text stringlengths 222 548k | id stringlengths 47 47 | dump stringclasses 95 values | url stringlengths 14 7.09k | file_path stringlengths 110 155 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 53 113k | score float64 2.52 5.03 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|
There are a lot of heavily technical terms that get used around computer security. Many of them can be a bit hard to explain in a simple manner, so they often get used incorrectly. One of the most frequently (and painfully) misused groups is the terms that differentiate malware from other types of vulnerabilities and threats. I thought I'd clear up the confusion by explaining what malware, trojans, viruses, and worms are and how they're different from one another.
Don't forget to protect your Mac from viruses, malware and everything in between: Download Mac Internet Security X8 and get protected today.
Here’s the basic definition for all the terms we’ll discuss here:
This is a big catchall phrase that covers all sorts of software with nasty intent. Not buggy software, not programs you don’t like, but software which is specifically written with the intent to harm.
This is a specific type of malware that spreads itself once it’s initially run. It's different from other types of malware because it can either be like a parasite that attaches to good files on your machine, or it can be self-contained and search out other machines to infect.
Think of inchworms rather than tapeworms. These are not parasitic worms, but the kind that move around on their own. In the malware sense, they're viruses that are self-contained (they don’t attach themselves like a parasite) and go around searching out other machines to infect.
Do you remember that story you had to read in high school about the big wooden horse that turned out to be full of guys with spears? This is the computer equivalent. You run a file that is supposed to be something fun or important, but it turns out that it’s neither fun nor important, and it’s now doing nasty things to your machine.
Funny thing about software: it’s written by humans. Humans are fallible and sometimes forget to cross t's and dot i's. Sometimes those mistakes create strange behavior in programs. And sometimes that strange behavior can be used to create a hole that malware or hackers could use to get into your machine more easily. That hole is otherwise known as a vulnerability.
The strange behavior that can be used to create a hole for hackers or malware to get through generally requires someone to use a particular sequence of actions or text to cause the right (or is that wrong?) conditions. To be usable by malware (or on a larger scale by hackers), it needs to be put into code form, which is also called exploit code.
So, how do these definitions play out in real life?
Malware is the big umbrella term. It covers viruses, worms and Trojans, and even exploit code. But not vulnerabilities or buggy code, or products whose business practices you don’t necessarily agree with.
Malware = umbrella term.
The difference between malware and vulnerabilities is like the difference between something and the absence of something. Yeah, okay, that’s a bit esoteric. What I mean is malware is a something. You can see it, interact with it, and analyze it. A vulnerability is a weakness in innocent software that a something (like malware or a hacker) can go through.
Flashback is an example of malware that exploited a vulnerability to take over people’s machines. The authors slipped malicious exploit code into otherwise-innocent websites, and this code utilized a vulnerability within Java in order to silently install itself.
Virus is a slightly smaller sort of umbrella term that covers anything that spreads itself without additional human intervention beyond that first double-click.
Virus = smaller umbrella.
It could spread parasitically, meaning the virus code attaches itself to otherwise-innocent files, and keeps infecting more and more files whenever that infected file is run. Viruses can either be destructive (including spying behavior) or they could just be intended to do nothing other than to spread. Non-destructive viruses are pretty rare these days, as everything has become financially motivated.
A virus requires the presence of those innocent files in order to spread. The other scenario is that it could spread as a static, self-contained file. The self-contained file sends itself through shared network connections, by attaching itself to emails or IMs, or even just by sending a link in email or IM to download the file. In this latter, static case, the specific type of virus is called a worm.
Worms are no fun.
The difference between a worm and a Trojan is a tricky one that may not seem to matter much if you’re the one being affected. If you got infected with the Melissa email worm way back when, you may remember the difference: you don’t have to worry about just your own machine getting messed up, now you have to worry about those first 50 people in your email address book who’ve now just been sent a copy. (Those people are probably gonna be pretty righteously peeved at you.)
Trojans really have only one purpose, and that is to cause damage.
Don't be fooled!
They often have identical destructive functionality to some viruses; they just lack the ability to spread on their own. Trojans must be planted somewhere people are likely to run across them (like Flashback), or they must be sent directly (like in a targeted attack such as Imuler). This confusion is what leads some people to refer to things as “Trojan viruses,” even though those two terms are mutually exclusive.
Hopefully that clears things up a bit! If you have any questions about malware, trojans, viruses, and worms, drop them in the comments.
Now that you know the difference between each malware, it's time to take action!
Protect your Mac from all known malware: Download Intego VirusBarrier today! | <urn:uuid:04bcf8ca-e26f-4709-a02f-d257d81e2e95> | CC-MAIN-2016-50 | https://www.intego.com/mac-security-blog/whats-the-difference-between-malware-trojan-virus-and-worm/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542932.99/warc/CC-MAIN-20161202170902-00429-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.950408 | 1,212 | 3.203125 | 3 |
Since their first use during the Gulf War by the US and the UK, Depleted Uranium Weapons (DU) have been deployed as well in Bosnia, Serbia and Kosovo, and again in the war in Iraq by the US and the UK in 2003. There is also a suspicion that the US used DU in Afghanistan in 2001, however this is denied by the government. DU is mostly used in armour piercing munitions because of its very high density but as it is toxic and radioactive, it produces an oxide dust while burning. This dust can be inhaled and retained by the lungs which leads to uranium deposits in the lymph nodes, bones, brain and testes. A sharp increase in breast cancers and lymphoma as well as birth defects has been observed in the countries in which DU has been used.
To this date, there is no treaty regulating DU weapons. The treaties on biological and chemical weapons as well as the 1925 Geneva Gas Protocol are not relevant as the toxic effect of DU is secondary, unlike the other weapons banned by these treaties where it is the primary character. The DU weapons must therefore be banned explicitly.
Yet, International Humanitarian Law prohibits weapons that cause unnecessary suffering, have indiscriminate effects or cause long-term damage to the natural environment and therefore theoretically should apply fully to the use of DU weapons. In this spirit, several UNGA resolutions about the harmful character of DU have been adopted but do not constitute treaty law.
For these reasons and precautionary obligations, States should uphold a moratorium phase and refrain from using DU weapons. More scientific studies should be made and a treaty process should be launched leading to a total ban on these weapons.
International Coalition to Ban Uranium Weapons (ICBUW)
International Physicians for the Prevention of Nuclear War (IPPNW) | <urn:uuid:d6764a8a-285f-4cb4-a005-f5eeaa519aec> | CC-MAIN-2017-26 | http://www.ipb.org/depleted-uranium/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320443.31/warc/CC-MAIN-20170625064745-20170625084745-00532.warc.gz | en | 0.95037 | 360 | 3.234375 | 3 |
Traditional Rhymes, Songs and Stories
In Y3 and Y4 the children have used traditional tales and nursery rhymes to develop their knowledge.They explored the patterns and sounds of the language and showed they understood by responding and joining in collectively.
During lessons the children looked at the phonemes that make up the new vocabulary of the lesson. They were able to see how sounds that were familiar to them in English were pronounced differently in French and how the addition of an accent changed the sound of a letter.
Multi Cultural Week - MFL French
During this special themed week in school, the focus in MFL has been to raise the children's awareness of Francophile countries, thus ensuring that they understand the extent to which French is spoken across the world.
In Y6 for example, the children read the poem 'Homme de Couleur' by Jérôme Ruillier (adapted from an original by Léopold Sédar Senghor).Senghor was a poet and writer, but was perhaps more well known for his presidency of the country of Sénègal. The poem compares the similarities and differences of people of colour with white people. It links colour to events and emotions throughout life. The children have produced their own 'hommes de couleur'.
Y5/6 - Building a variety of sentences
Peregrine class children researched French artists (KS2 curriculum requires that "pupils should be taught about great artists, architects and designers"). They then used a writing frame to select appropriate phrases and choose correct verb endings. Some children substituted proper nouns for pronouns.
European Day of Languages 2019
As part of our KS2 curriculum and to link with this special day, children from Kestrel class have been learning about 'Les Pays Francophone'. They studied a world map to help them understand that French is spoken not only in France, but also in countries which are spread across the continents.
MFL Day - A Day to Celebrate France
St. Mary's held their first MFL Day in Summer Term to celebrate and educate the children about France. With the kind assistance of local supermarkets Asda, Morrisons and Iceland, we offered the children a French breakfast.
Each class then spent the day discovering French landmarks, researching French culture and food, practising their learnt language skills, playing Loto and trying to emulate the famous artists Matisse, Monet and Seurat.
Our photographs show what a great time the children had, the day brought their learning to life and celebrated the language and culture of our focus MFL.
The children in Year 6 have been learning about Bastille Day, the national day of France. They learnt about the storming of the Bastille in 1789 and how the people of France rebelled against the powers controlling the country. This is in preparation for our own special day, celebrating France at St. Mary's School, which takes place on July 2nd.
Using Verbs (Aimer - to like)
Ringgold Class have been learning about different ways to say 'I Like'. They have already used 'j'aime' (I like) and now are extending their skills to use the other parts of the verb. The children used given key vocabulary to complete the sentences. Some children challenged themselves by writing their own sentences, sometimes even adding a simple conjunction. Well Done!
Developing written skills
Following on from the work on colours and body parts. The children are now using the vocabulary they have learnt to say, in written sentences. They are starting to recognise the written French and thinking about the correct word order.
Recognising Body Parts
Year 2 and 3 have been learning to recognise the parts of the face and body. They played 'Simon dit' (Simon Says) to help them learn the words. They joined in with a familiar song, the French version of Head, Shoulders, Knees and Toes using actions to support learning. Finally they looked at the written words and labelled a drawing of the face.
Starting to use adjectives - Extra Terrestrial Monsters
Ringgold Class (Y4/5) have started to look at adjectives. They have learnt about how they have to be altered depending on the gender of the accompanying noun. They are learning that sometimes the position of the adjective changes. To accompany their topic 'Earthlings' some of the children have designed their own extra terrestrial and added a simple description.
Months and Dates
Years 2 and 3 have been learning about days of the week and months of the year. They have learnt simple songs to help them remember the vocabulary. They have ordered the months of the year and can now recognise their own birthday months. The children made party invitations using this new vocabulary.
During our weekly 'Skill Up!' sessions, the children have the opportunity to participate in French in a fun, sometimes more artistic way. Preparing for learning about how Christmas is celebrated in France, the children have started to make vocabulary cards. Using a snowman template, they made a concertina of festive vocabulary, which they inserted to make an attractive card. For a fun finale they each made a 'chatterbox' to use when practising the new vocabulary at home.
Year 2 - Greetings
In MFL, Year 2/3 have been learning different language to greet each other. Justin has made a colourful card to introduce himself.
European Day of Languages 2018
The European Day of Languages is celebrated each year on 26th September. This year, to raise the children's awareness of our place in Europe, we have given each child in Ringgold and Van Gogh classes a 'child-friendly', poster size map of Europe. Please share these colourful resources with your child and take the opportunity to look at our photographs of EDOL activities.
Skill Up - French!
This week has seen us begin our Skill Up sessions on Fridays. Children from the Key Stage 2 classes chose to come together to gain a wider appreciation of French. During our sessions we will be playing games like Bingo and Happy Families. We hope to take the opportunity to learn songs, discover something about French culture and generally make French fun to learn. Take a look at our first set of photos. The children had a great time playing animal bingo.
Year 4 Writing - Carnival of the Animals
A selection of Year 4 writing. Children have written sentences and included adjectives to describe colour or characteristics of their animals.
Year 6 Writing
Examples of sentence work to complement En Ville. Children have been making statements and comparisons about their town nowadays and from a period in the past.
French Club 2018
Spring 1 has seen the start of our after school MFL Club. Here you can see the pupils meeting our tutor, Madame Montanaro, for the first time.
Week 1 winner - Summer Dean of Lovelace Class, who received the medal for super participation.
Week 2 winner - Keeley Robinson, who showed great number knowledge.
Week 3 winner - Harvey Witter who is gaining much more confidence with the spoken language.
Week 4 winner - Harry Wright for brilliant military style alphabet knowledge.
Week 5 winner - Kali Oakley for showing greater confidence with French.
Week 6 winner - Sky Hogan for brilliant understanding and recall of French body parts.
Week 7 winner - Izzi-Belle Rogers for speedy recognition and recall of new French vocabulary.
Building more complex sentences
Year 5 children begin to recognise word order and include connectives to build both simple and more complex sentences. This activity took place in our topic Les Planètes
Working with larger numbers
Following on from our En Ville unit, Y6 children have been introduced to larger numbers. They have worked together to order them correctly. Played dominoes to help them recognise which words matched the digits and played speaking games to practise the new vocabulary.
Coming Soon - Spring 2018 - MFL After School Club
Beginning in January 2018 we are pleased to offer an After School Club for modern languages. In partnership with the Karen Rich Foundation, KS2 children will be able to build on the language learnt in class in our weekly French club.
Cross Curricular MFL
Y5 topic for Spring 2018 is Earthlings. We took the opportunity to make cross curricular links with MFL as the Y5 Unit is The Planets.
The children worked on writing simple, and then more complex sentences. They have included correctly placed adjectives (colour, size, temperature, movement and distance from the sun) and simple conjunctions.
Following a Recipe
Year 5 have been looking at sentence building and paying particular attention to word order. Using scrambled recipes they put the instructions for Christmas biscuits in chronological order and identified imperative verbs.
Fiction and Non-Fiction Texts
Giving the children opportunities to enjoy both fiction and non-fiction texts.
Using dual language books and familiar story texts.
Learning about the location of countries throughout the world where the French language is spoken.
Sampling produce from France, the children begin to look at similarities and differences between our two countries.
Reading and understanding a range of familiar written phrases
Matching phrases and short sentences to pictures, using memory games.
Easter - Pâques
Year 4 children learning about how another culture celebrates Easter and comparing this with our own.
Looking at French Christmas Traditions and Comparing Cultures
The children look at the differing traditions and celebrations in France and compare them to our own. They learn that St. Nicolas and Père Fouettard play an important role delivering their 'gifts' to French children. They also learn about the dates that are important in French culture during the Christmas period, including La St. Sylvestre and Le Reveillon.
Quel temps fait-il? (What is the weather like?)
Children make use of props, picture flashcards and vocabulary cards to reinforce their language learning about the weather. | <urn:uuid:455dc324-47e1-4a45-9f4f-10a64ba77980> | CC-MAIN-2020-34 | https://www.st-marys-fleetwood.lancs.sch.uk/mfl/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739048.46/warc/CC-MAIN-20200813161908-20200813191908-00261.warc.gz | en | 0.953772 | 2,039 | 4.1875 | 4 |
Good Decision Making
What kind of person is best able to involve others and himself in good decision making? J. Keith Louden lists seven qualities:
1. The ability to look ahead and see whats comingforesight.
2. Steadiness, with patience and persistence and courage.
3. A buoyant spirit that in spite of cares generates confidence.
4. Ingeniousness, the ability to solve problems soundly yet creatively.
5. The ability to help others.
6. Righteousness, the willingness to do the right thing and speak the truth.
7. Personal morality of a quality that commands the respect of others** | <urn:uuid:e65fde0d-d7f9-40eb-b296-59f2cebc85ae> | CC-MAIN-2016-18 | https://bible.org/illustration/good-decision-making | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860117244.29/warc/CC-MAIN-20160428161517-00198-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.89248 | 134 | 2.703125 | 3 |
CHICAGO -- Children with brain tumors had stable cognitive function with proton irradiation, whereas photon radiotherapy was associated with significant decline in IQ, a retrospective study showed.
IQ of children treated with proton irradiation averaged 99.8 before treatment and 98.0 afterward. By comparison, children began photon irradiation with a mean IQ of 90.6, which declined to 86.6 by the end of treatment, according to Lisa Kahalley, PhD, of Baylor College of Medicine in Houston, and colleagues.
After controlling for differences in baseline characteristics and craniospinal irradiation (CSI), investigators found significantly greater decline in IQ with photon irradiation (P<0.001), they reported here at the American Society of Clinical Oncology.
"IQ remained generally stable for the proton group in the first 3 years' post-radiation therapy," Kahalley said. "In contrast, photon is associated with significant cognitive risk, with IQ scores declining by more than half a standard deviation with each additional year post photon.
"Our preliminary findings suggest proton may spare cognitive functioning."
An assessment of long-term outcomes is ongoing, since the first children treated with proton radiation therapy have just reached 5-year follow-up, she added.
Although an essential treatment modality for many pediatric brain tumors, radiation therapy carries a risk of neurocognitive decline as a late adverse effect. A child's IQ declines by 2 to 4 points per year after radiation therapy, and the risk increases with younger age at treatment, higher radiation therapy doses, and larger irradiated brain volumes, said Kahalley.
In contrast to conventional photon radiation therapy, proton-beam radiotherapy deposits its maximum dose at the greatest penetration depth, resulting in a reduced entrance dose and no exit dose. Several studies have described potential neuroprotective benefits of proton-beam radiotherapy, but no previous studies have compared actual neurocognitive outcomes in patients treated with proton versus photon irradiation, Kahalley continued.
Since 2006, patients at Texas Children's Hospital in Houston have undergone proton beam radiation therapy at MD Anderson Cancer Center, which has one of 11 proton beam radiation therapy centers that offer treatment for pediatric brain tumors. The collaborative arrangement provided investigators an opportunity to examine and compare the relative neurocognitive effects of brain irradiation by the type of energy source.
The study included 22 children treated by photon radiation therapy from 2000 to 2007 and 31 children treated by proton-beam irradiation from 2007 to 2011. Patients with poor-prognosis tumors were excluded. Kahalley and colleagues compared the patients' baseline IQ scores with scores on follow-up tests conducted within 3 years of radiation therapy.
Children treated by proton-beam radiation therapy were significantly older at the time of treatment (10.3 versus 7.5 years, P<0.01), and they received a lower total dose of radiation (50.4 versus 55.8 Gy, P<0.01).
In the proton group, tumor histology was germ cell in 10 cases, followed by medulloblastoma/PNET (nine), glioma (seven), and "other" (five). In the photon group, medulloblastoma/PNET accounted for half of the cases, followed by glioma and ependymoma (four each), "other" (two), and germ cell (one).
Tumor location was supratentorial in 22 patients in the proton group and 12 in the photon group, and infratentorial in nine and 10 cases, respectively.
Comparison of IQ averages in the two groups showed a significantly higher mean on follow-up in the proton group compared with the photon group (P<0.05). The difference in IQ change from baseline to follow-up also differed significantly between the groups (P<0.05).
"Multiple linear regression showed that the proton group exhibited essentially stable IQ over time (0.1 IQ point per year post-RT), whereas the photon group exhibited a significant IQ decline over time" of 10.3 IQ points per year (P<0.01), said Kahalley. "The 10.3 decline per year in the photon group is way higher than would be expected, and we intend to drill down to see whether we can identify factors to explain this.
"But the point is that IQ decline was significantly greater in the photon group."
The fully adjusted model accounted for 78% of the variance in follow-up IQ scores. In contrast to previous studies, age at the time of radiation therapy was not a predictor of neurocognitive outcomes. Consistent with the literature, craniospinal irradiation did predict lower follow-up IQ scores (P<0.05).
Invited discussant Gregory Armstrong, MD, of St. Jude Children's Research Hospital in Memphis, Tenn., noted that the primary advantage of proton-beam radiotherapy is a reduction in radiation dose to normal tissues. The newer radiotherapy modality also has several potential disadvantages: uncertain radiobiological effect, unknown toxicity profile, lack of comparison populations for key outcomes, and low enrollment in front-line clinical trials.
