text stringlengths 222 548k | id stringlengths 47 47 | dump stringclasses 95 values | url stringlengths 14 7.09k | file_path stringlengths 110 155 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 53 113k | score float64 2.52 5.03 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|
4 Answers | Add Yours
When choosing a problem for a research paper you are going to want to consider a few things:
- What limits or restrections has your instructor placed on you?
- What topics are you interested in?
- Of the topics you are interested in, which one has the most relevant material available for research? -or-
- If not much is available for research, which topic would you be most interested in conducting your own research for?
Once you've narrowed down your subjects you can run them through this test:
- Is this a real problem? (Does it actually exist and do people care?)
- What am I looking to do with this paper? Present the problem, its causes and effects, or the general trends therein? Solve the problem?
The first criteria in selecting a research problem is to make sure that it fits your instructor's parameters for the research. Many instructors even have students clear their research topics with them before beginning the work. Also, make sure that you have an interest in the subject. Give this a lot of thought, because it is one of the most important things to consider before beginning your research. You should have an interest in digging deeper into this topic, past what is considered common knowledge about it. Make sure that you have access to a wealth of sources as well. Your research may even have to include some work about what other people in your field have already decided about the topic—in history, this is called historiography. You also need to be able to form a thesis statement about your topic—what is the paper trying to prove with your research? Can this be proven? All of these things should be taken into account when finding a good research topic.
In selecting your research problem (or question/topic), consider an area of study that first, interests you so that you do not become bored with the research process. It must be a topic you can grasp and understand about which others have not exhausted all possible elements of research. Be sure to check the literature on the subject to determine if there is still anything left to research on the topic. Scan for resources as well, to insure that there are available sources of information.
Once you have taken these steps, consider the topic's importance to society. Is there a need for research on the topic? If so, you will probably need to narrow the topic to a manageable area of study. Be careful not to leave the topic so broad that you cannot cover it nor so narrow that there is not enough to research.
Write a specific question that will be your over-arching research problem and a few sub-questions to guide your research. In your questions, define the problem concisely in a way that others can understand.
Research methodology refers to research based on a set of principles or rules. For example, you will need to decide on the process for your research. Does your topic lend itself to a quantitative (a deductive process that seeks generalizations leading to predictions) or qualitative (an inductive process that seeks patterns and theories) process? Perhaps your research topic requires a mixture of both.
For choosing the right educational research problem it must be ensured
- sufficient data is available on same
-data can be statistically treated
- a good theoretical background is available
- sufficient sources for data collection is available
We’ve answered 320,022 questions. We can answer yours, too.Ask a question | <urn:uuid:e67a0bb1-3698-443a-b459-b22044d6f15f> | CC-MAIN-2017-22 | https://www.enotes.com/homework-help/what-criteria-selection-research-problem-184931 | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607846.35/warc/CC-MAIN-20170524131951-20170524151951-00026.warc.gz | en | 0.959469 | 703 | 3.28125 | 3 |
622 Life and Letters of Francis Galton Worth defined by Class Place.
The phrase that so and so ranks among the upper half, quarter, tenth or other division of a class consisting of a hundred persons is a definite fact and of substantial importance.
I have often had occasion to comment on this, but propose now to elaborate the idea somewhat more fully.
The comparison of the merits of alternative objects is a familiar act and the classification of a large number of objects of like kind in order of merit, however defined, is merely a prolonged application of this power. Class lists are familiar in competitive examinations, when candidates are given marks, by which their order of merit is expressed according to the judgment of the examiner, but the faculty of accurate classifying is far more widely exercised when there are many competitors for a coveted place and only one or a few vacancies. No electorate doubts its capacity of so placing the men that the right ones shall be on the whole generally approved of.
The selective process is gone through in renting a house, or buying an article, a dress, wine, a horse, a pianoforte and, as a rule, whenever a purchase has to be made. It is gone through with care in selecting an agent, a governess, or other employees ; Ministers of State, Heads of Departments, Bishops, Judges, Ambassadors and other diplomatic agents, recipients of honours, are all selected always with careful consideration, not seldom with anxious care. Appraisement in money value of curios and objects of art falls under the same head. If we please to take the trouble we may arrange a class in order of any specified description of merit.
I will now suppose this to be done for Civic Worth (a term that I need not now stop to define) and that examples have been recorded of the qualifications of those who stand at any two specified practical lengths of the array. It is convenient to take those at or about its middle and at or about its upper fourth division. Let us call them M and Q. The difference between M and Q we take as the unit of Civic Worth. This difference will be called q (describing briefly the Quartile difference).
All children of 1 of all parental couples to be Wards of Government ; n = say, 10. No. of
children to be provided for 4 per family (Average 4 children to parent, total children 40) i o V population. Expenditure on scale of upper artisan families say 5s. a week.
(p) at 5s. per week £13 a year.
Free from other expense „ 2s. 6d. „ £6. 10s. „ up to .., years.
Looked after without interfering with parental responsibility, unless grave faults of management. i i 11 = 2 £10 a year.
Competitive insurance of male children when adults to partly repay at age or death
r th of expenditure.
Marriages per thousand of population.
4 times as many children, i ~ take or multiply marriages by 0.4. 5s. a week = 5 x 52 = 260 shillings =X13 a year,
to be continued for 15 years, 13 x 15=£195 say £200 total for each child,
in a population of 1000, 20 (say) marriages a year or a yearly capital to be put by of £4000, i.e. £4 per head. Army cost?
This is 4 times too much to be reasonable; make n=20 to halve it,
If 20 more per thousand and 1 in 20 taken, that is (4 children to 1 marriage) 4 per thousand
of population to receive this at 4s. a head = £40 ann. = 40 x 15 = 600 total per 1000. Ignore compound interest, the are far greater than the allowance for it.
£10 annually= ?5 22 shillings = 4s. about weekly.
It is deviation from M measured to units of q that we shall be solely concerned with here. | <urn:uuid:2f35fb15-b9bc-4b3b-a7d5-b69a90d69180> | CC-MAIN-2013-20 | http://galton.org/cgi-bin/searchImages/galton/search/pearson/vol3b/pages/vol3b_0206.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706961352/warc/CC-MAIN-20130516122241-00044-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.943052 | 832 | 3.15625 | 3 |
In the last few weeks we have seen a spike in illness associated with consumption of raw oysters, and as the summer heats up, we anticipate more. We sat down with Jenny Lloyd, one of the epidemiologists investigating these illnesses, to learn more about what’s making people sick.
Why do raw oysters make people sick?
The majority of reports that Public Health has been investigating recently have been for Vibrio-like illness (see the outbreak disclosure page for more details) associated with raw oysters. Vibrio species are bacteria that occur naturally in marine waters, where oysters live and are harvested. Eating undercooked or raw shellfish, especially raw oysters in warm-weather months, is the main risk for acquiring vibriosis from infection with Vibrio parahaemolyticus.
How do you minimize the risk of Vibrio infection?
To minimize the risk of Vibrio infection, practice safe shellfish preparation (such as keeping shellfish cold (less than 41°F) and cook shellfish thoroughly, following these guidelines. People who take antacids, have suppressed immune systems, or some other chronic health conditions are more likely to get sick and should consider avoiding raw oyster consumption.
Less commonly, Vibrio bacteria can also cause a skin infection when an open wound is exposed to brackish water (where seawater and fresh water mix). This type of infection is more common for travelers with recreational water exposure outside of Washington State.
What are the symptoms of Vibrio infection?
When ingested, Vibrio bacteria can cause watery diarrhea, often accompanied by abdominal cramping, nausea, vomiting, fever, and chills. Usually these symptoms occur within 24 hours of ingestion (but can range from four hours to three days) and last three or more days. Severe illness is rare and typically occurs in people with a weakened immune system.
If you think you’ve been infected with Vibrio, contact your healthcare provider.
Why are we seeing more Vibrio right now?
Growth of Vibrio species in seawater increases in warmer water, and so, Vibrio levels in shellfish increase during the summer months.
What do commercial harvesters do to protect consumers from Vibrio?
The Washington State Department of Health licenses commercial shellfish harvesting. Commercial harvesters follow strict refrigeration and handling requirements during warm summer months and shellfish growing areas are regularly monitored for illness-causing pathogens.
I like to harvest oysters myself! What precautions should I take?
Recreational harvesters should also take steps to prevent illness by:
- Checking the biotoxin status of the beach you plan to harvest
- Harvest as soon as possible after the tide goes out
- Do not harvest oysters exposed to direct sunlight
- Refrigerate or ice oysters immediately
For information on our current Vibrio outbreak, visit our website.
Originally posted on July 18, 2017. | <urn:uuid:c520ffd0-df40-480a-8b2d-bfd82d8621a1> | CC-MAIN-2021-25 | https://publichealthinsider.com/2017/07/18/the-raw-deal-why-under-cooked-oysters-make-you-sick/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487582767.0/warc/CC-MAIN-20210612103920-20210612133920-00146.warc.gz | en | 0.932264 | 617 | 3.25 | 3 |
When wildfires burn, small particles are released into the air and these are potentially harmful if we breath them in. For the general population the concern is about long-term exposure, which can be damaging over time. With all this smoke around us, the most important thing we can do is to limit our exposure. That means staying inside and keeping windows closed when possible. For individuals with lung or other medical conditions, and for older adults and younger children, even brief exposure to smoke can be serious and these groups need to take extra precautions.
Anne Stowell of Teladoc, which provides over-the-phone treatment for Blue Shield of California, said "while we typically see visits drop off in the summer months, this year we’ve seen an increase in visits in California overall during the period that the fires have spread. And, while respiratory issues are one of the main reasons Californians contact Teladoc throughout the year, respiratory issues are a leading diagnosis over the past week as well."
Health tips when dealing with poor air quality:
- Be informed. Local and national resources help us know the conditions around us, and what we should and shouldn’t be doing to stay healthy. Among them: https://www.airnow.gov/ and the Bay Area Air Quality Management District.
- Limit exposure. Choose indoor activities when possible until the air clears up.
- Be prepared. Make sure that ----if you take medications---you have them filled and on hand. Those with asthma may need to use more of their prescribed “rescue” inhalers when the air quality is poor.
- Get help. If you are having difficulty breathing, or experiencing other serious symptoms, seek medical attention right away.
- Help each other. It is normal to be worried and stressed by what is happening around us. Reaching out to neighbors or pulling together donations for fire-relief efforts, are ways that we can work together to help our community and to feel better ourselves.
For more advice regarding dealing with air quality issue: The Centers for Disease Control.
For more on what Blue Shield of California is doing to help communities affected by the fires see this story.
The standard use number for Blue Shield of California members to use Teladoc is 1-800-835-2362.
The number for individuals displaced by the wildfires is 1-855-225-5032.
Malaika Stoll, M.D., is senior medical director for Blue Shield of California. She leads the nonprofit health plan’s team of regional medical directors who work with local providers to ensure Blue Shield members have access to quality, affordable care. | <urn:uuid:1dd360b3-226b-4b7f-b20d-d87d9ab7ce53> | CC-MAIN-2023-06 | https://news.blueshieldca.com/2018/08/09/as-california-wildfires-rage-air-quality-suffers-here-s-what-to-do | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500641.25/warc/CC-MAIN-20230207201702-20230207231702-00494.warc.gz | en | 0.939418 | 544 | 3.140625 | 3 |
These Sample papers are part of CBSE Sample Papers for Class 12 Political Science. Here we have given CBSE Sample Papers for Class 12 Political Science Paper 2.
CBSE Sample Papers for Class 12 Political Science Paper 2
|Sample Paper Set||Paper 2|
|Category||CBSE Sample Papers|
Students who are going to appear for CBSE Class 12 Examinations are advised to practice the CBSE sample papers given here which is designed as per the latest Syllabus and marking scheme as prescribed by the CBSE is given here. Paper 2 of Solved CBSE Sample Paper for Class 12 Political Science is given below with free PDF download solutions.
Time Allowed: 3 hours
Maximum Marks: 80
- All questions are compulsory.
- Questions nos. 1 to 5 are of 1 mark each. The answer to these questions should not exceed 20 words
- Questions nos. 6 to 10 are of 2 marks each. The answer to these questions should not exceed 40 words
- Questions nos. 11 to 16 are of 4 marks each. The answer to these questions should not exceed 100 words
- Questions nos. 17 to 21 are of 5 marks each. The answer to these questions should not exceed 150 words
- Questions no. 21 is map based question
- Questions nos. 22 to 27 are of 6 marks each. The answer to these questions should not i exceed 150 words
What is meant by seven sisters?
When was Soviet System introduced?
What is foreign policy?
Mention the historic decision given by the court in famous Kesavananda Bharati Case.
Mention the major challenges faced in Europe after the Second World War.
Mention the features of SAFTA.
How many member countries have got veto power in the UN Security Council and why?
What do you mean by Grand Alliance?
Who wrote the poem on Dalit? What does the poem signify?
What are the various positions on the issue of regional autonomy for Kashmir? Which of these do you think are justifiable? Give reasons for your answer.
Trace the emergence of BJP as a significant force in post-Emergency politics.
How did Europe become main arena of conflict between the superpowers?
Describe any four consequences of the disintegration of Soviet Union.
Describe the hegemony of the United States of America as a structural power.
The emerging economies of China and India have great potential to challenge the unipolar world. Do you agree with the statement? Substantiate your arguments.
Read the following passage carefully and answer the following questions:
During the Cold War years, India found itself on the opposite side of the divide from the US. India’s closest friendship during those years was with the Soviet Union. After the collapse of Soviet Union, India suddenly found itself friendless in an increasingly hostile international environment. However, these were also the years when India decided to liberalise its economy and integrate it with the global economy. This policy and India’s impressive economic growth rate made the country an attractive economic partner for a number of countries including the US.
(i) Name the country which was India’s closest friend during Cold War years.
(ii) What was India’s policy during post Cold War years?
(iii) What made India an attractive economic partner for the countries like the US?
Why is the EU considered a highly influential regional organisation in the economic, political and military fields?
Study the picture and answer the following questions.
(i) What is being shown by these cartoons?
(ii) What is being depicted in the first cartoon?
(iii) What is the subject matter of the second cartoon?
Read the passage and answer the following questions:
“Broadly, non-alignment means not tying yourself off with military blocs… It means trying to view things, as far as possible, not from the military point of view, though that has to come in sometimes, but independently, and trying to maintain friendly relations with all countries”. —Jawaharlal Nehru
(a) Why does Nehru want to keep off military blocs?
(b) Do you think that the Indo-Soviet friendship treaty violated the principle of non-alignment? Give reasons for your answer,
(c) If there were no military blocs, do you think non-alignment would have been unnecessary?
On a political outline-map of India, locate and label the following and symbolise them as indicated:
(i) Name and mark any two of the Princely States.
(ii) Name and mark the original state from which the Gujarat was carved out.
(iii) Name and mark thexountry reorganised on religious grounds.
(iv) Demarcated boundary of this countries by country zones.
How far is it correct to say the international alliances during the Cold War Era were determined by the requirements of the superpowers and the calculations of the smaller states? Explain. (Delhi 2016)
Analyse the three different views within India about the type of relationship India should have with the United States of America. (Delhi 2016)
How did the European countries resolve their post-Second World War problem? Briefly outline the attempts that led to the formation of the European Union. 6
What are some of the commonalities and differences between Bangladesh and Pakistan in their democratic experiences?
Like India why could democracy not take roots in Pakistan despite the fact that both the countries share a common part?
Describe briefly any four problems faced in the process of partition of India.
Did the prevalence of a ‘one-party dominant system’ affect adversely the democratic nature of Indian politics?
What were the major differences in the approach towards development at the time of Independence? Has the debate been resolved?
“The conduct of foreign affairs is an outcome of a two-way interaction between domestic compulsions and prevailing international climate. Take one example from India’s external relations in the 1960s to substantiate your answer.
Analyse the circumstances that favoured Indira Gandhi to become Prime Minister after the death of Lai Bahadur Shastri. Mention any four achievements of Indira Gandhi that made her popular as a Prime Minister. (Delhi 2016) 6
What was Mandal Commission? Did it try to solve the problems of other Backward classes? State any two arguments in support of your answer?
The north-east region which consists of seven states is known as seven sisters. This has approx 4 percent of country’s population.
It was introduced after Russian Revolution in 1917 based on the principles of egalitarian society and planned economy controlled by the state.
Globalisation refers to integration of an economy with the other country based on interdependence.
Foreign policy of a nation reflects systematic statements of national interests along with the interplay of domestic and external factors.
There are some basic features of Constitution not to be amended by the Parliament at all. It led to a crisis between the government and judiciary.
- Shattered many assumptions and structures on which European states maintained their relations.
- The European states confronted the ruin of economies and the destruction on which Europe had been founded.
South Asian Free Trade Agreement (SAFTA) was signed by SAARC members in 2004 with the following features:
- Formation of Free Trade Zone for whole South Asia.
- To sustain mutual trade and cooperation among SAARC members.
Five Permanent Member countries i.e. France, Russia, UK, the US and China got veto power because they have been emerged as industrialised developed countries to stall any decision.
Grand Alliance was an electoral alliance of all the major non-communist, non-Congress and opposition parties. The SSP, PSP, Bharatiya Jana Sangh, Swatantra Party and the Bharatiya Kranti Dal came together under this umbrella.
The Marathi poet Namdeo Dhasal wrote poem on Dalit during the decade of seventies which expresses the anguish that the Dalit masses continued to face even after twenty years of Independence.
On the issue of regional autonomy for Kashmir, the following positions are states as:
- Kashmiris were promised to make accession on reference of people after situation created by tribal invasion, becomes normal. But it has not been fulfilled, hence, it generated the demand for “Plebiscite”.
- Sometimes, it was felt that special federal status guaranteed by Article 370 has been eroded practically which led the demand for restoration of autonomy or “Greater State Autonomy”.
- It is felt that democracy, which is practised in rest of India has not been similarly institutionalised in Jammu and Kashmir.
We prefer the first position because ‘Plebiscite’ provides better opportunity to people of J & K to protect and sustain their regional autonomy in a very democratic manner.
The major trends in the electoral performance of the Bharatiya Janata Party (BJP) since 1989 can be traced as follows:
- In the elections of 1989, the National front under V.P. Singh came to power supported by left front and BJP from outside because they wanted to keep the Congress out of power. Due to Mandal Commission Report and implementation of its recommendations forced BJP to reconsider its support and finally withdrew it. Thus, in November 1990, the rule of National Front came to an end.
- In 1996, BJP minority government was formed for a short period. In June 1996 BJP failed to get majority support in the vote of confidence and thus collapsed.
- From March 1998 to October 1999, BJP and others formed alliances NDA (National Democratic Alliance) under the leadership of Atal Bihari Vajpayee. The regional parties demanded more share in the government to extend their support. dv) The political competition during nineties and divided between the coalition led by BJP and coalition led by Congress.
- Superpowers used their military power to bring countries into their respective alliances.
- Soviet Union used its influence in Eastern Europe so that the eastern half of Europe remained within its sphere of influence.
- In East and Southeast Asia and in West Asia, the US built an alliance called South East Asian Treaty Organisation (SEATO) and the Central Treaty Organisation (CENTO).
- The Soviet Union responded by having close relations with regional countries such as North Vietnam, North Korea and Iraq.
- The disintegration of Soviet Union meant the end of Cold War confrontations which demanded the end of armed race and restoration of possible peace.
- This disintegration created the possibility to bring in a ‘multipolar system’ where no power could dominate.
- The US became the sole superpower and the ‘capitalist economy’ was now dominant economic system at international level.
- This disintegration emerged in many new countries dividing Soviet Union into 15 independent countries alongwith their own aspirations and choices.
Hegemony as a structural power implies economic perspective of world economy. It can be summed up in the following ways :
- An open world economy requires a dominant power to support its creation and existence.
- The hegemon must possess both the ability and the desire to establish certain norms for order and must sustain global structure i.e. Bretton Woods system set up by the US after Second World War.
- The US reflects this hegemony by providing the global public goods, those can be consumed by one person without reducing the amount of goods available for someone else.
- A classical example of structural power of the US is the academic degree Master’s in Business Administration (MBA) to sharpen business skills in a University.
The Indo-China relations experience strategically organised as rising economic powers in global politics and to play a major role in Asian economy after the end of the Cold War. It can be proved on the following grounds:
- The new economic policies of India and China have broken their economy from stagnancy.
- The creation of special economic zones led to a phenomenal rise in foreign trade.
- China has become the most important destination for foreign direct investment anywhere in the world. Hence, it has large reserves for foreign exchange to allow it to make big investment in other countries.
- At the global level also, India and China have adopted similar policies in World Trade Organisation to deepen integration with the world economy to challenge unipolar world.
- Soviet Union
- India decided to liberalise its economy and integrate it with global economy.
- India’s policy of liberalisation and its impressive economic growth rate.
1. Economic Influence:
(a) Three times larger share in World trade than the US.
(b) Its currency Euro can pose a threat to the dominance of US Dollar.
(c) The EU functions as an important bloc in World Trade Organisation (WTO).
2. Political Influence:
(a) Two members of the EU, Britain and France hold permanent seats in Security Council to influence UN policies.
(b) The EU also includes various non-permanent members of UNSC.
(c) The European Union plays an influential role in diplomacy and negotiations except military force i.e.
EU’s dialogue with China on Human Rights and environmental degradation is remarkable.
3. Military Influence:
(a) The EU’s combined armed forces are second largest in world.
(b) Its total military expenditure is second to the US.
(c) Its two important members—Britain and France also experience nuclear arsenals of 550 nuclear warheads.
(d) The EU is world’s second most important source of space and communication technology.
- These cartoons show Indian view on Cold War.
- The first cartoon was drawn when the US came to a secret understanding with China keeping the USSR in dark. The cartoon also expresses changing the international political scenario as after a long time. China made overtures to the USA.
- The second cartoon shows the American midadventure in Vietnam. It also depicts that the US President Johnson was in more trouble over Vietnam.
(a) Nehru wanted to keep off military blocs to maintain friendly and peaceful relation with all nations of world as well as to maintain India’s uniqueness at international stage.
(b) No, the Indo-Soviet friendship treaty did not violate non-alignment because it was not to maintain military relations but to maintain diplomatic friendly relations.
(c) NAM emphasises on disarmament, decolonisation and terrorism except staying away from military blocs.
- Gujarat (from Bombay)
The superpowers used their military power to bring countries into their fold :
(a) Soviet Union used its influence in Eastern Europe backed by the large armies of countries of its alliance.
(b) The statement is utmost correct about the superpower as well as their alliances.
(c) On the other hand, the United States built alliance called SEATO and CENTO on the question of North Vietnam, North Korea and Iraq, Russia and China came closer.
(cl) Alliances were made for the requirement of vital national resources.
(e) Superpowers needed territories to launch their weapons and troops. In return, they helped them in many ways.
(f) Economic support was another factor.
During the Cold War phase, India was on the opposite side of the divide from the US as it had close relationship with Soviet. India’s decision to pursue a policy of NAM in 1945 was not liked by the US as it sided with Pakistan.
After the collapse of Soviet Union, India decided to liberalise its economy and integrate it with global economy. Hence, the US also found India an attractive economic partner due to technological dimension, and the role of Indian-American diaspora.
India-US relationship have never looked so brighter as it today. Both the countries are coming close to each other and both began to gain by coming closer.
Within India, the debate seems to be around three possible views. .
- India should maintain its aloofness from the USA and forms upon increasing its other comprehensive national power.
- India should take advantage of US hegemony and national understandings to establish best possible options for itself. Opposing the US would be a futile exercise and will only hurt India in long run.
- India should take the lead in establishing a coalition of countries from the developing world.
After the end of Second World War in 1945, the European States confronted the ruin of their economies and the destruction of assumptions and structures on which Europe had been founded. European countries resolved their post-second
World War problems in the following manner :
- Under the ‘Marshall Plan’ the USA provided financial help to revive European economy.
- The US also created a new collective security structure under NATO.
- Under the ‘Marshall Plan’ the organisation for European Economic Cooperation was established in 1948 to extend cooperation on trade and economic issues among the Western European States.
- European Union was founded in 1992 for a common foreign and security policy, cooperation on justice and home affairs and creation of a single currency. It evolved from an economic union to political one over time.
The following attempts led to the formation of European Union:
- The Council of Europe was established in 1949 for political cooperation.
- The process of economic integration of European Capitalist countries led to the formation of European Economic Community in 1957.
- The above mentioned processes acquired a political dimension with the creation of European Parliament.
- The collapse of Soviet bloc put Europe on a fast track and resulted in the establishment of European Union in 1992.
Bangladesh has been the part of Pakistan itself. Both of these countries bear some similarities and differences as follows:
- Both Bangladesh and Pakistan were under a military rule.
- At both the places, the struggle for democracy took place in their own way.
- Pakistan’s administration began under the command of General Ayub Khan and gave up due to dissatisfaction among people giving way to Yahya’s military rule and continued with the army rule though elections were held by military rulers to give a democratic shape to their own rule.
- In the same way, Bangladesh drafted its own constitution to begin with democracy. Sheikh Mujibur Rahman formed Presidential setup by abolishing all the parties except Awami Legue. But after his assassination the new military ruler Zia-ur-Rahman formed his own party and won elections in 1979. Later on he was also assassinated and another military leader Lt. Gen. H.M. Ershad took over.
- In Pakistan, military, clergy and land-owning aristocrats dominated socially to overthrow elected government whereas in Bangladesh the leaders and their party members dominated for the same.
- Pro-military groups have become more powerful due to conflict with India in Pakistan whereas in Bangladesh, pro-military groups are powerful due to friendship and encouragement of India.
The following factors are responsible for Pakistan’s failure in building a stable democracy :
- The lack of genuine international support for a democratic rule in Pakistan has encouraged to military to continue its dominance. The US and other countries have also supported military rule due to fulfilling their own interests.
- Pakistan’s conflict with India has made paramilitary groups more powerful which have often said that political parties and democracy in Pakistan are flawed, that Pakistan’s security would be harmed by selfish minded parties and chaotic democracy, hence army stay in power is justified.
- The social dominance of military, clergy, and owning aristocracy has led to frequent overthrow of elected governments and the establishing of military governments.
- Global Islamic terrorism and their apprehension that Pakistan’s nuclear arsenal might
fall into hands of these terrorist groups, the military regime in Pakistan was seen as the protector of western interests in West Asia and South Asia.
The two pro-democracy factors present in Pakistan that can pave the way for establishing a lasting democratic set up over there are:
- Pakistan bears a courageous and entirely free press.
- Pakistan enjoys strong human rights movement.
The process of partition had been started in 1940 when Muslim League under the leadership of Muhammad Ali Jinnah propounded Two-Nation Theory. This process involved various problems:
- Areas were supposed to be distributed on the basis of religions majority i.e. Muslim majority areas built Pakistani territory and rest stayed with India. It created communal riots in country.
- No single belt of Muslim majority was the part of British India. They were concentrated in East and West. Hence, it was decided that Pakistan will comprise two territories namely East and West Pakistan separated by long expansion of India territory,
- All Muslim majority areas did not want to be merged with Pakistan i.e. it was opposed in NWFP. But ultimately NWFP was made to merge with Pakistan.
- Another problem belonged to minorities on both sides of border i.e. lakhs of Hindus and Muslims and Sikhs from both the sides were left with no option except to leave f their homes.
No, the prevalence of one party dominance system did not affect adversely the democratic nature of Indian politics because:
- The key role of the Congress in the freedom struggle gave it a head start over others.
- The Congress accommodated diversified interests, religion, beliefs and aspirations to strengthen democracy.
- Despite being taken place of free and fair elections, Congress won elections in the
same manner again and again.
- The Congress Party consisted of various factions inside itself, based on ideological considerations who never taught together or went out of Congress.
- Hence, on the basis of above mentioned criterion, it can be concluded that Congress strengthened ideals of democracy and held unity and integrity of the country.
At the time of Independence, development was about becoming more like the industrialised countries of the West, to be involved with the break down of traditional social structure as well as rise of capitalism and liberalism.
- Modernisation referred to growth, material progress and scientific rationality.
- India had two models of modern development at the time of independence into considerations to be adopted i.e. the liberal capitalist model like Europe and the US and the socialist model like the USSR.
- A debate had been occurred regarding adoption of model of development as communists, socialists and Pt. Jawaharlal Nehru supported the socialist model to reflect a broad consensus to be developed during national movement.
- Above mentioned intentions cleared that the government made the priority to poverty alleviation alongwith social and economic redistribution.
- At the same time, these leaders differed and debated:
- Industrialisation should be the preferred path or
- Agricultural development should take place, or
- Rural poverty should be alleviated.
The statement is justified to maximum extent to be proved during ‘Sino-Indian Conflict of 1962’ to dent India’s image at home and international level. India had to approach the Americans and the British for military assistance to tide over the issues.
The Soviet Union remained neutral during the conflict:
- All the occurrings, created a sense of national humiliation but strengthened a spirit of nationalism also on the other hand.
- Pt. Nehru was also criticised for his naive assessment of Chinese intentions and lack of military preparedness.
- Political mood of country began to change, when no-confidence motion against Nehru moved in and debated in the Lok Sabha.
- ‘Sino-Indian Conflict’ splitted the Communist Party of India in 1960s split fraction formed communist party of India (CPI-M).
- Besides, the war with China alerted Indian leadership to volatile situation in the North east region.
- Apart from being isolated and extremely underdeveloped, this region posed the challenge of national integration in front of India.
Circumstances that favoured Indira Gandhi to become Prime Minister after the death of Lai Bahadur Shastri are as follows:
- On 10 January 1966, Shastri’s Prime Ministership came to an abrupt end when he died suddenly in Taskhent. Now, the Congress had to face the challenge of political succession.
- The senior party leaders decided to support Indira Gandhi, but the decision was not unanimous. There was intense contest between Morarji Desai and Indira Gandhi. The contest jvas resolved through a secret ballot among the MPs of the Congress. Indira Gandhi got the support of more than two-thirds of the Congress party’s MPs.
Achievements of Indira Gandhi that made her popular as a Prime Minister are:
- Indira Gandhi adopted her strategy boldly and diplomatically. When the Congress had lost in 1967 elections, she converted a simple power struggle into an ideological struggle.
- Indira Gandhi did not revive old Congress Party but she re-invented the party by forming an entirely different popular party to accommodate some social groups, the poor, the women, the dalits, adivasis and the minorities. Thus, she restored the Congress system by changing the nat are of Congress system itself.
- Indira Gandhi focussed on the growth of the public sector, imposition of ceiling on rural land holdings and urban poverty, removal of disparities in income and opportunity, and abolition of princely privileges. Her slogan ‘Garibi Hatao’ and the programmes that followed it were part of her political strategy of building an Independent nationwide political support base. As a result, she won 352 seats with about 44 per cent of the popular votes on its own in the Lok Sabha elections of 1971.
- After the 1971 Lok Sabha election, a major political and military crises broke out in East Pakistan (present Bangladesh). The 1971 elections were followed by the crisis in East Pakistan and the Indo-Pak war leading to the formation of Bangladesh.
All these events added to the popularity of Indira Gandhi. Even the opposition party leaders admired her statesmanship.
The Mandal Commission under the chairmanship of Bindeshwari Prasad Mandal set up in 1978 to investigate the extent of educational and social backwardness among various sections of society and recommended way to identify these classes.
The Mandal Commission gave its recommendations in 1980:
- The Commission advised that backward classes should be understood to mean backward castes since many castes other than the SCs were also treated as low in caste hierarchy.
- Reservation 27% seats in educational institutions and government jobs for these groups.
- It recommended land reforms to improve the condition of OBCs.
- Hence, Mandal Commission made recommendations in economic and occupational structures.
The Government of India accepted recommendations in 1990:
- 27% jobs reservation has been made in central and state government.
- Many welfare schemes have also been launched as Swarnima National Backward Classes Finance and Development Corporation.
We hope the CBSE Sample Papers for Class 12 Political Science Paper 2 help you. If you have any query regarding CBSE Sample Papers for Class 12 Political Science Paper 2, drop a comment below and we will get back to you at the earliest. | <urn:uuid:b200837a-9854-4c9a-b0c8-eda1e4661585> | CC-MAIN-2018-51 | https://www.learninsta.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823228.36/warc/CC-MAIN-20181209232026-20181210013526-00414.warc.gz | en | 0.950572 | 5,544 | 2.765625 | 3 |
ABRAHAM LINCOLN, 16th President of the United States, born (d: 1865); Only in a world that thinks that being Gay is an abnormal condition does the suggestion that a revered president might have been primarily Gay become an issue. C.A. Tripp went farther than any earlier study to present the greatest amount of evidence and the strongest argument currently available that Lincoln’s primary erotic response was that of a homosexual man in his posthumously published book, The Intimate World of Abraham Lincoln.
Over the years, a number of other writers and scholars had argued that Lincoln was homosexual, but Tripp objected to the evidence, finding it unconvincing. He then set out to collect as much information as he could on Lincoln and explore the 16th president’s sexuality in all its dimensions and complexity. What he created was neither a work of sexual or biological reductionism, but a full-fledged character study and a significant effort to understand a complicated man, that placed Lincoln’s sexuality into a larger, more significant framework.
There are, as usual, the dismissals of his evidence as “misreadings” of the customs of another time. And yet the evidence of the relationship Lincoln had with his wife Mary is as obscure and subject to interpretation as are his relationships with the important men in his life and there is no problem accepting those vagueries. As any modern Gay man will attest, Lincoln may have functioned as a heterosexual, but his marriage does not preclude an intense homosexual drive.
From 1862 to 1863, President Lincoln was accompanied by a bodyguard from the Pennsylvania Bucktail Brigade named Captain David Derickson. Unlike Lincoln’s earlier male friend, Joshua Speed, Derickson was a prodigious father, marrying twice and siring ten children. Like Speed, however, Derickson became a close friend of the president and also shared his bed while Mary Todd was away from Washington. According to an 1895 regimental history written by one of Derickson’s fellow officers:
“Captain Derickson, in particular, advanced so far in the President’s confidence and esteem that, in Mrs. Lincoln’s absence, he frequently spent the night at his cottage, sleeping in the same bed with him, and — it is said — making use of His Excellency’s night-shirt!”
Another source, the well-connected wife of Lincoln’s naval adjundant, wrote in her diary: “Tish says, ‘there is a Bucktail Soldier here devoted to the President, drives with him, & when Mrs L. is not home, sleeps with him.’ What stuff!” Derickson’s association with Lincoln ended with his promotion and transfer in 1863.
Sadly, Tripp died in May 2003, and we will never know how he would have defended his study of the sexual orientation of Abraham Lincoln. But any Gay man reading of Lincoln’s seduction of a 44-year old captain of the Pennsylvania Bucktails in the fall of 1862, will have little trouble with the remaining arguments. But it does give a whole new meaning to the term “rail-splitter” doncha think? | <urn:uuid:63718277-4c0a-4083-a952-1cec3db8b38b> | CC-MAIN-2020-40 | https://www.whitecraneinstitute.org/tdih_event/1809-02-12 | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400220495.39/warc/CC-MAIN-20200924194925-20200924224925-00777.warc.gz | en | 0.979492 | 663 | 3.15625 | 3 |
The applications of satellite data for the use of navigation has become an integral part of life, whether that be for use for SatNav systems in cars or for tracking shipping.
There is a huge variety of applications of satellite technology including both military and civilian applications.
In the military the use of GPS has become the core navigational system and has changed the way that the military operates in many areas including command and control and the guidance of autonomous systems. Satellite navigation has also been increasingly used for civilian purposes such as for SatNav systems in cars.
Future developments in satellite applications has the potential to revolutionise navigation, allowing for automated transport and the modernisation of air traffic control. The expanding field of satellite technology allows for many opportunities to work within its application to navigation.
Routes into Navigational Science
There is no set path to take into navigational science, with it being an ever expanding field with many different applications there are so many ways you could apply your knowledge to this field whether it be developing an app to use satellite data to help commuters avoid traffic or developing the use of satellites for autonomous vehicles. A background in science, engineering or maths would be an advantage and skills in programming and modelling would be an asset.
To learn more about navigational science, timing and positional systems, watch this free video course by the Royal Institute of Navigation: https://www.youtube.com/watch?v=YK_DB9Z73w4 | <urn:uuid:d5972cb6-097a-4f4a-ae24-33001775ffbd> | CC-MAIN-2020-24 | https://spacecareers.uk/?p=article_public&id=253 | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413097.49/warc/CC-MAIN-20200531085047-20200531115047-00248.warc.gz | en | 0.937163 | 295 | 3.375 | 3 |
So you’ve decided to start making candy at home—great! Whether you’re a novice in the kitchen or an experienced cook looking to try your hand at candy, these tips and instructions will provide all the information you need to get started.
Common Candy Ingredients
There are two main factors that affect the taste of your candy: the ingredients you use and the procedure you follow. By educating yourself about common candy ingredients such as chocolate and sugar, and by selecting the best ingredients you can find, you will go a long way toward ensuring successful, delicious candy.
Working With Sugar
There is nothing terribly mysterious or complicated about making candy, but if you are new to the world of confectionery, you might find some of the recipe instructions confusing. Candies that are based on a sugar syrup—sugar and water boiled together—often give instructions to boil the syrup to a specific temperature. To make these recipes, you will either need a candy thermometer or will need to be familiar with the “cold-water method” of temperature checking.
Additionally, some traditional recipes call for the candy to be “pulled,” as in taffy or ribbon candy. Pulling candy takes a little practice, but it's easy once you have the hang of it.
Working With Chocolate
After sugar, chocolate is probably the most common candy ingredient, so it is important to know how to successfully work with chocolate. You'll need to properly perform the most common chocolate tasks, from chopping to melting to tempering. But don't worry, if you make a mistake while working with chocolate—and who hasn’t?—there are ways to salvage your chocolate.
Equipment for Making Candy
In general, candy making does not require much in the way of specialized equipment. Many candies can be made using basic kitchen tools that most people already possess. But there are a few tools that reappear in recipes over and over again, like a candy thermometer, and if you anticipate making candy on a regular basis, it will be helpful to familiarize yourself with the most commonly used candy and chocolate equipment.
Are you ready to make some candy? Browse the complete Candy Recipe Index and get started. | <urn:uuid:616596ae-7307-4cdf-b674-536ff783dc04> | CC-MAIN-2019-18 | https://www.thespruceeats.com/candy-making-for-beginners-520303 | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578624217.55/warc/CC-MAIN-20190424014705-20190424040705-00312.warc.gz | en | 0.937554 | 455 | 2.625 | 3 |
You know those tiny little beads that are in most exfoliating face or body washes? They seem harmless right? Wrong. These tiny beads are a great example of how something so minuscule can have a huge impact on our planet!
Could the plastic you’re washing your face with end up in your sushi? Sounds crazy, but yes. Fish species that we harvest for food have been known to eat these micro-plastic particles at an alarming rate and the toxins absorbed in those plastics transfer to the fish tissue. And as you know, we are what we eat, so those toxins? Yeah, they’re transferred to us… ew.
But what are micro beads?
Micro beads are really tiny plastic particles usually smaller than two millimeters. The composition of micro beads can vary and often include polyethylene or polypropylene, polyethylene terephthalate, polymethlyl methacrylate or nylon. Bottom line, it’s all plastic!
Plastic micro beads absorb persistent organic pollutants (long-lasting toxic chemicals like pesticides, flame retardants, motor oil and more) and other industrial chemicals that move up the food chain when the toxic-coated beads are consumed by fish and other marine organisms. A single micro bead can be up to a million times more toxic than the water around it!
So what can be done?
Well there are a lot of solutions, but the easiest one we found was to eliminate micro beads from our routine completely.
But how am I supposed to exfoliate my skin? Great question!
Our answer? Micro Grains!
Our Exfoliating Micro Grains contain a mixture of all-natural oat and rice powders that not only gently exfoliate all the dead skin from your face and body but also contain vitamins and minerals that feed your skin, leaving it healthy and glowing.
So forget about Micro beads (please!) and try some Micro Grains instead, you're skin and the planet will thank you! | <urn:uuid:cd8f1b69-d902-4a39-b484-780dabd278cf> | CC-MAIN-2019-39 | https://www.whiteandelm.com/blogs/blog/112657415-microbeads-vs-micrograins-what-s-the-difference | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574039.24/warc/CC-MAIN-20190920134548-20190920160548-00544.warc.gz | en | 0.935035 | 415 | 2.703125 | 3 |
|Boulevard du Temple|
the [photographic] image was not 'merely' memory or imagination...but to all appearances something real.In The Information Peter Gleick writes:
The same year that Babbage published his essay, the artist and chemist Louis Daguerre in Paris perfected his means for capturing visual images on silver-coated plates. His English competitor William Fox Talbot, called this "the art of photogenic drawing, or of forming pictures and images of natural objects by means of solar light...By means of this contrivance" he wrote, "it is not the artist who makes the picture but the picture which makes itself." Now the images that fly before our eyes could be frozen, impressed upon substance, made permanent.
By painting or drawing, an artist -- with skill, training and long labor -- reconstructs what the eye might see. By contrast, a daguerreotype is in some sense the thing itself -- the information, stored, in an instant. It was unimaginable, but there it was. The possibilities made the mind reel. Once storage began where would it stop? | <urn:uuid:fa9fac8a-0636-41cf-90c0-a2fb3c8acb57> | CC-MAIN-2017-30 | http://www.barelyimaginedbeings.com/2013/01/it-was-unimaginable-but-there-it-was.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425766.58/warc/CC-MAIN-20170726042247-20170726062247-00310.warc.gz | en | 0.947291 | 230 | 2.6875 | 3 |
Success stories can inspire children and help them to believe in themselves and their abilities. There are many examples of success stories for children, ranging from individuals who have overcome adversity to those who have made a positive impact on the world. Here are some examples of success stories that can inspire and motivate children:
Malala Yousafzai: Malala is a young activist from Pakistan who has become a global voice for girls’ education. Despite facing threats and violence from the Taliban, Malala refused to be silenced and continued to advocate for the right of girls to attend school. Today, she is a Nobel Peace Prize laureate and continues to work tirelessly to promote education for all.
J.K. Rowling: J.K. Rowling is the author of the best-selling Harry Potter book series. She faced numerous challenges, including poverty, depression, and the loss of her mother, before finally achieving success as an author. Her story is a testament to the power of perseverance and the importance of never giving up on your dreams.
Steve Jobs: Steve Jobs was the co-founder of Apple and is widely regarded as one of the most innovative entrepreneurs of all time. Despite being fired from the company he helped to create, Jobs went on to found NeXT and eventually returned to Apple, where he played a key role in the development of products such as the iPod, iPhone, and iPad. Jobs’ story is a reminder that even setbacks can lead to success.
Simone Biles: Simone is a gymnast who has become one of the most successful athletes of all time. Despite facing numerous obstacles, including poverty and a learning disability, Simone went on to become a multiple Olympic and World champion gymnast. Her story is a testament to the power of hard work, determination, and the importance of never giving up on your dreams.
Barack Obama: Barack Obama is a former President of the United States and is widely regarded as one of the most inspiring leaders of our time. Despite facing numerous obstacles, including discrimination and opposition, Obama went on to become the first African American President of the United States. His story is a testament to the power of perseverance, hard work, and the importance of never giving up on your dreams, no matter what the odds.
These are just a few examples of success stories for children. By studying these stories, children can learn about perseverance, determination, hard work, and the importance of never giving up on their dreams. Additionally, these stories can help children to develop a growth mindset and to believe in themselves and their abilities. They can inspire children to pursue their own dreams, to overcome obstacles, and to make a positive impact on the world. | <urn:uuid:71cf9512-1936-494d-9829-68f97d64c9d1> | CC-MAIN-2024-10 | https://www.thinkingineducating.com/what-are-examples-of-success-stories-for-children/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474659.73/warc/CC-MAIN-20240226094435-20240226124435-00042.warc.gz | en | 0.973573 | 543 | 3.296875 | 3 |
Swipe/Scroll to view the whole image
Click on the diagram or expand the term index to learn more about the features.
The portion of a building that extends below the ground, providing a firm base for the structure above.
A pair of glazed doors that open out in the middle and are hinged to the door jambs.
Decorative features used to accent particular components of a building.
One or more vertically framed windows that flank a door, often divided into several lights.
Terra cotta or concrete semi-circular tiles with an overlapping edge.
A material – sometimes called render, made of an aggregate (sand) and a binder (Portland cement, and water). It is applied wet and hardens to a very dense solid. Sometimes used on interior walls, and ceilings (called California plaster), it is mainly used on exteriors and can cover less visually appealing construction materials such as concrete, cinder block, or clay brick.
A style defined by low-pitched or seemingly flat tile roofs and white stucco walls. Spanish Colonial Revival buildings often have decorative iron grills over windows, arch-topped paired windows, and small stucco parapets embellished with small tiled shed-roof projections supported by false purlins or brackets. Occasionally, they have decorative towers set into the body of the roof. Front doors typically are sheltered by a portico or set forward in a projecting bay, perhaps with spiral columns or pilasters. Test
Spanish colonial style first came into the public eye at the 1915 Panama-California Exposition in San Diego. Following the popularity of the Mission Revival style, it drew inspiration from California’s Spanish colonial history. The style was initially based on Spanish colonial architecture from across Latin America. As popularity grew, other architects began looking to Spain for inspiration. As a result, the style has a mix of Old and New World elements. Features that distinguish Spanish Colonial Revival from Mission Revival include low-relief ornamentation, decorative cornices and wrought iron. In Vancouver, the style is found on elaborate mansions such as Rio Vista and Casa Mia but also smaller bungalows. The sprawling villas that lend inspiration to the style made it well-suited for grander homes.
Red tile roofs, white roughcast stucco, heavy robust wood accents around windows, doors and eaves make up the Spanish style. Ornamental wrought iron appears in grillwork over windows and door openings, and iron accents turn up in lanterns, sconces and railings. Patterned tile turns up as accents in the stucco in open-ended gables and on stair risers. | <urn:uuid:7757788d-d492-465d-9713-322c276f49cd> | CC-MAIN-2023-06 | https://www.vancouverheritagefoundation.org/house-styles/spanish-colonial-revival/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500056.55/warc/CC-MAIN-20230203122526-20230203152526-00420.warc.gz | en | 0.936837 | 544 | 3.265625 | 3 |
A political agreement between Greece and its smaller northern neighbour, the Republic of Macedonia, ends a longstanding dispute over the republic’s name and sets the stage for renewed cross-border collaboration in research and higher education.
