text
stringlengths 174
640k
| id
stringlengths 47
47
| dump
stringclasses 17
values | url
stringlengths 14
1.94k
| file_path
stringlengths 125
142
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 43
156k
| score
float64 2.52
5.34
| int_score
int64 3
5
|
|---|---|---|---|---|---|---|---|---|---|
Published in the Door County Pulse, Peninsula Pulse on October 6th, 2017
Despite the fact that Trap-Neuter-Return (TNR) is the only humane and effective approach for outdoor cat populations, a Sept. 15 letter to the Pulse included several misconceptions about TNR and cats.
First of all, it’s perfectly normal for cats to live outdoors. Only with the invention of kitty litter 70 years ago did it even become practical for cats to live indoors. The truth is that it’s just as natural for cats to live outdoors now as it was in the thousands of years before they became indoor companions.
Outdoor cats are not a public health risk, either. Rabies and toxoplasmosis are often misguidedly used to justify catch-and-kill schemes for community cats, also known as feral cats. But there has not been a single case of a human contracting rabies from a cat in the U.S. in more than 40 years. The Centers for Disease Control and Prevention even says that human rabies cases are “rare,” with only one to three cases reported annually. This is a victory for public health, as well as community cats. As for toxoplasmosis, people are far more likely to contract this disease from eating undercooked meat than they are from anything else.
Sticking to the facts, scientific evidence consistently exonerates the domestic cat species of threatening wildlife. Leading biologists, climate scientists, and environmental watchdogs agree that climate change, habitat destruction, and development are the leading causes of species loss. Pinning the blame on cats conveniently ignores the reality that the solutions to species loss rest squarely in our hands.
For those of us who choose to help community cats, Trap-Neuter-Return is the only humane approach with a proven record of success. TNR ends the cycle of breeding, stabilizes the population, and helps cats stay healthy through vaccinations. TNR also addresses the public’s needs because it makes life better for the cats and for the residents who live nearby, shelters become less crowded, shelter morale improves, and considerable taxpayers’ dollars are saved.
Thousands of cities and counties across the U.S. conduct TNR programs, and Alley Cat Allies has tracked more than 650 of them that have adopted official TNR policies and ordinances. That number continues to grow because of the success of these programs.
In discussions surrounding community cats, plenty of falsified claims are made by people and groups who want to scare us. They might even say they have cats’ best interest at heart, but when they promote catching and killing community cats, that simply isn’t true. Focusing on the facts is the best way to understand what’s best for cats and what’s best for your community.
President and Founder, Alley Cat Allies
|
<urn:uuid:fcbbfa18-4f3f-4715-bc9e-9d225dbddc7f>
|
CC-MAIN-2023-14
|
https://www.alleycat.org/letter-to-the-editor-the-best-approach-for-outdoor-cats/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948868.90/warc/CC-MAIN-20230328170730-20230328200730-00765.warc.gz
|
en
| 0.958592
| 593
| 3.078125
| 3
|
White oak trees that play a key role in the ecosystem and economy of Kentucky will see a significant decline soon without action to help the species regenerate.
That’s the takeaway from a recent report from an organization called the White Oak Initiative, which is aimed at bringing attention to the challenges facing the tree and recommending ways to counter the looming decline.
White oaks are a cornerstone species in forests of the eastern U.S., providing habitat and food for birds and animals and wood for a wide range of products such as flooring and cabinets. In Kentucky, that includes barrels for the signature bourbon industry. Bourbon has to be aged in new charred oak containers, which give it color and flavor.
All told white oaks play a role in billions of dollars of economic activity in Kentucky annually. The problem is that they are not regenerating at a sustainable level, according to the report.
Click here to keep reading…
|
<urn:uuid:0625e020-c5e5-4053-88c8-9017cafbda34>
|
CC-MAIN-2023-14
|
https://www.urbanforestdweller.com/white-oak-decline-rocks-kentucky-bourbon-industry/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948868.90/warc/CC-MAIN-20230328170730-20230328200730-00765.warc.gz
|
en
| 0.943649
| 186
| 3.28125
| 3
|
I understand that this is one of those phrases that carries a lot of passion and emotion around it, and that well meaning people may disagree on its advantages or disadvantages. I came across an article recently by Tim Wise, who is no stranger to writing on racially charged topics. He was conducting a Q&A at a college campus when one of the White students asked what was different from Affirmative Action and historical, institutional racism. In the viewpoint of this college student, Affirmative Action discriminates against qualified Whites, and he struggled to understand the difference.
Tim White’s full article can be found here. But WARNING, he is very raw and opinionated when he gives his thoughts on this topic, so if you choose to read it, do so at your own discretion.
The body of the article is around his answer to this question, and that was the part I wanted to copy and paste into my blog. I have had this conversation with a number of White folks in particular who are trying to grasp Affirmative Action in the context of where we are in terms of present day race realities. Whether someone agrees or disagrees that Affirmative Action is the best way to address some of the systemic inequalities that continue to be persistent in our society, I think you will find Wise’s answer to the question helpful. Here is what he says in response to the question:
Affirmative Action vs. Old-School Discrimination: Differences in Intent and Function
Although discrimination against people of color and affirmative action both involve race-based considerations, historic and contemporary discrimination against people of color differs from affirmative action in a number of distinct ways, both in terms of intent and the underlying premises of each, and in terms of the impact or consequences of each.
In terms of intent, affirmative action is nothing like old-fashioned or ongoing discrimination against people of color. Discrimination against so-called racial minorities has always been predicated on the belief that whites were more capable than people of color in terms of their abilities, and more deserving of consideration with regard to their rights and place in the nation. So when employers have refused to hire blacks, or have limited them to lower-level positions, this they have done because they view them as being less capable or deserving than whites–as less desirable employees. Likewise, racial profiling is based on pejorative assumptions about black and brown criminality and character. Housing discrimination is rooted in assumptions about folks of color being less desirable as neighbors or tenants.
Affirmative action, on the other hand, does not presume in the reverse that whites are inferior to people of color, or less desirable as workers, students or contractors. In fact, it presumes nothing at all about white abilities, relative to people of color. It merely presumes that whites have been afforded more-than-equal, extra opportunity relative to people of color, and that this arrangement has skewed the opportunity structure for jobs, college slots and contracts. Affirmative action is not predicated on any assumptions about whites, as whites, in terms of our humanity, decency, intelligence or abilities. It is based solely on assumptions about what being white has meant in the larger social structure. It casts judgment upon the social order and its results, not people per se. Although one is free to disagree with the sociological judgment being rendered in this case — that the social structure has produced disparities that require a response — it is intellectually dishonest and vulgar to compare this presumption about the social structure to the presumption that black people are biologically, culturally or behaviorally inferior to whites.
Additionally, discrimination against people of color has always had the intent of creating and protecting a system of inequality, and maintaining unearned white advantage. Affirmative action does not seek to create a system of unearned black and brown advantage, but merely to shrink unearned white advantage. In other words, unless one presumes there is no difference between policies that maximize inequality and those that seek to minimize it, it is impossible to compare affirmative action to discrimination against people of color, in the past or present.
Affirmative Action vs. Old-School Discrimination: Differences in Impact and Outcome
In terms of impact, affirmative action and discrimination against people of color are completely different. Discrimination against people of color, historically and today, deprives those people of color of the right to equal consideration for various opportunities on equitable terms. While some may think affirmative action does the same thing to whites, in fact this is untrue. Affirmative action programs only deprive whites, in effect, of the ability to continue banking our extra consideration, and the credentials and advantages we have accumulated under a system of unfairness, which afforded us more-than-equal opportunities. There is no moral entitlement to the use of such advantages, since they have not come about in a free and fair competition. History — and ongoing racial bias against people of color — have served as “thumbs on the scale” for whites, so to speak. Or even more so, as the equivalent of a “Warp Speed” button on a video game. Merely removing one’s finger from the warp speed button cannot address the head start accumulated over many generations, nor the mentality that developed as a justification for that head start: a mentality that has sought to rationalize and legitimize the resulting inequities passed down through the generations. So affirmative action is tantamount to hitting a warp speed button for people of color, in an attempt to even out those unearned head starts, and allow everyone to compete on as level a playing field as possible. To not do so would be to cement the head start that has been obtained by whites, and especially white men, in the economic and educational realms. It would be like having an 8-lap relay race, in which one runner has had a 5-lap head start, and instead of placing the second runner at the same point as the first, so as to see who really is faster, we were to merely proclaim the race fair and implore the runner who had been held back to “run faster” and try harder, fairness be damned.
Finally, discrimination against people of color, historically, has had the real social impact of creating profound imbalances, inequities and disparities in life chances between whites and people of color. In other words, the consequences of that history have been visible: it has led to wealth gaps of more than 10:1 between whites and blacks, for instance (and 8:1 between whites and Latinos). It has led to major disparities in occupational status, educational attainment, poverty rates, earnings ratios, and rates of home ownership. Affirmative action has barely made a dent in these structural inequities, in large part because the programs and policies have been so weakly enforced, scattershot, and pared back over the past twenty years. So despite affirmative action, whites continue (as I document in my books,Colorblind, and Affirmative Action: Racial Preference in Black and White) to receive over 90 percent of government contracts, to hold over 90 percent of tenured faculty positions, to hold over 85 percent of management level jobs in the private sector workforce, to be half as likely as blacks to be unemployed (even when only comparing whites and blacks with college degrees), and to get into their college of first choice at higher rates than African Americans or Latinos.
In other words, when institutional racism is operating, we can actually see the results. We can see the after-effects in terms of social disparities that favor the group receiving all the preferences. But affirmative action has produced no such disparities, in reverse. It hasn’t even really closed the existing ones all that much. So if anything, a proper critique of affirmative action would insist that it hasn’t gone far enough, or been enforced enough to break the grip of white institutional privilege.
These were then his summarizing thoughts:
In the end, we really shouldn’t think of affirmative action as a matter of racial preference, so much as a preference based on a recognition of what race means, and what racism has meant in American life. It is a preference that takes into consideration the simple and indisputable fact that people of color have not been afforded truly equal opportunity. Whereas old-school discrimination against people of color was (and is) predicated on actual value judgments about the ability, character, and value of black and brown folks, affirmative action is predicated on no personal or group-based judgments whatsoever, but rather, upon the judgment that the social structure has produced inequities that require our attention and redress.
Reactions? Agree? Disagree?
Leave a Reply
|
<urn:uuid:8bfcf5b7-69d0-4705-bfff-a353c43680a6>
|
CC-MAIN-2023-14
|
https://drdanielhill.com/2011/01/03/affirmative-action/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949093.14/warc/CC-MAIN-20230330004340-20230330034340-00765.warc.gz
|
en
| 0.966994
| 1,770
| 2.796875
| 3
|
OpenAI, the maker of the popular generative language model ChatGPT and Dall-E, has announced a new tool which will help detect AI-written content. It can “distinguish between text written by a human and text written by AIs from a variety of providers,” says the company.
“We’ve trained a classifier to distinguish between text written by a human and text written by AIs from a variety of providers,” reads the press release.
Also Read | ChatGPT is getting a paid version for those who don’t want to wait to talk to AI chatbot
Dubbed as Classifier, the new tool is easy to use. You should have an OpenAI account to use this tool. Simply paste the text and it will tell you if the text is very unlikely, unlikely, unclear if it is, possibly, or likely AI-generated. The tool is publicly available.
OpenAI has created Classifier using a dataset of pairs of human-written text and AI-written text on the same topic. The company collected this dataset from a variety of sources including human-written ones and the ones generated on prompts submitted to InstructGPT.
“We divided each text into a prompt and a response. On these prompts we generated responses from a variety of different language models trained by us and other organizations. For our web app, we adjust the confidence threshold to keep the false positive rate low; in other words, we only mark text as likely AI-written if the classifier is very confident.”
Also Read | ChatGPT to soon replace software engineers? OpenAI reportedly training AI to code at scale
The maker of Classifier warns that the classifier is not fully reliable and that it should not be used as a “primary decision-making tool” to determine the source of the content. During the evaluation of Classifier, it found that the classifier correctly identified “26% of AI-written text (true positives) as “likely AI-written,” while incorrectly labeling human-written text as AI-written 9% of the time (false positives).” The company says that the tool’s reliability improves as the length of the input text increases.
Classifier, as per the company, is unreliable for content under 1,000 characters. Sometimes, even the longer texts can be incorrectly labelled by the classifier. The tool comes with several other limitations like sometimes the human-written text can be labelled as AI-written or determining the source for predictable texts.
For the unawares, ChatGPT is a chatbot created by OpenAI and sees investments from tech giant Microsoft. It is an AI-based chatbot that is trained to conduct human-like conversations over complex and all kinds of topics.
Also Read | ChatGPT can “destroy” Google in two years, says Gmail creator
|
<urn:uuid:63701d36-3dfb-4d09-9f3c-efa974e69319>
|
CC-MAIN-2023-14
|
https://www.financialexpress.com/life/technology-chatgpt-maker-launches-free-tool-to-help-users-identify-ai-generated-content-check-details-2970331/lite/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949093.14/warc/CC-MAIN-20230330004340-20230330034340-00765.warc.gz
|
en
| 0.937707
| 603
| 3
| 3
|
Modern Curriculum Press Phonics, also called "Plaid Phonics," is a grade K through 6 worktext program that provides instruction and space for writing within the workbook.
Levels K and A-C focus on phonemic awareness, phonics, encoding, recognizing words in context, and writing. Levels D-F focus on word study, comprehension, and composition.
Printed in full color, the worktexts are lively and thorough. Teacher's editions are available but are not usually needed in the early grades.
Scroll down to the bottom of the page to read reviews of this program.
Have you used this home school program? Please help other homeschoolers by adding your opinion to our list of homeschool curriculum reviews.
Tell others about your experience with Modern Curriculum Press Phonics. Please include the following information in the "Share Your Review" section (feel free to copy & paste):
PLEASE NOTE: Your email address will be removed from your submission and will remain confidential. Successful Homeschooling will never sell or give away your e-mail address.
Click below to see what others have said about Modern Curriculum Press Phonics...
Modern Curriculum Press Phonics
Product: MCP Phonics Levels used - 2nd - 4th grade Dates used - about 2000-2002 Likes: Very simple workbooks. Easy for kids to sit down and do basically …
Return from Modern Curriculum Press Phonics Curriculum Review to Homeschool Curriculum Reviews
|
<urn:uuid:63313780-20c0-448a-9074-5cc5da2e4912>
|
CC-MAIN-2023-14
|
http://www.successful-homeschooling.com/modern-curriculum-press-phonics.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00765.warc.gz
|
en
| 0.907446
| 342
| 2.734375
| 3
|
The Meaning of St John
His day came; Churches were adorned; and millions of ‘believers’ gathered round depictions of the man who was supposedly killed slightly over two thousand years ago.
The story of St John the Baptist is interesting. It has brief but significant encounters with Jesus Christ; it entails a mysterious form of missionary; and it is loaded with political intrigue, lust and seduction, and ultimately the murder of that shadowy figure.
But the meanings here go far beyond a simple story in first century Palestine.
One meaning, derived (but distinct) from Catholic Christianity, sees John as the first caller to the imminent change that was to come, the mission of Jesus Christ. In this meaning, John is a prophet preparing those who would listen for the holy presence that was to arrive. Here, John is the closest idea to that of Jesus. John is the positive presager of the divine blessing that Jesus symbolises. And so, indeed, in the theological paratenon of Catholicism, John takes a unique place, below the divine but above the mere followers (including Peter and Paul).
There is another view of John’s story. In it, John, though connected to Jesus, is a teacher in his own right, a teacher from whom Jesus absorbed, and whose learning had informed the message of Jesus. This view takes two directions.
One direction is historical. That is, apart from any belief system, both John and Jesus were preachers, some would say reformers, some would put them at the opposite end of social activism, but the point is that both belonged to the same stream: attempts at changing the Hebraic power structure of first century Palestine. And that John, by gaining more prominence (or notoriety) before Jesus, had primacy in the chronology of Judeo-Christian reform movements.
The other direction is more theological, certainly more interesting. It sees John’s independent teaching, independent missionary, as of tremendous importance that transcended his connection to Jesus. Here, John, in his own right, was an expression of the divine.
In this line of thinking, all humans contain in them the divine spark, that makes all of them sons of the divine. The word “son” here applies equally to both genders, for the phonetic leads not to gender, but to the “sun”: the primary source of energy – the universal power that seeps into humans and gives them life.
And yet, some sons (suns) shine more than others, especially at periods when humanity is supposed to make leaps in its knowledge (as was supposedly the case two thousand years ago, when John and Jesus walked in Palestine). And so, in this line of thinking, John was a special source of light, a special son/sun, a prophet of his own ultra-important mission.
But what kind of mission was John’s?
In this view, John personified a message for the elite. His was a mission of the elegance of the soul, its need to transcend the pulls of the base needs and wants, its ascension to merge with the refinement and purity of the divine, and ultimately, of the flowering that results from that merger.
In this line of thinking, this is not mere talking. It is a difficult path. It is the passing through a “narrow gate”, one that takes humans from the swamps of debasement to the paradises of sensing the divine spark in them and gradually to the illumination of their entire being.
Here the message is elitist and for the elite because that difficult path is indeed for a few, those who have the breadth of understanding, the depth of wisdom, the strength of character, and the will to pass through the narrow gate.
It follows that, in this view, John was indeed the logical predecessor to Jesus. This is because in this line of thinking one way of seeing the message of Jesus is that it was another divine expression of that flowering of the soul that comes about from the merger of the divine with the human. And so, in this view, John was indeed an expression that indicated the route, personified the potentiality of human ascension. So, whereas Jesus embodied the spirit of ascension, John was the eureka moment of knowing the bliss of that ascension. Or, Jesus embodied the rays of the sun, represented a manifestation of that bringer of life here on earth (and so, he was a sun/son on earth), while John was the recognition of the importance of the light of the rays; he embodied ‘seeing’ the light.
In this view, it is also logical that John gets murdered, as a result of political intrigue, the lust of an old man, and the anger of a young woman that was to seduce the old man by dancing naked for him – all for John’s head to be severed. The symbolism fits perfectly with this line of thinking. The point is that, base human desires kill humans’ ability to recognise the light. Be it because of uncontrolled anger, lust, or power – actually, because of all forms of losing self-control - humans debase themselves, bury the divine spark in them. They become blind and do not see. They sever John’s head.
In this line of thinking, the death that John suffered was a strong indication of how the message of Jesus Christ was to be understood and propagated. If the divine spark was buried amidst humans’ descent into debasement, it follows (in this line of thinking) that humans will not get the true nature of the mission of Jesus. And so, whereas a successful Johannite mission would have led to recognising what Jesus the son, the sun, meant; the failure to understand the mission of John presaged the colossal and disastrous misunderstanding of the mission and meaning of Jesus.
But, if we follow that line of thinking, what does it mean then that Jesus absorbed from John? That John’s message informed that of Jesus?
In this view, there is a circularity in the universe. Whereas John represents humans’ recognition of their divine nature and stirs them to begin the ascension towards their true potential, the divine expressions need humans to embark on that journey. Or put another way, John represented the preparation of the human mind to understand the true message that Jesus embodied. But that message of Jesus was not self-contained; it needed the preparation (the message of John). Without it, Jesus’s message could not be completed. And so, the flowering that was supposed to take place by humans realising the inner spark was not only to take place inside the human soul; it had its correspondence in the universe.
This is the old idea of the one belonging to the All, and the All is manifested in unlimited expressions in the many ones. It is also the old Egyptian idea of the sky (with its wisdom and life-giving power) and earth (with its intuition and ability to absorb that power and effect it into creation) needing each other for the harmonious universal existence to be - and to expand.
|
<urn:uuid:6044185f-60d3-410c-8e04-1f1b97741a0c>
|
CC-MAIN-2023-14
|
https://tarekosman.com/articles/stjohn
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00765.warc.gz
|
en
| 0.966105
| 1,464
| 2.828125
| 3
|
Case Study: Tagoura Junior High School (Classroom)
While it is important to ventilate classrooms, other areas in schools may have dense CO2 concentrations, such as elevators, hallways, gymnasiums, broadcasting rooms, and nurses’ offices.
Even if classrooms are properly ventilated, it is not possible to provide a truly safe and secure educational environment for children if sites with dense CO2 concentrations can be found in other parts of the school. Here, we highlight some locations that are often overlooked, as found from measurements outside of the classrooms at Tagoura Junior High School.
CO2 Concentrations in Classrooms
In reality, what are the actual CO2 concentrations in classrooms? In this demonstration project at Tagoura Junior High School, CO2 sensors were placed in all 13 classrooms to monitor CO2 concentrations on a daily basis.
The Board of Education had previously instructed the school to ventilate spaces within the school, so teachers routinely opened and closed the windows in each classroom.
Figure 1 shows the results of measurements under conditions where teachers had not been informed about the CO2 concentrations in their classrooms. Figure 2 shows conditions after the results of measurements were shared with the teachers. No new equipment other than CO2 sensors were installed, nor were rules put in place.
Despite the fact that only measurement results were shared, ventilation conditions improved dramatically, while in all classrooms, CO2 levels were well below the environmental health standard of 1500 ppm for schools. Variations between classrooms also decreased.
Simply visualizing and recognizing CO2 concentrations as numerical values has resulted in the ability to take proper action to ventilate classrooms, which has had a significant impact on improving the environment.
Feedback from Teachers
Teachers offered positive feedback on the benefits of visualizing ventilation conditions using CO2 sensors. Below are some of the actual comments from teachers.
・CO2 sensors provide a real sense of conditions because values are immediately visible.
・The measured values put us in control of ventilation and calling for windows and doors to be opened. The measured values were very persuasive because of the use of objective indicators.
・The awareness that levels were being measured helped us to recognize the need for ventilation, which has resulted in improvements to the environment in classrooms.
・In recent years, we have used air conditioners in the cold weather and hot summer months, so we were able to use this as a standard for ventilation while maintaining room temperature.
・I became aware of the environmental standard of 1,000 ppm. When the level is high, I ventilate the classroom immediately.
・The ability to quickly check the values at any time has increased my interest in and concerns about air quality.
・We learned that CO2 concentrations increase considerably after just one hour of class.
・We all became aware of the relationship between activities and CO2 concentrations through the use of objective indicators.
・We can now be more proactive in ventilating our classrooms than before.
Classrooms are not the only spaces that must be ventilated. On the following pages, we will introduce the results of measurements in other locations.
Senseair, which became a member of the Asahi Kasei Microdevices (AKM) Group in 2018, is a leading global provider of gas sensors using NDIR: Non-Dispersive InfraRed technology. Our goal is to constantly develop and mass-produce new gas sensor technologies.
|
<urn:uuid:4d733c67-d267-481e-9d6b-02bf8bfef6ea>
|
CC-MAIN-2023-14
|
https://www.akm.com/kr/ko/products/co2-sensor/application/co2-monitoring-school-top/3-classroom-demonstrations/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00765.warc.gz
|
en
| 0.965331
| 712
| 3.3125
| 3
|
This year, your seasonal allergies came with a fever. But is that normal?
Or maybe for the first time in your life, the start of a new season has brought you a stuffy, runny nose and tiredness. Is it COVID-19 or something else? Should you seek treatment?
Seasonal allergies and COVID-19 share some common symptoms. So, how can you tell them apart?
For starters, if you’re fully vaccinated against COVID-19, the symptoms you’re experiencing are most likely being caused by something else – since the chance of breakthrough COVID-19 is extremely low. Below, we dig into the similarities and differences between the two conditions, as well as share tips on how to get the care you need.
Allergy symptoms vs. COVID-19 symptoms: Similarities
Both seasonal allergies and COVID-19 affect the respiratory system. That’s why many symptoms of COVID-19 can feel a lot like seasonal allergy symptoms. Here are some of the symptoms that they share:
- Runny or stuffy nose
- Loss of taste or smell
How to tell the difference between allergy and COVID-19 symptoms
While both COVID-19 and seasonal allergies affect the respiratory system, they are different in how they affect the body.
Allergies are an immune response following an exposure to certain allergens such as mold or tree pollen. COVID-19 is a virus that your body is trying to fight off – this is hard work. And while COVID-19 symptoms may not be severe on their own, they are more severe when compared to typical allergy symptoms.
Here are the biggest differences between allergies and COVID-19.
Seasonal allergies follow a schedule
If you have seasonal allergies, you can expect symptoms to appear around the same time each year and last for several weeks. For example, if you’re allergic to tree pollen, you can expect a flare-up in the late winter or early spring that will last through early summer.
COVID-19 symptom onset can occur anytime, and symptoms can change as time goes on.
Allergies come with a significant itch factor
Itchy eyes, ears, nose and throat scream allergies. That’s because the allergens can irritate the lining of your eyes, ears and airways. Itching is not a symptom of COVID-19.
Allergies never cause fevers
If you have a fever, it’s not the result of allergies.
Fevers happen when your body is trying to kill a virus or bacteria that has caused an infection – invaders like the common cold, seasonal flu or COVID-19. It’s possible for you to have a fever while you have allergy symptoms. However, the fever would be due to a separate infection.
Generally, a fever of 100 degrees Fahrenheit or more can be a sign of the flu or COVID-19. If your fever is less than 100 degrees Fahrenheit, it’s more likely you have a cold.
COVID-19 respiratory symptoms can be more severe and persistent
While some COVID-19 symptoms overlap with allergies and other illnesses, the severity of certain symptoms can help you tell whether it might be COVID-19:
- Shortness of breath or difficulty breathing – Unless you also suffer from asthma, breathing problems are more characteristic of COVID-19.
- New or sudden loss of taste or smell – Anytime you have a stuffy nose, your taste and smell senses can be dulled. But new or sudden loss of taste or smell, with or without congestion, can be a sign of COVID-19.
- Repeated shaking with chills – This symptom is common with COVID-19 but never happens with allergies.
- Symptom combination – The possibility of COVID-19 is characterized by at least two of its symptoms being present.
COVID-19 symptoms vs. allergy symptoms
We’ve gone through the symptom similarities and differences between allergies and COVID-19. But here’s how they compare side by side.
|Fever and chills||Common||Never|
|Runny or stuffy nose||Common||Common|
|Itchy, watery eyes||Never||Common|
|Cough||Dry (typically), persistent and more severe than with allergies||Dry (typically)|
|Dark circles under eyes||Never||Typical|
|Muscle pain or body aches||Common||Rare|
|Sudden loss of taste or smell||Common||Sometimes (alongside stuffy nose and congestion)|
|Nausea or vomiting||Sometimes (more common in children)||Never|
|Diarrhea||Sometimes (more common in children)||Never|
If you have symptoms related to both allergies and COVID-19, you could have either or both. Knowing for sure whether you have COVID-19 can help you get the right treatment.
Concerned it could be COVID-19? Here’s what you should do
If you think you have COVID-19, there are a couple steps you should take to make sure you get the right care and keep others safe.
- Stay home – COVID-19 is very contagious. So if you’re noticing COVID-19 symptoms, stay home and try to separate yourself from other members of your household to help prevent the disease from spreading.
- Call our nurse line if you have questions – We have a team of nurses standing by 24/7 to answer any questions you might have, and to help you decide what type of care you may need. HealthPartners patients can call 800-551-0859. Park Nicollet patients can call their clinic directly, or 952-993-4665 if it’s after hours.
- Get care and treatment from home – Our virtual care options make it safe and easy for you to get the right treatment. You can choose a video visit with a doctor, or a Virtuwell visit with a certified nurse practitioner. If COVID-19 is suspected, your doctor or nurse practitioner will help you find a COVID-19 testing location near you. If your symptoms point to a different condition, you’ll receive a custom treatment plan.
- Get tested – Getting tested is the only way to know for sure if you have COVID-19. There are different types of COVID-19 tests and situations in which you may want to get tested, so people often speak with a doctor or nurse to help decide, but it’s not a requirement.
Think that it’s probably allergies? Here’s what you can do
So, you have coughing, sneezing, stuffy or runny nose, itchy, watery eyes – but no fever and you can still taste your delicious blueberry muffin. You’re pretty sure it’s allergies. What’s your next move?
Here’s how you can start getting some relief from seasonal allergy symptoms.
- Start with home remedies – One of the most effective home remedies for allergies is a sinus rinse. You can use a neti pot or another product to help flush out your nasal passages and get relief. Just make sure you follow the instructions and use distilled water for the saltwater solution.
- Use over-the-counter medicines for symptom management and relief – Taking an oral antihistamine can go a long way in reducing your symptoms. In addition, nasal steroid sprays like Flonase or Nasacort can help reduce nose and sinus inflammation.
- Take steps to reduce your exposure to allergens – Keep your windows closed and air conditioner on. Wash your hair and clothes after you’ve been outside. Use Pollen.com to check pollen counts in your area.
- Get an official allergy diagnosis – If you’ve never spoken to a doctor about allergies before, make an appointment with a primary care doctor. They can give you an official diagnosis and treatment plan. And if needed, they can refer you to an allergy specialist or ear, nose and throat specialist. If you know you have allergies and your symptoms seem to be getting worse, you can make an appointment directly with an allergy specialist.
And don’t forget to get your COVID-19 vaccination
If you haven’t yet gotten your COVID-19 vaccine, there’s no time like the present. We’re now vaccinating everyone 6 months old and older – even people who aren’t current patients.
|
<urn:uuid:98febec8-c327-44eb-ac49-d4705ff0d060>
|
CC-MAIN-2023-14
|
https://www.healthpartners.com/blog/allergies-vs-covid-19/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00765.warc.gz
|
en
| 0.914454
| 1,864
| 2.984375
| 3
|
What Is Calciferol?
Vitamin D is usually a nutrient that will helps the entire body take in calcium by the foods that we eat. Jointly, calcium and calciferol build bones and maintain them strong. Vitamin D also plays some sort of part in cardiovascular health and dealing with infection.
Why Perform Kids Need Supplement D?
Kids need vitamin D to construct strong bones. https://healthyherwomen.com helps bone fragments heal after an injury or surgical treatment.
Where Does Vitamin D Come By?
Our body make calciferol when our skin is definitely exposed to the particular sun. It's hard to get enough vitamin D from typically the sun, though. Most kids and individuals spend lots involving time indoors from school and operate. When outdoors, it can important to guard skin to prevent skin cancer and scarring damage from as well much sun coverage.
Few food items have calciferol normally. The foods most abundant in are fatty fish (such salmon and tuna), liver, eggs and fish oils. Babies don't eat these foods a whole lot. For this reason food businesses add vitamin M to milk, natural yoghurts, baby formula, liquid, cereal, and also other food items.
Adding calciferol to be able to foods is known as "fortifying. " It's helpful, but it can not be enough.
To get enough vitamin D, young children often need to take the multivitamin with supplement D or a vitamin D supplement. Vitamin Deb is oftentimes labeled because vitamin D3.
You can buy vitamin D pills, gummies, chewables, liquids, and sprays in shops without having a prescription. Ask your child's health care provider for advice on selecting the right a single.
How Much Supplement D Does Our Child Need?
Vitamin D is assessed in international products (IU).
Babies more youthful than 1 yr old need 500 IU of vitamin D each day. Baby formula has 4 hundred IU per liter, so babies who drink at the least thirty two ounces of method each day obtain enough. If the baby drinks just breast milk or perhaps gets less as compared to 32 ounces associated with formula every day, question your health proper care provider about giving your baby the vitamin D health supplement.
Kids older as compared to 1 year need 600 IU or more of vitamin M a day. Health attention providers often desire healthy kids to take 600 to one particular, 000 IU day by day.
Some kids may possibly need more nutritional D, such while people who:
have selected medical problems (for instance, obesity, celiac disease, cystic fibrosis, multiple fractures, or bone pain)
are usually healing from bone tissue surgery (such since after fusion surgical procedure for scoliosis)
will be taking medicines (such anti-seizure medicines) that will block how a human body uses vitamin D
Your own health care provider can speak with an individual about whether your current child needs a calciferol supplement.
How Can I Help The Child Get Sufficient Vitamin D?
Because vitamin D is definitely so important, you will want to always be sure your kids makes enough. Giving your current child a daily supplement or a multivitamin with nutritional D is the easiest way to perform this.
Health proper care providers might purchase a blood test out if they think a health issue is keeping some sort of child from receiving enough calciferol. In the event that doctors don't believe your current child has a health issue, there's no want for a blood vessels test.
What About Calcium supplements?
Vitamin D helps the body take in calcium, a developing block for solid bones. Unlike with vitamin D, children usually can obtain enough calcium through food. High-calcium foods include milk, cheese, and yogurt. Foods makers often build-up foods like food, bread, or juice with calcium.
|
<urn:uuid:19bce728-c3af-4e21-a531-4ba11c48be01>
|
CC-MAIN-2023-14
|
https://dalgaard-feddersen.thoughtlanes.net/vitamin-d-1673078027/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943589.10/warc/CC-MAIN-20230321002050-20230321032050-00165.warc.gz
|
en
| 0.936767
| 801
| 2.84375
| 3
|
June 20, 2010
June 20, 2010
June 23, 2010
15.393.1 - 15.393.14
Development and Dissemination of Learning Suites for Sustainability Integration in Engineering Education
As pointed out in a key presentation in “Sustainability and Engineering Programs” within the Environmental Engineering division at the 2008 ASEE conference, one of main challenges for incorporating sustainability into engineering education is the lack of effective learning materials. The work presented here is based on a project funded by the National Science Foundation that focuses on addressing those challenges by creating effective learning materials and demonstrating successful new teaching strategies. The paper begins with a brief overview of the entire project and then focuses on the development of learning suites and dissemination of such suites through a workshop. The learning suites have been designed according to the Fink’s taxonomy of significant learning and research from the learning sciences. The paper introduces the learning suites and discusses how to use the Fink’s taxonomy and other research to guide the development of learning objectives and activities for integrating sustainability into engineering education.
The use of these learning suites was introduced in a workshop format at the Association of Environmental Engineering and Science Professors Conference in 2009. The paper describes the design of the workshop using the learning science principles and discusses the assessment of the workshop.
Introduction Engineering education in the 21st century is very complex; not only because of the “grand challenges” posed for engineering itself as developed by the U.S. National Academy of Engineering (Table 1) but also from the declining proportion of students choosing engineering as a profession and the lack of diversity represented in the remaining students1. Examination of the grand challenges in Table 1 suggests the complex technological nature of the individual and combined challenges as well as the importance of considering sustainability issues. The reaction by many engineering educators to solve such problems in the classroom would be to immerse students in traditional methods of developing new technology or application of existing technology to the problem. In this process students would not typically integrate issues of society, economy, and environment into their solution.
Table 1. Grand Challenges for Engineering (NAE, www.engineeringchallenges.org) Make solar energy economical Engineer better medicines Provide energy from fusion Reverse-engineer the brain Develop carbon sequestration methods Prevent nuclear terror Manage the nitrogen cycle Secure cyberspace Provide access to clean water Enhance virtual reality Restore and improve urban infrastructure Advance personalized learning Advance health informatics Engineer the tools of scientific discovery
Zhang, Q., & Vanasupa, L., & Zimmerman, J., & Mihelcic, J. (2010, June), Development And Dissemination Of Learning Suites For Sustainability Integration In Engineering Education Paper presented at 2010 Annual Conference & Exposition, Louisville, Kentucky. 10.18260/1-2--16533
ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2010 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015
|
<urn:uuid:ae7fa1a4-b904-4049-931f-5e97b41dfea0>
|
CC-MAIN-2023-14
|
https://peer.asee.org/development-and-dissemination-of-learning-suites-for-sustainability-integration-in-engineering-education
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943589.10/warc/CC-MAIN-20230321002050-20230321032050-00165.warc.gz
|
en
| 0.909486
| 721
| 2.515625
| 3
|
What Is Facet Disease
The Facet joints are the joint structures that connect the vertebrae to one another. The facet joint is like any other joint in your body – they have cartilage that line the joint, (this allows the bone to glide smoothly over one another) and a capsule surrounding the joint. The function of the facet joint is to provide support, stability, and mobility to the vertebrae (spine). Facet Disease occurs when there is degeneration of the facet joint.
There are two facet joints between each vertebrae. They are located on each side of the vertebrae. Facet disease can occur at any level of the spine, but are most common in the lumbar region.
Facet Disease is caused by the cartilage in the joints being worn down as a result of wear and tear, aging, injury or misuse. This type of injury to the spine can be attributed to arthritis of the spine, work, over-use or an accident. Another cause of Facet Disease is spondylolisthesis, which is when one vertebra slips forward in relation to an adjacent vertebra, usually in the lumbar spine.
Symptoms related to facet joint problems are usually localized to the area of the facet joint. This can occur in the cervical (neck), thoracic (mid-back) and lumbar (lower back).
When the facets are affected in the lumbar region, a person can experience lower back pain that can go to the buttocks and upper thigh area. If the area affected is cervical, then pain can occur in the back of the neck and radiate to the top of the shoulders, and can radiate around the neck.
Since there are a lot of causes of back and neck pain, it is important that when evaluating and treating a patient that the correct diagnosis is made. Pain related to facet disease can be easily diagnosed. This is accomplished by either a thorough physical exam or a diagnostic facet injection, a numbing medication injected into the facet joint. If your pain is caused from the facet joint, then the pain should resolve immediately. If you still have pain after the injection, then your pain may be caused by something else such as Spinal Stenosis or a herniated/bulging disc, which may require a different procedure to correct.
The DRX9000(C)™ – is designed to relieve pressure on the anatomical structures that cause neck and lower back pain. This non-surgical procedure was developed for the treatment of pain and disabling neck and lower back conditions caused by disc herniations, degenerative disc disease, sciatica, stenosis and posterior facet syndrome.
How Does It Work?
The bones of the spine are slowly and methodically separated using the state of the art DRX9000(C) Spinal Decompression Unit. While the vertebrae are separated, pressure is slowly reduced within the disc (intradiscal pressure) until a vacuum is formed. This vacuum pulls the gelatin center of the disc back inside, reducing the bulging disc or herniated disc. Substantial disc bulge reduction takes pressure off the spinal nerves and drastically reduces disability and pain. The vacuum also pulls necessary oxygen, fluid and nutrients into injured and degenerated discs allowing the healing to begin.
If you are suffering with chronic back pain, hip pain, sciatica, neck pain, shoulder pain, arm pain, weakness, numbness, or tingling we can help.
What Will You Experience During Treatment?
Light side effects during the first few sessions are common with this type of therapy. Mild muscular soreness during or after treatment may occur. The soreness may be similar to what you may feel after starting a new workout or exercise program. Most patients find this type of therapy comfortable and relaxing. The DVD/CD player on this machine makes it easy to relax, kick back and enjoy some music or an episode of one of your favorite tv shows.
During an average 20-45 minute treatment, most patients experience a gentle stretch. After each treatment is complete, one of our providers will put a cold pack on the area that was treated and sometimes even some electrical stimulation.
At our facility we always pair the DRX with therapy treatments to help loosen restrictions, improve posture and promote strengthening.
|
<urn:uuid:0a4d3db5-3373-4952-b4eb-3fb635b89f41>
|
CC-MAIN-2023-14
|
http://imperialpainspecialists.com/facet-disease/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00165.warc.gz
|
en
| 0.940925
| 900
| 3.359375
| 3
|
The study examines literature and factors that influencing vaccination among the African American children. The literature says that African American children encountered barriers in accessing immunization. Some of the barriers that affecting the African American include socioeconomic status, motherhood education, having more than one child in the family and place of vaccination. The study will help health care professionals to understand factors that may affect immunization status of a certain cultural group. The study develops a foundation of knowledge for health care providers in developing promotion material for this cultural group.
Childhood vaccination is the most effective approach to prevent diseases and death. Besides providing protection to an individual, it reduces spread of diseases in a community. Vaccination triggers a defensive reaction of the immune system against chronic infection illness. In U.S., programs towards children inoculation have been a noteworthy contribution in eliminating much of vaccine-preventable illnesses. The deliverance of vaccination to the children in time increases the chances of preventing chronic diseases and lowers the risks of spreading the disease. The Center for Diseases and Control (CDC) recommends that children under the age of 19 months should be vaccinated to maximize protection (Center for Diseases and Control, 2011). The Center for Diseases and Control called for a protection of American Children as a measure of preventing the society from vaccine-preventable disease. Health peoples 2020 seeks to reduce disparities related to health (Kennedy, Pruitt, Smith, & Garrell, 2011). Zhao and Luman (2010) performed a study to examine the measures taken to eliminate disparities in vaccination coverage among the U.S children. They have investigated the coverage rates for 1:3 (the dose of polio) 4:3 (at least for doses of DTaP: 3:1(one dose of Varicella). The researchers used data on 186,000 infants included in the NIS survey of the 2000-2008 year by sociodemographic cohort. The estimated ratio of coverage improved by a quarter of each cultural group covered in the study. The African American group had less observed coverage than that of the Caucasian group in the six years of the nine-year period of study. This paper seeks to investigate causes of low immunization rates among the African American. The paper examines the relevant literature on African American children.
The purpose of this study is to examine written literature on factors that contribute to barrier of vaccination among the African American children. The study seeks to identify barriers to childhood immunization among the African Americans. Studying barriers that hinder the achievement of Health Peoples, 2020 will initiate a strategic approach for designing an intervention to improve guarantee in vaccination. Therefore, the study develops a foundation of knowledge for health care providers in developing promotion material for this cultural group.
The study seeks to understand barrier to vaccination among African American children. The researcher developed a quantitative strategy where literature materials were chosen in accordance with the objective of the study. The researcher used google scholar research engine to generate articles that were relevant to the subject of study. The keywords were: “vaccination among African American;” “disparities in vaccination in U.S;” and “immunization of African America”. The researcher have found limited literature related to the subject of study. However, there was a connection between parental choice and delay of childhood immunization. The literature highlighted the influence of parental literacy on African American children vaccination status. According to Niederhauser, (2010) literacy in health care is the ability of people to recognize and process basic health care information so as to make appropriate medical choices.
Niederhauser (2010) designed an instrument to test the theory of reasoned action of parental barrier in childhood immunization. Niederhauser (2010) developed an instrument by investigating barriers to vaccination from the scholarly material as well as from a pilot study. The elements included in the model include socioeconomic status, motherhood education, having more one child in the family and the place of vaccination. A pilot study of 20 respondents was developed to determine reliability and clarity of the instrument. He used the Likert scale to determine the level in which the parents perceived a problem with getting their children to immunization (Niederhauser, 2010). Higher score demonstrated the high chances of parental problems in obtaining vaccination for their children. Niederhauser (2010) reported that nearly half of the parents had difficulties reading and understanding patient education material with most having difficulties in comprehending health care services that were significant to the care of their children. Since most infants depend on their guardian to be in control of decisions related to health care, it is likely that health care proficiency of the guardian can affect the result of the well-being of the child.
Pati et al. (2010) performed a study to determine the relationship between literacy on maternal health and status of early immunization in a Medicaid-eligible inner city birth group. The authors believed that mothers with a high level of literacy were more connected to children who were informed of their immunization status. They also assumed that maternal health literacy reduced the impacts of maternal education on immunization status. The researchers applied both quantitative and qualitative research among 506 mother-infant dyads. The research collected demographic information using the Test of Functional Health Literacy among the study respondents. 87 percent of the study participants were African American. 23% of this cultural group demonstrated a lack of maternal health literacy while 31% did not attain high school education. Three-quarter of the children understood their vaccination at the third month of their birth. 43 % of the seven-month-old were still with their immunization schedule. According to their findings, infants with mothers who had lower levels of education (secondary school) were three times less mindful of their vaccination contrasted with kids whose mothers had attained more than a secondary school confirmation. Children who received care from hospital facilities were four times more informed that those children who received health care from private health environment. Although literacy on maternal health had no effect on the status of vaccination at three or seven months. Although parental literacy had no significant impact on children’s vaccination status, Pati et al.’s (2010) findings demonstrate that literacy in health care is connected to maternal education. The literature hints that maternal learning had a noteworthy effect on the status of kid inoculation. The study depicted the effect of maternal training on choices about the start of immunization.
In literature it is cited that parental literacy among the African-American is the main barrier preventing children from receiving the vaccination. However, the literature does not discuss the relationship between childhood immunization disparities and maternal health care literacy. Although, the articles argue that African American have less education level contrasted with other cultural groups, it is not obvious if there is a factor in the level of vaccination in among the African American. Pati et al.’s (2010) argue the maternal health literacy had no significance impact on children’s information status. However, the study was done in Pennsylvania which is associated low rates of disparity in Immunization coverage (Hernandez, Montana, & Clarke, 2010). Therefore, the limitation in this literature calls for an evidence-based study to determine unique barriers and factors that African American parents face when seeking childhood immunization for their children. There is a requirement for exploration to research the roles that literacy in health plays in levels of disparities among African American cultural groups.
The reduced levels vaccine administration are connected to choices of the parent to delay the vaccination of their children. Understanding the components impacting the immunization rate among infants could help in shielding children from infection and disease connected with inoculation. The literature suggests that African American children encountered barriers in accessing immunization. (Pati et al., 2010; Zhao & Luman, 2010). Some of the factors affecting the African American cultural group include socioeconomic status, motherhood education, having more then one child in the family and the place of vaccination. The views and insights of African American also impact the rates of childhood vaccination. According to Painter et al. (2010) parents either trust or do not trust the health care providers to provide vaccines to their children. The literature suggests a poor immunization knowledge among African American mothers. Zhao and Luman (2010) suggest the need for knowledge concerning vaccination and the need for relevant cultural communication between the parents and the health care provider. Parents are consumers of the internet, which could be used a platform to educate them the benefits of vaccination as well as its impacts, thus, motivating African American parents to vaccinate their children. When children are not vaccinated in time as recommended, the children miss receiving protection when the vaccine preventable illness is vulnerable and have more chance of never completing the full dose of the vaccine.
Centers for Disease Control and Prevention. (2011). General recommendations on immunization. Atlanta, GA: Centers for Disease Control and Prevention.
Hernandez, V. R., Montana, S., & Clarke, K. (2010). Child health inequality: Framing a social work response. Health and Social Work, 35(4), 291-301.
Kennedy, L., Pruitt, R., Smith, K., & Garrell, R. (2011). Closing the immunization gap. The Nurse Practitioner, 36(3), 39-45.
Niederhauser, V. P. (2010). Measuring parental barriers to childhood immunizations: The development and validation of the searching for hardships and obstacles to shots (SHOTS) instrument. Journal of Nursing Measurement, 18(1), 26-34.
Painter, J. E., Sales, J. M., Pazol, K., Grimes, T., Wingood, G. M., & DiClemente, R. J. (2010). Development, theoretical framework, and lessons learned from implementation of a school-based influenza vaccination intervention. Health Promotion Practice, 11(S1), 42S-52S.
Pati, S., Feemster, K. A., Mohamad, Z., Fiks, A., Grudmieir, R., & Cnaan, A. (2010). Maternal health literacy and late initiation of immunizations among an inner-city birth cohort. Journal of Maternal and Child Health, 15(3), 386-94.
Zhao, Z., & Luman, E. (2010). Progress toward eliminating disparities in vaccination coverage among U.S. children, 2000-2008. American Journal of Preventive Medicine, 38(2), 127- 137.
Why Choose Us
Top Quality and Well-Researched Papers
We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.
Professional and Experienced Academic Writers
We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.
Free Unlimited Revisions
If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.
Prompt Delivery and 100% Money-Back-Guarantee
All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.
Original & Confidential
We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.
Customer Support 24/7
Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.
No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.
Admission and Business Papers
An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.
Editing and Proofreading
Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.
If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.
|
<urn:uuid:a31ea09d-e789-42a5-950f-a355bd36ee90>
|
CC-MAIN-2023-14
|
https://essaywriters4me.com/vaccination-of-children-among-the-african-americans/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00165.warc.gz
|
en
| 0.941072
| 2,670
| 3.453125
| 3
|
Choose an existing or emerging global health issue from the textbook or from the CDC website and discuss its impact on the population. Within your small group, discuss the determinants of the population’s health status and the roles of health promotion and disease management. How do social determinants and global health disparities play into potential causes of this health issue? How might you address the issue in your role as a professional?
Homework Essay Writers
|
<urn:uuid:c112204f-df96-4239-ab04-ac59a7132ae8>
|
CC-MAIN-2023-14
|
https://paperwriterhelper.com/choose-an-existing-or-emerging-global-health-issue-from-the-textbook-or-from-the-cdc-website-and-discuss-its-impact-on-the-population-within-your-small-group-discuss-the-determinants-of-the-populati/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00165.warc.gz
|
en
| 0.91061
| 100
| 2.578125
| 3
|
A report released February 25, 2015 by the Annie E. Casey Foundation shows that the federal government's official poverty measure created in the 1960s uses outdated information on how U.S. families are faring today, failing to illustrate the effect of programs designed to help them.
The new KIDS COUNT® Data Snapshot, Measuring Access to Opportunity, points to a better index for measuring the effectiveness of social programs designed to reduce poverty – the Supplemental Poverty Measure (SPM).
This measure has two rates; the first is designed to capture the effect of safety net programs (Social Security, food assistance, housing subsidies, etc.) and tax policies (EITC, etc.) on families. The second does not take into account these programs or policies.
By using the SPM, researchers have determined that the rate of children in poverty in Missouri is at 15 percent instead of 30 percent because of these programs and policies.
"It is great to know that these programs and policies are improving children's lives," said Wendell E. Kimbrough, chief executive officer of Area Resources for Community and Human Services (ARCHS). "The next step is to better maximize the success of these activities and interrupt future generational cycles of poverty. ARCHS' early childhood, after school, and adult job training programs are additional investments that are putting vulnerable children and their families on better pathways to opportunity."
Missouri SPM data highlights include:
- According to the SPM (2011-2013) 218,000 Missouri children have been lifted out of poverty due to federal anti-poverty programs and initiatives (cash/non trash transfers).
- According to the SPM (2011-2013), Missouri's poverty rate was 30% without cash/non-cash transfers (i.e., not taking into account federal anti-poverty programs and initiatives). The U.S. percentage of poverty without transfers was 33%.
- According to the SPM (2011-2013), Missouri's poverty rate was 15% with cash/non-cash transfers (i.e., taking into account federal anti-poverty programs and initiatives). The U.S. percentage of poverty with transfers was 18%.
The Missouri Family and Community Trust (FACT), is the official Annie E. Casey (AECF) KIDS COUNT® partner in Missouri. FACT promotes and supports collaboration and innovation in service delivery for Missouri's children and families through its network of 20 "community partnerships" around the state. Area Resources for Community and Human Services (ARCHS) is the St. Louis region's state designated community partnership.
As St. Louis' KIDS COUNT® partner, ARCHS designs, manages, and evaluates 15 education and social service programs provided at more than 275 locations that annually improve the lives of more than 90,000 of the St. Louis region's most vulnerable children and their family members (FY2014 data).
Download PDF of National SPM Data Report
|
<urn:uuid:d41f1e28-13a9-4e3d-87db-a9a065fffd8e>
|
CC-MAIN-2023-14
|
https://stlarchs.org/?start=190
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00165.warc.gz
|
en
| 0.949488
| 603
| 2.828125
| 3
|
From Hindupedia, the Hindu Encyclopedia
By Swami Harshananda
Śama literally means ‘peace’.
Treatises on Vedānta deal with the sādhanas or means of attaining mokṣa or liberation. In Advaita Vedānta, the preliminary step is known as sādhanacatuṣṭaya or four means. Out of these four, the third is śamādiṣaṭka or ṣaṭsampatti or the group of six disciplines beginning with śama. Śama is defined as the internal peace or quietude got by preventing the mind from rushing towards the sense-objects that disturb it.
- The Concise Encyclopedia of Hinduism, Swami Harshananda, Ram Krishna Math, Bangalore
|
<urn:uuid:71ecbc9c-3bb2-4ebc-9cfe-2cd8b033fc3a>
|
CC-MAIN-2023-14
|
https://www.hindupedia.com/en/%C5%9Aama
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00165.warc.gz
|
en
| 0.878986
| 188
| 3.1875
| 3
|
Untreated OSA Negatively Impacts Exercise, Sleep, and Cognition
—Investigators have determined that untreated obstructive sleep apnea may lead to reduced exercise levels, which subsequently affects sleep quality and cognitive function.
Obstructive sleep apnea (OSA) is a complete or partial collapse of the upper airway that occurs intermittently during sleep and results in snoring, labored breathing, fragmented sleep, recurrent hypoxemia and hypercapnia, and daytime sleepiness. OSA is one of the major causes of disturbed sleep and—according to the investigators of a new study on the relationship between symptoms of OSA and less exercise frequency and poorer subjective cognitive function in adults—it increases subjective cognitive complaints, accelerates cognitive decline, and increases dementia risk.1
The Need for Exercise
Those with untreated OSA are more likely to have sedentary lifestyles.1 Furthermore, the investigators note that throughout adulthood, cognitive function is positively supported by exercise and sleep. They point to accumulating research showing that aerobic exercise not only preserves cognition in older adults, but that it actually improves working memory, response time, and executive control.
Inactivity, on the other hand, increases the risk for subjective cognitive complaints in middle- and older-age. Similarly, executive function and both episodic and working memory are aided by sleep throughout adulthood.1 And, according to the authors, regular exercise has been shown to promote good sleep by increasing duration of sleep, non-REM sleep time, and overall sleep quality. Daytime sleepiness, insomnia, and symptoms of OSA may also be reduced by regular exercise.1
The investigators of the current study sought to determine whether cognitive complaints are associated with subjective measures of exercise and sleep and whether the effects of exercise are impacted by sleep.
Data from 2016 in adults ages 18–89 enrolled in a recruitment registry were analyzed via questionnaire. The investigators utilized the Cognitive Function Instrument (CFI) to determine cognitive complaints and the Medical Outcomes Study Sleep Scale (MOS-SS) subscales and factor scores to assess sleep quality, daytime sleepiness, nighttime disturbance, and insomnia and OSA-like symptoms.
The weekly number of exercise sessions was used to define frequency of exercise and this, along with MOS-SS subscales, and factor scores were used to determine predictors of CFI score. Results were adjusted for age, body mass index, education, sex, cancer diagnosis, antidepressant usage, psychiatric conditions, and medical comorbidities. The relationship between sleep duration groups—short, mid-range, and long—and CFI score were analyzed after adjusting for covariates. The impact of sleep on the exercise-CFI score relationship was also tested.
The investigators determined that exercise and MOS-SS subscales and factor scores were associated with CFI score. Fewer cognitive complaints were associated with higher sleep adequacy scores. Conversely, more cognitive complaints were associated with higher levels of sleep somnolence, sleep disturbance, Sleep Problems Index I, Sleep Problems Index II, and factor scores. Other than sleep disturbance and the insomnia factor score, MOS-SS subscales and factor scores mediated the association between exercise and cognitive complaints.
“While both poorer self-reported sleep and lower self-reported exercise frequency were associated with more cognitive complaints, it appeared that the association between less exercise and more cognitive complaints was mediated by poorer sleep quality,” said one of the study’s senior investigators, Ruth Benca, MD, PhD, Chair, Psychiatry & Human Behavior, University of California-Irvine School of Medicine. “In other words, the analyses suggest that reduced exercise led to poorer sleep which in turn led to more cognitive complaints. Furthermore, the impact of poor sleep on cognition appeared to be particularly related to symptoms suggestive of obstructive sleep apnea.”
The results of this study contribute to the growing evidence that treatment of OSA should be a priority. “These findings have important public health implications and may suggest that untreated OSA may negatively impact exercise engagement and subjective cognitive performance,” the authors write.1
According to lead investigator Miranda G. Chappel-Farley, Department of Neurobiology and Behavior, University of California, Irvine, and Center for the Neurobiology of Learning and Memory, University of California, Irvine, further research is needed to confirm the findings of this study and to advance OSA diagnosis and management.
“This was a survey-based study,” notes Chappel-Farley. “Future work using objective measures of sleep, exercise, and cognition in both treatment naïve and treated OSA patients is needed to validate and build upon these findings. For example, we would need studies using polysomnography to examine sleep architecture and expression, max VO2 testing for assessment of physical fitness, and standardized neuropsychological measures of memory and cognition. Then, we can understand some of the mechanisms underlying the observed associations. Findings from these types of objective studies can be used to inform targeted treatments or prevention strategies to address or delay memory deficits related to sleep dysfunction.”