Armstrong also cautioned against assuming that the two study groups were similar. Although the 9-point difference in baseline IQ did not reach statistical significance, such a difference is "a clinically significant, measurable difference."
"I must emphasize that there is a gap in knowledge regarding the benefit and risk of proton-beam therapy," said Armstrong. "This study is the first to step into that gap and compares IQ against a control group. Taken alone, a single retrospective study cannot file the gap, nor would we expect it to do so."
Future studies should be prospective, longitudinal, and focus on systematic assessment, he added. The studies should be limited to a single tumor type to reduce heterogeneity, and the comparison population should be a well-established control group or a concurrent, contemporaneous group treated by photon therapy at a different institution. Finally, future studies should include a comprehensive evaluation of the late effects of brain irradiation in children.
Kahalley and coinvestigators had no relevant disclosures.
Armstrong had no relevant disclosures.
- Reviewed by F. Perry Wilson, MD, MSCE Instructor of Medicine, Perelman School of Medicine at the University of Pennsylvania
American Society of Clinical OncologySource Reference: Kahalley LS, et al "IQ change within three years of radiation therapy in pediatric brain tumor patients treated with proton beam versus photon radiation therapy." ASCO 2013; Abstract 10009. | <urn:uuid:27888a82-ecd5-49a7-84a4-78e2231dbc31> | CC-MAIN-2019-13 | https://www.medpagetoday.com/meetingcoverage/asco/39676 | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202161.73/warc/CC-MAIN-20190319224005-20190320010005-00345.warc.gz | en | 0.940767 | 1,361 | 2.71875 | 3 |
P is for Palestine. That’s the name the Romans used to refer to the area between the Mediterranean Sea, and the Jordan River, that included Judea (land of the Jews), and Samaria (home of the famous Good Samaritan), and Galilee, the area that includes Nazareth, the town where Jesus grew up. The name Palestine may have origin with the Philistine people (Remember David and Goliath? Goliath was a Philistine.)
The biblical account of the settling of this land (also called Canaan) by descendants of slaves who escaped Egypt in search of a Promised Land takes up considerable space in the Old Testament. It also provides the cultural and mythic matrix for Jewish identity, and by extension, the Christian understanding of what it means to be God’s people. One of the most powerful elements has been the quest for freedom- political, economic, religious freedom.
For much of recorded history, Palestine has been subject to one form of domination or another. The Persian Empire, the Hellenistic Empire of Alexander the Great, the Hasmonean Dynasty (a short-lived period of home-grown Jewish rule), the Roman Empire, the Byzantine Empire under Constantine, several Islamic dynasties, the Crusaders, Egyptian rule, the Ottoman Empire, the “British Mandate”, United Nations administration, and finally the partitioning of the land to create the modern state of Israel. Is there another area whose very name summons up such strong feelings and controversy?
The religions of three great “peoples of the Book” grew out of this fertile area. Judaism, Christianity and Islam all view this area as “Holy Land”. This Holy Land has been the location, and the object of so much human conflict and war over the centuries.
This is where Jesus was born. A place where ordinary people have always longed for a lasting peace, that has so far eluded them. A place that has inspired deep faithx and prayer, and which continues to frustrate and confuse people all over the world. A place of incredible beauty, rich history, and also terrible hardship and pain. (It makes sense to me that religious ideas born in this place, that spoke to the human condition there, would resonate with people in other places that have known strife, and in places where people have sought freedom.)
Before we take our two minutes of silent prayer today, let’s say a prayer for the Holy Land and all its cultures, and peoples.
The Advent Alphabet is a ministry offering from Rev. Darrow Woods, minister at Trinity United Church in Oakville, Ontario. | <urn:uuid:f034b156-89f9-4ecc-97bd-7e657ada3318> | CC-MAIN-2021-17 | https://revdarrow.com/2016/12/10/advent-alphabet-p-is-for-palestine/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039490226.78/warc/CC-MAIN-20210420183658-20210420213658-00533.warc.gz | en | 0.950343 | 538 | 2.8125 | 3 |
Welcome to our conversation about nonprofits supporting special education! Everyone wants to change the world for the better, and what better way to do so than to lend support to an initiative that benefits kids with special needs? Charitable special education groups put a lot of effort into helping families and teachers with resources and assistance, ensuring that kids with disabilities have the same chances as their classmates.
This includes implementing Evidence-Based Practices in Special Education and promoting awareness, such as during Disability Employment Awareness Month. This blog will discuss some of the incredible nonprofits that are making a difference in the lives of these kids and their families and how you can get involved. So let’s get started and discover the amazing work that special education charities worldwide are doing!
What are Special Education Charities?
Special Education Charities are nonprofit groups dedicated to enhancing the lives of kids with disabilities and special needs. These organizations offer numerous services and materials to support kids, their families, and teachers. Medical care, therapy, education, and advocacy are some of the services offered by special education charities.
Making sure that children with disabilities have access to the same opportunities as their peers is one of the main objectives of special education charities. Offering scholarships for higher education, providing specific sports equipment and other resources to enable kids to participate in leisure activities, and assisting kids and families in accessing specialist medical care and therapy are a few examples of how this might be done. This aligns with the goal of UNICEF, which strives for equity and inclusivity for all children worldwide.
Special Education Charity Advocacy
Advocating for the rights of children with disabilities is a key function of special education charities. To guarantee that children with disabilities are treated properly and given access to the resources they need to grow, charities collaborate with legislators, educators, and families. Additionally, they offer parents and teachers materials and information to assist them in better comprehending the special requirements of children with disabilities and how to support them effectively.
Who Frequently Funds Special Education Charities?
Volunteers, donations, and other nonprofits frequently fund charities that assist special education. They also receive grants from organizations like the Bill and Melinda Gates Foundation. To be able to offer their crucial services to children and families in need, they depend on donations and assistance from individuals and organizations. You may help special education organizations in various ways, including giving money, giving your time, or participating in fundraising activities.
In conclusion, Special Education Charities are essential to helping families and kids with disabilities. These organizations offer vital support and materials that help children with special needs develop to their full potential and experience happy, satisfying lives. They offer an essential chance for everyone to make a difference in the world and are a monument to the enormous impact that philanthropic organizations can have on our communities.
Event Information on Charity Events for Special Education
Charity events for special education are a fantastic opportunity to spread awareness and raise money to support families of children with special needs. These gatherings can take a variety of shapes, from bike rides and walkathons to charity concerts and auctions. Here are some instances of special education charity events:
Charity for Special Education Info Events that Allow a Parent to Participate
- The Special Olympics is a worldwide nonprofit that offers sports instruction and events for people with intellectual disability. The group sponsors several charitable activities, including the Polar Plunge, in which participants raise money and plunge into a body of ice, and the Law Enforcement Torch Run, in which law enforcement personnel and community members run to promote awareness of and donate to the Special Olympics.
- Best Buddies: Best Buddies is a global nonprofit organization encouraging friendship and inclusion for people with intellectual and developmental impairments. The charity runs many charity events, like the Best Buddies Challenge, a bike and walk that benefits the charity.
- Make-A-Wish Foundation: The Make-A-Wish Foundation is a worldwide nonprofit organization that grants the desires of children with serious medical conditions. The organization holds Numerous charitable events, such as the Walk for Wishes, in which people walk to collect money.
- Autism Speaks: Autism Speaks is a nonprofit group that advocates for and raises public awareness of autism. The organization holds Numerous charitable activities, such as the Autism Speaks Walk, in which participants walk to raise money.
- Children’s Miracle Network Hospitals: The Children’s Miracle Network Hospitals is a nonprofit group that supports children’s hospitals by raising money and public awareness. The group sponsors many charitable activities, such as the Extra Life gaming marathon, where gamers compete to raise money for children’s hospitals.
- Parent to Parent USA: Parent to Parent USA is a national nonprofit organization that assists families of children with disabilities. The group offers families individualized assistance, tools, and information. It also teaches parents how to help other parents. Parents might volunteer to assist other families or take classes to learn how to offer help.
In addition to raising money for worthwhile organizations, these charity activities also promote understanding, foster a sense of belonging and provide support for people and kids with disabilities and their families. People may significantly improve the lives of children with special needs and contribute to developing a more accepting and encouraging society by participating in or supporting these activities.
Special Needs Programs for Adults
Adult special needs programs are created to offer assistance and services to people with disabilities when they enter adulthood. With the aid of these programs, people and kids with disabilities can become more independent, improve their social abilities, and access opportunities like employment. Here are some instances of adult special needs programs:
- Vocational Training Programs: These programs assist people with impairments in acquiring job skills and finding jobs. These programs can offer instruction in various industries, including retail, office administration, hospitality, and food service.
- Community Living Programs: For people with disabilities transitioning to independent living, community living programs offer housing and support services. These programs can help with daily tasks, including cooking, cleaning, and caring for oneself.
- Social and Recreational Programs: Social and recreational programs give disabled people a chance to interact with others and participate in leisure activities. Sports teams, art workshops, music ensembles, and other activities that encourage socializing and community involvement are examples of these programs.
- Support Groups: Support groups offer a platform for people with disabilities and their families to connect with others in the disability community, exchange experiences, and offer support. These organizations can be more broadly based or concentrate on a particular handicap.
- Continuing Education Programs: Programs for continuing education give people and kids with disabilities a chance to pursue additional education and training. College classes, adult education courses, and programs for professional development might all fall under this category.
Adult special needs programs can offer vital assistance and services to people with disabilities as they enter adulthood. People with disabilities can become more independent, acquire new skills and hobbies, and participate actively in their communities by participating in these activities.
Federation for Children with Special Needs
Nonprofit groups called Federations for Children with special needs work to enhance the lives of children with disabilities and their families. These organizations, which frequently have several chapters or branches spread out over a nation or region, offer resources, advocacy, and support to people/kids with disabilities. A few organizations for special needs are shown here:
Examples of Organizations that Help People with Special Needs
- The Arc: The Arc is a U.S. national organization representing families and individuals with intellectual and developmental disabilities (IDD). The group offers resources and support to people with IDD and their families through its more than 600 chapters nationwide.
- National Federation of the Blind: In the United States, the National Federation of the Blind is a national organization that promotes the rights of people who are blind. The group offers resources and support to people with vision impairments and their families, and it has affiliates in all 50 states.
- Down Syndrome International: Down Syndrome International is a multinational federation that assists those with Down syndrome and their families. The group advocates for the inclusion and rights of people with Down syndrome and has members in more than 136 nations.
- Autism Society of America: The Autism Society of America is a nationwide organization in the US that assists people with autism and their families. The group supports people with autism and their families by offering information, advocacy, and support through its more than 75 chapters nationwide.
- Cerebral Palsy International Research Foundation: The Cerebral Palsy International Research Foundation is a worldwide organization that funds research and assists people with cerebral palsy and their families. Through advocacy, education, and research, the group seeks to enhance the lives of those impacted by cerebral palsy.
These are only a few federations for kids with special needs worldwide. Each of these groups contributes significantly to the betterment of the lives of people and kids with disabilities and their families, and their work is essential to the development of an inclusive and equitable society.
Ways to Help People with Special Needs
Volunteer, advocate, provide, offer assistance, receive education, and work to advance accessibility and inclusion of people with disabilities. These actions can support those who have impairments and advance a more welcoming and accessible society for all.
Other Resources Available
For more information, you can also search the web for “special needs organizations near me,” “programs for special needs near me,” or “programs for special needs adults near me” to determine which programs and organizations are available near you.
We hope you enjoyed today’s discussion of Special Education Charities. Have a good day!
Jennifer Hanson is a dedicated and seasoned writer specializing in the field of special education. With a passion for advocating for the rights and needs of children with diverse learning abilities, Jennifer uses her pen to educate, inspire, and empower both educators and parents alike. | <urn:uuid:b0b089b3-8a93-452c-b0dc-b784864fc5df> | CC-MAIN-2023-50 | https://special-education-journey.com/special-education-charities-special-needs-organizations/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100525.55/warc/CC-MAIN-20231204052342-20231204082342-00420.warc.gz | en | 0.957222 | 2,006 | 2.671875 | 3 |
Laura Van Eperen, Francesco M Marincola and Jennifer Strohm
Gives an understanding of necessity for journalists and scientists to work together. Also gives an insight into nuances faced by both the parties and tips for better communication.
In Science We Trust? On the Relation Between Scientific Knowledge, Risk Consciousness and Public Trust
Critically discusses the role of scientific knowledge and trust building and investigates the factors of importance for risk consciousness and trust.
Lauren M. Kuehne Laura A. Twardochleb Keith J. Fritschie Meryl C. Mims David J. Lawrence Polly P. Gibson Ben Stewart‐Koster Julian D. Olden
Gives a thorough overview of benefits of science communication and targets on guiding graduate level students to engage in the field of science communication parallel to their research.
Perception of technological risk: insights from research and lessons for risk communication and management
Ortwin Renn & Christina Benighaus
Gives an understanding of technology related risk perception and insights into the psychological, sociological and cultural aspects that are to be understood for risk communication and management.
Emphasizes on how having a PhD can be of help in science communication and advices on how to start your initial steps in communicating science.
The challenges of science journalism: The perspectives of scientists, science communication advisors and journalists from New Zealand
Douglas James Ashwell
A Study based on science journalism in New Zealand. It gives an insight into how individuals from different professions view science journalism. | <urn:uuid:b5b52420-4b7e-4274-a747-ae2e6ae3c19b> | CC-MAIN-2019-51 | https://niascomm.in/articles/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540497022.38/warc/CC-MAIN-20191207082632-20191207110632-00125.warc.gz | en | 0.848426 | 312 | 2.53125 | 3 |
Now that the shopping and baking, the scurrying and spending are over and Christmas is here, the time has come to ask why we do this. What are we celebrating?
Is Christmas an observance of the birthday of Jesus Christ on Dec. 25, 1986 years ago? Are we honoring the arrival on Earth of the Son of God, an arrival heralded by angels and witnessed by shepherds, who found the babe lying in a manger because there was no room at the inn for his mother and her betrothed.
These miraculous events are familiar to Christians from the Gospels of Matthew and Luke, but recent work by theologians and biblical scholars has undermined the authority of the Gospels as sources of information about Jesus` life.
This de-mythologizing of Christianity, as one scholar calls it, is changing the way clergymen think about religion. But much of their work has not filtered down to laymen, who might be surprised to hear the facts of Jesus` life almost summarily dismissed by the very people who, it would seem, should be defending the faith.
``I think it`s pretty safe to say that no mainstream Catholic or Protestant scholar accepts the story of the Nativity in Matthew and Luke as historical truth,`` said Thomas Sheehan, a philosophy professor at Loyola University. ``But the word hasn`t reached the man or woman in the pews yet.`` To radical scholars such as Sheehan, Christmas is still worth celebrating, but as a yearly reminder of Jesus` teachings that people should be merciful and just to others.
But Raymond Brown, one of the most influential biblical scholars on the subject of Christ`s birth, and other mainstream theologians insist that Christmas still means more.
``The incarnation and birth of God`s Son--that`s what we should celebrate at Christmas,`` Brown said. ``He brings the hope of salvation to the world.`` Probably the easiest fact to accept is that Dec. 25 is not Jesus`
birthday. Not only is the recording of a birthday a relatively modern phenomenon, but the record on how Dec. 25 came to be Christmas is fairly clear. In A.D. 274, the Roman emperor Aurelian dedicated Dec. 25 to the sun. Sometime in the early 4th Century, probably around 336, the Christian church, newly established as the official religion of the Roman Empire, established Dec. 25 as the day for observing Christ`s birth.
``The church has never really suggested that Dec. 25 is the real birthday,`` said Brown, a faculty member of Union Theological Seminary in New York. ``You can`t celebrate something in the abstract. You have to choose a day. The Queen of England`s birthday is celebrated on a day that isn`t her real birthday. It`s just a day the empire chooses to observe her birthday.``
Supernatural elements of the Nativity narrative are impossible to verify
--shepherds, for instance, left no record of a visit by the heavenly host. But some elements that one might expect to be corroborated by other historical accounts also cannot be verified.
For instance, there is no record of a census in Judea, which was supposed to have been the reason for Mary and Joseph`s journey to Bethlehem. University of Chicago theologian Hans Dieter Betz says Roman censuses were not that unusual, but none appears to have been taken in 4 to 6 B.C., when scholars think Jesus was born.
Another dramatic, wide-reaching event should have some echoes in records from the period, but doesn`t. According to the Bible, when Herod, King of the Judea, heard of the birth of Jesus from the Three Wise Men, he ordered that male children under the age of 2 be killed to safeguard his position. Betz thinks this cruel act, known as the Slaughter of the Innocents, could have been ordered by a man of Herod`s evil character, but probably was beyond the capability of an ancient state`s limited bureaucracy. Governments did not keep track of people as closely as they do now.
``About all we can say is that Jesus was a historical person,`` Betz said. ``He was born to Joseph and Mary and probably lived in Nazareth for the early part of his life. Since Joseph was a craftsman, the family was probably what we would call middle class today.``
Betz and other theologians say the Nativity story is one of the least reliable parts of the Gospels because it is one of the last additions to the story of Jesus` life. Scholars believe the books of Matthew and Luke were written no earlier than A.D. 85, about 50 years after Christ`s crucifixion and also many years after the deaths of the supposed authors.
``We don`t know who wrote Matthew and Luke,`` said Sheehan, who recently has published a book on how the early Church transformed Jesus` teaching into an organized religion. ``They`re certainly not eyewitness accounts. We have a good idea of the Christian communities for which they were written and the names Matthew and Luke were probably attached to them to give them added authority.`` | <urn:uuid:bd5c6386-3a7f-4166-9102-1b5903f9393d> | CC-MAIN-2018-09 | http://articles.chicagotribune.com/1986-12-25/news/8604060181_1_real-birthday-matthew-and-luke-scholars | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813691.14/warc/CC-MAIN-20180221163021-20180221183021-00692.warc.gz | en | 0.975106 | 1,070 | 2.640625 | 3 |
From Uncyclopedia, the content-free encyclopedia
“It's like a trick of the light or something!”
“Roses are red, violets are blue, but both types of flowers are divided into categories, often by colour. So, in fact, red violets and blue roses are both possible, and occur frequently. But that's irrelevant, because even the most common varieties of violets are purple, which isn't blue. Marry me?”
Colour (note the u, politically correct, U.S.) is a sensation derived from the ability of the eye/I to distinguish various visible electroumagnetic wavelengths. All rights to colour (except 37 Beige Pantones discouvered and owned by Cecil and Barbra Streisand) were acquired by Microsoft from Sony in 1997; licensing agreements for all uses of color are expected to be in place by 2015. Colour, however, is not owned by Microsoft as they are American, and do not know that colour exists.
Colour is something that British people see when they look around. They spell it "Colour" because they can spell words correctly. Canadians do this, however, because they are so Perfeuct, have 20.45 crimes a year and make maple syrup in their trousers. The most amazing "colour" in history has been scientifically proven to be Periwinkle.
During an experiment with a glass prism in 1665 Sir Isaac Newton noticed that plain white light was split into seven 'colours' when shone on a piece of white fish. The world was exclusively in black and white before this time.
During the 19th century colours became available to the upper classes. Blues were given to people good at sport attending Oxford and Cambridge Universities from 1860, Bishops took purple from 1876, and toffs riding horses obtained the incorrectly named 'Pinks' (that were in fact red) shortly afterwards.
