text string | id string | dump string | url string | file_path string | language string | language_score float64 | token_count int64 | score float64 | int_score int64 |
|---|---|---|---|---|---|---|---|---|---|
Just what is Personalized Learning?
Personalized learning is a partnership between students and teachers in the design of learning that emerges from students’ interests, questions, needs, and preferences, towards an aim of self-directed learning (Bray & McClaskey, 2014). The best personalization is both personal and social, filled with purpose, and rooted in community.
It’s a great way to meet the developmental and cultural needs of middle school students, as it’s engaging, active, personal, relevant, and social.
Food for thought
- Look at how one Physical Education program is personalizing learning for students. What do you notice?
- Setting goals is an important part of personalized learning, but it can also drain some students’ motivation. Here are some tools to help avoid that!
- Call them what you want: passion projects, genius hour, curiosity projects, but these personalized learning projects are a way to jump into personalization and engage students.
Now tell us
How do *you* define personalized learning? Tell us on this padlet, below. (We’d love you to sign this with your name and school, or location, but over to you). While you’re there, check out the amazing range of responses. Do any really resonate with you? Did any make you rethink your own definition?
Now let’s move from our definition of personalized learning over to examining your own. | <urn:uuid:e03964f6-1c09-407c-8643-63502a3d4087> | CC-MAIN-2023-06 | https://tiie.w3.uvm.edu/blog/ch-1-defining-personalized-learning/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499891.42/warc/CC-MAIN-20230131222253-20230201012253-00210.warc.gz | en | 0.936015 | 309 | 3.6875 | 4 |
Q1. What is dhoti function age?
When the family's young sons
reach the age of 11, they are on the cusp of entering their teenage years and
becoming adults. As a result, in order to commemorate this occasion in an
official manner, his maternal uncle or aunt will present them with a silk dhoti, and
the occasion will be celebrated as a sign of the boy's passage into maturity
and promising future. A significant event in the culture and history of South
India is known as the Dhoti Ceremony. This is a momentous day in the Telugu
family's calendar, which they call "Panchalu," and they celebrate it
in a magnificent manner with their close friends and relatives.
Q2. What is worn under a dhoti?
Dhoti-wearing men and women in
southern India frequently accessorize their traditional garment with a spare
scrap of cloth, called an angavastram. The garment is designed to be worn over
the shoulder. This garment will remain on the shoulders for the time being.
Many men in southern India wear their dhotis cuffed at the knees, a style that
involves folding the garment in half and tucking it under the waist. This style
of draping the
dhoti is known as the half-fold. The dhoti can be worn in this fashion
(called a "half fold"), however it is not required. It's done this to
guarantee a problem-free and efficient operation.
Q3. In which state do men wear an Angavastram?
People from Southern India,
especially from the state of Tamil Nadu, often wear an angavastram with their
sari. As part of the costume, the person wears an angavastram, which is a piece
of unstitched fabric that is draped over the shoulders and tied in place. It
can also be worn with a shirt called a chokka or a local version of the kurta
called a jubba. Both of these clothes are called "kurtas." In the state
of Andhra Pradesh, both of these options are common. Either of these shirts
would be called a kurta in the world of Indian fashion. Also, in the state of
Andhra Pradesh, it is more comfortable to wear it over a shirt than as a single
piece of clothing.
Q4. What do you wear on veshti?
It is common practice to pair it,
depending on the event, with a shirt, a kurta, a
jacket, or practically any other item of men's clothing that is currently in
circulation. This might be a shirt, a kurta, a jacket, or any other article of
men's clothing. It's possible that this is a shirt, but it might also be a
kurta or perhaps a jacket.
Additionally, the type of footwear that is acceptable to wear with a dhoti will
differ from one occasion to the next depending on the kind of gathering that
you are going to. You are more than welcome to wear traditional Indian footwear such
or mojaris, as well as leather chappals, kolhapuri chappals, or even a
combination of juttis and mojaris on your feet during this event.
Email a Friend | <urn:uuid:9d2dc018-dd4d-4adf-aff0-f2a5082906bc> | CC-MAIN-2023-06 | https://www.exoticindiaart.com/textiles/dhotis/cotton/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499966.43/warc/CC-MAIN-20230209112510-20230209142510-00290.warc.gz | en | 0.955405 | 723 | 2.59375 | 3 |
Equal Remuneration Convention released
The United Nations’ International Labour Organisation released the Equal Remuneration Convention, stating that men and women are entitled to equal pay for work of equal value. Over the next two decades, unions and the general public called on the government to ratify this in Australian law.
Female award minimum wage established at 85% of male wage
Australian Conciliation and Arbitration Commission (ACAC) established the general female award minimum wage at 85 percent of the male wage. The ruling applied nationally and assumed men, as ‘breadwinners’, were entitled to a higher wage than women. The ruling also secured equal pay for women doing exactly the same work as men in male roles—a landmark achievement.
‘Equal pay for work of equal value’ established
ACAC’s review of the 1969 ruling found that few women were benefiting from equal pay, as few were assessed as performing exactly the same work as men. After significant union lobbying, ACAC ruled that ‘equal pay for work of equal value’ be applied to all women working under federal awards of the Commission. This was a defining moment that meant work in traditionally ‘female’ industries and occupations could be equally recognised in terms of the value of its contribution.
After much public debate, Australia ratified the Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW), which was adopted by the United Nations General Assembly in 1979 and signed by Australia in 1980. Ratifying CEDAW committed us to ‘being a society that promotes policies, laws, organisations, structures and attitudes that ensure women are given the same rights as men’.
Sex Discrimination Act passed
Australia passed the Sex Discrimination Act to enforce the rights enshrined in CEDAW. The Act made it unlawful to discriminate against people because of their sex and other factors , but omitted provisions for affirmative action.
Instead, Affirmative Action for Women: A Policy Discussion Paper was presented to Parliament, outlining reasons for affirmative action and proposing a way forward. As a result, a pilot affirmative action program was conducted and a Working Group was established.
At this time, Australia had the most gender-segregated workforce in the Organisation for Economic Co-operation and Development (OECD).
Affirmative Action (Equal Employment Opportunity for Women) Act passed
Following recommendations by the Working Group, the Affirmative Action (Equal Employment Opportunity for Women) Act (AA Act) was passed, with the Affirmative Action Agency established to implement it. This was the first legislative attempt to promote the participation of women in the workforce and seen as critical to achieving equal employment opportunity. It did this by requiring employers to develop affirmative action programs (in line with a prescribed eight-step model) and submit annual progress reports.
Despite being a critical piece of legislation in Australia’s journey towards gender equality, the AA Act was not without resistance. Critics pointed to weak enforcement mechanisms, with naming non-compliant employers in reports to the Minister being the only sanction for non-compliance. Further, submitting a report was all that was required to show compliance; employers did not need to demonstrate progress towards specified, substantive outcomes.
In response to these concerns, the Government conducted a review of the AA Act in 1998. It found that ‘while central parts of the legislation should remain intact, various changes were desirable’.
Equal Opportunity for Women in the Workplace Act passed
The Equal Opportunity for Women in the Workplace Act (EOWW Act) was passed (replacing the AA Act) and the Equal Opportunity for Women in the Workplace Agency was established to implement it.
The EOWW Act removed the standardised eight-step model, requiring employers to identify their own gender and equal opportunity concerns and develop actions to address issues identified. It also developed an outcomes-focused reporting format and made employer education and consultation key objectives of the Agency.
EOWW Act reviewed
The Government announced a review of the EOWW Act. The review examined the effectiveness and efficiency of the legislation and the Agency in promoting equal opportunity for women in the workplace. It also considered opportunities to reduce the cost of existing regulation and provided practical advice on how to deliver better outcomes for Australian women.
Review of the EOWW Act Report released
The Review of the EOWW Act Consultation Report was publicly released. The Report highlighted that:
- women continued to be over-represented in areas of study linked to lower earning industries, while men continued to be over-represented in areas of study linked to higher earning industries
- female dominated industries had been historically undervalued
- women were less likely to be in leadership positions within organisations
- despite improvements, women’s earnings remained persistently lower than men.
It also raised issues with the EOWW Act, including that its focus was on women, coverage was insufficient, and penalties and sanctions were inadequate.
Workplace Gender Equality Act passed
In response to the Report, the Workplace Gender Equality Act (Act) was passed by both Houses of Parliament. The new legislation represented a fundamental change to the way gender equality in the workplace was approached. It also established the Workplace Gender Equality Agency (the Agency) to implement the Act, headed by Director, Helen Conway.
Importantly, the new Act:
- introduced a new standardised reporting framework, requiring private sector employers with 100 or more employees to report against six Gender Equality Indicators (‘GEIs’), enabling comparative analysis across employers
- gave the Agency new advisory, research and educational functions
- modified coverage so that all employers and employees in the workplace, regardless of gender, could benefit from the educational resources of the Agency
- provided further transparency regarding sanctions for non-compliance through the Commonwealth procurement framework of not being eligible to tender for government contracts or trade with government (The Workplace Gender Equality Procurement Principles.
First comprehensive dataset released
Notably, the Agency:
- introduced a new online reporting system and implemented full reporting under the Act whereby non-public sector employers with 100 or more employees report in a standardised format against six Gender Equality Indicators (GEIs)
- released its first comprehensive dataset on workplace gender equality, covering over one-third (four million) Australian employees and provided a benchmark for measuring future progress. This world-leading dataset provided Australia with the most comprehensive picture of workplace gender equality ever seen
- released the first customised, confidential benchmark reports to reporting organisations – the first data of its kind in Australia. The reports allow employers to assess their gender performance against their peers, identify areas for improvement and track the effectiveness of their gender equality strategies over time.
- commenced its WGEA Employer of Choice for Gender Equality citation, a leading practice recognition program aimed at encouraging, recognising and promoting organisations that demonstrate an active commitment to achieving gender equality across seven focus areas.
Libby Lyons appointed as Director
- Libby Lyons was appointed Director of the Agency for a five-year term.
- The Act was further reviewed and a new, updated Legislative Instrument was introduced for reporting.
New online reporting system commenced
The Agency secured funding through the Women’s Economic Security Package to develop and implement a replacement, fit-for-purpose online reporting system. The new online system has the capacity and flexibility for voluntary reporting (such as public sector organisations) and allows for a significant increase in the dataset.
Agency data and reach is bigger than ever
After five years of data collection, the Agency has developed a detailed picture of the state of gender equality in organisations across Australia and our reach is bigger than ever, with over 12,000 relevant employers, growing online engagement, and valuable partnerships and international engagements.
Our data shows change is happening for the better. There has been a strong increase in employer action on gender equality. As employers have taken action, gender equality outcomes have improved and the gender pay gap has declined. Women continue to move into management roles and an increasing number of employers now have a strategy or policy to support gender equality or promote flexible work.
But there is still work to be done. Men continue to out-earn women across all industries and occupational categories, gender segregation remains deeply entrenched, and women remain underrepresented in senior leadership. It is with this front of mind that we continue to work towards our vision for ‘women and men to equally represented, valued and rewarded in the workplace’.
Current Director Mary Wooldridge appointed
- Mary Wooldridge was appointed Director of the Agency for a five-year term.
National Australian Museum (2020), Equal Pay for Women, viewed 24 July 2020, available: https://www.nma.gov.au/defining-moments/resources/equal-pay-for-women
National Australian Museum (2020).
National Australian Museum (2020).
Australian Human Rights Commission (2012), The Convention on the Elimination of All Forms of Discrimination against Women (CEDAW), viewed 24 July 2020, available: https://humanrights.gov.au/our-work/sex-discrimination/convention-elimination-all-forms-discrimination-against-women-cedaw-sex
Australian Human Rights Commission (2012), About Sex Discrimination, viewed 24 July 2020, available: https://humanrights.gov.au/our-work/sex-discrimination/about-sex-discrimination
Department of the Parliamentary Library (1993), Sex Discrimination Legislation in Australia, Background Paper Number 19, viewed 24 July 2020, available: https://www.aph.gov.au/binaries/library/pubs/bp/1993/93bp19.pdf
Organisation for Economic Co-operation and Development (1984), The Integration of Women into the Economy, cited in B Pocock (1998), All change, still gendered: The Australian Labour Market in the 1990s, Journal of Industrial Relations, vol. 40, no. 4
Department of the Parliamentary Library (1993).
Affirmative Action (Equal Employment Opportunity for Women) Act 1986, viewed 24 July 2020, available: https://www.legislation.gov.au/Details/C2004C01666
Affirmative Action (Equal Employment Opportunity for Women) Act 1986
Manfre, L. (2013), The Workplace Gender Equality Act 2012 (Cth): Rethinking the Regulatory Approach, Honours thesis, University of Sydney, Sydney, pp. 7
Department of the Parliamentary Library (1999), Bills Digest No. 71 1999-2000 Equal Opportunity for Women in the Workplace Amendment Bill 1999, viewed 24 July 2020, available: https://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/Bd9900/2000bd071
Department of the Parliamentary Library (1999).
Department of the Parliamentary Library (2012), Equal Opportunity for Women in the Workplace Amendment Bill 2012, viewed 24 July 2020, available: https://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/bd/bd1112a/12bd147
Department of the Parliamentary Library (2012).
Department of the Parliamentary Library (2012). | <urn:uuid:c2a64952-3f29-40bf-bae8-29b8f652a45a> | CC-MAIN-2023-06 | https://www.wgea.gov.au/about/our-story | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499966.43/warc/CC-MAIN-20230209112510-20230209142510-00290.warc.gz | en | 0.949354 | 2,392 | 3.765625 | 4 |
What is Straight-Line Depreciation?
When companies invest in assets, they expect those assets to last a certain number of years. Over time, they’re depreciated based on their remaining serviceable life and any potential saleable value left in them. Done consistently over a period of years, it creates a linear expense model, known as straight-line depreciation.
Companies calculate straight-line depreciation by subtracting the salvage value from the asset’s cost and dividing it by the number of years estimated for its useful life. It’s one of four depreciation calculations and the simplest for many companies to use, since the depreciable amount remains the same. Graphed as asset value over years, this depreciation occurs as a straight line—hence its name.
Here’s a look at how companies use straight-line depreciation and how it’s factored into enterprise asset management.
A Look at Tangible Assets
Depreciation in any form only applies to tangible capital assets. These are assets a company can see and touch, which serve to facilitate vital business operations. They can include machinery, equipment, buildings, vehicles and much, much more—anything carried on the balance sheet for more than one year (fixed).
The type of asset is important for predicting its depreciation, since original acquisition cost matters. Some assets hold their value better than others over time, which can affect the useful life expectancy of the asset, as well as its salvage value.
Calculating Straight-Line Depreciation
The formula for straight line depreciation includes three important variables: asset price, useful life and salvage value.
- Asset price is the total amount paid for the asset.
- Useful life is the number of years the asset will continue to generate income.
- Salvage value is the amount the asset will sell for after its useable life.
In the case of straight-line depreciation, the amount depreciated is the same year over year. This simplifies the equation. The formula for calculating straight-line depreciation is:
Annual Depreciation Amount = (Asset Price – Salvage Value) / Useful Life
For example, ABC Company might buy a service vehicle for $50,000. The company expects the vehicle to offer five years of useful life and a salvage value of $5,000 after it’s retired. The annual depreciation amount for the vehicle would be $9,900 per year.
Straight-Line vs. Other Types of Depreciation
Straight-line depreciation is one of four modes of asset depreciation businesses can use. The others include:
- Declining balance
- Sum-of-years digits
- Units of production
What’s the difference between these methods and straight-line? Straight-line allows companies to expense the same amount annually. This simplifies accounting and asset life cycle management. The other methods are “accelerated modes” of depreciation, which allow companies to depreciate assets much quicker, to minimize taxable income. Each is a viable option for depreciating assets; the best strategy depends on the objectives of the company.
How Does Straight-Line Depreciation Affect Accounting?
Depreciation is a tricky subject when it comes to accounting. The way companies choose to depreciate assets can impact the balance sheet and change the way certain accounts look, for better or for worse. Thankfully, straight-line depreciation is easy to contextualize, since it features a static number that’s easily lifted out of calculations.
For example, a company might make a $1 million investment in equipment with a useful life of 10 years. Assuming no salvage cost, it would depreciate $100,000 each year. This would appear on the company’s financial statements as a credit (to offset the asset), thus, raising the company’s bottom line. This can reflect positively on the company’s performance and cause its share price to rise, even if there’s no change in operational figures.
Companies carrying a balance sheet heavy in assets tend to have significant depreciation figures, often staggered over different periods. Even straight-line depreciation is difficult to keep track of. That’s why Net Asset Value (NAV) is a favorite valuation metric of investors seeking to understand a company’s value, sans depreciation.
Be Mindful of Assumptions
Like any forward-looking estimation, depreciation involves assumptions. To calculate the annual depreciation amount, companies make two distinct assumptions: useful life and salvage value. However, there’s no guarantee either figure is accurate at the time of estimation. Companies may need to adjust depreciation based on changing variables in an asset’s life or changes in salvage value. For this reason, many will often assume a zero-dollar salvage value to simplify the calculation.
Another important consideration regarding assumptions involves posturing. Sometimes, companies will inflate useful life or salvage value in an attempt to create a more favorable depreciation schedule. This can help bolster investor support in the near-term. For example, a company investing in a $600,000 IT infrastructure may estimate a useful life at 12 years and a salvage value of $80,000. Meanwhile, it’s like that the tech will become antiquated in eight years and sell for $25,000.
Linear Depreciation is Predictable
Many companies choose a straight-line model for depreciation because it’s predictable. In fact, expending the same amount for an asset each year makes it easier to predict how that depreciation will show up in accounting—and what to expect from an asset over the next X number of years. Similarly, it’s easy for investors to see and understand how asset depreciation affects the company’s financials.
Therefore, to continue expanding your investment and financial knowledge, sign up for the Investment U e-letter below. You will discover valuable stock insights and financial literacy education from some of the nation’s top analysts and Wall Street experts!
Linear depreciation—like any method of expending an asset—is subject to assumptions. However, calculated responsibly, these assumptions can be accurate and reliable. As part of a straight-line depreciation model, they’re useful figures in understanding exactly how a company sees its assets and the role those assets play in generating income. | <urn:uuid:afbbb855-c7f5-4a1b-90ff-39ef3aabc290> | CC-MAIN-2023-06 | https://investmentu.com/straight-line-depreciation/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.66/warc/CC-MAIN-20230203091020-20230203121020-00370.warc.gz | en | 0.912941 | 1,297 | 3.0625 | 3 |
Wind and rain can be annoying, and some might call it distracting or disruptive, especially while hunting.
But wind isn’t all bad. It can be quite refreshing. Think about when that perfect breeze blows through just in time to cool you off on that hot summer day. You can’t beat that! Rain on the other hand… is necessary but to be honest, it’s not my favorite product of nature.
What do deer have to say about those rainy and breezy days in the forest?
In a 2015 post, Leah Giralico wrote about the unexpected way wind was affecting deer movements. Instead of slowing them down, it was increasing their movements during the day.
This seemed counterintuitive to nearly everyone. In a reader survey about white-tailed deer movement, almost 90% thought that wind would cause deer to reduce their movements! About 53% believed rain reduced deer movement and 11% felt that rain would increase deer movement.
Readers were asked what level of wind would cause an effect on deer movement given the following choices:
- Light breeze (wind felt on face, leaves rustle)
- Gentle breeze (leaves and small twigs constantly moving)
- Moderate breeze (dust, leaves, small tree branches move)
- Fresh breeze (small trees begin to sway)
- Strong breeze (larger tree branches moving, whistling in wires)
- Near gale (whole trees moving, resistance felt walking against wind)
Over half of readers agreed that a significantly windy day would affect deer movements.
Leah analyzed data from October 2013 and discovered that male and female deer were moving more during windy days and less during windy nights. Even slight air movement made a difference in deer activity. With regard to precipitation, she found that females were not affected but males traveled significantly less on rainy days.
If we know this already, why are we asking the same wind and rain question again? Because science likes replication. Will we get consistent results from year to year? Let’s see.
Given the fact that wind speeds barely reached 12 mph in October of 2013, it wasn’t a very windy month. This could have influenced the results. If there are more windy days in October of 2015 and 2016, would the same effect on movement be detected? What about an interaction between wind and rain? Wind and rain together might cause a different response in deer movement than just wind or just rain.
To find out we conducted the same analysis that was used in 2013.
We separated wind speed levels into these three categories:
- Calm: Winds less than 1 mph;
- Gentle/Moderate Breeze: Winds between 1 and 15 mph;
- Strong Breeze: Winds between 16 and 27 mph
Rain was categorized as either
- No Rain
We calculated the miles deer traveled during 3 time periods: day, night and crepuscular periods (dusk and dawn). We collected weather data from Weather Underground and analyzed male and female movements at each of these wind levels for each periods. We then did the same for rain.
The analysis says…
Wind and rain had a greater effect on males than females!
Also, instead of finding that wind affected day and night movements differently as they did in 2013, we found that the effect of was the same for both!
Bucks increased their movements when a gentle wind was blowing, but only if it was not raining. A strong wind caused buck activity to increase significantly whether or not it was raining but had no effect on does.
Similar to 2013, bucks were moving less during windy nights.
What about the rain? Well, in 2013, Leah found that rain decreased buck activity. This was only the case in 2015 and 2016 if there was little to no wind.
This shows that there is an interaction between strong wind and rain. Deer respond differently when there is wind and rain together rather than just wind or just rain. Rain alone causes a decrease in buck movement. But a little rain has no effect on buck activity if there is a strong wind blowing. Strong winds will increase buck movement no matter what!
Females have a little bit different strategy for dealing with wind and rain. The plot shows that at night and during the day a light breeze causes a slight but not significant increase in movement. But at higher wind speeds, activity drops back down to normal. Likewise, rain had no significant effect on female movements whether it was windy or not.
As noted, winds speeds did not get above 12 mph in 2013, but those results suggested increased movement with increased wind speed. However, 12 mph winds are only moderate, so the effect of strong winds could not be tested.
October 2015 and 2016 were much windier months (the highest recorded winds were 10 to 15 mph faster) so we could examine how deer reacted to stronger winds.
Once wind speeds reached 16 mph, doe movements were no longer affected. Females showed a biologically insignificant increase in their movements at lower wind speeds (1 to 15 mph) but neither increased or decreased their movements at higher wind speeds (16 to 27 mph).
Most of our readers also thought that wind would only affect deer movement if it was a strong wind and many thought that wind would cause deer to decrease their movements.
Not only did bucks increase their movement on windy days, but it only takes a light air movement to cause them to increase their activity. Bucks seem to like stronger winds and move more no matter how strong the breeze or how much it is raining while females don’t really care either way.
Keep in mind that these results are only observational. We cannot control the weather. But it appears that wind has a greater effect on the activity of males than females at higher wind speeds and that rain and wind influence buck movements even more when they are in combination with each other.
Wind does influence deer movement but not in way most people would expect.
The take-home lesson? Now you have no excuse for changing hunting plans on those windy or rainy days!
Undergraduate, Wildlife and Fisheries Science
If you would like to receive email alerts of new blog posts, subscribe here.
And Follow us on Twitter @WTDresearch | <urn:uuid:d108e743-46f2-47d8-9065-970f8e7c11c0> | CC-MAIN-2023-06 | https://www.deer.psu.edu/blown-away/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.66/warc/CC-MAIN-20230203091020-20230203121020-00370.warc.gz | en | 0.971927 | 1,284 | 2.984375 | 3 |
After months of speculation, on June 15, 2022, EPA issued its drinking water health advisory for four commonly used PFAS: PFOA, PFOS, GenX, and PFBS. EPA’s drinking water health advisories provide information on the levels of a specific contaminant that EPA believes is safe for people to consume. These levels are non-enforceable and non-regulatory, but many states and tribes use these levels as benchmarks for setting their own drinking water levels. Click here to read the current regulations in Alaska, Washington, Oregon, California, and Idaho.
EPA’s new health advisory levels (HAL) for PFOA, PFOS, GenX, and PFBS are:
- Interim updated HAL for PFOA: .004 parts per trillion (ppt)
- Interim updated HAL for PFOS: .02 ppt
- Final HAL for GenX: 10 ppt
- Final HAL for PFBS: 2,000 ppt
PFOS & PFOA HALs
EPA’s new PFOA and PFOS HALs have taken many by surprise. Although many expected EPA to lower these HALs (previously set at 70 ppt for these chemicals individually or combined), few, if any, expected EPA to set the new PFOA HAL at .004 ppt or PFOS HAL at .02 ppt. Not only are these new levels several orders of magnitude lower than the prior PFOA and PFOS HALs, they are also the lowest in the nation.
EPA’s new PFOA and PFOS HALs are also significantly below the current detection limit of 4 ppt, leading many to wonder how regulated entities will be able to demonstrate compliance with the new HALs, as testing for and achieving these near zero HALs are nearly impossible. These interim HALs will be in place until EPA publishes its PFAS National Drinking Water Regulations (proposed rule expected by Fall 2022).
GenX and PFBS HALs
Unlike PFOA and PFOS, EPA’s new GenX and PFBS HALs are the first of their kind for the agency. Currently, only a few states have a GenX standard. One of the lowest is found in North Carolina, where the standard is 140 ppt or 14 times EPA’s new GenX HAL of 10 ppt. As with the PFOA and PFOS HALs, EPA’s GenX HAL is the lowest in the nation.
EPA’s PFBS HAL of 2,000 ppt, on the other hand, is not the lowest in the nation. Washington, for example, sets its PFBS action level at 345 ppt.
Repercussions for Regulated Entities
Although the newly released HALs are non-enforceable standards, they are likely to set benchmarks or points of comparisons for states and tribes seeking to implement or revise their own drinking water standards. This may lead to greater exposure and liability for entities as federal and state environmental agencies look to crack down on the use of these PFAS. To lower this exposure and risk, regulated industries may be forced to review their supply chains and manufacturing processes to ensure they either minimize or eliminate PFOA, PFOS, GenX, or PFBS from their operations.
Additionally, regulated industries should be on the lookout for EPA’s continued implementation of its PFAS Strategic Roadmap, a publication that lays out EPA’s approach to addressing PFAS. This is especially true when it comes to EPA’s use of these HALs as support for designating these substances as hazardous substances under CERLCA or hazardous waste under RCRA or to set clean up levels in current and future remediation sites. | <urn:uuid:4dfcea7f-e18c-424e-ae74-79518e1f6c87> | CC-MAIN-2023-06 | https://www.millernash.com/industry-news/epa-issues-new-hal-for-4-commonly-used-pfas | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.66/warc/CC-MAIN-20230203091020-20230203121020-00370.warc.gz | en | 0.946018 | 776 | 2.578125 | 3 |
School of Humanities, Xi'an Conservatory of Music, Xi'an, China
Intangible cultural heritage refers to the specific expressions of traditional culture that are closely related to the daily life of the general public, such as folklore activities, performing arts, knowledge and skills, ceramics, objects, as well as handicrafts and cultural spaces. Zibo City is known as the "City of Porcelain", rich in diversified types of intangible cultural heritage. Among these, some are indigenous invention by local people during the long-term production activities, while some are imported from other places. However, whether it is native or foreign, it reflects the ingenuity, broad-mindedness, kindness and hard work of Zibo people. Moreover, the unique creativity, imagination and productivity of Zibo people is the basis and key component of Zibo culture, reflecting its splendid long history and culture.
Zibo ceramic making; Evolutionary process; Intangible cultural heritage; Changes
Lv Huina. The Changing Characteristics of Intangible Cultural Heritage from Ceramic Production Techniques of Zibo (Shandong, China). The Frontiers of Society, Science and Technology (2023) Vol. 5, Issue 1: 25-29. https://doi.org/10.25236/FSST.2023.050105.
Yang Chao, Zhang Nana. Research on Teaching Reform of the Course of "Ceramic Craft" for Art Majors [J]. Literature and Education, 2009(14):14-16.
Wang Yanxiang. Discussion on the Construction of Key Courses in Ceramic Crafts [J]. China Light Industry Education,2007(3):23-26.
Gan Chunsong, Zou Shipeng, Hu Yiping, ed. Cultural Heritage and the Future of China [M]. Jiangxi People's Publishing House, 2004. | <urn:uuid:edb0ec1a-fede-4959-bc86-ff622d14f037> | CC-MAIN-2023-06 | https://francis-press.com/papers/8961 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500140.36/warc/CC-MAIN-20230204142302-20230204172302-00450.warc.gz | en | 0.884811 | 397 | 3.390625 | 3 |
It is common for social workers to be presented with a crisis situation brought forth by clients, families, communities, and/or organizations. The ultimate goal is to restore the client to equilibrium. The five stages of the crisis are (1) the hazardous event, (2) the vulnerable stage, (3) the precipitating factor, (4) the state of active crisis, and (5) the reintegration or crisis resolution phase.
There are times when a social worker will use more than one theory to assist in conceptualizing the problem and intervention, particularly if the theories complement each other. For example, resiliency theory can be used alongside crisis theory.
To prepare: Review and focus on the same case study that you chose in Week 2.
Submit a 1- to 2-page case write-up that addresses the following:
Be sure to:
Turner, F. J. (Ed.). (2017). Social work treatment: Interlocking theoretical approaches (6th ed.). New York, NY: Oxford University Press.
Chapter 7: Social Work Theory and Practice for Crisis, Disaster, and Trauma (pp. 117–130)
Chapter 29: Resiliency Theory and Social Work Practice (pp. 441–451)
Smith-Osborne, A. (2007). Life span and resiliency theory: A critical review. Advances in Social Work, 8(1), 152–168. Retrieved from https://advancesinsocialwork.iupui.edu/index.php/advancesinsocialwork/article/view/138
Smith-Osborne, A., & Whitehill Bolton K. (2013). Assessing resilience: A review of measures across the life course. Journal of Evidence-Based Social Work, 10(2), 111–126. doi:10.1080/15433714.2011.597305
Note: You will access this article from the Walden Library databases.
Bradshaw, B. G., Richardson, G. E., & Kulkarni, K. (2007). Thriving with diabetes—An introduction to the resiliency approach for diabetes educators. Diabetes Educator, 33(4), 643–649. https://doi.org/10.1177/0145721707303808
Why Work with Us
Top Quality and Well-Researched Papers
We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.
Professional and Experienced Academic Writers
We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.
Free Unlimited Revisions
If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.
Prompt Delivery and 100% Money-Back-Guarantee
All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.
Original & Confidential
We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.
24/7 Customer Support
Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.
No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.
Admission Essays & Business Writing Help
An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.
Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.
If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered. | <urn:uuid:12d8f084-1b45-4178-a99b-ec713edd3d05> | CC-MAIN-2023-06 | https://duepapers.com/assignment-application-of-crisis-theory-and-resiliency-theory-to-a/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500288.69/warc/CC-MAIN-20230205193202-20230205223202-00530.warc.gz | en | 0.909755 | 1,124 | 2.671875 | 3 |
Exhibit Columbus, the annual celebration of mid-century and contemporary design in Columbus, Indiana, will be showing off new possibilities of materials that unify support and envelope. This August, two of the festival’s six University Design Research Fellows will present this work as part of a brand new fellowship program.
Marshall Prado, a professor at the University of Tennessee, is creating a 30-foot-tall tower out of a carbon-and-glass fiber spun by robots. To manufacture Filament Tower, strands of the material were rotated on a steel frame and injected with resin, which is cured and then baked to increase its tensile and compressive strength. After cooling, the 27 computationally-designed components were removed from the steel frame and made to support themselves. The design was inspired both by historic architecture—akin to the churches of Eero Saarinen—and by biology. Filament Tower mimics the integrated, fibrous matrices of protein structures native to the connective tissues found in plants and animals, all while maintaining transparency.
Christopher Battaglia, a research fellow at Ball State University, turned his skills to a different material for Exhibit Columbus: concrete. In DE|stress, a 35-foot-long, 9.5-foot-tall, pavilion, Battaglia critiques the common approach to prefab concrete construction, which often sacrifices either strength and control over form. DE|Stress is made from 110 curved panels created in a green-sand casting method, where the concrete, made of silica sand and bentonite clay, is worked while still wet. The same CNC robot that produced the mold, which is easily recyclable, later prints the material, giving the process a high degree of efficiency.
“There’s no material waste in the form-making at all,” Battaglia claimed in a report from Autodesk. He also said that 3D printing gives a far greater control over shaping the vault-like structure, which is designed to encourage communal occupation and encounters. | <urn:uuid:0c15a552-6325-4342-8b87-cdc6278ef20b> | CC-MAIN-2023-06 | https://www.archpaper.com/2019/07/exhibit-columbus-fellow-program-high-tech-pavilions/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500288.69/warc/CC-MAIN-20230205193202-20230205223202-00530.warc.gz | en | 0.953357 | 419 | 2.640625 | 3 |
When you have an asthmatic condition, it can be very annoying and very difficult to control. Asthma has three phases, which are bronchitis, inflammation, and chronic asthma. Most people who suffer from asthma are advised to take medication and to manage their symptoms. If you are diagnosed with asthma, you will need to learn how to control your symptoms to allow you to live a normal life as long as possible.
The first thing you need to do is to stop the process of circulation of air that creates a continuous negative airway pressure that is creating your symptoms. You have to learn how to get rid of the airways in your lungs, and also what you can do to start to heal them and making them stronger. You will need to work on your breathing habits so that you will be able to control your symptoms much better.
When you have been diagnosed with asthma, you will start to learn how to start treating it. The majority of cases are controlled using medications but if you want to know how to manage your asthma, you need to be able to recognize the signs and symptoms so that you can get help quickly. The best way to start to treat your asthma is to learn more about the triggers and ways to prevent them. You will need to become familiar with the different triggers and find ways to reduce or eliminate them.
To know how to manage your asthma attacks, you must learn how to identify the triggers. This means learning what to avoid and what foods to eat. You should take your time in learning all the different triggers and ways to avoid them. Once you have learned these you will be able to reduce your symptoms and be able to live your life without having to deal with them.
Exercise is another important factor in your life that can help you control your asthma. You should learn what type of exercise works for you and what not to do. You should also try to stick to a healthy diet and exercise regularly so that you can reduce your chances of developing asthma.
Smoking is also a preventative measure in preventing asthma. If you stop smoking you will be able to avoid attacks. You should get to know other smokers so that you can see the triggers and ways to avoid them.
Finding out more about the triggers is the first step in managing your asthma. The next step is to learn what causes your attacks and how to avoid them. Once you learn about the triggers, you will be able to do many things to help you manage your asthma. Asthma has many types, so you will need to learn all the different ways that you can use to control your symptoms.
Your episodes of asthma will vary in length and you should learn about these so that you will be able to know when it is best to go to the doctor or what other treatments you should do. If you know the causes of your attacks, you will be able to find ways to reduce the number of episodes that you have each year. Learning the triggers can help you learn about the various ways to manage your asthma.
Learn how to manage your asthma properly by learning more about how to avoid them. You will need to learn what triggers are and what you can do to avoid them. The worst part of having asthma is when you know how to avoid the symptoms but still do not do anything about them. You will need to stop taking the medication when the symptoms are getting severe, but you cannot stop taking it because you do not want to risk having another attack. This can lead to the medication becoming the only thing you have to treat your symptoms.
Knowing how to manage your asthma is necessary. You should learn all about the different triggers and ways to prevent them. Once you know about these, you can start to learn about the triggers that can lead to an attack. Once you know about these, you can do a little research to find out more about your specific case and learn more about how to stop an attack before it happens. All of this knowledge can be very important to help you get rid of your asthma permanently.
Learning how to manage your asthma is necessary in order to prevent another attack. You should take some time and learn more about asthma and how to prevent asthma attacks from happening. You will need to take action in order to live a normal life free from asthma attacks. | <urn:uuid:a85fdf62-ead2-49d9-ac1a-f9ad23216c98> | CC-MAIN-2023-06 | https://ahealthierme.com/the-essential-guide-to-learn-how-to-manage-your-asthma/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500719.31/warc/CC-MAIN-20230208060523-20230208090523-00690.warc.gz | en | 0.96741 | 867 | 3.078125 | 3 |
Rural sociologist Dr Kristen Lyons of Griffith University and colleagues present a survey of possible nano-applications in agriculture and food at the Rural Futures conference in Canberra this week.
"Despite significant investment from the agrifood sector in nanotechnologies, the need for nano-specific regulation in this area hasn't been recognised as a priority by the federal government," says Lyons.
She says the nano-agrifood industry will be worth more than US$20 billion by 2010, with heavy investment from several large international companies.
Lyons says one of the claimed agricultural benefits for nanotechnology is the development of more efficient methods of applying pesticides.
For example, creating nano-sized versions of pesticide molecules could lead to nanopesticide emulsions that are more stable, more toxic to pests and better absorbed into plants, she says.
But Lyons says the same characteristics that make nanopesticides desirable could also present new risks to humans or the environment.
For example, the ability for nanoparticles to penetrate the surface of plants may mean they also penetrate into edible parts of the crop, she says.
Or their added ability to dissolve may mean nanopesticides create new kinds of contamination in soils, waterways or the food chain.
Nanotechnology can also be used to create capsules containing pesticide toxins, says Lyons.
The capsules could be designed to release their contents in specific situations, such as inside the stomach of an insect.
The Australian Pesticides and Veterinary Medicines Authority says it has not received applications for nanopesticides.
"Any such applications are a fair way off," a spokesperson says.
But Lyons says there are no nano-specific regulations so manufacturers may not be legally required to register nano versions of already approved pesticides.
She says the world's leading chemical company already sells a number of pesticide emulsions containing nanoparticles.
"What we don't know is whether they're for sale in Australia," she says.
Lyons says nanosensors are also being developed to provide real-time monitoring of farm nutrients, pH and moisture levels, as well as pests and pathogens.
She says in some cases these could be linked to nano-seed varieties with in-built pesticides that are released by remote computers linked to a GPS system.
These nanosensors may be scattered widely over farming landscapes causing a new form of "nanopollution", says Lyons.
Lyons says nanotechnology is also being used in the food industry, for example, to encapsulate nutrients.
Some nano-structures could sense a person's nutrient requirements such as calcium or iron, and respond by making these nutrients available.
Lyons says some sources suggest there are as many as 300 nanofood products in the international markets and sales in nanofood and packaging were valued at US$5.3 billion in 2005.
The Food Standards Australia New Zealand website says while there is no evidence of adverse effects currently available, potential applications of nanotechnology in food could be a concern for health and environmental reasons.
The agency says it is keeping a watching brief on the food industry's use of nanotechnology.
The Department of Industry Tourism and Resources says it is undertaking a preliminary study into the impact of nanotechnology on regulation, which is expected to be finalised over the next two months. | <urn:uuid:54d04aa6-635d-40e3-ab37-7a6c2264141f> | CC-MAIN-2023-06 | https://www.abc.net.au/science/news/stories/2007/1982313.htm | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500719.31/warc/CC-MAIN-20230208060523-20230208090523-00690.warc.gz | en | 0.955609 | 682 | 3.171875 | 3 |
Norovirus is an important cause of gastroenteritis both in children and adults. In China, few studies have been conducted on adult populations. This study aimed to determine the contribution of norovirus to gastroenteritis, characterize the features of norovirus infections, compare them with other pathogens, and test the effectiveness of the surveillance system.
A citywide surveillance network on diarrhea patients was established. Samples were collected with intervals from both children and adults among diarrhea outpatients in hospitals and tested for viruses using rRT-PCR and for bacteria in CDCs. Patient information was acquired through interviews and recorded into a dedicated online system. The Pearsonχ2 test, multivariate logistic regression models and discriminant models were fitted into its comparisons with the non-norovirus group and other pathogens.
Norovirus was detected in 22.91% of sampled diarrhea patients. The seasonal distribution of norovirus infections was different from non-norovirus patients (p < 0.001), with a half-year peak. Higher proportions of males (p = 0.001, OR = 1.303, 95% CI = 1.110-1.529), local citizens (p < 0.001) and officials/clerks (p = 0.001, OR = 1.348, 95% CI = 1.124-1.618) were affected with norovirus when compared with non-norovirus patients. Diarrhea patients affected with norovirus featured nausea (p < 0.001, OR = 1.418, 95% CI = 1.176-1.709) and vomiting (p < 0.001, OR = 1.969, 95% CI = 1.618-2.398), while fewer manifested fever (p = 0.046, OR = 0.758, 95% CI = 0.577-0.996) and abdominal pain (p = 0.018, OR = 0.815, 95% CI = 0.689-0.965). Children were more vulnerable to rotavirus (p = 0.008, OR = 1.637, 95% CI = 1.136-2.358) and bacteria (p = 0.027, OR = 1.511, 95% CI = 1.053-2.169) than norovirus. There was a seasonal difference between the GI and GII genotypes (p < 0.001). Officials or clerks were more easily affected with GI than GII (p = 0.006, OR = 1.888, 95% CI = 1.205-2.958).
This study was based on a citywide hospital-sentinel surveillance system with multiple enteric pathogens included. Norovirus was recognized as the most prevalent enteric pathogen in Shanghai. The seasonal peak was from October to April. Males had a higher prevalence than females. Local citizens and officials/clerks were more vulnerable to norovirus than other pathogens. Compared with rotavirus and bacteria, children were less frequently affected by norovirus. Nausea and vomiting were typical of norovirus, whereas fever and abdominal pain were uncommon symptoms of this pathogen. GI and GII infections were centered in different seasons. Officials and clerks were more easily affected by GI than GII.
Diarrheal disease morbidity and mortality have been in decline globally, but around 1.7-5 billion cases of diarrhea and nearly 1.7 million diarrheal deaths still occur each year , the great majority of which are among young children in developing countries .
Norovirus is a leading cause of non-bacterial gastroenteritis in both developed and developing countries and is increasingly appreciated as an important cause of gastroenteritis. Norovirus is also considered to be the second most frequent cause of severe childhood gastroenteritis after rotavirus . Its prevalence in children with acute gastroenteritis is in the range of 6–48% . The development of molecular techniques in diagnosing has brought its epidemiological impact into sight . It was concluded that an average of 570–800 deaths, 56,000-71,000 hospitalizations, 1.7-1.9 million outpatients visits, and 19–21 million total illnesses occurin the United States each year as a result of norovirus infections . Although previous studies indicated that the disease was mild and self-limiting, recent studies have revealed its ability to cause more severe complications than previously expected [9,10]. In addition to human losses, the economic costs caused by norovirus infections were considerable. It is estimated that the economic burden of norovirus infections approached or exceeded US$284 million annually in health care charges in the United States .
The increasing number of global public health concerns caused by norovirus in recent years has largely been driven by an abundance of reported outbreaks . A systematic literature review identified >900 published reports of laboratory-confirmed norovirus outbreaks during 1993 ~ 2011 . However, the predominance of outbreak reports was mainly due to deficient sporadic data, because norovirus is not routinely tested in clinical settings due to high molecular method requirements. Because of this, the characterization of norovirus epidemiology has been primarily performed through the analysis of outbreak data .
In China, acute nonbacterial gastroenteritis is also considered a severe public health problem . However, very few studies have been focused on adult populations so as to illustrate the relative importance of norovirus and other enteric pathogens. In some developed countries, the typical age pattern of diarrhea mortality is reversed; diarrhea-associated deaths are 5 times more common in elderly individuals than in children .
Owing to the overrepresentation of studies merely in children and a lack of sporadic data on norovirus infections [9,13,15], the role of norovirus as the etiological agent in acute diarrhea needs to be further defined. The objectives of this study were to determine the infection rate of norovirus among diarrhea patients in Shanghai and describe the epidemiological characteristics of norovirus infections in an attempt to test the effectiveness of the surveillance system and make progress towards its future popularization.
Shanghai is a metropolis with a population of more than 23 million as of 2010. Of the total population, 62.61% were locals and the sex ratio (male: female) of the city was 1.06:1. The population of the elderly (>60y) was 3.47 million (15.07%) and for the elderly, the sex ratio (male: female) was 0.92:1. The average life expectancy in 2010 was 82.13 years old . There are 17 administrative districts in Shanghai. All of the hospitals in the surveillance system have enteric disease clinics for diarrhea patients for quarantine purposes.
The surveillance first began with 6 adult hospital sentinels in May 2012, with a child sentinel (specialized city hospital) joining in October 2012, and 16 additional adult hospital sentinels in August 2013.
The surveillance system consisted of three levels: hospital sentinels for case finding, sampling and information collection; district-level centers for disease control and prevention (CDCs) for sample testing; and the municipal CDC for management and quality control. The three levels could share information through a dedicated online system.
Surveillance subjects were defined as those who visited the enteric disease clinics of sentinel hospitals, with 3 or more loose or liquid stools per day [the definition of diarrhea by the World Health Organization (WHO) . Norovirus-affected patients were defined as those whose stool samples were norovirus-positive, including patients with sole-infections and co-infections.
To date, a total of 23 hospital sentinels were sampled using Probability Proportionate to Size (PPS) Sampling across all hospital types and spread over all 17 districts in Shanghai. The total sample size was calculated on the basis of the number of diarrhea patients of sampled hospitals in Shanghai and previous local studies on enteric pathogens. Systematic sampling was used for sample collection. Different intervals were allocated to different sentinel hospitals under a comprehensive calculation of the hospital’s location, classification and annual number of diarrhea patients.
All surveillance subjects were interviewed by doctors. General, epidemiological and medical information was obtained and recorded into the online system. Outbreak sources were excluded as much as possible via inquiry.
Stool samples were collected from surveillance subjects in designated intervals by trained medical staff. Approximately 8 ~ 10 g (mL) of stool was collected and then dispensed into two containers: a tube with Cary-Blair (C-B) culture medium for bacteria testing and a sterile box for virus testing. Nucleic Acid was extracted from fecal specimens (20% wt/vol or vol/vol suspensions) using the QIAamp Viral RNA Kit (Qiagen, Hilden, Germany). Norovirus detection was performed using a real-time Reverse Transcription -Polymerase Chain Reaction (rRT-PCR) method. The viral RNA was reverse transcribed using M-MLV (Promega, Madison, WI) according to the manufacturer’s instructions. The primers (Cog1F/Cog1R) and the probes (Ring1A/Ring1B) were used to detect norovirus GI, and the primers (Cong2F/Cog2R) and probe (Ring2) were used to detect norovirus GII . Probes Ring1A/Ring1B and Ring2 were each labeled with FAM and HEX at 50 extremities. The final reaction volume was 20 μl, consisting of 1 μl RNA and 19 μl RT-PCR master mix. The concentrations of the primers and probes were as follows: for the GI assay, 0.2 μM probe and 0.4 μM each primer; for the GII assay, 0.4 μM probe and 0.4 μM each primer. The thermal cycling conditions: RT for 30 min at 55°C, followed by denaturation at 95°C for 30s, amplification for 45 cycles, followed by denaturation at 95°C for 10s, and annealing-extension at 60°C for 60s. A negative control containing diethyl pyrocarbonate (DEPC) water and two positive controls containing the RNA of norovirus GI and GII were included in each PCR run. Samples were scored as positive if cycle threshold values were less than 40 and positive and negative controls showed the expected values.
Apart from norovirus detection, all of the samples were also screened for other viruses (astrovirus, sapovirus, rotavirus and enteric adenovirus), and for bacteria [Vibrio cholerae, Shigella, Salmonella, Vibrio parahemolyticus, Campylobacter jejuni (C. jejuni), Yersinia enterocolitica, Campylobacter coli (C. coli), Enteropathogenic escherichia coli (EPEC), Enterotoxigenic escherichia coli (ETEC), Enterohemorrhagic escherichia coli (EHEC), Enteroaggregative escherichia coli (EAggEC), Enteroinvasive escherichia Coli (EIEC)]. Astrovirus, sapovirus and rotavirus were detected using rRT-PCR and enteric adenovirus was detected using real-time PCR, all of which was performed using the appropriate respective commercial kits (Shanghai Zhijiang Biotechonology Co., Ltd.) according to the instructions provided by the manufacturer. Bacteria were isolated using different mediums at proper temperatures after preparation. The mediums included ChromID Vibrio and TCBS for Vibrio cholera and Vibrio parahemolyticus, MAC for Escherichia coli, XLD for Shigella and Salmonella, etc.. Bacteria were identified using biochemical tests. An automatic biochemical identification system was used for Escherichia coli. Serum agglutination tests were employed to subtype Shigella, Salmonella, Vibrio cholera and Escherichia coli.
Samples were taken as a part of standard medical care. All laboratory results were recorded and viewed using the online system.
The study protocol was reviewed and approved by the Human Research Ethics Committee of the Shanghai Municipal Center for Disease Control and Prevention.
Data analyzed in the study were from May 1, 2012 to April 30, 2014 (date of visit) and downloaded on May 26, 2014. The division of age groups conforms to the Convention on the Rights of the Child and WHO standards. The definition of seasons was determined by the climatic characteristics of Shanghai. Differences in discrete variable levels were examined using the Pearsonχ2 test. Fisher’s test was used when the expected value was less than 5 or when the p value was close to the level of the test. A multivariate logistic regression model was used to seek characteristic differences as integrated in a clinical setting (NoV+ vs NoV-; NoV+ vs RV+; NoV+ vs bacteria+; genotype GI vs GII). Discriminant analysis was used to identify the symptom complex of norovirus infections. Two-tailed P < 0.05 was considered statistically significant. Version 17.0 of the SPSS software package was used for all analyses (SPSS, Inc., Chicago, IL).
During the 2-year study period, a total of 44595 diarrhea patients were studied. The mean (±SD) age of the study subjects was 43.51 (±19.06 ) years and 21657 (48.56%) were male. Among the surveillance subjects, a total of 3941 samples (8.84%) were detected (duplicated samples excluded). There were 2114 positive samples detected (positive rate 53.64%) and 903 (detection rate 22.91%) patients were positive for norovirus (referred to as “NoV + ”), consisting of GI (94, 10.41%), GII (769, 85.16%) and co-infections of GI and GII (40, 4.43%). Co-infections of norovirus and other viruses or bacteria were confirmed in 91 cases (2.31%). Excluding co-infection samples, 2947 samples (74.78%) were confirmed as negative for all tested pathogens or positive for other enteric pathogens (referred to as “NoV -”). The positive rates of other enteric pathogens were as follows (excluding co-infections): Shigella 0.51%, Salmonella 3.63%, Vibrio parahemolyticus 3.93%, C. jejuni 0.66%, Yersinia enterocolitica 0.05%, C. coli 0.08%, EPEC 0.74%, ETEC 0.86%, EAggEC 0.10%, EIEC 0.03%, astrovirus 2.54%, rotavirus 10.05%, sapovirus 2.36%, and enteric adenovirus 0.53%.
NoV(+) sample features and comparison with NoV(−)
Norovirus was detected throughout the year, and the prevailing season lasted as long as half a year (from October to April) (See Figure 1). The seasonal distribution of NoV(+) detection was different from NoV(−) (p < 0.001), but no difference was found between autumn (September-November) and winter (December-February) (p = 0.117). Norovirus spanned all ages, from 0 to 94 years old. The proportion of the child population of NoV(+) patients seemed smaller than that of NoV(−) ones (See Figure 2), but the difference was not statistically significant in a logistic regression model. The sex ratio (male: female) was 1.18:1, with a higher male proportion in the NoV(+) group (p = 0.001, OR = 1.303, 95% CI = 1.110-1.529). The proportion of local citizens infected with norovirus was higher than that of non-norovirus patients (p < 0.001). Norovirus had a higher chance of appearing in: officials/clerks (p = 0.001, OR = 1.348, 95% CI = 1.124-1.618) and a lower chance of appearing in farmers/migrant laborers (p = 0.007, OR = 0.243, 95% CI = 0.087-0.680).
In an age stratification analysis, it was discovered that NoV(+) and NoV(−) patients had statistically different seasonal distributions for each age group (0 ~ 4y, p = 0.017; 5 ~ 18y, p = 0.005; 19 ~ 44y, 45 ~ 59y, >60y, all p < 0.001) (See Figure 3), and a significant seasonal difference among NoV(+) patients of different age groups could also be determined (p ≈ 0.027). While a difference in the proportions of male and female NoV(+) patients could be found among different age groups (p = 0.016): in the children and youth groups (<44y), males were dominant, and in the middle-aged and elderly groups (>45y), vice versa (p < 0.001, OR = 1.586, 95% CI = 1.216-2.067), the gender distribution did not differ much from NoV(−) patients, except in the youth (19-44y) group, where male patients had a higher proportion of infections (p = 0.024, OR = 1.302, 95% CI = 1.041-1.629).
Analysis of exposure history
When compared with NoV(−), a higher proportion of NoV(+) patients had a history of consuming suspicious food within 5 days before onset (p = 0.001, OR = 1.319, 95% CI = 1.124-1.550), while a lower proportion had an enteric disease history 6 months prior (p = 0.048, OR = 0.341, 95% CI = 0.117-0.992).Although a large percentage (53.09%) of the children (<18y) group kept or had contact with pets, in a univariate χ2 test, there was no statistically significant difference between NoV(+) and NoV(−) patients (p = 0.451) within this group.
Clinical feature analysis
NoV(+) diarrhea patients featured nausea (p < 0.001, OR = 1.418, 95% CI = 1.176-1.709) and vomiting (p < 0.001, OR = 1.969, 95% CI = 1.618-2.398), while fewer reported fever (p = 0.046, OR = 0.758, 95% CI = 0.577-0.996) and abdominal pain (p = 0.018, OR = 0.815, 95% CI = 0.689-0.965) when compared with NoV(−) patients. In a discriminant analysis, the relationship between symptoms and norovirus infections was also studied. The combination of nausea and vomiting (especially lasting over three days) was typical of norovirus infections, while fever (especially high fever) and abdominal pain were adverse determining factors (p < 0.001). General, epidemiological and clinical comparisons are listed (see Additional file 1).
Comparisons with rotavirus and bacterial infections
A total of 396 samples were confirmed to have rotavirus infections (10.05%), and 432 samples had bacterial infections (10.96%) (co-infections excluded). Comparisons with norovirus regarding their general, epidemiological and clinical features with norovirus are listed (see Additional files 2 and 3).
The seasonal difference between norovirus and rotavirus detection was obvious (p < 0.001): rotavirus mainly occurred in the coldest seasons (from November to February) (See Figure 1). There was also a difference in age distribution between the two viruses (p = 0.002): rotavirus affected children more (p = 0.008, OR = 1.637, 95% CI = 1.136-2.358) (See Figure 2). The proportion of males (p = 0.004, OR = 1.475, 95% CI = 1.133-1.919) and local citizens (p < 0.001) with confirmed norovirus was higher than those with rotavirus. Norovirus and rotavirus were detected from hospitals of different types (p = 0.006). Rotavirus-affected patients had a higher proportion of suspicious food history (p < 0.001, OR = 2.006, 95% = 1.447-2.781). Patients affected with norovirus were more likely to manifest vomiting (p < 0.001, OR = 1.860, 95% CI = 1.373-2.520), but less likely to manifest fever (p = 0.034, OR = 0.626, 95% CI = 0.406-0.964).