Benca believes that the study “adds to a growing body of data showing that disturbed sleep in general as well as OSA have negative health consequences,” and that the study “highlights the importance of exercise for cognitive function, both through direct as well as indirect effects (e.g., on sleep).”
- 1. Chappel-Farley MG, Mander BA, Neikrug AB, Stehli A, Nan B, Grill JD, Yassa MA, Benca RM. Symptoms of obstructive sleep apnea are associated with less frequent exercise and worse subjective cognitive function across adulthood. Sleep. 2021 Oct 4:zsab240. doi: 10.1093/sleep/zsab240. Epub ahead of print. PMID: 34604910.
|
<urn:uuid:d779fa39-05e9-4571-bd30-538d3e687f06>
|
CC-MAIN-2023-14
|
https://www.medpagetoday.com/resource-centers/excessive-sleepiness-and-associated-risks-with-obstructive-sleep-apnea/untreated-osa-negatively-impacts-exercise-sleep-and-cognition/3641
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00165.warc.gz
|
en
| 0.942501
| 1,221
| 3.03125
| 3
|
Table of Contents
Why did Buddhism grow in China?
It was brought to China by Buddhist monks from India during the latter part of the Han dynasty (ca. 150 CE) and took over a century to become assimilated into Chinese culture. One of the key forces of Buddhism’s success was Daoism. Buddhists gained a lexicon that made it easier to teach their tradition.
When did Buddhism become popular in China?
The Beginning of Buddhism in China Buddhism first reached China from India roughly 2,000 years ago during the Han Dynasty. It was probably introduced to China by Silk Road traders from the west in about the 1st century CE.
Why did Buddhism become popular?
Buddhism earned its place among the population in India because as a religion it offered an alternative to the seemingly unpopular Brahmanical order. After he attained this state of enlightenment he became known as Buddha. After his death, several small communities continued with Buddhism.
How did the Chinese regard Buddhism?
While some of China viewed Buddhism as a positive way to establish control and order as Taoism and Confucianism did in the past. Many however, believed Buddhism to be poisonous to Chinese culture and undermine confucianism teachings.
How did Buddhism change China and how did China change Buddhism?
Buddhism heavily influenced China and has shaped it into the nation it is today. Through the spread of Buddhism, other philosophies in China have also changed and developed. Buddhism also changed in China. Buddhist schools were established and ideas from Confucianism and Taoism both became integrated into Buddhism.
Why did Buddhism appeal to the Chinese?
‘ Before the end of the Age of Division, Buddhism had gained a remarkable hold in China. It appealed to people in China above all because it addressed questions of suffering and death with a directness unmatched in native traditions.
Why was Buddhism so appealing to the Chinese?
How did the Chinese state feel about Buddhism?
Tang state repression of 845 Opposition to Buddhism accumulated over time during the Tang dynasty, culminating in the Great Anti-Buddhist Persecution under Emperor Tang Wuzong. There were several components that led to opposition of Buddhism.
What changes did Buddhism bring to China?
Buddhism heavily influenced China and has shaped it into the nation it is today. Through the spread of Buddhism, other philosophies in China have also changed and developed. Adopting the Buddhist way of paying homage through art, Taoist art began being created and China developed its architectural culture.
|
<urn:uuid:5c2798fa-3e64-4238-ac6e-a69c8762e018>
|
CC-MAIN-2023-14
|
https://wisdomanswer.com/why-did-buddhism-grow-in-china/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945182.12/warc/CC-MAIN-20230323163125-20230323193125-00165.warc.gz
|
en
| 0.981624
| 516
| 3.5625
| 4
|
How to Start a Nature Journal
When the weather is nice, we like to head outdoors, to learn while being surrounded by the natural beauty of our world. One of our favorite ways to record what we discover is by creating a nature journal.
Nature journaling is an easy, practical way to capture what you see when you’re outside focusing on nature. It’s like a nature scrapbook or a type of journal diary where you use art, pictures, words, and more to express yourself.
A journal is as unique as you are, so feel free to make it simple or complex.
This post contains affiliate links.
What should you use for a nature journal?
You don’t need an expensive leather-bound journal to get started. Begin with a single piece of paper or even a small sketchbook. A favorite among homeschoolers is composition books. They are cheap, easy to find, and simple to customize.
Be creative! You can even make your own books by stapling blank sheets of paper between construction paper or card stock.
If you are going to be using mixed mediums in your books (tools like pencils, markers, and watercolor pencils), I would recommend sticking to heavier paper that can withstand the wetness and won’t bleed through.
Now that my girls are older, we use smaller, spiral-bound sketchbooks with 80lb paper.
The most important thing when selecting a journal or sketchbook is to find something you will utilize and can easily take along on your journey.
Nature journaling should be fun and accessible.
What other supplies will you need?
We use a variety of materials in our journals. It just depends on what we’re trying to capture at that particular time. My teens love experimenting with different mediums.
Our favorites include:
How do you get started?
How do you move from taking a walk to capturing your observations in a journal?
Number one is to get outside! Put the textbooks down and go exploring. Take a hike, walk around the block, or drive to a nature preserve. Just get started.
Remember that this isn’t about perfection. It’s about recording what you find beautiful, interesting, or inspirational.
Make a conscious choice to slow down. That is when you will begin to notice details about the natural world we live in. Pay attention to shapes, textures, movement, and color.
Find something that catches your eye, as well as your imagination, and study it. You can start sketching or recording right then and there. Or take photos and samples (if appropriate) so you can work on your journal at home.
If you’re looking for more concrete nature walk ideas, my favorite resource, hands down, is Creative Nature Walks by Our Journey Westward. Inside you’ll find over 100 creative and detailed ideas for exploration for all ages. We’ve used this book for a number of focused nature walks and I was always amazed at what my kids learned and how much fun we had together.
During our walks, I encouraged my kids to use their journals to record the different things we were out there searching for, once we found them.
What else can you add to your journal?
Over the years our family has experimented by adding other elements to our journals, including:
We have pressed them, sketched them, used our own photographs, and diagrammed them with the aid of a botany book.
My girls love collecting leaves in every color and shade when they happen to be up north in the fall. The leaves in their books remind them of the beauty of the changing seasons.
When Abigail was taking an online photography course, she included quite a few of her nature photographs in her journal. One idea is to add some pictures of birds you find during your journey.
Rubbings and stamping
They enjoy the chance to be “crafty” with bark and leaf rubbings, as well as stamping, using rocks and acorns.
We have written down our observations, poetry, and even short stories based on items we found.
I love going back and looking at the journals my girls have created over the years. It is a wonderful reminder of what interested them during a season, as well as a way to see how their writing and creativity has blossomed.
Nature journaling is a wonderful way to slow down and truly observe the world around you. Head outdoors today and see what catches your eye. I guarantee that you’ll return full of inspiration!
Additional Art and Nature Resources
- Get Outside with Creative Nature Walks – Discover how easy it is to head outside into nature. You don’t even have to come up with a plan because there are dozens of ideas you can use to make your time outside fun and educational.
- Simple and Unique Painting Technique Your Teen Should Try – Sure, you’ve painted with different types of paints, but have you ever painted with blueberries? That’s right, the juice from blueberries makes an incredible painting medium.
- This Tool Makes Studying Wildflowers a Breeze – If wildflowers are abundant near you right now, turn your science and nature studies toward them. This resource makes it incredibly easy simple to add the study of wildflowers to your homeschooling lesson plans.
Helpful Nature Journal Tools
Such a lovely idea that i’ll be doing with my kids
Natasha @ Serenity You
Thank you Natasha. I hope you enjoy it as much as we do. Thank you for stopping by.
Nature Journaling has been on my list of to-dos with my children for years, but we’ve had trouble getting started. I appreciate your tips for getting started and the book recommended. Thank you!
You’re welcome Sara! It’s sometimes so hard to get started with something brand new, isn’t it? I’m glad I was able to show you how easy it can be to get going. I think your kids will really enjoy it. I know mine do! Thank you so much for stopping by!
We started nature journaling as a way to pass the time in the car, driving home from hikes. The kids love it!
What a great idea Laura! My kids used to draw a lot in the car – I had forgotten all about that. Maybe I’ll start nudging them in that direction again. Definitely a great way to remember your hikes while passing the time.
wow this is a beautiful idea, that never crossed my mind and i think i never heard about it before!! my daughter and twins love nature and are still fascinated by its elements suggesting a nature journal would be a great way to get them engaged with something they are passionate about! thanks for sharing! Marwa from BlossomFamily.net
Thank you Marwa! I’m so excited to hear that your kids love being out in nature. My kids do too. When I started to add more purpose to our outdoor journeys, they seemed to become more reflective. They weren’t in such a hurry anymore and instead were anxious to find things to document. It’s been a great way to expand their art interests too. Thank you so much for stopping by. Let me know how your kids like keeping a nature journal.
This is such a beautiful idea and post! Thanks so much for sharing at After School.
Thank you Anna! I hope you’re able to make some nature journals this Spring!
A nature journal sounds like a fine way to welcome spring! We have to try it!
Thank you for stopping by the Thoughtful Spot Weekly Blog Hop this week. We hope to see you drop by our neck of the woods next week!
I know many people will be welcoming spring with open arms this year Jill! I hope your family enjoys keeping a nature journal as much as mine has. We love your hop and will definitely be stopping by again! Thank you for sharing.
Great flower picture. Love the leaves taped into the nature journal! Thanks for linking up to the Thoughtful Spot Blog Hop. Hope to see you next week!
Thank you Thaleia. We took that on a trip to Colorado last year at their botanical garden. My daughters don’t remember too much about living up North and the change of seasons, so they were thrilled to be in PA one year during the fall. They collected so many leaves!! We love your hop, so I’m sure we’ll have something to contribute next week. Thank you for stopping by!
Thank you for sharing these great ideas. What do you use to carry your supplies on your nature walks?
Thank you Jessi. We usually just take one of our bags, like a carrier bag that hangs to the side or a backpack. Nothing too cumbersome.
Comments are closed.
|
<urn:uuid:14dbdbf5-1e0e-4f67-8541-6d8902c9e800>
|
CC-MAIN-2023-14
|
https://educationpossible.com/how-to-start-a-nature-journal/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945292.83/warc/CC-MAIN-20230325002113-20230325032113-00165.warc.gz
|
en
| 0.949882
| 1,859
| 2.734375
| 3
|
Research is the backbone of innovation and technology which leads to the development of any nation and society in general. Every country encourages research and technology pursuits of its people involved in these fields to stand the competition world over. Research is being carried by people in different branches of science, medical, technology, arts and humanities.
Expertise and significance of research for a nation or an individual is assessed on the basis of number of publications in reputed national and international journals and the importance of research publications is further analysis on the basis of patents being generated and citation index. Research productivity (in terms of research projects, patents, publications, impact factors, citations, h-index, i10-index, number of Ph.Ds. guided) in educational institutions has become one of the important parameters towards their (institutions) ranking at the national and international level influencing their status towards funding and admission by students. As per UGC guidelines, Academic Performance Indicator (API) score evaluation for recruitment and promotion of college/university faculty and National Assessment and Accreditation Council (NAAC) evaluation while ranking national level universities, deemed and deemed-to-be universities give due credit to various research productivity parameters at individual and institute/university/college level.
A citation is a reference to the source of information used in research. An in-text citation is a brief notation within the text of research paper or presentation which refers the reader to a fuller notation, or end-of-paper citation, that provides all necessary details about that source of information. Citing or documenting the sources used in research serves three purposes: i) it gives proper credit to the authors of the words or ideas that we incorporated into our paper, ii) it allows those who are reading our work to locate our sources, in order to learn more about the ideas that we include in our paper, iii) citing our sources consistently and accurately helps to avoid committing plagiarism in our writing. In simple words, citation of a research paper means its recording by another researcher in his work which is being published. Citations are further classified in various categories like self-citations (means reporting by the same author or his group/colleagues), in low impact factor journals, in high impact factor journals, in the same country or in other countries (developed, developing or under developed). Citations in the highly rated international journals with very high impact factors e.g., nature, are given due importance and value by the scientific community. In the present era of internet, Research gate, Scopus, Web of science and google scholar portals are giving each and every update about the research publications and citations of every individual. These portals are also selecting and honouring the individuals every year as the most cited authors. Institutes/universities/R&D organizations of every nation also pay utmost importance to the achievements of people on these parameters not only for their appointments but also for growth in career.
There is no unique or universally-agreed concept of what constitutes extraordinary research performance and elite status in the sciences and social sciences and significance of research all over the world is assessed on the basis of citations the research findings of an individual is attracting. Take any topic of science, technology, medicine and social sciences, the citation record of people from countries like USA, UK, China, Germany, France is extremely well ahead than the citation numbers of people in India. India is littered with renowned and prominent institutions in the sciences, engineering and social sciences – the IITs, IISc, TIFR, JNU, and TISS. Yet, a new report (in 2018 Web Science) figures that only ten Indians are among the world top 1 percent of the world's most-cited researchers.Interestingly, in the report published by Clarivate Analytics, some of the ten researchers aren't even from the leading institutes in the country.The 'Global Highly-Cited Researchers 2018 List' is an annual compilation of statistics about research output from countries, institutions and individuals around the globe. In its 5th edition, the report listed the world's 4000 most 'influential' researchers of 2018, among which exactly 10 are Indian.While the list gathers information about researchers from over 60 different countries, over 80 percent of the 4000 listed names come from just 10 countries, and 70 percent from just 5. United States has the highest representation on the list with 2639 names, with the second largest influence is the United Kingdom with just 546 names. China is third in line with 482, while India is nowhere in the top 10, with all of 10 researchers to contribute. Harvard University was the institute with the most number of influential researchers (186).
Having low very low citation representation means we in India are not doing enough research and not at all the quality research. Research will get citation only when it will act as a path breaking for other researchers all over the world. In the present era of information online, it is very easy to get one’s research work noticed if it is worth for that. Need is to do innovative research instead of copying already going on research ideas and just to manipulate them with change of theoretical and experimental parameters and conditions. No doubt, thinking something new need facilities, environment and encouragement but above all it needs sincerity and hard work. Many of the researchers also believe that socio-economic, cultural factors and brain drain have their role to play in such assessments. Another is industrial partnerships and investments, which are very limited in India compared to elsewhere in the world. It is a matter of concern and needs to be addressed by the government, and stakeholders, including scientists. We need to improve our research ecosystem. There is a lack of focus on quality research in Indian academia. If teachers do not do high-quality research, they will not be updated with new developments.
India is the top country globally to get low-quality research published in ‘predatory’ journals, according to a study which found that it contributed 27 per cent of the scientific studies in bogus publications. The investigation, published in the journal Nature, also showed that majority of papers in suspected biomedical predatory journals (57 per cent) are from high or upper middle income countries, with many coming from prestigious institutions, including the Harvard University in the US.Largely unknown a decade ago, there are now an estimated 8,000 predatory journals collectively publishing more than 400,000 research studies each year. These journals offer to quickly publish research findings, typically at a lower cost than legitimate journals, but do not provide quality controls such as peer review. Researchers found that the top countries publishing in these journals were India (27 per cent), the US (15 per cent), Nigeria (5 per cent), Iran (4 per cent) and Japan (4 per cent).
While searching through the internet, the names of the following three researcher came with highest number of citations in the google scholar. In terms of citations, these people stand far ahead to the Indian authors who were listed in the 'Global Highly-Cited Researchers 2018 List' and given below. Citation of research depends on many factors not under the control of the researcher but innovative and path breaking research will always get good citation. Need is only to think out of box and think something new instead of just trying to take one small step ahead to earlier path travelled by the researchers.
Dr.Michel Foucault (https://scholar.google.com/citations?user=AKqYlxMAAAAJ&hl=en)(15 October 1926 – 25 June 1984) was a French philosopher, historian of ideas, social theorist, and literary critic has overall 1091105 citations to his credit.
Dr.Pierre Bourdieu(https://scholar.google.com/citations?user=d_lp40IAAAAJ&hl=en)(1 August 1930 – 23 January 2002) was a French sociologist, anthropologist, philosopher and public intellectual is credited with 811892 citations.
Dr.Sigmund Freud (https://scholar.google.com/citations?user=N80kIiYAAAAJ&hl=en)(6 May 1856-23 September 1939) as an Austrian neurologist and the founder of psychoanalysis, a clinical method for treating psychopathology through dialogue between a patient and a psychoanalyst got 556912 citations to his research publucations.
The ten Indian scientists amongst top 4000 influential researcher of the world who have been listed as a ‘Highly Cited Researcher’ for the year 2018 by Web of Science are:
Dr CNR Rao(https://scholar.google.co.in/citations?user=Zs9227oAAAAJ&hl=en)
With more than 119928 citations is the world-renowned chemist from Jawaharlal Nehru Centre for Advanced Sciences, Bangalore and former advisory councilman to the Prime Minister
Dr Ashok Pandey (https://scholar.google.co.in/citations?user=VlnbGhIAAAAJ&hl=en)
With more than 47405 citations is currently Distinguished Scientist at the Centre for Innovation and Translational Research, CSIR-Indian Institute of Toxicology Research
Dr Rajeev Varshney(https://scholar.google.com/citations?user=Kdmxy8EAAAAJ&hl=en)
With more than 38233 citations is currently the Research Program Director- at the International Crops Research Institute for the Semi-Arid Tropics (ICRISAT), a global agricultural research institute
Dr Dinesh Mohan(https://scholar.google.co.in/citations?user=CViEcmUAAAAJ&hl=en)
Professor at School of Environmental Sciences, Jawaharlal Nehru University, New Delhi, India is having more than 32943 citations.
Dr AvinashKumar Agarwal: From IIT Kanpur, has made outstanding contributions to the research related to IC engine combustion
Dr Alok Mittal: Professor of Chemistry & Dean (R & C) at Maulana Azad National Institute of Technology in Bhopal
Dr Jyoti Mittal: Dept. of Chemistry & Dean (R & C) at Maulana Azad National Institute of Technology in Bhopal
Dr Rajnish Kumar: IIT Madras
Dr SanjeebSahoo: Institute of Life Sciences, Bhubaneswar
Dr SakthivelRathinaswamy: Bharathiar University in Coimbatore
|
<urn:uuid:83e5e5df-308b-4d12-be7e-413b2daea5d3>
|
CC-MAIN-2023-14
|
https://scind.org/Science/article/Significance-of-Research
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945292.83/warc/CC-MAIN-20230325002113-20230325032113-00165.warc.gz
|
en
| 0.926877
| 2,163
| 3
| 3
|
AP PHOTOS: Women with sticks perform Indian festival ritual
NANDGAON, India (AP) — Hundreds of women in two north Indian towns celebrated Holi, the Hindu festival of colors, by playfully hitting men with wooden sticks in response to their teasing as part of a ritual.
After two years of subdued revelry due to COVID-19, the Holi celebrations that began last week recreated the legend of the Hindu god Krishna spraying his consort Radha and her friends with red, yellow, green and saffron colors. The women were from Nandgaon, the hometown of Krishna, and the men were from Barsana, the legendary hometown of Radha.
The men wore turbans and held shields above their heads to protect themselves from the women’s hits in the mock battle.
The devotees, smeared in colored powder, then prayed at the Nandagram Temple near where Hindus believe Krishna and his brother Balram spent their childhood. The temple was built at the beginning of the 19th century.
They exchanged sweets and drinks as part of the celebrations.
Some men were caught by women and made to dress like them. They then sang and danced along with the women.
The “Lathmar Holi” (Stick Holi) festival attracts visitors from around the world in large numbers to experience the celebrations, which are a symbol of India’s cultural heritage. The twin towns of Nandgaon and Barsana are about 115 kilometers (70 miles) south of New Delhi.
Holi traditions vary across India. In most parts, the holiday will be celebrated on Wednesday, turning the streets and lanes into playgrounds with people of all faiths joining the festivities. They also include water balloons and squirt guns.
Holi, which marks the advent of spring, is widely celebrated in India, Nepal and other countries with large Indian subcontinent diaspora populations.
Copyright 2023 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed without permission.
|
<urn:uuid:f57b0ac1-5bd7-404f-b8a9-6736292f43e0>
|
CC-MAIN-2023-14
|
https://www.kaaltv.com/news/us-world-news/ap-photos-women-with-sticks-perform-indian-festival-ritual/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945292.83/warc/CC-MAIN-20230325002113-20230325032113-00165.warc.gz
|
en
| 0.967246
| 424
| 2.515625
| 3
|
Height 2 m
Name Peter Freuchen
|Born Lorenz Peter Elfred FreuchenFebruary 2, 1886Nykobing Falster, Denmark (1886-02-02) |
Known for Arctic explorer, author, journalist, anthropologist.
Died September 2, 1957, Anchorage, Alaska, United States
Spouse Dagmar Cohn (m. 1945), Magda Lauridsen (m. 1924)
Books Arctic Adventure: My Life in, Peter Freuchen's Book of th, Whaling boy, I Sailed, Aventure arctique
Similar People Dagmar Cohn, Therkel Mathiassen, Peter Ittinuar, Jean Malaurie
Peter freuchen bamfs of history
Lorenz Peter Elfred Freuchen (February 2, 1886 – September 2, 1957) was a Danish explorer, author, journalist and Anthropologist. He is notable for his role in Arctic exploration, especially the Thule Expeditions.
- Peter freuchen bamfs of history
- Peter freuchen wikividi documentary
- Personal life
- Later years
- Honours and awards
- Literary prizes
Peter freuchen wikividi documentary
Freuchen was born in Nykøbing Falster, Denmark, the son of Anne Petrine Frederikke (née Rasmussen; 1862–1945) and Lorentz Benzon Freuchen (1859–1927). His father was a businessman. Freuchen attended the University of Copenhagen where for a time he studied medicine.
Freuchen was married three times. He was first married in 1911 to Navarana Mequpaluk (d. 1921), an Inuit woman who died in the Spanish Flu epidemic after bearing two children (a boy named Mequsaq Avataq Igimaqssusuktoranguapaluk (1916 - c. 1962) and a girl named Pipaluk Jette Tukuminguaq Kasaluk Palika Hager (1918–1999)). His second marriage was to Magdalene Vang Lauridsen (1881–1960), daughter of Johannes Peter Lauridsen (1847-1920), Danish businessman and director of Danmarks Nationalbank. The marriage started in 1924 and was dissolved in 1944. In 1945, he married Danish fashion illustrator, Dagmar Cohn (1907–1991).
Freuchen's grandson, Peter Ittinuar, was the first Inuk in Canada to be elected as an MP, and represented the electoral district of Nunatsiaq in the Canadian House of Commons from 1979 to 1984.
From 1926-1940, Freuchen owned the Danish island Enehoje on Nakskov Fjord. During this period he wrote several books and articles and entertained guests. Since 2000, the uninhabited island has been a part of Nakskov Vildtreservat, a wildlife reserve.
In 1906, he made his first expedition to Greenland. Between 1910 to 1924, he undertook several expeditions, often with the noted Polar explorer Knud Rasmussen. He worked with Rasmussen in crossing the Greenland ice sheet. He spent many years in Thule, Greenland, living with the Polar Inuit. In 1935, Freuchen visited South Africa, and by the end of the decade, he had travelled to Siberia.
In 1910, Knud Rasmussen and Peter Freuchen established the Thule Trading Station at Cape York (Uummannaq), Greenland, as a trading base. The name Thule was chosen because it was the most northerly trading post in the world, literally the "Ultima Thule". Thule Trading Station became the home base for a series of seven expeditions, known as the Thule Expeditions, between 1912 and 1933.
The First Thule Expedition (1912, Rasmussen and Freuchen) aimed to test Robert Peary's claim that a channel divided Peary Land from Greenland. They proved this was not the case in a 1,000 km (620 mi) journey across the inland ice that almost killed them. Clements Markham, president of the Royal Geographical Society, called the journey the "finest ever performed by dogs." Freuchen wrote personal accounts of this journey (and others) in Vagrant Viking (1953) and I Sailed with Rasmussen (1958). He states in Vagrant Viking that only one other dogsled trip across Greenland was ever successful. When he got stuck under a blizzard, he used his own feces to fashion a dagger with which he freed himself.
While in Denmark, Freuchen and Rasmussen held a series of lectures about their expeditions and the Inuit culture.
Freuchen's first wife, Mekupaluk, who took the name Navarana, accompanied him on several expeditions. When she died he wanted her buried in the old church graveyard in Upernavik. The church refused to perform the burial, because Navarana was not baptized, so Freuchen buried her himself. Knud Rasmussen later used the name Navarana for the lead role in the movie Palos Brudefærd which was filmed in East Greenland in 1933. Freuchen strongly criticized the Christian church which sent missionaries among the Inuit without understanding their culture and traditions.
When Freuchen returned to Denmark in the 1920s he joined the Social Democrats and contributed with articles in the newspaper Politiken. From 1926 to 1932 he served as the editor-in-chief of a magazine, Ude og Hjemme, owned by the family of his second wife. He was also the leader of a movie company.
In 1932 Freuchen returned to Greenland. This time the expedition was financed by the American Metro-Goldwyn-Mayer film-studios.
He was also employed by the film industry as a consultant and scriptwriter, specializing in Arctic-related scripts, most notably MGM's Oscar-winning Eskimo/Mala The Magnificent starring Ray Mala, and featuring Freuchen as Ship Captain. In 1956, he won $64,000 on The $64,000 Question, an American TV quiz-show on the subject "The Seven Seas".
In 1938 he founded The Adventurer's Club (Danish: Eventyrernes Klub), which still exists. They later honoured his memory by planting an oak tree and creating an Eskimo cairn near the place, where he left Denmark for Greenland in 1906. It is situated east of Langeliniebroen in central Copenhagen and not far from the statue of The Little Mermaid.
During World War II, Freuchen was actively involved with the Danish resistance movement against the occupation by Nazi Germany, despite having lost a leg to frostbite in 1926. He openly claimed to be Jewish whenever he witnessed anti-semitism. Freuchen was imprisoned by the Germans, and was sentenced to death, but he managed to escape and flee to Sweden. In 1945 he married Danish-Jewish designer Dagmar Freuchen-Gale.
As he related in Vagrant Viking, he was friends with the royal families of Scandinavia and other countries, and his movie work in New York City and Hollywood brought him into the 'royalty' of moving pictures and the political world of Washington, D.C.
Freuchen and his wife Dagmar lived in New York City, and maintained a second home in Noank, Connecticut.
The preface of his last work, Book of the Seven Seas, is dated August 30, 1957 in Noank. He died of a heart attack three days later in Elmendorf, Alaska. After his death, his ashes were scattered on the famous table-shaped Mount Dundas outside of Thule.
|
<urn:uuid:5062edb5-f928-4ec0-b5d9-26bdbed2a04d>
|
CC-MAIN-2023-14
|
https://alchetron.com/Peter-Freuchen
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00165.warc.gz
|
en
| 0.958179
| 1,634
| 2.53125
| 3
|
3D Printing: What Is It And How Is It Used
Unless you’ve been living under a rock, you’ve probably heard the term 3D printing. This technological concept has existed for decades, but it now specifically refers to the use of a machine to construct a three-dimensional object layer by layer.
The popularity of 3D printing machines has risen significantly as their prices dropped over time. It is now cheap enough that people from all walks of life are buying their own machines and getting creative. Many post videos of their 3D printing machines on social media websites as a source of income. Using SocialGreg to gain followers, people are having fun with their 3D creations and earning from ad revenue shares.
What Exactly Is 3D?
Before the term 3D Printing, the technology was known as additive manufacturing. This patented term was used to describe bonding a material layer by layer to create a final three-dimensional shape. A three-dimensional design is first created using a computer program, and fed into a machine to ‘print’ the designed object. In the past, the technology was only applicable to metalworking. Scientists developed ways to spray layers of metal in the manufacturing process to automate the manufacture of a final solid object. The older methods for 3D printing involved using a binding powder to fuse the different layers together. Newer methods use a thermoplastic material that can be heated in order to shape it and left to cool (and harden).
Several techniques have been developed for 3D printing, Inkjet head 3D printing, SLS (Selective Laser Sintering), and FDM (Fused Deposition Modeling), and MultiJet Fusion are only a few of many currently used 3D printing technologies There are many applications for this technology, and it is used in many industries.
FDM vs SLS
The most popular (and affordable) method of 3D printing is FDM, alternatively known as Fused Filament Fabrication (FFF). These are the smaller machines that many users on social media are filming the use of. Simply explained, a filament (of a chosen thermoplastic material) is heated and extruded at the same time, and deposited as a layer, according to a given design. These machines range from very small, to larger and more complex. They can even be used as an educational tool, giving students a means to creatively model and experiment with engineering principles. Inexpensive prototypes can be made within hours, allowing for a better understanding of engineering, molecular chemistry, and biology, among other subjects.
Although it has its relevant applications, models printed using FDM are less accurate and weaker than those using SLS. The latter uses a carbon dioxide laser to fuse together a powder made of a thermoplastic polymer. In simple terms, the laser is used to heat up specific parts of a powder, allowing the particles to fuse together forming a layer of solid material. SLS is more expensive than FDM but relatively cheaper and faster than traditional methods of manufacture. Additionally, the quality of manufactured products is very high, allowing for its use on an industrial scale.
How is 3D Printing Useful?
Although widely popular videos on TikTok make it seem like a toy, there are many useful applications for 3D Printing.
- Concept Models
In industrial situations where a small number of prototypes need to be made, 3D printing allows for a smaller structurally sound model to be made in a shorter period of time. This is particularly useful in making custom tools to fix a particular problem during any manufacturing process.
- Car Manufacturing
For decades, vehicle manufacturers have used 3D printing to construct various parts. Other methods to manufacture these parts can be too difficult or produce less sturdy results. By using 3D printing, automotive part manufacturers can speed up their production cycles in addition to providing more creative freedom when designing parts. The use of 3D printing allows for more customization in all levels of automotive manufacturing, and 33% of companies surveyed say that the technology allows for faster, customized production.
Complex buildings can be made faster using 3D Concrete, allowing for expansive construction to be cheaply made, with more structural integrity. A larger 3D printer is used to construct a building based on an architectural design, without human assistance. This also makes for a less expensive project. For example, a Chinese company states that they can print an apartment block (5 levels) for under $200,000. It is worth noting that this method of construction is often zero-waste, and thus makes it more environmentally friendly.
- Prosthetics and Implants
The prosthetics industry has come a long way from wooden legs that look, feel, and function unrealistically. With the technological and medical advantages, nowadays prosthetics can be made a perfect fit for the recipient. The same can be said for implants such as titanium hips etc. Additionally, the lower cost of production makes prosthetics affordable for more patients.
Medical scientists developed a method to use living cells and other biological materials as the 3D printing material, creating the opportunity to make tissues for various testing purposes. Experts project that this industry’s market size will grow 4 to 5 times in the coming years.
- Art and Jewelry
As this technology gives artists complete creative freedom, the options are endless. Artists are using affordable 3D printers to design and create artistic pieces, as well as jewelry. Custom-made jewelry is also easier to make by this process.
There is no doubt that there are still more advances in 3D printing technology to come. With an industry worth over $50 billion, it’s a safe bet that more uses for the technology will be developed. NASA is even thinking of ways to create zero waste food by 3D printing it. As 3D printers become increasingly more affordable, more hobbyists will be able to experiment with them. Naturally, this will lead to advances in the technology, and further development of old and new methods for 3D printing. The education of younger students on the methods of 3D printing will give rise to a generation of scientists that can further develop this amazing technology.
|
<urn:uuid:a109ccdc-d1c3-4fd4-9053-ea9be9cfd609>
|
CC-MAIN-2023-14
|
https://aptgadget.com/3d-printing-what-is-it-how-is-it-used/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00165.warc.gz
|
en
| 0.946987
| 1,259
| 3.703125
| 4
|
Ideal temperature for your pet
Pets are often quite weather resistant, but how do you make sure they are comfortable when it gets extremely cold or very hot? In the Netherlands, the temperature can fluctuate considerably, so it is important to ensure that your pet always has a comfortable living environment.
Body temperature of pets
The body temperature of dogs is between 38.0 and 39.0 degrees and that of cats between 38.0 and 39.5 degrees. This is slightly higher than the average human body temperature. Dogs and cats only have sweat glands under the soles of their feet, unlike humans who have sweat glands all over their body. This prevents dogs and cats from sweating to cool down. Instead, dogs pant to cool off and cats often lick their fur to cool off through evaporation of moisture.
Ideal temperature in the house
The temperature in the house depends on the temperature outside. If it's hot, you can close the curtains, turn on the air conditioner or fan, and make sure your pet has plenty of drinking water. Make sure the air conditioner or fan is not too cold, about 5 to 10 degrees colder than outside is sufficient.
In de winter kan de temperatuur ’s nachts dalen naar 15 graden, wat niet te koud is voor honden of katten, tenzij ze oud of ziek zijn. Dan is een temperatuur van ongeveer 18 graden beter. Zorg ervoor dat je huisdier een warm plekje heeft om te slapen, zoals een warme mand met dekens of een warm holletje voor de kat. Dit kan ook helpen om energie te besparen door het huis minder te hoeven verwarmen.
Consider your pet's needs when it comes to temperature in your home. Use natural means such as curtains to regulate the temperature and do not set the air conditioning or fan too hard or too cold. Make sure your pet has plenty of drinking water and a warm place to sleep. Doing this will help your pet stay comfortable without expending too much energy.
Dog or cat outside
Make sure your pet has plenty of shade if it spends a lot of time outside so it doesn't overheat too quickly. In the fall and winter months, it's important to make sure your pet has a warm place to retreat. For example, place a dog or cat flap or create a warm spot with a basket and blankets in the shed or hutch. Always provide enough food and drinking water, both indoors and outdoors.
In addition to taking care of your pet, it is also wise to treat your pet chipped and to correctly Registered at an animal database recognized by the government, such as PetBase.
|
<urn:uuid:fffdc03e-a453-4ceb-b8bf-b9c14d512ff7>
|
CC-MAIN-2023-14
|
https://www.petbase.eu/en/ideale-temperatuur-voor-je-huisdier/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00165.warc.gz
|
en
| 0.793798
| 589
| 2.828125
| 3
|
The risk of pets being a source of COVID-19 in a household is exceptionally low with some basic practices
Cat napping on woman's lap
Photo courtesy of Depositphotos
Newton’s third law is “For every action, there is an equal and opposite reaction.”
COVID-19’s first law is “For many actions, there’s a big over-reaction.”
Careful communication is important to limit application of COVID-19’s first law. However, some over-reaction is still going to occur.
One of the big concerns about news of SARS-CoV-2 infection in pets is people freaking out. With reasonable communication, the vast majority of pet owners will react fine. However, a small percentage may not. This leads to concerns that some people that are particularly freaked out about COVID-19 will abandon or surrender their pets, not getting the message that a logically managed pet poses virtually no risk to it owner.
Here’s a commentary on the subject. The pdf version sent by the Ontario Veterinary Medical Association is available here.
I’m worried about getting COVID-19 from my pet. What should I do?
As reports of animals being infected with SARS-CoV-2 (the cause of COVID-19) increase, some people have expressed concern about the risks posed by their pet. Human-to-pet transmission of this virus can occur. How often this occurs isn’t known, but the role pets play in transmission of the virus to their owner is likely very minor to non-existent.
A few key points must be considered.
- COVID-19 is spread almost exclusively, if not exclusively, person-to-person
- A pet owner is much more likely to transmit the virus TO their pet than to get it FROM their pet
- If someone’s pet is infected, they got it from a person. If the pet has been kept away from pets and people from outside the household, their infection would have come from a household family member.
For a pet to pose a risk of bringing the virus into the household, it has to encounter other people or animals outside of the household that are infected. If a pet is socially distanced and kept away from people and animals outside the household, there is essentially no risk of the pet being the source of COVID-19 in a household. If the pet becomes infected, it would have gotten it from someone in the household, and the infected human household member(s) would be the main risk to the rest of the household, not the pet.
The main concern about animals involves the potential for transmitting the virus outside of an infected household. For example, if a cat is infected by its owner and goes to a veterinarian or is allowed to roam, there may be a chance that the cat could infect another person or animal.
Therefore, basic measures can reduce or eliminate the already low risk. These include:
- Socially distance your pets, just like you and the rest of your family. Keep them inside with you, and when outside, keep them under control so they don’t interact with anyone else.
- If you’re infected, limit contact with people and
- If you’re infected, keep your pet in the house with you.
If you socially distance your pet(s) the same way you should be socially distancing yourself from other people, there is basically no chance they will bring this virus into the household.
Pets can provide important emotional support during challenging times. The risk that they would be a source of COVID-19 in a household is exceptionally low, with some basic practices. While there are reports of people asking to surrender their pet because of fear of COVID-19, the risk posed by driving to a shelter to surrender a pet is probably much greater than the risk posed by a pet.
(Reprinted with permission from Worms and Germs Blog)
September 26, 2020
VIN News Service commentaries are opinion pieces presenting insights, personal experiences and/or perspectives on topical issues by members of the veterinary community. To submit a commentary for consideration, email firstname.lastname@example.org.
|
<urn:uuid:0932061f-95bc-42e3-81db-896712b4bb6a>
|
CC-MAIN-2023-14
|
https://www.vin.com/vetzinsight/default.aspx?pid=756&catId=5874&Id=9613099
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00165.warc.gz
|
en
| 0.965899
| 888
| 2.796875
| 3
|
A UNICEF inforgraphic showing some of the data and statistics around preventable newborn deaths and stillbirths. The information on the poster reads:
Every year 2.6 million babies die in the first 28 days of life. Most in the first week.
The top causes:
An additional 2.6 million stillbirths occur each year. 50% after labour has begun.
But 75% of newborn deaths can be prevented with high-quality care. So can the majority of maternal deaths and stillbirths.
Healthy mother + Healthy birth + Good health in the first days of life = The start of a healthy childhood.
|
<urn:uuid:2d7d3863-2be6-47bb-9308-76ae64656d07>
|
CC-MAIN-2023-14
|
https://www.open.edu/openlearn/mod/oucontent/view.php?id=103469&extra=longdesc_idm120
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00165.warc.gz
|
en
| 0.921714
| 132
| 3.265625
| 3
|
Pregnant women who exercise are less likely to suffer from back pain compared to those who don’t, according to new research. A study Norway found that pregnant women who engaged in physical activity at least three times a week were less likely to report pelvic girdle pain, lower back pain, and depression. These results could indicate an association between exercising while pregnant and lower prevalence of these common health problems in pregnancy.
Exercise therapy is often recommended as a treatment option for pelvic pain, back pain, and other aches associated with pregnancy. However, little is known about how likely pregnant women are to follow the exercise therapy routine recommended by their doctor.
To understand the influence of exercise habits on pregnant women, researchers conducted a study on the exercise routines of 3482 pregnant participants. Data were collected by a questionnaire in pregnancy weeks 17-21, during week 32, and through an electronic journal kept after the birth.
Just 14.5% of respondents said that they followed the recommended exercise level (at least 3 times per week, exercising for 20 minutes at moderate intensity). A third of the participants reported exercising less than once a week mid-pregnancy. The authors concluded that few Norwegian women follow exercise guidelines in mid-pregnancy.
Women may be more motivated to stay active if they knew the benefits of physical activity for preventing muscoskeletal disorders in pregnancy. Previous studies have shown both exercise and chiropractic care to be effective natural approaches to pelvic and low-back pain during pregnancy. Many chiropractors provide their pregnant patients with exercise recommendations, utilizing both natural therapies to receive maximum benefit.
Gjestland K, Bø K, Mari Owe K, and Eberhard-Gran M.Do pregnant women follow exercise guidelines? Prevalence data among 3482 women, and prediction of low-back pain, pelvic girdle pain and depression. British Journal of Sports Medicine 2012; doi:10.1136/bjsports-2012-091344.
|
<urn:uuid:b862247b-be3b-419a-abba-206b20ef5b11>
|
CC-MAIN-2023-14
|
https://www.siegelchiro.net/article/exercise-reduces-risk-of-back-pain-in-pregnancy
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948673.1/warc/CC-MAIN-20230327154814-20230327184814-00165.warc.gz
|
en
| 0.952767
| 408
| 2.609375
| 3
|
Home › Causes Of Forgiveness › Second Cause
The second cause of forgiveness is repenting from sins even if they reach the extremities of the clouds. It was said, "Until there is no end in sight."
In another narration,
"If you committed errors until they reached from the skies to the Earth and sought the forgiveness of Allah; he would forgive you." [Tirmidhi, Ahmad and Ad-Darimi]
Forgiveness (Istighfar) is seeking absolution. Absolution from the evil of the sins with its secrets. Seeking forgiveness is mentioned many times in the Quran. Sometimes it is commanded.
Like the speech of the Exalted,
"Repent to Allah; Allah is forgiving and merciful." [Quran, 73:20]
"Repent you your Lord and return to him." [Quran, 11:3]
At times they are praised.
"Those who seek forgiveness in the night." [Quran, 3:17]
"And those who, when they do an evil thing or wrong themselves, remember Allah and plead forgiveness for their sins; who forgives sins except Allah?" [Quran, 3:135]
At times it is mentioned that Allah (the Exalted) forgives whoever seeks his forgiveness.
"Whoever does evil or wrongs their soul, then seeks the pardon of Allah, will find Allah Forgiving and Merciful." [Quran, 4:110]
Often, forgiveness (Istighfar) is compared and mentioned to repentance (tawbah). So forgiveness is, in its time, is expressed by seeking forgiveness with the tongue.
Repentance (tawbah) is expressed by uprooting the sins from the heart and limbs. Sometimes separate from forgiveness and (other times) systematic upon forgiveness as mentioned in Hadith etc.
They have even said that seeking forgiveness is combined with repentance.
It was stated that the texts of repentance are absolute unique connected to what we mentioned in the Quranic passage in The Family of Imran (surah three) without insistence.
As Allah (the Exalted) has promised forgiveness for whoever seeks forgiveness; for his sins and for whoever does not persist upon his action. The texts bear absoluteness about forgiveness and it is all in this condition.
Based on the speech, "O Allah, Forgive me," seeking forgiveness from him whilst supplicating. So its ruling is the ruling of all supplications, if Allah (the Exalted) wills he responds and forgives the requester. Especially if his heart is broken by his sins or turns in a moment that supplications are responded; just before daybreak and after the five daily prayers.
It is narrated that Luqman said to his son,
"O my son, habituate your tongue (to say) O Allah forgive me as Allah has moments in which the asker is not rejected." [Tirmidhi]
Al-Hassan al-Basri said,
"Seek forgiveness in your homes, your tables, your paths, in the markets, in your gatherings and wherever you are as you do not know when the forgiveness will descent."
Ibn Abu Dunya reports in his book Good Opinion a hadith from Abu Hurayrah, raised report,
"Amongst us was a man reclining and if he looked at the skies and to the heavens he (would) say, "I know that you have a Lord who created; O Allah forgive me." Then he is forgiven."
Muwariq said, "There is a man who does wrong actions until the night; then gathers soil and throws himself upon it and says, "Lord forgive my sins." Then he said, "Truly he knows that he has a Lord who forgives and punishes; so he is forgiven."
Mughith Ibn Sami said, "Amongst us was a despicable man who said one day, "O Allah, your forgiveness. O Allah, your forgiveness." Then he died and he was forgiven." [Hind in Az-Zuhd and Abu Na’yim in Al-Hilyah]
This is testified to in the authentic collections on the authority of Abu Hurayrah (may Allah be pleased with him) that the Prophet (may Allah bestow peace and blessings upon him) said,
"A servant commits a sin then says, "Lord, I have committed sins forgive me!" Then Allah (the Exalted) says, "The servant knows that there is a Lord who forgives sins and brings them forth and admonishes by them; I have forgiven my servant." Then he remains as Allah wills and then commits another sin; then mentions as he did the first time, He does it for a second and third time." [Bukhari & Muslim]
In a narration from Muslim he says about the third time,
"I have forgiven my servant so let him do as he wants." [Muslim]
Meaning as long as he continues, in this state, seeking forgiveness whenever he commits any sin. Outwardly the meaning of seeking forgiveness is combined by not repeating (the action).
Accordingly this narration is reported from Abu Bakr the Truthful (may Allah be pleased with him) that the Prophet (may Allah bestow peace and blessings upon him) said,
"There is no sin upon someone who seeks forgiveness even if he repeats seventy times a day." [Abu Dawud & Tirmidhi]
Seeking forgiveness is by the tongue with insistence of the heart upon the sin; it is the base supplication. Allah (the Exalted) can answer if he wishes or refuse. This insistence prevents a response.
In Al-Musnad there is a hadith from Abdullah Ibn Umar (may Allah be pleased with him) who said,
"Woe betide those who insist over what they do (sins) and they know." [Ahmad]
Ibn Abi Dunya (may Allah show him mercy) reports a hadith from Ibn Abbas (may Allah be pleased with them),
"The repenter from his sin is like he who is without sin. The seeker of forgiveness from sin whilst he is performing it, mocks his Lord." [Baihaqi reported similar]
Al-Dahik said, "Three people have no response," he mentioned two of them. "The aroused man who commits illegal fornication thus fulfilling his desire and says, "Forgive me and what I do to so and so." The Lord says, "Move from her and I shall forgive you. As long as you are with her I shall not forgive you." A man who takes the wealth of a people and when he sees them says, "Lord forgive me of what I have consumed from so and so." The Exalted replies, "Return it to them and I shall forgive you. As long as you have it I shall not forgive you."
The words, "I seek forgiveness from Allah (Astaghfriullah)." Means I seek his forgiveness or similar to the adage, "O Allah, forgive me."
So seeking correct forgiveness necessitates the miracle (being forgiven) and that does not occur without insistence similar to Allah (the Exalted) praising his people and promising them forgiveness.
One of the Gnostics said, "Whoever does not get the fruit of his forgiveness and sound repentance; has lied when he sought forgiveness."
One of them said, "Our seeking forgiveness for this; requires forgiveness to be sought for frequently."
One of them said, "Whoever seeks forgiveness from Allah; began with virtue by taking its meaning; how I hope for a response to the supplication when I am spoiled by sins; so Allah withdraws."
The virtue of seeking forgiveness is not connected to leaving insistence; it is, in its time, hope of sincere repentance if this is articulated on the tongue, "Forgive me Allah." If this is not extrapolated from the heart then it is supplication to Allah (the Exalted) for forgiveness as if he would say, "O' Allah, forgive me." This is best and it hoped that a response (is forthcoming).
As for whoever repented untruthfully it means that he did not repent as some people believe and this is the truth; as repentance does not occur without insistence.
If he says, I seek the forgiveness of Allah (the Exalted) and I repent to him then he has two states; one is that his heart is upon wrongdoing then he is a liar when he says, "I repent to him." Because he is not repenting then it is not permissible to tell himself that he is repenting when he is not! The second is that wrongdoing is uprooted from his heart.
The people differ in the permissibility of saying, 'I repent to him'; so a group of predecessors dislike it and this is the opinion of Abu Hanifa narrated by At-Tahawi.
Ar-Rabia Ibn Khathim said, "When he says, I repent to him, he lies and sins; rather he should say, "O Allah, I seek your forgiveness; turn to me." This is for whoever does not articulate with his heart and this is a similar state.
Muhammad Ibn Sawq spoke about seeking forgiveness, "I seek the forgiveness of Allah the Greatest who there is no deity other than He; the Ever living, the Self subsistence and I request sincere repentance."
Hudhayfa narrates that, "He is taken into account for the sins that he sought forgiveness for and repeated."
Mutraf heard a man say, "I seek the forgiveness of Allah and repent to him." So he corrected him, "Perhaps it was better that you did not." (Say that).
This is clear indication that it is disliked to say 'I repent to you' because sincere repentance is to never return to that sin, ever. So if he returns then he has lied when he said, 'I repent to you.'
Similarly, Muhammad Ibn Ka'b Al-Qarzi was asked about the one who made an agreement with Allah (the Exalted) never to return to the wrongdoing ever. He said, "Who is a greater sinner than he? To swear to Allah not to implement his decree!" Abu Faraj Ibn Al-Jawzi went back on his opinion because of this.
Sufyan is narrated to have said something similar and the majority of scholars accept the permissibility of the sinner saying 'I repent to Allah' as the slave swears to his Lord to never return to the sin and when he resolute on this; it became necessary.
Therefore he said,
"He does not cease to forgive even if they return to the sin seventy times a day." [Abu Dawud & Tirmidhi]
About the returner to sin He said,
"I have forgiven my servant so let him do as he wishes." [Muslim]
In a hadith about the expiration of a gathering,
"I seek your penance, O Allah and I seek your repentance." [Ahmad, Abu Dawud & Tirmidhi]
After a thief had his hand severed, the Prophet (may Allah bestow peace and blessings upon him) advised him to say,
"I seek the forgiveness of Allah and repent to him." He said, "I seek the forgiveness of Allah and repent to him." Then he said, "O Allah, forgive him." [Abu Dawood, Imam Ahmed, Ad-Darami, Ibn Majah, An-Nisa’i]
The Salaf used to love to gather and excessively say, "I seek the forgiveness of Allah and turn to him."
It was narrated that Umar (may Allah be pleased with him) heard a man say,
"I seek forgiveness from Allah and turn to him." He responded, "O'Crazy one, say: repentance is from he, himself, who does not possess the ability to harm or benefit oneself nor cause death, life or resurrection."
Al-'Awzai (may Allah be pleased with him) was asked about seeking forgiveness by saying, "I seek forgiveness from Allah the greatest who there is no deity except him; he is the ever living and I repent to him." He replied, "This is good but he should say, "I seek Allah's forgiveness until his forgiveness is complete."
|
<urn:uuid:e825da12-982c-46a1-9745-14ec2b2d3731>
|
CC-MAIN-2023-14
|
https://balagha.net/causes-of-forgiveness/second-cause
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948900.50/warc/CC-MAIN-20230328232645-20230329022645-00165.warc.gz
|
en
| 0.97197
| 2,571
| 2.9375
| 3
|
Foot related problems have increased. This is inspite of the fact that “Hi-Tech engineering” has been introduced into today’s athletic or casual shoes. The reason for this is that the footwear industry is going in the wrong direction. It is moving away from a concept that is natural for human beings: HUMANS WERE DESIGNED TO WALK AND RUN BAREFOOT!
In children’s footwear, the situation is even worse. Practically all manufacturers make shoe designs which are downsized adult models. The sole is extremely rigid, and the heel might be 2 cm thick. (In terms of an adult size it means a child is constantly wearing a 5 cm heel). This is harmful for the growing feet and very unnatural.
Feelmax provides solutions for the foot in natural way. The result is: less pain, fewer injuries and greater comfort. Simply put, Feelmax will make the feet feel better!
At birth the bones in our feet are only partially developed. Over the years up to age fourteen, many of the bones fuse together to form the 26 bones found in the adult foot. The bones continue to grow up to age 18. Many foot problems that adults develop, start at an early age and are due to inadequate shoes.
Almost everyone will suffer some kind of foot-related pain or problem during his or her lifetime. We are born without shoes: walking or running barefoot is the natural way to move.
70% of our brain’s information for movement comes from the 200,000 nerve endings located in the soles of the feet. The more one can feel the ground, the greater the body’s control of movement. Going barefoot gives us a sensory feedback, which in turn helps us maintain our equilibrium. When the feedback system is covered by a thick padding and modified as with conventional footwear, our brain does not receive all of this detailed information.
For a period of approximately 4 million years, going barefoot was the only choice for humans and the foot evolved accordingly. Only some thin leather wraps were used for foot protection. Modern shoes have been used only for a few hundred years.
The concept of running shoes only appeared in the 70´s, and according to the latest studies has done more harm than good. Not a single study backs the fact that “high-tech” running shoes are really helping the athletes or normal walkers. The high heels, unnatural cushions, and toe-upwards design in these shoes, forces athletes to run in a way that is contrary to how Mother Nature designed humans millions of years ago. That unnatural running technique is now causing injuries. However, going barefoot – the healthy and natural way – does not produce revenues to the shoe giants. Now they are even introducing microprocessor-controlled heel pads into the running shoes, which is a new marketing strategy.
The foot is perfectly adapted to work without any kind of shoe. We only need shoes for protection against cuts, abrasions, frostbite and parasites.
Many back, joint or articulation related problems are actually the result of the wrong kind of footwear: The current “modern shoe design” changes the anatomy of the gait, resulting in higher impact forces, unnatural posture and over time, injuries.
Feelmax footwear is the closest thing to being barefoot. They are designed to permit the natural movement of the foot, and maximum feeling and contact for the sensory feedback system. Feelmax is designed to provide protection against cuts, abrasions, bruises, and bacteria or parasites. The product provides effective warmth and protection against frostbite and extreme heat. The toe box area is extra wide. This allows the toes to spread outwards in a natural way that mimics what the foot does when walking barefoot. The sole is flat, straight and soft resulting in a feeling as if the wearer were indeed barefoot. The sole is ultrathin for maximum ground feeling and flexibility. The feel is like wearing an ultrathin stocking, but of course it provides all the protection already mentioned.
Feelmax toesocks are the perfect complement to our barefoot concept. They permit the toes to separate, but without causing uncomfortable pressure or friction.
|
<urn:uuid:4ebf9a96-8e2e-4fff-ba52-c1d8e0c6a08f>
|
CC-MAIN-2023-14
|
https://feelmax.com/benefits/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948900.50/warc/CC-MAIN-20230328232645-20230329022645-00165.warc.gz
|
en
| 0.94797
| 859
| 2.578125
| 3
|
Democratic People's Republic of Korea
Head of state Kim Jong-un
Head of government Choe Yong-rim
Systematic human rights violations remained widespread. The food crisis persisted, with chronic and widespread malnutrition still a public health concern. Millions faced continued food insecurity and remained dependent on food aid. Despite reports that one political prison camp had closed, tens of thousands remained detained in such camps where they were subjected to sustained violations of their human rights, including extrajudicial executions, forced labour and torture and other ill-treatment. There were reports of executions, including of those purged in the leadership transition. Severe restrictions on the rights to freedom of expression, association, opinion and assembly persisted. The media remained under strict control.
(Democratic People's Republic of)
Kim Jong-un, North Korea's Supreme Leader following the death of his father in 2011 was elected to the newly created position of First Secretary of the Workers' Party of Korea on 11 April and promoted to Marshal of the Korean People's Army in July. The Democratic People's Republic of Korea (North Korea) successfully launched an Unha-3 rocket on 12 December, sending a satellite into space, after a number of failed attempts.
State media announced a prisoner amnesty in January, due to begin 1 February, marking the anniversary of the birth of the late North Korean leader Kim Jong-il; however, no information about the releases was made public.
In July, floods resulted in severe damage to housing, infrastructure and public buildings. According to government figures, at least 212,200 people were left homeless and 169 people were killed.
Despite reports that harvests had improved for a second year, food insecurity remained widespread. In November, the UN's Food and Agriculture Organization and World Food Programme Crop and Food Security Mission report stated that although household food consumption had improved, “serious gaps remained between recommended and actual nutrient intake. The predominant share of the population remains food insecure”. Chronic malnutrition continued to plague most people, with several reportedly dying of starvation.
Arbitrary arrests and detentions
Hundreds of thousands remained arbitrarily detained, or held for indeterminate periods without charge or trial in political prison camps and other detention facilities. Detainees faced systematic and sustained violations of their human rights, including extrajudicial executions and long hours of forced hard labour with no rest days. Torture and other ill-treatment appeared to be widespread in prison camps. Many detainees died due to forced labour in perilous conditions, including inadequate access to food or medical care.
In October, there were reports that Political Prison Camp 22 in Hoeryong, North Hamkyung province, had been closed. It was not clear when the prison camp closed and where the prisoners, estimated at between 20,000 and 50,000, had been transferred. The camp, one of five of its kind, was a total control zone where inmates were held for life, without reprieve. Many of those held in political prison camps had not committed any crime, but were related to those deemed hostile to the regime and were held as a form of collective punishment.