The widespread use of colour after the Second World War slowly made the general population realise that there was actually no such thing as black or white people, this being a consequence of monochromism in the 19th century. Sadly this took more time in the poor south of America.
Upon arrival in a hostile area, a British warship would be entirely black-and-white; these big old grey warships would therefore be invisible in the monochrome environment seen in black-and-white photos of the era. The monochrome flags would be indistinguishable from those of any other nation; for instance, the French flag is blank white.
Once past the enemy's defences, the ship and its crew would land at a suitable disembarcation point, then change from monochrome to colour. The Union Jack would suddenly appear in all of its red, white and blue glory; the surrounding waters would turn sparkling blue; the grass on the other side of the fence would become green and the British forces would be free to majestically invoke the ruby-red laser of impending doom upon their hapless enemy.
When confronted with this tactic, the French general Montcalm attempted to cry Wolfe to warn les canadiens of the arrival of the famed British general, but it was by then far too late and la Nouvelle France was pwned.
World War II was fought largely in black-and-white, making it difficult to identify friendly forces and enemy combatants as the flags and uniforms all look the same in monochrome. This prolonged the war effort by many years.
In the Cold War era following WWII, efforts to introduce colour to the USA met with stiff opposition from McCarthyist forces who perceived it as a further infiltration of the red menace. When it was finally introduced, red, white and blue were declared to be the three primary colours, much to the dismay of the Green Party which, as always, felt marginalised on the sidelines. Advocates of Yellow were nowhere to be seen.
The US menace
Colour is often spelled incorrectly as "color" by speakers in the US-Group English Subdialect, an English variant commonly used in the United Spades of Amerika and very few other third-world English-speaking regions. This is because they are traitors to Queen and Empire showing their true colours.
- The introduction of colour to the US led to major race riots in many of the southern states, culminating in the assassination of Martin Luther King Jr. It also seemed to be quite a problem in deciding whether or not Florida liked red or blue better, but as G-dub has recently vetoed the Colorblindness Repair Bill, this subject has become null and void. In retrospect, the introduction of colour to the US was a bad idea.
- The state of Kansas remains in black-and-white to this day, as will be noted by viewers of The Wizard of Oz. Colour (and even color) are Class-A Banned Materials under the Kansas State Constitution (in black ink, of course).
Orange, the unrhymeable colour
The folk-rock band, 10,000 Maniacs, are accredited to first discovering the colour orange, after their song of the same title ("Orange," not "10,000 Maniacs") was written in 1981. Former lead singer, Natalie Merchant, once said that the title was due to the desire to come up with a word that was incapable of being rhymed. Subsequentially, The Color Purple and Sterling Silver were implemented into the English language. Still, Merchant and the Maniacs are given credit for creating the first "non-rhymeable" colour.
- The orange garb of No Doubt's lead singer in the music video for "Its My Life" started a widespread fashion trend at prisons everywhere.
- Orange is believed to have been created 2 minutes prior to the big bang, giving it time to hide from the rest of the universe. The rest of the universe, not knowing orange existed, saw no need to rhyme itself with orange.
- Orange is well known as the colour of plants of the Viaae family.
- Before the invention of orange, the Kubrick film A Clockwork Orange was monochrome and therefore a flop at the box office.
- Orange sort of rhymes with door-hinge.
- Orange hardly rhymes with lozenge at all.
- Colour was invented by noted British inventor Sir Humpty Dumpty, who was also a pioneer in the early development of Miners Lamps. His work was stolen however by the Feckin' Canadian, eh? genius Alexander Graham Bell.
- Before the invention of colour, many musical performances were presented by the Black And White Minstrels.
- Dreaming in colour is a relatively recent innovation; before the invention of colour, dreams were in snowy black-and-white monochrome.
- Remarkably many people are choosing to change their outfits to more modern colours, saying forget it with traditional colors such as blue and black, instead, people are choosing to wear muave, plum, and dinosaur.
Colour and racism
- White (including "white folk", "whiteboard", and "white only" entrance signs)
- Black (including "black folk", "blackboard" and "get off ma property ------" warning signs)
- Brown (including "caution, seats may be brown"- signs inside shit houses (scheissenhausen))
- Purple spotted (including "---- off purple spotted pieces of shit" hospital conditions of entry signs)
- Maroon 5 (including the band "Maroon 5")
Doing so may lead to you getting arrested under several counts of "racism", "crimes against humanity" and "general stupidity"
However, most Americans still use these words and the people don't seem to care about removing usage of them
|CHART OF PRIMARY COLOURS – Colours – Colors| | <urn:uuid:c82bb784-2cc9-4ee4-a407-b04e0a2be20d> | CC-MAIN-2014-41 | http://uncyclopedia.wikia.com/wiki/Colour?oldid=5655025 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657136896.39/warc/CC-MAIN-20140914011216-00227-ip-10-234-18-248.ec2.internal.warc.gz | en | 0.965992 | 1,628 | 2.859375 | 3 |
Currency counterfeiting is a crime that continuously poses a threat to a
country’s economy and is a source of financial loss to its citizens. Some of the ill-effects that counterfeit money has on society are a reduction in the value of real money; and increase in prices (inflation) due to more money getting circulated in the economy – an unauthorised artificial increase in the money supply; a decrease in the acceptability of paper money; and losses, when traders are not reimbursed for counterfeit money detected by banks, even if it is confiscated.
At the same time, in countries where paper money is a small fraction of the total money in circulation, the macroeconomic effects of counterfeiting of currency may not be significant. The microeconomic effects, such as confidence in currency, however, may be large.
Failure to take significant action in combating counterfeiting can lead to uninsurable risk, which has a harmful effect on the reputation and functioning of a country’s central bank. Legislation in South Africa is being examined with a view to effecting improvements. There are at present two statutes in South Africa that regulate the counterfeiting of currency. Both Acts provide for punitive measures amounting to imprisonment for a period not exceeding fifteen years.
Current initiatives in South Africa are based on a multi-agency approach to the combating of counterfeiting. The South African Government’s Departments for Safety and Security and Justice and Constitutional Development, the South African Reserve Bank, the South African Note Company, Interpol and the South African Mint have established formal relations and meet regularly to combat these crime forms. The formal relationship yielded a strategy as a basis for the combating of counterfeiting in the country. The strategy establishes joint planning, co-operation and liaison at all levels, the sharing of information, expertise and resources, as well as joint consideration of legal, economic and social issues that have a bearing on counterfeiting in South Africa. There is also recognition that the public can play an important role in combating the circulation of counterfeit currency in the South African economy. The early detection of counterfeit operations is essential to the limiting of the impact of counterfeit money on the economy. Conditions have been created that make it difficult for counterfeiters to circulate forged notes, including the prompt informing of all stake holders about new counterfeit notes and coins and the providing information on how to detect counterfeit money.
How to identify counterfeit notes
There are 3 methods for identifying counterfeit notes:
1) Money counting machines
Most money counting machines have built-in counterfeit detection. The level of detection differs from product to product but common features include; ultraviolet, magnetic thread and size detection.
South African big 5 series notes (new Mandela notes do not glow under a UV light) have multi coloured fluorescent markings that can be seen when the note is places under a UV light. Unfortunately many of the counterfeit notes that have been circulated recently in South Africa have had ultraviolet markings and therefore products that only have UV detection will not register them as counterfeit.
The note is scanned during the counting process to ensure that there are magnetic properties to the paper. This is one of the most reliable security features for South African currency as it is very difficult for counterfeiters to copy. When looking for a money counting machine, it is highly recommended that you choose a product with the magnetic (MG) function.
2) Desk top ultra violet Light Counterfeit detection
Installing a desk top counterfeit detector at the point of sale can be a cost-effective counterfeit detection method. Beware of relying on UV detectors because they are in no way completely accurate as many counterfeit notes in South Africa have UV markings so will appear real under the florescent light. Some ultra violet counterfeit detectors also have a magnetic (MG) identification feature, this is far more reliable and highly recommended as it is difficult for counterfeiters to copy. PLEASE NOTE: THE NEW MANDELA NOTE SERIES DOES NOT GLOW UNDER A UV LIGHT.
3) Manual identification
To view the full security and design features to look out for, please to view the South African Reserve Bank’s easy-to-use guide.
To view our full article in the FM Essentials Safety & Security October 2012 Newsletter, please . | <urn:uuid:3370024f-4ecd-4419-815a-33e0adc7c2df> | CC-MAIN-2016-50 | http://www.hotfrog.co.za/business/wc/cape-town/avansa-business-technologies/the-effect-of-counterfeit-money-on-the-economy-and-how-to-identify-them-125863 | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542657.90/warc/CC-MAIN-20161202170902-00436-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.952198 | 856 | 2.953125 | 3 |
Bariatric surgery is a term derived from the Greek words: ''weight'' and ''treatment.'' Bariatric surgical procedures are major gastrointestinal operations that either seal off most of the stomach to reduce the amount of food one can eat or rearrange the small intestine to reduce the calories the bodies can absorb. It is a collective term given to the various surgical options available for treatment of obesity.
Bariatric surgery is now becoming common place with more and more number of people interested in losing weight in a drastic way. As the demand for bariatric surgery continues to increase, employers and insurers are increasingly forced to make or revisit decisions about whether or not to provide insurance coverage for the cost of the procedure.
Several studies have been conducted on whether an insurance cover for such type of a surgery is necessary. It is estimated that the return on investment associated with an employer's decision to provide some level of coverage for bariatric surgery and the demand for such surgeries is based on various out-of-pocket costs.
In a recent study conducted, it has been found out that nearly 9 percent of all full-time employees are eligible for bariatric surgery based on existing guidelines. Because of their high medical costs and increased absenteeism, approximately two-thirds of costs attributable to obesity are incurred by those eligible for bariatric surgery. It would likely take between five and 10 years for an employer to recover the full cost of the surgery.
The second study used an Internet survey of obese individuals to determine that about 150,000 bariatric procedures per year would be demanded by those with private health insurance at an out-of-pocket price of $25,000. Even when fully covered by insurance, the results suggest that demand among those with private insurance would not exceed about 375,000 procedures per year among full time employees.
These estimates allow insurers and employers to make more informed decisions about the financial impact of offering coverage for bariatric surgery. More research is however indicated to address the cost concerns associated with the surgical procedure.
Financial implications are one of many factors considered in the decision to offer coverage for specific treatments but that as the prevalence of morbid obesity increases, employers will be forced to look for cost-effective strategies to improve the health of their employees. | <urn:uuid:1401aafb-a6b1-414c-8de5-d66681daae13> | CC-MAIN-2017-17 | http://www.medindia.net/news/view_news_main.asp?x=5312 | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123172.42/warc/CC-MAIN-20170423031203-00336-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.964951 | 450 | 2.734375 | 3 |
Observation and assessment form an ongoing cycle that is the basis for making educational decisions. Both must be done intentionally and provide a rationale for curriculum planning, adjustments, and accommodations. Professionals working with young children must observe constantly and maintain documentation of such observations, which must take place in all spaces, at all times, and over time so as to form the most complete picture possible of a child. Because young children's growth and development change rapidly, observation must happen frequently and be consistently updated.
Assessment, the systematic collection of information and the subsequent analysis of a child's growth and development processes, must also take place continually over time and utilize tools that are congruent with what is known about developmentally appropriate and culturally responsive practice.
The cycle of observation and assessment informs curriculum planning and evaluation of educational goals for children and programs.
Select a competency below to view the competency profile, including the associated behaviors and skills.
The professional working with young children: | <urn:uuid:7c45ff5c-9980-47e1-85c8-c3257d17f8f9> | CC-MAIN-2018-51 | http://earlychildhoodnyc.org/nywfc/cbk-area.php?area=CBK-3 | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824448.53/warc/CC-MAIN-20181213032335-20181213053835-00124.warc.gz | en | 0.94976 | 196 | 3.140625 | 3 |
Soy isoflavones and peptides may inhibit the growth of microbial pathogens that cause food-borne illnesses, according to a new study from University of Guelph researchers.
Soybean derivatives are already a mainstay in food products, such as cooking oils, cheeses, ice cream, margarine, food spreads, canned foods and baked goods.
The use of soy isoflavones and peptides to reduce microbial contamination could benefit the food industry, which currently uses synthetic additives to protect foods, says engineering professor Suresh Neethirajan, director of the BioNano Laboratory.
U of G researchers used microfluidics and high-throughput screening to run millions of tests in a short period.
They found that soy can be a more effective antimicrobial agent than the current roster of synthetic chemicals.
The study is set to be published in the journal Biochemistry and Biophysics Reports this summer and is available online now.
“Heavy use of chemical antimicrobial agents has caused some strains of bacteria to become very resistant to them, rendering them ineffective for the most part,” said Neethirajan.
“Soy peptides and isoflavones are biodegradable, environmentally friendly and non-toxic. The demand for new ways to combat microbes is huge, and our study suggests soy-based isoflavones and peptides could be part of the solution.”
Neethirajan and his team found soy peptides and isoflavones limited growth of some bacteria, including Listeria and Pseudomonas pathogens.
“The really exciting thing about this study is that it shows promise in overcoming the issue of current antibiotics killing bacteria indiscriminately, whether they are pathogenic or beneficial. You need beneficial bacteria in your intestines to be able to properly process food,” he said.
Peptides are part of proteins, and can act as hormones, hormone producers or neurotransmitters. Isoflavones act as hormones and control much of the biological activity on the cellular level.
North America has one of the safest food sources in the world, said Neethirajan, but the United States Centers for Disease Control and Prevention estimates that about 48 million people in the U.S. suffer from some sort of food-borne illness every year.
“In addition, some people are worried about the potential for long-term illnesses resulting from the use of synthetic chemicals,” Neethirajan said.
“The use of soy peptides and isoflavones could combat bacteria and reduce these concerns.”
The next step is for researchers to conduct large-scale tests, Neethirajan said.
“We’ve created a recipe for this to go ahead. This could be very beneficial to food processors, as well as the farmers who grow soybeans.” | <urn:uuid:a7094322-c361-41ce-9fe5-33355c2de72c> | CC-MAIN-2022-21 | https://news.uoguelph.ca/2016/04/soy-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545548.56/warc/CC-MAIN-20220522125835-20220522155835-00577.warc.gz | en | 0.934063 | 602 | 3.296875 | 3 |
A Brief Overview
At Corngreaves, we are a SOLO taxonomy school.
This means that the learning journey progresses from basic, to advanced, through to a deep level of thinking and reasoning. Each child may start their journey at a different depth, so we feel it is important to celebrate the success of the progress they make. In order to allow children to articulate their own progress, we make the journey visible to our pupils.
We tend to teach English and Maths in the morning and all the other subjects in the afternoon. In Key Stage 2, the afternoon curriculum is split into weekly blocks. Through this, children's thinking is deepened and skills developed to contribute towards the creation of a weekly outcome, to be displayed in their Topic books.
Our Curriculum aims to help our learners:
- To learn and achieve their potential in English and Maths and to achieve excellent SAT results.
- To have a broad range of curriculum skills which they use to help them gain a wider understanding of the world.
- To be inspired, challenged and prepared for the future.
- To realise with hard work they can achieve anything they want.
- To have enquiring minds and think better for themselves.
- To be creative, resourceful and able to solve problems.
- To understand better how they learn and to learn from their mistakes.
- Develop a sense of self worth and belief in themselves.
- Become increasingly independent, take initiative and organize themselves well.
- Work co-operatively with others and in teams.
- Respect others and act with integrity.
- Feel they can change things for the better.
Children under 5 years old go into our Pre-school and Reception classes. The Reception year group, follow a different curriculum to the rest of the school known as the Early Years Foundation Stage.
The rest of the school, that is, year groups 1 through to 6 follow the National Curriculum. The 3 ‘core’ subjects are English, Maths and Science and there are 8 ‘foundation’ subjects which we teach through a thematic approach developed from a high quality core text.
We aim to make learning difficult to resist. Our curriculum is about providing children with excitement for and inspiration to learn. We build learning experiences which excite, inspire and challenge pupils. This approach enables a sense of purpose which is deepened by participation, contribution and collaberation from all children. | <urn:uuid:8d2c4517-1c57-4962-9c10-20cda2c987de> | CC-MAIN-2020-40 | https://www.corngreavesacademy.org.uk/information/curriculum | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400189928.2/warc/CC-MAIN-20200919013135-20200919043135-00509.warc.gz | en | 0.945021 | 503 | 3.25 | 3 |
The buildings of the Cold War are some of our last physical links to this episode of our history.
They bear witness to phenomena such as the development and deployment of nuclear weapons, the ‘special relationship’ between the UK and the US, constant global surveillance, and huge expenditure on science and technology research as well as defence.
Until recently, these often secret establishments were unknown to historians. Now, thanks to recent research and the decision to list these intriguing sites, future generations can fully understand and appreciate the country’s experience of the Cold War.
1. Building X6, Foulness, Essex
This purpose-built research establishment was central to Britain’s defence strategy when, in the summer of 1952, an experimental atomic device was assembled here.
It was later transported to the Montebello Islands, Australia, where it was detonated in October. Some argued that this secured Britain’s position and provided a deterrent against Soviet aggression.
2. Orford Ness, Suffolk
From 1955, this remote coastal spit was developed for the testing of nuclear weapons to make sure that they were safe to store, handle, and ultimately could survive the flight to their final destinations.
This work carried high political stakes because Britain couldn’t be regarded as a nuclear power until it demonstrated it was able to drop an atomic bomb from an aircraft.
3. Westcott, Buckinghamshire
Westcott has been synonymous with rocket research and development since the mid-1940s.
After the Second World War, highly advanced German rocket research was incorporated into British programmes, with German scientists relocated to this establishment to research liquid propellants alongside their British counterparts.
4. RAF North Luffenham, Rutland
In the late 1950s, the United States supplied 60 nuclear-tipped Thor missiles manned by Royal Air Force crews and an American launch control officer.
During the Cuban Missile Crisis of October 1962, all but one of the 60 missiles were raised to alert.
5. Spadeadam Rocket Establishment, Cumbria
This world-class rocket research site was developed to test the British-built Blue Streak missile, designed to deliver a nuclear warhead to Moscow.
The project was cancelled in 1960, and the missile was adapted as the launch vehicle for the European Launcher Development Organisation. This, too, was cancelled in 1971.
6. RAF Neatishead, Norfolk
This early 1960s radar is Europe’s last surviving high-power Cold War-era radar. It was installed to provide early warning of an attack by Soviet bombers.
7. Regional Seat of Government building, Cambridge
England was divided into nine regions, which, in the event of nuclear war, would have been governed by Regional Commissioners housed and civil servants in heavily protected buildings.
This complex in Cambridge is one of only two purpose-built Regional Seats of Government built during the early 1960s, making it a rare example of a structure designed to operate after a nuclear attack.
It has thick external walls to resist blast, heat and radiation penetration and is equipped with an air filtration plant, standby generators, canteens, dormitories, operations rooms and communications facilities.
8. RAF Upper Heyford, Oxfordshire
This 1920s airfield was redeveloped in the early 1950s for the United States Strategic Air Command and, in the 1970s, was hardened against a pre-emptive attack.
At this time, if war had broken out, its nuclear-armed F111 jets would have been some of the first to engage Soviet forces.