The seasonal difference between norovirus and bacteria was more obvious (p < 0.001): bacteria were mostly found in warm seasons (from July to September) (See Figure 1). Age was also an influencing factor p = 0.037): a higher proportion of children were infected with bacteria than norovirus (p = 0.027, OR = 1.511, 95% CI = 1.053-2.169) (See Figure 2). Local citizens had a higher proportion of norovirus infections (p = 0.003). For the following occupations, there was a lower prevalence of norovirus than of bacteria: kindergarten/home-stay children (p = 0.033, OR = 0.090, 95% CI = 0.010-0.822) and farmers/migrant laborers (p = 0.008, OR = 0.180, 95% CI = 0.051-0.643). Norovirus-affected patients had a higher proportion of suspicious food history (p < 0.001, OR = 1.686, 95% CI = 1.266-2.244). Compared with bacteria, norovirus patients less frequently manifested fever (p < 0.001, OR = 0.428, 95% CI = 0.288-0.635) and abdominal pain (p < 0.001, OR = 0.405, 95% CI = 0.299-0.549), but more frequently manifested nausea (p = 0.001, OR = 1.735, 95% CI = 1.247-2.412) and vomiting (p = 0.006, OR = 1.620, 95% CI = 1.149-2.286).
Features of GI and GII genotypes
769 GII strains were detected concomitant with 94 GI ones. The Pearsonχ2 test indicated that the seasonal distribution of two genotypes was different (p < 0.001), with GI highest in spring (March to May) (44.68%) and GII highest in autumn (September to November) (40.44%). Those who work as officials or clerks had a higher possibility of being affected by GI (42.55%) than GII (25.75%) (p = 0.001, OR = 2.136, 95% CI = 1.368-3.289). GI-affected patients seemed to have eaten in a restaurant more often (3.19%) than GII-affected patients (0.65%) (p = 0.047, OR = 5.037, 95% CI = 1.185-21.277). The rate of patients who had consumed contaminated seafood within five days before onset was higher in GI (17.02%) than in GII (10.92%) patients (p = 0.019, OR = 2.294, 95% CI = 1.164-4.525). There were also slight differences in the clinical features of the two genotypes: nausea (54.26% of GI and 42.65% of GII, p = 0.037, OR = 1.595, 95% CI = 1.031-2.439), diarrhea lasting less than three days (87.23% of GI and 81.14% of GII, p = 0.035, OR = 4.008, 95% CI = 0.959-16.667), and hyperactive bowel sounds (37.23% of GI and 23.28% of GII, p = 0.003, OR = 1.955, 95% CI = 1.250-3.077).
In a logistic regression model, officials or clerks were more easily affected with GI than GII (p = 0.006, OR = 1.888, 95% CI = 1.205-2.958). Seasonal differences were statistically significant in both genotypes (p < 0.001). A higher proportion of patients who had eaten in a restaurant was affected with GI than GII (p = 0.048, OR = 4.717, 95% CI = 1.013-21.960).
91 norovirus co-infection samples were discovered (excluding co-infections of norovirus GI and GII): 21 with rotavirus, 18 with astrovirus, 15 with sapovirus, 10 with Salmonella, 7 with EPEC, 5 with Vibrio parahemolyticus, 5 with adenovirus, 3 with C. jejuni,2 with C. coli, 1 with Shigella, 1 with EAggEC and 3 triple co-infections.
Acute gastroenteritis is one of the most common diseases reported in humans. Norovirus is not only the leading cause of non-bacterial gastroenteritis outbreaks, but it is also currently recognized as a major cause of sporadic gastroenteritis in both children and adults . In China, acute nonbacterial gastroenteritis is also considered to be a severe public health problem. However, most studies have mainly focused on norovirus infections of children, while little research has been conducted in adult populations to clarify the importance of norovirus . In addition, materials and analyses with regards to norovirus have mostly been obtained from outbreak resources .
This study was the first in Shanghai to be concerned with sporadic norovirus infections of the whole population. It was based on a diarrhea disease surveillance system in Shanghai, which began in 2012. Compared with other studies[9,15], this study distributed sentinels across the city and used systematic sampling, which are better able to better represent and be extrapolated to the city’s population by avoiding the influence of clusters and season-specific cases; the incidence rate and disease burdens could be calculated in future studies. The positive rate of norovirus was 22.91% among 3941 diarrhea patients, which was quite close to the result of a previous study in Beijing (26.4% among acute non-bacterial gastroenteritis patients) and another in Shenzhen (21.4% in acute gastroenteritis patients) . In this study, the norovirus infection rate was the highest among all pathogenswhen co-infections were excluded.
Previous studies have reported that norovirus mainly peaked in winter or cold seasons [21,22]. In this study, the result verified this conclusion, as more strains were detected from October to April (when the weather was comparatively cold in Shanghai). Interestingly, an autumn peak was as distinct as the winter one, which was in concert with another study in Beijing (despite the fact that autumn in Beijing is colder than Shanghai). This could perhaps be explained by the immunity barrier to the current epidemic strain set up by the population during the epidemic season in autumn. The relationship of norovirus infections and temperature should be further explored in the future studies. For different age groups, the seasons when people were vulnerable to norovirus seemed different in a univariateχ2 test, but not enough samples could be included in a logistic regression model. More studies could be made if enough data were acquired.
Other than previous studies, which concluded that young children and elderly people were more vulnerable than other age groups [10,24], our study discovered that the highest detection rate was found in the youth group (19-44y) (25.97%), and the lowest in the children group (13.30%), with the elderly group in the middle (23.50%), whereas in a logistic model, the age distribution of NoV(+) patients could not be proved to be different from NoV(−) patients. Age distribution differences were found to be significant in NoV(+) vs RV(+) and NoV(+) vs bacteria(+) comparisons, which are stated below.
Males were found to more often be affected by norovirus when compared with other enteric pathogens. Although 0 ~ 44y males accounted for a higher proportion in the NoV(+) group and >45y a lower proportion in an age stratification analysis, the distribution seemed to be a general characteristic of all diarrhea patients.
It was observed that local citizens and officials/clerks had a higher proportion of norovirus infections, while immigrants and farmers/migrant laborers a lower proportion. There originally existed associations between the residency and occupation results, and yet it still seemed that norovirus was a more “urban” virus.
A history of consuming suspicious food within 5 days before onset was more commonly recorded among norovirus affected patients than non-norovirus ones. Nevertheless, the fact that a large part of non-norovirus diarrhea patients might have had physiological diarrhea or non-communicable enteric diseases might influence the outcome. It was also found that rotavirus-affected patients had a higher proportion of suspicious food history than norovirus patients, while bacteria had a lower proportion. Unfortunately, though specific food category information was gathered, the valid sample size was not large enough to be included in a logistic regression model. Further research regarding specific food risk factors could be made in future studies.
Some studies recognized diarrhea, vomiting and fever as the most common symptoms of norovirus-affected patients [13,24-26]. Although in this study it was proved that norovirus was distinguished by diarrhea (automatically included), nausea, and vomiting among diarrhea patients, fever was less commonly seen in NoV(+) patients when compared with NoV(−) ones. Other studies also claimed a lower occurrence of fever in norovirus patients than in rotavirus ones [21,22,27], but their rate was still much higher than what was reported in this study (only 8.86% norovirus-affected patients experienced fever). This was probably because febrile patients tend to visit fever clinics in Chinese hospital settings. Abdominal pain was also identified as a rare symptom of norovirus, which was similar to the result of a previous study . The clinical feature results produced in a logistic model were analogous to those in a discriminant analysis.
Comparisons between NoV(+) vs RV(+) and NoV(+) vs bacteria(+) were also made in this study to help enhance the cognition of the disease and provide evidence for a rough diagnosis. The results were broadly in line with the NoV(+) vs NoV(−) comparison, but some new conclusions were also drawn: rotavirus occurred in an even colder climate, and bacteria mainly appeared in hot seasons. Age distribution differences were significant here: children were more vulnerable to rotavirus and bacteria than norovirus. Although the difference in the proportion of patients showing abdominal distention in norovirus and bacterial infections was not significant (p = 0.053), observations should be continued when more data is obtained.
Norovirus GII is predominantly responsible for acute diarrhea worldwide, as described in most studies [10,24], and our findings (10.41% GI, 85.16% GII, 4.43% mix of both genotypes) were consistent with them. Our research also did further studies on the comparison of features between two genotypes: GI prevailed in spring while GII in autumn. This could be caused by variant alternation with seasonal changes. It was found in a univariate analysis that a higher proportion of GI-affected patients had the symptoms of nausea, diarrhea lasing for less than three days and hyperactive bowel sounds, whereas the results were not supported by the multivariate model. The influence of consuming seafood within five days before onset was also not backed up by the multivariate model. On the other hand, the multivariate model supported the univariate conclusions that the occupations of officials/clerks were a risk factor for infection with GI variants other than GII, though the power of the logistic model might be slightly compromised because of the small sample size of GI cases. Having eaten in a restaurant could not be regarded as a risk factor here as the confidence interval was too wide. In order for results to be revealed by either univariate or multivariate models, there needs to be more data for tests in the future.
The limitations of this study should be considered. First, data were gathered through 23 hospitals and 17 laboratories. Though testing methods and materials were unified, there was still a chance of bias caused by the different levels and conditions of laboratories (as suggested above). Admission rate bias should also be taken into account as patients visiting hospitals of different levels or in different regions were quite different. Furthermore, variations in the sentinel numbers would certainly affect the observation of seasoning, though it could be alleviated by making a comparison with non-norovirus patients. Second, only one child sentinel was enrolled and the data regarding children were quite limited. The testing power of age distribution might therefore be undermined. Next year we will enlarge the range of surveillance in children and include more data. Third, RNA sequencing of the positive samples was not done in this study. Since different features could possibly be found between GI and GII genotypes, this issue is deserving of further research with regard to particular strains and variants. Fourth, the recall bias of epidemiological information was difficult to avoid. The information on exposure history was primitive in this study. For example, water contamination was an important cause of norovirus outbreaks [27-31], and in another study, drinking spring water was reported as a risk factor . However, in this study, only 7 out of 3941 diarrhea patients reported drinking contaminated water and none of them were affected with norovirus. Meanwhile, very few data from general laboratory examination results were recorded. Perhaps if more meaningful variables of this sort of information were studied in the model, the power of the test would be greater. Fifth, because of the small sample size and short surveillance time, we did not perform further research among sole-infections and co-infections and other stratification analyses.
This was the first study on norovirus among all age groups in Shanghai. In this study, several meaningful conclusions were acquired: Norovirus was the most frequent enteric pathogen in Shanghai during the past two years; the epidemic season of norovirus was October ~ April in Shanghai; the norovirus infection proportion in children (<18y) was found to be lower than rotavirus and bacteria; Males had a higher proportion of norovirus infections than females; higher proportions of local citizens and officials/clerks were infected with norovirus than other pathogens; Norovirus could be characterized by nausea and vomiting among diarrhea patients, but fever and abdominal pain were rare symptoms; the GI genotype prevailed in spring while GII in autumn; It was easier for officials/clerks to be affected with GI than GII. These results might serve to promote diagnosis in a clinical setting, especially for medical staff to detect outbreaks and trace sources early. For public health workers, the results could help determine focus timing and populations of norovirus infections.
The study was based on a diarrhea surveillance system combining case finding in hospitals and laboratory testing in CDCs into one platform via a dedicated online system. The results of the norovirus survey proved that the surveillance system was running well. Other credible and constructive results on general, epidemiological and clinical features were generated. In the future, more improvements on epidemiological data, medical recording and RNA sequencing should be made based on the system. Nevertheless, the system still has reference value for other regions.
Matthews JE, Dickey BW, Miller RD, Felzer JR, Dawson BP, Lee AS, et al. The epidemiology of published norovirus outbreaks: a review of risk factors associated with attack rate and genogroup. Epidemiol Infect. 2012;140(7):1161–72.
Trujillo AA, McCaustland KA, Zheng DP, Hadley LA, Vaughn G, Adams SM, et al. Use of TaqMan real-time reverse transcription-PCR for rapid detection, quantification, and typing of norovirus. J Clin Microbiol. 2006;44(4):1405–12.
Wu W, Yang H, Zhang HL, Xian HX, Yao XJ, Zhao DJ, et al. Surveillance of pathogens causing gastroenteritis and characterization of norovirus and sapovirus strains in Shenzhen, China, during 2011. Arch Virol. 2014;159(8):1995–2002.
Yang SY, Hwang KP, Wu FT, Wu HS, Hsiung CA, Chang WC, et al. Epidemiology and clinical peculiarities of norovirus and rotavirus infection in hospitalized young children with acute diarrhea in Taiwan, 2009. J Microbiol Immunol Infect. 2010;43(6):506–14.
Tian G, Jin M, Li H, Li Q, Wang J, Duan ZJ. Clinical characteristics and genetic diversity of noroviruses in adults with acute gastroenteritis in Beijing, China in 2008–2009. J Med Virol. 2014;86(7):1235–42.
Oldak E, Sulik A, Rozkiewicz D, Liwoch-Nienartowicz N. Norovirus infections in children under 5 years of age hospitalized due to the acute viral gastroenteritis in northeastern Poland. Eur J Clin Microbiol Infect Dis. 2012;31(4):417–22.
Van Alphen LB, Dorleans F, Schultz AC, Fonager J, Ethelberg S, Dalgaard C, et al. The application of new molecular methods in the investigation of a waterborne outbreak of norovirus in Denmark, 2012. PLoS One. 2014;9(9), e105053.
Laine J, Lumio J, Toikkanen S, Virtanen MJ, Uotila T, Korpela M, et al. The duration of gastrointestinal and joint symptoms after a large waterborne outbreak of gastroenteritis in Finland in 2007–a questionnaire-based 15-month follow-up study. PLoS One. 2014;9(1), e85457.
This study was supported by the grant Key Discipline: Epidemiology (No. 12GWZX0101) and the Shanghai Public Health Professional Overseas Training Grant (No. GWHW2012105), from the Shanghai Municipal Commission of Health & Family Planning. The authors of this study thank all of the public health workers in the CDCs and health-care workers in the hospitals involved in the surveillance system for keeping the system running and for their acquisition of data. We thank Hong Ren and Yiyi Zhu for their kind and useful advice during the drafting of the manuscript. We are also grateful to Yi He for his intellectual contributions to the study’s design.
Authors and Affiliations
Department of Infectious Disease Control and Prevention, Shanghai Municipal Center for Disease Control and Prevention, No. 1380, West Zhongshan Road, Shanghai, 200336, China
Ying Xue, Hao Pan, Jiayu Hu, Huanyu Wu, Jian Li, Wenjia Xiao, Xi Zhang, Zheng’an Yuan & Fan Wu
The authors declare that they have no competing interests.
YX performed the statistical analysis and drafted the manuscript. HP, JH, and HW placed the surveillance system into effect. JL designed the study of the surveillance system. WX participated in the management of the system. XZ carried out the quality control of the laboratory tests. ZY and FW conceived of the study. All authors read and approved of the final manuscript.
Fan Wu is the correspondence author of this article; Zheng'an Yuan is the co-correspondence author of this article..
Ying Xue, Hao Pan and Jiayu Hu contributed equally to this work.
Epidemiology and clinical features by examining NoV(+) and bacteria(+) patients.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Xue, Y., Pan, H., Hu, J. et al. Epidemiology of norovirus infections among diarrhea outpatients in a diarrhea surveillance system in Shanghai, China: a cross-sectional study.
BMC Infect Dis15, 183 (2015). https://doi.org/10.1186/s12879-015-0922-z | <urn:uuid:39e06383-0e73-4ba9-a994-936ffdc45d3c> | CC-MAIN-2023-06 | https://bmcinfectdis.biomedcentral.com/articles/10.1186/s12879-015-0922-z | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494936.89/warc/CC-MAIN-20230127033656-20230127063656-00010.warc.gz | en | 0.953993 | 8,904 | 2.84375 | 3 |
Will an Old Drug Cure the Corona Virus?
The President just announced the use of Chloroquine to be considered as an anti-viral medication for certain populations at high risk for COVID-19. This is an old drug for the new virus. At least since 1934, Bayer Laboratories has been manufacturing this drug and there have been many trials done showing the efficacy of its anti-malarial properties.
Currently, several trials which are being conducted around the world seem to indicate evidence to use this drug for COVID-19. I caution that these are preliminary results. In previous scientific publications it appears that Chloroquine prevents the gain of the virus into the cells and, therefore, prevents the cellular infection from occurring. We also have to take into consideration that the use of this medication has to be done under strict supervision as there have been well-documented side effects, specifically, heart complications and visual toxicity. In reference to pregnant patients, there has been no previous indication that Chloroquine has been harmful to pregnant woman.
I think that it is important to emphasize that patient panic does not lead to a run of finding this medication on the internet. This drug should be targeted for prevention to high-risk groups and continues to need supervision by medical personnel. Other recommendations should continue to hold true in order to prevent the spread of this virus.
Read More: 5 Ways to Boost Your Child’s Immune System | <urn:uuid:3a4dc1d7-be46-4ba7-9b17-e2c6dfb60767> | CC-MAIN-2023-06 | https://www.askdrmanny.com/will-an-old-drug-cure-the-corona-virus/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494936.89/warc/CC-MAIN-20230127033656-20230127063656-00010.warc.gz | en | 0.963076 | 290 | 2.8125 | 3 |
Trophic cascades are powerful indirect interactions that can control entire ecosystems, occurring when a trophic level in a food web is suppressed. For example, a top-down cascade will occur if predators are effective enough in predation to reduce the abundance, or alter the behavior of their prey, thereby releasing the next lower trophic level from predation (or herbivory if the intermediate trophic level is a herbivore).
The trophic cascade is an ecological concept which has stimulated new research in many areas of ecology. For example, it can be important for understanding the knock-on effects of removing top predators from food webs, as humans have done in many places through hunting and fishing.
A top-down cascade is a trophic cascade where the top consumer/predator controls the primary consumer population. In turn, the primary producer population thrives. The removal of the top predator can alter the food web dynamics. In this case, the primary consumers would overpopulate and exploit the primary producers. Eventually there would not be enough primary producers to sustain the consumer population. Top-down food web stability depends on competition and predation in the higher trophic levels. Invasive species can also alter this cascade by removing or becoming a top predator. This interaction may not always be negative. Studies have shown that certain invasive species have begun to shift cascades; and as a consequence, ecosystem degradation has been repaired.
For example, if the abundance of large piscivorous fish is increased in a lake, the abundance of their prey, smaller fish that eat zooplankton, should decrease. The resulting increase in zooplankton should, in turn, cause the biomass of its prey, phytoplankton, to decrease.
In a bottom-up cascade, the population of primary producers will always control the increase/decrease of the energy in the higher trophic levels. Primary producers are plants and phytoplankton that require photosynthesis. Although light is important, primary producer populations are altered by the amount of nutrients in the system. This food web relies on the availability and limitation of resources. All populations will experience growth if there is initially a large amount of nutrients.
In a subsidy cascade, species populations at one trophic level can be supplemented by external food. For example, native animals can forage on resources that don't originate in their same habitat, such as native predators eating livestock. This may increase their local abundances thereby affecting other species in the ecosystem and causing an ecological cascade. For example, Luskin et al. (2017) found that native animals living in protected primary rainforest in Malaysia found food subsidies in neighboring oil palm plantations. This subsidy allowed native animal populations to increase, which then triggered powerful secondary ‘cascading’ effects on forest tree community. Specifically, crop-raiding wild boar (Sus scrofa) built thousands of nests from the forest understory vegetation and this caused a 62% decline in forest tree sapling density over a 24-year study period. Such cross-boundary subsidy cascades may be widespread in both terrestrial and marine ecosystems and present significant conservation challenges.
These trophic interactions shape patterns of biodiversity globally. Humans and climate change have affected these cascades drastically. One example can be seen with sea otters (Enhydra lutris) on the Pacific coast of the United States of America. Over time, human interactions caused a removal of sea otters. One of their main prey, the pacific purple sea urchin (Strongylocentrotus purpuratus) eventually began to overpopulate. The overpopulation caused increased predation of giant kelp (Macrocystis pyrifera). As a result, there was extreme deterioration of the kelp forests along the California coast. This is why it is important for countries to regulate marine and terrestrial ecosystems.
Predator-induced interactions could heavily influence the flux of atmospheric carbon if managed on a global scale. For example, a study was conducted to determine the cost of potential stored carbon in living kelp biomass in sea otter (Enhydra lutris) enhanced ecosystems. The study valued the potential storage between $205 million and $408 million dollars (US) on the European Carbon Exchange (2012).
Aldo Leopold is generally credited with first describing the mechanism of a trophic cascade, based on his observations of overgrazing of mountain slopes by deer after human extermination of wolves. Nelson Hairston, Frederick E. Smith and Lawrence B. Slobodkin are generally credited with introducing the concept into scientific discourse, although they did not use the term either. Hairston, Smith and Slobodkin argued that predators reduce the abundance of herbivores, allowing plants to flourish. This is often referred to as the green world hypothesis. The green world hypothesis is credited with bringing attention to the role of top-down forces (e.g. predation) and indirect effects in shaping ecological communities. The prevailing view of communities prior to Hairston, Smith and Slobodkin was trophodynamics, which attempted to explain the structure of communities using only bottom-up forces (e.g. resource limitation). Smith may have been inspired by the experiments of a Czech ecologist, Hrbáček, whom he met on a United States State Department cultural exchange. Hrbáček had shown that fish in artificial ponds reduced the abundance of zooplankton, leading to an increase in the abundance of phytoplankton.
Hairston, Smith and Slobodkin feuded that the ecological communities acted as food chains with three trophic levels. Subsequent models expanded the argument to food chains with more than or fewer than three trophic levels. Lauri Oksanen argued that the top trophic level in a food chain increases the abundance of producers in food chains with an odd number of trophic levels (such as in Hairston, Smith and Slobodkin's three trophic level model), but decreases the abundance of the producers in food chains with an even number of trophic levels. Additionally, he argued that the number of trophic levels in a food chain increases as the productivity of the ecosystem increases.
Although the existence of trophic cascades is not controversial, ecologists have long debated how ubiquitous they are. Hairston, Smith and Slobodkin argued that terrestrial ecosystems, as a rule, behave as a three trophic level trophic cascade, which provoked immediate controversy. Some of the criticisms, both of Hairston, Smith and Slobodkin's model and of Oksanen's later model, were:
Antagonistically, this principle is sometimes called the "trophic trickle".
Although Hairston, Smith and Slobodkin formulated their argument in terms of terrestrial food chains, the earliest empirical demonstrations of trophic cascades came from marine and, especially, aquatic ecosystems. Some of the most famous examples are:
The fact that the earliest documented trophic cascades all occurred in lakes and streams led a scientist to speculate that fundamental differences between aquatic and terrestrial food webs made trophic cascades primarily an aquatic phenomenon. Trophic cascades were restricted to communities with relatively low species diversity, in which a small number of species could have overwhelming influence and the food web could operate as a linear food chain. Additionally, well documented trophic cascades at that point in time all occurred in food chains with algae as the primary producer. Trophic cascades, Strong argued, may only occur in communities with fast-growing producers which lack defenses against herbivory.
Subsequent research has documented trophic cascades in terrestrial ecosystems, including:
Critics pointed out that published terrestrial trophic cascades generally involved smaller subsets of the food web (often only a single plant species). This was quite different from aquatic trophic cascades, in which the biomass of producers as a whole were reduced when predators were removed. Additionally, most terrestrial trophic cascades did not demonstrate reduced plant biomass when predators were removed, but only increased plant damage from herbivores. It was unclear if such damage would actually result in reduced plant biomass or abundance. In 2002 a meta-analysis found trophic cascades to be generally weaker in terrestrial ecosystems, meaning that changes in predator biomass resulted in smaller changes in plant biomass. In contrast, a study published in 2009 demonstrated that multiple species of trees with highly varying autecologies are in fact heavily impacted by the loss of an apex predator. Another study, published in 2011, demonstrated that the loss of large terrestrial predators also significantly degrades the integrity of river and stream systems, impacting their morphology, hydrology, and associated biological communities.
The critics' model is challenged by studies accumulating since the reintroduction of gray wolves (Canis lupus) to Yellowstone National Park. The gray wolf, after being extirpated in the 1920s and absent for 70 years, was reintroduced to the park in 1995 and 1996. Since then a three-tiered trophic cascade has been reestablished involving wolves, elk (Cervus elaphus), and woody browse species such as aspen (Populus tremuloides), cottonwoods (Populus spp.), and willows (Salix spp.). Mechanisms likely include actual wolf predation of elk, which reduces their numbers, and the threat of predation, which alters elk behavior and feeding habits, resulting in these plant species being released from intensive browsing pressure. Subsequently, their survival and recruitment rates have significantly increased in some places within Yellowstone's northern range. This effect is particularly noted among the range's riparian plant communities, with upland communities only recently beginning to show similar signs of recovery.
Examples of this phenomenon include:
Trophic cascades also impact the biodiversity of ecosystems, and when examined from that perspective wolves appear to be having multiple, positive cascading impacts on the biodiversity of Yellowstone National Park. These impacts include:
There are a number of other examples of trophic cascades involving large terrestrial mammals, including:
In addition to the classic examples listed above, more recent examples of trophic cascades in marine ecosystems have been identified:
((cite web)): CS1 maint: multiple names: authors list (link) | <urn:uuid:7085b978-2108-412e-894c-bc37708df273> | CC-MAIN-2023-06 | https://db0nus869y26v.cloudfront.net/en/Trophic_cascade | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499744.74/warc/CC-MAIN-20230129144110-20230129174110-00170.warc.gz | en | 0.935623 | 2,185 | 4 | 4 |
Glass articles for storage use, with sealed lid
(Storage for transport)
Use: In traditional oven (without lid), microwave oven (with lid unlocked or without lid) if appropriate size, refrigerator, freezer and dishwasher.
- Directly on a heat source such as gas burners, electric hobs, glass ceramic hobs or barbecue.
- A chipped or partially broken dish.
Precautions for use:
- Avoid sudden changes in temperature:
- Place a hot dish on wet or cold surfaces
- Immerse a hot dish in cold water
- Add cold liquid to a hot dish (if necessary, add hot water only)
- Place a cold dish under the grill
- Always handle a hot dish or its lid with dry mitts or gloves to avoid any risk of burns
- Watertight product, suitable for the transport and preservation of liquid foods, ensure the maintenance of locking and sealing during transport.
- We recommend the use of a bell during cooking in the microwave
- Caution when using microwave ovens with grill function, do not use this function with the lid
- When using the dish (without the lid) under a grill/roaster in the oven, leave at least 10 cm between the edge of the dish and the heat source.
- Do not use sharp utensils
- Do not fill the dish to the brim if you want to put it in the freezer, always leave a vacuum of about 1 cm
- Wash before first use. Avoid abrasive cleaners. Seal can be disassembled. Reassemble on visible streaks. When hand washing the seal, avoid over-pulling it so as not to deform it.
- In the case of burnt food, we recommend that once the dish is cooled, soak with soap and water.
- Lids may be dishwasher safe, but we recommend hand cleaning to maintain their service life (some wash cycles may be too hot and/or some detergents may be too aggressive).
Our glass, although more resistant than others, can break into several pieces or have chippings as a result of repeated mechanical shocks.
Main causes of mechanical shocks:
- in the dishwasher: repetitive shocks during washing if the dish is not stable in the dishwasher,
Possibility also of a dish that would have had a shock before washing, always check the state of the dish before putting in the dishwasher
- A shock or scale, depending on its intensity, can generate an instantaneous breakage or a breakage initiation that can cause a subsequent breakage
- In the cupboard: when storing a bad stack or a shock against another plate may cause a chipping or primer which may cause a subsequent breakage
Check from time to time for flakes or shocks
WARRANTY: This product is guaranteed by INTERNATIONAL COOKWARE against manufacturing defects from the date of purchase for the period indicated on the packaging subject to the presentation of proof of purchase.
The warranty does not apply to damage due to mechanical shock, failure to comply with the recommendations for use or professional use. Products with cuts or chippings due to use or that have been heated on a hob may be compromised and are no longer covered by the warranty. Staining, deformation and discoloration of the plastic cover are not covered by the warranty. | <urn:uuid:4984d5de-90d9-48f3-9294-8b897a01e979> | CC-MAIN-2023-06 | https://ocuisine.zendesk.com/hc/en-gb/articles/4793251292572-Use-care-Glass-articles-for-storage-use-with-sealed-lid | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499744.74/warc/CC-MAIN-20230129144110-20230129174110-00170.warc.gz | en | 0.9158 | 696 | 2.546875 | 3 |
How to use the word Prerequisite in a sentence? Sentence examples with the word Prerequisite.
Definition of Prerequisite
- Necessary to something that follows.
- Something necessary to something else that follows, as a course that a student must pass before taking a more advanced course.
Examples of Prerequisite in a sentence
- Chemistry is a prerequisite course for medical training.
- Having reliable data for the current year is, of course, a prerequisite of good budgets.
- Prerequisite: Ability to use telekinesis as a supernatural ability.
- Passing a written exam is a prerequisite to taking the advanced course.
- The registration of a property right in the property registry is a prerequisite for the property.
- Legal reform was a prerequisite for social change, but it was not automatically its immediate precursor.
- The essential prerequisite for using the lever scale is that its creator knew the principle well.
- Therefore, inhibition of acids is not a prerequisite for hyperplasia.
- The economic man hypothesis is a basic prerequisite of the theory of Western economics.
- This suggests that the chiton’s eyes are capable of distinguishing forms, a prerequisite for true vision.
- With the prerequisite that the regular circulation of water in the heat collector is ensured, a steam box is used to cook the food, boil the drinking water and heat.
- And a personal computer is a prerequisite for accessing the Internet.
- At one time, physical presence was a prerequisite for first-hand experience.
- Although some previous knowledge of programming and / or statistics is an advantage, it is not a prerequisite for the course.
- He had the gift of the talk, which a training officer described as the main prerequisite.
- This issue of number portability is considered an essential prerequisite for competition.
- A prerequisite for forming relationships with other people is empathy.
- An essential prerequisite for this work will be the definition of occam directly implementable subsets.
- The detection of the focus plane information is an important prerequisite to guarantee the high quality image of the aerial camera. | <urn:uuid:038b7fe8-6a44-4ceb-9ac8-eef5e11603c1> | CC-MAIN-2023-06 | https://www.8sa.net/use-prerequisite-in-a-sentence-how-to-use-prerequisite-in-a-sentence/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499829.29/warc/CC-MAIN-20230130201044-20230130231044-00250.warc.gz | en | 0.911726 | 433 | 2.78125 | 3 |
🇮🇳 Further to Blog 1490 the remaining 4 stamps and 1 miniature sheet issued by India Post to commemorate the involvement of Indians in the First World War are now illustrated below. The subject of this part-issue is the ‘Major Battle Theatres’ in which Indians fought as part of the British Imperial forces. The subjects featured are Indian involvement in the conflicts in France and Belgium, East Africa, Gallipoli and in Mesopotamia. The set emphasises just how significant was the role of Indian forces in bringing victory to the British and their allies in their fight with The German Empire and its allies. Rating:- *****.
🇮🇱 It is worth noting that the Indian contribution to victory in the First World War in the Middle Eastern area was also noted on one of the 4 stamps issued one per year by the postal service of Israel which made up a set to commemorate events in Palestine/Israel during the war. This fascinating set from the postal administration of a country which was once part of The British Empire and which has been said at one stage to have been interested in joining The Commonwealth, highlights the principal features of Palestine/Israel’s involvement in the First World War. The 2015 stamp depicts the Ottoman military railway, the 2016 stamp illustrates the aerial warfare which took place there, the 2017 stamp depicts the entry of British General Allenby into Jerusalem after defeating the Turks there and the 2018 stamp shows the Imperial Indian forces at Haifa. An interesting set telling an important part of the story of the British Empire’s involvement in the First World War and highlighting the role of Indian forces in the war.
🇬🇧 The first, admittedly rather indistinct, pictures of the upcoming Royal Mail Royal Navy ships issue, due to be released on 19 September 2019 are available. The set is made of 8 stamps sold in se-tenant pairs (2 x 1st - Mary Rose and HMS Queen Elizabeth, 2 x £1.35 - HMS Victory And HMS Dreadnought, 2 x £1.55 - HMS Warrior and Sovereign Of The Seas, 2 x £1.60 - HMS King George V and HMS Beagle).
There’s no disputing that the set depicts the Royal Navy’s most famous and historically significant ships and commemorates the Royal Navy’s magnificent new aircraft carrier, HMS Queen Elizabeth. The art used on the designs, despite the poor quality images here, is excellent and this could well be the best set of the year from Royal Mail. An exciting issue for sure. Rating:- *****.
🇺🇬 In addition to the 4 stamps and 1 miniature sheet featured in Blog 1490 which were issued by the postal service of Uganda on 21 March 2019 to commemorate the inauguration of the 183 MW Isimba Hydropower plant and interconnection project there are also 4 single stamp miniature sheets each with a high face value. Rating:- **. | <urn:uuid:7213cdf2-c393-4874-962f-9441d5fcf5ae> | CC-MAIN-2023-06 | https://commonwealthstampsopinion.blogspot.com/2019/08/1491-battlefields-of-world-war-i.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499899.9/warc/CC-MAIN-20230201013650-20230201043650-00330.warc.gz | en | 0.950957 | 599 | 2.765625 | 3 |
Believe it, or not, every time you shuffle a pack of cards you create something that no one else in the history of our planet has EVER created!
We can deduce this because counting such arrangements is very simple. Arranging three different items in a line can be done in 3×2×1 ways. Arranging eight different tiems in a line can be done in 8×7×6×5×4×3×2×1 ways, etc. Mathematicians use this pattern so often that we have created a name and a symbol for it. 8×7×6×5×4×3×2×1 is written as 8! and we call it "eight factorial." You probably have a button on your calculator labelled with [x!] that will perform these calculations for you.
When you shuffle a pack of cards, you will be creating just one out of 52! possible combinations. In this video I try to help you understand what an incredibly huge number that is! It looks deceptively small when written as 52!, but it can also be written in scientific notation as 8.065817517 × 10^67. If I attempt to write it using normal numerals, it would look like this:
It is difficult to understand or grasp the nature of a number that large (but I try). I hope you enjoy learning about the art of counting arrangements, about factorial notation, and about the amazing insights that we can gain into some of the simple acts we perform ... such as shuffling a deck of cards. Remember this next time you play!
[I apologise that (during the video), when writing the huge numeral above, I inadvertently wrote part of it off the bottom of the screen. I also made one (slightly) incorrect calculation, which I point out during the video ... but I decided to leave the video in its raw state. You will probably discern why.] | <urn:uuid:017a8d8a-9c1c-48eb-a578-66065408edb8> | CC-MAIN-2023-06 | https://crystalclearmaths.com/videos-learning-resources/chance-and-data/combinatorics-counting/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499899.9/warc/CC-MAIN-20230201013650-20230201043650-00330.warc.gz | en | 0.957268 | 441 | 3.40625 | 3 |
Earth Overshoot Day
Today is Earth Overshoot Day. The day on which, according to the Global Footprint Network, humanity’s demand for ecological resources and services in a given year exceeds what Earth can regenerate in that year. So as of today, we are consuming more natural resources than the earth can provide for us. Each year this day falls earlier because we humans are living on credit instead of using natural resources consciously and sustainably.
The shocking images and news of the disastrous flooding in the Eifel, North Rhine-Westphalia and Bavaria continue to reverberate. They have once again raised our awareness of the fact that climate change is not just a vision of the future, but has already long since begun – that we can no longer afford to continue our wait-and-see attitude but have to take action now to protect the earth’s climate. The global climate crisis is non-negotiable. #Move the Date: We need to do everything we can to delay the date as much as possible.
At VAUDE, we have already set out to reduce our ecological footprint and conserve natural resources. We want to take on responsibility for ensuring that our children will be able to enjoy nature in the future. How exactly are we doing this at VAUDE? That’s what we want to share with you here, providing some inspiration along the way.
We want to #Move the Date
How can we succeed in reducing our global ecological footprint? Experts such as Jürgen Knirsch from Greenpeace recommend 5 guidelines for making this happen.
- Eat less meat (and reduce waste food in general)
- Live modestly and keep our energy use low
- Fly as little as possible
- Drive less
- Call on the state for legal regulations so that human rights and environmental protection are put on the agenda with binding agreements
To mark Earth Overshoot Day, we have invited five representative VAUDE employees to speak about what we are doing to reduce our ecological footprint.
#Move the Date:
Eat less meat – and more veggies
Jackfruit kebab? No problem! Since the beginning of July 2021, VAUDE’s organic canteen has been completely vegetarian or vegan. Chef Rainer Seibold has always sourced his ingredients regionally, organically and fairly – and he has been instrumental in our switch to a purely vegetarian or vegan menu. “I have been vegan myself since 2019. I want to share my passion and am convinced that we can gain so much more with our new cuisine,” says the 33-year-old. Specifically, this means “a higher degree of freshness, quality, food diversity, environmental protection, social justice, and VAUDE Spirit!”
He easily won the VAUDE management over. “At VAUDE, we take on responsibility for people and the planet. In everything we do, we take ecological and social factors into account. We are breaking new ground in many areas and would like to give our canteen the chance to do so as well,” explains VAUDE Managing Director, Antje von Dewitz.
A few weeks have now been spent testing out the reception to the new menu. Mediterranean bowl with quinoa and hummus, mung bean curry with sweet potatoes, spinach & jasmine rice or simply the local specialty, Käs’spätzle with braised onions & a side salad, all sound very promising. “In the end, it just has to taste good – and I’m sure it does,” says Rainer Seibold with satisfaction.
#MovetheDate: Live modestly and keep our energy use low
Living modestly and keeping our energy use low means more than just living simply. It also includes how we construct our buildings, how we consume energy and inventing new technologies to reduce emissions as much as possible. Torsten Kamp is responsible for maintenance and all issues related to resource consumption at VAUDE. “We must finally stop climate change,” he says with conviction.
Torsten Kamp is proud of the fact that the VAUDE company site in Tettnang and the Manufaktur production facility have been climate-neutral since 2012. Energy efficiency played a prominent role in the modernization of the company headquarters in 2016. Thanks to better insulation, green roofs, floor heating, wooden construction and clever lighting, the buildings now have a very high energy efficiency standard.
The company’s own photovoltaic system on the roof supplies 600,000 kilowatt hours of electricity per year, heating has been provided by biogas since 2013, rainwater is used for flushing toilets, and the lighting in 90 percent of the buildings has also been completely converted to low-energy LED. “We control our lighting with presence and motion sensors in our offices,” reports Torsten Kamp. VAUDE offsets emissions that cannot be avoided with Myclimate, which finances projects that conserve emissions to the same extent that VAUDE produces them.
VAUDE has now set itself the goal of manufacturing all of its products worldwide in a climate-neutral manner in the future. “Consistently sustainable, climate-friendly business is the only sensible way for our future.” Not only VAUDE’s Managing Director, Antje von Dewitz, but also Torsten Kamp are convinced of this.
#Move the Date: Fly as little as possible – take more staycations
Fewer flights means simply taking more vacations at home. And Rafael Erath is one of the product managers at VAUDE who make sure that the necessary gear is available. Bike bags are currently in higher demand than ever. “We are experiencing a real bike boom,” the 37-year-old tells us. More and more people are discovering bike trips at home for themselves, instead of spending hours on a plane overseas. “Certainly the pandemic has also played an important role. Many are choosing to enjoy their free time nearby.” Rafael Erath also spends a lot of time with his family on his bike, exploring the Lake Constance region on his doorstep. Sometimes less really is more. VAUDE is also committed to reducing climate-damaging emissions as much as possible for the manufacturing of its products. By 2024, at least 90 percent of all VAUDE products should have a biobased or recycled material content of more than 50 percent. Using renewable raw materials or recycled materials conserves fossil resources and significantly reduces CO2 emissions in material production – another step towards climate neutrality.
The demand for sustainably produced gear is growing exponentially. VAUDE is constantly developing new solutions for secure and easy bike bag attachment while conserving resources. “Coming next October, the ReCycle series of bike bags, our first made from fully recycled main materials, will be available,” Rafael Erath is pleased to announce. Plastic packaging or multilayer films from Germany’s yellow bag recycling program are reused for this purpose. “This is innovative, forward-looking and climate-friendly as well,” says the VAUDE product manager.
#Move the Date: Drive less – bike more
The diesel scandal, smog alarms, endless traffic jams – mobility is responsible for a large share of emissions in our globalized world. VAUDE is taking a close look at the challenges of its corporate mobility policies including mobility guidelines for all business trips, the conversion of company cars to electric vehicles with 100% green electricity, incentives for environmentally friendly commuting to work such as JobRad, an e-bike rental service, front-row parking spaces for carpools, a mobility lottery, or the Bähnle bus.
Gernot Moser, sales manager in the Bike Division at VAUDE, is a big fan of the company’s mobility concept. “When it comes to promoting cycling at VAUDE, what I appreciate most is the bike repair workshop and the facilities for showering at work,” says Moser. He himself rides his bike to work almost every day, covering about 4,000 kilometers each year. Altogether, VAUDE employees ride over 80,000 commuter kilometers by bike every year – equivalent to over 2 times around the world. “Overall, we have already reduced climate-damaging emissions by quite a lot. But we are still far from reaching our goal: By 2024, we want to cut emissions from employee mobility by another 25%,” adds VAUDE CSR Manager, Hilke Patzwall.
#Move the Date: Call for better legal regulations
For VAUDE Managing Director Antje von Dewitz, taking a stand is a given. She wants to take on responsibility on many levels. She and the entire VAUDE team are committed to creating new political framework conditions so that industry can implement climate-friendly technologies and business models and remain competitive in the process. “An important prerequisite of this issue is recognizing that, as a company in the global textile industry, we are a part of the problem of pollution and global warming. That’s why I see it as my corporate responsibility to also develop solutions to these problems and to ensure that our economic impact does as little damage as possible to people and the planet,” she says.
VAUDE and Antje von Dewitz are also actively involved in politics and call for stricter legal requirements for corporate climate and environmental protection. VAUDE supports global climate protection movements such as Fridays for Future and Scientists for Future and is involved in the Entrepreneurs For Future initiative. Side by side with German Development Minister Gerd Müller, Antje von Dewitz has campaigned for a supply chain law that obliges companies to fulfill their responsibility throughout the global supply chain. VAUDE was also involved in the introduction of the Grüner Knopf seal (Green Button) from the very beginning as a founding member of the Partnership for Sustainable Textiles, working to make global textile production more environmentally friendly and fair. Today, 90% of the VAUDE Collection meets the strict criteria of the Grüner Knopf.
Since 2012, VAUDE has prepared an Economy for the Common Good balance sheet, which – in short – evaluates the success of a company according to basic democratic values and what serves the good of people and the environment. Antje von Dewitz is convinced that solution-oriented and sustainable business is the right way to survive in times of climate change and global challenges and that responsible corporate action is also becoming increasingly important to consumers. It’s a trend that others are only now discovering for themselves. And VAUDE also offers solutions for this issue. With the Academy for Sustainable Business, founded in 2020, VAUDE is passing on its many years of experience and knowledge to interested companies and organizations.
“Successful business can also be humane, environmentally friendly and value-oriented in a globalized world. We want to be part of the solution, and we are becoming more successful at this every year. That gives me strength and hope, and it always encourages me as well,” wrote Antje von Dewitz in her biography, which was published in 2020.
VAUDE wants to #Move the Date
We at VAUDE are convinced that it is worthwhile to become active for climate protection – true to the motto, “everything is possible, nothing is necessary.” Maybe together we will manage to move back Earth Overshoot Day 2022.
#Move the Date 😊 | <urn:uuid:e00d6ca3-1b5a-4811-a195-ff96e86a5dcf> | CC-MAIN-2023-06 | https://experience.vaude.com/vaude-wants-to-move-the-date/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499967.46/warc/CC-MAIN-20230202070522-20230202100522-00410.warc.gz | en | 0.953771 | 2,387 | 2.734375 | 3 |
The Covid 19 has affected many things in our living habits, including our daily lifestyle, what we consume, and how well we take cognizance of our health. Looking at the latest trends in our lifestyle, most of the engaging activities are done indoors. This is because health organizations such as the world health organization, disease control center, and other reputable organizations have warned about the dangers of being exposed to the killer virus. The world is in turmoil, and the only way it can get balance is that changes have been made to our lifestyle, and new ways of life have been adopted.
As a result of the Covid, 19 people are restricted from living their lives based on the remote method, which involves using technology to do almost everything. The use of technology has helped us work hand in hand with others without being exposed to the virus. In contrast, activities that get us together, such as education, socializing, and Covid, have restricted others. The new solution that has, however, been the new way of our life is leveraging technology. Many aspects of our life that include traveling, public events, and social gatherings have been on hold for now. While virtualization has been the only way, we communicate, interact and relate with others.
The Digital Connection A New Way To Our Lifestyle
Our lifestyle is only engaging when we relate with others, and this can only happen when there are physical meetings and social interaction. However, the pandemic has restricted this; it is only possible to create connections through digitalization. Experts analysis has broken down the emerging trends of what the remote lifestyle has been like. Although it took a toll on many people and took a very long time for many to adjust to the new normal, it has served as the bridge to our new lifestyle. Besides, innovative products and services were how the emerging trends of digitalization became much more enjoyable. There are new motivations that have been the sole driving force of how people see the new normal. Video games and other activities like online calls the virtual parties have become the norm.
What The Future Holds After The Pandemic
Yes, the pandemic has shaped the world in a new way, and it is pretty interesting to observe that people are adjusting to the new realities. More so, the lifestyle that has been in place previously would only become true if the pandemic clears out totally. Although the world is very dynamic and unpredictable, the effectiveness put into the measures restricting unnecessary social gathering is still very much holding. With that in mind, the new lifestyle we are living might just be the beginning of what is expected to come to pass. The future would become better, and we would be able to gather around to enjoy life the old ways, but until then, stay safe. | <urn:uuid:f790b9f5-d782-4053-8ba1-4531f5b63d56> | CC-MAIN-2023-06 | https://powernewsnetwork.com/the-global-remote-lifestyle-and-how-the-covid-19-changes-the-world/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500151.93/warc/CC-MAIN-20230204173912-20230204203912-00570.warc.gz | en | 0.977639 | 557 | 2.625 | 3 |
Researchers use genetics to help blind man see again
Modern medicine has brought hope to and improved the quality of life of countless people around the globe, but some areas of medical research move more slowly than others. Restoring vision in individuals that have lost it is one area of study that is both extremely complicated and challenging. Sight can be lost for many different reasons, so tackling the problem and attempting to restore the ability to see requires a multi-pronged approach, and new therapies for individuals suffering from full or partial blindness have been slow to develop.
Now, a team of scientists has demonstrated that gene therapy can be used to partially restore sight in people with certain retinal issues that cause blindness. A 58-year-old patient was able to regain partial sight after being treated, though the newfound ability to see required the use of special goggles that work in tandem with genetically modified retinal cells.
Today’s Top Deal Prime Day 2021 started early for the Fire TV Stick 4K — just $29.99 with coupon code HELLOFTV! List Price:$39.99 Price:$29.99 You Save:$10.00 (25%) Available from Amazon, BGR may receive a commission Available from Amazon BGR may receive a commission
As Gizmodo reports, the new paper the researchers published in Nature Medicine explains how they went about modifying the patient’s retinal cells. As part of a clinical trial, the scientists recruited a modified adenovirus which was used to transfer the modified genetic code to the patient’s retina. The tweaked retina cells generated a protein that was particularly sensitive to amber-colored light. This first step doesn’t actually result in restored vision, but it sets the table for the next step, which is to equip the patient with special goggles that effectively translate the outside world into pulsing amber light.
When the patient donned the goggles, he reported being able to “see,” but in a new and different way. He was able to accurately assess a 3D space by looking around, differentiating between objects in the space, and even plan how to reach and physically touch them. This is obviously a huge improvement over total blindness, but it’s not quite the same as restoration of natural vision. The patient only benefits from this new way of seeing while wearing the goggles.
It’s far from a magic bullet for blindness, but this approach may just be the first step toward one day restoring vision in even more meaningful ways. Being able to see anything at all is a huge improvement over complete loss of sight, even if it requires special goggles in order to work, but the scientists have their hearts set on even more impressive advances in the not-so-distant future.
As this gene therapy is still in a clinical trial phase it is not yet readily available for patients that might want to try it. Many hurdles have to be scaled before such a treatment option would be offered on a large scale, but based on the success the scientists are already seeing, it might not be long before it is ready to go.
Today’s Top Deal ? Price mistake alert ? Coupon code H7RT953B plus an accidental extra discount slash #1 smart plugs to $3.75! List Price:$24.99 Price:$14.99 You Save:$10.00 (40%) Available from Amazon, BGR may receive a commission Available from Amazon BGR may receive a commission
We are now on Telegram. Click here to join our channel (@TechiUpdate) and stay updated with the latest Technology headlines.
For all the latest Science News Click Here | <urn:uuid:60fde204-ad5a-4f1a-a65b-84418db6b99b> | CC-MAIN-2023-06 | https://techiazi.com/researchers-use-genetics-to-help-blind-man-see-again/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500151.93/warc/CC-MAIN-20230204173912-20230204203912-00570.warc.gz | en | 0.946484 | 747 | 2.5625 | 3 |
Why: The US shoreline along the Great Lakes covers nearly 6,000 miles, much of which provides direct access to the US-Canadian border. This region is important to the national economy given its historical manufacturing industry and therefore, several stakeholder share responsibility to improve security, safety, commerce and environmental protection. The Tribal Nations are one such stakeholder with significant waterfront presence.
What: Technical Assent supported an analysis and feasibility study to partner with Tribal Nations along the shoreline to deploy a federally sponsored Automated Identification System (AIS) tracking system. The project was envisioned to as a win-win from the start – Tribal Nations would improve their awareness of shipping activity in waterways contribute to regional situational awareness with other public safety and law enforcement groups. | <urn:uuid:f911be88-6330-4d18-a933-30c9b12452ff> | CC-MAIN-2023-06 | https://technicalassent.com/portfolio/great-lakes-mda/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500294.64/warc/CC-MAIN-20230205224620-20230206014620-00650.warc.gz | en | 0.938129 | 151 | 2.8125 | 3 |
A PhD can open a lot of job opportunities. Most of those jobs are academic in nature, including teaching and research. But what about PhD-holders who don’t want an academic career?
Someone with a PhD might leave academia for many reasons. Some may want to move into a completely different field, for example. Others may leave the academic world because of low pay. An academic in a specific field of study may make less money than their professional counterparts in the same field.
Some people want to understand their possibilities before they pursue a PhD in the first place. They want to know how a PhD could serve them, whether they pursue the academic life or not.
In any case, if you’re looking for alternative careers for PhD-holders, you do have options. You can find alternative jobs for PhD scientists, writers, business experts, and more. With many of these jobs, having a PhD can help you earn higher pay and qualify for leadership positions. If you have a PhD or want to pursue one, you don’t need to limit yourself to academia. Here are some options that you might pursue instead.
1. Grant Writing (PhD in English)
When organizations need money, grant writers help them obtain it. Grant writers are responsible for generating proposals for funding requests. They are usually employed by nonprofit organizations, universities, or government agencies. Grant writing can make a great career choice if you have a PhD in English, since your research and writing skills can serve you well. Grant writers need a firm understanding of their field and how to identify the most relevant donors. They also need excellent persuasive writing skills, which includes knowing their audience and writing in a way that appeals to them.
2. Curriculum Development (PhD in Education)
If you have a background in education, you could find a job in curriculum development. Curriculum development is the process of organizing and developing educational experiences for students. This process may involve activities such as identifying the educational needs, creating learning objectives, and designing approaches to meet these objectives. Curriculum developers can work at all levels of education, from kindergarten to college and beyond. Sometimes, publishing companies hire curriculum developers when they want to update textbooks. These professionals need excellent research and fact-checking skills, and they should also understand what learners need.
3. Product Testing (PhD in Physical Science)
A product tester is someone who tests a product before it gets released to the general public. Testing specialists examine and analyze products, identifying potential flaws. Product testers might work for a company that’s launching a new product, or they might work for an independent company that’s testing products for other companies to see how well they’re working. The more complex the product is, the more expertise the tester will need. Someone with a background in science, for instance, can test software. For the most complex products, those with a PhD in physical science can provide the right kind of knowledge.
4. Small Business Consulting (PhD in Business/Finance)
A small business consultant is an expert at helping small businesses grow. They provide advice on the company’s business, marketing, and management needs. They may also provide training or mentorship to help with branding or expansion strategies.The role of a consultant is to make sure that the business owner has the information they need to make good company decisions. Their job is to be an objective third party who can offer unbiased advice on what the business owner should do next. A PhD in business or finance can give a consultant invaluable expertise in this area.
5. Actuarial Science (PhD in Math)
An actuary is someone who deals with the probability of risk. First, they calculate the likelihood of certain risks. Then, they use their set of skills to help manage the possibilities. These skills include mathematics, statistics, and finance. Employers of actuarial scientists are often insurance companies. These companies hire actuaries to calculate specific risks, like the risk of flooding in a particular area. This work helps insurance companies determine their prices and make other decisions. Because actuaries need strong math skills, a PhD in math can help a person succeed in this kind of job.
6. Campaign Management/Strategist (PhD in Political Science)
Campaign managers and strategists play a big role in politics. They handle all aspects of a political campaign, from fundraising to advertising strategies. This includes coming up with the strategy, managing resources, and coordinating media efforts. As a result, candidates rely heavily on their campaign managers. Campaign management can provide a rewarding career for someone with a PhD in Political Science. This career lets political science experts make the most of their skills. It requires deep political knowledge, excellent organization, communication, and knowledge of the media landscape.
7. UX Design (PhD in Engineering)
“UX” is shorthand for “user experience,” and it matters for customer satisfaction. UX designers enhance user experience by improving usability and accessibility. In other words, UX is the practice of designing products with an emphasis on how people interact with them. UX designers use personas to understand who their users are, and then they identify what those personas need or want from the product. UX designers must research users, understanding their needs and goals. A PhD in Engineering can help a person succeed in this job. Plus, someone with a PhD instead of a bachelor’s degree might work for major corporations and earn a higher salary.
8. Public Policy Administration (PhD in Sociology)
Public policy administration is the practice of creating, implementing, and managing policies for public entities. It often requires a high level of education, so a PhD can help a person succeed in this field. Public policy requires a wide-ranging knowledge of laws and regulations. Public policy administrators should also know how to analyze data. Some jobs in public policy administration include legislative aide, budget analyst, and information specialist. These positions are only open to those who have at least a bachelor’s degree in economics, public policy, or related fields. A PhD can help public policy administrators rise through the ranks quickly.
9. Biomedical Manufacturing (PhD in Biological Science)
Biomedical manufacturers create a range of medical products. Those products include surgical equipment, diagnostic devices, and medical instruments. They may also make other items like drugs, nutritional supplements, prosthetic limbs, and orthotics. Biomedical manufacturers can work in many medical sectors. They are often hired by major hospitals and clinics. Many biomedical manufacturers focus on a particular area, like pharmaceuticals, medical devices, and more. In addition to manufacturing products, they may also offer other services like research or consulting. Someone with a PhD in biological science could thrive in this field.