- In response to a query from the UN Working Group on Arbitrary Detention, the government stated in April that Shin Sook-ja, last known to have been held with her two daughters in Political Prisoner Camp 15 at Yodok, had died of complications linked to hepatitis. They also claimed that her daughters did not want any contact with their father Oh Kil-nam, now based in the Republic of Korea. This information could not be verified and it was not clear when Shin Sook-ja died or where. The fate and whereabouts of her two daughters remained unknown.
- In December, North Korea announced that it had detained Kenneth Bae, a US national of Korean origin, on charges of committing “hostile acts against the Republic”. Kenneth Bae ran a travel company that specialized in taking tourists and prospective investors to North Korea. He had entered the country on 3 November and was reportedly detained after security officials found he had a computer hard disk that they believed contained delicate information about the country.
The authorities continued to refuse to acknowledge cases where North Korean agents carried out abductions on foreign soil of people from countries including Japan, Lebanon, the Republic of Korea and Thailand.
- In July, Fujita Takashi attended a meeting of the UN's Working Group on Enforced or Involuntary Disappearances where he raised the case of his brother Susumu, feared abducted by North Korea from Japan in February 1976.
Freedom of expression
The authorities continued to impose severe restrictions on freedoms of expression, opinion and assembly. Strict media controls were believed to have been imposed to prevent challenges to the government during its period of transition. There appeared to be no independent civil society organizations or independent political parties.
Freedom of movement
The authorities reportedly further tightened controls along the border with China and threatened individuals crossing it without permission with severe punishment on their return.
- In February, 31 people who left North Korea without permission were detained by Chinese authorities. According to news reports, in March, China forcibly returned some members of this group back to North Korea where they risked detention, torture and other ill-treatment, forced labour and death.
Executions of political opponents were reported, but this information could not be verified.
- According to unconfirmed reports received in October, Army Minister Kim Chol was executed in early 2012 for drunkenness and inappropriate behaviour during the mourning period of former leader Kim Jong-il.
In October, the UN High Commissioner for Human Rights stated that the “use of political prison camps, frequent public executions and severe food shortages, coupled with the extreme difficulty of gaining access, make DPRK [North Korea] singularly problematic.” For the first time, both the UN Human Rights Council and the Third Committee of the UN General Assembly passed resolutions without a vote in March and November respectively. Both expressed serious concerns at continuing reports of systematic, widespread and grave violations of civil, political, economic, social and cultural rights in North Korea.
|
<urn:uuid:0f439c8b-17b8-4191-bba9-5304dd5302f7>
|
CC-MAIN-2023-14
|
https://www.amnestyusa.org/reports/annual-report-north-korea-2013/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948900.50/warc/CC-MAIN-20230328232645-20230329022645-00165.warc.gz
|
en
| 0.975539
| 1,246
| 2.609375
| 3
|
The science of yoga is not a mystery, and it certainly isn’t a set of asanas. This ancient practice is more than just a series of asanas; it is a way of life. But how do you know what it really is? This article reveals some of the secrets behind the practice. Read on for more information! And don’t forget to share this article with friends and family!
It’s an art and a science
The debate over whether yoga is an art or a science has been raging for ages. Ultimately, the practice is both. As a discipline, yoga is a method of exploring the body, mind, and spirit in pursuit of unification with the universe. However, the practice involves immense dedication, an alliance between a teacher and a student, and a dedication to the discipline that goes beyond a mere physical exercise.
Practicing yoga is a systematic process that produces a number of benefits, both physically and mentally. In a nutshell, yoga helps one discover his or her own inner-being and become one with universal consciousness. It’s not just about the body – yoga is about uniting your body, mind, and soul. There are many benefits to yoga, but the most important are a combination of physical exercise, mental discipline, and spiritual practice.
It’s a way of life
Throughout the centuries, yoga has been a popular practice among the world’s religions, but it’s not a simple physical exercise. In fact, yoga is a philosophy of life, an enduring commitment to oneself and the world. Yoga is an ancient Indian science that helps us connect to our deepest nature and develop our fullest potential. To be able to practice yoga, you need to be physically fit, but it’s not all about exercising.
The practice of yoga brings amazing changes to one’s physical and mental states. Not only does yoga help you become a healthier and happier individual, but it also encourages you to let go of attachment and focus on your duties. Practicing yoga allows you to discover your true self, explore your inner self, and learn about your connection to supreme consciousness. When you live a yogic lifestyle, your meaning in life changes drastically.
It’s not just a set of asanas
Many people believe that yoga is just a series of asanas. However, that is not entirely true. The benefits of yoga go much deeper than physical postures. A yoga posture can elevate a person’s consciousness, which can benefit a wide variety of areas of his or her life. Yoga poses are often called asanas because they resemble different living creatures. These animals may be cows, trees, or even sages. Some asanas are named after body parts and directions. The name prasarita means stretch, while pada refers to the foot. For example, ekapadasana is commonly known as standing splits.
Aside from the physical benefits of asanas, yoga also promotes a deeper connection to the self and others. The physical forms of yoga are the easiest to learn and master because they involve working with the physical body. The mind, however, can be trickier and can make all sorts of things. It can even dump you at the end of the day! It is for this reason that yoga is so much more than a series of asanas.
It’s an ancient practice
The history of yoga is divided into four periods: pre-Vedic, Classical, and Modern. It is believed that yoga was first practiced in northern India 5,000 years ago. The earliest theory of yoga is found in the Rig Veda, one of the four major vedas, and contains more than 1,000 hymns and 200 mantras. It is believed that the first yogic texts were written during the Vedic era, and it was the priests of this civilization who developed it. The “Upanishads” are a collection of 200 scriptures describing the practice of yoga.
Yoga is an ancient practice that focuses on breathing, flexibility, and strength. It is a holistic approach that helps individuals achieve balance in all dimensions of their life. The eight limbs of yoga incorporate both physical and metaphysical practices. They involve breath control, concentration, and meditation. The goal is to achieve total balance and harmony within the body and mind. Yoga helps you feel enlightened, calm, and relaxed, thereby promoting healing.
It’s not just a set of poses
The practice of yoga involves physical exercises and meditation that can be practiced anywhere. Although yoga does involve physical work, it is not designed to be difficult for anyone. Many people are intimidated by the idea of yoga due to the physical work involved. But there are many ways to tailor yoga to fit your body. In addition, you don’t need to be able to bend and stretch to benefit from the practice. If you’re a beginner, you’ll be surprised to learn that there are many ways to tailor the practice to fit your needs.
The physical exercises involved in yoga focus on strengthening and stretching specific muscles. This reduces the possibility of injury and increases concentration. Focused breathing helps strengthen the mind-body connection and improves concentration. Some styles of yoga are more vigorous and require the practice of breathing techniques. While you’re exercising, remember that it’s not about the way you look, but the quality of your life. When you feel relaxed, you’re less likely to suffer from pain.
Yoga Best Sellers on Amazon
Did you miss our previous article…
|
<urn:uuid:140d8fe6-1e03-494b-bd1d-bcf3dd8838db>
|
CC-MAIN-2023-14
|
https://yogaclassesnear.me/the-science-of-yoga/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949107.48/warc/CC-MAIN-20230330070451-20230330100451-00165.warc.gz
|
en
| 0.952795
| 1,166
| 2.515625
| 3
|
How Do I Write A Docker File?
What is docker file and how it works?A Dockerfile is a text document that contains all the commands a user might get in touch with the command line to assemble an image. Utilizing docker develop users can produce an automated develop that carries out a number of command-line guidelines in succession.
Is Docker image a file?A Docker image is a file utilized to execute code in a Docker container. Docker images serve as a set of guidelines to develop a Docker container, like a template. Docker images likewise function as the starting point when using Docker. An image is equivalent to a photo in virtual machine (VM) environments.
What is Kubernetes vs Docker?An essential difference in between Kubernetes and Docker is that Kubernetes is suggested to stumble upon a cluster while Docker operates on a single node. Kubernetes is more substantial than Docker Swarm and is suggested to collaborate clusters of nodes at scale in production in an effective way.
How Do I Write A Docker File?– Related Questions
What is Docker Build command?
The docker build command builds Docker images from a Dockerfile and a “context”. A construct’s context is the set of files found in the specified PATH or URL. The develop process can describe any of the files in the context. For example, your develop can use a COPY instruction to reference a file in the context.
What are docker layers?
Basically, a layer, or image layer is a modification on an image, or an intermediate image. Every command you define (FROM, RUN, COPY, and so on) in your Dockerfile triggers the previous image to change, hence developing a brand-new layer.
Is docker a VM?
Docker is container based technology and containers are just user area of the operating system. In Docker, the containers running share the host OS kernel. A Virtual Machine, on the other hand, is not based upon container technology. They are comprised of user area plus kernel area of an operating system.
Where are my docker images?
The docker images, they are saved inside the docker directory:/ var/lib/docker/ images are stored there.
What is Kubernetes in simple words?
Kubernetes is a portable, extensible, open-source platform for handling containerized work and services, that facilitates both declarative configuration and automation. Kubernetes services, assistance, and tools are extensively offered. The name Kubernetes stems from Greek, indicating helmsman or pilot.
Is Kubernetes needed for Docker?
One isn’t an alternative to the other. Rather the contrary; Kubernetes can run without Docker and Docker can operate without Kubernetes. Kubernetes can (and does) benefit considerably from Docker and vice versa. Docker is what enables us to run, develop and handle containers on a single os.
What is Docker and Kubernetes in basic words?
Docker is a platform and tool for building, dispersing, and running Docker containers. Kubernetes is a container orchestration system for Docker containers that is more comprehensive than Docker Swarm and is meant to coordinate clusters of nodes at scale in production in an efficient way.
What OS can run Docker?
The Docker platform runs natively on Linux (on x86-64, ARM and many other CPU architectures) and on Windows (x86-64). Docker Inc. develops items that let you construct and run containers on Linux, Windows and macOS.
What are develop commands?
The construct command is used to build an image from a Dockerfile, however the command has to be run in the very same directory as the Dockerfile. When an image is developed, the commands specified in the Dockerfile are performed. The os is installed in addition to all the packages needed in the Docker container.
What is entrypoint Docker?
ENTRYPOINT instruction permits you to set up a container that will run as an executable. It looks comparable to CMD, because it likewise allows you to specify a command with criteria. The difference is ENTRYPOINT command and parameters are not overlooked when Docker container runs with command line parameters.
What can I finish with docker image?
A Docker image is a read-only design template that contains a set of instructions for developing a container that can work on the Docker platform. It offers a practical method to package up applications and preconfigured server environments, which you can utilize for your own private usage or share openly with other Docker users.
How do I know if docker is running?
The operating-system independent way to check whether Docker is running is to ask Docker, using the docker info command. You can likewise use running system energies, such as sudo systemctl is-active docker or sudo status docker or sudo service docker status, or examining the service status using Windows utilities.
Should I run docker as root?
Most containerized processes are application services and for that reason don’t require root gain access to. While Docker requires root to run, containers themselves do not. Well written, safe and multiple-use Docker images need to not anticipate to be run as root and ought to supply a foreseeable and simple method to limit gain access to.
Does docker run develop the image?
Docker images are comprised of layers. They’re produced based on the output generated from each command. Given that the file bundle. json does not alter typically as our source code, we don’t want to keep restoring node_modules each time we run Docker build.
What command will begin a docker container?
The docker run command initially produces a writeable container layer over the defined image, and after that starts it utilizing the defined command. That is, docker run is equivalent to the API/ containers/create then/ containers/(id)/ start.
Where do I put Docker commands?
By default, the Docker command line stores its setup files in a directory called. docker within your $HOME directory site. Docker handles most of the files in the setup directory site and you need to not modify them.
What Docker means?
Docker is an open source software platform to create, deploy and manage virtualized application containers on a common operating system (OS), with an environment of allied tools. was formed to support a business edition of container management software application and be the principal sponsor of an open source variation.
What is the flag in Docker?
What do those flags imply? The -it flag informs docker that it need to open an interactive container circumstances. The– rm flag informs docker that the container need to immediately be removed after we close docker. The -p flag specifies which port we want to provide for docker.
What is Docker example?
Docker is a platform for product packaging, deploying, and running applications. Docker applications run in containers that can be used on any system: a developer’s laptop computer, systems on properties, or in the cloud. Containerization is an innovation that’s been around for a long period of time, however it’s seen new life with Docker.
What is the distinction in between docker image and layer?
Each layer is an image itself, just one without a human-assigned tag. Each layer shops the modifications compared to the image it’s based on. An image can consist of a single layer (that’s typically the case when the squash command was used). Each direction in a Dockerfile results in a layer.
Is Docker like Virtualenv?
Python virtual environment will “containerize” only Python runtime i.e. python interpreter and python libraries whereas Docker isolates the whole system (the entire file-system, all user-space libraries, network user interfaces). Therefore Docker is much closer to a Virtual Machine than virtual environment.
|
<urn:uuid:405eeac2-851d-4fc4-ae4b-c0b6b00a9938>
|
CC-MAIN-2023-14
|
https://awisefuture.com/how-do-i-write-a-docker-file/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00165.warc.gz
|
en
| 0.878677
| 1,621
| 2.578125
| 3
|
Artificial Hippocampus, the Borg Hive Mind, and Other Neurological Endeavors
Many of us know about ‘Borg Hive Mind’ from TV programs where the characters are linked through brain-to-brain or computer-to-brain interactions. However, this is more than a science fiction fantasy. The idea was contemplated seriously in the 2002 National Science Foundation report, Converging Technologies for Improving Human Performance: Nanotechnology, Biotechnology, Information Technology and Cognitive Science. ‘Techlepathy‘ is the word coined, referring to the communication of information directly from one mind to another (i.e. telepathy) with the assistance of technology.
Many research activities focus on neuro-engineering and the cognitive sciences. Many neuroscientists and bioengineers now work on:
Journals exist for all of these activities — including the Human Brain Mappingjournal. Some envision a Human Cognome Project. James Albus, a senior fellow and founder of the Intelligent Systems Division of the National Institute of Standards and Technology believes the era of ‘engineering the mind‘ is here. He has proposed a national program for developing a scientific theory of the mind.
Neuromorphic engineering, Wikipedia says, “is a new interdisciplinary discipline that takes inspiration from biology, physics, mathematics, computer science and engineering to design artificial neural systems, such as vision systems, head-eye systems, auditory processors, and autonomous robots, whose physical architecture and design principles are based on those of biological nervous systems.”
There are many examples.
Researchers from Harvard University have linked nanowire field-effect transistors to neurons. Three applications are envisioned: hybrid biological/electronic devices, interfaces to neural prosthetics, and the capture of high-resolution information about electrical signals in the brain. Research is advancing in four areas: neuronal networks, interfaces between the brain and external neural prosthetics, real-time cellular assays, and hybrid circuits that couple digital nanoelectronic and biological computing components.
Numenta, a company formed in 2005, states on its webpage that it “is developing a new type of computer memory system modelled after the human neocortex.”
Kwabena Boahen, an associate professor of bioengineering at Stanford University, has developed Neurogrid, “a specialized hardware platform that will enable the cortex’s inner workings to be simulated in detail — something outside the reach of even the fastest supercomputers.” He is also working on a silicon retina and a silicon chip that emulates the way the juvenile brain wires itself up.
Researchers at the University of Washington are working on an implantable electronic chip that may help to establish new nerve connections in the part of the brain that controls movement.
The Blue Brain project — a collaboration of IBM and the Ecole Polytechnique Federale de Lausanne, in Lausanne, Switzerland – will create a detailed model of the circuitry in the neocortex.
A DNA switch ’nanoactuator‘ has been developed by Dr. Keith Firman at the University of Portsmouth and other European researchers, which can interface living organisms with computers.
Kevin Warwick had an RFID transmitter (a future column will deal with RFID chips) implanted beneath his skin in 1998, which allowed him to control doors, lights, heaters, and other computer-controlled devices in his proximity. In anotherexperiment, he and his wife Irena each had electrodes surgically implanted in their arms. The electrodes were linked by radio signals to a computer which created a direct link between their nervous systems. Kevin’s wife felt when he moved his arm.
In his book I, Cyborg, Kevin Warwick imagines that 50 years from now most human brains will be linked electronically through a global computer network.
St. Joseph’s Hospital in the United States has implanted neurostimulators (deep brain stimulators) using nanowires to connect a stimulating device to brain. A pacemaker-like device is implanted in the chest, and flexible wires are implanted in the brain. Electrical impulses sent from the ‘pacemaker’ to the brain are used to treat Parkinson’s, migraine headaches and chronic pain, depression, obsessive-compulsive disorder, improve the mobility of stroke victims, and curb cravings in drug addicts.
In 2003/2004 a variety of publications (see links below) reported on the efforts of professor Theodore W. Berger, director of the Center for Neural Engineering at the University of Southern California, and his colleagues, to develop the world’s firstbrain prosthesis – an ‘artificial hippocampus’ which is supposed to act as a memory bank. These publications highlighted in particular the use of such implants for Alzheimer’s patients.
The research program is proceeding in four stages: (1) tests on slices of rat brains kept alive in cerebrospinal fluid… reported as successful in 2004; (2) tests on live rats which are to take place within three years; (3) tests on live monkeys; and (4) tests on humans — very likely on Alzheimer’s patients first.
The Choice is Yours
If these advancements come to pass, they will create many ethical, legal, privacy and social issues. For the artificial hippocampus we should ask: would brain implants force some people to remember things they would rather forget? Could someone manipulate our memory? What would be the consequence of uploading information (see my education column)? Will we still have control over what we remember? Could we be forced to remember something over and over? If we can communicate with each other through a computer what will be the consequence of a Global Brain?
It is important that people become more involved in the governance of neuro-engineering and cognitive science projects. We should not neglect these areas because we perceive them to be science fiction. We also need to look beyond the outlined ‘medical applications.’ If the artificial hippocampus works, it will likely be used for more than dealing with diseases.
I will cover brain-machine interfaces, neuro-pharmaceutical-based ‘cognitive enhancement,’ and neuroethics and the ethics of artificial intelligence in future columns.
Gregor Wolbring is a biochemist, bioethicist, science and technology ethicist, disability/vari-ability studies scholar, and health policy and science and technology studies researcher at the University of Calgary. He is a member of the Center for Nanotechnology and Society at Arizona State University; Member CAC/ISO – Canadian Advisory Committees for the International Organization for Standardization section TC229 Nanotechnologies; Member of the editorial team for the Nanotechnology for Development portal of the Development Gateway Foundation; Chair of the Bioethics Taskforce of Disabled People’s International; and Member of the Executive of the Canadian Commission for UNESCO. He publishes the Bioethics, Culture and Disability website, moderates a weblog forthe International Network for Social Research on Diasbility, and authors a weblogon NBICS and its social implications.
|
<urn:uuid:3975978f-b394-4664-b03d-251f4d7f8e73>
|
CC-MAIN-2023-14
|
https://nanobrainimplant.com/tag/neurological/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00165.warc.gz
|
en
| 0.919264
| 1,456
| 3.328125
| 3
|
Your Brain Now Processes a Smiley Face as a Real Smile
Perhaps eventually we’ll respond to emoji as we would to real dogs, cats and night skies
When you see a colon and a parentheses, you know exactly what it means. The smiley face has become ubiquitous online, and psychologists have even looked into the ways it’s used in emails. Now, researchers say that not only do we know what the little :) means, but we actually perceive it the same way we perceive an actual human face.
Researchers at Australia's Flinders University showed twenty participants smiley faces, along with real faces and strings of symbols that shouldn’t look like faces, all while recording the signals in the region of the brain that’s primarily activated when we see faces. This signal, called the N170 event-related potential, is the highest when people see actual faces, but was also high when people saw the standard emoticon :). “This indicates that when upright, emoticons are processed in occipitotemporal sites similarly to faces due to their familiar configuration,” the researchers write.
Interestingly, when you switched up the characters that make up the smiley, the signal went away. So (-: didn’t trigger our facial recognition patterns, but :-) did. "If that sequence is reversed with opening parenthesis, hyphen, colon (-: , areas of the brain most readily involved in face perception aren't able to process the image as a face," lead researcher Owen Churches told ABC.
Owen thinks this is interesting because it shows that we can integrate a learned response and an innate one. We are naturally programmed to recognize human faces, but only through specific learning could we figure out that a colon and parentheses was supposed to be a face. "This is an entirely culturally-created neural response. It's really quite amazing,” Churches told ABC. “There is no innate neural response to emoticons that babies are born with. Before 1982 there would be no reason that ':-)' would activate face sensitive areas of the cortex but now it does because we've learnt that this represents a face.”
Perhaps eventually we’ll respond to emoji as we would to real dogs, cats and night skies.
|
<urn:uuid:feaec393-46eb-42bb-b98a-50db19d63f31>
|
CC-MAIN-2023-14
|
https://www.smithsonianmag.com/smart-news/your-brain-now-processes-smiley-face-real-smile-180949732/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00165.warc.gz
|
en
| 0.965664
| 463
| 3.140625
| 3
|
Dealing with the Unexpected | Virtual Learning
With the ongoing Russia-Ukraine conflict, Turkey, Syria earthquake, varied protests, political crisis, and the disrupted global value chains, several parts of the world seem to be on fire!
The effects of several global happenings are felt differently across all sections of society. But in this recovery phase of the global pandemic, students are one of the most impacted sections of all.
Even before the pandemic around 6.1% of the US student population dropped out of school. And by the year 2020, this figure dropped to 5.3%
Then came the challenging time of the pandemic, which further aggravated the learning losses and deepened the learning poverty (from 53% before the pandemic to 70% after it)
Any crisis in education has a sinister impact on students across the world. And despite several measures, our education system still struggles to recover these learning losses caused by varied unforeseen circumstances.
While the strategies adopted by the policymakers are in the process of dealing with these challenges, the need to adopt alternatives is equally essential to drive a more sustainable recovery.
The pandemic has already highlighted the advantages of online schooling. And most stakeholders have accepted it’s potential to combat catastrophic situations.
Let’s delve deeper to know how Virtual learning can help our students in dealing with the unexpected:
Enabling Educational Continuity
The global village continues to see disruptions in varied forms. And most of these create safety issues for students across all levels of formal education. In the past couple of years, our mainstream education system has explored a credible option to deliver instructions without the need to visit a physical campus. Distance learning, blended, hybrid or fully online schooling are some mediums that completely bring down/reduce the need to be a physical campus.
Virtual learning creates an environment which is perfect alternative for students to earn credits even if they fail to be a part of a traditional campus. As accredited online schools now offer virtual programs for the worldwide student population. Students from all parts of the world can now mitigate their learning losses with the help of this convenient option.
Ideal for Extraordinary Situations
For a very long time now, the world is surviving amidst extraordinary circumstances now. The long-term effects of the recession and the devastating impact of the pandemic have taken a toll on the financial stability of millions of households across the world. The United States Census Bureau disclosed some alarming figures about the median household income of their population (in 2021).
- As of 2020, the median household income decreased by around 2.9%, this is the worst since the year 2011.
- The median earnings of all types of workers decreased by 1.2%.
- The overall increase in the poverty rate between 2019-2020 was 1% (with a poverty rate of 11.4%).
These findings (financial conditions) are directly related to the educational attainment of the citizens. And the students in the low-income category tend to remain less educated than the higher-income category. The hardships created by these unforeseen happenings boil down to the lower and middle-income groups in most parts of the world. As a result, these sections of society need a more cost-effective and credible educational solution to stay within the mainstream system.
Supports Vulnerable Groups
Despite the right to education, our systems are not free from inequalities. We are battling the challenge of discrimination against vulnerable groups for decades now. And these issues continue to hamper our goals like inclusion and accessible education for all.
UNESCO identifies these vulnerable groups as refugees, migrants, differently-abled individuals, girls, etc.
It is proved that the utilization of resources for educational equality is a dominant factor that determines student performance. And the most effective tool to reduce educational inequality is virtual learning. In the present times, the world is looking for a sustainable solution to improve student learning outcomes by subsiding learning gaps. And technology is a great equalizer for students from both advantaged and adisadvantaged backgrounds. Online schooling reaches every nook and corner of the world that is connected to the internet. And the good news is that the smartphone penetration rate seems quite promising in the years to come.
Here’s a quick look at the smartphone penetration rates from 2022-25:
A virtual schooling platform operates through an internet connection. And resources/online content can be accessed through a compatible handset/device. Accredited online schools deliver instructions and conduct online classes through an online learning platform. A student can study 24/7/365 through this choice and manage to stay an active member of the mainstream education system without stepping out of his/her home.
All in all, this educational alternative is nurturing a healthy inclusive school culture by saving the at-risk student population within the regular educational system.
Virtual learning helps students thrive despite the Loss of a Caregiver
140,000 U. S children have lost their primary or secondary caregiver during the pandemic. Such unfortunate incidents shorten the student’s schooling span in many cases. And once again they are under the threat of dropping out of school. Orphanhood due to any reason is highly unexpected and life changing. However, the long-term impact of such happenings can be reduced with the right emergency action.
The post-pandemic future is highly dependent on more convenient choices like virtual education. This option not only brings down the need for parental support. In fact, it also helps students to study under the guidance of a trained teacher.
The negative effects of unforeseen life circumstances cannot be mitigated completely. But thanks to the blessing of new-age technology, unpredictable obstacles are no more a hindrance to a student’s academic journey. School education is now beyond the physical vicinity of a traditional school, making homeschooling, online schooling, and virtual learning possible for all students in the comforts of their homes.
It is rightly said that every dark cloud has a silver lining!
And Covid-19 has brought a ray of hope for millions of students by bringing the world close to Virtual learning. Fortunately, many of us have already experienced virtual schooling in the past couple of years. And the virtual space is now a perfect worry-free option for students beyond the harsh realities of their lives!
Thanks for Reading!
|
<urn:uuid:7a11f9e4-ec93-4adc-80f9-c36efbab3a62>
|
CC-MAIN-2023-14
|
https://validedu.com/dealing-with-the-unexpected-virtual-learning/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943625.81/warc/CC-MAIN-20230321033306-20230321063306-00365.warc.gz
|
en
| 0.945536
| 1,287
| 2.59375
| 3
|
Gravitational lensing occurs when light from a distant galaxy is bent by the gravitational pull of an intervening astronomical object. In this image assembled from multiple observations by the Hubble Space Telescope a relatively nearby galaxy cluster (MACSJ0138.0-2155) has lensed the galaxy (MRG-M0138) which is located 10 billion light-years from us.
Image Credit: NASA / ESA
The Earth is only 4.5 billion years old. It’s hard to wrap my mind around the fact that we are seeing light from a galaxy that is over twice as 9ld.
Pingback: Sorta Blogless Sunday Pinup » Pirate's Cove
|
<urn:uuid:b3908642-7070-4559-904e-95c5e0887d83>
|
CC-MAIN-2023-14
|
https://hogewash.com/2021/07/24/gravitational-lensing-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00365.warc.gz
|
en
| 0.913123
| 139
| 3.453125
| 3
|
5 Ways to Advance Your Child's Reading
A Parent's Guide to Raising Voracious Readers
by Sandra Lynn Robinov (aka AskSan); Contributing Writer
My daughter spends time during the summer months with her dad (something she's done since our divorce); and I always worry that she will lose what she's learned the past school year (and from me) while she's living it up with him. That is not to say I think he will "dumb her down" but...well, maybe its my Type A personality scooting to the front during the summer months; on top of just plain missing my little girl, of course.
This summer there were no worries. During many of our long (girl-talk) conversations I was treated to a good read (chapter book or short story) from my 7 year old genius. Proud mom? Without a doubt!
I am always amazed with how smart my Maggie is; and do credit all of her influences -- not just me -- however, I can absolutely take pride in how well she reads, her inflection and comprehension, and her ability to pronounce, define, and use big words; as well as small ones.
The following 5 tips do not even take much conscious thought on my part. At least at the time of implementation. As with most other things, I try to parent in a sensible way with respect to what I was taught as a child and what I learned as I got older.
With that in mind I would like to share what I consider five key ways for turning your child into a lover of the written word. With a healthy appetite for reading anyone can do anything they put their mind to.
5 Ways to Advance Your Child's Reading:
(1) Be a reader and share your love with your child: All kids like to copy what they see others doing and if your child sees you reading often, he or she will want to as well.
(2) Read to your child daily: I've been reading to Maggie since she was but a blob in my belly. Spend 10-15-20 minutes or more a day sharing a story with your child.
(3) Encourage your child to help you read the story you've chosen: Once your child is old enough to start recognizing certain words, let him or her become an active part of telling the story.
(4) Seek outside help (workbooks and/or tutoring): Don't be afraid to admit that you wish your child was a better reader. If the situation reaches a point where you need outside tutoring, there are plenty of ways to get it. Check out your local libraries, bookstores, and research on-line for great tools to help get your child to enjoy reading.
(5) Take time to hear a story and interact with your child: Once your child can read on his or her own, encourage private time -- for them to read on their own -- and time with them to hear their story. Help with big words -- pronouncing and defining, teach proper inflection (e.g., reading questions, character conversations, etc.), and make this a fun part of your day.
The Bottom Line?Again, the above is working for us and I am consistently amazed by my smart girl. I believe in nature and nurture when raising a child and this is one area where I can honestly say I had something to do with her reading success. Oh, and don't forget to praise your child when he or she blows you away with this awesome reading ability! Good luck raising voracious readers!!!
* Sandra Lynn Robinov is an expert reader and mother to a wonderful daughter who reads at two grade levels above her age.
Instant Download On Order
About the Book:
The FLOW-Key Parenting Book provides tips from Lyn Lomasi's practical method for parents to help their children F.L.O.W. and thrive. Focus on issues with love, expression, and your child's self-mastery. At the same time, be an authority that prepares your child with lessons that equip them for the real world.
The FLOW-Key Parenting method will help you learn how to connect with your children, teach them respect and discipline, raise them to be independent thinkers, and help you guide them to succeed on their self-chosen path.
FLOW-Key Parenting is a proven child and growth-focused method that has been put to use with all seven of my children, as well as with countless kids I've nannied over the years.
Find helpful tips for specific situations, reflective thoughts for all situations, fun activities to help your child grow, great activities to connect with your child, and more! Not only that, but learn how to put them into action easily and right away!
With this extensive eBook, you can help your child connect with you and the world around them in their own unique way, as well as learn to communicate with and respect all people in a positive and productive manner.
Lyn Lomasi is founder and owner of the Brand Shamans Content Community. Services include ordained soul therapy and healing ministry, business success coaching, business success services, handcrafted healing jewelry, ethereal and anointing oils, altar and spiritual supplies and services, handcrafted healing beauty products, and more!
Lyn is your brand healing, soul healing, marketing & content superhero to the rescue! While rescuing civilians from boring business practices and energy vampires, this awesomely crazy family conquers evil and creates change.
They live among tigers, dragons, mermaids, unicorns, and other fantastic energies, teaching others to claim their own power and do the same.
By supporting us, you support a dedicated parent, healer, and minority small business that donates to several causes. Profits from our all-inclusive store, Intent-sive Nature support these causes and our beautiful family!
HIRE OR SHOP WITH LYN | CONTACT LYN
|
<urn:uuid:7a5c03d0-2d8b-4cf6-8516-480eadc598ea>
|
CC-MAIN-2023-14
|
http://www.lifesuccessfully.com/flow-key-parenting/category/sandra-lynn-robinov
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00365.warc.gz
|
en
| 0.962305
| 1,261
| 2.625
| 3
|
27 Oct Nurture the Green November 2022: Week 2
Posted at 16:28h in Nurture the Green Movement 0 Comments
Healthy sitting posture
Good sitting posture is one easy way you can protect your health. Whether you’re in the driver’s seat or relaxing at home, you probably spend a lot of time sitting. Even though you are resting, your sitting posture impacts your physical health in many ways.
A poor sitting posture can cause everything from spine injuries to shoulder and neck pain to reduced blood flow, while a good sitting posture can help your body rest and recover from all the movement you do. For that reason, it’s important to be aware of your sitting posture.
Here are a few tips for healthy sitting posture:
- Sit with a straight back and shoulders: Sitting with a straight back and shoulders helps keep all of your muscles and bones in alignment without causing extra friction. Ideally, your back will be supported by the chair, giving you extra posture support.
- Put your feet flat on the floor: This will help you maintain good blood flow and reduce muscle strain that can occur when you cross your legs. Try to distribute your body weight evenly across your hips and have a small gap between the back of your knees and the chair.
- Keep your gaze forward: Craning your neck to look at something below, above or to your sides can cause neck pain. If you want to look at a phone, TV or computer for an extended period of time, try to position your chair in a place that allows you to view your device straight on.
- Take breaks from sitting: Whether you’re indulging in a Netflix binge or a long road trip, make sure to stand intermittently and stretch when you are sitting for a long period of time. If you start to feel stiff, walk around.
- How would you rate your current sitting posture?
- Have you ever injured yourself while sitting? What could you do to prevent that injury from happening again?
- What are some other things you can do to protect yourself from injury?
Sorry, the comment form is closed at this time.
|
<urn:uuid:347ec0be-cf42-4600-ad8c-0709fef2eb57>
|
CC-MAIN-2023-14
|
https://www.oningroup.com/nurture-the-green-november-2022-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00365.warc.gz
|
en
| 0.933088
| 475
| 2.953125
| 3
|
On April 22 we will celebrate the Mother Earth Day, and it is the perfect moment to remember how this oasis in the middle of the Atlantic Ocean appeared.
Canary Islands are recognized all around the globe thanks to its hot climate, the value of its landscapes and its gastronomy with a great amount of ground provisions.
Volcano and lava cradle
The seven islands form a volcanic archipelago, as a result of the constructive action of volcanic activity in the ocean when the magma from the earth’s interior went up through crevices and faults of the oceanic crust and was accumulated at the bottom of the sea for millions of years until emerging to the sea level.
At the time being there is proof of volcanic activities such as the eruption of the Teneguía in 1971, a volcano located in La Palma, seismic activity, emanation of sulfurous gas and geysers. However, these events do not affect everyday life of citizens.
Celebrating life in Canary Islands: Earth Day every day
The secret behind Canary Islands wealthy landscapes is its volcanic origin, not only for its orography but also for its fauna and flora. In the islands live endemic species that have been developed as a part of the ecosystem and do not exist anywhere else in the world.
Do not miss the opportunity to visit this wonderful volcanic heaven during your next holidays, as well as the majestic Teide volcano, a high geological structure where you will be able to look back millions of years.
Happy Mother Earth Day!
More information about Teide By Night and tour programme here.
|
<urn:uuid:df664b62-f5bf-4752-bfa6-a4b913d2e3e8>
|
CC-MAIN-2023-14
|
https://www.teidebynight.com/during-the-earth-day-we-remember-the-appearance-of-canary-islands/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00365.warc.gz
|
en
| 0.948997
| 327
| 3
| 3
|
Donated by Mr. Delano. Many oxen yokes were designed to harness the power of a team of two oxen. The yoke is made up of pair of bows that the farmer or teamster would put around the oxen’s neck. Hanging from the yoke between the two bows there was often a ring or some other mechanism that attached the yoke and the oxen to the load, whether that load is a wagon, a log or a plow. This particular yoke may have been used for hauling freight. These sliding yokes were developed in New England.
Sliding Oxen Yoke
Comments are closed.
|
<urn:uuid:224fc7db-9c8d-4993-8212-ca09be061b08>
|
CC-MAIN-2023-14
|
http://www.historiconeilfarm.org/researching-the-history-of-the-oneil-farm/sliding-oxen-yoke
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00365.warc.gz
|
en
| 0.987631
| 145
| 3.328125
| 3
|
What is functional medicine?…
You may have heard the term “functional medicine” and wondered exactly what that means and how is it different than regular medicine?
The best analogy to explain functional medicine is this… if your engine light comes on in your car, do you just put a piece of black tape over it so you cant see it anymore, or do you actually lift the hood to see what’s causing the problem?
Functional medicine tries to find the root causes of a health disorder rather than masking symptoms with drugs or surgery (although medication and surgery should not be avoided when needed). Because everything in the body works together, seeing a functional medicine doctor for a gut problem, for example, can also improve your brain function and hormone issues.
Suppose 10 different people have the same complaint such as fatigue. Each of those 10 people can have the same symptom, but for 10 very different reasons. For instance, fatigue in one person might be due to low blood sugar, while in another person it might be due to autoimmune disease or B12 anemia disease.
You must know why…
Until you know WHY you are suffering from a health issue, chasing drugs or therapies can keep landing you at dead ends.
Functional medicine is based on published, peer-reviewed science to help us understand where breakdowns can occur in the body. In my office, I use lab tests, questionnaires, exams, and a case history to help me find that underlying root cause.
Five common ….
In functional medicine, we usually find some very common root causes, starting with food intolerances, especially gluten and dairy. Next is either low or high blood sugar. Another common cause is bacterial and yeast overgrowths in the intestines. And sometimes the immune system attacks and destroys body tissues which is called autoimmunity.
There are no specialties…
Functional medicine looks at the body as a complex web where all the systems relate to each other instead of just looking at a certain part or specialty.
For example, if the gallbladder is acting up, addressing a gluten intolerance and chronic inflammation can sometimes prevent surgery. If your thyroid is sluggish or overactive, it’s important to check for autoimmunity.
Functional medicine is about feeling as good as you should feel. If you want to feel as good as you can, you can schedule to become a new patient or a free consultation.
|
<urn:uuid:aada405c-0295-4cec-91e1-0c27fb07535d>
|
CC-MAIN-2023-14
|
https://drcelaya.com/2018/03/28/what-is-functional-medicine/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00365.warc.gz
|
en
| 0.938697
| 504
| 2.546875
| 3
|
FxBrokerReviews.org – Based on market data, technical analysis is a technique or strategy used to forecast the likely future price movement of a security, such as a stock or currency pair.
The idea that all market participants’ aggregate buying and selling properly reflects all pertinent information regarding a traded asset and subsequently assigns a fair market value to the security is the basis for the legitimacy of technical analysis.
Wondering what is technical analysis?
By examining statistical trends gleaned from trading activity, such as price movement and volume, technical analysis is a trading discipline used to assess investments and spot trading opportunities. Technical analysis focuses on the analysis of price and volume as opposed to fundamental analysis, which seeks to determine a security’s worth based on financial metrics like sales and earnings.
- Technical analysis is a trading strategy used to assess financial assets and spot trading opportunities in price movements and chart patterns.
- According to technical analysts, a security’s previous trading activity and price fluctuations can be useful predictors of the security’s future price moves.
- In contrast to technical analysis, which concentrates on recent price patterns and stock movements, fundamental analysis concentrates on the financials of a firm.
The impact of supply and demand on changes in price, volume, and implied volatility is examined using technical analysis methods. It operates under the presumption that, when combined with suitable investing or trading rules, historical trading activity and price changes of security can serve as important predictors of the security’s future price movements.
It can assist enhance the assessment of a security’s strengths or weaknesses compared to the whole market or one of its sectors. It is frequently used to produce short-term trading signals using different charting tools. Analysts can refine their overall valuation estimate by using this information.
Charles Dow and his Dow Theory made a technical analysis of what it is today in the late 1800s.
William P. Hamilton, Robert Rhea, Edson Gould, and John Magee were among the notable scholars who added to the Dow Theory’s foundational ideas. Today’s technical analysis has progressed to incorporate a large number of patterns and signals that have been established through many years of study.
Worried about using Technical analysis?
Technical analysis is frequently used in conjunction with other types of study by professional analysts. Retail traders may base their conclusions only on a security’s price charts and comparable data, but in practice, stock analysts rarely confine their study to just fundamental or technical analysis.
Any security with a trading history can benefit from technical analysis. Stocks, futures, commodities, fixed-income, currencies, and other assets are included in this. Technical analysis is far more common in the commodities and currency markets, where traders pay attention to short-term price changes.
Stocks, bonds, futures, and currency pairings are just a few examples of tradable instruments that are often susceptible to forces of supply and demand and may be predicted using technical analysis. Some people think that technical analysis is just the study of supply and demand dynamics as they manifest themselves in changes in a security’s market price.
The most typical application of technical analysis is to price fluctuations, although some analysts also keep watch of other metrics like trade volume or open interest levels.
What is a technical analysis indicator?
To help technical analysis trading, experts have created hundreds of patterns and signals that are used throughout the business. To anticipate and trade on price fluctuations, technical analysts have created a wide variety of trading methods.
While some indicators are primarily concerned with detecting the current market trend, including support and resistance levels, others are more concerned with assessing a trend’s strength and the chance that it will persist. Trendlines, channels, moving averages, and momentum indicators are among the frequently used technical indicators and chart patterns.
Technical analysts often examine the main categories of indications below:
- Price trends.
- Chart patterns.
- Volume and momentum indicators.
- Moving averages.
- Support and resistance levels.
Get to know more about the Fundamental Premises of Technical Analysis
The two main techniques for evaluating securities and choosing an investing strategy are fundamental analysis and technical analysis. While technical analysis believes that a security’s price already represents all publicly available information and instead concentrates on the statistical examination of price movements, the fundamental analysis examines a company’s financial statements to establish the true worth of the firm.
Instead of examining a security’s intrinsic characteristics, technical analysis looks for patterns and trends to understand the market sentiment underlying price trends.
Several editorials by Charles Dow on technical analysis theory have been published. Two fundamental presumptions from his publications have been the cornerstones of technical analysis trading ever since.
- Markets are effective because values represent the variables that affect how much a security costs.
- Even seemingly random changes in market price appear to follow recognisable patterns and trends that frequently recur over time.
Dow’s work is still used today in the realm of technical analysis. Professional analysts often subscribe to three underlying tenets of the field:
- Everything is discounted on the market: The fundamentals of a firm, general market variables, and market psychology, according to technical experts, are all already included in the stock price. The Efficient Markets Hypothesis (EMH), which draws a similar conclusion regarding pricing, is consistent with this point of view. The only thing left is to analyse price changes, which technical analysts believe to be the outcome of market supply and demand for a certain stock.
- Price moves in patterns: Regardless of the time frame being examined, technical analysts anticipate that prices will demonstrate trends even in seemingly random market movements. To put it another way, a stock price is more likely to stick with a previous pattern than to fluctuate unpredictably. On this premise, the majority of technical trading methods are built.
- Technical analysts hold the view that history has a tendency to repeat itself. Market psychology, which has a tendency to be quite predictable based on emotions like fear or excitement, is sometimes blamed for the repeated pattern of price fluctuations. In order to examine these feelings and subsequent market movements and determine trends, technical analysis analyses chart patterns.
Wondering what is the difference between technical analysis and fundamental analysis?
The two main schools of thinking when it comes to approaching the markets, fundamental analysis and technical analysis, are at different ends of the spectrum. Both approaches have their proponents and detractors, much like any investing technique or philosophy, and are used to analyse and predict future patterns in stock prices.
Fundamental analysis is a technique for assessing securities that aims to calculate a stock’s intrinsic worth. Fundamental analysts research everything from a company’s financial health to the state of the industry and the wider economy. Fundamental analysts place great importance on earnings, costs, assets, and liabilities.
In contrast to fundamental research, technical analysis merely takes into account the stock’s price and volume. The fundamental premise is that all known fundamentals are taken into account by price, hence they are not particularly important. Technical analysts use stock charts to spot patterns and trends that point to what a stock will do in the future rather than attempting to calculate a security’s intrinsic worth.
Technical analysis strategy for beginners
Many investors base their stock analyses on a firm’s fundamentals, such as its revenue, valuation, or industry trends, but fundamentals don’t necessarily translate into market pricing. Technical analysis looks at previous data, primarily price and volume, to forecast price moves.
Utilising strategies such as statistical analysis and behavioural economics, aids traders and investors in navigating the discrepancy between intrinsic value and market price. The technical analysis aids traders in determining what is most likely to occur given historical data. The majority of investors base their choices on both technical and fundamental analyses.
Choose the right approach
The top-down technique and the bottom-up approach are the two main approaches used in technical analysis. Long-term investors frequently use a bottom-up strategy, whereas short-term traders frequently adopt a top-down one. In addition, there are five fundamental phases to beginning a technical analysis project.
The top-down method of macroeconomic analysis considers the entire economy before concentrating on specific securities. In the case of equities, a trader would initially concentrate on economies, then sectors, and last firms. This strategy places less emphasis on long-term values and more on short-term rewards for traders. For instance, a trader may be interested in equities as a buying opportunity if they broke out from their 50-day moving average.
The bottom-up method disregards the macroeconomic perspective in favour of individual stocks. It entails examining a stock that is attractive on a fundamental level for possible entry and exit opportunities. For instance, a trader may locate a company that is cheap in a downtrend and utilise technical analysis to pinpoint an exact entry moment when the price may be bottoming out. They aim for value in their choices and expect to view their transactions in the long term.
In addition to these factors, certain traders may favour employing particular methods of technical analysis. Swing or position traders may use chart patterns and technical indicators while day traders may employ straightforward trendlines and volume indicators. Trading firms creating automated algorithms may have wholly distinct specifications that influence trading decisions using a mix of volume indicators and technical indicators.
1. Pick a Strategy or Develop a Trading System
Finding a strategy or creating a trading system is the first step. For instance, a new trader may opt to use the moving average crossover technique, in which they monitor the movement of two moving averages (the 50-day and 200-day) on a certain stock price.
2. Identify Securities
The aforementioned method is most suited for highly liquid and volatile equities rather than illiquid or steady stocks, however not all companies or securities will fit with it. In this instance, different moving averages such as 15-day and 50-day moving averages may be needed depending on the stocks or contracts.
3. Find the Right Brokerage
Choose a trading account that can accommodate the chosen securities type (e.g., common stock, penny stock, futures, options, etc.). In order to maximise earnings, it should provide the necessary capability for tracking and monitoring the chosen technical indicators while keeping expenses to a minimum. A simple account using moving averages on candlestick charts might work for the aforementioned method.
4. Track and Monitor Trades
Depending on their plan, several levels of functionality may be needed by traders. To obtain Level II quotations and market maker visibility, for instance, day traders will need a margin account. But in the aforementioned scenario, a basic account could be the better choice due to its reduced cost.
5. Use Additional Software or Tools
To achieve the best performance, more features might be required. Others may use automated trading systems to conduct deals on their behalf, while other traders may need smartphone notifications or access to trading while they are on the road.
What are the limitations of technical analysis?
According to certain analysts and academic researchers, the EMH proves that historical price and volume data do not include any actionable information. However, using the same logic, business fundamentals should also not offer any actionable information. The weak form and semi-strong form of the EMH are referred to as these points of view.
Another argument against technical analysis is that since history does not always repeat itself exactly, studying price patterns is of doubtful value and need not be taken seriously. Assuming a random walk seems to be a better fit for pricing models.
Thirdly, technical analysis is criticised for sometimes working but only because it is a self-fulfilling prophecy. For instance, a lot of technical traders may set a stop-loss order below a company’s 200-day moving average. When the stock reaches this price after a big number of traders have done so, there will be a high number of sell orders, which will cause the stock to decline, confirming the trend traders had predicted.
When other traders notice the price dropping, they will sell their holdings as well, strengthening the trend. Although this short-term selling pressure may be self-fulfilling, it won’t have much of an impact on the asset’s price in a few weeks or months.
In conclusion, even if a small number of traders may influence price movements in the short term if they all used the same signals, they cannot control prices over the long term.
Wondering about the assumptions that technical analysis makes?
Three underlying tenets of the field are commonly accepted by professional technical analysts. The first is that the market discounts everything, just like the efficient market theory claims. Second, regardless of the time frame being analysed, they anticipate that prices will display tendencies even in seemingly random market moves. Last but not least, they think that history frequently repeats itself. Market psychology, which has a tendency to be quite predictable based on emotions like fear or excitement, is sometimes blamed for the repeated pattern of price fluctuations.
Each short-term trader’s objective is to identify the momentum of a certain asset and make an effort to benefit from it. This post has given you a few technical indicators and oscillators that you may start experimenting with out of the hundreds that have been designed specifically for this purpose. Consider incorporating the indicators into your current strategy or use them to create new ones. Try them out in a demo account to see which ones to utilise. Select your favourites and disregard the others.
Remember that no technical indication is faultless. None of them consistently emits signals that are 100% correct.
The savviest traders are constantly on the lookout for warning signs that the signals from their preferred indicators may be deceptive. Technical analysis may undoubtedly increase your trading profitability when done correctly. Spending more time and energy strategizing about how to manage situations if the market swings against you, as opposed to merely daydreaming about how you’re going to spend your millions, may do more to enhance your trading fortunes.
1. How Can I Learn Technical Analysis?
Technical analysis may be learned in many different ways. Learning the fundamentals of investing, stocks, markets, and financials is the first step. All of this may be learned through books, classes, internet learning, and other resources. Once the fundamentals are grasped, you may go on to using the same resources, but ones that concentrate only on technical analysis.
2. Is Technical Analysis Reliable?
Technical analysis is the process of interpreting market sentiment using patterns and signals seen in graphs. Although several empirical investigations have indicated its usefulness, there is still debate over its accuracy because of the wide range of success. To increase dependability, it is important to combine a variety of technical tools and indicators with other strategies like the fundamental analysis.
3. How Many Technical Analysis Tools Are There?
There are many different indicators and chart patterns among the several dozen technical analysis tools. Market professionals are always developing new tools and improving existing ones.
|
<urn:uuid:6bece4f4-8c3a-40fc-b1e7-2a6be3a69b50>
|
CC-MAIN-2023-14
|
https://fxbrokerreviews.org/blog/how-to-read-technical-analysis/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00365.warc.gz
|
en
| 0.922357
| 3,088
| 2.6875
| 3
|
Sandhill Cranes Visit NASA’s Kennedy Space Center and Merritt Island National Wildlife Refuge
By Space Coast Daily // April 3, 2021
Merritt Island National Wildlife Refuge features 330 varieties of birds
BREVARD COUNTY • KENNEDY SPACE CENTER, FLORIDA – A different type of visitor explores the area near the iconic Vehicle Assembly Building at NASA’s Kennedy Space Center in Florida.
Kennedy shares space with the Merritt Island National Wildlife Refuge, which is home to more than 1,000 species of plants, 117 species of fish, 68 types of amphibians and reptiles, 330 varieties of birds, and 31 different mammals.
Protected by the State of Florida as a threatened species, sandhill cranes live in the Sunshine State year-round.
The wildlife refuge presents an advantageous environment for the cranes, providing a shallow freshwater habitat for nesting, as well as a wide variety of vegetation and prey to feed on.
Sandhill cranes mate for life – finding their partner when they are at the age of two – and produce one to three chicks per year.
CLICK HERE FOR BREVARD COUNTY NEWS
|
<urn:uuid:4b4a46ef-1951-45a9-b7f1-0d3261f9aa7b>
|
CC-MAIN-2023-14
|
https://spacecoastdaily.com/2021/04/sandhill-cranes-visit-nasas-kennedy-space-center-and-merritt-island-national-wildlife-refuge/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00365.warc.gz
|
en
| 0.878272
| 238
| 2.671875
| 3
|
The world is in a race to secure a clean energy transition. Many view green hydrogen, which is produced by a water electrolysis process that is powered by renewable energy, as a key technological contributor to reaching net zero emissions. As electrolyzer manufacturers advance existing technologies, develop new ones, and ramp up their production capacities to meet the surging demand, the need for electrolyzer components is following suit.
By Johannes Mueller, Energy Transition Manager – Teadit
Large electrolyzer and fuel cell stacks can be comprised of several hundreds of individual cells that must be properly sealed to ensure safe and efficient operation. The opportunity for companies to accelerate the scale-up of green hydrogen production globally is immense. In the coming years an overall growth of the cumulated capacity of electrolyzers is expected to reach a benchmark of over 200 GW in 2030.
Currently, industrial H2 comes from a variety of sources, with the majority (48%) produced by the reforming of natural and/or refinery gas (known as grey H2). Other major sources include chemical production by-products (30%, white H2) and coal gasification (18%, brown H2). Only about 4% of global hydrogen production currently comes from electrolysis. Moreover, segmenting based on the source of the power used to drive the production, the hydrogen color palette contains even more variations. For example, purple H2 is produced using nuclear power and yellow H2 production utilizes a mixture of renewables and fossil fuels. However, achieving truly climate neutral H2 production requires that the electricity used for water electrolysis must be ‘green’ and therefore produced only from renewable energy sources, such as solar conversion (PV), or wind, or water driven turbines. This is one of the most proven options for low-carbon hydrogen and plays a key role in mobility, industry, or energy storage scenarios today.
Electrolyzers can be scaled to meet a variety of input and output ranges. They vary in size from small industrial plants installed in shipping containers to largescale centralized production facilities that can deliver the hydrogen by trucks or be connected to pipelines.
There are three main types of electrolyzers:
- proton exchange membrane (PEM),
- and solid oxide.
These different electrolyzers function in slightly different ways depending on the electrolyte material involved. Both alkaline and PEM electrolyzers can deliver on-site and on-demand hydrogen, pressurized hydrogen without a compressor, and provide 99.999% pure, dry, and carbon-free hydrogen.
H2 Electrolyzers Explained
Alkaline electrolyzers use a liquid electrolyte solution such as potassium hydroxide (KOH) or sodium hydroxide (NaOH), and water. The hydrogen is produced in a ‘cell’ which consists of an anode, cathode, and membrane. The cells are typically assembled in series, a ‘cell stack,’ that produces more hydrogen and oxygen as the number of cells increases. When current is applied on the cell stack, the hydroxide ions (OH) move through the electrolyte from the cathode to the anode of each cell, which generates hydrogen gas bubbles on the cathode side of the electrolyzer and oxygen gas at the anode.
PEM electrolyzers utilize a proton exchange membrane which uses a solid polymer electrolyte. When current is applied on the cell stack, the water splits into hydrogen and oxygen and the hydrogen protons pass through the membrane to form H2 gas on the cathode side.
One of the most important considerations in electrolysis applications is the technical requirements for the gaskets used in sealing the individual cells withing the stack. Due to its excellent sealing properties, PTFE has become a common gasketing material of choice. The seals used in the past were often made of asbestos coated with PTFE. Nowadays, however, asbestos is no longer used, so gaskets made of expanded or restructured PTFE have become a standard alternative.
Advanced PTFE solutions are universally employable for a variety of electrolyzer applications. They are suitable for all types of flanges, nearly all media, a wide temperature range, and for applications with high purity demands as they are inherently clean and non-toxic. Furthermore, they demonstrate high tightness (sealability) with low installation stresses even in media with small-sized molecules, like H2; and mechanical stability to creep relaxation.
Additionally, any potential seals applied in electrolyzer stacks must be electrically non-conductive to isolate the anode from the cathode. In general, the PTFE fluoropolymer offers remarkable dielectric strength and high resistance. To address the most diverse and challenging industrial applications a wide range of expanded PTFE (ePTFE) sealing products have been developed and manufactured.
ePTFE: What is it and How is it Made
All-purpose mono-directionally expanded PTFE sealant products (Figure 2, left) are manufactured from 100% pure PTFE (polytetrafluorethylene). Utilizing a special, thermo-mechanical stretching process results in a microporous fiber structure which adds high tensile strength and malleability to the previously identified general advantages of PTFE; while at the same time virtually eliminating the negative characteristics, like cold flow and creep. Because of the excellent compressibility and conformability of ePTFE, these sealant products adapt easily to the individual installation structures that are necessary, for example, in electrolyzer production.
The benefits to the cold flow properties and deformation characteristics developed by monoaxially expanded PTFE sealants are further improved by adapting the manufacturing process to incorporate expansion in multiple directions. This complex stretching process results in a multi-directional fiber structure which guarantees equal tensile strength in all directions, Figure 2, middle. This material has excellent dimensional stability and exhibits superior creep resistance, without losing any of the superb sealing properties of pure PTFE. Therefore, ePTFE products are ideally suited for use in H2 applications.
In addition to ePTFE sealing products, restructured PTFE materials, Figure 2, right, developed using a unique production process that develops a highly fibrillated PTFE structure combined with carefully chosen filler materials, offer a more rigid and higher density option with very high mechanical strength to improve handling. The caveat with these products is that the filler materials must be chosen for compatibility with the application for which they will be used.