Ratified by the Greek parliament on 25 January, the Prespa Agreement renames the Republic of Macedonia as the Republic of North Macedonia and is designed to settle the differences and establish strategic partnerships.
The two nations have been at loggerheads for decades over the Republic of Macedonia’s name because Greece has a northern region called Macedonia (see ‘Name change breakthrough’).
When a young republic claiming the same name arose from the break-up of Yugoslavia in the early 1990s, Greece blocked its attempts to join the Νorth Αtlantic Τreaty Οrganization (NATO) and, later, the European Union, insisting that it give up calling itself Macedonia.
The parliament of the Republic of Macedonia voted to accept the Prespa Agreement on 11 January.
A bridge to peace
Although the accord has faced fierce opposition from nationalists in both countries, it ends the political stand-off and opens up opportunities for cooperation, including in science, which is one of the areas specifically mentioned in the agreement.
“Scientific diplomacy is an effective tool that can strengthen the relations between Greece and North Macedonia, as well as the Western Balkans in general,” says Greek research minister and laser physicist Costas Fotakis, in Athens. “This agreement is very timely, especially considering that several research themes are of mutual interest in both countries.” He cites biomedicine, agrobiology, energy and the environment as examples of areas where the two nations could now share research infrastructure and exchange expertise.
A spokesperson for the Republic of Macedonia’s science ministry told Nature they hope the Prespa agreement will lead to a formal and more detailed deal on scientific and technological cooperation between the two countries.
Scientists in both countries welcome the agreement. They say they will now be able to work together more closely, without the political tensions and rigorous bureaucratic procedures that used to hold them back.
“Cooperation in science between the two countries has been somewhat ‘on ice’,” says biologist Svetislav Krstić at Saints Cyril and Methodius University in Skopje, Republic of Macedonia. “The real work in past decades was quite slow and sporadic.”
Although some cross-border science projects funded by the EU do exist and collaborations between scientists working on those projects were good, they have been limited, and the overall atmosphere restrictive, with political issues “constantly lurking”, Krstić says.
“Even the scientific results would be ‘corrected’ in line with the current politics,” he says. “That kind of environment has been nothing but harmful towards all scientific activities.”
He expects this will now change because the parliaments of the two countries have agreed to end hostilities and start cooperating on a range of topics, including science.
A promising start
One person already collaborating with colleagues across the border is Ioanna Chouvarda, an electrical engineer at the Aristotle University of Thessaloniki, Greece, who works with scientists in the Republic of Macedonia on electronic-health applications in primary care.
Chouvarda thinks the deal will be good for science collaborations as the political relations improve. “Science is done by people, and many people were affected by the mutually negative spirit among the two countries that prevailed in the past years,” she says.
Krstić agrees. “This can only mean a better and more prosperous future for both countries,” he says. | <urn:uuid:edc2b817-3b0c-47dd-97a8-4c0f2334b0b8> | CC-MAIN-2022-27 | https://www.nature.com/articles/d41586-019-00346-z?error=cookies_not_supported&code=0cdacf65-e083-4bc9-9dfe-0dd5f6e5ef55 | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103205617.12/warc/CC-MAIN-20220626101442-20220626131442-00618.warc.gz | en | 0.959443 | 770 | 3.28125 | 3 |
Gluten is a composite of storage proteins termed prolamins and glutelins and stored together with starch in the endosperm (which nourishes the embryonic plant during germination) of various cereal (grass) grains. It is found in wheat, barley, rye, oats, related species and hybrids, and products of these (such as malt).
Casein is a family of related phosphoproteins (αS1, αS2, β, κ). These proteins are commonly found in mammalian milk, comprising c. 80% of the proteins in cow's milk and between 20% and 45% of the proteins in human milk. Casein has a wide variety of uses, from being a major component of cheese, to use as a food additive. The purified protein is water insoluble. In addition to being consumed in milk, casein is used in the manufacture of adhesives, binders, protective coatings, plastics (such as for knife handles and knitting needles), fabrics, food additives, and many other products.
A study found that autistic children placed on a casein-free diet for eight weeks showed significant behavior improvements (Lucarelli 1995). In many cases, casein free diets are combined with gluten-free diets and are referred to as a gluten-free, casein-free diet. | <urn:uuid:fa641eca-2085-4036-8a51-94f654dbf1ea> | CC-MAIN-2018-43 | https://center4specialneeds.org/blogs/education/casein-gluten | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583517628.91/warc/CC-MAIN-20181024001232-20181024022732-00282.warc.gz | en | 0.956365 | 271 | 3.375 | 3 |
Why do we celebrate Sant Jordi?
We answer the most frequently asked questions about its origin and meaning
BarcelonaSant Jordi is one of the most awaited and celebrated festivities in Catalonia, but where does this tradition come from? Why do we give roses and books as presents? Why is it on April 23rd? Here are the answers to some of the most frequently asked questions about the festivity.
Why is Sant Jordi on April 23rd?
April 23rd is the day on which the knight George died in the year 303. According to Christian legend, George was a Roman soldier who was martyred and beheaded for refusing to follow an order to persecute Christians. His death gave rise to numerous legends and he began to be venerated as a martyr, which made the day of his death an important date in the Christian calendar. During the Middle Ages, the cult of his figure spread throughout the Catalan Countries. In 1456 he became the official patron saint of Catalonia. Since the sixteenth century there is evidence that a festival was held on April 23 to commemorate him, although it was in the late nineteenth century, as a result of the Renaixença, that Sant Jordi became a patriotic, civil and cultural holiday in Catalonia.
Why do we give roses?
The Catalan version of the legend says that, after a fierce battle between the knight and the dragon, the beast fell when pierced by the sharp spear of Sant Jordi. The blood from those wounds reached the ground and gave birth to a rose bush that, according to legend, bloomed every April. Here is where the custom of giving roses for Sant Jordi every April 23rd originates. In the symbolic universe of flowers, the red rose is associated with feminine love, while the carnation belongs to masculine love.
Why do we give books as gifts?
While the tradition of giving roses to our beloved comes from the Middle Ages, the tradition of giving books did not begin to emerge until the 1920s. The initial idea came from Valencian writer Vicent Clavel i Andrés, director of Cervantes publishing house, who proposed to the Cambra Oficial del Llibre de Barcelona and the Gremi d'Editors i Llibreters that a celebration be held to promote books in Catalonia. The date chosen was October 7, 1927. The festival was also held in 1929, during the Barcelona International Exposition, and was so successful that it was decided to change the date and move it to April 23. From then on, the custom of giving books as gifts became part of the Sant Jordi festival. April 23, in fact, is an important day for literature: it is the day on which William Shakespeare and Josep Pla died, and Miguel de Cervantes was buried.
What does it mean for Catalan culture?
Sant Jordi is a National Holiday in Catalonia, despite the fact that April 23 is a working day in the Catalan calendar. The holiday is one of the most important moments of the year for Catalan culture. Floral games are held in schools and official receptions take place at the Palau de la Generalitat. The streets all over the country are filled with rose and book stalls, both by professionals and charities and institutions that join in the celebrations. Numerous activities relating to the literary world are also organised in libraries and cultural spaces, poetry readings, talks by writers, and concerts.
Is Sant Jordi celebrated in other places?
San Jorge is also the National Day of Aragon, but the festival is celebrated in a different way. Several institutional events are held, book stalls are put up in the streets and regional government awards its Aragón Prizes. The Catalan celebration of the feast of Sant Jordi has also reached other countries by the hand of Catalans emigrés. Thus, on several occasions, talks and book and rose parades have been organised in countries such as France, the United Kingdom, Mexico, Germany, Italy, United States, Argentina and Japan. | <urn:uuid:b45db411-662c-4952-a934-f6ea4cf812a8> | CC-MAIN-2023-23 | https://en.ara.cat/culture/why-celebrate-sant-jordi-internation-book-day-catalonia-rose_1_4345774.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00447.warc.gz | en | 0.96738 | 822 | 2.953125 | 3 |
The San Antonio and Aransas Pass Railway was an early South Texas railroad. Uriah Lott organized the SA&AP in 1884 with its general offices in San Antonio and its operational center later based in Yoakum. On April 8, 1925, the SA&AP was leased to the Southern Pacific controlled Galveston, Harrisburg & San Antonio Railway, and both were later absorbed into the Southern Pacific system.
The name was derived from its first line that was built from San Antonio with the intention of reaching Aransas Pass (the waterway, the City did not exist at the time). However, construction of the main line turned south at Gregory to enter Corpus Christi. A branch was later built from Gregory to Rockport. Additional mains were built from Kenedy to Houston and from Yoakum to Waco. Branches were built from San Antonio to Kerrville, from Skidmore to Falfurrias, and from near Shiner to Lockhart. The GH&SA later extended the Falfurrias branch to Brownsville under the original SA&AP charter.
Two segments of the SA&AP later became important parts of the SP system. The Giddings to Flatonia line became part of the Dalsa (Dallas-San Antonio) Cutoff. The Beeville to Skidmore line (now abandoned) was the first SP line in Texas to be controlled by Centralized Traffic Control (CTC).
Last Revised: 01-28-12 | <urn:uuid:55f21f9c-20ac-4302-8959-7e7906c2452c> | CC-MAIN-2021-17 | http://saap.tnorr.com/main.htm | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038069133.25/warc/CC-MAIN-20210412175257-20210412205257-00403.warc.gz | en | 0.982786 | 305 | 2.75 | 3 |
We don’t teach students how to read code. Actually we don’t event teach them that they should read code for the most part. The closest we get is sample code in textbooks, demos, and for AP CS teachers the case study. Even there I think we could do more. One of the great learning experiences of my early learning career involved reading some code. My professor handed me a deck of cards (yes this was some time ago.) He explained that they had purchased this set of functions to help enable graphics programming but somewhere along the line the documentation had been lost making this code unusable. There were almost no comments in the code either. My task was to figure out the code and create some documentation so that other people could use these routines. With all the enthusiasm and confidence of youth I jumped in with gusto. It took a while but I accomplished the task. In the process I learned a lot about both figuring out code and using graphics functions. Both served me well over the years. I still think about that now and again wondering if that sort of thing could be globally useful in education. Or is it just mean?
I still enjoy reading and figuring out other people’s code. In some ways that, especially when debugging is involved, is more fun for me than writing code from scratch. I’ve never really organized my thoughts about reading code before but I’ve been thinking about it lately and thought I’d put it down so you all could tell me how wrong I am. Or at least tell me what else you do when studying code that is new to you.
I like to read code on paper. Yes old fashioned and kills trees but it lets you look at more code at one time than you can see on a screen. I know that there is some discussion that any code that doesn’t fit on one screen should be broken up into smaller pieces and to some extent I agree. On the other hand some things don’t fit on one screen and more then that often you can benefit from more context than one method on one screen. Also I like to draw lines and write notes and that is easier on paper.
In he early days code was often “ugly” with no indentation or helpful formatting. In fact we used to have special software called “prettyprint” programs that would reformat code by adding indentation, consistent use of white space and “punctuation.” I especially remember using software like this on PASCAL programs when I was teaching high school. The need for this sort of thing is less today than it used to be. IDEs like Visual Studio for example will automatically format code and even include helpful color coding. These things make looking at code, on line or on paper, a lot easier. Reading poorly formatted code is harder than you want it to be so if your code is not well formatted then fixing that is a great first step.
Next I like to look at variables. I like to understand the names, especially any coding standards that are being used, and what they mean. Knowing that a variable is an integer as opposed to a double is important. Making sure that coding conventions (do integer variables start with an “I”) and being followed (is a variable a double but its name suggests an integer) is a good place to look for logic or runtime errors. Keeping an awareness of scope of variables is also important. Comments on variables and throughout the program can of course be very helpful. My attitude about comments is “trust but verify.” That is to say that I try to confirm that the comments describe the code that they say they describe. If they fit – great. If they are wrong – fix them.
I like to draw lines to highlight things like the beginning and end of a loop, a module, or the actions inside a decision structure. The spacing along may be enough for some but I like that line down the side of the page. It helps me visualize the scope and the nesting of statements and variable scope. This also helps me to study the code to make sure the start and end are logical and correct. Once you have all the scopes figured out you can start from the inside and work out or from the outside and work in. In practice, if the code is at all complex, you may have to read it both ways. Take notes of what is going on. It helps.
Equations require a close look. One has to understand both what the formula is supposed to do but that the variable types work the way the programmer intended. There is no magic “do what I mean” instruction. All too often the computer follows its own consistent logic when a programmer was hoping (or miss-assuming) some different way of doing things. It’s also important that the values that are returned are of the type that the method says will be returned. A reason that I find paper useful is to double check parameters between where a method is called and where it is created. Again modern IDEs can make that easier for you. While reading code in the IDE IntelliSense in Visual Studio or other autocompletion tools can make checking a lot easier without bouncing around the file. So a mix of online and offline reading can be very useful. Use the tool that makes the most sense at the time.
The big gun in reading code can be a debugger. Single stepping through running code, assuming you are trying to understand code that works, can teach you a lot about what paths are taken and show you where things are not going where you think they are going. This is a lot easier today with modern IDEs compared to reading binary code in light switches back in the day. Today anyone can run a debugger. And more people should!
So that is the basics. I’m sure I’m missing things that I do without really thinking about it. What advice do you have for someone reading code? | <urn:uuid:d38f5761-289a-4405-b43b-6928dadcc9f2> | CC-MAIN-2017-22 | https://blogs.msdn.microsoft.com/alfredth/2012/08/16/how-to-read-code/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607998.27/warc/CC-MAIN-20170525044605-20170525064605-00373.warc.gz | en | 0.965428 | 1,224 | 3.15625 | 3 |
This Article provides an up-to-date analysis and critique of the intellectual foundations of the Supreme Court’s affirmative action jurisprudence based on evidence of our history of past societal discrimination. My analysis shows that the principal ideas underlying the Court’s affirmative action decisions are false or misleading and operate to protect only white interests.
The Court’s decision last term in Fisher v. Texas renewed the Court’s commitments to Bakke and Grutter, with their focus on diversity rather than past societal discrimination. Yet remedying our history of past societal discrimination was the original motivation for affirmative action, and it remains the most important reason for affirmative action. The Court’s reasoning in these cases disconnects affirmative action from its historical and social context.
In this Article, I situate the Court’s affirmative action jurisprudence within its historical context and test the validity of the Court’s premises against the background of history. This Article presents powerful historical evidence documenting the federal government’s intentional promotion and subsidization of race discrimination against African Americans in the design and implementation of the G.I. Bill. The educational and housing benefits of the G.I. Bill were, by design, enjoyed almost exclusively by whites, increasing significantly gaps in educational achievement and wealth between blacks and whites.
This Article uses this history and the findings of the latest sociological research to analyze the main ideas under-girding the affirmative action decisions. I identify seven highly influential ideas that under-gird the Court’s affirmative action decisions. The first three ideas are assumptions about affirmative action generally: 1) an increase in the stigma borne by students of color is a proper argument for curtailing affirmative action; 2) affirmative action constitutes “racial preference” for blacks and “reverse discrimination” against whites; and 3) whites are innocent victims who should not bear the burdens of affirmative action. The next two ideas form the basis for applying strict scrutiny in affirmative action cases: 4) whites too have been victims of discrimination and there is no principled way of distinguishing between the discrimination experienced by whites and blacks; and 5) equal protection must mean the same thing when applied to whites and to blacks. Lastly, the Court has reached two important conclusions about what constitutes a compelling government interest: 6) remedying past societal discrimination is not a compelling government interest; 7) diversity is a compelling government interest.
Upon close analysis, and using the historical context provided by the G.I. Bill, these principal ideas under-girding the Court’s affirmative action decisions turn out to be either false, misleading, or protective only of white interests. Despite their falsity, these ideas are widely believed. Because of both their falsity and widespread public belief in them, I call these the doctrines of delusion. I conclude that the Court’s reliance on these doctrines of delusion shows the Court to be a majoritarian institution intent on protecting the educational and economic interests of whites. | <urn:uuid:5cabf98c-e32f-484a-b320-1944b2c588ab> | CC-MAIN-2016-26 | http://lsolum.typepad.com/legaltheory/2013/08/perea-on-affirmative-action.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398209.20/warc/CC-MAIN-20160624154958-00085-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.896977 | 609 | 3.09375 | 3 |
On the night of March 21, 1968, Rev. Martin Luther King Jr. sought refuge from the Ku Klux Klan inside a small, shotgun-style home in the depot neighborhood of Greensboro, AL. (This occurred just two weeks prior to the assassination of Rev. King in Memphis, TN.) Mrs. Theresa Burroughs, a close friend of the King family and an active participant of the Civil Rights Movement, turned this small shotgun house into the Safe House Black History Museum which documents the local struggle for equality. It contains relics of the period from slavery through the civil rights movement. Displayed at the museum are many unpublished photos of the civil rights struggle in the Black Belt. These include photos of the Greensboro marches, of Bloody Sunday in Selma, and of the triumphant march from Selma to Montgomery.
Mrs. Burroughs sought Auburn Rural Studio’s assistance with renovating the museum. Rural Studio agreed to help and three Rural Studio students began work on this project in the fall of 2009. The project involved renovation of the museum building and a nearly identical small shotgun building located beside the museum that was used for storage. As with all Rural Studio projects, the students not only designed the project, but they performed all of the work that was involved with completing the job. The students’ goal with the renovation was to preserve the two old shotgun houses and make changes that would improve the museum. The exterior walls of the buildings were restored to their natural pine finish, reflecting the time period when Martin Luther King Jr. sought refuge. The front porch of the museum building, which had been enclosed, was restored to its original condition because porches were such an essential part of shotgun houses. A simple glass hallway was added between the two buildings. One glass wall of the hallway was covered with the images of protest marchers. The house which was being used for storage is now used for classes, a computer lab and an art gallery. The Rural Studio students re-used everything that they could salvage. Even the old sidewalks were dug up, crushed and used as the base for the museum courtyard.
Pictures included show the museum before and after the renovation by Rural Studio. Thanks are extended to Mackenzie Stagg with Auburn Rural Studio for providing pictures of the inside of the museum after completion of the renovation.
The Safe House Museum is located in the southwestern side of Greensboro, AL at the intersection of Davis Street and Martin Luther King Avenue (Site GPS Coordinates N32.697611,W87.609667).
Sources: 1) Alabama Black Belt Nature And Heritage Trail; 2) The Tuscaloosa News; 3) Rural Studio | <urn:uuid:8501a15e-e20a-4cb0-8f4d-234cba6041fd> | CC-MAIN-2016-40 | http://www.ruralswalabama.org/attraction/the-safe-house-black-history-museum-at-greensboro-al-recently-renovated-by-auburn-rural-studio/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661449.76/warc/CC-MAIN-20160924173741-00224-ip-10-143-35-109.ec2.internal.warc.gz | en | 0.961893 | 538 | 3.796875 | 4 |
A removable shoe insert, otherwise known as a foot orthoses, accomplishes many number of purposes, including daily wear comfort, foot and joint pain relief from arthritis, overuse, injuries, and other causes such as orthopedic correction, smell reduction and athletic performance.
Foot orthoses comprise a custom made insert or footbed fitted into a shoe. Commonly referred to as “orthotics” these orthoses provide support for the foot by redistributing ground reaction forces as well as realigning foot joints while standing, walking or running. A great body of information exists within the orthotic literature describing the sciences that might be used to aid people with foot problems as well as the impact “orthotics” can have on foot, knee, hip, and spine deformities. They are used by everyone from athletes to the elderly to accommodate biomechanical deformities and a variety of soft tissue inflammatory conditions such as plantar fasciitis. They may also be used in conjunction with properly fitted orthopedic footwear in the prevention of foot ulcers in the at-risk diabetic foot. | <urn:uuid:d8d6cda5-c205-4c69-8920-dadfe9b7512d> | CC-MAIN-2021-04 | https://achillespodiatry.com/patient-education/orthotics/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703561996.72/warc/CC-MAIN-20210124235054-20210125025054-00734.warc.gz | en | 0.956937 | 223 | 2.5625 | 3 |
Strantz. “Wayfinding in Global Contexts—Mapping localized research practices with Mobile Devices” C&C 38 (’15) (12 pages)
Strantz is interested in how researchers can use mobile devices to build a research agenda within locations and build a better contextual understanding of their research’s connection to others within the location, to the place itself, and to global contexts. Strantz looks particularly at research agendas that have researchers enter into locations with which they are unfamiliar and use mobile devices to track and create meaning from their movement within these spaces.
One of his guiding principles is wayfinding, “a research methodology for studying the impact of location on digital composing practices…Wayfinding focuses on the movement of users in physical spaces and their goals in understanding and using those spaces” (165). Wayfinding describes the way people use various materials—maps, signs, mobile devices, GPS, etc—to create meaningful paths within a location. Wayfinding is a meaning making practice where the traveler creates a meaningful representation of the space in order to support navigation and thus make a researchable/knowable space.
Wayfinding research, then, takes as an assumption that locations are not fixed sites; rather, individuals are constantly reshaping meaning within the location as interactions and encounters are changing on and off as people move across these locations. Moreover, we must also consider how encounters are further staged and movement driven through the design and layout of cities and physical spaces. Further, making maps creates many different kinds of contexts including emerging global contexts—accordingly, we must reconsider what local entails.
Stranzt, then, considers researcher’s personal methods of wayfinding—using mobile devices—a within unfamiliar territory as a powerful inventive tool for invention: “the discovery of research opportunities was tied to exploring the cities and speaking to locals. The unique, individualized maps generated by students then became a way to walk through this process of discovering research opportunities through exploring local space. In essence, students must learn the contextual nature of their new home and these maps serve as a way to show their research a form of contextual knowledge-making” (167). | <urn:uuid:a47af75f-007d-47e9-877d-cd9ca7627361> | CC-MAIN-2018-05 | https://joesprelimnotes.wordpress.com/2016/09/09/strantz-wayfinding-in-global-contexts/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887981.42/warc/CC-MAIN-20180119125144-20180119145144-00299.warc.gz | en | 0.942019 | 443 | 3.015625 | 3 |
Tuesday January 28, 2020
Sep-29-2011 14:34TweetFollow @OregonNews
Waters for Life in PalestineDr. Mazin Qumsiyeh Salem-News.com
After 1967, Palestinians in the West Bank and Gaza were denied access to most of their water resources in a calculated process to impoverish the population and destroy the economy in the occupied Palestinian territories.
(BETHLEHEM) - From its founding Israel as an apartheid colonial power has appropriated natural resources from native people to use for immigrants imported from around the world.
Before 1967, Israel diverted waters that normally flowed into the Jordan river basin and also restricted water usage by the Palestinians who remained in what became the state of Israel in 1948.
After 1967, Palestinians in the West Bank and Gaza were denied access to most of their water resources in a calculated process to impoverish the population and destroy the economy in the occupied Palestinian territories. Today, Palestinian are allowed to use an average of 72 liters per capita per day versus Israeli average of 280 liters versus settlers in the West Bank average of 400 liters daily.
For some communities of Palestinians like those in area C including the Jordan Valley, the situation is worse as Israel routinely destroys their sources of water. The international community and local Palestinians are called to work together to address this system of inequality through direct positive actions.
The Palestinian Center for Rapprochement Between People, the Applied Research Institute- Jerusalem, and the Palestine Justice Network have jointly proposed a plan of action for activists interested in helping us to ameliorate the water situation and also challenge the Israeli policies and practices via non-violent methods of resistance. We call you to join us by:
a) Donating towards rehabilitation of existing ancient wells and cisterns. While most labor will be via volunteers and owners of the wells and cisterns, there is need for purchasing cement, gravel, ladders, and other building supplies to implement this project. To donate, please go to http://www.pcr.ps/read/donate-
b) Coming to Palestine to help directly with your labor to rehabilitate old wells. You can arrive at anytime but you may want to coordinate arrival for our week of action focused on land and water beginning March 30th (email to firstname.lastname@example.org to get details)
c) Join our international advocacy group and publicize the water situation via pressure on governments and reaching out to others via mainstream and alternative media (share any letters you write with us at email@example.com ).
To implement this project, we created a local committee composed of activists knowledgeable in the area who laid out plans not only for rehabilitation of wells but also for their protection from Israeli destruction through legal and direct action methods. A project coordinator was selected from ARIJ and donations towards this project will be set-up in a separate account in PCR.
About ARIJ: Founded in 1990, the Applied Research Institute of Jerusalem (ARIJ) is a non-profit organization dedicated to promoting sustainable development and the self-reliance of the Palestinian people through greater control over their natural resources. ARIJ has more than 19 years of organizational experience in the fields of natural resources management, water management, and environmental management. ARIJ plays an active role in the local community as an advocate for greater co-operation among local institutions as well as international and non-governmental organizations. In its capacity as a research institute, ARIJ focuses on its applied approach to projects which contribute to sustainable development, on one hand, and finding solutions to community problems, such as providing safe access to water and sanitation ; better management and utilization of land, water and other natural resources, self-reliance and empowerment of the people, on the other hand.
About PCR: The Palestinian Center for Rapprochement between Peoples (PCR) was founded in 1988. Its mission is to promote, develop and implement unarmed civilian peacekeeping as a tool for reducing violence and protecting civilians in situations of violent conflict. We work to bridge the gap between Palestinians and people from all around the world, informing the public about the reality in Palestine, and empowering the community through nonviolent direct action. Our Goals are: 1) Promote arriving at a just and peaceful Palestine, 2) Promote harmony and rapprochement within society and between societies, 3) Raise awareness Provide accurate and first hand information about Palestine, and 4) Enhance civic duty and civic responsibility especially for empowering youth, women, and for marginalized segments of our society. PCR activists co-founded the International Solidarity movement which was headquartered at PCR for the first 5 years.
About Palestine Justice Network (PJN) and Welcome to Palestine (WTP) Campaign: PJN mission is to build a global network of activists and organizations that work together in advocacy in order to support the goals set forth by the Palestinian Civil Society Call to Action 2005. WTP has hosted internationals in support of this mission and to do exploratory and support missions to Palestine for example during Christmas 2010 and the attempt to arrive by the hundreds in July 2011. See http://palestinejn.org
Mazin Qumsiyeh, PhD - Popular Committee to Defend Ush Ghrab (PCDUG) "A Bedouin in Cyberspace, a villager at home. Mazin has been an Associate Professor of Genetics; Director, Cytogenetics Laboratory at Yale University School of Medicine since 1999. He previously held a similar position at Duke University. Professor Qumsiyeh has authored over 110 scientific papers in areas of mammalogy, biology, and medicine including mammalian biology and evolution, clinical genetics, and cancer research. He has published over 100 letters to the editor and 30 op-ed pieces in International, national, regional and local papers on issues ranging from politics to environmental issues. His appearances in national media included the Washington Post, New York Times, Boston Globe, CNBC, C-Span, and ABC, among others. He is the founder and president of the Holy Land Conservation Foundation and ex-President of the Middle East Genetics Association, and Prof. Qumsiyeh won the Jallow activism award from the Arab American Anti-Discrimination Committee in 1998. He is author of “Sharing the Land of Canaan: Human rights and the Israeli/Palestinian Struggle” and just published “Popular Resistance in Palestine: A history of Hope and Empowerment.” Visit Mazin Qumsiyeh's amazing and informative Website to learn more: qumsiyeh.org.
Articles for September 28, 2011 | Articles for September 29, 2011 | Articles for September 30, 2011 | <urn:uuid:9d3dba53-ceab-429f-bc3f-784aac2c5f43> | CC-MAIN-2020-05 | http://www.salem-news.com/articles/september292011/palestine-waters-mq.php | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783342.96/warc/CC-MAIN-20200128215526-20200129005526-00278.warc.gz | en | 0.9369 | 1,365 | 3.03125 | 3 |
China's economy witnessed tremendous growth after the Chinese market opened up in the early 1990s. As a result, the migration of people from rural locations to urban areas became more significant, especially over the past five years. The expansion and development of 'Mega Cities' and some coastal cities in China (eg. Beijing, Shanghai, Hong Kong, Guangzhou and Shenzhen) has led to a steeply increasing requirement of human resource as well as natural resource supply.
According to a study carried out by the Ministry of Earth Surface Process of China, the urbanisation rate of coastal areas in China is expected to reach 60%-65% by 2030. Considering the average urbanisation rate reached 46.6% in 2009, this is a large increase.
In line with the rapid urbanisation progress, the coastal areas are now also home to major industrial parks in China, including Tianjin Binhai New Area (TBNA) Chemical Industrial Park, Yangtze River International Chemical Industrial Park (YCIP), Shanghai Chemical Industry Park (SCIP) and the China-Singapore Suzhou Industrial Park (CS-SIP). Such relocation of heavy industry from inland regions to designated development zones on the coast will ultimately reduce environmental pressures on inland areas.
As a result of planned power plants along the coast - including renewable sources - there will inevitably be an increase of desalination capacity to copy with the water demand. Nor is it additional power facilities straining China's water resources.
Governmental actions and resolutions
A staggering 400 cities out of 668 in China face the challenge of water scarcity. Coastal areas in particular are the most water stressed with capita water resource of less than 500m3/year - the level that defines 'extremely scarce' by the standard of the UN. These areas account for 13% of the land, 40% of the population, but contribute 60% of the total GDP in China. It is expected that a combined demand gap of 16.6 to 25.5 billion cubic meters for the four northern coastal provinces is foreseen by 2010.
To cope with such water stresses, the Chinese government has set out to measure daily water consumption rates for people in different regions, to control and measure their water consumption with an incentive to avoid the over use of water. The sustainable development plan of 'Water Conservation Society' has been integrated into the 11th Five Year Plan (2006-2010), and will continue to be strengthened during 12th Five Year Plan (2011-2015).
Three important documents including 'China Ocean Agenda 21', 'The Outline of the National Planning for Development of Ocean Economy' and 'The Special Plan for Seawater utilisation' act as the guidelines for the Chinese seawater desalination industry. In particular, 'The Special Plan for Seawater Utilisation' clearly states the current status of coastal water resource, seawater utilisation and the potential for seawater desalination development, investment environment and regional short-term (2010) and long-term (2020) targets for regional desalination and seawater utilisation.
Though the initiatives are positive, there is still a lack of supporting policies when it comes to risk proof mechanisms, allocation of funds or subsidies, as well as mechanisms for developing desalination projects. Market participants need more specific guidelines and regulations to help operate businesses in this field.
China desalination market - market players and production capacity
In China, legislation and development plans determine the direction of an industry. As a relatively young market, the desalination market in China is somewhat centralised but not fully regulated. Two national institutes – The Development Center of Water Treatment Technology and The Institute of Seawater Desalination and Multipurpose Utilization are government led entities, responsible for desalination research and project development.
Key desalination project developers active in the northern and eastern coastal areas are BEFESA, Hyflux, Aqualyng, IDE, Zhonghe and Tsingtao Huaou cooperating with key desalination technology suppliers such as Dow, Hydranautics, Norit, Toray, GE Water, Siemens Water, ERI, etc.
There are 57 desalination projects either completed or in progress with different capacities. The largest one in China now is the Tianjin Seawater Desalination plant for Beijing Power Plant, developed by IDE with a production capacity of 200,000 m3/day.
The largest municipal desalination plant is Tsingtao Befesa desalination plant with production capacity of 100,000 m3/day. The current installed treatment capacity reached approximately 0.43 million m3/day with 1.75 million m3/day under construction. This stands in stark contrast to targets set out by 'The Special Plan for Seawater Desalination and Utilisation', which called for the procurement of up to 1 million m3/day by the end of 2010, and up to 3 million m3/day by 2020.
Two key factors restraining market growth
Key industrial sectors such as thermal/nuclear power plants, steel and metal production plants, or centralised industrial parks take up more than 90% of the overall desalinated water in China. Therefore, desalination plants are normally medium to large scale which need a tremendous amount of investment to support the technologies, engineering and construction involved. So far, privatisation in the desalination plant market is in its developing stage with 70-80% of the projects financed by the industry end users or the government.
Build-operate-transfer (BOT) or Design-build-operate (DBO) modes of business are expected to become prevalent for more municipal desalination projects. So far, the government does not have any direct incentives or funds for desalination projects. Financing is the biggest issue preventing many technology suppliers to tap into the desalination market opportunities in China.
It is estimated that for a 50,000 m3/day desalination plant, the overall investment can be up to U$30 million or more, which is almost three to four times the cost of a water treatment plant with the same treatment capacity. Medium to small engineering or investment companies find it difficult to develop such projects due to a lack of financial muscle. This leaves only companies with strong financial support and experience in the desalination water business to step up and become significant contenders in this market.
Befesa and Aqualyng projects are good examples of innovative financing practice, taking advantage of the 'non-recourse' financing mode that relies 70-100% on local bank loan (Tsingtao Befesa Desalination Plant, 100,000 m3/day, 2009; Caofeidian Desalination Plant, 50,000 m3/day, 2010).
Low water tariffs is also another long-term issue that affects the overall development of the water industry in China. Desalination will only be a financially viable proposition to public utility supply when the water tariff reflects the investment and operation costs.
However, convergence between water tariffs and the cost of desalination is expected during 2011-2015. The current desalination cost is about U$0.6-0.9/m3. Compared to the cost of U$1.2-1.5/m3 for the South-to-North water diversion project, it is attractive for northern coastal areas to relieve the water stress on such a reasonable cost. The cost of desalination rises when the network system expand, so the issue of introducing desalinated seawater into Beijing is still pending for cost evaluation and feasibility study.
Energy costs account for the highest proportion in the overall desalination costs, mounting up to nearly 50%. On the plus side, technological innovation continues to bring down the overall desalination cost. The relatively less energy intensive technology at present is Reverse Osmosis (RO) which is 30% lower than Multi-stage-flash (MSF) and 15% lower than Multi-effect Distillation (MED) technologies.
In the past four years, Reverse Osmosis (RO) technology was the dominant technology applied in China desalination industry except in 2008, when the biggest desalination project (200,000 m3/day) till then was initiated in Tianjin Beijiang Power Plant using Multi-Effect Distillation (MED) technology.
RO is more economically suitable for end-user applications such as high-temperature gas cooled nuclear plants, thermal power plants, chemical and petrochemical plants, and domestic municipal desalination plants when energy can be guaranteed but has potential problems of membrane blockages and needs periodic cleaning. MED is often applied in low-temperature nuclear plant, thermal power plant, steel and metal plants when heat is sufficient to support the distillation. A mixed combination of RO and MED desalination in power plants is another option when cooling, processing or even drinking water supply is needed for the specific project. This hybrid desalination technology is often adopted in centralised industrial parks.
The Chinese government encourages domestic companies to pursue innovate desalination technologies and increase the product quality, lifespan and services to catch up with the international established suppliers and further reduce the overall desalination cost.
At present, the gap in cost between domestic and imported desalination equipment is still significant. Imported equipment is still preferred by large scale project developers, largely on account of the assurance related to stable quality and treatment efficiency.
The National Development and Reform Committee announced six key energy-saving fields as the focus in the environmental sector for the 12th Five-Year-Plan. Among them, energy recovery devices and low energy consumption desalination technologies are expected to receive financial support.
The central government is encouraging the development of renewable energy projects (wind-powered/nuclear-powered plants, etc.), in which desalination can be adopted as auxiliary water supply and treatment system. This is to use either the abundant power or heat to generate desalinated water and integrate the energy and water recycling system. Desalination can then benefit from the special fund allocated to renewable energy industry by the Chinese government. Though detailed policies for the desalination industry are yet to be confirmed for the 12th five year plan (2011-2015), it can be expected that favorable policies will become clear and will be translated into city-level goals with regulations on both privatisation and long-term risk proof.
The Chinese desalination market is young with what can be described as immature regulation and market environment. Several demonstrative projects have been established in Northern China coastal areas, which significantly enhance confidence for the government and project developers in the wide adoption of desalination in water scarce coastal areas of China.
The Chinese government is working on establishing guidelines and focused directions to help the market grow in a healthy competitive environment. Water tariff is yet to be adjusted which can really recoup with the project investment and long-term operation cost.
Author's note: Jennie Peng is consulting analyst in the Frost & Sullivan Environment (Water) Practice based in Beijing. For further information on the study please contact Fredrick Royan, Research Director - Water Markets at [email protected]. | <urn:uuid:6f7ef7f8-d6ac-458b-a681-162fa8547b3c> | CC-MAIN-2023-50 | https://www.waterworld.com/home/article/16209359/market-report-developing-desalination-in-china | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100632.0/warc/CC-MAIN-20231207022257-20231207052257-00184.warc.gz | en | 0.923038 | 2,287 | 2.9375 | 3 |
|Figure 1: Recurrence of Capital-Output Ratio|
This example is from Arrigo Opocher and Ian Steedman. It illustrates the analysis of an isolated industry in equilibrium. This analysis is therefore more akin to partial equilibrium than to general equilibrium. Sometimes (mainstream?) economists say that the Cambridge Capital Controversies were only about aggregate neoclassical theory, that is, macroeconomics. Or that the CCC has been subsumed by General Equilibrium Theory. The example illustrates that such economists are, as has long been apparent, spouting poppycock.2.0 Indirect Average Cost Function
Consider a firm that produces widgets from inputs of widgets, unskilled labor, and skilled labor. Let the indirect average cost function be:
c(p, w1, w2) = sp + w1 + w2+ 2(pw1)1/2 + 2(pw2)1/2 + 2γ(w1w2)1/2
0 < s < 1
0 < γ
γ ≠ 1
- p is the price of a widget. Widgets used as inputs are assumed to be totally consumed in one production period.
- w1 is the wage for unskilled labor.
- w2 is the wage for skilled labor.
The indirect average cost function shows the average cost of producing each widget (net), when each firm in the industry is producing the cost-minimizing quantity. That is, each firm is producing at the point where the marginal cost and average cost of production of a widget is the same. Assume all firms face the same indirect average cost function. If a positive rate of (accounting) profit was being earned by any firm, the rate of profit would show up in the arguments of the indirect average cost function for that firm.
This indirect average cost function is homogeneous of the first degree:
c(a p, a w1, a w2) = a c(p, w1, w2)
This is a conventional assumption for cost functions.
Suppose the firm faces a given price of widgets and given wages for skilled and unskilled labor. By Shephard's lemma, the quantity of each input the firm wants to hire per unit output, given the price of each input, is the derivative of the indirect average cost function with respect to the price of that input. Hence, the capital-output ratio, k(p, w1, w2), is:
k(p, w1, w2) = ∂c/∂p = s + (w1/p)1/2 + (w2/p)1/2
Notice that the capital-output ratio is a pure number, unambiguously defined in this example, and independent of prices.
By the same logic, the amount of unskilled labor the managers of the firm desire to hire per widget produced is:
l1(p, w1, w2) = ∂c/∂w1 = 1 + (p/w1)1/2 + γ(w2/w1)1/2
The amount of skilled labor the managers of the firm desire to hire per widget produced is:
l2(p, w1, w2) = ∂c/∂w2 = 1 + (p/w2)1/2 + γ(w1/w2)1/2
The matrix of second derivatives of the indirect average cost function is:
(I am not sure whether it is more common to define the above matrix as the transpose of what I have above.) Anyway, for a positive price of widgets and positive wages, the signs of the second derivatives are as follows:
The signs along the principal diagonal show that the slopes of the per-unit input demand functions slope down. That is, given prices for all but one input, a lower price of that input is associated with a willingness of the firm to employ more of that input per unit produced. The positivity of the off-diagonal elements of the above matrix show that widgets, considered as inputs; unskilled labor; and skilled labor are all substitutes, not complements, in some sense. These signs for the matrix of second derivatives of the indirect average cost function are also conventional properties for cost functions.3.0 Full Industry Equilibrium
Suppose the industry in which widgets are produced has no barriers to entry or exit. Thus, in the long run, economic profits will have been competed away. For firms to be earning no economic profits, the price of widgets must be equal to the average cost of manufacturing them:
p = c(p, w1, w2)
So far, no numeraire has been specified. Let widgets themselves be numeraire. Then:
1 = c(w1, w2)
where the argument in the indirect average cost function for widgets has been dropped as otiose.
Consider various levels of w1, the wage of unskilled labor. For the industry to continue to be in long run equilibrium, the wage of skilled labor, w2, must vary as well, thereby leaving the average cost of producing a widget as unity. Figure 2 illustrates the resulting wage-wage frontier. (Figures are drawn for s = 1/10 and γ = 2/3.) The highest wage for unskilled labor (when the wage for skilled labor is zero) is ((2 - s)1/2 - 1)2. Since this model is symmetric in skilled and unskilled labor, the highest wage for unskilled labor is likewise ((2 - s)1/2 - 1)2. As long as the rate of accounting profits is zero and technology is given, the wage of unskilled labor can only be higher if the wage of skilled labor is lower.
|Figure 2: Wage-Wage Frontier|
The wage-wage frontier can be used to find the wage of skilled labor for a given wage of unskilled labor between zero and the maximum. In other words, the frontier is helpful in calculating the ratio of the wage of skilled labor to the wage of unskilled labor, given the wage of unskilled labor. This ratio of wages is independent of the choice of the numeraire.4.0 Capital and Labor
With the chosen numeraire, the capital-output ratio is:
k(w1, w2) = s + (w1)1/2 + (w2)1/2
Given the wage of unskilled labor, one can find the wage of skilled labor and, consequently, both the ratio of wages of the two types of labor and the capital-output ratio. Figure 1, at the start of this post, graphs the capital-output ratio as the derived function of the ratio of wages.
The capital-output ratio is the same when either skilled or unskilled labor is earning their maximum wage, with the other type of labor being paid a wage of zero. In these two extreme cases, the capital-output ratio is (2 - s)1/2 - (1 - s). Likewise for any ratio but one of the wage of skilled labor to the wage of unskilled labor between these extremes of zero and infinity, the capital-labor ratio is non-unique. The exception is the ratio of wages at which the function in Figure 1 peaks.
One can see that recurrence of the capital-output ratio is not reswitching. Figures 3 and 4 show, respectively, unskilled labor and skilled labor per unit output as a function of the ratio of wages. As shown in Figure 3, a higher wage of skilled labor accompanied by a lower wage of unskilled labor is associated with firms wanting to employ more unskilled labor per unit output. Likewise, a a higher wage of skilled labor accompanied by a lower wage of unskilled labor is associated with firms wanting to employ less skilled labor per unit output. As far as unproduced inputs go, this example of the isolated firm in long run equilibrium does not contradict outdated and exploded neoclassical intuitions about substitution and the mistaken notion of equilibrium prices as scarcity indices. But, since the functions in Figures 3 and 4 are monotonic, no reswitching of techniques arises in this example.
|Figure 3: Unskilled Labor Employed per Unit Output|
|Figure 4: Skilled Labor Employed per Unit Output|
This post has presented an example of an isolated firm in a long period equilibrium. The indirect average cost function, which includes the cost of the use of an input which itself is produced by the firm's industry, otherwise has utterly conventional properties. The analysis of the firm in a long run equilibrium demonstrates that it is an incoherent thought experiment to consider the equilibrium response of the firm to the variation of one price at a time. Only the variation of more than one price at a time can yield an equilibrium analysis that could be at all empirically relevant.
A result of this analysis is to reveal a non-monotonic response of the capital-output ratio to variations in the relative prices of the two unproduced inputs used by this firm in production. In fact, every possible capital-output ratio, except for one, recurs in the example. This is a step in an argument leading to the conclusion that economic theory is consistent with competitive firms wanting to employ more input per unit output for higher prices of that input, a finding that seems consistent with empirical results. | <urn:uuid:cae2c38d-4d27-4dfd-901e-dde1bf70d082> | CC-MAIN-2017-09 | http://robertvienneau.blogspot.com/2015_06_01_archive.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00061-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.917766 | 1,951 | 3.140625 | 3 |
The little girl, Rosamond
Plot: Rosamond is a little girl about seven years old; she is walking with her mother in the streets of London. Every time she sees something in the shops she asks her mother to buy her them, Even things that she doesn't know their names and what are they uses for.
Then in one of the shops she see a purple-pot and she asks her mother to buy it to her but her mother told her that she hasn't got enough money and at the same time her shoes were worn so some stones goes inside it and it hurts her. She asks her mother to buy a new pair of shoes but she refused and tell her that she have to decide either the pot or pair of shoes.
She decided to choose the purple-pot and accepted to be without new pair of shoes until a month later. When she goes home and bring the purple-pot and try to put flowers into it she realize that the pot color is not really purple, but there is something else inside it makes it colors in purple. By that time she disappointed and she wished that she believed her mother at choosing the pair of shoes instead of the purple-pot. Form there, she couldn't walk with her mother to see shops any more and her father didn't take her with him to her brother's.
Characters: The two main characters in the story are Rosamond and her mother. The other minor characters are Mr. Sole (the shoe maker), the shopkeeper, servant, father, brother, and customer. Rosamond here is the protagonist because all the events go around her and the antagonist is her desire.
Conflict: the kind of conflict in internal. It's between Rosamond and her desire.
Themes: the important themes in the story are appearance and the reality, it means that appearance is not always show us the reality of things and we should be aware of its inside. One other theme in the story is making choice or decision and its results, if the result was positive how we treat with it and if it was negative we should take the responsibility. The other theme of the story is talking about the characteristic of children and their behavior and the always change their mind towards thing around them.
Climax: the most important event in the story is when Rosamond chooses the purple-pot because after that every thing is changing.
Settings: time is not mentioned in the story, but the place is London city in the U.K.
Narration: the narrator is third person.
Point of view: it's an interesting story we can learn form it different things in our life like taking responsibility in our decision and not be cheated by appearance of thing. | <urn:uuid:513d7e22-f271-4995-847a-ccdd28169f21> | CC-MAIN-2018-09 | http://shvang.blogspot.com/2010/12/little-girl-rosamond.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813187.88/warc/CC-MAIN-20180221004620-20180221024620-00076.warc.gz | en | 0.983064 | 556 | 3.171875 | 3 |
German Lieder in the Nineteenth Century (Studies in Musical Genres and Repertories); edited by Rufus Hallmark (UK)
This is an essay collection on various 19th-century Lied composers, including a chapter on the song cycle and one on performance. Each chapter contains brief analyses of some of the more significant songs and discusses source materials.
The Romantic Generation, Charles Rosen (UK)
It discusses Schubert and Schumann Lieder, including many music examples drawn from the songs, discussion of the relationship between Schumann's piano music and his songs, much commentary on Winterreise, etc.