10. Digital Media Marketing (PhD in Humanities)
Advertising doesn’t just include newspapers and TV commercials. These days, marketers must understand digital technology. Digital media marketers create content for a variety of digital platforms, including websites, social media, email campaigns, and blog posts. Digital media marketers can specialize in a specific area or take on a generalist role. There are many jobs available in the digital marketing industry. Some examples include: SEO specialist, social media manager, website designer/developer, search engine marketing specialist, and email marketing specialist. Someone with a PhD in humanities could perform well in this role, since it requires both creativity and audience research.
What are Some Reasons a PhD May Change Careers?
A PhD may switch careers for any number of reasons. Some of those reasons are positive, while some are negative.
On the negative side, academics may need alternative careers for PhD holders because they don’t make enough money in the academic sphere. An alternative job can help them earn more money while leveraging their advanced education.
Some may search for alternative careers for PhD holders because of academic burnout. Burnout comes from workplace stress. With all the pressure that comes from academia, teachers often deal with this phenomenon.
On the more positive side, a PhD might choose an alternative career for other reasons. They may find alternate ways to explore their creativity, start their own business, or use their research to help people.
What are Important Skills a PhD Can Take Into a New Career?
Someone with a PhD will have a lot of valuable skills. All of those skills can benefit them in their new careers.
For example, PhDs understand research. For those who want alternative careers for PhD scientists, that research can lead them to product development. Overall, PhDs know how to choose credible sources and find information, which matters to a lot of employers.
Having a PhD often means having good task-related skills, whether the PhD works alone or with others. They often do both, performing research by themselves and then working with other people to bring that research to fruition. These skills can benefit virtually any workplace.
PhDs can manage their projects well, too. For example, writing a dissertation requires excellent time management skills, organization, and task prioritization. As a result, someone with a PhD could succeed while managing projects and teams.
And of course, PhDs know a lot about their field of study, which can help them if they go into a related field.
|PhD in English?||Try Grant Writing|
|PhD in Education?||Try Curriculum Development|
|PhD in Physical Sciences?||Try Product Testing|
|PhD in Business or Finance?||Try Small Business Consulting|
|PhD in Math?||Try Actuarial Science|
|PhD in Political Science?||Try Campaign Management|
|PhD in Engineering?||Try UX Design|
|PhD in Sociology?||Try Public Policy Administration|
|PhD in Biological Science?||Try Biomedical Manufacturing|
|PhD in Humanities?||Try Digital Media Marketing| | <urn:uuid:a2aa4066-3d9e-489a-a580-78509973e555> | CC-MAIN-2023-06 | https://www.collegeconsensus.com/careers/alternative-phd-careers/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500294.64/warc/CC-MAIN-20230205224620-20230206014620-00650.warc.gz | en | 0.950439 | 2,142 | 2.515625 | 3 |
According to Tolkappiam it is learnt that the great sage Agastya brought all the 18 clan of Velirs to the south after some kind of natural calamity struck the northern part of the country on those days, most importantly the sinking of Dwaraka besides they are from the kingdom of Lord Krishna who was the god who protected and saved these people from the difficulties they faced time to time. Until those times it seems that these Velirs had ruled northern part of this continent besides there are few civilizations ruled by Velirs present in the south also. In the historical years when they were under the protection of Lord Thirumal these group of peoples are popularly known by the name of Yadavars. The fact that they are named as Yadavars is due to the reason that Lord Krishna belonged to the Yadhu race. Yadhu race can be traced to the lineage of Pandavars. Yadhu is a king of Pandavars who was born to a Queen by the name Yayathi.
It is learned that from this ancestry several race were born who established kingdoms in various parts of the earth. One of the first race of the Yadhu is Sakasrjeththenalae Hayahaya to whom belonged king Kaarththaveereyaarchchunan, from king Kaarththaveereyaarchchunan another king Thaazhajangkarkazh. From Yadhus second son who belonged to the race of Kurooshdusha – some of famous persons of this race are Sacepenthu, Seyaamagan, Vetharppan etc., Vetharppan’s third son belonged to the Saethe race, from second son Saathva came the race Boojha race, Anthaka race Verushneeka race. From this Verushneeka race Lord Krishnan was born. Even Karnnan belongs to this Yadhu race because he is known by the name Yathuthaanan. There is a temple in the Tulunadu known by the name Yathugiri which is situated on a mountainous region. This temple is said to have 9 sacred water. This place is also known by the name Yaathavagiri and is said to be present since DwaparaYuga. Other name for this place is ThiruNarayanapuram, Melai Kootai etc., Sage Balaramar have visited this place. Of course this is an ancient temple for Lord Krishna. Dwapara Yugam is also known by the Yakkeum. The Varahaavatharam is also known by the name Yakkeavaraham. Yavanaari is yet another name for Lord Krishna. Velirs have 18 clans among them, surprisingly Yadhavars also have 18 clans among them. Interestingly in the Tanjore district of Mannargudi, Tuluva Velalars claim that the Yadhavars in their locality are relatives to them. It is in Mannargudi one of the 108 Divya Desam Sri Raja Gopalaswami Temple is present. Very few scholars address Mannargudi as Dwaraka of South.
When Dwaraka was present it is said that this city was built of Gold. One of the Pulavar Kapilar addresses a velir by the name ErungkooVel who had ruled Dwarka and that his fort was made of Copper. On those days cities and buildings were made up of metals! A feat not possible even today.
Among the many forms of Lord Krishna one was that he had Blue skin and Lord Shiva had dark-blue skin. Even today there are sightings that in some remote part of the world particularly in the ocean region that there are people who blue in color and any who makes any attempt to go near these places is somehow prevented through some natural forces besides any attempt to go near them or to their places with the help of scientific equipments have only resulted only in a futile exercise. The possible location of existence of these people is remote parts of all of the island present in and around japan including the regions in the water, channels of the rivers, seas, lakes, ponds and various water bodies present in Europe, desert regions in parts of Africa particularly in and around Sahara – these peoples is said to have been using their alphabets for many centuries and caves present in the American continent as a whole. None of the above said places are that easily accessible because some kind of Layers prevents them from doing so.
Marine Archeological Excavations: During year 2001 NIOT found cities that had geometrical alignment along the 9 km long strech Gulf of Cambay, west of Hazira, Gujarat. This resembled both harappan and pre-harappan ruins with well laid basements for houses, drainage network, many structures closely resembling Great Bath besides two rivers one running upto 9 km and the other upto 9.2 km flowing in the east-west direction that coincides with the course with the Tapti and Narmada rivers. Perhaps the river got changed its course and started to flow in a new direction. Artefacts, constructions elements with holes and studs, pot shreds beads and fossil bones etc., were found at this site. The artifacts collected included a variety of pottery pieces, Mesolithic stone tools, a few Paleolithic macro stone tools, arm portion of a women with bracelet in her wrist, object with a drilling process that might involve lathe indicating the use of machines, beads made of semiprecious stones, brick pieces, hearth material, wattle and daub structure materials, corals, perfectly holed stones, fossilized human remains and human teeth. Semi-circular and Rectangular blocks with some of them having a L-shape cut and provision for dowels have been found in Dwaraka. Harappan settlements dating back to 16th century B.C., had been found in and the Porbandar coast – on those days it was a centre for maritime activity.
Near Gulf of Cambay another archeological site Padri that resembles Harappan and pre-harappan site had been found. It is found that river Chatranji originally flowed west but due to some natural calamity got its direction changed to east and by connecting Chatranji with the river found in Gulf of Cambay it is found that it flowed up to Prabhaspattan another pre-harappan settlement which lies in the Arabian Sea. In the year 2005 another river that extends upto 250 km in the Gulf of Cambay was discovered which was discovered as a joint effort of geologists and scientists at the Space Application Centre.
There are other finds too such as kiln-burnt potsherds, fused articles with a flat surface with a cylindrical or flat object fused on to it; circular and triangular cakes with precisely drilled holes, even 2 in. long cylindrical beads perforated along the axis and two tablets-in-bas-relief with inscriptions (one with a possible pictorial motif of a person seated in a yogic posture – a typical pictorial motif of objects found at Mohenjodaro and Harappa inscribed with script and another with a triangular sign with lines drawn parallel to the base-line – a pictograph which looks similar to the sign of the Harappan script), semi-fossilized bones (of a bovine), a fossilized jaw-bone, a fossilized part of a vertebral column, a human tooth., semi-precious stone beads with perforated holes of 1cm to less than 1 mm. in diameter. Daimabad, located on the Pravara was the place where civilization flourished in the southern most region on those days. Pravara river is actually one of the tributaries of the river Godhavari. The fact that this lied in the southern most region on those days suggests that the people were moving only in the southerly direction.
The temple for Vishnu’s Matsya incarnation which was build on those days can still be found at the place called Shankhodhara in Bet Dwaraka. Dwaraka was a city that was build on the ruins of another city named Kususthali which on those days was lost to the sea. Dwaraka city of Gold and Golden Gateway on those days is situated in Gomti river where it meets the Arabian sea. Dwaraka extended upto Bet Dwaraka (Sankhodhara) in the north and Okhamadhi in the south Eastward and upto Pindara in the eastward direction. Large Trapezoidal blocks were used as stones for building activities and they had anti erosion structure in the sea also. Dwaraka is one of the Saptapuri, one of seven main holy cities and the others are Ayodhya, Mathura, Haridwar, Kashi (Varanasi), Ujjain, and Kanchipuram. It is also one of the four holy dhamas in India, the others being Rameswaram, Puri, and Badrinath. It seems that Dwaraka was build on cities that were build over and over again. The Tamil Alwars have sung of Dwarka in a total of 13 verses, in which Nammalwar refers to Krishna as the Lord of Dwaraka. There are atleast 12 archeological Indus valley sites in the Gulf of Cambay.
Even though there are so many evidences to suggest that this is Dwaraka these excavations might not be the real Dwaraka but the places occupied by native Dravidians after a long time of Dwaraka submergence. Dwaraka will be lying deep underneath. These excavations is just another glorious city of Indus Valley civilization for the simple reason that there are so many unique characteristics of this civilization present in these excavations. One of the reason for dismissing that this might not be the real Dwaraka is when Dwaraka was built our literature addresses that this city was glittering of Gold and building were made of other metals including gold. But marine archeological excavations did not yield much quantity of gold or other metals. The period that these cities existed might actually correspond to the age of Second Tamil Sangam.
In the vicinity of Gulf of Cambay was another important Indus valley site Lotal a port city and a center for bead industry. The city was destroyed by floods over and over again but was build over and over again also on higher platforms and a huge wall was build to encircle the city in order to protect the city from floods. There were warehouse for storing the commodities and recently a warehouse having 64 rooms with passages for each room was discovered. Here the Dockyard and warehouse was connected by a long wharf. Dockyards of those times can handle 30 ships of 60 tonnes each and vice versa. Copper Smith workshops were also present. Excavations at Lothal have brought to light a Persian Gulf seal, terracotta models of African mummy, guerrilla and boat model, demonstrating the maritime practices and relations with Mesopotamia and ancient Egypt. Even thought copper kind of materials were a rare in the findings of the marine archeological excavations that carried in the Gulf of Cambay, the least evidence of copper presence is present in Lotal indicates people were producing this metal and they had workshop for this indicating they were skilled in using this metal. This usage of copper must have been from the previous knowledge of the people who inhibited this and the surrounding areas of this city on those days.
Another city Dholavira, that belonged to the Indus Valley civilization was discovered by ASI after a 9 year long excavation. Dholavira is known for its sophisticated water management system. Giant reservoirs the largest measuring 263 feet by 39 feet and 24 feet in depth that together held more than 325,000 cubic yards of water was discovered which were connected to wells that filled cisterns for drinking and bathing. Dholavira had Dams and extremely fine small beads made up of Golds were found here. Dholavira city is divided into 49 squares having perfect geometry and alignment and the houses were constructed using circular structures to withstand storm and sandblast. Dholavira had two stadiums which was discovered recently, one is located 2.6 metres away from the southern side of the citadel and 30 metres from the southwest corner of the bastion. The length at the highest point is 24.75 metres and is 25.25 metres at the lowest. The stadium has a width of 8.25 metres and an extending height of 250 metres and the other is situated to the east of stadium number one and is located at a higher level. This stadium, which appears to be in a step format, is 22.20 metre in length and 14.50 metre in width. Also, the stadium is 110 metres higher than stadium number one. One of the stadium had space for accommodating 10,000 peoples. The fact that Dholavira was divided into 49 squares is very interesting because our tamil literatures do mention of a very huge empire eons ago which had 49 countries which were divided as 7 x 7 sectors. DholaMozhithevar one of the great learned Tamil pandit who wrote a treatise in tamil might be from this area. More over a minister from the kingdom of Thirumangai Alwar by the name Dholavazhakkan might also be from Dholavaria.
Velirs were once CHALUKYAS: Dwaraka had been swallowed up by the sea. Krishna had warned Yadhavars about the fury that their city will be destroyed by the ocean and advised them to go to a safer place and Krishna had saved these people from the natural calamity. After this it seems that they had entered into parts of Gujarat and places that lied south of the Vindya mountains. The kings who ruled these regions during the ancient period are known by the common name Chalukyas. The Chalukyas are addressed in the Tamil classical Literature as Vel, Velpulavarasar, Velpulavarasar Chalukaventhar, Tarakaariunch Chalukuventhanum, Vaenelazhanum Vaezhanalakum – Suggesting that they belong to the Velir clan. Exclusive Chola literature addresses Chalukyas as Vezhlkulatharasar, VezhlkulachChaluka. Great tamil poet, Avvayar had sung about a velalar king Ambarkezhan Saenththanar and this king in his notes had written that the flag of the Chalukyas had a flag of Varaha, a unique kind of mythical animal that looked similar to Boar which was present many thousand years ago. One of the Lord Vishnu’s Avtar is Varaha Avtar. Evolution of Boar can be traced back to 36,600,000 B.C. This kind of symbol was present in the flag of the Chalukya kings.
During some period the Chalukyas had split themselves into two with one of them ruling the Gujarat and the regions that lied in the vicinity of Vindya mountains and the other ruling the regions that lied south of Vindya mountains – this includes the parts of Maharashtra or Maharashtra as a whole with Ajanta and Ellora region and regions that lied around the river Godhavari. We have already seen that a city named Daimabad which lied on the tributary of the river Godhavari was discovered. So, civilization must have flourished in the surrounding regions of the river Godhavari and also on the banks of the Godhavari. From then Chalukyas were called as Upper Chalukyas and Lower Chalukyas. There is a character by the name Chaazhluvan who had almost 80% of powers of Lord Krishna and fought with Krishna over issue of Rukumani but lost his life. Had Krishna blessed the yadhavars with the powers of Chaazhluvan and named the yadhavars as Chalukyas. There is a place in north India named Chaazhakgramam – an ancient worshiping centre for Lord Vishnu as mentioned in Tamil literature. Had this name have been given to yadhavars to call themselves as Chazhlukyas i.e., Chalukyas. Chalukyas ancient kingdom was called Gangatheera i.e., kingdom that existed in the river Ganga, they belonged to the race of the Moon i.e., Chanadrakulam and they used the flags that resembled to the 18 clan of Yadhavars. A statement issued in the Bombay Gazetteer about Chalukyas and a coincidental poem of Puranaanooru was compared and it revealed that they had already belonged to the northern part of the region and they belonged to the velir clan. Our great history of Magadha Nadu actually starts from here. In Gujarat there is a place called Velavadar National Park, home to blackbuck, a 36 km long patch of grassland lying between the 2 rivers, few kms from Gulf of Cambay, the park soil is said to have its origin in sea.
Ellora lying in this part of the region is actually known by the name Elaapuram. The Bombay Gazetteer states that this is known as Vaezhlur Vaezhuyrakam or Velur Vaezhuyrakam. Found in one of the panel of a wall of the Ellora is one of the lion art which represents most of the lion art found in the pallava region of Mahabalipuram and also Yazhi with Horns is something unique present on the panel and this kind of Yazhi is found in the Kailasanathar temple in Kancheepuram another city of Velir Pallava. There are a no. of similarities that can be found between the arches in the Ellora monuments and Ajantha monuments that can be easily compared with that of the arches present in the Gopura present in the monuments of Mahabalipuram.
Ellora have undergone some kind of change in few forms which were prevalent before that such as a fused kind of arch i.e., a arch within an arch. Besides pillars in temples in the Deccan pleateu looked different from others and this change can be seen in the few monuments present in Ellora.
Besides Temples build on Dravidian Style of Architecture is present in Ellora particularly the Kailasanathar temple present in cave no.16 of the Ellora. Kailasanatha Temple built on a high plinth and enclosed by a courtyard. High plinth indicates creating a raised ground. The concept of building this temple seems to represent both real and mythical mountains like Mandira, Meru, etc., No-body knows how many years it took to complete this grandest temple. This temple is compared in many ways to the temple present Pattadakal-Virupaksha and Kailasanatha Temple Kancheepuram. Two independent pillars and elephants is present at the entrance of the temple. The complex covers 60,000 sq.ft. The temple tower raises to a height of 90 feet and is very much like the Rathas in Mahabalipuram. Kailasanathar Temple, Ellora consists of a gateway, a mandapam kind of enclosure for Nandhi, artistic carvings present on obelisk pillars of 50 ft. height present on either side of Nandhi mandapam, mandapam having vimanas build like a receding steps away from anyone, galleries having porticos as present in temples in the Tamil Nadu, etc., There is a debate that university once existed in Ellora and this building can still be seen in Ellora.
Looking from the Ariel view of the Ajanta Caves it is clearly seen that the arrangement of caves runs for a few hundreds of meter traversing a semi-circular path - this actually one part of it exposed. If we think this Ariel view as a whole then we can easily understand that there are circular paths and they are well marked by caves and the circular paths are present in steps i.e., in the descending steps towards the centre. This indicates they should have an arrangement of building the shelters according to the requirement of the administration with the Head or Chief present in the Centre and the next level of administration present just below the Head Office and the next administration level just below this and so on. If one is able to have a complete ariel view from the top most point near the Ajantha caves this will be very much evident.
According to Tamil Literature this part was ruled by the Naga Kings whose symbol is serpent. This Kind of arrangement also can be thought of as Snake swirling around it with Head present in the middle and the tail present in the last level. Is this represented symbolically in the cave 16 in Ellora with a figure present in the middle and surrounded by two elephants and the kind of step arrangement as described above for the Ajanta caves. Also with this kind of arrangement it is not easy for anyone to meet or capture the Chief that easily both officially or through attack. So defence had infact remained as top priority. Cave 16 is exclusively Dravidian in nature. Besides this arrangement had been surrounded by hills and other sort of lands. Hills within hills and then a city within that hill had been a part of city building of ancient Dravidians – one can also compare this kind of city to Paazhi in TuluNadu because almost this kind of arrangement is present for this city of Paazhi. Some unique kind of connection exists between the Cave no. 16 – Ellora, Ajanta caves and Paazhi.
Even today there are places in Sholapur known by the name Velapur. In Kathiawar there are several places by the name Bela corrupt form of Vela. In the Ahmedabad Taluk there is a place called Velaapuram, in the Puna there is a place called Veezhakam, on the southern side of this place another name of the place is Belgaum corrupt form of Velgaum – this place is also known as Veezhekgraamum to the locals and also it was the capital of Kathampars on those days. Nearby is also a place Belhtti corrupt form of Velhtti.
This kingdom includes the states with in the Vindhya Plateau . One of the most celebrated state is Avanti. Mahabharata refers this state as, the most powerful of the kings had ruled from this city which was present with in this state probably present aside of the river Narmada and the adjoining places. Brahma Purana and Bhavisya Purana does mention this state. The Matsya Purana says that the people of this Avanti state belong to the race of Hayahayas – as already mentioned this is the first race of the Yadhus. It is learned that there are five subdivisions of Hayahayas with one of the Hayahayas ruling the Avanti. Kartaviryarjuna of the Hayahaya dynasty was a powerful king. Bhagavatham also makes a mention of him. Around the age of 12 due to his supreme meditating power he was gifted with a thousand hands and legs. This state of Avanti was divided into two sectors with the northern sector having its capital at Ujjayini and the southern sector having its capital at Mahismati. Kartaviryarjuna actually ruled from Mahismati which was situated on the banks of Narmada.
Another region situated in this part of the empire is Anupa. Epic Mahabharata mentions the word Sagaranupa in several places. Harivamsa also makes a mention of this. Vayu purana mentions about this place and associate this place with the two races of the Hayahaya dynasty besides it mentions a place called as Narmadanupa. Epigraphic evidence suggests that this region should have lied near Mahismati possibly Saurashtra region.
Our tamil literature addresses a king by the name Anu who is the son of Yayathi. Also another king by the name AnupaThevan who belongs to the race of Yadhus. In ancient astronomy there is a period mentioned by the name of Anupa as AnuthithaPeriod. Even today there is a race of people present in the Tirunelveli, madurai and coimbatore and its surrounding place who call themselves by the name Anuppar who trace their origin to the agricultural regions of Karnataka region.
Utkala or Utkalam is another country present in this Empire. This should be the region in and around Orissa. On those days it seems that the peoples from this country seems to be civil engineers on all field. Architectural and scientific marvel Konark temple is from this region. One of the rishi by the name Ottiravaakananan can be traced to this country. Generally they had belonged to the race of the Thuruvans. Brahmanda purana refers to this place. Skanda purana refers this place as being situated between rivers and lied somewhere in the ocean. So, this place should have belonged to the country that had sunk in the ocean already and just to remember the name of such country this country must have been renamed. Again both of the great epics besides puranas makes a mention of these. This name had remained the same throught out the history and even in the inscription.
There are notable inscriptions here – some of them are Badal pillar inscription, an epigraph, sonapur inscription, bhuvanesvara stone inscription of Narasiha I(a velir king?) stating about the temple for Vishnu at Ekamra etc., This country also finds a mention in the Tirumalai rock inscription during the reign of Rajendra Chola and in the Adilpur copperplate of Narendra-Bhanjadeva. Puri also lied within this region which is famous for its temple. A lot of comparision can be made between this temple and the monuments of ancient origin in the America continent.
Dasarna is another country situated in this Empire. At one period of time it was gifted to the lord Rama. Both epics and Vayu purana and Matsya purana mention about this place. Its capital was called Vaisyanagara. Various references place this country in different places, Periplus says that this region is situated towards the east of the Masulipatnam in Andra Pradesh, Ptolemy places this country towards the west of the river Ganges, the vidisa region in Gwalior and generally the Chattisgarh District in the Madhya Pradesh. Our Tamil literature says that KaanthtaraNadu is the father land of this country. In KaanthtaraNadu there is place called as Raththinapuram. This region is one of the places that actually lies in the Indus valley civilization. It is situated in the Afganistan, present along the banks of the Kabul river between the Kunar and the Indus. The capital of this country is Purushapura. The country is named after a son of the Yayathi. Dasarna is a country which was ruled by a Yadhava clan.
Karusa is another country situated in this Kingdom. Bhagavata purana and Vayu purana mentions these city. Pliny refers this city as Chrysei. Possibly this represents the Shahbad district of Bihar. As per the inscription at Masar the major portion of this country lies between the rivers Sona and Karkanasa.
There is another country by a name Anudra. Natyasastra, Varahamihra, odra of Yoginitantra, Padma purana, Brahma purana, Skandha purana, Telugu Odhrulu, Mahabharata, Buddhist works etc., mention about this city. The soil in this country is very rich and fertile here. The climate is hot too. Pliny, Hiuen Tsang, Cunningham have all mentioned about this country. This can be compared with the adjoining regions of the Orissa state.
Tosala is yet country present in this Empire. Ptolemy mentions this by the name Tosalei. Later part of the history King Ashoka had used this country as the seat of his provincial government of Kalinga. Some of the ruins of a city present near Dhauli today may be ruins of this country. After this, the region was occupied by various races who divided the region into various sectors and started their rule from that place. Eastern range of the Satpura range, Mahadeo hills, Maikala range, Ramgarh hills, tributaries of the river Narmada, river Mahanadi and its source and places that lied on both sides of Wenganga formed this part of the country.
Another name for this country is Daksinakosala which states that this is the southern most part of the great country Kosala or Kosambi. Ruled by the generations of the king Kusan. Kausambi used to be its capital on those days. One of the great countries that was situated on the banks on the river Yamuna on those days had contained fortified cities with a kind of water system present that protects the fort from easy entry for others, a citadel like structure with very huge walls decorated with flags surrounding the complex, streets that are wide enough and had space for huge building in which complexes were build and were filled with riches show cases the wealth of this country. Usually this kind of place is filled with peoples of other countries. This city also consists of a huge rest place for peoples who visited this country from distant places and huge park nearby too. This country peoples were known for technical arts and crafts, art of carvings and particularly the art of sculpture.
Another kingdom present in this region is Bhojam. This was ruled by the Yadhu clans. Probably situated near the banks of river Narmada. This country had actually belonged to a very great empire known by the name Vidharpam. Also known by the name Berar. Berar is actually the kingdom of Bhishnaka. Rukmani, daughter of Bhishnaka is the one who was loved and later on married by Krishna.
Tripura(Triglypton by Ptolemy), Tundikera, Mekala(mountainous region), Vitihotras, etc., are some of the countries which lied in this region.
Velirs were Hoysalas: According to Mysore Gezetteer written by Lewis Rice it is known that the Hoysalas are actually called as HoysalaYadhavars. Besides the head of the Yadhava clan is known to the Kannada people by the name Bholalar which is the corrupt form of Velalar. HoysalaYadhavars are also known by the name BholalaYadhavars. The capital of their country is known by the name Vaezhulur or Vaezhaapuram. Tamil literature Purananooru states a king by the name Pulikadimal belonging to the Velir group who is actually from the empire of Dwaraka and their lineage had ruled the parts of Mysore sector too. Besides the history of the kings of Kongku kings there are also other books which explains the Hoysalas and the Yadhavars are the same. The art and architecture of the Hoysalas are very unique and known through out the world. A pillar that could rotate about its centre of axis and a pillar that stands on its own by the centre of gravity on a star shaped platform are some of the scientific achievements of Hoysalas.
So far we have seen that the Velirs were Yadhavars, Chalukyas, Hoysalas, apart from which they belong to Sathu Maazhava, Kaalasurikazh, Kaaktheya Ganapathi, Koondaveedu Kajhapathi, VijayanagaraYadhava according to James Princeps a noted historian and Mysore Gazetteer. Besides it is noted almost all of the ancient kings race of the ancient India were all Velirs. One day we will know who are all the Velir kings who ruled the states of the Indus Valley civilization. It is a very well known fact that king system of governance was absent on those days. So, it was all based on how great the individual excelled in all the kind of arts and science on those days. Remember as I had mentioned
earlier Velir is actually a term used to denote a person who had done great work in all aspects of arts and science so that he becomes an expert in all fields. Only such person can foresee the great Empire and can understand, provide guidance and can even innovate new things better than before in a straight forward way. Newer and newer discoveries about this kind of lost civilizations are throwing light on the technology that were prevelent on those days with some of them are totally perplexing and sophisticated.
There are notable scientific achievements of this Empire as a whole. Some of them are dicussed below: The Iron Pillar present inside the Qutub Minar complex in Delhi which is noted for rustless nature through many centuries. The origin of the Iron Pillar is traced back to Udayagiri in Andra Pradesh during the time of a Velir Prince probably a Chalukya King. Near by the location of this pillar in Udayagiri was also an astronomical observatory on those days. Vindhya Range and surrounding places were a major source for iron ore around 3000 B.P and even before that. So minimum period for this Iron Pillar should be around 2800 B.P. – 3000 B.P. Varaha carved out of the walls are present in the place near by to the location where the location of the Iron Pillar was present. There is also a Varaha cave nearby. In this pillar there are several changes that was introduced which could be noted particular both at the top and bottom of the pillar. The notable change in the elements of the pillar can be found from Ellora as earlier shown besides some unique kind of designs were brought in. The kind of design that was used by king Asoka for placing lion symbol in the pillar may have been from this kind of pillar. Even today scientists are perplexed about this kind of technology which was achieved centuries ago.
Temple for Lord Jagannath at Puri and Konark Temple both being situated at costal areas are also having iron pillars of this kind which have resisted corrosion. A Temple for Godessess Mookambika is present in the Kollur region, amidst the dense forest in the hilly region Kodachadri. Kodachadri is situated about 1450 metres above the sea level, receives an annual rainfall of around 600 cm – 700 cm and it rains for almost 7-8 months in a year. Imagine a medium sized Iron Pillar placed at such a location remaining with out rusting at such a place – Amazingly this is what that is happening. Apart from this there is a Iron Pillar at Dhar, Madhya Pradesh which is having similar kind of property. There is a question among scientists what kind of technology in earth did these possess that can make these kind of achivements happen.
After this Empire had collapsed and after several centuries a unique kind of Cannon having special kind of characteristics was actually made in Tanjore district, Tamil Nadu, South India. Perhaps the technology continued with the Tamils.
A number of unique kind of arts made out of copper either individually or collectively are present scattered over a area of Uttar Pradesh. What this represents a divine being, or a celestial art, or the kind of script or probably a fish symbol that was prevelent during the time of Indus is not known. The notable feature about this art is that it is made up of copper as early as 2000 B.C.
To create objects, things, materials, etc., of these kinds is not possible on a single day and also not possible with out a systematic and well developed study. This needs a long period of study of various subjects, proven results, trial and error methods etc., Yes, on those days universities existed and they were many. Only few of them have been discovered. Notable of them are Taxila University, Nalandha University, Odantapuri University-Bihar, Somapura-Bangaladesh, Jaggadala University-Bengal, Kanchi University, etc., are just a few of them. Both Taxila and Nalandha University have been of international repute on those days. More than 95% of these universities are yet to be discovered. Taxila might be Takka Nadu which can be traced through ancient Tamil Litrature. Takka Nadu belongs to a Yadhu king Supatheran. Nalandha might be named after a Velir king Nalan or Nazhan whose lineage can be traced to Yadhava clan.
In Nalanda University few thousands of students studied right from A-Z of arts and science. This university had few thousand Gurus too – a good Student-Guru ratio. Libraries, Astronomical-Observataries, Labs etc., were a common feature. Buddha frequently visited this university. Kings and students of all walks of life studied together. Hieun Tsang and Yuan Chwang Chinese scholars stayed, learned and wrote elaborate notes about this university.
DEFENCE ART of This Empire:
Centers for getting training on how to use weapons, advanced weaponary, how to keep oneself physically fit, yoga training, aerobatics exercises, exercises involved in gymnastics etc., were all present in Tulunadu during 17th century A.D. These centers were known by the name garadi but gradually lost its significance after 18th century A.D. It is said that peoples from other regions used to come and get trained over here. There are 18 such arts of defence involved. In garadi kind of centers there used to be both idols of gods and huge spacious training for its students which says that this used be a worship spot and training center too. The idols present in garadi is Chandrika Parameshwari goddess and Veerabadrar. Besides in all these places a round pillar is kept for training. This kind of art is known by the MALLAR KAMBAM. Our sangam works also mentions about these kind of centers.
The word kalari used to represent a battle field or a place for learning the arts of defences. Pattina Palai do mention to a number of Kalaries that were present on those days. Kalari tatt means a victor and Kalari kozhai means a loser. Kalarippayattu was infact written briefly in Tamil manuscripts. Today most of these works in tamil are lost and it seems that sage Agastya brought this art with him and taught them to students. Kalarippayattu is actually just one of the art in the garadi centers and it is from Tulunadu this art traveled to the present day Kerela where this art is now revived.
Garadi centers were present in many numbers even before 300 years ie., centuries after the original citizens had actually left this country. One could imagine how great this kind of arts could be since its strong presence was felt centuries after centuries and even today this could be traced.
Goddess Chandrika Parameshwari is none other than Goddess Parvathi wife of Lord Shiva and Veerabadrar is the God for Braveness who is also considered one of the sons of Lord Shiva. The name Chandrika Parameshwari states that as once stated that Tuluva Velalars were from Chandra Gupta lineage the name Chandrika may be attributed to Chandra which is moon. Veerabadrar is having its natural presence as this art has to do away with braveness and there is nothing strange about it.
Mallar Kambam is just one of the art of this Defence system. Kambam is word for pillar which is part of this art. Mallar can be attributed to the country which was retrieved by Lord Rama’s brother Lakshmana from a cruel king. But Tamil literature traces the origin of the country Mallar which belonged to this great empire to the location in Punjab particularly the Multan region and the other is in the high lands and hilly regions of the Bihar. Mallar Kambam is performing various kinds of asanas with ropes and wooden pillars. So, there is nothing unique in practicing this art in the hilly terrains where rock climbing, cliff hanging, climbing the high lands, flying from one area to another with the aid of rope, etc., are all common. | <urn:uuid:1028c6c9-2c41-4d35-8db2-33d12c187f12> | CC-MAIN-2023-06 | http://viswamurugu.com/link3.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500384.17/warc/CC-MAIN-20230207035749-20230207065749-00730.warc.gz | en | 0.975349 | 8,484 | 2.546875 | 3 |
The Referendum has helped Pinellas County Schools expand technology to elevate student engagement, make lessons more relevant and effectively train teachers in the latest technology.
Thanks to the Referendum:
- Students throughout the district have access to computer labs and updated technology that prepare them for college and careers.
- Nearly 1,500 SMART Boards and interactive projectors have been installed in schools since the Referendum was renewed. Now, classrooms at all schools have interactive whiteboards and projectors that engage students in inspiring lessons.
- Teachers have access to high quality software applications that promote student engagement and provide access to internet resources in a safe environment.
- Pinellas County Schools has hired Technology Integration Coordinators who train teachers to integrate current technology into their lessons and personalize learning to the needs of each student.
The Referendum funds numerous resources, including technology for media center Maker Spaces, which are collaborative areas where students can create, invent and explore: | <urn:uuid:eb20635c-70b4-4680-bb99-ffb3f88440f3> | CC-MAIN-2023-06 | https://www.pcsb.org/Page/11280 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500384.17/warc/CC-MAIN-20230207035749-20230207065749-00730.warc.gz | en | 0.944835 | 196 | 2.671875 | 3 |
“Yesterday, December 7th, 1941, a date that will live in infamy, the United States of America was suddenly and deliberately attacked by naval and air forces of the Empire of Japan,” said President Franklin Delano Roosevelt.
Within an hour of FDR’s speech on December 8th, 1941, Congress voted to bring the United States into World War II.
A recording of FDR’s address to Congress can be heard as you enter the “Florida Remembers World War II” exhibit, on permanent display at the Museum of Florida History in Tallahassee.
“Florida’s role in World War II was really transformative,” says Bruce Graetz, senior museum curator. “Florida was a relatively rural area before World War II. There was a large influx of servicemen for training during the war, industry like ship building occurred, and by the time the war was over, we’re getting into what’s considered modern Florida.”
According to government statistics, approximately 248,000 Floridians served in World War II. During the war, the population of the state exploded. Key West had 13,000 residents in 1940, and 45,000 by war’s end five years later. The population of Miami doubled to almost 325,000. Florida became an active training ground for American troops.
“Florida’s mild climate and flat terrain allowed for year round training for aviation,” says Graetz. “Camp Blanding [near Starke] is now a National Guard Camp. During World War II, it’s said that population-wise, Camp Blanding was the fourth largest city in the state.”
American troops were provided with amphibious training at Camp Gordon Johnston in Carrabelle, Florida.
“Between those two bases, the three significant U.S. Infantry divisions that went ashore at Normandy had some of their training here in Florida,” Graetz says. “In Daytona Beach, the WACS, the Women’s Auxiliary Corps, developed a training base. Noted African American educator Mary McLeod Bethune had lobbied President Roosevelt to set up a WAC training base, so from 1942 to early 1944, a large number of women trained here in Florida.”
The “Florida Remembers World War II” exhibit includes informational panels, and displays of uniforms, photographs, documents, posters, and personal artifacts.
“Camp Blanding even had a souvenir pillow case that soldiers would buy and send home to sweethearts as a token of where they were training here in Florida,” says Graetz.
More than 50,000 African Americans from Florida entered the military during World War II, primarily as Army support personnel. Some of the famous Tuskegee Airmen were from Florida.
“We’re very fortunate to have had donated for this exhibit, some of the memorabilia of James Polkinghorne, who’s from Pensacola,” says Graetz. “He was a Tuskegee Airman fighter pilot who was flying a strafing mission in Italy when his aircraft went down and he was killed. We have his training yearbook, his posthumous Purple Heart, his pilot’s file, and photographs.”
Florida’s participation in World War II went beyond serving as a training ground for soldiers. Immediately after the United States joined the war, German submarines began attacking supply ships off the coast of Florida.
“Quite a few tankers and freighters were attacked and sunk in Florida,” says Graetz. “In the early months of the war, pretty much the first seven months of 1942, civilians would see a burning tanker [from the shore] and even see a submarine surface. So it really brought the war home to Florida.”
In the 1940s, it was not uncommon to see men working in citrus groves wearing clothing marked with a “P” and “W,” indicating that they were German prisoners of war.
“They were brought back first from the North African campaigns, and some were captured submariners, and then eventually from Europe,” says Graetz. “Germans that were captured and brought to Florida were considered fortunate as opposed to Germans who were captured by the Russians and sent to Siberia. They were held in bases around Florida, and they took classes in English and American Values.”
After the war, Florida’s population expanded by 46%. Many soldiers returned here with their families, or to get an education on the G.I. Bill. To accommodate the influx, the Florida State College for Women became Florida State University.
“Florida produced a booklet called ‘After Victory’ promoting Florida as a state people could move to,” Graetz says. | <urn:uuid:dcecfcfc-221f-49b4-b05f-eaba0204fa82> | CC-MAIN-2023-06 | https://myfloridahistory.org/frontiers/article/178 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500758.20/warc/CC-MAIN-20230208092053-20230208122053-00810.warc.gz | en | 0.982462 | 1,014 | 3.59375 | 4 |
The Concerto (Part 1)
There are few genres of music more exciting than the concerto. A soloist, pitted against the strength of an orchestra, performing a dazzling virtuosic showpiece, exploring the highs and lows of what is possible on their instrument. Throughout history, a concerto performance could be what made or broke a musician's career, leading to new performing opportunities and patrons.
Yet, despite the large number of women who wrote and performed concertos (often early life), these life-altering opportunities were often denied to them. The history of classical music is rife with instances of composers being overlooked for their gender, pushed to the sidelines due to widely prevalent sexist attitudes and societal pressures to keep women in the home.
Over the coming month, almost 200 concertos to the A Seat at the Piano will be added to the database. To celebrate, we will be highlighting six concertos by women composers that span the breadth of classical music history: Marianna Martines, Clara Schumann, Amy Beach, Nadia Boulanger, Florence Price, and Unsuk Chin.
The Austrian composer Marianna Martines (1744–1812) grew up surrounded by cultural royalty. Due to her father's position in the Austrian court as a majordomo, their apartment in the Michaelerplatz had them living next to the vocalist Nicola Porpora, the poet Metastasio, and the composer Franz Joseph Haydn. She became a favorite of the Imperial Court, and found her compositions performed across Europe until 1764—the year Emperor Joseph II banned works by women from being performed in churches. Despite this setback, she persevered in the ways she could, including hosting musical soirées that included guests such as Wolfgang Amadeus Mozart.
Her music, though largely considered out of fashion by the end of her life, took many influences from Italian opera, and embraced the emfindsamer stil ideals popular in the mid-18thC. You can hear each of these influences in her Harpsichord Concerto in A Major, a piece likely written for her own performances sometime between 1760 and 1782. This piece is a excellent example of that cross section of Baroque and Classical styles found in the mid-1700s, and bares stylistic similarities to Haydn's own concerto (with whom Martines studied with as a youth).
Arguably one of the great pianists of her time, the German composer Clara Schumann, née Wieck, (1819–96) began touring when she was just 11 years old, and continued to tour throughout her life. She championed the works of her husband Robert, who was unable to perform after permanently injuring his hand in an ill-fated attempt to strengthen it, and worked with many of the leading musicians of the 19thC, including the violinist Josef Joachim and the composer Johannes Brahms.
Like many women composers, most of her own compositions date from early in her career. Schumann would later lament to friends that she felt like she had to give up her compositional career in order to take care of her family. Given the beauty of her Piano Concerto in A minor, Op. 7, we are left to wonder what her music would have been like with a lifetime of experience behind it.
Her concerto is a highly virtuosic showpiece, written for herself (at only 14 years old!) to perform during her concert tours. Both Robert and Edvard Grieg's concertos would later share the same key of A minor—there is a known connection between Robert and Grieg's concerto, and you cannot help but hear a similar connection with Schumann's earlier piece. The three-movement piece was premiered with Felix Mendelssohn conducting, and features a very unusual key structure of Am, Abm, and a return to Am.
Amy Beach (1867–1944) is widely considered to be the first successful American women composer, despite facing hardships in her career due to both sexism and the anti-Americanism attitudes commonly found in European musicians at the time. Having studied piano with Carl Baermann (a student of Franz Liszt), she had to teach herself to compose, and her marriage in 1885 led to several restrictions on her development. She was not able to teach nor study with a teacher, and was forced to limit the number and scope of her performances.
Despite these conditions, Beach's compositions were finding success in the United States. The success of her Mass in E-flat Major led to both her Symphony No. 1 becoming the first symphony by a women composer to be performed in the U.S.A. and to her piano concerto.
Her Piano Concerto in C# minor, Op. 45 was the first piano concerto by an American women composer, dedicated to the Venezuelan virtuoso Teresa Carreño and premiered by the Boston Symphony Orchestra. Two of the fours movements of the concerto are based on her own songs, and despite the paucity of performances of the piece during her lifetime, it is now regarded as an overlooked masterpiece. | <urn:uuid:fc7c07d1-0a81-48c7-bf96-e8906ddbb406> | CC-MAIN-2023-06 | https://www.aseatatthepiano.com/post/the-concerto-part-1 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494974.98/warc/CC-MAIN-20230127065356-20230127095356-00130.warc.gz | en | 0.98057 | 1,063 | 2.796875 | 3 |
Every year thousands of cranes arrive at Lake Hornborga (Swedish; Hornborgasjön) in Västergötland in Sweden as part of the spring migration. This has become an annual feast for bird watchers, who come from afar to experience this phenomenon.
. Annual migration of Common Cranes. (Photo Bjorn Grotting)” width=”960″ /> Sweden, Lake Hornborga. Annual migration of Common Cranes. (Photo Bjorn Grotting)
Most cranes gather at the “Trandansen” location in the south end of the lake. This is because of all the food, mainly grain, put out in this area in order to feed the birds. This is done to keep them away from the fields around the lake where they can be a burden to local farmers. At the same time creating a tourist attraction that is well worth checking out, and it is not only cranes that find the food appealing. Here are also a large number of swans, ducks and geese.
Trandansen is a view point and information center. The cranes often come close to the fence that visitors must stay behind, but they can also be some distance away. For good close-ups take a long telephoto (I had a 600mm) or rent one of the sheds that are set up. But you must sit in the shed for 19 hours before you can get out …
This year the cranes arrived record early, and the number was 23000 at the most. I had planned my visit there to be on April 13, 10 days after the peak, so I was afraid there was no cranes left. Luckily for me the weather was still rainy and windy and as many as 4,000 still remained when I pulled into the parking lot.
The next day however was sunny and the number quickly fell to 2,000. With the sun comes the favorable winds, and two days later the crane season 2014 at Hornborgasjön was officially declared to be over. All in all I was happy, next time I’ll try to get there when there are 20000 cranes present.
Besides, there are many other things to look at in the area surrounding the Hornborgasjön lake, which is a nature reserve with abundant bird life all year round.
There are several species of crane, these are Common cranes (Grus grus), one of only four crane species not red-listed and one of only two species commonly found in Europe. They have migrated from as far as North-Africa, and this is just a quick stop on their way to breeding locations around Scandinavia.
Click to see more photos of the bird life around Lake Hornborga. | <urn:uuid:c884aed2-c527-4965-8d4a-a9f5bbb68f03> | CC-MAIN-2023-06 | http://www.bjorngrotting.com/travel/crane-dance/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499634.11/warc/CC-MAIN-20230128121809-20230128151809-00210.warc.gz | en | 0.971802 | 570 | 2.71875 | 3 |
The overall goal of this target article is to demonstrate a mechanism for an embodied cognition. The particular vehicle is a much-studied, but still widely debated phenomenon seen in 7–12 month-old-infants. In Piaget's classic “A-not-B error,” infants who have successfully uncovered a toy at location “A” continue to reach to that location even after they watch the toy hidden in a nearby location “B.” Here, we question the traditional explanations of the error as an indicator of infants' concepts of objects or other static mental structures. Instead, we demonstrate that the A-not-B error and its previously puzzling contextual variations can be understood by the coupled dynamics of the ordinary processes of goal-directed actions: looking, planning, reaching, and remembering. We offer a formal dynamic theory and model based on cognitive embodiment that both simulates the known A-not-B effects and offers novel predictions that match new experimental results. The demonstration supports an embodied view by casting the mental events involved in perception, planning, deciding, and remembering in the same analogic dynamic language as that used to describe bodily movement, so that they may be continuously meshed. We maintain that this mesh is a pre-eminently cognitive act of “knowing” not only in infancy but also in everyday activities throughout the life span. | <urn:uuid:46e36736-344a-4f05-8d6f-1b937e92c965> | CC-MAIN-2023-06 | http://core-cms.prod.aop.cambridge.org/core/journals/behavioral-and-brain-sciences/issue/93295AFBAE6883C08E652EF04822A353 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499758.83/warc/CC-MAIN-20230129180008-20230129210008-00290.warc.gz | en | 0.964187 | 280 | 2.796875 | 3 |
We use our smartphones every day. But have you ever wondered how your smartphone mobile charger actually works? You would know that a charger converts AC into DC, but it is not that straightforward. First, it converts AC to DC then again back to AC and finally to DC. Today we are going to see how the 5V mobile charger circuit does this and why are their intermediate steps.
Must Read LM317 Variable Power Supply
This is a normal charger circuit that converts 220V AC to 5V DC. Let’s see what’s inside. Now we can see all the electronic components used in it. There are diodes, capacitors, transistors, resistors, transformers and an optocoupler. Also, there are resistors below the PCB. Once the power is on, it turns on. To understand it better, let’s rearrange the circuit.
Circuit Diagram of Mobile Charger Circuit
- Ferrite Transformer
- PC817C Optocoupler
- 1N4007 PN Bridge Rectifier Diode (x4)
- 1N5819 Schottky Diode
- Resistor (2MΩ, 560Ω, 1KΩ, 10Ω, 120Ω, 100Ω)
- 2.6Ω/1W Fuse Resistor
- S8050 NPN Transistor
- 13001 NPN Transistor
- 2.2uF/450V Polyester Film Capacitor
- 4.7nF/100V Polyester Film Capacitor
- 470uF/25V Electrolyte Capacitor
- 22uF/25V Electrolyte Capacitor
- 100nF Ceramic Capacitor
- 4.2V Zener Diode
- Red LED
Circuit Connection of Mobile Charger Circuit
Now we can see all the components and connections. The red wire is phase wire and the black is neutral. First, we have a resistor. By observing the colour bands and reference table, we can see it is 2.6Ω. This is a fusible resistor that prevents damage from overloading. Then there is a bridge rectifier made of four 1N4007 PN junction diodes and a filter capacitor of 2.2uF/450V.
This is an oscillator circuit. This converts DC back to high-frequency AC of 15 to 50 KHz. We can see the values of the components. These are two NPN transistors S8050, and 13001, and these are their pin configurations below.
After that portion, there is a small diode. It looks like a Zener diode, but it’s a fast switching diode i.e. 1N4148 and has a capacitor value of 22uF/63V.
This is an AC to DC converter for the phototransistor in the optocoupler, It forms a circuit like this. For the transmission of signals without contact, we use it. On the right side, we have an infrared led and on the left is a phototransistor. When the LED turns on its light turns on the base of the phototransistor turning it on. This capacitor is of 100nF used for safety purposes. It is connected between primary and secondary grounds to stop electromagnetic interference.
This is the transformer, it has three windings; primary, secondary, and auxiliary winding wrapped around the core. It is used here to step down the voltage. The auxiliary winding is used to run the oscillator circuit.
Then we have a Schottky diode 1N5819 with a capacitor of 470uF/16V to convert AC to DC and a LED for indication. Also, there is a feedback circuit that consists of an optocoupler PC817C and a 4.2V Zener diode.
For removing messy wiring and giving a clean look, I designed a PCB prototype for this project. It is also helpful for troubleshooting that runs great without any errors. To design this PCB board, I used EasyEDA as it is too easy to use. For ordering PCB for this, I prefer PCBWay.
Gerber file for Mobile Charger Circuit Gerber.
You can view the Gerber file here Gerber File Viewer.
Order PCB From PCBWay
There are so many forums or communities for electronics online in today’s technical world, and one of the famous ones for PCB manufacturing is PCBWay. PCBWay is a place that brings manufacturers and customers together. They have more than a decade of experience in this field of fabrication and prototyping and assembling of PCBs. PCBWay has proved its focus on its customers’ needs in terms of cost-effectiveness, delivery, and quality.
How PCB Manufacturing Process Done in PCBWay
Standard quality for any product needs to be maintained using some parameters. PCBWay gives that opportunity through quality control in designing and manufacturing. At first, they ensure the accuracy, clarity, and validity of the PCB files that we sent to them.
Then all the boards will go through the most stringent tests other than the basic visual check. They adopt most of the testing and inspecting equipment used in the industry, such as Flying Probe Tester, X-Ray Inspection Machine, and Automated Optical Inspection (AOI) Machine. PCBWay are having 50+ new engineers on the daily basis around the world using PCBs for their work, who trust for their reliable quality. They produce high-quality pink, orange, grey, and even transparent solder mask. Moreover, according to people’s needs, they can also provide Black core PCB. Check it out for a High-Quality PCB solder mask. There are some pictures below of the new colours of solder musks.
Features of PCBWay
PCB Prototyping & Manufacturing: PCBWay produces FR-4 and Aluminum boards and advanced PCBs like Rogers, HDI, and Flexible and Rigid-Flex boards, at a very reasonable price. Just check this Instant Quote to order premium PCBs for your hobby projects.
PCB Assembly: It not only offers PCB Prototyping but also offers PCB Assembly service. You can order a full PCB board with attached components by uploading your file. SMT & THT assembly starts from only 30$ including free stencil and worldwide shipping. The components can be sourced and provided by PCBWay, or by clients themselves.
Open Source Community: It not only offers PCB Prototype & Assembly service but also gives opportunities to students for sponsorships. I think this is so great. They feature their projects on the website also.
3D Printing & CNC: It also produces Rapid Prototyping like 3D printing, CNC Machining, Sheet Metal Fabrication, and Injection Molding. The quality of the product is too premium and reliable. And also the best part is that you will receive your order within a minimum of 3 days.
PCBWay Store: More boutique gift modules are waiting for you to discover, giving your creativity wings. You can order all types of electronic equipment, components and many more with exciting offers. Go with the link and buy your needs, PCBWay Store.
Services: PCBWay offers great servicing of its products. It takes only 3 to 15 days according to the courier service to deliver your products. Also, it has a live support facility. Whenever you have any problems, you can always reach a live customer service person to respond to your emails or messages. They have the “Return and Refund” principle, for every unusable board caused by PCBWay, they will rebuild and refund the order soon.
Guide for Ordering PCB From PCBWay
Working Principle of Mobile Charger Circuit
Let’s turn it on and see it in action. The red wires carry the positive voltage and the black wires carry the negative voltage or ground.
We have the input of 220V 50Hz AC. This is a bridge rectifier, it converts AC to fluctuating DC. As we can see this fluctuating DC filters from the capacitor and becomes almost pure DC. We can see we have DC in the circuit. Now, this current passes from the 2M ohm resistor to the base of the Q1 transistor to turn it on. This transistor isn’t fully turned on, because of the resistance it turns on partially. Due to the partial turning on of the transistor, a low current passed from the primary winding of the transformer. This induces a low voltage in the auxiliary winding.
The induced voltage now charges the capacitor and then the capacitor fully turns on the transistor. As the transistor is now fully on, it allows the current to flow through itself. Now, this turns on the transistor Q2, this shunts the base of the Q1 transistor turning it off. As the Q1 turns off the flow of current to the Q2 is cut off. Now the current flows to the base of the Q1 and the cycle repeats.
This situation happens at 15 to 50 kHz which is a thousand times faster than the rectifier circuit. Hence, you would see that the rectifier circuit is stopped. At the same time, the voltage from the auxiliary also turns the diode on and charges the capacitor and flows to the optocoupler. This diode and capacitor convert the AC signal from the auxiliary coil to the DC for the optocoupler.
The current is also induced in the secondary winding. This is converted to DC by a Schottky diode and a filter capacitor. It is indicated by the LED. But what if the voltage is more than 5 volts? Hence, we have a feedback circuit. As we reach 4.2V the Zener diode turns on allowing the current to flow to the optocoupler. It also drops the voltage by 4.2V, hence the Transmitter LED of the optocoupler doesn’t turn on. The Transmitter LED requires 0.8V to turn on. When the voltage reaches more than 5V, this turns on the LED of the optocoupler.
The infrared light of the Transmitter LED turns on the phototransistor of the optocoupler allowing the current to flow to the transistor T2. This turns on the transistor T2 shunting the first and stopping the flow of current in the primary winding. Also, the voltage in the secondary side of the transformer drops below 5V, turning off the Zener diode and optocoupler. The circuit is continuous to run normally.
Why We Should Not Directly Convert AC to DC Than This?
This is because of the normal power supply which is at 50 or 60 hertz. The size of the transformer and the capacitors are large. They cannot be mounted in a small charger like this. Hence in the 5V mobile charger, the 50 or 60-hertz frequency is converted to 50 kilohertz. This reduces the size of the transformer and capacitor required in the circuit. So to change the frequency of AC first we have to convert it to DC and then again back to AC.
Now you know how the 5V mobile charger circuit that we use daily works. | <urn:uuid:5fda401e-3c88-49d2-bfa2-2f68cf924709> | CC-MAIN-2023-06 | https://circuitdiagrams.in/how-does-a-5v-mobile-charger-work/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499758.83/warc/CC-MAIN-20230129180008-20230129210008-00290.warc.gz | en | 0.914249 | 2,342 | 2.9375 | 3 |
When bugs arrive there are many things that might have cause them, and actually we spend more time trying to find the bugs than coding .
If we would put in one sentence, debugging It is a two step process, first the location of the failure and then the fixing of the issue. The debugging process relies on developers questions but also relies on tools and approaches.
Modern debugging tools employ sophisticated mechanisms to help answering this question, however sometimes, actually most of the times, it is not enough just to use tools to find answers, it’s actually necessary to use several approach/more than one sometimes, to find the causes of issues.
1.Try and fail approach
For small development problems, the try and fail approach is effiencient and ok. However, to bigger problems we need to change the way to solve them actually.
1. Why? Chain of failure.
2. What? Related to entity level.
3. Whether? Set of events on the
The questions can be used combined with hypothesis testing, which is a quite interesting and reliable approach to solve problems on code that you know and code that you don’t know.
