people were homogenous in their principles and character, even if they embraced different economic interests across the sections. He argued that Providence had prepared the American people for union. He wrote, “It has often given me pleasure to observe that Independent America was not composed of detached and distant territories, but that one connected, fertile, wide, spreading country was the portion of our western sons of liberty. Providence has in a particular manner blessed it with a wide variety of soils and productions, and watered it with innumerable streams for the delight and accommodation of its inhabitants.” Publius also remarked that “Providence has been pleased to give this one connected country, to one united people, a people descended from the same ancestors, speaking the same language, professing the same religion, attached to the same principles of government, very similar in their manners and customs, and who, by their joint counsels, arms and efforts, fighting side by side throughout a long and bloody war, have nobly established their general Liberty and Independence.” In short, Publius argued that “This country and this people seem to have been made for each other.” In Federalist 2, Publius admitted that among the sections there were “slight shades of difference.” However, he argued that the common character and principles of the Americans trumped the consequential differences of economic interest across the sections. Furthermore, Publius and the Federalists believed that the American people would triumph over their differences through their common councils, given enough time. However, Publius argued that the principle of federalism allowed for harmony in cases where the diversity of state interests clashed; by limiting the federal government to specific and enumerated purposes, the Constitution embraces the “slight shades of difference” among the states. For example, in Federalist 10, Publius makes a distinction between “local circumstances” and “national objects.” He argued that the representative must balance his attention to the local concerns of constituents and the “permanent and aggregate interests of the community.” He remarked that “the federal Constitution forms a happy combination in this respect; the great and aggregate interests being referred to the national, the local and the particular, to the state legislatures.” In other words, Publius believed that a limited government, embracing the principle of federalism, could unite American citizens in common matters while allowing the citizens of states to legislate according to their particular circumstances, habits, and interests. But what was the alternative to union? One unpopular alternative among the Anti-federalists was the creation of a confederacy consisting of equal powers for each section of the union. In Federalist 5, Publius argued that the creation of a sectional confederacy was both impracticable and unwise. He predicted that the different sections would become jealous of the most powerful, and would scheme against their neighbors. Rather than cooperation, there would be competition between the sections. Rather than trust, there would be skepticism. Publius writes, “Distrust naturally creates distrust, and by nothing is good will and kind conduct more speedily changed, than by invidious jealousies and uncandid imputations.” So, what was Publius’ solution to the different passions and interests that tended toward disunion? Publius’ most famous solution is the creation of the extended republic wherein the factions are multiplied, dispersed, and allowed to drown one another out. But also important is the way in which power is divided. The division of power is best explained in Federalist 51, where Publius explains that in the Constitutional system “ambition must be made to counteract ambition.” Publius first sought to quell factious differences by diminishing them through the extended sphere, but then sought to vent factious passions through the system of representation. The Constitution controls the violence of faction in a number of ways (the most important of which is the creation of an enlarged sphere, or a large republic), but here are four general ways the Constitutional system intended to deal with the difficulty of sectional faction by allowing “ambition to counteract ambition”: - First, the Constitution divides power between the state and federal government which allows local interests to pursue their ends without interfering with the self-government of other localities. The federal government and local government, each jealous of their powers, will compete for sovereignty through the courts and public forums. - Second, when federal legislative power is exercised, it is divided. This means majority factions cannot easily exact their designs because a bill must pass both houses. - Third, the Senate’s mode of election and representation are meant to balance the power of more populous states in the House. - Fourth, Publius imagined that representatives would “enlarge and refine public opinion” meaning that the representative would be less susceptible to the passions of local or sectional factions. The Constitutional system successfully combated sectional faction under the pressures of the slavery question and Congress proved capable of balancing factious interests until states from the south rejected the Constitutional system and seceded from the union. In the next essay, I will consider how the Constitution and the Congress successfully combated the tendency toward disunion throughout the Antebellum period. Samuel Postell serves as Executive Director of The Center for Liberty and Learning at the Founders Classical Academy of Lewisville, Texas. Mr. Postell graduated from Ashland University with undergraduate degrees in Politics and English. He earned his master’s degree in Political Thought from the University of Dallas and is working on his dissertation to complete his Ph.D. Mr. Postell is writing a book on Henry Clay and legislative statesmanship, a subject about which he frequently writes and publishes. He has also conducted studies for Ballotpedia and has frequently contributed to Law and Liberty and Constituting America. At Founders Classical Academy he teaches courses on Government and Economics, and has taught courses on American Literature and Rhetoric. Click here for American Exceptionalism Revealed 90-Day Study Schedule Click here to receive our Daily 90-Day Study Essay emailed directly to your inbox Join the discussion! Post your comments below.Your feedback and insights are welcome. Feel free to contribute!
<urn:uuid:9b13bc78-62d0-4e7c-bbe8-6d48adf349f0>
CC-MAIN-2023-14
https://constitutingamerica.org/90day-aer-key-to-subverting-the-violence-of-faction-americas-founding-design-of-the-united-states-constitution-against-disunion-guest-essayist-samuel-postell/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948684.19/warc/CC-MAIN-20230327185741-20230327215741-00358.warc.gz
en
0.966928
2,871
3.5
4
Prices for grains and oilseeds projected to remain below recent highs Larger global production of grains and oilseeds in response to higher prices in recent years has increased world supplies of corn, wheat, and soybeans. At the same time, income growth in developing countries has weakened and the U.S. dollar has strengthened, affecting both global agricultural demand and U.S. exports, resulting in lower near-term prices for those crops. Longer run developments for global agriculture and U.S. trade reflect steady world economic growth, population gains, and continued global demand for biofuel feedstocks. Those factors combine to support longer run increases in consumption, trade, and prices of agricultural products. Thus, following the near-term declines, moderate prices gains are projected over the next ten years. This chart is from USDA Agricultural Projections to 2025. Download higher resolution chart (2083 pixels by 1663, 300 dpi)
<urn:uuid:a5ed3e74-eb54-4416-9261-50c88f04c1b7>
CC-MAIN-2023-14
https://www.ers.usda.gov/data-products/chart-gallery/gallery/chart-detail/?chartId=78793
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948684.19/warc/CC-MAIN-20230327185741-20230327215741-00358.warc.gz
en
0.933655
190
2.578125
3
The Controller Area Network (CAN) Bus was introduced in 1983 by Robert Bosch GmbH, a multinational engineering and electronics company headquartered in Germany. CAN Bus was originally designed to let microcontrollers and devices communicate without a host computer. It was primarily intended for automotive applications but is currently used additionally in elevators, video games, human prosthetics and elsewhere, including CERN’s powerful particle accelerator/collider, to collect data following sub-atomic collisions. A CAN Bus broadcasts uniformly to all nodes. Notwithstanding, individual nodes may incorporate filters to reject unwanted messages. All modules are configured with respect to the bus in accordance with AND logic. What this means is that if any single node drives the bus to logic 0, the entire bus goes to that state despite any other nodes that might attempt to drive the bus to a different logic state. Of the four different frames that are used in a Can Bus, the dominant type is the data frame. The arbitration field determines message priority when more than one node attempts to take possession of the bus, which may contain an 11-bit identifier or a 29-bit identifier, depending upon the Can Bus version (CAN 2.0A or CAN 2.0B). The data field may contain anywhere between 0 and 8 bytes (not bits) of data. The CRC (Cyclic Redundancy Check) contains a 15-bit checksum whose purpose is error detection. There is also an acknowledgment bit inserted at the end of each message. If the transmitter determines there is no acknowledgment bit, it retransmits the message. The CAN Bus is actualized in any of several ways, which are mutually exclusive. They do not generally work with one another. A common form taken by CAN Bus is the two-wire balanced signaling design, also known as High-Speed CAN. This variant, which is specified in ISO Standard 11898, benefits immensely from differential signaling, which is characterized by a high degree of noise immunity and fault tolerance, exactly what is needed in the noisy automotive environment. Balanced differential signaling over twisted pair cabling, shielded or unshielded, reduces noise by means of common mode rejection. A higher twist rate, as in newer versions of category cable used for Ethernet, promotes RF immunity and reduces inductive and capacitive coupling which always degrades signal integrity. ISO 11898 specifications for CAN Bus technology are applicable for a maximum signaling rate of 1 Mbps with a bus length of 40 m and with a maximum of 30 nodes. The maximum unterminated stub length is 0.3 m. The cable is shielded or unshielded twisted pair with a characteristic impedance (Z0 ) of 120 Ω. The cable is terminated at both ends with 120-Ω resistors, the purpose of which is to match the characteristic impedance of the line to prevent signal reflections, which would cause data loss. The two signal lines, when passively biased, measure 2.5 V. When the CANH line becomes dominant, the voltage increases to 3.5 V, and the CANL line drops to 1.2 V, so there is a 2-V differential signal. In contrast to high-speed CAN Bus transceivers, low-speed CAN transceivers support data rates up to only 125 kbs. The advantage of low-speed CAN Bus, however, is that the bus interface has a fault-tolerant layout. This means a failure of one of the two communications lines does not result in total communication failure. When Bosch originally developed the ISO 11898 CAN specification, three layers were recognized: object layer, transfer layer and physical layer. The CAN specification fully defined object and transfer layers, but did not explicitly address the physical layer, so voltage levels and transmission media could be customized by individual manufacturers for individual applications. High-speed CAN Bus is more widely used in the physical layer because it permits simple cable connection between devices. In low-speed CAN, because each device has its own termination, the two types of devices cannot be used in the same network. CAN Bus was originally developed and promulgated first for automotive, then nautical and aeronautic applications, but its use has continuously broadened into new areas, primarily because of its simplicity, reliability and low cost. A case in point is elevator technology, which continues each decade to write the book on reliability and safety all the while with a view on initial and on-going cost containment. CAN Bus, because of its serial technology, makes possible significantly reduced wire count in the traveling cable, machine room and throughout the building. Fire loading and troubleshooting difficulties are eased with less wiring and fewer terminations. Phone-style connectors allow easy field expansion. An essential element in elevators as used in commercial and multifamily occupancies is that humans in large numbers and often including children and disabled or infirm individuals are interacting with powerful machinery that lifts them off the ground. This happens day and night, year round, and in the fullness of time there is the potential for equipment failure and injury to the interacting individuals. This hazard is greatly mitigated by means of the reliability that is built into CAN Bus technology. CAN Bus is adept at the sort of multi-tasking that is required when there is a group installation of elevators operating in a large high-rise building. A number of cars may be in motion simultaneously, traveling in the same or opposite directions, reducing speed in preparation to stop at given floors or accelerating after completing a stop, all this with doors opening and closing as needed. The cars respond in a pre-programmed prioritized manner to call buttons pressed on many different floors and other buttons pressed inside the cars. What makes all this possible is a remarkably simple yet highly effective system of arbitration and message management within the CAN Bus. All nodes are connected to each other through a two-wire bus. Each node requires a (local) central processing unit. This host processor determines which messages are to be transmitted. Sensors, actuators and control devices that are connected to the CAN Bus receive these messages. The CAN controller, which may be part of the microcontroller, stores the received bits that the bus conveys, until the message is complete. Then it becomes available to the host processor. All nodes are capable of sending and receiving messages, but this cannot happen simultaneously. Data transmission in the CAN Bus proceeds in a manner that accomplishes contention resolution by means of arbitration. Because all nodes receive every bit in real time, the transmission is considered synchronous even though it takes place without regard to a synchronizing clock signal. CAN Bus realizes real-time prioritization by means of a system of dominant (logic level 0) and recessive (logic level 1) messaging. Arbitration takes place when one node transmits a dominant bit and another node transmits a recessive bit. Following the ensuing collision, the dominant bit wins arbitration and the higher-priority message is transmitted. However, the lower-priority message is not obliterated, as in some other types of serial transmission. Instead, it is retransmitted after an appropriate time interval, and this message also survives and is conveyed. That is why CAN Bus succeeds as a real-time prioritized communication system, making it appropriate in complex automotive, elevator and particle-collider applications, among many others. Of all serial bus transmission methods, not to mention parallel bus, CAN Bus is the most far-reaching, pervasive and successful. It is highly ambitious, yet its simplicity enables it to accomplish extraordinarily complex tasks where high reliability is required in rugged and electronically noisy operating environments. CAN Bus is message rather than address-based and for this reason does well when uniform data is to be sent to multiple locations. The full bandwidth is available when it is mandatory that messages get conveyed so critical equipment never goes down. Just think of a high-speed train or jet traveling across the sky! Fault-free operation takes place because problematic nodes are eliminated, ensuring the entire network is never permitted to crash. Error containment can be accomplished and new nodes can be hot-plugged into the bus, permitting the system to be modified on the fly. CAN Bus is readily adapted to a broad range of applications and operates reliably in the most challenging environments. For this reason, CAN Bus is suitable for all sorts of moving vehicles, construction equipment, mining and industrial sites and numerous other fast-moving situations when workers’ lives depend upon the machinery operating predictably and where large amounts of power must be controlled. That said, CAN Bus is not a good choice where the network needs to be secure and resistant to hacking. CAN is designed to be relatively simple and is often implemented between microcontrollers having little processing power and is used to relay messages in real time. There are no facilities for adding encryption or authentication of devices on the network. Raymond Ramirez says ” CAN Bus is not a good choice where the network needs to be secure and resistant to hacking.” As long as physical connection is the only means to access the CAN Bus in every individual vehicle, the security is limited to the original measures of the particular vehicle, such as door locks. But when some manufacturers are announcing “Over the Air” (OTA) programming updates, that security risk is gone. Anyone who can access the correct radio frequency and modulation can then access the CAN Bus. The byte is a set of 8 bits of 0’s and 1’s ? I also was wanting to know exactly how a signal (wave is created) being a novice the wave of electromagnetism must somehow be created and then sent ? From sender to and from controller ? Brian beebee says ” wave of electromagnetism must somehow be created” It is created in the wire. By raising or lowering the voltage. Technically it creates an electromagnetic wave in the wire. But not like you are thinking through the air like a radio signal.
<urn:uuid:94399975-9059-4135-b6a5-5d31c95e5dc1>
CC-MAIN-2023-14
https://www.testandmeasurementtips.com/exploring-canbus-oscilloscope/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948684.19/warc/CC-MAIN-20230327185741-20230327215741-00358.warc.gz
en
0.942209
2,033
3.546875
4
Scientists bake gluten-free bread using a revolutionary technology. Gluten-free bread is crucial for those with certain allergies and conditions like Celiac disease. However, it's time-consuming to produce. Scientists have successfully made gluten-free bread using a technique called Ohmic heating, in which the bread itself is a conductor for electricity. The test bread had more volume and more uniformity, and was made with less time and energy than traditional methods. Prof. Dr. Henry Jäger University of Natural Resources and Life Science (BOKU) In conventional baking, wheat bread is usually produced from doughs with a water content of about 55–60%. After various fermentation periods (around 2 h for pure yeast fermentation, up to several days for sourdough fermentation), the dough is baked in baking ovens (contact heat or convection oven) for approximately 1 h, whereby heat is transferred from the outside to the inside of the dough until it reaches its maximum core temperature of around 100 °C and is then held for drying and crust formation. In contrast, GF bread formulations usually require twice as much water than for wheat bread. Since the protein network is missing, the gas retention is mainly controlled by the starch gelatinization during baking and hence a higher water addition is needed. However, this results in a lower dough viscosity and together with the different gas retention of the starch matrix compared with a gluten network in wheat bread, baking of Gluten-free (GF) bread is challenging when applying conventional technologies. OH is an emerging technology that has shown many advantages over other heating methods. Heat is distributed in a very rapid and uniform manner, as heating occurs volumetrically and does not rely on conventional heat transfer based on conduction, convection or radiation. Main parameters affecting the heat generation during OH are the electrical field strength and the electrical conductivity of the material. Both determine the electrical current and result in a temperature increase based on the total specific energy input applied and the specific heat capacity of the material. The applied power affects the heating rate. In a heterogeneous material such as food, the electrical conductivity closely depends on certain properties (e.g., composition, pH, concentration, and mobility of ions) and usually increases with temperature, water, and salt content. Gluten-free (GF) batters usually present several technological challenges that limit the performance during conventional baking and the resulting product quality. Due to the volumetric heating principle and faster heating rates, ohmic heating (OH) may be advantageous compared with conventional baking. Therefore, the potential of using ohmic heating as a novel approach for gluten-free bread baking was explored. In detail, the effect of different OH process parameters (power input, holding time) on the chemical and functional properties (specific volume, crumb firmness and relative elasticity, pore properties, color, starch gelatinization) and digestibility of breads was investigated. Results showed that GF breads could benefit from the uniform rapid heating during processing, as these breads showed superior functional properties (specific volume, 2.86–3.44 cm3/g; relative elasticity, 45.05–56.83%; porosity, 35.17–40.92%) compared with conventional oven-baked GF bread (specific volume, 2.60 cm3/g; relative elasticity, 44.23%; porosity, 37.63%). In order to maximize bread expansion and the OH performance, it was found that the OH process could be improved by applying the electrical energy in three descending power steps: first step with high power input (in this study, 2–6 kW for 15 s), followed by 1 kW for 10 s, and 0.3 kW for 1–30 min. In total, ohmic baking only needed a few minutes to obtain a fully expanded GF bread. The determination of pasting properties and starch digestibility demonstrated that these breads were comparable or even superior to GF breads baked in a conventional baking oven. Electric shocks are used to heat gluten-free bread from the inside, saving energy and time compared to conventional baking applying heat from the outside. A recent study from the Institute of Food Technology of the University of Natural Resources and Life Sciences (BOKU), Vienna, was just published in Food and Bioprocess Technology. The researchers used a technology called Ohmic heating and adapted it to the production of gluten-free bread. First results show superior quality of the Ohmic bread while saving energy and time during the manufacturing process. The principle is well known from the light bulb: An electrical current passing through a wire heats it up until it glows. This is due to its electrical resistance and the Ohmic law leading to the dissipation of electrical energy into heat. The resistance of bread dough results in the same effect—it doesn't glow like a wire, but heats up and bakes. The researchers used this smart solution to make gluten-free bread that is challenging to bake conventionally. "The heat is generated instantaneously within the complete dough," explains Prof. Henry Jäger. "This is the main advantage of the Ohmic heating technology. Conventional baking in the oven requires more time, since the heat needs to penetrate from the outside toward the center of the dough." This slow heating is a major limitation for the manufacturing of gluten-free bread. Wheat protein, the gluten, which is usually responsible for the dough structure and its expansion, is missing in these products, so starch is substituted. Sufficient heating causes the starch to gelatinize and to contribute to the structure. However, a much larger portion of water is needed in the dough, which results in a lower viscosity and makes it thinner and more liquid. This is challenging for baking. The team around Prof. Jäger realized that the rapid and uniform heating of the whole dough mass is one of the major advantages obtained from Ohmic heating, particularly benefiting the production of gluten-free bread. "In order to really benefit from these advantages and obtain best results, the optimal process and product characteristics had to be identified," says Prof. Jäger. "Achieving such convincing results and improving the efficiency of the process at the same time was also surprising for us." The Ohmic bread showed excellent quality characteristics compared to conventionally baked products. The volume of the bread was 10 to 30 percent higher. The crumb was softer and more elastic, and the pores were smaller and more evenly distributed. But the team did not just rely on the physical characteristics of the bread, and looked also into nutritional aspects and digestibility. "Taking into consideration the short baking time during Ohmic heating, a negative impact on starch digestibility might occur," says Prof. Regine Schönlechner, senior author of the study. However, tests performed by in-vitro methods did not reveal any differences. The superior quality of the gluten free Ohmic bread was accompanied by savings of energy and time. The first trials indicate savings of around two-thirds compared to the energy needed for conventional baking. Also, the Ohmic baking needs much less time compared to conventional baking. In just a few minutes, the dough is converted into a ready-to-eat, gluten-free bread. Browning and crust formation do not occur, so the bread can be used directly for applications such as toast or tramezzini bread. If a crust is desired, it can be formed afterward in a controlled manner by infrared heating. Special equipment from the BOKU Core Facility Food & Bio Processing was used by the team for the development and optimization of this promising baking concept. In this study, it was used to identify the exact conditions that result in major benefits from the Ohmic heating to the baking of gluten-free bread. This was achieved by performing trials applying different combinations of electrical power input and duration of different baking steps. "At the end, the subsequent application of three different process intensities with different holding times proved to be the most suitable option," explains Prof. Jäger. "An initial baking step at two to six kiloWatts for 15 seconds followed by one kiloWatt for 10 seconds and a final baking at 0.3 kiloWatts for five minutes is the recipe for the successful production of gluten-free bread using Ohmic heating."
<urn:uuid:7a4894c3-a15e-46a0-bb28-58d40033484f>
CC-MAIN-2023-14
https://magazinebbm.com/blog/novel-approach-for-gluten-free-bread-baking-ohmic-heating-1505
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949181.44/warc/CC-MAIN-20230330101355-20230330131355-00358.warc.gz
en
0.958389
1,705
3.375
3
Network News Transfer Protocol (NNTP) Posted on | Network News Transfer Protocol (NNTP) We are by nature both highly social and creative animals, and as a result, we are always finding new ways to communicate. It did not take long after computers were first connected together for it to be recognized that those interconnections provided the means to link together people as well. The desire to use computers to create an online community led to the creation of Usenet more than two decades ago. Usenet started out as an informal network of UNIX computers. Usenet communication consists of four basic steps. A message is first composed and then posted to the originator’s local server. The third step is propagation, where the message is transmitted from its original server to others on the Usenet system. The last step in the process is article retrieval, where other members of the newsgroup access and read the article. The Network News Transfer Protocol (NNTP) is the technology used for moving Usenet articles from one host to the next. NNTP is similar to the Simple Mail Transfer Protocol (SMTP) in many ways, including its basic operation and command set and reply format. The Network News Transfer Protocol (NNTP) is the protocol used to implement message communication in modern Usenet. It is used for two primary purposes: to propagate messages between NNTP servers and to permit NNTP clients to post and read articles. It is a stand-alone protocol but shares many characteristics with email’s Simple Mail Transfer Protocol (SMTP). NNTP Overview and General Operation As we know, Usenet started out as an informal network of UNIX computers using dial-up UUCP connections to transmit messages between servers. This arrangement arose out of necessity, and it worked fairly well, though it had a number of problems. Once the Internet became widely used in the 1980s, it provided the ideal opportunity for a more efficient means of distributing Usenet articles. NNTP was developed as a special TCP/IP protocol for sending these messages. Now NNTP carries billions of copies of Usenet messages from computer to computer every day. Usenet began as a logical inter-network of cooperating hosts that contacted each other directly. In the early Usenet, a user would post a message to a local server, where it would stay until that server either contacted or was contacted by another server. The message would then be transferred to the new server, where it would stay until the second server contacted the third one, and so on. This transport mechanism was functional but seriously flawed in a number of ways. Servers were not continually connected to each other; they could communicate only by making a telephone call using an analog modem. Thus, messages would often sit for hours before they could be propagated. Modems in those days were also very slow as compared to today’s standards, so it took a long time to copy a message from one server to another. Worst of all, unless two sites were in the same city, these phone calls were long distance, making them quite expensive. Why was this system used despite all of these problems? The answer is simply because there was no alternative. In the late 1970s and early 1980s, there was no Internet as we know it, and no other physical infrastructure existed to link Usenet sites together. It was either use UUCP over telephone lines or nothing. That all changed as the fledgling ARPAnet grew into the modern Internet. As the Internet expanded, more and more sites connected to it, including many sites that were participating in Usenet. Once both sites in an exchange were on the Internet, it was an easy decision to use the Internet to send Usenet articles, rather than relying on slow, expensive phone calls. Over time, more and more Usenet sites joined the Internet, and it became clear that just as email had moved from UUCP to the TCP/IP Internet, the future of Usenet was on the Internet as well. The shifting of Usenet from UUCP connections to TCP/IP inter-networking meant that some rethinking was required as to how Usenet articles were moved from server to server. On the Internet, Usenet was just one of many applications, and the transfer of messages had to be structured using TCP or the User Datagram Protocol (UDP). Thus, like other applications, Usenet required an application-level protocol to describe how to carry Usenet traffic over TCP/IP. Just as Usenet had borrowed its message format from email’s RFC 822, it made sense to model its message delivery protocol on the one used by email: SMTP. The result was the creation of NNTP, published as RFC 977 in February 1986. The general operation of NNTP is indeed very similar to that of SMTP. NNTP uses TCP, with servers listening on well-known TCP port 119 for incoming connections, either from client hosts or other NNTP servers. As in SMTP, when two servers communicate using NNTP, the one that initiates the connection plays the role of client for that exchange. After a connection is established, communication takes the form of commands sent by the client to the server and replies returned from the server to the client device. NNTP commands are sent as plain ASCII text, just like those used by SMTP, the File Transfer Protocol (FTP), the Hypertext Transfer Protocol (HTTP), and other protocols. NNTP responses take the form of three-digit reply codes as well as descriptive text, again just like SMTP (which, in turn, borrowed this concept from FTP). NNTP was designed to be a comprehensive vehicle for transporting Usenet messages. It is most often considered as a delivery protocol for moving Usenet articles from one server to another, but it is also used for connections from client hosts to Usenet servers for posting and reading messages. Thus, the NNTP command set is quite extensive and includes commands to handle communications between servers and between clients and servers. For message propagation, a set of commands allows a server to request new articles from another server or to send new articles to another server. For message posting and access, commands allow a client to request lists of new newsgroups and messages, and to retrieve messages for display to a user. The commands defined in RFC 977 were the only official ones for over a decade. However, even as early as the late 1980s, implementers of NNTP server and client software were adding new commands and features to make NNTP both more efficient and useful to users. These NNTP extensions were eventually documented in RFC 2980, published in 2000. NNTP is used for all of the transfer steps in the modern Usenet communication process. However, NNTP is most often associated with the process of Usenet article propagation. This is arguably the most important function of NNTP: providing an efficient means of moving large volumes of Usenet articles from one server to another. It is thus a sensible place to start looking at the protocol. NNTP Interserver Communication Process: News Article Propagation The Usenet Server Structure In theory, all that is required of the Usenet structure is that each site bisconnected to at least one other site in some form. The logical network could be amorphous and without any formal structure at all, as long as every site could form a path through some sequence of intermediate servers to each other one. However, the modern Usenet is very large, with thousands of servers and gigabytes of articles being posted every day. This calls for a more organized structure for distributing news. For this reason, the modern Usenet logical network is structured loosely in a hierarchy. A few large Internet service providers (ISPs) and big companies with high-speed Internet connections and large servers are considered to be at the top of the hierarchy, in what is sometimes called the Usenet backbone. Smaller organizations connect to the servers run by these large organizations; these organizations are considered to be downstream from the backbone groups. In turn, still smaller organizations may connect further downstream from the ones connected to the large organizations. This hierarchical structure means that most Usenet servers maintain a direct connection only to their upstream neighbor and to any downstream sites to which they provide service. A server is said to receive a news feed from its upstream connection since that is the place from which it will receive most of its news articles. It then provides a news feed to all the servers downstream from it. As an example, suppose Company A runs a large Usenet server called Large news that is connected to the backbone. Downstream from this server is the NNTP server Medium news. That server provides service to the server named Small news. If a user posts an article to Medium news, it will be placed on that server immediately. That server will send the article downstream, to Small news, so that it can be read by that server’s users. The medium news will also, at some point, send the article to the Large news. From Large news, the message will be distributed to other backbone sites, which will pass the message down to their own downstream sites. In this way, all sites eventually get a copy of the message, even though Medium news needs to connect directly to only two other servers. The term used to describe how news is propagated with NNTP is flooding. This is because of the way that a message begins in one server and floods outward from it, eventually reaching the backbone sites, and then going down all the downstream “rivers” to reach every site on Usenet. Even though I described the logical Usenet network as a hierarchy, it is not a strict hierarchy. For redundancy, many NNTP servers maintain connections to multiple other servers to ensure that news propagates quickly. The transmission of articles can be controlled by looking at message IDs to avoid duplication of messages that may be received simultaneously by one server from more than one neighbor. Basic NNTP Propagation Methods Now let’s look at how messages are actually propagated between servers using NNTP. There are two techniques by which this can be done: - In the push model, as soon as a server receives a new message, it immediately tells its upstream and downstream neighbors about the message and asks them if they want a copy of it. - In the pull model, servers do not offer new articles to their neighbors. The neighboring servers must ask for a list of new messages if they want to see what has arrived since the last connection was established, and then request that the new messages be sent to them.Both techniques have advantages and disadvantages, but pushing is the model most commonly used today. Books you may interested
<urn:uuid:f3b2f1c4-fe43-450d-a405-c400477dece9>
CC-MAIN-2023-14
https://sanmati4.com/network-news-transfer-protocol-nntp/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00358.warc.gz
en
0.964543
2,252
3.625
4
Water: The Key to the Working of Herod's Temple Updated: Oct 12, 2022 Painting of William Simpson from 1870 showing the largest cistern under the Temple Mount. Water was an essential need for operations of the Temple in Jerusalem. Priests needed to be cleansed daily. The blood from sacrifices needed to be washed from around the altar. On feasts days a lot of water was needed to wash away a lot of blood. Given the Mediterranean climate and months without rain, water could not be guaranteed on any given day, and so needed to be stored. The most common way to do this in the region was by use of cisterns, which would receive rain runoff from the surface and hold it underground for later use. It turned out the Temple Mount was a great terrain for cisterns. Not only was the limestone rock soft enough for carving out openings, but a few natural caves already existed underground that could be enhanced for water storage. Not all cistern water was useful at a temple though. Sanctification water for purification was required to be “living” water—moving water—such as that issuing from a spring in the ground. It could not be simply pulled from a cistern where it might have sat for days and become contaminated. To this end the Gihon Spring became a center for priests to be washed, as it was the only reliable spring within miles. Purification at the Gihon Spring, though, required an uphill trip afterward to the Temple—and many Jews made this inconvenient trip over the centuries. To supply this demand for water at the Temple, aqueducts were constructed to bring water on a continual basis the ten or more miles from Bethlehem to Jerusalem. The open cisterns there collecting water from the mountain rains are called Solomon’s Pools, after the tradition of their original builder. Although the stonework and of the remaining aqueduct sections point to a Hasmonean construction in the 2nd century BCE and Roman improvements during their rule. Two aqueducts can be traced to Jerusalem—an “upper” and a “lower”—the latter which ended at the Temple Mount on the bridge atop of Wilson’ Arch. Charles Wilson and Charles Warren were charged with surveying the water resources of Jerusalem in the mid-1860’s (see earlier blogs), and this gave them the opportunity to investigate all the cisterns they could find on the Temple Mount. See the map Wilson constructed below. Over thirty cisterns and subterranean tanks were found of all different shapes and sizes. The largest, called the “Great Sea” for its sheer size, shown above, is believed to hold up to 3 million gallons (over 4 Olympic-sized swimming pools). It is cistern number 8 in the southern part of Wilson’s map below. It appears to be a natural cave excavated further for water storage, with rock pillars left for support. There have also been reported visible connections there at its roof to the surface platform. Today it lies directly in front of the Al-Aqsa Mosque. It was hard for me to imagine standing at that place last year that there was such an enormous cavern present out of sight under my feet. An important detail to note is that if one locates Herod’s Temple Sanctuary in the SW corner of the Mount today, that its eastern section falls directly over the Great Sea and the smaller cistern number 9 to its south. The positioning of these cisterns is additional evidence for the location of Herod’s Temple being exactly as that discussed in my previous blogs. The Talmud speaks of a water wheel the priests had in use in the Second Temple to bring water to the surface every morning from a major cistern directly below the Temple—water that was delivered by an underground conduit from the aqueduct and kept moving in and out of the cisterns so to remain “living”. Water wheel technology at the time was typically a number of small buckets tied to a long rope that hung over a vertical wheel down into the cistern below the water line. Turning of gears at the surface continually brought water up from the cistern via the string of buckets. Today the Al-Kas fountain also exists within the past Temple Sanctuary grounds, and it is exactly on a line between the end of the aqueduct and the Great Sea. It is the open circle on Wilson’s map at the end of the diagonal line. It is interesting to speculate if the Muslims did not make use of an existing vertical shaft that intersected water being delivered to the Great Sea. This could be another potential location within the Temple where “living” water might have been extracted from below. It is certainly delivering water there today for visitors to cleanse themselves with. See photo at the end. 1864 Map of Charles Wilson of cisterns beneath the Temple Mount. The Al-Kas fountain today on the Temple Mount. Note the seats all around where worshippers can sit and cleanse themselves with the water from each spigot opposite the seat. Cry For Jerusalem is a series of historical fiction books covering the seven years leading up to the burning of Herod’s Temple and the Siege of Jerusalem in 70 CE. Author Ward Sanford gives this period of history new depth in Cry For Jerusalem and showcasing the works of eyewitness historian Flavius Josephus in a new way with this fictional yet fact-based dramatization. In the CFJ blog section Ward covers subjects to do with the vast amount of research that went into the CFJ novel series, including Ancient Jerusalem, the Roman Empire, and Biblical topics and the writings of Josephus. To learn more about the series and purchase click here or more about the history behind the series click here.