Lieder: an introduction to German song; Kenneth S. Whitton
Eighteen song cycles: studies in their interpretation; Lotte Lehmann
|Updated: 17 December 1999||Lieder| | <urn:uuid:5e29a1b5-c476-4c29-9cf1-61b9d36d4223> | CC-MAIN-2018-43 | http://gopera.com/lieder/books/misc_lieder.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514437.69/warc/CC-MAIN-20181021224001-20181022005501-00441.warc.gz | en | 0.908893 | 174 | 2.671875 | 3 |
Most fruit trees will grow poorly, if at all, in wet soil. Their roots will die from lack of oxygen if water takes more than 24 hours to drain through the root system. Occasional floods probably aren't lethal, and trees planted on mounds will often survive. For a truly boggy area, choose a fruit tree that is genuinely tolerant of those conditions.
The common European pear and its varieties such as Seckel, Comice and Bartlett are quite tolerant of wet soil, though it would prefer a deep, moist, well-drained site. Plant on a mound if possible. It is closely related to both apples and quinces. The fruit should be picked when slightly green and ripened inside. If allowed to stay on the tree, fruit often drops off before ripening fully, and is difficult to pick without bruising. Pears need to be pollinated by other pear varieties, so plant two trees or buy a single tree on which two or more varieties have been grafted.
Persimmons are native to both Asia and the Americas, but it is the Asian species that has been cultivated for centuries and that is most widely grown. The many varieties available can be divided into two groups, those whose fruit is astringent until soft and jelly-like and those with non-astringent fruit. The astringent varieties are usually adapted to cooler areas. A non-astringent variety can be eaten when crisp, like an apple, and is usually grown in warmer climates. Persimmons will often take some drought as well as wet soil, though the ideal soil is deep, moist and well-drained.
Juneberry (Amelanchier alnifolia) is also known as serviceberry, saskatoon berry and shadblow. The fruit is a blue berry that is loved by both birds and humans. The small tree will spread by suckers to form a thicket and grows in most soils, wet or dry. The white flowers are attractive in spring.
Apples on Certain Rootstocks
Like most fruit trees, favorite apple varieties are grafted on to apple species that have root systems that are either stronger or smaller than that of the original variety. Some produce dwarf trees, some semi-dwarf. Certain rootstocks are more tolerant of wet soil than others, the apple species Malus borowinka, M. antonovka and M. ranetka among them. Though not commonly used, the swamp crabapple, M. fusca, from western North America, will produce a bog-tolerant apple tree when used as a rootstock. | <urn:uuid:b8496c55-b261-4ae0-a633-511ab9cd5302> | CC-MAIN-2017-13 | http://www.gardenguides.com/125078-fruit-trees-like-wet-soil.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189239.16/warc/CC-MAIN-20170322212949-00122-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.957704 | 538 | 3.703125 | 4 |
At the conclusion of this chapter, the reader will be able to:
Identify the major influences leading to the development of the Functional Mobilization approach to orthopaedic manual physical therapy (OMPT).
Understand the examination and treatment philosophy of The Institute of Physical Art and Functional Mobilization.
Conduct a functional examination, including assessment of rolling and gait.
Understand the use of functional movement patterns and proprioceptive neuromuscular facilitation patterns to identify biomechanical dysfunctions.
Understand the importance of the impact test.
Use Functional Mobilization to identify, localize, mobilize or stabilize, and reeducate dysfunctional movement segments.
Appreciate how the Functional Mobilization approach to OMPT can combine treatment of structural dysfunctions, neuromuscular dysfunctions, and motor learning into one treatment.
Understand how to involve the patient in treatment through movement education, active release, and neuromuscular control and reeducation.
Functional Mobilization (FM) is an inherent component of Functional Manual Therapy (FMT), a systematic approach to patient care designed to identify the mechanical, neuromuscular, and motor control factors inhibiting and preventing efficient function. Differing from traditional passive approaches, FM couples active and resisted movements with specific, directional pressures to restore functional mobility. FM offers a seamless progression from assessment of mobility to a three-dimensional approach to intervention.
"The Functional Manual Therapy Approach offers concepts and tools for examination and intervention…. Examination is performed through the use of observation of form and motion, palpation to determine condition, and resistance to explore neuromuscular control. Through intervention, we improve the interplay of motor control, structure, and functional capacity…." -G. Johnson
Functional Mobilization, developed by Gregory S. Johnson in 1980, represents a synergy of eclectic study and clinical experience. Following graduation from the University of Southern California in 1971, Johnson attended a yearlong proprioceptive neuromuscular facilitation (PNF) residency under Margaret "Maggie" Knott at Kaiser Rehabilitation Hospital in Vallejo, California (Fig. 12–1). Continuing at Kaiser as senior faculty in the residency program until 1978, Johnson's experiences reinforced his understanding of the importance of evaluating function, applying manual resistance, and using developmental postures and motions for movement reeducation.
Margaret "Maggie" Knott, developer of proprioceptive neuromuscular facilitation.
From 1972 to 1978, Johnson augmented his training in PNF with extensive study in joint mobilization approaches and alternative therapies. In 1978, together with his wife and cofounder of the Institute of Physical Art, Vicky Saliba Johnson, Johnson began teaching continuing education directed at the enhancement of function. The principles of PNF, joint mobilization, and soft tissue mobilization laid the foundation for the development of FM as a dynamic three-dimensional approach.1-5
The FM approach has been influenced by a variety of orthopaedic manual physical therapy (OMPT) approaches, including the Nordic (Chapter 6), Australian (Chapter 8), Paris (... | <urn:uuid:739cf655-815a-4856-b8a9-2e476fb5e6c5> | CC-MAIN-2023-50 | https://fadavispt.mhmedical.com/content.aspx?bookid=2154§ionid=164768190 | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.42/warc/CC-MAIN-20231203161435-20231203191435-00394.warc.gz | en | 0.89665 | 636 | 2.578125 | 3 |
Nicolas Fouquet, Fouquet also spelled Foucquet, (born 1615, Paris—died March 23, 1680, Pignerol, Fr.), French finance minister in the early years of the reign of Louis XIV, the last surintendant (as opposed to contrôleur général), whose career ended with his conviction for embezzlement.
Born the son of a wealthy shipowner and royal administrator, Fouquet was a supporter of the powerful Cardinal Mazarin and of the royal government during the turmoil of the Fronde (1648–53). He purchased the post of procureur général to the Parlement of Paris in 1650, and in 1653 he was appointed surintendant des finances. To aid Mazarin, who in return upheld him, Fouquet lent considerable sums to the treasury, making himself, in effect, banker to the King; his numerous financial operations, which he conducted in an irregular way (though not contrary to the usage of the times), made him extremely rich.
After Mazarin’s death (March 1661), Jean-Baptiste Colbert, Mazarin’s personal intendant and closest confidant, sought to succeed Fouquet as finance minister by destroying his reputation with the King. Colbert revealed irregularities in Fouquet’s accounts and denounced the financial operations by which he had enriched himself. Fouquet was arrested in September 1661, and his trial, which lasted three years, excited great public interest. Colbert suppressed the papers that would have proved Mazarin’s personal responsibility for many of the financial transactions in question, but Fouquet defended himself cleverly, and public opinion turned in his favour. On Dec. 20, 1664, he was condemned to banishment, but Louis XIV “commuted” the sentence to life imprisonment. Fouquet was taken to the fortress of Pignerol, where he died just before a measure of clemency could be issued. | <urn:uuid:c02b71f2-df3b-4c12-ad89-d63b16beaed8> | CC-MAIN-2022-21 | https://www.britannica.com/biography/Nicolas-Fouquet | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662577259.70/warc/CC-MAIN-20220524203438-20220524233438-00089.warc.gz | en | 0.975601 | 406 | 2.59375 | 3 |
As you and your students may be able to imagine, our planet is filled with trash. Most of what we consume today is considered not to be used more than a few times, and so we throw it in a trash can and then put it on the street for the trash men to take it far away from us. Unfortunately, this is not the whole truth, it ends up in our quickly filling land fills.
But we do not only occupy this planet. For the past fifty or so years we, or things we have made, have also occupied outer space. Some of these items have been brought back, others have been destroyed reentering our atmosphere. But many are still floating in outer space. And even the tiniest object can cause major damage. Have you students imagine sand being thrown at them. Then imagine it being thrown at you at around 17,000 mph, the average speed of a space craft in low orbit. It can cause a lot of damage to you, or to a space craft.
This infographic goes through various methods being explored and tested to help clean up this debris. From giant fish nets to lasers, there are a variety of ways being explored to make space safe for continued exploration. Have you students discuss the merits of each method, and be able to defend what they think is the best method. | <urn:uuid:073e0aa6-c7bc-4f5a-875b-4b32ad50c17b> | CC-MAIN-2019-30 | http://2cents.onlearning.us/?p=4459 | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526359.16/warc/CC-MAIN-20190719202605-20190719224605-00140.warc.gz | en | 0.960667 | 269 | 3.71875 | 4 |
The effect of irrigation with saline water (above 500 mg L-1) is considered a problem of small-scale farmers growing vegetable crops with high water demand in the hobby gardens characteristic of the Hungarian Great Plain. In order to simulate the circumstances of such hobby garden, we set up an experiment including five simple dr...ainage lysimeters irrigated with saline water in the Research Institute of Karcag IAREF UD in 2019. We regularly measured the electric conductivity (EC) of the soil referring to its salt content and the soil moisture content with mobile sensors. Before and after the irrigation season, soil samples from the upper soil layer (0-0.6 m) were taken for laboratory analysis and the soil salt balance (SB) was calculated. The actual salt balance (SBact) was calculated of the upper soil layer (0-0.6 m) based on the salt content of the obtained soil samples. The theoretical salt balance (SBth) was calculated by the total soluble salt content of the irrigation water and leachates. During the irrigation season, we experienced fluctuating EC in the topsoil in close correlation with the soil moisture content. Based on the performed in-situ EC measurements, salts were leached from the upper soil layer resulting in a negative SB. Combining SBact and SBth of the soil columns of the lysimeters, we estimated the SB of the deeper (0.6-1.0 m) soil layer. We quantified 12% increase of the initial salt mass due to accumulation. We consider this methodology to be suitable for deeper understanding secondary salinization, which can contribute to mitigating its harmful effect. By repeating our measurements, we expect similar results proving that saline irrigation waters gained from the aquifers through drilled wells in Karcag are potentially suitable for irrigation if proper irrigation and soil management are applied.
The movement of water resources, especially the possibilities of their regulation by interaction between surface and groundwaters are the subject matter of attention particularly during the occurrence of extreme hydrologic situation. This work presents the overview of knowledge and results which were achieved at IH SAS in this question. It...can show the ways how to optimize the adjudicated processes which emerge during the requirement of emergency intervention. The solution of this task was located at the Žitný Ostrov area because this territory with their existence of channel network is suitable for studying the surface and groundwater interaction. The channel network at Žitný Ostrov was built up for drainage and also to safeguard irrigation water. The water level in the whole channel network system has an effect on groundwater level on the Žitný Ostrov and vice versa. It was been necessary to judge the impact of the channel network silting up by bed silts on the interaction between channel network and groundwater on the Žitný Ostrov. The aim was to evaluate the changes of bed silt state of Žitný Ostrov channel network and consecutively their influence on interaction processes between groundwater and surface water along the channels in the period from 1993 to present. The measurements of bed silt thickness in Žitný ostrov channel network had been started from1993, later they continued at selected profiles of three main channels – channel Gabčíkovo-Topoľníky, Chotárny channel and Komárňanský channel (for checking of the silting up variability). From 2008 the detailed field measurements of cross-section profiles aggradations along these selected three channels have been started. The objective of detailed field measurements was the determination of the silt permeability which is expressed by parameter of saturated hydraulic conductivity. This parameter was determined by two ways – as the saturated hydraulic conductivity obtained from disturbed samples of silt Kp and as the saturated hydraulic conductivity obtained from undisturbed samples of silt Kn. In the first case the granularity of silts was determined as a first step and then was computed their Kp from the empirical formulas according Bayer-Schweiger and Spacek. From undisturbed samples of silts which were extracted along the channels from top, middle and bottom layer of silts, were determined the values Kn by the laboratory falling head method. The valid values Kp on channel Gabčíkovo-Topoľníky ranged from
4,33 10-7 to 4,46.10-5 m s-1, on Chotárny channel from 5.98 10-5 to 2.14 10-6 m s-1 and on Komárňanský channel fluctuated from 1.93 10-6 – 6.09 10-5 m s-1. The valid values Kn on on channel Gabčíkovo-Topoľníky ranged from 5.21 10-8 – 4.18 10-3 m s-1 , on Chotárny channel ranged from 8.54 10-8 – 2.70 10-4 m s-1 and on Komárňanský channel fluctuated from 4.72 10-7 – 1.26 10-5 m s-1. The remarkable results were noticed by comparison of values of saturated hydraulic conductivity from disturbed and undisturbed samples Kp and Kn. On Chotárny channel the values of silt saturated hydraulic conductivity from undisturbed samples Kn approximately hundredfold decreased (from 10-6 to 10-8 m s-1). On Komárňanský channel the comparison of values Kp and Kn shown that the values Kn from undisturbed samples approximately tenfold descended against Kp.
Simultaneously, the bed silts‘ impact on the groundwater recharge (saturated hydraulic conductivity of silt) was also examined. Determination of the total recharge amount was done by numerical simulation (model SKOKY) and by the so-called method of interaction formulas. These two approaches were applied at the Žitný Ostrov channel network. There were field measurements performed in monitored three main channels and adjacent to obtain correct input data. These characteristics were used for simulation and computation of total recharge along the channels. The total recharge amount was calculated for four alternatives of the surface water levels in the channel and the surroundings groundwater respectively. We chose four simplified variants with the same geological conditions in surroundings area of channels, only water levels of groundwater and in channels were modified. The results of the simulations seem to show greater impact of the silt in the case of outflow from the channels to the surroundings than the inflow into the channel from the surroundings.
Monoculture caused a gradual decline of soil conditions, while nematodes and salt accumulation stimulated the growers to choose alternative practices, such as soilless cultures, which proved their value in Western Europe. Exact statistics are lacking, but estimates deal with approximately 300-400 hectares of vegetable on rock wool, whereas othe...r substrates of soilless culture may multiply this number. Real perspectives are attributed to the forced production of pepper, tomato and cucumber.
Vegetable production in greenhouses may impair the ecological balance of the environment substantially as far as being uncontrolled. Soilless cultures especially should be handled thoughtfully. A fraction of the nutrients administered, more than 25-30%, is doomed to be lost in an open system, and the resulting ecological risk is accompanied with increasing costs of the production.
In Hungary, the quantity of nutrient elements in drainage water is unknown, et all. Connecting the production results with chemical analysis, we gain more information about it.
You can see a mathematical method for evaluation of nutrient and water conditions in tomato hydroponics production.
This research has the general goal to meet the customization of agriculture in small scale farming. We are developing a technique using micro doses of soil conditioners and organic material applied in the root zone of vegetable crops. We expected to change the physical and chemical properties of the affected soil, which has been irrigated w...ith salty water. Two different soil conditioners were tested. A lysimeter experiment including 8 simple drainage lysimeters was set up in the Research Institute of Karcag IAREF University of Debrecen in 2017. The main goal was to study the effect of different soil conditioners on the soil endangered by secondary salinization induced by irrigation with saline water. In order to compare the difference between the treatments, we collected soil samples, water samples, and determined the yields. Chili pepper (Capsicum annuum) was used as an indicator crop during one specific agricultural season. The technique called micro soil conditioning is rational because several reasons. The roles of the technique are various, for example it can serve as a source of carbon or a container for soil amendments and can minimize evaporation. We found this technique not to interfere with the chemical reaction or the interaction with the plants. However, the micro doses of soil amendments had the role to minimize the risk of soil degradation and do not significantly influence soil respiration. In addition, by improving soil properties, soil conditioning increases the leaching of the excess of salts from the root zone. In fact, this technique can decrease the cost of the inputs and improves the production of vegetables, and at the same time mitigates the effect of secondary salinization.
Salt affected soils cover about 1 million hectares in Hungary. This paper is based on the research results obtained at the Karcag-puszta long-term experimental site, where, depending on the catena, crusty (A horizon=0–7 cm), medium (A hor.=8– 20 cm) and deep (A hor.>20 cm) subtypes of the Meadow Solonetz soil could be found. The chemical... reclamation was made specifically for the given site. Lime was applied on the soils with neutral or slightly acidic top layer, while on the soils with alkaline top layer, gypsum was applied. As regards internal drainage, a tube system with an average depth of 1 m and 5, 10 and 15 m drain spacing was constructed. Decreasing salt and sodium content could be measured both in drained and non-drained soils. The advantage of drainage was that the leachingout extended to the whole layer above the drain pipes, while without drainage, the Na ions exchanged from the upper layers still accumulated at a depth of 60– 100 cm. In the first two decades, the groundwater level was deeper and leaching was the dominant process. Since 2004, due to the frequently high groundwater level, the leaching and deepening of the fertile top layer has been slower.
The DIRECTIVE 2000/60/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL orders the measurement of the state of natural and artifical waters. We therefore applied environmental qualification methods, which allow inductions of the searched area in environmental management, conservation and water quality protection points of view. These methods are... accepted in interdisciplinary sciences, and are in use in Hungarian and international practice. We applied the range data measured along the Berettyó River, and ratified by the remote sensing, to count hydrological-hydraulical attributes of the stream, by the framework of the Hec-Ras programme. We processed the physical, chemical and biochemical water qualifications, determined the MMCP-index (the point-system of the Hungarian macrozoobenthos taxons), and estimated the Spencer index-numbers, which were based on complex environmental qualification and bioindication. Appointed, that the different results of researches are not inconsistent. This results together the spatial analysis reveal the natural and anthroponetic specialities of the river and the landscape, which determine the environmental flavours and biodiversity. The bioindicators represent better environmental status, than the physical, chemical and biochemical parameters. The natural conservationist importance of drainage canal network of Bihari-Plain is appreciated by these facts. | <urn:uuid:02e2f8ec-c0f7-40a6-b85c-bc91a85d4d0a> | CC-MAIN-2021-43 | https://ojs.lib.unideb.hu/actaagrar/search?query=drainage%20water | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585183.47/warc/CC-MAIN-20211017210244-20211018000244-00178.warc.gz | en | 0.941859 | 2,459 | 2.765625 | 3 |
St James's Church
documents from the late 13th and early 14th centuries make it clear that the bishop's
palace extended from Abbeygate Street on the south to the passage separating it
from the King's Bath on the north, and from the rear of the tenements on Stall
Street on the west. These conclusions are reinforced by the early post-medieval
evidence. The eastern limits are not clear, except at the southern end, where
the Porter's Lodging was situated, but must obviously fall close to those shown
on fig. 3, based on post-medieval property lines. Within this neat near-rectangle
there was an obvious anomaly, only partially straightened by what appears to be
a rearrangement dating from the early 17th century, and still visible today. Number
2, Abbey Street and the present Crystal Palace public house occupy a plot that
is noticeably at an angle to the rest of the layout here, indeed to that of the
whole monastery. The only buildings that share this alignment are the now vanished
church of St Mary de Stalls, and - to a lesser extent - the cathedral itself.
Very limited excavations under both present buildings have revealed the existence
of a Christian burial ground, many of whose occupants displayed physical traits
common among the Anglo-Saxons.The propinquity of the bishop's chamber, the orientation,
and the presence of early burials points powerfully to this plot being exactly
that of St James's before 1279. That it was of Saxon origin is clear by its awkward
incorporation into the bishop's close. It was obviously already too well established
by 1091 to move, and had to be accommodated in the new plans.|
Site of the Abbey Church|
As to the position of the Saxon abbey, we can only guess that it occupied a site somewhere within the later medieval precinct (fig. 1). Comparison with sites elsewhere, such as Wells or Winchester, might suggest a location somewhere near, but not necessarily under the present building. Alternatively, it is still possible that it may have stood eri the site of the modern abbey, as is the case at Romsey, for example. Another intriguing possibility is that the abbey church may be represented by the undoubtedly Saxon church of St James that stood west of Abbey Green until 1279. In that year it was partly demolished and converted into the bishop's private chapel, and the parishioners provided with a church on a new site (the remains of which are buried underneath Woolworth's) that served until the Blitz of 1942. But, of course, the dedication is against this suggestion.
Only excavation now holds any hope for discovering the site of the Saxon abbey. A few scraps of evidence in the form of burials suggest that Saxon cemeteries existed immediately south of the
Bath the Saxon street plan was overlaid by the Norman cathedral priory and bishop's
palace, but can we diseern the pattern beneath (Illus, .?)? Alfred the Great was
apparently responsible for the recreation of Bnrli as n borough (Manco iyyS, 39-4.1).
Some of the city's medieval streets and lanes fit the pattern ot borough planning
in liis time. Cimliffc (i'jS4, 351-52} extrapolated trom those remnants to recreate
the original Saxon plan. He assumed that the main Saxon artery ran straight down
from tbe North Gate to a Saxon south gate on the site of the medieval Ham Gale.
The northern part of this street I ligh Street is still there. The
southernmost part was represented in the medieval period by a lane running south
from the Abbey Gate to the Ham Gate (Illus. i ami 2). However it is now clear
that the Saxon main street could not have run in a direct line between the two.
The Saxon cemetery ot H.ith Abbey blocked that route (liell iyij6, i 5). So presumably
the street swung westwards around li.iih Abbey, established long belore Allred.
It would have been convenient to adopt the new main street as the western boundary
ot the Saxon abbey and later of the Norman cathedral priory. Certainty the priory
boundary ran along the east side of the lane to the Ham (Sate, That is apparent
from the map of 1725 (Illus, i), which was made for the owner of the former priory
site. His property is shown in darker colours.|
If the bishop's elose was laid out on the other side of the street, that would explain its curious alignment. It would have followed the street swinging westwards around the abbey. For the bishop to lay out his close on a block between two pre-existing streets would have simplified the planning process. It seems that part of the street swallowed up by the close and priory continued to have a public use until i^yy. The close had engulfed the Saxon Church ot St James. Successive bishops tolerated the incursion of parishioners until in December 1279 Bishop Robert Hurnell madets tor a new Church of St James to be built outside his close. The nave of old St James's was to be convened into his private chapel. He gave the site of the chancel to the priory, along with two other areas to enhrge the court and the priory gate. This suggests that a strip of land was being thrown into the priory that wns no longer needed by the parishioners of St James for access CO their church. Prior Walter de Anno converted part of the extra ground into a laundry and built a cellarer's room by the gate. Since he was much engaged with waterworks, lie may also have been responsible for building the priory conduit house (Mnnco 1994, 80-81, 93-94 and fig. 4). All three features survived the I )jssoluiion to appear on SavileN map (lllus. 2), by which lime they had become attached to gardens within the former close. They form a line where one would c\pect the main Saxon street on the presumption that the bishop's close used the street as its eastern bound.uy.
In summary, the evidence indicates that the Norman bishop's close at li.itli was a roughly rectangular block, probably laid out between two Saxon streets. To the east was Hath Priory. Between the close and the priory precinct ran a way to the parochial Church of St James, probably preserving pait of the line of the Saxon main street.
St James Church 1694
St James Church 1784
St James Church 1795
St James Church 1818
St James Church 1850
St James Church 1900
|Mediaeval church partially rebuilt, 1716. Nave rebuily (Thomas Jelly and John Plamer) 1768-9. West end and tower replaced and nave rebuilt yet again (George Phillip Manners) - 1848. Gutted by bombing 1942. Demolished in 1957 to make way for Woolworth`s (now Boots the Chemist).| | <urn:uuid:68e856de-8128-420e-8af2-f83e500bc7a3> | CC-MAIN-2019-22 | https://www.freshford.com/st_james_church.htm | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257699.34/warc/CC-MAIN-20190524164533-20190524190533-00297.warc.gz | en | 0.965617 | 1,504 | 2.5625 | 3 |
Researchers from Canada have shown that obese people without any major health issues may live as long as others who are of normal weight. They also showed that some obese, but otherwise healthy people have lesser chances of dying due to heart problems when compared to normal weight people with some medical problems.
“This shows that one should not look at the weight alone”, says researcher Jennifer Kuk, PhD, assistant professor of kinesiology and health science at York University in Toronto. She adds that if a person is healthy, having a healthy lifestyle, being physically active and having a healthy diet are more important than the body weight or weight loss.
Read the whole article at: http://findatopdoc.com/blog/obese-people-may-live-as-long-as-slim-people | <urn:uuid:4bdd1626-6d5e-4a02-9667-9152501446be> | CC-MAIN-2018-05 | https://anthonycasimano.wordpress.com/2016/02/19/obese-people-may-live-as-long-as-slim-people/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893397.98/warc/CC-MAIN-20180124050449-20180124070449-00202.warc.gz | en | 0.944041 | 166 | 2.8125 | 3 |
The rich world of visual arts reflect and shape our history and contribute to the culture, creativity and wealth of our society. The Art and Design Department at Moat embeds a knowledge of visual language to enable our students to develop their creativity through practical and contextual based work.
Key Stage 3
Students follow the national curriculum and complete a base-line assessment to measure both practical skills and contextual understanding from KS 2.
Year 7 – part one
Students follow a highly structured and rigorous introduction to visual language exploring each of the formal elements.
Year 7 – part two
During the second part they are led through a project inspired by the work of Picasso. The Key Stage 4 art and design assessment objectives are covered at an entry level as they produce both practical and contextual work leading towards a final response. Traditional French café and Spanish guitar music is played during lessons. Cultural capital is also enriched by a visit to New Walk Museum to view their collection of Picasso ceramics.
In Year 8, students explore the rich art and architecture of Islam, which for many of our students builds upon and values any prior knowledge they possess. Islamic music contributes to their cultural capital.
Key Stage 4
At Moat we follow a three year programme.
In Year 9 students have opted for a GCSE in fine art. The first two terms are a structured foundation type course exploring a large range of materials, methods, techniques and ways of approaching the making of art. This ‘tool-kit’ allows them to work more independently in year 10 and 11. Music and dance – jazz and classical as well as modern is used as inspiration during this stage. The third term is a mini-project where knowledge of the four assessment objectives is delivered in a linear, structured way.
Coursework begins in year 10. Our students produce a major project with differing outcomes meeting all four of the GCSE assessment objectives. This is supported by two gallery visits – New Walk museum to view the ‘German Expressionism’ collection and a London trip to the Tate Gallery. Assessment Objective Four is carried out under exam conditions for five hours.
In Year 11 students complete a twelve week project. This is run as an end of unit one exam and the previous year’s exam paper is given to them. Assessment Objective Four is produced over 10 hours. This enables students to understand the challenges they shall face in Unit Two.
Students begin Unit Two in January in twelve school weeks. S.E.N.D students are highly supported in their choice of question and given much needed structure whilst the higher ability students are encouraged to produce a personal, meaningful response.
The disadvantages many of our students face are recognised by the department. Pupil premium students all receive a free art pack of materials. All of our students are given sketchbooks.
After school intervention sessions start at the beginning of Year 11, providing our students with departmental space, materials and support to produce quality outcomes. | <urn:uuid:47339446-06f2-4292-a551-133d8bf22fb0> | CC-MAIN-2020-50 | https://moat.leicester.sch.uk/?page_id=821 | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141188146.22/warc/CC-MAIN-20201126113736-20201126143736-00354.warc.gz | en | 0.943654 | 601 | 3.078125 | 3 |
The simplest steam heating system can installed at relative low costs. The disadvantages with the simple system is the lack of modulating quality.
The simplest steam heating system is the
Single Pipe Steam System with Main Pipes Pitched Towards the Boiler
Steam and condensate use the same main pipes. The condensate flows in the opposite direction of the steam.
Air valves are necessary for evacuating air during start-up.
The system is simple but the heat emission from radiators or in heat exchangers is hard to control. Modulating the heat will cause the heating elements to be partly filled with air. The system can work properly in applications where the heat can be modulated directly in the boiler, like applications for warehouses, garages and so on. The system should be avoided where individually modulating of each radiator or heat exchanger is required.
The condensate draines back to the boiler and during stops the system is filled with air. This makes the design suitable for temporarily heated application working under water freezing conditions.
The simple system can be modified to the
Single Pipe Steam System with Main Steam Pipes Pitched Away from the Boiler
This is a better design than the former because the steam and condensate are more separated in different pipes. It can be further improved with the
Single Pipe Steam System with Overhead Steam Distribution
A improvement to this system is to completely separate steam and condensate lines with the
Steam Trap System
With the Steam Trap System steam is hold back in the heating elements and the steam pipes by steam traps. Steam traps may work after thermodynamic or mechanical principles.
The advantage with the system is better individual modulated radiators and heat exchangers.
The disadvantage is more equipment and higher costs.
Sizing of steam and condensate pipe lines - pressure loss, recommended velocity, capacity and more.
Steam & condensate systems- properties, capacities, pipe sizing, systems configuration and more.
Water can be heated by injecting steam.
Hot water heating temperatures adapts to outdoor temperatures.
Free online design tool for designing hot water heating systems - metric units.
Online design tool for hot water heating systems.
Pressure loss nomogram for hot water steel pipes.
Hot-water heating systems can be classified by temperature and pressure.
Steam table with sensible, latent and total heat, and specific volume at different gauge pressures and temperatures.
Steam is a compressible gas where the capacity of a pipe line depends on the size of the pipe and the steam pressure.
Steam consumption and condensate generation when heating liquid or gas flows
Calculate steam flow rate vs. kW rating.
Steam consumption rates for typical steam heated consumers in industries like bakeries, breweries, paper factories etc.
Flow rate (lb/h) and pressure drop per 100 feet of pipe.
Calculate steam heated air systems.
Calculating the amount of steam in non-flow batch and continuous flow heating processes.
Steam systems carries heat through pipes from the boiler to consumers as heat exchangers, process equipment etc.
Calculate pressure drops in steam distribution pipe lines.
Sizing of steam pipe lines - major and minor loss in steam distribution systems.
Steam radiators and steam convectors - heating capacities and temperature coefficients.
Steam trap selection guide - Float & Thermostatic, Inverted Bucket, Bimetal Thermostatic, Impulse and Thermodynamic Disc steam traps.
A back pressure in a condensate systems will reduce steam trap capacity
Selection of steam traps and their safety factors.
Introduction and definition of steam quality and dryness fraction including calculating wet steam enthalpy and specific volume. | <urn:uuid:871d3abf-e6ea-416a-ad98-2bd6339af3e3> | CC-MAIN-2023-50 | https://www.engineeringtoolbox.com/amp/steam-heating-systems-d_474.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100602.36/warc/CC-MAIN-20231206162528-20231206192528-00520.warc.gz | en | 0.90348 | 758 | 3.21875 | 3 |
A. Ocean water.
D. River water.
The correct answer is B: Groundwater.
Infiltration is the movement of water from the top of the ground to below the surface of the ground. Rainwater that falls on soil can either move through the soil or run off the soil surface. The rainwater at first moves into and through the soil until it reaches the water table where it becomes groundwater.
How quickly the water can infiltrate is called the rate of infiltration and is often measured as millimeters per hour. There will be runoff from the soil when the rate of rainfall is greater than the rate of infiltration.
Several factors influence infiltration rate including soil type, which includes soil structure and texture. How the soil is structured is important including how many spaces there are between the soil particles.
This is known as the porosity of the soil and is very important because how much space there is between soil particles will determine how much water the soil can hold.
Of course, the presence of vegetation, amount of water already in the soil and temperature of the soil also play a role in determining the infiltration rate.
Water moves through soil by capillary action and because of gravity. Capillary action is the movement of water through the pores of the soil by means of the forces of surface tension, cohesion and adhesion. Gravity acts as a force to pull the water deeper through the soil.
Zones of the soil
The zone of the soil through which the water infiltrates is known as the vadose zone. The vadose zone is also referred to as the unsaturated zone of soil and it extends from the top of the soil, the surface, down to the water table. This zone is not saturated with water so more water can move through it.
The water table is in the top layer of the saturated zone of the soil where all the pores of the soil are fully saturated with water. Furthermore, the water table is also known as the groundwater table and is where the water that infiltrates ends up.
The groundwater table is the boundary between the saturated and unsaturated zones in the soil. It is important to realize that the exact position of the water table changes from one year to the next and depending on changes in weather and climate over time.
Groundwater can form aquifers if it reaches a level where the soil is so saturated with water that it becomes a good source of water. An aquifer can be closed off by solid rock, and this would thus be called a confined aquifer.
However, these are rare, and most often an aquifer is called an unconfined aquifer since the water table which sits directly above it is open to the atmosphere and not overlain by solid rock. People often drill into such aquifers when they are constructing a well.
Movement of water
The water seeps down into the soil from the surface of the soil because of gravity and capillary action. Capillary action occurs because of the forces that occur between water molecules. In fact, water molecules have the property of cohesion, which means they like to stick together.
A water molecule consists of an oxygen atom and two hydrogen atoms. Furthermore, the hydrogen atoms have a slightly positive charge, while the oxygen atom has a slightly negative charge.
A consequence of this is that there are unequal charges on the actual water molecule itself, so the hydrogen of one water molecule is attracted to the oxygen of another water molecule.
Adhesion is another property of water in which the molecules are attracted to molecules of other substances. Capillary action is largely due to cohesion and adhesion properties of water.
Furthermore, gravity acts as a force to pull water downwards through the soil. The result is that water molecules move steadily downwards through the soil towards the groundwater table.
Factors that influence the rate of infiltration include the soil structure, which is really how soil particles are grouped to produce porous compounds.
These groups of soil particles are called aggregates and can occur in different shapes with different amounts of space between particles, which all influence how easily and fast infiltration happens.
These shapes can be prismatic, granular, blocky, and massive. The granular soil has the fastest infiltration rate by water while massive has the slowest infiltration rate.
This is because the granular soil has spaces between while massive slabs of tightly bound soil particles will not have many or any spaces between them.
Soil texture is the soil particle size, which is also important in influencing the infiltration rate of water. In general, water moving through soils like clay which have very fine sized particles will have a slower infiltration rate than sand with larger particles.
This is because there is less space between fine sized particles than between larger sized particles. Water thus can more easily move through a soil like sand compared with a soil-like clay.
Infiltration rate varies from low at less than 15mm per hour, to high at 50mm per hour. A moderate infiltration rate is between 15 and 50 mm/hr.
These rates can be measured with instruments known as infiltrometers. There are different types of infiltrometers that can be used, but in all cases, the investigator records how quickly water moves into the soil.
Vegetation will impact the infiltration rate of water because plant roots function to break up the soil. In addition, the vegetation will attract other animals, including animals that live in the soil.
For instance, earthworms and moles will move through the soil and loosen soil particles in the process. This all creates more space for water to move into and through.
The presence of vegetation growing in soil leads to increased organic matter as plants drop leaves and as plants die and decompose. Increased rates of infiltration are evident in soils that have more organic matter compared with soils that have less organic matter.
This is because the organic matter increases the porosity of the soil, which makes it easier for water to seep into and through the soil.
- AJ Franzluebbers (2002). Water infiltration and soil structure related to organic matter and its stratification with depth. Soil and tillage research.
- Editors of Encyclopedia Britannica. (2018). Groundwater. Retrieved from Britannica.com.
- A Klute (1986). Methods of soil analysis, 2nd ed. Madison, Wisconsin: Soil Science Society of America.
- T.P.A. Ferré, A.W. Warrick (2005). Infiltration. Encyclopedia of soils in the environment. Retrieved from sciencedirect.com.
- JR Nimmo (2009). Vadose water. Encyclopedia of inland waters. Retrieved from sciencedirect.com. | <urn:uuid:b114bf02-edda-4514-adcc-5d35b948638b> | CC-MAIN-2019-09 | https://en.lifeder.com/infiltration-is-the-process-by-which-rainwater-becomes-what/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484689.3/warc/CC-MAIN-20190218053920-20190218075920-00441.warc.gz | en | 0.957122 | 1,363 | 3.625 | 4 |
Protecting Endangered Species
Still Only One Earth: Lessons from 50 years of UN sustainable development policy
The Persian leopard (Panthera pardus tulliana), the largest subspecies of leopards, used to roam widely across Central Asia and the Caucasus. They are large spotted cats—about five feet in length—with slender hindquarters and long, thick tails. Both male and female leopards lead solitary lives, though they come together during winter mating. They are very territorial, patrolling wide home ranges to scent-mark trees, shrubs, and rocks. The leopard inhabits a wide variety of habitats: from mountain crags up to 3,000 meters in elevation, to grasslands and cold desert ecosystems, with a preference for cliff and rocky areas, as well as juniper and pistachio woodlands that give them cover for hunting.
During the past century, human-wildlife conflict, indiscriminate killing of their prey, habitat loss, and bounties incentivizing their killing have reduced their historic range by 72-84% (Jacobson et al., 2016). Today, according to the International Union for Conservation of Nature (IUCN) Red List of Threatened Species—the world’s most comprehensive inventory of the global conservation status of species and subspecies, which uses a set of defined criteria to evaluate their extinction risk (Rodrigues et al., 2006)—the Persian leopard is endangered.
The story of the Persian leopard is the story of many species pushed by human action to the brink of extinction. Strong conservation measures can still reverse the course for some species. For many others, it is too late.
During the past century, human-wildlife conflict, indiscriminate killing of their prey, habitat loss, and bounties incentivizing their killing have reduced the leopard’s historic range by 72-84%
The foundations of global species conservation measures date back to the 1972 Stockholm Conference on the Human Environment. Principle 2 of the Stockholm Declaration says “the natural resources of the earth, including the air, water, land, flora and fauna and especially representative samples of natural ecosystems, must be safeguarded for the benefit of present and future generations.” Principle 4 reads “Man has a special responsibility to safeguard and wisely manage the heritage of wildlife and its habitat, which are now gravely imperilled by a combination of adverse factors.”
Among the 109 recommendations found in the Stockholm Action Plan, Recommendation 99 calls for the preparation and adoption of an international treaty to regulate international trade in certain species of wild plants and animals. This treaty, the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES), had been drafted as a result of a resolution adopted in 1963 at a meeting of members of IUCN. As a result of the push provided by the Stockholm Conference, the Convention was finally adopted at a meeting of representatives of 80 countries in Washington, D.C. on 3 March 1973.
There are a few other relevant recommendations. Recommendation 29 draws attention to species of wildlife that may serve as indicators for future wide environmental disturbances. Recommendation 30 emphasizes drawing attention to the situation of animals endangered by their trade value. The Stockholm Declaration and Action Plan also legitimized the role of IUCN and especially the Red List, which had been established in 1964. In fact, IUCN was one of the few environmental organizations formally involved in the preparations of the Stockholm Conference and in the drafting and implementation of the three conventions that followed it: the Convention Concerning the Protection of World Cultural and Natural Heritage (1972), CITES, and the Ramsar Convention on Wetlands of International Importance (1971).
What are Endangered Species: The Role of the IUCN Red List
Since its establishment, the IUCN Red List has been the key tool to assess the status of species and catalyze action for conservation and policy change. Through the List’s rigorous assessment processes, experts linked to the IUCN Species Survival Commission’s specialist groups collect information on a species’ range, population size, habitat and ecology, use and/or trade, threats, and conservation actions that inform necessary conservation decisions.
The assessments published in the IUCN Red List are used by governments, nongovernmental organizations (NGOs), and multilateral environmental agreements. The assessments drive conservation action and funding, albeit still in insufficient ways to always ensure saving species. In fact, Betts et al. (2020) noted that without successful communication between species experts, academics, policymakers, funders, and practitioners, IUCN Red List assessments may not lead to development and implementation of conservation action plans.
The IUCN Red List has nine categories to indicate how close a species is to becoming extinct. The closest to extinction is the “critically endangered” category, with a species example being the Asiatic cheetah (Acinonyx jubatus venaticus), a subspecies found only in Iran that has dwindled to fewer than 50 animals remaining in the wild. The least critical category is defined as “least concern.” For example, the global brown bear (Ursus arctos) population is considered to be of “least concern” because it is large and spread over three continents, even though there are some local populations that are under threat. The categories in the middle, i.e., “vulnerable” and “endangered,” are for species considered under threat.
In other words, if a species is either critically endangered, endangered, or vulnerable, it is in popular terms “endangered.”
This mismatch between the technical terms of the IUCN Red List and common language can lead to confusion. In 2016, a re-assessment of the snow leopard prompted an outcry from some members of the conservation community due the species’ being reclassified from endangered to vulnerable (McCarthy et al., 2016). Their anger was echoed by members of the public, in part because they did not understand “being vulnerable” under IUCN Red List criteria still means at high risk of extinction.
The way a species is assessed under the IUCN Red List can also determine whether such species deserve protection under two international treaties aimed at species conservation: CITES and the Convention on Migratory Species of Wild Animals (CMS). Listing an endangered species under either of these two conventions can catalyze further action and, possibly, save a species from extinction (Zahler & Rosen, 2013).
Without successful communication between species experts, academics, policy makers, funders, and practitioners, IUCN Red List assessment may not lead to development and implementation of conservation action plans.
Regulating the Protection of Endangered Species
CITES and CMS are the key conventions tasked with regulating protection of endangered species.
CITES regulates international trade and therefore looks at the impact of trade on species conservation. Annually, international wildlife trade is estimated to be worth billions of dollars and to include hundreds of millions of plant and animal specimens. The trade is diverse, ranging from live animals and plants to an array of products derived from them, including food, exotic leather goods, wooden musical instruments, timber, tourist curios, and medicines. Since trade in wild animals and plants crosses borders between countries, the effort to regulate it requires international cooperation to safeguard certain species from over-exploitation. Today, CITES accords varying degrees of protection to more than 37,000 species of animals and plants, whether they are traded as live specimens, fur coats, or dried herbs (CITES, n.d.)
In the language of CITES, species listed under Appendix I are considered threatened with extinction and afforded the highest level of protection, including restrictions on commercial trade. Examples of the 931 species currently listed under Appendix 1 include gorillas (Gorilla sp.), tigers (Panthera tigris), and snow leopards (Panthera uncia). Appendix II includes species that, while currently not threatened with extinction, may become so without trade controls. It also includes species that resemble other listed species and must be regulated to effectively control the trade in those other listed species. Currently 34,419 species are listed under Appendix II, including saiga antelope (Saiga tatarica), wolf (Canis lupus), argali sheep (Ovis ammon), and kiang (Equus kiang). Appendix III includes a list of wildlife and plant species identified by particular CITES parties as being in need of international trade controls.
The purpose of CMS is conservation of migratory species, their habitats, and migration routes. “Migratory” is broadly defined as species that straddle international borders (Lewis & Trouwborst, 2019). Migratory species threatened with extinction are listed in Appendix I of the Convention. Appendix I listing is a mechanism to promote conservation measures called, in CMS terminology, “Concerted Action” among the range states of the listed species. CMS parties commit to ensure strict protections under national laws and conserving their habitats, mitigating obstacles to migration, among other threats. Migratory species viewed as benefiting from international cooperation are listed in Appendix II of the Convention (CMS, n.d.). To date, seven specialized regional agreements and 19 memoranda of understanding have been concluded for Appendix II species under the CMS.
Representative Frameworks for the Conservation of Endangered Species
The development of models tailored to conservation needs throughout migratory ranges is a unique feature of the CMS. Along these lines, there are two important initiatives benefiting endangered species in Africa and Central Asia under the CMS umbrella.
One is the Central Asian Mammals Initiative (CAMI) and its associated Programme of Work. Established in 2014, CAMI aims to strengthen the conservation of Central Asian migratory mammals through a common framework to coordinate conservation activities in the region and coherently address major threats to migratory species. By developing an initiative for Central Asian mammals, CMS is catalyzing collaboration between all stakeholders, with the aim of harmonizing and strengthening the implementation of the Convention (Rosen & Roettger, 2014). One of the most recent projects under CAMI is the proposed development of a regional strategy for the conservation of the Persian leopard.
The Joint CITES-CMS African Carnivores Initiative (ACI), established in 2017, stems from the recognition of the importance of synergies and coordination of measures toward species that are protected under both Conventions. Supported by IUCN Species Survival Commission’s specialist groups, the Secretariats are tasked to drive effective conservation of African lion, leopard, cheetah, and wild dog, and help avoid duplicate activities and associated costs, and generate funding.
By developing an initiative for Central Asian mammals, CMS is
catalyzing collaboration between all stakeholders, with the aim of
harmonizing and strengthening the implementation of the Convention
There are also two other important frameworks, each focused on the conservation of single species. One is the Global Tiger Initiative Council (GTIC), and the other is the Global Snow Leopard Ecosystem Protection Program (GSLEP).
GTIC was originally set up as the Global Tiger Initiative (GTI), a global alliance of governments, international organizations, NGOs, and the private sector, with the goal to save tigers from extinction. Established by the World Bank, the Global Environment Facility (GEF), the Smithsonian Institution, Save the Tiger Fund, and International Tiger Coalition (representing more than 40 NGOs), the initiative is led by the 13 tiger range countries. The St. Petersburg Declaration, adopted in 2010 at the Tiger Summit in Russia, defines the priorities.
GSLEP, propelled by GTI and established in 2013, is driven by 12 snow leopard range states, NGOs, and international organizations, which sit on a steering committee. The foundation of the GSLEP is 12 individual National Snow Leopard and Ecosystems Priorities (NSLEPs). Under GSLEP, specific activities are grouped under broad themes that correspond to the commitments of the Bishkek Declaration adopted at the 2013 Global Snow Leopard Conservation Forum (Zakharenka et al., 2016).
Some of these initiatives have successfully catalyzed attention, resources, and conservation action. They have received a high level of political attention, especially GTI in Russia and GSLEP in Kyrgyzstan, as respective hosts of the Tiger Summit and Snow Leopard Forum. However, some conservationists argue, especially in relation to tigers, that results have fallen short, and lack of transparency and accountability is compromising progress in tiger conservation efforts. Slappendel (2021) writes that “tiger-range countries are responsible for making tiger conservation efforts and holding themselves accountable for their methods and results. There’s no authority above them, so they can do whatever they want.
While the reach and influence of CAMI and ACI are more limited compared to GTI and GSLEP, they have also generated important resources for conservation and could likely have a stronger policy-driving role in the future.
Generally, these four frameworks serve as important examples for directing donor resources.
The Role of UN Agencies and Donors
The GEF, established in 1992, is the largest multilateral fund focused on enabling developing countries to invest in nature. It supports the implementation of major international environmental conventions including on biodiversity, climate change, chemicals, and desertification. Endangered species prioritized under CITES and CMS, such as GTI and GSLEP, are also prioritized for GEF funding.