9. RAF Alconbury, Cambridgeshire
This massive two-storey structure was one of the last Cold War bunkers to be built in England. Its wartime role was to process data collected by TR1 reconnaissance aircraft collected over the European battlefields. | <urn:uuid:4435ccb8-4971-41d8-9c92-8a66cc777408> | CC-MAIN-2023-50 | https://heritagecalling.com/2014/11/08/9-places-that-reveal-the-hidden-history-of-the-cold-war/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.23/warc/CC-MAIN-20231203125921-20231203155921-00358.warc.gz | en | 0.969777 | 785 | 3.09375 | 3 |
New Media have accustomed us to discovering forms of expression that are always different and in continuous evolution. Starting with e-mail - which has replaced almost all paper letters in favour of a faster and more immediate correspondence - to instant messaging on mobile phones and video calls that we can make from our computer. The communication modes have been continuously modified and adapted to all electronic devices.
Technological development has also brought important innovations in electronic literature and interactive Webcomics as we will see below. The very practice of reading and writing has changed. We learned to read hypertexts, to summarize poems in two sentences with hashtags (#) and to use multimedia pages. Often the written text is accompanied by a video or images. We read in a multilinear, multimodal and multimedia way. In short, with new media we have developed a reading ability that is defined by the term multiliteracy.
Multiliteracy includes all types of use of Internet content, differing from sequential reading of a written text on paper. The way we perceive a multimedia text has deep pedagogical and aesthetic implications. In fact, it is a fundamental concept for electronic literature as it is a starting point and also a finishing point. Observations on the functions of communication of electronic devices therefore form an important basis for the study of electronic literature.
There is a literary tradition that fits very well into this digital context. The combination of text, sounds and images that characterises electronic literature is the narrative technique of comics. Comics is certainly a literary genre that is little considered and underestimated in the literary field. Defined as “consumer literature”, “paraliterature” or even “trivial literature” (Trivialliteratur in German) comics have never found full recognition in the literary scene.
Instead, one can find many analogies between the works of electronic literature and comics: the rhythm of reading, the sequence of the cartoons, the spatial-temporal connections between the different cartoons, the images, the colours, the sounds and the movement. All these narrative elements work very well on a paper medium - and in the mind of the reader - and they fit equally well with New Media. The interactive webcomics are created from the multimedia combination and the multimodal combination.
Comics present many narrative expedients that bring to light all those technological functions that make pleasant - or less pleasant, as many lovers of (monomedial) print literature strive to adapt to multiliteracy - works of electronic literature. It is therefore useful to focus on the aspects that act as joining links between comics, electronic literature and interactive webcomics.
Consider the adjective ‘interactive’. First of all, it is necessary to distinguish between the two major types of comics in the web. A webcomic can be published as a comic panel as it appears in a comic book. The comic is then reproduced on a website in the traditional form of a paper comic. The interactive webcomic is, instead, a digital creation, or, to use a term in current use, digital born. The cartoons and the different ways of using them are drawn and programmed with specific software. This means that you have images that move with a mouse click, texts that appear and disappear, or different audio-visual effects that accompany the reading.
This initial distinction also applies to electronic literature in general. As with comics, a novel or a short story can also be published in Portable Document Format (PDF) and read on a computer screen or an ebook reader. But it is a mere transposition from paper to digital, without further changes in the reading of the work. The same can be said of texts published in a blog that follow the logic of a book or newspaper. The changes that can be made to the text are minimal (comments from readers, links to external pages, etc.).
The works defined as digital born, on the other hand, are intrinsically tied to the digital medium and, unlike PDF files, cannot be reproduced on paper without losing their essential functions of fruition. Put simply, a work must pass the “printer test”: if a comic or text published on the web is printable on paper it does not fall into the category of electronic literature.
In “Buying Time” (http://buyingtime.the-comic.org/) a “digital animated webcomic”, as the author defines it on his website, presents both the interactive mode of fruition and the writing mode of a static blog, in the part below the cartoon table.
The author provides his readers with numerous explanations and indications which, on the one hand, serve to describe the interactive webcomic and on the other hand, to facilitate the use of the tables. On a pink band at the top of the web page there are several sections: Home, Archive, About, Cast, FAQ (Frequently Asked Questions), Media, Donate, Links, Fan Art and Subscribe.
In the FAQ section the author provides definitions of some terms and, at the bottom of the page, an interactive map of Hyperion City, where the plot is set. The characters of the cyberpunk novel are briefly presented in the Cast section while in About there are explanations regarding the work itself, the way it should be read and some information about the author Casey J.
With a click on the Home button, the last page of the last chapter of the webcomic opens. Under the frame of the opening sticker there are the navigation instructions on the previous or following pages. Even further down the author has created a space for “comments” open to readers. This is the part in which, as in a blog, the author interacts with his readers. Yet this interaction does not change the plot.
On the first page the author gives a brief explanation, written in the typical comic strips, of how the webcomic should be read and how the different indications should be interpreted. The author then moves on different levels of communication to address his readers: in addition to the narrative level of the novel “Buying Time”, we find some metaliterary texts, or texts in which the author speaks of his work and then, on a third level, the author addresses personally to his readers in the comments space as well as in other sections of the page (Media, Donate, Links, Fan Art, Subscirbe). Of the three communication levels chosen by the author, the metaliterary level is the most distinctive for interactive webcomics. The explanations of the work and the navigation instructions are the basis of the reader’s interaction. In a sense, the author makes a pact with the readers, or determines how the reader should move within the work
Metanarration is also another joining link that connects webcomics to electronic literature and also to print literature. In works of electronic literature, these explanatory texts are commonly included to facilitate navigation. In the tradition of print literature we find many books called “metanovels” that are distinguished by passages which deal with the writing of the book itself or reflections on, for example, the meaning of the novel.
According to the basic scheme of communication, conceived by the Russian linguist Roman Jakobson, communication is achieved between a sender and an receiver through a medium (also called code), which can be the spoken language, a written text, images or any other means of communication. In addition, communication takes place at various levels and with different functions. Jakobson also provided a metalinguistic function that refers to the message and is exactly the level of communication in question.
There is a long literary tradition that has as an underlying theme, hidden among various metaphors, literature itself or writing. Among the many books that use this narrative expedient we can remember “Six Characters in Search of an Author” by Luigi Pirandello, “The Game of the Goose” by Edoardo Sanguineti, which is very similar to “Hopscotch” by Julio Cortázar, “Mist” by Miguel de Unamuno, “Bohemian Lights” by Ramón María del Valle-Inclán, “The Neverending Story” by Michael Ende and the hyper-novels by Italo Calvino, who took his inspiration from the story “The Garden of Forking Paths” by Jorge Luís Borges.
The reflection on literature, the word (see on this topic “The Writing of the God”, in Aleph by J. L. Borges), the narration and the writing is in fact a very ancient tradition that goes back to the times of the “Thousand and One Nights”, in which the story of Shahrazad is narrated, who had to invent every night a fairy tale to escape death. Some passages of the book fulfill the function of metaliterary texts which deal with her role as a narrator. This work was taken as a model by Álvaro Cunqueiro for his novel “When the old Sinbad returns to the Islands”, in which the journey, the landscape, the natural elements, but also the objects and the colors are metaphors and symbols of literature and writing.
In “The Neverending Story” Michael Ende imagines a child reading a science fiction novel who later becomes the protagonist in the very story he is reading; a ‘neverending’ story because the existence of the Kingdom of Fantasia (a metaphor for fantasy and literature) depends on his willingness to invent the continuation of the plot.
The two Spanish authors, on the other hand, include in their novels reflections on their own writing style. In “Mist” Unamuno explains his concept of ‘nivola’ and ends the novel with a direct encounter between the author and the protagonist of the novel, during which they talk about the relationship between author and fictitious characters. In “Bohemian Lights”, instead, Valle-Inclán offers the definition of “esperpento” on which obviously the novel itself is based.
This short overview should help us understand that some narrative expedients of print literature are similar to the reading and writing practice of works of electronic literature. All these authors combine different types of text in their novels - dialogues, monologues, drama, folklore, short stories, fantastic tales, symbolism, etc. - thus creating a broader narrative structure that includes narrative and metanarrative levels. They actually show how the book is build and take the reader by the hand and explicate the plot.
Italo Calvino moves on another level and in his hyper-novels he addresses his readers directly. At the beginning of the ten chapters of “If on a Winter’s Night a Traveler” the author addresses the Reader in second person, thus involving anyone reading his book. Calvino’s hyper-novel is made up of several novels that alternate continuously and in which the Readers - that is the actual name of the two protagonists, la Lettrice and il Lettore - sometimes take on the role of protagonists. In this case, metanarration serves to show and to highlight the very structure of a novel, or rather the hypertext. In this regard, Calvino illustrates in the presentation of the book a map of the different novels that make up the novel and their respective connection between them.
Here is a new joining link that allows us to find analogies between print and electronic literature (and thus interactive webcomics). The narrative structure that links the different texts, stories or novels is a hypertext, or a system of texts linked together. Similarly, digital born works are based on the hypertext language of the Internet and the metaliterary texts (the various explanations and indications mentioned above) are used to navigate from one text to another.
To end this digression on the narratology of print literature, we can recall the words of Calvino. In the Presentation of “The Castle of Crossed Destinies”, written in October 1973, Calvino reveals that after writing “The Castle of Crossed Destinies” and “The Tavern of Crossed Destinies” he wanted to write a third text using a “modern visual material” instead of the tarot. He then asks us a question: “What is the contemporary equivalent of tarot as a representation of the collective unconscious?” He suggested the use of “dramatic, adventurous, fearful comics (...): gangsters, terrified women, spaceships, vamps, air warfare, mad scientists.” He would have added to the other two texts, “The Motel of Crossed Destinies”, which would have had a similar narrative frame: “Some people who escaped a mysterious catastrophe” Calvino writes “find refuge in a semi-destroyed motel, where only a burned newspaper sheet remained: the page of comics. The survivors, who lost their word for fear, tell their stories by indicating the cartoons, but not following the order of each strip: moving from one strip to another in vertical columns or diagonally
Calvino’s intuition brings us back to our discourse on interactive digital comics. We can now try to identify some characteristics of comics that the author could have considered for his third novel. The following four works present different narrative strategies compared to the works seen so far and help us to better understand the relationship that the author establishes with the readers.
The first three works have been published by the publishing house Submarine Channel (https://submarinechannel.com/), a Media Lab founded in 2001 with offices in Amsterdam and Los Angeles, which produces documentaries, animations and interactive transmedia with the aim of experimenting with the new narrative techniques brought by the new media. The authors of the three interactive webcomics have chosen a different strategy than “Buying Time” to address readers.
In “The Art of Pho” (https://artofpho.submarinechannel.com/), by the British artist Julian Hanshaw, we do not find the informative texts for the fruition of the work. The entries for the sections About, Episodes, Making of, Trailer and Press are displayed on the start page. The About button leads to a window containing a brief explanation of the graphic novel and the presentation of the author, his collaborators and the publishing house Submarine Channel. Here we learn that the graphic novel is about Little Blue, a surreal creature who moves to the city of Ho Chi Minh (Saigon) in Vietnam where he learns the art of Pho. We can also follow the link that leads us to the Submarine Channel page where, as in “Buying Time”, we can write comments. However, we are led to intuitively choose one of the eight paintings in the Episodes section. In fact, the engine of the narration of this webcomic is our curiosity, which leads us to discover what lies behind the eight cartoons, as we do after all in the other sections of the page. Everything is intuitive: the loading of each page is illustrated by a bowl that fills slowly with soup and we understand immediately that it is the Pho mentioned in the presentation in About.
We discover that the navigation from one cartoon to another is automatic and that we can stop the video by clicking on the stop icon or advance by clicking on one of the white dots that we see below the cartoon. Our navigation is guided by objects that are sometimes highlighted by a blue frame.
In the first cartoon of the first episode, for example, the arrow of the mouse turns into a key that we obviously approach the steering wheel to start the car and the sound of the engine in the background is a clear signal of what we have to do. The journey by car then begins as soon as we press the gas pedal highlighted in the following cartoon. In the first three cartoons of the third episode we see the objects highlighted with the blue color and we pass from one cartoon to another where different images of objects, rooms and objects inside them follow one another. The whole story of Little Blue is narrated in this way and we learn to be led by audio-visual effects and to follow the animations accompanied by music in the background.
The webcomic “The Killer” (http://killer.submarinechannel.com/) begins after a short introduction in which the publishing house Submarine Channel and the authors of the original comic “Le Tueur” (2001) Luc Jacamon and Alexis Nolent in Matz art, with background music, are presented. To find more information about the work and the authors we can click one of the three links always visible at the bottom of the page: About, More Motion Picture and Contact links all lead to respective pages of the Submarine Channel blog.
https://submarinechannel.com/motioncomics/the-killer/ https://submarinechannel.com/animation/ https://submarinechannel.com/contact/
In the opening cartoon ( http://killer.submarinechannel.com/navigate) you can recognize a desk seen from above and you are induced, as in the graphic novel before, to explore with the mouse the objects that are presented here. On closer inspection, the newspaper is entitled after an interview with the authors Jacamon and Matz in which they summarise the meaning of the work. As you can read, the comic goes beyond the violent events of a thriller. The work is “about a man coping with his own fears and loneliness, looking for a way to live in a world he resents.”
The authors also claim that interactive comics is “a new medium and a new way to tell a story; it’s not movies, it’s not comics, but a kind of in-between medium that includes interactivity.” (...) “As authors, they have less control over the pace of the story,” the article continues, “but at the same time we enjoy thinking the viewer will be able to play with the elements of the story” the authors conclude.
Next to the newspaper there is a business card on which we read the names of the creators of interactive comics. The diary in the middle of the desk opens with a click, presenting the twelve chapters of the work in the form of photographs. Again, you just have to hover your mouse over the photos and get involved in the story of the Killer.
The cartoons are animated images that follow each other like in a film and the readers interaction is indicated by the change of the cursor shape from an arrow to a hand. The interaction modes vary from clicking, dragging or holding the mouse button. In this work too, you are obliged to advance in the story by examining the elements of the story, as the authors suggest in the interview in the newspaper on the desk, with the mouse cursor.
At the end of each episode you can choose whether to return to the apartment, where you will find the desk, or to go to the following episode.
The third work published by Submarine Channel, called interactive tale, is more complex. The webcomic “Hotel” (http://hotel.submarinechannel.com/splash.html), created by Dutch digital artist Han Hoogerbrugge, is illustrated in a small window that appears with a click on one of the ten parts or chapters: Car Crash (part 1), The Plane (part 2) Choke (part 3) and Melt Down (part 4). Each chapter is introduced by an explanation of what is happening and on the left side of the window we find a list with the episode numbers of the selected chapter and the other chapters, as well as information about navigation (Help) and a caption, different in each chapter, of Dr. Goldin (Comic).
http://hotel.submarinechannel.com/ part1-episode1/index.jsp http://hotel.submarinechannel.com/ part1-episode2/index.jsp http://hotel.submarinechannel.com/ part2-episode1/index.jsp http://hotel.submarinechannel.com/ part2-episode2/index.jsp http://hotel.submarinechannel.com/ part3-episode1/index.jsp http://hotel.submarinechannel.com/ part3-episode2/index.jsp http://hotel.submarinechannel.com/ part4-episode1/index.jsp http://hotel.submarinechannel.com/ part4-episode2/index.jsp http://hotel.submarinechannel.com/ part5-episode1/index.jsp http://hotel.submarinechannel.com/ part5-episode2/index.jsp
Of all three works, “Hotel” is the most complex and intricate. The animated cartoons show very short episodes of the story about the experiments of Dr. Doglin, Dr. Goldin’s counterpart, in a hotel not better specified. With the hand cursor you can activate the characters of the story, which move in a repetitive, sporadic way and isolated from each other. In some cases you see dialogues, carried out by the cursor, which increase the sense of estrangement and perplexity in the much intricate plot as in chapter five (episode two) where Dr. Doglin teaches his patient to fly.
Let’s now see interactive comics that are characterized by the way they are used and that bring us back to the comment of the authors of “The Killer” on the freedom of interaction at the expense of the control of the plot.
The following works are read from top to bottom and have a very limited level of interaction. In the first work that we analyze, Matt Huynh’s “The Boat” (http://www.matthuynh.com/the-boat-1/), interactive texts and images alternate, brushstrokes and background music that tell the story, divided into six chapters, of Mai, a 16 year old girl who escapes from Saigon after the fall/liberation of the city in 1975. We can even opt for the Auto Scroll function that starts the webcomic as a movie.
The same technique, but without background music, can be found in another work by Matt Hyunh, “Magpie Magpie” (http://www.magpie-magpie.com/) and in the works published on the website Webtoons. Among the many webcomics we can mention some works in the Thriller/Chiller section such as“Bongcheon - Dong Ghost” (https://www.webtoons.com/en/thriller/chiller/bongcheon-dong-ghost-horang/viewer?title_no=536&episode_no=22) and “Knock Knock” (https://www.webtoons.com/en/thriller/chiller/knock-knock-horang/viewer?title_no=536&episode_no=21) by Horang or “Home Alone” (https://www.webtoons.com/en/thriller/chiller/home-alone-giryang/viewer?title_no=536&episode_no=18) by Giryang. The cartoons are mostly static and although we are told that we must activate the audio there are no sounds or acoustic effects. This creates a sense of suspense to increase the surprise effect of a few animated cartoons (forgive me for spoiling the only special effect of the two comics).
The latest example of this list of interactive webcomic presents an important innovation compared to all the works we have seen so far. The plot of “Prequel or Making a Cat Cry” (http://www.prequeladventure.com/) by artist Kazerad, in fact, is built on the basis of the comments of readers who can write comments in the space provided below the cartoons. There is a new element in the animated cartoons that are read from top to bottom. From time to time we see a cloud appear with a comment from a reader, selected by the author. Unlike other works, the blog for readers has a central function in the creation of the plot. In this way the author grants greater freedom to his readers and makes them participate in the creation of his work. It is not so much a collective work, because the author selects some suggestions from the blog and it is always he who draws the cartoons, but certainly his readers act as co-authors of the webcomic. The author’s different use of the comment section is a choice that changes the relationship with its readers in a decisive way and also modifies the paradigm of the role of readers, or adds one more function to the activities granted to readers. This innovation brings us back to the communication system scheme we saw at the beginning. The relationship between sender and receiver that is realized through the medium (language, book, etc.) changes when the medium is modified. The choice of web use, therefore, has profound implications in the narratology and in the way of reading webcomics. We should therefore shift our attention to the medium itself and bring to lightsome other important aspects that concern webcomics.
The web allows to create new techniques of narration thanks to the possibility to combine the different forms of expression (text, images, sound) in a sequence that can be modified at will by both the author and the reader, as we have seen in some cases. The authors of a multimedia work organize the different parts of the narration on the basis of the hypertext, the structure of the web, which results in the phenomenon of multiliteracy, or the simultaneous use of different media (text, image, sound) which we have approached step by step in our analysis.
Now we realize that the possibilities of combination are numerous, indeed, the American cartoonist and comic artist Scott McCloud speaks of infinite canvas (http://scottmccloud.com/4-inventions/canvas/index.html) referring to the writing space created by the hypertext. In his famous books on comics, “Understanding Comics” (1993) and “Reinventing Comics” (2000), McCloud compares the web space to a map that we look at through a window that, in this analogy, is the computer screen. Let’s imagine that we are looking at a city map with a magnifying glass - here, the lens we hold in our hands is the computer screen that we can move in different directions to follow, for example, the course of a river or a road.