How Did the Failure Come to Be? Mohammadreza Azadmanesh and Matthias Hauswirth. CoCos’17, October 23, 2017, Vancouver, Canada. | <urn:uuid:1dc29652-33ff-4553-8717-0da08cc53a32> | CC-MAIN-2023-06 | https://franciscomelojr.ca/2018/12/10/debugging-by-hypothesis/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499758.83/warc/CC-MAIN-20230129180008-20230129210008-00290.warc.gz | en | 0.947028 | 298 | 2.78125 | 3 |
Black locust is a member of the legume family; it can “fix nitrogen” in the soil. It is native to the Appalachian Mountains, from Pennsylvania to Alabama. However, in the last century, it has spread to almost every state. With a widespread, shallow root system, it is ideal for thin soils where it will prevent soil erosion; it is often used for strip-mine reclamation projects barren due to mining debris and acid soils.
The tree has long thin bean-like pods. (Do not confuse black locust with honey locust. They are not related.) The flowers are very sweet smelling during the early spring, and the pollen and nectar are used by bees to produce excellent honey.
High natural decay resistance of the wood has resulted in frequent use of black locust for fencing. It also was the popular species for the pins that held glass insulators on the cross-arms of electric and telegraph/telephone poles. It also was the prized species for wheel hubs for wooden wheels, such as used on the western covered wagons. Xylophone keys are another use. Today, this wood has fallen into neglect within our industry (lumber prices are often low, especially for cabinet grades; dry firewood is a common use). It deserves better treatment.
The tree is short-lived, so it does not grow to large sizes; a large tree would be 24 inches in diameter at the base and 50 feet tall. Wide, clear pieces of black locust lumber are not common. A wood boring insect often invades the tree. A leaf miner often turns entire hillsides into brown-leafed, “dead-looking” trees for a week or so in the summer, but this damage is not fatal.
Processing suggestions and characteristics
Weight. This is a fairly heavy wood, more than 10% heavier than red oak. The weight, when dry, is 50 pounds per cubic foot or about 4 pounds per board foot.
Strength. Black locust is one of the strongest, hardest native American species. For dry wood, the ultimate strength (MOR) is 19,400 psi, stiffness (MOE) is 2.05 million psi and hardness is 1,700 pounds. Mechanical fastening is difficult because of a tendency for splitting. Predrilling for nails and screws is advisable.
Drying. The wood dries slowly with some risk of checking, end splitting, and warping. Slow shed air-drying should be followed by kiln drying. Shrinkage in drying is moderately high. Overall shrinkage in drying from green to 6% MC is 7.2% tangentially (the width in flatsawn lumber) and 4.6% radially (the thickness of flatsawn lumber).
Stability. A typical final MC range is 6.0 to 7.5%, unless used in a humid location. It takes a 4% MC change to result in a 1% size change tangentially and a 6% MC change radially.
Machining and gluing. This wood machines with difficulty due to its hardness. This wood glues with some difficulty.
Grain and color. The heartwood is often quite green when first cut, but ages quickly to a russet brown color. The grain is moderately fine, but the annual rings are obvious and add character to the appearance.
This post appeared first on http://www.woodworkingnetwork.com | <urn:uuid:d6b09edd-faf5-49c0-95ef-5f018e30bd5b> | CC-MAIN-2023-06 | https://woodfloorrefinishing.info/black-locust-decay-resistant-tough-durable/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499831.97/warc/CC-MAIN-20230130232547-20230131022547-00370.warc.gz | en | 0.96003 | 704 | 3.734375 | 4 |
Welcome to Blonde Intelligence Blog with Ms. Roni where you will experience exquisite cranial repertoire. Let me say before I get started that I have an undergrad in Sociology and a Masters of Science in Counseling Studies so I am going to try to explain to some degree for those that don’t understand.
There are a few words that have to be understood. The first being “white privilege”. According to Oxford Languages, white privilege is the inherent advantages possessed by a white person on the basis of their race in a society characterized by racial inequality and justice. In other words, getting by with something or not punished simply because the person is white. Some example of white privilege (Greenburg, 2017) www.yesmagazine.com are a general positive relationship with the police, being favored by school authorities, attending mostly segregated affluent schools, the privilege of learning about one’s own race in school, finding children’s books that reflect own race, media blatant bias towards one race, the privilege of escaping violent stereotypes associated with race, the privilege of playing colorblind to wipe away the history of racism, the privilege of being insulated from the effects of racism, and the privilege of living ignorant to the actual racism occurring today. There are two forms of racism, overt and covert. Overt racism is racism shown openly. Covert racism is racism that is hid behind closed doors. Example: using the “N” word in a derogatory way to describe a person of color. Whether it would be said openly or just with a select group of friends as a joke determines if the racism overt or covert. The next word is racial discrimination. According to www.equalityhumanrights.com, racial discrimination is when someone or an institution treats a person or a group of people worse than another in a similar situation or a policy is built to disadvantage that group of people based on race. Example: football players kneeling and the officer kneeling in the Floyd case.
Just this morning I witnessed a reporter being arrested and treated differently than another reporter of the same organization and notably the only difference was one’s race. I asked a group of African American women their emotions after watching the video of the officer’s knee that resulted in the death of another unarmed person of color. Some of the emotions were angry, hurt, disheartening, weak, tired, and exhausted. Angry that people try to justify what is wrong. Hurt that the same thing keeps happening over and over. Disheartened because the feeling is always defense mode. Just exhausted and tired because people keep choosing denial instead of self-reflection. One of the African American women from the group, who happens to be a licensed therapist, feels that the problem is people saying they don’t see color is using that an excuse to not acknowledge the problem.
Lawyer Brigance said “Now close your eyes…….close them…now imagine that he was white” (A Time To Kill, 1996). Imagine that a white man was handcuffed and a grown man of color had his knee in his neck. Imagine a white man being handcuffed and shot in the head by a person of color with the excuse of he thought it was mace. Imagine a young white boy just going to the store for Skittles and fought and shot by a grown man of color. Imagine a white man just plain pleading for his life simply because he was being deprived to breath.
Remember that rope burns won’t heal with your knee on my neck and yes it an uncomfortable truth.
Please Comment, Like, Share, And Subscribe | <urn:uuid:716346c2-59ac-4cb9-aea8-2857880d8884> | CC-MAIN-2023-06 | https://www.blonde-intelligence.com/ms-roni/rope-burns-wont-heal-with-your-knee-on-my-neck-the-uncomfortable-truth | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499831.97/warc/CC-MAIN-20230130232547-20230131022547-00370.warc.gz | en | 0.963673 | 737 | 2.546875 | 3 |
Our memory is like a muscle, and the only way to strengthen it is to find new ways to challenge it. When it comes to remembering information, It really doesn’t matter who you are because your brain is programmed to recall memories that have been most useful to us, and the rest is dumped; it’s that simple.
Recent research suggested that approximately 56% of all information is forgotten within an hour, 66% is lost after a day, and 75% after six days.
Learning new things is just as useful as relearning old things or going back to the basics. This is where you need a refresher course that is designed to review the fundamentals that you might’ve forgotten over time.
How to recall lost knowledge or unused skills?
We often underestimate the power of our brain to recall information saved in our long-term memory. All we need to do is go through that particular topic or subject again to master it once more.
Have you ever experienced that even a specific fragrance or cup of coffee reminds you of several associated memories, events, people, and spoken words long ago?
This happens to you just because you refresh your memory with a powerful recalling agent. YES! Refreshing your memory to regain lost knowledge or unused skill is possible and an effective way to keep you on a professional track. REFRESHER TRAINING has already helped hundreds of thousands of people to regain lost knowledge and unused skills.
What Is refresher training?
Refresher Training is a training program that reviews and revisits concepts that are still relevant. It helps restore an employee’s old skills and knowledge, which would otherwise be lost or forgotten due to lack of use.
Overall, it seeks to keep the knowledge fresh and maintained in their memory despite taking in new learning concepts. Anyone can benefit from refresher training, regardless of their expertise and years of professional experience.
Why is refresher training important for everyone?
- It reduces mistakes and errors by an incredible margin. Slips and inaccuracies happen at work, even to your best employees. There are significant ways to minimize them. Revisiting fundamental concepts can help employees reconnect with lost knowledge and correct performance lapses.
- Refresher training also enables stronger memory retention. Our brains automatically offload information that is no longer useful. According to the Forgetting Curve by Herman Ebbinghaus, memories are bound to fade in just a matter of weeks if no attempts have been made to retain them. A frequent refresher training will counteract these effects and ensure that no skills will be lost over time.
- Reinforcing regular refresher training can help achieve better regulatory compliance too. Keeping the employees on top of the industry standards and regulations and the company policies and procedures builds harmony and consistency. Plus, it protects your company from the most brand-damaging breaches in the future, so it stays at the forefront of the market competition.
Plugins that can provide efficient refresher training
There are several WordPress plugins and add-ons available to help you in providing Refresher Training, but LMSExperts’s LearnDash Refresher Course add-on is the most preferred add-on among all.
What’s LearnDash Refresher Course add-on, and what can it do for you
LearnDash Refresher Course add-on allows the admin to define the expiration timeline for any course. The add-on also gives you the ability to set a grace period, after which the progress of the course will be reset.
Encourage users to retake their certification – LearnDash Refresher Course add-on notifies users (via email) when their courses or certifications are close to their expiration date.
Migrate data – The data migration functionality allows you to migrate existing data from the website, including existing users’ progress.
LearnDash Refresher Course add-on features:
- Define an expiration period (in months) for courses and certification.
- Define a grace period (in months) for courses and certification.
- Remove course or certification progress.
- Remove unenrolled users.
- Option to enable/disable refresher for individual courses.
- View logs for course completion.
- Send a reminder email to admin and users.
- Custom email option with predefined variables.
- Migrate course completion data.
How Does LearnDash Refresher Course Add-on Setting Works?
LearnDash Refresher Course add-on is quite a simple add-on with relevant functionalities. Admin can set expiration period, grace period, view refresher history, migrate courses, and much more.
1. Set Expiration Period:
2. View User’s Refresh History:
3. Migrate Courses:
4. Front-End View:
The refresher training program is intended to follow up, refresh and extend the knowledge and skills acquired during the initial training session. LearnDash Refresher Course add-on helps the admin to set expiration periods for courses and certifications. | <urn:uuid:f6962d29-cfad-440e-825a-2265514c112b> | CC-MAIN-2023-06 | https://lmsexperts.io/blogs/refresher-training-vital-regain-lost-knowledge-unused-skills/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499911.86/warc/CC-MAIN-20230201045500-20230201075500-00450.warc.gz | en | 0.909817 | 1,042 | 2.515625 | 3 |
The European Union is disturbed by the lack of comprehensive regulation of artificial intelligence. The EU AI Act is an important step that will determine the future of artificial intelligence in the context of personal data protection.
It’s a lawless world for artificial intelligence in today’s society. The European Union has a proposed solution called AI Act. Critical decisions about people’s lives are increasingly being made by AI programs without any regulation or accountability.
This can result in the imprisonment of innocent people, poor academic performance among students, and even financial crises. It is the first law in the world designed to regulate the entire sector and avert these harms. If EU succeeds, it could establish a new global standard for AI governance across the world.
What the EU AI Act proposes?
Here’s a brief summary of everything you need to know about the EU’s AI Act. Members of the European Parliament and EU member countries are currently amending the legislation.
The AI Act is very aggressive in its goals. It would need more checks on “high-risk” applications of AI, which have the most potential to cause damage to people. This might include systems for grading exams, recruiting workers, or assisting judges in making legal and judicial decisions. The bill’s first draft also contains restrictions on the use of AI deemed “unacceptable,” such as computing people’s trustworthiness based on their reputation.
The proposed legislation would also ban law enforcement agencies’ use of facial recognition in public spaces. There is a vocal group of influencers, including members of the European Parliament and nations like Germany, who want a total prohibition on its usage by both government and corporate bodies because they claim it allows for massive surveillance.
If the EU is able to execute this, it would be one of the most stringent bans yet on facial recognition technology. San Francisco and Virginia have imposed limits on facial recognition, but the EU’s prohibition would apply to 27 nations with a population of over 447 million people.
How EU AI Act will affect people?
By requiring that algorithms receive human review and approval, the bill should prevent humans from being harmed by AI in the event of an accident. According to Brando Benifei, an Italian member of the European Parliament who is a key player in preparing amendments for the bill, people may trust that they will be safeguarded from the most harmful forms of AI.
The AI Act also requires people to be notified if they encounter deepfakes, biometric recognition technologies, or AI applications that claim to be able to read emotions. Lawmakers are also discussing whether the legislation should include a system for individuals to file complaints and seek compensation if they have been damaged by an AI system.
One of the EU bodies working on amending the bill is also calling for a prohibition on predictive policing technologies. Predictive policing systems employ artificial intelligence to evaluate massive data sets in order to proactively deploy police to high-crime areas or try to forecast whether someone will become criminal. These algorithms are highly contentious, with critics alleging that they are frequently racial and lack transparency.
Are there any examples of such legislation outside of EU?
The GDPR, or the European Union’s data protection regulation, is one of the most well-known tech exports from the EU. It has been emulated in California to India. The EU’s approach to AI, which focuses on the riskiest AI, is a model that other advanced nations embrace. If Europeans can figure out how to regulate technology effectively, it might serve as a template for other countries wanting to do so as well.
“US companies, in their compliance with the EU AI Act, will also end up raising their standards for American consumers with regard to transparency and accountability,” explained Marc Rotenberg, the Center for AI and Digital Policy head.
The bill is also being watched closely by the Biden administration. The US is home to some of the world’s biggest AI labs, such as those at Google AI, Meta, and OpenAI, and leads multiple different global rankings in AI research, so the White House wants to know how any regulation might apply to these companies. For now, influential US government figures such as National Security Advisor Jake Sullivan, Secretary of Commerce Gina Raimondo, and Lynne Parker, who is leading the White House’s AI effort, have welcomed Europe’s effort to regulate AI.
The debate over the EU AI Act is also being closely monitored by the Biden administration. The United States has several of the world’s largest AI laboratories, including those at Meya, OpenAI, and Google AI and it leads many different global rankings in AI research. As a result, the White House is seeking information on how any legislation would apply to these firms. For the time being, prominent government figures in Washington, such as National Security Advisor Jake Sullivan and Secretary of Commerce Gina Raimondo, have praised Europe’s efforts to regulate artificial intelligence.
“This is a sharp contrast to how the US viewed the development of GDPR, which at the time people in the US said would end the internet, eclipse the sun, and end life on the planet as we know it,” said Rotenberg.
Despite some unavoidable wariness, the United States has compelling reasons to embrace the bill. It is extremely concerned about China’s rising tech influence. According to Raimondo, for America, maintaining a Western edge in technology is still a question of “democratic values” prevailing. It wants to keep close ties with the EU, a “like-minded ally,” and prevent it from drifting away, Fedscoop reports.
What kind of obstacles are there?
Some of the requirements in the bill are physically impossible to fulfill right now. The bill’s initial draft stated that data sets should be free of errors and that humans should be able to completely comprehend how AI systems operate. If a human checked for completeness, it would take hundreds of hours to ensure that data sets are completely error-free. Even today’s neural networks are so complicated that their creators don’t know why they reach their judgments.
Regulators and external auditors are also wary of the mandates that tech businesses must implement in order to comply with legislation.
“The current drafting is creating a lot of discomfort because people feel that they actually can’t comply with the regulations as currently drafted,” says Miriam Vogel, The CEO of a nonprofit organization called EqualAI. She also heads the newly formed National AI Advisory Committee, which advises the White House on AI policy. There are also those saying that lawyers are at risk of losing their jobs to AI by 2030.
There’s also a heated debate going on about whether the AI Act should ban face recognition outright. It’s a contentious issue because EU nations dislike when Brussels tries to tell them how to handle national security and law enforcement issues.
In other countries, such as France, the government is considering special rules for the use of facial recognition to protect national security. In contrast, the new German government, another major European nation and an influential voice in EU decision making, has stated that it supports a total ban on face scanning in public places.
There will also be a debate about which types of AI should be labeled as “high risk.” The AI Act includes a variety of AI applications, such as lie detection tests and systems for allocating welfare payments. There are two competing political factions: one that fears that the broad scope of the legislation will stifle innovation, and another that claims that the bill does not go far enough to protect individuals from significant injury. Some consider facial recognition risky, is big data going too far?
What effect will the law have on technology development?
A frequent complaint from Silicon Valley lobbyists is that the new rules will add to the burden on AI firms. The EU disagrees. The European Commission, the EU’s executive body, argues that only the riskiest category of AI applications would be covered by the AI Act, which it predicts would apply to 5 to 15% of all AI apps. If you wonder how tech giants use artifical intelligence, learn how businesses utilize AI in security systems, here.
“Tech companies should be reassured that we want to give them a stable, clear, legally sound set of rules so that they can develop most of AI with very limited regulation,” explained Benifei.
Organizations that do not comply with the AI Act will be fined up to $31 million (€30 million) or 6% of worldwide yearly sales. Europe has shown a propensity to hand out fines to tech businesses in the past. In 2021, Amazon was fined $775 million (€746 million) for failing to adhere to the GDPR, and Google was fined $4.5 billion (€4.3 billion) for violating EU antitrust regulations in 2018.
When will the EU AI Act come into effect?
It will be at least another year before a final text is decided upon, and several years before firms must comply. There’s a chance that hammering out the fine points of such a comprehensive bill with so many contentious components may take longer than expected. The GDPR took more than four years to negotiate and six years to come into force in the EU. Anything is conceivable in the world of EU legislationmaking. If you are into artificial intelligence and ML systems, check out the history of Machine Learning, it dates back to the 17th century. | <urn:uuid:ca453db2-f8c7-4fad-a15c-51e983e1d015> | CC-MAIN-2023-06 | https://dataconomy.com/2022/05/eu-ai-act-regulates-artifical-intelligence/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500017.27/warc/CC-MAIN-20230202101933-20230202131933-00530.warc.gz | en | 0.959315 | 1,960 | 3.265625 | 3 |
While federal law largely prohibits the sale of firearms to a juvenile, it does not impose further obligations on gun owners regarding the storage of privately-owned firearms.
Safe storage laws work to protect children from injuring themselves and others by requiring gun owners to keep guns locked up and unloaded, and ammunition stored in a locked location separate from the firearm.
Child Access Prevention (CAP) laws go one step further by imposing criminal liability to ensure that owners are held accountable for the security of their weapons.
The US Congress should pass legislation requiring the safe and secure storage of all guns and ammunition, and state legislatures should pass stringent and comprehensive safe storage and Child Access Prevention (“CAP”) laws that mandate all individuals to store all firearms unloaded under the protection of a gun lock or safety device;
Health care providers must be able to discuss the presence of firearms in the home, gun safety and safe storage with the gun owner and/or others within the household.
All states should require firearm owners to keep firearms locked and unloaded and safely stored in locked boxes or firearm safes, out of plain sight, with ammunition stored separately from the firearm, in their home or vehicle.
The state has a duty to prevent abuses of the right to stay alive by taking measures to address actual or foreseeable threats to this right, including in the context of gun violence.
The U.S. signed the Convention on the Rights of the Child in 1995. This means that the U.S. should recognize the particular vulnerabilities of children and provide “special safeguards and care” in order to protect them from gun violence, including strict regulation of the possession and use of firearms, and preventing access to firearms by those at risk of misusing them.
Unintentional child shootings that could have been avoided if the weapon had been safely stored, based on nationwide study of 100 unintentional deaths
Children living in homes where firearms are stored loaded and unlocked
Children who died in unintentional shootings between 2004 – 2016 | <urn:uuid:a4b091e9-c9f9-441a-ab31-a4545b3c29ae> | CC-MAIN-2023-06 | https://www.amnestyusa.org/our-work/government-relations-archived/end-gun-violence/end-gun-violence-safe-storage/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500017.27/warc/CC-MAIN-20230202101933-20230202131933-00530.warc.gz | en | 0.954711 | 399 | 3.046875 | 3 |
There are many features of cybersecurity program for home work with. The main one is that it helps you protect your pc and your personal data. However , there are many down sides of this kind of software as well. Here are some of the extremely common kinds. Listed below are a handful of reasons why you should use this type of software. And don’t forget to buy the best one which suits the needs you have and spending plan. Let’s look into them one by one.
First of all, it will secure your computer from online threats. Malware, Trojans and other malicious programs may be downloaded and install on your computer. Internet security application can detect and engine block these threats. There are many courses available on the market, plus the selection of the first is almost endless. The most popular kinds are Norton, Bitdefender, and F-Secure. For property users, F-Secure is one of the couple of antivirus applications that support Apple equipment.
Smart equipment are a further source of information security dangers. Many of them not necessarily protected very well. Hackers can install malware on brilliant devices and spy on all their users. Most of these devices connect to the internet router, and any viruses on an infected device should spread to other equipment on the same network. Some sensible devices likewise collect information that is personal, such as health trackers. No matter their planned use, the risks www.infosguards.net/what-to-do-if-the-avast-scan-failed-problem-occurs are significant. This is exactly why it’s important to make use of cyber reliability software that is compatible with cloud-based infrastructure. | <urn:uuid:ab67179a-ed15-4fed-af42-246fba7c4fbc> | CC-MAIN-2023-06 | https://adea.tn/internet-security-application-for-home-work-with-pros-and-cons/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500058.1/warc/CC-MAIN-20230203154140-20230203184140-00610.warc.gz | en | 0.951563 | 345 | 2.8125 | 3 |
Both instructors and students benefit from these audio materials that provide an interactive way to learn while reinforcing what is gained from the lessons within the textbook.
The Letters of Susan M. Hopkins, 1927-1935
Describes life from a woman’s perspective at the excavation of Dura-Europos, an ancient site that contained many remarkable archaeological finds.
Michael Ayrton and the Myth of Daedalus
An original inquiry into how the artistic psyche interacts with myth; includes a catalogue of the works of British artist Michael Ayrton.
Readings on the Fall of the Roman Republic
Eyewitness accounts of the collapse of the Roman republic, including selections from the correspondence of the great orator Marcus Cicero and Caesar’s narrative episodes of the civil war. For students of intermediate and advanced Latin.
A Latin via Ovid Workbook
Exhibiting the same clarity as Latin via Ovid, this student workbook parallels the text’s forty lessons and is the ideal supplement to classroom recitation and exercises.
With Notes and Vocabulary
Text and commentary on Cicero’s Verrines II.4 designed to assist students in the early stages of reading and understanding Latin literary texts.
Res Gestae et Fragmenta
The Res Gestae and Fragmenta by Caesar Augustus annotated for beginning Latin students.
A Handbook of Etruscan Studies
A reliable and lively volume which brings readers into the mainstream of the latest Etruscan scholarship.
A First Course
Using an introduction to mythology by the master storyteller Ovid himself, the authors have prepared a unique teaching tool designed to achieve proficiency at Latin in one year at the college level, two years at the high school or intermediate level.
Life and Thought in Ancient Greece
A history of ancient Greek life and thought from the Mycenaean kings to Alexander, Aristotle and Diogenes.
Based on the major primary sources of Roman history, this book recalls the experiences of the ancient Romans through a thousand years of their history. | <urn:uuid:72528e73-fa2b-4b4c-911c-2e6aa3517d92> | CC-MAIN-2023-06 | https://www.wsupress.wayne.edu/books/subjects/classical-studies | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500058.1/warc/CC-MAIN-20230203154140-20230203184140-00610.warc.gz | en | 0.814597 | 587 | 3.46875 | 3 |
Dit artikel staat op icthealth.nl. Link: https://ictandhealth.com/ucla-looks-into-rewiring-brain-in-order-to-help-with-depressions/news
UCLA looks into rewiring brain in order to help with depressions
Doctors in California say magnetic stimulation can help ‘rewire’ the brains of people with depression, offering hope for patients whose condition is not improved by medication or therapy.
Share this article
Depression is one of the most common forms of mental illness, affecting more than 350 million people worldwide, according to a Reuters video. Bob Holmes is one of them. "I struggled with that for many years, didn’t know really what to do, tried to pull myself through it. And then ultimately when I got into my forties, I wasn’t successful."
Rewiring the brain
Holmes has been receiving transcranial magnetic stimulation at the University of California Los Angeles, a treatment that beams targeted magnetic pulses deep inside his brain. Doctors say the therapy can effectively ‘rewire’ the brain by changing how brain circuits are arranged.
Andrew Leuchter, director of the Semel Institute’s TMS clinical and research centre (University of California, LA) explains: "By pulsing it with energy repeatedly, we’re changing the way that area works, but also changing the way the whole brain network works."
Holmes believes the treatment has been life changing: "I would recommend it a hundred percent. I have spoken to a number of people who have depression, given them my opinion, and I think it’s a wonderful program. It’s been a life-saver for me, and I’m very grateful that I found it, and I’m very grateful for the people here."
Bringing down length of treatment
Researchers hope the newest generation of equipment could decrease the length of a treatment session from over 35 minutes down to three minutes, allowing a patient to complete a course in two weeks and bringing the therapy to even more people with depression. | <urn:uuid:13bc1d04-5ace-489a-8d21-54520a90393b> | CC-MAIN-2023-06 | https://ictandhealth.com/ucla-looks-into-rewiring-brain-in-order-to-help-with-depressions/news/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500154.33/warc/CC-MAIN-20230204205328-20230204235328-00690.warc.gz | en | 0.940311 | 445 | 2.546875 | 3 |
In Medieval England, Magic Was A Service Industry
Tabitha Stanmore / The Conversation
Chances are that when you hear the words “ medieval magic ”, the image of a witch will spring to mind: wizened old crones huddled over a cauldron containing unspeakable ingredients such as eye of newt. Or you might think of people brutally prosecuted by overzealous priests. But this picture is inaccurate.
To begin with, fear of witchcraft – selling one’s soul to demons to inflict harm on others – was more of an early modern phenomenon than a medieval one, only beginning to take hold in Europe at the tail end of the 15th century. This vision also clouds from view the other magical practices in pre-modern England.
The Universal Use of Magic
Magic is a universal phenomenon. Every society in every age has carried some system of belief and in every society there have been those who claim the ability to harness or manipulate the supernatural powers behind it. Even today, magic subtly pervades our lives – some of us have charms we wear to exams or interviews and others nod at lone magpies to ward off bad luck. Iceland has a government-recognized elf-whisperer , who claims the ability to see, speak to, and negotiate with the supernatural creatures still believed to live in Iceland’s landscape.
An Icelandic politician claims to have elves on his property. ( Serhiibobyk / Adobe Stock)
While today we might write this off as an overactive imagination or the stuff of fantasy, in the medieval period magic was widely accepted to be very real. A spell or charm could change a person’s life: sometimes for the worse, as with curses – but equally, if not more often, for the better.
They were used to find lost objects, inspire love, predict the future, heal illnesses , and discover buried treasure. In this way, magic provided solutions to everyday problems, especially problems that could not be solved through other means.
Crime of Conjuring
This all may sound far-fetched: magic was against the law – and surely most people would neither tolerate nor believe in it? The answer is no on both counts. Magic did not become a secular crime until the Act against Witchcraft and Conjurations in 1542.
Before then it was only counted as a moral misdemeanor and was policed by the church. And, unless magic was used to cause harm – for example, attempted murder (see below) – the church was not especially concerned.
Medieval magic was policed by the church. (Martha Forsyth / CC BY-SA 2.5 )
Often it was simply treated as a form of superstition. As the church did not have the authority to mete out corporal punishments, magic was normally punished by fines or, in extreme cases, public penance and a stint in the pillory.
This might sound totalitarian today, but these punishments were far lighter than those wielded by secular courts, where maiming and execution were an option even for minor crimes. Magic, then, was placed low on the list of priorities for law enforcers, meaning that it could be practiced relatively freely – if with a degree of caution.
Among the hundreds of cases of magic use preserved in England’s ecclesiastical court records, there are a number of testimonials claiming that the spells were effective. In 1375, the magician John Chestre boasted that he had recovered $16 (£15) for a man from “Garlickhithe” (an unknown location – possibly a street in outer London).
- Say the Magic Word: The Origins of Abracadabra
- Newgrange: A Home for Magicians, Fairies, Gods, and Kings
- Religion and Magic in Amarna: Battling Forces from Different Realms—Part I
Magic circle from a 15 th century manuscript. (Katie.currier19 / Public Domain )
Meanwhile Agnes Hancock claimed she could heal people by blessing their clothes or, if her patient was a child, consulting with fairies (she does not explain why fairies would be more inclined to help children). Though the courts disapproved – she was ordered to stop her spells or risk being charged with heresy, which was a capital offence – Agnes’ testimony shows that her patients were normally satisfied. As far as we know, she did not appear before the courts again.
Magic by Royal Patent
Young and old, rich and poor alike used magic. Far from being the preserve of the lower classes, it was commissioned by some very powerful people: sometimes even by the royal family. In a defamation case from 1390, Duke Edmund de Langley – the son of Edward III and uncle to Richard II – is recorded as having paid a magician to help him locate some stolen silver dishes.
Meanwhile, Alice Perrers – mistress to Edward III in the late 14th century – was widely rumored to have employed a friar to cast love spells on the king. Though Alice was a divisive character, the use of love magic – like using it to find stolen goods – was probably not surprising.
Eleanor Cobham , duchess of Gloucester, also famously employed a cunning woman to perform love magic in 1440-41, in this case, to help conceive a child. Eleanor’s use of magic got out of hand, however, when she was accused of also using it to plot Henry VI’s death.
- Ancient Superstitions Pervade India as Modern ‘Witch Hunt’ Leaves Mother and Children Dead
- How Credible Are the Superstitions Surrounding the Mystical Irish Fairy Trees?
- Ancient Levitation – Magicians Secret Crafts Revealed
The public penance of Eleanor Cobham. Eleanor was accused of using magic against the king. (Jappalang / Public Domain )
In many ways magic was just a part of everyday life: perhaps not something that one would openly admit to using – after all, it was officially seen as immoral – but still treated as something of an open secret. A bit like drug use today, magic was common enough for people to know where to find it, and its use was silently recognized despite being frowned upon.
As for the people who sold magic – often termed as “cunning folk”, though I prefer “service magicians” – they treated their knowledge and skill as a commodity. They knew its value, understood their clients’ expectations and inhabited a marginal space between being tolerated out of necessity and shunned for what they sold.
As the medieval period faded into the early modern, belief in diabolical witchcraft grew and a stronger line was taken against magic – both by the courts and in contemporary culture. Its use remained widespread, though, and still survives in society today .
Top image: In the medieval England magic was a service industry. Source: Вероника Преображенс / Adobe Stock.
This article was originally published under the title ‘ In medieval England magic was a service industry used by rich and poor alike ’ by Tabitha Stanmore on The Conversation , and has been republished under a Creative Commons License. | <urn:uuid:cf0045f8-9124-4fc1-95ca-d28ac3dcab9c> | CC-MAIN-2023-06 | https://www.ancient-origins.net/news-general/medieval-magic-0012676 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500154.33/warc/CC-MAIN-20230204205328-20230204235328-00690.warc.gz | en | 0.968028 | 1,499 | 2.890625 | 3 |
A More Sustainable Shipping Method
There's an environmental cost to expedited shipping - that's why we don't do it. Expedited shipping means your packages may not be as consolidated as they could be, leading to more cars and trucks required to deliver them, which researchers have found is adding more congestion to our cities, and pollutants to our air.
We ship via ground transportation only and leverage USPS's existing network to minimize our carbon footprint. Our manufacturing and distribution facilities are centrally located in Chicago, Illinois. Operationally, this allows us to deliver nationwide with efficiency.
We are constantly taking steps to lighten our load on the environment, and reduce greenhouse gases associated with our normal business operations.
That is why we provide carbon neutral shipping on all orders, through our purchase of carbon offsets, to cover our direct and indirect carbon emissions.
What is a carbon offset?
A carbon offset is a scientifically quantified reduction in greenhouse gas emissions created when one metric ton of greenhouse gas is captured, avoided or destroyed in order to compensate for an equivalent emission made.
How Does It Work?
Carbon offsets enable organizations like ours to reduce our environmental impact by supporting projects that are actively working to reduce, absorb or prevent carbon and other emissions from entering the atmosphere.
These projects can be in the form of forestry conservation efforts, or technology that captures gas before it is released (such as at a landfill, or a farm with decomposing waste).
Our Project: Clinton Landfill #2 Gas Collection and Combustion Protocol
Through our carbon offset partner, 3Degrees, we support a project located near our warehouse facility in Chicago. The project activity involves voluntary expansion of the landfill gas management system to capture and destroy methane that would be partially released to the atmosphere.
The system includes wells, piping, blowers, meters and valves, a back-up open flare, two 1.6 MW Caterpillar engine generator sets, gas conditioning equipment, a building to house the generators, and associated interconnection and metering devices. | <urn:uuid:5b9eba32-d785-418d-b60a-919b4d2e639b> | CC-MAIN-2023-06 | https://www.dropps.com/pages/distribution | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500303.56/warc/CC-MAIN-20230206015710-20230206045710-00770.warc.gz | en | 0.936162 | 416 | 2.703125 | 3 |
Why did Jesus choose Peter as a disciple?
Jesus Chose Peter because…
He took the adversity and trials and mistakes he encountered and continued to love Jesus without hesitating. He didn’t allow the why not to defeat him but used them to change all together from an arrogant man to a humble disciple.
What did Jesus mean when he said to Peter upon this rock I will build my church?
Jesus is saying that though He were rejected by the people, arrested, tried and found innocent and then crucified anyway, it would not stop him from building His church. The Jews did reject Christ and crucify Christ, but He arose, He did build His church.
How did Peter become a disciple?
An unlikely choice to lead the church, Peter the Apostle had a life typical of the original Apostles, or the lead disciples of Jesus. Chosen when he was a simple fisherman to be an early disciple, or follower, Peter infamously denied Jesus three times.
What did Jesus mean by Peter being the rock?
“I think that Jesus was telling Peter that he (Peter) was the rock because his name means ‘rock,'” says Hillary, 12. The rock upon which Jesus would build his church could refer to Peter, since Jesus changed Peter’s name to “petros” meaning “rock.” This would make Peter the foundation of the church.
Why did Jesus name Peter the rock ‘?
In classical Attic Greek petros generally meant “pebble,” while petra meant “boulder” or “cliff”. Accordingly, taking Peter’s name to mean “pebble”, they argue that the “rock” in question cannot have been Peter, but something else, either Jesus himself, or the faith in Jesus that Peter had just professed.
Why did Jesus change Simon’s name to Peter?
Simon (Simeon in Hebrew) have meaning “The one whom hear (Word of God)”, and Peter (Chepas in Hebrew) means “a rock”. The name changes is to underline the transformation of the person whom hear words of God to a spiritual rock.
Whats the meaning of Peter?
Peter is a common masculine given name. It is derived from Greek Πέτρος, Petros (an invented, masculine form of Greek petra, the word for “rock” or “stone”), which itself was a translation of Aramaic Kefa (“stone, rock”), the nickname Jesus gave to apostle Simon Bar-Jona.
Where did Peter walk on water?
Jesus told His disciples to get in a boat and to go to the other side of the Sea of Galilee. They left and Jesus went off by Himself to pray. When the disciples reached the middle of the lake, a storm came. The water became rough.
Where was Peter when Jesus was crucified?
Following Christ’s crucifixion and Resurrection Peter remained in Jerusalem, which was where Jesus appeared to him in person (1 Corinthians 15:5).
What did Jesus say to Peter after he denied him?
Jesus restored Peter to fellowship after Peter had previously denied him and told Peter to feed Jesus’ sheep.
What did Jesus say to Peter when he walked on water?
28 And Peter answered him and said, Lord, if it be thou, bid me come unto thee upon the waters. … And Peter went down from the boat, and walked upon the waters to come to Jesus. 30 But when he saw the wind, he was afraid; and beginning to sink, he cried out, saying, Lord, save me.
What type of leader was Peter in the Bible?
Throughout the Gospels, Peter’s interactions with Jesus and the disciples reflect a leader who is impulsive, ambitious, self-assertive, and quick to commit without fully understanding the meaning of Jesus’ words or actions. demonstrating his commitment during Jesus’ time of suffering (John 18:15, 25). | <urn:uuid:dc01a7b0-fab2-4b07-8b8a-24dd84255f66> | CC-MAIN-2023-06 | https://abujacatholicarchdiocese.org/bible/what-made-jesus-chose-peter-as-the-shepherd-of-his-flock.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499646.23/warc/CC-MAIN-20230128153513-20230128183513-00330.warc.gz | en | 0.977254 | 856 | 2.671875 | 3 |
In the United States, current estimates are 1 in 59 children will receive an autism diagnosis by age 8. Individuals with autism all have difficulty with social communication and interactions, as well as restricted interests or repetitive patterns of behavior. However, the strengths and challenges for these individuals truly is a spectrum that can range from a completely nonverbal kindergartner, to a professor of linguistics.
We’ve known for more than 20 years that the lion’s share of the risk for developing autism is genetic. However, pinpointing specific genetic changes linked to autism has been tremendously challenging. Recently, new breakthroughs in our ability to read our DNA, our genomes, and partnerships between families and researchers have begun to shine a new light on our understanding of autism genetics. Importantly, these efforts are already sparking new actions that will help benefit individuals with autism, and their families, in the years to come.
April is World Autism Awareness Month, and three years ago this week, OHSU and more than 20 other sites across the U.S., helped launch SPARK, the largest genetic study of autism ever. SPARK’s goal is to recruit more than 50,000 families as research partners to accelerate the scientific understanding of autism.
I’m a co-leader of the OHSU SPARK site, now one of just 32 across the country. And, as a human geneticist who has studied autism and related developmental disorders for the past 15 years, I often have conversations with families, self-advocates and primary care clinicians about genetic testing and research. Generally, these conversations can be split into two types: “Why can’t I get genetic testing?” and “What’s the point of genetic testing? It’s‘not actionable.’”
The American Academy of Pediatrics, along with other leading health professional organizations, has long recommended that all individuals with autism receive some type of genetic testing, such as screening for fragile-X syndrome, or what is known as a chromosomal microarray analysis, which can detect large scale deletions and duplications of the genome.
Learn more about how genetic testing positively impacted two SPARK participants: Hope and Alex.
While these techniques were state-of-the-art when I was a graduate student in the late 2000s, recent technological advances within the last decade have allowed us to do so much more. We can now conduct whole-exome sequencing, a process that directly scrutinizes all protein coding regions of the genome, which is approximately 1 to 2 percent of our DNA. This more comprehensive screening can be done clinically for a similar cost as microarrays. For a bit more, individuals can sequence the other 99 percent of their DNA via whole-genome sequencing. These sequencing data allow clinical labs to find changes down to a single DNA base change, many of which we now know can strongly contribute risk for developing autism.
Despite these recommendations and technical advances, many families struggle to even get the basic recommended testing.
A recent survey published in the journal Application of Clinical Genetics shows that roughly two-thirds of individuals with autism have never had any genetic testing. The reasons behind this issue are complex and not well studied. However, from the parents and physicians I’ve spoken with, there is at least one major culprit for families that want genetic testing and have not had it: insurance.
Genetic tests have to be “authorized” by insurance companies prior to the testing. Plus, there still could be significant out-of-pocket-costs for a family. Assuming a test is even covered by your insurance plan, the patient or physician still needs to justify the necessity of the test to the insurance company.
This seems like a simple calculus. Every major medical association in the U.S. recommends genetic testing for individuals with autism. This individual has an autism diagnosis. Ergo, they are “justified” in having genetic testing. But still too often testing is denied.
So why does an insurance company deny even a basic genetic test recommended by everyone? Well, it’s “not actionable.”
When an insurance company or physician says something is not actionable, they mean that finding that result will not change the routine clinical care of the patient. For many of the families I’ve known and have worked with, this argument doesn’t hold any water. For them, just knowing can create actions.
Autism often co-occurs with other challenges. With new research, we are beginning to link specific risk genes to these challenges, including things such as congenital heart defects or seizure subtypes that are actionable. Families and physicians can use this new information to take actions that will improve care.
Importantly, these recent discoveries have also allowed families with similar genetics to find each other, share their stories, form communities and develop non-profit organizations to support further research. Many of these groups are less than 5 years old. Knowing why has empowered these families to take actions that -- with a lot of hard work to come -- will form the basis of targeted interventions in the future. I’d hardly call that “not actionable.”
SPARK is not a substitute for clinical genetic testing, but we are committed to returning meaningful results back to as many individuals with autism and their families as possible. We are currently analyzing data from over 9,000 families from the first two years of SPARK, and we are learning more about the genetic risk factors for autism every day. As our SPARK participants show us, just knowing can create actions that help bring light to our understanding of autism.
Additional information about OHSU and SPARK , as well as enrollment details, can be found at: www.ohsu.edu/SPARK.
Brian J. O’Roak, Ph.D., is an associate professor of molecular and medical genetics in the OHSU School of Medicine. | <urn:uuid:547ab618-2298-4c79-af1b-1be5f5272c82> | CC-MAIN-2023-06 | https://news.ohsu.edu/2019/04/25/taking-action-to-understand-the-genetic-causes-of-autism | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499646.23/warc/CC-MAIN-20230128153513-20230128183513-00330.warc.gz | en | 0.963114 | 1,226 | 3.515625 | 4 |
The Australian Prime Minister Malcolm Turnbull and Attorney General George Brandis want to introduce laws that would force technology companies to ensure their systems are capable of decrypting terrorists’ communications.
Following a meeting of the Five Eyes intelligence alliance in Ottawa - comprising Australia, Canada, New Zealand, the United Kingdom and the United States - a careful reading of the group’s recent communique shows agreement on much less; a commitment to “develop our engagement with communications and technology companies to explore shared solutions”.
Surely allowing good police officers to read terrorists’ communications could only be good for everyone? But the controversy arises because the mathematical laws that impede good people cracking terrorists’ communications are exactly the rules that keep your banking, health, voting and other data secure.
“This is not about creating or exploiting back doors, as some privacy advocates continue to say, despite constant reassurance from us,” says Mr Turnbull. Decrypting terrorists’ communications without undermining the security of everyone else sounds great, but this not an engineering plan and every known attempt has failed.
The Australian government has also announced a new “information warfare unit”. You can bet that many other countries have well-established units, some of them actively looking for flaws in Australia’s defences. And if we put weaknesses there, there is a good chance that other people will find them.
But, in order to understand the implications of the debate, first we need to understand what encryption is.
Decrypting the message
Encryption means hiding the content of information from everyone except the person you intend to talk to; it does not hide the existence of the information, just what it says.
Modern encryption uses maths. An algorithm on your computer transforms your message into a sequence of ones and zeros that’s meaningless except to a reader who knows the secret key that can transform it back, or decrypt it. Naturally, people have been trying to break encryption since it was invented - trying to recover the message from the encrypted version without knowing the key. This is called cryptanalysis.
The best-known encryption algorithm is RSA. It works on the simplest possible mathematical foundation - the fact that it’s easy to multiply but hard to factorise. To generate an RSA key you choose two random, very large prime numbers (hundreds of digits long), then you multiply them together and publish the result. You keep the prime factors secret - this is your decryption key. If you choose large enough primes, it’s just too hard to run enough computation to extract them and decrypt your message.
Ordinary posts on Facebook are hidden from eavesdroppers, but not from Facebook itself. You send your encrypted message to Facebook, which decrypts and reads it, then encrypts it again to send it to others. They need to read your communications to assess your mood, decide which of your friends’ posts to show you and display targeted ads for stuff you’re likely to buy. Gmail is similar.
If the government’s proposal is simply to give Australian law enforcement a way of getting a warrant to ask these companies for data that they already have, then that seems perfectly reasonable.
It gets complicated when individuals use end-to-end encryption. This kind of encryption is used when messaging apps such as Signal, Wickr, Telegram and WhatsApp run on your device and encrypt your message with a key known only to the recipient – it is decrypted only when it arrives on your friend’s device.
The company or service provider never learns the decryption key, and cannot read the message. They still learn who is communicating with who - metadata is unaffected. End-to-end encryption makes possible the promise that was made when metadata retention was introduced, that it will only be the “address on the front of the envelope”, not the contents, that can be accessed by law enforcement.
It’s uncertain what the Australian government proposes to do in this case.
One possibility is to compromise the device, a technique that Edward Snowden described early on in his revelations about the National Security Agency (NSA) saying “unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it”. This means there’s no need for cryptanalysis – it’s just a matter of reading the message before it has been encrypted or after it has been decrypted.
Perhaps the government is proposing to ask device manufacturers for a guarantee that they will have a method of reading communications or files before they are encrypted. If this is so, then it is very different from asking Facebook or Gmail for messages they already have.
This was the point of Apple’s landmark case against the FBI; whether the manufacturer of a device and a provider of cloud storage was obliged to provide access. But even the manufacturer of a device might not generally be able to access the data. Apple had intended to design a phone that even Apple couldn’t read, but a bug in the logic of their security protections allowed the FBI to read the messages anyway.
So the requirement to allow the manufacturer access means deliberately designing the device to be less secure than it could be, which inevitably introduces the possibility that someone other than legitimate law enforcement might try to use the same process to get the data.
The Wannacry ransomware that had a catastrophic impact on Britain’s NHS exploited a weakness that had allegedly been used by the NSA for surveillance. This weakness, dubbed EternalBlue, was quickly exploited when it came into the possession of criminals – and WannaCry was born.
Although this vulnerability was probably discovered rather than inserted, and deliberately weaponised, the same questions apply here: how could we be confident that the facility designed for reading people’s communications would be exploited only by legitimate law enforcement officers with a warrant, not by organised crime, foreign spy agencies, or terrorists themselves?
Getting the right key
Another possibility is to weaken or backdoor the encryption algorithms so that cryptanalysis becomes easier. The simplest kind of backdoor is key escrow, an arrangement in which the key needed to decrypt encrypted data is held in escrow so that, under certain circumstances, an authorised third party may gain access. The government then promises not to read your messages without a good reason.
The opportunities for abuse are obvious. Given that we have already seen metadata accessed in order to monitor journalists’ communication patterns without a warrant, concerns about the abuse of key escrow are justified.
But backdoors can be more subtle. A weakness in a commonly-used random number generator called Dual EC DRBG was allegedly introduced by the NSA. The backdoor consisted of parameters they knew, but nobody else did. It probably allowed them to decrypt Virtual Private Network traffic. Most concerning was the discovery, many years later, that someone had quietly re-keyed the backdoor. In 2015, tech giant Juniper Networks revealed that the program it depended on to secure its routers used the same weakened algorithm, but with different parameters. Same backdoor, new key but exactly whose key remains a mystery.
Cryptographic keys need to be long in order to be secure – otherwise the attacker can simply guess. US policy in the 1980s and 1990s restricted the export of cryptography that used long keys in the hope of decrypting foreign communications.
Unfortunately, as late as 2015, many servers still communicated using the deliberately-weakened “export grade” cryptographic key lengths. And there are examples here in Australia.
In 2015, during the NSW state elections, we found that online voting was vulnerable to tampering because it included code from a server using export-restricted cryptography. By the same year, the cryptanalysis could be run overnight on the Amazon cloud for about AU$100. A misguided US policy to facilitate NSA cryptanalysis introduced an open opportunity for vote exposure and manipulation in an Australian voting system some 20 years later.
Do the maths first, then write the legislation
Good-quality cryptography is available all over the Internet. If Australia insists on these weakened standards, law-abiding Australians will adopt them but terrorists will simply download something secure. Meanwhile any weakness in our algorithms or devices will jeopardise the security of our banking, elections, health records and just about everything else.
This is a critical matter of national security, both ways. It’s not a political dispute between people who want to catch terrorists and people who want to protect their privacy – it’s an engineering problem that has to be addressed with a clear understanding of what the options and logical implications are.
Making our communications a little less secure so that good people can read our messages might make us much more vulnerable to bad people in the long run. | <urn:uuid:091e48a1-64fc-429f-800c-fac86ddccc01> | CC-MAIN-2023-06 | https://pursuit.unimelb.edu.au/articles/what-kind-of-rear-window-into-encryption-do-the-five-eyes-want | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499646.23/warc/CC-MAIN-20230128153513-20230128183513-00330.warc.gz | en | 0.948374 | 1,793 | 2.65625 | 3 |
Nordic countries are experiencing searing temperatures as Europe’s record-breaking heat wave moves north, with Norway on Saturday equalling its 1970 record, and many areas recording “tropical nights.”
Laksfors in northern Norway on Saturday recorded a temperature of 35.6 degrees Celsius (96 degrees Fahrenheit), equaling the national record set in Nesbyen in 1970, the country’s meteorology service said on Twitter, adding, however, that the Meteorological Institute needed to “double check” that the measuring station was operating properly.
The Norwegian Meteorological Institute also said it had recorded “tropical nights” in 20 different locations in southern Norway, meaning that temperatures stayed above 20 degrees throughout the night.
The tropical heat was also felt around other parts of the Nordics and in neighboring Sweden, with most extreme heat in the country’s far north.
On Friday the small town of Markusvinsa in the far north recorded a temperature of 34.8 degrees Celsius.
“That’s the hottest temperature in the far north since 1945 and the third-highest temperature on record,” Jon Jorpeland, meteorologist at the Swedish Meteorological and Hydrological Institute, told AFP.
Earlier in the week several places in Sweden also experienced “tropical nights.”
According to Jorpeland, temperatures in the south of Sweden haven’t been as extreme and it’s not unusual that the mercury reaches 30 degrees a few days a year in the country, even though current temperatures are above average.
Swedish metereological institute has also issued warnings of potential water shortages in August in 15 of the country’s 21 counties.
Heat warnings have been issued in Sweden, Norway and Finland and earlier this week Finnish police even warned motorists to be mindful of moose, who were increasingly crossing roads in search of water to quench their thirst.
The World Meteorological Organization on Thursday said forecasts indicated that atmospheric flows would transport the heat from Europe to Greenland “resulting in high temperatures and consequently enhanced melting.”
Current predictions indicate the resulting melting of ice could approach the record losses recorded in 2012, the organization said, citing scientists from the Danish Meteorological Institute.
In a related news, 200 reindeer have been found dead in Norway, starved to death. It is believed, that it was heavy rainfall in December which froze to ice on impact with the ground, making it impossible for the reindeer to dig through to the plants below, that they live on. | <urn:uuid:33f869f0-5324-4ef4-b4e7-c70a23009094> | CC-MAIN-2023-06 | https://scandasia.com/heatwave-hits-scandinavia/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499646.23/warc/CC-MAIN-20230128153513-20230128183513-00330.warc.gz | en | 0.957839 | 532 | 3.15625 | 3 |
Python is very easy to learn. However, for newbies, you need a code editor that allows you to view code completion. Code completion helps to develop and learn a new computer language rapidly and that is why, Eclipse is one of the most popular Integrated Development Environments (IDE) out there.
To develop programs using Python on Eclipse, you can install the PyDev package in your favorite Linux distribution. For Fedora, do the following:
# yum install eclipse-pydev <enter>
Now you are ready to start the Eclipse IDE and develop programs using python. When you position your mouse pointer over any line in your Python program, you will see the details of the parameters / syntax for that line. Windows developers too can benefit from the power of Eclipse and Python. | <urn:uuid:a55ded28-550e-414d-9ee1-041bcf75831d> | CC-MAIN-2023-06 | https://askmeaboutlinux.com/2011/12/13/eclipse-ide-and-python-development/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499768.15/warc/CC-MAIN-20230129211612-20230130001612-00410.warc.gz | en | 0.890946 | 159 | 2.90625 | 3 |
In case you are searching for easy Preschool Activities, you can find some enjoyable ideas here. You may also consult with other articles on preschool activities, this kind of as A-Z Preschool Activities My Family members. Listed here, we are going to discuss some activities for preschoolers as well as the very best way to make them fascinating. After you have mastered some fundamental activities, you’ll be able to try new ones and incorporate a brand new twist for the previous kinds. And bear in mind, it’s in no way too early to start creating new memories. >>> Preschool Activities Online Free – Request Professional Help Or Maybe A Continue Reading >>>
Fundamental Activities For Preschoolers
A child’s simple activities include perform, messy play, and fake perform. You may also engage in easy board games or memory games or costume up as superheroes and possess enjoyable with your preschooler. Play is a vital element of the preschooler’s development, and you can easily incorporate this kind of activity into your daily regimen. Simple activities for preschoolers must enable them to discover about shades, shapes, as well as other items that interest them.
A deck of playing cards can be reworked right into a number recognition and correspondence program. Fingers on as We Expand has an exercise exactly where preschoolers “slap” the playing cards to their corresponding counterparts. This exercise may also be become a scavenger hunt for the entire class. Another concept for a scavenger hunt is to develop a ping pong recreation using golf tees as well as a Styrofoam foundation. >>> Preschool Activities Online Free – Benefit From Proficient Advice Or Maybe A Please Read On >>> The letters and quantities may be interchanged to make the various appears for the game.
Throughout huge group activities, the instructor will initiate a wide variety of enjoyable activities for the children. These activities may help them develop tutorial and social skills although creating classroom community. For example, you’ll be able to study stories to the youngsters, sing songs, go over the day’s timetable, and motivate the children to share. These activities can also be useful when welcoming guests and building classroom community. Throughout large team activities, the trainer can observe kid’s development and decide what areas would require more exploration.
To encourage creativeness, setup an artwork and craft box crammed with pencils, glue, wool scraps, little cardboard items, and paint samples. In addition, reusable supplies can be utilized to make artwork objects. You can photograph the finished creations as being a keepsake for long term reference. You may also use organic components to make a stuffed animal. >>> Preschool Activities Online Free – Take Advantage Of Qualified Support Or Maybe A Please Read On >>> For example, your preschooler can develop a wand by sticking leaves, bouquets, along with other all-natural components.
Home Preschool Activities – Preschool Activities Online Free
If you’re trying to find some tips for entertaining Home Preschool Activities for your toddler, you’ll find many ideas to keep your little one busy and engaged. Some straightforward tips include creating cereal necklaces and setting up puzzles. The two of those activities are wonderful for creating fantastic motor expertise, and you can also pair these activities with some enjoyable virtual discipline trips for preschoolers. Yet another excellent concept for preschool activities is always to play a sport of ping-pong, which combines literacy and fantastic motor abilities.
Another activity to your toddler is actually a picnic. It really is usually enjoyable to eat outside, so pack some easy-to-eat meals. Pack sandwiches and crackers, or pack some pudding. Your preschooler might be convinced to consume each meal outdoor! In addition to picnicking, you can also recycle household components and develop a robotic or other object. >>> Preschool Activities Online Free – Try To Get Specialised Information Alternatively Please Read On >>> If your youngster just isn’t also old to play volleyball, you can also create a game of balloon volleyball with no rules.
Regardless of whether your son or daughter is a toddler or even a preschooler, preschool activities will help shape their personality and build their social and cognitive skills. The very best method to sneak understanding into these activities is to go through aloud to them. Books like Community Helpers Children are a fantastic way to sneak inside a bit of preschool curriculum with out your child understanding it! And when you do not truly feel like instructing a lesson at home, you’ll be able to try out an easy activity like reading through in your kid.