<urn:uuid:72677a26-0da3-452b-a001-60ae25b2f8b7>
CC-MAIN-2023-14
https://www.cryforjerusalem.com/post/water-herods-temple
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00358.warc.gz
en
0.95987
1,192
3.859375
4
- The Western Monarch butterfly population has reached its highest number since the year 2000, with more than 335,000 butterflies counted during the annual Thanksgiving Western Monarch Count in California and Arizona. - Western monarchs winter in California and migrate thousands of miles each year, in a migration cycle that takes three to four generations. They are counted annually by volunteers at these sites. - The population rebound is a welcome development, but the species is still considered endangered and far from its population numbers in the 1980s, when millions of butterflies could be seen in the trees. - Conservation efforts include protecting wintering sites, planting native plants, reducing pesticide use, and supporting conservation initiatives; the public can also participate in community science projects and make simple changes to their gardens and communities. The western monarch butterfly population hit its highest number since the year 2000, with more than 335,000 butterflies counted at their wintering sites in California and Arizona during the 26th annual Thanksgiving western monarch count. “We can all celebrate this count,” Emma Pelton, a conservation biologist at the Xerces Society and leader of the Western Monarch, said in a news release. “A second consecutive year of relatively good numbers gives us hope that there is still time to act to save Western migration.” More than 250 people took part in the 2022 Western Monarch Count, in which they surveyed sites along the California coast and a few others in interior California and Arizona in November and December. Volunteers counted groups of monarchs as they gathered to spend the winter in groves of trees, often made up of non-native eucalyptus species. Monarch butterflies congregate in treetops for protection during the winter. Overwintering sites must provide particular combinations of protection from harsh weather, dappled sun and nectar. This cluster is located in Pacific Grove, California. Xerxes. Photo by Isis Howard / Xerces Society. The largest gathering of butterflies, 34,180 individuals, took place on a private site in Santa Barbara County, California. Santa Barbara, Ventura and San Luis Obispo counties have sites that are home to more than 20,000 butterflies. The San Francisco Bay area has also seen a dramatic increase in recent years, with approximately 9,000 individuals found. Some publicly accessible sites in California where the public can view the monarchs gathering include Pismo Butterfly Grove in San Luis Obispo County, Pacific Grove Sanctuary in Monterey County, and Natural Bridges in Santa Cruz County. While this population rebounded from fewer than 2,000 counted in 2020 to over 335,000 in 2022 is welcome news, scientists estimate we are still more than 90% down from historical numbers in the 1980s and early 1990s. when millions of monarchs filled the wintering grounds in California. “We know we still have a long way to go to achieve population recovery,” Pelton said, “and the storms that hit soon after mean we’ll start spring with much, much less than this total.” Graph showing the size of the overwintering monarch butterfly population in California from 1997 to 2022 (green bars). The graph also shows the number of sites visited each year (blue line). Image from the Society of Xerces. Scientists don’t know exactly why we’ve seen a rise in numbers over the past couple of years. But, Pelton said, butterfly numbers, like many other insect populations, fluctuate from year to year in response to temperature, rainfall and food availability. The iconic monarch butterfly has been listed as endangered by the International Union for Conservation of Nature (IUCN), a global authority on the species’ conservation status. An endangered listing means that the species is likely to become extinct without significant intervention. Monarchs meet the criteria to be listed under the US Endangered Species Act, which would ensure the protection of butterflies and their habitats, but the US Fish and Wildlife Service announced in December 2020 that the species would not be listed. listed, stating that other species are a higher priority. “Unfortunately, there continues to be very little protection for the species or its habitat. Overwintering sites in particular continue to be destroyed and damaged every year,” said Isis Howard, conservation biologist at the Xerces Society and coordinator of the count. A monarch butterfly (Danaus plexippus). Image by John Banks via Pexels (Public Domain). Just after the Thanksgiving count ended, the California coast was hit by extremely intense rain events known as atmospheric rivers, resulting in flooding, falling limbs, and uprooted trees. Some wintering sites were unaffected, but volunteers from others reported an increase in the number of monarch butterflies that were lying on the ground and being blown off their clusters by severe weather, making them more susceptible to cold, wet conditions and predation. “Small populations are especially vulnerable to being suffocated by extreme weather, so we’re lucky these storms occurred in a relatively good year,” Pelton said. “We don’t want to rely on luck alone to ensure the survival of the migration of Western monarchs.” There are two populations of migratory monarch butterflies in North America, both famous for their impressive overland journeys extending up to 6,400 kilometers (4,000 miles). Eastern Monarchs spend the winter in Mexico, while Western Monarchs winter in California. In spring, all monarchs migrate north, some as far as Canada. This migratory cycle covers thousands of kilometers and takes three or four generations. Monarch population estimates are taken at these wintering grounds. A map showing migration patterns of the monarch butterfly in North America. Monarchs winter along the California coast or in central Mexico (both areas are shown in red). From those areas they spread northward during the spring and summer to breed on milkweed, before the last generation of the summer travel to their wintering grounds. South Florida is colored purple to indicate that this is an area where monarchs do not migrate, but live year-round. Image courtesy of the Xerces Company. Conservationists say we need to put more effort into protecting existing wintering sites and making them more resilient to the impacts of climate change. This can be achieved by replacing dead or dying trees, designing sites to prevent or reduce flooding, and growing native plants as nectar sources. “The fact is, if we lose wintering sites in California, we could lose migratory western monarchs,” Howard said. “Development, eucalyptus removal and tree felling need to be managed carefully if we are to make room for these animals to survive.” After leaving their wintering sites, western monarch butterflies depend on finding suitable habitat and protecting breeding grounds in multiple western states. Gardeners, park managers, schools, and others can play a role in the recovery of the western monarch population by making simple but effective changes, such as: “So many people and organizations have come together to try and protect this butterfly and its habitats. From planting native milkweed and reducing pesticide use to supporting the protection of overwintering sites and contributing to community science, we all have a role to play in ensuring this iconic insect makes a full recovery,” said Anna Walker, a member of the IUCN Species Survival Commission Butterfly and Moth Specialist Group who led the IUCN Monarch Butterfly Assessment. “It’s hard to watch monarch butterflies and their extraordinary migration teeter on the brink of collapse,” she added, “but there are signs of hope.” Monarch caterpillars feed on milkweed plants. Photo by Bernard Spragg. New Zealand via Flickr. Public domain. Image of the flag of Monarchs Clustering on Monterey Pine in California. Photo courtesy of Photo courtesy of Carly Voight / Xerces Society. Liz Kimbrough is a staff writer for Mongabay. Find her on Twitter @lizkimbrough Again from this reporter: Monarch butterflies are officially endangered REPLY: Use this form to send a message to the author of this post. If you want to post a public comment, you can do so at the bottom of the page.
<urn:uuid:3f448444-820e-477c-9b17-d9c0c591977c>
CC-MAIN-2023-14
https://hinterlandgazette.com/western-monarch-populations-reach-highest-numbers-in-decades/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00358.warc.gz
en
0.935457
1,692
3.5
4
Every laptop, whether a PC, Mac or Unix/Linux machine, goes through what is called "booting." When first started, the laptop goes through a series of tests to ensure that its hardware is operational. Additionally, information specific to the operating system is loaded, with the end result being a computer that is ready for use. On occasion a laptop might get stuck in a booting loop, where during boot-up it starts over without completing the entire process. There are a number of reasons why this may occur. Check to see if there are any keys stuck/depressed. If so, use a paperclip and fit it underneath the key and gently pry the end that is stuck. Make sure the laptop is off before attempting this. Video of the Day Observe where the boot process ends and starts over. In most cases, this will give an indication where the problem occurs. If the laptop reboots early on in the process, for example when it is detecting the hard drive, chances are good it is a hardware issue. If the reboot occurs further along in the process, like when it is loading operating system files, there may be an issue with operating system software. Boot in safe mode or the operating system equivalent. Windows, Unix/Linux and Mac operating systems have a mode that will load the minimum software needed to boot. This is a standard approach in troubleshooting, as it only supports the minimum hardware needed to complete the boot into the operating system. Once you are logged into the computer, device drivers can be updated, software removed and so forth. To boot into safe mode in Windows, hit the "F8" key when the computer first starts up to get a submenu. From there select a boot option. Many choose "Safe mode with command prompt" as this will go line by line through the boot process, allowing you to isolate where the problem might be. To boot into a different run level in Unix/Linux, it depends on the version of Unix/Linux, but most have the option of a "recovery mode." During boot hit the "Esc" or "E" key and select the mode appropriate such as "drop to root shell," etc. If you have the ability to get into command shell, enter into run level 1 (single user mode) by typing in "init 1." To start in safe boot on a Macintosh laptop, hold the "Shift" key as it boots up. This forces a disk check and loads minimal software in efforts to complete the boot process, much like the other operating system's "safe modes." Check to see if your laptop is overheating. Laptops have a greater likelihood of overheating than desktops. Either touch the laptop or download an application such as MobileMeter to check laptop temperature. If it is running hot, try using canned air to clear out of vents, etc. Also, elevating the laptop off of its resting surface allows greater airflow in and out of the laptop.
<urn:uuid:1379a00f-ae29-4327-ac0e-44db8227e34f>
CC-MAIN-2023-14
https://www.techwalla.com/articles/how-to-fix-a-laptop-caught-in-a-booting-loop
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943637.3/warc/CC-MAIN-20230321064400-20230321094400-00558.warc.gz
en
0.920221
622
2.640625
3
This health crisis does not exist in a vacuum, but rather in a world that was already suffering from many other social and economic plights- including structural racism, an extractive economy, and climate change. Layered on top of people who were already struggling to navigate through these oppressive systems, COVID19 becomes a threat multiplier. Undocumented workers, pregnant women of color, incarcerated people, and people living in poverty are just a few of the groups who’s livelihoods are more at risk now due to the global outbreak of the Corona Virus. We need to pay close attention to the analysis and data being presented on who’s being most affected by this health crisis and in what ways, so that when we rebuild a post-virus economy we do it right by centering those most vulnerable in our solutions and strive to achieve environmental, racial and economic justice. Perhaps given the racial histories of this country, it is not surprising for many of us that the burden of this outbreak is falling mainly on our own Black and Brown communities. A recent article in the Hartford Courant reported that at one of his daily press briefings, Gov. Ned Lamont shared data showing that Black people have been nearly twice as likely as whites to contract the coronavirus, while Hispanic people have been more than one-and-a-half times as likely. To understand the complexity behind these health disparities, we have to lay out the structures that have been built to prevent Black and Brown people from living in safe environments and from having control over their health. Employment discrimination, housing discrimination, redlining, food apartheid, mass incarceration, environmental injustices and conscious or subconscious discrimination in medical treatment pose as examples of structures that makes it more likely for us to have health issues like asthma or diabetes and sever our ability to navigate a health crisis like COVID19. Not only are we navigating both the health and economic effects of this crisis but we are also the ones bearing the burden of fossil fuel and other hazardous air pollution, making us more vulnerable to COVID health complications. A recent article in the New York Times discusses how: “In three of the states with the highest number of Covid-19 cases — Illinois, Michigan and Louisiana — African-Americans made up 40 to 70 percent of deaths from the disease, far outpacing the percentage of black people in each state. Many of the black communities ravaged by Covid-19 are “front-line communities” — where residents live adjacent to heavily polluting industries.” – Rhiana Gunn-Wright, New York Times Opinion And from this 2017 National NAACP Study we know that Black people are 75% more likely to live near industrial facilities than the average American is, as oil, gas and petrochemical industries have concentrated heavily in low-income, majority-black-and-brown areas that black people. The oil and natural gas industries violate the Environmental Protection Agency’s (EPA) air quality standards for ozone smog due to natural gas emissions in many African American communities, causing over 138,000 asthma attacks among school children and over 100,000 missed school days each year. And while there has been inconclusive data on Asthma being a top risk factor to COVID, there is this early study from Harvard University causing an uproar in Washington as it links dirty air to the worst coronavirus outcomes. There is also this article in the NYTimes which notes that “it is well known that viral infections are the No. 1 cause of asthma flares in both children and adults under normal conditions”. Furthermore, scientists are saying that pandemics like COVID19 might be more likely to occur if our climate changes drastically: “Warming and changing weather patterns shift the vectors and spread of disease. Heavily polluting industries also contribute to disease transmission. Studies have linked factory farming — one of the largest sources of methane emissions — to faster-mutating, more virulent pathogens [Rebecca Thiele, PBS]”. We need to better hold our government accountable to both preparing for and mitigating climate change so that the exacerbation of these already existing disparities and suffering can be limited. The rhetoric that it is “opportunistic” for us to address more than one problem at a time needs to end. For many of us, seeing the ways that our society has become less individualistic as it creates solutions to help aid those most impacted this virus has been refreshing and inspiring. We’re seeing now that we can solve some of the toughest problems when we work together. But we can’t stop there. Taking inspiration from a talk given by Naimoi Kelin, “This is a moment that must revolutionize us. We need to be bold in thinking about ways to keep people safe and healthy”. And to do that we need to center our solutions in racial justice, climate justice, and economic justice.
<urn:uuid:6ecf7e9b-6e36-4222-a955-8c1f389fafc3>
CC-MAIN-2023-14
https://ctclimateandjobs.org/covid-climate-and-environmental-health/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00558.warc.gz
en
0.957213
1,005
2.71875
3
In the past, World Heritage Day has been celebrated on April 18th. The day is dedicated to all of those that have contributed or who are currently contributing to protecting and preserving cultural heritage around the world. This year’s celebrations fall in March because Easter falls on April 16th this year. The “importance of world heritage sites essay” is a 1000-word essay that discusses the importance of World Heritage Sites. You can find a 1000-word essay about World Heritage Day for students and children in this post. You will also learn about the significance and names of many World Heritage Sites in India. 1000-word essay for students and children on World Heritage Day Our world is a weird place with a lot of different things. Sites of historical and cultural significance should be conserved for future generations in many nations across the globe. These are retained on the heritage list. UNESCO has listed such natural, historical, and religious monuments as heritage sites. Every year on April 18, the globe commemorates World Heritage Day. The goal of commemorating this day is to raise public awareness about the significance of conservation and to entice them to visit such locations throughout the globe by providing information about them. Every year on April 18, this important day is commemorated in an attempt to conserve the world’s legacy. Our country is also rich in historical, religious, natural, and cultural items, memories, and locations. This world heritage site has drawn visitors from all over the globe. Every Indian citizen should be proud of his country’s historic sites and take measures to conserve them. On April 18, 1982, Tunisia became the first country in the world to commemorate World Heritage Day. The International Council of Monuments and Sites hosted the event. After that, in 1983, UNESCO agreed to commemorate it every year on April 18th. World Heritage Day’s Importance We commemorate World Heritage Day on April 18th. The goal of commemorating this day is to ensure that all historical, cultural, and natural landmarks relevant to human history be preserved, as well as to raise public awareness. UNESCO, a United Nations body with 193 member nations dedicated to the preservation of the world’s natural and social heritage, suggested an international convention. This proposal had been signed by twenty-one member nations. The first World Heritage Treaty proposal was made in 1972, and UNESCO included three lists of World Heritage Sites, which are as follows: - Site of Natural Interest - Site of cultural significance - Site with a Mixed Heritage On April 18, the globe celebrates World Heritage Day. The major goal of this event was to maintain three categories of history for future generations while also putting out persistent efforts in front of the globe. UNESCO has designated 1031 sites throughout the globe as World Heritage Sites as of 2015. The World Heritage Fund is given to these places by UNESCO. There are 802 cultural categories, 197 natural areas, and 32 mixed sites among these sites. World Heritage Day is observed to raise awareness of the world’s cultural treasures. India’s World Heritage Sites UNESCO maintains a list of such cultural sites in various nations across the globe. Italy has the most World Heritage Sites (51), making it the most populous country in the world. Apart from that, China has 48 and Spain has 44. Forty-one sites in France, forty in Germany, 33 in Mexico, and 32 in India have been added to the World Heritage List. The Agra Fort, Ajanta Caves, Sanchi Stupas, Champaner-Pandavgarh Bagh, Chhatrapati Shivaji Terminal, Old Goa Church, Elephanta Caves, Ellora Caves, Fatehpur Sikri, Chola Temples, Hampi Memorials, Mahabalipuram Monuments, Pattadakkal Memorials, Humayun’s Tomb, Kaziranga, Nandadevi and Valley Every nation has its own culture of civilisation. Which is passed down to each nation and state? It is distinguished from other countries by its culture and civilisation. Language, customs, philosophy of life, literature, fine arts heritage, and other factors distinguish one nation from another. Spiritual life philosophy, literature, fine arts, culture, and language are all found in India. India has a long and illustrious history. Millions of international visitors visit India each year to experience and comprehend its legacy, which has various penetration over the globe. Indian philosophy, spirituality, religious tolerance, unity in diversity, and historical history are some of the distinctive aspects of our nation that every Indian is proud of. India’s civilisation has a verified history of more than 5,000 years. Hundreds of foreign invading castes invaded and remained for such a long length of time. Except for India’s timeless heritage, no other ideology exists, and even if it does, it is equal. The ancient Hindu civilization in India was tolerant, and its effect may still be evident in the Indian population today. Some people in India currently follow Hinduism, Islam, Sikhism, Christianity, Buddhism, Jainism, Zoroastrianism, and Zoroastrianism. India’s Constitution has also incorporated the concept of secularism, which separates the state from religion. India is known as the “land of festivals” because it celebrates festivals for a whole year. The three national festivals of India are August 15, January 26, and Gandhi Jayanti. Apart from these, major holidays like as Holi, Diwali, Eid, Christmas, Lohri, Rakhi, and others are observed by people of all faiths to spread a message of brotherhood. India’s heritage includes several historically significant locations. Sites related with Gautam Buddha include Nalanda, Rajgir, Bodh Gaya, and Vaishali. Kurukshetra, Mathura, Varanasi, Prayag, Haridwar, Sarnath, Ayodhya, Khajuraho, Sanchi, Ajanta Ellora, Puri, and other historical sites in India include Kurukshetra, Mathura, Varanasi, Prayag, Haridwar, Sarnath, Ayodhya, Khajuraho, Khajuraho, Sanchi Thousands of international tourists visit India each year to see the country’s religious and historical attractions. Mughal architecture and fine arts have a unique character of their own. These include Agra’s Taj Mahal, Delhi’s Red Fort, and Qutub Minar, among others. Many government projects are in place at important locations such as the Anjata and Ellora caves in Maharashtra, Nalanda in Bihar, and Puri in Odisha. The rebirth of India’s sacred city of Kashi represents a watershed moment in the country’s cultural preservation efforts. Indian classical music has a unique position in the globe. Other song types, apart from conventional, include the following. Dhrupad, Dhamar, Khyal, Tarana, Thumri, Ghazal, Tappa, Hori, Bhajans, songs, folk songs, and other old Indian music genres include Dhrupad, Dhamar, Khyal, Tarana, Thumri, Ghazal, Tappa, Hori, Bhajans, songs, and folk songs. I hope you enjoyed my World Heritage Day Essay. “What does heritage mean to you essay” is a short essay about the meaning of heritage. Reference: what does heritage mean to you essay. Frequently Asked Questions What is Heritage Day essay? A: Heritage Day is a day that celebrates the achievements of Indigenous people in Canada, and educates non-Indigenous Canadians about their culture. What is the importance of World Heritage Day? A: World Heritage Day is a celebration held on October 16th of every year. Its purpose is to raise awareness for the UNESCO Convention, which was signed in 1972 and established that all nations must protect cultural sites from being exploited or destroyed by private entities. Why is cultural heritage important essay? A: Cultural heritage is important because it is an item that reflects the history of a country or culture. It gives individuals, as well as people and communities, some sense of identity and belonging. - speech on heritage - what is heritage - heritage celebration - cultural heritage - what is unesco
<urn:uuid:ea6201e7-16d6-4ec0-8268-cad0a0d3a40b>
CC-MAIN-2023-14
https://icfamwell.org/essay-on-world-heritage-day-for-students-children-1000-words/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00558.warc.gz
en
0.937926
1,759
3.46875
3
Where We Are In The Story - Week 26Ashley Chesnut To download the Bible reading plan that our faith family started on January 1st, visit this site. There is also a guide to personal worship that you can download from that site. If you haven’t been reading along thus far, no worries! Jump on in with the current day’s reading. Readings for This Week Deuteronomy 28:20-34:12, Joshua 1, and Psalm 119:25-122:9 Where We Are In The Story (Deuteronomy) Background of Deuteronomy: Deuteronomy picks up with Moses’ word from the Lord to the Israelites at Mount Horeb at the end of their forty years of wilderness wanderings.Deuteronomy presents the Law (much of what is in Exodus, Leviticus, and Numbers) in a preached format, and it contains three of Moses’ sermons to the people of Israel that both rehearse their history and instruct them in how they are to live as God’s people in the Land of Promise. While Moses wrote this book, the end of the Pentateuch (Genesis-Deuteronomy) has an unnamed author since Moses did not write about his own death in Deuteronomy 34. Structure of Deuteronomy: - Deuteronomy 1:1-4:49 reviews Israel’s history from Mt. Sinai through their wilderness wanderings. - Deuteronomy 5-28 rehearses God’s covenant with Israel and exhorts the people to keep the covenant. - Deuteronomy 29-30 records a renewal of the covenant between God and Israel. - Deuteronomy 31-34 reports Joshua’s succession of Moses, Joshua’s commission, a song of Moses, and the death of Moses. This Week in Deuteronomy: We pick up in Deuteronomy 28 with the curses God establishes for Israel should they disobey Him. These things later took place in the nation and resulted in the Assyrian Captivity (722 B.C.) and the Babylonian Captivity (587 B.C.). While the consequences of disobedience may appear harsh, they highlight the magnitude of the offense of infidelity to God, and while punishing the guilty, God offers grace and mercy when His people repent. All of this describes how Israel’s prosperity in the land stemmed from God’s provision and blessing, which hinged on the covenant faithfulness of the people. Deuteronomy 29 begins Moses’ third message in the book, and in Deuteronomy 29-30, he exhorts the people to “choose life” (30:19) by determining to love and obey God. He calls them to renew their commitment to God. In Deuteronomy 31, Moses commissions Joshua as his successor in leading the people, and he encourages the people of Israel to “be strong and courageous” and not to fear the people of the land because God would go with them and would not forsake them (31:6). Such encouragement was needed in light of the epic fail of the nation forty years earlier. Then Moses offers the same instruction specifically to Joshua in front of the nation as he takes over leadership of the people. God led Moses to write the words of the Law for the people to read them every Sabbath Year (31:9-13) as well as the words to a song of praise (31:30-32:43). During the Sabbath Year, the people were not to work the land, and instead, the proclaimed Law of the Lord was meant to remind them that God and His Word is their life and satisfaction. Deuteronomy 32 -34closes with God’s instructions to Moses regarding his death, Moses’ final blessings on Israel, and his death on Mount Nebo, in modern-day Jordan. From this mount, even today, one can see the Promised Land, the Dead Sea, and Jerusalem to the west. While prohibited from entering the land because of his own sin, God did permit Moses a panoramic view of the Promised Land that Israel would inherit. Where We Are In The Story (Joshua) Background of Joshua: While authorship of this book is unknown, the book’s name derives from the name of its main character, Joshua, who was Moses’ successor in leading the people of Israel. His name means “Yahweh delivers” or “Yahweh saves,” which is an apt title of the book since it describes God’s work in defeating the nations of the Promised Land and giving the land to His people. Joshua presents the fulfillment of God’s promises to Abraham, Isaac, and Jacob to give their descendants the land of Canaan, and it describes the military conquests that brought this to pass. Written as a historical book for Israel, Joshua also emphasizes God’s sovereignty, omnipotence, and faithfulness to His word, and Joshua 21:43-45 provides a fitting summary of God’s character as One who keeps all of His promises. Structure of Joshua: - Joshua 1-5 describes Israel’s preparations before taking the Promised Land. - Joshua 6-12 depicts the military conquests of the nation. - Joshua 13-21 explains the distribution of the land among the tribes, highlighting the fulfillment of God’s promises to His people. - Joshua 22-24 records Joshua’s final instructions and exhortations to the nation before his death. This Week in Joshua: Joshua 1 includes both God’s encouragement to Joshua as he prepared to lead the nation into the Promised Land as well as the nation’s affirmation of his leadership. While placing on him the responsibility of leading His people, God promised to be with Joshua, and no matter Joshua’s fears or skills, God’s promises His sufficiency. The linchpin of Joshua’s success and the nation’s triumph is found in God’s charge to Joshua verses 7-8 when God directs him to meditate on His law and to adhere to it. In the Old Testament era, meditation would have involved focusing upon God’s character, works, and words, and reminding one’s self of these things by reading or reciting them aloud. Inundating himself with God’s Word would be paramount for Joshua to lead effectively. Where We Are In The Story (Psalms) Background & Structure of Psalms: God used many different writers to write Psalms: David, Moses, the sons of Korah, Asaph, etc. The book is arranged in five parts, and this arrangement occurred after the people of Israel returned to the land after the Babylonian exile. A doxology concludes each book or arrangement of psalms (Psalm 41:13 for Book 1, Psalm 72:18-19 for Book 2, Psalm 89:52 for Book 3, Psalm 106:48 for Book 4, and Psalm 150:6 for Book 5), and the entire book of Psalms climactically ends with a grand doxology of several psalms (Ps. 146-150). - Book 1: Psalms 1-41 - Book 2: Psalms 42-72 - Book 3: Psalms 73-89 - Book 4: Psalms 90-106 - Book 5: Psalms 107-150 This Week in Psalms: - The longest psalm in the book, Psalm 119 consists of 176 verses that are arranged in twenty-two stanzas of eight verses with the stanzas arranged in alphabetical order and with every line of the stanza starting with that letter of the Hebrew alphabet. The entire psalm focuses on the subject of God’s law, and it includes many features of a wisdom psalm. - Psalm 120 begins a series of fifteen pilgrim psalms (Psalms 120-134) called the Songs of Ascent. As the Israelites traveled to Jerusalem for the yearly feasts (Passover, Pentecost, the Day of Atonement, and the Feast of Tabernacles), they sang these psalms as they journeyed. In light of this context, Psalm 120 contrasts the heathen who surround the pilgrim and records the traveler’s desire for peace and his prayers for God’s deliverance. - Psalm 121 proclaims the pilgrim’s trust in the Lord as he journeys. The psalmist reiterates the word “keep” six times in this short psalm, emphasizing God’s preservation of His people and His loving care for them. - The pilgrim would sing Psalm 122 upon his arrival in Jerusalem, and in this psalm, the psalmist calls for the people to pray for Jerusalem’s security and for peace.