The computer screen, therefore, is no longer a page of a book or, rather, a cartoon panel, but a window (a magnifying glass or a frame) that we move within the space of a web page. Web technology obliges us to change the way we create comics, but also the way we read them, our approach to comics, and further the way we distribute them and the way we protect copyright.
The adaptation of comics to the new medium opens a long discussion on the history, theory and aesthetics of comics in which we do not venture in this essay. We simply say that all these topics also concern electronic literature and that, following the logic of our analysis, they act as links between printed literature, electronic literature and webcomics.
Examples for the theory of the infinite canvas are given to us by McCloud himself: “Brad’s Somber Mood” (http://www.scottmccloud.com/1-webcomics/mi/mi-03/mi-03.html) and “Zot! Online: “Hearts and Minds” (http://scottmccloud.com/1-webcomics/zot/zot-01/zot-01.html). Other works presenting the same technique are “To be continued” (http://tobecontinuedcomic.com/about) (2014) by Lorenzo Ghetti, “First Word” (http://www.electricsheepcomix.com/delta/firstword/) by Patrick Farley, “The Wormworld Saga” ( https://www.wormworldsaga.com/about.php) (2010) by Daniel Lieske and “Hobo Lobo of Hamelin” (http://hobolobo.net/what-is-this-thing) (2011) by Stevan Živadinović.
To end our journey in the world of webcomics, we shift our attention to the third element of the communication system, namely the author. We have seen that interactive comics by virtue of new media bring about a change in the role of the reader and that the changes, both in the medium and in the fruition of a work, depend mainly on the decisions and computer skills of the cartoonist who tries to use the web.
The author chooses the degree of complexity of the work and the reader’s interaction. While technological innovation offers new possibilities, it also presents comic bookmakers with new challenges of an artistic, conceptual, practical and historical nature (with reference to the conventions of paper publishing).
It is interesting to remember at this point Scott McCloud’s observation, in “Reinventing Comics”, that the non-sequential structure of the hypertext follows a logic exactly opposite to the narration mode of comic strips, which is by definition “sequential art”. The American cartoonist solves this dilemma by giving the web the possibility to renew the world of comics and to start a new evolution of this artistic form.
Let’s now see the works of one of the best cartoonists who created interactive webcomics. Stuart Campbell in art Sutu is an Australian comic artist who has published several interactive comics on the web over the last ten years, such as “Nawlz” (https://www.nawlz.com/) set in a city (Nawlz is a contraction of ‘night’ and ‘urban sprawl’) in which comics, graffiti and digital art come together in an extraordinary sequence and rhythm.
Also in “The Ocean is Broken” (http://ocean.sutueatsflies.com/) he manages to exploit in an exemplary way the technology and to surprise the reader with interesting combinations of cartoons, text and sound. The comic panel continuously takes on new forms with a simple horizontal scrolling of the mouse and the cartoons move, on a layer superimposed on the background image, alternately from left to right and from top to bottom.
In the short story of “Jack & The Swordfish” (http://jack.sutueatsflies.com/) the cartoons are activated by clicking on the arrows below a small, central table. The table always assumes a new subdivision: a whole cartoon, two or three horizontal cartoons, sometimes static and sometimes animated. Unlike other works, the text is read by a voice. Finally, Sutu creates a special effect in “Memories” (http://memories.sutueatsflies.com/), a vertical scrolling webcomic that stands out for the simplicity of the opposite movement of images, which descend from the top of the screen, and texts, which instead go upwards, connected by a red rope, activated by the scrolling of the mouse.
From a purely narratological point of view we can say in conclusion that comics share many narrative techniques with works of electronic literature and some works of printed literature. Moreover, we have observed that comics are very well adapted to the multimedia, multimodal and multilinear context of the web, thanks to those narrative expedients that have always distinguished them.
These analogies highlight the nature and logic of electronic literature and help us to better understand the changing relationship between the three instances of the communication system, namely author, medium and reader, brought about by new media. On the other hand, however, looking back to the past, we find the same inventiveness, the same creative spirit and the desire to tell in authors of printed literary works and comics.
In every age of the long history of media, since the invention of printing, there have always been authors who have exploited the creative possibilities of the means of communication and found alternative solutions to overcome the limitations imposed by the medium itself. Hypertextual texts, for instance, existed long before the invention of the web. What we experience nowadays with the New Media is the realization of some of the literary expedients, or literary experiments that were conceived by authors of print literature. Electronic literature is, in a way, a development of the hypertextual, multilinear, multimodal and interactive way of reading that could not be fully carried out on paper, but that can be accomplished in the digital context. | <urn:uuid:b49816c1-d304-4ae6-a685-d5e502851fcf> | CC-MAIN-2022-40 | https://edgedpub.com/interactive_webcomics.php | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00451.warc.gz | en | 0.940381 | 6,895 | 3.046875 | 3 |
Are you looking for validation to celebrate your love of a properly placed apostrophe? Look no further. National Punctuation Day is celebrated annually on September 24. The “holiday” (quotation marks used intentionally) was founded by Jeff Rubin, and is featured in Chase’s Calendar of Events. Even if you aren’t enamored with punctuation, we all have to use it to communicate clearly when writing, so learning to wield punctuation powerfully is an important skill.
What’s the Point of Punctuation?
Do your friends and acquaintances get annoyed when you point out their punctuation errors? Are you the first to spot typographical errors in signs, menus, and programs? Or does the word “ellipse” make you think of a sun-related natural phenomenon instead of punctuation?
Whether punctuation leaves you befuddled or you’re the one pointing out all the misplaced commas in society, you’re in good company. Proper use of punctuation is a common struggle for all of us who communicate through the written word, including text messages, emails, essays, signage, and notes. Most forms of electronic communication offer a spelling and grammar check tool, but they aren’t always used, and they are rarely perfect. Knowing the most prominent types of punctuation and how to avoid common errors is the first step to using correct punctuation to communicate coherently.
Punctuation Types and Common Errors to Avoid
Period, Exclamation Point, and Question Mark
To signal the end of a sentence, you can choose the appropriate punctuation based on the type of sentence. Most people understand the basic function of these marks, but for a statement, use a period. Do you know which mark to choose for a question? A question mark will suffice. And to convey excitement or emphasis, use an exclamation point!
To create a contraction or show possession, use an apostrophe. The pitfalls of apostrophe usage are rampant, as are examples of its misuse. Here are a few quick tricks and tips to place your apostrophes correctly.
To use an apostrophe correctly in a contraction, write out the full phrase you plan to contract (or think through the full form of all words) before you replace the missing letters with an apostrophe. For example, “it is” becomes “it’s,” whereas if you are describing attributes of an object, you refer to “its” characteristics. You shouldn’t add an apostrophe if you aren’t removing any letters when creating a compound word like “goodnight,” but if you’re mumbling or shortening the phrase to “G’night,” an apostrophe is appropriate.
To show possession, you can rephrase the possessive statement to help determine where to place the apostrophe. Whose (not who’s) pen are you holding? The pen belongs to Sarah, so it’s (note the use of apostrophe as a contraction, not a possessive) Sarah’s pen.
Apostrophes are not needed to make a word plural. When writing your holiday cards this year, please do not wish everyone the joy of the season from “The So-and-So’s.” Your family’s last name should not need an apostrophe to make it plural, unless you happen to be “The Jones’s” or another name that ends in “s,” in which case, I recommend using “The Jones Family” as it eliminates all confusion.
Comma placement is debated in grammar circles. The notorious Oxford (or, penultimate) comma is especially contentious, but I recommend you use it. Some other common sentence structures where a comma is needed include:
- If you begin a sentence with an opening phrase that needs to be set off by a comma
- If you include an appositive statement (a descriptive aside) in the middle of a sentence
- Before a coordinating conjunction in a compound sentence (like or, and, or but)
This is not an exhaustive list, but equally important is the skill of not overusing commas. Otherwise, your sentences, will be belabored, by excessive, some may even say, exhaustive, altogether too many, pauses.
Colon and Semicolon
For short sentences that need to be further explained or to introduce a list, you can add a colon. The text immediately following a colon completes the thought that the text before the colon introduces. For example:
Q: How many colons can I possibly add to this example?
A: More than expected. Expectations are high: I must use more colons for emphasis.
Semicolons function in a similar way; they delineate sentence breaks, and they can be used to combine two similar clauses into a single sentence. I use semicolons to add variety to my writing. When writing, a mix of semicolons, shorter sentences, and longer sentences with dependent phrases can help your writing seem more polished. Use semicolons intentionally; use them well.
Parentheses and Brackets
Parentheses are another optional punctation mark to signal that information is being added to explain or as an aside. Parenthetical statements should be used sparingly (and with finesse) to not interrupt the flow of the narrative. Parentheses are also used to cite a source if your text is being quoted. (Occasionally, you may add a full statement in parentheses, but this is uncommon.)
Brackets are typically found within a quote if commentary or corrections are required. Changing a direct quote is verboten, so using brackets is a good way to signal that any errors are original to the source [sic]. You can also use brackets within parentheses, so if you have a statement that requires a parenthetical within a parenthetical, try to rewrite it, and then use brackets if needed.
The original source material requires us to use lots of acronyms (by the way [BTW] this happens a lot in real life [IRL]).
Hyphen and Dash
Hyphenated words and phrases can be used to modify a noun (or be used as adjectives) when placed before the noun. For example, if the pages of your dictionary are well worn from extensive use, you may have a well-worn book. Do not hyphenate adverbs that end in “–ly” or a modifier that includes the word “very.” Don’t get a know-it-all attitude in respect to hyphens because they can also be used to avoid ambiguity, so sometimes the hyphenated modifier will be retained after a “to be” verb. For example, the writer of this blog post is well-known (as far as you know).
Another punctuation mark to indicate an emphatic pause or to set apart certain text is the dash. In our documents, we typically use an em dash — differently than an en dash – , and we do not use dashes interchangeably with hyphens. For most basic compositions, you can use a dash to set apart items in a sentence—perhaps an unexpected phrase or list—without creating a new sentence.
When you need to omit words from the middle of a quoted sentence…or add a longer pause than a comma, you can add an ellipsis. If an ellipsis is placed at the end of a sentence, there will be four dots, rather than three. Use sparingly….
Quotation marks should always be added in pairs. Double quotation marks are the standard for showing that text is a direct quotation from another source. Some people use quotation marks to signify “sarcasm” or cast doubt on the validity of the statement. Generally, you should avoid using quotation marks that way. If you have a quote within a larger quote, you can use single quotation marks, similar to how you can use brackets within parentheses. “She claimed that direct quotations were being ‘extensively overused’ by certain writers.”
Visit https://www.nationalpunctuationday.com/ for more fun ideas about how to celebrate National Punctuation Day and hilarious examples of punctuation errors. While punctuation is often misapplied and pet peeves abound, you can use punctuation to communicate better in writing. Using the right punctuation enhances understanding of your carefully chosen words by adding the pauses and signals readers need to aid comprehension.
If you need help getting your punctuation right for any and all business correspondence and documentation, contact us today. Our technical writers and editors are happy to help you create flawless documents so that you know your intent is communicated clearly. | <urn:uuid:51dc5545-7606-410a-834b-590c6256b9dc> | CC-MAIN-2022-49 | https://www.sheaws.com/national-punctuation-day/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710503.24/warc/CC-MAIN-20221128102824-20221128132824-00265.warc.gz | en | 0.908307 | 1,838 | 3.28125 | 3 |
Push for more Antarctic protection
Australia is behind a proposal to foster greater conservation of Antarctica.
It is working with France on a proposal for next week's meeting of the Commission for the Conservation of Antarctic Marine Living Resources (CCAMLR).
The parks would include seven protected areas covering 1.1 million square kilometres.
Current rules govern the management of the fisheries and scientific research.
Australia's representative to CCAMLR, Tony Fleming, says the proposal will be put to the meeting in Hobart.
"It would provide protection of the high conservation values in East Antarctica but it would also allow for sustainable fishing in East Antarctica as well," he said.
"One of the proposals will protect spawning grounds for krill and fish like toothfish.
"The proposals would also protect the feeding grounds of penguins and marine mammals." | <urn:uuid:bda5779e-a372-45a3-9fe6-67e6f7ac7884> | CC-MAIN-2018-13 | http://www.abc.net.au/news/2012-10-19/push-for-more-antarctic-protection/4322486 | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647545.84/warc/CC-MAIN-20180320224824-20180321004824-00553.warc.gz | en | 0.930584 | 169 | 2.6875 | 3 |
Concave Cut Gemstones
At one time, virtually all gemstones were cut as cabochons. Faceted gemstones made their appearance in European jewelry during the late 13th and early 14th centuries. With the advent of the horizontal cutting wheel in the late 1400s came the possibility of designing and repeating elaborately conceived geometric faceting schemes, thereby controlling and enhancing the light reflected from within the stone.
Since the 15th century, a number of different faceting styles have been developed, and innovation continues to this day. One recent innovation; the concave cut, has created considerable excitement in the world of gemstones. However, this cutting style has its critics and some gem experts would not call this technique an advance at all.
The most typical example of the traditional art of faceting gemstones is the round brilliant cut. It consists of 58 total faces or facets. Of the 58 facets, 33 are on the the crown (the top half of the gem); and 25 are on the pavilion, (the lower half of the stone). These facets are several different shapes, but one thing they all have in common is that they are two dimensional, (flat surfaces).
Concave cutting involves cutting facets that are three dimensional (curved). The technology to cut concave facets was developed by the American inventor Douglas Hoffman around 1990. It allows conical-shaped, three dimensional facets to be cut, so that each facet has depth as well as length and breadth. The result is that more of the ambient light is refracted and returned to the eye in the form of brilliance. Generally, only the pavilion facets are concave cut, with flat facets on the crown. This often creates unusual reflective patterns, especially when the gem is viewed face-up.
In the hands of a skilled cutter, the results can be impressive. Yet not everyone is enthusiastic about the results. Only certain types of gems tend to benefit from concave faceting. Larger gems exhibit greater brilliance with this technique than smaller ones. Also, the improvements are more dramatic with light or medium-colored stones than gems with highly saturated color. Indeed, some experts warn that darker stones may look even darker and less attractive when cut with concave facets.
There are economic issues as well. Concave faceting involves removing more gem material to create the curved facets. The difference is about 10% when compared with traditional faceting techniques. This means that concave cutting is most appropriate for gemstones that are available in larger sizes at reasonable prices, such as quartz, citrine, amethyst, topaz and fluorite.
You will rarely see fine sapphire, ruby or red spinel cut with concave facets. Critics of concave faceting claim that it is not just the cost, or the fact that darker stones are not improved by this technique. They say that concave cut gems lack personality or look plastic; that the true beauty of the gem is lost in all the faceting. This is a debate that only the market will decide. Currently, concave-cut gems are still speciality items.
- First Published: February-11-2008
- Last Updated: July-10-2014
- © 2005-2015 GemSelect.com all rights reserved.
Reproduction (text or graphics) without the express written consent of GemSelect.com (SETT Company Ltd.) is strictly prohibited. | <urn:uuid:97503da6-51c6-45ee-8847-d18b40f361d4> | CC-MAIN-2015-27 | http://www.gemselect.com/other-info/concave-cutting.php | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375093899.18/warc/CC-MAIN-20150627031813-00181-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.957736 | 694 | 3.015625 | 3 |
Software platform virtualization in chemistry research and university teaching
© Kind et al; licensee BioMed Central Ltd. 2009
Received: 20 August 2009
Accepted: 16 November 2009
Published: 16 November 2009
Modern chemistry laboratories operate with a wide range of software applications under different operating systems, such as Windows, LINUX or Mac OS X. Instead of installing software on different computers it is possible to install those applications on a single computer using Virtual Machine software. Software platform virtualization allows a single guest operating system to execute multiple other operating systems on the same computer. We apply and discuss the use of virtual machines in chemistry research and teaching laboratories.
Virtual machines are commonly used for cheminformatics software development and testing. Benchmarking multiple chemistry software packages we have confirmed that the computational speed penalty for using virtual machines is low and around 5% to 10%. Software virtualization in a teaching environment allows faster deployment and easy use of commercial and open source software in hands-on computer teaching labs.
Software virtualization in chemistry, mass spectrometry and cheminformatics is needed for software testing and development of software for different operating systems. In order to obtain maximum performance the virtualization software should be multi-core enabled and allow the use of multiprocessor configurations in the virtual machine environment. Server consolidation, by running multiple tasks and operating systems on a single physical machine, can lead to lower maintenance and hardware costs especially in small research labs. The use of virtual machines can prevent software virus infections and security breaches when used as a sandbox system for internet access and software testing. Complex software setups can be created with virtual machines and are easily deployed later to multiple computers for hands-on teaching classes. We discuss the popularity of bioinformatics compared to cheminformatics as well as the missing cheminformatics education at universities worldwide.
Software platform virtualization
Virtual machines exist for Windows, LINUX and MAC OS X
List of common desktop virtual machines for Windows, LINUX and Mac OS X operating systems.
WINDOWS as Guest OS
LINUX as Guest OS
Mac OS X as Guest OS
Microsoft Virtual PC
SUN Virtual BOX
Server consolidation by using virtual machine software
Software virtualization and multiple operating systems in chemistry
List of system statistics and micro-benchmarks comparing an original Windows XP performance and Windows XP inside a virtual machine (Guest OS).
WINDOWS XP Host
of Guest VM
Operating system start time
50% less time
Size of windows system folder
57% less space
RAM memory requirement (IDLE)
80% less RAM
Average hard disk transfer rate
Single CPU core benchmarks
NIST SciMark 2.0a (JAVA 1.6 Server)
score of 661
score of 621
Molgen Demo - count all23862255 isomers of C12H12
CDK Descriptor GUI -- Kier & Hall SMARTS for all C8H16O2 isomers
Seven Golden Rules -- generate all 28008691 formulas below 1000 Da
Dual CPU core benchmarks
ChemAxon Marvin - calculate all stereoisomers of C8H16O2
MZMine2 -- chromatographic alignment of LC-MS runs
Mass spectrometry and cheminformatics software
Cheminformatics and mass spectrometry software course as part of an experimental mass spectrometry class, some of the software was deployed using WIN XP virtual machines in the computer laboratory.