Tested and Approved to Seal the ‘Smallest Molecule’
One useful tool for determining a material’s suitability in H2 applications is lab testing. However, most available tests do not utilize hydrogen as a test media. Therefore, engineers undertook a special investigation to determine how these products might perform. The aim of the investigation was to determine the gasket parameters according to the European test standard DIN EN 13555. This information is required for calculations according to DIN EN 1591-1 and is necessary for the approval of gasket solutions to seal hydrogen.
The conditions that are determined through this testing standard include a minimum gasket surface pressure in the assembled state Qmin(L) (40 bar) and minimum gasket surface pressure in the operating condition Qs, min(L) (40 bar). Deviating from the test standard, the leakage tests were carried out using hydrogen (H2).
In the leakage test, the gasket is loaded and unloaded in several stages, with the leakage rate being determined for each gasket surface pressure level. The measurement is carried out up to a gasket surface pressure of 160 MPa. The test records not only the loading curve, but also several unloading curves based on gasket surface pressure levels of 20 MPa, 40 MPa, 60 MPa, 80 MPa, 100 MPa, 120 MPa and 160 MPa. The smallest surface pressure level is 10 MPa.
Gasket tests were carried out on a TEMESfl.ai1 test equipment at Amtec‘s test laboratories, Figure 3. For several decades, Amtec has been testing the properties of gaskets, calculating strength, and measuring bolt forces.
The resulting leakage curve can be used to calculate the required minimum gasket surface pressure Qmin (L) for the various tightness classes, L, during assembly and the required minimum gasket surface pressure Qs, min(L) during operation. In the testing of a biaxially expanded ePTFE gasket (Teadit Style 24SH), the tightness class L0.01 was achieved at a the test pressure of 40 bar and a gasket surface pressure of 26–27 MPa. As the gasket is further loaded up to 160 MPa, the leakage rate decreases. The lowest leakage rate was measured at the surface pressure level of 160 MPa with 1.5 x 10-7 mg/s/m. The required minimum gasket surface pressure Qs min(L) in the operating state for tightness class L0.01 with an initial gasket surface pressure QA = 60 MPa is Qs min (0.01) = 10 MPa. The results are presented in the graph below, Figure 4.
Looking to the Future
Currently, the hydrogen demand is growing globally while activities in electrolyzer production are still in the early stages. However, as the energy transition accelerates, it is expected that massive amounts of resources will be allocated for developing new technologies, including developments in green electrolyzer technologies. The foundations of these future advancements are being seen today with major industrial manufacturers directing money and resources into reducing carbon output. As this happens, the requirement for H2 compatible sealing solutions is expected to develop concurrently in the coming years. The readiness to deliver high-end PTFE and ePTFE products that are suitable for the applications in electrolyzers will be paramount to the continued growth and expansion of this largely untapped resource.
|
<urn:uuid:a1eed528-1ac1-4d73-bfd8-b62290dc3ebf>
|
CC-MAIN-2023-14
|
https://valve-world-americas.com/electrolyzers-the-key-technology-in-h2-extraction/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00365.warc.gz
|
en
| 0.920276
| 2,058
| 3.21875
| 3
|
Titanium alloy is a highly specific strength material, having excellent mechanical characteristics such as high stiffness, fracture resistance, and hardness at high temperature, so it is applied to various fields such as automotive, aerospace and bio-industry. Yet, the excellent characteristics of titanium alloy generate high cutting heat in cutting process, stimulating tool wear and degrading process accuracy. This study looked into turning characteristics of Ti–6Al–4V alloy using super light, coated carbide and cermet tool and applied Taguchi method to identify factors affecting turning process. In the process of titanium alloy, the major cause of tool wear was adhesion of the chip by cutting heat at a high temperature, and to enhance tool life, cutting speed control is necessary. Factors affecting tool life were in the order of tool material, cutting speed and feed rate.
As high-tech main industries, such as automotive, aerospace and bio-industry rapidly grew, uses of difficult-to-cut materials with super light high hardness, such as titanium and inconel alloy increase. In cutting process, it is difficult for excellent mechanical characteristics and chemical characteristics of difficult-to-cut materials to meet dimensional accuracy and surface roughness required by a processed product, and they cause early failure of the tool, causing a problem of degrading its productivity. In order to solve this problem, various studies are in progress, but the types of difficult-to-cut materials are very diverse, and academic systematization of the process of difficult-to-cut materials is very difficult and complex. Yet, a study on the process of these new materials is a constantly required very important area of research with the development of high-tech industry [1,2,3].
Specific gravity of pure titanium is 4.506, which is a light weight metal between iron and aluminum, and since among practical metals, it has the maximum level of specific strength (strength/specific gravity) and characteristics such as high stiffness, fracture resistance and heat resistance, it is widely used in aerospace, chemical, petroleum and automotive industry [4, 5].
Mechanical characteristics of titanium alloy cause many problems in cutting process. High-temperature strength and low heat conductivity cause high temperature of the boundary surface between the chip and the tool during the process, and highest temperature at the boundary surface reaches 1000 °C in high-speed cutting. High cutting heat stimulates various heat-related phenomena and causes fast tool wear. Diffusion of titanium alloy element reduces hardness of tools, and adhesion due to dissolution causes chipping and early failure of tools. Generally, difficult-to-cut materials have high hardness and tensile strength or low thermal-conductivity and high affinity with tool materials, causing early damage on the tools, and accordingly, they have difficulties in economical cutting and in realizing process precision, and titanium alloy comes under both cases [6,7,8].
Since in the titanium alloy process, high process temperature and diffusion are the main causes tool wear and lowered surface quality of materials, currently, excessive cutting oil has been used to reduce temperature. This increases in process cost and energy use and has an adverse effect on environmental pollution. In order to improve these problems, a process technology that minimizes the use of cutting oil or does not use it to increase process efficiency is necessary. In addition, due to the lack of technology related to the process of difficult-to-cut materials, the use of them is limited and it is difficult to apply to a production site, so a study applicable to a general work environment is necessary.
To look into research trends of titanium alloy, Zlatin carried out a study on mechanical nature and process ability, and reported that the main factors of reducing process ability are caused by excellent mechanical properties of titanium alloy. Kim studied tool abrasion and cutting characteristic according to the cutting condition in titanium alloy process using a carbide tool, and Choi reviewed turning characteristic by the tool material. Currently, various materials such as super light, CVD coating, PVD coating, ceramic and cermet tool have been developed as tool materials, but it turned out that these materials did not greatly contribute to improving machining performance of titanium alloy. To reduce economic and environmental loss of cutting oil used to control high temperature in processing titanium alloy, eco-friendly difficult-to-cut materials process technologies, such as a cryo-process, minimal quantity lubrication process and plasma assisted process have been developed. Ezugwu and Yankoff et al. conducted studies to enhance tool process ability such as cryo-cooling, high-pressure cutting oil and self propelled rotation tool, and Rajurkar attempted a cutting process for chemical-milling and laser beam process. From the past, general processing methods of titanium alloy have been studied, and studies with new process methods have been carried out, but it is difficult to apply them to an actual site as equipment designed for research.
This study applied the cutting process mostly used in industrial fields in processing titanium alloy to study process characteristics of titanium alloy, and to consider economical cutting, carbide, coated carbide and cermet tools were applied to carry out dry turning process of Ti–6Al–4V alloy. In addition, the measured data were applied to test programming, and this study would attempt to identify factors affecting the process of Ti–6Al–4V alloy and select the optimal process condition.
2 Test Condition and Method
2.1 Test Material and Used Tool
Ti–6Al–4V alloy was applied (a round bar at diameter 35 mm and length 500 mm). Chemical composition and mechanical characteristics of the material were shown in Tables 1 and 2. Tools used in the test were SANDVIK carbide tool H13A, CVD coated carbide tool 3210 and cermet tool 5015, and cutting edge angle of the tools is 45°; clearance angle, 0°; and nose radius, 0.8 mm
2.2 Test Devices and Measurement Method
To investigate wear, surface roughness and cutting force of the tools according to cutting speed and feed rate for Ti–6Al–4V, a test was conducted, and devices used in this test were shown in Table 3, and the composition of the test devices was like Fig. 1.
A jig was designed, produced and attached to a dynamometer for the fixation of the tools. After the work piece was fixed between the headstock and the tail stock of the shelf and the material was pre-cut to make it a true circle, cutting conditions of the general-purpose shelf, such as cutting speed, feed rate and depth of cut, were set up to carry out dry cutting.
To observe tool wear, a CCD camera, data translation (DT3155) and a computer were composed. In a tool microscope, a vision system was installed to observe and measure tool wear after cutting length process of 250 mm, which was carried out till flank wear of the tool reached 0.25 mm. The wear image was saved in the computer through the CCD camera by the frame grabber in 256 brightness rating, which was analyzed in the computer. For cutting force, 1000 data per second for 3 s from the point with a cutting length, 200 mm were measured to show the average value. For cutting resistance, fine current measured in the tool dynamometer was amplified through a charge amplifier during the cutting process and through an A/D converter, it was entered, saved and analyzed by the computer.
In addition, after cutting conditions such as cutting speed, feed rate and depth of cut were tested for each condition, for surface roughness of the machined surface according to cutting condition, the average surface roughness, Ra was measured using a stylus type surface roughness meter under a condition with cut-off, 0.8 mm.
2.3 Cutting Condition
See Table 4.
2.4 Design of Experiment
Taguchi method is a kind of test programming, an effective method to make a large number of decisions through a small number of tests. This technique uses a mathematical tool called table of orthogonal arrays, which is a technique to identify factors having a significant effect on the test result and find the optimal condition using Signal-to-Noise Ratio (S/N-Ratio). The table of orthogonal arrays is a ready-made table in which each column is orthogonal. In other words, the overall level of the other columns occurs for all the levels the same time. Numerically presented process characteristics are called a value of characteristics. [15, 16]
The characteristics are divided into two kinds of forms, enumerated data consisting only of whole numbers and continuous data shown in the form of real numbers such as weight, size and mass. Mensuration characteristics are divided into dynamic characteristics of which output changes corresponding to the input signal, e.g. the speed of a bicycle, which changes according to the degree of the pedal pressed and static characteristics in which input remains steady, e.g. size, strength, output voltage, purity and temperature characteristic. Among the static characteristics, nominal-the-better characteristic refers to the one in which there is a sole target value, and it is not satisfactory when it is larger or smaller than the target value, which is used for analyzing weight, length and voltage. The-larger-the-better characteristic refers to the one which is not a negative number, and the larger value, the better, which is used for analyzing tool life, strength, efficiency and purity of chemicals. The-smaller-the-better characteristic refers to the one which is not a negative number, the smaller value, the better, which is used for analyzing cutting force, tool wear, noise and emissions. This study analyzed cutting volume using the-larger-the-better characteristic [17, 18].
3 Test Results and Discussion
3.1 Tool Wear Form and Tool Life
In titanium alloy cutting process, when flank wear reached 0.25 mm, it was judged that the tool life was over. Figure 2 is an SEM image of flank wear taken when the titanium alloy was processed under conditions at a cutting speed 1010 rpm and a feed rate 0.209 mm/rev and it reached the time of tool wear limit while Fig. 3 shows the form of crater wear. In Fig. 2, for the wear of a carbide tool, a coated carbide tool and a cermet tool, the wear by the adhesion of the chip and chipping were observed. In Fig. 3, for the coated carbide tool, a tool failure occurred while for the cermet tool, the adhesion of the undue chip occurred. Figure 4 shows the tool wear according to cutting time. The longer the process time, the more the tool wear became, and the tool life was the best in the carbide tool while shortest in the cermet tool. For the coated carbide tool and the cermet tool, when they reached the wear limit, there was a rapid increment of tool wear [19, 20].
In titanium alloy process, the main causes for tool wear include wear due to adhesion and diffusion by cutting heat. Since titanium alloy has a great shear angle, the chip and tool’s contact length are short, so the tool wear of the upper side starts from a position close to the cutting edge, and in spite of small cutting resistance, stress is concentrated and heat is highest in the cutting edge. At the contact surface between the chip and the tool, cutting heat at a high temperature occurs; with the diffusion of the titanium element, hardness of the tool decreases; titanium alloy melted by a high temperature is combined with the tool; and when the part combined by the localized high pressure and friction force in chip flow falls, the tool blade falls together. In titanium alloy process, when tool life, the wear shape and the form of combination with the chip are taken into account, it is judged that the cohesion of the carbide tool is lower to the molten metal than other tow tools and is stabler at a high temperature .
Figure 5 shows the cutting area, according to changes in feed rate at each cutting speed. Since there is little increase of tool wear in the carbide tool under a condition at a cutting speed 510 rpm, to secure test time and prevent a loss of the material, the number of times of processing was limited to 20 times each. The carbide tool had the best cutting area under each condition, and the less the cutting speed, the more cutting area of the carbide tool became. In contrast, under a condition at a cutting speed 1010 rpm, when the feed rate decreases from 0.209 to 0.090 mm/rev, the cutting area of the three tools tends to decrease. The less the feed rate, the more the cutting length becomes in processing the same volume, and the contact time of the chip and the tool increases. Accordingly, it is judged that the tool life is shortened by cutting heat and friction added to the tool.
Under a condition at a cutting speed 710 rpm, the cutting area of the coated carbide tool and the cermet tool decreased when the feed rate decreased equally at 1010 rpm. Yet, for the carbide tool, the volume value at a feed rate 0.090 mm/rev was two times of that at a feed rate 0.209 mm/rev, and it was found that the less the feed rate, the more the cutting area became. Under a condition at 710 rpm and 0.090 mm/rev, the cutting area of the carbide tool and the other two tools shows significant differences. Through this, it is judged that the carbide tool is stable with the cutting heat when the cutting speed is below 710 rpm.
Figure 6 shows the cutting time, according to changes in the feed rate. The cutting time of the carbide tool tends to increase when the feed rate decreases, and its cutting time is longer under each condition. While the cutting time of the coated carbide tool and the cermet tool increases or decreases depending on the feed rate under a condition at 1010 rpm and 710 rpm, the dynamic range of the cutting time is not great. Under a condition at 510 rpm, the less the feed rate, the more the cutting time of the three tools becomes.
3.2 Surface Roughness According to Cutting Conditions
After Ti–6Al–4V alloy process, the process surface was measured using a surface roughness tester, process surface to observe the characteristic of surface roughness according to each process condition.
Figure 7 shows the average profile of each tool. In the carbide tool under conditions at cutting speeds 1010 rpm, 710 rpm and 510 rpm, the less the feed rate, the less the surface roughness became. Under each condition, the more cutting area, the more tool wear became; however, until it reached the point of time of the tool wear limit, the surface roughness value did not show a big dynamic range. At 0.209 mm/rev, the surface roughness difference with the cutting speed was within 0.3 μm; at 0.157 mm/rev, 0.2 μm; and at 0.090 mm/rev, 0.2 μm. Through this, it is judged that the surface roughness of the carbide tool is affected more by the condition of the feed rate than by that of rpm.
The surface roughness of the coated carbide tool and the cermet tool also tends to decrease as the feed rate decreases. However, under a condition at 1010 rpm and 0.090 mm/rev, the average profile sharply increases because of rapid damage and breakage of the tool during the processing. In addition, Young’s modulus of titanium alloy is about a half of that of general steel, and it is characterized by a high strain rate in cutting and work hardening in the cutting process. Thus, sagging and vibration may occur by the cutting force, and if the cutting edge is not sharp, the material may slip. Since the tool blade of the coated carbide tool and the cermet tool is easily damaged in cutting, it is judged that the characteristic of surface roughness is poor.
3.3 Cutting Force According to Cutting Condition
Figure 8 shows the changes of the principal cutting force depending on the changes of the feed rate at a cutting speed 510 rpm. When the cutting area and the cutting time are taken into account in processing, it is judged that at a cutting speed 510 rpm, the tool is stable with a reaction to heat. The size of the principal cutting force was in the order of the coated carbide tool, the cermet tool and the carbide tool under the condition of feed rate, and the less the feed rate, the less the cutting force became.
Figure 9 shows changes in the principal cutting force, according to the cutting time. The longer the cutting time, the more the tool wear becomes, and the principal cutting force increases due to the damage of the tool edge. In the carbide tool, as the tool wear increases slightly, the width of changes in the cutting force is little.
3.4 Taguchi Method Interpretation of Cutting Area
Since the greater the cutting area, the better the tool life becomes, the-larger-the-better characteristic was applied, and the cutting area was entered till the flank wear length reached 0.25 mm. Three control factors, cutting tool, cutting speed and feed rate were selected; at three levels, the test was randomly carried out nine times in total; and MINITAB was used. For the carbide tool under conditions at 510 rpm and 0.209, 0.157 and 0.090 mm/rev, the test was terminated early before the point of time of tool wear, but a predicted tool wear limit was applied.
Table 5 shows a table of orthogonal arrays of S/N Ratio applying the-larger-the-better characteristic. As shown in the table, when processed under the third condition, the tool life was the best. Table 6 shows a table of responses to S/N Ratio. Delta value is the difference between the biggest average value from each factor and the smallest average value from each factor. The greater Delta value, the more the impact on the cutting area becomes, and it turned out to be in the order of cutting tool (δ = 16.91, 1st), cutting speed (δ = 13.97, 2nd) and feed rate (δ = 1.85, 3rd). Figure 10 shows the main effect on S/N Ratio based on the table of responses to S/N Ratio in Table 6. In the main effect, the more the incline, the more impact the factor has on the cutting area, and the higher S/N Ratio, the better the level becomes. When the processing is carried out using the carbide tool under a condition at 510 rpm and 0.090 mm/rev, the best tool life can be obtained.
In processing Ti–6Al–4V alloy, carbide tool showed the best tool life. Through SEM measurement, carbide tool showed a stabler form of tool wear for cutting heat than coated carbide and cermet tool at a high temperature.
In processing titanium alloy, the major tool wear was due to adhesion by cutting heat and the friction of the top surface of the chip and toll. To enhance tool life, it is necessary to control the cutting temperature and an appropriate cutting speed for cutting temperature control in dry cutting is necessary.
Surface roughness of titanium alloy is affected more by feed rate than by cutting speed, and the slower the feed rate, the more excellent surface roughness became.
The reason why dynamic range of cutting force and surface roughness of coated carbide tool and cermet tool is greater than that of carbide tool is that cutting edge gets duller due to the adhesion of titanium alloy in the process, and it is because of deflection and vibration by the cutting force.
When cutting area was taken into account using test programming, Taguchi method, the sizes of factors affecting tool life were in the order of tool material, cutting speed and feed rate. It was interpreted that using a carbide tool and slowing cutting speed and feed rate were advantageous.
Gatto, A., & Iuliano, L. (1997). Advanced coated ceramic tools for machining superalloys. International Journal of Machine Tools and Manufacture, 37(5), 591–605.
Nabhani, Farhad. (2001). Machining of aerospace titanium alloys. Robotics and Computer Integrated Manufacturing, 17, 99–106.
Park, Jong-Nam, Cho, Gyu-Jae, & Lee, Seung-Chul. (2004). A study on the cutting characteristics of Ti–6Al–4V alloy in turning operation. Journal of the Korean Society of Manufacturing Process Engineers, 3(4), 81–87.
Ezugwu, E. O., Bonney, J., & Yamane, Y. (2003). An overview of the machinability of aero engine alloys. Journal of Materials Processing Technology, 134, 233–253.
Venugopal, K. A., Paul, S., & Chattopadhyay, A. B. (2007). Growth of tool wear in turning of Ti–6Al–4V alloy under cryogenic cooling. Wear, 262, 1071–1078.
Sutter, G., & List, G. (2013). Very high speed cutting of Ti–6Al–4V titanium alloy—change in morphology and mechanism of chip formation. International Journal of Machine Tools and Manufacture, 66, 37–43.
Jianxin, D., Yousheng, L., & Wenlong, S. (2008). Diffusion wear in dry cutting of Ti–6Al–4V with WC/Co carbide tools. Wear, 265, 1776–1783.
Ribeiro, M. V., Moreira, M. R. V., & Ferreira, J. R. (2003). Optimization of titanium alloy (6Al–4V) machining. Journal of Materials Processing Technology, 143–144, 458–463.
Zlatin, N., Charistoper, J.D., & Cammett, J. T. (1973). Machining of new material,” USAF Technical Report AFML-TR-73-165.
Kim, N. Y., Ko, J.-B., & Lee, D.-J. (2002). A Study on The Tool Wear and Cutting Characteristics in the Machining of Ti–6Al–4V Using Tungsten Carbide Tool. Transaction of the Korean Society of Machine Tool Engineers, 11(2), 9–16.
Choi, Jong-Guen, Kim, Hyung-Sun, & Chung, Jin-Oh. (2008). Turning characteristics of various tool materials in the machining of Ti–6Al–4V. Transactions of the Korean Society of Machine Tool Engineers, 17(2), 38–44.
Ezugwu, E. O. (2005). Key improvements in the machining of difficult-to-cut aerospace super alloys. International Journal of Machine Tool & Manufacture, 45, 105–114.
Yankoff, G. (1986). “Method and apparatus for machining,” United States Patent No.4, pp. 461–467.
Rajurkar, K. P., Kozak, J., Wei, B., & Mcgeough, J. A. (1993). Study of pulse electrochemical machining characteristics. Annals of the CIRP, 42(1), 231–234.
Cha, Jinhoon, & Han, Sangbo. (2010). Searching optimal cutting condition for surface roughness in turning operation on inconel 718 using Taguchi method. Journal of the Korean Society of Machine Tool Engineers, 19(2), 295–300.
Lee, J. H., Ko, T. J., & Baek, D. G. (2009). A study on optimal cutting conditions of MQL milling using response surface analysis. Journal of the Korean Society for Precision Engineering, 26(1), 43–50.
Kwak, Jae-Seob, & Ha, Man-Kyung. (2004). Optimization of grinding conditions and prediction of surface roughness using taguchi experimental design. Journal of the Korean Society for Precision Engineering, 21(7), 37–45.
Kim, H. G. (2013). “A study on optimum tool selection by machinability using Taguchi method. Journal of Korean Society of Mechanical Technology, 15, 773–777.
Park, J. N. (2007). A study on the cutting characteristics of the glass fiber reinforced plastics by drill tools. IJPEM, 8, 11–15.
Sun, S. (2009). Characteristics of cutting forces and chip formation in machining of titanium alloys. IJPEM, 49(7–8), 561–568.
Xie, J. (2013). Experimental study on cutting temperature and cutting force in dry turning of titanium alloy using a non-coated micro-grooved tool. IJPEM, 73, 25–36.
This paper was supported by research funds of Chonbuk National University in 2017.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
You, S.H., Lee, J.H. & Oh, S.H. A Study on Cutting Characteristics in Turning Operations of Titanium Alloy used in Automobile. Int. J. Precis. Eng. Manuf. 20, 209–216 (2019). https://doi.org/10.1007/s12541-019-00027-x
- Cutting force
- Tool wear
- Surface roughness
|
<urn:uuid:0be5bc60-5da5-4acf-b200-03ac7935929e>
|
CC-MAIN-2023-14
|
https://link.springer.com/article/10.1007/s12541-019-00027-x
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945472.93/warc/CC-MAIN-20230326111045-20230326141045-00365.warc.gz
|
en
| 0.926107
| 5,524
| 3.1875
| 3
|
E3S Web Conf.
Volume 31, 2018The 2nd International Conference on Energy, Environmental and Information System (ICENIS 2017)
|Number of page(s)||6|
|Section||09. Environmental Policy, Planning and Education|
|Published online||21 February 2018|
Planning Of Beef Cattle Development in District Blora, Central Java, Indonesia
Master Program of Environmental Science, School of Postgraduate Student Diponegoro University
2 Animal Sciences Dept, Faculty of Animal and Agriculture Sciences, Diponegoro University
* Corresponding author: firstname.lastname@example.org
Continuity of meat supply availability is generally related to the number and production of livestock in a region. Therefore, a framework of sustainable livestock development is needed to increase the production and productivity of livestock. Blora Regency is one of the areas in the Province of Central Java with the largest number of large livestock, primarily beef cattle. Blora Regency has a population of 199.584 beef cattle. Agricultural waste results in Blora Regency can be used as supporting the availability of feed for livestock sector. This is supported by the availability of forage feed which is very abundant.Based on these potentials, it is necessary to assess the characteristics of natural land for the development of beef cattle farms. Therefore, the objectives of this study are (1) to assess the environmental suitability of the environment for the development of cattle ranching that is grazed and stacked; (2) to analyze the potential of forage source of fodder and bearing capacity for beef cattle farming; (3) to analyze the centers of activity of development of beef cattle; (4) to prepare direction and strategy of beef cattle development in Blora Regency.
© The Authors, published by EDP Sciences, 2018
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (http://creativecommons.org/licenses/by/4.0/).
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.
|
<urn:uuid:3905f950-2130-4f3b-a4f6-158c894d2a9e>
|
CC-MAIN-2023-14
|
https://www.e3s-conferences.org/articles/e3sconf/abs/2018/06/e3sconf_icenis2018_09022/e3sconf_icenis2018_09022.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945472.93/warc/CC-MAIN-20230326111045-20230326141045-00365.warc.gz
|
en
| 0.869604
| 561
| 2.828125
| 3
|
Est et occidentis populis sua ebrietas fruge madida, pluribus modis per gallias hispaniasque, nominibus aliis, sed ratione eadem. Hispaniae iam et vestutatem ferre ea genera docuerunt. Aegyptus quoque e fruge sibi potus similes excogitavit, nullaque in parte mundi cessat ebrietas, meros quippe hauriunt tales sucos nec diluendo ut vina mitigant. At Hercules illic tellus fruges parere videbatur. Heu mira vitiorum sollertia! Inventum est quem ad modum aquae quoque inebriarent.
There is among the western people their own (type of) intoxication (made from) soaked grains, with many varieties (drunk) throughout Gaul and Spain and, also with many names, but the product is the same. The Spaniards even taught us that such drinks can be aged.
In Egypt they make similar drink from their own grains and, in that part of the world, drunkenness never ceases. Of course, they drink such juices unmixed (with water) and they don’t they soften the drink by dilution as (is typical with) wine. And, by Hercules!, in Egypt it seems as if the earth is prepared (entirely with) grain. Alas, what a marvelous skill of terrible things! They even discovered how to get drunk on water.
This passage ends Pliny the Elder’s book on wines. Although he mentions beer on several occasions in other books (See previous posts 1, 2, 3), this chapter makes it clear that beer – though, not typically consumed by the Romans – should be treated as a variety of wine.
We, again, have confirmation that in the 1st c. CE, the Gauls, Spanish, and Egyptians drank beer. Beer is described as a drink made from “soaked grains” and its alcoholic qualities are inferred from its place in the wine chapter (Book 14).
The Egyptians, at least, preferred their beer at full strength. This contrasts with typically Greco-Roman procedures for wine consumption which was typically diluted at the time of drinking. This prevented the drinker from becoming too inebriated during an all-night drinking bout (“session wines,” anyone?). Excessive drunkenness and, by extension, preference for unmixed alcoholic beverages were considered characteristics of barbarians (i.e. those not Greek or Roman) – the uncultured, unrefined, wild, and out of control.
Pliny is particularly astounded by the Egyptian’s delight in drunkenness. Surely with hyperbole, Pliny describes all available land in Egypt as filled with barley and wheat that were dedicated for beer production. A near-contemporary, Dio Chyrsostum describes a similar inclination for inebriation among the Egyptian common-folk (1). BCS also highlighted the evidence for the beer-tradition continuing into the 4th c. CE, at least (1). Such is not surprising, as the ancient Egyptians are well-known beer drinkers who had brewed for millennia prior to the Greco-Roman period.
Finally, those who think Beer Cellars are a new fad: Think again! The ancient Spanish have you beat. Pliny tells us that their beer could be aged for very long periods of time. Perhaps, this suggests that their beer was of higher alcohol or inoculated with sour bacteria – favorable qualities in beer that make for prime cellaring candidacy. It also suggests that many of the additives (spices, herbs, etc.) were potentially added only at the time of drinking or were steeping in the beer during the aging process. Like hops, such flavors tend to diminish over time. Alternatively, the Spaniards may have just kept beer around on hand and had few designs on altering/maximizing the flavor of their drink.
Pliny the Elder (23-79 CE)
You should know him by now, really, truly.
Wikimedia Commons. “The Grain-threshers, Egypt” by Jean-Leon Gerome. Photo credit: Sotheby’s
6 Comments Add yours
|
<urn:uuid:af4224f2-2afb-4eb2-9167-8a2551332355>
|
CC-MAIN-2023-14
|
https://brewingclassical.wordpress.com/2017/07/31/pliny-the-elder-14-51/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948684.19/warc/CC-MAIN-20230327185741-20230327215741-00365.warc.gz
|
en
| 0.956923
| 914
| 2.859375
| 3
|
Life, death… Shouldn’t we talk about it with students? Issues arising from the creation of an online platform for the French medical and school staff
Death and mourning remain invisible issues within the French school system, whereas multiple studies and field experience reveal the prevalence of situations where teachers and school doctors are expected to take care of complex situations. These actors tend to feel vulnerable and lack concrete tools to open free discussion with students. The needs are important given how recent terrorist attacks in France and the current pandemic have profoundly affected students’ mental health. Offering spaces to openly discuss these deeply emotional issues appears essential to prevent psychosocial and pathological risks while promoting a pedagogy of finitude.
In a context where medical and psychological knowledge is increasingly being disseminated through the Internet and social media, the French Society for Palliative Care has recently launched an online platform to help the teaching and medical staff and parents to talk more openly with children and teenagers about issues such as the end-of-life, death and mourning. This website offers resources, examples of good practices as well as a list of actors which may support children or teenagers who have a life-limiting illness or who have a bereaved experience, a particular focus is made on young orphans and young carers, two populations emerging as subjects of study.
This presentation aims at introducing this project entitled “La vie, la mort… On en parle ?” (“Life, death… Shouldn’t we talk about it?”), which has required the collaboration of multiple stakeholders from the medical and the education worlds (parent-teacher associations, pediatric palliative care teams, school health associations, end-of-life care volunteers’ organizations, French Ministry for Education, etc.). The following points will in particular be addressed:
• The choice of a website as a medium: our initial bypassing strategy became a deliberate choice which was legitimized by the current COVID-19 crisis ;
• The operational, ethical and epistemological issues which the promotion of a pedagogy of finitude online implies in an institutional context ;
• The successful and participative mobilization offered by such an online platform to enhance the visibility of youngsters confronted with incurable illness, end-of-life and mourning.
Nicolas El Haïk-Wagner is the coordinator of a working group of French Society for Palliative Care dedicated to the diffusion of “palliative care culture” to young generations. He works as an independent researcher for several organizations; his research interests include the social and ethical issues arising from emerging medical technologies as well as from society ageing. Nicolas El Haïk-Wagner holds a Bachelor of Arts, Honours in Anthropology from the University of British Columbia (Vancouver, Canada), and a Master of Arts in social policy from Sciences Po Paris.
Caroline Tête is a documentalist at the French Centre of palliative and end-of-life care. She created a site, VigiPallia, dedicated to documentation (academic literature and pop culture references) on palliative care, end-of-life and bereavement. She works on health promotion of youth, first, on alcohol research projects and then, on projects focused on end-of-life and bereavement. She created a reading committee for highlighting a selection of child books on these topics, available online for parents and healthcare professionals who want to discuss these issues with children and teenagers.
The Digital Legacy Conference is free for EAPC 2021 ticket holders. Alternatively, tickets can be purchased for £20 using the button below.
*The Digital Legacy Conference is a not for profit event. To learn how you or your organisation can sponsor and support this year’s conference click here.
|
<urn:uuid:64a7a054-abc0-42ef-bdd4-b3c0cdbb67cd>
|
CC-MAIN-2023-14
|
https://digitallegacyconference.com/nicolas-el-haik-wagner-caroline-tete/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948684.19/warc/CC-MAIN-20230327185741-20230327215741-00365.warc.gz
|
en
| 0.937859
| 782
| 2.703125
| 3
|
OCR Geology AS & A2 Student Book
Availability: Out of Stock
|Series||OCR A Level Geology|
Quick overview Suitable for teachers of OCR A Level specifications who want to deliver the style A Level, this book engages students and supports them through the transition from GCSE. It includes two sections with advice on improving practical and field skills. It integrates How Science Works to help students understand the underlying principles of science.
|
<urn:uuid:7e8272b0-cfd3-417e-9a9f-4998b29676cd>
|
CC-MAIN-2023-14
|
https://www.alanhannas.com/OCR-Geology-AS-A2-Student-Book_9780435692117
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948684.19/warc/CC-MAIN-20230327185741-20230327215741-00365.warc.gz
|
en
| 0.821762
| 149
| 3.25
| 3
|
This Jambar article discussed the creation of the program. It was featured at the Youngstown Area 2012 Jewish Film Festival. Dr. Saul Friedman taught at YSU from 1969 to 2006 and was founder of our Holocaust Studies program. In addition to a dozen books, he created 13 documentaries of which 5 received regional Emmy Awards.
According to the records of the Greek government, 56,500 Jewish citizens lived in the city of Salonika on the eve of the Holocaust. By December 1944 only three remained. This is their story–and by extension–it is the story of the Jews of Greece.
The DVD Ash and /Smoke may be borrowed from the Maag Library AudioVisual Collection,
Call number DVD 0432. Ask at the Circulation Desk.
It will appear online in the Maag archives in the future.
|
<urn:uuid:776d3e95-bc6e-4613-94d6-2164111a2399>
|
CC-MAIN-2023-14
|
https://maag.guides.ysu.edu/c.php?g=427917
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00365.warc.gz
|
en
| 0.932001
| 205
| 2.703125
| 3
|
Major achievement enables precision drug design for inherited learning disabilities, other neurological diseases
Scientists have used the UK's national synchrotron science facility, Diamond Light Source, to make a discovery that could pave the way for more effective, targeted drugs to treat inherited learning disabilities and other neurological diseases. UK-based Heptares Therapeutics, the pioneering structure-guided drug discovery and development company, has mapped the structure of a protein linked to the genetic disorder Fragile X Syndrome, a major cause of inherited learning disabilities, as well as to autism, depression, anxiety, addiction and movement disorders. Understanding the structure of this protein means a new generation of targeted medication could be fast on the heels of drugs currently undergoing clinical trials to treat the symptoms of these diseases.
The level of detail required for this work could only be achieved using the intense synchrotron light produced at Diamond Light Source, the UK's synchrotron science facility based on the Harwell Science & Innovation Campus in Oxfordshire. Around 3,500 scientists a year use this light to study samples, and its intensity allows them to visualise on a scale that is unobtainable in their home laboratories.
Diamond Light Source produces a light 10 billion times brighter than the sun allowing scientists to study proteins at an atomic level. Using Diamond, Heptares scientists shone this intense light through pure protein crystals placed in the "beamline", a specialist lab, and for the first time determined the 3D structure of the protein mGlu5 (metabotropic glutamate receptor 5), part of a family of receptors that controls brain activity. Heptares' research, published today in the journal Nature, outlines a detailed understanding of mGlu5 and how it is affected by a drug which has been evaluated in clinical trials to treat Fragile X symptoms and other neurological disorders.
Using these findings, Heptares has enabled the development of a 'new generation' of targeted medication for diseases linked to this family of proteins with improved effectiveness over drugs currently in trials. Scientists from Heptares have already used the structural information to discover molecules that lock into a "pocket" identified inside the protein during this latest study.
Dr Fiona Marshall, Chief Scientific Officer at Heptares, believes this discovery has the potential to transform the treatment of a range of serious diseases involving mGlu5: "Drugs currently in clinical trials could be on the market within about five years' time, however, with the knowledge gathered in this study we could have a 'new generation' of precisely designed and more effective drugs within about ten years. Being able to use the world-leading microfocus X-ray crystallography beamline (I24) at Diamond Light Source to understand how the protein reacts to different drugs at an atomic level is invaluable in the success of research into these diseases."
In the past, drug design has been largely the product of trial and error. Drugs would be developed and then tested until they had the desired effect. Because scientists lacked a comprehensive understanding of why and how the drugs were working, this approach could lead to unwanted side- effects.
By visualising mGlu5 at the atomic level, Heptares was able to identify a "pocket" in the structure. Computer technology is allowing scientists to design a drug to fit precisely into this pocket. This targeted drug would only affect the receptor with the pocket identified, reducing the chance of side effects.
Prof Andrew Harrison, Diamond's Chief Executive, comments, "Heptares is currently the biggest annual industrial user of Diamond. This is testament to our unique facilities and the success they have had in the past using techniques only available in the UK at Diamond. Whilst the majority of the research undertaken at Diamond is done by academia, currently 5% of the overall experimental time is purchased by 70 regular industry customers. They are using Diamond to advance R&D programmes across a range of sectors including pharmaceuticals, biotechnology, chemicals, oil and engineering. The synchrotron is playing a major role in keeping a strong R&D base in the UK and promoting highly advanced innovation within a range of businesses from British SMEs to global companies such as GSK and Rolls-Royce."
Fiona Marshall, Chief Scientific Officer at Heptares, concludes, "Publishing this research in Nature will provide scientists with a new understanding about the function of this protein and help facilitate the design of some important new drug treatments. Here at Heptares, we are applying this structural knowledge to a range of proteins known to be important in serious diseases to create a new generation of targeted medication. Diamond will continue to play an important role in our future research."
More information: Andrew S. Doré et al. Structure of the class C GPCR metabotropic glutamate receptor 5 transmembrane domain, 2014, Nature dx.doi.org/10.1038/nature13396
Journal information: Nature
Provided by Diamond Light Source
|
<urn:uuid:5f0a77e9-cc0d-4558-8fa2-445af6110729>
|
CC-MAIN-2023-14
|
https://phys.org/news/2014-07-major-enables-precision-drug-inherited.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00365.warc.gz
|
en
| 0.937993
| 1,001
| 3.015625
| 3
|
Virtual chat rooms can increase negative political biases of debate viewers
The campaign for the 2020 U.S. presidential election was historic in many ways due to the COVID-19 pandemic, including the use of digital watch parties to view the presidential and vice-presidential debates. This viewing method allowed people to continue interacting socially while watching the debates and remaining socially distanced in their homes.
Inspired by these virtual watch parties, researchers at the University of Missouri studied the use of group chat rooms during virtual debate watch parties and found that online chat rooms can increase the negative political biases of debate viewers, particularly when chatting with like-minded individuals, said Ben Warner, associate professor of communication and co-author of the study.
"Imagine watching a political debate by yourself, and you already know who you're going to vote for, but all of a sudden the other political candidate makes a good point," said Warner, who also serves as the director of the Political Communication Institute. "You might think to yourself, 'that was smart, or 'I hadn't thought about it that way.' But if you are watching the same debate with a group of like-minded people, we found that you're more likely to notice the negative things or to construe something being said as negative, when likely that wouldn't have happened if someone wasn't there to conveniently supply that information."
Warner, whose research interests include studying the effects of partisan media, presidential debates, campaign ads and political humor, has helped conduct numerous debate-watching studies at MU involving hundreds of college students. From 2000 until 2020, all of these studies involved in-person watch parties, but due to the COVID-19 pandemic, the researchers had to move their studies of the 2020 campaign online.
Therefore, researchers recruited more than 500 study participants from a total of 12 higher education institutions to view one of the two 2020 presidential campaign debates or vice-presidential debate in real time using digital watch parties via video conferencing and the use of digital chat rooms. The participants were split into three different groups—with all supporters of the same political party, with a mix of supporters from both political parties, or no chat at all, said Go-Eun Grace Kim, a doctoral student in the Department of Communication and corresponding author on the study.
"We devised an innovative design for this study, and it was surprising to me that we could recruit a lot of students to participate," Kim said. "We also allowed participants to turn off their video cameras and change their names so they could remain anonymous when sharing their responses with us and one another."
Warner said the researchers "experimentally manipulated" the social conditions of these watch parties in order to study the amount of bias processing that was occurring in each watch party.
"When we talk about bias processing and debates, it means that Democrats believe their candidate did an awesome job and the Republican candidate was terrible—and vice versa," Warner said. "We found that it wasn't the agreements that made people more positive toward a particular candidate, rather it seems like these chats helped create a 'piling-on' effect of negative comments directed against the opposition party's candidate."
Warner equates this feeling to watching a sporting event while surrounded by and socializing with fans of the same team. He added that this study can contribute to the knowledge base surrounding a popular topic of discussion in today's society—the impact of people mostly surrounding themselves with like-minded individuals.
"When we think of the types of information environments that we surround ourselves in—we all have a choice of whether or not to hang out with people we disagree with—what kind of perspectives are we volunteering to expose ourselves to?" Warner said. "For instance, if I'm watching a football game and I purposely don't watch the game with fans of the opposing team that I root for, then I am recreating the sort of ideologically homogeneous environment of attending a political debate watch party with like-minded people."
"Social watching the 2020 presidential and vice-presidential debates: the effect of ideological homogeneity and partisan identity strength," was published in Argumentation and Advocacy.
More information: Go-Eun Kim et al, Social watching the 2020 presidential and vice-presidential debates: the effect of ideological homogeneity and partisan identity strength, Argumentation and Advocacy (2021). DOI: 10.1080/10511431.2021.1955446
Provided by University of Missouri
|
<urn:uuid:1c36fddb-31e5-483c-a008-28ffedb6c57a>
|
CC-MAIN-2023-14
|
https://phys.org/news/2021-12-virtual-chat-rooms-negative-political.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00365.warc.gz
|
en
| 0.967208
| 913
| 3.046875
| 3
|
The apple maggot (Rhagoletis pomonella) is one of the most important economic insect pests of apples in New Hampshire. This native insect is also known as the “railroad worm.” It is a northern pest of apples, ranging from the Dakotas to Arkansas and Canada. It has invaded parts of California, Oregon, Washington, and Utah. If left unchecked, the apple maggot can infect 100% of a season’s apple crop. In addition to apples, it commonly infests hawthorns and crabapples. In Utah and in parts of Wisconsin and Michigan, it also attacks cherries.
The adult apple maggot is slightly smaller than a house fly and is black with white bands on the abdomen. Females have four abdominal bands and a pointed abdomen while males have three white bands on their blunt abdomen. The wings of both sexes have a pattern of zigzag black bands. There is a white dot in the middle of the back, close to the base of the wings. Positive identification of this species is assured by seeing this prominent spot and the characteristic pattern of wing bands. Other closely related flies have the white spot, but different patterns of black wing bands.
Females lay their eggs singly in tiny punctures that are difficult to see on the apple skin. The immature stage is a white, legless maggot which tunnels through the fruit.
There is only one generation of apple maggot per year in New Hampshire. Apple maggots overwinter as pupae, 1-6” deep in the soil. Adults start emerging early in July, but emergence is greatly stretched out over time. Time of first emergence varies from one spot to the next, and is affected by soil type, soil moisture, shading, and other factors. Adults feed on honeydew lapped from leaves. Egg laying does not occur until 8-10 days after the fly has emerged. The eggs are deposited in tiny punctures in the skin of developing apples. They hatch 5-10 days later and the maggots immediately begin to bore throughout the apple. The maggot feeding resembles a complex system of railroads. That is why the name “railroad worm” applies to the apple maggot. When the apples drop to the ground, the maggots develop rapidly and enter the soil where they pupate.
- Sanitation - Sanitation can help reduce populations. Pick up and remove from the orchard any apples that fall during the growing season and after harvest.
- Monitoring - Sticky traps are often used to monitor apple maggot presence in the orchard. Traps capture the adults that attempt to land on them. These traps are red spheres coated with tanglefoot and may or may not contain a scent lure. If you do not use a scent lure, spray for apple maggots when you catch an average of one apple maggot fly per trap. If you use a scent lure, wait until you have caught five apple maggot flies per trap.
- Chemical Control - Apple maggots are easy to control with insecticides. Recent research on their behavior and survival indicates that most commercial growers need not apply more than two well-timed sprays. Some growers will only need one. Guidelines for chemical controls used on apple maggot can be found in the annually revised New England Tree Fruit Management Guide. Consult your county Agricultural Field Specialist for specific recommendations.
Guidelines for chemical controls used on apple maggot can be found in the annually revised New England Tree Fruit Management Guide. Consult your county Agricultural Field Specialist for specific recommendations.
Stop! Read the label on every pesticide container each time before using the material. Pesticides must be applied only as directed on the label to be in compliance with the law. All pesticides listed in this publication are contingent upon continued registration. Contact the Division of Pesticide Control at (603) 271-3550 to check registration status. Dispose of empty containers safely, according to New Hampshire regulations.
Download the resource for the complete factsheet.
|
<urn:uuid:2e393643-21e4-497a-9ad2-e14f3d12955e>
|
CC-MAIN-2023-14
|
https://extension.unh.edu/resource/apple-maggot-fact-sheet
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00565.warc.gz
|
en
| 0.921329
| 838
| 3.40625
| 3
|
The problem is that soft, fluffy toilet paper (and paper towels, etc.) can’t be achieved if even a tiny amount of recycled paper is used in its production, so mature trees are being cut down in large numbers to make it.
Bees are vital pollinators and an unseen link in the health of our ecosystem. The decline of bees means eating local honey, and maybe keeping some backyard bees, could be one of the healthiest things a family can do for the planet.
Riders are always looking for riding buddies.
The Wallkill Valley Land Trust works with the community to preserve the rural character, the unique sense of place of each of our eight towns—including Gardiner, its hamlets and the outlying areas.
Climate Smart Gardiner (CSG) has been aiming to make sustainable, environmentally-friendly changes to the area since its inception early in 2018.
Losing Tillson Lake would mean the loss of a peaceful Shawangunk foothills lake used by visitors and residents.
Integer posuere erat a ante venenatis dapibus posuere velit aliquet. Donec ullamcorper nulla non metus auctor fringilla.
Invasive plants are an ongoing threat to the Gardiner community in many ways. So what is to be done, now that they’re here? The answer: manage and destroy through vigilance and action.
The White Flowering Dogwood is considered to be the best ornamental of all trees.
|
<urn:uuid:710dafb4-887f-48b2-be16-e49e3d35881d>
|
CC-MAIN-2023-14
|
https://gardinergazette.com/environment/page/11/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00565.warc.gz
|
en
| 0.927223
| 311
| 2.609375
| 3
|
DUGWAY PROVING GROUND, Utah -- A new electromagnetic railgun is ready for testing at Dugway, where General Atomics has been testing railguns for the Navy periodically since 2008. Railguns use electricity instead of gunpowder to propel projectiles far faster than conventional munitions.
Previous railguns tested at Dugway were three megajoule systems, but the new system will use up to 10 megajoules of energy to fire specialized projectiles at velocities unobtainable with gunpowder, according to Nick Bucci, vice president of Missile Defense and Space Systems at General Atomics Electromagnetic Systems. A joule is a measure of energy. A megajoule (one million joules) is equivalent to the kinetic energy of a 2,205-pound vehicle moving at 99.42 miles an hour.
Dugway's primary mission is to test defenses against chemical and biological agents, but it regularly opens its 800,000 acres of desert to be used by unrelated testers requiring more space to test their systems. Another attribute: Dugway's climate is diverse; annual temperatures range from 105 to -15 Fahrenheit. High winds, snow, rain and dust storms are occasional.
"It's those real-world conditions that help us hone the design better, that the Warfighter has to deal with in the real world," Bucci said. "Dugway won out for flexibility of range, willingness to work with us and capabilities. One of the biggest advantages is that it's an open range. We're out there firing for kilometers. It just gives us the flexibility to get a lot more data."
Interest in railguns is high because the weapon fires projectiles at higher velocity, farther and with greater rapidity than conventional artillery, making it a formidable defense against ballistic and cruise missiles. A June 26 Pentagon report noted that Iran, Russia, North Korea, China and others are investing heavily in ballistic and cruise missile programs with long range capabilities. The threat is expected to continue growing.
Invented in France in 1918, the railgun has long drawn military interest for its advantages over conventional munitions.
Railguns use two parallel metallic rails with a sliding armature between them that holds the projectile. When a large electromagnetic pulse is introduced to the rails, a powerful magnetic field is created that propels the armature and projectile along the rails at hypervelocity. Velocity depends upon the power of the pulse.
Railgun projectiles are non-explosive and safer to manufacture, transport and store. Velocity is adjustable shot-to-shot, conserving power. Projectiles are guided to the target after leaving the launcher, and reach a target faster. At 100 yards, railguns sound no louder than a .30-06 rifle firing. What little "smoke" they create is actually plasma particulates or dust.
Previous testing with the three megajoule railguns produced projectile velocities up to two kilometers (6,562 feet) per second -- nearly double that of conventional artillery. According to press releases, within 10 years, the Navy expects to arm some ships with the railgun for missile defense. In 2018 at Dugway, General Atomics plans to test the 10 megajoule system against a cruise missile surrogate.
Historically, railguns have been hindered by their enormous power demands and rapid rail wear from heat and friction, curtailing their field portability. But General Atomics is making progress on both issues.
"We're getting more energy in a smaller package, so you can have more energy and still have (the railgun) be transportable," Bucci said. "We've made tremendous strides on the energy density of capacitors."
In the past, the rails lasted for a few dozen shots. "The way we produce the launchers now, we believe bore life will be in the neighborhood of thousands of shots," Bucci said.
|
<urn:uuid:7569e69b-ee41-4d98-b3d1-94e7ee838ef2>
|
CC-MAIN-2023-14
|
https://www.army.mil/article/192337/dugways_expanse_climate_benefit_railgun_testing
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00565.warc.gz
|
en
| 0.941194
| 801
| 2.6875
| 3
|
More U.S. beef is being recalled because it may be contaminated with salmonella.
The U.S. Department of Agriculture says a unit of Brazil’s JBS is now recalling a total of more than 12 million pounds of raw beef that was shipped around the country. JBS Tolleson in Arizona already recalled about 7 million pounds of beef in October.
Health officials say their investigation identified additional products with the USDA inspection number “EST. 267.” The products were packaged between late July and September. The USDA says any products still in people’s freezers should be thrown away.
The following products are subject to recall: Products List (PDF); Product Labels (PDF only).
These items were shipped to a retail locations and institutions nationwide.
Currently the USDA has declared this a Class I Recall, noting the health risk is high.
After FSIS Recall 085-2018 on Oct. 4, 2018, USDA, CDC, and state public health and agriculture partners continued to investigate the outbreak of Salmonella Newport illnesses.
The epidemiological investigation has identified 246 confirmed case-patients from 26 states with illness onset dates ranging from July 26 to Sept. 7, 2018. An additional 16 case-patients have provided receipts or shopper card numbers for the product traceback investigations.
Specific traceback for three case-patients have identified JBS Tolleson, Inc., EST. 267 ground beef products that were not part of the Oct. 4 recall.
In general the USDA and their public health partners, including the Centers for Disease Control and Prevention and state public health officials, said no one should be eating partially cooked or raw meat and that salmonella is prevalent and can be present in raw poultry or meat.
They said no raw poultry or meat is sterile so officials recommend always cooking the meat to a safe internal temperature as the cooking process kills the salmonella.
Health officials urge all consumers to safely prepare their raw meat products, including fresh and frozen, and only consume ground beef that has been cooked to a temperature of 160°F.
Other cuts of beef should be cooked to a temperature of 145 °F and allowed to rest for at least 3 minutes.
The only way to confirm that ground beef or other cuts of beef are cooked to a temperature high enough to kill harmful bacteria is to use a food thermometer that measures internal temperature.
Consumers with questions regarding the recall can contact the JBS USA Consumer Hotline at 800-727-2333.
The Associated Press contributed to this report.
|
<urn:uuid:05f35d6e-e9af-47b9-a61d-b6f04102ab40>
|
CC-MAIN-2023-14
|
https://wydaily.com/news/local/2018/12/04/got-beef-better-check-your-freezers-and-throw-away-the-product-if-its-part-of-this-recall/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00565.warc.gz
|
en
| 0.950294
| 528
| 2.640625
| 3
|
Thomas More (1477/78-1535) Author of, as well as character within, Utopia. More was a prominent English Humanist, writer, lawyer, and high official of the British Crown, attaining the position of Lord Chancellor at the end of his life (and Saint thereafter). He was beheaded on the charge of treason for refusing to sanction King Henry VIII’s divorce and expedient split from the Catholic Church. More »
Peter Giles (1486-1533) Flemish friend to Thomas More, and character in More’s Utopia. Giles, or Pieter Gillis as he was born, was a well known Humanist and printer in Antwerp. He contributed the Utopian alphabet, verses in the Utopian tongue, and probably the marginalia in Utopia. More »
Raphael Hythloday (1516 to the present) A traveler who discovered the island of Utopia and narrates Book II of Utopia. Hythloday, or Hythlodaeus as it appeared in the original Latin, is derived from the Greek word for “nonsense” or “idle talk,” while his Christian name, Raphael, recalls the archangel who gives sight to the blind.
Guillaume Budé (1467-1540) A well-known French Humanist scholar who provided a commendation for the 1517 and 1518 editions of Utopia. More »
Jerome de Busleyden (1470-1517) A Dutch Humanist, statesmen and patron of learning, as well as friend of More and Erasmus, who provided multiple commendations for Utopia. More »
John Desmarais (?–1526) A noted Latin scholar and teacher of oratory at the University of Louvain and friend of Erasmus. Also known as Jean Desmarez, he wrote a commendation printed in the 1516 and 1517 editions of Utopia.
Erasmus (1466-1536) A prominent Dutch Humanist scholar, translator, theologian, priest and friend of More’s. Erasmus–or Desiderius Erasmus of Rotterdam as he was also known– helped assemble commendations for Utopia, as well as supplying one of his own. He may also have contributed to the marginalia. More »
Gerard Geldenhouwer (1482-1542) A Dutch professor of history and theology who oversaw the first printing of Utopia and also contributed a short poem to the volume. More »
Cornelius Graphey (1482-1558) Also known as Cornelius Grapheus, Schreiber or de Schrijver, Graphey was a distinguished poet in Latin, and friend of Giles and Erasmus. He composed a short set of verses for Utopia.
Beatus Rhenanus (1485-1547) A printer, scholar, religious reformer and Humanist, friend to the popular Erasmus, and active in Johann Froben’s publishing business in Basel, where the two 1518 editions of Utopia were printed. Rhenanus supervised these printings and contributed his own dedication. More »
|
<urn:uuid:c09dac21-0f49-4037-801d-3df6d615709f>
|
CC-MAIN-2023-14
|
https://theopenutopia.org/full-text/cast-of-contributors/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00565.warc.gz
|
en
| 0.948739
| 675
| 3.09375
| 3
|
You are looking for information on the topic “using 2 states to insert the records”. toamdautien.com will gather information to answer your questions in this article. Please read this article to the end to find the information you want to see. You can also check out some other related articles here: toamdautien.com/blog INSERT ALL SQL, OUTPUT inserted in SQL Server, SQL check exists before insert, Create insert statement from select, Insert 2 table SQL, Db2 insert into SELECT, Append SQL query, Insert into sql multiple rows from select.
View information about the using 2 states to insert the records
Information about this question
- Question: using 2 states to insert the records
- Time: Asked 43 minute ago
- Modified: Asked 55 days ago
- View: 1966
using 2 states to insert the records
Assuming you’re referring to inserting records into a database table using two states, here’s an example of how you could do it in Python:
# Define a function to create the database table
conn = sqlite3.connect(‘mydatabase.db’)
c = conn.cursor()
c.execute(‘CREATE TABLE IF NOT EXISTS mytable (id INTEGER PRIMARY KEY, name TEXT)’)
# Define a function to insert records into the database table
def insert_record(state, data):
conn = sqlite3.connect(‘mydatabase.db’)
c = conn.cursor()
if state == 1:
c.execute(‘INSERT INTO mytable (name) VALUES (?)’, (data,))
elif state == 2:
c.execute(‘INSERT INTO mytable (id, name) VALUES (?, ?)’, data)
# Create the database table
# Insert records into the database table using state 1
# Insert records into the database table using state 2
insert_record(2, (4, ‘Jack’))
insert_record(2, (5, ‘Jill’))
insert_record(2, (6, ‘Joe’))
In this example, we’re using SQLite to create and interact with the database table. We define two functions:
create_table() to create the table if it doesn’t already exist, and
insert_record(state, data) to insert records into the table using one of two states.
state is 1, we insert a record without specifying an ID, and when
state is 2, we insert a record with a specified ID. The
data parameter is either a single value for state 1 or a tuple containing the ID and name for state 2.