Make an effort to integrate different activities into your toddler’s everyday routine. An enjoyable action for toddlers is to play with perform dough. You’ll be able to even make your own personal, and buy mats for toddlers. The cloud dough is well scooped and molded, and is also very low-cost. Taking part in clapping and stomping letters collectively is a good way to merge letter recognition and motion. A fun indoor sport this kind of as seaside ball will bolster your kid’s harmony and coordination. Another activity that can help to create motor expertise is always to pay attention to Vanessa’s Tunes and Rhymes. Its rhythmic designs are excellent for creating their minds and bodies.
A To Z Preschool Activities – Preschool Activities Online Free
A To Z preschool activities consist of alphabet-themed artwork and craft assignments. These activities develop letter recognition and counting abilities whilst educating preschoolers the alphabet. They can also enable them to develop STEM (science, technology, engineering, and arithmetic) skills and pre-writing expertise. Attempt one of those straightforward crafts these days! You can customize them to fit any letter inside the alphabet. If you want, you can also use your own handwriting as inspiration! The possibilities are limitless.
The alphabet letter Z is the very first letter of the alphabet, so we’ve compiled a variety of easy-to-follow activities that are sure to preserve your toddlers engaged throughout the day. Each and every action consists of easy-to-follow instructions, printable components in color, suggested kid’s literature, and connected on-line early childhood sources. >>> Preschool Activities Online Free – Gain Specialized Guidance Or Read On >>> Whether or not you happen to be trying to find alphabet-themed art or preschool activities, we have received you lined!
Letter Z is actually a trustworthy letter and frequently helps make the seem “zuh.” The A To Z worksheet for this letter includes a hidden picture and may be used to strengthen understanding. Several letter Z flashcards may also be accessible, which may be employed to show college students which phrases start using the letter. This action is excellent for youthful kids as they create their language abilities. So, do not hesitate to utilize it with your preschoolers! They’ll have a blast!
Preschool Activities My Family Members
A topic like Preschool Activities My Family will provide a lot of enjoyable to the youngsters! Make vibrant loved ones textbooks utilizing the original paper as the cover. Reduce out photos from the kids from previous publications or journals and possess them attract and create about them. These books is likely to make wonderful classroom textbooks to go through in the course of Circle Time. If you’re looking for a lot more suggestions, you’ll be able to make family banners or collages with images the kids label. These will go home using the kids once the theme is over.
Another entertaining exercise for preschoolers is always to produce a family members tale with pictures from the kid’s parents. This exercise could be a terrific way to educate literacy skills, build associations, and have fun although studying about the distinct loved ones. Developing a family members picture storybox is a superb way to try this. You can even request mothers and fathers to add images in their households to ensure that your college students can read together along with you. But ensure that you give your kids plenty of time to follow. >>> Preschool Activities Online Free – Get Quality Guidance. | <urn:uuid:e8e1efd2-1528-48c4-95ab-2a3970a794ac> | CC-MAIN-2023-06 | https://www.kidsprintableworksheets.com/pa01/preschool-activities-online-free/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499919.70/warc/CC-MAIN-20230201081311-20230201111311-00570.warc.gz | en | 0.947101 | 1,648 | 2.640625 | 3 |
Choosing Whole Foods for a Healthier You
Written by Eric DeAngelis, a Mayo Clinic School of Health Sciences dietetic intern
What is a whole foods diet?
A whole foods diet simply means choosing foods that are minimally processed. Think fresh fruits and vegetables, nuts, seeds, oils, and whole grains. While a whole foods diet does focus on eating lots of plant-based foods, it does not necessarily mean you have to become a vegetarian or vegan. Meat and dairy are perfectly acceptable, but the idea is to choose those foods in moderation (a few times a week as opposed to every meal). Focus, instead, on fueling with unprocessed plant foods for the majority of your meals.
What are the benefits?
Unprocessed foods tend to be rich in essential vitamins, minerals, antioxidants, phytochemicals, and fiber. They are naturally low in saturated fat and sodium. Evidence from large population studies and randomized clinical trials have linked a diet higher in plant-based whole foods to lower occurrences of heart disease, diabetes, hypertension, metabolic syndrome, obesity, and certain types of cancer. If that isn’t reason enough, whole plant foods can be grown and harvested while having a smaller impact on the environment and can be surprisingly affordable.
Is a whole foods diet nutritionally adequate?
A common myth often used against a plant-based diet is that it does not provide all the nutrients we need, such as protein. While it is true that it takes a extra planning to meet protein goals, it is absolutely possible to get more than enough protein with a whole food plant-based diet. Remember that meat and dairy are perfectly acceptable, but if you are planning to eat a purely vegetarian or vegan diet, the main nutrients of concern are protein, omega-3 fatty acids, vitamin B12, vitamin D, iron, calcium, zinc, and iodine. In some cases supplementation may be necessary. It is recommended to talk to your doctor to set up an appointment with a registered dietitian who can help you plan a diet that ensures you are getting enough of these important nutrients!
Tips for getting started
Are you interested in trying the whole food approach to eating? Try these tips to get started down the path to health and longevity!
- Aim for at least one fully vegetarian meal a week and go from there
If you are new to this concept it may be a little intimidating to completely uphaul how you are eating overnight. To get started, try to plan for one meal a week that fits the whole food mold. From here you can work toward incorporating one whole food meal a day. Once you have a good idea of foods you enjoy and have some recipes you like it will be much easier to eat this way for multiple meals every day!
- Open up that spice drawer
It’s a common misconception that plant-based meals are bland and lack flavor. Try experimenting with different spices and herbs other than salt to spice up your dishes. A few of our favorites are lemon juice, garlic and onion powder, turmeric, tarragon, cumin, coriander, paprika, ground mustard seed, marjoram, mint, rosemary, thyme, basil, and ginger. The possibilities are endless!
- Build a healthy plate
When preparing a plate try to fill half the plate with vegetables (the more colorful the better!), a quarter with whole grains, and a quarter with a protein such as beans or lentils. This will ensure you are getting a wide array of vitamins and minerals and the fiber will help fill you up and keep you satisfied.
Have you increased your intake of plants or plant-based meals lately? | <urn:uuid:b60f04e5-3b71-41fa-9344-763bd88d0c40> | CC-MAIN-2023-06 | https://connect.mayoclinic.org/blog/weight-management-1/newsfeed-post/choosing-whole-foods-for-a-healthier-you/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500028.12/warc/CC-MAIN-20230202133541-20230202163541-00650.warc.gz | en | 0.948799 | 755 | 3.21875 | 3 |
Rain and snowfall have long been thought to be the main driver of freshwater ebbs and flows, but a new study has proven this theory inaccurate. Published in the Nature journal, “Human Alteration of Global Surface Water Storage Variability,” offers telling insights about the global hydrological cycle.
Researchers Sarah W. Cooley, Jonathan C. Ryan, and Laurence C. Smith used NASA satellite data to analyze 227,386 bodies of water from October 2018 to July 2020. Their findings revealed seasonal variability in human-managed reservoirs averaged 0.86 meters, compared with just 0.22 meters for natural water bodies.
The research team determined the natural variability in surface water storage is highest in tropical basins, as opposed to the Middle East, where human-managed variability is greatest. Additionally, they found that human influence steers 67% of surface water storage variability south of 45 degrees north, rising to nearly 100% in some arid and semi-arid regions.
Global Water Usage on the Rise
Water scarcity is an issue on every continent, according to the United Nations. This is due to water usage growing globally at more than double the rate of population increase over the last century. Consequently, a rising number of regions throughout the world are nearing the limit at which water can be delivered in a sustainable manner — especially in dry regions.
Despite this, the UN noted there isn’t currently a global water shortage. However, countries and regions need to work swiftly on an individual basis to manage local issues caused by water stress. The intergovernmental organization emphasized that water must be considered a scarce resource, to place a stronger emphasis on managing demand.
At present, more than 2 billion people reside in countries facing high water stress, according to the UN. Specifically, a territory is considered water-stressed when it withdraws at least 25% of its renewable freshwater resources. Right now, five out of 11 regions are in this predicament — with two in a period of high water stress and one in extreme water stress.
Don’t leave the results of your projects to chance by using unreliable tools. Eco-Rental Solutions offers high-quality equipment at affordable rates. Stop into one of our eight rental locations in New York, Illinois, Missouri, California, or Michigan or request a quote online today! | <urn:uuid:940659c1-6a4a-4a92-9b28-9d2030170f6f> | CC-MAIN-2023-06 | https://eco-rentalsolutions.com/2021/09/20/new-study-finds-humans-control-the-bulk-of-freshwater-ebbs-and-flows/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500028.12/warc/CC-MAIN-20230202133541-20230202163541-00650.warc.gz | en | 0.93695 | 472 | 3.484375 | 3 |
The Ages & Stages Questionnaire (ASQ) is a screening instrument that measures developmental performance in young children aged 1 month-5.5 years. Early childhood educators and healthcare professionals use ASQ to collect information from parents on children’s development in five domains: communication, gross motor skills, fine motor skills, problem solving, and personal-social skills.
The most recent version of ASQ as of 2022 is ASQ-3, the third edition of the instrument. ASQ-3 offers 21 parent/caregiver questionnaires that are used depending on the child's age.
No training required
Access and Use
Prices vary, see publisher’s website.
Contact publisher (Brookes) at https://agesandstages.com/contact-us/
Ahmed, S. M., Mishra, G. D., Moss, K. M., Yang, I. A., Lycett, K., & Knibbs, L. D. (2022). Maternal and childhood ambient air pollution exposure and mental health symptoms and psychomotor development in children: An Australian population-based longitudinal study. Environment International, 158, 107003. https://doi.org/10.1016/j.envint.2021.107003
Sullivan, J., Mei, M., Perfors, A., Wojcik, E., & Frank, M. C. (2022). SAYCam: A large, longitudinal audiovisual dataset recorded from the infant’s perspective. Open Mind, 5, 20-29. https://doi.org/10.1162/opmi_a_00039
Madigan, S., Browne, D., Racine, N., Mori, C., & Tough, S. (2019). Association between screen time and children’s performance on a developmental screening test. JAMA pediatrics, 173(3), 244-250. https//doi.org/10.1001/jamapediatrics.2018.5056
Hornman, J., Kerstjens, J. M., de Winter, A. F., Bos, A. F., & Reijneveld, S. A. (2013). Validity and internal consistency of the Ages and Stages Questionnaire 60-month version and the effect of three scoring methods. Early Human Development, 89(12), 1011-1015. https://doi.org/10.1016/j.earlhumdev.2013.08.016
San Antonio, M. C., Fenick, A. M., Shabanova, V., Leventhal, J. M., & Weitzman, C. C. (2014). Developmental screening using the Ages and Stages Questionnaire: standardized versus real-world conditions. Infants & Young Children, 27(2), 111-119. https//doi.org/10.1097/IYC.0000000000000005
Schonhaut, L., Armijo, I., Schönstedt, M., Alvarez, J., & Cordero, M. (2013). Validity of the Ages and Stages Questionnaires in term and preterm infants. Pediatrics, 131(5), e1468-e1474. https://doi.org/10.1542/peds.2012-3313
Squires, J., Twombly, E., Bricker, D., Potter, L. (2009). ASQ-3™ User's Guide. Brookes Publishing. https://agesandstages.com/
Squires, J., Bricker, D., & Potter, L. (1997). Revision of a parent-completed developmental screening tool: Ages and Stages Questionnaires. Journal of Pediatric Psychology, 22(3), 313-328. https://doi.org/10.1093/jpepsy/22.3.313
Squires, J. K., Potter, L., Bricker, D. D., & Lamorey, S. (1998). Parent-completed developmental questionnaires: Effectiveness with low and middle income parents. Early Childhood Research Quarterly, 13(2), 345-354. https://doi.org/10.1016/S0885-2006(99)80043-X | <urn:uuid:37a7551d-14c0-4068-923e-b325f4f3b9b2> | CC-MAIN-2023-06 | https://edinstruments.com/instruments/ages-and-stages-questionnaire-asq | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500028.12/warc/CC-MAIN-20230202133541-20230202163541-00650.warc.gz | en | 0.670882 | 908 | 2.84375 | 3 |
Reminiscent of Ken Oppel’s Sunwing – a story of bats and their misuse in World War II research – A. T. Balsara’s The Great and the Small also features a laboratory, but in this story the misuse is imposed on rats. Neither bats nor rats are puppies or ponies – both are unlikely heroes to the human population – but in the end our empathy is swayed. In part this is accomplished through the whimsical illustrations that run through the text.
Balsara’s storyline develops in a city market and the tunnels running beneath it, and occasionally the setting shifts to a nearby suburban neighbourhood where humans live and the laboratory exists. The underworld of the city is populated by a colony of rats under the thumb of their leader, the “Beloved Chairman,” who convinces them to spread the bubonic plague anew in retaliation for the cruel treatment of rats caught among market stalls. His curious nephew, Fin, develops doubts about the plan and literally falls into a relationship with a young girl named Ananda. She happens to be bullied at school and she’s the daughter of the laboratory researcher. So the stage is set for adventure, a ratty love story, and rebellion.
This book challenges the usual categories with respect to target audience. In some ways it reminds of Sunwing, and it would appeal to middle grade youth. Books for these readers usually feature adolescent protagonists who face their first big choices. There’s a metaphorical dragon to be slain. As challenges are met, they grow in self-acceptance, confidence and wisdom. As they leave childhood behind, they discover how the larger, unknown world works and find ways to understand the human condition. Since these stories are written to elicit empathy of readers for the protagonists, readers usually learn (if only vicariously) about making choices and succeeding against the odds, and they learn important life-lessons. The Great & the Small reveals Ananda’s responses to bullying and idealism, and it also leads to her self-acceptance and more responsible confidence and actions. Elements of the story appeal to the developmental stage of adolescents.
In other ways, this book suits the young adult (YA) category of readers where the problems faced by protagonists are more complex and often enter challenging areas (such as death) and sexual/love explorations, although Balsara delves more deeply into the former. This is also the developmental stage where youth begin to form logical systems and hypotheses, explore abstract ideas, and focus on possibilities rather than realities. In large part, the story runs along a dual plotline: rat Fin’s for peace and Ananda’s for rebellion against cruelty to the rats. Balsara prefaces chapters with vivid quotes from Stalin’s rule and from the era of the14th century plague. These sombre quotations introduce another element requiring developmental maturity. However, the numerous, finely wrought illustrations counterbalance the dark quotes. The Great & the Small bridges the abilities of both middle and YA readers.
In a radio interview, Balsara said The Great & the Small shares messages of hope, resilience, and perseverance with young people. Its theme – good vs. evil – pits blind obedience against rebellion. And, she suggested she wants to remind readers about dark periods of history from which we can learn.
Balsara has written an ambitious book in which she combines issues relevant to young readers within the larger context of history, a history of cruelty and blind obedience, in which few rebel. From time-to-time, the “lesson” she advances feels too didactic for my taste, but that aside, she has created a moving and heartfelt story in which a young girl stands up for what she believes and a rat who eventually recognizes a painful truth and grows up.
FYI: Book trailer
Available through your local bookstore or online: The Great & the Small | <urn:uuid:d647697e-f8d7-4f34-a7e7-7112b872df08> | CC-MAIN-2023-06 | https://kathrynmacdonald.com/2018/02/06/the-art-of-growing-up-the-great-the-small-written-and-illustrated-by-a-t-balsara/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500028.12/warc/CC-MAIN-20230202133541-20230202163541-00650.warc.gz | en | 0.940529 | 805 | 2.71875 | 3 |
Inventory, lb : 0
Parijoto fruit is small in size and round to oval in shape, growing in large clusters on angular, thick, and fibrous stems. The skin of the fruit is taut, smooth, and ripens from pink to a vibrant red-purple when ripe and the stems are also bright red-pink. In addition to the fruits, the leaves are lanceolate in shape, averaging fifteen centimeters in diameter, and are dark green with a leathery texture and prominent veining. Parijoto fruits are crunchy, soft, and slightly acidic with a sweet and sour, fruity flavor.
Parijoto fruit is available in the fall.
Parijoto fruit, botanically classified as Medinilla speciosa, are tiny fruits that grow on an evergreen shrub that can reach up to one meter in height and belongs to the Melastomataceae family. Also known as Showy Asian grapes, Parijoto plants are found in Southeast Asia, growing throughout dense forests in mountainous regions with slightly cooler climates. There are many different varieties of Parijoto, and these shrubs are highly favored as ornamental plants grown for their brightly colored fruits in home gardens.
Parijoto fruits contain tannins, glycosides, saponins, and flavonoids, which contribute to the fruit’s high anti-inflammatory properties.
Parijoto fruit is predominately consumed raw and can be eaten fresh, out-of-hand, sprinkled over desserts, tossed into fruit and green salads, or muddled and mixed into fruit drinks and cocktails. When young, the fruit is also sometimes coated in vinegar to add flavor. In addition to raw preparations, Parijoto fruit can be cooked and processed into jams and syrups. The leaves of some varieties are also edible and add a sour flavor into stir-fries, curries, soups, and salads. Parijoto fruits should be consumed immediately after harvest for best quality and flavor, and will only keep 1-2 days when stored in the refrigerator.
In Java, Indonesia, Parijoto fruit is believed to be very healing and is used medicinally for its anti-inflammatory and anti-bacterial properties as a remedy for sores and diarrhea. The fruit is traditionally boiled and consumed as a drink and is sometimes mixed with turmeric or ginger for added nutritional benefits. Parijoto fruit is also the subject of mythology in a village near Mount Muria, a dormant volcano on Java. Locals believe eating the medicinal fruit will allow women to become fertile, and if consumed while pregnant, the children will be more beautiful when born. This myth stems from the story of Sunan Muria, a man who was credited with spreading Islam throughout Southeast Asia, and his wife who professed to consuming the fruit and giving birth to a beautiful baby with clear skin.
Parijoto fruit is native to regions across Asia and Southeast Asia and has been growing wild since ancient times. Today the plant is widely cultivated for ornamental use and for its brightly colored fruits. Parijoto fruit can be found at local markets in Java, Borneo, the Philippines, Sumatra, and throughout the Malay Peninsula. | <urn:uuid:7f0666d9-2444-4929-bcad-1f6f547e1dba> | CC-MAIN-2023-06 | https://specialtyproduce.com/produce/tropicalfruits/parijoto_fruit_17775.php | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500028.12/warc/CC-MAIN-20230202133541-20230202163541-00650.warc.gz | en | 0.945384 | 696 | 2.71875 | 3 |
WHEN YOU SEE A GOOD DEED, PUT IN A SEED!
This easy-to-use, colorful app encourages children to look for the good in other people and to see the good deeds that their friends and family are doing. Each time the child sees someone doing a mitzvah or good deed, they choose a seed, record what they saw, and drag it into an empty pomegranate, filling it up with a collection of good deeds that can be saved and viewed at any time. As they fill up the pomegranate with these seeds, they come closer to the concept of “Love your neighbor as yourself”.
The Mitzva Hunt is an opportunity for educators and parents of children in preK -G2 to encourage positive reinforcement of good behaviour and help instill the character trait of looking for good in others. The Hebrew phrase ” v’ahavta l’rayacha kamocha” is a key focus with a catchy song about its meaning and information about its significance in Judaism within the app. This is particularly fitting in the reflective months of Elul and Tishrei where we can encourage the class to try and better themselves. Another fitting time to use this app is in the month of Av during the Three Weeks.
Within the classroom environment educators can use The Mitzvah Hunt with the class on the interactive whiteboard (IWB) or on personal devices. The app will ask you to name each new pomegranate before it can be filled in. The educator can fill in a name for the pomegranate e.g.: Grade 1.
When a mitzvah is spotted, the educator can encourage the children to fill in a seed and drag it to the pomegranate. When the pomegranate is filled, a list of all the people doing mitzvot and who spotted them will be provided for you to download and print for a bulletin board or to give to individuals.
There are educational opportunities within the app where children can learn about sources in the Torah where pomegranates are mentioned and this can be tied in with teaching about customs on Rosh Hashanah and why pomegranates are significant. | <urn:uuid:25e141e4-3b90-4c0d-88fe-e2ed39f2e246> | CC-MAIN-2023-06 | https://www.jewishinteractive.org/ji-products-services/the-ji-collection/mitzvah-hunt/mitzvah-hunt-educator-guide/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500028.12/warc/CC-MAIN-20230202133541-20230202163541-00650.warc.gz | en | 0.939146 | 462 | 3.125 | 3 |
A variety of cybersecurity trends happen to be impacting firms around the world. One of these certainly is the proliferation of ransomware. This type of viruses requires victims to pay off a ransom in order to retrieve their facts. Another is definitely the emergence of cryptocurrencies, which are digital values that use blockchain technology to protect transactions.
Additionally to these cyber threats, you will find governmental endeavours to strengthen the safety https://dokusoftware.com/cybersecurity-trends-in-document-management-software-in-2021/ of connected devices and cloud systems. However , this broad regulatory intervention might not take impact immediately. Until then, corporations must concentrate on cybersecurity health.
The number of security incidents is usually rising quickly. Among the most common triggers are abilities theft, ransomware, lost or perhaps stolen devices, and DDoS. For example , the WannaCry attack impacted 70, 000 medical devices, which includes those used by the Countrywide Health Assistance.
The growth of connected and smart gadgets is also leading to the surge of cyberattacks. These devices cover anything from industrial machinery by appliances and smart wearables. As a result, companies must apply rock-solid cybersecurity infrastructure to defend sensitive info.
In addition , a rapid IT market revolution has made pre-existing applications and devices hard to adapt to. Because of this, cybersecurity teams must be competent to foresee gaps and progress their functions.
Increasingly, nation-states are engaged in cyber-sabotage and cyber-espionage. Their very own goal should be to gain access to company secrets, gain access to data, or perhaps undermine competitive governments.
Cybercrime costs corporations an estimated $12. 5 trillion by 2025. That’s a raise from previous year’s $3 trillion, in fact it is projected to improve even more. | <urn:uuid:0baea2f4-66c4-4aa9-957c-ee76252622b0> | CC-MAIN-2023-06 | https://boherald.com/appearing-cybersecurity-movements/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500158.5/warc/CC-MAIN-20230205000727-20230205030727-00810.warc.gz | en | 0.938606 | 374 | 2.578125 | 3 |
You want: Perform functional annotation and analysis of its potential proteins.
You need: Predict all potential genes or coding regions before proceeding to the functional annotation: Gene-Finding
How can this be done?
- Use Glimmer, a set of algorithms which uses interpolated Markov models to distinguish coding from non-coding DNA in bacteria, archaea, and viruses. Glimmer has been developed at the Center for Computational Biology at Johns Hopkins University, Baltimore, USA which is also the home of tophat, bowtie and cufflinks among others popular bioinformatics tools.
- Use GeneMark, a family of gene prediction programs, which use species-specific inhomogeneous Markov chain models of protein-coding DNA sequence as well as homogeneous Markov chain models of non- coding DNA. GeneMark is developed at Georgia Institute of Technology, Atlanta, Georgia, USA.
- Use Prodigal. Prodigal, which name stands for Prokaryotic Dynamic Programming Genefinding Algorithm is a microbial (bacterial and archaeal) gene finding program developed at Oak Ridge National Laboratory and the University of Tennessee, USA. Prodigal is known to be a very fast gene recognition tool and a highly accurate gene finder which performs well also with high GC content genomes. Prodigal is based on log-likelihood functions and does not use Hidden or Interpolated Markov Models.
A brief review of these gene finding tools:
We describe here a basic review of 3 popular prokaryote gene prediction tools: Glimmer, GeneMark and Prodigal. We performed gene predictions for the Gram-positive bacterium Streptococcus thermophilus. (wikipedia)
We downloaded the complete genome (.fna) from NCBI and used Glimmer, GeneMark and Prodigal for gene prediction.Glimmer and Prodigal have been executed locally, by downloading the programs from their web pages. The exact steps and command used are provided at the end of this article. GeneMark has been executed online and results were obtained by email.
To test the performance in terms of recall and precision we performed a blastn of the predicted genes for each tool against the official genes published at the NCBI. The blast database has been created with the corresponding (.ffn) file. The blastn algorithm has been performed within Blast2GO PRO using LocalBlast.
The following table summarises the results of the three algorithms used to predict the genes of Streptococcus thermophilus.
In addition, the blastn results against the original data from NCBI, that contains 1914 genes, are also provided below.
|# Predicted Genes||1272||2019||1899|
|# Hits (true pos)||1252||1879||1832|
|# No Hits (false pos)||20||140||67|
|Missing Genes (false neg)||662||35||82|
|#Seq < 100% sim||3||17||10|
The official gene prediction (NCBI) contains 1914 sequences. Based on the blastn results with 100% similarity, we recovered 1252 genes with Glimmer, 1879 with GeneMark and 1832 with Prodigal. While Glimmer obtains the highest precision it also shows the lowest recall in this test scenario. GeneMarkS has the best recall with 98.2%. However, the best overall performance has been obtained by Prodical. We believe that the results of all 3 tools could be improved by further fine-tuning of parameters, something we did not consider for this basic evaluation.
Continue to functional annotation in Blast2GO
The obtained fasta file containing the gene predictions can now be used in Blast2GO for the functional annotation. The standard steps here-fore would be blastx against bacteria, InterProScan, perform Gene Ontology mapping and the functional annotation step. The obtained information can now be used for further downstream analysis like the functional enrichment analysis of expression profiles (e.g. obtained via cuffdiff) and pathway analysis.
Popularity of Tools in terms of citations:
Instructions to perform gene predictions with Glimmer, Prodigal and GeneMarkS:
First, we need to download Streptococcus thermophilus genome from NCBI via FTP or Entrez: http://eutils.ncbi.nlm.nih.gov/entrez/eutils/efetch.fcgi?db=nucleotide&id=55821993&rettype=fasta
The predictions have been performed directly on GeneMarks webpage and the results have been retrieved on the email.
- Download Glimmer https://ccb.jhu.edu/software/glimmer/glimmer302b.tar.gz
- Extract Glimmer (see Glimmer notes for more information):
tar xzf glimmer302.tar.gz
- Compile Glimmer
- Build Glimmer index for whole genome. Execute the following command from the bin folder.
./build-icm /path/to/index/output/filename/Prokaryota/Streptococcus/output.icm < /path/to/whole/genome/Prokaryota/Streptococcus/Streptococcus.fasta
- Run Glimmer (percentages for ecoli start codons) – you will rectrieve 2 files .predict and .detail
./glimmer3 --start_codons atg,gtg,ttg --start_probs 0.83,0.14,0.03 --stop_codons tag,tga,taa --gene_len 110 --max_olap 50 /path/to/index/Prokaryota/Streptococcus/output.icm /path/to/output/filename/Prokaryota/Streptococcus/result/strep
- Extract sequences from the .predict file
./extract -d -w /path/to/whole/genome/Prokaryota/Streptococcus/Streptococcus.fasta path/to/predict/filename/Prokaryota/Streptococcus/result.predict > path/to/output/filename/Prokaryota/Streptococcus/strep.fasta
- Download latest version of Prodigal https://github.com/hyattpd/prodigal/releases/
- Change the permissions of the prodigal.linux executable.
chmod 755 prodigal.linux
- Run Prodigal:
./prodigal.linux -i /path/to/whole/genome/Prokaryota/Streptococcus/Streptococcus.fasta /path/to/output/filename/Prokaryota/Streptococcus/prodigal_predicted.fasta | <urn:uuid:b82f1ae8-636e-4a2a-83b6-f64024661227> | CC-MAIN-2023-06 | https://www.biobam.com/genefinding/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500158.5/warc/CC-MAIN-20230205000727-20230205030727-00810.warc.gz | en | 0.78891 | 1,604 | 2.90625 | 3 |
Signed: Ikkaisai Yoshitoshi hitsu and red kiri seal
Fine impression, with extensive use of mica powder on the black background. Fine colour and condition, margins at top sides.
The triptych is one of the most important early works by Yoshitoshi. It depicts a difficult battle from the Taiheiki (Chronicle of Great Peace), a Japanese historical epic written in the late 14th century and covering the period from 1319 to 1367. The book's stories had great popularity in the nineteenth century, when they became the subject of musha-e, prints depicting warriors, drawn by Kuniyoshi and his school. Very often the heroes drawn by ukiyo-e artists referred to those of the most recent events in Japan's unification under the Tokugawa Shogunate, events that could not have been explicitly dealt, to avoid censorship.
A mine explodes in radiating jets of flames, sending samurai tumbling head over heels through the night sky. At right, Masakiyo (who is probably meant to represent the famous general Kato Kiyomasa, 1561-1611) grips the reins as his horse rears in fright, trampling men beneath its hooves. At lower left, another warrior turns his head away from the fire, flinging one hand up in the air while still holding his sword. Yoshitoshi animates the scene even further with gray spirals of wind between the flames, punctuated by the starbursts of exploding shells. A dynamic image with an unusual composition. Although set in the fourteenth century, in fact this is a comment on the recent (spring of 1866) campaign of the Tokugawa Shogun Iemochi. He had temporarily defeated the dissident Choshu samurai who had shelled the Shogun’s palace in Edo in 1864.
Yoshitoshi was one of the last great masters, and one of the great innovative and creative geniuses of the Japanese woodblock print. At the age of eleven, he was enrolled as a student of the school of Kuniyoshi. His early work is full of extremely graphic violence and death, perhaps mirroring the lawlessness and violence of Japan around him, which was simultaneously going through the breakdown of the feudal system imposed by the Tokugawa shoguns, as well as the impact of the West. By 1871, Yoshitoshi became severely depressed. Unable to work, he hardly produced any prints for two years. In 1873 he recovered from his depression and changed his name to Taiso, which means great resurrection. In 1882 he was employed by a newspaper. This gave him a steady income and marked the end of years of poverty. His last years were among his most productive, not only in terms of quantity, but also in terms of artistic quality. In 1885 the first designs of One Hundred Aspects of the Moon were published. This series was extremely popular. In 1888 the series 32 Aspects of Customs and Manners was published, a series of women's prints. In 1889 a new series with ghost subjects came on the market: New Form of 36 Ghosts. The symptoms of mental illness became more and more frequent. Nevertheless Yoshitoshi continued to work. He died in 1892 from a cerebral hemorrhage at the age of 53. | <urn:uuid:f4bfcd92-2127-48c4-b8e5-002c9463dcfb> | CC-MAIN-2023-06 | https://www.stanzadelborgo.it/scheda.php?i=30348d8e16e803c26da22b6b2c7221c5&c=0409269509a4ffb954a9ba95c8a77980&f= | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500158.5/warc/CC-MAIN-20230205000727-20230205030727-00810.warc.gz | en | 0.978948 | 687 | 2.8125 | 3 |
1, 2, 3 Minutes Speech on Earth Day
Hello to everybody!
Today is Earth Day, a day set aside to honour and recognise our planet and all the wonderful things it has to offer.
It’s also a chance to consider how we can save the planet for next generations.
The health of our world can be significantly impacted in a great number of minor ways.
By adopting energy-efficient appliances, cutting back on our driving, and turning off the lights when we leave a room, we can lower the amount of energy we use.
Utilizing reusable containers, bags, and water bottles as well as recycling and composting where feasible will help us cut down on our waste production.
However, it goes beyond one person’s acts.
To solve challenges like climate change, pollution, and habitat degradation, we also need to lobby for change at the policy level.
We can build a more sustainable and healthy planet for everyone if we band together and speak up.
So let’s commemorate Earth Day by pledging to contribute to the preservation and protection of the planet.
Together, we can change things.
5 Minutes Speech on Earth Day
Greetings to all.
Today is Earth Day, a day set aside to honour and save the environment.
We must take care of the world because it is our only home, as is common knowledge.
The land gives us everything we need to live, including the air we breathe, the water we drink, and the food we eat.
But regrettably, humans haven’t always done a good job of taking care of the planet.
We face several difficulties, including habitat destruction, pollution, and climate change.
Although these issues may appear intractable, each of us can make a significant difference by taking little efforts.
For instance, we can lessen our carbon footprint by taking the bus, carpooling, or driving an electric vehicle.
Recycling and composting are additional ways we may cut back on waste.
Additionally, we can help environmental organisations by giving them money or our time, as well as by volunteering.
So let’s observe Earth Day every day.
We take care of ourselves and future generations by taking care of the world.
We can build a more wholesome and sustainable world by working together.
Speeches in English
- Speech on women’s empowerment
- Speech on social media
- Speech on environment
- Speech on gender equality
- Speech on poverty
- Speech on Global Warming
- Speech on Environmental Pollution
- Speech on Earth Day
- Speech on Discipline
- Speech on Human Rights
- Speech on Education
- Motivational speech for students
- 2-minute Self-introduction speech examples
- Speech on Mahatma Gandhi
- Speech on freedom fighters
- Speech on APJ Abdul Kalam
- Speech about friendship
- Speech about Technology
- Speech on Parents
- Speech on Health
- Speech on Doctor
- Speech about Life
- Speech on Health and Hygiene
- Speech on sports
- Speech on Racism
- Speech on Mental health
- Speech on Population
- Speech on Overcoming Fear
- Speech about Family
- Speech on Mobile Phones
- Speech on water conservation
- Speech on Honesty
- Speech on Culture
- Speech on Unity in diversity
- Speech on Peace
- Speech on Time
- Speech on Success
- Speech on Leadership | <urn:uuid:f599ea73-51df-4299-af5b-1c4d03553b7e> | CC-MAIN-2023-06 | https://t4tutorials.com/speech-earth-day/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500334.35/warc/CC-MAIN-20230206082428-20230206112428-00010.warc.gz | en | 0.906629 | 731 | 3.359375 | 3 |
To use all functions of this page, please activate cookies in your browser.
With an accout for my.chemeurope.com you can always see everything at a glance – and you can configure your own website and individual newsletter.
- My watch list
- My saved searches
- My saved topics
- My newsletter
A recuperator is a special purpose counter-flow heat exchanger used to recover waste heat from exhaust gases. In many types of processes, combustion is used to generate heat, and the recuperator serves to recuperate, or reclaim this heat, in order to reuse or recycle it.
Additional recommended knowledge
Recuperators are often used in association with the burner portion of a heat engine, to increase the overall efficiency. For example, in a gas turbine engine, air is compressed, mixed with fuel, which is then burned and used to drive a turbine. The recuperator transfers some of the waste heat in the exhaust to the compressed air, thus preheating it before entering the fuel burner stage. Since the gases have been pre-heated, less fuel is needed to heat the gases up to the turbine inlet temperature. By recovering some of the energy usually lost as waste heat, the recuperator can make a heat engine or gas turbine significantly more efficient.
|This article is licensed under the GNU Free Documentation License. It uses material from the Wikipedia article "Recuperator". A list of authors is available in Wikipedia.| | <urn:uuid:85656f55-43b9-4240-853d-415354ee54f6> | CC-MAIN-2023-06 | https://www.chemeurope.com/en/encyclopedia/Recuperator.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500334.35/warc/CC-MAIN-20230206082428-20230206112428-00010.warc.gz | en | 0.887827 | 321 | 3.609375 | 4 |
Some bettas might eat fruit. The soft, sweet, and easy to digest fruits are safer than the citrusy fruits. However, the betta’s digestive system does not have the ability to break down these fruits, so it is best to keep them out of the tank. Betas can be kept in a wide variety of tanks, but they prefer a medium-sized tank with lots of hiding places.
They can also live in an aquarium with a lot of plants, such as cacti, succulents, or other aquatic plants. The tank should be large enough to allow for plenty of room for the fish to move around and for them to be able to hide from predators. A tank that is too small will not provide enough space for all of your fish.
If you are not sure how big your tank is, you can measure it by using a ruler or measuring tape. Be sure to use the correct size ruler for your species. For example, if you have a blue-ringed octopus, then you should use a 1-1/2-inch ruler, not a 3-3/4 inch ruler.
Can my betta eat grapes?
The betta fish can eat grapes. It’s best to stick to one type of fruit or vegetable at a time, because mixing too many different types of food at once can cause problems for bettas.
If you’re concerned about your fish’s health, check with your veterinarian to make sure it is healthy and not suffering from any other health issues. If it appears to be healthy, you may want to take it to the vet for a check-up.
How can I play with my betta fish?
A tunnel can be found on the bottom of the aquarium. Or float a ping pong ball or other small plastic ball at the surface and see if your betta will push it around!. You can engage in a lot of fun activities with your betta by using your imagination or training.
Can bettas eat fruit?
Bettas love strawberries, apples, pear, mango, melon, and especially cantaloupe. If you give your pet a treat, you can feed the tiny bits of the fruit, but keep it for a while. You shouldn’t give fish any kind of fruit because they can’t digest them.
Bettas can be fed a variety of foods, but the most important thing to keep in mind is that they are carnivores. This means that you should not feed them anything that will cause them to eat more than they need to.
If you want to feed your fish a diet that is high in protein and low in fat, then you will have to make sure that the food you feed to them is a high-protein, low-fat food.
For this reason, it is very important for you to read the labels of all the foods you give your betta to ensure that it contains the right amount of protein, fat and calories for their needs.
Can bettas eat cucumber?
Bettas are predominant carnivorous (insects, larvae) so they will not eat cucumber. It’s not a problem for Guppys to have some vegetables. Cucumbers are a good source of vitamin C:
- Vitamin a
- Vitamin k they are also rich in vitamin b6
- Pantothenic acid
Cucumber juice is also a very important part of a healthy diet.
Can betta fish have toys?
Betta fish do like to explore and interact with toys in their environment. Bettas can be taught tricks by using toys such as ping pong balls and hoops. Bettas are also known to be playful and playful fish.
They love to play in the water and will often play with other fish, even if they don’t know what they are doing. This is a great way to get to know a new fish and learn more about them.
How do you know betta fish is happy?
A happy betta will swim around their tank daily. Sometimes they will move very slowly, and other times they will move very quickly. Your betta is ready for a new tank if it appears to have no trouble swimming and isn’t leaning to the side or struggling. Daily.
Some bettas have a tendency to float around in the tank, but this is not a sign that they are sick or injured. Instead, it means that the fish is in good health and is ready to be moved to a larger tank or a different tank in which it will be able to swim more freely.
Will betta eat shrimp?
Any fish that can eat your cherry shrimp is going to eat it. To limit this, try to buy the biggest shrimp in the shop and avoid males. If you know your betta has a good temperament and you’ve kept shrimp in the past with him, the cherry shrimps won’t be a problem. | <urn:uuid:e9b6a736-4554-444b-8bde-d8c977d7afde> | CC-MAIN-2023-06 | https://www.fishing-advisor.com/can-betta-fish-eat-strawberries/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500334.35/warc/CC-MAIN-20230206082428-20230206112428-00010.warc.gz | en | 0.964595 | 1,088 | 2.625 | 3 |
Education is in need of evolutionary game-changes. There are two important aspects to that simple statement. First, we need evolution, not revolution. Our foundations and traditions are strong, so we don’t need to blow up the walls. What we think of as revolution due to fear of the unknown will present as evolution once we get our hands in the dirt. Second, we need game-changers, people who can and will prompt and champion the big changes.
In his essay in Racer magazine Diego Rodriguez of the design-thinking group IDEO states that innovation requires a group of people with disparate viewpoints who tackle broadly impactful issues, and in doing so inevitably trigger resistance. Schools are not going to get into the mode of true innovation if we cannot look around and quickly find people like these in our organization:
- They bring together disparate ideas. This was my core idea when I first conceptualized The Falconer, heavily influenced by the writings of Hermann Hesse, primarily The Glass Bead Game. The players of this game are archetypical creators, bringing forth new knowledge by weaving together threads from disparate centers. In education, we should look for game-changers amongst those who wear multiple hats, and should model game changing for our students through experiential opportunities that do not have proscribed outcomes.
- They are not narrowly focused on a particular discipline. Game changers have system-wide vision. A real problem in our schools is that silos of department, division, and grade restrict the opportunity for systemic vision for most of our talented employees. If we reserve the expectation and responsibility for game changing to the head of school or the senior leadership team, we are wasting vast human potential for ideas, and narrowing the base of sustainable implementation.
- Their actions trigger resistance. We know this to be true in our schools. It is OK for a teacher to be innovative in his or her own classroom but asking others to change what THEY are doing often meets with stiff resistance. But history and experience show that if an implied change does not trigger resistance, it is probably not going to be a game changer. Leaders need to create an environment where teachers and administrators feel emboldened and comfortable with initiating and dealing with resistance; it is a mark of true progress.
Take a look at what your school is focusing on now and ask these questions: Are we nibbling at the edges or are we considering some real game changers? Are we looking across disciplines for new approaches? Are the questions we ask substantive enough that some feathers are being ruffled (and not just amongst the small percentage of stakeholders who ALWAYS get ruffled feathers)? Who is going to lead the way? The success and sustainability of your innovations will depend on the answer to these questions. | <urn:uuid:3e8bf704-0743-4cdb-a9d5-d0e0a51bac36> | CC-MAIN-2023-06 | https://www.grantlichtman.com/do-you-have-real-game-changers-on-your-team/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500334.35/warc/CC-MAIN-20230206082428-20230206112428-00010.warc.gz | en | 0.95283 | 560 | 2.515625 | 3 |
In Papua New Guinea, today as in the past, most people make their journeys by foot or, if they are in an area of rivers and waterways, by canoe. These simple facts can sometimes be forgotten by those developmentalists and transport planners who seem only to be able to think about capital-intensive projects such as airports and highways when they agonise about the lack of ‘infrastructure’ in the country.
A transport infrastructure does exist in the country. It is an infrastructure of walking tracks and waterways. These tracks go from house to house, from a house to its vegetable garden or plantation, from one cluster of houses to another, and from village to village. Walking tracks connect villages with market places and larger towns. In the towns, walking tracks cut through the back ways to make shorter, more convenient journeys out of longer ones. Out in the country, long-distance trails, leading over mountain ranges between mighty rivers, provided the walking and waterway routes for traders carrying goods between the inland areas and the coast.
Many of the tracks are in daily use. Men, women and children pass sure-footed over the soft or rugged ground. The gradients can be steep. People go to church along these walking tracks. Children go to school. Women are the main load carriers. Always with a bilum, they bring firewood down from the forests, taking produce to and from the gardens. Physical anthropologists have said that women’s skulls can sometimes be distinguished from men’s by a groove at the front, the result of carrying heavy loads. Easing this load could be a main aim of transport planners.
Motor transport and motor roads are not necessarily the best solution.The statistics on car ownership and per capita income suggest that planners should start to think in a different way about road transport – and, indeed, about air transport – in Papua New Guinea. For the foreseeable future, travel in motor vehicles and flights on planes will be only an occasional experience for many of the citizens of this country.
When a road is cut through an area, sometimes on the route of an old walking track, it is engineered for vehicles, not walkers. While the hard surface, unlike tracks, may remain dry after rain, the experience of walking on roads is often more tedious. In fact, anyone walking for any distance on main roads feels alienated and ill at ease, only too aware that they are not riding in a car or truck. Roads can also be dangerous places, full of strangers. The walker may sometimes wish for the clock to be put back.At the same time, the people have transport needs. Their daily journeys pass over streams that need bridges and along tracks that could be improved. Rivers and lakes could benefit from permanent jetties, as well as ferries and taxi canoes. In the islands, more boats would make sense. On flat land, bicycles are an inexpensive form of transport that could be encouraged.
When a new road is the appropriate solution, smaller roads are more desirable as well as cheaper and a network of small roads more desirable still. Highways leading straight to urban centres tend to drain all the young people out of an area as fast as they drain the treasury’s coffers. Networks of local roads would strengthen community links. That would be a truly useful infrastructure. | <urn:uuid:150dcf73-acef-4ac3-9d1f-f83c83411b4b> | CC-MAIN-2023-06 | http://www.destinationpng.com/section-4/ministry-of-transport/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500619.96/warc/CC-MAIN-20230207134453-20230207164453-00090.warc.gz | en | 0.964007 | 672 | 2.71875 | 3 |
Custom «Dante’s Presentation» Essay Paper Sample
Symbolism and allegory have been used in the presentation to aid in a clear understanding of the nature of the Dis city and the nature of characters. In literary work, symbolism is the use of symbols for multiple interpretations while allegory is the direct representation of concepts or ideas with a one on one relationship. “Sea of wisdom…” (Inferno 8, line 7) is symbolically used to represent a person who is more knowledgeable and experienced and offers guidelines to the inexperienced colleague. The narrator refers to his colleague with a conviction that he is fully aware of the response to his queries about their surroundings. “The ancient prow…” (Inferno 8, line 29), is allegorically used to represent an old boat. The author uses “…dogs…” in inferno 8, line 42 to refer to the gatecrashers or those showing up in places they are not invited. The master notes that the people of Dis city have “eternal fire that burns inside them…” (Inferno 8, line, 73). This is meant to warn the narrator that the city dwellers are hostile and inhuman to strangers. They even further refer to their city as “…kingdom of dead…” inferno 8, line 85, wondering how this stranger has managed to penetrate their territory without being killed. The narrator refers to his leader as a master and mentor all through the play meaning his role inter coupled with that of protecting him. He also refers to the snake as the frog’s enemy directly implying that a snake predates frogs. “Pallor cowardice…” (Inferno 9, line 1) represents fear that overwhelmed him.
0 Preparing Orders
0 Active Writers
0% Positive Feedback
0 Support Agents
They were former friends. The two met in Dis and recognized each other due to their earlier relationship on earth. Brunetto was a paternal figure to Dante when he was alive. The man’s soul looks troubled and frail to a point where Dante had difficulty in recognizing him at first. Brunetto is already doomed to eternal pain while Dante is still alive although on a visit to Lucifer’s residence, Dis. He acted as a paternal figure to Dante when he was alive, “the cherished, kind, paternal image of you…” (Inferno 15, Line 83). Their destinations are also different, as that of Dante seems to favor his future while Brunetto is already doomed.
He presents him as an, “emperor of the woeful kingdom…” who inflicted eternal suffering to his followers, for example, Judas Iscariot. Dante could discern his presence even in the darkness that engulfed the Dis due to the wind currents after flapping his featherless wings. He is colossal in size that Dante compares himself to him by saying that he “…is closer to a giant than giants are when measured to his arms…” (Inferno 15, line 31). His physical features are represented as a replica of a creature capable of inflicting sorrow to humanity. His subjects are already undergoing eternal suffering under the hands of merciless Lucifer. This implies that he is remarkably tiny compared to him. Dante describes him as having three faces in one head. The one above was red in color. The other two joined with the red one above midpoint. He drooled blood red saliva and his teeth were, “…just like hackle pounding flax…” that he used to gnaw on his subjects. His presence is that of a king of a woeful kingdom, “The emperor of the woeful kingdom…” (Inferno 34, line 28.) | <urn:uuid:f9eb6234-225c-4695-b539-b3a8d35f1952> | CC-MAIN-2023-06 | https://essays.primewritings.com/book-review/dante-s-presentation.php | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500904.44/warc/CC-MAIN-20230208191211-20230208221211-00170.warc.gz | en | 0.975824 | 788 | 2.734375 | 3 |
Salmon and other fatty fish such as sardines and mackerel are the superstars of heart-healthy foods. That’s because they contain copious amounts of omega-3 fatty acids, shown in studies to lower the risk of arrhythmia irregular heart beat and atherosclerosis plaque build-up in the arteries and decrease triglycerides. The American Heart Association recommends eating fish and preferably fatty fish at least twice a week, but you can also get omegarich fish oils as dietary supplements, though they may not have the DHA and EPA omega-3s specifically found in fatty fish. Oatmeal is high in soluble fiber, which can lower cholesterol. Graf recommends avoiding instant oatmeal, which often contains sugar, and heading instead for old-fashioned or even quick-cooking oats. Not just blueberries, but strawberries and other berries as well. The authors of the study attributed the benefit to compounds known as anthocyanins, flavonoids which are antioxidants that may decrease blood pressure and dilate blood vessels. Anthocyanins give plants their red and blue colors.
Cruciferous vegetable intake is inversely associated with extensive abdominal aortic calcification in elderly women: A cross-sectional study. Once these vegetables are consumed, the phenolic compounds are absorbed and targeted to certain areas of the body or concentrated in the liver, they said. February 17, Frozen and canned vegetables and fruit have about the same nutritional value as fresh. Things that will help you enjoy first-time sex in a better way. Retrieved February 18, from Home Healthy living Healthy eating Vegetables and fruit.
How to teach your kids not to fear failure. Pomegranates contain numerous antioxidants, including heart-promoting polyphenols and anthocyanins which may help stave off hardening of the arteries. Join the Heart Foundation community. Story Source: Materials provided by University of Warwick. It’s not clear where the benefit comes from and the news isn’t necessarily a reason to pick up the habit. Classic and timeless pieces of clothing every woman must own. Allium vegetables, which include garlic and onions, have been shown to reduce inflammation in the body, which in turn lowers the risk of artery hardening. Fresh, peeled beets can be thinly sliced or shredded to add to salads, or blended into smoothies. | <urn:uuid:48f64e70-bb3a-4349-a841-50ea4e71f5fa> | CC-MAIN-2023-06 | https://wekerle100.eu/is-broccoli-allowed-on-a-heart-disease-diet/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500904.44/warc/CC-MAIN-20230208191211-20230208221211-00170.warc.gz | en | 0.945857 | 482 | 2.765625 | 3 |
|Java: The Complete Reference, 12th Edition
This is Herb's most popular book on Java, fully updated and expanded
to cover Java SE 17 (JDK 17).
Whether you're an experienced pro or just starting out, this one-stop
guide will help you master this important language. Inside you'll find comprehensive coverage of the Java language,
its keywords, syntax, and fundamental programming principles. The
book's in-depth discussions examine the full spectrum of the Java
language, from its foundational features (such as data types, operators,
control statements, classes, and interfaces) to its advanced topics
(such as multithreading, annotations, generics, lambda expressions,
and modules). Of course, recent additions to the Java
language, such as records, sealed classes, and switch expressions
are discussed in detail.
This lasting resource also describes key elements of the Java API
library, such as I/O, the Collections Framework, the concurrency
utilities, the stream library, networking, event
handling, AWT, and more. Three chapters provide a solid introduction
to Swing, Java's popular GUI framework. In addition, beans
are examined and servlets are introduced. As an added
bonus, an introduction to JShell, Java's interactive programming
tool, is included.
|Java: A Beginner's Guide, 9th Edition
This is Herb's step-by-step introduction to Java, updated for
Java SE 17 (JDK 17).
If you are just learning Java, then this is the book for you.
It starts at the beginning, explaining the history of Java and why it's
important. You then learn how to obtain the Java Development Kit (JDK)
and write your first Java program.
Next, it's on to the Java fundamentals, including data types,
operators, control statements, classes, objects, and methods.
You'll then progress to more advanced topics, such as inheritance,
exception handling, the I/O system, and multithreading.
Also included is coverage of some of Java's most powerful features,
such as generics, lambda expressions, and the very important
modules feature. A number of recent additions to the Java language, such
as records, sealed classes and switch expressions are also
examined. The final chapter provides an
introduction to Swing, Java's popular GUI framework.. As an added bonus, an
introduction to JShell, Java's interactive programming tool, is included.
|Introducing JavaFX 8
This is Herb's fast-paced,
practical introduction to JavaFX 8 GUI programming. JavaFX is Java's next-generation GUI
The book begins with the fundamentals, including the general form of
a JavaFX program. You then advance to event handling, controls, images,
fonts, layouts, effects, transforms, animation, menus, and more.
Numerous complete examples are included that put key topics and
techniques into action.
Designed for Java programmers, the book's focus is on the JavaFX API
and all examples are written entirely in Java.
Also of interest::
Programming: A Comprehensive Introduction, co-authored with Dale Skrien. It
is part of
McGraw-Hill's College Programming Series. | <urn:uuid:f1f99b10-3802-499c-83f3-7bc317ec5346> | CC-MAIN-2023-06 | https://herbschildt.com/whatsnew.htm | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499654.54/warc/CC-MAIN-20230128184907-20230128214907-00450.warc.gz | en | 0.881037 | 751 | 2.921875 | 3 |
Mucus coming into the mouth after eating is caused by postnasal drip, a sinus condition where mucus drips down the back of your throat because it isn’t able to drain properly out of your nostrils. Postnasal drip after eating can be caused by spices, extreme temperatures in your mouth or a food allergy. If you suspect that you’re allergic to a certain food, you should make an appointment with an allergist for a diagnosis.
Postnasal drip commonly occurs because of increased mucus production in your sinus cavity. Your sinuses are lined with soft tissue and mucus membranes. If you eat a spicy food or go from eating an extremely cold food item to a hot food item, the mucus membranes in your sinuses will produce thin secretions down your throat, according to the American Academy of Otolaryngology. If you notice that you develop mucus in your mouth after you eat when you consume certain foods, you may have a food allergy.
Food Allergy Cause
Food allergies can cause postnasal drip within minutes of eating certain foods. Common food allergies are related to wheat, soy, eggs, peanuts, nuts, fish and dairy, according to the University of Maryland Medical Center. After you eat a food that you’re allergic to, your immune system attempts to fight it off by creating antibodies and other chemicals, such as histamine. The presence of histamine in the sinus tissue causes inflammation, swelling and increased congestion. This causes postnasal drip to form, leading to coughing and bad breath.
If your postnasal drip is due to environmental allergens, treat it by taking an antihistamine to reduce the amount of histamine in the soft tissue in the sinuses. This will help reduce irritation and mucus production. The American Academy of Otolaryngology states that a decongestant will help reduce inflammation in the sinuses, providing the excess mucus with the ability to drain through the nostrils properly. If you’re diagnosed with a food allergy, avoid consuming that food altogether.
Related LeafTv Articles
If the mucus in your mouth after eating is related to a food allergy, you will experience other symptoms, such as asthma, hives, tingling in your mouth and digestive symptoms. A food allergy is a serious medial condition that needs to be under a doctor’s supervision. You should avoid all foods that you’re allergic to in order to prevent further complications.
Diane Marks started her writing career in 2010 and has been in health care administration for more than 30 years. She holds a registered nurse license from Citizens General Hospital School of Nursing, a Bachelor of Arts in health care education from California University of Pennsylvania and a Master of Science in health administration from the University of Pittsburgh. | <urn:uuid:ba55caf5-94c4-40bc-80f7-382e7d75eeec> | CC-MAIN-2023-06 | https://www.leaf.tv/6181674/mucus-in-the-mouth-after-eating/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499654.54/warc/CC-MAIN-20230128184907-20230128214907-00450.warc.gz | en | 0.938779 | 595 | 3.171875 | 3 |
These cost savers are so simple - some may wonder why they aren't already doing it.
Try unplugging your computer and printer when you turn them off. Or even simpler, plug those electronics into a single extension cord with an on and off switch, and switch them off when not in use. That's $30 a year in savings.
"Seventy-five percent of the electricity used to power electronics is consumed when the electronics are turned off," said Sara Lyle, Good Housekeeping.
Moving to the kitchen, switch on your oven light instead of opening the door. That keeps the heat in and your utility bill down.
"Your microwave is much more energy efficient than an electric oven, so if you use it to cook with more often, you can really cut your cooking costs by as much as 25 percent," said Lyle.