Fighting computer illiteracy -- bits, bytes, CPUs
Regular expressions as emergency helpers
Structures -- resonance forms, stereoisomers, tautomers
Mass spectrometry publications via Yahoo Pipes
Mass spectral and molecular data handling
Mass spectral data formats and conversion of mass spectra
Open exchange formats for mass spectra (mzData, mzXML, JCAMP-DX, netCDF)
Structure handling software and structure conversion (SMILES/SMARTS, SDF/MOL, InChI/InChIKey, PDB, CML)
Chemical structure handling (Instant-JChem, BioClipse)
Mass spectral and molecular database search
Mass spectral databases (EI, ESI, APCI) and search algorithms (PBM, dot product, mass spectral trees) and library conversion
Proteomics data analysis (database search, de-novo sequencing, hybrid methods)
Molecule search (exact search, substructure search, similarity search, Markush search)
Databases (PubChem, SciFinder, Beilstein, BlueObelisk)
Mass Spectrometry Tools & Concepts
Resolving power, mass accuracy, isotopic pattern, charge states, charge state deconvolution
Molecular formula space of small molecules
Isotopic abundances as orthogonal filter for elemental compositions
Molecular Isomer Generators, substructure predictions, simulation of mass spectra
Concepts for GC-MS
Automatic peak detection
Peak picking and mass spectral deconvolution
Concepts for LC-MS
Deconvolution and evaluation of LC-MS data
Adduct removal and detection during ESI-LC-MS
Seven Golden Rules for generation of possible molecular formulas
Structural isomer lookup example in ChemSpider
Prediction and simulation of mass spectra
Dendral - Artificial intelligence and mass spectrometry
Prediction of the isomer substructures from a given mass spectrum
Simulation of mass spectra from given isomer structures
Virtual machine hardware for benchmarks and teaching labs
Software installation for virtual machines
The freely available Microsoft Virtual PC 2007 (Version 220.127.116.11) was downloaded from Microsoft and was used for all benchmarks and teaching VMs. Memory settings for the virtual machine were set to one GByte RAM. A virtual machine for Microsoft Virtual PC 2007 was created using Microsoft XP (service pack 3) under a university volume licensing agreement. Multiple mass spectrometry and cheminformatics related software packages were downloaded from their original download websites and installed into the virtual machine by simply drag-and-drop copy from one window to another or direct download from within the virtual machine. For all packages an appropriate software license was obtained. Multiple topics were covered in the teaching sessions (see Table 3) but a discussion of each single package goes beyond the scope of this paper. A free teaching license was obtained for the ChemAxon Marvin and ChemAxon Instant-JChem package. The freely available Instant-JChem and the open source BioClipse package were used for GUI driven molecule and spectral handling. Software settings for appliances shown in Figure 3 and Figure 5 included a Windows Vista Ultimate 64-bit operating system and the freely available Sun VirtualBox 3.0 as virtual machine software.
Benchmark software selection for virtual machine testing
The NIST SciMark 2.0 program was selected because it has cross-platform capabilities and is freely available. Furthermore the five computational routines including Fast Fourier Transforms (FFT), Jacobi Successive Over-relaxation (SOR), Monte Carlo integration, Sparse matrix multiply dense LU matrix factorization represent a fair mix of scientific computing problems. The application is only single-threaded and was obtained from . The benchmark was run with the Sun JAVA 1.6 server compiler in off-line mode. The Molgen program is a molecular isomer generator which requires a molecular formula as input and subsequently counts or generates all possible structural isomers . It was included because the process of isomer generation is of importance in analytical chemistry. The demo version 3.5 (single threaded) was downloaded from and all isomers for C12H12 were counted. The free CDK Descriptor GUI (v0.94) is a software for molecular descriptor calculation and is based on the open source chemistry development kit . The Kier and Hall descriptors (electrotopological E-state state indices) were used on a dataset of all 13190 C8H16O2 isomers generated with the SMOG2 isomer generator software . The high-speed molecular formula calculator HR2 was downloaded from and performed a generation of all 28,008,691 elemental compositions including the elements (C:1-78 H:1-126 N:0-20 O:0-27 P:0-9 S:0-14) below 1000 Da according to the Seven Golden Rules . The test conditions are below the maximum element restrictions for this mass range and were genuinely chosen for performance measurements. The software Marvin 5.1.4 was downloaded from and used for the generation of all tetrahedral and double bond stereoisomers of C8H16O2. The command was invoked via the command line cxcalc command by supplying a file with all SMOG2 structural isomers. The Marvin software is multi-threaded, hence can make use of multiple CPUs. As a final test the multi-threaded and compute cluster-ready MZmine software was used. It is a package for LC-MS chromatogram alignment and the free mzmine2 (beta 1.92) software was downloaded from . The test set was downloaded from and is based on a metabolic profiling study . All samples were included and batch processed using a zoom scan filter, three steps peak detector (local maxima mass detection, score connector chromatogram construction, Savitzky-Golay peak recognition) and alignment join aligner. Other software licenses were either purchased or obtained through university software licensing. All benchmarks were run three times and the average times were reported using the timethis command from the Windows 2000 Resource Kit Tools.
Popularity comparison of bioinformatics versus cheminformatics
For the comparison of the popularity of cheminformatics versus bioinformatics a web site specific search was performed on all 325 university websites (US) with an associated research chemistry faculty. A domain specific Google search was used to obtain information how often the words "cheminformatics", "chemoinformatics" and "bioinformatics" occur on a single university website. For example cheminformatics site:berkeley.edu returned 93 hits on Google, meaning the word occurred 93 times in HTML websites, in PDF and EXCEL sheets across the whole UC Berkeley website. If zero hits were returned the word would not occur on the specific university website. A JAVA program using the Google web search API was implemented to perform an automated analysis of the several thousand searches. The hit counts for all universities are discussed in the result section. All results are freely available in an EXCEL sheet from the Additional file 1.
Installation and micro benchmarks in a research environment
The initial installation size of the virtual machine file with Windows XP SP3 32-bit (guest OS) was 4 GByte. After the installation of multiple software packages the VM file grew to eight GByte, even though the total software installation size was only around 300 MBytes. One of the reasons may be the included swap file or NTFS file system fragmentation and folder compression in the guest OS. It has been reported that the minimum size of a Windows XP system can be as small as 700 MBytes . There are in general two different disk types: fixed disk and dynamic disk systems . A fixed disk has a constant file size. Dynamic disks in a virtual machine can grow up to the maximum available size on the host operating system. During this setup a dynamic disk was selected to leave enough room for installed programs and allow a flexible disk size management. After installation the virtual machine drive has to be defragmented and precompacted with a special precompactor program which zeros out all free space. Additionally the virtual machine has to be stopped and an external defragmentation has to be applied. General system benchmarks can be found in Table 2. The memory footprint of the WIN XP virtual machine guest OS was relatively small with 100 MByte RAM and after installation of the Sophos-Antivirus software the memory allocation grew to 150 MBytes. As comparison a two year old Windows XP system with hundreds of different software tools installed requires up to 500 MByte memory in idle mode (doing nothing) due to multiple drivers and resident programs. The start and save time for a virtual image OS are quite fast. Saving the virtual machine state takes around 30 seconds and restoring the saved virtual machine takes only 5 seconds. This short save time is due to the three times faster average transfer rate of the RAID 6 file system on the host computer compared to a common desktop hard disk. The times for the compute intensive single CPU core benchmarks are listed in Table 2 and it can be seen that the speed penalty for running programs inside a virtual machine usually varies between 5% and 10%. To line out the importance of a fast disk system and multi-core and multi-CPU capabilities of programs and virtualization software also dual core CPU applications were included. The Microsoft Virtual PC does not support symmetric multi-processing (SMP), hence supports only one CPU. The penalty for running in a virtual single CPU virtual environment is 50% lower speed (Table 2).
Installation and use of VMs in a teaching environment
The virtual image with all the required mass spectrometry and cheminformatics software was deployed to each computer station. Due to the size of the virtual image (eight GByte) it was copied to each PC during off hours. A real-time deployment over network services to multiple computers was impossible. Students and teacher would login into the original computer workstation using their campus Kerberos authentication system. The Virtual PC is then started using the start menu without any additional certification. The set of pre-installed programs is then used for learning structure handling techniques and mass spectrometry data handling approaches including molecular formula generators, charge state deconvolution, isotopic pattern generators, mass spectral database search, tools for mass spectral interpretation and simulation, gas chromatography and liquid chromatography (GC-MS and LC-MS) deconvolution software and tools for mass spectral interpretation and simulation (see Table 3). Additionally the course includes structure handling approaches as well as the exploration of different file formats, structure search techniques and structural isomer generators. The whole set of teaching slides including all software references can be freely downloaded from source . All virtual machines are identical allowing a synchronized working from the instructor's large screen together with all students, who basically follow the instructions and take part in discussions.
Application of VMs in research and system benchmarks
The micro benchmarks were performed to validate the use under heavy computational tasks. The benchmark programs were selected according to frequent use in cheminformatics and mass spectrometry laboratories. The Microsoft Virtual PC only utilizes one single CPU. Therefore all results are based on single CPU speed instead of utilizing the dual core capabilities. The MS Server version and VMWare virtual machine also allow multiple CPU setups but were not used for comparison. The fastest mode in a virtual machine is the direct execution mode where the machine code runs without interaction from the virtual machine at almost the same native speed. Certain CPU specific commands are prevented from running within the virtual machine or they generate a CPU exception and therefore the virtual machine is needed to emulate such a machine code via binary translation and is much slower. That also explains the very small CPU based speed penalty (virtual machine overhead) for running programs inside the virtual machine. The start time of a freshly installed virtual machine is usually faster than that of an aged system, because no additional drivers and programs are installed. As seen in Table 2 the start time of the guest OS is only 50% of the host OS. A minimum install of Windows XP usually boots in 30 seconds, but antivirus and network drivers delay such fast boot times. The minimum memory requirements are quite astounding with 150 MBytes but the real-time antivirus software needs an additional 50 MBytes. In comparison a 3 year old production system needs 750 MByte, with additional restrictions that 32-bit Windows systems can only allocate and use 2.8 GBytes even if more memory is installed. The problem is that many programs and hardware driver software for mass spectrometers are not yet certified for 64-bit operation and would create incompatibilities. One solution here is to install a large memory system with a 64-bit operating system as host OS and use the 32-bit machines as guest OS, allowing both 32-bit and 64-bit operation. Windows 64-bit can directly emulate 32-bit programs in an emulation layer. If, however, 64-bit drivers are required and not yet available the program can not be installed in the first place.
Discussion of cheminformatics and mass spectrometry related benchmarks
The single core benchmarks NIST SciMark 2.0a, Molgen Demo, CDK Descriptor GUI, Seven Golden Rules are all single-threaded benchmarks. Table 2 shows that the speed penalty within the virtual machine is around 5-10% for each of the programs. No investigation of the impact of disk speed was performed. But the fast Areca RAID-6 system allows full guest CPU utilization. Therefore the penalty on disk use exists but is very small on a hardware RAID system. In case of a slow single hard disk on the host system, the disk performance within the guest system is also lower. In such a case the disk system overhead from guest and host system add up and decrease the overall disk speed. Many new desktop computer systems utilize minimum two CPUs. The new Intel Nehalem Core i7 technology provides fast quad-core CPUs each with a total of eight working threads. Unfortunately only few chemistry and mass spectrometry desktop applications are multi-threaded or multi-core ready . Among the tested versions which can make use of multi-core systems are the JChem calculational routines and MZMine2 for chromatographic alignment. The speed penalty on single-threaded programs compared to a dual core setup is severe. The stereoisomer calculation shows that on a dual processor machine a doubled performance can be obtained. Unfortunately, the Microsoft Virtual PC is a single-threaded application and does not allow the use of multi-core CPUs in the guest virtual environment. Ironically, when Microsoft bought the Virtual PC technology from Connectix in 2003 the software supported symmetric multi-processing (SMP) virtual machines. The free Microsoft Virtual PC 2007 is marketed as a desktop virtualization product and the free Microsoft Virtual Server 2 is marketed as a server product and can utilize multi-core CPUs. In comparison, the commercial VMWare Workstation and the open source VirtualBox both support virtual symmetric multiprocessing (SMP) and currently up to 32 virtual CPUs can be used in the guest system. The MZMine2 test especially shows the disk I/O dependence because of the large file size and the multi-core CPU dependence, because the software can be executed according to the number of available threads on the computer and therefore performs with double speed on a dual CPU setup.
Virtual machines can diversify operating system choices in chemistry labs
The majority of software that is commercially sold together with mass spectrometers is running under Microsoft Windows. One reason may be the sole availability of Microsoft Windows driver software for analog-digital converters (AD/DA) which are required when connecting mass spectrometers to PCs. However there is no explanation why LINUX installations cannot be used because many older instruments were successfully running under different UNIX operating systems. The reason of developing vendor software only for a single operating system is based on the complexity of the software development tools and the development and support costs. Aiming at a single platform certainly reduces costs for the vendor. Hardware near programming furthermore usually requires C or C++ code development. The data evaluation part can be done on multiple platforms including Linux, Mac OS and Windows. Here cross-platform applications written in JAVA, which have the ability of running on many different operating systems have a clear advantage.
Modern mass spectrometry labs usually use multiple operating systems for historic reasons. Windows computers are used for operating chromatography equipment and mass spectrometers, LINUX OS for running software on computer clusters and Mac OS X for personal workstations and laptops. However only very few mass spectrometry desktop applications are available for MacOS . That problem can be solved by using a virtual PC application like VMware Fusion or Parallels Desktop for MAC to install Windows compatible applications. As already mentioned it is currently prohibited by Apple Inc. to run Mac OS X as a guest operating system in a virtual machine on non-native apple hardware.
The choice between 32-bit and 64-bit operating systems for mass spectrometry based computer systems is based on two major factors: If the computer has more than 4 GByte RAM available and the motherboard and CPU are 64-bit capable it is recommended to use a 64-bit operating system to utilize more than 4 GByte memory. In case of less than 4 GByte RAM a 32-bit system is sufficient. The other major obstacle is the availability of programs and drivers that are natively compiled for 64-bits. If such 64-bit software drivers are not available for hardware cards (AD/DA converters, PCI cards) then it is impossible to use that hardware on a 64-bit operating system. In case of 32-bit software this is not a major problem, because most 64-bit operating systems can execute both 32-bit and 64-bit software. It is recommended however to test all system critical software on a virtual machine before deploying them in a working environment.
Hardware choices for software virtualization in chemistry labs
For server consolidation purposes usually server-grade components are used. That includes a motherboard capable of multi-socket CPU setups and enough memory banks to handle memory from 32 to 512 GByte RAM. As CPUs the quad-core or hex-core Intel XEON (based on Nehalem technology) as well as AMD Opteron (based on Shanghai or Istanbul 45 nm technology) can be recommended. The overall hard disk performance is extremely important for virtualization, therefore a series of 10,000 rpm SAS or SATA hard drives using RAID6 or RAID10 hardware RAID controllers (such as ARECA, LSI, ADAPTEC, 3WARE) should be used. A native hypervisor virtual machine monitor (XEN, VMware ESX Server or Microsoft Hyper-V) can be installed as core software layer. Any LINUX or WINDOWS guest operating system can be installed into the hypervisor.
For desktop virtualization a dual-core or quad-core processor (Intel Core i7 or AMD Phenom) should be used. The memory can range from 2 to 32 GByte. As operating system any 64-bit LINUX, MAC or WINDOWS system can be installed. For each virtual machine a minimum of 800 MByte RAM should be considered. Therefore if the host operating system uses 1 GByte RAM and it is planned to run four virtual machines in parallel, a minimum of 4 GByte RAM is needed. As hard disk system an Intel Matrix software RAID with multiple disks can be used. For even higher performance a Solid State Disk (SSD) setup or server grade hard disks with an ARECA RAID controller are recommended. Currently only limited support for Direct3D graphics cards and other specialized hardware inside virtual machines are provided. Applications that require such hardware should be run on native systems. Figure 5 shows an Intel Nehalem 3 GHz quad-core system equipped with four hard disks in RAID10 (mirrored stripe). The system can be used to virtualize special hardware, like a 32 thread LINUX machine as seen in the screenshot. The high average hard disk transfer rate of around 200 MByte/sec is important because the system has to deal with multiple virtual machines all performing their own disk operations. The most common source of mediocre performance of virtual machines is the use of a single slow hard disk.
Software licensing issues using virtual machines
Each operating system installation requires its own operating system license. In case of the free desktop LINUX operating system no licensing issues occur. In case of Microsoft Windows or LINUX Enterprise versions a separate license for each computer processor and for each virtual machine install must be acquired. That is also the case for most commercial software if not otherwise stated in the EULA. For universities, academic volume licenses are usually available at a reduced price. In case of trial licenses, a use in production environments is mostly prohibited. For teaching environments a special agreement must be reached with the software vendor. Some companies like ChemAxon provide three different kinds of license a) paid commercial licenses b) free teaching licenses and c) free academic licenses for use in an academic research environment.
Server consolidation in research labs using virtual machines
The use of server consolidation approaches is very common in larger research laboratories or bioinformatics labs at universities. Figure 4 (right side) shows a XEN virtual machine monitor running multiple VMs at the UC Davis Genome Center Bioinformatics core lab. The idea is that a single physical computer with multiple CPUs and large memory setups runs different operating system and provides multiple services at once. That can include different web services, database front-ends or web sites. Additionally internal computations can be carried out on such a system and the system can also be used to provide intermediary backup solutions. With connected small diskless network PCs such a system could even provide simple common services as Word, EXCEL, PowerPoint and access to statistical services, without the need of purchasing individual computers for each student and researcher. Larger virtualization projects including several thousand virtual machines are usually deployed by computer IT departments at large research universities. The aims are the same: minimizing management and hardware costs.
Use of virtual machines for software testing and distribution and computer upgrades
A common application of virtual environments is application testing and development. Especially computer programmers use such VM technologies for testing the deployment of their software for cross-platform use under different operating systems. The distribution of existing (open) software packages is usually performed with live-CDs that contain a series of programs on a bootable LINUX CD . Especially the Bioinformatics community has a strong history of using live-CDs such as the VLinux and the Vigyaancd for software distribution . Such CDs can be converted to a single ISO file that can be mounted inside a virtual machine, allowing the LINUX system to run without the need to reboot. Although the direct distribution of pre-installed virtual machines is widely used in the computer science community the use in chemistry is very sparse. Some examples include the ECCE (Extensible Computational Chemistry Environment) or the MASPECTRAS platform for management and analysis of proteomics data . Complex installation processes and web server installations on production systems can be easily avoided by using such pre-configured virtual hard disks (VHDs). That also includes applications for grid computing inside virtual machines [14, 44]. It is must be realized that Windows software inside a pre-configured Windows system is not suited for worldwide distribution or outside a university with volume licensing, because each installation requires a paid license. The use of the WINE emulator that is capable of running Windows software inside a LINUX virtual machine could be a possible solution.
Another application for VMs is legacy software testing. Certain programs may only run under native 32-bit environments. Although Windows has an in built 32-bit legacy emulation, the only solution may be to install a 32-bit and a 64-bit OS into an virtual machine. Older native Windows 16-bit installer programs will not run on Windows 64-bit computers, making the use of a 16-bit or 32-bit virtual machine a first choice. Also software which requires older operating system versions can be tested without problems. Once an application is installed and shows erroneous behavior or major incompatibilities a snap-shot from an older date can be used to restore the virtual machine to its original condition. Another favorable use is to replace old computer infrastructure but retain or keep all the current software installations. In such a case a full copy of the hard disk is created and this virtual hard disk file (VHD) is installed into a virtual machine on a faster and newer computer. Popular software tools for such a purpose are the freely available VMWare Converter and the Microsoft Disk2vhd software. In a teaching environment the use of virtual PCs is useful if no hardware based hard disk write protection is in use. In such a case the virtual machine installations including all intentional and unintentional changes can be discarded after each class and for a new teaching class a fresh original copy is simply restored.