You can modify this example to work with other databases or adjust it to fit your specific needs.
Watch videos related to “using 2 states to insert the records”
How to insert records to your Microsoft SQL Server database using Python
How to insert data from two different tables in SQL?
To insert data from two different tables in SQL, you can use the INSERT INTO…SELECT statement. This statement allows you to insert data from one or more tables into another table.
Here’s an example of how to insert data from two different tables:
INSERT INTO table1 (column1, column2, column3)
SELECT column1, column2, column3
In this example, we’re inserting data from table2 into table1. The column names in the SELECT statement should match the column names in the INSERT INTO statement. You can also specify specific columns to insert into by listing them in the INSERT INTO statement, and selecting the corresponding columns from table2 in the SELECT statement.
Note that the data types and sizes of the columns in both tables should match, or you may encounter errors during the insertion process.
How to insert data into 2 tables in single query SQL?
It is not possible to insert data into two tables in a single SQL query. You will need to execute separate INSERT statements for each table.
However, you can use transactions to ensure the data is inserted into both tables atomically. A transaction is a sequence of SQL statements that are treated as a single unit of work. If any of the statements in the transaction fail, the entire transaction is rolled back, and the database is left in its previous state.
Here’s an example of how to use transactions to insert data into two tables:
INSERT INTO table1 (column1, column2) VALUES ('value1', 'value2');
INSERT INTO table2 (column1, column2) VALUES ('value3', 'value4');
In this example, the statements between
BEGIN TRANSACTION and
COMMIT are treated as a single unit of work. If either of the INSERT statements fails, the transaction will be rolled back, and the data will not be inserted into either table.
Which clause is used to combine records from two tables?
The clause used to combine records from two tables is called the “JOIN” clause. The JOIN clause is used to combine data from two or more tables in a relational database based on a related column between them.
There are different types of JOIN clauses, including INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL OUTER JOIN. Each of these types of JOIN clauses performs a different type of join operation, allowing you to retrieve different sets of data from the tables.
Images related to using 2 states to insert the records
Found 27 using 2 states to insert the records related images.
You can see some more information related to using 2 states to insert the records here
- SQL Query to find records belongs to two states – Stack Overflow
- INSERT INTO SELECT statement overview and examples
- Insert records from multiple tables in MySQL – Tutorialspoint
- Insert multiple values into multiple tables using a single statement in …
- SQL Joins – W3Schools
- INSERT INTO Statement: How to Insert Into Table – SQLCourse
- Updating Objects in State – React Docs Beta
- 184.108.40.206 INSERT … ON DUPLICATE KEY UPDATE Statement
- How To Manage State in React with Redux | DigitalOcean
There are a total of 723 comments on this question.
- 848 comments are great
- 784 great comments
- 227 normal comments
- 56 bad comments
- 50 very bad comments
So you have finished reading the article on the topic using 2 states to insert the records. If you found this article useful, please share it with others. Thank you very much.
|
<urn:uuid:fd25f035-bc98-4d33-b31b-d4fca4243e38>
|
CC-MAIN-2023-14
|
https://toamdautien.com/using-2-states-to-insert-the-records/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00565.warc.gz
|
en
| 0.75402
| 1,512
| 2.984375
| 3
|
The Southeast Asian collections at the Oriental Museum reflect the many varied cultures of this area.
The Museum is home to collections from almost every country that makes up the region. The objects range from ceramics to textiles, as well as musical instruments, wood carvings, lacquerware, and arms and armour.
Highlights from the collection include:
- Headhunting swords used by the Iban people of Borneo
- An exquisite Burmese manuscript chest covered in gold lacquer
- Objects relating to the Cambodian royal family, saved from destruction by the Khmer Rouge.
The core of the collections was donated by the Rt Hon Malcolm MacDonald. After World War II, MacDonald served as Governor General of Malaya and Singapore and later as Commissioner General for Southeast Asia. During this time, he amassed a considerable collection of fascinating objects. MacDonald recognised the vital role that art and culture could play in international diplomacy, and many of the objects in the collection were presented to him by key political figures in the region at that time.
Complementing this is the Roberts Collection of Balinese Art. This substantial collection of woodcarving, sculpture and paintings from the island of Bali provides a picture of the changes in artistic practice on the island during the 20th century, as Balinese artists and craftspeople responded to the growth of international tourism. The Stemson collection of ceramics includes more than 100 pieces from across Southeast Asia, ranging in date from prehistory to the 20th century.
More recently, the Museum has actively engaged in collecting contemporary Vietnamese material to support an exhibition created in early 2015. In addition, generous donations from Mr Colin and Mrs Joy Glendenning and the missionary Father David Bingham have also helped to increase our collections from Malaysia and Indonesia.
|
<urn:uuid:7cb5cd2d-7dba-4c94-8266-f74ed5616a7e>
|
CC-MAIN-2023-14
|
https://www.durham.ac.uk/things-to-do/venues/oriental-museum/about-our-collections/southeast-asia/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00565.warc.gz
|
en
| 0.953744
| 371
| 2.65625
| 3
|
Think you’re good at classic arcade games such as Space Invaders, Breakout and Pong? Think again.
In a groundbreaking paper published today in Nature, a team of researchers led by DeepMind co-founder Demis Hassabis reported developing a deep neural network that was able to learn to play such games at an expert level.
What makes this achievement all the more impressive is that the program was not given any background knowledge about the games. It just had access to the score and the pixels on the screen.
It didn’t know about bats, balls, lasers or any of the other things we humans need to know about in order to play the games.
But by playing lots and lots of games many times over, the computer learnt first how to play, and then how to play well.
A machine that learns from scratch
This is the latest in a series of breakthroughs in deep learning, one of the hottest topics today in artificial intelligence (AI).
Actually, DeepMind isn’t the first such success at playing games. Twenty years ago a computer program known as TD-Gammon learnt to play backgammon at a super-human level also using a neural network.
But TD-Gammon never did so well at similar games such as chess, Go or checkers (draughts).
In a few years time, though, you’re likely to see such deep learning in your Google search results. Early last year, inspired by results like these, Google bought DeepMind for a reported UK£500 million.
Many other technology companies are spending big in this space.
Baidu, the “Chinese Google”, set up the Institute of Deep Learning and hired experts such as Stanford University professor Andrew Ng.
Facebook has set up its Artificial Intelligence Research Lab which is led by another deep learning expert, Yann LeCun.
And more recently Twitter acquired Madbits, another deep learning startup.
What is the secret sauce behind deep learning?
Geoffrey Hinton is one of the pioneers in this area, and is another recent Google hire. In an inspiring keynote talk at last month’s annual meeting of the Association for the Advancement of Artificial Intelligence, he outlined three main reasons for these recent breakthroughs
First, lots of Central Processing Units (CPUs). These are not the sort of neural networks you can train at home. It takes thousands of CPUs to train the many layers of these networks. This requires some serious computing power.
In fact, a lot of progress is being made using the raw horse power of Graphics Processing Units (GPUs), the super fast chips that power graphics engines in the very same arcade games.
Second, lots of data. The deep neural network plays the arcade game millions of times.
Third, a couple of nifty tricks for speeding up the learning such as training a collection of networks rather than a single one. Think the wisdom of crowds.
What will deep learning be good for?
Despite all the excitement though about deep learning technologies there are some limitations over what it can do.
Deep learning appears to be good for low level tasks that we do without much thinking. Recognising a cat in a picture, understanding some speech on the phone or playing an arcade game like an expert.
These are all tasks we have “compiled” down into our own marvellous neural networks.
Cutting through the hype, it’s much less clear if deep learning will be so good at high level reasoning. This includes proving difficult mathematical theorems, optimising a complex supply chain or scheduling all the planes in an airline.
Where next for deep learning?
Deep learning is sure to turn up in a browser or smartphone near you before too long. We will see products such as a super smart Siri that simplifies your life by predicting your next desire.
But I suspect there will eventually be a deep learning backlash in a few years time when we run into the limitations of this technology. Especially if more deep learning startups sell for hundreds of millions of dollars. It will be hard to meet the expectations that all these dollars entail.
Nevertheless, deep learning looks set to be another piece of the AI jigsaw. Putting these and other pieces together will see much of what we humans do replicated by computers.
If you want to hear more about the future of AI, I invite you to the Next Big Thing Summit in Melbourne on April 21, 2015. This is part of the two-day CONNECT conference taking place in the Victorian capital.
Along with AI experts such as Sebastian Thrun and Rodney Brooks, I will be trying to predict where all of this is taking us.
And if you’re feeling nostaglic and want to try your hand out at one of these games, go to Google Images and search for “atari breakout” (or follow this link). You’ll get a browser version of the Atari classic to play.
And once you’re an expert at Breakout, you might want to head to Atari’s arcade website.
|
<urn:uuid:72c061b0-092a-4055-af65-d31affc1f02a>
|
CC-MAIN-2023-14
|
http://theconversation.com/machines-master-classic-video-games-without-being-told-the-rules-37985
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00565.warc.gz
|
en
| 0.941203
| 1,045
| 2.765625
| 3
|
The human gastrointestinal (GI) tract is estimated to house 100 trillion microorganisms, encoding some 3 million genes; producing thousands of metabolites. The genetic information within these organisms, or the microbiome, can significantly impact the host's health. But, to what extent can diet influence the microbiome?
Image Credit: Alpha Tauri 3D Graphics/Shutterstock.com
The role of gut microbes in human health and disease has been the focus of much research in the past decade. The forces influencing the structure and composition of the gut microbe communities, or microbiota, have been of particular interest. Several factors, including dietary habits, can influence this complex ecosystem.
Sequencing the genome of microbiota and documenting the diversity of different communities in relation to the host diet provides detail on the role of microbes in the gut. Utilizing a database of KEGG orthologs and operational taxonomic units (OTU), it is possible to define the communities of gut microbes with particular molecular functions.
The Gut Microbiota of a Herbivore vs. a Carnivore
The structure and function of the microbial ecosystem can be influenced by diet content and quantity. When comparing the microbiome of a carnivore and herbivore, a clear distinction lies in amino acid metabolism. Adapting to their host diet, microbiota are thought to provide enzymes to aid the chemical breakdown of diet-derived substrates. Perhaps unsurprisingly, the degradative pathways of 9 amino acids have been enriched in carnivores.
On the opposite end of the spectrum, Lachnospiraceae are seen to be negatively correlated with protein intake. This family of core human gut microbiota colonizes from birth, fluctuating in terms of species diversity and abundance during the host's life. The relative abundance of Lachnospiraceae in the microbiota has also been positively associated with vegetable intake.
Gut Microbes Communicate with G-protein-coupled receptors (GPCRs)
Fermentation of diet-derived fiber by members of the Lachnospiraceae family produces short-chain fatty acids (SCFA) that can communicate with the host. These SCFAs can influence processes such as nutrient uptake and metabolism, as well as pathogen propagation and host immunity. Comprising 58 genera, as well as several unclassified strains, members of the Lachnospiraceae family co-metabolize dietary components with the host to produce various beneficial metabolites and signaling molecules.
Acetate, propionate, and butyrate are amongst the main SCFAs produced by the gut microbiota. Acting as signaling molecules, these metabolites bind GPCRs. When expressed in the pancreatic β-cells, SCFA activation of receptors GPR43/FFA2 and GPR41/FFA3 has been associated with cell proliferation, survival, and function.
SCFA levels in the gut of diabetic individuals
The production of propionate and acetate in microbiota has been associated with differential modulation of insulin secretion. Activating FFA2 by propionate and acetate can activate G protein α subunits, pertussis toxin (PTX)-sensitive Gαi, or PTX-insensitive Gαq. Gαi activation leads to changes in intracellular cAMP levels, resulting in decreased insulin secretion. On the other hand, activation of Gαq activates PLC to hydrolyze PIP2 to DAG and IP3, with consequent activation of protein kinase C (PKC) and release of Ca2+ (respectively) amplifying insulin release.
Several disease states have identified deficiencies in the host-microbe co-production of SCFAs in the gut. In individuals with type 1 diabetes (T1D), the gut microbiota undergoes a shift. The altered microbiota produces a decreased level of butyrate, thought to be involved in increased intestinal permeability. In cases of T1D and pre-diabetes, clinic onset is seen to succeed in heightened gut permeability.
Microbiotic diversity and health
Shifts in microbiota can alter the production of metabolites by changing the composition and structure of the ecosystems within it. Altering the diversity of microbiota is seen to influence the host's health. Lower diversity is associated with various conditions, including obesity and metabolic disorders.
Long-term dietary patterns are able to influence the composition and function of gut microbiota. The microbiota profile of individuals with vegan and vegetarian diets is shown to have a greater profusion of beneficial bacteria than omnivores. Interestingly, the microbiome of those with vegan and vegetarian diets is also significantly associated with lower occurrence and abundance of antimicrobial resistance genes than omnivores.
Image Credit: New Africa/Shutterstock.com
The influence of diet and culture
Gut microbiota can be influenced by diet, culture, and genetics. The gut microbiota of individuals from non-western communities, where natural fiber and starch intake is higher, is often dominated by Prevotella. In inflammatory arthritis and multiple sclerosis cases, Prevotella was found to provide effective anti-inflammatory influences. For those from western society, Bacteroides ten to dominate gut microbiota. This microbe species has been associated with providing antimicrobial resistance to variant antibiotics.
Gut microbial ecosystems play a vital role in the production of various signaling molecules. The structure and composition of microbiota in the gut directly influences their function, with environmental factors often altering the communities in terms of bacterial species' type, number, and consistency. The shift in microbiota resulting from long-term dietary changes can alter the metabolites produced. The degree to which these metabolites contribute to human health is the topic of ongoing research.
- Palmas, V., et al. (2021) Gut microbiota markers associated with obesity and overweight in Italian adults. Sci Rep. doi.org/10.1038/s41598-021-84928-w
- Vacca, M., et al. (2020) The Controversial Role of Human Gut Lachnospiraceae. Microorganisms. doi:10.3390/microorganisms8040573
- Patterson, E., et al. (2016) Gut microbiota, obesity and diabetes. Postgraduate Medical Journal, 92, pp. 286-300.
- Liu, J.L., et al. (2020) Controversial Roles of Gut Microbiota-Derived Short-Chain Fatty Acids (SCFAs) on Pancreatic β-Cell Growth and Insulin Secretion. Int J Mol Sci. doi:10.3390/ijms21030910
- Matsumoto, N., et al. (2021) Relationship between Nutrient Intake and Human Gut Microbiota in Monozygotic Twins. Medicina (Kaunas). doi:10.3390/medicina57030275
- Sakkas, H., et al. (2020) Nutritional Status and the Influence of the Vegan Diet on the Gut Microbiota and Human Health. Medicina (Kaunas). doi:10.3390/medicina56020088
- Valdes, A.M., et al. (2018) Role of the gut microbiota in nutrition and health. BMJ. doi:10.1136/bmj.k2179
- Brody, H. (2020) The gut microbiome. Nature. https://doi.org/10.1038/d41586-020-00194-2
|
<urn:uuid:80466b8a-dfed-419b-bcb1-47d083192dd1>
|
CC-MAIN-2023-14
|
https://www.azolifesciences.com/article/Effect-of-Food-on-the-Gut-Microbiome.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00565.warc.gz
|
en
| 0.865061
| 1,530
| 3.890625
| 4
|
Various methods of embedding music in a Web page have become popular since the early days of the World Wide Web. Notably, the "embed" tag in HTML, Java-based audio players and Flash-based players are all possible options for adding background music to a Web page, but no one solution has been universally embraced or is fully compatible with all browsers and platforms. The newer HTML5 standard includes the "audio" tag, which is specifically defined for embedded audio playback.
Add the following code anywhere in the body of your HTML document to embed a music file and play it automatically when a visitor browses your website.
Video of the Day
Change the "src" attribute so that it contains the path and filename of the music file that you want to embed.
Add the "loop" attribute if you want the music file to play over and over:
Use multiple "source" tags instead of the "src" attribute of the "audio" tag if you want to offer the user's browser a choice of multiple file formats:
In this example, the user's browser will decide whether to play the MP3 file or the OGG file. This technique can be useful for targeting mobile devices that can only play certain audio formats.
Nest the "embed" tag within the "audio" tag to provide support for older browsers that lack HTML5 support. Note that this use of the "embed" tag is deprecated (meaning it's no longer officially required to be supported), so only experiment with this technique if you suspect your users will be using outdated Web browsers. Here is an example:
|
<urn:uuid:c9a4b1f7-56a6-4084-bab0-8f447fac4e4c>
|
CC-MAIN-2023-14
|
https://www.techwalla.com/articles/how-to-add-a-background-html-music-code
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00565.warc.gz
|
en
| 0.874937
| 336
| 2.5625
| 3
|
The Rubbish Entrepreneur
Zero Waste is a concept which may seem completely unrealistic to many, a philosophy of redesigning the consumption style and the life cycle of resources so that all waste is reused, nothing is thrown away or discarded. While it is quite uncommon in our societies, there are some working examples of people living this way already, proving that it can be done! The idea of unusable waste is a purely human one, we only need to look out of our windows to be inspired by nature's natural Zero Waste cycles, reusing and recycling everything.
This activity explores how we can make use of the materials that are commonly thrown away as waste, through a process called ‘Upcycling’. Upcycling adds value to an object or material that would otherwise be thought of as worthless, this can be done through combining it with other ‘waste’ or even just finding a new use for it without much modification! Making a bag from an old bike tire, creating art from old vinyl records,using ‘scrap’ building materials to build furniture and turning organic waste into fertilizer are all examples of ‘Upcycling’.
Now it is time to be creative! Time to turn so-called waste into something useful!
Individual / Experiential
It can take a few hours or a few days
To change our relationship to and redefine our definition of resources and waste, seeing the potential beauty in what was otherwise thought of as useless
Required Materials and Tools:
Tools to create and repair
Get inspired! Either individually or in a group, do some research online, read some articles, watch some videos to find some examples of Upcycling that make you feel inspired. Feel free to use the resources provided under the Resources section below.
Visit some local recycling centres, dumps or scrap yards, have a look around to find things you can use to upcycle. Feel free to come up with your own ideas or just copy something cool you found in your research. [Note: It is always a good idea to check with where you are going, there are often different rules about what you can take for free etc. Remember you can always just use ‘rubbish’ from your own or friend’s and families’ homes/work.]
Now it’s time to create! Even if you have decided to copy something you found online, it is encouraged to allow yourself to be creative and make your creation personal to you! Remember it is always favorable to work in a team and if you get stuck, feel free to look through the resources again and alter your idea as you go! Especially the first time round, this may take quite a while, but in the end hopefully you will have something to be very proud of.
Once done, take the time for reflection. Was there any part of the process that could have been more efficient? How will you do it differently next time?
Reflect on the questions: “Can I use ‘up-cycling’ in my work? “Can it be a job or business in its own right?” Debate the answer with yourself or in your group. Think who could need the object and how they would use it. How much would it potentially cost or what could it be exchanged for?
Movie: Waste Land (2010)
Look up 3R principles (Reduce - Reuse - Recycle)
Why do we need to recycle and upcycle?
What was the most astonishing aspect of the process?
Do you know somebody having upcycling as their job?
Do you think it is a useful skill to make new things from waste materials?
Instructions for submission
Upload 1 photo of your creation and submit a promotion text on it in Moodle (so that your peers can give you feedback). The promotion text on your creation should explain why other people should buy it. Instructions on how to upload photos and how to submit things in Moodle can be found here: Instructions on Submission&Uploading
Instructions for assessment
Provide feedback to at least one participant that has done this activity. Instructions on providing feedback can be found here: Instructions on Feedback
Tried an activity? Give us feedback!
|
<urn:uuid:6c8b25ae-6202-4f5f-8150-104406f2ce84>
|
CC-MAIN-2023-14
|
https://bridgedale360.gen-europe.org/mod/forum/view.php?id=42
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00565.warc.gz
|
en
| 0.945001
| 899
| 3.75
| 4
|
Selection of the strongest
Researchers from Northwestern University have developed a new method of selecting immune cells for a quick and effective fight against cancer, which led to a sharp reduction in tumors in mice compared to known methods of immunotherapy. Using a new microfluidic device that can be created on a 3D printer, the group multiplied, sorted and collected hundreds of millions of active cells.
Using the tissues of one's own body to treat diseases helps to reduce undesirable effects and the risk of rejection, and many methods in regenerative medicine and cancer treatment have become widespread in clinical practice. But the problem is that due to the complexity of cell selection, such therapy has limited indications and works in a very small number of patients.
The researchers' attention was focused on tumor-infiltrating lymphocytes (tumor–infiltrating lymphocytes, TIL) - immune cells capable of penetrating tumor tissue and directly attacking cancer cells. But for the cell therapy of tumors used today in clinical practice, a mixture of "depleted" and "inexperienced" cells is used. After taking a patient's tumor sample, TIL are out of the body for a long time, and by the time they are ready to return, many of them are exhausted and have lost the ability to fight.
Selection of the best fighters
Using a new technology of microfluidic affinity for infiltrating cells (microfluidic affinity targeting of infiltrating cells, MATIC), researchers can accurately identify and sort the most active cells that can then be introduced into the body.
The tunable microfluidic device can effectively restore powerful TIL from solid tumors using specific levels of marker expression on the surface of target cells. The device, surrounded by magnets, uses a magnetic field and fluid resistance forces to sort cells pre-labeled with magnetic nanoparticles with antibodies for target markers. Compared to conventional cell sorting, immunomagnetic sorting restored 30 times the amount of TIL, and also made it possible to identify and isolate powerful TIL subpopulations that are specific to tumors, self-repair and are necessary for the long-term effect of cell therapy.
In this study, scientists tested MATIC on mouse models. The size of tumors in animals decreased dramatically, and in some mice they completely disappeared, which led to a significant improvement in survival rates compared to traditional methods of cell therapy.
Reproducible and affordable technology
The new technology is easily reproducible, in hospital conditions, you can use a 3D printer to create a device. This will make cell therapy closer to patients and significantly reduce treatment costs and, ultimately, increase survival.
Now the authors are working on creating a device for searching for TIL in blood samples, which will eliminate the need for sampling a tumor fragment to prepare for cell therapy.
Article Z.Wang et al. Efficient recovery of potential tumour-infiltrating lymphocytes through quantitative immunomagnetic cell sorting is published in Nature Biomedical Engineering.
Aminat Adzhieva, portal "Eternal Youth" http://vechnayamolodost.ru based on the materials of Northwestern University: Tumors dramatically shrink with new approach to cell therapy.
|
<urn:uuid:acbeee20-8989-4ec7-a2a2-df1a32c15f0d>
|
CC-MAIN-2023-14
|
https://vechnayamolodost.ru/en/articles/cellular-technologies/selection-of-the-strongest/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949689.58/warc/CC-MAIN-20230331210803-20230401000803-00565.warc.gz
|
en
| 0.934719
| 658
| 3.296875
| 3
|
Two doses of the Pfizer or AstraZeneca vaccine against COVID-19 are about as effective against the delta variant strain of the new coronavirus, which is highly contagious, as it was against the previous dominant alpha variant, according to a study published yesterday. .
The study, published in the New England Health Inspectorate, confirms findings briefly released in May by the UK Public Health System on the effectiveness of Pfizer-BioNTech COVID-19 vaccines and Oxford-AstraZeneca-based vaccines. in real conditions.
Yesterday's research found that two doses of the Pfizer vaccine were 88% effective in preventing the disease with symptoms from the Delta strain, compared with 93.7% against the Alpha strain, with the data being in broad lines approximately the same as those previously published.
Both doses of the AstraZeneca vaccine are 67% effective against the Delta variant, with this percentage being increased by the 60% protection initially reported. The same vaccine is 74.5% effective against the variant Alpha strain, compared to the initial estimate of 66% efficacy.
“Only limited differences in vaccine efficacy were found for the Delta variant strain compared to the alpha variant strain after receiving two doses of the vaccine,” the UK Health System researchers wrote in the same study.
Data from Israel have shown that the Pfizer vaccine is less effective against symptomatic illness, although protection against severe symptoms remains high. The UK Health System has previously announced that the first dose of any of these two vaccines is approximately 33% effective against the disease with symptoms from the delta strain.
The full study published yesterday found that one dose of the Pfizer vaccine is 36% effective, while one dose of the AstraZeneca vaccine is about 30% effective. “Our findings on reduced efficacy after the first dose will support efforts to optimize the intake of two doses among vulnerable groups within the transmissibility of the Delta variant strain,” according to the study participants.
|
<urn:uuid:dbf3b1fb-4bea-40a8-bad9-f4b5a4e56c7b>
|
CC-MAIN-2023-14
|
https://cyprus-digest.com/pfizer-astrazeneca-two-doses-of-vaccine-effective-against-delta-strains-according-to-research/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00565.warc.gz
|
en
| 0.966547
| 403
| 2.640625
| 3
|
Alan’s mother died.
Lara walks her daughter, Lucy, to class on the first day of kindergarten.
Sharon and Scott celebrate their 50th wedding anniversary.
Events of our lives trigger human emotions.
They are the stuff stories are made of, and it is up to authors to use the right words, phrases, descriptions so that our readers will experience these events with all of the emotion as if they were right there, encountering them firsthand.
Authors do this in many different ways:
- By providing appropriate settings- Perhaps using darker lighting, wind/rain, eerie sounds in instances of sadness such as death, defeat/loss of some sort, suspense, and so on. Light, sunshine, puffy clouds, a gentle breeze for scenes of romance, birth, success, etc.
- By providing appropriate sounds- Such as laughter, wind chimes, birds singing for happier scenes; screams, heavy breathing, howling for more suspenseful ones.
- By providing describing appropriate ‘touch’- Gripping, pounding, scraping are more emotionally charged for suspense; soft touch, patting, tender reassurances for more restful scenes.
- By using certain colors- Light pastels are more restful; red, orange, black are often used for scenes with more action… tenseness.
5. Other things that can be varied, depending upon the purpose of a scene are: smell, facial expression, voice, vocabulary, description of the characters’ bodies (tense shoulders…) Even teeth—and especially eye descriptions—add add to the overall emotional feelings of each scene.
Emotions are all about the senses, so everything you would feel, see, hear—and the resulting tastes/sounds/smells (and I’m not talking about popcorn) on a movie screen is fair game for authors.
A quickened pulse or heartbeat… a churning stomach…
A good book to get you started toward creating an emotional journey for your reader is: The Emotion Thesaurus by Angela Ackerman and Becca Puglisi.
|
<urn:uuid:dab3e691-71e4-44cf-a994-e6a31fbc94cf>
|
CC-MAIN-2023-14
|
https://brendapoulos.org/tag/sounds/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00765.warc.gz
|
en
| 0.900833
| 429
| 2.9375
| 3
|
A few decades ago, dental patients only had removable dentures as an option for replacing missing teeth. However, dental implants have recently increased in popularity, and by performing CT scans, dentists now have an easier way to find out which patients are eligible for this treatment.
Dental implants can replace single or multiple missing teeth. They are comprised of artificial tooth roots typically made from titanium alloys and placed in the jawbone; these implants are later covered with a tooth-like cap made from dental porcelain. This procedure is possible through the process of osseointegration, where the jawbone is capable of healing around the metal implant to make it a permanent fixture in the patient’s mouth.
The procedure for dental implants has an overall 96% success rate, according to most sources, and the treatment provides the appearance and experience of a patient’s natural teeth. Before recent improvements in dental implant technology, though, this type of treatment was made difficult if the implant was not placed properly within the jawbone.
Advancements in dental implant surgery are now allowing for greater success rates when dentists perform a CT scan before the procedure. CT scans let dentists know which patients have an adequate amount of bone in the jaw necessary to support dental implants, so those with unhealthy jaws and gum tissue may receive alternative treatments.
A CT scan, or computerized tomography, combines computerized processing with a series of X-rays of a patient taken from multiple angles to create a cross-sectional image of the bones in a patient’s body. Dental surgeons can use these images to construct three-dimensional computer models of a patient’s teeth to determine where the implants should go.
Although CT scans have made it easy for dentists to perform this procedure, patients need to be aware of the treatment’s details. Most importantly, dental implants are a form of surgery, and dentists must follow precautions up front to ensure that a patient will have a successful treatment, such as performing a necessary exam and CT scan.
Additionally, many dental implant procedures can take up to eight to 10 months to complete because each tooth being replaced will receive its own implant and crown. However, there are similar treatments available with reduced healing time, and these may not require as many implants or will use less invasive implants.
One option is to receive six-month dental implants, which only place four implants throughout a patient’s jaw to be covered by multiple crowns. An alternative treatment is the use of mini dental implants, sometimes known as teeth in a day or subperiosteal implants, which sit on the bone rather than inside the jaw and are acceptable for patients whose jaws will not accept traditional implants.
Patients seeking dental implants should be sure to find a dentist who can recommend the correct procedure for replacing missing or decayed teeth. Above all, patients should expect a CT scan beforehand to ensure that they receive the correct treatment.
|
<urn:uuid:889c8a92-922b-4592-8e4c-30465efbc812>
|
CC-MAIN-2023-14
|
https://horseshoebendchamber.com/ct-scans-alternative-treatments-now-letting-more-patients-have-dental-implants/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00765.warc.gz
|
en
| 0.940791
| 600
| 3.125
| 3
|
HLT 312V Week 2 & Week 3 Complete Latest
HLT-312v Week 2 Discussion 1
Analyze the health care status of a specific minority group. Choose a particular minority group that is represented in the United States and compare its health status to the national average. What is the current health status of this minority group? What barriers to treatment and health care exist? How does race, socioeconomic status, or gender determine the quality of health care in the United States?
HLT-312v Week 2 Discussion 2
What is HIPAA and how has this affected health care? What rights to privacy should patients have?
HLT-312v Week 3 Discussion 1
Discuss the pros and cons of having “designer babies.” In what ways might this become a social, economic, class, racial, or prejudicial system? Will it truly improve society? How does the issue of cloning impact the future of reproduction?
HLT-312v Week 3 Discussion 2
What ethical issues surround embryonic stem-cell research? Should the president have limited federal stem-cell research? Are other alternatives such as adult stem cell and placenta as effective? Why or why not?
HLT-312v Week 3 Assignment – Patient Advocacy and Autonomy
Read “The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research” (1979): http://www.hhs.gov/ohrp/humansubjects/guidance/belmont.html
Write a 1,250-1,500 word paper that addresses the significance of autonomy, patient advocacy, and informed consent. Your paper should include:
1. A description of the concepts of autonomy, patient advocacy, and informed consent.
2. A discussion of the Nuremberg Code and the Declaration of Helsinki and a summary of the events that led up to the development of ethical guidelines for conducting human clinical trials, including Institutional Review Boards (IRB).
3. Three examples of ways “The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research” works to protect special populations (e.g., minors, prisoners, persons with mental illness).
A minimum of three references are required.
Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are required to submit this assignment to Turnitin. Please refer to the directions in the Student Success Center.
Find out more here: HLT 312V Week 4 Complete Latest.
|
<urn:uuid:349879a9-be06-49e2-b19a-f1185e761f13>
|
CC-MAIN-2023-14
|
https://assignmentwritingpro.com/hlt-312v-week-2-and-week-3-complete-latest/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.74/warc/CC-MAIN-20230322180852-20230322210852-00765.warc.gz
|
en
| 0.892642
| 566
| 2.578125
| 3
|
Pwning Binary With Nx And Aslr Protections Enabled
Hola people, today lets try to pwn a binary which has NX/DEP protection and the machine has ASLR enabled. I have written a simple C program which utilizes the vulnerable function gets to read the user input. The user input is read into the variable ‘a’ which is an array of 20 characters.
When we run the file command on the compiled binary we see that its a 64 bit ELF and is not stipped which means that the debugging symbols are enabled. And the checksec command tells that only the Non executable stack protection (NX) is enabled which means that we can’t just put shellcode on the stack and execute it. If we try to do it, we will end up in a segmentation fault.
Let’s run the binary and see what it does. It just ask for the user input and then prints out “Thanks!”.
Now let’s test whether we have a buffer overflow or not (even though we know it exists).
And yes! we received a ‘Segmentation fault’ which means that we are trying to read/write to some part of the memory where we don’t have permission for it.
So, we can find the offset until which we can fill out junk data and whatever is sent after it will overwrite the return address. Let’s use gdb to find the offset.
We create a cyclic pattern of 100 characters in length and input that to our vulnerable binary.
The offset is at 40. So, we can fill up junk until 40 character and after which the return address will be modified by data specified by the attacker. Now we have the control of the instruction pointer.
We also see that ASLR is enabled on the server which is why libc’s base address gets changed everytime when we run the ldd command on the vulnerable binary.
So, we can try to leak the real address of one of the functions in libc library so that we can calculate the libc’s base address and even call other libc function just by knowing their base address. Isn’t that cool!! We use Return Oriented Programming (ROP) method in this post to bypass the NX/DEP protection. It is one of the best attacks which you can use to break NX protection. From the source code of the vulnerable program we see that puts and gets are the libc function that are called. So, we can try to leak the real address of puts from the Global Offset Table (GOT) and then use that address to calcuate the libc’s base address. For that we need to understand what is PLT and GOT. You can read more about it here.
For now, i will quickly explain what do they do. Before a function from the dynamically linked library gets called, its real address is unknown. So, when it is first called, there is a slow lookup function called Procedural Linkage Table (PLT) which will calculate the real address of that function and updates it in the GOT. So, we leverage this activity and try to leak the real address of that function.
Lets get into some action now. We will identify the PLT address for the puts function using the
From the PLT address of the puts fuction we can try to find out the GOT entry for puts.
So here the address of the GOT entry for puts is 0x601018. If we try to see what value is present in that location, we see that it is pointing back to the next instruction of the PLT. This is before the real address of puts function is calcuated. We can see later how the real address get populated in the GOT entry when we start executing the vulnerable binary.
You can also see the PLT and GOT memory regions using the command
info files in the gdb.
Now, lets see how the real address gets populated in the GOT. We set a breakpoint before and after the calling the puts function.
If we execute the binary, we hit our first breakpoint. Now, lets check the contents of GOT entry for the puts function. We see still its pointing to the next instruction of PLT.
Lets continue executing and then we hit our second breakpoint. Now it is populated with the real address of the puts function after it gets executed.
Now, lets try to leak this address using the ROP gadgets. The gadgets in the ROP are simple the sequence of assembly level instruction which we can leverage to alter the flow of execution of the program. As we all know, in the 64-bit calling convension, the arguments for a function are first populated in the registers and then the function gets called. So, the sequence of registers that store the paramters are RDI, RSI, RDX, RCX etc. So the address of the first, second, third and fourth arguments of a functions will be populated into the RDI, RSI, RDX, RCX etc.
We can use the program called ROPgadget to find the required gadgets.
pop rdi; ret gadget so that, the first argument for the function will be popped into RDI and then the ret instruction will tell the CPU to jump to RSP which intern executes the function that is pointed by RSP. Lets get the PLT entry for the main function so that we can call it again to continue our exploitation. If we just call the main function once, it is waste to leak the address of puts as the libc will be loaded to new address everytime our vulnerable binary gets executed.
Now, lets use the pwntools utility to craft a simple exploit to leak the real address of puts. This is how the exploit look.
When we execute it we leak the real address of the puts function in libc.
So, after that we tweak the exploit code to display the leaked address in a nice hex value.
After executing the exploit, we see the leaked real address of puts in hex.
We can calculate the real address where the libc is loaded from the leaked address of puts using some simple calcuations. We also can calculate real addresses of other functions using the same. First we have to identify the offset of the puts function in the libc library. We can use
readelf command to read the symbols and to display their offset in libc library. We also need the offset of the system function and the string “/bin/sh” so we can try to spawn a shell. strings command can help to identify the offset of the string “/bin/sh” in libc.
Now, we calculate the base and real addresses using the below formula:
libc_base_address = leaked_real_puts_address - offset_of_puts
real_system_address = libc_base_address + offset_of_system
real_bin_sh_address = libc_base_address + offset_of_bin_sh
So, here is the overall exploit to pwn the binary and spawn a shell.
So, when we execute the exploit, it first leaks the real address of puts from the GOT in stage 1 and then calculate the real address of system and “/bin/sh”. Finally it calls the system function with “/bin/sh” as the argument to it using the same
pop rdi; ret gadget.
|
<urn:uuid:b589a6e9-4cdd-4ef8-8620-c97fffd929e7>
|
CC-MAIN-2023-14
|
https://fir3wa1-k3r.github.io/2020/02/13/PWNing-binary-with-NX-and-ASLR-protections-enabled.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.74/warc/CC-MAIN-20230322180852-20230322210852-00765.warc.gz
|
en
| 0.913126
| 1,570
| 2.59375
| 3
|
How long can humans live?
A new study published in the leading journal Nature claims that we have a "maximum limit" on our life span...
Researchers analyzed data from around the world and found that survival declined after age 100. Then, using these demographic data, they pinned 115 years as the natural limit of human aging. As they point out, no one has beaten the record the world's longest living person since the 1990s. You may remember the oldest person on record, Jeanne Calment, who celebrated her 122nd birthday in 1997.
Of course, this isn't the first time scientists have made a prediction that humans can't live longer than a certain age...
In 1928, a researcher used U.S. life-table data to predict that humans around the world could only live up to 64.75 years... At the time, U.S. life expectancy was about 57 years. But he didn't realize that this upper limit had already been surpassed – in New Zealand, women already had a life expectancy of about 66 years of age.
Then in 1990... another researcher asserted that life expectancy should not exceed an additional 35 years after turning 50 – capping maximum age at 85. This level was surpassed by Japanese females in 1996.
In fact, according to a research article in Science magazine, the typical maximum life expectancy prediction has been broken, on average, five years after publication.
Today, the fastest-growing segment of the population in developing countries are folks aged 85 or older, according to the National Institutes of Health. Experts project this segment to grow more than 350% between 2010 and 2050.
According to the National Institute on Aging, the number of people who make it past the age of 100 will keep increasing. It expects this number to rise by more than 1,000% from today through 2050.
That's because of advancements in science. Take Valter Longo, a University of Southern California professor of gerontology (the study of the elderly). He has already upped the life spans of yeast and mice. He has increased their lives to the equivalent of 800 and 150 years, respectively, for humans.
As medical advancements continue, that number could grow even more... even faster. Already, life expectancy is increasing by an average of three months every single year.
So as you can see in the chart below, every four years, people get another year. (The big drop occurred during the 1918 Flu Pandemic.)
It's clear that improvements in the field of medicine already help us live longer, healthier lives than in decades past. That makes it more important to preserve your nest egg... and make sure we're prepared to make it to 100... 120... or longer.
A longer life means you may need your money to last 40-50 years in retirement, not just 20 more.
And in my newsletter, Retirement Millionaire, I covered a way to guarantee that your nest egg will generate income for the rest of your life – no matter how long you live...
This is a tricky investment to understand at first, and the industry is plagued with high-fee, opaque investments... But once you understand the concept, you can be completely insulated against a decline in the market.
I'm talking about annuities.
Annuities are a financial contract between you and an insurance company. In the simplest terms, you pay a large amount up front, then the company pays you back over the following years... either for a fixed number of years or until you die.
When used properly, annuities provide stable income and remarkable peace of mind.
Annuity structures vary in so many aspects that people find them difficult to understand. Many have poor designs and high fees. And annuity sellers often use aggressive sales tactics because they want a commission.
But when used correctly, annuities are a powerful tool to help ensure a secure, comfortable retirement.
The idea of an annuity is to start off retirement with a piece of your nest egg invested in a guaranteed stream of income.
For example, a 60-year-old man can spend $200,000 today and, in return, receive $900 to $950 a month for life. That becomes a total of almost $290,000 in payments by the age of 85. The longer you live, the bigger the return on your investment principal.
Now, this can get more complex based on how much of a payout you want and over what length of time. In the above example, the 60-year-old man chose what's called a "single premium immediate annuity."
But there are many other variations available...
- You could set an annuity to pay for a certain number of years, rather than base it on your anticipated life span.
- You can buy one today but not start collecting income until decades into the future (called a deferred annuity).
- You can earn a guaranteed return or allow it to fluctuate in the market.
- You can avoid paying taxes on your investments.
By selecting, combining, and adjusting these factors (and more), you can tailor the right annuity to your situation.
Current Retirement Millionaire subscribers should read my full September issue on annuities right here, titled Can You Afford a 200th Birthday?.
We also discussed this issue on our monthly podcast, Retirement Millionaire Uncut. Every month in Uncut, I – along with staff, friends, and business contacts – talk about what's going on in the markets... expand on the ideas we've been writing about... and share some important updates and insights with you.
This feature is available only to lifetime members – folks who want to make sure they receive all of our income and retirement advice for a lifetime.
Lifetime members also receive quarterly recommendations from my options-trading newsletter, Retirement Trader. And, of course, you'll have lifetime access to my flagship newsletter, Retirement Millionaire. Click here to learn more about the benefits of lifetime membership.
What We're Reading...
- Behavioral economist Richard Thaler, author of Nudge and Misbehaving, has found that buyers of annuities are assured more annual income for the rest of their lives versus people who self-manage their portfolios... so why don't more people buy them?
- Something different: Bumblebees can get buzzed on sugar.
Here's to our health, wealth, and a great retirement,
Dr. David Eifrig and the Retirement Millionaire Daily Research Team
October 17, 2016
|
<urn:uuid:7091eaac-3813-4c73-9710-411836080463>
|
CC-MAIN-2023-14
|
https://healthandwealthbulletin.com/how-to-guarantee-income-for-the-rest-of-your-life/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945242.64/warc/CC-MAIN-20230324020038-20230324050038-00765.warc.gz
|
en
| 0.951845
| 1,334
| 2.796875
| 3
|
I’m still trying to understand God’s word to the woman in Genesis 3:16, connecting the difficulties of childbirth, the woman’s desire for her man, and her man ruling over her. In the narrative context of Genesis, this connection clearly looks forward to the patriarchal households of Genesis, where a man’s belongings consist in living things (the kind of things listed in the 10th commandment) in an economy where the increase of wealth means the flourishing of living things in the household (the oikos, the Greek root of oikonomia, economics).
To see what is at stake in this patriarchal economy, it helps to see what the alternatives could be. So today I’ll turn to the most deeply imagined alternative in antiquity, which we find in Plato’s Republic. It’s interestingly modern, in all sorts of ways. Plato famously advocates a kind of egalitarianism within the ruling class. Setting aside the lower class (which in Plato’s republic means the rich and all those who are allowed to have private wealth) he aims to produce a ruling class in which all goods are held in common, with women and men sharing the same work and the same education. The aim is to form a city in which as many people as possible “say mine and not mine about the same things in the same way” (Republic 5:462c).
The great obstacle to this project is the family, where parents regard their children as “my own” in a unique and exclusive way. So Plato proposes that women and children are to be possessed in common, “so that no parent will know his own offspring or any child his parent” (Republic 5:457d). As in Genesis, children are the most precious of all possessions, but they belong not to a family or household (oikos) but to the state (polis). In fact there is to be no such thing as a family or household. From infancy children are raised in a state-controlled daycare in which children of the same age are grouped together and “no mother knows her own child” (Republic 460c).
The point of the daycare is to make it very easy for the women in the ruling class to have children (Republic 5:460d). The effect, as Plato realizes, is to minimize the one respect in which women are of a fundamentally different nature than men (Republic 5:454d). There is thus a deep connection between these two points: if all goods are to be fundamentally in common (so that we say “mine” about the same things in the same way) then women must not be allowed to be too different from men. We must make it as easy as possible for women to have children so that they may be as much like men as possible, so that all may share as equally as possible in the same work and the same goods, including the same children.
This is the best light I have found to shed on God’s word to the woman: “I will greatly multiply your pain in childbirth” (Gen. 3:16). It means God does not make it as easy as possible for women to be like men. God evidently wants women to remain other than men, so that greatest blessing comes to women and to men only through an other who is fundamentally different than oneself. In the biblical logic of otherness, each needs the other: women need men (hence “your desire shall be for your husband”) but men also cannot attain the most precious possession of all, the new life of their own children, without taking good care of their wives (which is the proper meaning of “and he shall rule over you”).
It is not good for the man to be alone: he needs an other, someone who is not the same as himself. Hence male and female are deeply other to one another, for the good of one another. This is what a rationalist project like Plato’s misses. The common good requires us not just to be the same, sharing the same work and the same goods, but to be fundamentally other than one another, with an otherness written into our own bodies.
For rationalists like Plato, this fundamental bodily difference within humanity, male and female, is a problem to overcome, not a source of blessing. It generates deep family loyalties that are pre-political and pre-rational, rooted in the bodies of women. Thus the lesson Antigone, with her ineradicable loyalty to her dead brother, tries to teach Creon, the king of Thebes: the power of the city goes only so far; it does not reach all the way into the life of the family or household. Plato, bold as he is, wants us to imagine ignoring Antigone’s lesson in the name of reason and justice. And down to this day, the family poses an obstacle to political projects that reduce the common good to what we can achieve by our own rational planning and legislation.
In Genesis, by contrast, family comes before state, oikos before polis, the economics of human life flourishing in the household before the politics of rational planning for the good of all. To think about God’s word to the woman is to think about how the deepest form of human otherness and difference give shape to human social life, and why this is a good thing.
|
<urn:uuid:a320e192-4937-42a4-9085-069eb95849d4>
|
CC-MAIN-2023-14
|
https://www.firstthings.com/blogs/firstthoughts/2014/01/plato-against-otherness
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945242.64/warc/CC-MAIN-20230324020038-20230324050038-00765.warc.gz
|
en
| 0.966385
| 1,121
| 2.609375
| 3
|
By: Cynthia Uthayakumar, CSC Research Intern & Lizet Vlamings, CSC Advocacy and Research Manager
The universal right to education has a solid basis in international law and is a key component of the United Nation’s 2030 Agenda, centred on leaving no one behind. The goal to get all children, adolescents and youth into education by 2030 has seen rising global enrolment rates reach 82% in 2017, the figure being as high as 91% for primary school aged children. Despite this commendable progress, street children are at risk of being left behind. The numerous societal, practical and health barriers street children face means they are among the millions of the world’s hardest-to-reach children who are unable to attend mainstream schools and face high drop-out rates from formal education programmes.[i]
When data on enrolment rates are gathered, street children not enrolled in school are often not included – as most of the data is gathered through household surveys.[ii] This means they are neither part of the 91% of children in primary school, nor part of the 9% of children not in primary school – they remain invisible altogether.
“Education is the key of life: if you do not have education, you are just like nothing”
– Street child in Harare, Zimbabwe.
Allowing street children to be left behind from efforts improving access to education will only perpetuate their cycle of poverty and the countless human rights violations they face on the streets every day. Providing them with access to education can not only provide safe spaces and security whilst they are on the streets, but also opportunities to move away from the streets and go on to lead happy and healthy adult lives.
It is time to take action to ensure street children no longer remain invisible, and are able to benefit from the efforts towards inclusive and quality education for all. Ensuring they are included in data collection on access to education and progress towards SDG 4 is key in achieving this, as is sharing existing evidence and information on street children’s barriers to education, and best practices in overcoming these barriers. This post highlights some of the key barriers and best practices as collected from the global CSC Network.
Barriers to education for street children
Street children face unique barriers to accessing education that many other children don’t have. Street children are often unable to enrol in formal education due to a lack of legal identification, permanent address or guardian, whilst others who have spent years on the streets are not permitted back in with younger students and struggle to catch up with those their own age. Those who are able to enrol are often faced with marginalisation, stigmatisation and discrimination by their teachers and peers, affecting their wellbeing and performance in class; “at school, we’re told: ‘You don’t belong here’” – street child in Mexico (7-10 years).
The stigmatisation and lack of support within classrooms can cause further harm to already psychologically vulnerable street children who often suffer physical and sexual abuse, exploitation and neglect, sometimes at the hands of those in positions to best protect them such as law enforcement officers.[iii] Abuse, trauma and neglect can have serious, lasting effects on children’s psychological development and health with street children at a disproportionately higher risk of suffering from psychiatric diseases, infectious illnesses and reproductive health issues. These health challenges can negatively implicate street children’s attainment and attendance in schools, indicating the need for an education approach specialised for supporting the psychosocial and health needs of street children.[iv]
“Give us the opportunity to change our story”
– 18-year-old street boy, Rio de Janeiro
Whilst enrolment may be free in many countries, the numerous hidden costs of education such as uniforms and textbooks means that many families and street children simply cannot afford to be in mainstream schools. Moreover, for the many street children who are driven to the streets by poverty, attending schooling would take time away from income generating activities.[v][vi] Whilst no child should have to engage in work that limits their educational opportunities, to stop earning money and attend full-time schooling is simply not realistic for all children, especially when their and their families’ survival depends on it. Many feel proud of their work and feel a sense of duty to contribute to their families.[vii] As one street child in Accra stated: “I have been supporting my younger siblings who go to school, so if I should be removed from the street my siblings are going to lose their education”.[viii] Forcing these children to enrol in full-time formal primary or secondary education may therefore not be beneficial, desirable or sustainable. Their realities must be understood and respected when identifying pathways to education for street children. Approaches allowing a combination of education and work can offer a way to ensure street children have access to education whilst continuing to earn money for their survival.
Best practices in realising street children’s right to education
The many unique barriers street children face to accessing education highlights the importance of tailoring education initiatives to their specific needs. Acknowledging their realities is crucial for the development of education programmes that leave no street child behind. The need to develop alternative inclusive models for street children is clear and governments must work collaboratively with NGOs and street children in order for initiatives to be successful and sustainable.
Many members of the global CSC Network have developed innovative and inclusive education programmes that support street children to enjoy their right to education. These initiatives are exemplary of the approach that must be urgently taken to ensure street children are no longer left behind:
- Mobile School NPO reaches street children where they are with carts on wheels equipped with extendable blackboards, educational materials and trained street workers. By providing education in open accessible spaces in which street children feel safe and accepted, Mobile School NPO is ensuring the children are empowered and self-confident whilst learning.
- S.A.L.V.E. International encourages learning through creative play, showing that street children feel motivated and encouraged, as well as develop a love for education. Creative play also allows the teacher and child to build a stronger relationship through which children feel confident and supported.
- Education can equip street children to break out of the cycle of poverty and lead happy healthy lives as adults, and in recognising this, Bahay Tuluyan’s Independent Living Skills Program supports children in the Philippines to access on-the-job training and learn entrepreneurial skills to transition into formal employment, as well as sponsoring tertiary education.
- In order to ensure retention, Child In Need Institute (CINI) provides after-school coaching support to vulnerable children in India’s slums as well as specialised education packages to bridge children’s learning gaps in ways adapted for their individuality and variations in needs.
- It is important that initiatives do not engage solely with street children but also with schools, parents and the wider community as CHETNA does in India. CHETNA works closely with parents, counselling and encouraging them to participate in their child’s education and supporting them with obstacles they may face in sending their child to school. Meanwhile, Save the Children India works with teachers, training them to use child-friendly and interactive teaching methods, ensuring learning is engaging and fun.
- CESIP provides a variety of learning activities for street-based, working children and adolescents through a mobile development centre called ‘Centro de Desarrollo Integral del Niño, Niña y Adolescentes’ (CDINA) in Peru. The mobile CDINA is installed in public spaces around supply markets where children and adolescents work. Parents, guardians, family members and the community at large see this as a safe learning and recreation space for working children and adolescents, and accept their participation, even if it means they work less.
These initiatives are just some of the approaches that organisations and teams around the world have been implementing in order to ensure street children are included in global education progress. These promising initiatives are not only successful, but sustainable and scalable and with collaborative support and effort, we can ensure that street children are no longer being left behind.
Are you implementing innovative programmes to help street children access an education or want to know more how you can contribute to realising education for all street children? Send us a message at email@example.com.
[i] Natalie Turgut, ‘The Protection and Promotion of Human Rights for Street-Connected Children: Legal, Policy and Practical Strategies for Change’, Briefing Paper (Consortium for Street Children, 2017), https://www.streetchildren.org/resources/cscs-briefing-paper-2017-the-protection-and-promotion-of-human-rights-for-street-connected-children-legal-policy-and-practical-strategies-for-change/.
[ii] UNESCO, ed., ‘Meeting Commitments. Are Countries on Track to Achieve SDG4?’ (Springer Publishing Company, June 2017), https://doi.org/10.1891/9780826190123.0015.
[iii] Sarah Thomas de Benítez, ‘State of the World’s Street Children: Violence’ (London: Consortium for Street Children, 2007).
[iv] Jessica Woan, Jessica Lin, and Colette Auerswald, ‘The Health Status of Street Children and Youth in Low- and Middle-Income Countries: A Systematic Review of the Literature’, Journal of Adolescent Health 53, no. 3 (September 2013): 314-321.e12, https://doi.org/10.1016/j.jadohealth.2013.03.013.
[v] L. Veloso, ‘Child Street Labor in Brazil: Licit and Illicit Economies in the Eyes of Marginalized Youth’, South Atlantic Quarterly 111, no. 4 (1 October 2012): 663–79, https://doi.org/10.1215/00382876-1724129.
[vi] Lonnie Embleton et al., ‘Causes of Child and Youth Homelessness in Developed and Developing Countries: A Systematic Review and Meta-Analysis’, JAMA Pediatrics 170, no. 5 (1 May 2016): 435, https://doi.org/10.1001/jamapediatrics.2016.0156.
[vii] Daniel Gebretsadik, ‘Street Work and the Perceptions of Children: Perspectives from Dilla Town, Southern Ethiopia’, Global Studies of Childhood 7, no. 1 (1 March 2017): 29–37, https://doi.org/10.1177/2043610617694741.
[viii] Consortium for Street Children, ‘Africa Consultation Report for the UN Committee on the Rights of the Child’s General Comment on Children in Street Situations. February – March 2016’, 2016, https://www.streetchildren.org/wp-content/uploads/2016/05/Report-on-Ghana-Zimbabwe-DRC-consultations-April-2016-1.pdf.
|
<urn:uuid:f34e5da4-c405-4b2e-a9a1-24a5440733ce>
|
CC-MAIN-2023-14
|
https://www.streetchildren.org/news-and-updates/realising-street-childrens-right-to-education/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945323.37/warc/CC-MAIN-20230325095252-20230325125252-00765.warc.gz
|
en
| 0.94014
| 2,327
| 3.34375
| 3
|
With summer just around the corner, we all know how harmful the sun’s rays can be for our skin, but did you know they are just as bad for our eyes? While sunglasses are a great fashion accessory, their most important role is to protect our eyes from the sun’s ultraviolet rays. Sunglasses can block UV radiation and reduce your risk for potentially blinding eye diseases and tumors, but they’re also great at preventing dust, sand, and other airborne particles from getting into your eyes.
When going out and looking for the perfect pair of sunglasses, make sure you look for lenses that block out 99 to 100% of both UVA and UVB radiation. By purchasing these sunglasses, you will be able to cut back from squinting which keeps your eyes healthy and your vision sharp. While it’s important to always have your sunglasses on while exposed to sunlight, it is also just as important to have sunglasses on your children as well. Children and teens also need to protect their eyes from the sun. VSP optometrists say we get 75-80% of our UV exposure before we turn 18. It’s especially important that kids wear sunglasses from an early age.
According to the National Eye Institute, some of the sun’s effects on the eyes include:
Cataracts: a clouding of the eye’s lens that can blur vision. An estimated 20% of cases are caused by extended UV exposure.
Macular degeneration: resulting from damage to the retina that destroys central vision. Macular degeneration is the leading cause of blindness in the United States.
Pterygium: a tissue growth over the white part of the surface of the eye that can alter the curve of the eyeball, causing astigmatism.