<urn:uuid:d1a97bf9-31a4-45d5-8e03-5f2d6ea6c40e>
CC-MAIN-2023-14
https://www.brookhills.org/blog/where-we-are-in-the-story-week-26/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00558.warc.gz
en
0.935165
1,872
2.640625
3
Humankindness is powerful medicine. Healing can happen in many ways. One way is through the world-class medical and academic excellence that the health care professionals of St. Joseph Health are known for. But there is another way. Because you, too, hold the power to heal. We all do. An act of kindness, a moment of human connection, empathy for those who are hurt and vulnerable—all can have a tangible impact on the health of others. Less pain1. Lower blood pressure2. Faster recovery3. We see it happen every day. While medicine has the ability to cure, it’s our shared humanity that holds the power to heal the whole person: body, mind, and spirit. We call this power humankindness. And we believe it’s capable of changing not just health care, but the world in which we live. We are all caregivers at heart. Join us. - Pavel Goldstein et al., “Brain-to-Brain Coupling During Handholding Is Associated with Pain Reduction,” Proceedings of the National Academy of Sciences 115, no. 11 (2018): e2528–e2537. - Angier, Natalie. “The Biology Behind the Milk of Human Kindness.” The New York Times, The New York Times, 23 Nov. 2009, www.nytimes.com/2009/11/24/science/24angier.html?_r=1. - Janice K. Kiecolt-Glaser et al., “Hostile Marital Interactions, Proinflammatory Cytokine Production, and Wound Healing,” Archives of General Psychiatry 62, no. 12 (2005): 1377–84. Healing begins with human connection. Humankindness has the power to change the world, and we start by championing the healer within each of us. Let us know the areas in which you could use some encouragement and support.
<urn:uuid:bd773af8-1747-4559-a34a-9175c1705698>
CC-MAIN-2023-14
https://locations-sjh.stlukeshealth.org/humankindness
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00558.warc.gz
en
0.883145
412
2.515625
3
Corn Silage in Backgrounding Diets This article written by Dr. Reynold Bergen, BCRC Science Director, originally appeared in the June 2019 issue of Canadian Cattlemen magazine and is reprinted on the BCRC Blog with permission of the publisher. Recent columns indicated that corn’s potential to produce 50% higher silage (and starch) yields than barley may offset its 30% higher growing costs, provided the right corn hybrid is selected for the local growing conditions, and provided growing conditions cooperate. The higher starch content of corn silage also means that feedlot diets may need to be re-examined. If corn silage is supplying more starch to the diet, perhaps backgrounding diets can feed less barley grain, or maybe cattle can be backgrounded to heavier weights with a shorter grain finishing period, provided growth rates, feed conversion and carcass grade aren’t adversely affected. Karen Beauchemin of Agriculture and Agri-Food Canada (Lethbridge) recently published a Beef Cluster study examining whether replacing barley grain with corn silage in backgrounding diets impacted animal performance and carcass characteristics (Effects of feeding corn silage from short-season hybrids and extending the backgrounding period on production performance and carcass traits of beef cattle, doi:10.1093/jas/sky099). What They Did: Barley and a 2175 corn heat unit (CHU) hybrid corn were seeded near Lethbridge in May 2014 (last 8-year average 2200 CHU). Barley was silaged in July at the soft dough stage. Corn was harvested before the first frost in September. 160 crossbred steers (644lb) were fed one of four backgrounding diets in a small pen study (10 head per pen, 4 pens per backgrounding diet). The experimental backgrounding diets contained (dry matter basis) 60% barley silage or 60% corn silage (40% barley grain-based concentrate), 75% corn silage (25% concentrate) or 90% corn silage (10% concentrate). The silages had very similar particle lengths, barley grain was dry-rolled (processing index = 82%) and all diets contained 13.5% protein. Two pens of each diet were backgrounded to an average weight of 840lbs, and two pens were backgrounded to an average weight of 950lbs. Cattle were fed once daily, and all diets contained Rumensin but not Tylan. Feed left in the bunk was sampled periodically to assess particle size and nutritional value, and steers were weighed every three weeks. All steers were finished on the same diet (91% barley-based concentrate, 9% corn silage; dry matter basis) to an average pen weight of 1544lbs. Carcass data and liver scores were collected. What They Learned: Backgrounding performance: Barley silage-fed steers ate the most and grew the fastest, and steers fed 90% corn silage ate the least and grew the slowest, but these differences weren’t great enough to substantially impact feed efficiency or the number of days to reach the target backgrounding end weight. The proportion of leftover feed particles longer than 8mm increased from 51% to 75% as the level of corn silage in the diet increased from 0 to 75%. This suggests that steers fed higher levels of corn silage were avoiding some of the dietary fiber. In contrast, the proportion of fine particles (shorter than 8mm) fell from 49% to 25% as the level of corn silage increased. This suggests that the steers on the barley silage diet were leaving behind some of the starch. Finishing performance: Because they weighed more, steers backgrounded to 950lbs had higher daily feed intakes during the finishing period than steers backgrounded to 840lbs. Aside from that, backgrounding diet (silage type or level) and duration (backgrounded to 840 vs. 950lbs) did not affect growth rate, feed intake or feed efficiency during the finishing period. Total days to slaughter and total feed consumption did not differ among backgrounding diet or duration groups. Carcass characteristics: Steers backgrounded to lighter weights on the 75% corn silage diets were fatter than the steers from any of the other backgrounding diet – weight combinations. This is hard to explain and may have been a chance result. There were no other differences among backgrounding diets or duration in terms of carcass weight, ribeye area or quality grade. Liver abscess scores were not affected by backgrounding diet or duration. What it Means: These results were somewhat unexpected. The researchers had expected better performance from the steers fed the corn silage diets, because corn silage usually contains much more starch than barley silage. But in this case the corn silage contained slightly less starch than usual (28% instead of 30% or more), and the barley silage contained more starch than usual (24% instead of 22% or less). This likely clouded the potential treatment differences. These results are an important reminder of a few basic principles for both cow-calf and backgrounding operations. Growing conditions affect silage quality, especially for corn. On average, corn produces higher energy silage than barley. But very few years are average, and long-term averages can provide a false sense of security. In fact, actual CHUs in Lethbridge have only been “average” in one out of the past eight years, so test your feed! Unexpectedly high-quality feed containing more nutrients than your class of cattle require can be stretched farther by diluting it with lower quality feed. On the other hand, a disappointingly poor feed test result can tell you what nutrients need to be supplemented. There are decision making tools on http://www.beefresearch.ca to help you do this. The Beef Research Cluster is funded by the Canadian Beef Cattle Check-Off and Agriculture and Agri-Food Canada with additional contributions from provincial beef industry groups and governments to advance research and technology transfer supporting the Canadian beef industry’s vision to be recognized as a preferred supplier of healthy, high quality beef, cattle and genetics. Click here to subscribe to the BCRC Blog and receive email notifications when new content is posted. The sharing or reprinting of BCRC Blog articles is typically welcome and encouraged, however this article requires permission of the original publisher. We welcome your questions, comments and suggestions. Contact us directly or generate public discussion by posting your thoughts below.
<urn:uuid:6ce2ca13-0bbf-49b8-860b-1fd795148e4b>
CC-MAIN-2023-14
https://www.beefresearch.ca/blog/corn-silage-in-backgrounding-diets/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00558.warc.gz
en
0.94386
1,340
2.59375
3
Follow Up From The Scuba News Canada’s Article from Mike McAllister In the deep and dark waters at the bottom of Lake Ontario off Prince Edward County Ontario, lies a mystery. In 2020 & 2022 after years of research, and a licence to Carry Out Marine Archaeological Fieldwork obtained by Derek Niles of Orange Force Marine, from the Government of Ontario, several sonar surveys were conducted by the Canadian Harvard Aircraft Recovery Team using the advanced underwater equipment of Shark Marine Technologies Inc. with the aim of finding a lost WWII era fighter aircraft and locating the final resting place of it’s pilot. Interesting objects were seen on the bottom in the sonar data obtained from an Autonomous Underwater Vehicle, called an Iver, this AUV which resembles a small torpedo, also towed a proton magnetometer in it’s programmed search pattern. The sonar unit emits sound pulses which return to the unit and are then visually represented. This works because signals bouncing off a near object take less time to return than signals from the lakebed do, thus allowing the software in the sonar unit to form an image using the time difference that it takes the signal to return. The magnetometer shows ferrous metal anomalies, which may be concealed from sight under the lake bed. The AUV after being launched from the boat conducts a grid search pattern by taking a GPS reading at the surface and descending to search depth where it proceeds in a straight line gathering sonar data, then ascending to the surface to get another GPS reading before it returns to depth to run the next line of the grid. The operator can send signals by sound from a transmitter on the boat to tell the AUV to change it’s depth or to run a different program. Flying Officer Barry Allen Newman was 23 years old on June 10 1952, when he climbed into the cockpit of P-51 Mustang #9555 at the Royal Canadian Airforce’s Unit No.1 Flying Training School, Trenton Ontario, to perform high altitude flight tests. Newman had been born in Carman Manitoba, and had moved to Grimsby Ontario with his parents Frederic and Bernice. The aircraft that Newman was flying that day, was a P-51 D Mustang built by North American Aviation. Powered by a Rolls Royce designed Merlin V12 engine built in Detroit by the Packard Motor Company, and carrying three Browning 50 caliber Machine guns in each wing, these fighters were used by Allied forces in both air combat and ground attack roles in WWII. The flight test instructions for that day indicated that the aircraft was to be flown to 34,000 ft. It was equipped with an oxygen supply system for the pilot, as oxygen is required anywhere above 10,000 ft to prevent a pilot from losing consciousness due to hypoxia (oxygen starvation). Although the system had been checked and found to be working by Newman and a member of the ground crew, faults had previously been discovered in the oxygen systems of other P-51 Mustangs. The plane was first noticed by onlookers on the ground when it began to leave condensation trails while turning at somewhere above 24,000 ft. In the words of witness Mel McIntosh :: “While I was watching he started a circle to the left and very nearly completed it when he made a very sharp little turn to the left. At this point he started to come down. As I continued to watch the vapour trails I did not observe the aircraft for a short time. When I next saw it, it was still very high and was spinning or spiraling down at a very high speed and increasing. There was a terrific noise increasing to a high pitched whine as he came down. He continued like this until I estimate two thousand feet when the plane partially leveled off. The wing or part of it came off and then I heard a heavy explosion. At this time the aircraft engine made a much louder noise. The heaviest part of the aircraft disappeared behind the trees followed shortly by the wing.” (part of witness sworn statement) Within days of the accident, hard hat divers had recovered most of the port wing, the propeller and some other small parts of the plane, but the engine, cockpit and fuselage along with the body of Flying Officer Newman had not been found. Following the granting of a search licence to dive on the targets seen on sonar, from the Ontario Ministry of Heritage, a diving search weekend was planned. (Divers are not allowed to touch anything and the Government must be kept fully informed or consequences are severe) Paul Darnbrough arranged with Helen Cooper of Dive Brockville, to charter her Dive Boat “AMG” and also was able to procure accommodations for the team at a lakeside cottage near the launch point that had actually just closed for the season at that time. In September 2022 ,on the morning of the first dives, 9 team members assembled in the main room of the cottage to be trained by Shark Marine CEO and diver Jim Garrington on how to operate a search device called a Navigator. Designed and built for Military use by Shark Marine Technologies Inc. of St. Catherines, Ontario, the Navigator, in appearance and operational ability resembles something that could have been seen in science fiction. The Navigator, a diver held sonar unit, which appears somewhat like a television news camera, is able to detect objects underwater in zero visibility, whether stationary or moving and show them to the diver in real time on its screen. The screen can be changed from the sonar display to a chart showing your location relative to the target and zoomed in and out. After a training session on the Navigator the team set out with Captain Helen Cooper on the boat AMG out of Waupoos Marina travelling some distance out into the Lake where the field of unknown objects lay. (actual location is kept confidential) On the first day, after dropping a shot line (a surface float attached to weights) as close to the first target as possible, the first team of three divers Paul Darnbrough, Paul Chapple and myself entered the water, following the shot line down, Paul Chapple operating the Navigator and the other two following and searching with dive lights, ready to take stills and video of what may be found. With sediment in the water and at depths of approximately 100 ft (30 meters) these dives were like night dives. We didn’t find anything.The second team of divers geared up while the first team was in the water, and would enter the water at the next search location, while the third team geared up and the first team waited out their surface interval. All hands were prepared to render any assistance required to those entering and leaving the water. As there was no mooring line, the dive boat would not anchor, but would cut power after arriving at the target and drift. Upon their return the divers all made free ascents. Several pairs of eyes were on the diver’s bubbles, as the boat would drift away from the shotline float and the searching divers were not always near it. Knowing that at the helm was an expert Dive Boat Captain gave the divers full confidence. Each team made two dives on each of two successive days, some members did three dives. Durrell and Kayla Martin had to leave after the first day and Elizabeth Colp Larson joined the team for a few dives on Saturday. Interesting objects were found at several locations and although mostly covered in zebra mussels it was apparent that these things we were seeing were man made. One of the objects found on the second day, by divers Corey Phillips, Steve Mueller,and Craig Smith, although partly buried in the sediment, appeared to the team upon viewing the camera footage, to possibly be a wing. Also on the second day Paul Chapple and I entered the water following Jim Garrington who was operating the Navigator and travelling about 5 feet off the bottom. We saw Jim stop and turn, his light then illuminating a strange looking object which suddenly seemed to appear right in front of me (it was almost as dark as a moonless night down there) It was covered in zebra mussels, appeared cone shaped, narrowing at the top and was about 5 feet high We then circled the object and I was able to see into a small spot where there were no zebra mussels and inside were some vertical metal strips about 1/8″ thick. Upon returning to the boat we informed the team of our find and Steve Mueller, Corey Phillips and Paul Darnbrough went down the shot line, Corey bringing his two camera rig and Paul Darnbrough helping to illuminate the object. Some footage was reviewed on the way back to harbour, the team very pleased with having found man made objects right in the middle of the target area. At a later ZOOM meeting 5 days after the dive when the camera footage and stills were reviewed by more members of the team, CHAA member Mark McCrae pointed out that the object which could be a wing, appeared to have a gun camera port, in the right spot where one would be on a P-51-D Mustang. The next step will be to secure permission from the ministry to recover some parts of what is believed to be Flying Officer Newman’s Aircraft for positive identification, only then can this case be closed. CHAA-Recovery has obtained permission in the past to bring to the surface, parts of a WW II Harvard aircraft which had crashed in Lake Erie. As this is believed to be the debris field of a mass produced metal aircraft and not a rare wooden shipwreck we believe that this should be done. In addition CHAA – Recovery has initiated a project to locate the wreck of a Curtis P-40 fighter flown by RCAF Squadron Leader Jacques Chevrier, which was lost on patrol on July 6 1942 near the mouth of the St.Lawrence River while while hunting the Submarine U-132 near Cap Chat, which had just sunk three freighters earlier that day. It is thought that Chevrier’s aircraft ran out of fuel but some have speculated that it may have been hit by gunfire from the U-Boat. Although the general location is known, neither the aircraft or pilot’s remains have ever been found. Jacques Chevrier was the first Canadian to lose his life on duty on Canadian territory during WWII, during what later became known as the Battle of the St. Lawrence. With help from the public, this story will continue…… We would like to give special recognition to: Jim Garrington of Shark Marine Technologies Inc. who along with other CHAA-Recovery Members, carried out the earlier sonar surveys and trained the team on the use of his equipment. Helen Cooper of Dive Brockville (Abucs) Dive Boat Captain who put the team over the targets. Paul Darnbrough who organized the dive weekend and arranged with Helen for the use of her boat, brought in 3 divers from Save Ontario Shipwrecks and also found accomodations for the team. Derek Niles of Orange Force Marine who obtained the licence which permitted the search Bil Thuma of GeoTech who spearheaded Project 9555 and set up the funding effort. Walther Irie, Canadian Harvard Aircraft Association Dive Recovery Team Leader Divers on the Search Weekend: Jim Garrington, Paul Darnbrough, Paul Chapple, Durrell Martin, Kayla Martin, Corey Phillips, Craig Smith, Steve Mueller, Mike McAllister and Elizabeth Colp Larson. Many thanks must also go to the CHAA-Recovery Team members who do many hours of research for these projects and also raise funds through various methods to keep these efforts going. (The list of names would be too long) and finally special recognition is due to Ken “The Professor” MacMillan of McQuest Marine, Terry Kovacevic of London Scuba Centre and Dean McConnachie of the Dive Academy for their long time support of CHAA’s efforts to raise awareness of Canadian History. More info here: bit.ly/BarryNewman The Scuba News Canada thaanks Mike McAllister for the contribution of this article. Follow Mike’s Dive Adventures on Facebook.
<urn:uuid:47798653-8070-49cb-8a9d-ba2c5d1bab19>
CC-MAIN-2023-14
https://www.thescubanews.com/2022/11/15/canadian-harvard-aircraft-recovery-team-chaa-survey-and-dive-search-for-barry-newmans-p-51-mustang/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00558.warc.gz
en
0.97108
2,528
2.90625
3
The availability of naloxone as an emergency response intervention has been critical in saving lives. Modeling estimates that from January 2015 to March 2021 more than 3,000 deaths events were averted due to take-home naloxone. But this milestone is overshadowed by the high rate of fatal overdose that has persisted in British Columbia for more than five years, despite the heroic efforts of so many. We continue to lose people from a toxic and unregulated drug supply, and the rate of overdose deaths in B.C. continues to hover at more than five a day Overdose deaths are preventable and unacceptable. Naloxone is not enough. Community members and partners have been paramount in providing training and getting naloxone into the hands of those who need it. People with lived and living experience of substance use (PWLLE) and people who use drugs (PWUD) continue to carry the burden of being the first responders to overdoses, saving the lives of friends, family, and community members — which comes with overwhelming experiences of loss, burnout, and frustration. Some of these people with lived experience are members of the PEEP Consultation and Advisory Board and Peer2Peer teams with the BC Centre for Disease Control and are based across the province. These are their letters to the people of British Columbia. Naloxone is Not Enough: Letters from the Heart of the Crisis Source : BC Centre for Disease Control (BCCDC) , Toward the HeartPublished: 2021
<urn:uuid:64e12f46-d969-4382-859d-a16935c19e4d>
CC-MAIN-2023-14
https://substanceuse.ca/naloxone-not-enough-letters-heart-crisis
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00558.warc.gz
en
0.969951
307
2.5625
3
Epilepsy is a common and diverse set of chronic neurological disorders characterized by recurrent and unprovoked seizures due to alterations in structure / brain function. The symptoms of epilepsy vary from person to person. The most common signs are: The most common causes of epilepsy include: Epilepsy is usually controlled or cured with medication.
<urn:uuid:66abe17e-dfb3-4888-92b1-b191c9f0f07a>
CC-MAIN-2023-14
https://www.norvichospital.com/departments/neurosciences/epilepsy
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00558.warc.gz
en
0.938058
68
3.203125
3
Most glaciers in Central Europe, Western Canada and the United States would vanish in the second half of this century under the current rates of ice loss, according to a new report. Glaciers have lost over 9,000 billion tons of ice between 1961 and 2016, according to a research letter published in the journal Nature on Monday. This amounts to a block of ice the size of Germany and almost 100 feet thick, or the size of the United States and 4 feet thick, said lead author Michael Zemp. “Under current loss rates we are going to lose glaciers – basically all glaciers – in several mountain ranges,” said Zemp, who is a lecturer in glaciology at the University of Zurich. This ice loss has also meant global sea levels increased by up to 27 millimeters over the time period, said the letter, which was authored by 15 international scientists. This accounts for between 25% to 30% of the observed increase in global sea levels. In this latest research, the team used data from over 19,000 glaciers, including satellite observation and 450 field visits. That’s far more than previous studies, which Zemp said relied on data from around 500 glaciers. Glaciers are “icons of climate change,” the authors said, and the research suggests glacier loss may be larger than previously reported. In addition to raising sea levels, Zemp said that melting glaciers can destabilize mountain ridges. Glaciers can also be an important water source for agriculture. For example, in the Peruvian Andes, he said, households depend on local glacier water in dry seasons. By comparing current ice loss rates with remaining ice volume the researchers found that glaciers in several regions, including in the European Alps, New Zealand and Western Canada, will disappear within this century. “But behind that there is a second bad message,” said Zemp. That mesage? In more heavily glaciated regions, such as the Canadian Arctic, the melting of glaciers has only just “kicked in,” meaning that these glaciers will continue to raise sea levels beyond 2100. Glaciers in other regions, such as the European Alps and New Zealand, also saw significant ice losses, the study said, but they played a small role when it comes to rising global sea levels because of the regions’ small glacierized areas. Currently, up to 335 billion tons of ice are lost each year, the study found. This translates into an increase in sea levels of nearly 1 millimeter per year, according to the calculations. Calculations of changes in global glacier mass can be further improved, the researchers noted. One way to do this would be to have more observational data, especially from regions that are more likely to contribute to future sea level increases, such as Alaska, Arctic Canada and the Russian Arctic. Get CNN Health's weekly newsletter Sign up here to get The Results Are In with Dr. Sanjay Gupta every Tuesday from the CNN Health team. Martin Siegert, co-director at the Grantham Institute for Climate Change and Environment at Imperial College London said that the research confirmed what glaciologists had expected for some time – “that glaciers around the world are contributing as much to sea level rise as the Greenland Ice Sheet.” Siegert was not involved in the new research. “At the moment, their state of health is critical to how sea levels will rise over the coming decades,” he said in an email. “The outlook is bleak for these glaciers, however, with melting entirely over the coming century.”