In 2010, the GEF indicated it would provide up to USD 50 million in grants to save the tiger through contributions to be invested by developing countries using their GEF allocations in biodiversity, supplemented by investments from its REDD+ Program (reducing emissions from deforestation and forest degradation in developing countries, and the role of conservation, sustainable use of forests, and enhancement of carbon stocks) (GEF, 2010). Since 1991, the GEF has invested nearly USD 100 million toward snow leopard projects implemented by the United Nations Development Programme (UNDP). The GSLEP Forum in 2013 catalyzed nine further GEF-financed, UNDP-implemented projects, representing an investment of about USD 45 million to support snow leopard range countries. These nine projects also leveraged over USD 200 million in co-financing from national and international partners (UNDP, 2016).
UNDP has emerged as one of the key implementing UN agencies when it comes to endangered species and conservation projects more broadly. The United Nations Environment Programme (UNEP) has also spearheaded initiatives for the conservation of endangered species, such as Vanishing Treasures. This EUR 9 million project, funded by the Grand Duchy of Luxembourg, seeks to better understand the vulnerability to climate change of the snow leopard, tiger, and gorilla and the ecosystems being affected.
Why Do Many Species Continue to be Endangered?
The Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services (IPBES) warned in its Global Assessment Report on Biodiversity and Ecosystem Services that “nature is declining globally at rates unprecedented in human history—and the rate of species extinctions is accelerating” (IPBES, 2019).
Despite continued conservation efforts, the status of many endangered species remains unchanged—including tigers, lions, and cheetahs. The question is: Why? With our growing knowledge of the fragility of the planet’s ecosystems, why are we pushing entire species out of existence?
The limited amount of funding benefiting species research and conservation is one reason. Often these funds are short term, whereas to really see progress and results, a longer funding commitment is necessary. Some projects are also too narrowly focused on protection and enforcement, without seeking ways local communities can be part of the solution. Likewise, some projects do not address root causes of decline.
But there are also issues of capacity. In many countries that provide habitat for endangered species, there is limited technical capacity to protect such species. Local and national conservation organizations also would benefit from greater capacity building.
At the national level, species conservation may not be prioritized. This is often reflected in ministries tasked with both environment and agriculture or economic and mining issues—with the latter issues prioritized over conservation. Species conservation also does not operate in a vacuum, but must be considered alongside mechanisms to address threats to their survival, which may be exacerbated by conflicting development goals. For example, a development project aimed at improving access to water, through building dams and irrigation channels, may hurt access by salmon species to spawning grounds or damage riparian habitat. Finally, conservation organizations—with their own agendas and issues of competition for funding that leads to lack of cooperation—sometimes fail to create better synergies for conservation.
There are also many other endangered species that are not as well known or do not have the appeal of more popular endangered species, such as snow leopards or tigers. Some of these species have disappeared from large swaths of their range, including the striped hyaena (Hyaena hyaena), which can no longer be found in parts of Central Asia and Caucasus regions. The lesser-known Saint Lucia racer (Erythrolamprus ornatus), listed as Critically Endangered, numbers fewer than 20 individuals and is considered one of the rarest snakes in the world. Similarly, the Daguo Mulian tree (Magnolia grandis) is listed as critically endangered due to habitat loss for agricultural expansion and logging.
Protecting iconic endangered species is still important for promoting policies and measures that can benefit entire ecosystems and many other endangered species. Nevertheless, species conservation efforts must expand to include many more species that are lesser known and serve important ecosystem services. Such efforts should also create incentives for local communities to conserve them, including through sustainable use when that is recognized as the only or the most effective measure. Finally, greater financial resources have to be allocated. Many hope the post-2020 global biodiversity framework will help guide the most pressing actions to keep entire species from being erased from our shared world.
Betts, J., Young, R. P., Hilton-Taylor, C., Hoffmann, M., Rodríguez, J. P., Stuart, S. N., & Milner-Gulland, E. J. (2020). A framework for evaluating the impact of the IUCN Red List of threatened species. Conservation Biology: The Journal of the Society for Conservation Biology, 34(3), 632–643. doi.org/10.1111/cobi.13454
Convention on International Trade of Endangered Species of Wild Fauna and Flora. (n.d.). What is CITES? cites.org/eng/disc/what.php
Convention on the Conservation of Migratory Species of Wild Animals. (n.d.). CMS. cms.int/en/legalinstrument/cms
Global Environment Facility. (2010). Global Environment Facility to support $50 million in grants to save the tiger. thegef.org/newsroom/news/global-environmentfacility-support-50-million-grants-save-tiger
Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services. (2019). Global assessment report on biodiversity and ecosystem services of the Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services. doi.org/10.5281/zenodo.3831673
Jacobson, A.P., Gerngross, P., Lemeris, Jr., J.R., Schoonover, R.F., Anco, C., Breitenmoser-Würsten, C., Durant, S.M., Farhadinia, M.S., Henschel, P., Kamler, J.F., Laguardia, A., Rostro-García, S., Stein, A.B., & Dollar, L. (2016). Leopard (Panthera pardus) status, distribution, and the research efforts across its range. PeerJ 4:e1974. doi.org/10.7717/peerj.1974
Lewis, M., & Trouwborst, A. (2019). Large carnivores and the Convention on Migratory Species (CMS)—definitions, sustainable use, added value, and other emerging issues. Frontiers in Ecology and Evolution 7. frontiersin.org/article/10.3389/fevo.2019.00491
McCarthy, T., Mallon, D., Jackson, R., Zahler, P., & McCarthy, K. (2017). Panthera uncia. The IUCN Red List of Threatened Species 2017. Panthera uncia (Snow Leopard) (iucnredlist.org)
Rodrigues, A.S.L., Pilgrim, J.D., Lamoreux, J.F., Hoffmann, M., & Brooks, T.M. (2006). The value of the IUCN Red List for conservation. Trends in Ecology & Evolution 21(2), 71-76. doi.org/10.1016/j. tree.2005.10.010
Rosen, T., & Roettger, C. (2014). Central Asian Mammals Initiative: Saving the last migrations. CMS. cms.int/sites/default/files/publication/Central_Asian_Mammals_Initiative.pdf
Slappendel, C. (2021). What’s stopping some countries from keeping up with tiger conservation promises? Commentary. Mongabay news.mongabay.com/2021/11/whats-stopping-some-countries-from-keeping-up-with-tiger-conservationpromises-commentary/
UNDP. (2016). Silent Roar - UNDP and GEF in the snow leopard landscape. undp.org/publications/silent-roar-undpand-gef-snow-leopard-landscape
Zahler, P., & Rosen, T. (2013). Endangered mammals. Encyclopedia of Biodiversity. Elsevier.
Zakharenka, A., Sharma, K., Kochorov, C., Rutherford, B., Varma, K., Seth, A., Kushlin, A., Lumpkin, S., Seidensticker, J., Laporte, B., Tichomirow, B., Jackson, R. M., Mishra, C., Abdiev, B., Modaqiq, A. W., Wangchuk, S., Zhongtian, Z., Khanduri, S. K., Duisekeyev, B., … Yunusov, N. (2016). The Global Snow Leopard and Ecosystem Protection Program. Snow Leopards, 559–573. doi.org/10.1016/b978-0-12-802213-9.00045-6
You might also be interested in
Web of resilience
Pakistan's development model has still not recognised the limits of the natural environment and the damage it would cause, if violated, to the sustainability of development and to the health and well-being of its population. Pakistan’s environment journey began with Stockholm Declaration in 1972. A delegation led by Nusrat Bhutto represented the country at the Stockholm meeting, resulting in the establishment of the Urban Affairs Division (UAD), the precursor of today’s Ministry of Climate Change. In setting the country’s environmental agenda, we were inspired by the Stockholm Principles, but in reality, we have mostly ignored them for the last five decades.
The Legacies of the Stockholm Conference
Fifty years after Stockholm, we face a triple planetary crisis of climate change, nature and biodiversity loss, and pollution.
The Roots of Forest Loss and Forest Governance
If lessons from past failures on deforestation are learned, forest protection could play a major role in reversing both climate change and biodiversity loss.
Pathways to Sustainable Cities
Urban planning needs to be inclusive and responsive to the needs of local communities and build on participatory approaches that foster the engagement of marginalized actors. | <urn:uuid:1594913c-4db2-4f2e-a40a-c93b1ce9760f> | CC-MAIN-2023-40 | https://www.iisd.org/articles/deep-dive/protecting-endangered-species | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506339.10/warc/CC-MAIN-20230922070214-20230922100214-00473.warc.gz | en | 0.903523 | 5,024 | 4.0625 | 4 |
Many publications about Bashar al-Assad wonder how a modest and shy young man could turn into a bloody dictator. In our opinion, there is nothing to be surprised at. Many dictators of the XX and XXI centuries were modest and even shy teenagers. Such personalities as Lenin, Stalin, Hitler, Saddam Hussein, Lukashenko and Milošević were neither aggressive nor particularly cruel in their childhood. As a rule, bloody dictators grow up in the families with mothers bringing them up. The mechanism of turning a quiet boy into a butcher is well shown in Hitchcock’s films.
In a number of cases, dictators were growing up in one-parent families where fathers either left them early or were not present at all. This was the case in the families of Saddam Hussein, Lukashenko and Milošević. Another type of a family, growing up a dictator, is a family where fathers were present but did not take part in bringing up their sons for different reasons like being busy at work or because of drinking. Such were the families where Stalin and Hitler grew up. Finally, the third family type has the fathers who did not pay attention to the upbringing of their children because of being busy at work and having other sons they tied up their hopes with. A future dictator felt a pang of envy of his brother and a shortage of parental love. For instance, Lenin and Bashar al-Assad were brought up in the families of the last type.
Bashar’s father, Hafez Assad, was, in fact, excluded of the process of raising his children because he was totally engaged in his work. He tied up all his hopes with his elder son Bassel, an aggressive macho, who was groomed to continue his father’s business –a dictatorial rule. There were other children in the family with psychological qualities much better than those of Bashar. Among them were his youngest brother Maher, a copy of his elder brother, and his sister Bushra, a charismatic and strong personality, who simply had a bad luck to be born a girl. Otherwise, she would have played one the first violins in the Assad’s family orchestra. However, Bashar is, certainly, not the most incapable child in the family. His younger brother Majid is said to have suffered from mental disorders.
Bashar had mixed feelings about his father and elder brother. He loved, admired and envied them, being aware of his lower qualities compared to them. His father provided him with a good European education. Bashar had become an ophthalmologist, lived and worked in London. When his elder brother died in an automobile accident, his father recalled Basahr to serve the interests of the family, the party and the state. He had to live up to his father’s expectations.
Being a pragmatic and pedantic person in his studies, Bashar carefully started to prepare, studying the intricacies of military matters and the state management. The main thing for him was not to let his father down, to continue his father’s business and to deserve his father’s approval. When his father passed away and Bashar succeeded to ‘the throne,’ he was desperately attempting to match his father and his requirements even stronger.
It was not a simple matter. Having personal qualities that were quite different from those of his father and elder brother, Bashar felt it inherently difficult to reproduce the model of hard leadership. He began to adjust the political system to himself, trying to modernize it. However, when Bashar found out that many citizens were not willing to live in the Assads’ empire, he came to the conclusion usual to many politicians with a low self-esteem: deadly enemies pose a threat to everything that is dear to him, including the cause of his father, his clan and the party. The existence of a clear and psychologically drawn enemy immediately triggered off the same mechanisms that had already been used at the time of Hitler, Stalin, Lenin, Hussein and other dictators.
The analysis of Bashar al-Assad’s personality allows us to make more detailed assessments and forecasts. Bashar al-Assad is a personality with a low self-esteem, requiring a continued compensation. He is well aware of the need to prove to himself and other people that he is worthy of his father and able to cope with the presidency not worse than his brother.
Bashar al-Assad is always in defense against something that poses a threat to his self-esteem, including criticism and accusations. The most unpleasant criticism for him is to be accused of weakness. Therefore he rejects all accusations of being cruel not because he does not want to look bloodthirsty but due to the fact that it is pragmatically beneficial. The Syrian President often uses negative forms in his speech in English. There may be several of them in one phrase. This means that he has a deep feeling of unease in a given conversation, compellingly denying what he believes to be not too bad.
He is sure of doing the right thing and sees no need to change his behavior. President Assad is absolutely indifferent to the criticism on the part of people and organizations that do not deserve his credit, all those that are outside the limits of his family, be it the West, the United Nation, foreign journalists, other Arab countries or protesters in his own country. Their criticism does not touch him because he correlates his self-esteem only with the requirements that tie him up with his father who is Bashar’s role model. Their assessments are not able to make him change his behavior.
The main motive of Bashar al-Assad’s political activity is a very high need for power and no fear of it. Power is not only a means of compensating his low self-esteem. Having power helps him to come close to an ideal, to an image of a real leader as he sees it taking into account the model of his father. Bashar al-Assad will not give up power himself unless his family faces a serious threat. But even in this case, it will be difficult for him to make a decision about his resignation voluntarily. Anyway, the reason for such a decision should be so important that his father, Hafez, would have understood and approved it.
President Assad has also a high need for control over people and situations. This is caused by both his high need for power and strong sense of danger. He is apprehensive of many factors that may do him harm, including his brutal youngest brother, the party elite, protesters and, finally, enemies from abroad. All these opponents are quite powerful to destroy everything that is so dear to him. And Bashar needs to control these people and the situation continually. He feels himself rather uneasily in the situations when has no full control over his interlocutor. His facial expression, gesticulation and numerous repetitions of words in sentences show this during the interviews with foreign correspondents, for instance, with Barbara Walters.
President of Syria has a remarkably low need for achievement. He neither strives for success nor has fear of a failure. He is, probably, well aware of his inability to implement any major breakthroughs either in economy or the social and political development of the country. Some attempts to modernize the country turned out to be inadequate. Therefore, his main problem is to preserve his power according to Hafez’ model. He believes such a goal to be achievable and is ready to undertake considerable efforts to solve this problem. Such an index as a positive valence shows this.
Superficial in his social ties, Bashar does not need any approval or support on the part of his people and has no fear of being rejected. When he says that the support of his people is the main thing for the President, he does not really need that support. Until he is able to contain his people’s anger and protest, he will put up with hatred and indignation of millions of people as well as with their reluctance to tolerate his power. The only person causing his fear of being rejected was his father. Now no other reference people exist for him.
All dictators of the world are typical in their desires to dominate the external circumstances and to cover them with their public duty. They explain this referring to the needs of people and not to their own desires. Bashar is not an exception here. His inner need “I wish” is eight times stronger than his outer need “I have to.” He skilfully explains his brutal suppression of the protests with a public need to fight terrorists rather than with his own desires and orders. His desires are an important imperative for his actions in the state and he is ready to continue them for all that. However, an important question is an object of his desires. The main thing must be in keeping line with the standards of Hafez Assad’s presidency and preserving this model.
Bashar is quite balanced. Impulsiveness and excitability are not typical of him. He does not produce an impression of a happy man, full of energy. He is, probably, somewhat asthenic, feeling discomfort from psychological overloads. He is neither hysteroid nor demonstrative. It is important for him to be rather than to seem. And he is not prepared to play the role of a good fellow for the sake of image benefits.
The main psychological conflict Bashar had been suffering from for a long time was over when his elder brother died and his father, Hafez, decided to groom him for the future ruler of Syria. But like many dictators he is notable for a high degree of suspiciousness and paranoidness. Taking into account an attempt of Hafez’s brother to overthrow Hafez himself, Bashar has misgivings about his aggressive youngest brother Maher. Moreover, his low popularity among the party elite, numerous opponents abroad and the hatred on the part of the majority of the population enhance his apprehensions. He trusts nobody suspecting many people of plots and treason. Such anxiety leads to a considerable destruction of personality.
Bashar Assad thinks it is important to analyse information exactly and carefully. He is ready to use every opportunity to make the information more precise. To make a decision he needs the factual, detailed and comprehensive information. He is inclined neither to exaggeration nor to underestimation. While analysing different facts, he considers them from different sides without ignoring controversial details. However, his analysis of the reasons is many times deeper than his analysis of the possible consequences. This leads to miscalculations in the forecasts.
Making a decision, Bashar Assad assumes overall responsibility for it, thus demonstrating certain courage. He is a very pragmatic politician able to weigh up for and against. He is also ready to make tactical manoeuvring. However, all these manoeuvres are performed inside a specific tunnel built up within his system of beliefs. And he is not going to change his beliefs. Once he changes them, he will destroy his fragile self-esteem that practically means his personality catastrophe. Therefore, he will correlate all decisions with the code of his father’s principals. And he is ready to die for that.
Bashar Assad is quite an active personality. And his activity is inherent rather than a forced one. He avoids using the passive voice while speaking about himself. This means that he perceives himself as the main subject of actions seeing no forces that may direct him, neither other members of the family nor members of the party elite. However, while speaking in the name of the party, he uses a word “we” far more frequently that “I”. This, probably, reflects the protocol characteristics of the presidential speech.
On the whole, his speech in English is not rich in expressions that may be interpreted as a sign of his lack of confidence, embarrassment or shyness. These qualities remained in his pre-presidential past. At present, Bashar Assad is quite a mature and authoritarian personality who copes with his daily dictatorial duties pretty well. At first we wanted to call this article In the Shadow of Tough Men, now we believe that he managed to come out of their shadow. The dead dictators still seem to have been tougher, though.
Psycho semantic Analysis of Bashar al-Assad’s Speech
COMPARATIVE TABLE OF VAAL INDICES (the method of the computer psycho semantic analysis of the spontaneous answers of these political leaders in their personal interviews (VAAL) . O.O scores mean the size of the psychological trait in average people)
CHARACTERISTICS OF PERSONALITY Bashar al-Assad
ACHIEVEMENT OF SUCCESS -3.2
FAILURE AVOIDANCE -0.7
HOPE FOR SUPPORT 0.6
FEAR OF REJECTION 0.0
DESIRE FOR POWER 5.5
FEAR OF POWER -0.0
FOCUS OF ATTENTION -0.6
OUTER “I HAVE TO” -1.4
INNER “I WISH” 7.2
MOVEMENT TO 1.9
MOVEMENT FROM -2.2 | <urn:uuid:dc523555-09de-4242-885b-eba90ee3b63f> | CC-MAIN-2014-41 | http://www.all4syria.info/Archive/75616 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663637.20/warc/CC-MAIN-20140930004103-00006-ip-10-234-18-248.ec2.internal.warc.gz | en | 0.982976 | 2,670 | 2.859375 | 3 |
Stressing about the amount of sleep you get may be counterproductive, but some nights I can’t help but toss and turn, thinking about how miserable I’ll be in the morning if I don’t get the eight—now seven, now six, now four—hours of sleep that I know I need to be on top of my game in the morning.
Getting the recommended amount of sleep may not seem like something worth worrying about, but anxiety over insomnia isn’t completely unfounded.
More sleep studies are confirming the importance of deep, restful sleep and revealing that sleep deprivation, especially over an extended period of time, can actually cause serious long-term harm to your health.
The Serious Health Consequences of Too Little Sleep
Are you suffering from any of the following issues? Address your sleeping habits now to combat the negative effects of sleep deprivation.
It might seem like a good idea to sacrifice a few precious hours of shut-eye to get that extra mile in, or make sure you keep up a rigid exercise regime, but you could actually be making it harder for yourself to maintain a healthy physique. Numerous studies have shown that lack of sleep causes the body to increase the production of the hormone ghrelin, which causes you to feel hunger [1-3].
2. Increased Risk of Stroke
A review of sleep studies done by the Journal of the Academy of Nutrition and Dietetics asserts that consistent sleep deprivation actually puts a person at higher risk of stroke, even without other risk factors, such as a family history or obesity.
3. Increased Risk of Diabetes
According to studies done by the National Institute of Diabetes and Digestive and Kidney Diseases, a link was found between poor sleep and insulin resistance. Another study further showed that some cells could actually become more resistant to insulin when the body was deprived of sleep.
4. Memory Loss
Most of us probably know by now that dreaming is our mind’s way of sorting through and storing our memories. So it makes sense that when we don’t dream because we don’t sleep, we don’t remember or store new memories quite as well. But a study done in 2014 actually suggests that sleep deprivation can cause more serious brain deterioration in the long term.
5. Increased Risk of Cancer
There is no evidence that lack of sleep will create cancer in your body, but it certainly won’t help to stop it, either. Cancer is a cellular mutation, and your immune system needs to be strong to fight that mutation. Our immune systems work best when we’ve slept, as the sleep cycle gives our bodies a chance to rejuvenate. So, naturally, a lack of sleep will weaken our immune systems and, subsequently, our defenses.
These are just a few of the more serious effects sleep deprivation can have on your health. A quick Google search can provide you with countless other health risks that prolonged sleep deprivation can have on your body. In fact, TIME reported on a study revealing that, over time, those who got less than six hours of sleep were actually more likely to die at a young age. And let’s not forget the poor chap who lost his life after working nearly 72 hours straight as an intern for Bank of America.
Prioritize Your Sleep, Period.
It’s hard—with our constantly changing, fast-paced society demanding more and more of our time and requiring more and more multitasking—to fit in a full night’s sleep and still get everything done. But should we really be prioritizing things above our own health?
It’s time we all start investing more in ourselves and our future health by getting the rest we need. I don’t know about you, but I think these risk factors are a great excuse to sleep in tomorrow.
Need some help falling asleep? Then you may want to look into a natural supplement like Getting Sleepy to help you get there.
What is Getting Sleepy?
Getting Sleepy contains powerful sleep enhancing ingredients such as Melatonin, Valerian root, Chamomile Powder and Hops powder. This natural supplement is packed full of a unique compound of ingredients to enhance every part of the sleep cycle. This gentle yet effective formula will help you relax by soothing you to sleep, keeping you asleep, and helping you wake up free of grogginess or other negative side effects.
Try it for yourself!!!
1. Meta-analysis of short sleep duration and obesity in children and adults,http://www.ncbi.nlm.nih.gov/pubmed/18517032, 2008
2. Acute partial sleep deprivation increases food intake in healthy men, http://www.ncbi.nlm.nih.gov/pubmed/20357041, 2010
3. Metabolic, Endocrine, and Immune Consequences of Sleep Deprivation, http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3132857/, 2011 | <urn:uuid:7b483599-0c3f-4285-902d-c19c98a28711> | CC-MAIN-2019-30 | http://getyourfit.com/blogs/learn/are-you-suffering-from-the-five-negative-effects-of-sleep-deprivation/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527000.10/warc/CC-MAIN-20190721123414-20190721145414-00364.warc.gz | en | 0.925513 | 1,034 | 3.015625 | 3 |
Around 1,38,899, people from India are Mars-bound. They have 'booked' a flight to the Mars via Nasa's InSight (Interior Exploration using Seismic Investigations, Geodesy and Heat Transport) mission slated for launch on May 5, 2018. NASA states that those who submitted their names were provided online 'boarding passes' for the mission.
The names are being etched on a silicon wafer microchip using an electron beam to form letters with lines one one-thousandth the diameter of a human hair. This chip will then be attached to the top hull of the lander.
Several Indians responded to Nasa's call for names for the Mars mission. The total number of names received by Nasa from all over the world is 2,429,807. The first is the US with 6,76,773 names followed by China with 2,62,752 names. India stands at number three. | <urn:uuid:d2e64efe-46e9-4513-8f14-0fbd314154b1> | CC-MAIN-2022-21 | https://scind.org/Space/article/One-Lakh-Indians-Book-Ticket-For-Mars | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662570051.62/warc/CC-MAIN-20220524075341-20220524105341-00383.warc.gz | en | 0.933515 | 192 | 2.53125 | 3 |
We’re back in the early 80s. Sweden’s vital primary industry is still heavily reliant on hard-working wood choppers, felling tree by tree with chainsaw in hand, to feed the never-ending demand of a blossoming manufacturing industry based on papermills, sawmills, housebuilders, and furniture factories, both within and outside of Sweden. On the surface, all looks well. However, there’s something not quite right. The wood choppers are experiencing health problems. They’re being plagued by headaches and tiredness. As well as far, far worse things; blood cancer, also known as leukaemia, is affecting a disproportionately high number* of forestry workers.
This is where Roland Elmäng appears on the scene. He has the exact experience required to solve the problem, having worked both in the oil industry and as a fuel expert for Volvo. Roland recollects how jet fuel was produced during the Second World War through alkylation: a special process involving collecting the vapours produced when refining crude oil. The fuel created was far purer than other fuels, and free of many of the harmful hydrocarbons found in standard petrol.
Research* indicated that these hydrocarbons could be one cause of the forestry workers’ problems.
Could the alkylation process be a solution? | <urn:uuid:9eefe1e5-ea57-4194-8d80-5e6697a1ff75> | CC-MAIN-2022-40 | https://www.aspenfuels.com/about/aspens-story/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338244.64/warc/CC-MAIN-20221007175237-20221007205237-00570.warc.gz | en | 0.967739 | 278 | 2.515625 | 3 |
In 1988, when the World Health Assembly resolved to eradicate polio, 350,000 children were being crippled by the virus in 125 countries. Since then, the incidence of polio has been slashed by 99 per cent, thanks to mass immunization campaigns that have brought the oral polio vaccine to more than 2 billion children. In 2004, only 1,255 cases were reported worldwide (8). The Americas were certified polio-free in 1994, the Western Pacific in 2000 and Europe in 2002.
Six countries have yet to stop the transmission of the indigenous wild poliovirus: Afghanistan, Egypt, India, Niger, Nigeria and Pakistan. Strong progress is being made, but challenges remain. In a setback in 2004, a polio outbreak originating in West Africa spread to several countries that were polio-free; its advance was fuelled by low immunity levels and a breakdown of services caused by civil conflict in some countries of the region. Countries as far afield as Indonesia and Yemen have reported cases linked to the outbreak.
Achieving polio eradication will depend upon countries' capacity to launch focused immunization campaigns, including massive, targeted social mobilization activities, to stop any cases from spreading, especially in the poorest areas where immunity gaps persist. Vital in that regard is the support of public- and private-sector partners in the Global Polio Eradication Initiative: the World Health Organization (WHO), Rotary International, the US Centers for Disease Control and Prevention, and UNICEF.
The polio goal will be reviewed in October 2005 by partners in the Global Polio Eradication Initiative. Once polio transmission has been stopped in every region, a strong, ongoing surveillance system must confirm three polio-free years have passed before global eradication can be certified. | <urn:uuid:9987a616-e5de-4773-a17b-5efb723b5ceb> | CC-MAIN-2013-20 | http://www.unicef.org/progressforchildren/2005n3/polio.php | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702414478/warc/CC-MAIN-20130516110654-00063-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.95284 | 349 | 3.765625 | 4 |
The strategy for solving a puzzle may be regarded as comprising a combination of three processes: scanning, marking up, and analysing.
Scanning is performed at the outset and periodically throughout the solution. Scans may have to be performed several times in between analysis periods. Two basic techniques comprise scanning:
- Cross-hatching: the scanning of rows (or columns) to identify which line in a particular region may contain a certain number by a process of elimination. This process is then repeated with the columns (or rows). For fastest results, the numbers are scanned in order of their frequency. It is important to perform this process systematically, checking all of the digits 1-9.
- Counting 1-9 in regions, rows, and columns to identify missing numbers. Counting based upon the last number discovered may speed up the search. It also can be the case (typically in tougher puzzles) that the value of an individual cell can be determined by counting in reverse?that is, scanning its region, row, and column for values it cannot be to see which is left.
Advanced solvers look for “contingencies” while scanning?that is, narrowing a number’s location within a row, column, or region to two or three cells. When those cells all lie within the same row (or column) and region, they can be used for elimination purposes during cross-hatching and counting (Contingency example at Puzzle Japan). Particularly challenging puzzles may require multiple contingencies to be recognized, perhaps in multiple directions or even intersecting?relegating most solvers to marking up (as described below). Puzzles which can be solved by scanning alone without requiring the detection of contingencies are classified as “easy” puzzles; more difficult puzzles, by definition, cannot be solved by basic scanning alone.
Scanning comes to a halt when no further numbers can be discovered. From this point, it is necessary to engage in some logical analysis. Many find it useful to guide this analysis by marking candidate numbers in the blank cells. There are two popular notations: subscripts and dots.
- In the subscript notation the candidate numbers are written in subscript in the cells. The drawback to this is that original puzzles printed in a newspaper usually are too small to accommodate more than a few digits of normal handwriting. If using the subscript notation, solvers often create a larger copy of the puzzle or employ a sharp or mechanical pencil.
- The second notation is a pattern of dots with a dot in the top left hand corner representing a 1 and a dot in the bottom right hand corner representing a 9. The dot notation has the advantage that it can be used on the original puzzle. Dexterity is required in placing the dots, since misplaced dots or inadvertent marks inevitably lead to confusion and may not be easy to erase without adding to the confusion. Using a pencil would then be recommended.
An alternative technique that some find easier is to mark up those numbers that a cell cannot be. Thus a cell will start empty and as more constraints become known it will slowly fill. When only one marking is missing, that has to be the value of the cell.
The two main approaches to analysis are “candidate elimination” and “what-if”.
- In elimination, progress is made by successively eliminating candidate numbers from one or more cells to leave just one choice. After each answer has been achieved, another scan may be performed?usually checking to see the effect of the latest number. There are a number of elimination tactics, all of which are based on the simple rules given above, which have important and useful corollaries, including:
A given set of n cells in any particular block, row, or column can only accommodate n different numbers. This is the basis for the “unmatched candidate deletion” technique, discussed below.
Each set of candidate numbers, 1-9, must ultimately be in an independently self-consistent pattern. This is the basis for advanced analysis techniques that require inspection of the entire set of possibilities for a given candidate number. Only certain “closed circuit” or “n x n grid” possibilities exist (which have acquired peculiar names such as “X-wing” and “Swordfish”, among others). If these patterns can be identified, elimination of candidate possibilities external to the grid framework can sometimes be achieved.
One of the most common elimination tactics is “unmatched candidate deletion”. Cells with identical sets of candidate numbers are said to be matched if the quantity of candidate numbers in each is equal to the number of cells containing them; essentially, these are perfectly coincident contingencies. For example, cells are said to be matched within a particular row, column, or region (scope) if two cells contain the same pair of candidate numbers (p,q) and no others, or if three cells contain the same triplet of candidate numbers (p,q,r) and no others. The placement of these numbers anywhere else in the matching scope would make a solution for the matched cells impossible; thus, the candidate numbers (p,q,r) appearing in unmatched cells in the row, column or region scope can be deleted. This principle also works with candidate number subsets?if three cells have candidates (p,q,r), (p,q), and (q,r) or even just (p,r), (q,r), and (p,q), all of the set (p,q,r) elsewhere in the scope can be deleted. The principle is true for all quantities of candidate numbers.
- A second related principle is also true ? if the number of cells (in a row, column or region scope) where a set of candidate numbers only appear is equal to the quantity of candidate numbers, the cells and numbers are matched and only those numbers can appear in matched cells. Other candidates in the matched cells can be eliminated. For example, if (p,q) can only appear in 2 cells (within a specific row, column, region scope), other candidates in the 2 cells can be eliminated.
The first principle is based on cells where only matched numbers appear. The second is based on numbers that appear only in matched cells. The validity of either principle is demonstrated by posing the question ‘Would entering the eliminated number prevent completion of the other necessary placements?’ Advanced techniques carry these concepts further to include multiple rows, columns, and blocks. (See “X-wing” and “Swordfish” above.)
In the what-if approach, a cell with only two candidate numbers is selected, and a guess is made. The steps above are repeated unless a duplication is found or a cell is left with no possible candidate, in which case the alternative candidate is the solution. In logical terms, this is known as reductio ad absurdum. Nishio is a limited form of this approach: for each candidate for a cell, the question is posed: will entering a particular number prevent completion of the other placements of that number? If the answer is yes, then that candidate can be eliminated. The what-if approach requires a pencil and eraser. This approach may be frowned on by logical purists as trial and error (and most published puzzles are built to ensure that it will never be necessary to resort to this tactic,) but it can arrive at solutions fairly rapidly.
Ideally one needs to find a combination of techniques which avoids some of the drawbacks of the above elements. The counting of regions, rows, and columns can feel boring. Writing candidate numbers into empty cells can be time-consuming. The what-if approach can be confusing unless you are well organised. The proverbial Holy Grail is to find a technique which minimises counting, marking up, and rubbing out. | <urn:uuid:702dda17-bc58-4d98-a742-69b9b2aeecc6> | CC-MAIN-2019-22 | https://en.sudokusweb.com/metodos-de-resolucion/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257767.49/warc/CC-MAIN-20190524204559-20190524230559-00157.warc.gz | en | 0.935755 | 1,607 | 3.71875 | 4 |
Artificial Intelligence is defined as the development of computer systems with the ability to perform tasks that normally require human intelligence. The concept sounds reasonable enough, but how exactly does a machine learn, and is it different from how humans learn?
Tay was an artificial intelligence chatbot that was originally released by Microsoft Corporation via Twitter in 2016. A chatbot learns by performing repetitive tasks. So, when someone asks a question or engages with the chatbot, it learns a process or response for the next time. The more experience it has with a situation, the faster and better the chatbot responds. The chatbot is learning, exactly the same way you and I learn — repetition and experience through patterned learning.
Artificial Intelligence Learns Faster than Humans
Quickly, Tay learned inappropriate responses because of human trolls that “taught” Tay to be racist in replies. Within 16 hours after Tay’s launch on Twitter, it had to be shut down. Even though Tay was taught how to respond inappropriately to troublemakers on the internet, AI can learn useful things equally as quickly.
The fear that many people are experiencing is the fear that AI will come over and steal jobs away from people. In the future, you should expect some portion of your job to be replaced by artificial intelligence. In fact, part of it probably already has been replaced with AI. In 2013, Oxford University did a study on how susceptible jobs are to computerization, and virtually every job and profession that exists has a range of 99-0.3 percent chance of automation. This means that every job has at least some chance of being automated by AI but doesn’t necessarily mean you will lose your job.
If you have done a task more than once, and you can write instructions down on how to do that task, the odds are that it can be automated. What can’t be automated is your emotional intelligence. This is where humans have the intelligence advantage.
What Makes Human Intelligence Better?
Emotional intelligence (EI) or emotional quotient (EQ) is the capability of individuals to recognize their own emotions and those of others, discern between different feelings and label them appropriately, use emotional information to guide thinking and behavior, and manage and/or adjust emotions to adapt to environments or achieve one’s goal(s) (Wikipedia).
Artificial Intelligence claims to be able to read emotions based on facial expressions. However, as we all know, it is hard to tell exactly what someone is feeling based on facial expression alone. This is where humans will be required to use more than straight logic based on someone’s facial expression, volume, and inflection. The ability to read and interpret emotion is where we excel as humans. We can have relationships, emotions, compassion, and authenticity.
Humans are able to tell the difference between right and wrong immediately. We can see when someone looks like they need a hug, wants to be left alone, or is agitated. I can remember that you and I went to high school together, that your daughter had a ballet recital last week, and that your family is going to Disney World on spring break.
CRM (Customer Relationship Management) systems have become commonplace, making relationship management a little easier for companies by not making them rely on their memory to keep up to date on personal information for individual customers. It makes customers feel special when they are recognized as repeat customers and are treated like a friend. We know that the best customer service representatives are keeping notes, but it still feels good to be known.
On the other hand, how is it going to feel when a chatbot asks you how your daughter’s ballet recital went? It is going to feel creepy! Knowing that the company is keeping information about you in a non-human AI isn‘t going to feel all warm and fuzzy. We know that most people don’t remember those little things about us, but it feels good when they do! So, customers missing out on that personal experience with humans is an overall disadvantage to businesses. As we work alongside AI, humans can add the personal touch that makes customers feel good and want to become or stay repeat customers because of the atmosphere of your company.
Knowing that the human ability to form relationships is going to be far more valuable than Artificial Intelligence in the future means that you are indeed, smarter than artificial intelligence. | <urn:uuid:4062030d-29bd-43ac-b8f7-3b7c1dd6ce55> | CC-MAIN-2020-16 | https://businessingmag.com/9874/leading/ai/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371675859.64/warc/CC-MAIN-20200407054138-20200407084638-00534.warc.gz | en | 0.96748 | 896 | 3.71875 | 4 |
I need to output lots of (>20 million) float values to a text file from a Fortran 77 program. I'd like to keep the output file as small as possible. Therefore I would like to output the floats in a compact way, without resorting to binary.
I know the precision I need (usually two digits right of the decimal point), so in C I would use
printf("%.2f %.2f", val1, val2); Is something like this possible in Fortran 77? All I found was that I have to set the field width explicitly (like in
format (f8.2,x,f8.2)). This wastes lots of space, when I don't know the range of the output numbers beforehand.
If it is not possible in Fortran 77, do newer Fortran standards offer a way to do this? | <urn:uuid:feec90f1-bcd7-4df3-b658-88892f7a126d> | CC-MAIN-2013-48 | http://stackoverflow.com/questions/17210083/fortran-77-output-floats-with-variable-widths?answertab=votes | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164848402/warc/CC-MAIN-20131204134728-00043-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.92614 | 178 | 2.546875 | 3 |
Randy Olsen looks at the correlation between income and height. This correlation has been discussed and debated for years. It has been widely accepted that poverty and the lack of proteins are well known to stunt growth as well as reduces IQ but this is one of the first looks that would show this continues even when compared to higher income countries. Arvind Panagariya, a trade economist at Columbia University, recent article in Economic and Political Weekly suggests that perhaps the stunted growth of Indian children is not a problem. He proposes that Indian children are simply genetically short, and therefore, their heights are nothing to worry about. It would certainly be nice if this were true. But the main thrust of Panagariya’s views are open to simple scrutiny: his opinion is that because differences in income, mortality, and food cannot account for the average difference in height between people in India and people in Africa, the gap must be made up of differences in average genetic potential.
The argument is further supported by the stagnation of Dutch incomes in the late 1800’s also corresponded with a dip in heights.
Also check out the research the Rice Institute | <urn:uuid:27d25660-4db7-486c-bba3-47995cc336e9> | CC-MAIN-2019-18 | http://wtw.so/2014/07/08/dutch-income-to-height/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578583000.29/warc/CC-MAIN-20190422235159-20190423021016-00054.warc.gz | en | 0.980224 | 232 | 2.859375 | 3 |
The term "food system" is used frequently in discussions about nutrition, food, health, community economic development and agriculture. A food system includes all processes and infrastructure involved in feeding a population: growing, harvesting, processing, packaging, transporting, marketing, consumption, and disposal of food and food-related items. It also includes the inputs needed and outputs generated at each of these steps. A food system operates within and is influenced by social, political, economic and environmental contexts. It also requires human resources that provide labor, research and education. Food systems are either conventional or alternative according to their model of food lifespan from origin to plate.
- 1 Conventional food systems
- 2 Alternative food systems
- 3 Transparency
- 4 See also
- 5 Notes and references
- 6 External links
Conventional food systems
Conventional food systems operate on the economies of scale. These food systems are geared towards a production model that requires maximizing efficiency in order to lower consumer costs and increase overall production, and they utilize economic models such as vertical integration, economic specialization, and global trade.
The term “conventional” when describing food systems is large part due to comparisons made to it by proponents of other food systems, collectively known as alternative food systems.
History of conventional food systems
The development of food systems can be traced back to the origins of in-situ agriculture and the production of food surpluses. These surpluses enabled the development of settled areas and contributed to the development of ancient civilizations, particularly those in the Fertile Crescent. The system of trade associated with the exchange of foodstuffs also emerged in East Asia, North America, South America, and Subsaharan Africa with common commodities of exchange such as salt, spices, fish, grains, etc. Through events in world history such as the conquests of Alexander the Great, the Crusades, the expansion of Islam, the journeys of Marco Polo, and the exploration and colonization of the Americas by Europeans led to the introduction and redistribution of new foods to the world at large, and food systems began to intermingle on a global scale. After World War II, the advent of industrialized agriculture and more robust global trade mechanisms have evolved into the models of food production, presentation, delivery, and disposal that characterizes conventional food systems today.
Impacts of conventional food systems
Lower food costs and greater food variety can be directly attributed to the evolvement of conventional food systems. Agronomic efficiency is driven by the necessity to constantly lower production expenses, and those savings can then be passed on to the consumer. Also, the advent of industrial agriculture and the infrastructure built around conventional food systems has enabled the world population to expand beyond the “Malthusian catastrophe” limitations.
However, conventional food systems are largely based on the availability of inexpensive fossil fuels, which is necessary for mechanized agriculture, the manufacture or collection of chemical fertilizers, the processing of food products, and the packaging of the foods. Food processing began when the number of consumers started growing rapidly. The demand for cheap and efficient calories climbed resulting in nutrition decline. Industrialized agriculture, due to its reliance on economies of scale to reduce production costs, often leads to the compromising of local, regional, or even global ecosystems through fertilizer runoff, nonpoint source pollution, and greenhouse gas emission. Also, the need to reduce production costs in an increasingly global market can cause production of foods to be moved to areas where economic costs (labor, taxes, etc.) are lower or environmental regulations are more lax, which are usually further from consumer markets. For example, the majority of salmon sold in the United States is raised off the coast of Chile, due in large part to less stringent Chilean standards regarding fish feed and regardless of the fact that salmon are not indigenous in Chilean coastal waters. The globalization of food production can result in the loss of traditional food systems in less developed countries, and have negative impacts on the population health, ecosystems, and cultures in those countries.
Alternative food systems
Local food systems
Local food systems are networks of food production and consumption that aim to be geographically and economically accessible and direct. They contrast to industrial food systems by operating with reduced food transportation and more direct marketing, leading to fewer people between the farmer and the consumer. As a result, relationships that are developed in local food systems emerge from face-to-face interactions, potentially leading to a stronger sense of trust and social connectedness between actors. As a result, some scholars suggest that local food systems are a good way to revitalize a community. The decreased distance of food transportation has also been promoted for its environmental benefits.
Both proponents and critics of local food systems warn that they can lead to narrow inward-looking attitudes or ‘local food patriotism’, and that price premiums and local food cultures can be elitist and exclusive.
Examples of local food systems include community-supported agriculture, farmers markets and farm to school programs. They have been associated with the 100 Mile Diet and Low Carbon Diet, as well as the food sovereignty movement and slow food movement. Various forms of urban agriculture locate food production in densely populated areas not traditionally associated with farming. Garden sharing, where urban and suburban homeowners offer land access to food growers in exchange for a share of the harvest, is a relatively new trend, at the extreme end of direct local food production.
Organic food systems
Organic food systems are characterized by a reduced dependence on chemical inputs and an increased concern for transparency and information. Organic produce is grown without the chemical pesticides and fertilizers of industrial food systems, and livestock is reared without the use of antibiotics or growth hormones. The reduced inputs of organic agriculture can also lead to a greater reliance on local knowledge, creating a stronger knowledge community amongst farmers. The transparency of food information is vital for organic food systems as a means through which consumers are able to identify organic food. As a result, a variety of certification bodies have emerged in organic food systems that set the standards for organic identification. Organic agriculture is promoted for the ecological benefits of reduced chemical application, the health benefits of lower chemical consumption, the economic benefits that accrue to farmers through a price premium, and the social benefits of increased transparency in the food system.
Like local food systems, organic food systems have been criticized for being elitist and inaccessible. Critics have also suggested that organic agriculture has been conventionalized such that it mimics industrial food systems while using pesticides and fertilizers that are organically derived
Cooperatives in food systems
Cooperatives can exist both at the farmer end of food production and the consumer end. Farming cooperatives refer to arrangements where farmers pool resources, either to cultivate their crops or get their crops to market. Consumer cooperatives often refer to food cooperatives where members buy a share in the store. Co-operative grocery stores, unlike corporate grocery stores, are socially owned and thus surpluses cannot be taken from the store as profit. As a result, food co-ops do not work for profit, potentially keeping prices more cost representative. Other forms of cooperatives that have developed more recently include community-supported agriculture, where community members buy a share in a farm’s harvest, and may also be engaged in farm labour, operating at both the consumer and producer end of food systems. Garden sharing pairs individual landowners and food growers, while variations on this approach organize groups of food gardeners for mutual assistance.
The benefits of cooperatives are largely in the redistribution of risk and responsibility. For farming cooperatives that share resources, the burden of investment is disbursed to all members, rather than being concentrated in a single individual. A criticism of cooperatives is that reduced competition can reduce efficiency
Fair trade has emerged in global food systems to create a greater balance between the price of food and the cost of producing it. It is defined largely by more direct trading systems whereby producers have greater control over the conditions of trade and garner a greater fraction of the sale price. The main goal of Fair Trade is to “change international commercial relations in such a way that disadvantaged producers can increase their control over their own future, have a fair and just return for their work, continuity of income and decent working and living conditions through sustainable development” Like organic food systems, fair trade relies on transparency and the flow of information. Well-known examples of fair trade commodities are coffee and cocoa.
Transparency within food systems refers to full disclosure of information about rules, procedures and practices at all levels within a food production and supply chain. Transparency ensures that consumers have detailed information about production of a given food item. Traceability, by contrast, is the ability to trace to their origins all components in a food production and marketing chain, whether processed or unprocessed (e.g., meat, vegetables) foods.2 Concerns about transparency and traceability have been heightened with food safety scares such as Bovine Spongiform Encephalopathy (BSE) and Escherichia coli (E. coli), but do not exclusively refer to food safety. Transparency is also important in identifying foods that possess extrinsic qualities that do not affect the nature of the food per se, but affect its production, such as animal welfare, social justice issues and environmental concerns.
One of the primary ways transparency is achieved is through certification and/or use of food labels. In the United States, some certification originates in the public sector, such as the United States Department of Agriculture (USDA) Organic label. Others have their origin in private sector certification (e.g., Humanely Raised, Certified Humane). There are also labels which do not rely on certification, such as the USDA's Country of Origin Label (COOL).