Just remember, by wearing sunglasses that offer effective protection against harmful UV rays, you can enjoy the outdoors while protecting your eyesight. Laser Locators proudly provides ophthalmologists around the world with the medical equipment needed to correct the damages caused by UV light to our eyes. From lanes to lasers, Laser Locators can provide all the tools for a bright and safe summer.
|
<urn:uuid:30f6c70e-f619-4ed7-8f2c-6bdb91560e92>
|
CC-MAIN-2023-14
|
https://laserlocators.com/importance-sunglasses-eye-health/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00765.warc.gz
|
en
| 0.951604
| 442
| 3
| 3
|
Across the country, thermometers are rising into previously unimagined realms. It’s been a summer of record-setting heat across Europe and the United States, including California. Climatologists don’t expect them to be record highs for long.
“At this point in the state of California, there are some places where just by mid-century we're expecting about a third of the year to be over 100 degrees. And that's going to be sort of the new normal,” says V. Kelly Turner, director of Urban Environment Research at UCLA’s Luskin Center for Innovation and assistant professor at the UCLA Luskin School of Public Affairs. Turner co-leads a multidisciplinary, Pritzker Family Foundation-funded UCLA project called Heat Resilient L.A.
Turner is focused on the issue of extreme heat, and how we can address the looming crisis.
“Protecting people from extreme heat will require a coordinated and well-researched government approach,” Turner said. “This is especially crucial for advancing equity and reducing the disproportionate effect heat has on people of color and low-income communities.”
What extreme heat looks like
Extreme heat, by government definition, is “a period of high heat and humidity with temperatures above 90 degrees for at least two to three days.” If it feels like this is happening more already, it is; studies show that heat waves have been increasing since the 1960s, and that they’re hotter and lasting longer.
The problem is more than a nuisance or inconvenience. As multiple studies have found, extreme heat affects health and well-being in both acute and chronic ways, from premature births to lower test scores, decreases in productivity and increases in violent crime, and increased risk of heatstroke among children and the elderly. The impacts disproportionately affect poor and minority communities.
Humans can only deal with so much heat. When high heat combines with humidity and other factors, the human body has a harder time lowering its own internal temperature through sweat. Without sufficient time to recover from extreme heat, people can face major health issues, including heatstroke and organ failure. Extreme heat claims more lives than any other type of weather event in the United States. It is a silent killer that, if anything, is undercounted.
► Learn how to stay safe in a heat wave
Where the problem is now — and where we’re heading
To try to understand the thermal burden someone is experiencing, Turner favors a measure of temperature called mean radiant temperature, which factors in heat, humidity, and importantly, heat radiating off of nearby surfaces and direct solar exposure. The temperature in front of a sunny window, for example, is much hotter than it would be in a room facing away from the sun. A cool floor can help bring down the mean radiant temperature, helping someone better cope with heat.
Extreme heat most dramatically affects people in cities, where temperatures can be significantly higher than outlying rural communities. This is a function of how cities — where 80 percent of the U.S. population lives — are built. Surfaces like black asphalt capture and radiate out heat, making hot conditions even hotter in urban regions. They can also keep cities from cooling down at night. City surface temperatures can be 22 degrees Fahrenheit higher than surrounding rural areas overnight, Turner says.
A lack of shade in broad swaths of urban areas adds to the heat burden, making it harder for people to find relief. Shade can make a big difference during extreme heat events — it can change how the human body experiences heat by as much as 50 degrees Fahrenheit, according to Turner’s close colleague and Arizona State University professor Ariane Middel. Places where heat is condensed in cities can often be the places we most want to use; one such area Turner found in a study of Los Angeles neighborhoods, a giant, glowing red spot on a satellite image, was a middle school, where artificial turf had the hottest surface temperature.
The neighborhoods in cities most dramatically affected by extreme heat are areas with the fewest resources to mitigate it: A study from UC Davis found that California’s poorest neighborhoods were sometimes 5 degrees hotter than the wealthiest ones. Wealthier neighborhoods tend to have more trees, more grass — natural features that cool the environment — more shade, and more AC.
With temperatures ticking ever higher due to climate change, extreme heat in the U.S. is a crisis.
“I would not say it is hyperbole to call heat the greatest environmental and equity challenge facing California today,” Turner says.
Cooling down our cities and our citizens
In Northern parts of the United States, cities have plans for snow and blizzards. In the coastal United States, urban planners dedicate resources to protecting communities from hurricanes and flooding. Extreme heat needs that same kind of focused attention, Turner and others say.
As with all weather-related problems, there is no one simple solution. But coordinated steps can have a real impact — a study by Turner’s UCLA colleague and Heat Resilient L.A. co-leader David Eisenmann found that cooling neighborhoods down by adding trees and vegetation and using more reflective outdoor materials could save up to nearly one in four lives currently lost to heat waves, and delay climate change-induced warming by approximately 40-70 years.
Turner places solutions to our rising heat problem in a few buckets.
We need to rethink how we build our cities, Turner says. Environmental concerns need to be a primary, not secondary concern in real estate development. And buildings can be required to use cool roof and cool wall technology.
In Los Angeles, one project reducing heat in cities is Cool Streets LA. It focuses on the hottest and most-vulnerable neighborhoods in the city by planting 2,000 trees and adding 60 miles of cool pavement, using various special materials, including one known as CoolSeal. Originally developed by the military, CoolSeal was designed to keep spy planes cool and hide them from infrared cameras. The city reports that these cool pavements can lower surface temperatures by as much as 10 degrees on a summer afternoon.
Cool pavement technology helps cool down the neighborhood as a whole, but it must be applied across a large enough surface area to offset the radiant heat created by its reflection of sunlight. Turner and her colleagues are studying how best to do this, and new surface materials are coming onto the market that intend to minimize this penalty.
Another bucket of heat mitigation strategy is better protecting people when they’re outside, primarily by providing shade and producing more shade infrastructure. Adding tree cover can provide much needed shade and help naturally cool the air. But it doesn’t work everywhere. Urban planners should consider how to bring shade to areas like bus shelters, school playgrounds and other highly trafficked areas that need it.
“My team looked at municipal plans from the 50 largest cities in the U.S., and we found that the overwhelming majority don't even include shade in any of their heat planning documents,” Turner says. “And if they do, they only include trees. But we know that built structures are a vital source of shade. In fact, they can be more efficient shade producers, and they're especially important in arid cities where we have huge water tradeoffs that are salient, and in vulnerable neighborhoods where you might need shade now and you don't have time to wait for a tree to mature enough to produce any shade.”
Finally, there is one very important thing we can do to help people survive extreme heat: ensuring that our most vulnerable communities have access to cooling, particularly in their own homes. While it is illegal to rent an apartment in California that doesn’t provide heat, there are no standards that require adequate cooling. The state Legislature could soon take up the issue. Cooling will likely need to be subsidized; in neighborhoods most brutally affected by extreme heat and most lacking mitigating infrastructure, AC can become prohibitively expensive, forcing people to make a choice between cooling their bodies and other essential needs.
California, and Los Angeles in particular, are already taking coordinated steps forward, Turner says. Cities and states need heat officers to coordinate action to help the wide range of people affected by extreme heat, from farmworkers vulnerable to heatstroke to kids playing in middle schools to seniors in their homes.
“This is a matter of giving people a quality of life,” says Turner.
Top photo: iStock/LPETTET
|
<urn:uuid:6c35fb1b-5b1b-42a0-9371-653a954deed2>
|
CC-MAIN-2023-14
|
https://universityofcalifornia.edu/news/heat-waves-arent-going-away-heres-how-we-can-prepare
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00765.warc.gz
|
en
| 0.952517
| 1,748
| 3.25
| 3
|
Over the past several years, I’ve studied the role of trust in massive social and environmental crises and two remarkable events stand out from the pack: the BP Oil Spill (Deepwater Horizon) and the Chilean Mine Rescue.
By comparing these events, it’s easy to see how corporate culture influences crisis management. Moreover because the crises occurred in different hemispheres and required the help of experts from a variety of different backgrounds, their comparison illuminates the role of culture more broadly.
In fact, social norms affect how citizens, companies, and governments organize to solve some of the most daunting humanitarian and environmental crises on our planet. Comparing these two specific events reveals how in the U.S. and more specifically–inside BP’s corporate hierarchy, culture clearly hindered progress. However in Chile, culture enabled one of the most successful rescue missions ever.
Culture in the Spotlight
During times of great turbulence, the truth often rises to the surface. Extreme stress drives people and organizations into a state of decision-making that Nobel laureate Daniel Kahneman refers to as “System One,” in his book Thinking Fast and Slow. This impulsive and emotional state of decision-making is common when people are under stress, lacking sleep, and anxious. Therefore, the things people do and say everyday, their habits or automatic reactions, take over. And in poor ethics and values cultures , these default behaviors are not suitable for public scrutiny.
In many respects, Tony Hayward, BP’s former CEO, is now an iconic example of how unhealthy cultures produce incapable leaders. John Bell, the former CEO of Jacobs Suchard, which is now part of Kraft Foods, adeptly describes Mr. Hayward’s failures on his blog:
The entire world was touched by the most environmentally destructive crisis of all time – BP’s oil spill in the Gulf. Everyone watched as CEO Tony Hayward made blunder after blunder while BP’s crude killed. Three weeks after the explosion, Hayward called the spill “relatively tiny” in comparison with the size of the ocean – 6 weeks later he said he’d like his life back, and 6 weeks after that, BP’s shell-shocked Board finally put him out of his misery.
As details emerged in the months and years following the incident, it became clear that Mr. Haward’s actions reflected the company’s culture at the time. It was later revealed that BP had never created an actual crisis management plan for the rig. During the drilling, managers had ignored warning signals, preferring instead to stay on schedule. And, Transocean later claimed that BP intentionally concealed the rate of oil flowing from the Macando well during the first months of the spill. These are all examples of culture. As Elizabeth Hass Edersheim described in the Harvard Business Review:
Culture is an organization’s operating system, the values that everyone lives by. In the case of BP, the culture didn’t work effectively and now its failure is on full display.”
Quite remarkably, it’s the positive side of culture that made the Chilean Mine Rescue such a triumphant success. Whereas BP sought to control information and scientific discovery during the crisis, the Chilean Mine Rescue benefited from specialists and technology from around the world. Through a masterfully coordinated effort, the relatively poor and technically inferior nation succeeded in saving all 33 men in almost 20 days less time than it took BP to shut down the Macando well.
Commonalities between BP and Chile
At first glance, these events seem to have little in common, but when you dig a little deeper, some fascinating insights emerge. Both events occurred in environments where businesses have little or no experience solving problems: thousands of feet under water and rock. Successful leadership depended on deep technical expertise and on-the-spot innovations, including the development of new technology. And, as Mr. Bell referenced above, both events were watched by the world.
While one was an environmental crisis and the other a humanitarian crisis, both directly resulted from business actions. This is an important distinction from natural disasters, which tend to elicit greater levels of sympathy and contribution from businesses and civic groups. A man-made event, however, is often steeped in resentment and anger, at least here in the U.S.
Cultural differences have enormous influence
The differences between how these crisis responses were orchestrated are compelling. With the BP disaster, research reveals constant argument and battles for control between business, government, and technical experts. According to a report from Scientific American:
Scientist fought scientist in the battle over whether to proceed with an established way to plug the leak, the so-called “top kill” operation. Nobel Prize winning physicist and U.S. Secretary of Energy Steven Chu remained unconvinced of BP’s technical case, whereas geologist by training Tony Hayward, CEO of the British oil major, felt it had as much as a 70 percent chance of success.
By contrast, the Chilean rescue effort benefited from an almost seamless coordination of effort between specialists, including NASA and drilling experts from a dozen or so countries. From the outset, the country’s newly elected president, Sebastian Pinera assumed control of the rescue and assembled a leadership team of experts from several different companies. Andre Sougarret, a mining engineer with crisis experience was handpicked to lead the rescue.
Three Harvard researchers: Faaiza Rashid, Amy C. Edmondson, and Herman B. Leonard published a case study called: “Leadership Lessons from the Chilean Mine Rescue,” which details Mr. Sougarret’s remarkable leadership techniques and his ability to balance technical knowledge with collaborative and empowering team-building. His adept leadership skills almost certainly are responsible for the miners’ safe passage to the surface after 68 grueling days underground.
The Chilean rescue effort
- As many as three different teams drilled at the same time, using different technologies and different tactics. These were known as plans A, B, and C.
- The teams sought technical knowledge and ideas from organizations such as the United Parcel Service and the Chilean Navy.
- The teams also welcomed help from those that offered it, such as Maptek, an Australian 3-D mapping software company.
- Mr. Sougarret “created a psychologically safe environment, never blaming anyone and always focusing on the learning generated by failure.”
- Innovation occurred frequently, experimentation was welcomed, and learnings were quickly absorbed by the full team.
One of the most remarkable aspects of the HBR case study by Rashid et al. is their focus on iterative decision-making. In the U.S. very few organizational cultures are accepting of iterative design and implementation processes. The basic structure of organizations is not conducive to this level of agility. Ms. Rashid and her team explain this clearly,
It isn’t easy for leaders to make the shift to an iterative process; most cultures and systems will stifle their attempts. . . Executives will have to shed the deeply embedded beliefs that important business challenges and opportunities are well defined.
Cultural Comparison: At-a-glance
photo credit: Deepwater Horizon Response via photopin cc
|
<urn:uuid:b76d6219-e720-428d-b12f-536d565de580>
|
CC-MAIN-2023-14
|
https://www.kelliecummings.com/massive-crises-put-culture-on-display/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00765.warc.gz
|
en
| 0.960721
| 1,495
| 2.53125
| 3
|
We do not wait for you to get sick first. We are focused on preventative technolgoies that can predict disease before it takes hold.
Full Spectrum testing considers many different types of factors, including gene testing, family history, lifestyle, medications, heart function, blood markers, etc to assist in determining your possible disease risk, and how best to prevent that disease based your own personal biological profile.You might think about Full Spectrum testing if:
1. You value a future insight into your biology.
2.You would like to understand your biological age.
3.There may be a hereditary condition that runs in your family.
4.You may have an infant that is affected by serious problems with growth, development or their health.
5.You or your partner have been exposed to toxins, chemicals, complex compounds of unknown origin
6.You are pregnant or have recently had a newborn baby to ensure there are no rare genetic conditions passed down. We can perform a reduced form of Full Spectrum diagnostics on your baby.
7.You have been exposed to drugs or radiation that could cause genetic aberrations.
8.Most genetic tests are either mouth swabs, finger prick
Knowledge: knowing and understanding your unique biology allows for a tailor-made solution for your health and longevity (pre-emptive solutions). If we determine that you are at risk of a specific condition, we can begin preventative therapies to ensure that your risk of developing that condition remains low. What are the risks of Full Spectrum testing?
The risks of not knowing your biology far outweigh the risks of doing Full Spectrum testing. If you are destined for a disease, Full Spectrum testing has a high chance of finding it before it takes hold, and our research panel will offer preventative actions you can take. Preventative action is always the preferred action. Tests are not covered by Government Departments as our partner labs are international and those departments rarely pay for predictive testing where there is no current disease. Full Spectrum testing is usually bundled and more cost efficient than purchasing multiple genetic tests independently due to our partnerships.
Many genetic testing companies only look at specific factors of the genome, however many other factors for longevity and disease need to be considered.
How long does testing take? From signing the engagement letter, testing and report generation takes approximately six months. There are usually only four appointments you will need to attend early on, we do the rest.
Full Spectrum testing is the most comprehensive way to seek out impending disease, however due to random mutations that happen after the testing, or mutations that are not seen in the samples we collect, it is always possible that something may be missed. However not looking for biological threats is the biggest risk of all. Yearly testing should also increase your chances of detection to an even higher level. Gene testing is complex, and it can be difficult to tell how a minor change inside a gene will affect each person. Some testing may be performed more than once to ensure accuracy of testing. In the exceedingly rare event that a repeat test is required, that cost is passed onto the client.
Full Spectrum testing is not covered by Government Medical Rebates or Private Health Insurance, and this is only because this type of analysis is not yet recognized as a medical importance.
|
<urn:uuid:714426c8-6508-4a2b-a12a-0cdeeb9c451c>
|
CC-MAIN-2023-14
|
http://fullspectrumbiologics.life/About.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00765.warc.gz
|
en
| 0.954458
| 664
| 2.765625
| 3
|
Today was the unit 3 assessment about activities for level 1. I was excited to see what they could do, but I could feel their fear when they entered. They knew the assessment expected them to give more information than the previous. Some were giving up before they even started. I switched up my lesson plans and did a little game called “Pasa la tabla” (Pass the board) to ease their nerves.
I put students in groups of 4. Each group had one dry erase board, marker and eraser. I let them use notes this time. Next time we play, I will not let them. I showed them the above rules on the board. To start a round, I showed them a picture and started the 3 minute timer. They had to create one really long sentence based on the picture. After each person wrote ONE word, they had to pass it to the next person.
Example board (I wrote this example. The student boards had errors, but that’s acceptable at a novice proficiency level.):
When I called time, one person from each team brought the boards up to me. This board earned 19 points (one point for each word). If a word was hard to understand, I did not give a point. On the chalkboard, we kept a running tally of their scores. I sent them back and I showed another picture. Sometimes I added that they had to include a negative form or use a specific word like “favorite”.
After we finished (about 5 rounds), we talked about why we played that game. They realized it was about making detailed sentences. NOW they were ready for the assessment! Here’s an assessment that is showing Novice High characteristics:
Ivonne R. showed me this cool Datexx Miracle Cube Timer. You flip the box to the show the amount of time you want on the top and the timer starts. I will be purchasing one of these! I need a quick way to keep track of time during games and activities.
I like using this on-line timer/count down. You can set any time. Perfect for short speaking assessments, timed free writes or anything for that matter.
This is an awesome idea! I am going to use this on Monday! And I love seeing an example of your student work, it could have been from one of my students. I still struggle internally with the change from a book-based, grammar-focused, vocab sheet-filled classroom, it’s good for me to see that I’m right where I should be. Thank you again!
I loved this and wish I’d known about it last week. I’m definitely going to use it ASAP. Btw, there is a Miracle Cuba available for under five minutes I think.
Did you allow the students to talk and tell each other what to write, or did they each have to make the decision of what came next.
I allowed them to do about anything they wanted as long as each person only wrote one word. I did this because I mixed the groups to have mixed proficiency levels. I heard some great talk about “you can write this or that” in the groups which really motivated my “unmotivated” students to try. I think they would have refused to play if they didn’t have that extra help. As they all get stronger, or in my upper level classes, I add the challenge of “no talking!” or “no notes” while they are playing. I would say you know how far to push your students. Just make sure they are having fun while learning!
Kara a really awesome timer for any type of activity or game is the software timer available through KAGAN. It has a huge variety of timers in one package! It’s great!
I asked my kids to write about their classes today. We talked about moving beyond the minimum and different ways to do this. Their paragraphs were amazing! It was really exciting seeing what they could do with the tools I learned from this website. Gracias, gracias, gracias!!!!
I’m using this today! It is so much fun that I’m taking the time during my planning to write about it. I’ve never seen my kids so excited about writing. Even my day dreamers are participating!
This was an awesome activity and very motivating for my students! In our current unit I have learned that the more open ended I make writing activities the more engaged my students are! Thank you for this awesome idea…EVERY student was participating and adding creative ideas to the sentences!
Added a twist….had each group read their own sentence aloud, to count words, then passed sentences to next group to check the count (and thus tricked them into reading more!) Smooth transition from group effort to solo production on paper–no complaining! and only a couple of nonengaged ( I asked them to at least copy the sentence the group had written and they did).
I agree that the allowing them to talk helps and I was not overly strict about the one word becuase some were adding whole phrases ( los lunes or a las 9 or en la primavera!!!!)
Like! I also felt that “smooth transition” to writing alone. It shows the power of group learning!
Used this today….except I use shiny plastic notebooks because I don’t have mini-white boards – cheap alternative! After three rounds my students went from six-word sentences to 20+ words – so proud of them!
What do you mean by “shiny plastic notebooks”?
A friend of mine that teaches French at UMBC, shared this idea with me for inexpensive writing boards:
Get some medium to heavy weight sheet protectors
Line with a piece of paper (I use cardstock for durability)
Cut up squares of felt – one for each sleeve – these are the erasers
Put an eraser (felt) and a dry-erase market in each sleeve.
Instant writing boards!
Don’t forget to remind students that they write on the outside of the sheet protector – some automatically take out the paper/cardstock.
Oops, just saw your comment! I mean three ring binders with the clear plastic cover where you can slide in a sheet of paper.
The sheet protectors are a good idea too!
I just read this idea and really like it. I am wondering if you gave out an award to the winning team? I am always curious if other teachers feel they need to give a concrete award.
I do not give a reward every time we do any “competitive” activity for two reasons. 1. I’d go broke, because we “play” so often. 2. I feel like they should just enjoy the activity (it’s better than a worksheet!). Sometimes I do give a little something, but I will never reward them if they ask. That is a big no-no to me and they will quote me “you never ask for a reward”.
I would rather give a treat when I see something outstanding or a student doing something kind for someone else. These are just my thoughts!
|
<urn:uuid:67e58609-b7f7-4f41-8f29-7ecfa8ace00c>
|
CC-MAIN-2023-14
|
https://www.creativelanguageclass.com/jumping-to-novice-high/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00765.warc.gz
|
en
| 0.9718
| 1,539
| 3.453125
| 3
|
SHARE THE ARTICLE ON
A bubble chart is a type of data visualization in which several circles (bubbles) are shown in a two-dimensional plot. It is a generalization of the scatter plot, with bubbles substituting the dots. A bubble chart is most typically used to display the values of three numeric variables, with each observation’s data represented by a circle (“bubble”), and the horizontal and vertical locations of the bubble displaying the values of two additional variables.
A bubble chart is a form of chart that displays data in three dimensions. Each entity and its triplet (v1, v2, v3) of related data is shown as a disc, with two of the vi values expressed through the disk’s xy position and the third through its size. Bubble charts may help people comprehend social, economic, medical, and scientific linkages.
Bubble charts are a type of scatter plot in which the data points have been replaced with bubbles. “You may use a bubble chart instead of a scatter chart if your data comprises three data series that each contain a set of numbers,” according to Microsoft Office guidelines. The numbers in third data series govern the size of the bubbles.
Each bubble in the bubble chart below represents a nation, its area is proportionate to its population size, the color symbolizes the continent, and the horizontal and vertical positions correspond to GDP per capita and life expectancy, respectively.
Conducting exploratory research seems tricky but an effective guide can help.
It is possible to be misled when using bubbles to represent scalar (one-dimensional) values. The human visual system perceives the size of a disc in terms of its diameter rather than its area. This is why, as the third input element, most charting software requires the radius or diameter of the bubble (after horizontal and vertical axis data). The use of area to scale the size of bubbles can be deceptive.
This scaling problem can lead to significant misinterpretations, especially when the data range has a wide range. And, because many people are unfamiliar with — or do not pause to examine — the problem and its influence on perception, those who are aware of it must often exercise caution when interpreting a bubble chart because they cannot assume that the scale correction was done. It is consequently critical that bubble charts not only be accurately sized, but also clearly labelled, to demonstrate that area, rather than radius or diameter, conveys the data.
The phrase “bubble chart” is also used in architecture to refer to a preliminary architectural design of a plan created using bubbles.
A “bubble chart” in software engineering can refer to a data flow, a data structure, or any other diagram in which entities are represented by circles or bubbles and relationships are represented by links drawn between the circles.
A “bubble chart” in information visualization may refer to a technique in which a collection of numeric numbers is represented by densely packed circles with areas proportionate to the quantities. Unlike a standard bubble chart, such displays do not attribute significance to x- or y-axis positions, instead attempting to pack circles as densely as possible to maximize space use. Fernanda Viegas and Martin Wattenberg invented bubble charts, which have subsequently become a popular way to present data. The New York Times has employed circular packing charts, which are included in popular visualization toolkits such as D3.
Search Engine Marketers can quickly assess the impact of a high Cost Per Click rate on ad position, clicks, and website conversions. A bubble chart will assist in determining whether there have been substantial improvements in these aspects. The size of the bubble will be determined by charting the number of clicks on the x-axis, the cost per ad on the y-axis, and the rise in conversion rate.
Keyword researchers can utilize Word Graphs to assess the density of a specific keyword or hashtag when working on Word Graphs. The Google yearly report of the most searched terms is one example. This information may be turned into a bubble chart, with the most frequently searched terms taking up the greatest space on the globe. This will make it much easily identifiable.
A bubble chart may be used to study the impact of promotions and advertisements on your business. The x-axis should show the number of ads created, the y-axis should show the cost of each ad, and the circle radius should show the money earned.
One common error is to scale the diameters or radii of the points to the values of the third variable. When this type of scaling is used, a point with twice the value of another point will have four times the area, making its value appear much bigger than it is.
Instead, ensure that the regions of the bubbles correspond to the values of the third variable. In the identical case, a point with twice the value of another point should have sqrt(2) = 1.41 times the diameter or radius of the smaller point, so that its area is twice that of the smaller point.
Because overlaps are much simpler to occur when all points have a small size, bubble charts are typically made with transparency on points. This overlapping also implies that the amount of data points that may be plotted while making a plot understandable is limited.
Another suggestion is to put a caption or other key on your plot to indicate how different bubble sizes correlate to different values of your third variable. The tick marks on the axes make it very simple to assess and compare numbers based on horizontal or vertical lengths and locations. A bubble size key serves the same purpose as the tick marks for the third variable.
If you’re thinking about utilizing a bubble chart to communicate information to others, be sure it can show a clear trend by using point size as an indicator of worth. Experiment with the order in which variables are plotted while creating your chart. The two most significant variables or relationships should be placed on the vertical and horizontal axes. Use extra, simpler plots instead of a bubble chart if the third variable does not contribute significantly to the story given by the chart.
If a variable has negative values, it cannot be allocated directly to point size as an encoding: how can a form have a negative area? Negative values require additional information to be encoded into shape size. For example, you may have full circles representing positive values and empty circles representing negative values. You might also have good points in one color and negative points in a unique, other color.
Simple Bubble Chart is the simplest fundamental bubble chart version. In reality, the basic bubble chart is not a subset of the bubble chart. The bubble chart is in its original form.
The labelled bubble chart is similarly quite basic, with few modifications. The difference between this chart and the simple bubble chart is that the bubbles on this chart include labels. These labels serve as stand-ins for legends. They aid in determining the variable each bubble represents. Bubble labelling is only possible when working with a three-variable bubble chart with a small number of data sets, as seen in the figure below. When the dataset is enormous, it normally takes a long time, and the display becomes congested.
This bubble chart variant is utilized when dealing with more than three variables. Colors can be used to assist depict various sets of data.
In this situation, chart shows sphere-like bubbles rather than circle-like bubbles. The third parameter in the dataset determines the radius of the sphere. All of the previous options are also possible with this 3-dimensional bubble chart.
However, using a 3-D bubble chart to show data is not always recommended. This will have an impact on the aesthetic appeal of the bubble chart.
If the two positional variables reflect geographical coordinates (i.e. latitude and longitude), we may create a bubble map by superimposing bubbles over a map in the backdrop. A bubble map is a fascinating extension of the scatter map that can help with the latter’s possible overplotting difficulties. If a scatter map has so many points in a location that the number is difficult to see, we might replace it with a single bubble that indicates the total number of points inside the region.
Packed circle charts (also known as circular packing or bubble clouds) have the appearance of a bubble chart on the surface. While bubbles in a packed circle chart show numerical values or frequencies, this is the sole variable: the bubbles are crowded together in a dense arrangement with no true spatial axis.
A packed circle chart is similar to a bar chart composed of discs in several ways. However, this reveals one of the packed circle chart’s flaws: the unordered bubble sizes make it impossible to obtain accurate numbers or a ranking. Because of their usage of location to encode value, you’ll likely be better off going with a bar chart, lollipop chart, or dot plot to convey information. The one advantage of packed circles is that they can be significantly more compact than presenting each category in a continuous line if there are many groupings to depict. Smaller values, on the other hand, may be grouped into an “other” group to save space in a more traditional chart.
Circular packing is most frequently seen in a hierarchical framework, where smaller circles are packed inside bigger circles to demonstrate how a whole is broken into components at several degrees of division. Even here, the circular shape for proportions is fairly inefficient when compared to other chart types such as the treemap, therefore the circular packing chart’s benefit is firmly in aesthetics rather than functionality.
Bubble charts are without a doubt one of the most difficult yet helpful charts available. Aside from the fact that it can display 3D data, there are several other advantages to utilizing it. Some of the benefits of utilizing this style of chart are as follows:
The bubble charts, as attractive as they are, are far from ideal. Look for the junction of 11.5 percent Net Margin and 2 percent Market Share in the bubble chart below. A larger bubble is covering a smaller one. That is entirely possible. A cursory scan at the chart, on the other hand, may be problematic since we would miss this. Careful color selection might perhaps aid in the discovery of these situations. This also suggests that bubble charts may not be the best option for huge data sets due to too many overlaps.
Furthermore, bubble charts in their most basic form only present a snapshot in time. Time-series analysis must be performed in a unique method. The good news is that Cognos 10 includes sliders. These sliders may be used to go through history and quickly identify changes in the data.
See why 450+ clients trust Voxco!
|
<urn:uuid:fc680e56-1dfd-4887-8aa8-35e7aabf68f5>
|
CC-MAIN-2023-14
|
https://www.voxco.com/blog/bubble-chart/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00765.warc.gz
|
en
| 0.923649
| 2,214
| 4.3125
| 4
|
Alerts: Keeping Current in Your Discipline: Database Alerts
Alerts refer to notifications when something of interest to you has been published in a new journal issue or added to a database or website. Covers basic techniques for setting up alerts (a.k.a. current awareness services).
Very short tutorials - usually 1-5 minutes long.
Specific Database Alert Tutorials
Database alerts can cover thousands of journals while publisher alerts are usually limited to a significantly fewer number of journals.
- Databases are slower to update than publisher websites. Publisher information is sent to database vendors; however, some databases are only updated monthly or quarterly.
- Publisher websites are the first place information is made available. Also, publishers often provide information on research articles while they are still "in press" but databases do not usually include content until after it is officially published.
- Database alerts usually work best for subject alerts or citation alerts. If you want a table of contents alert for a journal - publisher alerts would be more timely.
- Academic Search Premier (EBSCO Databases)To set up an alert - go into one of the EBSCOHost databases and search by subject or publication title. There is a tab on the search screen for Search History/Alerts. Click on Save Searches/Alerts. The next screen will ask you to sign in. If you have not yet registered with EBSCOHost, click on I'm a new user and follow the directions for setting up an account. This is a free service, but requires you to register in order for them to set up an automatic alert with your email address.
- ACM Digital LibraryNon-members and the general public can search/browse the ACM Digital Library,
- BioOneOffers new issue e-alerts, citation alerts, and saved search alerts. This database provides access to an aggregation of high impact bioscience research journals. BioOne is made up of three separate collections, all of which are included in the University's subscription. The subject areas covered by this database include Agriculture, Dairy & Animal Science, Agronomy, Biochemistry & Molecular Biology, Biodiversity Conservation, Biology, Biophysics, Cell Biology, Developmental Biology, Ecology, Education, Engineering, Entomology, Environmental Sciences, Evolutionary Biology, Fisheries, Forestry, Genetics & Heredity, Geography, Geology, Geosciences, Limnology, Marine & Freshwater Biology, Microbiology, Ornithology, Paleontology, Parasitology, Plant Sciences, Public/Environmental/Occupational Health, Radiology, Nuclear Medicine & Medical Imaging, Reproductive Biology, Sport Sciences, Veterinary Sciences, and Zoology.
- CQ ResearcherGives reports providing analysis and commentary on current and controversial issues in the news. Topics covered include health, social trends, criminal justice, international affairs, education, the environment, technology, and the economy. Log in and create a profile to receive email alerts and save your searches. Also available via twitter.
- Dissertations and Theses Full-TextProvides access to millions of searchable citations to dissertations and theses from around the world, available from 1861 to the present day. The database offers the full text for most of the dissertations added since 1997 and retrospective full-text coverage for many older graduate works. Over a million of these dissertations are available for download in PDF format, and over 2.1 million are available for purchase as printed copies. Run the desired search from either the Basic or the Advanced page. On the Results page, click Set Up Alert. You will see the Set up Your Search Alert page. Complete the required information and click Save.
- Engineering VillageTo obtain your FREE personal account, please register. Your account will allow you to save searches, save records, and create email alerts. Provides access to the content of two databases from Engineering Village, Compendex and Inspec. Compendex is a bibliographic database of engineering research which contains over ten million references and abstracts taken from over 6,000 scholarly journals, trade magazines, conference proceedings and technical papers. Inspec is a bibliographic database providing access to scientific literature in electrical engineering, electronics, physics, control engineering, information technology, communications, computers, computing, and manufacturing and production engineering.
- Project MuseThis database provides access to the full text of over 400 scholarly peer reviewed journals by over 100 publishers in the humanities and social sciences. Alerts are available via RSS feeds or email. Follow Project Muse on Facebook or Twitter. The link to set up alerts is found under Tools.
- Proquest DatabasesOn the My Research Tab, select the Alerts subtab, and then click the Manage My Alerts link.
You see the ProQuest Alerts - Login page.
- PubMedPubMed, a service of the National Library of Medicine, includes over 22 million citations for biomedical articles back to the 1950's. These citations are from MEDLINE and additional life science journals. PubMed includes links to many sites providing full-text articles and other related resources.Type a search into the box. When the results display - next to the search box will be an orange RSS button.
- Sage Premier JournalsOver 645 titles from more than 245 scholarly and professional societies are included. Subjects covered by these journals include business, humanities, social sciences, science, technology, medicine, and more. Coverage varies by title, and the collection is updated regularly with new or changing content. Go to the My Tools tab and register.
- Science.govSearches over 60 databases and over 2,200 selected websites, offering 200 million pages of U.S. government science information. ALERTS is a service that will notify you weekly of new Science.gov information in your specific areas of interest. Register for the service and then sign up for topic(s) which will be matched automatically against each new weekly update. You will receive an ALERT email each Monday. Open access to the public.
- Scitation(Physical sciences and engineering). Use the Browse feature to see the journals Scitation covers, then click on specific journal titles and look for the link to email alerts or RSS feeds. Some journals have this under "interactive features." Sign up journal by journal - OR - create your own dynamic RSS feed.
- ScopusGo to My Alerts to register for an account to be able to set up alerts.
- Wiley Online Library JournalsRegister on Wiley Online Library to receive email alerts for new content and saved searches; save articles, publications and searches to your profile; purchase individual articles and chapters; receive email updates and promotional offers on Wiley books and journals relevant to you; track your accepted article if you are a journal contributor.
- WorldCatWorldCat's search covers over 30 million records of any type of material cataloged by OCLC member libraries, including manuscripts written as early as the 11th century. Has holdings information for many US and some foreign libraries. Does not offer Alerts, but provides a Saved Search service. To set up a saved search, click on My Account and follow the directions for registering. Once you have completed a search you wish to save, look directly below the My Account link and you will see a link to Save Search.
|
<urn:uuid:3a43de81-79fd-4447-9cc6-b3e56cc227c3>
|
CC-MAIN-2023-14
|
https://campusguides.lib.utah.edu/c.php?g=160395&p=1052011
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949355.52/warc/CC-MAIN-20230330163823-20230330193823-00765.warc.gz
|
en
| 0.872569
| 1,498
| 2.59375
| 3
|
Very early on in the development of the immunotherapy drugs called checkpoint inhibitors doctors realized that melanoma and lung cancer have something important in common. These cancers were the first shown to respond to checkpoint inhibitors. Both tend to have a lot of DNA mutations. Tumors with an elevated number of mutations are referred to as having a high tumor mutational burden (TMB).
Researchers from Memorial Sloan Kettering have conducted a wide-ranging study to find out if the relationship between high TMB and a positive response to checkpoint inhibitor drugs holds across other cancers. Their findings were recently published in Nature Genetics.
“Based on observations in lung cancer and melanoma, experts in the field have made the assumption that the association between mutation burden and immunotherapy response is true for all cancers,” says surgeon-scientist Luc Morris, one of the three senior authors on the paper. “Until now, however, it hasn’t been well studied. Our study asked if TMB has value as a predictive biomarker across all cancers.”
The investigators confirmed that TMB is predictive across many cancer types. They also noted that people with high-TMB tumors who were treated with immunotherapy lived longer compared with those who had high-TMB tumors and got other kinds of treatment. And importantly, they determined that what is considered a high level of TMB varies depending on the type of tumor. This is a critical question that needed to be answered before using this information when caring for patients.
Bringing Tumors Out of Hiding
The relationship between a high TMB and response to immunotherapy was first demonstrated in two groundbreaking studies from MSK researchers. One, published in 2014 by physician-scientists Timothy Chan and Jedd Wolchok, reported the connection in melanoma. Another study the following year from Dr. Chan and then MSK researcher Naiyer Rizvi reported the same relationship between immunotherapy response and high TMB in non-small cell lung cancer.
The connection made sense. DNA mutations lead to the production of altered proteins that the immune system is able to recognize as foreign. The more mutated proteins a tumor has, the more likely it is that the immune system will attack the cancer, and that drugs that promote an immune response, such as checkpoint inhibitors, will be successful in eliminating it.
For melanoma, the high number of mutations results from exposure to the sun’s damaging UV rays. For some lung cancers, bladder cancers, and head and neck cancers — for which immunotherapy drugs often work well — the high TMB may be due to carcinogens in tobacco.
Using Data to Confirm a Long-Standing Assumption
Other cancers also have high TMBs, but these elevated mutation rates tend to appear with less frequency and at varied levels. “The assumption that TMB is a useful predictor of response to checkpoint inhibitors for all types of cancer has not been proven,” Dr. Morris explains. “Until now, we also haven’t known whether this testing is valuable for people who are treated as part of routine care, as opposed to those who were carefully selected for clinical trials.”
The investigators determined that what is considered a high level of TMB varies depending on the type of tumor.
The current study used data from more than 1,600 people who were treated with checkpoint inhibitor drugs at MSK and about 5,300 people who received nonimmune-based treatments. All of the patients had their tumors analyzed with MSK-IMPACT™. The US Food and Drug Administration has authorized this targeted tumor-sequencing assay, which is offered to MSK patients. The test looks for mutations in tumors that can be targeted with drugs and also reports TMB. Results from MSK-IMPACT were anonymously linked with clinical records, allowing researchers to tease out connections between different levels of TMB and drug response.
“The bottom line is that we confirmed that TMB does have predictive value across a range of cancer types,” Dr. Morris says. “We also showed that the predictive value of TMB is dose dependent. This means that the higher the TMB in a person’s cancer, the more likely they are to respond to the drugs.”
But the researchers found that there is not one universal definition for what it means to have a high TMB. For example, having six mutations was considered high in breast cancer and glioblastoma, compared with 31 in melanoma and 52 in colorectal cancer.
A Collaborative Project Focusing on Many Cancer Types
The team was able to conduct such a large, multifaceted project thanks to contributions from 57 researchers from a number of Disease Management Teams. MSK’s Immunogenomics and Precision Oncology Platform (IPOP) and the Marie-Josée and Henry R. Kravis Center for Molecular Oncology (CMO) helped bring together the collaborators and analyze the data.
To further advance this important and growing field of research, all of the data from the study are being made available to other scientists through MSK’s cBioPortal for Cancer Genomics. This will allow scientists at other institutions to use the data to design future trials.
“We are still optimizing the use of TMB as a way to predict response to therapy,” Dr. Morris notes. “We need more research to determine the optimal number of mutations that we should use for each cancer type. We hope that based on our data, researchers will move forward with more clinical studies that will ultimately result in the ability to select the best treatments for people with cancer and allow them to avoid treatments that are unlikely to help them.”
The first author of the Nature Genetics paper is Robert Samstein, a fellow in radiation oncology at MSK. In addition to Dr. Morris, the other senior authors are Dr. Chan, Director of IPOP, and physician-scientist David Solit, Director of the CMO.
|
<urn:uuid:28617ace-e37c-43f6-a143-d6caf3bac320>
|
CC-MAIN-2023-14
|
https://www.sloankettering.edu/news/tumor-mutational-burden-can-help-predict-response-immunotherapy-many-different
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949694.55/warc/CC-MAIN-20230401001704-20230401031704-00765.warc.gz
|
en
| 0.964857
| 1,235
| 2.640625
| 3
|
None put it better than the Great African Statesman & World Leader; Nelson Rolihlahla Madiba Mandela when he posited, “Education is the greatest equalizer, the only bridge between poverty & privilege.” Indeed, he was not far off the mark. The notion of Boarding Schools in the ideal sense was supposed to enable the creation of centres where young men and women are enabled the freedom to learn unencumbered by external influences hence provide them with a conducive environment for the endeavor. In the period prior to the advent of colonialism, missionaries first came to soften the ground as the forerunners. When Johann Ludwig Krapf and Johannes Rebmann landed on our shores they found a people already with an inquisitive attitude and a proactive appetite for learning. Though apprehensive of their new Caucasian guests, they still welcomed them with great warmth. Unbeknownst to most, the two unearthed the reality that the indigenes of Kenya had some primordial access to Western education as far back as before 1730, evidenced by a Swahili manuscript of ‘Utendi wa Tambuka’ a translation of Book of Heraclius – a treatise to the strife-riddled reign of medieval Byzantine Emperor; Heraclius, a contemporary of Prophet Muhammad. Stats for nerds aside, the two Church Missionary Service (CMS) charges interacted favourably with the people of Mombasa & were granted land by the local community to build the earliest mission school in the jurisdiction at Rabai in 1846. Consequent to a buoyant critique from explorers and missionaries, the Imperial British East African Company built a railway from the Coast to Western Kenya that facilitated travel greatly. This was a precursor to the influx of more missionaries, who set up a school in Kaimosi come 1902. In the same year the Prince of Wales school (modern-day Nairobi School) was established. This was the first of many that catered to the interests of the progeny of the burgeoning settler community that took hold of the lands of the British East Africa Protectorate. In due course, such schools mushroomed all over the landscape evidenced by European Girls High School (Kenya High) – founded 1908, Maseno school – 1906, Duke of Gloucester (Jamhuri High) – 1906, Mang’u High School – 1925, Alliance High School – 1926 among others. These in due course started attracting students both black and white from all around the country and that necessitated the construction of boarding facilities. Brand recognition took root as the alumni of these institutions went on to make a name for their alma maters in academia, their respective professions and politics. That is the short and unabridged origin story of boarding schools in Kenya.
Come 2020 – 21, the bureaucrats at Jogoo House that domiciles the Ministry Education in Kenya find themselves at a cul-de-sac. Kenya is gradually making a transition from the 8-4-4 to the Competency-Based-Curriculum (CBC). At the same time, everybody is alarmed by the frequent and utterly egregious incidents of school fires gutting down dormitories and leaving students destitute and shaken. This raises the conundrum as to whether to eradicate boarding schools wholesale with all schools being converted to day schools. Of course, this suggestion is already garnering support from various quarters, the spearhead being the newly-appointed Principal Secretary for Basic Education, Dr. Julius Jwan. To quote the early arriving shots from the newbie apparatchik verbatim, “Being away from home at an early age means being unable to imbibe a myriad of cultural values, beliefs, lore, practices and traditions that children need to function effectively in society. Besides, the institutions foment a sense of alienation. Children in Boarding Schools feel unloved, unappreciated, unwanted or uncared for.” This is a view corroborated by the Kenya Secondary School Heads Association Chairman; Kahi Indimuli who reiterates, “In such a case you find a child grappling with things like homesickness when they are unable to acclimatize to the environment leading to a dip in the learners’ academic performance. They just are not able to reconcile themselves to the idea of being far from home.” Running the gamut of most utterances paints a picture of a dichotomous schism. A few think it is a novel and worthy idea to be trialed while others, not restrained to but inclusive of the author of this piece relegates such presumptions to the backwaters of shallow thinking albeit ignorance. Most certainly, I will indulge you and hopefully at the end of this piece many will have been brought on board to my particular school of thought.
At the World Conference on Education For All (EFA) that culminated in the Jomtien Declaration on EFA held between March 5th – 9th 1990 in Jomtien, Thailand; developing countries reaffirmed their commitment to furnish their children of scholarly-age with universal access to foundational education. This was to be a new basis to surmounting inequality and generating new opportunities for poverty alleviation. Emphasis heavily slanted towards access, quality of education and actual learning outcomes. However, many delegates who attended the conference bemoaned the expansion of enrolment leading to a strain on resources to run the respective schools. Since the epoch of the Philosophers of yore like Plato, Aristotle and Socrates; Education has always been a sacrosanct and fundamental human right and a catalyst for development adjunct to economic empowerment. Today in Kenya, this scruple is constitutionally-enshrined. As stated in other previous posts, Education with regards to future generations should be safeguarded from all turmoil and conjecture pertaining to its shape and morphology. So join me in the odyssey to make a case for the continual existence of Boarding Schools that have served us well for an eon.
Here henceforth, I will itemize while expounding on the benefits of Boarding Schools that far outweigh any drawbacks witnessed.
Pulling the plug on boarding schools will deny learners the benefits of the Best Education. It goes without saying that each year a role of honour is released from the Ministry of Education after the National Examinations where the best students are often feted for their exemplary performance. A cursory look will lay bare the incontrovertible fact that among the best performing schools, a sizable tranche are Boarding Schools. Instructive to note is that in Kenya, Academic performance is inextricably tidally-locked to job acquisition & prosperity. And on this track record alone, students from all over the country travel far and wide to be able to gain access to ostensibly the best tutors and facilities. So it boggles the mind that a Professor of Surgery, Technocrat, Administrator par-excellence and man of the intellectual sophistry of our current Cabinet Secretary for Education, Prof. George A. Omore Magoha who never spares the opportunity to wax lyrical ad nauseam about his time at Starehe Boys Centre, still has the effrontery to cast a pall over schools that offer full-board accommodation to their students. For some context, before Prof. Magoha was the burly man-mountain he is today adorned in a heavily-feathered professional & academic cap, he was merely an ebullient yet studious lad from rural Gem in Siaya County. The distance from Gem, Siaya to Starehe Boys Centre, Nairobi is nearly 410 Kilometres. Starehe Boys Centre was started in 1959 and during the time it was shepherded by the Late Geoffrey Griffin, it styled itself as not just a home for needy yet bright students but also a premiere Kenyan academic Centre of Excellence. And I feel this consideration weighed heavily on the family of the colossus when they decided to take him there for his studies. Plenty of water may have gone under the bridge and road networks enhanced, but a poignant question is if Prof. Magoha would have been able to make the 410km commute to Gem daily were Starehe not a boarding school? Such an edict to abolish all boarding schools smirks of aloofness, high-handedness, ivory-towerism and arrogance of the variety absolutely discordant with intellectualism. Were Queen Marie Antoinette of the pre-revolutionary France still alive, even she would have baulked at such misanthropy!
Closely linked to the former, Boarding Schools Provide a stable & conducive learning environment. You need no specialized learning in child psychology to make such a deduction. Only a tenuous grasp on logic. Affording students fewer distractions is surely an invaluable shot in the arm tantamount to their scholastic pursuits. The reality of this world is that nobody chooses where they are born. Economic situations are at a variance while family stability may be in conjecture for some units. There are families that suffer such eternal bickering that you are left to wonder what attracted the couple that are now parents together in the first place. Beyond a shadow of doubt, this is unlikely to be the best situation for any student. Moreover, we have the pressures of suburban life where both parents and their children are forced to wake up even before the crack of dawn to beat the traffic jams that are an unfortunate fixture of city life. Added to the existential tussle of the day that culminates in the children more often than not getting home before their parents and then immerse themselves into chores adjunct to the mountain of assignments they are expected to finish before showing up at school the next day to continue the interminable cycle. Woe on you if you do not have a house help to organize the small things like washing and ironing uniforms! Don’t even get me started on the conflict-prone areas of this Republic where primitive men still wreak wanton destruction and dereliction of peace while trying to steal each other’s livestock. The insecurity is oft so bad that whole villages are put into full flight into havens of tranquility until conflict subsides when they make a catabasis back to the status quo. With livestock also comes the burden of Nomadic Pastoralism in Arid and Semi-arid Lands where families have to move to where the resources are after depleting the current regions’ quota of water and pasture. More often than not, this means uprooting the entire family, inclusive of school-going children and wandering all over the landscape like the children of Israel during their sojourn in the desert led by Moses. This is no environment for scholarly undertakings that often require stability for effective learning. Perhaps, more Prep time is available to the students in Boarding schools which is irrefutably the difference between excellent academic outcomes and merely passing through the school system.
Vagaries of unpredictable & adverse weather conditions are an impediment to day schools. Needless to say, this situation is exacerbated by Climate change that makes weather conditions touch & go. I recently encountered a post somewhere of a guy who was shipwrecked 3 times. He spent a whole night and a day adrift at sea. His life was imperiled by both rivers & robbers. He suffered the precariousness of a life with dishonest & mendacious brethren both Jews and Gentiles. His life was one of ceaseless hazards in cities, deserts, seas and violent storms. The keen Biblical analysts here immediately recognise this passage of text from Paul’s 2nd Letter to the Corinthians. However, a similar fate is the day-to-day life of many students across our nation. Even the scenic and enthralling beauty of the Great Rift Valley is now turning against our people as the breathtaking Lakes of the halcyon days are now expanding beyond their realm submerging all and sundry. This includes infrastructure and social amenities like schools making a bad situation absolutely ghastly. The description of the same as an ecological catastrophe does not merely pay homage to the impact of the same on water pH levels, ambient flora and fauna but also the students that are now cut-off from their schools. Hitherto paths to schools now end up in a pool of bracken water as regions formerly easily accessible by road on foot are now only reachable using the make-shift rafts, the only conveyance that parents can afford to bequeath to their education-thirsty children. This leads to daily existential duels between these tots and ferocious wild animals like hippos and crocodiles in places like Baringo! Even the sage who envisioned the roots of education being bitter while the fruits are sweeter surely did not presage such difficulty. Then there are parts of Kenya with an all-round rainy season like Kericho and Kakamega. I offer my sincerest of commiserations to those who make daily voyages from home to school under such conditions, braving the muddy terrain with the need to keep their uniforms and shoes clean for an audacious new day tomorrow. Granted life will be one of toil, struggles, ups and downs but I posture that lads and lasses needn’t be subjected to such hardship while still being expected to overcome our rigorous Kenyan Education system.
Boarding schools are an excellent springboard to inculcate independence and autonomy from parents. A much-touted critique of day schools is that they makes children too dependent on their parents, resting on their laurels and denying them the tactical nous to independently face their own life challenges without a rock to lean on. Many parents, more so the responsible ones are often quite doting and protective of their young always viewing them as that little fruit of their loins that once upon a time lay in the crèche vulnerable and entitled yet still a bundle of joy. Pertinent to such parents, every bruised knee and calloused elbow was treated as a medical emergency for the day scholars. In boarding schools there is neither daddy nor mummy in sight to tide you up when you are down. This gives the individual the chance to stand up on their own merits and test their resolve and ability to live and work free from parental influence. There comes a time when even academic responsibility is vested on the capable shoulders of the student. This is excellent preparation for their future endeavours where as a leader, sharp and spontaneous decision-making is a much-vaunted skill in both employment and enterprise. Important too is the fact that self-discipline is honed by having a daily routine which is a common feature in institutions with boarding facilities. Time-keeping is a skill that is whetted by the boarding school system as the consequences of tardiness may include missed meals and risking adrenaline-fueled extreme sporting escapades against a draconian and indisputably garrulous discipline/boarding master or Teacher on duty. Athletics prowess notwithstanding, as per the stipulates of Biblical Proverbs 22:15, sparing the rod is also rather low on the agenda.
The chance to engage in extra-curricular and co-curricular activities is among the lures of boarding schools. With the new-found sense of identity and solidarity with your mates, also arises the need to protect certain inalienable bragging rights against aggressors. The superfluous activities additional to the academic calendar are especially vital as they offer the opportunity for social, cultural and personal development. These activities may include sports, drama, music festivals, debating, science contest and career-specific clubs. Also because the children are growing, they will eventually hit puberty and start experiencing physical changes. As most human development experts pontificate, teenage is a tumultuous period of great physical, emotional, psychological and moral growth & development. And these activities serve the budding young men & women well as they are inundated with bursts of energy they previously never possessed beforehand. Activities performed together are essential in building fraternity among people. Additionally, they are indispensable in teaching young people how to deal with failure, inculcates fortitude of heart, resilience, fosters team spirit, conflict resolution, fairness, magnanimity in victory and also the solidarity to stand up for your teammates. I remember an incident in high school where we were watching a UEFA Champions League match when the buzz-kill discipline master showed up with the express intention to switch off the Television citing noise-making for the rest of the school as his principal grouse. After some remonstrations from a thoroughly aggrieved member of the audience, which mostly fell on the deaf ears of the concerned. The Entertainment Prefect begrudgingly took charge of the situation and switched off the TV for the night and the Television Cabinet was locked. All appeared to be going according to script but subliminally the murmurs of discontent were turning into a nefarious stratagem. Two of my colleagues decided not to take this slight on their fandom to their esteemed football team lying down. In the twinkle of an eye, somebody switched off the lights and there was helter-skelter scampering in all directions. By the time the Discipline Master found the switch to take stock of the situation, it was clear to all what had just happened. He had taken ounces of ‘Ugali’ to the head and his tidy, clothes were now sordid! As they say, boys will be boys. The guy decided to be a good sport about the shenanigans and let it go but it speaks to a brotherhood, the fact that to this day none has snitched on the perpetrator of the incident. You start off as disparate men and women of distinct geneses and character types but time and shared experiences anneal the bond of familiarity between y’all.
Boarding schools build character. New people and new experiences have the reaction of evoking unforeseen emotions in people. For the new-comers in boarding schools, there is the age-old tradition of bullying. This practice varies greatly depending on the type of school and breed of fellows found there. However, in most institutions this norm is merely a light-hearted practice where the Senior Students try to assert some modicum of dominance of the younger folk. For instance, my own situation as a freshman entailed being woken up at 2 a.m. by Form 2’s (Grade 10 for my IGCSE crowd) to mount a guard of honour for them. We stood in two straight files where a lanky, wiry fellow lectured us on some rather naughty, popularly used words & phrases by the indigenes of the institutions which I don’t feel the predilection to share here due to their graphic nature. In the foregoing, the leader of the miscreant gang of torturous sophomores suddenly turned to me and asked for my name. I replied.
Gang Leader: Did you pass your exams to get into this institution?
Me: (With a near whisper) Yes.
Gang Leader: Then would you care to give us a slight demo of how you passed the exam?
Me: For sure.
Not aware this was a trick question and taking the bait, I proceeded to strut my stuff in the presence of all. I did not anticipate to be the subject of some light mirth so much so that the quasi-parade was soon dismissed. The point of this story is that such incidences of slight bullying are a character-building experience. A few end up having all their confidence and self-esteem shattered and falling through the cracks but most will be held in good stead by the experience. Boarding schools also offer an opportunity for Mentorship. Sooner rather than later everyone’s talents and academic capabilities come to the fore. You will ultimately bear witness to some schoolmates receiving awards for being in the top 3 of their class. Others for scoring the title-winning basket, yet another gains acclaim for their flawless theatrical portrayal of the lady in ‘Juliet & Romeo’ despite being a pubescent boy. Here is now a once-in-a-lifetime chance to get insight from that classmate who beats everyone hands-down in both the mathematical examination and the regional contest. And there is nothing better than being mentored by your own peer. Iron sharpens iron.
Culture of Collaboration. Boarding schools induct their students into the pristine way of life where you learn to work in articulation with other minds to solve all sorts of problems. Cleaning your living space is your responsibility. In the nick of time, the House Prefect will come up with a duty-rota such that each day perhaps a team of two will clean a particular cubicle. This is a chance to work in synergy to enable you to finish the task in good time and effectively lest you be forced to do the repeat task. Collaboration goes further than that. Nothing earns a geek more stripes than dabbling in and fruitful participation in the Science contest. For most presentations, two or more characters will be required to develop a concept, brainstorm about it, research, build a prototype and ultimately present it before the multitudes taking cognizance of yourselves as ambassadors for your institution. This is an excellent chance for learning how to make best use of the shared pool of skills, talents, competencies and even idiosyncrasies among yourselves to build a viable product. It is also a chance for peer-to-peer learning.