<urn:uuid:1039a654-339b-470b-ab8d-8538972c46f7>
CC-MAIN-2023-14
https://edition.cnn.com/2019/04/08/world/global-glaciers-sea-levels-study-scn-intl/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00558.warc.gz
en
0.956544
740
3.953125
4
Mathematical modeling is used in this study to assess how tectonic movement of fault blocks and fault permeability influence the present-day and paleohydrogeology of the Rio Grande Rift near Socorro, New Mexico. Our analysis focuses on active and ancient groundwater flow patterns and hot spring development within the southern La Jencia and Socorro subbasins. The best agreement between model results and present-day and paleoheat flow data was achieved by representing faults as passive surfaces and incorporating 2 km of moderately permeable (10-14.0 m2) fractured crystalline rocks into the hydrogeologic model. Quantitative results indicate that changes in groundwater flow patterns across the basin are primarily generated by the truncation/reconnection of aquifers and confining units. Calculated flow patterns help to explain the annealing of apatite fission tracks within Eocene Baca Formation clasts to the east of Socorro, potassium metasomatism mass balance constraints within Oligocene volcanics and overlying Santa Fe Group deposits, and the timing of barite/fluorite ore mineralization within the Gonzales prospect on the eastern edge of the Rio Grande Rift. We estimate that about 5% of mountain front recharge penetrates to a depth of 2.8 km below the sedimentary pile. This may have implications for water resource planners who have historically focused on groundwater resource development within the shallow alluvial deposits along the Rio Grande Rift valley. |Original language||English (US)| |Number of pages||19| |Journal||Water Resources Research| |State||Published - 1999|
<urn:uuid:76d00c8d-bb72-4ff5-b003-824cb9e8b255>
CC-MAIN-2023-14
https://experts.umn.edu/en/publications/tectonic-controls-on-the-hydrogeology-of-the-rio-grande-rift-new-
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00558.warc.gz
en
0.850453
367
2.515625
3
Mental health is a combination of our emotional, psychological, and social well-being, affecting how we think, feel, and act. Our mental health also plays a factor in how we handle stress, relate to others, and make decisions. People who manage their mental health well are able to cope with the stressors of life, be productive both in and outside of work, and make meaningful contributions to their communities. Those who struggle to manage mental health may suffer from a mental illness. A mental illness is a common health condition that involves changes in emotions, thought patterns, and behavior. In fact: - About one in five adults in the United States has a mental illness - One in 12 has a substance use disorder - One in 24 has a serious mental illness Even though it’s more common in adults, children can develop mental health issues too. Mental health conditions that also affect children and young adults include: - Anxiety disorders: Examples of anxiety disorders include generalized anxiety disorder, social anxiety disorder (social phobia), specific phobias, and separation anxiety disorder. It is possible to have more than one anxiety disorder, and some may require medical treatment. - Attention-deficit/hyperactivity disorder (ADHD): Adult attention-deficit/hyperactivity disorder (ADHD) is a mental health disorder that includes a combination of persistent problems, such as difficulty paying attention, hyperactivity, and impulsive behavior. Though it’s called adult ADHD, symptoms start in early childhood and continue into adulthood. - Autism spectrum disorder (ASD): Autism spectrum disorder is a condition related to brain development that impacts how a person perceives and socializes with others, causing problems in social interaction and communication. The disorder also includes limited and repetitive patterns of behavior. The term “spectrum” in autism spectrum disorder refers to the wide range of symptoms and severity. - Eating disorders: Eating disorders are serious conditions related to persistent eating behaviors that negatively impact your health, emotions, and ability to function in important areas of life. The most common eating disorders are anorexia nervosa, bulimia nervosa, and binge-eating disorder. - Mood disorders: If you have a mood disorder, your general emotional state or mood is distorted or inconsistent with your circumstances and interferes with your ability to function. You may be extremely sad, empty, or irritable (depressed), or you may have periods of depression alternating with being excessively happy (mania). - Schizophrenia: Schizophrenia involves a range of problems with thinking (cognitive), behavior, or emotions. It may result in some combination of hallucinations, delusions, and disordered thinking and behavior that impairs your child’s ability to function. Childhood schizophrenia is essentially the same as schizophrenia in adults, but it occurs early in life and has a profound impact on a child’s behavior and development. With childhood schizophrenia, the early age of onset presents special challenges for diagnosis, treatment, education, and emotional and social development. What Is a Mental Health Crisis? A mental health crisis is any situation in which a person’s behavior puts them at risk of hurting themselves or others and/or prevents them from being able to care for themselves or function effectively in the community. Often, a crisis can involve thoughts of suicide for both adults and children. Let’s look at data and statistics on children’s mental health. - 9.4% of children aged 2-17 years (approximately 6.1 million) have received an ADHD diagnosis - 7.4% of children aged 3-17 years (approximately 4.5 million) have a diagnosed behavior problem - 7.1% of children aged 3-17 years (approximately 4.4 million) have diagnosed anxiety - 3.2% of children aged 3-17 years (approximately 1.9 million) have diagnosed depression - 1 in 6 U.S. children aged 2–8 years (17.4%) had a diagnosed mental, behavioral, or developmental disorder - Among children aged 2-8 years, boys were more likely than girls to have a mental, behavioral, or developmental disorder - Among children living below 100% of the federal poverty level, more than 1 in 5 (22%) had a mental, behavioral, or developmental disorder - Age and poverty level affected the likelihood of children receiving treatment for anxiety, depression, or behavior problems While mental health crises are a major threat to public health and can become fatal, clinical professionals are not always the ones on the front lines of intervening in or preventing such crises. Physicians and nurses sometimes are not aware that a patient is vulnerable to a sudden escalation in mental illness, or even that a mental illness is afflicting their patients. This is a major reason why non-clinical professionals with a background in an area such as general healthcare studies are needed. These individuals are able to help educate the public, develop novel intervention strategies outside of hospitals, and help ensure vulnerable individuals don’t fall through the gaps in a moment of crisis. However, there is a need for everyone — not just healthcare professionals — to understand the risk factors, warning signs, and interventions that can help others survive a mental health crisis episode. Warning Signs of Crisis Episode Signs of a mental health crisis episode may not always be apparent in a child. With the proper education, teachers, principals, and other staff members will know what to look for when the following mental health crisis signs arise. - Abusive behavior: Often an individual will show abusive behavior to themselves and others. This may include self-harm, substance abuse, physical abuse, etc. - Inability to perform daily tasks: This can include even the most simple tasks such as bathing, teeth brushing, brushing hair, and putting on clean clothes. - Increased agitation: When a child shows signs of increased agitation they’ll use verbal threats, are violently out of control, destroy property, and more. - Isolation: Children and young adults tend to isolate themselves in school and work, from both family and friends. - Loses touch with reality (psychosis): This encompasses the inability to recognize family or friends — showing signs of confusion, strange ideas, thinking they’re someone they’re not, not understanding what people are saying, hearing voices, and seeing things that aren’t there. - Paranoia: This is manifested in suspicion and mistrust of people or their actions without evidence or justification. - Rapid mood swings: This includes increased energy levels, the inability to stay still, pacing, sudden depression and withdrawal, as well as becoming suddenly happy or calm after a period of depression. Other warning signs and risk factors include: - Eating or sleeping too much or too little - Pulling away from people and things - Having low or no energy - Having unexplained aches and pains, such as constant stomach aches or headaches - Feeling helpless or hopeless - Excessive smoking, drinking, or using drugs, including prescription medications - Worrying a lot of the time — feeling guilty but not sure why - Having difficulty readjusting to home or work life Suicide Warning Signs Suicide in teens can be prevented if those around them learn to recognize the warning signs and intervene appropriately: - Noticeable changes in eating or sleeping habits - Unexplained or unusually severe, violent, or rebellious behavior - Withdrawal from family or friends - Sexual promiscuity, truancy, and vandalism - Drastic personality change - Agitation, restlessness, distress, or panicky behavior - Talking or writing about committing suicide, even jokingly - Giving away prized possessions - Doing worse in school It’s important to take any talk of suicide seriously. “Suicide is a very difficult topic to discuss,” says Jeffrey Borenstein, M.D., an associate clinical professor of psychiatry at Columbia University College of Physicians and Surgeons in an article about the importance of speaking out about suicide. “But silence can have tragic results, and knowledge can save lives. The message that things can get better is more important today than ever before.” Examples of Triggers for a Crisis Episode Crisis episode triggers are external events or circumstances that may produce very uncomfortable emotional or psychiatric symptoms, such as anxiety, panic, discouragement, despair, or negative self-talk. Those with a mental illness typically handle triggers differently than other people. According to author Arlin Cuncic writing for Very Well Mind, from a mental health perspective, “being ‘triggered’ more narrowly refers to the experience of people with post-traumatic stress disorder (PTSD) re-experiencing symptoms of a traumatic event (such as exposure to actual or threatened death, serious injury, or sexual violation) after being exposed to a trigger that is a catalyst or reminder.” There are both internal and external triggers that can remind a person of a past traumatic event. - Internal Triggers: - Feeling abandoned - Feeling lonely - Feeling out of control - Feeling overwhelmed - Increased heart rate - External Triggers: - Anniversary date - Being alone too much - Crowded places - Ending of a relationship - Feeling judged - Going to a specific location that is a reminder of a traumatic event - Loud noises - Money problems - News stories about bad events - Particular interaction (ex: an argument) - A particular time of day (ex: sunset) - A particular smell (ex: incense) - Physical illness - Seeing an overly thin celebrity (in the case of anorexia) - Seeing someone else use drugs (for substance abuse) - Sexual harassment - Violent movies Being aware of someone’s personal triggers is especially helpful because it allows others to recognize sensitive situations, provide an adequate warning to those who may be triggered, and take other steps to prevent known triggers from leading to a crisis situation. How to Prevent a Mental Health Crisis Fortunately, mental health crises can be prevented. As such, how teachers, parents, and peers respond to a child’s mental health crisis is crucial. How an authoritative figure should speak to one suffering from a mental illness crisis varies based on their relationship to them. - Family members and friends: If a family member or friend is showing signs of a mental health crisis, you can help to prevent the situation from occurring/worsening by: - Asking questions, listening to ideas, and being responsive when the topic of mental health problems comes up - Educating other people so they understand the facts about mental health problems and do not discriminate - Expressing your concern and support - Finding out if the person is getting the care they need/want — and, if not, connecting them to help - Including your friend or family member in your plans — continue to invite them without being overbearing, even if they resist your invitations - Offering to help your friend or family member with everyday tasks - Reassuring them that you care - Reminding them that help is available and that mental health problems can be treated - Treating people with mental health problems with respect, compassion, and empathy - Students: When assisting a student who is showing signs of a mental health crisis, educators should: - Educate other staff members, parents, and students on symptoms of mental health problems and how they can help - Encourage good physical health - Encourage helping others - Help ensure access to school-based mental health support - Help ensure a positive, safe school environment - Promote social and emotional competency and build resilience - Teach and reinforce positive behaviors and decision-making - Your child/other dependents: It’s important for caregivers to pay special attention to their children, especially after the loss of a loved one, separation of parents, and/or any other major transition. This is because children typically have a hard time understanding difficult situations. However, if you are concerned your child is on the verge of a mental health crisis you should: - Ask your child’s primary care physician if your child needs further evaluation by a specialist with experience in child behavioral problems. - Ask if your child’s specialist is experienced in treating the problems you are observing. - Talk to your child’s doctor, school nurse, or another healthcare provider and seek further information about the behaviors or symptoms that worry you. - Talk to your medical provider about any medication and treatment plans. Communication Tips and Talking Points Starting a conversation about mental health can be uncomfortable, no matter how necessary. Here are a few tips for parents and educators for talking to children about their mental health. - Create a sense of belonging - Develop competencies - Educate staff, parents, and students on symptoms and help for mental health - Encourage good physical health - Encourage helping others - Ensure access to school-based mental health support - Ensure a positive and safe school environment - Establish a crisis response team - Promote resilience - Provide a continuum of mental health services - Teach and reinforce positive behaviors/decision-making Seek Help from a Professional Mental illness can be treated. Here is a list of medical professionals one can utilize when seeking treatment for mental illness. - Addiction counselor: Addiction counselors treat people with addictions. While this usually involves substance abuse or gambling problems, it can also include less common addictions such as sexual addictions or hoarding. - Art therapist: Art therapy involves using creativity in ways like painting, sculpture, and writing to explore and help with depression, medical illnesses, past traumatic events, and addiction. - Family and marriage counselor: A family and marriage counselor specializes in common problems that can come up in families and married couples, from differences to arguments. - Mental health counselor: “Mental health counselor” is a broad term used to describe someone who provides counseling. Their titles may also include the terms “licensed” or “professional.” It’s important to ask about a counselor’s education, experience, and the types of services involved since the term is vague. Counselors can specialize in fields like job stress, addiction, marriages, families, and general stress. - Psychologist: Psychologists specialize in the science of behaviors, emotions, and thoughts. They work in places like private offices, hospitals, or schools. Psychologists treat a range of issues, from relationship problems to mental illnesses, through counseling. A psychologist usually holds a doctoral degree, such as a Ph.D. Psychologists cannot prescribe medications in most states. - Psychiatrist: Psychiatrists mainly diagnose, treat, and help prevent mental, emotional, and behavioral disorders. They use psychiatric medicine, physical exams, and lab tests. Psychiatrists’ specialties can include children and adolescents, forensic psychiatry, and learning disabilities. - Psychoanalyst: A psychoanalyst follows the theories and practice of Sigmund Freud by helping someone explore their repressed or unconscious impulses, anxieties, and internal conflicts. This is done through techniques like free association, dream interpretation, analysis of resistance, and transference. However, it is important to be cautious in selecting a psychoanalyst. The title and credential are not protected by federal or state law, which means that anyone can call themselves a psychoanalyst and advertise their services. - Psychiatric nurse: Psychiatric nurses are registered nurses who specialize in mental health. They’re known for their therapeutic relationships with the people who seek their help. - Psychotherapist: Psychotherapist is a general term for many types of mental health professionals. This can include psychologists and therapists. These professionals all provide psychotherapy — a type of talk therapy designed to improve your mental health and general well-being. - Religious counselor: Religious counselors are trained to help people with a variety of problems, including crises of faith, marriage and family counseling, and emotional and mental problems. - Social worker: Social workers are public or private employees dedicated to helping people cope with and solve issues in their lives, including personal problems and disabilities. They may also address social problems like substance abuse, housing, and unemployment. They are often involved in family disputes that involve domestic violence or child abuse. It’s important to provide loved ones with support when they’re suffering from a mental crisis. This ensures that they are not alone in the process and minimizes the damage that may come along with mental illness. Here is how you can help a loved one with a mental illness: - Avoid falling into the role of fixer and savior - Check out support groups for family members of those experiencing mental illness - Have realistic expectations - If a loved one is in acute psychiatric distress (experiencing psychosis or feeling suicidal), getting them into the hospital may be the wisest and best choice - Inform yourself as much as possible about the illness being faced - Instead of guessing what helps, ask - Keep yourself healthy and pace yourself — overextending yourself will only cause further problems in the long run - Know that even if your actions may seem to have little impact, they are making a difference - Offering objectivity, compassion, and acceptance is valuable beyond measure - Seek counseling for yourself - Start dialogues, not debates Immediate Crisis Response and Emergency Intervention Crisis response refers to all the advance planning and actions taken to address natural and man-made disasters, crises, critical incidents, and tragic events. Of course, in an emergency, you should always call 911. However, in some cases, having a crisis response and intervention plan can be helpful as well. Crisis intervention is beneficial because it can mitigate adverse reactions, facilitate coping and planning, assist in identifying and accessing available support, normalize reactions to the crisis, and assess capacities and need for further support or referral to the next level of care. The three main goals of crisis intervention are: - Reduce symptoms - Return to adaptive functioning or to facilitate access to continued care In regards to a suicidal crisis on school grounds, some key principles to remember are: - Be direct - Be honest - Debrief all teachers and staff of the current situation - Ensure that the student in crisis is safe - Inform parents (when the time is right) - Inform the student of what is happening at all times - Keep other students safe - Know your limits - Listen to the student - Monitor your surroundings - Send someone for help Parents and teachers can help prevent mental health crises by helping adolescents and teens develop emotional intelligence and healthy coping skills. Assess the Situation Before making any rash decisions, assess the situation and ask yourself: Is the person in danger to themselves or others? Is emergency assistance needed? Can I call someone for guidance? Are there resources to help me and the person at risk? What triggered the crisis? Am I capable of handling this on my own? It is important to assess the situation because the person you are trying to help may not be able to communicate clearly. If you’re able to figure out what is going on using your own assessment of the scenario, you may find it easier to help control the moment. Emergency Resources and Suicide Prevention Hotlines Always call 911 in an active emergency situation, especially if someone is trying to harm themselves or others, or is threatening to. Additional help is also available 24/7 via specialized emergency hotlines. Here is a sample list of national hotlines you can call, text, or online chat when in distress: AIDS Info: Treatment, Prevention and Research - Al-Anon for Families of Alcoholics Automated meeting information: (800) 344-2666 - Families Anonymous – a 12-step program similar to Al-Anon, meeting information only: (800) 736-9805 - SAMHSA National Helpline: 800-662-HELP (4357) - The Childhelp National Child Abuse Hotline: (800) 422-4453 - Covenant House – Help for runaways: (800) 999-9999 Crisis and Suicide - Girls & Boys Town National Hotline: (800) 448-3000 - International Suicide Hotlines - National Suicide Prevention Lifeline – for youth and adults: (800) 273-TALK (8255) Domestic Violence, Rape and Sexual Assault - National Domestic Violence Hotline: (800) 799-7233 - Rape, Sexual Assault, Abuse, and Incest National Network (RAINN): (800) 656-HOPE - American Association of Poison Control Centers: (800) 222-1222 - Disaster Distress Hotline (SAMHSA): (800) 985-5990 - National Eating Disorders Center Helpline: (800) 931-2237 — Open M-F, 9-9 p.m. - Shoplifters Anonymous: (800) 848-9595 — Open M-F, 9-5 p.m.; otherwise use the website - Veteran’s Crisis Line: (800) 273-8255 - YouthLine: (877) 968-8491 — Text TEEN2TEEN to 839863 - Planned Parenthood Hotline: (800) 230-PLAN (7526) - National Runaway Safeline: 800-RUN-AWAY - National Center for Missing & Exploited Children: (800) 843-5678 - Child Find of America Helpline: (800) 426-5678 - SAMHSA’s National Helpline: (800) 662-4357 - Poison Control: (800) 222-1222 - National Institute on Drug Abuse Hotline: (800) 662-4357 - Cocaine Anonymous: (800) 347-8998 Techniques to De-Escalate a Crisis Here are 10 tips on de-escalating a crisis. Remember, only do this on your own if you feel comfortable doing so. If not, emergency personnel should be called immediately. - Allow silence for reflection - Allow time for decisions - Avoid overreacting - Be empathetic and non-judgmental - Choose wisely what you insist upon - Focus on feelings - Ignore challenging questions - Respect personal space - Set limits - Use non-threatening nonverbals. The Importance of Mental Health Awareness To implement preventive measures, we need to deconstruct the stigma associated with mental illness. This will help make communicating about the topic feel more natural and help students realize it is OK to talk about it — and they aren’t alone. Having the proper mental health resources for students ready is just one of the many ways we can take away the stigma and show the importance of mental health awareness. Mental health awareness is important because with awareness comes more support and care for those who are in need. When the public is educated on everything there is to know about mental health and mental illnesses, it becomes more likely that these topics become less taboo and negative. Mental health can be just as important — if not even more so — as physical health. This is because it can be hard to maintain your physical health without a healthy mental capacity. Students can take action against their mental health issues and should feel empowered to do so. Here is a list of coping strategies and mental health resources for teenagers and college students: - Talk to your parent, guardian, or other trusted adult. - Utilize online resources such as Teen Mental Health. - Download helpful apps like Mood 24/7. - Follow medication guides like the Bipolar Medication Guide and Drugs to Treat Mental Illness. - Call or text corresponding hotlines. - Become a part of advocacy organizations like AACAP Legislative Activities. - Recognize the different signs and symptoms of a mental illness. Dealing with Grief It’s not uncommon to show signs of grief after losing a loved one, decline in health, death of a pet, a miscarriage, divorce, and more. Grief is the emotional suffering you feel when something or someone you love is taken away. If you are not able to handle grief on your own, it’s important to know that you don’t have to — reach out to a parent, teacher, or mental health professional right away. There are five stages of grief: - Denial: “This can’t be happening to me.” - Anger: “Why is this happening? Who is to blame?” - Bargaining: “Make this not happen, and in return, I will ____.” - Depression: “I’m too sad to do anything.” - Acceptance: “I’m at peace with what happened.” To experience these feelings after any emotionally heavy life event is normal. Luckily there are ways to cope with grief: - Accept that many people feel awkward when trying to comfort someone’s grieving. - Draw comfort from your faith. - Join a support group. - Talk to a therapist or grief counselor. - Talk to friends and family members for support. Mental Health and Self-Care Investing in self-care enriches coping skills, energy level, sense of well-being, and the ability to create balance. Applying different self-care techniques — like skin and hair care, reading, baths, meditation, etc. — into your daily routine is beneficial because it allows the mind and body to work together for overall wellness. Prolonged amounts of stress caused by mental illness can weaken the immune system. This can also lead to more serious health issues such as heart disease, obesity, diabetes, strokes, and high blood pressure. Symptoms of elevated stress levels include but are not limited to: - Changes in appetite - Decreased in activity levels and/or social connections - Difficulty concentrating - Feeling anxious, worried, or depressed - Increased irritability - Sleep disruption We may not be able to control the stressors of life, but we can control how we react to them. Self-care allows us to do so in a way that is beneficial to our overall well being. Resources for Mental Illness In case of an immediate emergency (such as suicidal thoughts, potential to harm yourself or others, or any other life-threatening scenarios) you should always call 911. However, there are other mental health resources that can be utilized for those who need both short-term and long-term solutions: - Mental Health America - National Council for Behavioral Health - National Empowerment Center - National Institute of Mental Health - President’s New Freedom Commission on Mental Health - World Health Organization Support for Schools Mental health may be an underfunded educational staple for some schools. Luckily there are ways that teachers — backed by the support of lawmakers and principals — can provide support for their students. This can include: - Continuing education and awareness workshops for recognizing and addressing mental health issues among students - Creating relationships with mental health professionals - Peer-to-peer learning - Trauma-informed schools Mental Health Facilities and Government Agencies Here is a list of mental health facilities and agencies that can help: - American Foundation for Suicide Prevention - American Psychiatric Association - Anxiety and Depression Association of America - Hope for Depression Research Foundation - International OCD Foundation - National Institute of Mental Health - The Anxiety Network It’s important to always remember — if you have a mental illness or are on the verge of a mental crisis, you are not alone. With proper education techniques and the right resources, teachers, parents, and other authority figures will be able to properly care for our youth’s mental health, especially in times of crisis. The Future of Psychology The Future of Psychiatry The Future of Public Health Youth Suicide Prevention Suicide Prevention Resource Center National Suicide Prevention Lifeline American Foundation for Suicide Child Trends – Key Facts About Teen Suicide How Much Time Do People Spend on Social Media Federal Trade Commission Children’s Online Privacy Protection Rule Children in a Digital World
<urn:uuid:e47ae979-a0fd-41af-bfb6-a1fccff9c8ae>
CC-MAIN-2023-14
https://online.maryville.edu/blog/mental-health-crisis-toolkit-for-schools/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00558.warc.gz
en
0.920718
5,968
4.03125
4
Achieve successful orchid cactus care with an optimal balance of water, humidity and light. Epiphyllum thrive in moderate indoor humidity, moist but well-draining soil, an acidic pH, and filtered sunlight. Balanced fertilizer and lower winter temperatures help encourage bright, fragrant blooms. In this way, how do I get my orchid cactus to bloom? How to Make Orchid Cactus Bloom - Give it a winter rest. A cool, dry rest for about 8-10 weeks in winter are needed for the plant to set buds. … - Shed some light. Keep your orchid cactus in bright, indirect light year-round. … - Feed it. High-phosphorus fertilizer will encourage more blooms. … - Leave it alone. Similarly one may ask, how often do you water orchid cactus? Native to tropical rainforests where it grows on trees, this indoor plant doesn’t want it soil to be moist all the time and will rot if it’s overwatered. That often means watering once every 10 days or so, depending on conditions such as plant size, temperature, and how much light your orchid cactus gets. Is queen of the night an orchid? The beautiful queen of the night cactus (Epiphyllum oxypetalum), also known as the orchid cactus, is one of the most commonly cultivated species of the genus Epiphyllum. This species boasts large, fragrant white flowers that open only at night, as its common name suggests. What is the best soil for orchid cactus? It is recommended that the best potting mix is 3 parts commercial potting soil and 1 part small to medium pumice. If pumice is not available, use bark chips or perlite. The soil must hold moisture but drain quickly. Plant cutting upside down for best results. Why is my orchid cactus limp? Yellowed, withering leaves indicate too much sun, while limp or undersized leaves indicate too little sun. Moisture is vital to the health of the orchid cactus. While you should be careful not to overwater your plant and encourage root rot, you also can’t let your plant’s roots dry out. Is orchid cactus toxic to dogs? Orchids are a stunning, graceful addition to any home that also happens to be non-toxic to cats and dogs. Orchids have a reputation for being difficult to cultivate, but several types, including the phalaenopsis orchid, can thrive indoors. Why are my orchid cactus not blooming? Some orchid cactuses don’t bloom if they haven’t been fed appropriate fertilizer. … You should never apply a fertilizer with more than 10 percent nitrogen, as too much nitrogen can lead to leggy growth at the expense of flowering. What flower blooms once every 100 years? In the Arid Greenhouse at the Chicago Botanic Garden, Agave ocahui is known as the century plant because people used to think it flowered only once every 100 years. A more accurate estimate is that it blooms once after 25 to 30 years of growth. How do I get my Epiphyllum to flower? In late winter, stimulate bloom production by placing the cactus in an unheated space that’s above 40 degrees Fahrenheit, such as a garage or porch, for about three weeks. Make sure it continues to receive the same filtered light. At the end of the chilling period, return the plant to its place indoors. What causes Epiphyllum to flower? Light is an important factor for its growth. You need to place the plant in an area where it receives partial sunlight right throughout the day. They are happy to grow in bright spots or in areas where they receive filtered sun. You can also place them in light shaded porticos or hang them from the trees. Are used coffee grounds good for orchids? Coffee grounds are an excellent fertilizer, especially for orchids and African violets. What do orchid cactus look like? Flowers: Showy, large flowers appear from notches in the leaves in spring and into summer. … Foliage: It has long, flattened, narrow stem-like leaves with scalloped edges. Orchid cactus does not have noticeable spines. Habit: Orchid cactus grow as a clump of flattened leaves that droop and dangle to 20 inches long. How do you prune an orchid cactus? Orchid cacti do not require frequent pruning, but annual maintenance pruning helps keep the plant balanced and healthy. - Disinfect bypass pruners in a 10 percent diluted bleach solution, mixing 1 part chlorine bleach with 9 parts water. - Clip off all flowers after the blossoms expire.