Participation in local food systems such as Community Supported Agriculture (CSA), Farmers Markets, food cooperatives and farmer cooperatives also enhances transparency, and there are diverse programs promoting purchase of locally grown and marketed foods.
|Organic (USA) - The USDA Organic label indicates that the product has been produced in accordance with the USDA's Federal Organic Standard. This label is applied to fruits, vegetables, meat, eggs and dairy products. Some states, such as California, have their own organic label. Organic labelling is prominent internationally as well.|
|Fair Trade -Indicates that the product has been grown and marketed in accordance with Fair Trade standards. This is an independent certification, awarded by FLO-CERT and overseen by FLO International. Major food items that are marketed under Fair Trade are coffee, tea and chocolate. Many items other than food are sold with a Fair Trade label.|
|Food Alliance Certified. Food Alliance is a nonprofit organization that certifies farms, ranches, and food processors and distributors for safe and fair working conditions, humane treatment of animals, and good environmental stewardship. Food Alliance Certified products come from farms, ranches and food processors that have met meaningful standards for social and environmental responsibility, as determined through an independent third-party audit. Food Alliance does not certify genetically modified crops or livestock. Meat or dairy products come from animals that are not treated with antibiotics or growth hormones. Food Alliance Certified foods never contain artificial colors, flavors, or preservatives. Food Alliance Certified. http://www.foodalliance.org|
|Country of Origin - This label was created by enactment of the 2002 Farm Bill. The US Department of Agriculture is responsible for its implementation, which began 30 September 2008. The bill mandates country of origin labeling for several products, including beef, lamb, pork, fish, chicken, perishable agricultural commodities and some nuts. USDA rules provide specifics as to documentation, timetables and definitions. There is not one specific label to indicate the country of origin; they will vary by country.|
|American Humane Certified. This certification is provided by the American Humane Association, and ensures that farm animals are raised according to welfare standards that provide for adequate housing, feed, healthcare and behavior expression. Antibiotics are not used except for therapeutic reasons; growth promoters are not used. Other issues including transport, processing and biosecurity are addressed as well. Species covered are poultry, cattle and swine.|
|Certified Humane Raised & Handled. This label ensures that production meets the Humane Farm Animal Care Program standards, which addresses housing, diet (excluding routine use of hormones or antibiotics) and natural behavior. Additionally, producers must comply with food safety and environmental protection regulations. They must meet standards set by the American Meat Institute, that are more stringent than those laid out in the Federal Humane Slaughter Act. Certification has been applied to beef, poultry and eggs, pork, lamb, goat, turkey, veal, dairy products and wool.|
Notes and references
- Discovering the Food System - A Primer on Community Food Systems: Linking Food, Nutrition and Agriculture http://foodsys.cce.cornell.edu/primer.html
- Conceptualizing food systems for global environmental change research – Polly J. Ericksen Environmental Change Institute, Oxford University Centre for the Environment, Oxford, OX1 3QY, UK Received 17 August 2006; received in revised form 5 September 2007; accepted 12 September 2007
- Development Policy Review, 2003, 21 (5-6): 531-553 Food Policy Old and New - Simon Maxwell and Rachel Slater∗
- (2004); Manning, R.; Against the Grain: How Agriculture Hijacked Civilization, New York:North Point Press
- (1994); Toussaint-Samat, M. and Bell, A.; A History of Food ; Blackwell Publishing
- (1998); Welch, R., Graham, R.; "A new paradigm for world agriculture: meeting human needs, Productive, sustainable, nutritious"; Field Crops Research #60
- Nestle, Marion. (2013). Food Politics: How the Food Industry Influences Nutrition and Health." Los Angeles, California: University of California Press. ISBN9780520275996
- (1993); Schnitkey, G.D., Miranda, M.; “The Impact of Pollution Controls on Livestock Crop producers”, Journal of Agricultural and Resource Economics
- (2001); Bjorndal, T., “The Competitiveness of the Chilean Salmon Aquaculture Industry”, Foundation for Research in Economics and Business Administration, Bergen, Norway
- (1996); Kuhnlein, H.V., Receveur, O.; Dietary Change and Traditional Food Systems of Indigenous Peoples; Centre for Nutrition and the Environment of Indigenous Peoples, and School of Dietetics and Human Nutrition, McGill University, Quebec, Canada
- Hinrichs, Clare. 2000. “Embeddedness and local food systems: notes on two types of direct agricultural market” Journal of Rural Studies 16: 295-303
- Feenstra, Gail. 1997. “Local food systems and sustainable communities” American journal of alternative agriculture 12(1) p. 28-36
- Jones, Andy. 2002. “An Environmental Assessment of Food Supply Chains: A Case Study on Dessert Apples” Environmental Management 30(4) p. 560-576
- Bell and Valentine (1997). D. Bell and G. Valentine Consuming Geographies: We are Where We Eat, Routledge, London and New York
- Guthman, Julie. 2004. Agrarian Dreams: the Paradox of Organic Farming in California. Berkeley : University of California Press
- Morgan, K and J. Murdoch (2000) “Organic vs. conventional agriculture: knowledge, power and innovation in the food chain” Geoforum 31(2): 159-173
- Renkin, A.M., K. Lyons and R.C.N. Laurence (2002) in Proceedings from the 14th IFOAM Organic World Congress, Victoria, BC, August 2002
- Raynolds, L. (2000) “Re-embedding global agriculture: The international organic and fair trade movements” Agriculture and Human Values 17(3): 297-309
- Altieri, M. and P. Rossett. 1997. “Agroecology versus input substitution: A fundamental contradiction of sustainable agriculture” Society and Natural Resources 10(3): 283 - 296
- Deininger, Klaus (1995) Collective agricultural production: A solution for transition economies?. WorldDevehpmenr, Vol. 23, No. 8, pp. 1317-1334
- Fairtrade Foundation (1999). “The Fairtrade Foundation.” <http://www.fairtrade.org.uk>
- Raynolds, L. (2000) “Re-embedding global agriculture: The international organic and fair trade movements” Agriculture and Human Values 17(3): 297-309
- VonBailey, D., Jones, E., & Dickinson, D. L. (2002). Knowledge Management and Comparative International Strategies on Vertical Information Flow in the Global Food System. Amer. J. Agr. Econ. 87: 1337-1344.
- Unnevehr, L. & Roberts, T. (2002). Food safety incentives in a changing world food system. Food Control 13(2):73-76.
- Mandatory Country of Origin Labeling - Interim Final Rule for Meat, Perishable Agricultural Commodities, Peanuts, Macadamia Nuts, Pecans, and Ginseng. USDA 8/28/08. http://www.ams.usda.gov/.
- American Humane Association. http://www.americanhumane.org/
- Humane Farm Animal Care. http://www.certifiedhumane.com
- The American Humane Association: http://www.americanhumane.org/
- Protected Harvest sustainability certification: http://www.protectedharvest.org/
- Humane Farm Animal Care: http://www.certifiedhumane.com
- Univ. of Wisconsin - Agroecology: http://www.agroecology.wisc.edu/
- UC Santa Cruz Center for Agroecology & Sustainable Food Systems - http://casfs.ucsc.edu/index.html
- "Bacon as a Weapon of Mass Destruction" - video by Democracy Now!
- Food for the Cities initiative of the Food and Agriculture Organization of the United Nations (FAO) | <urn:uuid:e7af2af9-8c03-41b8-b6de-899ee9ad864f> | CC-MAIN-2014-23 | http://en.wikipedia.org/wiki/Food_systems | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997904391.23/warc/CC-MAIN-20140722025824-00072-ip-10-33-131-23.ec2.internal.warc.gz | en | 0.914628 | 3,766 | 3.65625 | 4 |
One stop shop
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message)
A one stop shop, one stop store or one stop source is a business or office where multiple services are offered; i.e., customers can get all they need in just "one stop". The term originated in the United States in the late 1920s or early 1930s to describe a business model offering customers the convenience of having multiple needs met in one location, instead of having to "drive all over the town" to attain related services at different stores. The phrase is now used as slang to describe everything from Web sites to TV shows where people can find most of what they need, including information, in one place.
UK local government
Local authorities in the United Kingdom use the term to describe the facility they offer for their residents to discuss and arrange services with officers of the authority. They are promoted on the idea that they provide a single point of contact but they are also designed from a security point of view to restrict public access to the town (city, etc.) hall.
A one stop shop for workforce development may offer job training, housing assistance, and other services, for example. The offices are similar to Jobcentres in the UK, providing an easy way to get government and council advice. In Australia, the Centrelink agency is a very similar model.
|This article related to government in the United Kingdom or its constituent countries is a stub. You can help Wikipedia by expanding it.| | <urn:uuid:3be83e01-f51d-496b-a827-a30280fc9e37> | CC-MAIN-2018-30 | https://en.wikipedia.org/wiki/One_stop_shop | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594675.66/warc/CC-MAIN-20180722233159-20180723013159-00562.warc.gz | en | 0.947974 | 331 | 3.015625 | 3 |
There are many types of whole grains to choose from and each one provides a different set of nutrients, texture and taste to your meals. Here are some “common” whole grains that you can find at your local grocery store. Don’t be afraid to try different whole grains until you find a few different types that your family enjoys. Whole grains should account for approximately one quarter of your plate at every meal.
Barley. Barley is an excellent source of fiber and selenium. It also serves as a good source of the minerals phosphorous, copper and manganese. One of the unique properties of barley is its ability to actually “scour” cholesterol out of the body.
- Pearl barley is readily available in most supermarkets and may be found next to dry beans, rice and lentils. Pearl barley can be added to soups, stews and casseroles for a rich nutty taste.
- Barley flakes are made from barley kernels that have been steamed, rolled and dried. Barley flakes may be cooked as a hot cereal or used as an ingredient in baked goods. They may be found in the bulk foods sections of some supermarkets.
- Barley flour may be found in some supermarkets with other packaged flour products or in bulk containers. Barley flour may be used to add fiber to baked goods.
- Barley is also used as an ingredient in commercially prepared foods, such as: ready-to-eat cereals, hot cereals, cereal bars, canned soups and pilaf mixes.
Bran. Bran is the hard outer layer of cereal grains. Along with germ, it is an integral part of whole grains, and is often produced as a by-product of milling in the production of refined grains. When bran is removed from grains, they lose a portion of their nutritional value. Bran is present in and may be milled from any cereal grain, including rice, wheat, maize, oats, and millet.
Bran is an excellent source of iron, magnesium, phosphorus, potassium, zinc, copper, thiamin, riboflavin, niacin and vitamin B-6. Bran is at its best when used in baking.
Buckwheat. Buckwheat is an excellent source of magnesium, and a good source of copper and fiber. Buckwheat is not actually a whole grain, though it has many properties of whole grains. Buckwheat is, actually, the seed of a plant related to rhubarb. The whole form, minus the hull, is called groats. When dry roasted, groats become kasha. Kasha can be steamed or it can be used as a breakfast cereal and has a hearty, earthy flavor. Buckwheat can also be made into flour and used in pancakes or baked goods.
Bulghur. Bulghur is a quick-cooking form of whole wheat that has been cleaned, parboiled, dried, ground into particles and sifted into distinct sizes. The result is a nutritious, versatile wheat product with a pleasant, nut-like flavor and an extended shelf-life that allows it to be stored for long periods. Bulgar is a good source of iron and magnesium and is best served like rice in soups or as a side dish.
Corn (Cornmeal, Grits, Hominy and Polenta). Corn is an excellent source of iron, magnesium, phosphorus, zinc, copper, thiamin, riboflavin, niacin and vitamin B-6. Whole grain cornmeal can be used in pancakes, bread and muffins. Grits, hominy and polenta can be used as side dish for breakfast or dinner.
Couscous. Similar to rice, pasta, or bread, couscous is an inexpensive and highly nutritous product made from wheat or other cereals (barley, sorghum, corn, millet, or minor grains). A good source of fiber, it’s also a versatile dish that can be mixed with vegetables, legumes, meat or fish, or it can be eaten with butter or fresh fruit.
Millet. Millet looks like birdseed but it has a mild flavor and crunchy texture. Cook millet for breakfast and serve with oatmeal or use as a side dish with savory herbs, add to meatloaf or use in stir-fry.
Oats. Oats and oatmeal are an excellent source of iron, magnesium, phosphorus, zinc, copper, thiamin and folate. Oats are outstanding as cereal, for baking and as a gravy or soup thickener. Be sure not to use the one-minute variety. The longer it takes to cook the better it is for you – 5 minutes minimum.
Quinoa. Quinoa is an excellent source of iron, magnesium, phosphorus, potassium, zinc, copper, thiamin and riboflavin. When cooked it has a mild taste, light fluffy texture and pleasing crunch. Makes unique side dishes and is great with salads and soups. Quinoa is so nutritious the UN named it food of the year in 2013.
Rice (Brown, Red, Black). White rice has all the nutrients refined out of it so choose one of the other varieties. They can be used as a side dish, for stuffing, stir fry, or any way that you would normally eat white rice.
Wheat Germ. Wheat Germ is a good source of vitamin C and fiber. It can be eaten raw and is great sprinkled over yogurt or hot cereal or mixed with breads or muffins. | <urn:uuid:65f38567-43a0-4d06-813a-811a8db0fe84> | CC-MAIN-2015-11 | http://www.defeatdiabetes.org/how-to-choose-whole-grains/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463637.80/warc/CC-MAIN-20150226074103-00127-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.936881 | 1,154 | 3.3125 | 3 |
The Zealots of Masada?
Troubles in defining a "Zealot"
Although the word "zealot" has been applied loosely to many fanatical rebels from Phineas, to Mattitiah the Maccabee, to Simon the "zealot" and to all of the insurgents of the First and Second Revolts, these are not to be confused with the political group known as the "Zealots" (note upper case "Z"), which defended the temple building in Jerusalem during the First Revolt. Josephus distinguishes at least five groups who were among the rebels (which he also called "robbers"):
1) The Sicarii (connected finally with the siege of Masada) commanded by Eleazar ben Yair.
2) The Zealots (protectors of the central Temple building), finally under the brothers Simon and Yehudah ben Yair.
3) John of Gischala and his followers (from Gush Halav, controlled mainly the outer Temple precinct and surrounding districts, and eventually the Temple building itself).
4) Simon bar Giora and followers (from Jerash; during 68, Simon and his followers were forced to take up refuge at Masada as guests of the Sicarii. They endeavored to control most of Judea and the remainder of Jerusalem.)
5) The Idumeans (a mercenary contingent that encamped outside the walls of Jerusalem).
HOWEVER ONE SHOULD NOT FORGET:
6) The Jerusalem priestly aristocracy, not mentioned as such by Josephus, nevertheless controlled especially the country-wide extent of the Revolt. They minted their own coins and controlled the regional commanders of the Revolt at least until 68 CE.
Concerning Masada, the main paragraph in Josephus that identifies the group which controlled Masada:
CONCERNING MASADA AND THOSE SICARII WHO KEPT IT; AND HOW SILVA BETOOK HIMSELF TO FORM THE SIEGE OF THAT CITADEL. ELEAZAR’S SPEECHES TO THE BESIEGED.
War.7.8.1. (252) When Bassus was dead in Judea, Flavius Silva succeeded him as procurator there; who, when he saw that all the rest of the country was subdued in this war, and that there was but one only stronghold that was still in rebellion, he got all his army together that lay in different places, and made an expedition against it. This fortress was called Masada. (253)It was one Eleazar, a potent man, and the commander of these Sicarii, that had seized upon it. He was a descendant from that Judas who had persuaded abundance of the Jews, as we have formerly related, not to submit to the taxation when Cyrenius was sent into Judea to make one; (254) for then it was that the Sicarii got together against those that were willing to submit to the Romans, and treated them in all respects as if they had been their enemies, both by plundering them of what they had, by driving away their cattle, and by setting fire to their houses: (255) for they said that they differed not at all from foreigners, by betraying, in so cowardly a manner, that freedom which Jews thought worthy to be contended for to the utmost, and by owning that they preferred slavery under the Romans before such a contention. (256) Now this was in reality no better than a pretense and a cloak for the barbarity which was made use of by them, and to color over their own avarice, which they afterwards made evident by their own actions; (257) for those that were partners with them in their rebellion joined also with them in the war against the Romans, and went farther lengths with them in their impudent undertakings against them; (258) and when they were again convicted of dissembling in such their pretenses, they still more abused those that justly reproached them for their wickedness; (259) and indeed that was a time most fertile in all manner of wicked practices, insomuch that no kind of evil deeds were then left undone; nor could any one so much as devise any bad thing that was new, (260) so deeply were they all infected, and strove with one another in their single capacity, and in their communities, who should run the greatest lengths in impiety towards God, and in unjust actions towards towards their neighbors, the men of power oppressing the multitude and the multitude earnestly laboring to destroy the men of power. (261) The one part were desirous of tyrannizing over others; and the rest of offering violence to others, and of plundering such as were richer than themselves. (262) They were the Sicarii who first began these transgressions, and first became barbarous towards those allied to them, and left no words of reproach unsaid, and no works of perdition untried, in order to destroy those whom their contrivances affected. (263) Yet did John demonstrate by his actions that these Sicarii were more moderate than he was himself; for he not only slew such as gave him good counsel to do what was right, but treated them worst of all, as the most bitter enemies that he had among all the citizens: nay, he filled his entire country with ten thousand instances of wickedness, such as a man who was already hardened sufficiently in his impiety towards God would naturally do; (264) for the food was unlawful that was set upon this table, and he rejected those purifications that the law of his country had ordained; so that it was no longer a wonder if he, who was so mad in his impiety towards God, did not observe any rules of gentleness and common affection towards men. (265) Again, therefore, what mischief was there which Simon the son of Gioras did not do? Or what kind of abuses did he abstain from as to those very free men who had sent him up for a tyrant? (266) What friendship or kindred were there that did not make him more bold in his daily murders? For they looked upon the doing of mischief to strangers only as a work beneath their courage, but thought their barbarity towards their nearest relations would be a glorious demonstration thereof. (267) The Idumeans also strove with these men who should be guilty of the greatest madness! for they [all], vile wretches as they were, cut the throats of the high priests, that so no part of a religious regard to God might be preserved; they thence proceeded to destroy utterly the least remains of a political government, (268) and introduced the most complete scene of iniquity in all instances that were practicable; under which scene that sort of people that were called Zealots grew up, and who indeed corresponded to the name, (269) for they imitated every wicked work; nor, if their memory suggested any evil thing that had formerly been done, did they avoid zealously to pursue the same; (270) and although they gave themselves that name from their zeal for what was good, yet did it agree to them only by way of irony, on account of those they had unjustly treated by their wild and brutish disposition, or as thinking the greatest mischiefs to be the greatest good. (271) Accordingly, they all met with such ends as God deservedly brought upon them in way of punishment; (272) for all such miseries have been sent upon them as man’s nature is capable of undergoing, till the utmost period of their lives, and till death came upon them in various ways of torment: (273) yet might one say justly that they suffered less than they had done, because it was impossible they could be punished according to their deserving: (274) but to make a lamentation according to the deserts of those who fell under these men’s barbarity, this is not a proper place for it:—I therefore now return again to the remaining part of the present narration. | <urn:uuid:0d8c772c-c861-4b4c-ba5f-2b5edbb865d2> | CC-MAIN-2019-43 | http://www.uhl.ac/old/index.php/en/resources/blog/zealots-masada/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986672723.50/warc/CC-MAIN-20191017045957-20191017073457-00131.warc.gz | en | 0.987977 | 1,673 | 3.15625 | 3 |
The Dangers of Kratom Use
Many people who are struggling with substance abuse turn to anecdotal evidence to help them with their recovery. One of the more popular substitutes for those struggling with opiate addiction is kratom. Some laud it as a healthy, habit-free alternative to opiates like Oxycontin and heroin. Many claim that kratom is a safer alternative, both as a drug and as a tool for withdrawing from the aforementioned drugs. But is this actually true? Here are the facts: kratom is a highly unregulated and highly addictive substance that can cause a litany of problems in users.
What Is Kratom?
Kratom is a grounded extract that is pulled from an evergreen tree found in Southeast Asia. In mild doses, it acts as a stimulant on the brain. In higher doses, it mimics the effects of opiates. Anecdotally, some people feel as though that kratom can be safely used to lessen the symptoms associated with opiate withdrawal. However, researchers, scientists, and doctors have found that the potential dangers far outweigh any perceived benefits.
Side Effects, Dangers, and Concerns
According to the Mayo Clinic’s Consumer Health page, “Poison control centers in the United States received about 1,800 reports involving the use of kratom from 2011 through 2017, including reports of death. About half of these exposures resulted in serious negative outcomes such as seizures and high blood pressure.” Kratom also causes a number of issues in infants. Infants exposed to kratom through breastmilk go through withdrawal symptoms, among other serious side effects. Some of the recorded side effects of routine kratom use include:
- Chills, nausea, and vomiting
- Changes in urine and constipation
- Liver damage
- Muscle pain
- Depression and delusion
- Breathing suppression
- Seizure, coma, and death
As for its efficacy as a tool for alleviating some of the withdrawal symptoms associated with opiate addiction, doctors and addiction counselors point to a study wherein subjects struggling with opiate addiction were given kratom as a treatment for their withdrawal symptoms. After six months, some of the subjects of the study complained of withdrawal symptoms — the exact thing they were being treated for! Some people who used kratom as a treatment for their withdrawal symptoms reported that they had to resort to treatments like Buprenex and Naloxone.
When it comes to opiate addiction and withdrawal symptoms, it is always best to consult with a doctor or addiction specialist or to seek treatment at a certified center.
Unregulated and Contaminated
As an unregulated substance, kratom can be bought in places like gas stations, smoke shops, and other places that don’t have to abide by certain safety standards. Also, due to its lack of FDA approval, there are not many regulations in place concerning its shipping, handling, and quality control. Because of this, there have been numerous reports of contamination from both bacteria and unsafe adulterants.
In a study published by the Journal of Medical Toxicology, researchers found that six different commercial brands of kratom were enhanced with the compound naturally found in kratom, 7-hydroxymitragynine. In the concluding notes of the study, researchers stated that “We have found multiple packaged commercial kratom products likely to contain artificially elevated concentrations of 7-hydroxymitragynine, the alkaloid responsible for M. speciosa’s concerning mechanistic and side effect profile. This study describes a unique form of product adulteration, which stresses the importance of increased dietary supplement oversight of kratom-containing supplements.” This artificial elevation of the potency of these products increases the likelihood of overdose, addiction, and adverse effects. In synthesizing the compound and adding it to kratom leaves, there is an added risk concerning the ways in which the synthesizing process was conducted.
There have also been several reports of Salmonella contamination found in commercial brands of kratom. Because there are little to no policies that regulate kratom, and no currently regulating body has any oversight over its manufacture or shipping to the United States, consumers run the risk of ingesting potentially harmful bacteria and other contaminants. According to reports studied by the Mayo Clinic, “As of April 2018, more than 130 people in 38 states became ill with Salmonella after taking kratom. Salmonella poisoning may be fatal, and the U.S. Food and Drug Administration has linked more than 35 deaths to Salmonella-tainted kratom.”
While there may be many anecdotal stories of the efficacy of kratom as a treatment for opiate withdrawal or as just a substitute for opiate use, the research, and evidence point to a plethora of dangers that should not be ignored. When we struggle, we sometimes may feel ashamed to reach out for help and turn to other alternatives. However, there is no reason to be ashamed, and many of these alternatives may hurt much more than they help.
Addiction is a crippling disease that affects every aspect of our lives. Opiate addiction can be especially difficult to live with and recover from. In dealing with a disease, it is always best to seek help from trained professionals and those who have experience in working with that disease. Resorting to unregulated and dangerous substances like kratom can have disastrous effects on our physical and mental health. At Jaywalker Lodge, we strive to provide a place for men to reconnect with themselves and others through recovery, community, and service. Our four-phase program is designed to meet the needs of every man struggling with addiction that walks through the doors of our lodge. After completing the program, our clients have access to a wide variety of aftercare designed to help them maintain their sobriety and live happily in recovery. If you are struggling with addiction, please do not hesitate to reach out at (866) 529-9255. | <urn:uuid:36fe8638-876e-4a69-bb72-0973dba74180> | CC-MAIN-2022-27 | https://www.jaywalkerlodge.com/recovery/the-dangers-of-kratom-use/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103922377.50/warc/CC-MAIN-20220701064920-20220701094920-00652.warc.gz | en | 0.961819 | 1,208 | 2.546875 | 3 |
Last month Norfolk was treated to a rare sight, the Aurora Borealis. The spectacular show was due to a coronal mass ejection from the sun. This is a fast moving cloud of charged particles emitted when a sunspot erupts, producing a solar flare. The charged particles interact with atoms of the Earth’s atmospheric gases near the magnetic poles, and the burning gases create a display of ethereal coloured lights – oxygen produces green and yellow lights, nitrogen produces blue, and red and violet can also be seen. The aurora is usually only visible above the north and south magnetic poles, but under the right conditions can be seen at other latitudes. The display in Norfolk is said to have started around 8 pm in the evening and to have lasted for several hours.
The Aurora Borealis is also known as the Northern Lights, and the equivalent in the southern hemisphere, the Aurora Australis, is known as the Southern Lights. Other names for the Northern Lights include Merry Dancers and Lord Derwentwater’s Lights. This last name refers to James Radclyffe, the third Earl of Derwentwater, who was an English Jacobite beheaded for rebellion on 24 February 1716, when the lights were said to be unusually brilliant.
There are many myths associated with the Northern Lights. They take the name Aurora from the Roman goddess of the dawn who flies across the sky every morning to announce the arrival of her brother, Sol, the sun. Her sister is Luna, the moon, and the morning dew is referred to as Aurora’s tears. According to Brewer’s 1870 Dictionary of Phrase and Fable, the lights were ascribed by “northern savages” to the merriment of ghosts, while Finnish legend suggests that the lights are caused by magical fire-foxes whose tails brush the sky, creating sparks. The Saami people of Lapland believed that the lights were the energies of the souls of the departed, or the fire of torches lighting their way to heaven. In Norway they were thought to be the spirits of old maids dancing in the sky, the Vikings called them the bridge to Valhalla, and the Australian aborigines interpreted them as the gods dancing. The lights may also have been the origin of early dragon legends from China and Europe, where they were interpreted as the dragons’ firey breath.
If you missed out this time you may like to use Lancaster University’s AuroraWatch service. Sign up at http://aurorawatch.lancs.ac.uk/alerts and they will alert you by email or Twitter when an aurora is likely to be visible from the UK. | <urn:uuid:0f4a4151-88b3-4352-8125-f7323fa607ad> | CC-MAIN-2023-06 | https://disscommunityfarm.org/2014/03/15/northern-lights/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00383.warc.gz | en | 0.96093 | 547 | 3.390625 | 3 |
According to a recent CBC article, a sudden trend of students leaving the province to find work after graduation is leaving “gaping holes in some NB communities.”
Though universities in the province are frantically trying to keep their young and talented at home, the lack of work available is sending students to find employment in other areas of the country. The problem isn’t the unavailability of jobs as a whole, but the fact that too many people are training for positions that no longer need to be filled.
The issue seems to be stemming from a theory explored in a report by Rick Miner, a former College president, entitled “People without Jobs, Jobs without People.” Miner says that even though Canadian institutions are producing a great deal of educated people, they aren’t being trained to work in industries that need them the most.
According to the Van City Buzz, “Canada currently has a stronger demand for people with trade skills rather than basic undergraduate credentials.” And yet the degrees keep coming.
According to the Van City Buzz, 43 to 51 per cent of grads are employed in positions that don’t require one. Canada’s low-wage sector is massive, despite the fact that the workforce is becoming increasingly more educated.
We’ve got too many people studying for the same profession and not enough looking to train for positions that need to be filled. The ultimate cause of many people leaving the province may be because they can’t find work, but the problem overall covers a broader spectrum. To say that there isn’t enough work would be overlooking the obvious.
There are enough well-paying jobs in the province to employ everyone; the problem is that no one explores the market completely. Maclean’s On Campus says, “there are too many people going to university.”
Too many students are under the impression that these institutions of “higher learning” are the only way to achieve success. Today, many know that that is not the case, especially with the influx of high school grads enrolling in trades programs, but the stigma attached to university remains.
Robert MacKinnon, the vice-president of UNBSJ told CBC “we need to be working more closely with our private and public sector partners to find creative ways of keeping our students here in New Brunswick.”
There could be many solutions to this issue, but the long-fought battle over how we should create more jobs for unemployed graduates may need to be re-vamped. University is becoming the latest trend; too many people are hopping on the bandwagon and the province is really feeling the consequences. | <urn:uuid:8f66832e-38b6-4b41-8165-fb385489b04a> | CC-MAIN-2022-49 | https://thebaron.ca/2013/02/26/students-get-degrees-for-nonexistent-jobs-in-nb/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711637.64/warc/CC-MAIN-20221210005738-20221210035738-00689.warc.gz | en | 0.970821 | 548 | 2.625 | 3 |
The Summer Olympics will be here again before you know it, and with it, an opportunity for our kids to learn about new sports and have a little fun while they do it. My 6 & 4 year old boys are still a little young for many of the math and science applications of sports, even simple things like calculating speed, determining the best angles for goal scoring, and exploring physics topics like drag in the water for swimming. However, I thought a lesser known Olympic sport, shooting, would be a good place to start getting them excited about the event. What’s an easier way than using our beloved Nerf guns?
This activity involves Science, Art, and Math.
I started planning the activity by researching the shooting events at the Olympics. You can learn more about them here.
Then I ordered a few new nerf guns (the Retaliator for my husband and the Sharpfire Blaster for the kids). I thought they looked more like rifles and claimed to have a pretty long range, so I hoped they’d be perfect for this activity. When they arrived, I used a marker to draw the target right on the box they came in. It’s not centered because I planned to draw two targets side by side, but then realized I didn’t really have enough room.
I just drew our target freehand, but you can have the kids make their own targets with this large compass ruler or even use two pencils and a string to make your own compass for more accurate circles.
I assigned each circle on the target a point value, starting with 10 in the middle. At first, I tried using a little bit of chalk on the tip of the dart to mark where each dart hit the target, but eventually ended up using just a bit of acrylic paint instead. That made it easy to see where each dart hit and hasn’t gummed up the gun yet. Just make sure you load up the bullet with paint right before you shoot, and don’t let the kids try it. They will use too much paint. Use different colored paint for each competitor, or make your targets on drawing paper that you tape to the box and have each participant use their own disposable target. Using the points is a great way for the kids to practice math while they shoot. Win-Win!
In the Olympics, shooters compete using 3 different stances, Standing, Kneeling, and Prone (laying down). This is a great opportunity to turn the shooting activity into a science experiment by having the kids predict which position they will get the most points using. You can also experiment to test the accuracy of the gun’s aim at various distances and graph your results for more math practice.
This post is also part of a series of Olympics Activities for Kids. Check out all of the fun ideas here! It also includes a fun challenge for your kiddos that you won’t want to miss !
More Fun STEM Activities | <urn:uuid:8d8c9a02-d747-4595-b8be-4ac0062bde78> | CC-MAIN-2018-17 | http://amypessolano.com/olympic-sports-steam-backyard-target-shooting/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946256.50/warc/CC-MAIN-20180423223408-20180424003408-00621.warc.gz | en | 0.952168 | 607 | 3.34375 | 3 |
Easy Paper Kite for Kids
What You Need
- 8.5 inches x 11 inches thick piece of paper
- A wooden skewer/straight drinking straw
- Kite string/ light strong string
- Wide ribbon
15 Steps to make a Kite
- Fold the paper in half
- Mark a point on the paper’s top, about an inch from the fold.
- Similarly, mark a point on the bottom of the paper, an inch from the open side.
- Draw a dotted line connecting these points.
- Fold the paper’s top corner along the line that you drew.
- Then, turn the paper and fold the other side down, in the same way as the side you just folded.
- Again, turn the paper so that it looks like it did in Step 5.
- Put pieces of tape on the middle crease.
- Put a skewer across the kite, as shown. Tape that too.
- Turn the kite. Straighten its ‘spine.’
- Mark a spot one third of the way down the spine, half an inch from the edge. Put tape over it, on both sides.
- With your scissors, make a hole in this spot.
- Tie your kite string through this hole with a strong knot.
- Tape an end of the ribbon at the bottom of the back of the kite.
- Keep the ribbon tail of the kite between six to ten feet. If it feels the kite can’t hold the ribbon’s weight, cut it shorter.
Have fun flying your kite! A light breeze will be perfect, it might not do well if it’s very windy.
To know how to fly a kite visit https://mocomi.com/kite-flying/ | <urn:uuid:bda52406-c1dd-42bc-bb84-d48c9ba6bb77> | CC-MAIN-2020-16 | https://mocomi.com/how-to-make-a-kite/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370519111.47/warc/CC-MAIN-20200404011558-20200404041558-00280.warc.gz | en | 0.862889 | 386 | 2.671875 | 3 |
A recent study published in Science Translational Medicine uncovers how liver cells react after acute liver injuries from common painkillers and demonstrates a method to improve liver regeneration in animal models.
Acetaminophen is a drug that is commonly used to relieve pain, reduce fevers, and alleviate symptoms of the common cold. More commonly referred to as its brand names, Tylenol or Panadol, this drug is widely used and prescribed for a range of conditions. Although it is a common painkiller and usually seen as a relatively safe drug, liver injury and acute liver failure can result from consuming it in high doses or mixing it with alcohol.
Impaired liver regeneration from common painkillers
In normal conditions, the liver regenerates after acute liver injury through the replication of liver cells. However, when the cells fail to regenerate, liver injuries may lead to liver failure. A better understanding of the mechanisms behind why livers sometimes do not effectively regenerate will pave the way for new therapies that address acute liver injury, which can occur from taking common painkillers. A group of scientists in the UK explored how liver cells react to acute injuries and published their novel findings in Science Translational Medicine.
In their study, the authors first discovered evidence of liver cells in a state of halted growth, also known as senescence, in a liver sample from an acute liver failure patient. Next, scientists administered the common painkiller, acetaminophen, to mice as a model of acute liver injury and noted that their liver cells also became senescent, which has not been previously described in previous models of acute liver injury. Adding on to these findings, the group performed experiments showing that this phenomenon was spreading among liver cells through the release of an important molecule called TGF-b.
Inhibiting TGF-b signalling improves liver regeneration
To determine if this mechanism could be blocked to improve liver regeneration, the authors of the study tested a drug that inhibits the receptor for TGF-b in mouse models. Again, mice were treated with acetaminophen, which induced acute liver injury, but the drug inhibitor was able to diminish liver senescence and consequently improve liver regeneration and function.
Common painkillers have greatly improved the quality of care for many patients, but they also bring certain drawbacks, such as the risk of liver injury. Since acute liver injury can occur quickly and lead to devastating consequences, new treatments are necessary to improve the quality of care for patients who experience these injuries.
This study described how senescence of liver cells was contributing to impaired liver regeneration after acute liver injury. By uncovering this mechanism, scientists are more able to effectively target the pathways that are involved and develop treatments to combat this issue.
Written by Branson Chen, BHSc
Reference: Bird TG, Müller M, Boulter L, Vincent DF, Ridgway RA, Lopez-Guadamillas E, Lu WY, Jamieson T, Govaere O, Campbell AD, Ferreira-Gonzalez S. TGFβ inhibition restores a regenerative response in acute liver injury by suppressing paracrine senescence. Science Translational Medicine. 2018 Aug 15;10(454):eaan1230. | <urn:uuid:982413df-7b3f-46c0-b20c-5b2e6f7dd51b> | CC-MAIN-2021-43 | https://medicalnewsbulletin.com/damaging-effects-common-painkillers/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585405.74/warc/CC-MAIN-20211021102435-20211021132435-00116.warc.gz | en | 0.942583 | 658 | 2.953125 | 3 |
The Dead Manís Penny is a commemorative medallion which was presented to the next-of-kin of the men and women who died during World War One. Next to Lady Britannia is the deceased soliderís name, with no rank provided to show equality in their sacrifice. The Dead Manís Penny was accompanied by a letter from King George V, stating ĎI join with my grateful people in sending you this memorial of a brave life given for others in the Great Warí. See this UK museum page [Press Here] for plenty of information on these extraordinary pieces.
Evaluating these items requires separating innate value from sentimental value. Addressing a Dead Man's Penny numismatically, from an indifferent coin collector's view, the innate values run like this:
INNATE (NON-SENTIMENTAL) VALUE:
worn: $10 US dollars approximate catalog value
average circulated: $15
well preserved: $25
fully uncirculated: $75
However, the innate value does not give a complete picture. Since each medal in unique, with a unique soldier's name, additional value comes in depending on the soldier and a potential buyer's connection to that soldier. Further, medals made for women (bearing the inscription SHE DIED FOR FREEDOM AND HONOUR) carry more sentimental value than medals made for men.
No relationship with named soldier: no added value
Some relationship with named soldier: add $50
Strong relationship with named soldier: add $100 or more
You can find these selling on the Internet for as little as $15 US dollars and as much as $250. They are fascinating collectibles. | <urn:uuid:a8ae48fe-d4e0-460d-926f-e976d14cc4c1> | CC-MAIN-2017-43 | http://coinquest.com/cgi-bin/cq/coins?main_coin=18863 | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820700.4/warc/CC-MAIN-20171017033641-20171017053641-00534.warc.gz | en | 0.928761 | 342 | 2.84375 | 3 |
As we’re speeding toward the widely predicted Sixth Extinction, thinking of our doomed heirs and the possible loss of this beautiful planet, there’s much talk of the larger species: predators that keep the water, land, regional animals, and indigenous flora balanced. We tremble for the majestic ancient creatures too: elephants, rhinos, giraffes, apes and monkeys, whales and dolphins.
Bigger birds also are in our sights: eagles and hawks, storks and flamingos, herons – all of them threatened by poisoned waters and diminished safe foods. In short, destroyed by human greed that disregards and deregulates any sane efforts to help us have clean waters, fresh air, and fertile soil.
Where do we start if we want to add our own little ounce of strength to solving the horrible problems facing us?
When I first read Elizabeth Kolbert’s article on the sixth extinction, predating her book of the same title, I learned that bats and frogs are threatened by a very similar fungus, white nose disease in bats, and chytrid fungus in frogs. The frog caught my interest.
Older than dinosaurs, frogs have survived no end of natural disasters. Now humans are killing them in vast numbers. The normal previous rate of extinction of a frog species was one in every 500 years; now we have lost 200 species in a little more than 20 years. Out of 6,000 species, 2,000 are endangered because of, to name a few, climate change, habitat destruction, disease, and poaching, No, humans don’t need to eat frog legs (millions are killed for food that WE don’t need).
Frogs are not alone; according to the Intergovernmental Science Policy Platform on Biodiversity and Ecosystem Services IPBES on the order of a million species are also faced with imminent extinction.
Besides the frog’s sturdiness, their most important trait is that they are bioindicators. They show us what is coming. Research like that of Tyrone Hayes can warn us of dangers to higher species. It also made Dr. Hayes a target of vicious slander and attack by the pesticide company wanting to prove that atrazine is harmless. It is NOT harmless to frogs or to any species. More human birth abnormalities? Think poisons.
Frogs also are keystone species, affecting other flora and fauna above and below them in the food chain. What do frogs eat? What eats frogs? What poisons the food of the animals that are themselves food? And what is the impact on the land when the last and lowest of the last are depleted?
This precarious balance between the eaters and the eaten hold the world together. Working for the survival of frogs is a fascinating way to work for the future of our earth.
Frogs eat the insects that make us ill sometimes unto death, and torment our nights with bombing and buzzing. Bullfrogs dine on smaller frogs and even small birds.
And then, sated, frogs are food for owls, hawks and other birds.
Tarantulas and snakes love them. Foxes and otters do too. Bigger bugs and fish eat frog- spawn and tadpoles. Frogs have little chance to escape the large quick nets and traps humans set for them.
Frogs are essential, yet they are dying all over the world. SAVE THE FROGS! is an organization dedicated to becoming one of the most effective international environmental groups in the world, and I have been fortunate to have been informally affiliated with it for the last 10 or 12 years.
Frogs are beautiful and hilarious. They startle us and we laugh. Their sounds range from sweet songs to raucous shrieks and burps. They’re entertainers, and although a few species might poison us if we mess with them, they largely keep us gentle company.
And so was born A Frog House, my own lent and local ounce of strength. Much to my delight, it encompasses ALL of my interests and/or training, author, artist, activism, biology, ecology, educator, entrepreneur, environment, group leadership, networker, politics speaker, and psychiatrist.
A Frog House brings me into contact with the most interesting people as we move forward together to conserve, develop and preserve green spaces and biodiversity. We are staunching the toxicity that is coming from carelessness and greed. Money is necessary to support our activities for town and village wetland projects and events. A Frog House Holiday and Annual Fundraiser are underway. Please donate here!
Save the Date of April 25, 2020, for the all county Nature Symposium honoring Save the Frogs Day, Earth Day, and Arbor Day, to be the subject for next time). | <urn:uuid:25a0e46c-a391-4851-b200-9a8e7321baa7> | CC-MAIN-2020-45 | https://afroghouse.org/the-sixth-extinction/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107882102.31/warc/CC-MAIN-20201024051926-20201024081926-00669.warc.gz | en | 0.940669 | 989 | 3.046875 | 3 |
Where to collect
The best place to find minerals is at mines. Mines are locations where industrially important rocks, minerals, and ores, as well as precious metals and gemstones are extracted from the earth. Mines can produce large amounts of specimens
of certain minerals, and continue to provide specimens as long as the mine is actively worked. Even after mines are exhausted or abandoned, specimens are often found in the mine dumps. Some abandoned mines are on public lands or in areas which trespassing is permitted, and these localities can afford some of the best collecting experiences. Many famous mines and deposits are entirely gone, having been built over or completely sealed and inaccessible.
In the past, it was often easy to obtain permission to take minerals
from a commercial mine. Collectors would enter the mining areas and extract the minerals
without interfering with the workers or collect on weekends. This is rarely possible today, due to insurance liabilities and corporate agglomeration restrictions and bureaucracy.
Many famous localities that have been abandoned are also difficult to collect upon due to trespass barring by the property owners.
Therefore, it may be very difficult or impossible to collect at well-known mineral localities. In these cases, the
only way to collect is to either have connections to a mine operator or get permission from a property owner. Another possibility is to collect with a mineral group or club, which works on getting the permits and permission to enter active quarries where an individual
would not be permitted.
There are a number of specimen-producing mines that
have closed for commercial mining and have been transformed into tourist attractions and museums. Minerals can be extracted from some of these mines without membership or
requirement of a permit. A collector usually pays a fee to search a quarry or dump.
Some minerals are also found in road cuts on the side of roads,
highways, and railroads. Construction sites have also yielded many interesting specimens, and in a mineral-producing region one should always keep an eye out for construction sites as these can yield the biggest surprises.
Mineral collecting requires certain tools which can be
purchase in hardware and hobby stores. A hammer and chisel is the most important, and is used to break apart the host rock as well as remove specimens from their surroundings. A backpack or pail is necessary to store the rocks, and newspapers should be used to wrap specimens after they are found to protect them. Some collecting localities require hard hats and goggles for safety, and this is good practice.
Behavior at a Collecting Site
It is always beneficial to find out all about a
locality before going collecting. Care must be exercised when chipping at a cliff not to
leave any unstable portion. In addition, make sure not to chisel rocks when a person is in
close proximity, lest a mineral fragment fly out and injure the person. When visiting an
operating mine, make sure not to disturb the workers. Further, don't leave any garbage - take out what you bring in. Any such offenses can
permanently close a locality to collectors!
Types of Collecting Areas
There are various mines and mineral deposits where minerals occur. These are:
Open pit mine - A large, open, terraced
hole in the ground. Open pit mines will eventually fill with water if abandoned since water is not pumped
Underground or tunnel mine - A series of shafts where
rock is blasted out underground or in a cliffside; the ore is brought out then processed.
Underground mines can be a network of tunnels, often on different levels. Some are well over a
Quarry - Cliff which has been created by
continuous digging into a mountain or hill for ore extraction.
Dump - Area where left over material is
placed after being brought out of the mine. If no new material is brought to a dump, the
material can eventually become exhausted by collectors.
Alluvial deposit - Area in a stream
or a river bed where collectible material is found. In such an area, boots and sieving
apparatuses are required for collecting, unless collecting is done on the banks. | <urn:uuid:7b067411-6d29-46c2-9c4c-98b94de8c398> | CC-MAIN-2018-34 | http://new.minerals.net/resource/Finding_Minerals.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221214713.45/warc/CC-MAIN-20180819070943-20180819090943-00064.warc.gz | en | 0.952244 | 851 | 2.84375 | 3 |
- grilled layur (hairtail)
- the long, thin fish is wrapped in a spiral around a piece of split wood, preferably papah nyuh (bamboo may be used but burns readily), then grilled over an open fire. The split stick is called pemanggangan, from panggang.
Bali dataran dialect
Bali aga dialect
⚙ Usage examples pulled from the Virtual Library
No examples collected yet. | <urn:uuid:d9fdbcc1-8efc-437d-9de7-6a903d076643> | CC-MAIN-2020-05 | https://dictionary.basabali.org/Leko | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250610919.33/warc/CC-MAIN-20200123131001-20200123160001-00293.warc.gz | en | 0.696259 | 95 | 2.625 | 3 |
Problems with Quotation Marks
One of the biggest problems with quotation marks is knowing whether another type of punctuation, such as a period or comma, goes inside or outside the quotation marks. Here is a summary of rules that will help you avoid errors:
- Put periods and commas inside quotation marks, whether or not they are part of the quotation.
Her little sister said, “I want to go swimming.”
“The pool opens tomorrow,” he said.
- Put question marks, exclamation marks, and dashes inside quotation marks if they are part of the quotation.
His sister asked, “Is it hot enough to go swimming today?”
He screamed, “I don't want to go swimming!”
The last words we heard were, “I want to go—”
- Put question marks, exclamation marks, and dashes outside quotation marks if they are not part of the quotation.
- Colons and semicolons always go outside quotation marks.
On Monday the instructor said, “I'm grading your essays”; a week later, we still hadn't received our papers back.
The new tenant said, “I'll return the contract”: a detailed rental agreement and explanation of the necessary damage deposit.
When using punctuation marks with quotation marks, remember to reserve quotation marks for direct quotations. Don't use quotation marks around the title of your paper. Don't use them to signal—and somehow justify—the use of clichés or slang expressions. Don't use them to indicate that you are being clever or funny. In fact, don't use them to call attention to your tone at all. | <urn:uuid:a4129ace-ed49-4397-b12c-ac750dfa6d21> | CC-MAIN-2016-50 | https://www.cliffsnotes.com/study-guides/grammar/dashes-parentheses-and-quotation-marks/problems-with-quotation-marks | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541864.44/warc/CC-MAIN-20161202170901-00414-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.939217 | 355 | 2.875 | 3 |
Fighting the war by feeding the family
Everything was militarized during the Second World War, including the household economy. Women became "housoldiers" whose job was to prepare "appetizing and nourishing meals that protect and preserve the health of their families."