Use of virtual machines for better computer safety - avoiding viruses, Trojan horses, zombie farms and drive-by-infections
Computer safety in chemistry and life sciences research labs not only includes anti-virus scanners and multiple stage backups of important scientific data but requires also a more active approach towards virus prevention. Current anti-virus software can detect more than 70,000 threats and viruses. However that requires the virus to be known to the anti-virus software. Any potential new virus or software exploit cannot be detected, leaving a critical exploitation time window open until virus updates are provided. Trojan horse programs can be installed to either steal passwords or log every keyboard keystroke or deactivate internal software firewalls. Such compromised systems are used from outside as servers or proxies for illegal material including music files, video files, commercial software or pornographic material. Especially proxy functions are dangerous because a computer outside a research organization or university can now access files or network ranges that are usually only accessible for computers inside the organization. This is due to the fact that many authentication schemes work IP network address based, hence assuming the computer is a registered and clean system belonging to the internal network. Unsecured and unpatched computers can become parts of large botnets which in case of large botnets like Conficker or Torpig have infected hundreds of thousands of Windows PCs . The infected PCs (zombies) are controlled by Zombie Masters which use such computers to extort money, gain information, steal credit card data or rent subnets to persons that want to perform DDOS (Distributed Denial of Service attacks) or send spam mail.
The use of LINUX or Mac OS systems can actually prevent virus spread, but not because such systems are generally safer, but due to the fact that administrator rights are handled very strict. LINUX computers are also prone to attacks, a recent severe vulnerability of LINUX systems in August 2008 allowed the Phalanx2 kernel rootkit to be installed and steal SSH passwords and subsequently get access to other systems . One of the bigger problems in terms of computer safety is that many older programs under Windows XP always require administrator rights for installation and switching back to more restrictive user rights will let the program fail. Applying only guest user rights and installing all required software updates already reduces the number of possible virus attacks.
Research centers and universities are commonly protected by multiple hardware firewalls or have internal safe-zones without any internet access or even computers prohibiting any data exchange. Under realistic scenarios such extreme protection without any internet access is contra-productive. Even with hardware firewalls activated, users are allowed to surf the internet (IP port 80) or allowed to use SSH and SFTP (IP port 21) for connecting to remote computers or compute clusters. In such a scenario virus or Trojan horse infections can still occur. Another solution would be to surf the internet through proxy software that monitors all incoming traffic with multiple anti-viruses and rootkit detection utilities. Such a software solution which includes web antimalware, and https (secure traffic) and http web traffic inspection, a network inspection system and URL filtering is available for enterprise customers . A simpler solution would be to use online surfing tools like SiteAdvisor or simply use Sandbox technologies as implemented in the Google Chrome Browser which restricts program rights.
The use of virtual machines for internet connections and surfing is highly recommended. If a user works on a Windows Machine as host and surfs the Internet using a small LINUX OS as host he would greatly reduce direct computer virus infection risks. Usually the computer virus itself cannot escape the virtual environment, therefore the underlying operating system and programs remain virus free. It must be mentioned that programs can detect if they are executed inside a virtual environment and that there are few concept studies of ultrathin hypervisors (Blue Pill/Red Pill) which can be exploited as rootkits . The second barrier would be the cross-platform barrier because only few viruses exist which could be executed in LINUX and Windows together. Such a scenario requires that the guest operating system itself is not prone to any network attack from outside. The Windows Operating System 7 has inbuilt virtual machines services, therefore browser sessions could be automatically started within a virtual machine. Using sandbox browsers (Google Chrome) already reduces the risks of virus infections, but such natively running browsers are still prone to vulnerabilities from installed external plugins (Flash, PDF, bitmaps graphics, QuickTime). Most viruses can not escape from a virtualized cross-platform environment and the virtual image itself can be reset to the original stage, therefore preventing any virus infection.
Use of virtual machines in teaching environments
Cheminformatics and mass spectrometry teaching not only require the classical chalkboard talks but also laboratory sessions. In such experimental laboratory classes students perform experiments on different mass spectrometry platforms including time of flight analyzers (TOF), Orbitrap analyzers, Fourier-transform mass spectrometers and investigate different ionization modes including electrospray, matrix-assisted laser desorption ionization (MALDI) and others. Such experimental classes have to be taught in smaller group sizes, because not all students can perform the experiment itself, but they should be involved as much as possible. An estimated 80% of the time will be spent on software work and data evaluation of acquired spectra and the investigation of mass spectra and their associated molecular structures. Therefore, a strong cheminformatics syllabus and software handling courses are needed. We observed in our class that prior to the course students were mainly exposed to internet search, Microsoft Word and EXCEL and general purpose chemistry drawing programs. Very few individuals had computer programming skills. Individual discussions revealed that the software classes had direct synergistic impacts, with students independently exploring the learned databases and chemistry programs.
A possible solution for cheminformatics distance learning, based on remote access to virtual machines, would be the use of a large server and a virtual machine setup with around 48 CPU cores and 256 GByte RAM. Students would then login via remote desktops or thin clients into virtual machines with teaching material. Existing software technology allows access to such services via internet browsers JAVA or ActiveX plug-ins. However in the current computer teaching laboratory setup 42 workstations with overall 82 cores and 164 GByte of RAM were available. In case of a virtual machine setup not only a powerful but expensive server had to be purchased but also individual diskless thin client computers and additional software licenses had to be acquired. Due to the optimized system management the use of individual computers in the lab was the preferred and overall cheaper solution. However, for distance based learning a total virtualization could be a good solution to reduce administration time.
About the missing cheminformatics education at universities worldwide
A general problem is, that compared to bioinformatics, cheminformatics is taught only at few universities with strong cheminformatics graduate-level and PhD programs. Related courses are sometimes taught together with computational chemistry, quantum chemistry or theoretical chemistry courses. Among those few universities are Indiana University, UC Irvine, Clarkson University, University of Michigan, University of New Mexico, Louis Pasteur University of Strasbourg (France), University Erlangen Nuremberg (Germany), Beilstein-Stiftungsprofessur Chemieinformatik at the University Frankfurt/Main (Germany) and University of Sheffield (UK) and New University of Lisbon (Portugal) .
The current fast-paced chemistry development requires that each chemistry student should have a very early cheminformatics education which goes beyond simple database search and structure drawing . The use of pre-configured virtual machines containing teaching material and cheminformatics software could lead to an easier handling of complex software setups. Also distance based learning techniques could use real-time remote connections to virtual machines equipped with a wide array of cheminformatics software [63, 64]. Such advanced learning tasks could include in-silico reaction planning with a large computerized reaction database and planning system , the use of molecular descriptors, in-silico de-novo molecular design, structure screening and searching, Quantitative Structure-Activity Relationships (QSAR) and visualization methods . Also the lack of programming skills among chemists must be regarded as a potential threat to a successful development of the field. The recruitment of computer scientist from outside the field is limited, because chemical structure handling and chemical reaction manipulation requires a deep understanding of chemistry in the first place. Wendy Warr an international expert in chemical information stated in a 2008 editorial : "The catalog of courses and resources compiled in this paper might suggest that cheminformatics education is flourishing. It is not. Many examples of isolated efforts are cited here but there is no European or international coordination. Cheminformatics practitioners have still not defined their discipline and its impact, let alone successfully made a case to governments and funding agencies."
In a related commentary about systems chemical biology , the authors discussed cheminformatics tools that can integrate chemical knowledge with biological databases and raised concerns about the cancellation of the National Institute of Health (NIH/US) funding projects for the "Preapplication for Cheminformatics Research Centers" in 2007 , which would have been the largest funding source for the study of new cheminformatics approaches in the United States. It must be argued that cheminformatics education and research are such a fundamental part of new chemistry, that funding in the United States should be provided by the National Science Foundation (NSF) and not by the NIH which historically receives a much higher funding (Budget FY2009 NIH: 30.5 billion US$ and NSF: 6.5 billion US$ ). The NSF not only has the mandate of promoting interdisciplinary research but also has a strong interest in chemistry education . Regrettably, U.S. funding of chemistry can barely keep up with inflation and the FY2009 budget for the NSF Division of Chemistry (CHE) is around $244.67 million and therefore represents only 3.7% of the whole NSF budget. But making the case that cheminformatics is a substantial building block for success in the grand challenges in chemistry is up to the cheminformaticians themselves.
Software virtualization in chemistry, mass spectrometry and cheminformatics is needed for software testing and development under different deployment scenarios and operating systems without the need of having multiple standalone computers. We have shown with multiple cheminformatics and mass spectrometry software benchmarks that the computational penalty of using virtual machines is very low and usually around 5% to 10%. In order to obtain maximum performance the virtualization software must be multi-core enabled and should emulate a multiprocessor configuration in the virtual machine environment. The computational chemistry software should make use of multi-core CPUs and the computer itself should be equipped with a multi-core CPU as well as a fast SSD or RAID system. Software virtualization in research chemistry labs is useful for keeping the computational infrastructure small and manageable. Multiple operating systems can be used one multi-core CPU computer providing web services, backup services, computational and data exchange services. Software virtualization in a teaching environment allows faster deployment and easy use of commercial and open source software. Preconfigured virtual machines can be used for worldwide distribution of open source and freely available cheminformatics tools.
We thank all contributors who provided free or open source software and those companies that provided free teaching licenses. Thanks to Martin Scholz (UC Davis) for help with the JAVA query tool using the Google API. Thanks to Zhi-Wei Lu (UC Davis Genome Center Bioinformatics Core) for the screenshot and hardware information on the XEN hypervisor. Funding was provided by NSF MCB-0820823. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
- Goldberg RP: Survey of Virtual Machine Research. IEEE Computer. 1974, 7 (6): 34-45.View ArticleGoogle Scholar
- Gasteiger J: Chemoinformatics: a new field with a long tradition. Analytical and bioanalytical chemistry. 2006, 384 (1): 57-64. 10.1007/s00216-005-0065-y.View ArticleGoogle Scholar
- Wold S: Chemometrics; what do we mean with it, and what do we want from it?. Chemometrics and Intelligent Laboratory Systems. 1995, 30 (1): 109-115. 10.1016/0169-7439(95)00042-9.View ArticleGoogle Scholar
- Software Platform Virtualization. [http://en.wikipedia.org/wiki/Platform_virtualization]
- Virtual Machine Definition. [http://en.wikipedia.org/wiki/Virtual_machine]
- Wine translation layer - for running Windows applications on Linux, BSD and Mac OS X. [http://www.winehq.org/]
- Hypervisor Server Virtualization. [http://en.wikipedia.org/wiki/Hypervisor]
- Comparison of virtual machines. [http://en.wikipedia.org/wiki/Comparison_of_virtual_machines]
- VMware vCenter Converter. [http://www.vmware.com/]
- PlatinSpin PowerConvert for virtual machine images. [http://www.platespin.com]
- Marty MR, Hill MD: Virtual hierarchies to support server consolidation. ACM. 2007, 56-Google Scholar
- Vogels W: Beyond server consolidation. Queue. 2008, 6 (1): 20-26. 10.1145/1348583.1348590.View ArticleGoogle Scholar
- Ramkumar VV, Yan S, Sameer K, Laxmikant VK, Mark ET, Glenn JM: Scalable fine-grained parallelization of plane-wave-based ab initio molecular dynamics for large supercomputers. Journal of Computational Chemistry. 2004, 25 (16): 2006-2022. 10.1002/jcc.20113.View ArticleGoogle Scholar
- Bullard D, Gobbi A, Lardy MA, Perkins C, Little Z: Hydra: A Self Regenerating High Performance Computing Grid for Drug Discovery. Journal of Chemical Information and Modeling. 2008, 48 (4): 811-816. 10.1021/ci700396b.View ArticleGoogle Scholar
- Agarwal PK: Vigyaan biochemical software workbench. [http://www.vigyaancd.org]
- Kind T: Programs for structure elucidation of small molecules. [http://fiehnlab.ucdavis.edu/staff/kind/Metabolomics/Structure_Elucidation/]
- Software for stereoisomer generation; Marvin 5.1.4; ChemAxon 2008. [http://www.chemaxon.com/]
- Spjuth O, Helmus T, Willighagen EL, Kuhn S, Eklund M, Wagener J, Murray-Rust P, Steinbeck C, Wikberg JES: Bioclipse: an open source workbench for chemo- and bioinformatics. BMC Bioinformatics. 2007, 8 (1): 59-10.1186/1471-2105-8-59.View ArticleGoogle Scholar
- Boisvert RF, Moreira J, Philippsen M, Pozo R: Java and numerical computing. Comput Sci Eng. 2001, 3 (2): 18-24. 10.1109/5992.908997.View ArticleGoogle Scholar
- Pozo R, Miller B: NIST SciMark 2.0 benchmark. [http://math.nist.gov/scimark2/index.html]
- Schymanski EL, Meinert C, Meringer M, Brack W: The use of MS classifiers and structure generation to assist in the identification of unknowns in effect-directed analysis. Anal Chim Acta. 2008, 615 (2): 136-147. 10.1016/j.aca.2008.03.060.View ArticleGoogle Scholar
- MOLGEN 3.5 demo version for Windows. [http://www.molgen.de/]
- Guha R: CDK Descriptor Calculator GUI. [http:////www.rguha.net/code/java/cdkdesc.html]
- Steinbeck C, Hoppe C, Kuhn S, Floris M, Guha R, Willighagen EL: Recent developments of the Chemistry Development Kit (CDK) - An open-source Java library for chemo- and bioinformatics. Curr Pharm Design. 2006, 12 (17): 2111-2120. 10.2174/138161206777585274.View ArticleGoogle Scholar
- Butina D: Performance of Kier-hall E-state descriptors in quantitative structure activity relationship (QSAR) studies of multifunctional molecules. Molecules. 2004, 9 (12): 1004-1009. 10.3390/91201004.View ArticleGoogle Scholar
- Molchanova MS, Zefirov NS: Irredundant Generation of Isomeric Molecular Structures with Some Known Fragments. Journal of Chemical Information and Computer Sciences. 1998, 38 (1): 8-22.Google Scholar
- Kind T, Fiehn O: Seven Golden Rules Software. [http://fiehnlab.ucdavis.edu/projects/Seven_Golden_Rules/]
- Kind T, Fiehn O: Seven Golden Rules for heuristic filtering of molecular formulas obtained by accurate mass spectrometry. BMC Bioinformatics. 2007, 8: 20-10.1186/1471-2105-8-105.View ArticleGoogle Scholar
- Katajamaa M, Miettinen J, Oresic M: MZmine: toolbox for processing and visualization of mass spectrometry based molecular profile data. Bioinformatics. 2006, 22 (5): 634-636. 10.1093/bioinformatics/btk039.View ArticleGoogle Scholar
- MZmine 2 LC/MS framework. [http://sourceforge.net/projects/mzmine/]
- LC/MS data - FAAH Knockout Dataset. [http://metlin.scripps.edu/download/]
- Saghatelian A, Trauger SA, Want EJ, Hawkins EG, Siuzdak G, Cravatt BF: Assignment of Endogenous Substrates to Enzymes by Global Metabolite Profiling. Biochemistry. 2004, 43 (45): 14332-14339. 10.1021/bi0480335.View ArticleGoogle Scholar
- Atwood J: Creating Smaller Virtual Machines. [http://www.codinghorror.com/blog/archives/000639.html]
- Wolf C, Halter EM: Virtualization - From the Desktop to the Enterprise. [http://dx.doi.org/10.1007/978-1-4302-0027-7]
- Kind T, Leary J: Mass Spectrometry meets Cheminformatics - Teaching Slides. [http://fiehnlab.ucdavis.edu/staff/kind/Teaching/]
- A Performance Comparison of Hypervisors - VMWare. [http://www.vmware.com/pdf/hypervisor_performance.pdf]
- Sutter H: The Free Lunch Is Over: A Fundamental Turn Toward Concurrency in Software. [http://www.gotw.ca/publications/concurrency-ddj.htm]
- Swain C: MacInChemBlog - Macs in chemistry. [http://homepage.mac.com/swain/Sites/Macinchem/default.htm]
- 64-bit. [http://en.wikipedia.org/wiki/64-bit]
- Rana A, Foscarini F: Linux distributions for bioinformatics: an update. EMBnet news. 2009, 15 (3):
- Field D, Tiwari B, Booth T, Houten S, Swan D, Bertrand N, Thurston M: Open Software for Biologists: from famine to feast. Nature Biotechnology. 2006, 24 (7): 801-804. 10.1038/nbt0706-801.View ArticleGoogle Scholar
- ECCE, A Problem Solving Environment for Computational Chemistry. [http://ecce.pnl.gov]
- MASPECTRAS platform for management and analysis of proteomics LC-MS/MS data. [http://genome.tugraz.at/maspectras/]
- Figueiredo R, Dinda P, Fortes J: A case for grid computing on virtual machines. IEEE Computer Society. 1999, 2003: 550-559.Google Scholar
- Stone-Gross B, Cova M, Cavallaro L, Gilbert B, Szydlowski M, Kemmerer R, Kruegel C, Vigna G: Your Botnet is My Botnet: Analysis of a Botnet Takeover. [http://www.cs.ucsb.edu/~seclab/projects/torpig/torpig.pdf]
- Heintz M: Phalanx2 - What Happened?. [http://hep.uchicago.edu/admin/report_072808.html]
- Microsoft Forefront Security and Forefront Threat Management Gateway. [http://www.microsoft.com/forefront/]
- McAfee SiteAdvisor. [http://www.siteadvisor.com/]
- Chromium Developer Documentation - Sandbox FAQ. [http://dev.chromium.org/]
- Skapinetz K: Virtualisation as a blackhat tool. Network Security. 2007, 2007 (10): 4-7. 10.1016/S1353-4858(07)70092-2.View ArticleGoogle Scholar
- Rutkowska J: Introducing Blue Pill. [http://theinvisiblethings.blogspot.com/2006/06/introducing-blue-pill.html]
- Wild DJ, Wiggins GD: Videoconferencing and Other Distance Education Techniques in Chemoinformatics Teaching and Research at Indiana University. Journal of Chemical Information and Modeling. 2006, 46 (2): 495-502. 10.1021/ci050297q.View ArticleGoogle Scholar
- Electronic Analytical Reference Library (EARL) - Crawford Scientific. [http://www.earl2learn.com/]
- Guha R, Howard MT, Hutchison GR, Murray-Rust P, Rzepa H, Steinbeck C, Wegner J, Willighagen EL: The Blue Obelisk Interoperability in Chemical Informatics. Journal of Chemical Information and Modeling. 2006, 46 (3): 991-998. 10.1021/ci050400b.View ArticleGoogle Scholar
- Cheminformatics Teaching Tools for the Cheminformatics Virtual Classroom. [http://www.chemvc.com/]
- Ertl P, Selzer P, Mühlbacher J: Web-based cheminformatics tools deployed via corporate Intranets. Drug Discovery Today: BIOSILICO. 2004, 2 (5): 201-207. 10.1016/S1741-8364(04)02413-8.View ArticleGoogle Scholar
- UC Davis iTunesU - audio, video and podcasts of news, faculty lectures and interviews. [http://itunes.ucdavis.edu/]
- Wild DJ, Wiggins GD: Challenges for chemoinformatics education in drug discovery. Drug discovery today. 2006, 11 (9-10): 436-439. 10.1016/j.drudis.2006.03.010.View ArticleGoogle Scholar
- Bishop N, Gillet VJ, Holliday JD, Willett P: Chemoinformatics research at the University of Sheffield: a history and citation analysis. Journal of Information Science. 2003, 29 (4): 249-10.1177/01655515030294003.View ArticleGoogle Scholar
- Cheminformatics Academic Programs. [http://cheminfo.informatics.indiana.edu/cicc/cis/index.php/Cheminformatics_Academic_Programs]
- Hann M, Green R: Chemoinformatics--a new name for an old problem?. Current Opinion in Chemical Biology. 1999, 3 (4): 379-383. 10.1016/S1367-5931(99)80057-X.View ArticleGoogle Scholar
- Russo E: Chemistry plans a structural overhaul. Nature. 2002, 419 (6903): 4-7. 10.1038/nj6903-04a.View ArticleGoogle Scholar
- Stockman M: Creating remotely accessible" virtual networks" on a single PC to teach computer networking and operating systems. 2003, ACM New York, NY, USA, 67-71.Google Scholar
- Border C: The development and deployment of a multi-user, remote access virtualization system for networking, security, and system administration classes. ACM SIGCSE Bulletin. 2007, 39 (1): 576-580. 10.1145/1227504.1227501.View ArticleGoogle Scholar
- Pirok G, Máté N, Varga J, Szegezdi J, Vargyas M, Dorant S, Csizmadia F: Making" Real" Molecules in Virtual Space. Journal of chemical information and modeling. 2006, 46 (2): 563-568. 10.1021/ci050373p.View ArticleGoogle Scholar
- Brown N: Chemoinformatics - an introduction for computer scientists. ACM Comput Surv. 2009, 41 (2): 1-38. 10.1145/1459352.1459353.View ArticleGoogle Scholar
- Warr W: Cheminformatics Education. [http://www.qsarworld.com/cheminformatics-education.php]
- Oprea TI, Tropsha A, Faulon JL, Rintoul MD: Systems chemical biology. Nature Chemical Biology. 2007, 3 (8): 447-450. 10.1038/nchembio0807-447.View ArticleGoogle Scholar
- Cancellation of PAR-07-353 (Preapplication of Cheminformatics Research Centers [X02]). [http://grants.nih.gov/grants/guide/notice-files/NOT-RM-07-010.html]
- 2010 Funding for NIH, NSF - FASEB Office of Public Affairs. [http://opa.faseb.org/]
- Colon W, Chitnis P, Collins JP, Hicks J, Chan T, Tornow JS: Chemical biology at the US National Science Foundation. Nat Chem Biol. 2008, 4 (9): 511-514. 10.1038/nchembio0908-511.View ArticleGoogle Scholar
- The Future of U.S. Chemistry Research: Benchmarks and Challenges - US National Academy of Sciences 2007. [http://www.nap.edu/]
- Beyond the Molecular Frontier: Challenges for Chemistry and Chemical Engineering - US National Research Council 2003. [http://www.nap.edu/]
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. | <urn:uuid:333a4776-3ccc-47eb-9634-22eb303de41f> | CC-MAIN-2016-50 | http://jcheminf.springeropen.com/articles/10.1186/1758-2946-1-18 | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541886.85/warc/CC-MAIN-20161202170901-00114-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.857585 | 11,692 | 2.5625 | 3 |
Glen Hansman is an elementary school teacher with the Vancouver School Board, and is currently in his third year as President of the British Columbia Teachers’ Federation, which represents the 43,000 public school teachers in BC. He is the chair of the K–12 Aboriginal Education Partners, is an officer of the BC Federation of Labour, and is a member of the Canadian Council of the Canadian Labour Congress.