<urn:uuid:1b6b2d0a-5c2b-4b36-8203-6254cc592359>
CC-MAIN-2023-14
https://succulentsaddiction.com/how-do-you-care-for-an-epiphyllum-orchid-cactus-14fe115a/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00558.warc.gz
en
0.912846
1,035
2.6875
3
Getting a cancer diagnosis is never easy, but being aware of the symptoms and starting a treatment plan early is vital for improving the chances of recovery and quality of life. While breast, colon and lung cancer are the top 3 most common cancers in Singapore1; in 2016, it was revealed that there are roughly 2,000 new cases of blood cancers (including leukaemia and lymphoma) reported every year, with at least six new patients being diagnosed daily2. Unfortunately, leukaemia is a condition that is often incidentally diagnosed through a physical exam or routine blood tests. Depending on its growth rate, leukaemia could also be chronic or acute, with the latter being more fast-growing and obvious in its symptoms. The good news is, leukaemia is a highly manageable condition that can be treated to prevent it from coming back. Regardless of which type of leukaemia, whether it be acute myelogenous leukaemia (AML), acute lymphocytic leukaemia (ALL), chronic myelogenous leukaemia (CML) or chronic lymphocytic leukaemia (CLL), getting the right diagnosis is the first step to overcoming cancer. Learn more about the not-so-obvious symptoms of this cancer and what to do next if you are feeling concerned. Symptoms Of Leukaemia The symptoms pointing to leukaemia can vary depending on its type, but some remain the same across all age groups. Many of these symptoms are often mistaken as the common flu or some other minor condition, but the primary ones to look out for are: 1. Fatigue and weakness 2. A tendency to bruise or bleed easily 3. Susceptibility to infections 4. Loss of weight and appetite Other common symptoms include night sweats, unplanned weight loss, and experiencing pain under the ribs on the left side. As mentioned earlier, the results of physical exams and blood testing can sometimes reveal symptoms of the disease and any abnormalities in the number of white blood cells in the body. However, to fully ascertain the type of leukaemia, more comprehensive tests are required. One such test is called bone marrow biopsy, whereby a bone marrow sample is taken from the patient and analysed for a fuller diagnosis. This type of test can help identify the type of leukaemia present, its growth rate and proliferation, or how far it has spread in the body. Other tests are also used in conjunction with a biopsy, namely imaging tests, which provide info about the progression of leukaemia in the body, and more comprehensive blood tests like complete blood count (CBC) or full blood count (FBC), differential, and peripheral blood smear – all of which can be conducted as part of a comprehensive cancer screening test in Singapore. When To Seek Help From A Doctor Given that there are multiple types of leukaemia, symptoms can vary from one person to another. As a recommendation, if you are feeling unsure about your symptoms and are concerned that you might have leukaemia, it is best to speak to a healthcare expert and seek their advice. In addition, be aware that there exist risk factors that increase your chances of developing leukaemia. These factors can depend on one’s age, gender, family history, and existing blood disorders: Men are more likely to develop the disease compared to women. When it comes to age, acute myeloid leukaemia (AML), chronic myeloid leukaemia (CML) or chronic lymphocytic leukaemia (CLL) can develop in people aged 65 years and older. On the other hand, acute lymphocytic leukaemia (ALL) mostly occurs in people aged 20 years old and under. If you’re already experiencing specific blood disorders, such as polycythaemia vera or idiopathic myelofibrosis, your chances of developing leukaemia are much higher. While most types of leukaemia have no familial links, you can have a higher risk of developing the disease if you are a first-degree relative of someone who has CLL, or you have an identical twin who has or had experienced ALL or AML. Those who are considered high risk are advised to consider getting a cancer screening test that’s specialised in diagnosing leukaemia. Upon diagnosis, the doctor can then further advise on proven treatment options including chemotherapy, radiation therapy or a bone marrow transplant to get the symptoms under control. When it comes to any disease, the sooner they’re discovered, the better. Currently, there is no cure for leukaemia; however, early detection allows for earlier treatment, making a patient’s prognosis much more positive. This fact does not just apply to leukaemia but other cancers, and it is crucial to get tested as soon as you suspect that it may be present in your loved ones, your children, or even yourself. Talking to a specialist is vital in properly diagnosing the type of leukaemia and knowing the factors that may be causing the symptoms experienced. Most importantly, remember that you’re not alone and that help is not out of reach. Our specialists here at ICS provide cancer diagnosis and treatment in Singapore and can help you in potentially detecting leukaemia at its early stages and treating it as soon as possible. 1. Singapore Cancer Society. (2021). Common Types of Cancer in Singapore. Retrieved 14 July 2021, from https://www.singaporecancersociety.org.sg/learn-about-cancer/cancer-basics/common-types-of-cancer-in-singapore.html 2. When cancer runs through the blood: What you need to know about leukaemia. (2021). Retrieved 14 July 2021, from https://www.straitstimes.com/singapore/health/when-cancer-runs-through-the-blood-what-you-need-to-know-about-leukaemia
<urn:uuid:48b608fc-5d72-4732-b9a6-e6ff6147611e>
CC-MAIN-2023-14
https://www.icscancer.com/post/4-leukaemia-signs-you-should-never-ignore-what-to-do-next
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00558.warc.gz
en
0.9406
1,258
2.703125
3
Traditional Chinese medicine has used acupuncture for centuries to treat common ailments. Acupuncture is a technique originally used to restore balance to the flow of energy or life force known as qi or chi. Chi is believed to flow along pathways throughout your body called meridians. The technique of acupuncture uses thin needles that are inserted into various points along these meridians with the belief that chi will be rebalanced. While research has not proven its efficacy in that regard, thousands of people in the United States still turn to this alternative medicine technique to stimulate nerves, muscles, and connective tissue.1 Acupuncture appears to help the body naturally deal with pain by increasing blood flow. A recent study done by Japanese researchers indicates that acupuncture therapy may also aid in mitigating muscle loss.2 The results of the study showed that decreases in muscle mass in mice can be significantly reversed by acupuncture. Akiko Onda, an acupuncturist and graduate student at the Waseda University School of Sport Sciences said, “The main focus of this study is changes in the mRNA expression levels of muscle-specific atrophic genes such as atrogin-1.” Onda continued: Muscle mass and structure are determined by the balance between protein degradation and synthesis. It is my hope that this study will demonstrate acupuncture’s feasibility with regard to improving health among the elderly and medical patients. Our findings could identify acupuncture as the primary non-pharmacological treatment to prevent skeletal muscle atrophy in the future.3 The results of this study are quite promising since it uncovered one particular molecular mechanism responsible for the efficacy of acupuncture treatment and clarified its usefulness in preventing skeletal muscle atrophy in mice on the molecular level. Losing skeletal muscle mass has a negative effect on the elderly and sick, and inhibits their ability to participate in physical activity. Resistance training, improved nutritional habits, and other methods are often recommended to help deter muscle atrophy. Those who are already at a disadvantage from being frail due to age or sickness may not be able to implement those methods. Consequently, the possibility of using acupuncture as a non-pharmaceutical method to help prevent atrophy seems like a beneficial alternative.4 Acupuncture is still considered to be quite obscure, and is still not completely understood since all of its underlying mechanisms are unknown. This is why it is still considered an alternative form of medicine, and is still not accepted in the medical world as an effective and legitimate treatment for preventing skeletal muscle loss. However, with advancing research, acupuncture may soon be accepted as a new strategy for preventing skeletal muscle loss. Fortunately, this study has piqued more interest and will result in more in depth studies on acupuncture, in hopes of better understanding its mechanisms, and convincing the world of its efficacy.5
<urn:uuid:f5c9c44f-7b0b-492c-b190-4eca74384980>
CC-MAIN-2023-14
https://breakingmuscle.com/new-science-acupuncture-can-prevent-muscle-atrophy/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00558.warc.gz
en
0.955845
561
3.296875
3
Nutrition & Related Topics Nutrition plays a vital role in helping you achieve the best result from your medical treatment. Calories are needed to provide energy to all of the cells of the body to help maintain their many important functions. Protein is important to help heal, rebuild and repair damaged tissues. During the course of your treatment, you will need more protein and calories than normal. Whether or not you are actively receiving treatment, nutrition is very important. Click on the following to learn more: Good nutrition will: - Help prevent infections. - Help maintain and rebuild muscles and damaged tissues. - Provide you with energy helping you to maintain a sense of well being. It can be a challenge to maintain good nutrition due to the side effects of the medications you may be taking. These side effects may include nausea/vomiting, taste changes (dysgeusia), sore mouth and throat (mucositis), anorexia (lack of appetite), and diarrhea. The dietician will help you to meet your nutrient requirements by suggesting foods that may be easier to tolerate, or offering nutritional supplements if needed. Decreased food intake and increased need for protein and calories can make it very easy for patients to lose weight, so it is important to be conscious of your intake: - Eat a balanced diet with a variety of foods, including fruits, vegetables, breads, pasta, meats and dairy products. - Include foods high in protein at each meal such as meat, fish, eggs, and cheese. - If you are a vegetarian, talk to the dietician for more protein options. It is very important for you to drink plenty of fluids. Not drinking enough can lead to dehydration and other problems such as nausea, vomiting and kidney complications. You should aim to drink about 6–8 cups or 2-3 litres of fluid each day. Here are a few suggestions to help you drink enough fluids: - Always carry your water bottle with you and sip on it often. Make sure it gets a thorough cleaning every day. - Dilute juices and other drinks with water. - Remember how often you have filled your bottle to estimate how much you are drinking. Avoid caffeinated drinks – strong teas, coffee, colas etc. – as these are of little benefit and may dehydrate you more. Many patients undergoing treatment find that specific foods taste different. This may result from damage to the cells in your mouth that help to detect taste. Taste changes (dysgeusia) may also occur if there is decreased production of saliva in the mouth, causing a dry mouth (xerostomia). Taste changes are different for every person, and may last for several weeks. Coping with taste changes can be very challenging. Here are some tips: - Keep trying different foods and you might find a new favourite. Keep a list of foods that taste good to you. - Eat foods that taste good even if it means eating the same foods over and over again. Ask the dietitian for some help to make sure you are getting all the proper nutrients you need. - Try eating foods at cold or room temperature. - If food/meat tastes metallic, try marinating meat to hide the taste, using plastic utensils instead of metal, using glassware instead of metallic cookware, eating other protein rich foods instead of meat such as milk, canned fish, quiche, cottage cheese, milkshakes, puddings, custard, yogurt, cheese, deviled eggs, and cold sliced meat. - If food tastes too sweet, mix juice/high protein high calorie supplement drinks with water or milk, or add a pinch of salt to decrease the sweetness. - Good mouth care may help with taste changes; rinse your mouth throughout the day especially before and after meals, brush your teeth and tongue with a soft toothbrush. - For dry mouth, try the following foods to help stimulate your own saliva: lemonade, orange juice, cranberry juice, sugar free citrus candies, pickles, and plain yogurt. Avoid these foods if you have a sore mouth or throat. Chemotherapy can lead to a condition called mucositis. Mucositis is an inflammation of the lining of your digestive tract and can lead to pain and sores in the mouth, throat and the passage to the stomach (esophagus). Mucositis may last for days to weeks, and will usually get better around the time your blood cell counts begin to recover. Common side effects include dryness, redness, sensitivity, sores, ulcers, and taste changes. The soreness in your mouth and throat can make it very difficult to eat. Here are some tips: - Inform the doctor/nurse if you develop sores in your mouth. Medications are available to help you with the pain and the sores. - A regular mouth care routine will help minimize the discomfort. You will receive instructions on mouth care from the healthcare team. - Drink lots of fluids to help minimize mouth dryness. If your mouth is sore, cool or room temperature drinks are often more soothing than hot ones. Try diluted sport drinks, diluted juice and flat sodas instead of plain water. - Avoid spicy or acidic drinks such as grapefruit or orange juice if your mouth is sore. Instead, stick to bland foods and juices such as apple or grape. - Choose foods that are soft, moist and easy to chew and swallow, such as ice cream, popsicles, smoothies, high protein/calorie drinks, pudding, etc. If you have parotid gland swelling (in the side of the neck) after total body irradiation, you may find that applying ice packs to the throat will help. It may be necessary for your BMT doctor to prescribe an analgesic until the swelling goes away. The swelling usually goes away within 12-24 hours. Nausea/vomiting is a very common side effect with chemotherapy. There are many different things that can trigger nausea such as motion, heartburn, food or other odours, and feeling full after eating. It is important to keep track of these triggers and to tell your doctor or nurse about them. This way, you can get the most effective anti-nausea medication. Prior to receiving chemotherapy or total body irradiation, you will receive medications that are very effective in minimizing nausea. These medications may be given by mouth, under the tongue, or through your Hickman® line on a regular basis throughout the therapy. Some of the anti-nausea medications cause a feeling of drowsiness and many patients find that they will nap more often.. Many different anti-nausea (also called anti-emetic) medications are available to you throughout the course of your treatment. They can be prescribed for you based on your nausea/vomiting triggers. What You Can Do - Keep your mouth fresh by rinsing before and after meals/snacks. - Eat small, more frequent meals/snacks throughout the day. - Take clear fluids such as juice, broth or jello rather than a regular meal prior to chemotherapy or total body irradiation. - Avoid spicy, fried and greasy foods. Starchy, bland foods are better tolerated. Try saltines, rice cakes, rusks, bread sticks, plain toast, pretzels, bagels, noodles, rice, plain congee, plain roti or digestive cookies. - Put some crackers or biscuits by your bedside. Eating a little before you get up in the morning may help. - If food odours trigger your nausea, try foods that are cool/cold. Reduce cooking odours by using a kitchen fan and keeping pots covered. - Eat whenever your appetite is the best. - Try relaxation and distraction techniques before snacks/meals. - Wear loose, comfortable clothing. - A cold facecloth to your face or the back of your neck may be helpful. A lack of appetite (anorexia) is very common during chemotherapy. Even though you may not want to eat, you still need good nutrition during and after treatment in order to maintain your strength and help your body recover. Here are some tips: - Make every bite count. Eat high calorie, high protein foods. These foods include ice-cream/non-dairy frozen dessert, yogurt, sour cream, nut butters, smoothies, milkshakes, dried fruit, nuts, eggs, fish, meat, cheese, dried beans, peas and lentils. Drink homogenized milk instead of 2%, and try cream-based soups instead of clear soups. - Make every sip count. Drink a high protein high calorie supplement drink throughout the day. Some commercial brands include Ensure® or Boost®. You can also make your own high protein high calorie drink by mixing 1 tablespoon of skim milk powder, 1 cup of cow or soy milk, 1 banana (or ½ cup of your favourite fruit) and ½ cup of ice-cream. Blend all of these ingredients and serve chilled. - Aim to eat 6-8 small meals daily instead of 2-3 large meals. Some small meal ideas include granola bars and milk, cheese and crackers, toast and peanut butter, bagel and cream cheese, pita bread and hummus or tzatziki, chips and dip, dried fruit, trail mix, pudding (rice, tapioca, flavoured) and cookies, fruit and custard. - Eat when you feel hungry. - Try experimenting by having traditional breakfast foods at dinner or vice versa. Your treatment can create changes throughout the bowel that are similar to the changes in the mouth, throat and esophagus. One side effect that commonly occurs as a result of these changes is diarrhea, gas and cramping. Diarrhea can cause your body to lose fluids and nutrients that can make you feel very weak and dehydrated. Like other side effects, the amount and frequency of diarrhea varies from patient to patient. It is very important to let your doctor and nurse know if you are having diarrhea. Uncontrolled diarrhea can lead to serious complications such as dehydration. Useful Management Tips The following tips might be useful if you are having diarrhea: - Keep the perianal area clean to prevent skin irritation. A “sitz bath” or soak in warm water may be taken after bowel movements followed by the application of a mild cream to keep the area protected. Your BMT doctor may choose to prescribe a medicated cream for this purpose. - Limit foods with caffeine such as coffee, colas, and strong tea. Caffeine can cause your body to lose even more fluid. - Dairy products such as milk, cheese and ice-cream may make diarrhea worse. If you feel worse after eating these foods, consult the doctor or dietitian for more information. Lactose-free beverages might be better tolerated. - Avoid high fat foods. If you feel worse after eating high fat foods such as deep fried foods, fatty meats, excess butter or margarine, or greasy snack food, then limit the use of these foods. - High fibre foods might make diarrhea worse. Ask the dietitian for a list of low fibre foods to try. If you have bloating, cramping or gas, then avoiding foods that can increase gas production might help. These include broccoli, cabbage, cauliflower, dried beans and peas, brussel sprouts, onions and carbonated beverages. - Defrost meat and fish in the refrigerator or in the microwave. Defrosted foods should be used immediately. Do not refreeze food. - Thoroughly wash fresh fruits and vegetables under running water before eating. Trim away any bruised areas. - Use a separate cutting board for meat and seafood. Wash hands, knives and cutting boards very well with hot soapy water between uses. - Sanitize all areas used for the preparation of raw meat or seafood with diluted bleach (5 ml bleach in 1 litre of water) or a cleaner containing bleach. - Wash the tops of cans (e.g., soup, pop, fruit) before opening. - Meat and seafood should be well cooked. There should not be any rare or pink portions. - Poultry should be cooked to an internal temperatures of 85°C (180°F). - Red meat, ground beef and pork should be cooked to an internal temperature of 75°C (165°F). - Do not eat deli meats or salads made in the store, such as ham salad, chicken salad, egg salad, tuna salad or seafood salad. - Do not eat refrigerated pâtés or meat spreads. Canned or shelf-stable products may be eaten. - Barbecuing and grilling should be done carefully. Make sure meat is well cooked. - Do not eat raw or undercooked seafood, especially sushi, clams, shrimp, oysters, squid, octopus, and marinated fish. - Do not eat refrigerated smoked seafood unless it is contained in a cooked dish such as a casserole. Canned or shelf-stable seafood may be eaten. - Do not drink unpasteurized milk or eat foods that contain unpasteurized milk. - Do not eat unpasteurized cheeses. - Do not eat soft cheeses such as feta, Brie, Camembert, blue-veined cheeses, or Mexican-style cheeses such as queso blanco, queso fresco and Panela, unless they have labels clearly stating they are made from pasteurized milk. - Avoid yogurt and ice cream from “soft-serve” machines. - Keep the refrigerator at 4°C (40°F) or lower; keep the freezer at -18°C (0°F) or lower. - Keep raw meat, seafood and poultry separate from other food that will not be cooked and away from cooked/ready-to-eat foods. - Perishable foods should not be unrefrigerated for over 2 hours. - Any egg or mayonnaise dishes should not be unrefrigerated for more than 2 hours. - Note all dates on foods and use before the expiry or “best before” date. - Wash cutlery or dishes between use with raw and cooked meats. - Wash your dishes with hot, soapy water and rinse with hot water. - “Air dry” dishes instead of using a dishtowel. - If you use a dishwasher, use the hot setting. - If you use paper plates and plastic utensils, discard them after each use. In general, you should not wade in, swim, or drink river, lake, ocean or pond water. Do not drink water from a well, especially a private well. Drinking or swimming in these bodies of water can lead to serious infections such as cryptosporidium. Cryptosporidium is a parasite that infects the intestines. It is a water-borne disease and is a common cause of diarrhea. Municipal tap water is safe to drink. Local health departments will issue warnings about water safety. If such a warning is issued in your area, follow the instructions for boiling water. Bottled water is safe to drink. Chemotherapy and other medications can affect your liver function. Following bone marrow transplant, your liver may be affected and unable to function properly. Alcoholic beverages should be avoided during treatment and for at least 3 months following transplant. This period may be longer for some patients. Check with your doctor before having beer, wine or other alcoholic beverages. Fatigue is the most common symptom felt by people with cancer. Many factors, in addition to the underlying cancer itself, can contribute to cancer related fatigue. These include anemia, poor nutrition, depression, medication side effects, poor sleep and being less active. What you can do to help: - Tell your healthcare team. It’s possible that you may need medicine, a nutritional supplement or a blood transfusion to help with your symptoms. - Think about the “4 P’s of Energy Conservation” - Prioritize: When you have more than one thing to do, begin with the most important task to make sure it gets done. - Plan: Plan your activities in advance to avoid doing extra trips. - Pace: Never rush. Rest often and rest before you feel tired. - Position: Sit when you can to do tasks. Avoid bending and reaching too much. - Rest when you need to. Take short naps of 10 or 15 minutes rather than longer naps during the day. Too much rest, as well as too little, can make you feel more tired. Save your longest sleep for the night. - Balance your rest and activity. Keep track of when you feel most tired and when you have more energy so you can plan activities at the best time. - Try to limit the length of visits with family and friends. In hospital, ask your nurse if you need help limiting the length of time visitors stay. - Update family and friends with group texts/emails or social media (or delegate this task!). - Let others help. Ask a friend or family member to update others on your condition and to help grocery shop, cook, or babysit. - Light exercise such as walking around the block or unit can boost your energy. Activity & Exercise Regular exercise and physical activity are important. - You will feel better mentally and physically. - You will keep your muscles, heart and lungs in shape. - You will sleep better - You will maintain your strength and circulation. When you are feeling unwell, do what you can. Regular exercise can simply mean getting up and walking several times a day.. Even a short walk around the unit or your house is good for you. While you recover, walking is probably the best activity to start with. Over time, your stamina and strength will improve. Your physiotherapist can help you plan a re-conditioning program that includes gradual increases in activity. Here are some activities you can do to keep up your strength while in hospital and at home: - Walk in the hallway when you are allowed to do so at least 3 times a day. 5 times a day is better! - Do at least 2 laps around the Unit; 3 or 4 laps each time is great. If you feel tired, one lap is better than nothing. - If you feel unwell, do what you can – a short walk several times daily is better than only one big long walk. - Sit in a chair to read or watch television instead of lying in bed. Sit in a chair for all of your meals. - Marching on the spot is a very good exercise to keep up your strength and balance. Stand up and lightly hold a windowsill or stable furniture (not the IV pole).. Good posture is important. - Do leg and arm exercises daily, especially if you are not walking much. If you have a central line, PICC or Hickman/Trifusion line you can move that shoulder in any direction but avoid strong swinging or forceful stretching. Avoid heavy resistance exercise on that side and be careful not to pull on the line. Avoid heavy lifting above your head. Exercise is very important but there may be some restrictions at first. Mention any exercise activities to the BMT doctor before engaging in them. Your Physiotherapist will also help you with exercises. Platelets help stop bleeding. When you exercise, especially against resistance, you can cause very small injuries to tissues and small blood vessels. This is normal and usually heals easily, causing no problems. However, when your platelets are low, bleeding may not be stopped as effectively. Here is what you need to know: - Platelets less than 10 = limit activity. Be extra careful to avoid falls or injury. Walk in room only - Platelets 10 – 20 = gentle stretching, walking, exercises without resistance, stationary bike without resistance - Platelets 20–50 = light resistance (theraband or hand weights), walk briskly, stationary bike with some resistance, step-ups/stairs - Platelets 50 – 100 = jogging, resistance exercise (theraband or weights), massage - Platelets greater than 100 = heavy resistance exercises, deep massage There are no restrictions on exercise once your platelet count returns to normal. However, ask your doctor before taking up sports and activities that put you at risk for injury such as contact sports and skiing. Hemoglobin is in the red cells of your blood. Hemoglobin carries oxygen around your body, which every cell needs for energy to carry out normal processes. Normal hemoglobin levels are: 115 to 150 for women and 135 to 170 for men. If the hemoglobin count is less than normal, you may tire more quickly. You may find it helps to go more slowly and do shorter periods of activity more frequently. If you get short of breath or tired, slow down or rest before continuing. Short walks on flat surfaces are a great option. You may be given infusion of red blood cells if your hemoglobin level is low. White Blood Cells When your neutrophil count is low, you will be limited in where you can go. You should avoid crowds, groups of people etc. It is important to wash your hands frequently. You may be asked to stay in your room or stay on the unit. Walking around the hospital is not allowed if you are admitted. The physiotherapist can give you exercises to do in your room or on the unit if allowed to walk in the hall. It is important to avoid getting sick as much as possible. You can still be active and exercise when your neutorphils are low. Your activity level will depend on your platelets and hemoglobin level. Sexual Health & Intimacy Human sexuality is often a very difficult issue for people to discuss in the best of times. When this is compounded by a diagnosis of a life-threatening illness and its treatment, it often becomes even more difficult to discuss. Issues of reproduction and sexuality are important because they have implications for your future. This is one of the major reasons why we are discussing them here. Please know that you can ask your health care team any questions about this topic. Most men and women experience a temporary decrease in libido (desire). This may be due to tiredness, weakness, a change in how they feel about their appearance, or a general feeling of illness. Remember, sex requires extra energy! It is an individual thing, but it can take several months or more for interest to return. Resuming intimate relationships will take patience and time. It is important for both partners to be patient and sensitive to each other’s needs. Remember there are many ways to express love and closeness. Initially you may just want to sit close together, hold hands, and hug each other. Touching and caressing takes much less energy than sexual intercourse and can be just as intimate and satisfying. Chemotherapy agents are not known to directly affect desire, orgasm or ejaculation For many patients, however, decreased libido (desire) is common, but usually temporary. Due to chemotherapy or radiation therapy, semen may appear brown or orange. This is temporary. Patients receiving chemotherapy should wear a condom during sexualcontact , for up to seven days after the last dose of chemotherapy Semen will be cytotoxic and pregnancy needs to be avoided. Body fluids such as vagianl fluid will also contain small amounts of cytotoxics. A condom is recommended for intercourse and Resuming relationships will take patience and time. Communication with your partner is the key. Touching and caressing take much less energy than sexual intercourse and can be just as intimate and satisfying. During your recovery engaging in sexual intercourse can put you at risk for infection and bleeding. We recommend the following guidelines: - Do not engage in sexual activity if you or your partner has an infection, such as a cold, upper respiratory infection, open sores or cuts, or herpes/cold sores. - Do not engage in sexual intercourse if your platelet count is less than 50. - Do not engage in sexual activity if your neutrophil count is less than 0.5 - It is advised for couples to use birth control, preferably condoms. The use of condoms is preferred to protect the immunocompromised patient from infection. Discard condom after each use. All questions regarding birth control should be addressed by your doctor. - if you are a women undergoing chemotherapy treatment and wish to receive oral sex, your vaginal fluid will be cytotoxic. This is very hard to avoid while preforming oral sex and therefore oral sex should be avoided until 48 hours after the last chemotherapy dose - If you are a man undergoing chemotherapy treatment and wish to receive oral sex, you need to wear a condom to prevent the sharing of body fluids. This should be avoided for 48 hours after the last dose due to cytotoxic body fluids. - Saliva should not be shared as it will be cytotoxic for 48 hours after the last dose of chemotherapy – example performing oral sex and french kissing. - Avoid the use of spermicides as these may irritate the penis and/or vagina. - Do not use intrauterine devices (IUDs) or diaphragms. - It is advised to urinate after sex and to wash thoroughly to reduce the chance of urinary tract infections. - Due to immunosuppression, women are more likely to develop vaginal infections/dryness, and are advised to use a water-based lubricant. - Avoid anal sex. - If not in a long-term relationship, consider telling potential partners about your history, so proper precautions can be taken. - Avoid multiple sex partners. Here are some points to consider when thinking about intimacy: - Sexuality is an important part of many relationships and needs to be addressed, even during treatment. - You are not alone. Most cancer patients and their partners have issues pertaining to sexuality and their treatment. - Do not make the mistake of defining your sexuality on the basis of your desire/ability to have intercourse. This puts too much pressure on you, and is a total falsehood. Human sexuality is much more fluid than this. - Understand that sexual issues during treatment arise for a number of different reasons. These include physical symptoms (eg pain, nausea) that may prevent intercourse from happening, the stress of your current situation may create performance issues, and you or your partner may have issues with self-image regarding body changes due to the disease or the treatment. - It is tremendously important to first acknowledge your feelings about your sexual self, and any reasons why thinking about your own sexuality is difficult. Then share this with your partner. - It is important for partners to maintain open communication and to continue physical contact like touching and tenderness to support and affirm each other. - Don’t be upset if you are unable to have intercourse for a time. It is all about perspective. Think about it as an opportunity to re-connect with your partner in a very special way. - Don’t be afraid to take things slowly. Don’t think you need to go ‘back to normal’ after your treatment. This will take some time. You may have a ‘new normal’. - Don’t be afraid to have the conversation. Talk to your partner about sex. Chances are they are dealing with some of the same issues you are. - Get help if you need it. There are many counsellors who specialize in human sexuality, and it may make all the difference. Chemotherapy and total body irradiation can cause temporary or permanent infertility. Infertility is the inability to have children. Although rare, a few men and women have had children following treatment. It is important for you to discuss contraception issues with your health care team prior to discharge as well as any concerns you have regarding sexuality and fertility. Freezing (cryopreservation) of fertilized eggs (ova), called zygotes, may be possible prior to receiving high-dose therapy. Your BMT physician can discuss this in more detail if you wish. This is a time consuming process and may not always be possible. Sperm banking is a process available that involves freezing and storing sperm in liquid nitrogen. This sperm may be used at a later time for artificial insemination The patient’s underlying disease and exposure to chemotherapy or radiation can decrease sperm counts. Patients interested in sperm banking should discuss this with their physician. For some patients, treatment cannot be safely delayed and if the sperm count is low, sperm banking may not be possible. Patients should discuss this with their physician if they have concerns or questions. There is a fertility clinic very close to VGH that you can be referred to if you wish. It is possible to collect a sample here at VGH and have someone take it to clinic for you. There are fees associated with the storage and freezing of sperm that you will need to pay annually. Please ask your health care team if you would like more information Support for oncology patients: Women will notice that their menstrual cycle, or period, may become irregular or stop following chemotherapy or a blood and marrow transplant. If it does not stop, hormone replacement therapy may be given to stop the monthly cycle. This decreases the risk of excessive blood loss while your platelet and hemoglobin counts are low. Provera or Ovral are drugs commonly used to stop menstrual flow. Once your counts have recovered enough that blood/platelet transfusions are no longer necessary, these medications can be discontinued. Due to your increased susceptibility to infection, if you do have a period, avoid the use of tampons or menstrual cups. You may find your menstrual period is longer and heavier than usual After chemotherapy or blood and marrow transplant, menopausal symptoms can occur due to a lack of ovarian hormone production. Hormones are chemicals made by the body that control many different functions of the body. Menopausal symptoms include hot flashes, vaginal dryness, and inflammation of the vaginal wall, pain during intercourse, irritability, and decreased libido (desire). Hormone replacement therapy such as Premarin or Provera may be used to lessen these symptoms and to prevent bones from becoming weak and brittle, leading to osteoporosis. Some women find that using lubricants, gels or other vaginal creams such as K-Y jelly (Vaseline is not recommended) may help to relieve some of the vaginal discomfort. It is important to discuss these issues with your gynecologist or BMT doctor.
<urn:uuid:b841732c-606b-4a11-a17e-6697822adf7f>
CC-MAIN-2023-14
https://www.leukemiabmtprogram.org/patients-support-givers/healthy-living/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00558.warc.gz
en
0.934468
6,420
3.265625
3
In the West, ‘sharia’ often calls to mind antiquated laws founded upon gender discrimination and barbaric punishments. In the East, for some it means the ideal standards by which Muslims strive to live; for others, it is the greatest obstacle to modernisation of their societies. These clashing views sometimes lead to violence. Clarification of the term has therefore become an urgent necessity. Sharia is all of these things and much more. It is the legal system of Islam, a series of guidelines and prohibitions. But it is also a concept invested with a whole range of meanings, from the virtuous attributes of an ‘ideal’ society, to the confinement of particular elements to otherness and adversity. Moving through history, society and Islamic thought to explore the sources of sharia law, Baudouin Dupret gets to the heart of its uses and abuses in the twentieth and twenty-first centuries. This short, accessible book provides an invaluable guide for those seeking to understand a matter more complex and pressing today than ever before.