Economy Recipes for Canada’s “Housoldiers” (Toronto: Canada Starch, 1943)
War, Memory and Popular Culture Archives - The University of Western Ontario - London, Ontario
booklet, 22 pages, 15.2cm x 22.8cm | <urn:uuid:79c2191d-a874-4722-9965-041e110f1dbb> | CC-MAIN-2019-35 | http://wartimecanada.ca/document/world-war-ii/recipes/fighting-war-feeding-family | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315551.61/warc/CC-MAIN-20190820154633-20190820180633-00227.warc.gz | en | 0.948854 | 114 | 2.640625 | 3 |
Alternative Names: Viral croup; Laryngotracheobronchitis – acute; Spasmodic croup
Croup is a respiratory condition that is usually triggered by an acute viral infection of the upper airway. The infection leads to swelling inside the throat, which interferes with normal breathing and produces the classical symptoms of a “barking” cough, stridor, and hoarseness. It may produce mild, moderate, or severe symptoms, which often worsen at night.
The barking cough of croup is the result of inflammation around the vocal cords (larynx) and windpipe (trachea). When the cough reflex forces air through this narrowed passage, the vocal cords vibrate with a barking noise. Because children have small airways to begin with, those younger than age 5 are most susceptible to having more-marked symptoms with croup.
Croup typically occurs between the ages of six months and six years, but the peak age is two and it’s less common after three. Children with asthma may get repeated episodes.
Croup usually isn’t serious. Most cases of croup can be treated at home. Sometimes, your child will need prescription medication.
Once due primarily to diphtheria, this cause is now primarily of historical significance in the Western world due to the success of vaccination.
Croup affects about 15% of children, and usually presents between the ages of 6 months and 5–6 years. It accounts for about 5% of hospital admissions in this population. In rare cases, it may occur in children as young as 3 months and as old as 15 years. Males are affected 50% more frequently than are females, and there is an increased prevalence in autumn (fall).
The word croup comes from the Early Modern English verb croup, meaning “to cry hoarsely”; the name was first applied to the disease in Scotland and popularized in the 18th century. Diphtheritic croup has been known since the time of Homer’s Ancient Greece and it was not until 1826 that viral croup was differentiated from croup due to diphtheria by Bretonneau. Viral croup was thus called “faux-croup” by the French, as “croup” then referred to a disease caused by the diphtheria bacteria. Croup due to diphtheria has become nearly unknown due to the advent of effective immunization
Croup is characterized by a “barking” cough, stridor, hoarseness, and difficult breathing which usually worsens at night. The “barking” cough is often described as resembling the call of a seal or sea lion.
As the cough gets more frequent, the child may have labored breathing or stridor (a harsh, crowing noise made during inspiration).The stridor is worsened by agitation or crying, and if it can be heard at rest, it may indicate critical narrowing of the airways. As croup worsens, stridor may decrease considerably.
Other symptoms include fever, coryza (symptoms typical of the common cold), and chest wall indrawing. Drooling or a very sick appearance indicate other medical conditions
Rarely, croup can last for weeks. Croup that lasts longer than a week or recurs frequently should be discussed with your doctor to determine the cause.
Viral croup is the most common. Other possible causes include bacteria, allergies, and inhaled irritants. Acid reflux from the stomach can trigger croup.
Croup is usually (75% of the time) caused by parainfluenza viruses, but RSV, measles, adenovirus, and influenza can all cause croup.
Before the era of immunizations and antibiotics, croup was a dreaded and deadly disease, usually caused by the diphtheria bacteria. Today, most cases of croup are mild. Nevertheless, it can still be dangerous.
Croup tends to appear in children between 3 months and 5 years old, but it can happen at any age. Some children are prone to croup and may get it several times.
In the northern hemisphere, it is most common between October and March, but can occur at any time of the year.
In severe cases of croup, there may also be a bacterial superinfection of the upper airway. This condition is called bacterial tracheitis and requires hospitalization and intravenous antibiotics. If the epiglottis becomes infected, the entire windpipe can swell shut, a potentially fatal condition called epiglottitis.
Croup is a clinical diagnosis. The first step is to exclude other obstructive conditions of the upper airway, especially epiglottitis, an airway foreign body, subglottic stenosis, angioedema, retropharyngeal abscess, and bacterial tracheitis.
A frontal X-ray of the neck is not routinely performed, but if it is done, it may show a characteristic narrowing of the trachea, called the steeple sign. The steeple sign is suggestive of the diagnosis, but is absent in half of cases.
Other investigations (such as blood tests and viral culture) are discouraged as they may cause unnecessary agitation and thus worsen the stress on the compromised airway. While viral cultures, obtained via nasopharyngeal aspiration, can be used to confirm the exact cause, these are usually restricted to research settings. Bacterial infection should be considered if a person does not improve with standard treatment, at which point further investigations may be indicated
The most commonly used system for classifying the severity of croup is the Westley score. It is primarily used for research purposes rather than in clinical practice. It is the sum of points assigned for five factors: level of consciousness, cyanosis, stridor, air entry, and retractions.The points given for each factor is listed in the table to the right, and the final score ranges from 0 to 17.
*A total score of ? 2 indicates mild croup. The characteristic barking cough and hoarseness may be present, but there is no stridor at rest.
*A total score of 3–5 is classified as moderate croup. It presents with easily heard stridor, but with few other signs.
*A total score of 6–11 is severe croup. It also presents with obvious stridor, but also features marked chest wall indrawing.
*A total score of ? 12 indicates impending respiratory failure. The barking cough and stridor may no longer be prominent at this stage.
85% of children presenting to the emergency department have mild disease; severe croup is rare (<1%).
Most cases of croup can be safely managed at home, but call your health care provider for guidance, even in the middle of the night.
Cool or moist air might bring relief. You might first try bringing the child into a steamy bathroom or outside into the cool night air. If you have a cool air vaporizer, set it up in the child’s bedroom and use it for the next few nights.
Acetaminophen can make the child more comfortable and lower a fever, lessening his or her breathing needs. Avoid cough medicines unless you discuss them with your doctor first.
You may want your child to be seen. Steroid medicines can be very effective at promptly relieving the symptoms of croup. Medicated aerosol treatments, if necessary, are also powerful.
Serious illness requires hospitalization. Increasing or persistent breathing difficulty, fatigue, bluish coloration of the skin, or dehydration indicates the need for medical attention or hospitalization.
Medications are used to help reduce upper airway swelling. This may include aerosolized racemic epinephrine, corticosteroids taken by mouth, such as dexamethasone and prednisone, and inhaled or injected forms of other corticosteroids. Oxygen and humidity may be provided in an oxygen tent placed over a crib. A bacterial infection requires antibiotic therapy.
Increasing obstruction of the airway requires intubation (placing a tube through the nose or mouth through the larynx into the main air passage to the lungs). Intravenous fluids are given for dehydration. In some cases, corticosteroids are prescribed.
Alternative Treatments :-
Since most croup cases are mild in severity, over the counter treatments are often used. These treatments include ointments such as Vick’s or other menthol creams. These often are used to open up the airways. Other over the counter treatments include humidifiers to keep the humidity up in a room and lessen the chances of the airways becoming further inflamed or irritated.
Other methods of breaking croup attacks include hot shower exposure and cold air exposure. In the hot shower method, the shower is used as a sauna, in that the shower is running but people sit outside of it, taking in the warm, humid air. This method can be very effective when used in ten minute increments. Cuddling or reading to the child can limit the stress that is on the child during such a treatment. Cold or cool air exposure is another very effective alternative treatment. This method of treatment relies on the idea that the inflamed tissues will cool and shrink when exposed to cool air. Since most croup cases occur during the fall or winter seasons, this is often achieved simply by going outside or driving with the windows rolled down.
Lifestyle and home remedies:
Croup often runs its course within three to seven days. In the meantime, keep your child comfortable with a few simple measures.
*Stay calm. Comfort or distract your child — cuddle, read a book or play a quiet game. Crying makes breathing more difficult.
*Moisten the air. Use a cool-air humidifier in your child’s bedroom or have your child breathe the warm, moist air in a steamy bathroom. Although researchers have questioned the benefits of humidity as part of emergency treatment for croup, moist air seems to help children breathe easier — especially when croup is mild.
*Get cool. Sometimes breathing fresh, cool air helps. If it’s cool outdoors, wrap your child in a blanket and walk outside for a few minutes.
*Hold your child in an upright position. Sitting upright can make breathing easier. Hold your child on your lap, or place your child in a favorite chair or infant seat.
*Offer fluids. For babies, water, breast milk or formula is fine. For older children, soup or frozen fruit pops may be soothing.
*Encourage resting. Sleep can help your child fight the infection.
*Try an over-the-counter pain reliever. If your child has a fever, acetaminophen (Tylenol, others) may help. Cough syrup, which doesn’t affect the larynx or trachea, isn’t likely to relieve your child’s cough. Over-the-counter cold preparations are not recommended for children younger than age 5.
Your child’s cough may improve during the day, but don’t be surprised if it returns at night. You may want to sleep near your child or even in the same room so that you can take quick action if your child’s symptoms become severe.
Viral croup is usually a self-limited disease, but can very rarely result in death from respiratory failure and/or cardiac arrest. Symptoms usually improve within two days, but may last for up to seven days. Other uncommon complications include bacterial tracheitis, pneumonia, and pulmonary edema
To prevent croup, take the same steps you use to prevent colds and flu. Frequent hand washing is most important. Also keep your child away from anyone who’s sick, and encourage your child to cough or sneeze into his or her elbow.
To stave off more-serious infections, keep your child’s immunizations current. The diphtheria, Haemophilus influenzae type b (Hib) and measles vaccines offer protection from some of the rarest — but most dangerous — forms of upper airway infection.
Disclaimer: This information is not meant to be a substitute for professional medical advise or help. It is always best to consult with a Physician about serious health concerns. This information is in no way intended to diagnose or prescribe remedies.This is purely for educational purpose.
- My child has a cough. What should I do?! (from-the-frontline.com)
- Inhaled epinephrine confirmed quick, effective for croup (physorg.com)
- Wheezing 5-Month-Old (everydayhealth.com)
- Nightlife (famelessramblings.wordpress.com)
- Wednesday Wisdom: Cough Cough Cough! (kimberleygridley.wordpress.com)
- What Causes Laryngitis? (brighthub.com)
- 10 childhood illnesses and how to treat them (parentcentral.ca)
- Wednesday Wisdom; Cough Cough Cough! (homeopathy4women.com)
- 365 Project: Day 53 – Sickness (justforjill.wordpress.com) | <urn:uuid:40de3aa8-49f1-46d5-a103-1c02b63f6ca7> | CC-MAIN-2015-48 | http://findmeacure.com/2011/03/28/croup/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398450745.23/warc/CC-MAIN-20151124205410-00284-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.930043 | 2,778 | 4.09375 | 4 |
canyon heads, where smaller individuals concen- trate and where food resources would be enhanced due to the autumn plankton bloom and the materials carried downwards from shallower areas influenced by river outflows in this season. The higher activity of submarine canyons in the northwestern Mediter- ranean has been pointed out by Courp and Monaco (1990) in the Lacaze-Duthiers Canyon (to the north of Catalonia) and for our study region by Puig and Palanques (1998a,b). Furthermore, the influence of episodic fluxes on the behaviour of benthic species in the Mediterranean has been shown by Buscail et al. (1990), De Bovée (1990), Féral et al. (1990), Cartes et al. (2002) and Puig et al. (2001). New evi- dence on benthic-pelagic coupling and the relation- ship with particular benthic compartments such as bacteria, meiobenthos and macrobenthos has appeared recently (Angel and Smith, 2000). Compa- ny et al. (2001) showed the link between the popu- lation structure of different shrimp species in the genus Plesionika Bate, 1888, such as the presence of mature females and recruitment, and the presence of nepheloid layers at different depths. However, the relationship between the geomorphological struc- ture and environment of canyons and the exploited natural resources has not yet been demonstrated in situ as a cause-effect, and the results in this work are a case in this direction. Some aspects are not entire- ly clear yet. For instance, there is no hypothesis yet as to why females undergoing gonadal maturity would concentrate primarily on the middle and lower slope in spring and summer or why smaller sizes concentrate at canyon heads. Eco-physiologi- cal studies are needed in order to clarify the possible relationship between particle fluxes and different population structures of deep-water shrimp in rela- tion to submarine canyons.
Cartes and Sardà (1989) and Maynou and Cartes (1997, 1998) consider this species to occupy one of the lower positions in the benthopelagic food chain but to be atypical among deep-sea decapod crus- taceans in that it exhibits a relatively high proportion of full stomachs as compared to other deep-sea decapod crustaceans. The high metabolic and growth rate demonstrated for this species by Com- pany and Sardà (1998, 2000) is likewise indicative of this. Furthermore, more mobile species tend to have higher metabolic rates, that is, they have high- er energy requirements, which translates into a high- er daily ration (Koslow, 1996). Given the reduction in food sources in deep-sea habitats, causing dietary overlap and competition for food (Gage and Tyler,
30 F. SARDÀ et al.
1990), it seems reasonable to assume that A. anten- natus will have specific nutritional requirements during spawning and will therefore tend to adopt a distribution at optimum depths to fulfil those requirements. This could be one of the main reasons for the high level of dominance found for this species in the depth interval studied. In the Catalan Sea total consumption by bathyal decapod crus- tacean assemblages is higher on the upper middle slope (400-900 m) than on the lower middle slope (900-1200 m). The generally lower food consump- tion by decapod crustaceans with depth is consistent with the commonly accepted notion that food avail- ability also declines with depth, which holds both for the suprabenthos (one of the main sources of food for benthic decapod crustaceans) and for mesopelagic decapods and euphausiid crustaceans and other crustacean taxa (Carpine, 1970; Cartes, 1998; Cartes and Maynou, 1998; Mura et al., 1998; Carrassón and Cartes, 2002). The reduction in food resources takes place around the zonation boundary located at 900 m, with deep-water rose shrimp shoals being located above that depth.
A comparison of trophic level results with previ- ous studies in shallower waters shows that there are some differences between shallower and deep-sea species (Cartes et al., 2001; Cartes and Carrassón, 2004; Cartes et al., 2004b; Sardà et al., 2004b). Trophic levels of crustaceans from deep-sea area are higher than those obtained from ecological models of the shelf and upper slope area of South Catalan Sea and the coastal area of the Bay of Calvi, Corsi- ca (northwestern Mediterranean Sea). Trophic levels of deep-sea fishes are also in the high range of val- ues compared with the results from shallower areas mentioned above. However, this result cannot be aligned with a viable economical and ecological development of a deep-sea fishery, because the highest trophic levels have been identified to corre- spond to species with low fecundity and a low meta- bolic rate. Moreover, the food web structure is com- posed of highly-specialised organisms and displays low web-like features.
Temperature did not appear to be a determining factor in these processes, the temperature in the Mediterranean being constant at around 13 ± 0.5 ºC below 200 m (Hopkins, 1985), so the population structure and behaviour of A. antennatus can be con- sidered temperature-independent. In the deep-water habitat that concerns us here, food availability in the deep-sea food web would seem to be the main lim- iting factor (Gage and Tyler, 1990). | <urn:uuid:22aa3b48-917e-4bd4-973a-f21d7d397922> | CC-MAIN-2016-44 | https://www.hitpages.com/doc/4510729809952768/24/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718034.77/warc/CC-MAIN-20161020183838-00190-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.923712 | 1,201 | 2.640625 | 3 |
The pancreatic enzymes
Pancreatitis is basically the autodigestion of the pancreas by the pancreatic enzymes caused by obstruction of pancreatic ducts (e.g. edema, tumor, inflammation, and gallstones) and other causes. But before anything else, let’s review the different types of pancreatic enzymes and their main role in our system.
Our pancreas is located in our abdominal cavity. This amazing organ produces two types of hormones: endocrine and exocrine functioning hormones.
The pancreatic islets or famously known as islets of Langerhans produces:
- Alpha Cells (glucagon)-stimulates the liver to break down stored glycogen to glucose (hyperglycemic agent)
- Beta Cells (insulin)-is responsible for lowering blood sugar (hypoglycemic agent)
- Somatostatin- regulates glucagon and insulin
The pancreas also produces “pancreatic juice” that is responsible for breaking down the food entering the small intestines. This pancreatic juice is enzyme rich and it contains:
- Amylase- responsible for digestion of starch or carbohydrates
- Lipase- responsible for fat digestion
- Trypsin, chymotrypsin, and others- responsible for protein digestion. Trypsin is also the enzyme that causes autodigestion.
Pancreatitis can be classified in two forms: acute and chronic.
Acute pancreatitis has also two types:
- Edematous (interstitial)
This type of pancreatitis causes fluid accumulation and as a result hypovolemia can result due to severe third spacing of fluid.
- Necrotizing (hemorrhagic)
This type of pancreatitis occur when there is premature activation of pancreatic enzymes. There are several explanation for this type of pancreatitis. Obstruction, disruption, or inflammation of the pancreatic duct can cause the enzymes to back up and spill into the pancreas. This is what we call autodigestion or dyschylia “digestion of fat and tissue in and around the pancreas”. These eventually causes cell death and tissue damage in the retroperitoneum and omentum.
Complications of Hemorrhagic Pancreatitis:
- Multiple Organ Failure
- Respiratory Distress
- Cardiogenic shock
- Acute liver failure
- Acute renal failure
Pancreatitis Pathophysiology and Schematic Diagram
What are the signs and symptoms of acute pancreatitis?
- Severe abdominal pain: Left Upper Quadrant that radiates to the back
- Cullen’s sign: discoloration of the abdomen and periumbilical area, suggest that there is massive bleeding
- Grey Turner’s sign: blush discoloration of the flanks, also suggest bleeding
This is an inflammatory disorder characterized by progressive destruction of the pancreas with scar tissue replacing the pancreatic tissue.
What are the signs and symptoms of chronic pancreatitis?
- Persistent pain
- Left upper quadrant mass
What are the usual causes of pancreatitis?
- Alcoholism- alcohol itself is a “downer” or depressant that may cause spasm in the sphincter of Oddi.
- Abdominal trauma
- Drug toxicity: e.g. corticosteroids, estrogen, thiazides cyclosporine
What are the laboratory/diagnostic tests for pancreatitis?
- Elevated serum amylase and lipase (confirmatory test)
- Elevated WBCs
- Elevated bilirubin
- Elevated urinary amylase levels
- Elevated glucose
- ECG readings: long ST segment
- Endoscopic retrograde cholangiopancreatography: shows calcifications and strictures
- CT scan: shows enlargement of the pancreas
|Normal Laboratory Results||Findings in patients with pancreatitis|
|Lab Tests||Conventional||SI Units|
|Serum Amylase||4-25 units/mL||4-25 arb. unit||Elevated|
|Serum Lipase||2 units/mL or less||Up to 2 arb. unit||Elevated|
|Bilirubin||Up to 1.0 mg/100 mL||Up to 17 µmol/L||Elevated|
|Urinary Amylase||24-76 units/ml||24-76 arb. unit||Elevated|
|Serum Glucose||70-110 mg/100 mL||3.9-5.6 mmol/L||Elevated|
|Calcium||8.5-10.5 mg/100 mL||2.1-2.6 mmol/L||Decreased|
Normal range of each test vary depending on the range/standard/computation followed by the laboratory.
Nurses should educate their patient that though pancreatitis is a deadly disease, it is highly preventable. As nurses, what are the nursing health teaching we can give to our patients?
- Avoid too much alcohol consumption. Alcoholism is one of the major cause of this disease.
- Eat a balanced-diet. Avoid eating fatty and high-carbohydrate meal.
- Maintain a healthy weight. Check your BMI and lose some pounds if you are overweight.
- If you think you have most of the risk factors of this disease, have a lifestyle change.
- Guyton, A. & Hall, J. (2006). Textbook of Medical Physiology. 11th edition.
- Myers, E. (2006). RNotes: Nurse’s Clinical Pocket Guide. F. A. Davis Company. Philadelphia. 2nd edition.
- Schilling McCann, J. (2007). Lippincott manual of nursing practice series: Pathophysiology. Lippincot Williams & Wilkins, Philadelphia.
- Silvestri, L. (2008). Comprehensive Review for the NCLEX-RN Examination. Saunders Elsevier. 4th edition.
- Smeltzer, S., Bare, B., Hinkle, J., Cheever, K. (2010). Brunner & Suddarth’s Textbook of Medical-Surgical Nursing. Lippincott Williams & Wilkins. 12th edition | <urn:uuid:7b1323ae-18e1-4cbc-bf3d-548b235c32e0> | CC-MAIN-2021-49 | https://rnspeak.com/pancreatitis-pathophysiology-and-schematic-diagram/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358966.62/warc/CC-MAIN-20211130080511-20211130110511-00542.warc.gz | en | 0.823662 | 1,465 | 3.65625 | 4 |
Day 4 – 10 Daily Use English Words
Day 4 – 10 Daily Use English Words [hide]
- 1. Appreciate: Verb
- 2. Bother: Verb
- 3. Recognise or Recognize: Verb
- 4. Favour: Noun
- 5. Dust off: Verb
- 6. Slice: Verb
- 7. Fold: Verb
- 8. Untidy: Adjective
- 9. Decrease: Verb
- 10. Trash: Noun
1. Appreciate: Verb
To say thanks to someone or recognizing one’s goodness or deed.
- We really appreciate your work.
- I appreciate your help.
2. Bother: Verb
To inconvenience or to trouble or to excuse.
- Don’t bother to cook your own food.
- Sorry to bother you.
3. Recognise or Recognize: Verb
To identify someone or something.
- Her hair and dressing style made her easy to recognise.
- I recognised her when she removed mask.
4. Favour: Noun
To ask help or support.
- Can I ask you a favour?
- Aren’t you in favour of a ban on 59 Chinese apps including TikTok, Helo, UC Browser?
- He made her write a document in his favour.
5. Dust off: Verb
To clean or remove the dust on surface of something.
- I dusted off the TV, computer and their tables.
- They are dusting off the old cars and decorating them for exhibition.
6. Slice: Verb
To chop or cut something into thin and flat pieces.
- She is slicing the onions.
- He sliced carrots.
7. Fold: Verb
To bend something .
- I am folding blankets.
- She folded clothes.
8. Untidy: Adjective
Not being clean and neat and things are not in order.
- This room is untidy.
- His handwriting is untidy, he must improve his handwriting.
9. Decrease: Verb
To make something smaller in amount or size or degree.
- Air pollution has decreased substantially due to the lockdown in Hyderabad.
- Janvi, please decrease the sound of the TV.
- Vehicles sales decreased sharply this year.
10. Trash: Noun
Waste things. Not valuable.
- I am removing the trash.
- I threw away the trash.
- This serial is trash really, I have wasted my time. | <urn:uuid:11380c09-f8bc-4bf1-b5bd-4c2b743ec7da> | CC-MAIN-2023-23 | http://www.manandari.com/day-4-10-daily-use-english-words/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652161.52/warc/CC-MAIN-20230605185809-20230605215809-00280.warc.gz | en | 0.844564 | 573 | 2.6875 | 3 |
"Scoff if you will Mateys! ...but after reading this you'll keep a weather eye on the waters round yer vessel when anchored!"
IDIOM: keep a (or one’s) weather eye open. To keep watch; stay alert.
The American Heritage Dictionary of the English Language http://www.bartleby.com/61/21/W0072100.html
“weather eye” NOUN: An ability to recognize quickly signs of changes in the weather.
As a sea kayaker, you should work on developing a good “weather eye” (along with all your other seamen’s tricks). Various sights, sounds and smells can tip you off to changes that portend trouble. All you have to do is learn what they are for your kayaking area and keep that weather eye peeled.
What to look for here in Hong Kong.
The weather is the most important criteria for planning when going sea kayaking. The kayaker who paddles without knowing the weather forecast is just asking for trouble.
Winds & the kayaker
When things go wrong for kayakers at sea, it’s usually because of a little too much wind.
Sea kayaks cope very well with waves, tides, currents and extremes of temperature, but too much wind can be a real problem.
If the day of your trip is windy, you can avoid problems by changing your plans. Shorten the trip. Move it to a small estuary with wooded sides, or the downwind side of a headland. On a windy day, paddle upwind to start with so if anybody gets tired, the group will have an easy downwind ride back to where you started from.
If you are out kayaking and a strong wind is blowing right in your face, keep up the pace until you get to shelter.
If you go slowly you will be out there struggling for a lot longer. If you stop for a rest you will drift backwards faster than you expect. A 10-minute rest on open water in a strong wind can cost you an extra 20 or 30 minutes paddling.
Also, wind creates waves. When a strong wind blows out to sea, the water may be smooth inshore but increasingly rough as you get further away from the beach. And the further you go out to sea, the rougher the sea and the stronger the wind. An onshore wind blowing a long distance over water can create a heavy surf which makes things difficult or even dangerous, especially when exiting the ocean. Knowing how to surf you kayak is essential in these conditions!
What is the best weather for kayaking?
A cloudy (overcast) day with little or no wind.
Some people are put off kayaking by cloudy days, but that can be the best time to head out. Kayaking in light rain is also quite refreshing and you’re going to get wet anyway, so don’t let a few showers put you off.
When the weather is overcast you don’t get baked by the sun so you tire less quickly and can have more fun kayaking out on the water. This is very important in Hong Kong
Bright sunny days are the most popular time to hire a kayak becuase most people haven’t had the experience of sitting on or in a kayak with no shade in the hot Hong Kong sun. This is infact not the best time to go kayaking. More information about the dangers of over heating while kayaking will be published in a future article.
So, if you are planning a kayaking trip in Hong Kong, or anywhere for that matter, make sure you get the latest weather information, understand it, apply it to the local geography and have a safe fun day on the ocean making sure you always ‘keep your weather eye open”! | <urn:uuid:8bb1e890-e08c-4631-8b28-33167b3cd4a7> | CC-MAIN-2022-27 | https://seakayakhongkong.com/weather-watch/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104189587.61/warc/CC-MAIN-20220702162147-20220702192147-00266.warc.gz | en | 0.932558 | 803 | 2.59375 | 3 |
Details about Introduction to Geometric Probability:
Here is the first modern introduction to geometric probability, also known as integral geometry, presented at an elementary level, requiring little more than first-year graduate mathematics. Klein and Rota present the theory of intrinsic volumes due to Hadwiger, McMullen, Santaló and others, along with a complete and elementary proof of Hadwiger's characterization theorem of invariant measures in Euclidean n-space. They develop the theory of the Euler characteristic from an integral-geometric point of view. The authors then prove the fundamental theorem of integral geometry, namely, the kinematic formula. Finally, the analogies between invariant measures on polyconvex sets and measures on order ideals of finite partially ordered sets are investigated. The relationship between convex geometry and enumerative combinatorics motivates much of the presentation. Every chapter concludes with a list of unsolved problems. | <urn:uuid:c428b388-a938-4cb9-a88b-c0acdc73e5e0> | CC-MAIN-2015-48 | http://www.chegg.com/textbooks/introduction-to-geometric-probability-1st-edition-9780521596541-0521596548 | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398452560.13/warc/CC-MAIN-20151124205412-00339-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.922227 | 189 | 2.90625 | 3 |
Lead compounds from promising extracts are being fractionated and identified using bioassay-guided fractionation.
In the laboratory of Phil Crews at UC Santa Cruz, lead compounds are being identified using bioassay guided fractionation. Microbe and plant extracts (1) are being prepared in Indonesia at LIPI Biology (Cibinong) and LIPI Chemistry (Serpong) and used to create crude extract libraries for evaluations in (2) high throughput bioassays. Bioactive extracts are then (3) fractionated using automated LCMS-UV-ELSD into 96 well plates and are then rescreened in the high-throughput assays to identify lead compounds (based on m/z ions). Final processing of active extracts (4) involves automated scale up HPLC to purify more of the lead compound(s) for dereplication and or structure elucidation using HRMS, 1-D and 2-D NMR. | <urn:uuid:dd92db6f-3eed-4804-bdc6-486e817275c1> | CC-MAIN-2023-06 | https://icbg.ucdavis.edu/ap3/separation-and-structure-elucidation-lead-compounds | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499541.63/warc/CC-MAIN-20230128090359-20230128120359-00074.warc.gz | en | 0.90553 | 196 | 2.640625 | 3 |
From: Haines Brown, Central Connecticut State Univ. BROWNH@CCSUA.CTSTATEU.edu
Slightly revised. HB
I've always assumpted that the Wu and Yuezi were Tocharian, and that Tocharian-speakers survived well after the date of 2400 BC and probably until absorbed in to the Xiungnu confederation. Would someone kindly straighten me out?
As for the point about diffusionism, first, I've always considered the motives of its advocates suspect when the advocate happens to share the ethnic, linguistic, or racial identity of the originators of diffusing ideas.
Second, my understanding of "migration" is that today it is no longer felt typically to be a mass movement of peoples, but instead a "wave of cultural advance" in which the movement of a language or culture does not necessarily imply a mass organized movement of peoples (genes). The Xiungnu themselves are a classic example.
Third, my understanding of modern notions of scientific innovation (Mokyr's Lever of Riches, for example) emphasizes that innovation is a dialectical process in which a new development depends as much as outside factors as it does on internal ones; that both outside stimulus and inside adoption require equally innovative active participation. Put more usefully, I'd insist that innovation is an "emergent process" in which outcomes are constrained by initial factors, whether internal or external in origin, but are essentially novel, attributed not to the past, but primarily to the actors in an historical present.
Sorry for burdening you with this, but the implicit racism that is inevitably part of diffusionism and hopefully is contributing to its demise, raised my hackles ("hackles"? As on a fishing fly?).
Haines Brown (firstname.lastname@example.org) | <urn:uuid:a817efd1-315d-446a-8cf1-2314364e0ff8> | CC-MAIN-2015-11 | http://www.hartford-hwp.com/archives/29/009.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463108.89/warc/CC-MAIN-20150226074103-00150-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.956637 | 377 | 2.59375 | 3 |
The Connetquot School District prides itself on being recognized by the Namm Foundation (National Association of Music Merchants), as one of the Best Communities in the United States for Music Education.
By participating in a healthy musical environment, students at Edward J. Bosti Elementary School share in many vital musical experiences that add and shape their growth. Music deals with teambuilding. When a student joins a general music class, a chorus rehearsal, a string orchestra rehearsal, or a band rehearsal, all students are active participants. Everyone is equally important in a music class and a rehearsal. Individually, students contribute by adding their own knowledge, talent and personality. This teambuilding is attributed to learning about complex vocabulary words, the language of music, listening skills, fine motor skills, mathematics, physics, history, many different languages, and enjoyment. This is all included in the Common Core State Standards and Student Learning Objectives (SLO), as well as the State and National Standards for the Arts.
All students at Bosti participate in General Music Classes. Our music curriculum follows the National and New York State Standards for the Arts. In addition, all classes incorporate the Common Core State Standards.
Students have the opportunity to dance, sing, play instruments and become life-long lovers of music. We focus on the things children like to do: sing, chant rhymes, clap, dance and keep a beat on just about anything. Improvisation and composition start students on a lifetime of knowledge and pleasure through personal musical experience.
“Music students are developing those areas of the brain that expand human creativity. They broaden their thoughts of originality, independence, curiosity, and flexibility, as they interpret, analyze, and break apart the music in new and interesting ways.
Learning through music and the arts not only allows the child to develop all of the types of intelligence that lie within him/her, but also allows the child to express their uniqueness as a person, thereby promoting a strong inner confidence and self-worth.”
From the book - Good Music Brighter Children by Sharlene Habermeyer
“If I were not a physicist, I would probably be a musician. I often think in music. I live my daydreams in music. I see my life in terms of music.”
- Albert Einstein | <urn:uuid:fc6aa81d-a436-4c1f-99cb-4e3ffd128822> | CC-MAIN-2019-30 | http://ccsdli.org/our_schools/ejb_music_program | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528869.90/warc/CC-MAIN-20190723043719-20190723065719-00203.warc.gz | en | 0.950642 | 476 | 2.78125 | 3 |
creative commons licensed (BY-NC-ND) flickr photo by Pensiero: http://flickr.com/photos/pensiero/3496059097
Dr. Lori Desautels recently published an interesting piece on Edutopia with an update to class roles. She writes:
“Last week as I was driving to one of our large, diverse public elementary schools to speak with teachers about connection, my mind went to a different realm of classroom structure and function. I began to think differently about what bonding and empathy look like in our classrooms. Traditionally, we give students classroom responsibilities with different jobs (paper passer, line leader, errand runner, etc.), but what if we built relationships and trust through leadership and caregiving roles? These roles and responsibilities call us to explore an emotional climate in our classrooms that would breed service and compassion. When we engage with one another, feeling the power of our compassion and service, the neural circuitry in the brain shifts, and our “reward system” of dopamine and serotonin sharpens our focus, emotional regulation, and engagement. We prime our brains for deepened learning and social connection.”
Read the entire piece here. | <urn:uuid:2412225e-3869-4202-983a-11e6c519822c> | CC-MAIN-2017-47 | https://teachingandlearninginsofia.wordpress.com/2015/02/05/building-cooperative-environments/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806771.56/warc/CC-MAIN-20171123104442-20171123124442-00306.warc.gz | en | 0.943747 | 248 | 2.828125 | 3 |
To cause agglutination of red blood cells.
Substances capable of causing agglutination of red blood cells are known as hemagglutinins. Examples of which are the antibodies, viral capsid proteins, or some phytolectins (e.g. PHA).
Word origin: hem- » Greek haimo-, from haima + agglutinate.
Related forms: hemagglutination (noun), hemagglutinin (noun)
Variant: haemagglutinate (British) | <urn:uuid:240f4a14-300d-477e-af06-0bc4e8fcbebf> | CC-MAIN-2014-35 | http://www.biology-online.org/dictionary/Hemagglutinate | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535919066.8/warc/CC-MAIN-20140901014519-00124-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.77785 | 119 | 3.671875 | 4 |
These two university-level textbooks on developmental biology adopt contrasting styles and have different aims.
Principles of Developmental Biology signals its intent in the title: it aims to provide "an introduction to developmental biology that presents the essentials without overwhelming students", with either length or difficulty. In this it succeeds, presenting in 18 concise and well-written chapters of about 20 pages each a pleasing introduction to the field, suitable for a one-term introductory course. It uses simple smart colour illustrations and few photographs. Details of the molecular basis of development are invoked only where necessary.
It is up to date, as evidenced, for example, by the sub-section on "Conservation of genes and networks", the latter topic - gene networks - of great importance. The book is not encumbered with a CD-Rom or packets of slides for teachers. I say "encumbered" because for an introductory one-term course, these materials can be daunting to students, who often worry that all available reading materials may be drawn on for exam questions. In place of electronic materials, the authors offer key concepts and study questions at the end of chapters.
Developmental Biology is a book for majors, designed to give students a broad knowledge, and to prepare them for more advanced courses in development, embryology, cell signalling and evolutionary-developmental biology. It aims for encyclopaedic coverage, at least at undergraduate level. In this it largely succeeds, even if it is not always succinct. But the material is carefully chosen, relevant and densely illustrated in colour.
Students will find thought-provoking the "Sidelights and Speculations" sections in each chapter. These present case studies on, for example, genetic assimilation and deformed frogs. The book comes with a CD-Rom and there is a dedicated website.
These are the elements of the North American "package" approach to pedagogy, developed for the large class sizes of many courses in the US. Large class sizes are beginning to be seen in the UK and will eventually call for teaching packages following the North American model.
Mark Pagel is professor of evolutionary biology, University of Reading.
Principles of Developmental Biology. First edition
Author - Fred H. Wilt and
Publisher - Norton
Pages - 430
Price - £35.99
ISBN - 0 393 97430 8 | <urn:uuid:7b241455-8dd6-4ff5-a1f8-718bb9c40409> | CC-MAIN-2017-39 | https://www.timeshighereducation.com/books/textbook-guides/8-november-2012/leaps-in-learning/186972.article | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690112.3/warc/CC-MAIN-20170924171658-20170924191658-00122.warc.gz | en | 0.905285 | 481 | 2.8125 | 3 |
Adapted From In Motion: Active Living for All Ages.
Sports is a fun way to introduce your child into a healthy lifestyle. Benefits of Sports are countless, and include promotion of growth and development, socialization and teamwork, development of self-esteem and goal setting, as well as providing a healthy alternative for less desirable engagements.
You can encourage your child to get involved by:
Staying fit yourself — Be a good role model. Your kids are watching you more than you think. If you have a healthy lifestyle, they are more inclined to emulate these positive exercise experiences.
Play sports with your child — Simple running, kicking a ball, or playing outdoor games, biking and swimming are fun experiences from which the child builds.
Free play — Under the age of five, free play is best and comes first. As the child grows, team sports participation can be introduced, usually around the age of 5 or 6. Before then, the attention span may not lend itself to team efforts, and stressing the child to be involved beyond his attention span can create an unwanted experience.
Expose your child to various sports — Taking the child to organized athletic events introduces the child to various team sports. You don’t have to take the child to a professional event. Merely taking the child to a little league soccer or baseball game may show them that other kids are doing physical activities and having fun.
Safety and proper couching — It is important to be sure the child is in a safe environment with proper coaching and equipment needed for the sport. Parents should be supportive and let the child enjoy themselves. Positive reinforcement promotes self-esteem and confidence. Don’t put excessive pressure on the child. Keep it fun and safe. | <urn:uuid:daa9a69b-e3fd-429d-8507-4affef020c5f> | CC-MAIN-2019-47 | https://upperext.com/2014/03/28/getting-kids-started-in-sports/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669967.80/warc/CC-MAIN-20191119015704-20191119043704-00301.warc.gz | en | 0.957059 | 353 | 3.21875 | 3 |
The opioid epidemic has been a growing problem in recent years and the results have been devastating. People in need of opioid treatment spend an average of two hours waiting for pain relief before entering a hospital emergency room (ER).
Opioids are one of the most dangerous drugs in the world, which are often prescribed to patients who are suffering from pain. Although they provide an effective remedy for such pains, there is a concern that these medications may have lasting effects on the brain, body, and behavior. In this article, we’ll take a look at how opioid use can actually lead to long-lasting ills.
The Effect of Opioid Abuse on Society
Opioid abuse has a tremendous effect on society today, and the number of people who are using these drugs is increasing. According to an article by the CDC, in 2016, there were over 63,000 deaths from drug overdoses in the United States. That number is higher than the entire number of deaths that occurred in car accidents or gun violence. They also estimate that 74% of these individuals were using prescription opioids such as oxycodone or hydrocodone. The effects that opioids have on a person can be severe including respiratory depression (insufficient breathing), sedation/coma/death due to overdose, and dependence.
There are also more social effects to opioid addiction as well depending on where they live such as what kind of discrimination they experience which may be based on their socio-economic status and race, or how much money they make. Opioid addiction can lead to homelessness for example because of not being able to afford to live and so on. Let’s take a look at this epidemic in more detail.
What Is Opioid Addiction?
Opioid addiction is a type of drug addiction that can be very difficult to overcome with prolonged treatment. By understanding what opioid addiction is, it is easier to know how one might get addicted to opioids and how it could impact life in the long run.
Opioid addiction can occur with any type of opioid drug, including prescription painkillers, heroin, and synthetic opioids such as fentanyl. Opioids are also used recreationally for euphoria or in the context of dependence on other drugs. Opioids often produce a feeling of relaxation or euphoria that leads to compulsive use and tolerance development over time.
What Types of Opioid Addiction Are There?
With the opioid addiction epidemic in America, it is important to understand what kinds of opioid addiction are there. This includes physical dependence, psychological dependence, and substance-use disorder. There are several types of opioid addiction including physical dependence, psychological dependence, and substance-use disorder. Physical and psychological addictions often overlap in the case of long-term opioid use.
How Is Opioid Addiction Treated?
Opioid addiction is a worldwide problem that has become a key issue in the United States. More than 200 million people worldwide abuse opioids and between 4 million and 6 million Americans are addicted to these drugs as well. There are many treatment options available for opioid addiction, some of which are prescription drugs, such as methadone and buprenorphine. However, these treatments have their own limitations.
What Are the Long-Lasting Effects of Opioid Addiction?
Opioid drugs are pain relievers. This does not mean that they should be taken without medical supervision in any way. It is important to note that these drugs do not have an instant effect as other pain relievers might, and they also come with many long-term side effects.
Opioids allow us to feel good, but only for a short period of time before we crash and feel worse than before. In fact, it’s common for people who abuse these drugs to become addicted after just one dose!
Opioid addiction is a chronic condition that can have long-lasting effects on the body and brain. As a result, people who become addicted to opioids often experience withdrawal symptoms such as nausea, vomiting, diarrhea, and more. These symptoms are often caused by drug withdrawal but can also be attributed to the many other factors that come with addiction.
How Opioid Abuse Can Injure Other Areas of Life
In the United States, there has been an increase in the usage of opioids over recent years. This has, in turn, led to an increase in addiction rates and long-lasting side effects.
Long-lasting effects of opioid abuse can be seen in a number of areas, including long-lasting physical effects of opioids such as social isolation and emotional problems such as depression or anxiety, and long-term side effects that occur due to the loss of work productivity and jobs. | <urn:uuid:5b3088e2-763a-4ec0-b60f-a8a04ce3328d> | CC-MAIN-2023-06 | https://evolveindy.com/what-are-the-long-lasting-effects-of-opioid-abuse/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499934.48/warc/CC-MAIN-20230201112816-20230201142816-00706.warc.gz | en | 0.964579 | 957 | 3.296875 | 3 |
As war threatened in the Balkans, the attention of much of the French people focuses instead on the sensational case of Madame Henriette Caillaux, whose trial for the murder of Gaston Calmette, editor of the newspaper Le Figaro, opens on July 20, 1914, in Paris.
Joseph Caillaux, a left-wing politician, had been appointed prime minister of France in 1911. He was forced out of office the following year, however, after he was accused of being too accommodating to Germany. Chosen again as a cabinet minister in 1913, the relatively pacifist Caillaux was under almost constant attack from the right. In his personal life, Caillaux was relatively indiscreet, parading his mistresses around during his life as a bachelor and carrying on a secret love affair with one of them, his future second wife, while he was still married to his first wife.
Although Caillaux was an old friend of Raymond Poincare, elected president of France in March 1913, he and Poincare had become political adversaries even before World War I began the following summer. Shortly after his election, Poincare supported legislation that would increase the required length of military duty in France from two to three years, a measure that seemed necessary to many as a way of offsetting Germany's enormous population advantage–70 million to 40 million–in the case of a war. Despite opposition from Caillaux and other liberals, including the country's Socialist leader, Jean Jaures, the bill passed in August 1913. When Caillaux continued to attack it, he became the object of a major smear campaign led by Gaston Calmette, the most powerful journalist in France and the editor of the leading right-wing journal Le Figaro.
Beginning in December 1913, Calmette claimed he could and would publicize certain documents that would prove Caillaux, while serving as minister of finance in 1911, had obstructed justice in a financial scandal in which he may have been personally involved. Moreover, Calmette threatened to publish love letters exchanged between Caillaux and his second wife, Henriette, while he was still married to his first wife.
When Calmette threatened to publish intercepted wire communications supposedly showing Caillaux's sympathy to Germany–a claim that spurred a protest by the German government against the interception of its official correspondence–Caillaux went to Poincare and asked him to prevent Calmette from revealing the documents. If Poincare declined to do so, Caillaux pointed out, he himself would make public intercepted cables in his possession that revealed the French president's secret negotiations with the Vatican, a revelation that would certainly anger Poincare's secular and anticlerical supporters. The French government subsequently issued an official denial of the existence of the German cables, but Calmette continued to threaten to publish Caillaux's love letters.
On March 16, 1914, Henriette Caillaux took a taxi to the offices of Le Figaro in the rue Drouot. After waiting for an hour to see the chief editor, she walked with him into his private office and fired six shots at him from her automatic pistol. Struck by four of the bullets, Calmette died that evening.
While to the east, in Vienna and Berlin, plans proceeded that would begin the First World War, Parisians–and many others in France–were riveted by the Caillaux affair, and completely unaware of the imminent crisis in Europe. In addition to being a sensational crime, the case was also a clash between left- and right-wing politics in France. Madame Caillaux's trial for Calmette's murder began July 20, 1914. Eight days later, the jury acquitted Madame Caillaux, on the grounds that hers was a crime passionnel. The same day, July 28, Austria-Hungary declared war on Serbia. | <urn:uuid:c06f994a-7d1d-40be-b62d-371568a78d61> | CC-MAIN-2014-49 | http://www.history.com/this-day-in-history/caillaux-trial-begins-in-paris?catId=16 | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931011477.80/warc/CC-MAIN-20141125155651-00158-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.985123 | 794 | 3.140625 | 3 |
Scientific awareness that marine diseases represent a major threat to coral reefs has led to the multiplication of disease investigations over the past three decades (Weil, 2001; Harvell et al., 2007; Pollock et al., 2011; Burge et al., 2014). Field monitoring surveys have considerably increased our knowledge about macroscopic characteristics, abundance and distribution of coral reef diseases and the environmental factors influencing their dynamics (Gladfelter, 1982; Kuta & Richardson, 1996; Hayes & Goreau, 1998; Nugues, 2002; Willis, Page & Dinsdale, 2004; Aeby et al., 2008; Weil, Croquer & Urreiztieta, 2009; Haapkylä et al., 2010; Tribollet, Aeby & Work, 2011). However, little progress has been made in elucidating disease causation due to the lack of microscopic pathology (Work & Meteyer, 2014). Coupled with microbial culture and molecular essays, histopathology appears as a crucial tool to determine the association between a pathogen and a tissue lesion. It is therefore a vital step in any effective coral reef disease survey (Work & Meteyer, 2014). It provides insight into cell pathology and host response to help resolve the question of disease causation (Work et al., 2014). It can detect etiological microorganisms and propose or refute potential causative agents by their observation in situ. Furthermore, it provides a great amount of information on the cell and tissue damages associated with gross lesions (Peters, 1984; Ainsworth et al., 2007a; Burns & Takabayashi, 2011; Williams et al., 2011; Sudek et al., 2012). Sometimes, even in the absence of pathogens, changes in the host tissue histology hint at the type of infection and lead to a diagnostic (Gupta et al., 2009). It is therefore the only current diagnostic tool that allows the establishment of a link between the potential causative agent and the specific changes in cell and tissue (Work & Meteyer, 2014). For instance, histology has confirmed the association between a fungus and the blue-black band lesion in crustose coralline algae (CCA) affected by the Coralline Fungal disease (CFD) (Williams et al., 2014). However, an integrated approach (i.e., combining microbiological, microsensor, molecular and physiological techniques) is necessary in order to incriminate infectious agents as disease causation and thus complete the diagnostic picture (Richardson et al., 2001; Work & Meteyer, 2014).