Effective care for Learners with Special Needs. An often-overlooked sector of the population are the people with disabilities. As able-bodied men and women, we take for granted the fact that some of the hypothetically simple tasks may be extremely difficult nay impossible to others, by no fault of their own. None has a say on the arrangement of their genetic makeup and how they are born. None possesses the prescience to predict calamity or an accident that could maim them leading to loss of their anatomical faculties. Caring for differently-abled people is quite challenging and the run-of-the-mill parent with many other competing responsibilities is vulnerable to getting overwhelmed by the enormity of the task. To mitigate this eventuality, we have special schools that cater to the needs of this cadre of learners. In appreciation of the challenges involved, very few of these schools accept day scholars. Assuming you have no personal vehicle, it is a painfully-arduous task to share public transport with people not accountable for their actions. All these adjunct to the impolite stare of a cold, indifferent public bereft of concern, understanding or even a scintilla of empathy for your situation. Others haven’t an inkling on how to mind their own business albeit etiquette. So to avoid all these sideshows, it becomes a more convenient bet to drop off your child in a special school and only visit periodically while the experts deal with them.
Imbuing Social Maturity, Leadership & appreciation of cultural diversity. When a group of people live together, sooner rather than later, their true character filters through. Indeed a wise man once uttered that the true test of a man’s character is how he tackles adversity. It is at this juncture that true leaders and stewards are forged and step forth. Also social maturity is attained by the process of separating a child from their family and having them learn to have a new fraternity or sorority away from home. Those with leadership acumen eventually come to the fore and exercise jurisdiction over their fellow students. The House Prefect takes responsibility over the living quarters and general welfare of all the dormitory residents. The Sports Prefect ensures that all sporting equipment, appliances and infrastructure is maintained all the while liaising with school administration to ensure nothing falls into disrepair. The Dining Hall Prefect is the Principal’s eye in the School’s Cafeteria ensuring quality control of the victuals, sufficient quantities, crowd control, preserving a quota for the late-arriving sporting teams & the requisite nutritional value for the rapidly growing teenagers with an appetite that is expanding proportionately. The School Captain and his Deputy are the overall Leaders of the School Governing Council additional to creating a liaison level between the students and school administration. All these are portfolios that are non-existent in day schools which yields a situation where we have entitled intellectuals but who lack the backbone to take responsibility and be effective stewards of industry in years to come. Kenyans from all walks of life countrywide most assuredly have a kaleidoscopic range of cultural traditions and norms whose appreciation is taught by encountering a multiplicity of humanity. This is seldom possible in day schools as these commonly admit students from the vicinity of the institution with a similar culture. This limitation may create closed-minds devoid of appreciation for other cultures which is abominable.
Enforcing Equality. This particular point is a substantiation of the aforementioned one on conducive learning environments. Students hail from families that enjoy differing strata of financial stability. In paying homage to the human palm, fingers are of variegated shapes, sizes and lengths. Equality is brought on board by having all students have the same uniform, learn in the same classes, eat the same food in the Dining Hall and ultimately sleep in the same dormitories. A rule that varies from school to school sometimes forbids students from arriving with cooked food or having it brought on visiting days. The spirit behind such a rule is to curtail a smidge of resentment, envy and even self-loathing that the students from the not so well-endowed families are wont to have towards their housemates that came from money. Equality is pivotal in entrenching respect for each other’s humanity irrespective of all else.
Change of Scenery. Scientific studies by psychologists have brought to the fore empirical wisdom that a change in scenery could improve academic outcomes. A change from normal routine is as good as a rest. Such a variance may result in a change of perspectives, coaxing the fire for new ideas and in some cases even unlocking of new sectors of the brain that were previously untapped. “It is an interesting psychological phenomenon” is all I can surmise from this.
In closing submissions, I feel the benefit to be acquiesced from boarding schools far supersedes the drawbacks. Acts of arson notwithstanding, I call for placid heads in dealing with this situation. I may not be too conversant with the strictures of the newly-minted CBC curriculum but feel its full value will be tapped by keeping existing structures in place while gradually building on them as you phase out the outmoded components of the old system. We should not trifle with the education of the succeeding generations and make it subject to the whims of egotistical blackguards.
|
<urn:uuid:fc9580d4-bbbd-4967-b851-60d6f7c6adba>
|
CC-MAIN-2023-14
|
https://dennismukoya.co.ke/wp/blog/2021/03/19/suggestion-to-convert-all-boarding-schools-to-day-schools-is-unmitigated-balderdash/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950422.77/warc/CC-MAIN-20230402074255-20230402104255-00765.warc.gz
|
en
| 0.961055
| 5,430
| 3.171875
| 3
|
Did you know that with grain preparation the phytic acid in grains can be neutralized? Don't know what phytic acid is? Neither did I until health problems began! Let me explain 2 methods of proper grain preparation.
All grains look bad if you have been introduced to the GAPS diet.
That is not the case at all, if, you have a healthy gut. It is important to remember that GAPS is a temporary diet with the goal of encouraging "good" bacteria and healing the gut. Once intestinal healing has occurred, you can add grains to your diet. Properly prepared grains, that is!
Have you ever wondered why we change the way we do things? Usually changes occur for the sake of convenience, time saving and/or money making for larger companies trying to provide consistency of products.
The truth is, the old traditional ways actually had a purpose behind them and the new, more convenient modern methods may be harming our bodies!
Take, for example, grain preparation. As early as 1200 - 1500 BC the people in Guatemala soaked corn, a process called Nixtamalization. According to Wikipedia:
Nixtamalization typically refers to a process for the preparation of maize (corn), or other grain, in which the grain is soaked and cooked in an alkaline solution, usually limewater, and hulled. Maize subjected to the nixtamalization process has several benefits over unprocessed grain for food preparation: it is more easily ground; its nutritional value is increased; flavor and aroma are improved; and mycotoxins are reduced.
People soaked far more than corn throughout history. Soaking grain allows the grain to sprout. The vitamin and enzyme content of sprouted grains increases dramatically. Plus, the phytic acid and enzyme inhibitors neutralize.
Also known a germinating, people sprouted food for centuries. The Chinese sprouted beans for ocean voyages. Injera is a national dish in Ethiopia and Eritrea and according to Wikipedia is made by soaking teff flour in water and allowing it to ferment for several days before baking the large pancakes. Injera has a sourdough like taste which brings me to the soudough process. Did you know that before the 19th century and the identification of yeasts, all yeast-leavened breads were sourdough? According to Wikipedia:
The leavening process was not understood until the 19th century, when yeast was first identified. Since then, strains of Saccaromyces cerevisiae have been bred for their reliability and speed of leavening and sold as "baker's yeast". Baker's yeast was adopted for the simpicity and flexibility it introduced to bread making, obviating the lengthy cultivation of a sourdough starter.
Another point of interest is that due to modern farming techniques, grains no longer germinate as they once did in sheaves and stacks in the field.
Who cares, you might think. After all, it is easier not to soak or sprout grain, beans, legumes and just stay with the options provided for us by our local grocery store.
But, there are a couple of important reasons that we all should care:
1. Sprouted grains have more nutritional value than their unsprouted counterparts
The vitamin and enzyme content of grains increases with sprouting.
According to Wikipedia:
The metabolic activity of resting grains and seeds increases as soon as they are hydrated during soaking. Improvements in amino acid composition, B-group vitamins, sugars, protein and starch digestibilities, and decrease in phytates and protease inhibitors are the metabolic effects of the sprouting process.
2. Phytic acid is present in the bran of all grains and the hulls of seeds. Phytic acid inhibits absorption of minerals - especially calcium, copper, iron, magnesium and zinc - in the body. According to Wikipedia:
In-home food preparation techniques can reduce the phytic acid in all of these foods ... effective methods are soaking in an acid medium, lactic acid fermentation, and sprouting.
Proper preparation of grains neutralizes the phytic acid and makes the grain more easily digested plus increases its nutritional value!
Why then, don't we take the time to properly prepare our grains, seeds and legumes? For many of us, it is lack of knowledge.
I have ground my own whole wheat flour from the wheat-berries and baked my homemade whole wheat bread for years now. Did I sprout my wheat-berries? No.
Did I soak my flour? No.
Why? Because I had never heard of phytic acid. I had never heard about the nutritional value of the grain increasing so dramatically when sprouted. This may explain my "moderately-severe" osteoporosis diagnosis at age 48, before menopause!
If it is so important, we should all know how to do it! If you do not have the time to sprout and soak your own grains, you can also purchase them (from my affiliate -where to buy sprouted flour)!
There are 2 methods of grain preparation and both involve soaking in water:
The basic method is the same for all grains, seeds, and legumes:
- Soak the grain (beans, seeds or nuts) in water overnight. A wide mouth mason jar with a mesh cover works well.
- In the morning, drain the water, rinse with fresh water and drain again.
- Tilt the jar so it will continue to drain while still allowing air circulation.
- Rinse the grain twice a day (morning and evening).
- When little sprouts appear and are ¼ inch long, the grain is ready to use.
- You can use this grain in recipes or place it in the dehydrator for 8-12 hours.
- Once dried, mill in a grain mill and use flour as desired.
Soaking whole grain flour overnight also neutralizes the phytic acid and enzyme inhibitors found in grain.
The basic method is the same for all whole grain flours:
- Using the desired recipe , place the whole grain flour in a bowl.
- Moisten with the amount of water specified in the recipe.
- For each cup of water, add 1 tablespoon kefir, yogurt or lemon juice. In the morning, proceed with the recipe.
Soaking the flour may change the texture of baked goods. An example is Whole Wheat Pancakes/Waffles – soaked flour makes much lighter waffles. This is also a good alternative when you do not have access to a dehydrator.
Both methods, sprouting and soaking, accomplish the intended purpose of neutralizing the phytic acid in the grain. Which ever method you choose or if you choose a combination of the two, the result will be a food which provides more nutrition to yourself and your family without the danger of contributing to mineral deficiencies in those you love.
happy momma says
Wow1 so informative. A point of clarification; Not all the yeast was sourdough in the past. I have started using a natural yeast in our baking. It is a natural sweet yeast not sourdough. It is similar to sourdough in that is has a long cultivation process. I had a real learning curve. I was used to baking with bakers yeast. I have had to relearn how to make brad. It is a fun process. It has made a real difference in our lives.
I am begining to think that all those with celiac's and gluten intolerances may actually be intolerances to the quick, overprocessed methods we use nowdays and the yeast. I think that I will start sprouting the wheat before grinding. The natural yeast already involves the soaking of the flour in order for the yeast to grow. Thank you for all your information. It is good to get the word out so others can enjoy great health.
Here is a link to a blog that goes into alot of details about the natural yeast and the benefits of baking with it as opposed to the the yeast that is now available. I think it would be of interest to you and your readers. Plus you can get your own yeast start from him.
Hi Happy Momma,
Thanks for the comment!
Sourdough is a dough containing a Lactobacillus culture in symbiotic combination with yeasts so it is a type of natural yeast as opposed to baker's yeast which is cultivated forms of yeast (Saccharomyces). I agree that we have sacrificed health in many cases for the sake of quick and conveniet. I have also had to relearn a lot about baking!
Miz Helen says
Hope you are having a great weekend and thank you so much for sharing your awesome recipe with Full Plate Thursday.
Come Back Soon!
Would there be any need to do both forms of preparation, both sprouting and soaking? Or would that be over kill? Is one method preferred over the other? Thanks
Joy Kauffman says
I really appreciate your research here. I am trying to understand though why many seem to suggest neutralizing phytic acid with another acid. Why not use an alkaline solution like the native people of the Americas did with lime (CaCO3) for maize. (https://en.wikipedia.org/wiki/Nixtamalization) I am really seeking to understand the best way to recommend because I am working with very nutritionally vunerable populations.
Joy, soaking grains using a bit of kefir, yogurt or even lemon juice is so easy, takes very little time and does a great job at neutralizing the phytic acid. I have read some controversial articles as to the safety of using lime even in the small amounts used for making pickles. I hope this helps.
I discovered over the last 24-36 hours that baking soda, alkali producer, used with yellow cornmeal as follows does the following surprising things... which means to me that it is a safe equivalent of lime water, and less expensive:
1. try the experiment: 1 cup of yellow cornmeal, add 1 cup of water and a generous teaspoon of baking soda. Sir, leave over night or more as you like; note the color change. The soak water becomes the color of turmeric. This I read is a sign of nixtamalization using lime water so if it can be achieved with baking soda, yay for those who want to eat corn.
2. try the control, same as above without the baking soda. No effect.
Cornmeal is a slightly stimulating grain and I didn't sleep well after eating it; it is also diuretic. But, I'm trying again on Sunday 18 March, with the 'nixtamalized cornmeal.' We shall see. I use grains as a main meal and to help me relax and sleep.
Nandarani, thanks for taking the time to comment! Your experiment sounds very interesting.
Judy, plantdrlady says
Just sprout veggie seeds (ie, broccoli, alfalfa, etc).
Feeding sprouted beans or grains to lab animals causes cancer.
All pulses/legumes (lentils, peas and beans) contain a natural toxin called lectins, which can cause acute poisoning. Lectins are broken down when they are soaked and then pressure cooked in fresh water (sprouting actually increases lectin content.
All grains have lectins except millet & sorghum, which have neither lectins nor gluten. Gluten-free grains can be prepared the same as legumes (above), but gluten grains cannot be prepared in any way to remove the lectins.
Gundry, Steven R., M.D. The Plant Paradox: the hidden dangers in “healthy” foods that cause disease and weight gain. NY, NY: HarperCollins, 2017.
Never consume gluten grains - they cannot be prepared in any way to remove lectins, plus they contain gluten. Gluten is another plant toxin that can eventually cause Leaky Gut, Lupus, autoimmune diseases, etc.
Judy, thank you for you comment. I do have to say that I do not agree, though. Lectins are indeed in grains along with phytic acid but their concentration is normally less so as not to be quite the concern of phytic acid. Although, for people with bone density issues, any amount is concerning since both prevent absorption of minerals. Gluten is a protein which, in patients with leaky gut, is not broken down in the last phase of digestion and is allowed through the intestinal lining into the blood stream and that causes many autoimmune diseases - lupus is one of those. Leaky gut is most commonly causes by a diet filled with processed foods and especially sugar and antibiotic usage which kills the good bacteria in the gut as well as the bad. The imbalance of gut bacteria is the culprit and can be corrected many times by the GAPS diet - I know because mine was! Again, I appreciate your taking the time to comment and I think it is important for everyone to do their own research but be careful of your sources.
I was told that roasting wheat bran reduced physic acid considerably. Can anyone verify this and, if so, what is best temperature and length of time needed.
Judith, I have not done that and have not heard it so maybe another reader can help here...
I just discovered your blog after starting a research in nut soaking/dehydrating methods.
The information you provide are extremely helpful. My question is, when I use a (fan-assisted) oven to dehydrate my nuts and not a dehydrator, does it take 12-24 hours too? I heard it takes half or 1/3 of the dehydrator time. Maybe you could share your insight on the subject.
I thank you in advance.
Barbara, I would definitely start with about 1/3 of the time and keep checking them because it will not take as long.
Can apple cider vinegar be used to soak organic store bought spelt flour instead of lemon juice.
Also when I soak the spelt flour overnight do I disguard the soaking liquid.
Maria, yes, I would think that would work fine. Personally, I would discard the soaking liquid.
|
<urn:uuid:01be1a42-83ef-442c-b636-1250aa16c2da>
|
CC-MAIN-2023-14
|
https://myculturedpalate.com/grain-preparation/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950422.77/warc/CC-MAIN-20230402074255-20230402104255-00765.warc.gz
|
en
| 0.949036
| 3,091
| 2.921875
| 3
|
You will learn how to:
- sketch graphs of simple rational functions, including the determination of oblique asymptotes, in cases where the degree of the numerator and denominator are, at most, 2.
- understand and use relationships between the graphs of y=f(x), y=1/f(x), y=|f(x)|, and y=f(|x|).
Designed Just 4 You!
Sketching Rational Functions
Latest posts by Dr. Vincent P. Techo (see all)
- DTTP Teacher Technology Survey for SUIS - September 13, 2020
- 8 Best Web 2.0 Tools for Education: 2020 list - February 16, 2020
- EDTC615 Final Reflection - August 5, 2019
|
<urn:uuid:9c2f7aa2-8410-4d2a-9bd0-180adeb4f1ea>
|
CC-MAIN-2023-14
|
https://techoacademy.com/course/2-rational-functions/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950422.77/warc/CC-MAIN-20230402074255-20230402104255-00765.warc.gz
|
en
| 0.836827
| 176
| 4.0625
| 4
|
Site record MDR4532 - St Alkmund's Church (site of), St Alkmund's Way, Derby
Type and Period (4)
- HOGBACK STONE (Saxon - 410 AD to 1065 AD)
- ANGLICAN CHURCH (Saxon to Victorian - 900 AD? to 1844 AD)
- CHARCOAL BURIAL (Saxon - 410 AD to 1065 AD)
- ANGLICAN CHURCH (Victorian to Late 20th Century - 1846 AD? to 1967 AD)
- World Heritage Site Buffer Zone
The remains of St Alkmund are said to have been moved to Derby from his original burial place of Lilleshall, in Shropshire, in the 9th century, with his shrine becoming a focus for pilgrims. In the time of Edward the Confessor, the church was served by a college of six priests who were endowed with nine oxgangs of land in Little Eaton and Quarndon. In 1841 it was 'most unfortunately' resolved to pull down the venerable old church and build a new one on the site, with demolition taking place in 1844. The old church consisted of a nave, with side aisles and south porch, a chancel, and a tower at the west end, not disengaged from the building but open to the aisles and nave by three pointed arches. The dimensions as taken in 1826 were: nave, 63ft 7ins by 17ft; south aisle 12ft 9ins wide, north aisle 10ft 8ins wide, and chancel 34ft 3ins by 12ft 4ins. From various drawings etc it appears that the building externally was almost entirely of the Perpendicular period, although descriptions of the interior suggest that the pillars between nave and aisles may have been Norman, with other possible Norman details in the chancel. On demolition, the old font was removed and was later in use as an ornamental vase in the vicarage garden. A number of stones belonging to the original Saxon church were found during demolition. (1) St Alkmund's Church was built in 1846 by H I Stevens on a Saxon site. It was an ambitious building marking the beginning of Victorian prosperity. It was constructed of ashlar stone, slightly rock-tooled, and had a tall nave with openwork balustrade, aisles and tall 14th century-looking piers inside, and a tall tower with a spire supported by flying buttresses. It was demolished in 1967 to make way for the inner ring road. (2) The new Derby Excavation Committee started work in October 1967 on the site of St Alkmund's church in Bridge Gate, which was being demolished ahead of construction of the new inner ring road. The excavation was planned to continue until March 1968. The whole area within the present church was excavated to more than 6ft below its original floor level. The foundations of previous churches, dating back to the 9th century when St Alkmund's remains were brought to Derby, were uncovered. A finely carved stone sarcophagus associated with the earliest buildings had also been found, although it contained only rubble and could not, therefore, be connected with the saint. (3) During and after the demolition of the church of St Alkmund's, excavations were carried out on the site. The oldest building found beneath the 19th century church consisted of a nave 50ft by 19ft with a smaller sanctuary about 16ft square. Traces of aisles about 3ft wide also probably date from this period. The surviving fragments of walling have a massive plinth about 10ins high, which much rank among the more impressive features of early church building anywhere. This church is certainly Saxon. The plan and details suggest a period not later than the 9th century. The two fragments of sculptured crosses inset in the wall appear to confirm this date. In the 12th century the church was extended eastward. The added part of the sanctuary was raised over the crypt and was probably designed to hold the shrine of St Alkmund. At the same time the aisles were rebuilt, if indeed they did not originate at this period. In the late 13th or early 14th century the south aisle was widened and the north aisle remodelled. Finally in the 15th century the church was extended westward and a tower inserted at the west end of the nave, wholly enclosed by aisles on either side. The most important single find was a very fine ornamental sarcophagus dating from the 9th century. It had been opened at some point, smashing the cover. The body was exhumed and the void filled with rubble, indicating the translation of the body which was regarded as a relic and enshrined, probably in the chapel behind the altar. In the circumstances this must mean that the sarcophagus was prepared for St Alkmund and that he was translated in the usual manner in the 12th or 13th century. (4) Fuller details of the excavations were published in 1976. It was found that the Victorian church ignored the plan of the medieval building, which was completely enclosed within the 19th century walls, although the piers and responds often cut into or lay within the medieval walls. Four building phases were identified. The earliest of these was pre-Conquest, but the actual date was difficult to assess. Its origins are now thought to pre-date the 9th century, with the remains of St Alkmund being brought to a pre-existing minster. The body of Aethelwulf is also said to have been buried in St Alkmund's following his death in 871. In addition to the sarcophagus referred to above, four charcoal graves were discovered in this early church, a custom thought to have been prevalent in the 10th century. Later building phases comprised various extensions to enlarge the church, so that the late medieval church gave the impression of a Perpendicular building. Finds made during the course of the excavation included a pre-Conquest penny, a few other coins and tokens, and a number of sculptured stones including architectural fragments, cross shafts and grave covers, one of the latter being a hogback. (5) Many of the finds made during the 1967 and 1968 excavations are now in Derby Museum. They include the monolithic sarcophagus carved with interlace ornament, the silver penny of well known Viking type with inscriptions which may be interpreted as 'MIRABILIA FECIT' AND 'DOMINUS DEUS OMNIPOTES REX', nine sculptured stones (five from the 1844 rebuilding and four found in the 1967-8 excavations) - these include 9th or 10th to 11th century cross shaft fragments, relief fragments and 10th or 11th century grave covers; and two 19th century corbel heads acquired by Derby Museum in 1985. In addition, two old keys from St Alkmund's were accessioned by Derby Museum in 1915. (6) Several fragments of Anglo-Saxon monuments, including a decorated sarcophagus and two possible slab tomb covers which may be post-Conquest, found as a result of excavation of the church site in the 1960s. Several carved stones have already been removed from the same site. All the pieces (12 in all) are now in Derby Museum. (7)
- <1> SDR11672 Bibliographic reference: Cox, J C. 1879. Notes on the Churches of Derbyshire, Vol IV. pp 113-126.
- <2> SDR12891 Bibliographic reference: Pevsner, N. 1979. The Buildings of England: Derbyshire. 2nd ed., revised. p 171.
- <3> SDR4508 Bibliographic reference: 1967. 'Notes and News : St Alkmund's Church, Derby', Derbyshire Archaeological Journal. Vol. 87, p 169.
- <4> SDR5840 Bibliographic reference: 1974. East Midland Archaeological Bulletin, No. 10. p 7.
- <5> SDR7620 Article in serial: Ralegh Radford, C. 1976. 'The Church of Saint Alkmund, Derby'. Vol 96.
- <6> SDR19706 Digital data: Derby Museum Curators. Derby City Museum Database. pp 39-41,67-8, 102-113, 142-3, 146, 152.
- <7> SDR19261 Correspondence: Sidebottom, P. 1994. Letter regarding Anglo-Saxon stone monuments in Derbyshire, 15th February, 1994. Letter.
|Grid reference||Centred SK 3514 3673 (43m by 28m) (Approximate)|
|Civil Parish||DERBY, DERBY, DERBYSHIRE|
Related Monuments/Buildings (0)
Related Events/Activities (2)
Please contact the HER for details.
External Links (0)
Record last edited
Dec 9 2020 11:42AM
|
<urn:uuid:5b9ab8c3-c30d-42c0-9816-e2dca1043161>
|
CC-MAIN-2023-14
|
https://her.derbyshire.gov.uk/Monument/MDR4532
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943471.24/warc/CC-MAIN-20230320083513-20230320113513-00166.warc.gz
|
en
| 0.966143
| 1,925
| 2.703125
| 3
|
“One man is ten-thousand, if he is the best.” (Kahn, 63; cp. S, R, DK 49, L&M D12)
Various translations personalize this statement. Laks and Mott do so, noting: “One man, for me, is ten-thousand, if he is the best” (D12). Here, they follow Cicero. Based on the fact that the personalization of this is not found in the earliest sources, but only by the time of Cicero, Kahn argues that it is best not to personalize the statement. Heraclitus, in any case, generally isn’t proposing personal views but is making more general truth claims.
The use of the term myrioi (translated ten-thousand here) was characteristically used to mean “innumerable” or “countless” (see Kahn, p. p. 177). But who are the best men, and what differentiates them from the multitude? Bias of Piene, discussed in Fragment 62 is one example of the best. Hermodorus, discussed in Fragment 64, is another. Such rare individuals, as we see in reference to Bias, have better accounts than others. Their views, unlike the ten-thousand, reflect logos.
Robinson mentions the unsavory prospect of interpreting Heraclitus as affirming the status of the aristocracy as superior to that of the masses. Yet that turns on the use of aristos in the text in an unusual manner, as a substantive indicating “noble,” which Robinson notes “is not parallel in the language” and thus not probable (Robinson, p. 112). The main emphasis we have seen in the fragments so far is on the superior thinking of the superior men. This is reflecting the Pre-Socratic focus on theoretical reasoning. We shall later examine the extent to which the superior man will also have a moral superiority.
|
<urn:uuid:58e77c13-17ec-4d0f-8e66-bcfb9c5c6ad4>
|
CC-MAIN-2023-14
|
https://philosophyandsociety.com/2018/02/04/heraclitus-fragment-63/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943471.24/warc/CC-MAIN-20230320083513-20230320113513-00166.warc.gz
|
en
| 0.922499
| 414
| 2.8125
| 3
|
Section 6. Discrimination, Societal Abuses, and Trafficking in Persons
Rape and Domestic Violence: The law penalizes perpetrators of rape, including spousal rape, with six to 12 years in prison. The law criminalizes the physical abuse of women (including by family members), provides for the prosecution of perpetrators of violence against women, and helps shield abused women from publicity. Judicial protective measures for violence occurring within a family allow for an ex parte application to a civil court judge in urgent cases. A specific law on stalking includes mandatory detention for acts of sexual violence, including by partners. Police officers and judicial authorities prosecuted perpetrators of violence against women, but survivors frequently declined to press charges due to fear, shame, or ignorance of the law.
The COVID-19 pandemic may have both caused and masked an increase in violence against women. The pandemic at times forced women into closer proximity with their abusers, leading to greater abuse, and restrictions on movement and decreased funding for civil society organizations and agencies lowered the level of social services and hampered the reporting of cases and the delivery of assistance to victims. In one example, on April 19, a man shot and killed his partner near Milan. The two worked in different parts of northern Italy and only visited each other on weekends before the outbreak but were compelled by financial constraints to reside together during the government-mandated lockdown. The man had a history of domestic violence, with two complaints filed by his former spouse.
Between January and June, 535 women were killed by domestic partners. In April police arrested a Bangladeshi man who repeatedly raped and physically and mentally abused his wife because she refused to stop attending Italian language classes. Their minor daughter also suffered abuse and corroborated the mother’s charges.
The Department of Equal Opportunity operated a hotline for victims of violence seeking immediate assistance and temporary shelter. It also operated a hotline for stalking victims. Between March 1 and April 16, the hotline received 5,031 calls, a 73-percent increase from the same period in 2019. In an estimated 93 percent of those cases, the mistreatment occurred at home where, in 64 percent of the cases, children were present.
Sexual Harassment: Minor cases of verbal sexual harassment in public are punishable by up to six months’ incarceration and a fine. By law gender-based emotional abuse is a crime. The government effectively enforced the law. Police investigated reports of harassment.
Reproductive Rights: Couples and individuals have the right to decide the number, spacing, and timing of their children; and to manage their reproductive health. They had access to the information and means to do so, free from discrimination, coercion, and violence.
No legal, social, or cultural barriers adversely affected access to contraception or to skilled health attendance during pregnancy and childbirth. Independent observers and NGOs, however, reported access to counseling and insufficient government resources limited some reproductive health services.
The government provided access to sexual and reproductive health services for survivors of sexual violence. NGOs reported that in some cases authorities expelled undocumented foreign women who were victims of sexual violence, and that some public officers were not sufficiently trained to identify victims and refer them to services.
Coercion in Population Control: There were no reports of coerced abortion or involuntary sterilization on the part of government authorities.
Discrimination: Women have the same legal status and rights as men, and the government enforced laws prohibiting discrimination in all sectors of society and economy. Women nonetheless experienced widespread discrimination, particularly with respect to employment (also see section 7.d. regarding pay disparities between genders).
Birth Registration: A child acquires citizenship automatically when one of the parents is a citizen, when the parents of children born in the country are unknown or stateless, when parents are nationals of countries that do not provide citizenship to their children born abroad, when a child is abandoned in the country, and when the child is adopted. Local authorities require registration immediately after birth.
Child Abuse: Sexual abuse of minors is punishable by six to 24 years in prison, depending on the age of the child. Child abuse within the family is punishable by up to seven years in prison. On June 23, a court in Sardinia sentenced three adults to eight years in prison for mistreatment and violence towards a child. The child had been forced to live segregated in a dark room without a bed and was repeatedly slapped and forced to take cold showers as punishment. In 2019 there were 15,044 reports of missing minors, of whom 7,109 were foreigners. During the COVID-19 pandemic, the NGO Telefono Azzurro registered an increase in the number of calls from abused minors. The government implemented prevention programs in schools, promptly investigated complaints, and punished perpetrators.
Child, Early, and Forced Marriage: The minimum age for marriage is 18, but juvenile courts may authorize marriages for individuals as young as 16. Forced marriage is punishable by up to five years in prison, or six years if it involves a minor younger than 18. Forced marriage even for religious reasons is also penalized. In June the Italian embassy in Islamabad intervened to prevent the forced marriage of a 16-year-old girl with Italian citizenship to her underage cousin in Pakistan.
Sexual Exploitation of Children: Authorities enforced laws prohibiting sexual exploitation, the sale of children, offering or procuring a child for prostitution, and practices related to child pornography. Independent observers and the government estimated at least 5,000 foreign minors were victims of sexual exploitation. According to the Department of Equal Opportunity, the number of minor victims of trafficking who received assistance decreased from 215 in 2018 to 160 in 2019.
On July 20, the daily La Stampa reported the break-up of a “psycho-sect,” a child abuse ring led by a 77-year-old man that preyed on children for 30 years in Novara, Milan, and Pavia. The press reported 26 persons were under investigation.
There were reports of child pornography. In July, Florence prosecutors investigated the possession and distribution of images by Italian nationals that showed physical and sexual abuses against children in foreign countries. Police investigated six adults and 19 minors throughout 13 provinces in Italy. In 2019 Postal Police reported 650 persons allegedly involved in child sexual abuse or sexual exploitation.
Save the Children Italy reported the COVID-19 pandemic exacerbated sexual exploitation and other abuses of children, because they were often forcibly abused in overcrowded apartments without health precautions and received reduced token “payment” from their abusers.
The minimum age for consensual sex is 14, or 13 if the partner is younger than 18 and the age gap is less than three years.
Displaced Children: The Ministry of the Interior reported 1,981 unaccompanied minors arrived in the country between January and August 17. As of July 31, the Ministry of Labor and Social Policies reported the presence in the country of 5,202 unaccompanied minors, of whom 95 percent were boys. It also reported 959 minors previously registered at reception centers were reported missing between January and July, putting them at risk of labor and sexual exploitation. UNICEF estimated more than 6,300 foreign unaccompanied minors were in the country at the end of 2019.
International Child Abductions: The country is a party to the 1980 Hague Convention on the Civil Aspects of International Child Abduction. See the Department of State’s Annual Report on International Parental Child Abduction at https://travel.state.gov/content/travel/en/International-Parental-Child-Abduction/for-providers/legal-reports-and-data/reported-cases.html.
There were approximately 28,000 Jews in the country. The law criminalizes the public display of the fascist stiff-armed Roman salute and the sale or display of fascist or Nazi memorabilia. Violations can result in six months’ to two years’ imprisonment, with an additional eight months if fascist or Nazi memorabilia are sold online.
Anti-Semitic societal prejudices persisted. Some extremist fringe groups were responsible for anti-Semitic remarks and actions, including vandalism and publication of anti-Semitic material on the internet. The Observatory on Anti-Semitism of the Foundation Jewish Contemporary Documentation Center reported 143 anti-Semitic incidents between January and August 18, including the physical assault on a boy wearing a kippah who was punched from behind and spit on.
Internet hate speech and bullying were the most common forms of anti-Semitic attacks, according to the center. On August 18, the center reported 74 cases of insults on the internet and 13 cases of graffiti or vandalism against Jewish residents. Most episodes occurred during Jewish holidays or celebrations. Anti-Semitic slogans and graffiti appeared in some cities, including Milan, Bologna, and Turin. On January 24, Siena University suspended from teaching a law professor who tweeted anti-Semitic and pro-Nazi comments.
More than 2,000 police officers guarded synagogues and other Jewish community sites in the country. In January the government appointed a national coordinator to combat anti-Semitism.
Trafficking in Persons
See the Department of State’s Trafficking in Persons Report at https://www.state.gov/trafficking-in-persons-report/.
The law protects the rights of persons with disabilities. The government enforced these provisions, but there were incidents of societal and employment discrimination. Although the law mandates access to government buildings and public transportation for persons with disabilities, physical barriers continued to pose challenges. On April 29, a Rome court found the local transportation company guilty of not repairing the escalators of a subway station in May 2019 and thereby denying a man with disabilities access to trains. On June 8, a Milan resident urged the Lombardy regional minister to reopen escalators and lifts in public stations closed to prevent the spread of COVID-19, so that she and other persons with disabilities could access public services.
On July 8, police arrested a physiotherapist who raped and mistreated a minor with disabilities in Cosenza in 2019.
Members of National/Racial/Ethnic Minority Groups
Governmental and societal violence and discrimination against ethnic minorities, including Roma, Sinti, and the nomadic Caminanti, remained a problem. There were reports of discrimination based on race or ethnicity in employment (see section 7.d.).
The press and NGOs reported cases of incitement to hatred, violent attacks, forced evictions from unauthorized camps, and mistreatment by municipal authorities. In 2019 authorities reported 726 crimes of racial hatred, of which 234 were incitement to violence, 147 violations of tombs, and 93 acts of physical violence.
On July 1, local authorities announced their intention to close a Romani camp in the outskirts of Rome. By September 18, only 36 families were still waiting in the camp for alternative housing. The government suspended the closure of all camps. Such camps often had no access to drinking water, power, or sewage. Living in a segregated camp usually meant living in an overcrowded housing (seven or eight persons per trailer, shack, or shipping container) on the periphery of a town or city. Local residents and NGOs claimed that local authorities had not offered adequate and permanent housing for most of the vulnerable families.
The NGO Associazione 21 Luglio reported that in 2019, 12,700 Roma lived in 119 authorized camps in 68 municipalities, and another 7,300, mainly Romanians, lived in informal encampments, primarily in Lazio and Campania. An estimated 55 percent of persons living in authorized camps were minors; 53 percent were foreign. Their average life expectancy was 10 years lower than the rest of the population. The European Roma Rights Commission (ERRC) reported that, in most cases, no masks, hand sanitizer, or hygienic supplies were distributed to Romani camps, even those lacking access to water. The absence of supplies made it difficult, if not impossible, for Roma living there to follow recommended guidelines for preventing COVID-19. The crowded living quarters in some camps led some municipalities to quarantine entire camps rather than single, at-risk individuals.
The ERRC stated that between February and July, it recorded at least seven such evictions.
The law prohibits discrimination against lesbian, gay, bisexual, transgender, and intersex (LGBTI) persons in housing, employment, nationality laws, and access to government services and the government enforced the law effectively. NGOs advocating for the rights of LGBTI persons reported instances of societal violence, discrimination, and hate speech.
The press reported isolated cases of violence against gay and lesbian couples. On July 2, a group of teenagers and young adults verbally and physically assaulted a gay couple in a train station in Vernazza. Police arrested one of the perpetrators. When LGBTI persons reported crimes, the government investigated but in some cases failed to identify the perpetrators.
|
<urn:uuid:d1649cff-a153-4d05-b8fc-11941938ec7f>
|
CC-MAIN-2023-14
|
https://preview.state.gov/report/custom/65b8e135d3/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00166.warc.gz
|
en
| 0.963346
| 2,623
| 2.890625
| 3
|
Not long ago, researchers had thought it was rare for the cells in a single healthy person to differ genetically in a significant way. But scientists are finding that it’s quite common for an individual to have multiple genomes. Some people, for example, have groups of cells with mutations that are not found in the rest of the body. Some have genomes that came from other people.
For example, Alexander Urban, a geneticist at Stanford University, and his colleagues investigated mutations in cells called fibroblasts, which are found in connective tissue. They searched in particular for cases in which a segment of DNA was accidentally duplicated or deleted. As they reported last year, 30 percent of the fibroblasts carried at least one such mutation.
Michael Snyder of Stanford University and his colleagues searched for mosaicism by performing autopsies on six people who had died of causes other than cancer. In five of the six people they autopsied, the scientists reported last October, they found cells in different organs with stretches of DNA that had accidentally been duplicated or deleted.
Now that scientists are beginning to appreciate how common chimerism and mosaicism are, they’re investigating the effects of these conditions on our health.
Read the full article at The New York Times here
|
<urn:uuid:b466b1cd-bfcc-4727-b26a-37709f613ae4>
|
CC-MAIN-2023-14
|
https://socgen.ucla.edu/2013/09/16/dna-double-take/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00166.warc.gz
|
en
| 0.980066
| 261
| 3.328125
| 3
|
Location: Global Change and Photosynthesis ResearchTitle: Multiple genomic regions govern tolerance to sulfentrazone in snap bean (Phaseolus vulgaris L.)
|SABALLOS, ANNA - Oak Ridge National Laboratory|
|SOLER-GARZON, ALVARO - Washington State University|
|HART, JOHN - Earthwork Seeds Inc|
|LIPKA, ALEX - University Of Illinois|
|Miklas, Phillip - Phil|
|PEACHEY, RONALD - Oregon State University|
|TRANEL, PAT - University Of Illinois|
Submitted to: Frontiers in Agronomy
Publication Type: Peer Reviewed Journal
Publication Acceptance Date: 5/2/2022
Publication Date: 6/1/2022
Citation: Saballos, A., Soler-Garzon, A., Brooks, M.D., Hart, J., Lipka, A., Miklas, P.N., Peachey, R.E., Tranel, P., Williams, M. 2022. Multiple genomic regions govern tolerance to sulfentrazone in snap bean (Phaseolus vulgaris L.). Frontiers in Agronomy. 4. Article 869770. https://doi.org/10.3389/fagro.2022.869770.
Interpretive Summary: Registering an herbicide on a minor crop requires a thorough understanding of risk of crop injury from the herbicide. Weeds, especially waterhemp, are becoming more difficult to control in snap bean. While sulfentrazone is relatively effective at controlling numerous broadleaf weeds, including waterhemp, snap bean tolerance to the herbicide is unknown. We investigated snap bean tolerance to sulfentrazone in a diversity panel with 277 snap bean entries. In general, snap bean is sensitive to sulfentrazone when applied at a use rate that is most effective at controlling waterhemp; however, some snap bean entries are highly tolerant to the herbicide. We identified several genomic regions associated with crop tolerance to sulfentrazone. The impact of this work is identifying candidate genes conditioning plant tolerance to sulfentrazone which may be exploited for crop improvement and understanding weed resistance.
Technical Abstract: The availability of effective weed management tools against waterhemp (Amaranthus tuberculatus) is crucial to maintain profitable production in snap bean (Phaseolus vulgaris L.). Preemergence herbicides enable the crop to gain a size advantage over the weed, but the few preemergence herbicides registered in snap bean have poor control of waterhemp. Sulfentrazone, a protoporphyrinogen oxidase (PPO) -inhibiting herbicide, provides significant control of waterhemp and other problematic weeds. However, crop tolerance to the herbicide is poorly known. To quantify snap bean tolerance to sulfentrazone and investigate the underlying tolerance mechanism, a genome-wide association mapping study was conducted using field-collected data on a snap bean diversity panel. Response to preemergence application of sulfentrazone was measured using plant population density and shoot biomass variables. High levels of crop tolerance were found in several entries including Bush Romano 71, Navarro, and Flamata. Snap bean tolerance to sulfentrazone is associated with multiple genomic regions, indicating the trait is likely a non-target site resistance (NTSR). Rapid metabolism of the herbicide, as well as differential tolerance to peroxidative stress have been postulated as the mechanisms of NTSR to PPO-inhibiting herbicides. In this study, several cytochrome P450 and ABC transporter genes were localized in associated genomic regions. Of particular interest are the genes Phvul.004G023066 and Phvul.004G023132, annotated as MDR exporters. Homologs of those genes have been directly implicated in soybean tolerance to several herbicides including PPO-inhibitors. Alleles conditioning snap bean tolerance to sulfentrazone identified in the diversity panel shed light on herbicide metabolism and could be used in snap bean improvement. Further research is necessary to confirm candidate genes and their functions.
|
<urn:uuid:e3f546ac-bd73-4195-98c6-1e50d31ac431>
|
CC-MAIN-2023-14
|
https://www.ars.usda.gov/research/publications/publication/?seqNo115=391462
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00166.warc.gz
|
en
| 0.847633
| 923
| 2.59375
| 3
|
France Proposes Mandatory Environmental Rating for Textiles
On 11 February 2020, the French junior Ministry of Environment opened talks with the Environment & Energy Management Agency (ADEME) and around 70 major global fashion/textile actors in France in order to make mandatory, within two years, a scoring system under which apparel and textile products must display a rating from A to E to demonstrate how environmentally friendly they are.
In accordance with the recently enacted Anti-waste and Circular Economy Law 2020-105, the scoring system will help the fashion industry to lower its negative impact on the environment, better inform consumers about the source and processes involved in making clothing, and enable them to quickly identify the most environmentally responsible products.
The rating system will include several environmental criteria including:
- the carbon footprint of producing and transporting the garments
- the amount of water the garment took to produce
- the level of toxicity in the fabric and dye
- the product recyclability, etc.
Want to find out how you can stay on top of regulations relating to apparel and textiles? Talk-to-Us today!
|
<urn:uuid:d6dd0532-cc78-43bf-8954-a47004d138e4>
|
CC-MAIN-2023-14
|
https://www.complianceandrisks.com/blog/france-proposes-mandatory-environmental-rating-for-textiles/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00166.warc.gz
|
en
| 0.933322
| 225
| 2.65625
| 3
|
In graph theory, graph coloring is an arbitrary assignment of labels (colors) to objects within a graph. Such objects can be vertices, edges, faces, or a mixture of those. A graph coloring is distinct from a graph labeling in that in the former, the same label may be used more than once.
Graph coloring is a rich source of theoretical questions and practical applications. It has found applications in areas such as scheduling, register allocation in compilers, frequency assignment in mobile radios, and pattern matching. It has even become popular with the general public in the form of the popular number puzzle Sudoku. Graph coloring is still a very active field of research.
Vertex coloring, the process of assigning a color to each vertex of a graph, is one of the most fundamental types of coloring. Other coloring problems can be transformed into a vertex coloring problems: for example, an edge coloring of a graph is just the vertex coloring of its line graph. Likewise, a face coloring of a planar graph is just the vertex coloring of its (planar) dual.
When used without qualification, the term graph coloring generally means vertex coloring. Also (unless otherwise specified), a coloring is nearly always assumed to be proper, meaning that no two adjacent vertices are assigned the same color.
A coloring using at most k colors is called a (proper) k-coloring and is equivalent to the problem of partitioning the vertex set into k or fewer independent sets.
The least number of colors needed to color the graph is called its chromatic number χ. For example, the chromatic number of a complete graph of n vertices is . A graph that can be assigned a (proper) k-coloring is k-colorable, and it is k-chromatic if its chromatic number is exactly k.
The problem of finding a minimum coloring of a graph is NP-hard. The corresponding decision problem (is there a coloring which uses at most colors?) is NP-complete, and in fact was one of Karp's 21 NP-complete problems. It remains NP-complete even on planar graphs of degree at most 4, as shown by Garey and Johnson in 1974, although on planar graphs it's trivial for k ≠ 3 (due to the four color theorem). There are however some efficient approximation algorithms that employ semidefinite programming.
Some properties of χ(G):
- χ(G) = 1 if and only if G is totally disconnected.
- χ(G) ≥ 3 if and only if G has an odd cycle (equivalently, if G is not bipartite).
- χ(G) ≥ ω(G).
- χ(G) ≤ Δ(G)+1.
- χ(G) ≤ Δ(G) unless G is a complete graph or an odd cycle (Brooks' theorem).
- χ(G) ≤ 4, for any planar graph G. This famous result, called the four-color theorem, was stated by P. J. Heawood in 1890 (first written reference by Augustus De Morgan in 1852), but remained unproven until 1976, when it was established by Kenneth Appel and Wolfgang Haken at the University of Illinois at Urbana-Champaign.
Here Δ(G) is the maximum degree, and ω(G), the clique number.
About infinite graphs, much less is known. The following is one of the few results about infinite graph coloring:
- If all finite subgraphs of an infinite graph G are k-colorable, then so is G. (de Bruijn, Erdős 1951)
The chromatic polynomial counts the number of ways a graph can be coloured using no more than a given number of colours. For example, using three colours, the graph in the image to the right can be coloured in 12 ways. With only two colours, it cannot be coloured at all. With four colours, it can be coloured in 24 + 4⋅12 = 72 ways: using all four colours, there are 4! = 24 valid colourings (every assignment of four colors to any 4-vertex graph is a proper coloring); and for every choice of three of the four colours, there are 12 valid 3-colourings. So, for the graph in the example, a table of the number of valid colourings would start like this:
|Number of colorings||0||0||12||72||…|
The chromatic polynomial is a function that counts the number of -colorings of . As the name indicates, for a given the function is indeed a polynomial in . For the example graph, , and indeed .
The chromatic polynomial includes at least as much information about the colorability of as does the chromatic number. Indeed, χ is the smallest positive integer that is not a root of the chromatic polynomial,
It was first used by Birkhoff and Lewis in their attack on the four-color theorem. It remains an unsolved problem to characterize graphs which have the same chromatic polynomial and to determine precisely what polynomials are chromatic.
|Tree with vertices|
- if contains an edge
- , if .
- is the number of acyclic orientations of
- If has vertices, edges, and components …,, then
- has degree .
- The coefficient of in is 1.
- The coefficient of in is .
- The coefficients of … are all zero.
- The coefficient of is nonzero.
- The coefficients of every chromatic polynomial alternate in signs.
- A graph G with vertices is a tree if and only .
- The derivative evaluated at unity, is the chromatic invariant up to sign
Computing the chromatic polynomial
Whenever contains a loop, it cannot be legally colored at all, so
If not a loop, then the chromatic polynomial satisifes the recurrence relation
where is the graph with the edge removed, and is the graph with the edge's endpoints contracted into a single vertex.
The two expressions give raise to a recursive procedure, called the deletion–contraction algorithm. In the recursive step, the instance is transformed into two instances that are at least one edge smaller, so the running time comes within a polynomial factor of , where is the number of edges. The analysis can be improved to .
Other algorithms are known, but all are exponential in the size of the graph. For some classes of graphs, polynomial-time algorithms are known. These include the empty and complete graphs, forests, chordal graphs, wheels, and ladders. In general, computing the chromatic polynomial is Sharp-P-complete, so it is unlikely that a polynomial time algorithm for all graphs will be found.
List of other colorings
Not only can the idea of vertex coloring be extended to edges, but also be added with different conditions to form new structures and problems.
- edge coloring - edges are colored
- list coloring - each vertex chooses from a list of colors
- list edge-coloring - each edge chooses from a list of colors
- total coloring - vertices and edges are colored
- harmonious coloring - every pair of colors appears on at most one edge
- complete coloring - every pair of colors appears on at least one edge
- exact coloring - every pair of colors appears on exactly one edge
- acyclic coloring - every 2-chromatic subgraph is acyclic
- strong coloring - every color appears in every partition of equal size exactly once
- on-line coloring - the instance of the problem is not given in advance and its successive parts become known over time
- equitable coloring - the sizes of color classes differ by at most one
- sum-coloring - the criterion of minimalization is the sum of colors
- T-coloring - distance between two colors of adjacent vertices must not belong to fixed set T
- rank coloring - if two vertices have the same color i, then every path between them contain a vertex with color greater than i.
- interval edge-coloring - a color of edges meeting in a common vertex must be contiguous.
- circular coloring - motivated by task systems in which production proceeds in a cyclic way
- path coloring - models a routing problem in graphs
- fractional coloring - vertices may have multiple colors, and on each edge the sum of the color parts of each vertex is not greater than one
Some improper colorings:
- cocoloring -- every color class induces an independent set or a clique
- subcoloring -- every color class induces a union of cliques
Applications to Computer Science
Main Article: register allocation by graph coloring
In Computer Science, compilers---computer programs which translate one formal language to another---can employ vertex coloring to determine a satisfactory solution to the problem of register allocation. Vertex coloring is the most popular approach, and is one of the most effective.
Typically, a compiler will translate a source written in a high-level language (HLL) to a target in assembly language or machine code. There are a few critical differences between the source and target languages. In particular, HLLs allow for a large or unlimited number of variables, while the typical microprocessor only allows for efficient access to a small number of variables, called registers, and inefficient access to main memory. Since only a small percentage of the variables within a computer program are used at one time, there is an opportunity to place multiple variables into the same register---but only if those variables are not used at the same time.
The register allocation problem can be viewed as a vertex coloring problem as follows: every variable in a program is treated as a vertex in an undirected graph. Then, if at any point during program execution two variables each hold some value that will later be read, then those two variables are said to interfere, and an edge is drawn between them. Unfortunately, it is not always possible to determine if two variables interfere (a consequence of the halting problem), and thus a compiler must act conservatively and assume that they do interfere unless they can be shown not to. This graph is called the interference graph.
As was mentioned earlier, determining a -coloring for a graph is NP-Hard. Nonetheless, the compiler must solve such a problem. Thus, a compiler uses a heuristic algorithm to produce a non-optimal solution to the vertex coloring problem, attempting to minimize the number of colors used. If, ultimately, the number of colors used is greater than the number of registers in the target language, then the graph must be transformed to reduce the number of necessary colors. A compiler accomplishes this by spilling one or more variables, storing them in a memory location instead of a register.
- ↑ Stanley, 1973
- R. L. Brooks: On colouring the nodes of a network. In: Proc. Cambridge Phil. Soc. 37, 1941, 194–197.
- N. G. de Bruijn, P. Erdős: A colour problem for infinite graphs and a problem in the theory of relations. In: Nederl. Akad. Wetensch. Proc. Ser. A 54, 1951 371–373. (Indag. Math. 13.)
- Tommy R. Jensen, Bjarne Toft: Graph coloring problems. Wiley-Interscience, New York 1995 ISBN 0-471-02865-7.
- Marek Kubale and others: Graph Colorings. American Mathematical Society 2004 ISBN 0-8218-3458-4.
- M. R. Garey, D. S. Johnson, and L. Stockmeyer. Some simplified NP-complete problems. Proceedings of the sixth annual ACM symposium on Theory of computing, p.47-63. 1974.
- Michael R. Garey and David S. Johnson (1979). Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman. ISBN 0-7167-1045-5. A1.1: GT4, pg.191.
- Four-color theorem
- Uniquely colorable graph
- Critical graph
- Graph homomorphism
- Perfect graph
- Hadwiger–Nelson problem
- register allocation by graph coloring
- Graph Coloring Page by Joseph Culberson (graph coloring programs)
- CoLoRaTiOn by Jim Andrews and Mike Fellows is a graph coloring puzzle
- GF-Graph Coloring Program
|
<urn:uuid:8e0b916b-a20d-4d07-8222-d02710563076>
|
CC-MAIN-2023-14
|
https://en.citizendium.org/wiki/Graph_coloring
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00166.warc.gz
|
en
| 0.895667
| 2,725
| 3.78125
| 4
|
People who are admitted to a medical center for an emergency or even a planned operation typically worry that the surgical team will be skilled and rested. It doesn’t enter their mind that the hospital may be at risk because of malicious cyber attacks on its sensitive electronic equipment.
However, an Israeli specialist in this growing and increasingly worrisome field has just declared at a meeting of the Radiological Society of North American (RSNA) in Chicago that Internet connectivity of medical imaging equipment raises the potential danger for such attacks.
Ben-Gurion University of the Negev researcher and doctoral candidate Tom Mahler presented his team’s approach to solutions using artificial intelligence (AI) to prevent future attacks.
The RSNA is an association of over 54,000 radiologists, radiation oncologists, medical physicists and related scientists that promotes excellence in patient care and health care delivery through education, research and technological innovation.
Mahler told the participants that the Internet has been beneficial for health care – radiology included – improving access in remote areas, allowing for faster and better diagnoses and greatly improving the management and transfer of medical records and images. Medical imaging devices such as x-ray, mammography, magnetic resonance (MRI) and computerized tomography (CT) machines play a vital role in diagnosis and treatment.
But as these devices are typically connected to hospital networks, they can be potentially susceptible to sophisticated cyberattacks, including ransomware attacks that can disable the machines, said Mahler.
The BGU expert is a researcher at Cyber@bgu, an umbrella organization at the university in Beersheba that deals with various aspects of cybersecurity, big data analytics and AI applied research activities. With Beersheba increasingly being called Israel’s Cyber Capital, the umbrella organization is located in the R&D center on the campus’s new hi-tech park.
Cyber@bgu serves as a platform for the most innovative and technologically challenging projects with various industrial and governmental partners. Mahler showed the Chicago audience could bypass security mechanisms of a CT machine to manipulate its behavior. Because CT scanners use ionizing radiation, changes to dose could negatively affect image quality, or – in extreme cases – endanger the health of the patient.
Hacking a system is the first step in determining vulnerabilities and creating solutions. “In the current phase of our research, we focus on developing an anomaly detection system using advanced AI methods to train the system with actual commands recorded from actual equipment. The system will monitor scan protocols to detect whether outgoing commands are malicious before they are executed and will alert or possibly stop if it detects an issue,” said Mahler.
Mahler and his fellow cyber researchers are working on new techniques to secure CT devices based on machine learning. Their approach assumes a host PC is already infected with malware. The machine-learning algorithm analyzes the profile of the patient being scanned, the actual and the outgoing commands before they reach the CT itself. This completely prevents the CT malware attack and infection. They are interested in collaborating with imaging manufacturers or hospital systems for on-site evaluation.
While other solutions have focused on securing the entire hospital network, the solution that his team offers is oriented towards hospital devices, he said. “Our goal is to be the last line of defense for medical imaging devices to prevent as many attacks as possible.”
The BGU approach to detect defects included developing a system using AI to train data consisting of real commands recorded from actual devices. The model learns to recognize typical imaging scan protocols and to predict if a new, unseen command is legitimate or not. If an attacker sends a malicious command to the device, the system will detect it and alert the operator before the command is executed.
He noted that the system is not yet complete, but the results are a significant milestone on the path to securing medical imaging devices.
The development of medical information devices, from concept to market, takes three to seven years, Mahler noted. Cyber threats can change significantly over that period; this leaves medical imaging devices highly vulnerable. “If health-care manufacturers and hospitals take a pro-active approach, we can prevent such attacks from happening in the first place.” The next step in this process is to collect more scans from different devices and sites to create a more accurate model.
Earlier this year, Mahler said at a Tel Aviv Cybertech Conference that manufacturers of medical imaging devices and healthcare providers must do more to protect equipment in hospitals and in and community health clinics from cyber threats. He showed the relative ease of exploiting “unpatched” medical devices whose owners and operators don’t download ongoing security updates. Mahler predicted that the number of attacks will grow and that there would be more sophisticated skills directed at the mechanics and software that are often installed on outdated PCs.
The Tel Aviv conference was one of the biggest and most important cyber events in the world, attracting thousands of individual participants and delegations from 80 countries.