<urn:uuid:a72080e0-59a7-4ffe-b3e8-50a2f8ae54ea>
CC-MAIN-2023-14
https://www.apollo.ee/what-is-the-sharia.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00558.warc.gz
en
0.952906
213
3.046875
3
Robots, or automated devices, have become a big part of our lives today in an effort to assist people in a variety of contexts, ranging from assembly processes to operating in difficult environments that are unsuitable for human existence. Furthermore, robotics as a field has permeated a variety of industries, allowing mechanical devices to perform a variety of jobs. The rise in technical breakthroughs and the market’s demand for robotics expertise has necessitated the appropriate education of aspiring technophiles. Robotics is a rapidly evolving field, so studying won’t be as simple as you might expect. Significant institutions, on the other hand, are providing new and all-encompassing robotics programs to prepare the next generation of technologists. The top 5 robotics engineering courses and colleges that are changing the landscape of robotics education are listed below. Carnegie Mellon University This university has a variety of engineering and computer science departments and is notable for robotics. It provides a PhD in Robotics, a Master of Science in Robotic Systems Development, and a Master of Science in Robotics, among other Robotics degrees (MRSD). Some undergraduate programs at the university allow students to complete their master’s degree in as little as five years. The two options are Master of Science-Robotic Technology (MS-RT) and Master of Science-Computer Vision (MS-CV) (MSCV). The Master of Science in Robotics (MSR) program covers a wide range of robotics topics. It’s intended to help students become leaders in the study and development of future generations of integrated robotics technologies and systems. Massachusetts Institute of Technology Graduate students interested in robotics can take advantage of several options at MIT’s highly regarded School of Engineering. Numerous robotics organisations and labs can also be found at MIT. The Robot Locomotion Group and the Biomimetic Robotics Lab, for example, are dedicated to creating robots that are extremely agile and efficient. The Robotics Team, which develops the principles, techniques, and technologies for future robots, and the Personal Robots Group, which develops the principles, techniques, and technologies for personal robots are all part of the Field and Space Robotics Lab. The university’s Computer Science and Artificial Intelligence Laboratory has been responsible for a number of robotic breakthroughs. University of Pennsylvania’s The University of Pennsylvania’s School of Engineering and Applied Science offers a one-of-a-kind Master’s Degree in Robotics (ROBO). Three university departments – Electrical and Systems Engineering, Mechanical Engineering and Applied Mechanics, and Computer and Information Science – jointly fund Penn’s ROBO master’s program. The General Robotics, Automation, Sensing, and Perception (GRASP) Laboratory oversees the program. In one of the world’s most advanced robotics labs, students study artificial intelligence, kinematics, design, and prototyping. GRASP offers undergraduate robotics courses in addition to a master’s degree. University of Michigan – Ann Arbor The Michigan Robotics curriculum is divided into three technical areas that merge as students build working robots: - Sensing of the environment, - external agents, - Internal body information to determine state information Each of these categories could be thought of as a sub-plan for coursework and research. Students who do not intend to pursue a doctorate in robotics can also use the Engineering Career Resource Centre to look for jobs with the university’s corporate sponsors (ECRC). Colorado School of Mines The Colorado School of Mines’ Centre for Automation, Robotics, and Distributed Intelligence (CARDI) is a great place to meet other robot enthusiasts, learn how to build robots, and undertake research on the subject. CARDI’s mission is to conduct multidisciplinary research in the areas of control systems, robotics, and automation, computer vision and intelligence, distributed systems and networking, and data/information. The Mechanical Engineering Department provides a Master of Science in Mechanical Engineering with a focus on Robotics, Automation, and Design. The author is Tanisha Gupta. Leave a Reply
<urn:uuid:8daeb9e7-33b5-4e71-9c0b-d2ecaee55dc5>
CC-MAIN-2023-14
https://www.dqindia.com/top-5-universities-robotics-research/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00558.warc.gz
en
0.914172
841
2.8125
3
What kind of material is 2A12 aluminum sheet? Corrosion resistance is poor, but it can be effectively protected by pure aluminum coating. It is easy to crack when welding, but it can be welded or riveted by special process. Widely used in aircraft structures, rivets, truck hubs, propeller components, and many other structures. The temperature is higher than 125 degrees C, and the strength of the 2024 alloy is higher than that of the 7075 alloy. Under the condition of hot state, annealing and new quenching, the formability is better, and the strengthening effect of heat treatment is remarkable, but the heat treatment process is strict. 2A12 is a typical Al Mg alloy in Al Cu mg system. Its composition is reasonable and its comprehensive properties are better. Many countries produce this alloy, which is the largest in use. The alloy is characterized by high strength, a certain heat resistance, and can be used as working parts below 150 degrees C.
<urn:uuid:6e2779ef-4823-4bf1-8441-2f40328500e0>
CC-MAIN-2023-14
https://ask.okorder.com/questions/what-kind-of-material-is-2a12-aluminum-sheet_410312.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00758.warc.gz
en
0.939479
206
2.578125
3
Cindy Haws’s Biology class traveled to the Lower Cow Creek Watershed area near Riddle Friday, March 2 to view the impact of the logged landscape and the use of variable retention regeneration harvesting at the 2015 and 2017 Douglas Complex and Horse Prairie fire locations. The purpose of the trip was to analyze the Bureau of Land Management’s oversight of the lands. The field trip lab taught that variable retention regeneration harvesting is a timber harvest method that retains structures, organisms and conditions from the pre-harvest stand for incorporation into the post-harvest ecosystem with the goal of establishing complex early-seral forest conditions through the regeneration of a new cohort of trees and other vegetation. The students viewed three different fire locations and were asked to look at the size of the regrowth forest and its density as well as how the fires had affected the forest as a whole. Students also looked at the loss of water storage caused by clear cutting as water can run off the clearcut landscape straight into the rivers instead of storing in the ground, creating habitat and water supply. The trip’s first stop was in BLM territory where the composition of the forest was intact – some old and some new growth. Students took pictures of the minor conifer (a minor confier is any tree species other than Douglas fir). A fire had been in that location, but the area was not clear cut after the fire which left the ability for the area to regrow. The forest was very diverse with foliage, moss, grass and brush. Leaving enough trees after the fire for wildlife led to additional voles, birds and elk in the area. There was also some dead wood that helped contribute to the storing of water for the summer months when there is little or no water. After this BLM territory, students visited a dead area that looked burnt with almost no regrowth. The composition of the forest floor was bare. The trees were burned but still standing, and the students learned that the dead wood helps create new habitats and water storage that will in theory rebuild the forest. The last stop was bare and looked like a graveyard with no trees, barely any dead wood, with little or no wildlife habitat and no re-growth. A sign nearby referred to a pioneer gravesite. A stream coming down from the mountain used to fall into a water cache prior to going into the Cow Creek, a tributary of the South Umpqua River. Because of all of the rubble and rocks from years of clear cutting and the creation of logging roads, the bare area displayed only a small area of water holding, closer to a puddle than a pond. The water runs straight off to the river. “Students went on the field trip to analyze the impact of regeneration logging on the landscape’s composition, structure and function, as well as high fire risk and loss of water storage processes caused by the plantations” Haws said. Students also learned that the watershed area is a mix of private and public land. According to Oregon Explorer, a site partly managed by Oregon State University, “The most common land use in the Lower Cow Creek Watershed is forestry, with 91% of the land base used for public or private forestry. Agriculture constitutes 6% of the land use and mostly occurs in Cow Creek Valley. Land ownership is primarily private (60%), with public ownership (39%) mostly administered by the Bureau of Land Management.” Prior to the trip, students skyped with Chris Maser, a natural history and forest ecology research scientist and author of Forest Legacy, who talked about how the state is failing to take responsibility for ecosystems. Maser is passionately against totalitarian agriculture that controls what and who gets to grow and sell to the market for the public. Maser supports the idea that the land belongs to everyone, to every species, rather than the belief that the land belongs only to humans to exploit for profit. For more information about the Bureau of Land Management’s work in the Lower Umpqua Watershed, see the report “Upper Cow Creek: Bureau of Land Management Watershed Analysis,” available online from the Bureau of Land Management’s website.
<urn:uuid:9c2b99a3-2345-4ce8-afa0-ab7670e5d86e>
CC-MAIN-2023-14
https://mainstreamonline.org/wildlife-biology-class-visits-horse-creek-douglas-complex-fire-sites-to-check-regrowth/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00758.warc.gz
en
0.959254
852
3.203125
3
What is Blended Learning and How Does It Work in the Classroom? It’s true: Young people can’t get their noses out of their phones, which has led to the consternation of many educators. But at the same time, with Google giving us directions, Alexa reporting on the weather, and Instagram sharing our memories, our daily lives are already inextricably linked with technology. Over the last decade, a similar trend has expanded into our schools and classrooms. Rather than shunning technology, blended learning connects analog and digital in order to support young people and enhance their learning. What is the definition of blended learning? Simply put, blended learning is a method of teaching and learning in which students learn via electronic and online media as well as traditional face-to-face teaching. Instead of learning only from their teacher, and only interacting with their peers, students also engage with technology in order to meet learning goals. Given the advances of technology over the last 10 years, the majority of students already have experienced at least some form of blended learning. At the same time, it’s important to note that simply the use of technology — say, to type an essay or to submit a homework assignment — does not constitute blended learning. In addition to the production of knowledge, students engaging in blended learning also acquire and apply knowledge with a combination of online and in-person modalities. What is blended learning in the classroom? Blended learning in the classroom typically requires that students have 1:1 access to an electronic device, usually a Chromebook. Some schools, rather than giving students computers, store and share Chromebooks in carts, in an effort to share resources. Either way, students must have ample and frequent opportunities to go online and use the internet in order for blended learning to occur. While it’s not required in blended learning for students to have a combination of in-person and online learning on a daily basis, it’s certainly recommended. While some teachers prefer to reserve the online component for homework, best practice suggests that learning opportunities in the classroom also combine both analog and digital formats. There are different model types of blended learning. Depending on the interest and skill of the teacher, as well as access to technology, there are several model types of blended learning. These lie on a spectrum of the amount of in-person vs. online learning and the degree to which students have choice in their learning activities. The face-to-face driver approach involves a majority of whole-class teacher-led instruction, with the teacher also in charge of delivering the online content and monitoring students. This online component is also done as a whole class, without students splitting off in groups or working individually. When it comes to blended learning, a rotation approach, students in groups move through a set of online learning activities in the classroom with the guidance of a teacher. In other words, teacher-led instruction is minimized, and the students engage in common tasks online. The teacher determines the learning activities and requires that every student complete them all, like a checklist. The flex and the self-blend approaches offer teachers and students more choice and flexibility. In flex, the online platform provides most of the curriculum and learning activities, while the teacher is available to support students individually or in small groups. Usually the online platform tailors and differentiates content based on student needs. In self-blend, students choose online enrichment content to supplement their learning in school, in order to expand their skills or to try on advanced coursework. This approach is already very popular with many students at the high school level. Finally, in an online driver approach, the students do not or rarely come to a physical school, working remotely on online content. Teachers are available remotely for support. Students currently participating in distance or remote learning are learning with an online driver approach to blended learning. Blended learning can be beneficial. There are many benefits of blended learning. The first is that the practice offers more flexibility in the learning process. Rather than assuming that all students need the same information and skill-building, all at the same time and in the same way, blended learning allows for various learning activities, teaching approaches, pacing, and student groupings. The second major benefit is that students enjoy a combination of face-to-face and online learning, resulting in greater engagement. Some learning — like applying knowledge, solving complex problems, collaborating with peers, and working on a project together — is best done with other young people. On the other hand, other learning — like targeted skill development, individual research, and exploratory enrichment — is best done alone, with the use of technology and the internet. Perhaps the most crucial benefit, though, is that blended learning provides easier and more effective ways for teachers to differentiate learning material for their students. A simple example is that some students with Individualized Education Programs learn better when they have access to audio versions of texts. In a traditional classroom, that accommodation would mean that a teacher or an aide would need to read the text to the student. A blended approach, on the other hand, supports the student in a more tailored and efficient way. Furthermore, because blended learning normalizes the frequent use of technology, students who may unfortunately experience stigma because of their learning differences more comfortably engage in the classroom experience with less anxiety. Is blended learning a pedagogy? Despite its many benefits, some educators debate whether blended learning is a pedagogy, rather than an “approach” or a “method” of teaching and learning. If we agree that a pedagogy is a theory and practice of imparting skills and knowledge, then blended learning definitely qualifies as a pedagogy. Additionally, if a pedagogy also takes into consideration the interaction of students in the process of learning, blended learning again certainly constitutes a pedagogy. For some education researchers, however, blended learning needs additional study to join constructivism and other more-established pedagogies. With the ubiquity of technology, and the rise of distance learning and hybrid models, there is no doubt that the future of K-12 education will become more and more blended. Most educators would say that the future has already arrived.
<urn:uuid:3712c45c-91d9-4740-9a04-07c5d1489061>
CC-MAIN-2023-14
https://gradecam.com/2020/09/what-is-blended-learning-and-how-does-it-work-in-the-classroom/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.74/warc/CC-MAIN-20230322180852-20230322210852-00758.warc.gz
en
0.961764
1,276
3.890625
4
Even in a city of skyscrapers, the Tribute in Light is colossal: twin columns of blue-white light shining four miles high into the bruised orange-black bowl of the night sky. With clear weather in New York City, the beams are crisply visible from 60 miles away. Illuminated every September 11 since 2002, the Tribute is an iconic and emotional memorial to the lives lost in the 9/11 terrorist attacks and a symbol of New York City’s unbreakable spirit. It is a beacon in more ways than one. Birds are drawn to the lights, at times by the thousands. On September 11th, 2017, I was drawn to the lights by the birds. At sunset, I join a small gathering of people on top of a six-story parking garage near Wall Street. At the entrance to the upper deck, I pass the event production staff supervising the display, conferring over a bevy of laptops and switchboards. To the eastern side of the roof, rescue workers and families of the victims of 9/11 congregate near a long white tent over a dinner buffet. Opposite, to the west, New York City Audubon staff and volunteers gather. Dominating the roof are the spotlights: 88 in total, separated into two square arrays to the north and south, twenty parking spaces apart. As lighting technicians check their snaking cables, the beams wink with dust motes and the looping flight of insects. There are few vertical light installations in North America of the magnitude of the Tribute. Only the Luxor Sky Beam in Las Vegas, Nevada, compares. I crane my head back, looking for birds, but quickly drop my gaze, dizzy. From afar, the Tribute is a powerful spectacle. Standing below the beams, it’s staggering. I cross the roof to join Susan Elbin, director of conservation and science for NYC Audubon, as she greets her volunteers. In coordination with the National September 11 Memorial & Museum, NYC Audubon maintains an annual presence monitoring the Tribute to ensure that the beauty of the memorial does not compromise the safe passage of nocturnally migrating birds. Over the last century and a half, scientists have catalogued the detrimental effects to nocturnally migrating birds from manmade light sources, from lighthouses to communication towers, and the ever-growing sprawl of city skyglow. When the Tribute was first proposed, NYC Audubon anticipated similar problems of attraction, aggregation, and possible collisions in the night sky over lower Manhattan. By 11 p.m., most of the rescue workers here for the memorial leave the site, but the Tribute stays illuminated all night long. New York City is south of the boreal forest. If weather conditions are right, millions of birds could be moving regionally in mid-September throughout the night. NYC Audubon started communication with city officials in 2002 and negotiated access to the site, a distinction already granted to the families of those lost in the terrorist attacks. But it was not until 2005 that a partnership arose, with the production team agreeing to turn off lights if need be. In 2007, NYC Audubon proposed the official protocol: If one or more birds crashes to the ground, dead; if the birds appear to be trapped (flying low in the beams and calling); or, if 1,000 birds are in the beams for more than a 20-minute period; then the lights are shut off for 20 minutes, to allow them to fly on. By 8 P.M., the silhouettes of birds flash, uplit, as they thread through the spotlights’ beams. A Chimney Swift flies in low with shallow, stiff wingbeats. A Northern Flicker shoots by, its wings outstretched in a brilliant revelation of yellow. While the birds are familiar, their behavior is strange. They seem to be caught in a gyre, looping the blue-white lights. Near the parapet wall, Andrew Farnsworth, a research associate at the Cornell Lab of Ornithology, adjusts the tripods of two cameras a meter apart. Both cameras are pointed straight up, a laptop between them. The monitor displays a pair of grainy images of birds circling in the beams. With basic trigonometry, Farnsworth can calculate the altitude of the birds as their flight slows and descends under the influence of the Tribute. Elbin, Farnsworth, and other Cornell Lab-affiliated researchers gathered data and observations from the Tribute in Light from 2008 to 2016, and after analysis, published their findings in the Proceedings of the National Academy of Sciences in 2017. In seven nights over the nine years of study (two years were omitted due to poor weather), the lights were shut off 22 times. With each episode of temporary darkness, the birds’ behavior—including circling at decreased speeds and lower altitudes, and increased vocalization and aggregation at the lights—stopped within minutes. At 8:30 P.M., there are 400 birds wheeling a few hundred feet above us. Of the 102 species recorded at the Tribute, the majority are Neotropical migrant songbirds, each only the weight of a couple of coins. Many are young birds that just hatched the previous summer, embarking on their first southbound migration and particularly susceptible to the draw of skyglow. I raise my binoculars and look north, where the floor-to-ceiling windows of a new residential building reflect 60-plus stories of pure white light. As I scan, a Blackburnian Warbler strikes the glass at 30 stories up, its wings spread wide. It falters, then flies straight back into the spotlights and continues circling the beams. Farnsworth grimaces. By 10:45 p.m., the count of birds in the beams is over a thousand. The quantity of birds visible above us is staggering, but radar confirms that many more are flying our way. If the weather on September 11 is favorable for migration, the regional influence of the Tribute is tremendous, drawing in densities of migrating birds at 20 times (and up to 150 times) their normal levels. In seven nights of study over seven non-consecutive years of the Tribute in Light, the scientists estimate that 1.1 million birds were influenced by the beams. With the bird density count in hand from her volunteers, Elbin walks off to find the production staff. It’s time to turn out the lights. Just past midnight, with the lights illuminated once again, more birds appear in the beams. One of the volunteers recruited by Farnsworth, birder Anders Peltomaa, seeks out Elbin. Peltomaa is holding a dead male American Redstart—jet black, with a white belly and vivid orange patches on its wings, sides and tail. The bird is small enough to fit neatly into his open palm. Disoriented by the lights, the bird must have struck a building. Its neck appears to be broken. Elbin takes the dead redstart gently, her jaw set, and strides away to find the light production staff, corpse in hand. Typically, a shutdown takes 15 minutes to negotiate. This time, it takes five. “I just opened up my hand,” Elbin says, “I just took the bird and held it out. ‘Oh my God,’ [they] said, ‘Turn the lights out.’” The American Redstart is the first mortality of the night, and only the second bird ever found dead by NYC Audubon monitors at the Tribute. But it’s difficult to calculate the actual number of bird deaths due to the lights. At the Tribute and throughout downtown Manhattan, bird carcasses from collisions are often scooped up by building custodians or devoured by animal scavengers such as rats before they can be discovered in the morning light. Building collisions claim an estimated 90,000 birds a year in New York City. A study by scientists at the Smithsonian Migratory Bird Center estimated that nearly 600 million birds die every year in the United States due to building collisions. The low number of bird fatalities at the Tribute speaks to the dedication of all stakeholders and the powerful impact of turning off the lights, allowing the birds to fly on. During the 20 minutes of darkness after the lights are shut off, the pixelation on the radar above Lower Manhattan disappears. High up, further than we can see from the roof deck, the birds have dissipated, southbound again. As new pulses of birds migrate overhead, the lights are snuffed out four more times throughout the night. At last, in the hours toward dawn, the night seems calmer, emptier. I check the radar again. The blue and green pattern is now gray, indicating slower-moving biota: insects. Throughout the night, wisps of smoke coil off the spotlights as hundreds of insects, charmed by the lights, strike them repeatedly. Scattered around the arrays are the burnt bodies of stinkbugs and wasps, beetles and mantises, moths and flies. On the half-hour, Graham Montgomery, an entomologist from Cornell recruited by Farnsworth, discreetly collects them into neatly labeled vials. By dawn, Montgomery will find insects from around 40 families in 10 orders. A warmer night would have encouraged the movement of tens of thousands of insects. At sunrise, Great Black-backed and Ring-billed Gulls arrive on the roof to pick through the insects barbecued on the lights. Elbin takes her leave, shaking hands with the event staff and small group of rescue workers who stayed through the night. The Tribute is a necessary and beautiful memorial. The opportunity to study nocturnal bird migration here, and the gravity of this night, is not lost on the scientists. Earlier in the day, before joining Farnsworth at the Tribute, Cornell Lab researcher Kyle Horton had visited the World Trade Memorial Site for the first time, a somber visit that made a big impression on the 29-year-old. “The Tribute in Light is an important icon, a symbol of remembrance,” he says. “The fact that organizers are willing to turn the lights off for migratory birds is encouraging for conservation.” Farnsworth echoes that sentiment: “There’s another intention with this site, deep and profound. That will always color the science of what we’re doing. We’re lucky to have people who are thoughtful enough, caring enough, to let us do this.” Annie Novak writes about the connections between people, agriculture, and ecology for The Atlantic and Organic Life magazine. She is currently working on a book about the scientific study of nocturnal bird migration. This article originally appeared in Living Bird magazine and has been reprinted with permission.