Cutting your dryer cycles in half by waiting for a full load will put another $30 in your pocket.
Here's another money saving tip; replacing your showerhead with a new energy efficient model can save you over a $100 a year. | <urn:uuid:83f6e34b-0549-470f-b087-f16d2ff8a409> | CC-MAIN-2023-06 | https://abc7news.com/archive/6365109/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499790.41/warc/CC-MAIN-20230130003215-20230130033215-00530.warc.gz | en | 0.966309 | 227 | 2.546875 | 3 |
This article touches on cultural, linguistic, and technical issues that arise in video recording stories of Deaf individuals who use American Sign Language (ASL). Whether you are Deaf or hearing, documenting ASL interviews presents complex film making challenges. Unlike audio or spoken language filmed interviews, recording a conversation in ASL requires full documentation of a signed message along with careful editing decisions to determine what the viewer sees.
While interviews with Deaf people are often conducted in ASL, the film may be shared with audiences who do not know the language. The end product must be bilingual—meaning two languages, in this case ASL and English—and bimodal—using two modes of expression, visual and auditory or signed and spoken. Captions add text to the presentation. With planning and dedication to access, filmed interviews can effectively reach Deaf and hearing audiences.
For Deaf interviewers fluent in ASL this article may seem to state the obvious; we hope some of the technical information is useful. For hearing interviewers, consider who is on your interview team. Collaboration with Deaf people–cinematographers, editors, Certified Deaf Interpreters (CDIs), production assistants, cultural consultants, and historians will enhance your ability to engage with the interviewee and produce a meaningful interview. With cross-cultural projects, community collaboration is essential to accurate representation. Try to ensure that the interviewee is not the only Deaf person in the room.
What’s in a Name?
Narrative history–or what is often called “oral history”–interviews can raise issues pertinent to the Deaf community or the local geographic area. Conversations can be biographical or focus on a sense of place, patterns of behavior, traditions, or beliefs. In the U.S. Deaf community, the term “narrative” (signed “story”) is sometimes preferred over “oral” because of an enduring history of “oral” education that has powerful, often painful, connotations for many Deaf adults. Historically “oral” education meant learning without signing, the visual/tactile means of communication used by the Deaf community. To be caught signing in an oral-only school usually resulted in punishment. Using “narrative” or “story” history to describe the interview sidesteps an unintended reference to oralism that may be brought to mind with the word “oral” and can help build rapport with the interviewee. Before reaching out to a Deaf individual to discuss an interview, consider how phrases such as “oral history” or “give voice to” might be taken.
What Are You Trying to Do?
Consider the purpose of your interview because it will guide how you document the discussion. Are you trying to enlighten history via documenting an event or locality and interviews with Deaf people are part of a more expansive effort that includes interviews with hearing people? Are you trying to understand a social “ism” (racism, sexism) via a Deaf lens? Are you trying to get at what is specifically Deaf? Deaf stories often reveal what it means to be part of an embedded community. They might explain how technology impacts life, or how medical science has changed the Deaf physical or cultural experience. The intersectional nature of Deaf lives is often expressed in stories about religion, race, gender and gender identity, or immigration circumstances. Childhood memories reveal how communication happened within a family that did–or did not–sign and how that affected the way a child felt at home. Members of the Deaf community, like members of many communities, use stories to amuse, instruct, reinforce shared values, show solidarity, and challenge stereotypes. Unless you have unlimited time and filmmaking resources, define the purpose of the interview and narrow the scope.
Documentaries are often peppered with expert interviews, usually with people who have written extensively on a subject and bring a well-known perspective. Their answers can be polished and, for the filmmaker, predictable. This is unlikely to be the case with most members of the Deaf community. Rarely is there primary source writing from or about the individual. Without sources, it’s difficult to know if the individual will tell a story that is relevant to the research at hand. Fortunately, learning a Deaf person’s basic story is often quite easy by reaching out to community members. The Deaf community is small and interconnected through schools, clubs, and organizations. One person leads to the next, and before long a list of proposed interviews grows to multiple pages.
Pre-interview discussions can be done in person or via videophone. Relay services can interpret the call if you do not know ASL, but it may be more effective to work with a consistent interpreter or a Deaf team member for direct communication. Video conferencing is another way to have a pre-interview discussion when you describe what you are doing and why, how long it will take, and who will be in the room. Discuss topics but not specific questions if you can avoid it. Gather years they attended a school or were a member of an organization or other data that will help you formulate interview questions but don’t venture into their stories. Ask if they have any photos or footage they wish to share, and determine if the questions you plan to ask are germane. An excellent resource for preparing to interview is the Oral History Association’s Principles and Best Practices webpage. Although these guidelines primarily address audio recordings, the concepts of ethical behavior and intellectual honesty are the same, as is the responsibility to ensure preservation of the interview.
A crucial pre-interview component is determining language preference and comfort with the interviewer. Deaf people use a wide range of signing styles. Some sign ASL with all the grammatical features of the language. Others use sign in English sentence structure. Some use their voice. It is important to ensure that the interviewee is comfortable with the interviewer. Can the interviewer match the language used by the interviewee? If not, the danger is that the interviewee may “code switch” to fit the interviewer or the interpreter. Ideally, the interviewer or interpreter will know local signs as well as the history and geography of the area.
Interviewees may be more at ease with someone who is also Deaf, or the same gender or race, but this is not always the case. Familiarity comes with its own issues. Interviewers who are part of the Deaf community will be asked their story. Who are your parents? What is your connection to the school or organization? Be sure to provide time for the interviewee to get to know the background of people in the room, including the interpreters. Community membership raises questions of privacy. It may also raise expectations that you will help the interviewee, their family, or the local community in a specific way, or that this new connection will be open-ended. It is important to be clear about what you can and cannot do, who this interview may help, and how.
During the pre-interview, describe any “Informed Consent” or “Video Release” documents that will require the interviewee’s signature. Provide any documents used by your organization in written and, if possible, ASL formats prior to the interview. Consent documents generally cover what the individual is asked to do, how long it will take, whether they will be paid, language used, risks and benefits, confidentiality, voluntary participation, results of the interview, and how to contact the researcher. Video release forms cover confidentiality and storage of the filmed interview, as well as access and dissemination limits. Most institutions have standard release forms.
Interviewing Deaf people in ASL in many ways is like interviewing hearing people. Open-ended questions that start with “why, how, where, tell me about” lead to stories. But ASL has a cinematic quality so occasionally asking “show me” will produce an evocative story. For example, when asking to be shown how a linotype print machine works, the detail and visual representation in the answer can feel real and take you to the print room. Hands lightly tap keys; metal type slides into slots for placement; hot lead is pressed, cooled, and dropped for a composer to place and quickly proofread reversed lines of type while discerning minute adjustments needed in a line; the page is “locked up” and sent for imprint and the whole process starts over when the lead is fed to be melted and reused. In ASL you can see this process, not imagine it from a description. Think in advance about what questions you can start with “show me.”
In ASL it may be more effective to establish the topic and then ask for comment about it. While you want open-ended questions that do not lead the interviewee, it is important to be clear, even blunt, in asking. Usually in narrative history, interviewers try not to give selections, but sometimes options clarify. For instance, “how did you communicate” might be too broad. If you are trying to determine if someone signed or spoke you may want to ask how they communicated with teachers–and then with students. You might ask about the school’s signing policy. If that does not work you might ask if students signed or spoke or used fingerspelling. You might break that question up for use in class, out of class, or on the sly.
Listening in ASL comes with a constant exchange that confirms a message is received. The person “talking” looks at the one “listening,” who is usually nodding–not in agreement but in understanding. As with any interview, listen intently. That means watching, and if you are listening to an interpreter, keep your eyes on the signer. Focus on the answer and avoid thinking about the next question. Wait longer than is typical in an everyday conversation before moving on. A follow up might be a facial expression–eyebrows up or a head tilt that asks for clarification or expansion on a topic. Sometimes the statement after a long pause is the most revealing. Don’t rush.
Questions will vary based on the individual and discoveries made during research. If the interview is biographical there are some common experiences that could be discussed. Answers to questions about childhood memories, language used at home, school experiences, organizational membership, work life, barriers to information and employment opportunities, and technology use will likely reveal common Deaf community threads.
There are questions that would only be asked of members of the Deaf signing community. How did you get your sign name? What do you think of it? What are the city or regional signs that outsiders do not generally know? What is a Deaf joke? Can you can share one? What does the “Deaf grapevine” mean to you? How did you learn to sign? Were there times when you were forbidden to sign? What happened if you did? What kinds of technology do you use in your home today? Can you tell me about getting that technology? What did it change for you? Can you describe any efforts to medically “cure” or religiously “heal” you? Show me what that was like. As with any interview, ask if there is anything else they want to share.
The majority of Deaf children are born to hearing parents and are the only Deaf person in their family. Being Deaf will often affect communication, language use, and identity. Deaf children may learn language and Deaf identity outside their family. Questions about family often conjure up deeply felt responses if the family home was not a place where communication was comfortable and clear. For more on cultural identity read Inside Deaf Culture, by Carol Padden and Tom Humphries (2005), or see the online Deaf Studies Digital Journal (Gallaudet University Department of ASL and Deaf Studies 2009). If the Deaf community is unfamiliar to you, be self-aware of your assumptions and bias about what it means to be Deaf, and, conversely, what it means to be hearing.
In any small community there may be dangers in being interviewed. The Deaf community is interconnected not just within close geographic areas, but nationally. It may be impossible to give any detail without someone figuring out who you are talking about during the interview. If the interviewer knows the family or friends of the interviewee there may be another layer of concern for privacy. Finally, if the interview is being conducted in a public space, a Deaf club or a school, others may see what is being signed, even at a distance. There is no privacy in public spaces. All these factors will affect how much an individual chooses to share, and it is critical that they understand exactly how their interview will be used, stored, shared, or protected.
Clarity of Visual Image
On screen, what’s behind the interviewee can distract from the signed message. It’s not necessary to have a blank wall or green screen. Context helps the viewer understand who this person is and what their life is like. But backgrounds for filming need to be plain or blurred enough to allow viewers to focus on the signed message. Take time to look at what’s going on in the space behind the interviewee. If a clock, lamp, or hanging mobile catches your eye, ask if you can move it. Try to pull the individual away from any wall to add depth to the visual image. Avoid harsh light or shadows. For seated interviewees, use a chair without arms that does not rock, swivel, or squeak.
Clothing should be a solid color that contrasts with the skin tone of the individual on camera. Explain this to interviewees and ask that they wear solid colors. Nail polish can be distracting and pointing this out may compel some to remove it for an interview. Jewelry is best kept simple; necklaces can be distracting. Minimize anything that diverts attention from the content of the interview.
Test camera settings to ensure you are capturing the complete message. Is the fingerspelling clear? Rapid movement of the hands can look blurry if the lighting and camera settings are out of sync. While the focus is on the face, without clear fingerspelling you will not have an understandable interview. Do the hands extend past the frame? If so, widen the shot. Check settings while preparing for the interview, on site and with the lighting you plan to use.
Light the Dominant Hand
In ASL the dominant hand is the one used to fingerspell. This hand also does more of the movement for many signs. Lighting the dominant hand more prevents shadows from impeding readability. There is more than one way to do this, but use the image below as a guide. Notice that the person is not sitting in the middle of the camera shot, but slightly off to the side. Shoulders are at an angle to the camera. More light is shining onto the hand that fingerspells words. Slightly more space is on the side of the dominant hand. This format gives the interviewee room for large signs that extend past the body. It also creates a more interesting visual image than sitting precisely in the middle of the screen with shoulders square to the camera.
One Camera? Two? Three?
Depending on your crew, budget, and proposed use of the film, there are several ways to set up cameras. First determine if you want or need the interviewer and/or an interpreter on camera. Two people on in one shot can make viewing more difficult, especially on a small phone screen. Is seeing the interaction between two people important? Can you show the question in text form, or do you need it at all? Can you use two cameras and cutaway in the editing process? Do you need that extra camera to capture extreme close-ups that more clearly show emotion? How the footage will be used guides decisions on camera set up.
The simplest format is using one camera solely on the interviewee, or one camera with both interviewee and interviewer sitting together. A good example can be seen in the Council de Manos Know Your Story collection. In the shot, Carlos Aponte-Salcedo, Jr., is interviewing his father as they sit on the same couch about growing up in Puerto Rico and moving to New York City. This format requires minimal editing, but it means capturing a wider shot than with one individual. It can be more difficult to light but gives a better sense of personal relationship and interaction. It’s possible to use a smartphone to capture this format. Be sure to turn off the autofocus feature, as it adjusts when hands and arms move closer to the camera. Keep the focus on the face. Give screen space to the arms and torso, as that is where signing usually occurs. Since people sign at differing visual volume, ask the interviewee(s) to sign so that the cinematographer can set the camera width.
With two cameras both the interviewee and interviewer can be filmed, or one camera can be set on the interviewee and the second used for close-ups. The interviewer often sits close to the camera, just to the side. There are different perspectives on where the interviewee should be looking. It is possible to have the interviewee look almost directly into the camera, or be nearly in profile. Thinking about gaze ahead of time will help determine how to position the interviewee. Three cameras can allow for one camera on each person with a third taking in the wide shot. This provides editing options but also creates what can be an overwhelming amount of footage to process. The beauty of using three cameras is flexibility, but it requires significant editing time.
If your interview involves walking or other ethnographic context that requires movement, see the MobileDeaf website. MobileDeaf is an international group of researchers documenting the many ways Deaf people connect across national and linguistic boundaries. See how they use two cameras in their story “Anthropologists and Filmmakers Making Deaf Ethnographic Films” to capture dialogue. Note how one cameraperson might occasionally appear on the screen.
Several considerations go into determining what, if any, sound should be recorded. How will the sound be used? Who is the audience? If you are planning to add voiceovers, what sound can remain? Does the interviewee or interviewer speak while signing? Are there important soundscapes to record? Is ambient noise of kids playing outside or traffic important? Is there a historically significant sound such as teletype keystrokes? Is laughter important? Do you want to capture the sound of hands slapping while signing? If you plan to record sound, how will you do it without intruding on the signing of the interviewee? How you capture sound will depend on how you plan to use it and how the individuals use their voices. If sound is critical, a boom microphone might be the least visually intrusive, but it prompts questions about why sound is being recorded at all. Be prepared to answer that question.
Access to the interview cannot be an afterthought. Who will be able to watch or listen to the interview? Who won’t? Decisions about access must be made up front as they influence shooting. Will you add captions or subtitles? Captions can be “open” (always on) or “closed,” meaning they can be switched on or off. Captions run on specific lines in the lower third of the screen. They cannot be moved. Captions typically show spoken words along with background sounds or references to music. Subtitles or on-screen text are not locked into a location. Placing them in a corner or across the top or extending from a hand is possible. This takes much longer to do but allows for some creative solutions. The Deaf Jam documentary uses placed text on screen innovatively.
Voiceovers make the interview accessible to non-signing hearing viewers and blind people. They add depth and tone in ways a caption cannot. A skilled interpreter or actor can “voice” the signed message. You may want to try and match the gender or regional accent of the voice actor to the interviewee. For hearing people who do not know sign, watching a Deaf person sign on screen and listening to a disembodied voice can be confusing. Adding a voice that seems to fit the image they see can help. It also clarifies who is talking for blind individuals.
Audio description is an added access feature that briefly, in between statements, tells blind viewers what is seen on screen. Professionals in this field must succinctly describe visual information. Posting a Word document of the script merged with text from the audio description will help make the entire interview accessible to DeafBlind individuals who use a refreshable braille display.
Editing forms a cohesive presentation of the story for all audiences. A Deaf editor or consultant can help make decisions on when and how to cut from one clip to another. For example, a frequent technique is slowing down the lead-in sign for clarity or ending sign for emphasis. Making that type of decision requires language fluency and cultural knowledge.
Working with Interpreters
Film production in any two languages is complex. An interpreter creates an insider/outsider dynamic. The interpreting process, no matter how expert the interpreter, alters the experience. There is lag time between each statement. There is lack of eye contact that can cause an emotional disconnect. There are turn-taking issues.
Bilingual documentary film production requires careful teamwork and modification of standard interpreting practices. A major concern for dual language production is loss of fluent ASL when interviewees switch to a more English-based signing, perhaps in response to the interpreter’s language or because the Deaf person is more confident in the interpretation if they sign in English grammatical structure. This will always be a challenge when you have a two-language conversation. The best way to address it is by building a strong team, often including CDIs working alongside certified hearing interpreters.
Interpreters in documentary film production surrender a critical tool–the ability to interrupt to clarify the message. While the camera is rolling, the interpreter is asked not to interrupt when a story is being signed or an extended answer given, even if a portion of the story is not understood. Rather than disrupt a story that cannot be recreated, it is better to wait until there is a pause and then ask for clarification. This requires interpreter(s) and the interviewer to collaborate closely.
Interpreting is an exceedingly complex task and omissions, misreadings, or insertions can occur. Since one interview answer often leads to the next question, the discussion may veer in a direction based on false understandings. Numerous challenges exist when filming or editing an accessible, signed interview or film, such as:
Absent reference. In ASL, a signer may point to a person or set up a place and then refer back to it with a point–similar to saying “he, she, it,” or “that place.” Often the interpreter rightly fills in the referenced person or place. What you then see on tape is the reference to a space, and what you hear interpreted is the specific name of the place or person. A signing editor would know that it is unclear for a Deaf audience. A non-signing editor would know only what they hear.
Place holding and turn taking. Deaf and hearing people hold onto control of the conversation differently and proficient interpreters adeptly negotiate that territory. Deaf people hold the floor visually; hearing people are usually only quiet until they hear a slight pause in the conversational flow. While “voicing” from ASL to English, skilled interpreters hold the hearing person’s attention and prevent interruptions until they can see and voice the full message. They do this in a few ways, most commonly by extension of a word–stretching it out. They may insert the word “aannd” to let the non-signer know that it’s not yet their turn. Understanding Deaf cultural turn-taking etiquette improves the flow of the interview.
Flat tone and decisions based on sound. Often a preliminary interview without cameras is when to determine if the individual would be a good interviewee and engaging on camera. If the interpreter has a flat tone, even if they accurately present the content, it may influence a non-signing interviewer/filmmaker not to include that person in a taped interview. This might happen simply because of the interpreter’s tone or a Deaf individual’s lack of confidence in the interpreter’s voicing, which can slow the pace and flow and make them seem halting and less compelling.
Distracting additions. Some interpreters use colloquialisms or include their own speech habits in voicing. Overuse of the word “like” or “like, you know” or even “like you know, oh my God” might find their way into an interpretation out of habit, not because it was signed.
Edits and selects based on transcripts. Once the signed interview is completed, if transcripts are needed they are typed either from the interpreter’s “voicing,” or transliterated (sign to text without spoken form) from the signer’s statement. Depending on the production team, the transcript rather than the footage may be the basis for film editors to make selects. A skilled bilingual production team makes a tremendous difference in the reliability of the end product.
Voiceovers. Some interpreters sound great; their language flows, but it does not match the signed message. Other interpreters might have a distracting accent or mumbling voice, but they provide complete and accurate information. At times interpreters accurately convey the message in content, tone, and even accent. Once an interview is filmed and the editors are working on using portions of it, they may pull in professional voice actors to restate what the interpreter said. The actors can delete the “uhs” and “mms.” They can add vocal depth and interest. While this adds nothing for the Deaf audience, for hearing people it may make the difference between watching and channel surfing. There are a few dangers. Actors follow a script that may not have comparable emphasis to the signer. For example, “Deaf people started staying home instead of going to the clubs because they could watch captioned videos and TV. It was good! But I missed the fellowship.” Or “It was good… but I missed the fellowship!” The statement could be read in two completely different ways. One suggests the loss of fellowship was regrettable, the other devastating.
Forming a qualified team can ensure accurate interpretation. If possible, hire the same team for pre-interviews, interviews, and editing. There is much more to working with interpreters than can be conveyed in this article. For further information see the Registry of Interpreters for the Deaf website.
Care for the filmed interview should be resolved before the camera rolls. How will it be stored? Where will it live? In what format? Will transcripts be searchable? Who will have access? How will the community know it exists? Consider how you will create an edited, accessible, and, if consent is given, publicly available version of the interview.
Film is the only way to show sign and ASL accounts of Deaf life. Interviews can bring little-known stories to the public and enlighten viewers. They can empower individuals and bolster community. There is always an urgency in conducting interviews. People pass on, memories fade. Times change and community life of the past is no longer the reality of today. If a Deaf person agrees to an interview, take time beforehand to consider carefully how you can collaborate with others, particularly Deaf people, to document their stories accurately, and how that recording can live on.
Jean Lindquist Bergey is Associate Director of the Drs. John S. & Betty J. Schuchman Deaf Documentary Center at Gallaudet University in Washington, DC. Bergey, who is hearing, has been a curator, author, and director of multiple documentary projects.
Zilvinas Paludnevicius is a filmmaker with extensive experience filming and editing dialogue in American Sign Language. He taught ASL film production at Gallaudet University and many concepts in this article draw on his course materials. Paludnevicius, who is Deaf, is based in Salt Lake City.
All photos by Jean Bergey unless otherwise noted.
Padden, Carol and Tom Humphries. 2005. Inside Deaf Culture. Cambridge, MA: Harvard University Press.
Gallaudet University ASL and Deaf Studies Department. 2009. Deaf Studies Digital Journal, http://dsdj.gallaudet.edu.
Oral History Association, Principles and Best Practices: https://www.oralhistory.org/about/principles-and-practices-revised-2009
Drs. John S. & Betty J. Schuchman Deaf Documentary Center: www.gallaudet.edu/drs-john-s-and-betty-j-schuchman-deaf-documentary-center
Council de Manos Know Your Story Interview: https://www.youtube.com/watch?v=XJH1hZ15cJ8&feature=youtu.be
Mobile Deaf: https://mobiledeaf.org.uk
Deaf Jam trailer: https://www.youtube.com/watch?v=muEIiErm0J4
Registry of Interpreters for the Deaf: https://rid.org | <urn:uuid:d32deb12-69c4-4a71-9d5d-e0f00f2e1dbe> | CC-MAIN-2023-06 | https://jfepublications.org/article/filming-deaf-stories/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499790.41/warc/CC-MAIN-20230130003215-20230130033215-00530.warc.gz | en | 0.936129 | 6,178 | 3.265625 | 3 |
Vector data consists of potentially linked points defined by coordinates that can form complex geometries with assigned attributes.
Vector data model
In a Cartesian coordinate system, which is necessary for the representation of a Euclidean geometry, arbitrarily complex spatial structures for the modelling of geoobjects can be constructed starting from the most basic element: a single point.
If there is more than one point – or node in topological notation – in the coordinate system we can connect these points by a line or a linestring, which is topologically called an edge.
If more than two points are connected by an edge and a closed surface arises, we speak of a polygon or topologically of a mesh. In the context of spatial data and Geographic Information Systems, nodes are usually referred to as points, non-closed connections of edges as lines, and meshes as polygons.
- More detailed information for vector data can be found at Geocomputation with R - Vector data. | <urn:uuid:13d9cc58-c20b-4976-9aac-b924178f3094> | CC-MAIN-2023-06 | https://geomoer.github.io/moer-bsc-project-seminar-SDM/unit03/unit03-02_vector_data.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499845.10/warc/CC-MAIN-20230131055533-20230131085533-00610.warc.gz | en | 0.928123 | 201 | 3.78125 | 4 |
Pharmacists are caring for more individuals of diverse age, gender, race, ethnicity, socioeconomic status, religion, sexual orientation, and health beliefs than in previous decades. Not all residents of the United States equally experience long life spans and good health. Health disparities in various cultures have been documented. One critical aspect of reducing health disparities is moving health care providers, staff, administrators, and practices toward increased cultural competence and proficiency. Effective delivery of culturally and linguistically appropriate service in cross-cultural settings is identified as cultural competence. Culture is a dynamic process, with people moving in and out of various cultures throughout their lives. The failure to understand and respect individuals and their cultures could impede pharmaceutical care. Incongruent beliefs and expectations between the patient and pharmacist could lead to misunderstandings, confusion, and ultimately to drug misadventures. Models and frameworks have been developed that provide descriptions of the process by which individuals, practice settings, and organizations can become culturally competent and proficient. This article, the first in a five-part series, presents an overview of issues related to cultural competence in health care with an emphasis on the pharmacy profession. Also provided are definitions for cultural competence and related terms, a brief overview of health disparities and challenges to the common morality, and a discussion of models and frameworks that describe pathways to cultural competence and proficiency. | <urn:uuid:24df46cb-c01f-414d-8523-f793a7d8a431> | CC-MAIN-2023-06 | https://pubmed.ncbi.nlm.nih.gov/17594213/?dopt=Abstract | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499934.48/warc/CC-MAIN-20230201112816-20230201142816-00690.warc.gz | en | 0.933755 | 268 | 3.34375 | 3 |
Yum! There is nothing better than the taste of produce you grew in your own organic garden. There is just something about it! Maybe it is the sense of accomplishment! Or, just the fact that the tomato taste like a tomato! Needless to say, it is an accomplishment because not all gardens produce. Following are some handy tips and tricks to help your garden be a success!
Divide large clumps of perennials. Some perennial plants lose vigor and flower less well if the clump becomes too large. Plants like Shasta daisies, bearded irises, phlox, chrysanthemum and coneflower benefit from being divided every three years. Without division they become congested, and the center of the clump will begin to die out. Simply dig the entire plant out, keeping the root ball intact, and divide it into pieces using a shovel. By doing this, you will have at least two or three new plants!
A useful solution to keep pests like bugs and flying insects away from your garden is to put basil, garlic or parsley plants as trim plants around your garden. These plants have the ability to deter pests, while still being quite useful in your kitchen! If a splash of color is more your style, marigolds have a similar effect.
Always read the product label before using garden chemicals and store the chemicals in a safe place out of the reach of children and pets. Garden chemicals like pesticides and fertilizers can be very toxic to humans, so make sure you are aware of any extra precautions you need to take when using, storing and disposing of the products.
Recycled newspaper can be used in the garden. Newspapers are an eco-friendly addition to your garden that can keep weeds at bay and help your soil retain important moisture. Simply wet some newspaper, and place it around the bases of your garden plants. Sprinkle with soil to ensure the paper does not blow away. It will smother any weed seedlings trying to emerge and help the soil hold onto its moisture.
Use groundcover to fill in bare areas of soil. Groundcover plants are very effective for ‘tying’ larger plants together and keeping weeds to a minimum. The earth needs to be well-cultivated, weeded and well-fertilized before you plant anything. In order for the plant to become well established, water thoroughly during dry spells and remove any weeds that may pop up. Fast growing groundcover plants include creeping thyme, sedum, ajuga, golden oregano, heuchera, lamium and vinca.
Composting for organic gardening reduces the need for fertilizers, is a form of herbicide, can help prevent plant diseases and helps impact the environment in positive ways. Composting is a source of nutrition for insects, helps with soil erosion and reduces waste sent to landfills. It is wonderful for the health of the environment in general.
It is important to drink water when gardening. You will be out in the sun and it is very easy to get dehydrated very quickly. You can easily take a water bottle out to your garden with you so that you have the water on hand to sip on throughout the day.
To be most efficient in your gardening, always keep your tools close at hand. You have several options including using a bucket to hold your tools or wearing pants with lots of sturdy pockets. You should always have your gloves, pruning shears and a trowel close to you.
You need to make sure you are very efficient when working in your organic garden. You do not have the time to spend an hour looking for each tool you need. Organize the tools you will need before you head to the garden, and put every item away when you finish your work. If you use lots of tools, consider using a tool belt or even just some pants that have lots of pockets.
Use mulch to fertilize your beds. You have to make sure you spread mulch evenly, as you need a certain quantity and do not want to waste any of it. Sprinkle mulch as best as you can and use a rack to spread it flatly and evenly. Make sure you cover all the areas that need it.
Variety makes for a better compost pile. By using a wide variety of materials in your compost pile, you are providing a better pH balance, more nutrients and microbial organisms. Shred materials when possible, as smaller particles decompose much faster, but having a few larger materials in there helps to improve the aeration. For the best results, don’t add any more materials once the composting process has begun.
Organic gardening means trying to grow plants as naturally as possible without the use of chemicals. So when the time comes to kill harmful, plant-eating insects, try planting a few flowers in your vegetable garden. The flowers will attract beneficial insects that naturally kill the harmful ones. These beneficial insects perform other valuable services like pollination as well as pest control.
Organic gardening is a relaxing hobby that will give you a great sense of satisfaction. When you do this type of gardening, you will start to have a good idea of the whole process of planting from start to finish.
When planting your tomatoes in your organic garden, you should always make sure that you stake the tomato plants as high as you possibly can when you are transplanting them. The reason is because doing this will eliminate the roots of the plants from being damaged during the transplanting process.
Stay out of your garden after it has rained or whenever it is wet. Diseases and bacteria thrive and spread more easily in damp environments. Bacteria can easily attach to your shoes as you walk through the wet garden and be transferred from plant to plant. Instead, wait until the soil is dry to enter your garden.
Hopefully, the above tips and tricks will help you to make a success of your organic garden! There is nothing like the taste of produce you grew in your own garden. Can you taste the tomato now? Wow! You should be proud of what you accomplish! Apply the information that best suits your circumstances and tastes! Enjoy your produce! | <urn:uuid:0b7008b2-c7dc-45d9-9bfe-f6a78eea02b1> | CC-MAIN-2023-06 | https://stocall.com/2022/06/15/the-secret-to-successful-gardening-is-finally-within-your-reach/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499934.48/warc/CC-MAIN-20230201112816-20230201142816-00690.warc.gz | en | 0.951691 | 1,262 | 2.640625 | 3 |
This is indeed an important topic for nursing practice. It is difficult if not impossible to separate out physical injury from the psychological effects that can occur. One of the developing issues in pediatric nursing is that the constructs used in work with child psychopathology have been derived from examination of how the illness develops and affects adults. It is important, however to differentiate between the diagnostic formulation of any mental illness in adults form the situation in children.
This is particularly so for PTSD as questions arise about the validity of the diagnostic formulation of PTSD in children. PTSD is an anxiety disorder that can result from exposure to events that can be physically threatening. These events can include physical or sexual abuse, torture, severe motor vehicle accidents, war exposure, being kidnapped or taken hostage, terrorist attack, natural or man-made disasters, community violence, or being diagnosed with a life-threatening illnesses (e. g. , cancer). Many of these seem to be increasing threats for children today.
This study by Meiser-Stedman et al (2008) examined the diagnosis of pre-school and elementary school children exposed to motor vehicle accidents. Their emphasis was on accurate diagnosis of PTSD in children. Three main points presented were how to modify the diagnosis for young children, how psychopathology is best detected at an early stage and how to make use of multiple informants. The study was a longitudinal assessment of preschool and elementary school children who were exposed to a traumatic event.
The participants were 114 children, aged 2- 10, from three emergency departments in London, England. They were all from low socioeconomic boroughs that had experienced a motor vehicle accident. The measures used included structured interviews completed by the children and their parents or caregivers at initial stage and at 6-month follow-up. The parents completed the PTSD semi-structured interview and Observational Record for Infants and Young Children. They also completed the Anxiety Disorder Interview Schedule – Child and Parent Version.
The important results of the study were that the percentage of children meeting the criteria for a diagnosis of PTSD based on the alternative algorithm criteria was higher than with the DSM-IV diagnosis, and that the combined report of child (7- 10 years) and parent was more reliable in predicting post-traumatic psychopathology than the report of parent alone. The study demonstrated for the first time that a significant degree of psychopathology persists over the first six months of post trauma in young children.
Secondly the results implied that when only one informant is available clinically significant cases are overlooked. The study emphasizes the growing consensus that many adult psychiatric disorders have origins in childhood and adolescence. Therefore it is becoming more important to be able to accurately diagnose psychopathology in children, even at preschool level. There is a need therefore to develop valid and reliable diagnostic criteria for these age groups. Pediatric nurses can benefit from this information.
Perhaps the fundamental issue is the relationship between physical pain and psychological effects; and therefore how psychological effects follow from such physical trauma such as fractures and burns and how these psychological effects can contribute to the development of PTSD in children. Not enough is known about the normal range of acute psychological responses in children to traumatic physical injury so this research is significant. There are possibilities that aggressive pharmacological pain management during hospitalization and care of children can help to reduce the likelihood of the later development of PTSD.
Nurses can assess for a history of pain and trauma and for early predictors of PTSD, even in emergency room. Nurses can also follow up after the injury to ask about behavioral symptoms that may be developing that will help with intervention and prevention of PTSD later on. Reference Meiser-Stedman, R. , Smith, P. , Glucksman, E. Yule, W. & Dalgliesh, T. (2008). The Posttraumatic Stress Disorder Diagnosis in Preschool- and Elementary School –age children exposed to motor vehicle accidents. The American Journal of Psychiatry, 165 (10) pp: 1326- 1337 | <urn:uuid:b1880395-03f7-4a5f-8288-cdeba7036eec> | CC-MAIN-2023-06 | https://nmmra.org/post-traumatic-stress-disorder-in-children/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500035.14/warc/CC-MAIN-20230202165041-20230202195041-00770.warc.gz | en | 0.959483 | 798 | 2.984375 | 3 |
Our learning this week has been focused on health and wellbeing as part of Health Week.
Primary 6 put lots of effort into preparing for Sports Day and their hard work paid off. Well done to everyone for their participation in the lead up to sports day and on the day.
We were lucky enough to get a ‘Relax Kids’ session where we practised massage, yoga and relaxation.
We teamed up with P7 for an afternoon in Seaton Park where we played rounders and football. Thank you to our parent helpers who joined us and took part in the games.
Soup and Bread Making
Primary 6 invented their own healthy soup as a class and baked bread to go with it. We enjoyed comparing shop-bought bread with homemade bread. We created recipes for other healthy soups which pupils are keen to try out.
We were active in Maths as we explored the link between speed, distance and time in the playground.
After learning about the importance of sleep, we used spreadsheets to create digital graphs showing our sleep habits.
We used fruit to practise shading techniques where we learned about three key elements in shading: pressure control, smooth shading and understanding light. | <urn:uuid:3c30c2ed-ffc4-443e-8ffe-470f7ea2e89f> | CC-MAIN-2023-06 | https://st-peters.aberdeen.sch.uk/?p=10566 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500035.14/warc/CC-MAIN-20230202165041-20230202195041-00770.warc.gz | en | 0.97361 | 260 | 2.84375 | 3 |
Vietnam is located in the centre of Southeast Asia with a land area of 331,689 square kilometres. It is bordered by China to the north, Laos and Cambodia to the west, and the East Sea to the east. Vietnam is in an ideal position for the development of the economy in general, and trade and tourism in particular. Its capital is Ha Noi, and its currency is the dong (VND). Vietnamese is the national and official language of Vietnam.
The modern day history of Vietnam is perhaps best started by reference to the Geneva Accord signed in 1954, which ended French colonial rule following the conquest in 1858 and partitioned the country into two parts. Since 1986, Vietnam has been carrying out economic reforms under the ‘Doi Moi’ (Renovation) to move from a central planned economy maintained from its reunification in 1975 to a market oriented economy. Since then, Vietnam has recorded important achievements in socio-economic fields and has become one of the fastest-growing economies in the world, with gross domestic product (GDP) projected to expand by 6.8% in 2018. Vietnam joined the World Trade Organization (WTO) in January 2007, following more than a decade-long negotiation process. WTO membership has provided Vietnam an anchor to the global market and reinforced the domestic economic reform process.
Vietnam has an extensive state-controlled network of schools, colleges, and universities and a growing number of privately run and partially privatised institutions.
General education in Vietnam is divided into five categories: kindergarten, elementary schools, middle schools, high schools, and universities.
A large number of public schools have been constructed across the country to raise the national literacy rate, which stood at 90% in 2008.Most universities are located in major cities of Hanoi and Ho Chi Minh City with the country’s education system continuously undergoing a series of reforms by the government. Basic education in the country is relatively free for the poor although some families may still have trouble paying tuition fees for their children without some form of public or private assistance.Regardless, Vietnam’s school enrolment is among the highest in the world.
The number of colleges and universities increased dramatically in the 2000s from 178 in 2000 to 299 in 2005. In higher education, the government provides subsidised loans for students through the national bank, although there are deep concerns about access to the loans as well the burden on students to repay them.
Since 1995, enrolment in higher education has grown tenfold to over 2.2 million with 84,000 lecturers and 419 institutions of higher education.A number of foreign universities operate private campuses in Vietnam, including Harvard University (USA) and the Royal Melbourne Institute of Technology (Australia). The government’s strong commitment to education has fostered significant growth but still need to be sustained to retain academics. In 2018, a decree on university autonomy allowing them to operate independently without ministerial control is in its final stages of approval. The government will continue investing in education especially for the poor to have access to basic education.
Vietnam, a one-party Communist state, has one of south-east Asia’s fastest-growing economies and has set its sights on becoming a developed nation by 2020.
It became a unified country once more in 1975 when the armed forces of the Communist north seized the south.
This followed three decades of bitter wars, in which the Communists fought first against the colonial power France, then against South Vietnam and its US backers. In its latter stages, the conflict held the attention of the world.
The US joined the hostilities in order to stem the “domino effect” of successive countries falling to Communism.
The war produced heavy casualties on both sides, atrocities against civilians, and the indiscriminate destruction and contamination of much of the landscape.
A visit to Vietnam by US President Bill Clinton in November 2000 was presented as the culmination of American efforts to normalise relations with the former enemy.
Vietnam struggled to find its feet after unification and tried at first to organise the agricultural economy along strict state-run lines.
But elements of market forces and private enterprise were introduced from the late 1980s and a stock exchange opened in 2000.
Foreign investment has grown and the US is Vietnam’s main trading partner. In the cities, the consumer market is fuelled by the appetite of a young, middle class for electronic and luxury goods. After 12 years of negotiations the country joined the World Trade Organization in January 2007.
But the disparity in wealth between urban and rural Vietnam is wide and some Communist Party leaders worry that too much economic liberalisation will weaken their power base.
Despite pursuing economic reform, the ruling Communist Party shows little willingness to give up its monopoly on political power.
Vietnam actively suppresses political dissent and religious freedom. Rights groups have singled out Hanoi’s treatment of ethnic minority hill tribe people, collectively known as Montagnards.
The human rights advocacy group Amnesty International says in a 2011 report that ”more than a dozen activists were convicted in faulty trials simply because they had peacefully voiced criticism of government policies”. A new wave of subversion trials began in 2013.
World Class Education
Over the past decades, we have been attaching great importance to promoting quality post-secondary education by welcoming talents, upholding academic freedom, respecting institutional autonomy, fostering collaboration and promoting academic exchanges. Vietnam aspires to further develop itself into a regional education hub with world-class universities and quality institutions through diversification and internationalisation. It is our vision to nurture bilingual students with a broad knowledge base, global outlook, enriched learning experience, ability to think critically and creatively, ability to work independently and collaboratively, and most important of all, the integrity to serve the community.
World Class Institutions
Our universities’ performance is outstanding amidst our population and GDP compared with other countries and regions. Accounting for a global academic performance, our tertiary education has achieved greater fame on the global academic map.
According to the Times Higher Education World University Rankings surveys, Vietnam hosts some of the world’s best universities in fields such as computer science and information systems, engineering-mechanical, aeronautical and manufacturing and engineering-electrical and electronics. Our performance in other fields is equally impressive. We adopt international standards in curriculum design and quality assurance.
listed in Best Global Universities Rankings by U.S. News & World Report based on academic research and reputation.
Our institutions also join hands with other prestigious universities worldwide to offer joint academic programs. With the help of the Government, Our institutions have seamlessly promoted transnational cooperation and exchange with countries like Australia, France, the U.S., Japan, and Germany. Our institutions have also acceded to international education agreements, such as the Asia-Pacific Convention on the Recognition of Qualifications in Higher Education.
Our institutions strive for excellence in conducting world-class quality research. They have also emphasised inter-disciplinary and inter-institutional collaboration in research activities so as to create synergy and maximise available resources. In addition, our institutions have a long history of involvement in both local and international research, from the supervision of PhD students, to breakthrough research in the fields of education, the environment, technological innovations, and economic reform.
To attract both outstanding local and non-local students to pursue PhD studies in Vietnam, Our institutions provide schemes that offer research students a comprehensive and international training program with supervision from renowned local and international professors.
Admission into these PhD programs requires a good Master’s degree in a relevant discipline. The programs require a research student at least three years of full-time study. In the case that they cannot study full time, they must study and research for a total time of four years including at least twelve months full time at the university to realize research projects.
For details of what PhD programs your institution provides for overseas students, please check out the international office’s or student affairs office’s website, or contact them directly.
Facts About Study in Vietnam
A home to some of the world’s top 139 universities in Asia in 2018.
A home to three international cities where English is used as a teaching medium in most university courses.
A melting pot of Eastern and Western cultures with diversity in lifestyle.
A home to cosmopolitan cities offering super global, regional and local connectivity.
A unique destination consisting of beautiful cities punctuated by a dramatic skyline filled with skyscrapers.
Vietnam aspires to be a regional education hub. We welcome non-local students to study, to do research and to take part in exchange activities here.
In general, non-local students should nominate a local sponsor, which can either be the educational institution granting the acceptance or an individual, provide the necessary supporting documents. Normally, the Immigration Department requires the following documents, while further supporting documents and information in connection with the application may still be required when necessary. It will normally take four to six weeks to process a visa or entry permit application for study upon receipt of all the required documents – apply as far in advance as possible!
International students are obligated to provide the following information 4 weeks prior to the date of arrival in Vietnam:
Students’ contact information (Name, e-mail address and telephone number)
Accurate address of Vietnam Embassy or Vietnam General Consulate in students’ home country in which visa will be granted.
Scanned passport with at least 6 months validity
International University shall not be responsible for the tardiness of students’ arrival in case they fail to submit the mentioned documents on time.
Once you are accepted to study at IU, you will receive a Letter of Acceptance. At the same time, IU will send an email requesting you to fill in the Visa Information Form. Information being requested composes of your personal information (name, passport number, etc.) and the exact address of the Vietnam Embassy or Vietnam Consulate General nearest to your place.
IU then submits the necessary documents to the Vietnam Immigration Department in Hanoi or Ho Chi Minh City (VID- HN/HCMC). The visa pre-approval will be issued after 7 working days.
VID-HN/HCMC will fax a copy of visa pre-approval to Vietnam Embassy or Vietnam Consulate General in your home country (to the address of your choice as written in the Visa Information Form).
Institutions will make admission decisions primarily based on the merits (e.g. academic and other non-academic achievements) of individual applications. Some institutions will invite applicants to attend interviews, whose performance at the interviews will also be taken into consideration. You are advised to read the course information provided by institutions carefully and contact the institution(s) you intend to apply for if you need further advice and clarification. | <urn:uuid:ae2bf80d-a075-432b-a54a-4b78ac3f1a9a> | CC-MAIN-2023-06 | https://www.oaastudy.com/study-destinations/vietnam/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500076.87/warc/CC-MAIN-20230203221113-20230204011113-00850.warc.gz | en | 0.942117 | 2,257 | 2.96875 | 3 |
9 Nutrition Mistakes That Are Making Us Fat
Obesity is an epidemic, and we all want to escape it. So, if you have put on a few unwanted pounds, the urge to immediately lose them can sometimes cause you to make mistakes. In our over-zealousness and because of all the misinformation flooding the internet, it is very possible that we might unknowingly be committing mistakes, like doing the wrong exercises or eating the wrong things.
To stop you from making mistakes at the dinner table, Bright Side has listed some of the most common diet mistakes. You could be guilty of committing some of these too!
1. Thinking that all calories are equal
All calories are not equal, there are good ones and there are bad ones. The calories that you ingest when eating vegetables are good, while the calories you ingest when you eat a large burger are bad. This is because the amount of insulin released by the body depends more on the type of calories you are consuming, than on the amount of calories you are consuming.
2. Choosing only low-fat or diet food
Processed, low-fat, or “diet” foods are often considered to be the ideal choice when it comes to losing weight, but that might not always be true. Many of these so-called healthy foods are often loaded with sugar to improve their taste.
Therefore, instead of keeping you full, low-fat foods are more likely to make you hungrier, and you might end up actually eating even more. It is healthier to choose a combination of nutritious, minimally processed food products instead.
3. Not eating enough protein
Protein is the single most important nutrient if you are aiming for weight loss. A high protein diet improves metabolism, reduces the appetite, and positively impacts several weight-regulating hormones. It also helps protect muscle mass during weight loss. A study found that a diet containing about 0.6–0.8 grams of protein per lb, may help with appetite control, and improve your body’s composition.
4. Lacking fiber in your diet
Adding enough fiber to your meal can help reduce your appetite by filling you up. Fiber also helps with weight loss by making the body absorb fewer calories from other foods. Studies show that doubling your daily fiber intake can result in up to 130 fewer calories being absorbed. You can add fiber to your food by making little changes to your diet like switching to brown whole grain bread, instead of normal white bread.
5. Eating too often, even if you are not hungry
We are often advised to eat small portions and at multiple times during the day, if we want to lose weight, rather than have big meals 3 times a day. However, this is not true. Eating when you’re hungry and only when you’re hungry is the key to losing weight. This is because eating too often, even if you eat less, can unknowingly lead to too many calories being consumed over the course of the day.
6. Following the advice about never skipping breakfast
Another piece of advice that we often hear is to never skip breakfast, without even taking our appetite into account. This advice is not exactly true. A study found that people who skip breakfast consumed more calories at lunch, compared to those who had breakfast. However, when the calories consumed during the entire day were counted, it was found that they had consumed an average of 408 fewer calories.
7. Drinking packaged fruit juice
People who strive for weight loss mostly stop drinking soft drinks and other sweetened drinks. But they often forget about packaged fruit juices. Even 100% fruit juice is packed with enough sugar to make your weight loss plans go awry. For example, 12 ounces of unsweetened fruit juice may contain about 36 grams of sugar. That’s more than in 12 ounces of soda.
8. Not eating whole, single-ingredient foods
The worst culprits for your weight gain are highly processed foods. Studies suggest that processed foods are a major contributor to the current obesity epidemic. The best thing to do, if you care about your health, is to go for whole food because they are self-limiting, which means that they are very hard to overconsume.
9. Eating a lot and not including fresh fruits in your diet.
Last but not least, eating too much and not including fresh fruits in your diet can also make your weight loss dreams remain dreams. The best fruits for weight loss are watermelons, pears, apples, and grapefruits.
While shopping it is recommended to only purchase food items that you know you can eat while they are still fresh. Stocking up your fridge unnecessarily can cause you to eat more than you had originally planned.
So, which mistakes have you been making? Share your little secret with us in the comments below. Don’t forget to share this article if you liked it. | <urn:uuid:974b74ad-8759-4d7d-8906-4bc32d14e631> | CC-MAIN-2023-06 | https://brightside.me/inspiration-health/9-nutrition-mistakes-that-are-making-us-fat-787260/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500250.51/warc/CC-MAIN-20230205063441-20230205093441-00050.warc.gz | en | 0.969369 | 1,007 | 2.703125 | 3 |
Whether it’s a child or a teenager, a lot of us have a backpack to use when going to school. These backpacks are used to store things such as books, notebooks, and other school supplies. They are also used to carry lunch and other items.
History of backpacks
Originally designed to carry heavy equipment, korean backpack for school became popular for carrying books in the early 1900s. Backpacks for school became an integral part of students’ lives. They were used to carrying books to and from school.
One of the first mass-produced backpacks was the Trapper Pack. This design was inspired by the indigenous people of Alaska, who carried their possessions on their backs. It was featured in the first REI catalog in 1939.
The Trapper Pack was designed by Lloyd Nelson in 1920. He was inspired by the sealskin packs used by the indigenous people of Alaska. He wanted to create a more comfortable backpack that would allow the wearer to redistribute the weight from his shoulder to both shoulders.
Another designer, Gerry Cunningham, took his experience from the outdoors and created the first zippered backpack. He also designed a day pack for skiing and hiking. He invented the nylon zipper, a material that proved stronger and more water-resistant tent.
The Trapper Pack became the first backpack to be mass-produced worldwide. The design was developed for the US Army and was meant to reduce the burden on soldiers’ backs. It also freed soldiers from their straps and was designed to disperse the load evenly.
After World War II, more materials became available. Nylon proved more durable and lighter than canvas. Nylon backpacks became very popular. They proved to be more comfortable to wear.
JanSport started selling backpacks in 1967. The company began by approaching typical outdoor shops, such as sporting goods stores. The company also approached university bookstores. Its Ski and Hike day pack sold like hotcakes. Other college bookstores began selling it as well.
In the early 1970s, JanSport teamed up with a bookstore manager in Seattle to improve its backpacks. He suggested improvements to the design. The company expanded to Oregon, Idaho, and Washington, and built a school backpack empire.
The company also created its own line of day packs. These were more student-friendly than its backpacks. It also began selling backpacks to outdoor enthusiasts, such as hikers. JanSport sold all types of bags, from day packs to backpacks.
Whether you’re a parent looking for a new backpack for school or a student looking for the latest trends in backpacks, there are a few things you should look for. These include:
The best way to pick a backpack for school is to look at what it can do. Look for one that has plenty of compartments and pockets. This will allow you to find what you need and keep it organized.
A good backpack for school will also be able to hold your laptop. You may want to look for a backpack that has an internal laptop sleeve. This will also help keep your laptop safe from damage.
A large backpack with built-in compartments will make it easier to keep track of everything you need to bring to school. You may also want to buy a backpack with a padded sleeve, which will help keep your back comfortable.
A good small canvas backpack should also include a water bottle pocket. This is especially important if your child has a busy school day. You may want to buy one with a reflective strip, which will make your child more visible to drivers.
Another must-have in a backpack is a waist belt. The waist belt will help distribute the weight evenly, which is important for keeping your back in good shape. A backpack with only one strap can cause strain on your back.
You might also want to look for a backpack with a chest clip, which will allow you to easily access all of your gadgets without having to take them out of your backpack. This is especially helpful if you’re in middle school and don’t have time to carry your notebook and other essentials to class.
A good backpack will have a large main compartment, as well as a place for your laptop. Having a backpack with a water bottle pocket will help keep you hydrated throughout the day, which is especially important for elementary school children.
When looking for the best backpack for school, remember to look for the best design. You should also look for one that has a well-made zipper. This will ensure that your backpack will last for many years to come.
Choosing the best backpack for your school can be a daunting task. You want to make sure you get the most out of your investment, while also finding a bag that looks good and lasts for the long haul. Thankfully, you’ll find backpacks in all shapes and sizes.
The best backpacks are made from a variety of materials. From sturdy leather to durable pine weave, these bags will stand up to the rigors of school life. Some even feature padded compartments to keep laptops and tablets in order. Whether you’re looking for a slick bag to take you from class to class, or a snazzy backpack for a night on the town, you’ll find a stylish bag that fits your needs.
The best school backpack are also the most functional. You’ll find backpacks with compartments that fit everything from notebooks to water bottles. You can even find backpacks with compartments that can convert into tote bags and backpacks. Most backpacks have handles on the top so you can keep them on your back. These bags are also a great way to get noticed. | <urn:uuid:7f9db19a-836a-45f0-be87-f25c743be247> | CC-MAIN-2023-06 | https://ifusi.org/backpacks-for-school/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500250.51/warc/CC-MAIN-20230205063441-20230205093441-00050.warc.gz | en | 0.979567 | 1,170 | 3 | 3 |
Beautiful stock certificate from the Phil Sheridan Gold & Silver Mining Co.
issued in 1877. This historic document was printed by the G. T. Brown & Co. San Francisco, California and has an ornate border around it with a vignette portrait of General, Phil Sheridan. This item has the original signatures of the Company's officers.
Philip Henry Sheridan (March 6, 1831 August 5, 1888) was a career United States Army officer and a Union general in the American Civil War. His career was noted for his rapid rise to major general and his close association with Lt. Gen. Ulysses S. Grant, who transferred Sheridan from command of an infantry division in the Western Theater to lead the Cavalry Corps of the Army of the Potomac in the East. In 1864, he defeated Confederate forces in the Shenandoah Valley and his destruction of the economic infrastructure of the Valley, called "The Burning" by residents, was one of the first uses of scorched earth tactics in the war. In 1865, his cavalry pursued Gen. Robert E. Lee and was instrumental in forcing his surrender at Appomattox. Sheridan prosecuted the later years of the Indian Wars of the Great Plains. Both as a soldier and private citizen, he was instrumental in the development and protection of Yellowstone National Park. In 1883 Sheridan was appointed general-in-chief of the U.S. Army, and in 1888 he was promoted to the rank of General of the Army during the term of President Grover Cleveland. History from Wikipedia and OldCompany.com
(old stock certificate research service) | <urn:uuid:bc22aaa1-6c31-4dc1-9ed5-669eba948215> | CC-MAIN-2023-06 | https://scripophily.net/phil-sheridan-gold-silver-mining-co-virginia-mining-district-storey-county-nevada-1877/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500250.51/warc/CC-MAIN-20230205063441-20230205093441-00050.warc.gz | en | 0.976949 | 334 | 2.546875 | 3 |
Lev Bely, 07.05.2012 21:56
There are still butterflies in Mumbai albeit they're increasingly getting lack of habitation space due to the growing deforestation and developing industry. So it was chosen to count the rest what resulted in the first book of butterflies of Mumbai region. “Butterflies of Mumbai” that describes 153 local species was presented on May 1st in Maharashtra Nature Park near Dharavi. The book as well tells about little-known facts of lepidoptera and consists over 400 pictures.
“British naturalists were the first ones to orally document 129 different species in the Bombay region. But the demography of the city has changed since Independence,” said Nelson Rodrigues, a nature enthusiast and the author of this book who spent six years of research to write it. He notices that lists of local species were made up even before this book but they've never been combined in one document. “In this book, I have also included three species that were recently discovered in the Mumbai region — the Abnormal Silverline (Cigaritis abnormis), the Giant Red Eye (Gangara thyrsis) and the Large Guava Blue (Virachola perse),” he said.
“I have kept the language devoid of jargon so that the book can be read by students and nature enthusiasts alike,” said Rodrigues who systematized butterflies not by families but colors.
Butterflies perform an important role in pollinating plants and they themselves are ecological indicators. “Unfortunately, their numbers are dwindling even in greener pockets of the city because of the use of pesticides and the weeding out of wild plants on which the butterflies feed or lay eggs,” said Rodrigues, adding that the Southern Birdwing (Troides minos), the biggest known butterfly in India, is not seen anymore in Mumbai.
Whilst Rodrigues plans to support people in arranging butterfly gardens near forests or villages all over Maharashtra state, he advises to those who are eager to see Mumbai butterflies to go look for them in Maharashtra Nature Park, Sanjay Gandhi National Park, Yeoor Hills in Thane or in the Vasai fort.
Daily News & Analysis, http://www.dnaindia.com
Photo: Troides minos butterfly, Vaikoovery, http://fr.wikipedia.org
Note: you should have a Insecta.pro account to upload new topics and comments. Please, create an account or log in to add comments.