The study, conducted in collaboration with Clalit Health Services (Israel’s largest health maintenance organization), included a comprehensive risk analysis survey based on the “confidentiality, integrity and availability” risk model, which addresses information security within an organization.
Researchers targeted a range of vulnerabilities in medical and imaging information systems and medical protocols and standards. While they discovered weak spots in many of the systems, they found that CT devices face the greatest risk of cyber attack due to their pivotal role in acute-care imaging.
“In cases where even a small delay can be fatal or where a dangerous tumor is removed or erroneously added to an image, a cyber attack can be fatal,” warned Mahler. “However, strict regulations make it difficult to conduct basic updates on medical PCs, and merely installing anti-virus protection is insufficient for preventing cyber attacks.”
|
<urn:uuid:076e14cb-fdf4-4895-b808-356c0812cdfb>
|
CC-MAIN-2023-14
|
https://www.israel365news.com/327378/protecting-hospital-cyber-attacks/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00166.warc.gz
|
en
| 0.94896
| 1,191
| 2.90625
| 3
|
Personal Finance: Cash vs. Accrual, and the Balance Sheet
- Distinguish accrual and cash accounting.
- Compare and contrast the three common financial statements.
- Identify the results shown on the income statement, balance sheet, and cash flow statement.
- Explain the calculation and meaning of net worth.
- Trace how a bankruptcy can occur.
Clay tablets interested Sumerian traders because the records gave them a way to see their financial situation and to use that insight to measure progress and plan for the future. The method of accounting universally used in business today is known as accrual accounting, in which events are accounted for even if cash does not change hands. That is, transactions are recorded at the time they occur rather than when payment is actually made or received. Anticipated or preceding payments and receipts (cash flows) are recorded as accrued or deferred. Accrual accounting is the opposite of cash accounting, in which transactions are recognized only when cash is exchanged.
Accrual accounting defines earning as an economic event signified by an exchange of goods rather than by an exchange of cash. In this way, accrual accounting allows for the separation in time of the exchange of goods and the exchange of cash. A transaction can be completed over time and distance, which allows for extended—and extensive—trade. Another advantage of accrual accounting is that it gives a business a more accurate picture of its present situation in reality.
Modern accounting techniques developed during the European Age of Discovery, which was motivated by ever-expanding trade. Both the principles and the methods of modern accrual accounting were first published in a text by Luca Pacioli in 1494,Luca Pacioli, Summa de arithmetica, geometria, proportioni et proportionalita (Venice: Luca Pacioli, 1494). For more information on Pacioli, see http://en.wikipedia.org/wiki/Luca_Pacioli (accessed November 23, 2009). although they were probably developed even before that. These methods of “keeping the books” can be applied to personal finance today as they were to trading in the age of long voyages for pepper and cloves, and with equally valuable results.
Nevertheless, in personal finance it almost always makes more sense to use cash accounting, to define and account for events when the cash changes hands. So in personal finance, incomes and expenses are noted when the cash is received or paid, or when the cash flows.
The Accounting Process
Financial decisions result in transactions, actual trades that buy or sell, invest or borrow. In the market economy, something is given up in order to get something, so each trade involves at least one thing given up and one thing gotten—two things flowing in at least two directions. The process of accounting records these transactions and records what has been gotten and what has been given up to get it, what flows in and what flows out.
In business, accounting journals and ledgers are set up to record transactions as they happen. In personal finance, a checkbook records most transactions, with statements from banks or investment accounts providing records of the rest. Periodically, the transaction information is summarized in financial statements so it can be read most efficiently.
Bookkeeping—the process of recording what and how and by how much a transaction affects the financial situation—is how events are recorded. Since the advent of accounting software, bookkeeping, like long division and spelling, has become somewhat obsolete, although human judgment is still required. What is more interesting and useful are the summary reports that can be produced once all this information is recorded: the income statement, cash flow statement, and balance sheet.
The income statement summarizes incomes and expenses for a period of time. In business, income is the value of whatever is sold, expenses are the costs of earning that income, and the difference is profit. In personal finance, income is what is earned as wages or salary and as interest or dividends, and expenses are the costs of things consumed in the course of daily living: the costs of sustaining you while you earn income. Thus, the income statement is a measure of what you have earned and what your cost of living was while earning it. The difference is personal profit, which, if accumulated as investment, becomes your wealth.
The income statement clearly shows the relative size of your income and expenses. If income is greater than expenses, there is a surplus, and that surplus can be used to save or to spend more (and create more expenses). If income is less than expenses, then there is a deficit that must be addressed. If the deficit continues, it creates debts—unpaid bills—that must eventually be paid. Over the long term, a deficit is not a viable scenario.
The income statement can be useful for its level of detail too. You can see which of your expenses consumes the greatest portion of your income or which expense has the greatest or least effect on your bottom line. If you want to reduce expenses, you can see which would have the greatest impact or would free up more income if you reduced it. If you want to increase income, you can see how much more that would buy you in terms of your expenses (Figure 3.3 "Alice’s Situation (in Dollars)"). For example, consider Alice’s situation per year.
She also had car payments of $2,400 and student loan payments of $7,720. Each loan payment actually covers the interest expense and partial repayment of the loan. The interest is an expense representing the cost of borrowing, and thus of having, the car and the education. The repayment of the loan is not an expense, however, but is just giving back something that was borrowed. In this case, the loan payments break down as follows (Figure 3.4 "Alice’s Loan Payments (Annually)").
Breaking down Alice’s living expenses in more detail and adding in her interest expenses, Alice’s income statement would look like this (Figure 3.5 "Alice’s Income Statement for the Year 2009").
Alice’s disposable income, or income to meet expenses after taxes have been accounted for, is $35,720. Alice’s net ncome, or net earnings or personal profit, is the remaining income after all other expenses have been deducted, in this case $6,040.
Now Alice has a much clearer view of what’s going on in her financial life. She can see, for example, that living expenses take the biggest bite out of her income and that rent is the biggest single expense. If she wanted to decrease expenses, finding a place to live with a cheaper rent will make the most impact on her bottom line. Or perhaps it would make more sense to make many small changes rather than one large change, to cut back on several other expenses. She could begin by cutting back on the expense items that she feels are least necessary or that she could most easily live without. Perhaps she could do with less entertainment or clothing or travel, for example. Whatever choices she subsequently made would be reflected in her income statement. The value of the income statement is in presenting income and expenses in detail for a particular period of time.
Cash Flow Statement
The cash flow statement shows how much cash came in and where it came from, and how much cash went out and where it went over a period of time. This differs from the income statement because it may include cash flows that are not from income and expenses. Examples of such cash flows would be receiving repayment of money that you loaned, repaying money that you borrowed, or using money in exchanges such as buying or selling an asset.
The cash flow statement is important because it can show how well you do at creating liquidity, as well as your net income. Liquidity is nearness to cash, and liquidity has value. An excess of liquidity can be sold or lent, creating additional income. A lack of liquidity must be addressed by buying it or borrowing, creating additional expense.
Looking at Alice’s situation, she has two loan repayments that are not expenses and so are not included on her income statement. These payments reduce her liquidity, however, making it harder for her to create excess cash. Her cash flow statement looks like this (Figure 3.6 "Alice’s Cash Flow Statement for the Year 2009").
As with the income statement, the cash flow statement is more useful if there are subtotals for the different kinds of cash flows, as defined by their sources and uses. The cash flows from income and expenses are operating cash flows, or cash flows that are a consequence of earning income or paying for the costs of earning income. The loan repayments are cash flows from financing assets or investments that will increase income. In this case, cash flows from financing include repayments on the car and the education. Although Alice doesn’t have any in this example, there could also be cash flows from investing, from buying or selling assets. Free cash flow is the cash available to make investments or financing decisions after taking care of operations and debt obligations. It is calculated as cash flow from operations less debt repayments.
The most significant difference between the three categories of cash flows—operating, investing, or financing—is whether or not the cash flows may be expected to recur regularly. Operating cash flows recur regularly; they are the cash flows that result from income and expenses or consumption and therefore can be expected to occur in every year. Operating cash flows may be different amounts in different periods, but they will happen in every period. Investing and financing cash flows, on the other hand, may or may not recur and often are unusual events. Typically, for example, you would not borrow or lend or buy or sell assets in every year. Here is how Alice’s cash flows would be classified (Figure 3.7 "Alice’s Cash Flow Statement for the Year 2009").
This cash flow statement more clearly shows how liquidity is created and where liquidity could be increased. If Alice wanted to create more liquidity, it is obvious that eliminating those loan payments would be a big help: without them, her net cash flow would increase by more than 3,900 percent.
In business or in personal finance, a critical piece in assessing the current situation is the balance sheet. Often referred to as the “statement of financial condition,” the balance sheet is a snapshot of what you have and what you owe at a given point in time. Unlike the income or cash flow statements, it is not a record of performance over a period of time, but simply a statement of where things stand at a certain moment.
The balance sheet is a list of assets, debts or liabilities, and equity or net worth, with their values. In business, assets are resources that can be used to create income, while debt and equity are the capital that financed those assets. Thus, the value of the assets must equal the value of the debt and the equity. In other words, the value of the business’s resources must equal the value of the capital it borrowed or bought in order to get those resources.
assets = liabilities + equity
In business, the accounting equation is as absolute as the law of gravity. It simply must always be true, because if there are assets, they must have been financed somehow—either through debt or equity. The value of that debt and equity financing must equal or balance the value of the assets it bought. Thus, it is called the “balance” sheet because it always balances the debt and equity with the value of the assets.
In personal finance, assets are also things that can be sold to create liquidity. Liquidity is needed to satisfy or repay debts. Because your assets are what you use to satisfy your debts when they become due, the assets’ value should be greater than the value of your debts. That is, you should have more to work with to meet your obligations than you owe.
The difference between what you have and what you owe is your net worth. Literally, net worth is the share that you own of everything that you have. It is the value of what you have net of (less) what you owe to others. Whatever asset value is left over after you meet your debt obligations is your own worth. It is the value of what you have that you can claim free and clear.
assets − debt = net worth
Your net worth is really your equity or financial ownership in your own life. Here, too, the personal balance sheet must balance, because if
assets − debts = net worth,
then it should also be
assets = debts + net worth.
Alice could write a simple balance sheet to see her current financial condition. She has two assets (her car and her savings account), and she has two debts (her car and student loans) (Figure 3.8 "Alice’s Balance Sheet, December 31, 2009").
Alice’s balance sheet presents her with a much clearer picture of her financial situation, but also with a dismaying prospect: she seems to have negative net worth. Negative net worth results whenever the value of debts or liabilities is actually greater than the assets’ value. If
liabilities<assetsthenassets − liabilities>0;net worth>0 (net worth is positive)Ifliabilities>assetsthenassets − liabilities<0;net worth<0 (net worth is negative)
Negative net worth implies that the assets don’t have enough value to satisfy the debts. Since debts are obligations, this would cause some concern.
Net Worth and Bankruptcy
In business, when liabilities are greater than the assets to meet them, the business has negative equity and is literally bankrupt. In that case, it may go out of business, selling all its assets and giving whatever it can to its creditors or lenders, who will have to settle for less than what they are owed. More usually, the business continues to operate in bankruptcy, if possible, and must still repay its creditors, although perhaps under somewhat easier terms. Creditors (and the laws) allow these terms because creditors would rather get paid in full later than get paid less now or not at all.
In personal finance, personal bankruptcy may occur when debts are greater than the value of assets. But because creditors would rather be paid eventually than never, the bankrupt is usually allowed to continue to earn income in the hopes of repaying the debt later or with easier terms. Often, the bankrupt is forced to liquidate (sell) some or all of its assets.
Because debt is a legal as well as an economic obligation, there are laws governing bankruptcies that differ from state to state in the United States and from country to country. Although debt forgiveness was discussed in the Old Testament, throughout history it was not uncommon for bankrupts in many cultures to be put to death, maimed, enslaved, or imprisoned. BankruptcyData.com, http://www.bankruptcydata.com/Ch11History.htm (accessed January 19, 2009). The use of another’s property or wealth is a serious responsibility, so debt is a serious obligation.
However, Alice’s case is actually not as dismal as it looks, because Alice has an “asset” that is not listed on her balance sheet, that is, her education. It is not listed on her balance sheet because the value of her education, like the value of any asset, comes from how useful it is, and its usefulness has not happened yet, but will happen over her lifetime. It will happen in her future, based on how she chooses to use her education to increase her income and wealth. It is difficult to assign a monetary value to her education now. Alice knows what she paid for her education, but, sensibly, its real value is not its cost but its potential return, or what it can earn for her as she puts it to use in the future.
Current studies show that a college education has economic value, because a college graduate earns more over a lifetime than a high school graduate. Recent estimates put that difference at about $1,000,000.Sandy Baum and Jennifer Ma, “Education Pays: The Benefits of Higher Education for Individuals and Society” (Princeton, NJ: The College Board, 2007). So, if Alice assumes that her education will be worth $1,000,000 in extra income over her lifetime, and she includes that asset value on her balance sheet, then it would look more like this (Figure 3.10 "Alice’s Balance Sheet (revised), December 31, 2009"):
This looks much better, but it’s not sound accounting practice to include an asset—and its value—on the balance sheet before it really exists. After all, education generally pays off, but until it does, it hasn’t yet and there is a chance, however slim, that it won’t for Alice. A balance sheet is a snapshot of one’s financial situation at one particular time. At this particular time, Alice’s education has value, but its amount is unknown.
It is easy to see, however, that the only thing that creates negative net worth for Alice is her student loan. The student loan causes her liabilities to be greater than her assets—and if that were paid off, her net worth would be positive. Given that Alice is just starting her adult earning years, her situation seems quite reasonable.
- Three commonly used financial statements are the income statement, the cash flow statement, and the balance sheet.
- Results for a period are shown on the income statement and the cash flow statement. Current conditions are shown on the balance sheet.
- The income statement lists income and expenses.
- The cash flow statement lists three kinds of cash flows: operating (recurring), financing (nonrecurring), and investing (nonrecurring).
- The balance sheet lists assets, liabilities (debts), and net worth.
- Net worth = assets − debts.
- Bankruptcy occurs when there is negative net worth, or when debts are greater than assets.
- Prepare a personal income statement for the past year, using the same format as Alice’s income statement in this chapter. Include all relevant categories of income and expenses. What does your income statement tell you about your current financial situation? For example, where does your income come from, and where does it go? Do you have a surplus of income over expenses? If, so what are you doing with the surplus? Do you have a deficit? What can you do about that? Which of your expenses has the greatest effect on your bottom line? What is the biggest expense? Which expenses would be easiest to reduce or eliminate? How else could you reduce expenses? Realistically, how could you increase your income? How would you like your income statement for the next year to look?
- Using the format for Alice’s cash flow statement, prepare your cash flow statement for the same one-year period. Include your cash flows from all sources in addition to your operating cash flows—the income and expenses that appear on your income statement. What, if any, were the cash flows from financing and the cash flows from investing? Which of your cash flows are recurring, and which are nonrecurring? What does your cash flow statement tell you about your current financial situation? If you wanted to increase your liquidity, what would you try to change about your cash flows?
- Now prepare a balance sheet, again based on Alice’s form. List all your assets, liabilities and debts, and your equity from all sources. What does the balance sheet show about your financial situation at this moment in time? What is your net worth? Do you have positive or negative net worth at this time, and what does that mean? To increase your liquidity, how would your balance sheet need to change? What would be the relationship between your cash flow statement and your budget?
- Read the CNNMoney.com article “How Much Are You Worth?” (October 3, 2003, by Les Christie, at http://money.cnn.com/2003/09/30/pf/millionaire/networth/), and use the data and calculator to determine your net worth. How does you net worth compare to that of other Americans in your age and income brackets?
- The Small Business Administration’s Personal Financial Statement combines features of an income statement and a balance sheet. You would fill out a similar form if you were applying for a personal or business loan at bank or mortgage lender. Go to http://www.sba.gov/sbaforms/sba413.pdf and compare and contrast the SBA form with the statements you have already created for this chapter’s exercises.
|
<urn:uuid:c75480fc-a975-431e-a16a-ae1fe2449812>
|
CC-MAIN-2023-14
|
https://www.beardsandmoney.com/the-twitter-marketing-experiment/personal-finance-cash-vs-accrual-balance-sheet
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945279.63/warc/CC-MAIN-20230324082226-20230324112226-00166.warc.gz
|
en
| 0.966228
| 4,329
| 3.6875
| 4
|
This post is part of our series on the Bill of Rights. We’re highlighting primary sources from our student workbook Putting the Bill of Rights to the Test, that helps students explore core concepts found within the Bill of Rights, and how they’ve impacted American history. This year marks the 225th anniversary of the ratification of the first 10 amendments to the Constitution, known as the Bill of Rights. The National Archives is commemorating the occasion with exhibits, educational resources, and national conversations that examine the amendment process and struggles for rights in the United States.
Teachers often use hot topics in the forefront of today’s news to motivate student learning and exploration. The Second Amendment to the U.S. Constitution, because of its controversial nature and ability to polarize large groups in today’s news, might be used effectively as motivation to teach topics such as the importance of plain writing, understanding historical context, and using fundamental research skills in primary sources.
One classroom approach might begin with a class discussion using two primary sources that help illustrate how long the modern controversy surrounding the 2nd Amendment has been going on.
After comparing these documents, display for students the text of the 2nd Amendment: “A well-regulated Militia, being necessary to the security of a Free State, the right of the people to keep and bear Arms, shall not be infringed.”
Ask students to answer: Do we really know the exact meaning of the 2nd amendment? Why or why not? (Note: Many court battles have been fought and won on both sides of the gun-control controversy and the arguments on both sides rage on. See the Cornell Legal Information Institute’s analysis, including some specific court cases.)
Illustrating the Importance of Plain Writing
Instruct students to rewrite the amendment so it is clearer and more applicable to their lives in modern society. Save this to compare to later examples. You might want to discuss the concept of preconceived ideas and personal bias in writing at this time as well.
Then ask: Why does the amendment begin with the concept of a “militia?” What is a militia?
A quick look at a dictionary will reveal something like (http://www.merriam-webster.com/dictionary/):
A group of people who are not part of the armed forces of a country but are trained like soldiers.
- a part of the organized armed forces of a country liable to call only in emergency
- a body of citizens organized for military service
- The whole body of able-bodied male citizens declared by law as being subject to military service
Have students read and compare the following two primary sources: what later became the Kansas State Constitution (1859) and New York’s proposed amendments to the U.S. Constitution (1788). Point out the wording about the right to bear arms and the need for a militia.
See section 4 of the Kansas Territory Wyandotte Constitution:
The people have the right to bear arms for their defense and security, but standing armies, in time of peace, are dangerous to liberty, and shall not be tolerated, and the military shall be in strict subordination to the civil power.
See page 3 of New York’s Ratification of the Constitution with Proposed Amendments:
That the People have the right to keep and bear arms; that a well-regulated Militia, including the body of the People capable of bearing arms, is the proper, natural and safe defense of a Free State; that the Militia should not be subject to martial law, except in times of War, Rebellion, and Insurrection.
That standing Armies in time of peace are dangerous to Liberty, and ought not to be kept up, except in Cases of necessity; and that at all times the Military should be under strict subordination to the civil Power.
Placing Primary Sources in Historical Context
Share with students text from the second paragraph of the Declaration of Independence:
He has kept among us, in times of peace, Standing Armies without the Consent of our legislatures.
He has affected to render the Military independent of and superior to the Civil power.
Direct them to the Founders Online, a National Archives website of correspondence between George Washington, Benjamin Franklin, John Adams (and family), Thomas Jefferson, Alexander Hamilton, and James Madison before, during, and after the creation of the Bill of Rights.
Share some relevant examples of results for searches on “militia,” “standing army,” and other terms gathered from the example documents. (Explain that a “standing Army” is nearly the opposite of a “militia;” it is a professional military, active in peacetime as well as during time of war, with little or no civilian control.)
John Adams’ “Essay on Man’s Lust for Power” (29 August 1763) with Author’s Comment in 1807:
Power is a Thing of infinite Danger and Delicacy, and was never yet confided to any Man or any Body of Men without turning their Heads.—Was there ever, in any Nation or Country, since the fall, a standing Army that was not carefully watched and contrould by the State so as to keep them impotent, that did not, ravish, plunder, Massacre and ruin, and at last inextricably inslave the People…
Letter to Benjamin Franklin from the Massachusetts House of Representatives, 6 November 1770
… So wretched is the State of this Province, not only to be subjected to absolute Instructions given to the Governor to be the Rule of his Administration, whereby some of the most essential Clauses of our Charter vesting in him Powers to be exercised for the Good of the People are totally rescinded, which is in reality a State of Despotism; but also to a Standing Army, which being uncontrouled by any Authority in the Province, must soon tear up the very Foundation of civil Government.
Letter from Thomas Jefferson to James Madison, Secretary of State, during the Constitutional Convention, 20 Dec 1787
…I will now add what I do not like. First the omission of a bill of rights providing clearly and without the aid of sophisms for freedom of religion, freedom of the press, protection against standing armies, restriction against monopolies, the eternal and unremitting force of the habeas corpus laws, and trials by jury in all matters of fact triable by the laws of the land and not by the law of Nations…
Ask students to search Founders Online themselves for more evidence of colonial discussions centered on the militia, standing armies, and the right to bear arms written in the mid to late 1700s. Discuss how day-to-day life differed in 1787 from today. Have them decide what the reasons might be for having the right to keep and bear arms in that time period. After gathering more evidence, ask them to rewrite the 2nd Amendment again in their own words as if they were living in 1787 and then compare the three versions:
- the actual 2nd Amendment,
- their first rewritten modern version, and
- their rewritten version from the viewpoint of a citizen in 1787.
2 thoughts on “Examining the Second Amendment Using Plain Writing and Historical Context”
I think there are seven draft versions of the second amendment. This page should link to those drafts.
|
<urn:uuid:5786225e-c605-4af3-a310-393001ebaf9e>
|
CC-MAIN-2023-14
|
https://education.blogs.archives.gov/2016/05/10/teaching-the-second-amendment/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00166.warc.gz
|
en
| 0.950838
| 1,532
| 4.4375
| 4
|
Positive thinking has been gaining traction in recent years as a means of improving mental and physical health. In recent times, it has become increasingly accepted that the power of positive thinking can have a profound impact on our lives. Positive thinking is not just a new age concept, but is now backed by scientific research. In this article, we will look at the scientific evidence that suggests positive thinking can improve your life.
The main concept behind positive thinking is that your thoughts influence your attitude and behavior. A positive attitude can lead to increased confidence and motivation, which can then lead to better performance in a particular task or activity.
Studies have found that positive thinking can have a direct effect on our physical health. A study conducted in 2009 at the University of California Los Angeles (UCLA) discovered that positive thinking can reduce the risk of developing heart disease. Another study published in 2016 in the American Journal of Cardiology found that people who had higher levels of optimism were less likely to experience a heart attack or stroke.
Positive thinking can also have an effect on our mental health. Studies have found that positive thinking can help reduce depression, anxiety, and stress. A study conducted in 2016 found that people who practiced positive thinking were less likely to experience feelings of depression. A different study published in 2015 in the journal PLOS ONE found that positive thinking can help to reduce stress in individuals.
The power of positive thinking can also have an effect on our overall life satisfaction. A study conducted in 2017 in the journal Social Psychological and Personality Science found that people who engaged in positive thinking felt a greater sense of life satisfaction than those who did not.
The science behind positive thinking is clear: it has the potential to improve our physical and mental health, leading to a better quality of life overall. By engaging in positive thinking, we can improve our attitude and behavior, gaining more confidence and motivation in both our personal and professional lives.
Positive thinking isn’t just about thinking happy thoughts – it’s about being mindful of our thoughts and reactions, and consciously making an effort to think positively. It’s about being aware of the impact our thoughts can have on our lives, and making a conscious effort to think positively in order to positively influence our lives.
So, if you’re looking to make a positive change in your life, positive thinking is a great place to start. With the right mindset and attitude, you can start to reap the rewards of positive thinking and begin to experience the positive effects it can have on your life.
|
<urn:uuid:7a4061bf-f430-4cdb-82d0-fb80425305e3>
|
CC-MAIN-2023-14
|
https://www.justnews.io/the-science-behind-how-positive-thinking-can-change-your-life/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00166.warc.gz
|
en
| 0.962208
| 513
| 3.40625
| 3
|
Chronic Dry Eye Disease
If you find yourself using artificial tears often, like when you’re checking
e-mail or going outdoors for a run, it may mean you have a disease called Chronic Dry Eye. Chronic Dry Eye is sometimes called dry eye disease or dry eye syndrome. It is also known by the medical name keratoconjunctivitis sicca (pronounced “carrot-oh-con-junk-tiv-it-is seek-a”). But the important thing to remember is that Chronic Dry Eye is a disease and that there is medical treatment available.
Chronic Dry Eye is a chronic disease that can be caused by advanced age, contact lens wear, certain medications, eye diseases, other medical conditions, or environmental factors.
One type of Chronic Dry Eye is caused by decreased tear production due to inflammation. Without enough tears, the film protecting the eye can break down, creating dry spots on the surface of the eye. That’s why it is so important to see your eye doctor. Fortunately, there are prescription options available.
What Happens When You Have This Type of Chronic Dry Eye Disease?
leading to decreased tear production
Talk to your eye doctor if you have dry eyes…because what you don’t see can hurt you
You can’t see the inflammation that causes Chronic Dry Eye disease. To find out if you have Chronic Dry Eye, you’ll need to talk to your eye doctor and get tested. Watch a video about why you shouldn't wait to talk to your eye doctor. If you do have this disease, you’re not alone—many people suffer from this type of Chronic Dry Eye. Meet other people like you.
(credit to www.restasis.com)
|
<urn:uuid:6b42e02d-81c8-47f2-b205-78175a9b0636>
|
CC-MAIN-2023-14
|
https://www.wjgarvinod.com/eyecare-services/dry-eye.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00166.warc.gz
|
en
| 0.92999
| 372
| 3.28125
| 3
|
Engineering Nanomaterials Assignment Help
Nanomaterials explain, in concept, products which a single system is sized (in a minimum of one measurement) in between 1 and 1000 nanometres (10 − 9 meter) however is typically 1-- 100 nm (the normal meaning of nanoscale. Nanomaterials research study takes a products science-based technique to nanotechnology, leveraging advances in products metrology and synthesis which have actually been established in assistance of microfabrication research study.
Products with structure at the nanoscale frequently have distinct optical, electronic, or mechanical homes. Nanostructured products show remarkable residential or commercial properties unique from those of bulk products and are being utilized in applications as varied as drug shipment, solar power, and lubrication.
Nanomaterials research study is focused in locations such as coverings, composite products, photo-acoustic microscopy, nanoscale products, and multi-scale modeling. Research study, frequently carried out with market partners, covers a series of application locations, consisting of mechanics and fluid characteristics at the nano-scale, and establishing improved products processing abilities for opto-electronic applications, advanced engines and power systems. Nanotechnology is one of the most quickly advancing clinical innovations today. A nanometer is one billionth of a meter. There are 2 techniques are utilized to produce nanomaterials. In the very first technique really little elements are produced utilizing bigger parts of the product.
One considerable residential or commercial property that makes nanoparticles various from other products is the truth that nanomaterials have a huge surface location. Its amazing strength is due to the greater surface location of its stemming products. One of popular application of nanomaterials is nanotubes. They are understood to be one of the greatest products having actually been produced by nanotechnology so far. They have actually been utilized for fields like electronic and chemistry so they cannot be thought about as a brand-new product. 2 dimensional products like wires and tubes are the other type of applications of nanotechnology. There dimensional nanomaterial applications consist of nanoparticles like fullerenes and dendrimers. Dendrimers are round polymeric particles that are formed through a nanoscale self-assembly procedure.
Engineering Nanomaterials Homework Help
Nano and micro electromechanical devices are made in the billions every year for picking up, ink jet printing, vehicle applications, interactions, and medication. Microelectromechanical systems (MEMS) variety in size from a particle of dust to about the size of a grain of rice. In medication, bioMEMS guarantee to change biotechnology and biomedical engineering through fabrication of gadgets under 100 micrometers utilizing unique micro and nano fabrication methods. The most well-known of all nanomaterials is the carbon nanotube. The nanotube, which is a sheet of carbon comparable to that in graphite however rolled into a tube, is most likely the greatest product understood to guy. While the homes kept in mind above are discovered for single nanotubes, it is extremely challenging to integrate lots of nanotubes together to form engineering structures. This is the world of the products engineer. Products engineers are actively working with researchers to establish the next generation of such products. Get immediate assistance for Engineering Nanomaterials Assignment aid & Engineering Nanomaterials research assistance. Our Engineering Nanomaterials Online tutors assist with Engineering Nanomaterials tasks & weekly research issues at the college & university level. We make sure total Engineering Nanomaterials options prior to the due date. Our exceptional tutorbase for Engineering Nanomaterials enure ontime shipment of Engineering Nanomaterials project services.
|
<urn:uuid:b157a923-804e-49a6-abeb-6c8e92f626eb>
|
CC-MAIN-2023-14
|
https://civilengineeringaid.xyz/engineering-nanomaterials-assignment-help-20469
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00166.warc.gz
|
en
| 0.934592
| 762
| 2.921875
| 3
|
By Madison McClure and Austin White, Child and Family Development
Torticollis, plagiocephaly, brachiocephaly, and cranial bands – oh my! You may have heard these words before but what do they mean?
What is torticollis? Torticollis, or congenital muscular torticollis, is Latin for “twisted neck.” It describes when a baby’s head is constantly tilted to one side. Often times, the neck is also rotated towards the opposite direction.
What causes torticollis? Several neck muscles can be involved in torticollis although the most commonly referred to is called the sternocleidomastoid, or the SCM for short. When this muscle is tight, you will notice the baby prefers looking to one side, which is one component of the “twisted neck.” The SCM can become tight from positioning in the womb or after birth.
Often times, torticollis does not stop at the neck. It can begin to affect your child’s head shape. Here are some terms you might see in relation to torticollis . . .
Plagiocephaly is the flattening that occurs on one side of the back of the head, typically due to the preference for looking to one side from torticollis. The baby’s head is asymmetrical and resembles a parallelogram. This baby will have a strong preference of looking to one side and may have one cheek that is fuller than the other.
Brachiocephaly is flattening that occurs across the entire back of the head. This head shape is wide above the ears. This baby may have more tightness in the front of his or her neck and will typically have limited rotation to either side.
Schaphocephaly is flattening along both sides of the head. This head shape is long and narrow. This baby will have difficulty keeping his or her head in midline and will usually be rotated all the way to one side or the other.
Cranial bands, also referred to as “helmets,” are a type of orthotic used to correct a baby’s head shape specifically. Cranial bands are sometimes required for moderate to severe flattening although, early intervention with a comprehensive home program can limit the time required in a helmet. While the cranial band addresses the head shape, it does not address the muscular cause of the preference for looking to one side. In other words, a cranial band should not replace physical therapy, as it addresses different aspects of the condition.
Some things to think about if you are concerned about the possibility of torticollis:
Does your baby prefer to look only to the right or only to the left when laying on its back or belly?
Can you easily move your baby’s head to each side? Does he or she fuss when going one direction?
Can you feel any small bumps in the muscle that runs on the side of his or her neck to behind the ear?
When feeding your baby, is it difficult for him or her to feed on one side?
Do you see any asymmetries in his or her head shape?
If you are concerned that your baby has a preference to look one way more than the other or if you see some asymmetries in his or her head shape, we encourage you to schedule an evaluation with a physical therapist. The earlier you can get your child in, the better. Current research indicates the following average treatment times based on age of referral . . .
|Age at referral||Average Treatment Time|
|Before 1 month of age||1.5 months of treatment|
|1-3 months||5.9 months of treatment|
|3-6 months||7.2 months of treatment|
|6-12 months||months of treatment|
While the neck and head shape may be of the most concern early on, torticollis can have lasting effects if left unresolved. Without treatment, you can typically see signs of unresolved torticollis as babies progress through their developmental milestones. One long term sign in particular is asymmetric weight bearing. The child may prefer to use one side of the body to hold his or her weight, which can impact tummy time, rolling, sitting, balance, stability in standing, crawling, and walking. With all of the developmental gross motor milestones impacted, it is important to look beyond solely plagiocephaly and head shape to ensure the torticollis and muscular causes are addressed to decrease the risk of delays down the road.
Things to look for with unresolved torticollis:
Consistently rolling to one side
“swimming” on the belly or pushing up to hands with only one arm
Consistently falling to the same side when sitting.
Crawls with one knee and one foot on the floor or “butt scoots”
Walks with a “limp”
If you notice any of the above signs or have further questions, please reach out to your doctor or our team of physical therapists for more information.
Reference: Physical Therapy Management of Congenital Muscular Torticollis: A 2018 Evidence-Based Clinical Practice Guideline From the APTA Academy of Pediatric Physical Therapy
Austin White and Madison McClure are Doctors of Physical Therapy at Child and Family Development. As a pediatric physical therapist, Madison provides aquatic therapy as well as services at our Midtown location. Austin provides pediatric physical therapy to clients at our Pineville location. She is well versed in working with clients of all ages who have a variety of rehabilitative needs.
Child & Family Development
4012 Park Road, Suite 200
Charlotte, NC 28209
11940 Carolina Place Parkway, Suite 200
Charlotte, NC 28134
Website | Facebook | Instagram | Twitter
|
<urn:uuid:1d825940-8417-4243-a110-92830b28cc20>
|
CC-MAIN-2023-14
|
http://charlottesmartypants.com/2022/06/from-the-smarty-health-corner-child-and-family-development-infant-head-and-neck-deformities/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943483.86/warc/CC-MAIN-20230320114206-20230320144206-00366.warc.gz
|
en
| 0.936292
| 1,257
| 3.421875
| 3
|
Let me return to the old challenges from last year and fill a few more gaps.
The tasks reads:
Write a program to output the same number of PI digits as the size of your script. Say, if your program size is 10, it should print 3.141592653.
OK, I immediately have a few ideas:
- Just type the digits in the program and fit the width.
- Use some kind of formatting output.
- Compute the value of π and print it.
The first option contains a paradox. The program must keep need to keep all the digits that you need to print but you also need a printing instruction. So the file length will always be bigger. The only exception is when you are using REPL:
$ raku > 3.14 3.14
The second option is more promising. In Raku, there are at least
fmt. Let us see how many digits we can potentially use. The only place where you can see a substring
3.1415 in the Rakudo sources seems to be the file gen/moar/CORE.c.setting:
my constant pi = 3.14159_26535_89793_238e0;
Looks like we have enough digits. Can we then print
π.fmt('%.20f') and see all of them?
> π.fmt('%.20f') 3.14159265358979300000
Oops. Not that promising any more. But let’s try to make the output shorter then. After a few attempts you get it:
> π.fmt('%.12f') 3.141592653590
Hmm, the width is perfect but there’s a zero in the last position? OK, let’s use an ASCII version to add a character and remove that zero:
> pi.fmt('%.11f') 3.14159265359
Ah, no, when switching from π to
pi, you need to add digits, not to remove them. And if you add, you’ll get zeroes. And did we forget that we are in the REPL, and for a real program in a file we need to add at least four characters to add
OK, move on to the third option maybe? In the third option, we can use one of the known algorithms to compute the value of π to any arbitrary length, and then our program can in theory be as big as we want, including detecting its size by calling system functions.
Good one. But what if you just print π?
Run this program and confirm that you get quite a few digits:
$ raku ch-1.raku
Aha, we’ve got a five-character program and 17 characters in the output. OK, let us just add some ‘useful’ noise to the code until it grows to the sam 18 characters.
print(pi ~ "\n");
Yes! Now there are exactly 17 characters. The program looks ugly but does the job and satisfies the conditions, so the task has been solved, congratulations!
* * *
→ GitHub repository
→ Navigation to the Raku challenges post series
|
<urn:uuid:1420ca27-f157-45b8-ac0b-9b6c02af3c70>
|
CC-MAIN-2023-14
|
https://andrewshitov.com/2020/09/15/raku-challenge-week-4-task-1-printing-pi/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943483.86/warc/CC-MAIN-20230320114206-20230320144206-00366.warc.gz
|
en
| 0.893681
| 698
| 3.609375
| 4
|
2.6 to 15 Million Years
South Carolina, USA
*NOTE: THIS FOSSIL COMES WITH A GIFT BOX, A FLOATING FRAME/STAND AND ENGRAVED BASE, A SPECIES INFORMATION CARD, AND AN INTERNATIONAL AUTHENTICITY CERTIFICATE.
This is a stunning Megalodon tooth collected from a river in South Carolina. A tooth of this size would have come from the prehistoric, mega-shark, the megalodon, in the 9 or 10 metre size range.
The Megalodon holds the record for the biggest and most dangerous shark ever, as well as the largest marine predator in the history of planet Earth. The great white sharks that we have today would appear very little next to this monster. If we had to compare their teeth, the largest Megalodon teeth ever found are an impressive 19cm. On the other hand, the largest teeth of the great whites we have today is about 7.6cm.
The Megalodon was the boss of the oceans all around the world from 15.9 to 2.6 million years ago. Their teeth are found in deposits all around the world. They had 5 rows of teeth (276 teeth in total), and like nowadays' sharks, they shed their teeth. The Megalodon used to attack strong prey such as Baleen whales, using its huge teeth as tools.
We measure the Megalodon teeth along the longest edge of the tooth. Adult teeth are usually around 10cm. Only a handful of teeth measuring over 15cm were ever found.
Scientists and biologists do not know exactly why the Megalodon went extinct around 2.6 million years ago, but many attribute it to climate change and the extinction of the large whales it used to feed upon. At least we now have Megalodon fossils which enabled us to get to know about this beautiful monster and appreciate its beauty.
|
<urn:uuid:a4642587-96f8-4c6b-ab97-78a9e5cd2bbb>
|
CC-MAIN-2023-14
|
https://www.heritageatheart.com/products/copy-of-9-8cm-megalodon-tooth-from-the-usa-br-2-6-15-million-years-br
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00366.warc.gz
|
en
| 0.933171
| 417
| 3.703125
| 4
|
This article is more than 1 year old
Intel hopes to burn newly open-sourced AI debug tech into chips
Chipzilla dreams of planting ControlFlag in hardware
Intel Labs has big plans for a software tool called ControlFlag that uses artificial intelligence to scan through code and pick out errors.
One of those goals, perhaps way out in the future, is to bake it into chip packages as a last line of defense against faulty code. This could make the information flow on communications channels safer and efficient.
But that's a big "if," and contingent to many things falling in place. Last week Intel open-sourced the tool – dubbed ControlFlag – to software developers. The software pores over lines of code and points out errors that developers can then fix.
The company ran ControlFlag on a proprietary piece of internal production-quality software with millions of lines of code. It found 104 anomalies, of which one was a security vulnerability. But it also found 96 false positives
Chipzilla hopes the AI tool ultimately becomes a sophisticated system that reduces – and hopefully eliminates – manual verification of code, with the aim of completely automating the costly and time-consuming debug process.
"Debugging only exists because we have a miscommunication of our intention to machines. And if we were to improve the way that we express our intentionality to machines, the entire field of debugging will vanish, or just [won't] exist anymore," Justin Gottschlich, principal AI scientist at Intel Labs, who is leading the development of the tool, told The Register.
He compared that to the shift from manual gears to automatic transmissions in automobiles. "That's because we sort of figured out how to do the automatic transition through those gears without the human being involved," Gottschlich said.
Shifting up a notch
Gottschlich said the firm recognized it would need to develop a bulletproof AI system and a learning model so accurate that it produces unquestionably reliable results on code verification. ControlFlag's learning system is evolving and becoming more accurate as it ingests more data, he said.
The accuracy of AI systems may suffer for reasons that include model drift, in which faulty data fed into learning systems throws results off the rails.
In other cases, technology isn't the answer. Last year, Walmart discontinued the use of robots in aisles to track inventory after it found that humans – as opposed to AI – produced better results.
Intel's ControlFlag system uses a two-step process to generate, verify and improve the anomaly-detection model. The deterministic system analyzes code, parses out information like the semantic meaning of code, and flags suspicious elements.
The second part is the stochastic side using self supervision, where the AI system starts to learn on its own, and how to categorize semantic and syntactic information from the code, and what is anomalous and non-anomalous.
- Former Intel AI boss Naveen Rao is now counting the cost of machine learning, literally
- Megachips or decoupled approach? AI chip design companies accounting for operating costs
- Chip manufacturers are going back to the future for automotive silicon
- Intel offers Loihi 2 to boffins: A 7nm chip with more than 1m programmable neurons
Intel built ControlFlag's learning model via techniques including the parsing through of open-source code on Github, which today has more than 200 million repositories.
"It reads the code, and tries to discern, is this code that I can trust? And if it is, what can I learn from this code? The sort of historical data, trying to do the prediction of the new data... the baseline data is the source code repositories," Gottschlich said.
The system is different from conventional AI applications such as natural-language processing or image recognition, and doesn't follow a traditional high-level system design or topology in which it could be plugged in.
"Because we don't use labels, what we have to do is we needed to rethink the whole problem," Gottschlich said.
Trust, but verify
Intel relies on a concept called "semi trust," in which the company uses environmental data around the repository to guide ControlFlag into whether or not you can trust the data that gets ingested. For example, the star-based rating system on GitHub helps ControlFlag weigh the popularity and reliability of code from a repository.
The company ran ControlFlag on a proprietary piece of internal production-quality software with millions of lines of code. It found 104 anomalies, of which one was a security vulnerability. But it also found 96 false positives.
"What we need to work on improving is a number of false positives. That is certainly an area of improvement to get that more developer friendly because [a] 50 per cent false positive rate is just not super great," Gottschlich said.
Developers can download ControlFlag from Github here and run it on code. It works on Linux and Mac OS, and Chipzilla is working to add Windows support.
Intel is dedicating more resources to development of this system – which it calls machine programming – for the long haul, but another challenge is figuring out how communications, machine learning and computing will evolve, Gottschlich said.
Intel sees ControlFlag possibly being baked into chips to make data communication channels more efficient. But for that, the AI system needs to mature, and be reliable to the point that the debug process can be automated.
"Right now, [ControlFlag is] principally in software. Part of that is, as we build more advanced...systems, some of the core components, if we can burn them into hardware, because they're so critical to machine learning systems, we're likely to do that," Gottschlich said. ®
|
<urn:uuid:a77428d6-961a-4be2-bacc-03520d5cc44a>
|
CC-MAIN-2023-14
|
https://www.theregister.com/2021/10/25/intel_controlflag/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00366.warc.gz
|
en
| 0.936081
| 1,191
| 2.6875
| 3
|
« PreviousContinue »
APPENDIX TO CHAPTER IX.
CONCERNING THE WORKS OF NATURE, CHIEFLY WITH RESPECT TO UNIFORMITY AND VARIETY.
Beauty and design in the works of nature, equally conspicuous, both in the internal and external structure-External structure respects regularity in animalsBeauty of inanimate nature-Mechanical operations of man confined to the surfaces of bodies-The operations of nature diffused through the most intimate and minute parts of all substances-The mechanical power of nature not confined to the smaller bodies, but extends to the largest ones-The wonderfu. power of nature in connecting and propagating systems-The connection betwixt the internal frame and external nature, of all, the most wonderful— Uniformity and variety interwoven in the works of nature with surprising art; especially in man-Still there is here, a great diversity-Natural objects hence form themselves into groups, and are always agreeable.
IN things of Nature's workmanship, whether we regard their internal or external structure, beauty and design are equally conspicuous. We shall begin with the outside of nature, as what first presents itself.
The figure of an organic body is generally regular. The trunk of a tree, its branches, and their ramifications, are nearly round, and form a series regularly decreasing from the trunk to the smallest fibre: uniformity is no where more remarkable than in the leaves, which, in the same species, have all the same color, size, and shape: the seeds and fruits are all regular figures, approaching for the most part to the globular form. Hence a plant, especially of the larger kind, with its trunk, branches, foliage, and fruit, is a charming object.
In an animal, the trunk, which is much larger than the other parts, occupies a chief place: its shape, like that of the stem of plants, is nearly round; a figure which of all is the most agreeable: its two sides are precisely similar: several of the under parts go off in pairs; and the two individuals of each pair are accurately uniform: the single parts are placed in the middle: the limbs bearing a certain proportion to the trunk, serve to support it, and to give it a proper elevation upon one extremity are disposed the neck and head, in the direction of the trunk: the head being the chief part, possesses with great propriety the chief place. Hence, the beauty of the whole figure, is the result of many equal and proportional parts orderly disposed; and the smallest variation in number, equality, proportion, or order, never fails to produce a perception of deformity.
Nature in no particular seems more profuse of ornament, than in the beautiful coloring of her works. The flowers of plants, the furs of beasts, and the feathers of birds, vie with each other in the beauty of their colors, which in lustre as well as in harmony are beyond the power of imitation. Of all natural appearances, the coloring of the human face is the most exquisite: it is the strongest instance of the ineffable art of nature, in adapting and proportioning its colors to the magnitude, figure, and position, of the parts. In a word, color seems to live in nature only, and to languish under the finest touches of art.
When we examine the internal structure of a plant or animal, a wonderful subtlety of mechanism is displayed. Man, in his mechanical operations, is confined to the surface of bodies; but the operations of nature are exerted through the whole substance, so as to reach even the elementary parts. Thus the body of an animal, and of a plant, are composed of certain great vessels; these of smaller; and these again of still smaller, without end, as far as we can discover. This power of diffusing mechanism through the most intimate parts, is peculiar to nature, and distinguishes her operations, most remarkably, from every work of art. Such texture, continued from the grosser parts to the most minute, preserves all along the strictest regularity. The fibres of plants are a bundle of cylindric canals, lying in the same direction, and parallel or nearly parallel to each other: in some instances, a most accurate arrangement of parts is discovered, as in onions, formed of concentric coats, one within another, to the very centre. An animal body is still more admirable, in the disposition of its internal parts, and in their order and symmetry; there is not a bone, a muscle, a blood-vessel, a nerve, that has not one corresponding to it on the opposite side; and the same order is carried through the most minute parts: the lungs are composed of two parts, which are disposed upon the sides of the thorax; and the kidneys, in a lower situation, have a position no less orderly as to the parts that are single, the heart is advantageously situated near the middle; the liver, stomach, and spleen, are disposed in the upper region of the abdomen, about the same height; the bladder is placed in the middle of the body, as well as the intestinal canal, which fills the whole cavity with its convolutions.
The mechanical power of nature, not confined to small bodies, reaches equally those of the greatest size; witness the bodies that compose the solar system, which, however large, are weighed, measured, and subjected to certain laws, with the utmost accuracy. Their places round the sun, with their distances, are determined by a precise rule, corresponding to their quantity of matter. The superior dignity of the central body, in respect of its bulk and lucid appearance, is suited to the place it occupies. The globular figure of these bodies, is not only in itself beautiful, but is above all others fitted for regular motion. Each planet revolves about its own axis in a given time; and each moves round the sun, in an orbit nearly circular, and in a time proportioned to its distance. Their velocities, directed by an established law, are perpetually changing by regular accelerations and retardations. In fine, the great variety of regular appearances, joined with the beauty of the system itself, cannot fail to produce the highest delight in every one who is sensible of design, power, or beauty.
Nature has a wonderful power of connecting systems with each other, and of propagating that connection through all her works. Thus the constituent parts of a plant, the roots, the stem, the branches, the leaves, the fruit, are really different systems, united by a mutual dependence on each other: in an animal, the lymphatic and lacteal ducts, the blood-vessels and nerves, the muscles and
glands, the bones and cartilages, the membranes and bowels with the other organs, form distinct systems, which are united into one whole. There are, at the same time, other connections less intimate: every plant is joined to the earth by its roots; it requires rain and dews to furnish it with juices; and it requires heat to preserve these juices in fluidity and motion: every animal, by its gravity, is connected with the earth, with the element in which it breathes, and with the sun, by deriving from it cherishing and enlivening heat: the earth furnishes aliment to plants, these to animals, and these again to other animals, in a long train of dependence. That the earth is part of a greater system, comprehending many bodies mutually attracting each other, and gravitating all toward one common centre, is now thoroughly explored. Such a regular and uniform series of connections, propagated through so great a number of beings, and through such wide spaces, is wonderful: and our wonder must increase, when we observe these connections propagated from the minutest atoms to bodies of the most enormous size, and so widely diffused as that we can neither perceive their beginning nor their end. That these connections are not confined within our own planetary system, is certain: they are diffused over spaces still more remote, where new bodies and systems rise without end. All space is filled with the works of God, which are conducted by one plan, to answer unerringly one great end.
But the most wonderful connection of all, though not the most conspicuous, is that of our internal frame with the works of nature: man is obviously fitted for contemplating these works, because in this contemplation he has great delight. The works of nature are remarkable in their uniformity no less than in their variety; and the mind of man is fitted to receive pleasure equally from both. Uniformity and variety are interwoven in the works of nature with surprising art: variety, however great, is never without some degree of uniformity; nor the greatest uniformity without some degree of variety there is great variety in the same plant, by the different appearances of its stem, branches, leaves, blossoms, fruit, size, and color; and yet, when we trace that variety through different plants, especially of the same kind, there is discovered a surprising uniformity: again, where nature seems to have intended the most exact uniformity, as among individuals of the same kind, there still appears a diversity, which serves readily to distinguish one individual from another. It is indeed admirable, that the human visage, in which uniformity is so prevalent, should yet be so marked, as to leave no room, among millions, for mistaking one person for another: these marks, though clearly perceived, are generally so delicate, that words cannot be found to describe them. A correspondence so perfect between the human mind and the works of nature, is extremely remarkable. The opposition between variety and uniformity is so great, that one would not readily imagine they could both be relished by the same palate; at least not in the same object, nor at the same time: it is however true, that the pleasures they afford, being happily adjusted to each other, and readily mixing in intimate
union, are frequently produced by the same individual object. Nay. farther, in the objects that touch us the most, uniformity and variety are constantly combined; witness natural objects, where this combination is always found in perfection. Hence it is, that natural objects readily form themselves into groups, and are agreeable in whatever manner combined: a wood with its trees, shrubs, and herbs, is agreeable: the music of birds, the lowing of cattle, and the murmuring of a brook, are in conjunction delightful; though they strike the ear without modulation or harmony. In short, nothing can be more happily accommodated to the inward constitution of man, than that mixture of uniformity with variety, which the eye discovers in natural objects; and, accordingly, the mind is never more highly gratified than in contemplating a natural landscape.
CONGRUITY AND PROPRIETY.
Congruity and propriety not applicable to one object-Man has a sense of congrunty and propriety-They are agreeable, because man is so formed-Congruity and propriety required, in proportion to the relation between thingsNo coincidence between congruity and beauty-Distinction between congruity and propriety-A great degree of congruity between a part and the whole Principal and accessory, mean appearance-Congruity relates to kind, as well as to quantity of ornament-A slight impropriety, makes a stronger impression than a slight incongruity-The improprieties which excite laughter and contempt, ridiculous-A mixed emotion consists of one too risible for anger, and too serious for derision-The effect of contempt for another upon ourselves— Congruity, as its final cause, contributes to our happiness-Impropriety furnishes entertainment-It makes us cautious-It prompts to moral conductPropriety regulates our actions-It induces justice to ourselves and othersIt enforces the performance of social duties.
MAN is superior to the brute, not more by his rational faculties, than by his senses. With respect to external senses, brutes probably yield not to men; and they may also have some obscure perception of beauty: but the more delicate senses of regularity, order, uniformity, and congruity, being connected with morality and religion, are reserved to dignify the chief of the terrestrial creation. Upon that account, no discipline is more suitable to man, nor more congruous to the dignity of his nature, than that which refines his taste, and leads him to distinguish, in every subject, what is regular. what is orderly, what is suitable, and what is fit and proper.*
Nec vero illa parva vis naturæ est rationisque, quod unum hoc animal sentit quid sit ordo, quid sit quod deceat in factis dictisque, qui modus. Itaque eorum ipsorum, quæ aspectu sentiuntur, nullum aliud animal, pulchritudinem, venustatem, Convenientiam partium sentit. Quam similitudinem natura ratioque ab oculis ad animum transferens, multo etiam magis pulchritudinem, constantiam, ordinem, in consiliis factisque conservandum putat, cavetque ne quid indecore effeminateve faciat; tum in omnibus et opinionibus et factis ne quid libidinose aut faciat aut cogitet. Quibus ex rebus conflatur et efficitur id, quod quærimus, honestum. Cicero de Officiis, 1. 1.
Nor is it a trifling power of nature and of reason that this animal alone understands order, decency in words and deeds, and propriety of manner. No other
It is clear from the very conception of the terms congruity and propriety, that they are not applicable to any single object: they imply a plurality, and obviously signify a particular relation between different objects. Thus we say currently, that a decent garb is suitable or proper for a judge, modest behavior for a young woman, and a lofty style for an epic poem: and, on the other hand, that it is unsuitable or incongruous to see a little woman sunk in an overgrown farthingale, a coat richly embroidered covering coarse and dirty linen, a mean subject in an elevated style, an elevated subject in a mean style, a first minister darning his wife's stocking, or a reverend prelate in lawn sleeves dancing a hornpipe.
The perception we have of this relation, which seems peculiar to man, cannot proceed from any other cause, than from a sense of congruity or propriety; for, supposing us destitute of that sense, the terms would be to us unintelligible."
It is matter of experience, that congruity or propriety, wherever perceived, is agreeable; and that incongruity or impropriety, whereever perceived, is disagreeable. The only difficulty is, to ascertain what are the particular objects that in conjunction suggest these relations; for there are many objects that do not: the sea, for example, viewed in conjunction with a picture, or a man viewed in conjunction with a mountain, suggest not either congruity or incongruity. It seems natural to infer, what will be found true by induction, that we never perceive congruity nor incongruity but among things that are connected by some relation; such as a man and his actions, a principal and its accessories, a subject and its ornaments. We are, indeed, so framed by nature, as, among things so connected, to require a certain suitableness or correspondence, termed congruity or propriety; and to be displeased when we find the opposite relation of incongruity or impropriety.†
animal has an eye to perceive the beauty, agreeableness, and convenience of parts. Nature and reason, in transferring this similitude from the eyes to the mind, thinks that beauty, constancy, and order, are much more to be preserved in counsels and actions, and takes care that nothing be done indecorously or effeminately, and that, in opinions and actions, nothing libidinous should be thought or done. That, which we seek, honesty, is made up of this.
From many things that pass current in the world without being generally condemned, one at first view would imagine, that the sense of congruity or propriety has scarce any foundation in nature; and that it is rather an artificial refinement of those who affect to distinguish themselves from others. The fulsome panegyrics bestowed upon the great and opulent, in epistles dedicatory and other such compositions, would incline us to think so. Did there prevail in the world, it will be said, or did nature suggest, a taste of what is suitable, decent, or proper, would any good writer deal in such compositions, or any man of sense receive them without disgust? Can it be supposed that Louis XIV. of France was endued by nature with any sense of propriety, when, in a dramatic performance purposely composed for his entertainment, he suffered himself, publicly and in his presence, to be styled the greatest king ever the earth produced? These, it is true, are strong facts; but luckily they do not prove the sense of propriety to be artificial: they only prove, that the sense of propriety is at times overpowered by pride and vanity; which is no singular case, for that sometimes is the fate even of the sense of justice.
✦ In the chapter of beauty, qualities are distinguished into primary and secondary: and to clear some obscurity that may appear in the text, it is proper to be observed, that the same distinction is applicable to relations. Resemblance,
|
<urn:uuid:2ddcb58d-1a22-4c90-99b7-2b6390164dd1>
|
CC-MAIN-2023-14
|
https://books.google.ca/books?id=FfQAAAAAYAAJ&pg=PA165&focus=viewport&vq=%22stillest+night,+With+all+appliances+and+means+to+boot,+Deny+it+to+a+King+%3F+Then,+happy+low!+lie+down%22&dq=editions:ISBN1358077444&lr=&output=html_text
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00366.warc.gz
|
en
| 0.954046
| 3,692
| 3.203125
| 3
|