<urn:uuid:85737a13-3afc-4600-84a6-d353bf60ae4a>
CC-MAIN-2023-14
https://junipercivic.com/juniper-berry/article/protecting-wildlife-while-remembering-9-11
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945242.64/warc/CC-MAIN-20230324020038-20230324050038-00758.warc.gz
en
0.936985
2,244
2.546875
3
Madeline L'Engle's exposition of the concept of multiple dimensions is in Chapter Five: "The Tesseract," of A Wrinkle in Time. Below, a dissection and analysis of her treatment of the concept from a modern and more strictly mathematical point of view… (Italicized passages are from the text and in context as much as possible)Chapter 5:The Tesseract"Yes," Mrs. Which said. "Hhee iss beehindd thee ddarrkness, sso thatt eevenn wee cannott seee hhimm." L'Engle's treatment of "the darkness" curiously recalls the astronomical concept of dark matter. "The Black Thing" is not necessarily an entity in and of itself; it is observed mainly through its effect on worlds, planets, and galaxies discussed in the book. This is analogous to the modern idea of dark matter in the universe-basically invisible, astronomers note its presence through the gravitational effects of its mass on objects. Although most of the modern theory of dark matter had been developed since A Wrinkle in Time was published in 1962, the idea of an invisible substance that drastically affects the order and motion of objects is centuries old: "James Clerk Maxwell (1831-1879), founder of the modern theory of electromagnetism, wrote [that] 'Whatever difficulties we may have in forming a consistent idea of the constitution of the aether [proposed invisible 'glue' of the universe, which some mathematicians have purported to exist between objects in space, both on large and small scales], there can be no doubt that the interplanetary and interstellar spaces are not empty, but are occupied by a material substance or body, which is certainly the largest, and probably the most uniform body of which we have any knowledge.'" (Quoted by Rudy Rucker in his book The Fourth Dimension. Boston: Houghton Mifflin Company. 1984. Page 71.) Meg began to cry, to sob aloud. Through her tears she could see Charles Wallace standing there, very small, very white. Calvin put his arms around her, but she shuddered and broke away, sobbing wildly. Then she was enfolded in the great wings of Mrs. Whatsit and she felt comfort and strength pouring through her. Mrs. Whatsit was not speaking aloud, and yet through the wings Meg understood words. "My child, do not despair. Do you think we would have brought you here if there were no hope? We are asking you to do adifficult thing, but we are confident that you can do it. Your father needs help, he needs courage, and for his children he may beable to do what he cannot do for himself." "Nnow," Mrs. Which said. "Arre wee rreaddy?" "Where are we going?" Calvin asked. Again Meg felt an actual physical tingling of fear as Mrs. Which spoke. "Wwee musstt ago bbehindd thee sshaddow." "But we will not do it all at once," Mrs. Whatsit comforted them. "We will do it in short stages." She looked at Meg. "Now wewill tesser, we will wrinkle again. Do you understand?" "No," Meg said flatly. Mrs. Whatsit sighed. "Explanations are not easy when they are about things for which your civilization still has no words. Calvintalked about traveling at the speed of light. You understand that, little Meg?" Incidentally-The speed of light equals 3 x 10^8 meters/second, which is roughly equivalent to 670 million miles per hour. It is believed to be physically impossible for humans to travel at this speed, and at any rate, it would do a number on the body. "Yes," Meg nodded. "That, of course, is the impractical, long way around. We have learned to take short cuts wherever possible." "Sort of like in math?" Meg asked. "Like in math." Mrs. Whatsit looked over at Mrs. Who. "Take your skirt and show them." "La experiencia es la madre de la ciencia. Spanish, my dears. Cervantes. Experience is the mother of knowledge." Mrs. Who took a portion of her white robe in her hands and held it tight. "You see," Mrs. Whatsit said, "if a very small insect were to move from the section of skirt in Mrs. Who's right hand to that in her left, it would be quite a long walk for him if he had to walk straight across." Swiftly Mrs. Who brought her hands, still holding the skirt, together. "Now, you see," Mrs. Whatsit said, "he would be there, without that long trip. That is how we travel." Mrs. Who's movement of her skirt changes the one dimensional line of before. The curve she forms is still technically one dimensional (that is, any point on the curve can be described by a single coordinate), but by connecting the two endpoints of the line together, she describes an elliptical polygon, which exists in a two dimensional plane. Mrs. Who's "trip" had to involve the next higher dimension. The "wrinkle in time" concept hinges upon using the fourth (or fifth-more on this later) dimension to similarly bend and join parts of the familiar three (or four) dimensional world in which the reader, L'Engle, and our characters live. The idea is that the fabric of space/time 'wrinkles'-folds onto itself, creating new paths for travel. By creating the ellipse with the line of Mrs. Who's skirt, L'Engle's utilizes the idea of two points' possibly being the same point in the next higher dimension. An infinite series of (x,y) coordinates in a Cartesian plane could have the same z coordinate in the third dimension-thus, in the next higher dimension, these two points are in the same "place." It is possibly to algebraically extrapolate this idea into the third and fourth dimension. An infinite series of (x, y, z) coordinates in three dimensional space could all have the same coordinate q in the fourth dimension. This entire series of points could all exist in the same "place" in the fourth dimension, thus making travel from three dimensional point to three dimensional point both possible and instantaneous in the fourth dimension. Charles Wallace accepted the explanation serenely. Even Calvin did not seem perturbed. "Oh, dear," Meg sighed. "I guess I am a moron. I just don't get it." A large part of the lasting appeal of "A Wrinkle in Time" is the fact that the hero is quite obviously flawed and easy to relate to. An interesting parallel exists here between Meg's understanding of math and the mathematical concepts used in the book. Meg relies on shortcuts and a sort of intuition to handle her math work in school. She does not do mathematics in traditional ways. The entire area of dimensions and theoretical geometry has, by necessity, been trailblazed by those mathematicians who used traditional mathematics in non-traditional ways. These concepts have also been investigated by 'amateur' mathematicians-writers such as Jorge Luis Borgesand Gabriel Garcia Marquez have used dimensional and time-related concepts in their works. Many children's authors have investigated new ways of travel that imply, if not other dimensions, different modes of looking at our reality. Lewis Carrol sends Alice to another world through the looking glass and down rabbit holes, and C.S. Lewis uses a wardrobe. Edwin Abbott Abbott, one of the first people to think seriously about dimensions and their implications, wrote a book called Flatland in 1884 about shapes that travel from dimension to dimension. "That is because you think of space only in three dimensions," Mrs. Whatsit told her. "We travel in the fifth dimension. This issomething you can understand, Meg. Don't be afraid to try. Was your mother able to explain a tesseract to you?" This is where L'Engle's math gets a little confusing. Traditionally, the tesseract is a term used to describe the hypercube. The hypercube is an object in the fourth dimension, analogous to a point in the zero dimension, a line in the first dimension, a square polygon in the second dimension, and a cube in the third dimension. Thus, a "tesseract" is an object of the fourth dimension, not the fifth. "Well, she never did," Meg said. "She got so upset about it. Why, Mrs. Whatsit? She said it had something to do with her and Father." "It was a concept they were playing with," Mrs. Whatsit said, "going beyond the fourth dimension to the fifth. Did your mother explain it to you, Charles?" It's interesting that L'Engle assumes here that everyone is comfortable with the fourth dimension's existence at all. Having taken an informal poll on the campus of Yale University, I have found that a surprisingly vocal minority of students (close to a majority) don't believe that a fourth dimension (let alone the fourth dimension) exists. (Incidentally, according to The American Heritage Dictionary, there's no such thing as a tesseract. Maybe Mr. Jenkins wrote it.) Many of those students who did believe that it exists are even more vague about it than L'Engle, when she refers to it simply as time. More on this later. "Well, yes." Charles looked a little embarrassed. "Please don't be hurt, Meg. I just kept at her while you were at school till I got it out of her." Meg sighed. "Just explain it to me." "Okay," Charles said. "What is the first dimension?" Note: The "zero" dimension is a single point "Well--a line: ----------------" "Okay. And the second dimension?" "Well, you'd square the line. A flat square would be in the second dimension." L'Engle's use of the verb "to square" is a little curious. The American Heritage (1983) Dictionary's definition of "square" as a verb is "to multiply (a number, quantity, or expression) by itself." If we work with a single variable, x, then the zero dimension (i.e. x^0) equals one and is a single point. The first dimension would be x^1, or x. If we find the second dimension by squaring the first, then we'd get x times x, or x^2. So far so good, but later… "And the third?" "Well, you'd square the second dimension. Then the square wouldn't be flat any more. It would have a bottom, and sides, and a top." If we were to follow the pattern above, then we'd square the second dimension, or x^2. However, (x^2)^2 is x^4, not x^3. (This follows from the additive property of multiplying exponents) To go from one dimension (expressed in terms of x), you only need to multiply the previous dimension by x. This is not a drastic mistake, but it shows that the mathematics in A Wrinkle in Time were not L'Engle's primary concern. In many ways, the mathematical concepts in A Wrinkle in Time were used as a vehicle to provide an opportunity for L'Engle to express her religious beliefs. "Well, I guess if you want to put it into mathematical terms you'd square the square. But you can't take a pencil and draw it the way you can the first three. I know it's got something to do with Einstein and time. I guess maybe you could call the fourth dimension Time." Okay, this paragraph has some serious mathematical inaccuracies. First of all, one can draw a hypercube (or the outline/shadow of one) using a pencil. Of course, this figure isn't perfect. But we can all draw a three-dimensional cube on a blackboard and understand what we're seeing, and this is the same idea. See below. Secondly, L'Engle calls the fourth dimension the square of a square. In algebraic terms, this would be expressed as (x^2)^2, or x^4, which is accurate. It's curious that L'Engle had this concept right and not the previous. However, she didn't get to the fourth dimension directly via the third dimension, as in (x^3) times x equals x^4. If she had been consistent with this progression in the chapter, the math would have actually been simpler and more accessible for her readers. Calling the fourth dimension "something to do with Einstein and time" is a gross oversimplification. Algebraically, the fourth dimension is a simple extension of basic mathematical principles in the first, second, and third dimensions.L'Engle actually recalls the aforementioned Flatland by referring to the fourth dimension as time. In Flatland, a creature (called A. Square) lives in a two-dimensional flat world. A. Square is visited by a sphere, from the third dimension. Obviously, all of the sphere cannot exist in Flatland at the same time. The sphere is forced to travel through Flatland one part at a time, as shown below in an original illustration by Abbott Abbott from the book. A. Square's view of the sphere is always changing-he first sees a point, then the outline (actually, he sees only part of the curve) of a small circle, then a larger circle, then a larger, and so on until the sphere crosses Flatland at its diameter and is at its largest. Then the circles that A. Square sees get smaller again, until the sphere shrinks back down into a point. A. Square sees the sphere as movement, as constantly changing. In the book, he says that he has seen the "lifetime" of the sphere. A. Square has seen change over time. To A. Square living in the second dimension, an object from the third dimension appears as movement or "time" in his world. This idea is one reason that some people living in the third dimension call the fourth dimension time. If we saw a fourth dimensional object enter our third dimensional space, we'd see it as movement and time. "That's right," Charles said. "Good girl. Okay, then, for the fifth dimension you'd square the fourth, wouldn't you?" Well, no. You know by now that if we squared the fourth dimension we wouldn't get the fifth dimension. (x^4)^2 equals x^8, not x^5. To go to the fifth dimension from the fourth, you multiply the fourth dimension by x, as in (x^4) times x equals x^5. Is this getting more familiar now? "I guess so." "Well, the fifth dimension's a tesseract. You add that to the other four dimensions and you can travel through space without having to go the long way around. In other words, to put it into Euclid, or old-fashioned plane geometry, a straight line is not the shortest distance between two points." L'Engle is combining a lot of ideas here-folding dimensions up in the next dimension, "adding" dimensions-that don't completely follow. The idea that "a straight line is not the shortest distance between two points" is interesting, but L'Engle should have added the qualifier "in higher dimensions." For a brief, illuminating second Meg's face had the listening, probing expression that was so often seen on Charles's. "I see!" she cried. "I got it! For just a moment I got it! I can't possibly explain it now, but there for a second I saw it!" It's tough to imagine the fourth dimension, since our eyes are conditioned from birth to recognize just the third. Visualization is definitely possible (honestly), and it can occur in this sudden flash that Meg has here. She turned excitedly to Calvin. "Did you get it?" He nodded. "Enough. I don't understand it the way Charles Wallace does, but enough to get the idea." "Sso nnow wee ggo," Mrs. Which said. "Tthere iss nott all thee ttime inn tthe worrlld." "Could we hold hands?" Meg asked. Calvin took her hand and held it tightly in his. "You can try," Mrs. Whatsit said, "though I'm not sure how it will work. You see, though we travel together, we travel alone. We will go first and take you afterward in the backwash. That may be easier for you." This idea of "backwash" is interesting. Some projections of the hypercube/tesseract into the second dimension show one cube with a smaller cube within it, and the larger cube appears to be spitting out the smaller cube. As it is spit out the smaller cube grows, and the larger cube shrinks, and the larger cube become the smaller cube and the smaller cube becomes the larger cube. It does almost look like the smaller cube is being dragged by the larger, in at of "backwash." As she spoke the great white body began to waver, the wings to dissolve into mist. Mrs. Who seemed to evaporate until there was nothing but the glasses, and then the glasses, too, disappeared. It reminded Meg of the Cheshire Cat.--I've often seen a face without glasses, she thought;--but glasses without a face! I wonder if I go that way, too. First me and then my glasses? She looked over at Mrs. Which. Mrs. Which was there and then she wasn't. There was a gust of wind and a great thrust and a sharp shattering as she was shoved through--what? Then darkness; silence; nothingness. If Calvin was still holding her hand she could not feel it. But this time she was prepared for the sudden and complete dissolution of her body. When she felt the tingling coming back to her fingertips she knew that this journey was almost over and she could feel again the pressure of Calvin's hand about hers. Without warning, coming as a complete and unexpected shock, she felt a pressure she had never imagined, as though she were being completely flattened out by an enormous steam roller. This was far worse than the nothingness had been; while she was nothing there was no need to breathe, but now her lungs were squeezed together so that although she was dying for want of air there was no way for her lungs to expand and contract, to take in the air that she must have to stay alive. This was completely different from the thinning of atmosphere when they flew up the mountain and she had had to put the flowers to her face tobreathe. She tried to gasp, but a paper doll can't gasp. She thought she was trying to think, but her flattened-out mind was as unable to function as her lungs; her thoughts were squashed along with the rest of her. Her heart tried to beat; it gave a knifelike, sidewise movement, but it could not expand. It's interesting to try to imagine our third dimensional bodies being suddenly transported to a two dimensional world. For one thing, our lungs couldn't expand; we couldn't breathe. All of our blood vessels would be squished flat-could blood move through veins and arteries like that? Digestion, muscle control, standard movement, standard thinking (with a flat brain?) would all be out of the question. But then she seemed to hear a voice, or if not a voice, at least words, words flattened out like printed words on paper, "Oh, no! We can't stop here! This is a two-dimensional planet and the children can't manage here!" She was whizzed into nothingness again, and nothingness was wonderful. She did not mind that she could not feel Calvin's hand, that she could not see or feel or be. The relief from the intolerable pressure was all she needed. Then the tingling began to come back to her fingers, her toes; she could feel Calvin holding her tightly. Her heart beat regularly; blood coursed through her veins. Whatever had happened, whatever mistake had been made, it was over now. She thought she heard Charles Wallace saying, his words round and full as spoken words ought to be, "Really, Mrs. Which, you might have killed us!" This time she was pushed out of the frightening fifth dimension with a sudden, immediate jerk. There is another way to look at the fourth/fifth dimension confusion in this chapter. Meg and Calvin and Charles Wallace and the Mrs. W's do travel in fourth dimensional space, presumably, and this travel does take a small amount of time. In this way, their new fourth dimensional world has a small element, or thickness, of the fifth dimension. There she was, herself again, standing with Calvin beside her, holding onto her hand for dear life, and Charles Wallace in front of her, looking indignant. Mrs. Whatsit, Mrs. Who, and Mrs. Which were not visible, but she knew that they were there; the fact of their presence was strong about her... Written by Jessica Weare © 1998 by Eli Weiss. Last modified: Fri 4 Dec 1998
<urn:uuid:4d984c0f-7ea3-43a1-bc03-fea3a7c13e77>
CC-MAIN-2023-14
https://www.math.brown.edu/tbanchof/Yale/project12/math.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945242.64/warc/CC-MAIN-20230324020038-20230324050038-00758.warc.gz
en
0.973211
4,483
3.15625
3
Rapid and efficient mixing of particles in a microfluidic system is of great interest for chemical and biochemical analysis, especially in miniaturised lab-on-a-chip platforms. In the larger scale, mixing relies on turbulence and chaotic stirring of the fluid. This is commonly achieved in laboratories by using rotating magnets to move magnetic stirrers. However, this kind of contactless actuation is difficult to implement in a small lab-on-a-chip device. In the small scale, mixing is not as straightforward because the large-scale friction forces make fluid flow laminar and stable. Furthermore, most biological particles such as cells are non-magnetic and do not respond to a magnetic field. Prof. Nam-Trung Nguyen’s team at the Queensland Micro- and Nanotechnology Centre of Griffith University solved these problems by utilising a magnetofluidic phenomenon called diamagnetophoresis. “Magnetism can stir particles if there is a mistmatch in magnetic properties between the particles and the surrounding fluid. The particles do not need to be magnetic. We can make the surrounding fluid magnetic to move non-magnetic particles around in the small scale,” said Ahmed Munaz, the first author of this research. The team developed a microfluidic device with a set of external rotating magnets. The magnets create a complex rotating magnetic field that can efficiently mix multiple non-magnetic samples dispersed in magnetised fluid. The team’s microfluidic platform achieved 86% mixing efficiency. “With the fabrication support from ANFF-Q, we are able to design and fabricate the device prototypes within just a few days. The quick turnaround enables the optimisation of our mixing concept and the verification of numerical simulation data,” said Mr. Munaz. “Our proof-of-concept results pave the way for the implementation of an all magnetofluidic lab-on-a-chip platform that uses magnetism for contactless sample preparation steps such as mixing and separation of biological particles such as cells, exosomes and DNA fragments.”
<urn:uuid:1204c42b-a4ca-4f5a-8ef6-377435aad7e5>
CC-MAIN-2023-14
https://anff-q.org.au/casestudy/magnetic-micromixer-non-magnetic-samples/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945323.37/warc/CC-MAIN-20230325095252-20230325125252-00758.warc.gz
en
0.913936
435
3.203125
3
Some basic factors which may increase the risk of developing lupus include: - Gender: Lupus can be diagnosed in both men and women, but is more common among the fairer sex. - Age: The most common age range (although not exclusively) in which lupus is diagnosed is between 15 and 44. - Race: Ethnicity does play a role in how high a person’s risk for lupus is. It has been commonly diagnosed among African-American, Hispanics and Asians. Lupus can lead to an increased risk of infections such as urinary tract infections, respiratory infections, yeast infections, salmonella, herpes and shingles, as well as cancer, avascular necrosis (bone tissues which diminish or ‘die’ due to collapse) and pregnancy complications (higher risk of miscarriage, high blood pressure (preeclampsia) and preterm birth. Typical complications of lupus often result from inflammation in the body in varying degrees of severity. Serious kidney damage (or failure) is one of the leading causes of death among people with lupus. Other complications include damage to the brain and central nervous system where sufferers experience physical and behavioural changes (headaches, dizziness, hallucinations, seizures and even stroke). Blood problems (anaemia, bleeding,blood clotting or vasculitis) are also common complications. Breathing problems and inflammation of the chest cavity lining (pleurisy) can also lead to the development of pneumonia. Inflammation of the heart muscle, arteries or pericardium (heart membrane) known as pericarditis can also occur resulting in cardiovascular disease and heart attacks. Lupus and pregnancy Both pregnancy and lupus carry their own set of risks and complications for both mother and child. Not all women with lupus will be completely discouraged from falling pregnant, but it is essential to work with a doctor to ensure the best outcome, keeping all risk factors and complications top of mind, for both mother and child. Many women have been able to safely fall pregnant and have healthy babies while managing symptoms of lupus. For a woman with lupus, the first steps for a healthy pregnancy begin before the time of conception. It’s vitally important to ensure that lupus is under control for at least six months before falling pregnant. Pregnancy naturally places additional stresses on the body and its functions. The healthier a woman is when she conceives, the greater her chances of a healthy pregnancy and baby. Pregnancies in women with lupus are often classified as ‘high-risk’ and the attending doctor will take extra precautions. Selecting an obstetrician (gynaecologist) who specialises in or has experience with high-risk pregnancies is recommended. Selecting a hospital that is well-known for successful high-risk deliveries is also worth considering. It is also a good idea to ensure that, if applicable in a woman's country of residence, health insurance plans be checked thoroughly to ensure that any necessary treatments required are covered. Many potential risks or complications in expectant moms with lupus can be prevented or sufficiently treated if addressed early. Some problems which could develop are: - ‘Flares’: An improvement of normal lupus symptoms during pregnancy, while in others symptoms appear to worsen (especially during the first 3 months after birth). - Hypertensive complications: High blood pressure (preeclampsia) often requires immediate treatment. - Miscarriage: The loss of a baby can be as a result of high blood pressure, active lupus (a flare-up of symptoms), kidney disease or antiphospholipid antibodies (a type of antibody that increases the risk of blood clots in the veins and arteries, as well as those in the placenta). An expectant mom should be screened for antibodies, especially if a woman has miscarried before. - Preterm delivery: This occurs more frequently where preeclampsia, antiphospholid antibodies and active lupus symptoms develop during pregnancy. Symptoms that can indicate premature labour include backache, pelvic pressure, leakage of fluid (clear or blood) from the vagina, abdominal cramps and contractions occurring every 10 minutes (or more).
<urn:uuid:d7e805cd-a056-44e9-a37e-6cc41294caf4>
CC-MAIN-2023-14
https://www.mymed.com/diseases-conditions/lupus/risk-factors-and-complications-of-lupus
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945323.37/warc/CC-MAIN-20230325095252-20230325125252-00758.warc.gz
en
0.946909
888
3.375
3
How much milliliters are in a cup of coffee? The average diner coffee cup is likely 5 or 6 ounces (138 to 168 ml) and mugs can be just about anything from 230 to 450 ml. Attention in mug-making is given to the design and decoration, not to the capacity. What is the standard size of a coffee cup? What is The Standard Coffee Cup Size? - Espresso. Also known as demitasse cups, these small white cups are widely used throughout the world. … - Latte. A classic latte can be served in a cup holding between 6 to 9 ounces with the most common standard size being 8 oz. - Cappuccino. Most baristas will vote for a 6 oz size coffee cup for cappuccinos. … - Turkish. … How many mg of caffeine in 1 cup of coffee? The short answer is that an average cup of brewed coffee contains around 95 mg of caffeine while for any espresso or espresso based drink it is 63 mg for a single shot and 125 mg for a double shot.To put that in context, health experts recommend 400 mg of caffeine per day for an healthy adults. How many Oz are in a cup of coffee? In the US, a cup of coffee usually measures 4-6 fluid ounces or 118-177ml. In fact, most popular carafe coffee makers use 5fl oz cups to size their carafes. For example, a 12-cup Cuisinart coffee carafe holds 12 five-ounce cups of coffee.
<urn:uuid:1bb0cc08-b1aa-4915-8561-3cb1ebc7b651>
CC-MAIN-2023-14
https://coffeetearoom.com/how-many-milligrams-in-a-cup-of-coffee/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00758.warc.gz
en
0.932238
319
2.59375
3
Childhood depression is different from the normal “blues” and daily emotions that children go through as they develop. Just because a child appear sad doesn’t necessarily mean they have significant depression. But if the sadness becomes discouragement or interferes with normal social activities, interests, schoolwork, or family life, it may mean they have a depressive illness. Put in mind that while depression is a serious illness, it’s also a treatable one. A depressive disorder is typically defined as a mood disorder which goes above the usually blue mood, it goes across the average sadness and grief an individual feels. Somebody suffering from Depression may not only experience sadness and negative thoughts but may also lose interest in their daily activities or activities they liked doing before viz. eating, sleeping, talking, sexual activity. They may also develop aches beyond their body and might not want to continue living. These individuals frequently have suicidal thoughts and may also resort to self-harming. Initially, the general public did not believe that children could suffer from a severe condition like this and had highly invalidated children who did experience depression but over time with growing research being done in this field, people have been growing more and more tolerant. Depression is actually common at every age and has been estimated to affect more than 16% of children at some point in their lives and it has been seen to be increasing in children and adolescents. Children may suffer from episodes of reasonable to severe depression which can be associated with major depressive disorder, or dysthymia according to best psychologist in India. Depression may also beyond doubt as a part of other mood disorders namely bipolar disorder or might be a result of a child’s exposure to some particular medications or drug abuse. While all of the mentioned earlier reasons could be hypothesized to be the reason for a child’s depression, it is important to understand that a single factor does not contribute to this condition; a number of biological, psychological, and environmental factors can also play a part. Signs and symptoms of depression in children: The symptoms of depression in children vary. The condition is often undiagnosed and untreated because symptoms are received off as normal emotional and psychological changes. Early medical research focused on “masked” depression, where a child’s depressed mood was evidenced by acting out or angry behavior. While this does happen, especially in younger children, many children display sadness or low mood similar to adults who are depressed. The primary symptoms of depression rotate around sadness, a feeling of hopelessness, and mood changes. Signs and symptoms of depression in children added: • There may be changes with hunger and weight • They may be feeling snappy, sad, always in tears • They may be feeling a loss of energy in them • They may be feeling some regret or ashamed of something from the past or may feel that they may do something wrong • They may be having trouble in concentration • There may be a loss of interest in activities which they used to enjoy previous • They may be feeling agitated • There may be frequent thoughts of suicide or they may be thinking of death • There may be some sleep disturbances like insomnia or extra sleeping • Away from this they may be having some physical issues like stomach aches, headaches or they may also indulge in substance use with poor performance in school. Not all children have all of these symptoms. In fact, most will show different symptoms at different times and in different settings. Although some children may continue to do fairly well in structured environments, most kids with important depression will have a noticeable change in social activities, loss of interest in school, poor academic performance, or a change in presence. Children may also begin using drugs or alcohol, chiefly if they are over age 12. Causes of depression in children: Some common causes of depression in children are stressful life reaction and divorce of parents. But genetics may also play a important role in it. The causes may be as follows: • Brain chemistry: when there is some inequality in the neurotransmitters and hormones, it will affect the way the brain works. This will change the mood and emotions in turn. • Environmental factor: When the environment is stressful and chaotic, it may also change the children and make them go into depression. • Family history: Research has solved that children who have a history of parents or anyone in the family with any mood disorders, are at a higher risk of depression. • Stress and trauma: Some changes like after the dissolution of the parents or moving into another house or some trauma like losing a loved one, an abuse or an aggression may also affect the thinking pattern of the child and make the child depressed. This may be because for a short time or long time also. For the treatment action typically pediatricians and primary care doctors are approached for diagnosis first for childhood depression, may be due to the social stigma around it. It becomes important though to approach mental health counselors who are efficient in this particular field. While accepting the treatment, family support becomes truly important for a child. The family should encourage a healthy mental state, good lifestyle habits, and also inspire the child to be more in touch with their feelings. With the right contact, techniques, and good support and love around, the child feels reassured and it helps them heal faster. Can Depression in Children Be Prevented? Children with a family history of depression are also at higher compromise of depression. Children who have parents with depression bear to have their first episode of depression earlier than children whose parents don’t have the condition. Children from chaotic or conflicted families, or children and teens who abuse physical matters like alcohol and drugs, are also at greater risk of depression.
<urn:uuid:df9fd731-aa15-420e-967c-eae6c049250b>
CC-MAIN-2023-14
https://drvinodmune.com/childhood-depression-genetics-reasons-causes-and-symptoms/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00758.warc.gz
en
0.961219
1,169
3.640625
4
Funder: This project is currently seeking funding Principal Investigators: Nhat Le, Ronald Geskus, Marc Choisy Location of activity: Hanoi and Ho Chi Minh City, Viet Nam Collaborator(s): Dr Pham Quang Thai, Epidemiology Department, National Institute of Hygiene and Epidemiology (NIHE), Vera Arntzen (Leiden University) This study aims to develop a standardised format for the questionnaire on contacts and build a smart device app to collect contact-tracing information. The world becomes increasingly more vulnerable to pandemics of novel infectious agents. When a novel infection emerges, an efficient methodology to contain the spread is contact tracing, which aims to identify all contacts of a diagnosed case and test them for infection. Contact tracing is generally performed in a rush and in a way that is not always carefully considered. Furthermore, the data are collected to address immediate public health questions and are rarely collected in a standard format. We propose a system to collect contact tracing information in a safe and standardised way. Such a system fulfils immediate public health purposes like containing the outbreak and is also helpful for research purposes. For example, contact tracing data can provide information for estimating key epidemiological quantities such as the distribution of latency and incubation period. Precise and unbiased estimates of these quantities will improve the predictions from epidemiological and mathematical models and thus are extremely valuable for efficient and timely control of the disease. - We design an electronic questionnaire on individual contact-tracing information, which is embedded into an app. This app connects to a central database in the cloud server. The app can also detect frequent errors during data entry, such as multiple formats of dates or Vietnamese free text. We will investigate how best to structure the questionnaires. - We write an R package that can read the raw contact data per individual into R and transform the data into a format that consists of possible sources of infection and the period of contact with each of them. The package also includes functionalities that appeared as a shiny app that visualises the transmission chain developed by Vera Arntzen.
<urn:uuid:5407600e-32f2-4654-aa87-c2bceee611ec>
CC-MAIN-2023-14
https://www.oucru.org/a-web-based-application-on-contact-tracing-questionnaire/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00758.warc.gz
en
0.901984
444
2.59375
3
ASHRAE Standard 188P: Prevention of Legionellosis in Building Water Systems Two dreaded words no facility manager wants to hear: Legionnaires’ disease. The mere mention evokes haunting images of the 1976 American Legion Convention in Philadelphia at which 220 became ill and 30 died. No one wants the stigma of Legionella bacteria associated with their building. Just one case of Legionnaires’ disease can shine an unwanted spotlight on a building’s water system and wreak havoc by creating negative publicity, disruptive emergency disinfection, damaged reputations, diminished property values, legal liability and potentially huge expense. According to a Centers for Disease Control and Prevention (CDC) report released in August 2011, over the past 10 years, Legionnaires’ disease cases have increased by 217 percent. That translates to 18,000 to 20,000 cases annually in the United States. Of those cases, 10 to 30 percent were fatal. Additionally, according to published research, up to 70 percent of all building water systems are contaminated with Legionella, the bacteria that cause Legionnaires’ disease (a serious but preventable form of pneumonia), as well as Pontiac Fever, a flu-like illness. Pontiac Fever was the pathogen responsible for sickening more than 200 people in the widely reported outbreak at the Playboy mansion. Together, these two diseases are called Legionellosis. Occupants in buildings can become ill when they ingest or inhale water or aerosols contaminated with Legionella. In a health care setting, it can also be transmitted through respiratory devices. Although anyone at any age can contract Legionellosis, the people most at risk are smokers, the elderly, and individuals with impaired immune systems. Legionella guidelines have been around for years, but currently there is no consensus on the best industry practices to follow for prevention and control of Legionellosis. Making matters worse, many recommendations in existing guidelines are backed by little or no scientific evidence. Some of these ineffective practices are labor-intensive, costing facility managers wasted time and money. To respond to this growing threat to public health, the American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. (ASHRAE) will release ASHRAE Standard 188P: Prevention of Legionellosis Associated with Building Water Systems. This new standard will require that facility managers implement stronger safeguards through pro-active risk assessment and risk management practices. ASHRAE STANDARD 188P, written by engineering, microbiology, disease prevention and water treatment experts, provides a comprehensive set of practices that facility managers can follow, to help prevent Legionellosis. The standard specifies uniform practices for risk assessment and management. It covers potable water systems; cooling towers and evaporative condensers; whirlpool spas; decorative fountains; other water features; and aerosol-generating air coolers, humidifiers, and washers. Facility Manger Responsibilities Determining responsibility for water safety in buildings has historically been murky. It typically falls somewhere among the building owner, the facility manager and a water treatment company. ASHRAE STANDARD 188P lays the responsibility for water safety squarely at the feet of those responsible for the water systems. That means everyone associated with design, construction, installation, ownership, operation, management, and maintenance are required to ensure building water systems are designed, maintained and operated in a manner that minimizes the risk of Legionellosis. There is no question that the new standard puts facility managers on the front line of Legionellosis prevention. ASHRAE Standard 188P applies to water systems in human-occupied buildings — new and existing. Single-family residential homes are exempt. To comply with the standard, facility owners and managers will be required to do an annual survey of their buildings, on a building-by-building basis, to determine risk characterization. If a building possesses one or more of the risk characteristics set out in the standard, it will be necessary to develop a risk management plan for Legionella control. This includes conducting an evaluation using Hazard Analysis Critical Control Point (HACCP) methodology, documenting water system operation and maintenance, and verifying monitoring and control. ASHRAE Standard 188 also requires validating that Legionella is under control in all water systems. These include:potable and utility water systems for water used for drinking, cooking, washing, bathing, and also water emitted from plumbing fixtures, cooling towers, boilers and other HVAC-related equipment. Annual Survey to Determine Risk Characteristics There are specific building characteristics that allow Legionella to colonize building water systems. Facilities at high risk for Legionella include healthcare facilities, such as hospitals and nursing homes. An increasing number of cases have been reported from assisted-living and long-term care facilities. Under the new standard, facility managers are charged with conducting an annual survey to determine what risk is present in their buildings. Specific risk factors called out in the standard are: - multiple housing units with one or more centralized water heaters - more than 10 stories (including levels below grade) - cooling tower or evaporative condenser - one or more whirlpools or spas within or adjacent to building - devices that release aerosols (e.g., ornamental fountains, misters, air washers or humidifiers) - incoming potable water containing less than 0.5 ppm residual halogen such as chlorine - inpatient health care facility - occupants primarily older than age 65 - occupants receiving chemotherapy for cancer or bone marrow transplantation. If a facility manager determines that at least one of these risk factors is present, then a risk management team must be assembled to prepare and implement a HACCP plan designed to prevent the threat posed by Legionella bacteria. What facility mangers should know about Standard 188P and HACCP ASHRAE Standard 188 is modeled after HACCP — a tool used to determine, plan and protect against risks found in a variety of industries, from manufacturing to food service. It is a method employed to improve quality and safety. In the food industry, it is employed to prevent disease from infectious organisms transmitted into food and water. The effectiveness of this approach for assessing the hazards of Legionella in building water systems is yet to be proven, but it nevertheless provides a structured course of action aimed at reducing risk for waterborne pathogens. Responding to Legionella in your water system will require a team effort. ASHRAE recommends that the first step is to convene a risk management team consisting of a combination of employees, suppliers and consultants. Who is on the team is more important than the number of members. Nevertheless, ASHRAE requires at least one person who is familiar with HACCP principles and one person that understands the building water systems. An optimal team might consist of someone in your organization with knowledge of safety and health issues, a representative from your water treatment company, a Legionella risk management professional and a laboratory with Legionella expertise. Once the team is established, its task is to conduct a hazard analysis of the building’s potable and utility water. From these hazard analyses, two separate diagrams will be created. These diagrams will identify control points; determine critical control points; establish monitoring procedures and corrective actions; verify that Legionella is controlled; and create documentation concerning all procedures and records appropriate to these principles. ASHRAE specifically requires that for every critical control point (i.e., where the presence of Legionella bacteria is of most concern), the team must address four issues about the hazard control method being applied: (1) critical control limit of Legionella bacteria, (2) hazard control monitoring method, (3) frequency of monitoring hazard control, and (4) corrective actions to be taken if the critical control limit is exceeded. ASHRAE STANDARD 188P requires a written, comprehensive, prevention plan. The HACCP documentation should include process flow diagrams, hazard analysis summaries, the monitoring schedule, equipment device maintenance schedules, validation summary, verification schedule and planned responses to disruptions in water services. The written plan should include procedures for maintenance of each potable or utility water device identified in the process flow diagrams; cleaning and disinfection before commissioning any new system; restarting safely after a drained shutdown or any unplanned loss of energy; treatments following water supply interruption or breaks in water supply piping; and the method and frequency of temperature measurements in the water heaters and in the distribution system. In addition, facility managers must identify conditions that could allow cooling tower exhaust (drift) to infiltrate buildings and develop water treatment procedures to control Legionella in cooling towers and evaporative condensers. Other aerosol-generating equipment (decorative fountains, misters, air coolers, humidifiers, and air washers) that disperse small water droplets into the air also require procedures to guard against the amplification and dissemination of Legionella bacteria. Monitoring, disinfection and legal considerations Monitoring for Legionella is the key to prevention. Testing your water system is the only way to confirm the presence of Legionella. Studies show there are no substitutes for testing — including the temperature, chlorine, and disinfectant residual — that can predict the presence or absence of Legionella. For example, total bacterial counts aren’t predictive of the presence or absence of Legionella. Simply put, if you don’t test, you don’t know. Leading experts in the detection and remediation of Legionella have recommended culturing water to assess risk and to verify the efficacy of disinfection. If a Legionnaires’ disease or Pontiac fever outbreak is suspected to have originated from your water system, ASHRAE STANDARD 188P requires disinfection. Chemical and thermal systems or a combination are recommended. Selecting a disinfection method that works best requires analysis based on efficacy, cost, installation and maintenance. No disinfection technique can be successful without a conscientious monitoring program and a committed staff. If a disinfection system is installed, Legionella site positivity and disinfectant concentrations need to be routinely monitored — often for the life of the system. Legionella Expertise Recommended While the standard goes a long way in providing guidance to control Legionella, it is by no means an exhaustive guide for effective prevention and disinfection. According to some industry experts, some of the methods of disinfection mentioned in the standard are of questionable effectiveness in controlling Legionella. Given that Standard 188P requires that the risk assessment team include persons knowledgeable in Legionella and HACCP, this may require seeking outside consultation with professionals. One useful pace to start is by seeking the guidance from current publications and sources such as www.legionella.org. Impact of Standard 188 on Legal Liability Where ASHRAE Standard 188P is adopted in building codes, it will have the force of law. Even where not formally made part of a code, standards such as this are often argued to establish best practices for the industry. Compliance with a standard can assist in establishing compliance with the industry standard of care. Conversely, if compliance is not attempted or achieved, you can expect that a plaintiff will argue that the defendant(s) could have acted to prevent the injury but chose not to do so. While the increased accountability contained in Standard 188P will call for increased risk management, compliance with these measures should translate into greater protection from accusations of negligence in those instances where illness or death is alleged to have occurred. Facility managers following guidelines issued by organizations other than ASHRAE may want to do more research or seek assistance on how to develop, implement, and maintain your plan to comport with ASHRAE Standard 188. In addition, using both an accredited and CDC-ELITE (Environmental Legionella Isolation Techniques Evaluation) certified lab for Legionella testing can give you the confidence your treatment methods are capably performed and save you time and money. Overall, the new ASHRAE standard gives facility managers the basic steps they need to implement a plan to control Legionella while saving lives and avoiding the time and expense of contentious claims and litigation.