* Our website is multilingual. Some comments have been translated from other languages. | <urn:uuid:1ebe9f0b-53f9-4377-9875-e2eca92a8dae> | CC-MAIN-2023-06 | http://insecta.pro/community/8804 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500339.37/warc/CC-MAIN-20230206113934-20230206143934-00130.warc.gz | en | 0.946846 | 534 | 3.015625 | 3 |
The quest to achieve the impossible fuels creativity, spawns new fields of inquiry, illuminates old ones, and extends the frontiers of knowledge. It is difficult, however, to obtain a patent for an invention which seems impossible, incredible, or conflicts with well-established scientific principles. The principal patentability hurdle is operability, which an inventor cannot overcome if there is reason to doubt that the invention can really achieve the intended result. Despite its laudable gatekeeping role, this Article identifies two problems with the law of operability. First, though objective in theory, the operability analysis rests on subjective credibility assessments. These credibility assessments can introduce a bias toward unpatentability, with inventions emerging from new, poorly understood, and paradigm-shifting technologies as well as those from fields with a poor track record of success as the most vulnerable. Second, what happens when the impossible becomes possible? History reveals that the Patent Office and the courts will continue to deny patents for a long time thereafter.
This Article argues that the mishandling of seemingly impossible inventions vitiates the presumption of patentability, prevents the patent system from sitting at the cutting edge of technology, and frustrates the patent system’s overarching goal to promote scientific and technological progress. In an effort to resolve these problems and fill a gap in patent scholarship, this Article offers a new framework for gauging the patentability of seemingly impossible inventions. Briefly, it contends that a more robust enforcement of patent law’s enablement requirement can and should perform the gatekeeping role because it can resolve whether an invention works by weighing objective, technical factors. This approach would quickly reveal technical merit for inventions that really work or, alternatively, the fatal flaw for inventions that are truly impossible. Its implementation would not only eliminate the need for the operability requirement, but it would also streamline patent examination, improve the disclosure function of the patent system, promote scientific and technological progress, and ultimately foster innovation. | <urn:uuid:f6944bd5-24bd-45c5-a75b-74216b34f263> | CC-MAIN-2023-06 | https://vanderbiltlawreview.org/lawreview/2011/10/patently-impossible/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500339.37/warc/CC-MAIN-20230206113934-20230206143934-00130.warc.gz | en | 0.932811 | 399 | 2.65625 | 3 |
This post may contain affiliate or referral links. Read more about this in our disclosure policy.
The Magic School Bus Lost in the Solar System Unit Study
My kids are IN LOVE with the Solar System right now. So we have been working our way thru our The Magic School Bus Lost in the Solar System Unit Study. We have read many books learned about the moon and placement of the planets. But my kids say their all time favorites have been the The Magic School Bus Lost in the Solar System activities!
We had an astronaut snack that the kids loved! They loved being able to try out what people eat up in space. We explained why certain foods were the way they were and made a day out of it.
We worked with a Solar System Sensory Bin and made a window solar system with reusable stickers. They would move the stickers around daily!
We also worked on our Solar System Art Project. With this project we went in depth about the placement of the planets and their orbits and sizes.
Each day we read The Magic School Bus Lost in the Solar System and they wanted to do their Solar System puzzle each day as well!
I also highly suggest using our 100 page Solar System Printable with this unit. | <urn:uuid:e2318517-a13c-4471-9cce-6213fab77648> | CC-MAIN-2023-06 | https://www.thefrugalnavywife.com/magic-school-bus-lost-solar-system-unit-study/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500339.37/warc/CC-MAIN-20230206113934-20230206143934-00130.warc.gz | en | 0.968188 | 247 | 2.65625 | 3 |
Copyright is a type of intellectual property. It gives its owner the right to copy, distribute, adapt, display, and perform creative work.
Copyright grants two types of rights: economic and moral.
Economic and moral rights
- Guarantee control over the work.
- Guarantee remuneration for work through selling or licensing.
- They are transferable.
- Right of attribution - the right to claim the authorship.
- Right of integrity - the right to refuse the modification of the work.
- They are non-transferable.
Useme tip: In EU law, as an author, you always have the moral right to the work. They are non-transferable. You can’t pass them on to another person in any way.
What else should you know about copyright?
You can transfer the economic rights of a unique and original work. You can do it under a license or a protocol.
A license transfer
- You can still profit financially from your work.
- You transfer the rights for a period of time.
- All it needs is an online confirmation.
- You can sell the work to another client under a license.
A protocol transfer
- You give up the ability to profit from your work.
- You transfer the rights indefinitely.
- You need to print, fill in, and scan additional documents.
Should I transfer the rights?
When you create something unlikely to be used by another person, such as a logo, it’s a good idea to transfer it to copyright. However, when you sell something like software that you could sell again to another client, think twice before parting with your economic rights. | <urn:uuid:2fd60161-5e3c-4010-a6c8-070a5e2a8dae> | CC-MAIN-2023-06 | https://help.useme.eu/hc/en-us/articles/360014412731-What-are-copyrights- | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500628.77/warc/CC-MAIN-20230207170138-20230207200138-00210.warc.gz | en | 0.918166 | 355 | 2.875 | 3 |
Kids! They’re always fidgeting and yawning and being unhygienic, and this was as true 500 years ago as it is now. In 1530, Erasmus published the educational treatise On Good Manners For Boys, which may be the earliest example of an etiquette book out there. Dedicated to the 11-year-old Henry of Veere, it outlines some good manners, though he insists that Henry doesn’t even need such a book, “having been, in the first place, brought up from infancy at court.” If only we were all so lucky. He goes on to describe how “the task of fashioning the young is made of many parts,” and I assumed he was talking about collecting legs and eyes and teeth to build an army of youths. Really, he means the task consists of teaching piety, a love for liberal arts, giving instruction on the duties of life, and teaching good manners. So, how do you do that? Erasmus explains.
“For the well ordered mind of a boy to be universally manifested—and it is most strongly manifested in the face—the eyes should be calm, respectful, and steady: not grim, which is a mark of truculence; not greedy, the hallmark of insolence; not darting and rolling, a feature of insanity; not furtive, like those suspects and plotters of treachery…”
This goes on for another paragraph, which is just to say you should be constantly aware of your eyes. What are your eyes doing right now? Are they grim? Are they truculent? Stop that.
“It is bad manners to look at someone with one eye open and one shut. For what else is this than to deprive oneself of an eye?”
It is literally nothing else, Erasmus. Do not wink at me.
“The eyebrows should be smooth, not contracted, which denotes fierceness; not arched, a sign of arrogance…”
He goes on like this nearly as long as he did about the eyes themselves. Following this he finally gets to the etiquette of the nostrils, the mouth, and how you’re cheating if you use blush because a natural modesty should be giving your cheeks that glow. You’d think that Erasmus would have the most polite face, given that he knows all the rules, but I don’t know…
That mouth looks pretty tight set, Are you “afraid of inhaling someone else’s breath”?
“To expose, save for natural reasons, the parts of the body which nature has invested with modesty ought to be far removed from the conduct of a gentleman. I will go further: when necessity compels such action, it should be none the less done with decency and modesty even if there is no observer present. For the angels, from whom derives that most welcome sense of shame that accompanies and protects the chastity of boys, are always near.”
Are you saying the angels don’t want to see my butt? I’m pretty sure they want to see my butt. What else are they doing all day?
“There are some who lay down the rule that a boy should refrain from breaking wind by constricting his buttocks. But it is no part of good manners to bring illness upon yourself while striving to appear ‘polite.'”
I love old science, and the idea that holding in a fart could cause you illness. He later says that it is more dangerous to hold in a fart than it is to hold in a bowel movement, which is bananas. Try to do both of those today and see which is worse. Anyway, he does say that if you must break wind, cover it with a cough. Slick.
Finally, Erasmus gets to the bottom of the body, discussing whether or not one should cross one’s legs like an Italian. Now, we move on to dressing.
“To drag long trains after one is ridiculous in women, reprehensible in men; whether becoming in cardinals or bishops I leave others to judge.”
I had no idea cardinals or bishops could be “becoming.” But thankfully I’ve also learned from Erasmus that wearing multicolored or embroidered clothing is for “idiots and apes.” Dude is bitchy. He also reserves an entire section on behavior in church, including this gem.
“Touching the ground with one knee while the other is upright supporting the left elbow is the gesture of the impious soldiers who addressed the Lord Jesus in mockery, ‘Hail King of the Jews!'”
DID ERASMUS JUST DIS TEBOWING? I THINK HE DID.
Erasmus addresses banquet and bedtime manners, but in the end comes up with the cardinal rule of etiquette itself. “The essence of good manners consists in freely pardoning the shortcomings of others although nowhere falling short yourself: in holding a companion no less dear because his standards are less exacting.” May we all strive to be better ourselves and more forgiving of others. And to let each other fart in public. | <urn:uuid:e9422e21-06a7-4e26-8345-4b33099f4ba6> | CC-MAIN-2023-06 | https://uncommon-courtesy.com/2014/01/17/etiquette-for-kids-from-1530/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500628.77/warc/CC-MAIN-20230207170138-20230207200138-00210.warc.gz | en | 0.958324 | 1,093 | 2.8125 | 3 |
Liquid level sensors, also called liquid level switches, are designed to change state when immersed in a liquid. They are used to determine if a liquid or oil exists at a particular level in a container.
What are the different kinds of liquid level sensors?
The different kinds of liquid level sensors include
1. Optical Liquid Level Sensors
Optical sensors work by are solid state. They use an infra-red LED and phototransistor which are optically coupled when the sensor is in air. When the sensing tip is immersed in liquid, the infra-red light escapes making the output change state. These sensors can detect the presence or absence of almost any liquid. They are not sensitive to ambient light and are not affected by foam when in air or by small bubbles when in liquid. This makes them useful where the state change must be quickly and dependably noted, and where they can function reliably for extended periods without maintenance.
For example, the SST Optomax Digital Liquid Level Sensor is a popular low-cost, low-maintenance infra-red LED sensor.
The disadvantage of an optical liquid level sensor is that it can only determine if liquid is present or not present. If variable levels are required, (25%, 50%, 100%, etc.) each requires an additional sensor.
2. Capacitive Liquid Level Sensors
Capacitive liquid level switches use 2 conductive electrodes (usually made of metal) in a circuit that are a short distance from each other. When the electrodes are immersed in a liquid it completes a circuit.
The advantage of a capacitive liquid level switch is that it can be used to determine the rising or falling of liquid in a container. By making the electrodes the same height as the container, the capacitance between the electrodes can be measured. No capacitance means no liquid. Full capacitance means a full container. Both “empty” and “full” measurements must be recorded, then a meter calibrated with 0% and 100% to show the liquid level.
Although capacitive liquid level sensors have the advantage of no moving parts, one of their disadvantages is that corrosion of the electrodes will change the electrode’s capacitance requiring either cleaning or recalibration. They are also more sensitive to the type of liquid used.
3. Conductive Liquid Level Sensors
Conductive liquid level switches are sensors with an electrical contact at a specific liquid level. Two or more insulated electrodes with exposed tips are used inside a pipe lowered into the liquid. A longer electrode carries a low voltage, while a shorter one is used to complete the circuit when the liquid level rises to meet it.
Like capacitive liquid level switches, conductive liquid level switches depend on the conductivity of the liquid. Therefore, they are only useful for measuring certain types of liquids. In addition, these sensors tips must be cleaned at regular intervals to reduce fouling.
4. Diaphragm Liquid Level Sensors
Diaphragm or pneumatic liquid level switches rely on air pressure to push a diaphragm which engages a micro-switch inside the body of the unit. As the liquid level rises, the internal pressure inside a detecting pipe rises until the micro-switch or a pressure sensor is activated. As the liquid level falls, the air pressure also falls and the switch is disengaged.
The advantage of a diaphragm-based liquid level switch is that no power source inside the tank is required, it can be used with many types of liquids, and since the switch does not come in contact with the liquid. However, because it is a mechanical device, over time it will require maintenance.
5. Float Liquid Level Sensors
Float switches are the original liquid level sensors. They are mechanical devices. A hollow float is connected to an arm. As the float rises and falls in the liquid, the arm is pushed up and down. The arm may be connected to a magnetic or mechanical switch to determine on/off, or it may be connected to a gauge that rises from full to empty as the liquid levels falls.
The ball float switch in a toilet tank is the most common type of float liquid level sensor used. Sump pumps also use float switches (see right) as a cost-effective way to measure the water level in a basement sump pit.
Float switches can measure any type of liquid, and can be designed to require no power to operate. The disadvantage of float switches is that they are larger than other types of switches and because they are mechanical, must be services more often than other liquid level switches. | <urn:uuid:67cc0f9c-7c02-425c-9ec5-7f0b96a166ee> | CC-MAIN-2023-06 | https://gaslab.com/blogs/articles/what-is-a-liquid-level-sensor | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500983.76/warc/CC-MAIN-20230208222635-20230209012635-00290.warc.gz | en | 0.909393 | 961 | 3.390625 | 3 |
Clearly we are far from eradicating COVID 19 from our environment, but we do have the power to boost our own defenses. As we learn how to increase our protection and tolerance to severe disease, we can diminish our fear of infection. My intention is to spread vetted information on how we can best KISS. Keep Immune Systems Strong!
Today’s post will delve into the Sleep point of the KISS star.. are you getting your zzz’s?
WHY YOU SHOULD CARE:
During sleep our bodies produce cytokines and T-cells. Both of these play a vital role in immunity. Cytokines create an immune response by targeting infection and inflammation, while T- cells kill virus infected cells via toxic mediators. Studies have shown that lack of sleep (both quality and quantity) does indeed weaken our immune system. Those who are skimping on zzz’s are more prone to get sick after being exposed to a virus. Aim for 7-9 hours of quality sleep each night to ensure you support your body’s production of cytokines and immune cells.
SLEEP HYGIENE TIPS:
- Create a sleep ritual (a special set of little things) to do before bed to relax the body. Here are a few ideas: stretching, meditation, breathing exercises or gratitude journaling.
- Create an aesthetic environment that encourages sleep. Use serene and restful colors and eliminate clutter and distraction. Scan your room for any lighting that might interfere with your body’s natural release of melatonin. For instance, a light from a charger – keep all electronics out of your bedroom!
- Use your bed for sleep, reading and sex only (not for screen time ) 😌
- Go to bed and wake up at the same time each day. Our physical bodies are designed to operate on routine!
- Be mindful of your alcohol and caffeine consumption. Avoid excess caffeine, and no caffeine after 1pm. Aim to consume no more than 1(for females) or 2 (for males) alcoholic beverages per day. Give yourself a break from alcohol at least 3 days per week! While alcohol will help you fall asleep, too much will have you “ping” awake in the middle of the night. This will drastically affect your quality of sleep.
- Create total darkness and quiet. Consider using eyeshades and earplugs. If your room has a lot of windows, blackout curtains are essential!
- Enjoy outdoor fresh air for at least 1 hour daily. Sitting outside can reduce blood pressure, lower heart rate, and decrease cortisol levels. When we are outside our body slows down, helping us feel peaceful and calm.
- Write it out! We’ve all experienced those nights where the monkey mind won’t leave us alone as we desperately attempt to drift off to la la land. Our minds are designed to create thoughts rather than hold them – be sure to write out all of your ‘to do’s’ for the next day so your mind can be clear and relaxed when you hit that pillow. This will allow your energy to go toward sleep!
9. Raising your core temperature before bed helps to induce sleep. If you have access to a tub, consider taking a hot salt & soda aromatherapy bath before bed.
DIRECTIONS: mix 1- 1.5C of Epsom salt (magnesium sulfate) with 1- 1.5C baking soda (sodium bicarbonate) to your bath. Absorbing the magnesium through your skin and receiving the alkaline balancing effects of the baking soda will leave you in a relaxed state ready to fall asleep. Add a few drops of eucalyptus or lavender oil to the tub for the ultimate unwind.
Another popular option for warming your center is to use a hot water bottle which you can easily find online. Personally, I find hot cold packs even more convenient than filling up a water bottle! My go to, thermipaq, is affordable and high quality: ThermiPaq Reusable Ice Pack and Hot Cold Pack
10. If you are really struggling to fall or stay asleep, there are many vetted supplements that will help you overcome your struggle.
HERBS AND SUPPLEMENTS:
- Try 320 mg to 480 mg of valerian root extract standardized to 0.2 percent valerenic acid one hour before bed. Herb pharm also makes an alcohol free version: alcohol free herb pharm valerian
- Oral lavender tincture (be sure the bottle says safe for consumption, there are many lavender extracts that are made for diffusers only).
- Take 200 mg to 400 mg of magnesium glycinate (citrate is for constipation, glycinate is what you want for sleep) before bed. This relaxes the nervous system and muscles. I use pure’s brand – vetted and provides a 3 month supply. 1-3 of melatonin 1 hour before bed.
Note: When using supplements and herbs, it is important to change them up every month or so, this way your body will not become dependent on them. Also note that (with the exception of Magnesium) they are not intended for long term use. | <urn:uuid:f0974af1-a271-4637-964d-51c61a3756cb> | CC-MAIN-2023-06 | https://getfitwithkate.com/2021/08/27/immunity-series-1-sleep/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499695.59/warc/CC-MAIN-20230128220716-20230129010716-00570.warc.gz | en | 0.907347 | 1,085 | 2.625 | 3 |
By Spencer Cramer, NCL Health Policy Intern
Spencer is a student at Brandeis University, where he is studying Politics and Health: Science, Society & Policy.
Most Americans are all too familiar with our country’s gun violence epidemic. In a typical year, around 40,000 Americans are killed by a firearm, including deaths from homicides, suicides, and accidents. Gun related fatalities in other high-income countries pale in comparison to those of the U.S. Based on 2010 data from the Organization for Economic Co-operation and Development (OECD), Americans were over 10 times more likely to be killed by a gun than people in Australia, a country that once dealt with a similar gun violence problem. This crisis comes in the form of street crime, domestic violence, accidents involving children, and the mass shootings that seem to occur on a multi weekly basis.
Of particular concern has been the rise in gun violence during the COVID-19 pandemic. Last year, 2020, saw a 10 percent increase in gun deaths over the previous year, fueled primarily by a 25 percent rise in homicides and accidental gun deaths. Experts say the recent spike is due to the economic and social stresses of the pandemic, and the numbers are showing no signs of abating as we open back up post-COVID.
What can we do to address this terrible situation? Sadly, the typical debate pits stricter gun control measures against Second Amendment absolutists who believe any gun reform measure to be a threat to their freedom. But those absolutists have outsized power. According to a recent poll, approximately 2 in 3 Americans support stricter gun control measures, with certain policies like enhanced background checks gaining even higher support. Yet attention to the spike in gun violence perversely spikes sales of firearms.
For many years, thoughtful experts have argued that America’s gun violence problem must be viewed as a public health crisis. That approach allows researchers and policymakers to tackle the problem from multiple angles, like understanding why people commit violence, creating safer environments, and implementing common-sense gun violence prevention measures.
The first step to a public health effort should be far-ranging research on gun violence so we can have the proper knowledge to inform policy solutions. Unfortunately, until very recently the federal government was barred from researching gun violence. The Dickey Amendment has been attached to federal spending bills since 1996 and had banned the Centers for Disease Control and Prevention (CDC) from researching gun violence. For the first time, in 2018, the Dickey Amendment was reinterpreted, allowing research to be conducted as long as it does not specifically advocate for gun control policies. After this reinterpretation, Congress proceeded to provide $25 million in funding for gun violence research.
Unfortunately, this funding is a pittance compared with the scope of the crisis. For reference, the National Institutes of Health (NIH) provided $170 million in funding for back pain research in 2019. To meet the scale of the gun violence epidemic, we must dramatically increase funding for research so we can properly direct resources to fight the problem.
We often view gun violence as an issue of criminal justice that narrowly focuses on prosecuting homicides and gun crimes. Many policy solutions therefore involve traditional gun control methods: assault weapons bans, enhanced background checks, and stronger law enforcement tactics to target gun crimes. But by treating gun violence as a public health issue, researchers can undertake a wide-ranging holistic approach that accounts for the numerous societal factors that contribute to gun violence.
A public health approach to the gun violence epidemic—if done well—could be as successful as the campaigns to reduce smoking and automobile accidents. To combat cigarette smoking, we engaged in a multi-pronged strategy involving tobacco taxes, age restrictions, public awareness campaigns, and bans on smoking in many public spaces. These measures have resulted in the adult smoking rate to fall by nearly 70 percent since the 1960’s. Similarly, to deal with vehicular accidents and deaths, we instituted new safety measures in cars and on roads, improved licensing restrictions, enacted tough DUI laws, and better traffic enforcement. As a result of these solutions, deaths from car crashes have fallen dramatically over the last few decades.
Similarly, strategies to combat gun violence can include better mental health services, doctors consulting their patients on gun safety, better firearm safety training, or improved designs of guns that reduce the risk of accidents. It may also involve creating a safer society overall, where lower poverty rates and better economic prospects will naturally lead to less violence. Of course, better gun control policies are needed, but we should think of them as one important part of a larger public health strategy for fighting the gun violence epidemic.
Firearm deaths have shown no signs of letting up—in fact they are exploding. Gun violence has reached horrific levels in the U.S. and tragically destroys many lives. By recognizing this epidemic as a public health crisis, we can address the issue from many different societal perspectives. We need gun control, but we also need stronger mental healthcare, community interventions, poverty reduction, even safer firearms. Any successful public health effort must embrace an all-of-the-above approach. America’s campaigns against cigarettes and automobile deaths should serve as examples to lead our struggle against gun violence. By finally investing in robust research and multiple solutions for gun violence, we can start to eliminate the scourge of gun violence in our society. | <urn:uuid:9e5aacce-f1b8-4ea5-876a-583e7511fe93> | CC-MAIN-2023-06 | https://nclnet.org/gun_crisis/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499857.57/warc/CC-MAIN-20230131091122-20230131121122-00730.warc.gz | en | 0.949895 | 1,097 | 2.671875 | 3 |
Before the early 1900s, if it walked like a Christmas Island mouse and spoke like a Christmas Island mouse, it was likely a Christmas Island mouse. But if one of these now-extinct mice ever walked the earth again, it would in fact be a genetically modified Norwegian brown mouse. A new study has found that the rodents will not resemble a Christmas Island rat as some hope.
with advent Gene editing technology like CRISPRScientists have turned from cloning to genetic engineering as the most promising way to “eliminate extinction” or revive species that have become extinct (SN: 10/7/20). But unlike cloning, genetic engineering will not create an exact replica of an extinct species. Instead, this technology will modify the genome of an existing animal so that it resembles the genome of a desired extinct animal. The challenge is to make this agent as similar to an extinct species as possible.
To explore the limits of this method, the researchers attempted to recover the genome of the Christmas Island rat. By comparing parts of the extinct mouse’s genetic instructions book with the genome of a living relative, the Norwegian brown rat, the team was able to recover about 95% of the extinct genome. It sounds like a lot, but it means it 5% of genes are still missingincluding some important elements for smell and the immune system, scientists reported on April 11 current biology.
“You can only take back what you can find. Our view is we can’t find everything,” says Tom Gilbert, an evolutionary biologist at the University of Copenhagen.
To obtain the genome of the extinct rat, Gilbert and colleagues took ancient DNA from two rat skin samples preserved on Christmas Island. ancient DNAextracted from specimens that have died anywhere from a few decades to thousands of years, are far from perfect (SN: 5/19/08). Gilbert’s Genome of Extinct Species describes it as a book shredded. One way to rebuild this torn book is to scan the parts and compare them to a reference.
Using an intact copy of the original book, anyone could theoretically reconstruct the book perfectly. When identifying a reference genome, researchers look for species that diverged evolutionarily from recently extinct species—in other words, a very similar book. The genomes will match up closely, but not completely.
For this reason, the Christmas Island mouse (Ratus McCleary) was an obvious choice of analysis for scientists. diverged from its closest relative, the Norwegian brown rat (norwegian rat), only about 2.6 million years ago.
The team found that the genome of the Christmas Island rat has been mapped to about 95 percent of the genome of the brown rat in Norway. Additional analyzes showed that the approximately 5% missing could not be explained solely by a defect in the technique or an inappropriate reference genome. Instead, due to the evolutionary difference between the two species, most of that genetic information has simply been lost.
Moreover, the missing genes were not random. It tends to fall into two main areas that control rats’ immune responses and their sense of smell. So, if the genome of the Norwegian brown rat was modified to resemble a Christmas Island rat, the new creature would smell differently than the prototype. This could hinder the chance of the Christmas Island rats to survive if released into their former habitat.
Gilbert doesn’t think anyone would likely attempt to eradicate mice. But he says what the team has shown may be useful to people working on more ambitious projects, such as bringing back woolly mammoths. The difference between the Norwegian brown rat and the extinct Christmas Island rat, for example, is similar to the divergence between the Asian elephant and the woolly mammoth.
“By doing these kinds of analyzes, which aren’t hard to do, you can at least come up with what you’re going to get, and what you won’t get, and you can use that to decide if it’s worth doing,” Gilbert says.
Despite the hurdles, using technology to bring back species is still something worth doing, says Ben Novak, chief scientist at Revive & Restore, a nonprofit that uses genetic engineering for conservation projects. He plans to apply Gilbert and colleagues’ analysis to his own work on the passenger pigeon, which became extinct in 1914. He adds that there are potential solutions for how to capture some of the missing data, but the fact that some of the data will always remain the same. The missing is one limitation that de-extinction scientists have already found.
“The problem of reference aggregation will always remain a barrier to eliminating extinction,” Novak says. “Anyone seeking de-extinction has to settle on the fact that we want to get as close as possible to something that is deceiving the environment.”
In other words, an extinct mammoth created using genetic editing, if such a thing happened, wouldn’t be quite a mammoth; It would be akin to an Asian hairy elephant that is adapted to survive in the cold. The new analysis suggests that the alternative animal version likely had enough differences that it would be difficult for the creature to repopulate its previous ecological niche. For some, this may be enough to defeat the purpose of the exercise.
“As a science, it’s cool,” Gilbert says. But “Is this the best use of money in a world where we can’t keep rhinos alive?”
“Beer aficionado. Gamer. Alcohol fanatic. Evil food trailblazer. Avid bacon maven.” | <urn:uuid:4073a184-2bda-4f44-9a04-57ab010cf94d> | CC-MAIN-2023-06 | https://www.lankatimes.com/extinct-rat-shows-limits-of-crispr-to-reviving-species/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499857.57/warc/CC-MAIN-20230131091122-20230131121122-00730.warc.gz | en | 0.953835 | 1,149 | 3.796875 | 4 |
The Lockheed D-21 Drone was a sophisticated attempt by the US to create an unmanned reconnaissance air vehicle that could spy on its Cold War rivals, the Soviet Union and China, without risking the lives of its Air Force personnel. Despite looking out of this world, it was a very real aircraft.
The D-21, constructed without landing gears, was an innovative contraption that could only be used only once and was jettisoned mid-air from another plane that acted as a mothership. It was the product of the tense nuclear stand-off between the US and the Soviet Union that characterized much of the 1950s and 1960s, and the Free World’s desire to be more well-informed about the development of Communist nuclear programs.
The Flight of Gary Powers
Following the Soviet’s rejection of an ‘open-skies’ policy proposed by President Dwight Eisenhower, which would permit both sides to inspect each other’s nuclear facilities, the US government turned to more surreptitious means to gather data on their atomically armed nemesis.
The U-2 spyplane, a manned reconnaissance device, was crafted specifically with this purpose in mind, flying at an altitude of 70,000 feet which was generally believed to be high enough to evade radar detection.
Read More: Curtiss XP-55 Ascender – The Flawed Fighter
Starting in July 1956 with a sortie over Moscow and Leningrad, the U-2 carried out its most famous mission in May 1960, undertaken by CIA pilot Francis Gary Powers from an airfield in Pakistan bound for Norway.
He was to make a 2,900 mile diversion through Soviet airspace. When he reached the city of Sverdlovsk nestled in the Ural Mountains, he was spotted and shot down by a Soviet surface-to-air missile.
Powers released his parachute and floated down to the surface where he was detained by KGB agents and interrogated. He was sentenced to 3 years in prison and 7 years hard labour but was eventually swapped for Soviet spy Rudolf Abel in February 1962.
The US scrambled for an excuse, claiming that Powers had been operating a routine weather flight when he had blacked out following a problem with the oxygen delivery system, causing him to unintentionally drift into the Soviet Union.
However, the Soviets possessed clear evidence from the recovered wreckage that this was false, and on May 11th of that year Eisenhower was forced to publicly acknowledge the truth.
He explained that the program was necessary for US defense policy since the Soviets had rejected the implementation of nuclear inspections and that he planned to continue it.
However, realizing his fleet was now vulnerable to Soviet anti-air attacks, Eisenhower discontinued all manned flights over the Soviet Union in favor of a self-operating alternative.
The CIA decided that an unmanned reconnaissance craft that could fly higher, faster, and be less susceptible to detection was now required.
In 1962 they selected the renowned team at Lockheed Skunkworks, a division responsible for developing many of the black-budget aircraft of the Cold War, to design and build for them a suitable replacement for the U-2.
Lockheed would incorporate many of the aeronautical advances of the SR-71 Blackbird into their new project, which was christened Q-21 and later renamed to D-21.
The D-21 was 42.9 feet long, 7.1 feet in height, and had a gross weight of 11,200Ibs. In combination with a titanium body and single vertical tail, the D-21 had a highly swept delta wing with a span of 19.1 feet, engineered with the wing leading edges running the centre of the vehicle made from silicon composite material.
It was propelled by a Marquardt RJ43-MA-3 Bomarc Engine supplied with circumvented air from a mixed compression inlet connected to a titanium duct that ran through the centre of the craft.
The engine had to be air-launched and could only be activated at a certain speed, hence the D-21’s need for a mothership and its notable absence of take-off and landing gears.
While traveling, it had a cruise speed of 3.2 Mach, a cruise altitude of between 65,000 to 90,000 feet, and a maximum range of 3,000 miles.
It was run by JP-7 fuel that was stored in the fuselage and wings, the fuel tanks being separated into 3 sections by bulkheads which could contain a maximum fuel load of 5,900Ibs. An auxiliary power unit provided electricity for the aircraft and the cooling system, and a hydraulic pump generated charge for the control surfaces.
The D-21’s reconnaissance equipment, including the automatic flight control system, telemetry electronics, recovery beacons, parachute system, and a high-resolution camera capable of taking detailed photos from as high as 90,000 feet were all loaded into an ejectable hatch assembly located on the bottom of the air vehicle.
The D-21 was designed to operate in tandem with another transporter plane and was fitted with a rack that allowed it to be attached to the back of an M-21.
As a result, the D-21 was designated ‘Daughter’ and the M-21 ‘Mother’.
The D-21 was released by the M-21 when a speed of Mach 1.2 had been achieved, helping it accelerate to Mach 3 velocity.
After the D-21 was dropped, it underwent a pre-programmed reconnaissance flight at Mach 3.3. After surveillance, the D-21 maneuvered into an unpowered descent with the hatch assembly, housing all the photos and data, ejecting when it reached 60,000 feet.
At 52,000 feet the D-21 initiated a self-destruction sequence while the hatch assembly glided towards a waiting Lockheed C130 or US battleship to be collected.
Testing with the M-21
The D-21, tested between 1966 to 1971, produced mostly disappointing results. In March 1966, the D-21 completed its maiden voyage without any hitches, however, the next two attempts would foster an ominous sense of uneasiness.
The second flight was marred by hydraulic failure, and the third was by a failed electronics module. Concerns were raised by Skunkworks chief Kelly Johnson, who was anxious that the D-21 launch process was too dangerous.
Johnson’s apprehensive analysis was ignored, and in July 1966 the program would be shaken by a horrific accident.
During its fourth foray, the D-21 collided with the right wing of the M-21 upon release at Mach 3.25 speed after experiencing an asymmetric unstart, causing the mothership to break up in mid-air while plummeting towards the Pacific Ocean near Point Magu.
The forward fuselage of the M-21 that contained the two operators were torn off in the clash. Pilot Bill Park was able to escape unscathed, but flight engineer Ray Torick was not so lucky.
His flight suit became damaged and filled with water, and he drowned shortly after hitting the sea.
With one death and both vehicles totally destroyed, the program was temporarily suspended. Lockheed went back to the drawing board, with Kelly Johnson suggesting they should instead use the B-52 Stratofortress as the mounting aircraft.
Read More: Mil V-12 – The Biggest Helicopter Ever
The Switch to the B-52
During the top-secret operation codenamed ‘Senior Bowl,’ the Skunkworks crew modified two B-52s so that a D-21 could be fitted onto them. In total, the second phase of the program ran from January 1968 to July 1971.
The new drone, given the moniker D-21B, was re-fashioned with dorsal mounting hooks so that it could bind itself to a pylon from the B-52.
The new prototype was also fitted with a solid rocket booster that was to give the D-21B significantly more acceleration and the ability to reach Mach 2 speed, designed to quicken its passage away from the parent craft, thereby reducing the chance of another mid-air disaster.
This additional component provided an average thrust of 27,300 pounds over 87 seconds, shooting it from 38,000 feet at Mach 0.8 to 80,000 feet at Mach 3.2 in a matter of minutes.
The booster was even bigger than the D-21B, sizing up at 30 inches in diameter, 531 inches in length, and even heavier at a colossal 13,286Ibs.
The D-21Bs flew 4 unsuccessful reconnaissance missions over Communist China, aimed at monitoring a Chinese nuclear weapons testing facility in the west of the country at Lop Nor.
The first D-21B failed after a malfunction with its navigation system propelled the craft past China and into Soviet lands where it was picked up by the KGB.
Later on, after the fall of the Soviet Union, it was transferred back into American custody as a gift from the KGB to retired Skunkworks president, Ben Rich.
The second flight performed admirably until the electronics module recovery system broke down after ejection and fell into the sea. The third mission went very well, but when the reconnaissance module was being retrieved it was accidentally grazed by a US Navy ship, causing it sink to the bottom of the ocean.
The final model, the D-21 #527, simply vanished from sight heading towards the Gobi Desert after launch. It was later found by Chinese authorities after going down near Lop Nor, and is now on display at the Chinese National Aviation Museum.
In 1971 the program was cancelled, and in January 1977, the 17 remaining D-21s were transported into long-term storage and subsequently loaned out to multiple aircraft museums around the USA, with two given to NASA.
In the late 1990s, the D-21s were earmarked to be involved in the testing of the trailblazing Demonstration of Rocket and Air-Breathing Combined Cycle Operation Engine, abbreviated ‘DRACO’.
The plan was to discharge them with B-52s in order to examine how DRACO performed at low-speed flight. Despite the D21s being deemed flightworthy by NASA inspectors, the proposed plan was never approved.
- Wingspan: 19 ft 0.25 in (5.8 m)
- Length: 42 ft 10 in (13.1 m)
- Height: 7 ft 0.25 in (2.1 m)
- Launch weight: 11,000 lb (5,000 kg)
- Cruise speed: Mach 3.32 (2,524 mph; 4062 km/h)
- Maximum speed: Mach 3.35 (3,600 km/h; 2,300 mph) (conversions estimated at the service ceiling altitude)
- Service ceiling: 95,000 ft (29,000 m)
- Range: 3,500 mi (5,600 km)
- Engine: 1 x Marquardt RJ-43-MA-20S4 ramjet, 1,500 lbf (6.7 kN) | <urn:uuid:617b737f-1a85-4963-828d-8449fc176c3c> | CC-MAIN-2023-06 | https://planehistoria.com/cold-war/d-21/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499946.80/warc/CC-MAIN-20230201144459-20230201174459-00810.warc.gz | en | 0.970787 | 2,319 | 2.875 | 3 |
Chemotherapy is known to come with a long list of side effects -- from debilitating nausea and hair loss to extreme fatigue -- and in many cases, it does not cure or even stop cancer from progressing. But what if chemotherapy does something no one has realized before during all the decades it has been in use? What if chemo actually encourages cancer to spread throughout the body, the process known as metastasis?
Researchers with the University of Alabama at Birmingham (UAB) Comprehensive Cancer Center and UAB Department of Chemistry have just been awarded a $805,000 grant from the U.S. Department of Defense Breast Cancer Research Program to see if the answer to those questions is "yes". The study is investigating the very real possibility that dead cancer cells left over after chemotherapy spark cancer to spread to other parts of the body.
"What if by killing cancer cells with chemotherapy we inadvertently induce DNA structures that make surviving cancers cells more invasive? The idea is tough to stomach," Katri Selander, M.D., Ph.D., an assistant professor in the UAB Division of Hematology and Oncology and co-principal researcher on the grant, said in a statement to the media. "Fundamentally this question must be answered to advance the knowledge base and to know all the risks and benefits of cancer treatment. This research has the potential to reach across numerous scientific disciplines, and may one day improve the lives of patients worldwide."
The UAB scientists are concentrating on inactivated or altered genetic material (DNA) left in the body after breast-cancer cells are exposed to chemotherapy. The research team stated that the resulting altered DNA could be the deadly factor that sparks the dreaded process of metastasis through a specific molecular pathway. Finding out whether chemotherapy could cause cancer spread is hugely important to the field of oncology because metastasis is the number one cause of cancer recurrence and treatment failure.
Dead cancer cells have been found to activate a pathway in the body mediated as a protein dubbed toll-like receptor 9
, or TLR9, that is present in the immune system and in many kinds of cancer. "If TLR9 boosts metastasis, then researchers will work on finding targeted therapies that block or regulate this molecular pathway," Dr. Selander stated.For more information:http://main.uab.edu/Sites/MediaRela...
Sherry Baker - Natural News | <urn:uuid:fe0717e9-feb3-464b-946a-b6936c9b220d> | CC-MAIN-2023-06 | https://www.enrichgifts.com/Chemotherapy-shows-potential-to-spread-cancer-s/100.htm | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499946.80/warc/CC-MAIN-20230201144459-20230201174459-00810.warc.gz | en | 0.942572 | 488 | 3.34375 | 3 |
What is a Herniated Disc?
The spine runs down the middle of the back. A healthy spinal cord is completely straight with all bones and discs in place. A herniated disc occurs when a disc of the spinal cord begins to move out of place, and this can cause chronic and severe back pain. Every vertebra is surrounded by protective discs, and when a disc begins to push out or in, the extra pressure goes directly to the spine. Basically, the disc has slipped out of its normal position within the spine. Most herniated disc cases are seen in the lower back. This cause of chronic back pain goes by several names. Patients may hear about a “slipped disc,” “pinched nerve,” “bulging disc,” or “ruptured disc,” but these conditions are the same and what we refer to as a “herniated disc.”
What Causes a Herniated Disc?
Typically herniated discs are caused by the wear and tear of aging. The outer ring of your intervertebral disc becomes weakened over time, which allows the inner disc to slip out of place. Factors that may add to your risk for developing a herniated, ruptured, or slipped disc are:
- Being overweight
- Wear and tear over time
- Sitting for long periods of time
- Weak back muscles
- An injury to the spine
- Lifting, moving, or twisting with heavy objects using the wrong technique
- Constant pulling, lifting, or straining of the back and spine
- A family history of disc degeneration
Herniated discs are also more common in men than women.
SYMPTOMS OF A HERNIATED DISC
Patients will know something is wrong if they are suddenly struck with never-ending chronic back pain. Usually, herniated disc pain in more toward the lower lumbar spine, and include symptoms such as:
- Muscle spasms in the back
- Chronic pain in any extremities — including the legs, feet, neck, arms, buttocks, hands, arms
- Feeling unexplained weakness when trying to stand or walk
- Numbness, tingling, burning, or weakness in the lower limbs
- Pain that is worse at night, after standing or sitting, or with certain movements.
TREATMENTS FOR HERNIATED DISCS
The entire spinal cord is sensitive due to the surrounding nerves. A herniated disc usually causes chronic back pain because of the extra pressure and stress put on the back. Patients ultimately need to rest the body and the spine; rest allows the body to heal itself. The best at-home herniated disc treatment is rest and relaxation. Besides resting, patients can take advantage of other at-home herniated disc treatments, such as:
- Taking short walks while using good posture and standing up straight
- Taking over-the-counter pain relief medicine, as needed
- Alternate applying heat and ice to the chronic back pain area
Overuse of the back and spine can prevent the herniated disc from returning to its normal position. Pain doctors will often recommend rest to treat minor herniated disc pain. It is when the pain turns chronic that patient should see a pain specialist for a treatment plan. A herniated disc with chronic back pain means the disc has seriously ruptured.
Spinal Cord Stimulation
Microdosing & Pain Pumps
Herniated Disc Recovery
Once the herniated or slipped disc returns to its normal position and is pain-free, patients can usually return to their typical schedule. The further treatment for herniated disc pain does not involve serious recovery time. Treatment options are non-surgical, technology-based, and natural. Natural treatment leads to a full recovery, but patients should make necessary lifestyle changes to prevent other discs from slipping or rupturing in the future. | <urn:uuid:62ce60a4-37e2-4ee4-9777-12d2331c83a6> | CC-MAIN-2023-06 | https://spacecitypain.com/herniated-disc/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500041.2/warc/CC-MAIN-20230202232251-20230203022251-00010.warc.gz | en | 0.929219 | 827 | 3.484375 | 3 |
Guinea pigs are social little animals. In their natural habitat they live together in herds. It is recommended that you have more than one guinea pig as pets. Having a companion makes them feel more relaxed and secure.
Guinea pigs are prey in the wild and for this reason they need to live in groups for security. They can alert each other when a predator is spotted, so that they can take cover and hide.
Why do guinea pigs need a cage mate?
We want to provide an environment for our guinea pigs where they can feel safe, secure and happy.
To do this we want their environment and interaction to be as close to their natural environment as possible. This is why they need a friend, a companion of their own kind to communicate and play with.
Guinea pigs as pets can be great companions to us, but just as they can’t replace human interaction for us, we can’t replace a guinea pig companion for them. At the end of the day they will still go back to a lonely, empty cage.
Guinea pigs should live with other compatible guinea pigs
Guinea pigs should be introduced to other guinea pig friends at a young age. It’s easier to bond and develop the social skills they need to function well in a herd.
It’s best to have 2 or more guinea pigs in a herd.
Recommended combinations of guinea pigs
- Two or more sows
- Two boars
- A neutered boar with one or more sows
Combinations of guinea pigs to avoid
- Three or more boars
- A grown boar with a very young boar (it may result in fighting, because as the little one matures, he might want to compete for dominance)
- A rabbit and a guinea pig
Can guinea pigs and rabbits be kept together?
Guinea pigs and rabbits should not be kept together. Some rabbits may carry a specific bacteria that often cause respiratory issues in guinea pigs.
Rabbits can also bully guinea pigs and can seriously injure them with their powerful kick.
How to introduce guinea pigs to each other
It is important to introduce guinea pigs to each other in a neutral space like:
After the cage has been thoroughly cleaned and you’ve placed fresh food, hay and water.
Or outside on the grass in a playpen
Place your piggies in the neutral environment at the same time, so they can investigate their surroundings and approach each other.
Watch them for at least an hour for signs of bonding or aggression.
Signs that your guinea pigs are bonding
- They are following each other
- Eating close to each other
- Males will sometimes make a rumbling sound
- Popcorning (suddenly jumping in the air)
Signs that your guinea pigs are aggressive
- Chattering of teeth
- Attacking or fighting
- Opening their mouths at each other
- Signs of blood or injury
Luckily most younger guinea pigs will act like long lost friends when meeting for the first time.
Tip when introducing guinea pigs
Even though guinea pigs are little herd animals, they all need their space sometimes.
Make sure you provide enough hideys for when they want a little space.
I have hideys made from fleece material and then also a box which I normally cut with two doorways, so they can’t corner each other and it’s easy to escape out the other door. | <urn:uuid:2178e8b3-56c0-440e-b043-904899b2433d> | CC-MAIN-2023-06 | https://guineapals.com/do-guinea-pigs-need-friends/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500094.26/warc/CC-MAIN-20230204044030-20230204074030-00090.warc.gz | en | 0.946834 | 731 | 3.171875 | 3 |
Mar 28th 2016
Learn to Program with Minecraft
Learn to Program with Minecraft, users can learn how to build a palace in the blink of an eye. All this and more can be done with Python, a free language used by millions of programmers. Simple Python lessons can teach you to modify Minecraft to product instant and awesome results. Craig Richardson is a trainee Computing and ICT teacher originally from the North East of England and working in East London.
Download or subscribe to this show at https://twit.tv/shows/triangulation.
Thanks to Cachefly for the bandwidth for this show. | <urn:uuid:ec319100-b429-4655-8fb5-7b78eb5f0507> | CC-MAIN-2023-06 | https://twit.tv/shows/triangulation/episodes/243?autostart=false | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500094.26/warc/CC-MAIN-20230204044030-20230204074030-00090.warc.gz | en | 0.881185 | 129 | 2.671875 | 3 |
How does the baby grow?
Now the baby is about 40cm long and weighs about 1.3kg (about the size of a cabbage). There is 1.5 liter of amniotic fluid surrounding the baby’s body, but it will decrease as the baby gets bigger and occupies more volume in the mother’s womb.
Besides, the baby’s vision continues to develop though it happens not so quickly. Even after birth, the baby still closes their eyes most of the day. When opening the eyes, the baby will respond to changes in light, but only reach 20/400 eyesight, which means that the baby can only see objects about 5cm from the face.
Changes occurring in the mother’s body during the 30th week of pregnancy
Moms may feel a bit tired on these days, especially if moms are having trouble sleeping. Moms may also feel awkward than usual because moms are heavier and the body’s focus changes. In addition, the fact that ligaments and joints become loose due to hormonal changes makes moms lose balance.
Do moms remember the previous mood swings in pregnancy? A combination of unpleasant symptoms and hormonal changes can bring those up and down emotions back. Moms may be worried about the birth, or whether moms are a good mother or not. That is perfectly normal. | <urn:uuid:46e9399c-f94c-47aa-8ade-9c0b6772afe6> | CC-MAIN-2023-06 | https://blog.motheringdiary.com/30-weeks-pregnant.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500251.38/warc/CC-MAIN-20230205094841-20230205124841-00170.warc.gz | en | 0.938837 | 278 | 2.5625 | 3 |
Regulator for Boiler Feed
Regulator Steam and Size
- System's load includes all boilers that may run at the same time.
- The temperature (°F) of condensate returns and make-up water is returned to as blend temperature.
- Represents temperature (°F) that the liquid is to be heated to. Temperatures below 180°F will cause water hammer and noise. For temperatures above 205°F, a deaerator should be used.
- Steam supply pressure cannot exceed 125 psig. If steam supply pressure available is above 15 psig, a pressure reducing valve must be used to reduce steam pressure down to 5-7 psig in the tank. A regulator comes standard with a pressure reducing valve.
- Size is for a Self-Contained Regulator normally used on Boiler Feed Units. Regulator models vary if steam pressure at regulator is less than or equal to 15 PSIG or greater than 15 PSIG but less than or equal to 125 PSIG.
- Regulator Size not applicable. The resulting Amount of Steam exceeds a Regulator Size of 4 inches. | <urn:uuid:41e80905-fca3-4f18-bbbc-51c318c56f1a> | CC-MAIN-2023-06 | https://shipcopumps.com/tools/mathwizard/index.php?category=steam-regulators&id=regulator-boiler-feed | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500251.38/warc/CC-MAIN-20230205094841-20230205124841-00170.warc.gz | en | 0.861082 | 239 | 2.609375 | 3 |
What condition do Neil Diamond and Billy Connolly share?
If you guessed Parkinson’s Disease, you’re right. The list of high profile identities with Parkinson’s Disease (PD) is long, however you may also know somebody personally who is living with this condition. PD has an estimated prevalence of 0.85% in the Australian population (Australian Journal of General Practice (2021) but many of us don’t really understand what this diagnosis entails beyond the tell-tale tremors, nor is it widely understood that exercise can play an important role in managing this disease.
So, what is Parkinson’s Disease?
Parkinson’s Disease is a common, complex, progressive neurological condition that comes with a multitude of motor and non-motor problems. Motor challenges for individuals with PD can include a resting tremor, rigidity and stiffness of the trunk and limbs, bradykinesia or slowness of movement, as well as balance problems and falls. Those with PD can also experience cognitive challenges including memory difficulties, personality changes and changes in the ability to think and reason. PD can affect the gastrointestinal system and autonomic nervous system, leading to changes in gut health, sleep and mood (Parkinson’s Australia Inc., 2014). Recognising these signs and symptoms can aid early diagnosis and slow disease progression.
What’s dopamine got to do with it?
Dopamine is often referenced as the chemical in our brain that makes us feel good. However, dopamine also plays in a role in the complex pathways of the brain which allow us to perform movement. You can think of dopamine like a wi-fi signal that enables movement. Dopamine is normally produced in the substantia nigra in our midbrain. In the case of PD, the brain cells located in the substantia nigra start to degenerate, leading to a gradual deficit of dopamine. This in turn weakens dopamine’s ability to act as that wi-fi signal for movement, and furthermore affects movement tasks as simple as walking or getting out of a chair. For this reason, medications for PD usually aim to artificially boost the supply of dopamine.
Exercise and Parkinson’s
People that have been diagnosed with PD have usually spoken to their GP, and discussed medical interventions with a neurologist. However, exercise also has a crucial role in the management of PD. Those with PD are advised to target aerobic fitness, strength, balance, and flexibility, according to the The American College of Sports Medicine – view their specific exercise guidelines here.
In Australia, group based exercise programs are available for individuals with Parkinson’s including innovative options such as Dance for Parkinson’s which offers classes with the Queensland Ballet right here in Brisbane. Even Ali, or the ‘balletic boxer’ as he has been called, loved ‘a lot foot work, a lot of dancing‘ while in the ring! Think of Ali’s claim to ‘float like a butterfly’ and we can see how footwork and balance were so important to his success. And while we can’t confirm that Ali danced after his PD diagnosis, he did became a huge contributor to early research in the field. It was due to his heavy investment into PD studies that it is now widely accepted that regular exercise, particularly when begun early after diagnosis, can reduce symptoms and greatly increase a patient’s quality of life.
How can UQ Healthy Living support clients with PD?
UQ Healthy Living is interested in making a difference for those living with Parkinson’s Disease. We encourage clients to reimagine what is possible and what movement might look like for them. Our allied health team acknowledges that each person has their own unique challenges and we take a tailored approach to treatment. Please get in touch with us to discuss a 1:1 consultation. | <urn:uuid:d4954334-db96-4b01-8f90-4800b63fe661> | CC-MAIN-2023-06 | https://www.uqhealthyliving.org.au/parkinsons-disease/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500251.38/warc/CC-MAIN-20230205094841-20230205124841-00170.warc.gz | en | 0.962776 | 798 | 3.21875 | 3 |
How much of the battery capacity is actually used?
June 9, 2022
The hidden waste
At least 15 billion primary batteries are being disposed of yearly worldwide. The world is getting better at recycling, which is excellent news. However, the bad news is that we are still throwing batteries that are not fully utilized. Unused battery capacity is hidden waste that goes unnoticed for consumer electronics, but it is getting noticeably annoying for the businesses within the Internet of Things (IoT) and medical space. The IoT and medical device suppliers need to deliver on promised battery life but don’t know how well their devices are using the batteries.
The good or bad fit
Batteries have specific performance characteristics. The electronic device needs to have a matching power consumption profile for the capacity to be fully used. The power consumption profile depends on the choice of hardware, layers of software and connectivity and the actual device usage. Suppose the power profile doesn’t match the battery characteristics. There will be energy that is never extracted, which is valid for primary batteries and rechargeable batteries for any application and industry. There could be a good or a bad fit for your small loT sensor, a smartwatch or the electrical vehicle (EV) that you are developing.
Furthermore, the batteries can be of bad quality. For everyone working in development projects where second sourcing of components is essential for the reliability or cost-down activity (and batteries are one of the most expensive components), validating the battery performance is the key. You may have figured out your device’s power consumption performance but are still underutilizing the energy source due to a particular bad battery batch or an overall bad design and quality. The difference between brands is noticeable.
Unused battery capacity
One thing is for sure, there is no such thing as utilizing the battery to 100%, but you can get close. On the other hand, a bad match can be pretty bad. Our testing shows between 30-50%, on average, of capacity never being used.
Let’s look at an example of an IoT device with a coin cell battery.
The battery data sheets usually show a typical capacity that you could expect if you match your device well with the battery and use it in a normal temperature type of use case. However, suppose the matching is not good or the battery is bad quality. You may be limited to utilizing only 16% of the available energy, as for Battery 1 in table 1 above.
If you are interested, you can read the technical benchmark study where this example is from here.
Battery life impacts your business
Unused battery capacity can make or break a business. As a device supplier, you can not guarantee battery life if you don’t understand how well your product and the energy source are matched. The hidden energy waste can mean countless and expensive maintenance and replacements of the batteries and costly IT downtime, either for you or your customer.
Let’s play with an example of having 10 000 IoT devices deployed for tracking purposes. In general, we hear five years of battery life presented. Though not guaranteed, this is most likely only calculated by simply dividing battery capacity with an average current across use cases. Also, the battery characteristic is taken from the datasheet for a ‘typical’ use case. In this case, there will be a normal distribution of batteries running out, which means at least twice during the five years, there will be changes in batteries. At the worst, you may be looking at 10 000 x 2 x $300 (approx. cost per battery change) = $6M in maintenance cost per the life cycle. Who is paying for this, you or your customer?
If the IoT solution that you are providing is for mission critical purposes, then you have to consider the IT downtime. According the Gartner the downtime can be very expensive, up to $5 600 per minutes are mentioned here. Doing an software over the upgrade for the deployed IoT device and not checking that the upgrade doesn’t have negative impact on the battery life and thus your business is really risky.
What can be done?
Start measuring! Gain insights into how your device behaves for different use cases and start characterizing and validating your batteries. It is simple as that. To understand your device, you can use Otii Arc and Otii Automation Toolbox for software quality assurance. For battery validation, Otii Battery Toolbox or our battery analytics service can help. Contact us to see what solution fits your organization the best for characterization, benchmark, and validation of batteries. | <urn:uuid:e9285d49-7ad3-46a7-9884-239733869550> | CC-MAIN-2023-06 | https://www.qoitech.com/blog/how-much-of-the-battery-capacity-is-actually-used/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500641.25/warc/CC-MAIN-20230207201702-20230207231702-00330.warc.gz | en | 0.941914 | 934 | 2.875 | 3 |
An prefix expression is a expression in which first operator comes and proceded by strings. Every prefix string longer than a single variable contains first and second operands followed by an operator.e.g. A,+A B ,*A B ,+ * A B/ C D.
An postfix expression (also called Reverse Polish Notation) is a single letter or an operator, preceded by two postfix strings. Every postfix string longer than a single variable contains first and second operands followed by an operator.e.g. A,A B +,A B + C D –
First,Read the Prefix expression in reverse order (from right to left)
1.If the symbol is an operand, then push it into the Stack
2.But if the character is an operator, pop the top two values from stack.
3.Create a string by concatenating the two operands and the operator between them. string = (2nd top value+1st top value+operator)
4.And push the resultant string back to Stack Repeat the above steps until end of Prefix expression..Checkout examples that are mention below in table.And you can also check postfix to prefix Converter and postfix to posfix Converter .Checkout examples that are mention below.