Unfortunately, investigations at the cellular level are seriously lacking in diseases affecting CCA despite the importance of these calcifying algae in marine ecosystems, especially coral reefs. Along with scleractinian corals, CCA are important primary producers (Adey & Macintyre, 1973; Chisholm, 2003) and framework builders (Adey & Vassar, 1975) delivering significant functional services in coral reef ecosystems, including enhancing coral larval settlement (Morse et al., 1988; Heyward & Negri, 1999; Harrington et al., 2004; Ritson-Williams et al., 2010; Ritson-Williams et al., 2014). CCA are not spared by the increasing intensity and severity of marine diseases (Littler & Littler, 1995; Hayes & Goreau, 1998) and field investigations on CCA diseases have multiplied in recent years (Aeby et al., 2008; Vargas-Ángel, 2010; Tribollet, Aeby & Work, 2011; Miller et al., 2013; Quéré, Steneck & Nugues, 2015). At present, six disease categories have been reported (Vargas-Ángel, 2010; Williams et al., 2014; Quéré, Steneck & Nugues, 2015), but only CFD and coralline lethal orange disease (CLOD) have known causations. Virtually nothing is known about the other CCA disease categories and they remain histologically uncharacterized. Further knowledge on these diseases and the response of their host could be gained from studies at tissue and cellular levels.
In Curaçao, CCA species are affected by the Coralline White Band Syndrome (CWBS) and the Coralline White Patch Disease (CWPD) (Quéré, Steneck & Nugues, 2015). Both pathologies have the potential to reduce the survivorship and settlement of coral planulae and thus may have important implications for the maintenance and recovery of coral reefs (Quéré & Nugues, 2015). They differ in gross symptoms, spatio-temporal variations and lesion spread, suggesting that they may have different causations (Quéré, Steneck & Nugues, 2015). CWBS lesions are defined by a white-band that appears centrally or peripherally and advances slowly but steadily on the healthy tissue, while CWPD manifests by the presence of distinct white patches on the healthy crust, suggesting sudden losses of tissue (Figs. 1A and 1B). Both diseases result in tissue loss with subsequent colonization by endophytic algae often leading to the death of the diseased patch in the case of CWBS (Quéré, Steneck & Nugues, 2015). Visible symptoms may have a biotic or abiotic origin. On one hand, thermal stress has been shown to cause bleaching in both corals and CCA in the laboratory (Anthony et al., 2008) and algal necroses appear on CCA crust under elevated temperature in aquaria (Martin & Gattuso, 2009). On the other hand, bacterial pathogens can also cause bleaching disease in the marine red algae Delisea pulchra (Fernandes et al., 2011). Gross symptoms in the shape of rings are known to be caused by a bacterial infection in the case of CLOD (Littler & Littler, 1995) and by fungi in the case of CFD (Williams et al., 2014). The aim of this study was to describe CWBS and CWPD at the microscopic level in order to better understand these diseases and their effects on coralline algal tissues.
Materials and Methods
Crustose coralline algae were sampled in May 2012 at two sites along the leeward coast of Curaçao, Southern Caribbean (12°N, 69°W). Fragments (ca. 10–20 cm2) from four CCA species were collected using hammer and chisel on the reef terrace at 5–10 m depth at two reef sites: Hydrolithon boergesenii, Neogoniolithon mamillare and Paragoniolithon accretum at Water Factory (12°06′32″N, 68°57′14″W) and Paragoniolithon solubile at Playa Kalki (12°22′30″N, 69°09′31″W). Sampling was not targeted towards particular species, but we sought to have an approximately equal number of healthy and diseased samples. A total of 23 fragments, including 7 healthy fragments, 8 fragments affected by CWBS and 8 fragments affected by CWPD, were sampled (Table 1). For each diseased fragment collected, we made sure to incorporate healthy-looking tissue. Each replicate was selected from a distinct patch. Healthy and diseased fragments of each disease were placed in separated collecting bags to avoid contamination and transported in the dark to the laboratory.
Back in the laboratory, a sample (ca. 2–4 cm2) of each fragment was kept for taxonomic identification. The pieces used for taxonomic determination were rinsed with freshwater and dried for six hours in the oven at 60 °C before being checked under a dissecting scope for reproductive and morphological features (Steneck, 1986). The rest was fixed in 4% Formalin-seawater solution and stored in the fridge until further use. Before decalcification, a small piece (ca. 1 cm2) was cut from each fragment so that only the crust of the CCA and a thin (ca. 5 mm) layer of limestone underneath remained. All superficial epibionts (i.e., mostly filamentous algae) present on the surface of the coralline algae were removed. In the case of diseased fragments, each piece was chipped so that it included the boundary between healthy and diseased tissues.
Each sample was then placed in an individual container with 5% L-ascorbic acid solution to gently decalcify over a period up to one week. The solution within each container was refreshed every two days. Once the skeleton and limestone were dissolved, the tissue samples were placed in individual embedding cassettes and dehydrated at room temperature in ascending grades of ethanol (70%, 80%, 95%, 100%, 100%) for 40 min each, followed by an immersion in limonene (three baths of 40 min each). Samples that could not be processed immediately were stored in 70% ethanol for a maximum of 5 days. This additional step did not affect the results (G Quéré, pers. obs., 2014). CCA tissue was then placed in three successive baths of paraffin (Paraplast® Plus™; Sigma-Aldrich, Seelze, Germany) each time 40 min before being embedded into paraffin blocks. Samples were orientated so that transverse sectioning was possible. The blocks were stored overnight at 4 °C in the fridge to ease withdrawal from the cassette the following day. The blocks were sectioned (section thickness 5 and 7 µm) using low profile microtome blades (Leica DB80 LX; Leica Biosystems GmbH, Wetzlar, Germany) mounted on a calibrated rotary microtome (LEICA™ RM2245; Leica Microsystems GmbH, Wetzlar, Germany). Sections were floated onto water (20 °C), mounted onto clean slides and dehydrated on a slide drying bench for minimum 40 min at 50 °C.
Sections were then rehydrated and stained following the Sharman staining series (Sharman, 1943) modified from Ruzin (1999). This method stains the cell walls of plant tissue in tannic acid and iron alum after the protoplasts have been stained in safranin and orange G (see Document S2 for detailed staining procedure). Several other staining methods were tried, but this method was the most effective to visualize the different cellular components of CCA. Sections were then dehydrated in successive baths of ethanol (45%, 90% and 100%) and cleared with limonene. Coverslips were finally mounted using adhesive resin. We examined and photographed 10 permanent histology sections of each CCA fragment using light microscopy (Leica DM750; Leica Microsystems GmbH,Wetzlar, Germany) with integrated camera (Leica ICC50 HD) using the Leica LAS EZ software.
Host response was described at the microscopic level and interpreted by comparing normal healthy fragments paired with diseased ones. The presence of invading organisms, their type and localization within the tissue were recorded. In each fragment, organisms could be present in the CCA crust (i.e., epithallus, perithallus and/or hypothallus) or in the limestone underneath the crust. In addition, in diseased fragments, we noted whether they were located in the healthy-looking and/or diseased tissues of the fragments. The identification of the invading organisms was beyond the scope of this study and was restricted to two boring categories: macroborers (i.e., boring sponges, helminths and others) and microborers (i.e., cyanobacteria). Sample sizes were not sufficient to allow robust statistical analysis. All results are reported for pooled species of CCA as the number of replicates per species was too low to make comparisons between species, but species-specific data are listed in Table S1.
The four CCA species presented similar responses towards diseases. For both diseases, we observed no difference in cell structure and organization between healthy tissue of healthy CCA and healthy-looking tissue of diseased CCA. Cell walls and contents in healthy-looking tissue of diseased CCA were intact without any apparent damage (Figs. 2B and 3B). In contrast, the diseased part of the tissue showed distinct histological changes between diseases. Cells affected by both CWBS and CWPD presented no apparent damage of their cell walls, but showed a complete depletion of their protoplasmic content (Figs. 2D and 3D). However, in all cases of CWBS, we observed a transition area between healthy and dead cells consisting of cells that were partially deprived of protoplasmic content (Fig. 2C). Cells containing what appeared to be a condensed nucleus or balled up cytoplasmic materials were also frequently observed (Fig. 4A insert). This transition area most likely corresponds to the white band in the gross morphology (Fig. 1A). It did not exist in CWPD tissue where healthy-looking cells were in immediate vicinity of empty dead cells (Fig. 3C). In two cases of CWBS and one case of CWPD, we observed an overgrowth of the diseased/dead surface by the healthy crust, suggesting tissue recovery (Figs. 4A and 4B).
Various macroborers and microborers were observed in both healthy and diseased tissues (Fig. 5). They were more abundant in diseased fragments, particularly in CWBS. Of the 7 healthy fragments examined, 4 (57%) had invading macro- and microorganisms versus all of 8 CWBS fragments and 5 (63%) of the 8 CWPD fragments (Table 2). Of 13 diseased fragments with evidence of boring organisms, sponges were most common (62%) followed by other macroborers (38%) and cyanobacteria (31%). Of the four healthy fragments with borers, 3 had sponges and two had other macroborers and cyanobacteria were not encountered. Within diseased fragments, borers were also more abundant in the diseased tissue of the fragments. Of 13 diseased fragments, 5 (38%) presented borers in their healthy-looking tissue, whereas 12 (92%) showed intrusion by borers in their diseased tissue (Table S1). However, boring organisms were rarely present within or in the immediate vicinity of diseased cells. Boring organisms were more abundant in the underlying limestone than in the CCA crust. In CWPD, borers were found exclusively in the limestone of all 5 diseased fragments containing borers. Cyanobacteria were never seen in the CCA crust. We did not visualize any fungal infections associated with the diseased cells.
|Health of fragment||Healthy||CWBS||CWPD|
|Health of tissue||HT||HT||DT||HT||DT|
|Number of samples||7||8||8|
|Samples with borers||1||3||4||2||4||2||6||8||1||5||5|
|Samples with sponges||3||3||2||2||3||4||5||1||5||5|
|Samples with helminths||1||1|
|Samples with other macroborers||1||1||2||2||3||1||3||4|
|Samples with cyanobacteria||2||2||3||1||1|
Note that the numbers can add up more than for the total fragments since the same fragment may have borers in different sections of the sample.
This is the first study providing histological information on CWBS and CWPD. We found no visible difference between healthy tissues of healthy and diseased crusts, which suggests that the action of the disease is localized, at least at the cellular scale. However, variations could occur at a smaller scale. For example, distinct differences in bacterial community between non-diseased corals and healthy-looking tissues of colonies affected by white band disease have been highlighted in Orbicella annularis using molecular techniques (Pantos et al., 2003). In tissue affected by both diseases, the three distinct cell layers characteristic of CCA (epithallus, perithallus and hypothallus) showed cells with an intact cell wall, but depleted from all cytoplasmic content as highlighted by a sudden change in the intensity of the staining. A plausible explanation to cell bleaching is the loss of pigments as already known in corals during bleaching events (Kleppel, Dodge & Reese, 1989). CCA contain phycobilins (phycoerythrin and phycocyanin) pigments that are present in living tissue. Their loss could be followed by tissue necrosis and death (Fernandes et al., 2011). CCA also commonly experience sloughing events (Keats, Knight & Pueschel, 1997). However, the signs detected in this study differ from sloughing. During a sloughing event, epithallial cells are lost or appear loose (Keats, Knight & Pueschel, 1997; Garbary et al., 2013). Here, they remained present in all the diseased fragments as clearly visible in Fig. 3. Additionally, all the different cell layers showed similar changes in the diseased part of the crust (difference in cell staining intensity) whereas in the case of a sloughing event, only the superficial epithallial cells would have shown deterioration.
In CWPD, healthy cells were in immediate vicinity of diseased empty cells whereas in CWBS, a transition area existed where cells had less protoplasmic content than healthy cells as highlighted by a weaker stain within the cells. This transition area could be the sign of a chronic, slowly progressing disease which is reflected in the slow but steady rates of CWBS progression on healthy tissue (i.e., 0.21 ± 0.06 cm month−1 in Quéré, Steneck & Nugues, 2015). In contrast, CWPD generally manifests by a sudden and extensive loss of tissue, often with a rapid turn-over (G Quéré and M Nugues, pers. obs., 2012), characteristic of acute diseases (Work, Russell & Aeby, 2012; McCoy & Kamenos, 2015).
Dead cells were characterized by an intact cell wall and a complete loss of protoplasmic content. In the case of CWBS, some cells in the transition area showed a highly visible nuclei or rounded cytoplasmic content. Histology confirmed cell death but the technique used here did not allow us to determine whether death was the result of necrosis or programmed cell death (PCD). The former is triggered by external factors often affecting many cells within a tissue, while the latter is triggered by intracellular signals activating specific gene expression at the level of a single cell (Greenberg, 1997; Dunn et al., 2012). These phenomena have rarely been studied in multicellular algae (Garbary et al., 2013) and remain poorly understood. Both have been highlighted during bleaching in the sea anemone Aiptasia sp. using a combination of histology, electron microscopy and in-situ end labelling of DNA fragmentation (Dunn et al., 2002). In the transition area, the sudden high visibility of the nuclei or rounded cytoplasmic content could be related to the condensation of the nucleus during PCD. Similar cellular degradation has been observed in Acroporid corals affected by white syndromes (Ainsworth et al., 2007b). However, several other distinct features are necessary to differentiate necrosis (e.g., vacuolization, cell rupture, tissue degradation) and PCD (e.g., cell shrinkage, formation of accumulation bodies) (Dunn et al., 2002; Franklin, Brussaard & Berges, 2006). Interestingly, plants can also present a hypersensitive response that consists of rapid death after infection by a pathogen (e.g., fungi, bacteria, viruses, nematodes) in order to prevent its spread (Garbary et al., 2013). This phenomenon could constitute a plausible explanation for the CWPD symptoms. However, further analyses are required to test this hypothesis.
We observed regrowth of healthy-looking tissue over diseased tissue in both diseases. In reef-building corals, an immune response and repair mechanism consisting of a locally accelerated growth has been shown in wounded colonies (D’Angelo et al., 2012). We could interpret this regrowth as a response of the remaining healthy tissue to counteract the progression of the lesion like a wound healing response in CCA. Similarly, CCA are capable of healing wounds caused by herbivores grazing on their crust by regeneration of perithallial cells within the thallus (Steneck, 1983). This healing response could explain the presence of CCA cells lining up the burrow around the invading organisms (Fig. 5B). CCA may have repaired cells around those damaged by the borer. Alternatively, the algal tissue could have grown around the invaders.
We found various metazoa (sponges, helminth, bivalve juveniles) and microrganisms (cyanobacteria) associated with both healthy and diseased CCA tissue. This is consistent with previous studies which have shown the presence of those organisms in healthy and diseased coral colonies (Work & Aeby, 2011; Séré et al., 2013) and in live and dead coralline thalli (Tribollet & Payri, 2001). These organisms were more abundant in diseased than healthy CCA fragments, and, within diseased fragments, they were more abundant in diseased vs healthy tissue, suggesting a potential link between CCA diseases and the presence of borers. However, it is unknown whether these borers are the cause of the disease or opportunistic secondary colonizers. Among the organisms observed here, several have been identified as pathogenic in other species. This is the case for helminths known to cause tissue loss in Montipora (Jokiel & Townsley, 1974) or cyanobacteria which appear to cause tissue lysis and necrosis in black band diseased corals (Ainsworth et al., 2007a). Ciliates are also frequently associated with diseases and capable of invading animal and plant tissue by breaking cell membranes and walls using enzymes such as proteases (Work & Aeby, 2011). In our observations, boring organisms did not seem to be associated with evident cell pathology, suggesting a secondary invasion. Indeed, diseases may weaken or damage coralline tissues, thus facilitating invasion by borers. The mechanical (chip production) and chemical (dissolution) bioerosion of calcium carbonate by boring sponges or bivalves has been reported (Lazar & Loya, 1991; Zundelevich, Lazar & Ilan, 2007). In our study, the acellular space observed around the different invaders could be due to a digestive effect of the borer on the surrounding CCA cells creating a dead zone around them. It is also possible that the presence of an organism would have weakened the tissue around it leading to its loss during fixation.
Microborers are also well-known agents of bioerosion in live and dead CCA thalli causing higher rates of erosion in dead versus live thalli (Tribollet & Payri, 2001). The same way dead coral skeletons are colonised at the surface and bored inwards, diseased crusts could become rapidly vulnerable to invaders (Tribollet & Payri, 2001). Previous studies looking at the association between host response and potential agents revealed that sponges, cyanobacteria and helminths are absent from acute lesions but often associated with chronic diseases, such as the slowly progressing phases of White Syndromes in Montipora capitata (Work, Russell & Aeby, 2012). Our observations confirm this pattern since sponges were often found spreading through the crust and the limestone in CWBS fragments. In contrast, in CWPD fragments, sponges were exclusively located in the limestone, suggesting that they did not have time to invade the crust. There is evidence that macroborers such as bivalves or sponges could take a couple of years to colonize dead skeleton, as they are long-lived, slow-growing organisms (Tribollet & Golubic, 2011).
The increase of borers within the coralline tissue could have a cascading effect by making carbonate substrata available to new borers, thus increasing their eroding action. Ocean acidification also accelerates reef bioerosion without necessarily affecting the health of boring organisms (Wisshak et al., 2013). Furthermore, synergistic effects of ocean warming, ocean acidification and disease infection enhance the reduction in the calcification rates of CCA (Williams et al., 2014). In the face of climate change, disease outbreaks may thus, together with global stressors and boring organisms, aggravate reef degradation.
Histological observations of lesions from the two diseases did not reveal any evidence for the presence of fungi. A fungus belonging to the subphylum Ustilaginomycetes has been identified as the pathogenic agent responsible for CFD thanks to conventional histology (Williams et al., 2014). We could deduce that fungi are not implicated in CWBS and CWPD. Similarly, fungi were not observed in the white syndrome of Acroporid corals (Ainsworth et al., 2007b). Our method did not allow for the visualization of bacteria which have been identified as causal agents for CLOD (Littler & Littler, 1995). Visualizing bacteria using conventional histology would have required the use of Taylor’s gram stains (Peters, 1983; Work & Rameyer, 2005). Additional techniques such as the embedding of tissue in agar and the use of fluorescence in situ hybridisation (FISH) or transmission electron microscopy (TEM) (Work, Russell & Aeby, 2012) have also been suggested to improve bacterial detectability in coral tissues (Bythell et al., 2002). The same applies for virus-like particules (VLPs) whose presence can be detected using TEM and flow cytometry (Davy et al., 2006). Viruses have been associated with the presence of syncitia inside cells (Work, Russell & Aeby, 2012); however, they were not observed in this study. The potential implication of viruses in coral disease is still unknown but thermally stressed corals produce numerous VLPs (Davy et al., 2006; Rosenberg et al., 2009). Although this study did not identify the agents responsible of the diseases, it allows to narrow the pool of potential suspects. The use of an integrated approach is necessary for further progress on the complete diagnosis of CCA disease.
This study brings a descriptive distinction at the cellular level between CWBS and CWPD. Observations of the diseased tissues were consistent with the signs described in the field. CWBS known to progress slowly but steadily over the CCA in the field showed a transition zone in microscopy. In contrast, CWPD known to cause a sudden loss of tissue in CCA had no transition zone. Although boring organisms were observed at higher abundances within diseased tissues in comparison to healthy ones, we did not find evidence of a direct link between the presence of invaders and the disease lesion. However, the range of potential pathogens could be narrowed as no sign of fungal infection was observed. Standard techniques in histopathology alone cannot elucidate the question of disease causation. Additional methods are necessary to complete the diagnosis picture.
Type of boring organisms encountered and their localisation within the tissue for each CCA sample
HT, healthy tissue; DT, diseased tissue. | <urn:uuid:acbb3bd0-8879-4bc9-bde5-8cd7d2727791> | CC-MAIN-2017-39 | https://peerj.com/articles/1034/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687592.20/warc/CC-MAIN-20170921011035-20170921031035-00465.warc.gz | en | 0.943452 | 5,782 | 2.640625 | 3 |
The Higgs boson is a cornerstone of modern physics despite never being seen. It is believed to play a key role in imbuing things with mass. It is the last missing part of the Standard Model, a suite of equations that has held sway as the law of the cosmos for the last 35 years.
Physicists have been eager to finish the edifice, rule the Higgs either in or out and then use that information to form deeper theories that could explain, for example, why the universe is made of matter and not antimatter, or what constitutes the dark matter and dark energy that rule the larger universe.
In July, it looked as if the search for the Higgs boson — the longest and most expensive search in the history of science — was coming to an end. Physicists announced that they had discovered a new subatomic particle that looks for all the world like the Higgs boson.
The discovery was announced by physicists at CERN, the multinational research center headquartered in Geneva that is home to the Large Hadron Collider, the immense particle accelerator that produced the new data by colliding protons. But they were cautious about declaring that the particle was the Higgs boson beyond all doubt. It may be an impostor as yet unknown to physics, perhaps the first of many particles yet to be discovered. For now, some physicists are simply calling it a “Higgslike” particle.
Confirmation of the Higgs boson or something very much like it would constitute a rendezvous with destiny for a generation of physicists who have believed in the boson for half a century without ever seeing it. The finding affirms a grand view of a universe described by simple and elegant and symmetrical laws — but one in which everything interesting, like ourselves, results from flaws or breaks in that symmetry.
According to the Standard Model, the Higgs boson is the only manifestation of an invisible force field, a cosmic molasses that permeates space and imbues elementary particles with mass. Particles wading through the field gain heft the way a bill going through Congress attracts riders and amendments, becoming ever more ponderous.
Without the Higgs field, as it is known, or something like it, all elementary forms of matter would zoom around at the speed of light, flowing through our hands like moonlight. There would be neither atoms nor life.
The particle is named for the University of Edinburgh physicist Peter Higgs, one of six physicists — the others are Tom Kibble, Robert Brout, Francois Englert, Gerry Guralnik and Dick Hagen — who in 1964 suggested that a sort of cosmic molasses pervading space is what gives particles their heft. Particles trying to wade through it gather mass the way a bill moving though Congress gains riders and amendments, becoming more and more ponderous. It was Dr. Higgs who pointed out that this cosmic molasses, normally invisible and, of course, odorless, would have its own quantum particle, and so the branding rights went to him.
In 1967, the Nobel Prize-winning physicist Steven Weinberg made the Higgs boson a centerpiece of an effort to unify two of the four forces of nature, electromagnetism and the nuclear “weak” force, and explain why the carriers of electromagnetism — photons — are massless but the carriers of the weak force — the W and Z bosons — are about 100 times as massive as protons.
Unfortunately, the model did not say how heavy the Higgs boson itself — the quantum personification of this field — should be. So physicists have had to search for it the old-fashioned train-wreck way, by smashing subatomic particles together to see what materializes.
In December 2011, two independent teams of scientists, who run giant particle detectors named Atlas and C.M.S. from the CERN collider, reported that they had found promising bumps in their data at masses of 124 billion electron volts and 126 billion electron volts, respectively, those being the units of mass or energy preferred by particle physicists. (By comparison, a proton is about a billion electron volts, and an electron is about half a million.)
In March 2012, after 40 years of searching, scientists reported that the end of the biggest manhunt in the history of physics might finally be in sight.
Physicists from the Fermi National Accelerator Laboratory in Batavia, Ill., reported that they had found a bump in their data that might be the long-sought Higgs boson. The signal, in data collected over the last several years at Fermilab’s Tevatron accelerator, agreed roughly with results announced in December 2011 from two independent experimental groups working at the Large Hadron Collider at CERN, the European Organization for Nuclear Research, outside Geneva.
None of these results, either singly or collectively, were strong enough for scientists to claim victory. But the recent run of reports encouraged them to think that the elusive particle, which is the key to mass and diversity in the universe, is within sight.
In early July 2012, Fermilab physicists announced that the Tevatron accelerator had fallen just short of finding the elusive particle. Fermilab said its results were the best “indication” so far that the legendary particle exists.
In what amounts to a last hurrah for the Tevatron, physicists said that when they combined the data from some 500 trillion collisions of protons and antiprotons recorded since 2001 there was a suspicious excess, a broad bump in the mass range between 115 billion electron volts and 135 billion electron volts, in the units physicists use to measure mass and energy.
More on the Fermilab Data
In the evidence reported in March 2012, the Fermilab physicists found a broad hump in their data in the same region, between 115 billion and 135 billion electron volts. Those results came from combining the data from two detectors operated on the Tevatron: the Collider Detector at Fermilab, and DZero. The chances of this signal being the result of a random fluctuation in the data were only about 1 in 100, the group said Dmitri Denisov, a leader of the Fermilab effort, wrote in an e-mail: “It is clearly not the answer to crossword, but an important piece of the puzzle!”
Rumors of sightings of the Higgs boson have come and gone at both CERN and Fermilab in the last few years, but invariably where one group saw a bump, another saw a dip in the data, and with more data the bumps went away.
This is the first time in the long search for the particle that different groups, indeed different colliders, are in vague agreement.
It has led to a joke in physics circles now: The Higgs boson has not been discovered yet, but its mass is 125 billion electron volts.
The Atlas and C.M.S. groups will be trying to combine and reconcile their data in the coming weeks. The Hadron collider, now on winter break, will start up again in April 2012, with protons colliding at four trillion electron volts apiece. CERN has said that the collider will gather enough data this year either to confirm the existence of the Higgs boson or to rule it out forever.
Either outcome, physicists say, will be exciting. If the Higgs does not exist, they will have to come up with a new model of how the universe works. If they do find the Higgs, studying it might give them clues to deeper mysteries the Standard Model does not solve. | <urn:uuid:05f14b38-4080-4c67-8aac-e106a7e19944> | CC-MAIN-2017-34 | https://www.nytimes.com/topic/subject/higgs-boson | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109670.98/warc/CC-MAIN-20170821211752-20170821231752-00415.warc.gz | en | 0.95925 | 1,581 | 3.171875 | 3 |
Unikernels are customized, single address space bootable images composed of an application and the required bare-minimum kernel functionality. Today’s unikernels have demonstrated substantial performance and security advantages over monolithic and microkernels, but none have yet achieved widespread adoption.
The fundamental problem is that today’s unikernels, which have been developed by forking existing operating systems or as clean-slate designs, have abandoned the evolutionary community process that has made Linux such a success. In this post we describe an alternative approach we are pursuing with the goal of making unikernels a community supported, evolving capability of Linux and and the GNU C LIbrary (glibc).
Unikernels are single address space library operating systems. An application compiled into a unikernel only has the required functionality of the kernel and nothing else. Such a stripped-down kernel makes unikernels extremely lightweight, both in terms of image size and memory footprint, and also can lead to security benefits due to a reduced attack surface. There are many such lightweight unikernel implementations, e.g, LING, IncludeOS, and MirageOS. LING’s website takes 25 MB of memory because it runs on top of the LING unikernel. IncludeOS’s base VM starts at 1MB and a DNS server running on MirageOS compiles into a 449 KB image.
Since a unikernel does not have to initialize devices or services not needed for the application to run, boot times can be very fast. There is no ring transition overhead in unikernels (e.g., the overhead of going from least privileged ring 3 where applications operate to most privileged ring 0 where the kernel lives) because ring transitions are required to implement multiprocessing and by design, basic unikernels do not run multiple processes.
Additional improvements come because the kernel/application code can be co-optimized to meet the specific application’s needs. For example, researchers at Boston University’s Department of Computer Science carried out experiments to compare the performance of Linux and their specialized unikernel named the Elastic Building Block Runtime (Ebbrt). The application they chose to run was Memcached which is a memory based key value store also used by Facebook for their own data-centers. The researchers generated access patterns representative of Facebook’s own workloads and found out that EbbRT gives almost two times improvement in Memcached throughput at a target 99% tail latency as compared to Memcached running on the Linux kernel by optimizing the kernel memory management, networking, and scheduling to the needs of the application.
Why aren’t unikernels more popular?
Given all the advantages, why are unikernels still not widely used even after being around for decades? Possible answers can be found in the way these unikernels were developed. Different efforts for unikernel development over the years have followed one of the two approaches: clean slate or forking of an existing code base.
With the clean slate approach, developers have far more control over the code and the API. They don’t necessarily have to follow the POSIX API and can use newer languages, as is the case for HalVM, which uses Haskell. With such freedom, these unikernels can provide enhanced performance/security benefits.
The problem with this approach is these unikernels abandon the battle-tested Linux code, and with that, the entire Linux community as well that maintains Linux and keeps on fixing bugs. The newer codebases might be thoroughly structured and well written, but cannot match the thousands of person-years invested in development of Linux over the decades.
Furthermore, Linux has become the go-to kernel for deployment in cloud and other settings. Deviating away from that and developing something entirely new means persuading everyone to let go of Linux. If these unikernels deviate from the POSIX API, then legacy software can’t run on these unikernels. Applications have to be ported or rewritten for different, non-standard APIs.
The other approach to unikernel development is forking of an existing kernel codebase, e.g. Linux or NetBSD, and stripping it down to create a unikernel. In the process of stripping down the codebase, some projects change the original code so much that the changes don’t get integrated back into the original code bases. This essentially leads to maintaining the code as a new project. There is no existing developer community that takes care of maintaining the non-target-specific code and might even ensure that well-integrated targets don’t break without further work by the original contributor of the port.
A gradual, community based approach
Can we take a different approach to developing a unikernel? Can it follow the approach that Linux, glibc, and other such projects took: making a working version and improving it gradually? Can such a unikernel actually be part of the Linux and glibc code base so the huge community maintains the unikernel as well?
This way we would be able to use the entire code base of Linux and glibc without having to reinvent the wheel. This can provide an unchanged Linux interface to developers, with support for the existing device drivers, file systems, etc. Such a unikernel can be deployed in a virtual environment or on bare metal machines. If we can achieve this, we might have a unikernel that has, for instance, GPU support!
Over the summer of 2018, I worked at Red Hat as an intern on this project. Ulrich Drepper and Richard W.M. Jones from Red Hat, along with my PhD advisor Prof. Orran Krieger from Boston University, were my supervisors. James Cadden and Tommy Unger (EbbRT team from Boston University) also consulted on the project.
We started off with a few goals in mind. We wanted to create a unikernel out of Linux and glibc. The idea was to get it accepted upstream eventually so we had to make as few changes to the code bases as possible. We wanted to keep the Linux interface unchanged; any changes (e.g., zero copy networking) should come after the project is upstreamed and go through the regular Linux/GCC community processes.
The architecture that we came up with had an application and relevant user space libraries sitting on top of glibc, which instead of making systems calls into the kernel, made function calls. For now, we wrote a wrapper library around the system calls to translate them into direct function calls in the kernel.
To keep the application and kernel in the same address space, we stopped the kernel from creating the init process. Instead, we called our application code there. Finally, everything was linked together in a single bootable binary. We tested our setup by running a simple echo server inside the unikernel in QEMU.
This initial version of our unikernel is extremely promising because we changed just one line in the Linux code base. The changes in glibc made by Ulrich Drepper are also minimal. They are in a separate subtree that translates system calls into function calls. Such modest changes might increase our chances of eventual acceptance upstream.
The unchanged Linux and glibc API means applications can run on this unikernel with little or no changes. Additionally, it means that libraries that do not make system calls themselves can be used unmodified. We might need some more code in emulating uses of pseudo files in /proc and /sys, but those can be hidden implementation details in glibc and/or the kernel.
Coming iterations of UKL
We are currently working on the next iterations of our unikernel. We will get rid of the wrapper library and move some of the functionality into the Linux kernel and the rest into glibc. We plan to introduce config options for users to turn off or turn on functionality as required by the application at compile time. Further along, we plan to do this automatically by link time optimizations.
We are also currently working on cleaning up the unikernel build process. Right now we are borrowing functionality from the Linux kernel build process. Eventually, we hope this will be a different GCC target and all one will have to do to create an application specific unikernel is to run “make CC=ukl-gcc …”, assuming that the libraries used fulfill the requirements. Such ease of creating the unikernel will be a huge step towards making unikernels pervasive.
Once we have all the plumbing done, we plan to incorporate more support into it. We will start with features such as thread local storage, pthreads support, calling C++ constructors on boot up, etc. We will employ the research carried out by different unikernels such as EbbRT and add similar solutions here, e.g., zero copy networking.
By employing whole program optimizations and link time optimizations on the resulting codebase, we can automatically create application specific unikernels. The idea is to have acceptance by the community and gradually add features that the community can accept and maintain.
Long term, we believe that a Linux-based unikernel can provide a viable alternative to packages that, fully or in-part, bypass or avoid the kernel and do most of the processing in user space, such as DPDK and SPDK. Such packages won’t need to re-implement the functionality that already resides in the kernel and would be able to build on top of that. A unikernel approach could eliminate the overhead these kernel-bypass approaches address.
It will be interesting to see the performance benefits for applications we can get as compared to vanilla Linux. Interesting research directions can be explored while improving the performance of our unikernel by comparing it against specialized efforts, e.g., EbbRT.
This unikernel based on Linux may not be the answer to all performance and security questions out there, but it has a potential to begin addressing those questions once it becomes easier to deploy applications with it. And that is where we intend to go. | <urn:uuid:c2cddad3-e54c-4c56-afd4-6fec2da00d77> | CC-MAIN-2019-39 | https://next.redhat.com/2018/11/14/ukl-a-unikernel-based-on-linux/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574077.39/warc/CC-MAIN-20190920200607-20190920222607-00428.warc.gz | en | 0.929662 | 2,083 | 2.78125 | 3 |
4/3: Frank Lloyd Wright, Solomon R. Guggenheim Museum
This work represents the height of architect Frank Lloyd Wright’s delving into sculpture as a form of architecture. Originally, the building comes from Solomon R. Guggenheim, who began collecting nonobjective works of art that he intended to display to the public. The collection grew so large that he commissioned Wright to make a museum so that he could display the works. The museum itself took Wright over 15 years as well as over 700 drawings to complete. The building wasn’t even actually completed in his lifetime, as its first day open to the public was six months after his death, and 10 years after Guggenheim’s. The museum itself polarize architects, as some claimed that the building itself overshadowed the art inside, while others wondered why such amazing art could be displayed in such a hideous building. The building was designed with the thought of a “Temple of the Spirit”, as seen in certain aspects of the building: Namely, the white bands that stretch around the building and around the 5th avenue façade, which serve to emphasize harmony and seamless unity. Overall, Wright thought that architecture should be expressive of movement, and so his building reflected unbroken motion both within and without.
Learn a little more about Frank Lloyd Wright:
Foundation for the artist’s work:
Explore the Guggenheim: | <urn:uuid:dd685ae3-989c-4145-b6ac-856261f6e120> | CC-MAIN-2017-30 | http://culturemechanism.blogspot.com/2013/04/unending-spirit.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423842.79/warc/CC-MAIN-20170722022441-20170722042441-00189.warc.gz | en | 0.972771 | 297 | 3.21875 | 3 |
Scientists have created the world's first cloned monkey embryos and extracted stem cells from them, a development that brings the cloning of humans a step closer. Embryonic stem cells can be turned into any cell in the body and offer the hope of developing treatments for a range of diseases including Alzheimer's, Parkinson's and diabetes.
Scientists hope to use stem cells to grow replacements for damaged tissue - the resulting tissue would be genetically identical so there would be little chance of rejection. Creating such stem cells would require the creation of a cloned human embryo but this has so far been problematic. Though scientists have cloned several species, until now they have not been successful with primates; and creating useable stem cells from cloned embryos has so far only been possible in mice.
In their experiments, Shoukhrat Mitalipov's team at the Oregon Health and Science University made 35 cloned embryos and successfully extracted stem cells from two of them, eventually growing them into heart and nerve cells. Their results, published yesterday in Nature, show that Mitalipov used a total of 304 eggs collected from 14 rhesus macaques in his work.
Ian Wilmut, director of the Scottish Centre for Regenerative Medicine at the University of Edinburgh and leader of the team that cloned the world's first mammal, Dolly the sheep, said: "The ability to produce embryo stem cells from cloned human embryos would create entirely new opportunities to study inherited diseases."
Attempts to clone humans have been beset by problems: Hwang Woo-suk of South Korea announced the world's first cloned human embryos in 2004, but his work was retracted after it emerged that he had fabricated his results. A team led by Alison Murdoch at Newcastle University also published details of a cloned human embryo, but these survived only a few days and stem cells were not extracted.
In a statement yesterday, Murdoch and Mary Herbert, of the Newcastle-based North-East England Stem Cell Institute, said Mitalipov's work was the first convincing evidence that skin cells in primates can be reprogrammed into stem cells. "This takes us several steps closer to the production of patient-specific stem cells to treat life-limiting conditions."
Mitalipov's team used somatic cell nuclear transfer, the technique used to clone Dolly the sheep. They injected the nucleus of a skin cell from an adult macaque into an egg which had had its nucleus taken out. The embryonic stem cells were then extracted. | <urn:uuid:2e433eb8-66e4-4605-80ba-154f28da89f5> | CC-MAIN-2014-23 | http://www.theguardian.com/science/2007/nov/15/cloning?view=mobile | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776438008.40/warc/CC-MAIN-20140707234038-00029-ip-10-180-212-248.ec2.internal.warc.gz | en | 0.967963 | 507 | 3.515625 | 4 |
Paleness is an abnormal loss of color from normal skin or mucous membranes.
Unless pale skin is accompanied by pale lips, tongue, palms of the hands, inside of the mouth, and lining of the eyes, it is probably not a serious condition, and does not require treatment.
General paleness affects the entire body. It is most easily seen on the face, lining of the eyes, inner mouth, and nails. Local paleness usually affects a single limb.
How easily paleness is diagnosed varies with skin color, and the thickness and amount of blood vessels in the tissue under the skin. Sometimes it is only a lightening of skin color. Paleness may be difficult to detect in a dark-skinned person, and is detected only in the eye and mouth lining.
Paleness may be the result of decreased blood supply to the skin. It can also be due to decreased number of red blood cells (anemia). Paleness of the skin is not the same as loss of pigment from the skin. Paleness is related to blood flow in the skin rather than deposit of melanin in the skin.
Paleness can be caused by:
When to Contact a Medical Professional
Call your health care provider or emergency number if a person suddenly develops generalized paleness. Emergency action may be needed to maintain proper blood circulation.
Also call your provider if paleness is accompanied by shortness of breath, blood in the stool, or other unexplained symptoms.
What to Expect at Your Office Visit
Your provider will examine you and ask about your medical history and symptoms, including:
- Did the paleness develop suddenly?
- Did it happen after reminders of a traumatic event?
- Are you pale all over or only in one part of the body? If so, where?
- What other symptoms do you have? For example, do you have pain, shortness of breath, blood in the stool, or are you vomiting blood?
- Do you have a pale arm, hand, leg or foot, and cannot feel a pulse in the area?
Tests that may be ordered include:
Treatment will depend on the cause of paleness.
Skin - pale or gray; Pallor
High WA, Tomasini CF, Argenziano G, Zalaudek I. Basic principles of dermatology. In: Bolognia JL, Jorizzo JL, Schaffer JV, eds. Dermatology. 3rd ed. Philadelphia, PA: Elsevier Saunders; 2012:chap 1.
Schwarzenberger K, Callen JP. Dermatologic manifestations in patients with systemic disease. In: Bolognia JL, Jorizzo JL, Schaffer JV, eds. Dermatology. 3rd ed. Philadelphia, PA: Elsevier Saunders; 2012:chap 53.
Review Date 4/14/2015
Updated by: Kevin Berman, MD, PhD, Atlanta Center for Dermatologic Disease, Atlanta, GA. Review provided by VeriMed Healthcare Network. Also reviewed by David Zieve, MD, MHA, Isla Ogilvie, PhD, and the A.D.A.M. Editorial team. | <urn:uuid:3638e49c-ea1c-4e3e-8531-f666e3bea064> | CC-MAIN-2017-09 | https://medlineplus.gov/ency/article/003244.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170696.61/warc/CC-MAIN-20170219104610-00210-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.867501 | 662 | 3.296875 | 3 |
Vietnam's southwestern provinces are famous for their abundance of fish--so much so that the sight of fish drying in the roadside heat has become a hallmark of the Mekong Delta. Photos: Minh Hung
Ba Tong, a farmer in Long An Province, said the practice has always been common in the Mekong Delta, especially decades ago when fish were so abundant that people had to store the surplus. "Fish swam along the surface and you could simply scoop them up with a basket," he said.
Nowadays, people make dried fish out of both wild and farmed snakehead.
A small facility staffed by a whole family.
This household business in Dong Thap Province buys both farmed and wild fish caught in the wetlands.
Each kilogram of dried fish sells for around VND150,000 (US$7) so long as the fish is farmed and VND250,000 when the fish is caught in the wild.
A rarer delicacy is dried snake; they're also sold live for VND100,000 per kilogram.
Dried walking catfish is also common in the Delta.
Nam Xe, who owns a household business in Long An's Tan Thanh District, said that after slaughtering the fish, he mixed them with Sacha sauce, chilli, sugar and salt before setting them out to dry.
Ten kilograms of raw fish make about 2.5 kilograms of dried fish, Xe said.
It takes about three days to dry a batch in sunny weather.
Further south, in the Delta's An Giang Province, dried fish become less common than fermented fish, which is sold at virtually every market and shop. | <urn:uuid:4d50e141-8b36-477e-a83c-305e24156e2a> | CC-MAIN-2020-40 | http://www.thanhniennews.com/travel/the-magical-mekong-delta-where-the-roads-are-paved-with-drying-fish-36639.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402131986.91/warc/CC-MAIN-20201001174918-20201001204918-00155.warc.gz | en | 0.971177 | 348 | 2.65625 | 3 |
The Local School Board and the New Realities
The National School Boards Association adopted the following statement on the role of local school boards in January, 1992. The Kansas Association of School Boards endorsed this statement five months later. It is intended to provide the framework for school board leadership, education programs and services.
The mission of the public school is to educate each and every child to the fullest of his or her potential. This mission can be achieved only in the context of the new realities of our society and the world at large. In our times of social, economic, technological and geopolitical turbulence, the local school board’s responsibility is greater than ever. But school boards are determined to meet this daunting obligation and fulfill the mission of public education.
The local school board, an integral part of the American institution of representative governance, acts on behalf of the people of each community across our nation to translate this education mission into reality. A four-fold thrust for leadership by local school boards will ensure excellence and equity in the public schools and is pivotal in keeping America free and first among the nations of the world as the 21st century unfolds.
The Local School Board - An Overview
School boards share the responsibility for school governance with other elected officials of the state and national government and with the people as electors. The Kansas Constitution makes education a state responsibility while at the same time providing for the operation of public schools by local school boards elected by citizens of the school district. A little over 2,000 dedicated men and women guide a public school system that employs more than 50,000 people and serves nearly half a million children. Board members receive no pay for their service, only the satisfaction that comes from providing an indispensable public service.
What Does a School Board Do?
Boards of education have several functions, including establishing the vision for the district, setting goals, establishing policies for a school system, hiring and evaluating the superintendent of schools, holding the superintendent accountable for accomplishing district goals and helping build support for public education.
Setting a vision is not just another way of saying “goal setting” or “long-range planning.” The word comes from the Latin videre, which means “to see,” and a vision for a school district should, in fact, give people another way to see their schools, clearly showing the district not only as it is, but also what it might become.
As a school board member, you will have a central role in defining your district’s vision, but yours should not be the only viewpoint considered. Teachers, administrators, community members and students are more likely to support the board’s vision if they feel they have played a part in developing it.
The process of creating a vision involves making choices, not only about where the district is headed, but also about how it will get there. For this reason, establishing a vision may be the most difficult responsibility that any school board faces. But it is also perhaps the most important.
Specific responsibilities for school board members include:
- Keeping students as the focus of the work of schools.
- Adopting a shared vision based on community beliefs to guide local education.
- Demonstrating a strong commitment to the shared vision and mission by using them to guide decision-making and communicating them to others.
To achieve its vision, a board must establish a structure and create an environment that will ensure for all students the opportunity to attain their maximum potential. Vision alone is not enough. The board must also put in place an organizational framework that can allow the district to achieve its vision.
School boards are responsible for providing a planning, policy and management structure that can move the district toward its vision. The infrastructure the board creates reflects local circumstances. It begins by employing a superintendent, adopting missions and goals in harmony with its vision through a strategic planning process, developing and approving policies, formulating budgets and setting high instructional standards for students and staff. The board must also create an environment in the school system that encourages innovation and supports staff members in a process of continuous renewal of education.
Specific responsibilities for school board members include:
- Employing a superintendent and establishing a district management system that enables all people to contribute meaningfully to achieve the district’s vision;
- Establishing direct processes to use information and make effective decisions;
- Ensuring long- and short-term plans are developed and annually revised through a process involving extensive participation, information gathering, research and reflection;
- Supporting student learning and school renewal when reviewing and adopting policies and allocating resources;
- Setting high instructional standards based on the best available information of the knowledge and skills students will need in the future; and
- Encouraging an environment conducive to innovative approaches to teaching and learning and supportive of continuous improvement in education.
The genius of America’s system of local control of education is local boards are directly accountable to the communities they serve. Effective boards engage in continuous assessment of all the conditions affecting education.
These should include:
- Monitoring student achievement;
- Using student achievement data and all other available information as a basis for making program corrections and modifications as needed;
- Keeping the public informed on the status of the district’s programs and students’ progress;
- Ensuring all functions of schools as institutions of teaching and learning fit together harmoniously;
- Providing appropriate staff and board training opportunities;
- Encouraging curricular and assessment innovation; and
- Fulfilling governance responsibilities as required by state and federal law.
A comprehensive accountability system can improve the effectiveness of schools by keeping the primary focus on student achievement and on what can and should be done to improve that achievement.