<urn:uuid:b628b991-fef8-4da3-9f69-27931351d5be>
CC-MAIN-2023-14
https://chemsystemshi.com/ashrae-standard-188p-prevention-of-legionellosis-in-building-water-systems/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00758.warc.gz
en
0.924743
2,502
2.984375
3
Economic Boom and Decline Adapted from an Untitled Document at the Arrow Lakes Historical Society Photos from A. Devlin’s Personal Archive In 1914 everything came to a standstill due to World War I. All the young men (15) enlisted and left their land. Not one of them returned. Eventually their land reverted. Middle-aged farmers with growing families worked the land and once again they had thriving orchards. The fruit industry was flourishing. The crops were shipped up and down the lake by steamboat, and around the province by train. There were two steamboats a day, one traveling south, and the other north. Therefore, service was prompt, which was in favor of the fruit growers. In December 1917, Mr. Fauquier died. He was badly in debt due to his loss of land sales during the war. Thus, the “Needles Ranch” was put into the hands of an administrator. In 1919, there was an influx of newcomers. The Fauquier farm was sold in two halves. Other properties outside the ranch were also sold. These were the good years, for the orchards were in their peak. A need was felt for a Packing House, and the growers got together to put up a building. Experienced packers graded, sorted and packed the fruit. Between ten and twelve box cars of apples and pears were exported from Fauquier yearly. Each boxcar contained approximately 875 boxes of fruit. In the late 1920’s, the Okanagan developed a series of irrigation systems and planted thriving orchards. It was soon discovered that their fruit was of fine quality and developed three weeks ahead of Fauquier’s. The Okanagan slowly but surely stole its market. Fruit farmers of Fauquier suffered a great loss. With the loss of fruit sales, the C.P.R. reduced steamboat service. Now, only one steamer made a trip a day, and as time went on, only two trips a week were made.The 30’s brought the depression. The orchards were neglected and times were very poor. The Packing House was no longer required. In 1943, it was given to the community, and it was turned into a community hall. During World War II, farming lost its importance and logging took over. Farming was only done in the summer, while logging was done during the rest of the year. A flume was built that brought logs from Whatshan lake to the Arrow Lakes. Family farmers made some cash by selling vegetables to logging camps. In 1948, the Whatshan power plant was built and provided employment for every available man. The people started to improve their homes; toilets and running water were installed. In 1951, electricity was brought to Fauquier. In 1965, Hydro bought the whole of the Needles Ranch. It was surveyed into the present site of Fauquier. With the installment of the Keenleyside Dam, the lake was flooded. Most people moved away, but some moved into the new town. Today, logging is still the main industry of Fauquier. Without it Fauquier would die. Since Fauquier is a bridge point, the general store, gas station, and the presently defunct motel still have potential for growth in business. Today, Fauquier’s population consists mainly of retired old people due to its beauty and quietness. The school is closed. The BC Forestry Service relocated to Nakusp and Nelson. Young families have moved away due to lack of work. The town seems to have come to a halt. There are fewer social activities or get-togethers. The future doesn’t look very promising. The question is: Will Fauquier survive? In a future post I will add a note of optimism by pointing out the many attractions that the big overcrowded cities just cannot match: tranquility, serenity and beauty experienced through an impressive number of recreational activities. Is there potential for economic growth in a pastoral setting? Perhaps. For now, I can only express my hope that this will be so. One thought on “Short History of Fauquier BC – Part 2” Fascinating story. My brother Greg just shared this with me. I had always thought Fauquier was named after our grandfather in Ottawa who had Sri he’d together components of railroads that eventually formed the C’NR. I was way off base!! Tim Fauquier – Déc. 2020 LikeLiked by 1 person
<urn:uuid:b320a4de-269c-4eee-afb8-a31197dcb4e7>
CC-MAIN-2023-14
https://klopp-family.com/2015/02/04/short-history-of-fauquier-bc-part-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00758.warc.gz
en
0.98723
952
3.328125
3
If you have been following me for a while, you will know that I LOVE teaching young ones how to read, and the alphabet is where it all starts! Truly one of the best experiences for a teacher is when he/she finally sees that lightbulb turn on, when the child has that “aha” moment. On the other hand, teaching reading can be an extremely stressful process for both the teacher and the student. Therefore, it’s crucial for students to receive a strong foundation for reading based on letter sound and name recognition and phonemic/phonological awareness. Once these skills are learned, moving on to reading words is a goal that is far more easy to achieve. For that reason, I want to introduce you to the Alphabet Curriculum. It is a complete 7-week program that goes from letter recognition and formation to letter sounds to simple CVC words. It is packed with hands-on activities to keep young minds engaged as they learn, practice and master the alphabet. ⭐ Lesson plans ⭐ Assessments (Pre-Assessments, Mid-Assessments, Post Assessments). Students will be grouped by score for targeted centers and small group instruction. ⭐Scope and Sequence ⭐ Whole group lessons ⭐ Differentiated small group lessons ⭐ Hands-on centers ⭐ Extra practice for additional support ⭐ Sample Schedules for 90 minutes, 70 minutes and 40 minute blocks What order are the letters taught? The lessons are organized in the following layout: - Week 1- Letters m, p, t, a - Week 2- n, b, s, i - Week 3- h, d, g, o - Week 4- r, f, c, e - Week 5- l, k, j, u - Week 6- z, w, y - Week 7- v, x, q Although the lessons are organized in this way, you can always choose to introduce and teach the letters in a different order. You can also teach them at a different pace. If you feel that you students need more time, you can stretch the lessons over 14 weeks or more. *Note: The order of the letters and lessons have recently been changed sequence shown above in order to coincide with the new Pathway to Fluency science of reading aligned curriculum. The pictures in this blog post have not yet been updated to reflect that change. Why do you teach the letters in this order? This is a frequent question posed by teachers, and for a good reason: it is important to teach the alphabet in with a systematic approach. Keep in mind that there is no “correct” order to teach the alphabet. Furthermore, you don’t necessarily have to teach it from A – Z. However, by using the order listed above, you are able to make words quickly. For example, by the end of week 1, students will be able to move on from letters to simple CVC words. In week one alone, students will be able to use their letter sound recognition to make and read the words: pat, bat, tab, and tap. What a confidence booster! Are you ready to change the way you teach the Alphabet? No more boring and monotonous letter activities. This Alphabet Curriculum provides explicit instruction in a variety of ways with context and structure! This packet provides students with hands-on and engaging activities! Let’s Take a Look at SOME of the activities in Week 1 of the Alphabet Curriculum: Lesson Plans: Included in the curriculum are easy-to-follow daily lesson plans to help guide your teaching for whole group and small groups. They are complete with sample schedules, center activities and rotations, teacher table small groups activities for your low, standard (mid) and extension (high) groups and so much more! Weekly Letter Activity Centers/Rotations: The weekly activities for center rotations include hands-on activities for letter identification, letter formation, letter sounds and letter review and application. Here are just a few of the activities in action. Letter Identification Activities Magazine Letter Hunt… Upper and Lowercase Spin and Cover… Upper and Lowercase Letter Match… Letter Formation Activities Play Dough Mats… Open-ended Letter Formation… Roll and Trace/Write a Letter… Beginning Sound Activities Beginning Sound Cover up… Beginning Sound Spin and Cover… Beginning Sounds Letters… Teacher Table Activities These activities are broken down into low, medium and high groups in the lesson plans. You will want to prepare Alphabet Toolkits for each student at the table. You only need one set that will be used with each group of students. For example, if you have 5 students at a time at the “Teacher Table“, you will need to prepare 5 sets. These 5 sets will be used for all three groups. Listed below are the resources that you will include in each Toolkit. The lesson plans clearly indicate which activities should be used in each group. The Beginning Sounds Poster comes in a full size and mini size… What supplies do I need? Here are a list of items that you might find helpful when building your Alphabet Curriculum toolkit: - Magnet letters - Binder rings - Popsicle sticks - Jumbo foam dice - Game spinners - Pattern blocks - Snap cubes Most of these items can be found on my Amazon Influencer Page: Click Here. Things to keep in mind: 1. Be patient. Too often, we expect a child to learn how to read on “our schedule.” If we don’t allow the student the time needed for their brains to produce the anticipated information, we impede the learning process. If a child is not saying the letter sound or word, count to 10 silently in your head. You may find that all they needed was a little bit more time to come up with the information. Furthermore, this 7-week curriculum can easily be expanded over 14 weeks or more to accommodate struggling students. 2. Be sure to emphasize the difference between letter sounds vs. letter names. Too much focus on letter names can confuse a child when it comes to sounding out a word. For example, for the word cat, the student may refer to the letters by their name instead of the sounds that the letters make, saying c-a-t instead of /c//a//t/. 3. Practice, practice, practice! Even after a student has shown that he or she can identify a letter or word, continue to have them practice it in many different ways. In the Alphabet Curriculum, I’ve included a variety of practice activities to ensure that students have ample opportunity to truly master the skills. 4. Frequent mix-ups and difficulties: - Letters b, d, p and q- These letters are frequently confused when learning how to read. These letters, and some others, may require more practice than the rest of the alphabet. - Speech delays- It is important to remember that speech is also continuing to develop at these young ages. If a child consistently gets a letter wrong, check to make sure that they can first make the sound of the letter before asking them to identify it. - Dyslexia, vision and other contributing factors- Keep in mind that there are multiple factors that contribute to a child’s reading success. Once a child has mastered the alphabet, you can move on to building fluency reading CVC Words and basic Sight Words. Here are a few Bundles to consider: - CVC Endless Mega Bundle: This is a bundle of CVC resources that will continue to grow. This bundle provides engaging hands-on resources for extra practice. Many students need a lot of practice when it comes to beginning phonics. - CVC Fluency Bundle: This bundle of resources includes 12 packets that take students from sounding out CVC words to reading simple passages. - Sight Word Fluency Pyramid Sentences: This bundle helps students build fluency with sight words along with phonics skills starting with pre-primer sight words and CVC words. I’m excited to get started with this . Every lesson look useable with teaching a small group . Excited to get started . What’s the best age to start this? I homeschool and my five year old son is having great difficulty learning the alphabet. This curriculum looks very thorough. Melissa A Gessert says This curriculum looks great. How do I order and how much does it cost? Here is a link to the Alphabet Curriculum: Click Here. Hi! Do you have the Mini Alphabet Beginning Sound Cards for individual download? This is a great resource!Thank you! Yes, click here for the Mini Alphabet Beginning Sounds Posters. sonia sarti says Your blog is great. I read a lot of interesting things from it. Thank you very much for sharing. Thank you so much for your sweet words! I’m glad you are finding the site helpful! Cathi Tyson says I was wondering will there be a problem with copyyrules if I take the pages and have them printed and:or put in a spiraled binder! Thank you so much! You can take a thumb drive of the product to the printers to have them print it. As long as you aren’t sharing the file, you can print and spiral bind it as you need. 🙂 Brooke Sherbino says I would like to purchase the entire package please. Worksheets, teacher book etc. You can click on the links in the post above to access the product in my store. I hope that helps! Hi,Iwould like to know where could I buy the Magnet letters? I am from Taiwan,I love your worksheets,but I can’t find the similar Magnet letters here, I love it! Hope you can tell me how could I buy it:> I wish I could tell you where to get them out there. I’m not sure which companies can ship out there. Lakeshore Learning is where I got this set from, but there is another set on Amazon by Really Good Stuff. I hope that helps! This looks fantastic! We’ve always been so impressed with everything we’ve used from the Moffatt Girls. 🙂 I’m wondering if this is available for purchase in a format of already spiral-book-bound? Unfortunately, I don’t have them in printed version. But an easy way to get it bound is to print it and take it to an office supply store. I hope that helps! I can’t wait to get started on this. I just have one question..where do you get the binding done for your packets? Sorry for the late response! I have a personal binding machine that I use at home. You can find an affordable one on Amazon. 🙂 I bought and I’m working on prepping it. How do you organize all of it? Thanks for any help! I would suggest organizing according to the letters you will be teaching. If you are following the lesson plans that I have outlined, it would be helpful to prep the materials and group them according to which letters are being introduced that week. I like the Sterelite bins for storage. Check out our facebook group to see more storage ideas: Click Here. I hope that helps! Just wondering if the picture that’s labeled letter sounds Can I purchase that individually ? Kathleen Cruz-Moyet says how do i print the material out? Follow the links for the product you’d like to purchase. Once you purchase and download, you will be able to print from your computer. I hope that helps! Mindy Kinsch says I couldn’t find what needs to be included in the alphabet toolkit. Do u you have a list of supplies somewhere? Sorry for the late response! Here is a link to my Amazon affiliate list: Click here. I hope that helps! Where can I find the mini alphabet cards? Sorry for the late response! These are part of the Alphabet Curriculum, and here is a link to the individual packet: Click Here. I hope this helps! Can I ask whether will this be suitable for 28 months old? Hi there! This curriculum looks very comprehensive. How much time would you recommend spending on the alphabet curriculum every day for a kindergartener? Thanks! Sorry for the delayed response! There are lesson plans that outline the pace (a 7-week plan with 3 or 4 letters being taught per week). If you find that your students are quick learners, you can certainly double-up on lessons. I hope that helps! Hello! First of all, I LOVE your curriculum (especially your no-prep packets). I was wondering at what age you recommend using your pre-school products. I have a 2 year old and was wondering if you had any products geared towards that age group, or if you recommend me to start him with your curriculum when he is closer to 3. Thank you so much! Dalene Baxter says I am looking for your CVC segmenting & blending race care activity. I can find a similar on on TPT with a bunny but I like the car. I am a literacy aide so I don’t need the whole curriculum. Great ideas for virtual learning Tomee Jo says Can I buy specific items rather than a whole “unit’ on letter sounds? Hi can I just get the segment and blend set please? Thank you! Melba A. Steward says Can I purchase the beginning sound cards without purchasing the whole bundle? Can I order the activities without ordering the curriculum? Susan Clement says Thank you for the engaging materials. It has saved me countless hours trying to find enrichment for my students. I am super excited for these thanks Elizabeth Hamman says How can I get the segment and blend race car activity? I couldn’t find it in any of the sets. Here’s a link to the Alphabet Curriculum in my store: Click Here.
<urn:uuid:66f4c08d-0f95-4440-83e7-bfe05151af60>
CC-MAIN-2023-14
https://themoffattgirls.com/how-to-teach-the-alphabet/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00758.warc.gz
en
0.920741
3,781
3.9375
4
Definitions of sexual violence Learn more about the different terms and language related to sexual violence. The definitions and ideas included are not meant to ignore or challenge your descriptions and how you want to talk about your life experiences. Sharing definitions give us a way to talk together about sex and what is not sex. Sexual violence is a widespread and deep-rooted problem. It crosses all social boundaries. It is experienced by women, girls, men and boys of every age and culture. It can occur anytime, anywhere, anyplace. It is a crime. Ontario’s Sexual Violence & Harassment Action Plan Sexual violence is a big umbrella term that describes a range of sexual behaviour and actions that are aggressive, abusive and violent. It is any unwanted, forced, tricked or coerced sexual activity. Different forms of sexual violence include sexual abuse, sexual assault, rape, incest, childhood sexual abuse and rape during armed conflict. It also includes sexual harassment, stalking, indecent or sexualized exposure, degrading sexual imagery, voyeurism, cyber harassment, human trafficking and sexual exploitation. - Sexual violence is rooted in gender inequality. Although it affects both men and women, 92% of reported adult victims are female and 97% of those accused are men. - Sexual violence is about power and control, not sexual desire or lust. It is an act of aggression against another person.[It’s Never Okay: Ontario’s Sexual Violence & Harassment Action Plan] - In many cases, no overt physical force is used. Instead, the person being victimized may be threatened with words, manipulated or pressured into doing something they don’t want to do. - Sometimes alcohol and drugs are used on purpose to make someone unable to give consent or fight back. - Sexual violence happens in both heterosexual and same-sex relationships.[This is a footnote for Margaret.] - Sometimes sexual violence is used as an expression of racism, homophobia or other forms of discrimination. - In conflict and war zones, sexual violence is used as a weapon to erode the very fabric of a community. Rape is described as the most intrusive of traumatic events.[Unicef: Sexual violence as a weapon of war] Forms of sexual violence further described: Acquaintance sexual assault, sometimes called “date rape,” is sexual contact that is forced, manipulated, or coerced by a partner, friend, or acquaintance. Child sexual abuse is a form of child abuse. It happens when an adult who is a caregiver or in a position of trust and authority engages a child in any sexual activity. Child sex abuse includes: - Obscene phone calls or text messages - Exposing genitals to a child - Masturbation in the presence of the child or forcing the child to masturbate - Intercourse (penetration of the vagina, anus or mouth of the child) - Producing, owning or sharing of pornographic images or movies of children - Sex trafficking - Any other sexual conduct that is harmful to a child’s mental, emotional or physical welfare Cyber harassment / bullying can be a form of sexual violence when the targeted person is photographed or pressured to take sexual photos that are then shared on the internet to shame or further exploit. Victims of sexual assault can also be shamed and blamed online. Date rape is interchangeable with “acquaintance sexual assault”. It is sexual contact that is forced, manipulated, or coerced by a partner, friend or acquaintance in a casual or dating relationship. Drug-facilitated sexual assault involves the perpetrator making use of alcohol and/or drugs (prescription or non-prescription) to control, overpower or subdue a victim for purposes of sexual assault. Incest is sex between family members. When children are sexually abused, they may respond by being sexual with other children in the home. If left untreated, they may also grow up to become adults with confusion about what is sex and what is abuse. This is why understanding consent and the impact of trauma is so important. Luring describes the criminal actions of an adult who communicates with minors over the internet to persuade or invite the child/youth to meet in person, provide nude photographs or engage in sexual activity online. Sexual abuse is not a legal term but can be used to describe ongoing relationships in which sexual violence is occurring. Sexual assault describes any event of unwanted sexual touching and/or physical force. It is the legal term for rape in Canada. Sexual assault is the only violent crime in Canada that is not declining. It goes far beyond the impact on survivors and their families. Sexual violence costs Canadians billions of dollars every year. Sexual coercion is when tactics like pressure, trickery or emotional force are used to get someone to agree to sex, when they want to say no. Sexual exploitation is the sexual abuse of children and youth through the exchange of sex or sexual acts for drugs, food, shelter, protection, other basics of life, and/or money. Sexual exploitation includes involving children and youth in creating pornography and sexually explicit websites. Sexual harassment refers to unwanted sexual activity, including touching and attacks. It can encompass discriminatory comments and behaviour, as well as touching. Sexual harassment may take the form of jokes, threats, comments about sex, or discriminatory remarks about someone’s gender. Sex trafficking is the trade of human beings as sexual slaves who are forced to perform sexual services for paying customers. Workplace sexual harassment is sexual harassment that takes place at work. It is an Occupational Health and Safety hazard. Your employer has a legal obligation to protect you from being harassed or hurt in any way. A 2014 study showed that 43% of women have been sexually harassed at work. Women are twice as likely as men (20% compared to 9%) to experience sexual contact while at work. Stalking / criminal harassment (the legal term for stalking) is defined as repeatedly following a person, or repeatedly communicating with a person, in a way that could have that person fearing for his or her security or someone else’s. Offences commonly associated with criminal harassment include uttering threats, threatening or harassing phone calls, common assault and mischief. Stalking is a red flag that can be an indication that a situation is escalating. It is against the law to stalk someone. It’s Never Okay: Ontario’s Sexual Violence & Harassment Action Plan Canadian Women’s Foundation: Fact Sheet: Sexual Assault and Harassment
<urn:uuid:fea0f8fe-1657-460d-9f21-b713c6f949b5>
CC-MAIN-2023-14
https://www.leap21.ca/definitions-of-sexual-violence
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00758.warc.gz
en
0.938342
1,359
3.46875
3
New serotonin findings could help treat depression, anxiety By Aaron J. Bouchie New research from the Boyce Thompson Institute on the neurotransmitter serotonin, which carries messages between nerve cells and is thought to play a role in several mental health conditions, could ultimately lead to new therapeutics for anxiety and depression. Frank Schroeder, BTI faculty member, is co-senior author of “Parallel Pathways for Serotonin Biosynthesis and Metabolism in C. elegans,” which published Oct. 10 in Nature Chemical Biology. The first author is Jingfang Yu, a graduate student in Schroeder’s lab. Discovered in the 1930s, serotonin is produced in many animals and mediates behaviors such as feeding, sleep, mood and cognition. Drugs that alter serotonin levels are the main weapon for treating psychological conditions such as anxiety, depression and eating disorders. As a simple model for neurobiology research, the microscopic roundworm Caenorhabditis elegans has been used extensively to study serotonin’s role in regulating behavior and food intake. For many years, researchers thought that serotonin was made in C. elegans by one specific molecular pathway, and that serotonin was then quickly degraded. But research by Schroeder’s team and colleagues at Columbia University refuted those assumptions. “We discovered a second, parallel biosynthetic pathway that accounts for about half of the total serotonin produced in our model system,” said Schroeder, a professor of chemistry and chemical biology in the College of Arts and Sciences. The work began about three years ago, when the researchers unexpectedly discovered an enzyme that converts serotonin into derivative compounds. “Most people in the field thought serotonin is made and then quickly broken down,” Schroeder said, “but we found that, instead, it is used as a building block for other compounds that are responsible for some of serotonin’s activity. So we decided to start at the beginning and see how serotonin is made, and then how it is converted into these new molecules.” Yu further showed that the new serotonin derivatives affect feeding behavior. “When the worms lack endogenous serotonin, they tend to move quickly across the bacteria ‘food lawn’ [in a petri dish] and turn infrequently to explore the food,” Yu said. “We found this behavior can be alleviated by treating the worms with serotonin derivatives, suggesting these newly identified compounds contribute to effects previously attributed to serotonin.” C. elegans is an excellent model for studying serotonin because the compound’s molecular signaling pathways are very similar across species, including humans. For example, the researchers showed that in C. elegans, a large portion of serotonin is made in the gut, which is also the case in humans. Schroeder said there are hints that human serotonin is converted into metabolites similar to the ones identified in C. elegans, which opens up many more avenues of research. “Are the analogous metabolites important in humans?” he said. “What is the role of one manufacturing pathway versus the other? How are these manufacturing pathways and metabolites important for human behaviors?” This research was supported by grants from the National Institutes of Health and the Howard Hughes Medical Institute. Aaron J. Bouchie is a science writer at Boyce Thompson Institute.
<urn:uuid:10062e15-088f-4cf3-a3bb-2832be2a32ec>
CC-MAIN-2023-14
https://news.cornell.edu/stories/2022/10/new-serotonin-findings-could-help-treat-depression-anxiety
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949355.52/warc/CC-MAIN-20230330163823-20230330193823-00758.warc.gz
en
0.950943
694
2.796875
3
What is netlink and what its types? Netlink is designed and used for transferring miscellaneous networking information between the kernel space and userspace processes….Netlink. |Stable release||5.17.1 / 28 March 2022| |Type||Application programming interface| |License||GNU General Public License| What is netlink used for? Netlink is used to transfer information between the kernel and user-space processes. It consists of a standard sockets-based interface for user space processes and an internal kernel API for kernel modules. What is netlink protocol? The netlink protocol is a socket based IPC mechanism used for communication between userspace processes and the kernel or between userspace processes themselves. The netlink protocol is based on BSD sockets and uses the AF_NETLINK address family. What is Rtm_newlink? RTM_NEWLINK , RTM_DELLINK , RTM_GETLINK. Create, remove, or get information about a specific network interface. These messages contain an ifinfomsg structure followed by a series of rtattr structures. struct. Is Linux a networking device? Linux has long been the basis of commercial networking devices, but now it’s a mainstay of enterprise infrastructure. Linux is a tried-and-true, open-source operating system released in 1991 for computers, but its use has expanded to underpin systems for cars, phones, web servers and, more recently, networking gear. What is Netdev in Linux? What is netdev? ¶ It is a mailing list for all network-related Linux stuff. This includes anything found under net/ (i.e. core code like IPv6) and drivers/net (i.e. hardware specific drivers) in the Linux source tree. What is netfilter in Linux? Netfilter is a framework provided by the Linux kernel that allows various networking-related operations to be implemented in the form of customized handlers. How does Netlink socket work? Netlink is asynchronous because, as with any other socket API, it provides a socket queue to smooth the burst of messages. The system call for sending a netlink message queues the message to the receiver’s netlink queue and then invokes the receiver’s reception handler. What is generic netlink? What is generic netlink? Generic netlink was designed to allow kernel modules to easily communicate with userspace applications using netlink. Instead of creating a new top level netlink family for each module, generic netlink provides a simplified interface to enable modules to plug into the generic netlink bus. What is generic Netlink? What is RTNL in Linux? If you look at the source it says it’s for “Routing Netlink”. How does netlink socket work?
<urn:uuid:b4511fdc-e7d3-4963-a72c-3ea7fca724ba>
CC-MAIN-2023-14
https://www.curvesandchaos.com/what-is-netlink-and-what-its-types/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949355.52/warc/CC-MAIN-20230330163823-20230330193823-00758.warc.gz
en
0.856474
608
3.09375
3