Since some compilers,editors calculators convert expression to postfix to evaluate an expression. That's why if it has prefix expression that should be converted to postfix due to their further evaluation. So,this type of converter can be helpful in such cases. | <urn:uuid:ab0fbe74-d3ec-4a24-8b1b-5ca8f410ec7d> | CC-MAIN-2023-06 | https://www.calcont.in/Conversion/prefix_to_postfix | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501066.53/warc/CC-MAIN-20230209014102-20230209044102-00410.warc.gz | en | 0.868205 | 324 | 3.71875 | 4 |
Tamar Ezer and Judy Overall
Health and Human Rights 15/2
Published December 2013
Background: In Eastern Europe and Central Asia, for society’s most marginalized people, health systems are too often places of violations of basic rights, rather than of treatment and care. At the same time, health practitioners are largely unaware of how to incorporate human rights norms in their work. Additionally, they may face abuses themselves, such as unsafe working conditions and sanctions for providing evidence-based care. Similarly, legal professionals have limited experience working in the health sector, trying to address abuses that occur.
Context: Republics of the former Soviet Union and Yugoslavia have emerged from communism and experienced continued restructuring of their health care systems. As faculties of law, public health, and medicine have sought to incorporate these rapid changes into their curricula, this period of reform and openness to new approaches presented a particular opportunity to integrate human rights education.
Results: The Open Society Foundations have attempted to respond to the need to build health and human rights capacity by supporting the development of over 25 courses in human rights in patient care in nine countries. Targeted at different audiences, these courses are now part of the regular offerings at the academic institutions where they are taught. Student evaluations point to the strength of the interdisciplinary approach and the need to integrate practical examples and exercises. Faculty response has led to the development of a virtual community of practice and series of workshops to gain exposure to new ideas, strengthen interactive teaching, and share materials and experiences.
Reflections: Critical to this initiative has been working with faculty champions in each university, who shaped this initiative to meet the needs in their context. It quickly became apparent that teaching methodology is as important as content in human rights education. Meaningful engagement with health practitioners has entailed connections to day-to-day practice, participatory methodology, inclusion of marginalized voices, and linkages to provider rights and challenges.
In Eastern Europe and Central Asia (EECA), as in many other parts of the world, for society’s most marginalized—people with disabilities, people living with HIV, people who use drugs, and ethnic and sexual minorities—health systems can too often be places of punishment, coercion, and violations of basic rights to privacy and confidentiality, rather than places of treatment and care.1 At the same time, doctors and other health practitioners are largely unaware of how to incorporate ethical and human rights norms in their work. Additionally, they may face abuses themselves, such as unsafe working conditions, lack of due process when complaints are filed against them, and sanctions for providing evidence-based care.2 Legal professionals have not offered much help in such situations, as they have limited experience working in the health sector and addressing the abuses that occur. This paper shares findings and reflections from an Open Society Foundations (OSF) initiative seeking to address this gap through higher education courses providing basic human rights training to the next generation of health practitioners and equipping legal professionals to work at the intersection of law and health in nine EECA countries.
Both authors helped guide OSF’s initiative from its inception, and this paper draws on our personal experiences. While this initiative by no means presents a perfect model and work is still in progress, it provides insights into health and human rights education in EECA, including strengths and gaps. It also offers guidance for the teaching of human rights in patient care more broadly. The first section outlines the context in EECA countries, the second section presents the various components of the OSF initiative, and the final section shares reflections and lessons from this work, indicating areas for further development.
The participating countries in the initiative were republics of the former Soviet Union (Armenia, Georgia, Kazakhstan, Kyrgyzstan, Moldova, Russia, and Ukraine) or part of the former Socialist Federal Republic of Yugoslavia (FYR Macedonia and Serbia). All emerged from communist systems (either Soviet or Yugoslav) and have experienced disintegration followed by transition and continuing change. 3 Although there was alignment between the Soviet Union and Yugoslavia in 1945 immediately after World War II, including similarity in central state administration in the health sectors, this ended in 1948. The Soviet Union continued with its centralized health system, while Yugoslavia developed a more decentralized one, after going through alternating cycles of centralization and decentralization until the early 1950s.4
Countries of both the former Soviet Union and Yugoslavia faced many similar problems and often adopted similar responses. All experienced continued restructuring of national health systems and changes in infrastructure, with a general reduction in the health care workforce.5 Almost all countries faced diminishing public resources available for health services and changes in health care financing.6 Rising poverty levels in most countries impacted the population’s ability to pay for services that were once free, leading to problems with equity and access to basic health services. Corruption in government and regulatory structures further exacerbated problems with equity and access.7 These various factors contributed to a general disintegration in health status and decreases in life expectancy.8
Former Yugoslav countries further faced the trauma of civil war, ethnic cleansing, sanctions, and NATO bombing. War resulted in destruction of hospitals and negatively impacted the delivery of health care services. In 2012, the Commissioner on Human Rights for the Council on Europe characterized the civil war in former Yugoslavia as the period with the greatest human rights and humanitarian law violations in Europe since World War II.9 Physicians for Human Rights had provided a similar assessment.10
Countries of the former Soviet Union further have had to contend with a legacy of collusion between the medical establishment and the state in violations of rights. Doctors practicing in the Soviet Union, in fact, had to swear an oath of loyalty to the state.11 Egregious abuse of medical care for political purposes included psychiatric confinement of political opponents.12
Additionally, both the Soviet Union and Yugoslavia collapsed at the time of the “new age of infectious disease,” with its implications for the policing functions of public health and its differential impact on marginalized populations. In post-Soviet countries, particularly Russia, there has been a drastic rise in mortality due to new or re-emerging infectious diseases such as HIV and tuberculosis.13 As Emma Jolley and her co-authors point out, the HIV epidemic has had a disproportionate effect on “populations who are socially marginalized and whose behavior is socially stigmatized or illegal.”14 The population of people who inject drugs in EECA is one of the fastest growing in the world and accounts for two-thirds of all HIV diagnoses in Europe (70% in Russia).15 The rise in drug use has led to police crackdowns with negative consequences for health.16 Fear caused by criminal laws banning syringe provision and requiring government registration of all even suspected of drug use drives those who use drugs away from life-saving HIV prevention and treatment, as well as other health services.17 It further fosters risky behavior such as needle-sharing, which facilitates transmission of HIV, hepatitis B and C, and tuberculosis.18 Additionally, restrictions or bans on essential medicines designed to combat illicit drug use hamper needed substitution treatment for people with opioid dependence and condemn millions of cancer and other palliative care patients to unnecessary pain and suffering.19 Health professionals are also impeded in their work “within a legal and policy framework that is often in direct conflict with fundamental medical ethics—not least the commitment to ‘first, do no harm,’” as noted by the nongovernmental organization (NGO) Count the Costs.20
The impact of the “war on drugs” is just one of many examples of the unintended consequences of government policies on the health of individuals and the community. The policing function of public health is not new, and its power to curb individual rights—whether to curtail smallpox or tuberculosis—has historically been vast.21 Today, international bodies have determined that infectious diseases rise to the level of threats to international security, and there is again discussion of the “medical police” function of sovereign power.22 It is, however, critical for a human rights analysis to inform these discussions and guide any restrictions.23
EECA countries in transition continue to struggle to meet these challenges to health care access and equity and to define adequate frameworks for protecting basic rights and quality in the delivery of health care. These frameworks include law reform, as well as effective implementation of existing laws on informed consent, confidentiality, privacy, and non-discrimination in the health care arena.24 Both Macedonia and Serbia are candidate countries for accession to the European Union (EU) and have adopted or harmonized laws required by the accession process. The political criteria to be met include the stability of institutions safeguarding democracy, the rule of law, human rights, and protection of minorities.25
Medical, public health, and law schools seeking to incorporate these rapid changes into their curricula have presented a particular opportunity for human rights education. EECA law, medical, and public health schools have been reformed, established, or expanded just as the rights-based approach to health has matured globally and in the West, translating into formalized health and human rights curricula.26 EECA faculty were thus open to new approaches and well positioned to take advantage of lessons learned and state-of-the-art methods in this arena.
The higher education initiative described below attempts to assist EECA faculties of medicine, law, and public health to integrate these lessons and methods and adapt them to their distinct local context. Incorporating human rights in patient care into the professional training of medical and legal personnel develops an understanding of the interconnectivity and human value of all the stakeholders—patients, doctors, health managers, and others, as well as the role of the state. Jennifer Leaning articulates it succinctly: “There is perhaps no better place to begin to impart an awareness of human dignity than in the small world of the doctor-patient relationship.”27
Developing human rights in patient care courses
The Law and Health Initiative (LAHI) of the Open Society Public Health Program, in collaboration with other OSF partners, has attempted to respond to the need to build health and human rights capacity by supporting the development of over 25 courses in law, human rights, and patient care in nine EECA countries: Armenia, Georgia, Kazakhstan, Kyrgyzstan, Macedonia, Moldova, Russia, Serbia, and Ukraine. Targeted at different audiences and of varying levels of sophistication, these courses are now sustainable and part of the regular offerings at the academic institutions where they are taught.
The initiative began in 2007 when LAHI hosted a seminar as part of the Salzburg Medical Seminar series in Austria. The seminar brought together medical, public health, and law faculty from six EECA countries along with key partner NGOs and patient advocates. Participants spent an intensive week examining critical human rights in patient care topics and thinking creatively about how to structure a course addressing these issues. Topics explored included the international framework for health and human rights; patient privacy, consent, and confidentiality; institutionalization and the health care system; criminalized populations and disease vulnerability; providers’ rights and their relationship to patients’ rights; legal remedies for health care abuses; and human rights in health care reform. While faculty from countries that joined this initiative at a later point did not attend the seminar, they also drew on the seminar resources.
Faculty participants subsequently developed proposals for courses tailored to their national context and target audience. Target audiences varied, including medical students, medical practitioners, nurses, health managers, public health students, and law students. LAHI and OSF partners provided one year of support for the development and piloting of the courses, contingent on institutional backing from the host university and the understanding that if piloting was successful, the courses would then be a regular part of the offerings at each university. To qualify for funding, courses did not need to focus exclusively on human rights in patient care. In many of the countries, law and health (often called “medical law” in the region) itself was a new field, and such an exclusive focus would not have been politically viable at the various institutions. However, to join this initiative, human rights in patient care had to be a central component of the proposed course.
While the development of courses in most of the countries followed the above route, partners in Ukraine took a different approach: developing a course in medical law to be introduced into all the medical universities with Levels III and IV accreditation. This resulted in a larger working group with 27 members representing various medical universities, more levels of review and approvals, and a two-year process lasting to 2009. The Minister of Health created and convened the working group by ministerial order in 2007, with other working sessions held at one of the national universities. On October 19, 2009, Minister of Health Order No. 749 approved and introduced a new curriculum for training in the following areas: general medicine, pediatrics, and general medicine and prophylaxis (preventive health care).28 This included medical law, with components of human rights in patient care, to be taught to fourth- and fifth-year medical students.
Parallel to this initiative, in Romania, OSF’s Roma Health Project partnered with the Association for Development and Social Inclusion (ADIS), a Romanian NGO, to develop courses on non-discrimination and ethics in four medical schools in Romania. These courses address ethics in human subjects’ research, the rights to health and non-discrimination, mechanisms for protection at both the Romanian and European levels, and Roma history and traditions.29
Table 1, shown at the end of this paper, provides a summary of the courses directly developed as part of OSF’s human rights in patient care initiative. All of the courses created course materials and manuals, with some also compiling textbooks. Most of the courses are housed in faculties of law, medicine, or public health (including health management). Two are taught in medical colleges for nurses. They are taught at varying educational levels: master-level law; basic/undergraduate, residency, and postgraduate medical; basic-level nursing; and master-level public health and health management. Number and type vary by country.
The highest numbers of law students are taught in Georgia. As Table 1 shows, there is also a course in the school of public health at the state medical university in the capital, Tbilisi. Georgia is unique in its approach of preparing one basic curriculum (Health Law: Health and Human Rights) and modifying it for the particular student target audience. They also have one core faculty for all the courses—a mixture of legal and medical/health care professionals—with guest lecturers for particular target groups. The course at the school of public health best covers the tensions and synergies that arise between public health interventions and human rights.
Other countries have a variety of courses, as Table 1 shows, with most courses being in medical faculties or schools of public health. There are three others in law faculties and two more that are joint courses between law and medical faculties.
The development of these courses has produced a ripple effect, with other faculty inspired to adopt topics and materials on human rights in patient care in their courses. This transfer took place quite naturally at the same institution where interdisciplinary faculty teams developed the courses in the first place, leading to courses taught at both medical and law faculties. For instance, the course at Saints Cyril and Methodius University in Macedonia is a collaboration of the Faculty of Medicine/Center of Public Health and the Faculty of Law. The course is taught separately to graduate-level law and public health students, with faculty members from both faculties teaching. Once the core curriculum for the course was in place, junior faculty came on board to help teach, thus also entering the field.
Likewise, courses spread to involve students at different levels. In the Kazakhstan School of Public Health, the original course for health managers in the Master Program of Public Health was designed for second-year students. However, student response to the course was so positive that faculty determined a course was needed for first-year students. In Armenia, the state medical university in Yerevan, which initially developed a course for medical residents, added the course for upper-level dental and general medicine students as well. Initial plans for a law, human rights, and patient care course in Serbia focused on upper-level medical students. However, the medical faculty opted simultaneously to design and pilot three continuing education courses, all open to doctors, pharmacists, nurses, lawyers, economists, and public health professionals as members of multidisciplinary teams. All four courses have been nationally accredited, and the course guide was submitted in September 2013 for inclusion in the literature list for graduate and postgraduate education in Serbia.
The new field of human rights in patient care also sparked broader interest by other universities in the country. In Kyrgyzstan, the course for health managers and health care decision-makers was introduced into the curriculum of a national institute for continuing professional education, with later development of a separate department to institutionalize the course. Soon afterwards, faculty at the Kyrgyz-Russian Slavic University developed a mandatory law and health course for civil law students: the project included training for staff and students at the university’s legal clinic to assist with claims of human rights violations in the health care arena. The Kyrgyz State Academy of Law, on its own initiative, developed and piloted a medical law course that includes human rights-in-patient-care components. After faculty successfully offered this course over two academic years, the Academy decided to include it in the regular university curriculum. The university then coordinated an initiative across various law faculties in the country, sharing materials developed and seeking Ministry of Education inclusion of the course in the list of mandatory courses for law curricula. In Armenia, following up on a successful course at the state medical university in Yerevan, two medical colleges developed courses for nurses—the only two courses specifically for nurses set up as part of this initiative.
In Russia, an initial course on human rights in patient care similarly spread to have wider reach. Participants in the original course at the then St. Petersburg Medical Academy of Postgraduate Studies (MAPS), now part of North-Western Russia Medical University Mechnikov, requested three seminars for their co-workers at health care organizations and facilities. Then, a second course, for law students, was prepared jointly with the Interregional Institute for Law and Economics. Faculty then created a separate course for teachers who address health law problems in their courses from various academic institutions. The faculty also prepared three short textbooks.
The above examples illustrate how well the courses have been received. Written participant evaluations combined with evaluation site visits consistently showed mostly positive reactions. In one elective course, since the course was not mandatory, on-site evaluators asked why students took the course; the students overwhelmingly responded that they needed to know this material. Those training to become health managers found the knowledge essential for management positions in health care facilities, dealing with rights and responsibilities of both patients and health care providers, while complying with state regulations. Those already in decision-making roles in health facilities were quite vocal that the postgraduate-level courses should be longer. Medical students and residents also often agreed that courses should be longer, although difficult to integrate into the busy medical curricula. Principles such as confidentiality, privacy, and informed consent were of interest to doctors, medical students, and health managers when approached through a human rights lens. At the outset, some students expressed uncertainty about paying special attention to marginalized groups, rather than keeping a broad focus on the human rights of patients generally. However, during the course, they unpacked the principle of non-discrimination and learned to appreciate the particular health challenges facing marginalized populations.
Course evaluations consistently stressed the need for practical experience and exercises. Students explained that although they must understand theory, “real life” examples and case studies, including actual legal cases and video where these exist, are most effective. One challenge for faculty is that few legal cases exist yet at the national level in these countries. However, students found the use of relevant European Court of Human Rights cases particularly valuable.
Additionally, students appreciated the interdisciplinary team approach to teaching these courses and interaction with multiple perspectives. Students had the opportunity to hear from doctors, bioethicists, ombudspersons, Ministry of Health staff, and directly from members of marginalized groups, as well as from lawyers and law professors. In Georgia, students remarked on the power of having a sitting Supreme Court Justice and a former president of the national bar association articulate the importance of human rights in the delivery of health care services and lead related exercises in class.
Students particularly praised the use of interactive teaching methodology. Some of the most popular exercises required doctors and medical students to assume the role of patients, patients’ family members, or representatives in a role play, or that of lawyer or judge in a moot court exercise. Professors similarly recognized how “walking a mile in another person’s shoes” helped students to grasp the complex interplay of law and medicine in human rights in patient care, with its inherent tensions and, sometimes, competing interests. Consequently, professors (even those with practical experience and degrees in both law and medicine) continued to request training and materials on interactive teaching.
Developing a community of practice
At the outset, LAHI and OSF partners envisioned the successful development of courses to be the end of the initiative. However, they were soon beset with faculty requests for help in strengthening their teaching and for greater connection with their peers. The various faculty members involved in this initiative were pioneers in their countries and craved contact with experts, as well as a community with whom to share ideas, materials, and experiences. As mentioned earlier, there were many requests for resources to assist in interactive teaching. Faculty sought not just scholarly articles and readings on human rights in patient care, but also exercises and other interactive materials they could use.
To meet this need, LAHI and OSF partners organized a series of workshops in the period from 2009 through 2012 for faculty to share materials and experiences with each other, interact with international experts, and jointly develop lesson plans and case studies. Workshop topics have included human rights and health care privatization; access to pain relief and essential medicines; health care and people who use drugs; limitations on human rights in the name of public health; and physician dual loyalty and human rights (for which the guidelines of the International Dual Loyalty Working Group provided an important resource).30 Workshop topics were taught through a variety of different methods, including role plays, games, debates, brainstorming, needs assessments, film, and guest speakers, enabling faculty to experience and experiment with different interactive teaching methodologies. Peer learning during the workshops has also been critical. Faculty themselves led many of the workshop sessions and taught “master classes,” which colleagues could then adapt and use.
LAHI further supplemented materials produced by faculty themselves through the workshops. To meet the consistent demand for case studies, LAHI partnered with the Health Equity and Law Clinic at the Faculty of Law, University of Toronto and with the Hastings Center to develop a series of case studies on cutting-edge health and human rights topics. Issues explored included access to sex reassignment surgery in relationship to legal identity change, access to maternal care for women who use drugs, and coercive sterilization of women living with HIV.31 Additionally, faculty drew on materials produced through parallel LAHI initiatives in their teaching. LAHI and OSF partners supported the development of Practitioner Guides, or practical manuals for lawyers taking human rights in patient care cases, in many of the same countries involved in the courses. These manuals examine patient and provider rights and responsibilities and procedures for protection at national, regional, and international levels.32 Thus, in addition to information on the international and European framework, they provide a human rights analysis of national level laws and procedures, which faculty incorporated in the courses.
Complementing in-person workshops, LAHI and OSF partners also supported the development of an online Community of Practice (available at http://cop.health-rights.org/teaching/) faculty to stay in contact more regularly and for greater sharing of resources. In addition to housing all workshop materials, as well as materials developed by the faculty themselves, the Community of Practice includes curated topical modules with articles and exercises, a section on teaching methodology, and a section with links to relevant films specifically requested by faculty.33 In collaboration with NGO partners, OSF is currently producing a series of videos focused on work protecting the rights of patients from socially marginalized groups, which will be added to the website. Videos feature Roma patients in Macedonia, transgender persons in Ukraine, homeless people living with HIV in Russia, and patients marginalized because of their illness, including cancer patients in Armenia and hepatitis C patients in Georgia. Traffic on the Community of Practice website is particularly heavy at the start of a new semester. For instance, in January 2013, the site received over 3000 visitors with the highest numbers from Russia, Ukraine, Kazakhstan, and Macedonia (in that order). By June 2013, the highest numbers of users were from the US, Ukraine, Russia, Kazakhstan, and the United Kingdom (in that order); there were users from 110 countries (and an additional 187 users for whom countries were not identified).
Critical to this initiative has been working with faculty champions for the field of human rights in patient care at each university. While OSF hosted the initial seminar and provided start-up funding for the development and piloting of courses, faculty drove the project forward. Faculty champions were able to navigate administrative hurdles and the internal politics of each university to get their courses approved and integrated into core university offerings. In some cases, as in Ukraine, this also meant negotiating with government ministries. OSF staff and consultants did not attempt to collaborate with the university administration themselves. Rather, they took a more bottom-up approach, working directly with faculty and investing in building their substantive capacity. Faculty were not shy in letting LAHI and OSF partners know what they needed and what capacities they wanted to strengthen. Their requests led OSF to move beyond the initial vision to development of a multi-year second phase focused on building a community of practice, both virtually and in-person through the series of teaching workshops.
The bottom-up approach taken by this initiative has also led to variation amongst the different courses. While they all have a central component of human rights in patient care, they differ in emphasis, depth, breadth, and teaching methodologies. This initiative has provided much room for local input. The strength of this approach is that it allows for ownership by the faculty who can tailor the curriculum to their particular country contexts and target audiences. This latitude, however, can also lead to uneven quality, making capacity-building for faculty critical.
Since many of the courses include a component on human rights in patient care within a larger law and health course, there at times could be tension between OSF’s desire to narrow and focus on human rights and the universities’ desire to teach a broad course with wide appeal. Faculty negotiated this tension with varying results. Some courses are stronger in human rights than others, depending on both context and faculty capacity. In many instances, human rights have become the frame for addressing all the law and health issues covered in the course. This overarching framework has provided an opportunity to define a human rights approach to a number of different health issues, and the tension between human rights and broader law and health issues has become a source of creativity. For instance, in Georgia, faculty pointed to the importance of paying careful attention to rights protections when designing health insurance regulations.34 Other faculty looked at the implementation of new health technologies and blood/organ donation through a human rights lens.
Absorption of the human rights framework also differed by country. There was particular enthusiasm for the human rights framework and incentives for its adoption in schools in Macedonia and Serbia, at least partially due to their EU candidate status and its corresponding requirements. In these countries, there was also greater flexibility for the development of new courses, despite the need to meet certain standards and adhere to institutional bylaws. Ukraine was at the opposite extreme in terms of flexibility, where faculty in collaboration with the Ministry of Health took a more centralized approach, convening a working group to develop a course for all medical universities with approval of the curriculum required at the Ministry level. Georgia was the most receptive to instituting courses in law faculties; most other courses focused on medical students. Additionally, schools in Eastern European countries showed particular interest in the application of European Court of Human Rights cases and their impact on the law and health framework.
OSF realized early on in this project that teaching methodology is as important as content. Human rights cannot be adequately taught through classroom lectures. A human rights analysis requires more than memorization of a set of norms. As Nancy Flowers writes, “Human rights education must be more than knowledge about human rights documents. It must involve the whole person and address skills and attitudes as well.”35 Students need to grapple with difficult questions, and the voices of people from marginalized communities need to be brought into the classroom. As one professor explained, students need to “feel the problems marginalized communities face by working directly with them. They can then understand, appreciate, and personalize these problems. They become real, not classroom theories.”36 Human rights education literature, therefore, stresses the need for experiential learning and methodologies, such as case studies, site visits, and role plays that promote critical thinking.37 As part of this initiative, professors from EECA countries where didactic teaching is the norm immediately recognized this gap, requesting particular support in this area. As a faculty member from Kazakhstan recounted, “lecturing gives a great opportunity to receive much knowledge, but it does not involve the class in discussion, in analyzing cases, etc. Interactive teaching makes education more alive.”38 Thus, this initiative became as much about how to teach as it was about what to teach.
In order to identify best practices for meaningfully engaging with health practitioners on human rights questions, in parallel to this initiative, LAHI convened an expert consultation, “How Can Training of Health Providers Be Effectively Used to Promote Human Rights in Patient Care?” with global human rights trainers, many with a health background, who have focused on working with health providers. Out of the consultation emerged 10 key principles of human rights education for health care providers.These key principles are:
Do not engage in training for its own sake. Rather, training should be part of a broader initiative.
- Training should be action-oriented and connected to advocacy.
- Always plan for follow up.
- Connect training to the daily practice of health providers. Human rights should be made concrete.
- Involve opinion leaders and identify leaders at different levels in the health system.
- Bring the voices of the patients and the marginalized into the training.
- Use interactive, participatory adult methodology.
- Recognize provider rights and allow space for health providers to talk about their challenges.
- Use peer-led trainings.
- After the training, create benchmarks, checklists, or visual reminders to help integrate human rights into health practice.39
Faculty have taken many of these recommendations to heart in their teaching.
Thus far, the initiative has tended to focus more on health practitioners than legal professionals. Human rights in patient care appeared immediately relevant for health care providers, who interact with patients on a daily basis. Law school students needed a clear connection to practice. The idea emerged of linking law courses to a law clinic where students would have the opportunity to take on practical cases. An example of this is the Medical Law Clinic at Donetsk National University in Ukraine, where students provide legal consultation and representation to patients whose human rights were violated in the delivery of health care.40 Work is also underway for a clinical component in Kyrgyzstan. For most of the courses in law faculties, however, this component has not yet been developed.
More could also be done with the junior faculty involved in courses teaching human rights in patient care. An unanticipated benefit of this initiative has been the ripple effect with faculty colleagues and junior faculty entering the field and incorporating human rights in patient care in their teaching. Junior faculty members, who have not yet established their careers and fields of expertise, may be an important source of creativity to advance this work and ensure its sustainability.
A major gap that this initiative has not yet been able to address adequately is the dearth of scholarly research and writing on health and human rights from EECA countries. Some of the reasons for this are linked to the state of scholarship in this region in general. An important next step for the establishment of human rights in patient care as a vibrant field in these countries would be for it to serve as the subject of serious scholarly inquiry. Over the last few years, the teaching of human rights in patient care has come a long way in EECA countries. During the next few years, perhaps scholars and practitioners from this region will also serve as initiators in the global health and rights conversation, propelling innovation and progress.
Following discussions with LAHI, the Association of Schools of Public Health in the European Region (ASPHER) has agreed to institutionalize this initiative under its auspices. ASPHER’s leadership will enable greater sustainability, more local control, and wider dissemination of the human rights in patient care concept. ASPHER, an association with over 100 institutional members and over 5000 academic and expert individual members throughout Europe, aims to support the professionalization of the public health work force through building capacity in public health education, research, and practice. ASPHER’s list of core competencies for public health professionals encompasses the application of law and regulations, human rights, and medical ethics; many ASPHER member schools include lawyers as faculty members. ASPHER already has a strong connection with OSF’s human rights in patient care work in EECA. Ten of the 25 human rights in patient care courses that are part of the OSF initiative are taught in ASPHER member schools. Two members of ASPHER’s board are part of the courses initiative, including ASPHER’s President, Vesna Bjegovic-Mikonovic, who will be serving until November 2015 and whose university has developed four law, human rights, and patient care courses in Serbia.
In assuming leadership of this initiative, ASPHER has agreed to pursue the following:
- Initiate an annual summer school for teachers of law, human rights, and patient care: While OSF has held faculty workshops in the past, an annual competitive summer school program with a few focus topics each year would enable both deeper and wider engagement with faculty. Faculty could spend more time delving into particular substantive areas and developing relevant teaching exercises. A regular event would also provide greater reach, bringing new faculty into this initiative. An interdisciplinary steering committee with both law and health backgrounds, drawn from current human-rights-in-patient-care faculty, would guide the development of the summer school program.
- Assume management of the web-based community of practice: The integration of the Community of Practice on human rights in patient care with ASPHER’s other web resources, such as the Online Resource Centre for Public Health Education and Training, would enable it to be more sustainably maintained and widely disseminated.
- Establish a mentorship program for junior faculty on research and scholarship: This program aims to develop the expertise of junior faculty and address the current dearth in research and scholarship on health and human rights from EECA. Each year, four junior faculty members would be competitively selected as scholars and assigned research mentors. The scholars would then prepare at least one paper for presentation at the annual ASPHER and European Public Health Association conference and for publication in a journal. New thinking and materials could then be incorporated into classroom teaching.
- Establish a core ASPHER network on human rights in patient care and widely integrate this topic in ASPHER schools: ASPHER would form a core network on human rights in patient care, composed of member faculty and universities who teach this topic, which would develop and implement a strategy for integrating human rights in patient care throughout ASPHER member schools and raise the profile of this work. A master’s program in human rights in patient care may eventually be possible.
OSF hopes this next stage of this initiative will build on the past few years of work and lead to a new generation of practitioners committed to the protection of human rights in patient care.
Table 1. Courses developed in EECA countries as part of the human rights in patient care initiative
Tamar Ezer, JD, LLM, is the Senior Program Officer at the Law and Health Initiative of the Public Health Program at the Open Society Foundations in New York, New York.
Judy Overall, MEd, MS (Health Administration), JD, is the lead consultant for Human Rights in Patient Care projects of the Law and Health Initiative of the Public Health Program at the Open Society Foundations, an adjunct faculty member of Tulane School of Public Health and Tropical Medicine in New Orleans, Louisiana, and Senior Advisor to the Faculty of Medicine, University of Oslo, Norway.
Please address correspondence to the authors c/o Tamar Ezer, Open Society Foundations, 224 West 57th Street, New York, NY 10019, USA, email: email@example.com.
1. See, for example, Central and Eastern European Harm Reduction Network (CEEHRN), Sex work, HIV/AIDS, and human rights in Central and Eastern Europe and Central Asia (Vilnius, Lithuania: CEEHRN, 2005). Available at http://www.opensocietyfoundations.org/sites/default/files/sex%2520work%2520in%2520ceeca_report_2005.pdf; Mental Disability Rights International, Torment not treatment: Serbia’s segregation and abuse of children and adults with disabilities (Mental Disability Rights International, 2007). Available at http://www.disabilityrightsintl.org/wordpress/wp-content/uploads/Serbia-rep-english.pdf; Open Society Foundations, Access to health care for LGBT people in Kyrgyzstan (Open Society Foundations, 2007). Available at http://www.opensocietyfoundations.org/sites/default/files/kyrgyzstan_20071030.pdf; Open Society Foundations, Human rights abuses in the name of drug treatment: Reports from the field (Open Society Foundations, 2010). Available at http://www.opensocietyfoundations.org/sites/default/files/treatmentabuse_20090309.pdf; Open Society Foundations, Roma health rights in Macedonia, Romania, and Serbia: A baseline for legal advocacy (2013). Available at http://www.opensocietyfoundations.org/sites/default/files/roma-health-rights-macedonia-romania-serbia-20130628.pdf.
2. L. Beletsky, T. Ezer, J. Overall, et al., Advancing human rights in patient care: The law in seven transitional countries (New York: Open Society Foundations, 2013), p. 16. Available at http://www.opensocietyfoundations.org/sites/default/files/Advancing-Human-Rights-in-Patient-Care-20130516.pdf.
3. F. W. Neal, “The communist party of Yugoslavia,” American Political Science Review 51/1 (March 1957), pp. 88–111. Available at http://journals.cambridge.org/article_S0003055400070714.
4. N. Simmons, O. Brborovic, T. Fimka, et al., “Public health capacity building in Southeastern Europe: A partnership between the Open Society Institute and the US Centers for Disease Control and Prevention,” Journal of Public Health Management and Practice 11/4 (2005), p. 352. Available at http://nciph.sph.unc.edu/cvs/baker/pdfs/118.pdf.
5. A. Zoidze, G. Gotsadze, and S. Cameron, “An overview of health in the transition countries,” International Hospital Federation Reference Book 2006–2007 (Bernex, Switzerland: IHF, 2006), pp. 29–32. Available at http://www.researchgate.net/publication/233945963_AN_OVERVIEW_OF_HEALTH_IN_THETRANSITION_COUNTRIES/file/32bfe50d3661a918ab.pdf.
7. L. Beletsky et al. (see note 2), p. 2.
8. J. P. Mackenbach, M. Karanikolos, and M. McKee, “The unequal health of Europeans: Successes and failures of policies,” Lancet 381/9872 (2013), pp. 1125–1134. Available at http://dx.doi.org/10.1016/S0140-6736(12)62082-0.
9. N. Muiznieks, Commissioner for Human Rights, Council of Europe, “Post-war justice and durable peace in the former Yugoslavia,” Issue Paper 1 (Strasbourg, France: Council of Europe, March 2012), p. 9. Available at https://wcd.coe.int/ViewDoc.jsp?id=2052823&Site=COE.
10. Physicians for Human Rights (PHR), War crimes in the Balkans: Medicine under siege in the Former Yugoslavia 1991–1995 (Boston, MA: PHR, May 1996). Available at http://physiciansforhumanrights.org/library/reports/medicine-under-siege-yugoslavia-1996.html.
11. P. Tichtchenko, “Resurrection of the Hippocratic oath in Russia,” Cambridge Quarterly of Healthcare Ethics 3 (1994), pp. 49–51.
12. S. Yanokvsky, “Neoliberal transitions in Ukraine: The view from psychiatry,” Anthropology of East Europe Review 29/1 (2011).
13. United States National Intelligence Council National Intelligence Estimate, “The global infectious disease threat and its implications for the United States,” National Intelligence Council 99-17D (January 2000). Available at http://www.fas.org/irp/threat/nie99-17d.htm.
14. E. Jolley, T. Rhodes, L. Platt, et al., “HIV among people who inject drugs in Central and Eastern Europe and Central Asia: A systematic review with implications for policy,” BMJ Open 2/5 (2012). Available at http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3488708.
16. A. Sarang, T. Rhodes, N. Sheon, et al. “Policing drug users in Russia: Risk, fear, and structural violence,” Substance Use and Misuse 45/6 (2010), pp. 813–864. Available as author manuscript at http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2946846/; E. Jensema, “Human rights and drug policy,” Transnational Institute (October 11, 2013). Available at http://www.tni.org/briefing/human-rights-and-drug-policy; see also Anand Grover, UN Special Rapporteur on the right of everyone to the enjoyment of the highest attainable standard of physical and mental health, “Report of the Special Rapporteur on the right of everyone to the enjoyment of the highest attainable standard of physical and mental health,” UN Doc: A/65/255 (2010).
17. T. Rhodes, L. Platt, A. Sarang, et al., “Street policing, injecting drug use and harm reduction in a Russian city: A qualitative study of police perspectives,” Journal of Urban Health: Bulletin of the New York Academy of Medicine 83/5 (2006), p. 911 and Human Rights Watch, Rhetoric and risk: Human rights abuses impeding Ukraine’s fight against HIV/AIDS (New York: Human Rights Watch, March 2006), vol. 18:2D, as cited in Public Health Program, Open Society Institute, “Public health fact sheet: Police, harm reduction, and HIV” (April 2008). Available at http://www.opensocietyfoundations.org/sites/default/files/Police%2520and%2520Harm%2520Reduction_ENGLISH.pdf.
18. Count the Costs, “Threatening public health, spreading disease and death,” p. 6. Available at http://www.countthecosts.org/sites/default/files/Health-briefing.pdf.
19. E. Jensema (see note 16); Count the Costs (see note 18), p. 9.
20. Count the Costs (see note 18), p. 2.
21. R. Bayer, “The continuing tensions between individual rights and public health: Talking point on public health versus civil liberties,” European Molecular Biology Organization Reports 8/12 (December 2007), pp. 1099–1103. Available at http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2267241/.
22. P. E. Carroll, “Medical police and the history of public health,” Medical History 46/4 (2002) pp. 461–494. Available at http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1044561/?page=1; R. Pereira, “Processes of securitization of infectious diseases and Western hegemonic power: A historical-political analysis,” Global Health Governance 2/1 (Spring 2008). Available at http://ghgj.org/Pereira_%20processes%20of%20securitization.pdf.
23. S. Abiola, “Limitations clauses in national constitutions and international human rights documents: Scope and judicial interpretation,” research memorandum prepared for Open Society Institute’s Public Health Program Law and Health Initiative (April 2010). Available at http://cop.health-rights.org/teaching/46/Limitation-Clauses-in-National-Constitutions-and-International-Human-Rights-Documents; S. Abiola, “The Siracusa Principles on the limitation and derogation provisions in the International Covenant for Civil and Political Rights (ICCPR): History and interpretation in public health context,” research memorandum prepared for the Open Society Institute’s Public Health Program Law and Health Initiative (January 2011). Available at http://cop.health-rights.org/teaching/46/Memo-The-Siracusa-Principles-on-the-Limitation.
24. L. Beletsky et al. (see note 2), p. 2.
25. European Union, “The accession process for new member states” (February 28, 2007). Available at http://europa.eu/legislation_summaries/enlargement/ongoing_enlargement/l14536_en.htm.
26. J. Fridli, New challenges in the domain of health care decisions (Budapest, Hungary: International Policy Internship Program, Open Society Institute, 2006), p 11. Available at http://pdc.ceu.hu/archive/00003127/01/fridli_f3; D. Tarantola and S. Gruskin. “Health and human rights education in academic settings,” Health and Human Rights: An International Journal 9/2 (2006), pp. 297–300. Available at http://www.jstor.org/stable/4065412.
27. J. Leaning, “Human rights and medical education,” British Medical Journal 315 (November 1997), pp.1390–1391. Available at http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2127872/pdf/9418078.pdf.
28. Ukrainian Ministry of Health, Ministry of Health Order No. 749 (October 19, 2009) [in Ukrainian; translation by National Medical University of Bogolomets].
29. V. Astarastoae, C. Gavrilovici, M. C. Vicol, et al., Ethics and non-discrimination of vulnerable groups in the health system (Bucharest: Association for Development and Social Inclusion, 2011).
30. International Dual Loyalty Working Group, Dual loyalty and human rights in health professional practice: Proposed guidelines and institutional mechanisms (Boston MA/Capetown, South Africa: Physicians for Human Rights and Schools of Public Health and Primary Health Care, University of Cape Town, Health Sciences Faculty, 2002).
31. See “Health rights community of practice.” Available at http://cop.health-rights.org/teaching/47/.
32. See “Health rights community of practice.” Available at http://cop.health-rights.org/PractitionerGuides.
33. See “Health rights community of practice.” Available at http://cop.health-rights.org/teaching/19/; see ibid., Health rights community of practice.” Available at http://cop.health-rights.org/teaching/17/; see ibid., “Health rights community of practice.” Available at http://cop.health-rights.org/media/200/.
34. Law and Health Initiative, Open Society Foundations, participating faculty members questionnaire responses (2012).
35. N. Flowers, “How to define human rights education? A complex answer to a simple question,” in V. B. Georgi and M. Sebrich (eds.), International perspectives in human rights education (Gütersloh: Bertelsmann Foundation Publishers, 2004), p. 121.
36. As quoted in T. Ezer, L. Deshko, N. G. Clark et al., “Promoting public health through clinical legal education: Initiatives in South Africa, Thailand, and Ukraine,” Human Rights Brief 17/27 (2010), p. 32. Available at http://www.wcl.american.edu/hrbrief/17/2ezer.pdf.
37. See, for example, F. Tibbitts, “Transformative learning and human rights education: Taking a closer look,” Intercultural Education 16/2 (2005), pp. 107–113; L. London and L. Baldwin-Ragaven, “Human rights and health: Challenges for training nurses in South Africa,” Curationis (March 2008).
38. Law and Health Initiative (see note 34).
39. Open Society Foundations, “Expert consultation: How can training of health providers be effectively used to promote human rights in patient care?” (October 22, 2008). Available at http://www.opensocietyfoundations.org/publications/expert-consultation-how-can-training-health-providers-be-effectively-used-promote-human.
40. T. Ezer et al. (see note 36), p. 30. | <urn:uuid:0f4d27f9-c22f-410d-94da-242ec799f774> | CC-MAIN-2023-06 | https://www.hhrjournal.org/2013/12/advancing-human-rights-in-patient-care-through-higher-education-in-eastern-europe-and-central-asia/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501066.53/warc/CC-MAIN-20230209014102-20230209044102-00410.warc.gz | en | 0.942552 | 10,725 | 2.59375 | 3 |
- Herbert A. Simon was an American scientist born in 1916.
- He is most famous for his work in the field of decision-making and psychology.
- Mr. Simon’s most popular book was called Human Problem Solving.
Who is Herbert A. Simon?
Herbert Simon was an American economist, computer scientist, social scientist, and cognitive psychologist whose primary research interest was decision-making within organizations and is best known for the theory of “bounded rationality” and the theory of “satisficing.” He applied psychology to statistics, operations, and decision-making scenarios to help define the process that people go through when formulating solutions to problems.
Herbert Simon was born in Milwaukee, Wisconsin, on June 15th, 1916. He went to the Milwaukee public school system, where he focused on science. He then attended the University of Chicago in 1933, where he continued his study of social science and mathematics. Herbert Simon earned both his B.A. and Ph.D. in political science from the University of Chicago.
- Full Name
- Herbert A Simon
- APA Award for Distinguished Scientific Contributions to Psychology (1969)
- ACM’s Turing Award for making “basic contributions to artificial intelligence, the psychology of human cognition, and list processing” (1975)
- Nobel Memorial Prize in Economics “for his pioneering research into the decision-making process within economic organizations” (1978)
- National Medal of Science (1986); the APA’s Award for Outstanding Lifetime Contributions to Psychology (1993)
- ACM fellow (1994)
- IJCAI Award for Research Excellence (1995)
- Katherine, Peter, and Barbara
- Place of Birth
- Milwaukee, Wisconsin
- Fields of Expertise
- [“Computer Science”,”Economics”,”Political Science”,”Cognitive Psychology”]
- Carnegie-Mellon University
- Bounded Rationality, Satisficing
Herbert Simon spent the bulk of his career as a faculty member at Carnegie-Mellon University in Pittsburgh, Pennsylvania. He spent fifty years of his life, from 1949 through 2001, as a social scientist and professor of administration, psychology, and computer science.
What is Herbert Simon known for?
Bounded rationality is the theory that rationality is limited when people make decisions. There is an attention economy that limits the amount of focus someone has to spend on a particular situation. It is a human decision-making process in which we attempt to satisfice rather than optimize. In other words, we seek a decision that will be good enough rather than the best possible decision.
People tend to choose the first option that works based on their feelings and perceived facts. Perfectly logical and rational decision-making is not feasible due to constraints on time, information, and focus. This type of decision-making can save time which then allows for more decisions to be made in a shorter period of time, but regularly choosing the first option that’s just barely good enough can produce negative outcomes over time.
Herbert Simon coined the term Satisficing. It is a combination of “satisfy” and “suffice.” It is a decision-making strategy linked to the bounded reality that involves searching through your various available options until you find a solution that meets your needs. It is rarely the best option, but as long as it satisfies the criteria of the situation in a sufficient enough way, then you no longer need to search for a solution.
Obviously, it would be advantageous to always find the best solution to every situation, but that’s not how the human mind works in decision-making theory. Satisficing is basically searching for the first solution that solves the problem adequately.
Herbert A. Simon: Marriage, Children, and Personal Life
Herbert Simon married Dorothea Pye in 1938. They remained married for the rest of Herbert’s life which ended in 2001.
Herbert Simon had three children with his wife, Dorothea. They were named Katherine, Peter, and Barbara.
Herbert A. Simon: Awards and Achievements
1978 Nobel Prize in Economics
Herbert Simon won his Nobel prize on October 16th, 1978, for his pioneering research into the decision-making process within economic organizations.
1993 APA’s Award for Outstanding Lifetime Contributions to Psychology
On August 20th, 1993, Herbert Simon was awarded the APA’s Award for Outstanding Lifetime Contributions to Psychology due to his academic history and the facts of his research. Specifically, he was awarded the Nobel prize for economics and made outstanding contributions to organizational theory, the cognitive character of the decision-making process, and the computer metaphor of rational thinking.
Herbert A. Simon Published Works and Books
Herbert Simon has had several books and articles published. His first book was titled “Administrative Behavior: a Study of Decision-Making Processes in Administrative Organization,” and his most popular book was called “Human Problem Solving.”
Administrative Behavior: a Study of Decision-Making Processes in Administrative Organization
Herbert Simon published “Administrative Behavior: a Study of Decision-Making Processes in Administrative Organization” in 1947. It was largely based on his doctoral thesis.
Human Problem Solving
Herbert Simon wrote “Human Problem Solving” with co-author Allen Newell in 1972. This book develops and defends the authors’ information processing theory of human reasoning. Human reasoners, they argue, can be modeled as symbolic “information processing systems” (IPSs), abstracted entirely from physiological bases.
Herbert A. Simon Quotes
Herbert Simon has several quotes attributed to him. These quotes mostly cover his work in decision-making theory or mathematics.
- “What information consumes is rather obvious: it consumes the attention of its recipients. Hence a wealth of information creates a poverty of attention and a need to allocate that attention efficiently among the overabundance of information sources that might consume it.”
- “Human beings, viewed as behaving systems, are quite simple. The apparent complexity of our behavior over time is largely a reflection of the complexity of the environment in which we find ourselves.”
- “Whereas economic man maximizes, selects the best alternative from among all those available to him, his cousin, administrative man, satisfices, looks for a course of action that is satisfactory or ‘good enough.”
- “Most of us really aren’t horribly unique. There are 6 billion of us. Put ’em all in one room, and very few would stand out as individuals. So maybe we should think of worth in terms of our ability to get along as a part of nature rather than being the lords over nature.”
- Linus Torvalds – Complete Biography, History, and Inventions
- Meet Angela Ruiz Robles – Complete Biography, History and Inventions
- The Complete History of The Burroughs Adding Machine | <urn:uuid:a778b226-92aa-460d-b183-72c8cbd5f1f8> | CC-MAIN-2023-06 | https://history-computer.com/herbert-a-simon-complete-biography/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764495012.84/warc/CC-MAIN-20230127195946-20230127225946-00610.warc.gz | en | 0.956579 | 1,526 | 2.828125 | 3 |
How to Build a Frame for Sweet Peas
The fragrant, flowering sweet pea (Lathyrus ororatus) and the tall form garden vegetable pea (Pisum sativum) are both climbing vine plants. Whether you prefer to grow the flower to enjoy the colorful blossoms that work well for cut bouquets or you grow the tasty vegetable, both plants benefit from a frame to support the vines. Frames encourage the vines to grow upward, taking advantage of vertical garden space and keeping the plants off the ground where they are susceptible to rot. A simple obelisk frame made from tree branches provides this vertical support and serves as garden artwork.
Tie four 1 1/2-inch diameter branch poles together with heavy-gauge wire, such as 16-gauge, approximately 12 inches from the ends of the poles. Use 8-foot poles to make a frame that is approximately 6 feet tall or adjust the lengths accordingly to build a frame to the desired height. Wrap the wire tightly so the poles stay together at the top when you adjust the bottom.
Spread the opposite ends of the poles apart to form four legs, approximately 18 inches apart. Arrange the legs in a square so there is equal spacing between each leg.
Measure the distance between each pole about 12 inches from the bottom of the legs, and cut four 1-inch diameter branches to length.
Nail the short branch pieces to the legs to create horizontal crosspieces that hold the legs apart. Use 1 1/2- to 2-inch ring shank nails, inserting two nails in at angles for each joint. It helps to set the legs up on a level work surface as you nail the crosspieces in place.
Attach additional crosspieces in the same manner every 12 inches along the height of the frame. Alternatively, you can bend a flexible branch, such as willow, into a spiral from the bottom crosspiece to the top of the structure and nail it in place where it meets the joints. Use two to three spiral pieces in opposite directions if you choose this method to allow a sufficient number of branches for the sweet pea vines to climb.
Wrap each joint with twine or grapevine to conceal the nails and the wire at the top of the poles so it appears as though the structure is tied together, giving the frame a more rustic look while maintaining stability.
Push the frame into the soil over top of the sweet pea plant. If the plant already has a few feet of vine length, weave the vine in and out of the vertical and horizontal pieces of the frame.
- You can also make round hoops out of flexible willow or last season's grapevines in place of the horizontal crosspieces. Make three to four hoops of descending size and fit them over the frame; the largest hoop creates the bottom horizontal crosspiece and the smallest makes the top horizontal crosspiece. Nail the hoops in place to stabilize the structure and prevent the hoops from sliding.
A former cake decorator and competitive horticulturist, Amelia Allonsy is most at home in the kitchen or with her hands in the dirt. She received her Bachelor's degree from West Virginia University. Her work has been published in the San Francisco Chronicle and on other websites. | <urn:uuid:1e84615f-c9af-4ae4-9b0c-2b958251eaed> | CC-MAIN-2023-06 | https://homeguides.sfgate.com/build-frame-sweet-peas-31339.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499697.75/warc/CC-MAIN-20230129012420-20230129042420-00690.warc.gz | en | 0.907551 | 711 | 2.6875 | 3 |
Whey may offer greater lean muscle gains.
A study on humans consuming whey or soy protein has found greater lean muscle gains with whey.
Funded by the Dairy Research Institute, the study assigned 41 subjects to 20 g of whey protein concentrate or soy protein isolate daily for nine months. Subjects were assigned to resistance training three times daily and body composition was assessed every three months. After nine months, researchers observed a higher average gain in lean muscle mass with whey (3.3 kg) compared to soy (1.8 kg).
The U.S. Dairy Export Council proposes that whey’s naturally high levels of the amino acid leucine-an amino acid involved in the building of lean muscle-may have been a reason for the greater gains in lean muscle mass. Leucine is an essential amino acid for humans. It cannot be created by the body and must be obtained from food sources.
The study comparing whey protein and soy protein was presented at the American College of Sports Medicine (ACSM) Annual Meeting earlier this year. | <urn:uuid:1e436343-ce3a-4116-88fd-f93c5c95b396> | CC-MAIN-2023-06 | https://www.nutritionaloutlook.com/view/muscle-study-pits-whey-versus-soy | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499697.75/warc/CC-MAIN-20230129012420-20230129042420-00690.warc.gz | en | 0.950454 | 222 | 2.609375 | 3 |
Intravitreal injections are the fastest-growing procedure in ophthalmology and in medicine in general (Video 20-10, Fig 20-17). The most common indications for injections include AMD, diabetic retinopathy, and venous occlusive disease–associated macular edema. The most common injections are anti-angiogenic agents (eg, aflibercept, bevacizumab, and ranibizumab). Other intravitreal injections include steroid preparations, including sustained delivery devices, antimicrobial medications, and many medications used in clinical trials that will likely be approved in the coming years. The number of injections performed in the United States, estimated from Medicare procedure codes, increased from fewer than 3000 per year in 1999 to an estimated 6.5 million in 2016. This number continues to increase as a result of the aging population, new medications becoming available, and an expanding list of indications.
Intravitreal injection of pharmacologic agent.
Courtesy of Stephen J. Kim, MD.
Injections can be accomplished safely 3–4 mm posterior to the limbus. Commonly used methods for anesthesia administration before intravitreal injections include pledgets or cotton-tip applicators soaked with anesthetic and held against the site of injection, application of topical (including viscous) formulations of anesthetic, and subconjunctival lidocaine injection. There is no consensus regarding the optimal method of anesthesia for patient comfort and reduced risk of infection.
Strict aseptic technique, including managing the eyelid to prevent contamination from the margin and lashes, is recommended. The application of povidone-iodine, 5%, to the ocular surface for at least 60–90 seconds prior to injection is widely considered beneficial. Antibiotic eyedrop use before or after injections is controversial and is not recommended in routine procedures, particularly given that repeat topical antibiotic application results in the development of resistant ocular flora.
Figure 20-17 Intravitreal injection. The ocular surface was anesthetized with subconjunctival injection of lidocaine, 2%, in the inferotemporal quadrant. An eyelid speculum was inserted, and povidone-iodine, 5%, applied to the ocular surface. After 2 minutes, povidoneiodine was reapplied over the injection site and—after proper hand placement and no talking—the injection was made approximately 4 mm from the limbus.
(Courtesy of Stephen J. Kim, MD.)
Endophthalmitis remains the most feared complication resulting from an intravitreal injection; the reported incidence ranges from 0.02% to 0.2%. Although respiratory organisms could cause endophthalmitis (via contamination from respiratory droplets), the most common source of infection is presumed to be the patient’s own conjunctiva or eyelids. Therefore, potential mechanisms of infection include direct inoculation of ocular surface bacteria into the vitreous or subsequent entry through a wound track. Multiple studies have reported that Streptococcus viridans, a common component of oral flora, is a more frequent cause of endophthalmitis following intravitreal injections than after other intraocular procedures, presumably from contamination by respiratory droplets. Consequently, attention should be paid to efforts that reduce the risk of respiratory-droplet contamination such as minimizing talking of both the patient and provider and the use of face masks during the procedure. In addition, excessive manipulation of the eyelid margin should be avoided to limit expression of bacteria-laden secretions from the meibomian glands, and aggressive treatment of blepharitis prior to intravitreal injection should be considered for patients with severe disease.
Outbreaks of endophthalmitis from contaminated bevacizumab in the past have prompted periodic review of compounding pharmacy practices and accreditation status to reduce the risk of future outbreaks. To minimize patient risk when bilateral injections are performed, many practitioners have adopted a workflow in which different lot numbers of compounded medications are used for each eye.
Other complications include the development of elevated intraocular pressure following intravitreal injections of anti-VEGF agents, or as a common adverse effect of steroid injections. A complication unique to the dexamethasone sustained-release implant is severe corneal endothelial toxicity if the implant migrates into the anterior chamber. Such migration has been reported to be common in aphakic eyes, but it can also occur in pseudophakic eyes.
Khurana RN, Appa SN, McCannel CA, et al. Dexamethasone implant anterior chamber migration: risk factors, complications, and management strategies. Ophthalmology. 2014;121(1): 67–71.
Kim SJ, Chomsky AS, Sternberg P Jr. Reducing the risk of endophthalmitis after intravitreous injection. JAMA Ophthalmol. 2013;131(5):674–675.
Kim SJ, Toma HS. Antimicrobial resistance and ophthalmic antibiotics: 1-year results of a longitudinal controlled study of patients undergoing intravitreal injections. Arch Ophthalmol. 2011;129(9):1180–1188.
McCannel CA. Meta-analysis of endophthalmitis after intravitreal injection of anti-vascular endothelial growth factor agents: causative organisms and possible prevention strategies. Retina. 2011;31(4):654–661.
Excerpted from BCSC 2020-2021 series: Section 10 - Glaucoma. For more information and to purchase the entire series, please visit https://www.aao.org/bcsc. | <urn:uuid:d4cc4be9-8e1e-4e42-a8ec-77fef23cfb2a> | CC-MAIN-2023-06 | https://www.aao.org/bcscsnippetdetail.aspx?id=388b39f0-7c15-444f-91b7-a953fbd79b23 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499804.60/warc/CC-MAIN-20230130070411-20230130100411-00770.warc.gz | en | 0.882093 | 1,195 | 2.578125 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.