- Specific responsibilities for school boards include:
- Receiving regular reports on student progress and needs based on a variety of assessments in order to evaluate the quality and equity of education in the district;
- Evaluating both superintendent and board performance;
- Evaluating progress toward the achievement of district long- and short-term goals and ensuring policies and allocation of resources effectively support the district vision; and
- Reporting district progress to the community and parents on a regular basis.
School boards ought to serve as the leading advocate on behalf of students and schools in the community. Both individually and collectively, school board members need to speak out on issues that can advance the community’s vision for its schools. They must keep the vision visible and vital for the community and for other organizations that serve the needs of children.
In a time when children come to school with more problems than ever before, schools must acknowledge they cannot meet all these needs alone. Instead, they collaborate with families, community organizations and other public and private agencies to benefit both the children and the community they serve.
As a result, the advocacy role is becoming increasingly important for school board members. Informing citizens about the schools’ accomplishments, problems and needs is an essential part of school board leadership. Through their actions, board members represent the community and help foster understanding and support for the schools.
Specific responsibilities for school boards include:
- Seeing others who can help expand educational opportunities to meet the needs of the whole child;
- Advocating for children and families and establishing strong relationships with parents and other mentors to help support students;
- Promoting the schools’ instructional and other programs;
- Leading in celebrating the achievements of students and others in education; and
- Promoting school board service as a meaningful way to make long-term contributions to society.
These responsibilities mean school boards cannot be isolated institutions. They must bring together the entire community (parents, community groups and others concerned about schooling) in effective and responsible ways to initiate and sustain lasting improvement of the schools. | <urn:uuid:09683711-5c31-46fb-892c-bc52759ff208> | CC-MAIN-2017-17 | http://www.kasb.org/wcm/_AboutKASB/School_Board_Elections/School_Board_Elections.aspx?hkey=61b5bada-1840-4834-b085-c63e29b61e02 | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118950.30/warc/CC-MAIN-20170423031158-00193-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.955413 | 1,582 | 3.125 | 3 |
The first organised settlement to be established in the area of
dates to the Middle Minoan period (19th century BC). The site is mentioned as a-mi-mi-so in the Linear B tablets.
Habitation continues until the end of the Mycenaean period (12th century BC). In the Archaic period (7th century BC) a sanctuary
dedicated to Zeus Thenatas is founded and remaines in use until the 2nd century AD. After a long period of abandonment, the
site was again inhabited during the Venetian era. This medieval settlement, called Mesovouni, was located on the hill of Palaiochora
and was destroyed in the first years of the Turkish occupation.
The site was excavated by Spyridon Marinatos in 1929-1938 and then by Stylianos Alexiou. In 1983-85 the architectural
remains were cleared and drawn by the Archaeological Institute of the University of Heidelberg. Consolidation and conservation works
are carried out at intervals by the 23rd Ephorate of Prehistoric and Classical Antiquities.
The most important monuments of the site are: The "Villa of the Lilies".
A typical Minoan villa of the Neopalatial period with paved corridors, "polythyra" (pier-and-door partitions), shrine, kitchen and rooms decorated
with wall-paintings depicting blossomed lilies. "Building C" or "Megaron". Minoan building divided into two separate rooms by a partition wall. It was used
until the 14th century BC. "Complex E". Residential quarter of the Late Minoan period to the west of the hill of Palaiochora. A section has
been submerged in the sea and the preserved complex is divided into two large wings; the east includes storerooms and the west is occupied by
a shrine and a deposition pit. "Complex F". This is the part of the settlement that dates to the Mycenaean period. It consists of irregular
architectural complexes, with rooms employed for the storage of amphoras, a small temple (?) and an open courtyard. Sanctuary of Zeus Thenatas. It is situated on the hill of Palaiochora and has a peribolos surrounding a circular altar
of ashes. A wall built of ashlar blocks, dated to the MM II period, is visible today next to the sanctuary of Zeus. | <urn:uuid:ef46407b-0e6d-4335-ab5f-8d14f0f5e9dd> | CC-MAIN-2022-21 | https://www.gtp.gr/TDirectoryDetails.asp?ID=14557 | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662644142.66/warc/CC-MAIN-20220529103854-20220529133854-00106.warc.gz | en | 0.951951 | 521 | 3.046875 | 3 |
What is the retina?
Imagine that your eye is like a camera, and the retina is the film. The retina is a fine sheet of nerve tissue lining the inside of the eye. Rays of light enter the eye and are focused on the retina by the lens. The retina produces a picture which is sent along the optic nerve for the brain to interpret. It’s rather like the film in the camera being developed so that pictures can be produced.
What is retinal detachment?
Usually the retina is attached to the inner surface of the eye. If there is a tear or hole in the retina then fluid can get underneath it. This weakens the attachment so that the retina becomes detached – rather like wallpaper peeling off a damp wall.
When this happens the retina cannot compose a clear picture from the incoming rays and your vision becomes blurred and dim.
Who is more likely to get it?
Detachment of the retina happens more to middle-aged, shortsighted people. It is quite uncommon however and only about one person in ten thousand is affected. Very rarely, younger people can have a weakness of the retina.
What are the symptoms?
The most common symptom is a shadow spreading across the vision of one eye. You may also experience bright flashes of light and/or showers of dark spots called floaters. These symptoms are never painful.
Many people experience flashes or floaters and these are not necessarily a cause for alarm. However, if they are severe and seem to be getting worse, and/or you are losing vision, then you should see a doctor urgently. Prompt treatment can often minimise the damage to your eye.
What is the treatment?
If you get help early, it may only be necessary to have a laser or freezing treatment. This is usually performed under a local anaesthetic.
Often, however, an operation to repair the hole in the retina is needed. This is usually done under a general anaesthetic and can be repaired with a single operation in 90% of cases. This does not usually cause much pain but your eye will be sore and swollen for a few days afterwards. You will usually need to stay in hospital for two or three days after your operation.
We want to reassure you that your surgeon does not remove your eye from its socket to operate on it.
How much vision can I expect after a successful operation?
This depends on how much the retina has detached and for how long. The shadow caused by the detachment will disappear in all cases when the retina has been put back in place. However, if the detachment involves the part of the retina which is responsible for your central vision, this may not recover. The longer this part of the retina has been detached, the smaller the chance that your central vision will recover to its former level. But if this is the case, you will still have some useful vision left.
What happens after the operation?
Usually you can return home after two or three days in hospital. And you will be encouraged to get up and carry on as usual on the day after the operation. Sometimes you will be asked to keep your head in a particular position to help the healing process.
You can resume normal activities as soon as you feel able.
What happens if the retina is not put back in place?
Most people will lose all useful vision if no operation is carried out or if the treatment is unsuccessful. Occasionally, if the detachment involves the lower portion of the retina, some vision may recover by itself.
Can retinal detachment be prevented?
If your family has a history of retinal detachment, or your doctor finds a weakness in your retina, then preventive laser or freezing treatment may be needed. In most cases however it is not possible to take preventive action.
Retinal detachment does not happen as a result of straining your eyes, bending or heavy lifting.
Am I likely to get one in the other eye?
If you have a retinal detachment in one eye, you are at increased risk of developing one in the other eye. But there is only about a one in ten chance of this happening.
What if my sight cannot be fully restored?
Much can be done to help you use your remaining vision as fully as possible. You should make an appointment to see an NCBI community resource worker. There are a variety of optical aids such as brighter reading lamps, simple magnifying glasses and more sophisticated equipment that can help you. | <urn:uuid:ab940fdc-00b8-4268-bc8a-5246c1b91350> | CC-MAIN-2022-27 | https://www.ailishohanlonopticians.ie/eye-conditions/flashes-floaters/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104215790.65/warc/CC-MAIN-20220703043548-20220703073548-00006.warc.gz | en | 0.958817 | 905 | 3.5625 | 4 |
Building an agrihood that other communities can model will require a research institute and a farm training program
Research and training: SULRI and SOFT
Research and training programs are established to study, improve, promote and expand the agrihood and other land use models and thus create a regional network of world wide regenerative farming models. Each model varies according to region and the local ecosystem where the model is located.
Research and training programs can be offered at each farm’s location based on the local soils, their microbiology and climate conditions, native plants, and local ecosystems.. SULRI collaborations can be developed with the academic institutions of each region, especially those within close proximity to each model site.
SULRI The Sustainable Urban Land-use Research Institute
SOFT Sustainable Organic Farm Training
In order for this farming model to produce significant benefits to society, an academic research institute is connected to it, primarily populated by a student internship program that provides a labor force and academic discipline programs to study outcomes and benefits, set up experiments, collect data, publish and share data.
For example, studies may be conducted comparing a regenerative farm model with other farm models. Some typical research areas of study may investigate:
1) Soil health,regeneration and microbial comparisons of naturalized soils to disturbed soils and the effects on yield and productivity by comparing microbial behaviors in varying soils states of disturbance.
2) air quality: conducting air quality and air content studies at regeneration farming sites, vs non regenerative farms sites.
3) Water: studies are conducted using various water technologies that enhance quality, conservation, improve technology, reuse, cleansing and watershed stewardship and education vs non regenerative farming sites
4) Waste: studies are conducted, shared and published comparing on site waste management systems to conventional systems that transport waste away from sites. This includes product and consumer waste and human bio-waste.
5) native plants studies: a list of the top native, ancestral food and medicinal plants, selected according to ecological regions where the farms are located.
A rating system may includes
1) Nutritional Value
2) Popular Acceptance
3) Super Food
4) Drought Tolerant
5) Ease of Processing
6) Disease and Pathogen Resistant
8) Habitat Value
11) Nitrogen Fixing | <urn:uuid:6a93ca98-ef91-4c1d-ad4b-c49d08992c2b> | CC-MAIN-2020-29 | https://cngf.org/sulri/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655901509.58/warc/CC-MAIN-20200709193741-20200709223741-00045.warc.gz | en | 0.889734 | 480 | 3.203125 | 3 |
LI:To learn what a good and bad leader isThis week For kiwi can we had a new topic it was leadership.Leader means when a person in your team or group. The person that tells you what to do and encouraging you. We looked at what a bad and a good leader is.Our energiser was called hammer. We had to find a partner.With your hands you had to make a fist and put them on top of one and a another. When Miss Lilly said up if she said up the the persons fist that is at the bottom can goon the top and if she said down the person fist on the top has to put I at the bottom and if she says hammer! the person fist at the top had to smash there fist on top of the other persons fist if the person that was successful would find another partner and play with him or he.or lesson was called copy me in copy me we had to make three groups the person in the front was the leader. Miss Lily, Mr Mat, Mr O. Gave each group the same action then they tapped the person in front of them on there should and showed the action the team that at the end got the move right had won. | <urn:uuid:da029ad2-4e18-461c-813a-76c46521b03b> | CC-MAIN-2019-04 | http://tpsmojtabas.blogspot.com/2018/03/kiiwi-can.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583716358.66/warc/CC-MAIN-20190120123138-20190120145138-00298.warc.gz | en | 0.988483 | 247 | 3.3125 | 3 |
by Larry Cohen
When Florida Governor Rick Scott recently signed legislation barring doctors from asking about gun safety practices in the homes of their child patients, it sounded the alarm that physicians’ roles in community prevention are chronically misunderstood. Rather than restricting doctors’ options for involvement in prevention, we should be supporting and expanding them.
Community prevention is the creation of physical and social environments that support safe, healthful lives so that people don’t get sick and injured in the first place. The term covers a diverse set of measures, ranging from macro-level policies like including more fresh foods in school lunches, to community-level solutions like designing streets that support bikers and pedestrians, or engaging youth in extracurricular activities to prevent violence or drug abuse. Part of the challenge for community prevention advocates is that these critical solutions have not been integrated into conversations on health care, though they have a huge impact on our health.
Studies indicate that behavior and environment account for roughly 70% of our health outcomes. Genetics account for 20% and medical care, 10%. Yet 96% of our national health expenditures are focused on medical care, with only 4% dedicated to prevention. We have learned that our growing medical expenditures are not helping to stem the rapid growth of chronic disease in America, the cost of these illnesses to our economy, or the burden of these illnesses on our health care system. Prevention is part of the answer.
Doctors are skilled and experienced in some kinds of prevention—immunizations, wellness exams, and early detection of illness through screenings like mammograms, to name a few. But physicians are also critical and natural allies in the fight for community prevention. In fact, the skills needed to engage in community change are closely aligned with the problem solving skills doctors currently employ to address individual health needs. With patients, physicians follow a three-part process: collect data (symptoms, vital signs, tests, etc.), diagnose the problem, and develop a treatment plan.
These same skills can be applied to communities if clinics collect data on local health trends, review them periodically to determine root causes, and then support efforts to improve those conditions. Innovative approaches like these are already in use at St. John’s Well Child and Family Center in Los Angeles, where doctors engaged in community change after noting an increase in illness and injury related to substandard housing conditions. The clinic collaborated with other community leaders to secure local administrative policies and agreements that have improved landlord compliance with housing standards.
Doctors at St. John’s and other pioneers recognize that in order to comply with “doctor’s orders,” patients need supportive places to live, work, learn, and play. It would be difficult for someone to take his recommended daily walk when the nearest park is in the next city and his local sidewalks are in disrepair. A working mother of two won’t find fresh vegetables at a local corner store, but what where else can she shop if no grocery stores will open in her neighborhood?
America has a proud and successful history of physicians spearheading primary prevention measures because Americans regard them as the foremost authorities on health. Tired of treating injured infants, Tennessee pediatrician Dr. Robert Sanders pioneered the child safety seat law that paved the way for all states to reduce death and injury from motor vehicle crashes. Doctors’ expert testimony also played an important role in passing regulations that have significantly decreased smoking since 1965. Doctors are on the front lines, and their vigilance and expertise are essential to bolstering community prevention and incorporating it into American healthcare.
So how can we create more opportunities for clinicians to engage with primary prevention? It must start early on in training our future doctors. Simple changes, like the case studies chosen for review, can expose medical students to prevention thinking without adding bulk to a full curriculum. Schools like the University of California, San Francisco already use case studies that profile the patient’s family and neighborhood, teaching students to identify social and environmental factors that contribute to the patient’s illness or injury. These readings can be supplemented with opportunities to attend community meetings to learn the social and environmental context of what they’re seeing in the clinic. When community advocates and physicians work together to expand the American definition of health care, we can better prepare to face current and projected challenges to our health and safety.
Larry Cohen is founder and Executive Director of Prevention Institute, a national non-profit dedicated to improving community health and equity through effective primary prevention: taking action to build resilience and to prevent illness and injury before they occur.
Submit a guest post and be heard on social media’s leading physician voice. | <urn:uuid:1e59685f-ab0a-4c28-9215-53bacba1c090> | CC-MAIN-2017-04 | http://www.kevinmd.com/blog/2011/07/doctor-support-critical-fight-community-prevention.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282932.75/warc/CC-MAIN-20170116095122-00538-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.952715 | 941 | 2.75 | 3 |
October 26, 2017
Doctrine & Covenants and Church History Gospel Doctrine Lesson #40
"And after it had come forth unto them I beheld other books, which came forth by the power of the Lamb, from the Gentiles unto them."
1 Nephi 13:39
Modern revelation through prophets and apostles is our most valuable source of information about the scriptures. This revelation helps us to better understand each book of scripture and to apply their teachings into our own lives. However, there is another, less well-known, blessing of modern times that can also enrich our understanding of the scriptures. Since the 1840s, many ancient texts have been discovered that have shed light on our current scriptural canon. In fact, it’s possible that Nephi may have even seen some of these discoveries in his expansive vision of the future of his people.
During Nephi’s revelation, he saw that the Bible would come forth to Lehi’s descendants in the New World. After this, Nephi “beheld other books, which came forth by the power of the Lamb, from the Gentiles unto them” (1 Nephi 13:39). These books were meant to show the world “that the records of the prophets and of the twelve apostles of the Lamb are true” and also to “make known the plain and precious things which have been taken away” from the Bible (vv. 39–40).1
These verses clearly refer to the Book of Mormon,2 but it’s possible that they might also refer to records discovered by archeologists from the mid-19th through the 20th centuries. In 1844, for example, the German scholar Constantin von Tischendorf discovered a manuscript known today as the Codex Sinaiticus. This document, dating from the fourth century, became the oldest copy of the New Testament available at the time.3 This finding can be seen as the beginning of a flood of discoveries of lost records. In 1851 Sir Austen Henry Layard discovered the extensive library of the Assyrian king Ashurbanipal.4 These texts, written on clay tablets, helped to shed light on many aspects of the Old Testament.
In 1896, Agnes S. Lewis and Margaret D. Gibson gathered some manuscripts from another huge collection of texts in Egypt, called the Cairo Geniza, and brought them back to England. The Jewish scholar Solomon Schechter obtained as many of these manuscripts as he could (collecting more than two hundred thousand manuscript fragments) and spent the rest of his life studying them.5 Another collection of texts from Egypt, called the Nag Hammadi library, was discovered in 1945, shedding new light on the New Testament and early Christianity.6
Then, in 1947, a young shepherd named Jum'a Muhammed Khalil was looking for a lost sheep in a cave near the Dead Sea, when he stumbled upon a collection of ancient documents. He got two of his friends to help him look for more, and the three of them continued to find scrolls in the caves surrounding the Dead Sea.7 These texts, known today as the Dead Sea Scrolls, include the oldest known copies of the books of the Old Testament. They also help to shed light on what Judaism was like during the time of Jesus.8
All of these discoveries, along with the Book of Mormon, have meaningfully fulfilled Nephi’s prophecy. They help confirm “that the records of the prophets and of the twelve apostles of the Lamb are true,” and they also “make known the plain and precious things which have been taken away” from the Bible (1 Nephi 13:39–40).9
Because the Book of Mormon is composed of multiple books compiled together, it is possible that Nephi’s vision was just referring to the Book of Mormon when it referred to other records coming forth.10 It could also have been referring to books from the ten tribes that have not been discovered yet, records that Nephi mentioned would eventually come forth (2 Nephi 29:13). However, if Nephi was also referring to the records discovered in the 19th and 20th centuries through archaeology, then this is a reminder that “by small and simple things are great things brought to pass” (Alma 37:6).
One might naturally think of sweeping visions and grand miracles when considering the ways God will help people to understand His word in the last days. This is certainly how things happened in the case of the Book of Mormon and Joseph Smith’s other miraculous translations like the Book of Abraham and the Joseph Smith Translation of the Bible, including the Book of Moses. However, the stories of these archaeologists and scholars present a different picture. Solomon Schechter labored over thousands of fragments of ancient manuscripts, day after day, for many years11 According to one account, Constantin von Tischendorf pulled his famous ancient copy of the Bible out of the garbage in a monastery where they were about to burn it.12
It was through these small coincidences and the sometimes tedious work of a huge number of scholars over many years that we have gained so many priceless resources for understanding the Bible. Although many of them may not fully recognize it, their work is a testament to modern revelation.
James H. Charlesworth, who has spent his life working with these newly discovered texts, once spoke to Book of Mormon scholar John W. Welch about Nephi’s vision of future records (1 Nephi 13:39–41). "When was this written?" he asked. Welch said, "Well, about 550 B.C." Charlesworth replied, "No, not that. I meant, when was the Book of Mormon published?" Welch answered, "March, 1830." Charlesworth was amazed that any book written in 1830 could have ever predicted that so many documents were just about to come forth in the coming decades. This story is a reminder of the importance of these ancient texts—not only for the Bible, but for the Book of Mormon as well.
Andrew C. Skinner, “The Ancient People of Qumran: An Introduction to the Dead Sea Scrolls,” in LDS Perspectives on the Dead Sea Scrolls, ed. Donald W. Parry and Dana M. Pike (Provo, UT: FARMS, 1997), 1–45.
Hugh Nibley, Since Cumorah, The Collected Works of Hugh Nibley, Volume 7 (Salt Lake City and Provo, UT: Deseret Book and FARMS, 1988), 61–64.
Stephen E. Robinson, “Early Christianity and 1 Nephi 13–14,” in First Nephi, The Doctrinal Foundation, ed. Monte S. Nyman and Charles D. Tate Jr., Book of Mormon Symposium Series, Volume 2 (Provo, UT: Religious Studies Center, Brigham Young University, 1988), 177–191.
- 1. For more on the removal of plain and precious things, see Stephen E. Robinson, “Early Christianity and 1 Nephi 13–14,” in First Nephi, The Doctrinal Foundation, ed. Monte S. Nyman and Charles D. Tate Jr., Book of Mormon Symposium Series, Volume 2 (Provo, UT: Religious Studies Center, Brigham Young University, 1988), 177–191.
- 2. See Brant A. Gardner, Second Witness: Analytical and Contextual Commentary on the Book of Mormon, 6 vols. (Salt Lake City, UT: Greg Kofford Books, 2007), 1:242.
- 3. See Robert Davidson, “Tischendorf—The Man and the Library,” in Constantin von Tischendorf and the Greek New Testament, ed. Matthew Black and Robert Davidson (Glasgow, UK: University of Glasgow Press, 1981), 10.
- 4. See Charles Keith Maisels, The Near East: Archaeology in the “Cradle of Civilization” (New York, NY: Routledge, 1993), 44–45.
- 5. See Paul E. Kahle, The Cairo Geniza (London, UK: Oxford University Press, 1947), 6–8.
- 6. See Marvin Meyer and Elaine H. Pagels, “Introduction,” in The Nag Hammadi Scriptures, ed. Marvin Meyer (New York, NY: HarperOne, 2007), 1.
- 7. See Andrew C. Skinner, “The Ancient People of Qumran: An Introduction to the Dead Sea Scrolls,” in LDS Perspectives on the Dead Sea Scrolls, ed. Donald W. Parry and Dana M. Pike (Provo, UT: FARMS, 1997), 3–4.
- 8. For more on how the Dead Sea Scrolls have helped to clarify what things have been removed from the Bible, see Robert E. Parsons, “The Great and Abominable Church (1 Nephi 12–14),” in Book of Mormon, Part 1: 1 Nephi to Alma 29, Studies in Scripture, Volume 7, ed. Kent P. Jackson (Salt Lake City, UT: Deseret Book, 1987), 54.
- 9. For more on plain and precious things being removed from the Bible, see Hugh Nibley, Since Cumorah, The Collected Works of Hugh Nibley, Volume 7 (Salt Lake City and Provo, UT: Deseret Book and FARMS, 1988), 61–64.
- 10. See Joseph Fielding McConkie and Robert L. Millet, Doctrinal Commentary on the Book of Mormon, 4 vols. (Salt Lake City, UT: Bookcraft, 1987–1992), 1:104.
- 11. See Kahle, The Cairo Geniza, 6–8.
- 12. See Davidson, “Tischendorf,” 10–11. | <urn:uuid:aa56dfd9-9933-4bd5-9d3c-a818da0ae9bf> | CC-MAIN-2018-51 | https://knowhy.bookofmormoncentral.org/content/what-were-the-other-records-nephi-saw-in-vision | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823614.22/warc/CC-MAIN-20181211083052-20181211104552-00442.warc.gz | en | 0.936932 | 2,047 | 3.375 | 3 |
Cars are safer than ever before, yet drivers are still being injured at alarming rates. Why is that? We’re padded in balloon-like airbag compartments with crush zones and safety cages designed to absorb crash energy so our bodies won’t. Even our knees are protected by airbags in some vehicles! Yet there are still over 10,000 deaths from frontal crashes each year. Why? Small overlap frontal crashes.
Certainly there are unsurvivable crashes. That’s a given. But we can improve our vehicles even more in small overlap frontal crashes. What’s a small overlap frontal crash? It’s that thin slice of area to the left or right of the engine, where the front fenders are. The Insurance Institute for Highway Safety (IIHS) has designed a new crash test for that area and the majority of midsize luxury and near-luxury cars earn only marginal or poor ratings in this test. Only two IIHS 2012 Top Safety Pick cars, the Acura TL and the Volvo S60, earn Good ratings, while the Infinity G earns an Acceptable rating. The new test has 25% of the vehicle’s front end striking a 5 foot tall rigid barrier at 40 mph. The dummy used is the 50th percentile male Hybrid III. IIHS is currently the only entity performing the test.
Vehicle manufacturers, to this point, have designed vehicles that perform well for current frontal crash tests, meaning the crush zones protect occupants in head-on or offset collisions. There’s no structure on the edge of many vehicles for occupant protection, which is why small overlap frontal crashes are so deadly. In a 2009 IIHS study, nearly a quarter of the frontal crashes that involved serious or fatal injury to front seat occupants were due to small overlap crashes in vehicles that received good frontal crash ratings.
In a small overlap frontal crash, the crash forces go to the outside edges of the vehicle. The affected side’s wheel, suspension system, and firewall are pushed back. The A-pillar (the main pillar that holds your windshield and blocks your view) can be pushed back into the passenger compartment and footwells can be compromised. It’s also a gray area for airbags. Frontal airbags are designed to go off for this type of impact, but side and torso airbags may or may not deploy, depending on the algorithms some manufacturers use in adjusting their airbag sensitivity. Side airbags are generally designed to deploy when a vehicle is hit on the side, as when you’re T-boned. Because the steering column moved to the right in the Lincoln MKZ, the dummy’s head and chest completely missed the front airbag in one test.
Vehicle manufacturers will no doubt be quick to head back to the drawing board to work on new safety designs for this test. The IIHS tested luxury and near-luxury vehicles because they tend to have the latest and greatest safety items before more affordable vehicles. Top-selling vehicles, such as the Ford Fusion, Honda Accord, and Toyota Camry, will be tested next. | <urn:uuid:d234c491-81c2-447f-9a5f-0d30a17a888a> | CC-MAIN-2015-27 | http://carseatblog.com/date/2012/08/page/2/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096287.97/warc/CC-MAIN-20150627031816-00103-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.955991 | 638 | 2.53125 | 3 |
Core Data, originally introduced in Mac OS X 10.4 Tiger, is Apple's framework for object graph management and persistence. It provides one way for an application to implement the "model" portion of the model-view-controller design pattern.
Though Core Data has many features, the most important (and most relevant to iCloud) is that it provides a way for objects to persist even when they are not in memory, or when the application that created them is no longer running. Unsurprisingly, it does this by writing objects to disk.
The details of this process are mostly hidden from developers by the Core Data framework. There are actually a few choices for the storage mechanism, but most applications that plan to manage a large amount of data choose the SQLite-based back end.
iCloud and its accompanying expectation of simultaneous access to data from multiple hardware devices brings some considerable complications to the already complicated process of managing a graph of persistent objects.
Though Core Data does store information in files, the file-based versioning, conflict detection, and resolution techniques used for iCloud document storage are not going to cut it for Core Data. The files created on disk as part of a Core Data persistent object store cannot be versioned and mixed and matched like normal document files. And remember, the actual storage mechanism is supposed to be an implementation detail that's not visible to the developer anyway.
Instead, when Core Data is used with iCloud, conflicts are addressed on a per-record basis. For example, an address book created using Core Data may store information about hundreds of people using only a few large database files on disk, but the conflict detection system will view each person's contact information as an individual record.
As with document storage, iCloud will detect conflicts and automatically choose a "winner." Core Data goes one step further and provides automatic three-way merging of records. It can do this because, unlike the document storage API, Core Data has intimate knowledge of the structure of the data that it's storing; it deals with records, fields, and relationships, rather than opaque binary blobs.
Applications will receive notifications of changes as they become available in the cloud. They can choose how to integrate those changes, perhaps using more sophisticated merging logic. The same goes for duplicate records, where the same information was added from multiple devices. According to Core Data's record ID assignment, two "identical" records may appear to be distinct. It's up to the application to decide whether they're really the same (e.g., if the first and last names are the same in both records) and how to handle the situation.
As you might imagine, Core Data databases can get quite large. Again, Core Data's knowledge of the structure of the data comes to the rescue, allowing it to formulate and transmit just the incremental data changes over the network. Similarly, Core Data's explicit information about its data schema allows iCloud to hold on to incompatible changes (e.g., data entered in a newer version of an application that has no home in the data schema for an older version) and push them down only when the schema on the receiving device is compatible.
Why bother describing these three different mechanisms for iCloud data storage? The first reason is to highlight how much work Apple has done to make cloud data storage easier for developers. The three different storage systems attempt to provide just the right amount of sophistication for the task at hand. Having to wrangle something as complex as Core Data just to store a few user preferences would be silly. And neither the primitive Key Value Storage system nor the database-backed Core Data engine is a good fit for traditional document storage.
These various iCloud frameworks and associated daemons also handle all the pesky details like detecting when a network connection is available or when a device has switched its connection (e.g., from WiFi to 3G), propagating changes even when applications are not running and reducing bandwidth usage by carving up data into smaller chunks and transmitting only the parts that have changed.
Despite all this, believe me when I tell you that this brief overview of three ways to store data using iCloud barely scratches the surface of the issues involved. To provide just one example that you may not have thought of, what happens if a user signs out of one iCloud account and signs into another one while an application is running? And what if that application was in the middle of being notified about and handling the merge of some modified data in the cloud?
The number of ways things can go terribly wrong for iCloud-enabled applications is astronomical. Apple has done a commendable job of creating the iCloud data storage APIs and the back-end service itself, but even if we assume these things have zero bugs, it's still up to application developers to use these new APIs correctly.
All of this is true of any new, complex framework, but it bears specific contemplation in the case of iCloud due to the pervasiveness of the service. As we'll see in the next section, Apple is pushing iCloud hard in Mountain Lion. | <urn:uuid:a43614a4-7c91-49ce-b572-ca4ee84741ef> | CC-MAIN-2017-04 | http://arstechnica.com/apple/2012/07/os-x-10-8/11/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280292.50/warc/CC-MAIN-20170116095120-00053-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.92651 | 1,017 | 3.09375 | 3 |
Say No to Slavery
The Narrative of the Life of Frederick Douglass details the hardships Frederick Douglass went through as a slave before his escape to freedom. Douglass wrote the autobiography of his life to persuade people that the abolition of slavery was necessary, and this book served as a catalyst for a fundamental change in society during the antebellum period. As a slave, Frederick Douglass witnessed the dehumanization of slavery that the only crime was to be born of the wrong color. In his narrative, Douglass offered the readers with abundant information of the pain, sufferings the slaves went through, the brutality, immorality and evil of the slave-owners, and how he fought for his future through obtaining an education by himself. Although some arguments suggest that the slavery system produced enormous wealth for the world, generated prosperous economies, and accelerated scientific and technological developments, the terrifying physical abuses, the destructive psychological damages it brought to African American people, and the lingering racial prejudice as a result of slavery far outweigh any benefits realized.
First, the life of slaves was not easy. The physical destruction caused by both living condition and slaveowners was deplorable. They were treated badly by the plantation owners: whipped, beaten, sometimes starved and even murdered. Slaves got very few clothes through the years, and these garments were especially not warm enough for winter. As Douglass described, in the winter, he was kept almost naked - “no shoes, no stockings, no jacket, no trousers, nothing on but a coarse two linen shirts, reaching only to my knees… My feet had been so cracked with the frost…” (230). According to Douglass, this entire apparel could not have cost more than seven dollars per year. However, children got even less. Since they did not work in the field, they did not get shoes, stockings, jackets or trousers. They were only given two linen shirts per year, and if these failed to last the entire year, they ran around naked. This awful description creates empathy for mistreated children whose only “crime” results from birth to mothers with black color. Furthermore, in the most dehumanizing comparison, Douglass used animal imagery to reveal the conditions in which the children were fed. Douglass wrote: “The children were then called, like so many pigs, and like so many pigs they would come and devour the mush; some with oyster shells, others with pieces of shingle, some with naked hands, and none with spoons” (230). Essentially, the slave children were fed in the same manner as animals. These descriptions create vivid pictures of the inhumane treatment of slave children and the slave-owners made them perform the animal-like behaviors in order to survive in the cruel plantation life.
Second, slavery also caused psychological damage on slaves which will last for a lifetime, such as the brake... | <urn:uuid:50eb1fc3-203f-4f69-88af-d37f02513153> | CC-MAIN-2023-06 | https://ostatic.com/essays/the-narrative-of-the-life-of-frederick-douglass-baruch-eng2850-essay | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500074.73/warc/CC-MAIN-20230203185547-20230203215547-00570.warc.gz | en | 0.975868 | 609 | 3.875 | 4 |
Education initiatives may be directed toward the general public, as a form of awareness raising and information campaigns, or toward women and girls who are vulnerable to being trafficking. There are a number of ways that information can be disseminated to the public- through press conferences, media campaigns, public service announcements, distribution of informational leaflets, documentary films and email and the Internet, for example.
Regardless of the manner in which information is conveyed to the public, an effective anti-trafficking campaign should take into consideration both the audience and the message that is to be conveyed. The U.S. National Advisory Council on Violence Against Women has developed a Toolkit To End Violence Against Women which contains concrete guidelines to NGOs, community and policy leaders who are working to end violence against women in all forms. While the toolkit does not address trafficking specifically, it does include a chapter on Educating and Mobilizing the Public About Violence Against Women with guidelines and action items on public education.
The United Nations Development Fund for Women (UNIFEM), in cooperation with the Media Materials Clearinghouse (Johns Hopkins Center for Communications Programs), has published a compilation of materials, Picturing a Life Free From Violence: Media and Communications Strategies to End Violence Against Women that includes sample campaigns developed around the world to address trafficking and commercial sexual exploitation. More information about and guidelines for working with the media can be found in the training section.
Much of the work in the area of education has been directed to providing women and girls who are at risk of being trafficked with information about potential dangers. Advice and information can be disseminated through leaflets and brochures, lecture or video presentations or through educational programs in schools and universities. La Strada Bulgaria has created a set of guidelines called "Things to Think About for Women and Girls Who Decide to Work Abroad," . The U.S. Department of State created a brochure titled, Be Smart, Be Safe, which includes information for women on how they can protect themselves when they travel to and work in the U.S. The promotion of vocational training and general education for girls is another tactic to reduce women's vulnerability to being trafficked.
Many NGOs also operate telephone hotline services, both for victims of trafficking and also to provide information to women and girls who are considering traveling abroad for work purposes. More information about the creation of a telephone hotline and training of hotline staff can be found in the training section as well as the Community Education pages of the advocacy section.
The Advocates for Human Rights Site Map About the Site
330 Second Avenue South, Suite 800, Minneapolis, MN 55401 USA Phone: (612) 341-3302 Fax: (612) 341-2971 Email: email@example.com
Although Stop Violence Against Women endeavors to provide useful and accurate information, Stop Violence Against Women does not warrant the accuracy of the materials provided. Accordingly, this Web Site and its information are provided "AS IS" without warranty of any kind, express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular use or purpose, or non-infringement. Some jurisdictions do not allow the exclusion of implied warranties, so the above exclusion may not apply to you. We reserve the right to make improvements and/or changes in the format and/or content of the information contained on the Web Site without notice.This information is provided with the understanding that Stop Violence Against Women and its partners are not engaged in rendering legal or other professional services. If legal advice or other expert assistance is required, the services of a competent professional should be sought.
Copyright © 2010 The Advocates for Human Rights. All rights reserved. Permission is granted to use this material for non-commercial purposes with proper attribution to The Advocates for Human Rights. | <urn:uuid:83a5539e-c9b5-424c-bd10-ce61f37cac2e> | CC-MAIN-2014-23 | http://www.stopvaw.org/Education_and_Awareness_Raising | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270528.34/warc/CC-MAIN-20140728011750-00495-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.932103 | 772 | 3.40625 | 3 |
This past week marked National Eating Disorder Awareness Week, a week dedicated to preventing eating disorders and body image issues by increasing awareness and treatment options, and decreasing the stigmas attached.
Millions of people suffer with eating disorders in the United States. Though typically seen as only affecting females, males make up 15% of clients with anorexia or bulimia, and about half of clients with binge eating disorder.
There are three main types of eating disorders, though there are multiple combinations of symptoms that may be classified as eating disorders not otherwise specified.
Anorexia nervosa is a serious, potentially life threatening eating disorder marked by self-starvation and excessive weight loss. There are four main symptoms of anorexia: resistance to maintaining minimal body weight at or above normal for one’s ages and height; disturbance in body image; intense fear of gaining weight; and loss of menstrual period in girls and women post-puberty. The majority of those who suffer with anorexia are girls and women. Anorexia has the highest mortality rate of any mental health condition.
Bulimia nervosa is a serious, potentially life-threatening disorder characterized by cyclical and recurring pattern of binge eating followed by compensatory behaviors such as laxative or diuretic abuse, self-induced vomiting, or over-exercising. The three main symptoms of bulimia are: regular intake of large amounts of food with the feeling of a loss of control over eating behavior; regular use of extreme compensatory behaviors such as over-exercising, laxative abuse, or self-induced vomiting; and extreme concern of body weight and shape. People struggling with bulimia are typically of average body weight, and the majority of sufferers are female. Bulimia can lead to health consequences such as esophageal rupture, electrolyte imbalances, and chronic irregular bowel movements.
Binge-eating disorder is the most prevalent eating disorder in the US. While it is currently classified as an eating disorder not otherwise specified, binge eating disorder is currently being considered as its own diagnostic category in the Diagnostic and Statistical Manual of Mental Disorders V. Binge eating disorder is characterized by four main symptoms: recurrent episodes of eating large quantities of food in short amounts of time; feeling out of control over the eating behavior; feeling disgusted and ashamed by the eating; and other indicators such as eating in secret and eating when not hungry. Estimates show that about 40% of the sufferers are male, while 60% are female. There are serious potential health problems related to binge eating disorder such as diabetes, high blood pressure, high cholesterol, heart disease, and gallbladder disease.
Those with eating disorders often have dual diagnosis with other mental health disorders such as depression, anxiety, substance abuse, obsessive-compulsive disorder, and self-injury. Because of the complex nature of eating disorders, treatment must be comprehensive and thorough. Most sufferers will need, at the very least, a combination of individual therapy, group therapy, a 12 step support group and a dietitian. Clients often find the most success in finding an inpatient or residential treatment center – safe environments in which to focus on learning healthy eating behaviors.
If you or someone you know struggles from an eating disorder, please don’t hesitate to contact The Way Out for more information. We are here to help you find the best treatment available for you or your loved ones. | <urn:uuid:d9e6be71-3759-47db-a93a-ec6621896d64> | CC-MAIN-2017-39 | http://thewayoutrecovery.com/blog/2013/02/28/information-on-eating-disorders/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689661.35/warc/CC-MAIN-20170923123156-20170923143156-00360.warc.gz | en | 0.953466 | 702 | 3.65625 | 4 |
Mossman Commemorative Air Raid Cairn
The memorial is a cairn made up of several large rocks on a concrete base. Steps lead up from the road with white hand rails and a white rail behind the cairn. There is a sculptured aerial bomb position on the top of the memorial.
JAPANESE AIR RAID ON DOUGLAS SHIRE - 1942
At 3.30 a.m. on 31/7/42, a Japanese aircraft dropped eight bombs in this Shire, one landing fifty metres directly behind this point. Carmel Zullo aged 2 1/2 years was asleep in the home
of her parents when the bomb exploded nearby.
Shrapnel pierced the iron walls of the house, one fragment grazing Carmel's skull. She was the only civilian casualty inflicted by the enemy on the Eastern Australian mainland throughout
World War 2.
This plaque was unveiled by Mrs. Carmel Emmi (nee Zullo) on 31/7/92 at a public ceremony to commemorate the attack, fifty years later.
- Conflicts commemorated
- Second World War, 1939–1945
- Memorial type
- Recorded by
- Dennis Stocks/Sally Barnes, RSLA Mossman
- Date recorded
- 27 February 2009 | <urn:uuid:d77e4b65-ecd2-4300-996b-b1ad4b32b6df> | CC-MAIN-2020-16 | https://www.qldwarmemorials.com.au/memorial?id=866 | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371604800.52/warc/CC-MAIN-20200405115129-20200405145629-00056.warc.gz | en | 0.922727 | 267 | 2.59375 | 3 |
Watering Plants – Tips and Techniques
Watering plants properly keep them vibrant and healthy. Both
over-watering and under-watering can lead to poor plant health,
decline, and possibly death.
Signs of over watering include wilting, yellow leaves, floppy stems,
and evidence of mold growth on the soil surface.
Under watering signs are more obvious. Signs include dry soil – if
plant is potted, soil will pull away from the sides of the container.
Foliage and flowers will show signs of dryness and wilting.
House Plants – Keeping Them Healthy
Remember, the amount and frequency of watering depends on
such as species, size, location, and soil mix.
The watering instructions included with the plant you purchase might be
generic. Take the time to research the specific needs of the plant. An
abundance of information regarding plant care and watering plants is
If you prefer having the information at your fingertips, consider
buying a book devoted to house plant care.
Basic Watering Tips for House Plants
- Pots should have adequate drainage (usually a hole in the
bottom of the pot).
- Check moisture by sticking your finger into the soil up to
the first joint. If the soil is almost dry at your fingertip, it’s time
to water the plant.
- Water the plant until water runs out the bottom of the pot.
This will flush out excess salt build-up as well as ensure the bottom
of the pot receives sufficient water.
- Do not let the pot sit in standing water, this can cause
for Watering Outdoor Plants
As with house plants, the amount and frequency of watering
outdoor plants depends on species, size, location in the garden or
landscape, and soil conditions. Follow these general guidelines for
water outdoor plants:
- Water the soil around the roots of the plant. Soil should
be moist, but not soggy.
- Take enough time to ensure the water soaks into the soil to
reach the bottom of the plant roots. Shallow watering can limit root
growth and survival.
- The best time to water outdoor plants is during moderate
temperatures and calm winds. Water is less likely to evaporate, freeze,
or be blown away from the soil.
Tools that Make Watering
Plants Effortless and Enjoyable
A garden hose is an essential tool for watering chores in the garden
and landscape. Purchase a high quality garden hose that is 4-6 ply in
thickness, and equipped with brass fittings. Garden hoses come in a
variety of lengths – be sure to know the distance requirements before
you purchase the hose.
A watering wand is ideal for watering seeds, young plants, and
hard-to-reach locations (such as hanging baskets). Water flows through
the nozzle in a soft shower, making it easy to water delicate plants
and flowers. High quality watering wands come in a variety of lengths
and are equipped with brass shut off valves.
A watering can is a portable container, usually equipped with a handle
and spout, used watering plants and flowers by hand. They are available
in a variety of styles and materials. Some styles are equipped with a
circular filter at the end of the spout that breaks up the stream of
water. Water cans typically made out of metal, ceramic, or plastic.
Water Hose Nozzles
Water hose nozzles allow you to adjust the water flowing from the
garden hose. The spray pattern can be narrow or wide, water pressure
can be hard or soft. Water hose nozzles are available in a variety of
styles and materials.
A root irrigator sends water and air to the hard to reach roots of
trees and shrubs. This allows roots to receive improved aeration and
better absorption of fertilizer. The root irrigator is attached to a
garden hose, and then inserted into the ground near the root source. | <urn:uuid:96a7ac09-1daf-4b41-b0b2-3a712b21693f> | CC-MAIN-2018-05 | http://www.tropical-plants-and-flowers-guide.com/watering-plants.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889542.47/warc/CC-MAIN-20180120083038-20180120103038-00798.warc.gz | en | 0.90246 | 840 | 3.484375 | 3 |
The children (and I) have been working our way through a hands on project while we look more closely at European Exlorers to New Zealand between the 1600 & 1800's.
I was wanting the exercise to be a geography based one. New Zealand geography, and so creating a map each - along with a concertina lapfold - while we read and discussed our way through this topic in history seemed like a good idea.... to me :)
Using enlarged maps of each island we blacked out the reverse side of the maps outline with a 6b sketch pencil (cellotaping the printed side of the A4 sheets to the ranchslide works as an excellent lightbox).
We then lined up each map, one after the other, with the blacked side onto the sketch paper and Bobs and Daisy proceed to 'reprint' their own maps, Bobs is working on retracing the South Island, below.Once the maps were made Bobs and Daisy have been working on detailing in key points of geography that relate to our European Explorers and New Zealand study. We are using Builders of New Zealand (OOP) as our spine - but have found some good literary sources on the internet that have made certain explorers and events surrounding them spring to life. Bobs (11 & 1/2) is able to work through this study pretty much on his own and I'm giving Daisy (9 & 1/2) the occasional hand, where needed.For anyone interested in having a look at that study you can find our pages over at hslaunch:
Hands-on-Craft & Study: European Explorers to New Zealand 1600 - 1800
And for those looking for extra NZ history books to enjoy we've listed some, in pdf format, we use and like in a link at the top of our blog. | <urn:uuid:d61ae93b-42a6-4dc5-bf44-a33a52a54b5b> | CC-MAIN-2023-06 | http://www.last-in-line.info/2011/08/european-explorers-to-new-zealand-1600.html?showComment=1314407711203 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500041.18/warc/CC-MAIN-20230202200542-20230202230542-00532.warc.gz | en | 0.961455 | 373 | 2.75 | 3 |
Definition - What does Cloud App mean?
A cloud app is an application that operates in the cloud. Cloud apps are considered to be a blend of standard Web applications and conventional desktop applications. Cloud apps incorporate the advantages of both Web and desktop apps without absorbing many of their drawbacks. Similar to desktop apps, cloud apps can provide offline mode, rich user experience and instant responses to user actions. Similar to Web applications, there is no need to install cloud apps on a computer. Updates can be done at any time by simply uploading a newer version to the Web server. Cloud apps also store data in the cloud.
Techopedia explains Cloud App
Cloud apps do not consume hefty amounts of storage space in the user's communication device or computer. If the user has a fast Internet connection, an efficient cloud app can offer the interaction of a desktop application together with the portability of a Web application.
Anyone with a browser, an Internet connection and a communication device can easily access and use cloud apps. Although the tools are present and could be revised in the cloud, the original user interface is present in the local device. The users are able to cache data locally, which enables full offline mode when required. Cloud apps, unlike Web apps, can be used offline even when there is no wireless access or during temporary Internet outage. In addition, cloud apps can offer some functions even when there is no Internet connection present for prolonged periods, for example, when camping in a remote wilderness.
Join thousands of others with our weekly newsletter
The 4th Era of IT Infrastructure: Superconverged Systems:
Approaches and Benefits of Network Virtualization:
Free E-Book: Public Cloud Guide:
Free Tool: Virtual Health Monitor:
Free 30 Day Trial – Turbonomic: | <urn:uuid:64bcfe05-7267-4507-a52e-54515eddae88> | CC-MAIN-2017-13 | https://www.techopedia.com/definition/26517/cloud-app | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189771.94/warc/CC-MAIN-20170322212949-00121-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.90134 | 360 | 3.171875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.