Written by Glen Hansman
Canadian teachers, like our colleagues worldwide, are united in a desire to make the world a better place by confronting social injustices such as racism. In our troubled times, disturbing signs of a resurgent neo-Nazi, white supremacist movement have got teachers across North America talking about how best to confront...Fighting racism with the light of learning, by Glen Hansman | <urn:uuid:f28969fc-d88c-4c06-875d-04c7cb0be26c> | CC-MAIN-2023-40 | https://www.ei-ie.org/index.php/en/author/243:glen-hansman | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511717.69/warc/CC-MAIN-20231005012006-20231005042006-00114.warc.gz | en | 0.971623 | 163 | 2.625 | 3 |
This reading is associated with a first-day readiness activity. Please contact your instructor for more instructions.
¶1 For many people, the word “nature,” like the word “home,” calls to mind mostly positive and nurturing images. “Mother Nature” is often spoken of as a mythic force that sustains life on Earth. Natural landscapes, too, are spoken of with emotion and are tied to the concept of home and natural identity. Consider, for example, the landscapes evoked by the songs “America the Beautiful” and “God Bless America.” In these songs, love of country and the idea of home are clearly connected to love of the land.
¶2 The natural world is also often described in spiritual ways. In the popular media, references to nature are frequently used to evoke images of purity, innocence, and peace. Of course, drawing connections between nature and spirituality is nothing new—most ancient belief systems valued and even worshipped the natural world. Writers, spiritual leaders, and naturalists throughout history have given moving accounts of the power of nature as a source of life and as a source for learning important life lessons. Among Native American cultures, there is a long tradition of speaking in spiritual ways about humankind’s relationship to nature. Luther Standing Bear, at one time chief of the Oglala Sioux, wrote several books in which he describes the reverence his people felt for the natural world. For the Lakota people, he wrote in Land of the Spotted Eagle, “Kinship with all creatures of the earth, sky, and water was a real and active principle.” These views have been expanded on by many naturalists and environmental activists. In the opening chapter of his book, Our National Parks (1901), American naturalist John Muir describes the public’s embrace of national parks in terms of a religious conversion:
Thousands of tired, nerve-shaken, over-civilized people are beginning to find out that going to the mountains is going home; that wildness is a necessity and that mountain parks and reservations are useful not only as fountains of timber and irrigating rivers, but as fountains of life. Awakening from the stupefying effects of the vice of over-industry and the deadly apathy of luxury, they are trying as best they can to mix and enrich their own little ongoings with those of Nature, and to get rid of rust and disease.
In Muir’s view, nature can save people from materialism and destructive habits; it can cleanse us and help us lead better lives. There is no doubt that people draw much wisdom about life from the natural world.
¶3 Nevertheless, one pitfall of assuming that nature is spiritual or nurturing is that such a view romanticizes nature. In his essay “The American Geographies” (p. 486), Barry Lopez observes American pride in “our rolling prairies, free-flowing rivers, and ‘purple mountains’ majesty.’” Yet Lopez argues, these images of national geography are in fact creations—fictions constructed by politicians, marketing firms, and the entertainment industry—meant to give people a false vision of an unspoiled, untroubled landscape. What is lost in this view is the hard reality that humans have—for both good and ill—permanently altered the natural landscape. Prairies have been fenced and forests clear-cut. Rivers have been dammed or diverted to bring water to arid regions. Cities and industries have created mini-climate zones. Farming practices have become increasingly high-tech and involve the use of genetically modified crops. Lakes and rivers have been invaded by nonnative plants and fish, brought in on the hulls of ships from international waters. “The real American landscape,” contends Lopez, “is a face of almost incomprehensible depth and complexity.”
¶4 A further consequence of the romanticization of nature is that it can lead to thinking of natural disasters like drought, hurricanes, blizzards, tsunamis, and tornados as examples of Mother Nature’s dark side. Again, such a view masks humankind’s impact on the natural world and any human responsibility for the overtaxing of the environment, through industrial practices, for example, that may lead to some destructive natural events. Although humans do not cause tornadoes or tsunamis, there is no doubt that human practices, such as unregulated industry, alter the environment. The temperature of the ocean is rising, the use of fossil fuels is affecting the planet’s climate zones, and the interdependence of the world’s economies has had a far-reaching impact on the plant and animal world.
¶5 Love and respect for the land and for nature resonate in the American national consciousness, but this very set of emotions should encourage us to question our assumptions about nature. Romanticization of nature can prevent investigation of the complex and conflicted relationships humankind has with the natural world.
After reading this essay, respond in writing (in a word-processing document) to the questions found on this quiz. Send those responses to your instructor (or submit them according to instructions provided by your instructor). | <urn:uuid:1e983dd3-7d4a-4f57-bfd2-1b55ece4a4a5> | CC-MAIN-2014-49 | http://producer.csi.edu/cdraney/2011/102/readiness-reading.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009004.88/warc/CC-MAIN-20141125155649-00067-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.949604 | 1,082 | 3.5625 | 4 |
Today we see kids and teenagers wearing earrings in all possible places and rings on all fingers, including the thumb. But have you ever asked yourself what significance each finger has for the rings that we put on it?
Wearing a ring often gives a message toward someone and toward the world. Since the left hemisphere of the brain corresponds to logic and controls the right hand, it is reasonable to think that wearing a ring on the right hand is done consciously and logically, as well as for a desire for control of one's life and actions. Since the right hemisphere controls the left hand and creative ability, rings on the left hand symbolize beliefs, creativity and inclinations. Wearing a ring on a specific finger is usually related to a willingness for increasing the power associated with that finger.
The thumb: Willpower - the thumb represents logic and willpower, which control our actions. The thumb is independent of the other fingers and is the most important when working with the rest of the hand. It symbolizes power, freedom and freedom of thought.
The index finger: Power and ambition - this finger is symbolic of our need to escalate our ego and gain power and strength. It is also connected to leadership and ambition. Kings, priests and healers wear rings on their index finger because it is believed that this finger holds special power. People often wear rings on their index fingers to demonstrate their own power.
The middle finger: Identity and materialism - being the highest finger, it is connected to our goal in life. Since it is also in the center of the hand, it represents our identity and the things which are most important to us. Those who wear a ring on their middle finger, often want to be the center of attention.
The ring finger: Emotions, creativity and heart - wearing a ring on the ring finger means a link with the heart, since it is connected to an artery that goes all the way to the heart. It is tied to our feelings of love. It also illustrates our creativity and artistry. Wearing a ring on this finger on the left hand represents engagement and a promise of eternal loyalty to the person who gave it. If the ring has been purchased from someone wearing it, this portrays that the person loves and values themselves, as well as believing in their own talent.
The pinky: Connections - a ring on the pinky is a sign of reliance in business and personal relationships. It is a symbol of our connections with others. This finger is the opposite of the finger of independence, it is related to our attitudes toward others, intimacy and the material world. It also expresses the relation one has to oneself. Wearing a ring is a sign of honor but wearing numerous rings is usually a sign of a person who has low self-esteem, and despite that wants to draw attention to themselves.
More from Palmistry: Fingers and the Hand
More from Palmistry: Lines of the HandSee more | <urn:uuid:0f6933f3-2554-469f-85f8-0982983071c5> | CC-MAIN-2020-29 | https://mysteries24.com/n4-40849-Palmistry_-_Fingers_and_Rings | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886121.45/warc/CC-MAIN-20200704104352-20200704134352-00022.warc.gz | en | 0.963314 | 597 | 2.65625 | 3 |
Research activities on efficient and sustainable irrigation management, because of rapid climate change, population growth and decrease in water resources for agricultural, and increase in industrial demands, have been carrying out in the Department of Agricultural Irrigation and Land Reclamation. The main responsibility of the department is to carry out research projects about water consumption of crops grown in Aegean Region, irrigation water requirements, irrigation methods and the other subjects deal with agricultural water use and/or drainage. The other task is to provide the knowledge, data and irrigation techniques for investor institutions, farmers and farmer organizations.
Research Topics :
• Improvement of suitable irrigation methods and technology for efficiency water use in agriculture,
• Determination of suitable irrigation methods and programs for the optimum water usage by precision and deficit irrigation,
• Defining the results of marginal water use such as domestic waste water and drainage water in agriculture,
• Investigation the automation practices on surface and pressurized irrigation methods,
• Determination of the strategies of water distribution and usage in irrigation networks and providing the sustainability of land management for suitable crop production,
• Analyzing the water distribution performance and carrying out the researches for the improvement of irrigation systems,
• Investigation the quality and level of ground water for irrigation area and its effect on soil and plant,
• Determination of the criteria for drainage projects, which are the main objects of planning and operating of drainage systems, in field, lysimeters and laboratory conditions,
• Improvement of the fields which have salinity and/or alkalinity problems and reclamation of these fields for agriculture,
• Investigation about effects of climate change and droughts on agricultural water resources and irrigation practices,
• To analyze irrigation water, waste water and to conduct microbiological analysis for the water used in agricultural process, and also to evaluate the water according to the criteria of irrigation water. | <urn:uuid:fee48a86-a138-43fd-9370-4b1d423bf751> | CC-MAIN-2024-10 | https://arastirma.tarimorman.gov.tr/izmirutaem/Menus/54/Agricultural-Irrigation-And-Land-Reclamation | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00514.warc.gz | en | 0.912229 | 376 | 2.703125 | 3 |
If you already sick of hearing the IT experts or the mass media are constantly talking about Facebook and Twitter, you’ll want to start taking French lessons. Once proficient, you can move to the country. Why so?
Conseil Supérieur de l’Audiovisuel (CSL), an institution that makes the regulation of various electronic media in France has banned television and radio use the words Facebook and Twitter.
Both said it still may be used when in the body of the news, but if a television station intends to invite viewers to follow their account on Facebook, they should only be mentioned indirectly. For example “Please follow our social networking site.”
This rule itself refers to the law made in 1992 and about the mention of the name of the product as part of the ad.
“Why give up the facility on, now its value has reached billions of U.S. dollars, while at the same time many other social networking sites are struggling to be recognized by the community,” said Christine Kelly, a spokesman for CSL, as quoted from Good Media, 9 June 2011.
Kelly said the measures such as Facebook or Twitter mention of the word it will bring the distortion in competition.
However, the French government move was considered absurd by some circles. The reason, the industry is clearly already emerged the winner and we would not want to accept the fact that, rather than avoid it.
Also, now people are not lay against the existence of Facebook and Twitter. Chances are, if there is someone who is connected to the Internet and want to be a fan of one French television station and follow up or Twitter account of his, they might have taken the initiative to do a search through other Internet giants, Google. | <urn:uuid:b58a9f4f-3815-4536-af6f-eea4208c66a8> | CC-MAIN-2018-43 | https://masaguz.com/france-bans-word-facebook-and-twitter.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511206.38/warc/CC-MAIN-20181017174543-20181017200043-00537.warc.gz | en | 0.966068 | 362 | 2.53125 | 3 |
|Fajardo, Diego -|
|Morales, Jose -|
|Zhu, Huayu -|
|Harbut, Rebecca -|
|Vorsa, Nicholi -|
Submitted to: Plant Molecular Biology Reporter
Publication Type: Peer Reviewed Journal
Publication Acceptance Date: July 18, 2012
Publication Date: August 3, 2012
Citation: Fajardo, D., Morales, J., Zhu, H., Steffan, S.A., Harbut, R., Bassil, N.V., Hummer, K.E., Polashock, J.J., Vorsa, N., Zalapa, J.E. 2012. Discrimination of American cranberry cultivars and assessment of clonal heterogeneity using microsatellite markers. Plant Molecular Biology Reporter. 31(2):264-271. Interpretive Summary: Cranberries are grown from clonally preserved and vegetatively propagated cultivars. Growers usually select cultivars for their operation based on expected attributes, such as horticultural performance (e.g., yield, fruit color, disease resistance, etc.). Since each cranberry cultivar is theoretically propagated from “the original” cultivar clone, growers expect that each of their beds represent a single genotype with stable and uniform trait performance. However, in practice cranberry beds are established by cuttings from pruning or raking established production fields. Production fields are not managed to maintain genetic purity and are believed to become more genetically diverse over time, presumably due to seedling establishment from self-pollinated and outcrossed flowers. Thus, newly established cranberry beds will not necessarily be genetically uniform or clonal depending on the purity of the starting material. Growers request that their new materials be true-to-type, but no reliable and/or affordable methods exist to provide this assurance. In this study, we developed a reliable and efficient molecular method for cranberry cultivar discrimination. The molecular markers developed herein can also be used for other purposes such as the identification of parental materials used in breeding programs, assessment of genetic diversity, and the maintenance of germplasm collections.
Technical Abstract: Cranberries (Vaccinium macrocarpon Ait.) are an economically important fruit crop derived from a North American native species. We report the application of 12 simple sequence repeats (SSR) or microsatellite markers to assess the genetic diversity of cranberry cultivars. We studied 164 samples of 21 different cranberry cultivars, 11 experimental hybrids, and 6 representative accessions of wild species. Genetic cluster analysis, based on 117 SSR alleles, differentiated the major cranberry cultivars. However, some cranberry cultivar sub-clone variants and mislabeled samples were observed. Consensus genetic profiles identified the most likely clonal representatives of several important cranberry cultivars (e.g., ‘Ben Lear’, ‘Howes’, and ‘Stevens’). The markers were further used to confirm putative parents of several hybrid progenies. The long-term goal of our studies is to identify, preserve, and utilize unique genetic materials to breed improved cranberries. Attaining this goal will help growers maintain sustainability under changing economic and environmental conditions. | <urn:uuid:5a977899-015b-496a-bd71-516bf5f4cd30> | CC-MAIN-2015-32 | http://www.ars.usda.gov/research/publications/publications.htm?SEQ_NO_115=282849 | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990114.79/warc/CC-MAIN-20150728002310-00087-ip-10-236-191-2.ec2.internal.warc.gz | en | 0.890186 | 677 | 2.546875 | 3 |
To get aid in a disaster, one first determines find which county and/or state is declaring the disaster. Then you "hashtag" that geographical name and it will lead you to all kinds of aid. The county websites usually have information listed for immediate help. If you add the terms "livestock" or "pets" to the hashtag name of disaster, it will lead you to the main shelters or primary organizations offering aid. Livestock and horses are the most difficult to transport during a disaster. Most large farm animals are evacuated to county fairgrounds.
For smaller animals such as dogs and cats, government pounds sometimes help evacuate and temporarily house pets for those who have lost their homes. The reality is government pounds clear shelters by killing pets to make room for others. However, when we try to warn people that there's a real possibility that their pets are in danger of being killed, they get angry at me. In fact so many disasters leave beloved pets unclaimed and at the fate of pounds that are run by health departments, which are pressured to kill "excess" animals. Their job is animal care and control of dead animals and diseases or to impound any stray animal and kill it, i.e., management by death.
So it's up to the community and those of us who want to help those in need to reach out and offer aid to local shelters such as finding fosters, providing items like pet food, kennels, fencing, shavings, hay, grains, chicken coops, etc. In addition, after a period of time, unclaimed pets will need homes, and there is a very small period of time to find adopters if the owner does not claim the pet. What people need to know is that California has enacted the Hayden Act, which stipulates a four to six day hold for unclaimed pets (seven days with holiday) at government pounds.
There are three major recent disasters that need the public help. First is the northern California fire, known as #ValleyFire and #ValleyFirePets; second is the Texas fire, #BastropFire #pets, and last is the South Carolina Fire, #SCFloodRelief #pets.
The California fire in Lake County, was California's worst ever in terms sheer destruction. During fires, domestic animals seem to run back into burning houses or barns, unlike wildlife which instinctively knows where to go during a fire. So it's best to lock domestic pets outside and let them go free. Horses should have a snap halter so they don't get caught, and nothing made of nylon or plastic. Cats always suffer the most in fires since their instinct is to hide and not to run out into open spaces.
Rachael Hairston Photography | <urn:uuid:2a644a62-7f06-44cd-8481-0b7c6e3c4f70> | CC-MAIN-2019-30 | https://www.thedodo.com/california-valley-fire-help-pets-1424436132.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525634.13/warc/CC-MAIN-20190718125048-20190718151048-00300.warc.gz | en | 0.972001 | 568 | 2.59375 | 3 |
Published on November 10th, 2008 | by Paul O'Callaghan13
Energy Versus Water: Is Blue the New Green?
There is a growing recognition that there are two convergent crises facing the world: energy and water. Scientific American launched a dedicated environmental publication this month, Earth 3.0, with the cover story Energy Vs Water. The article explores the dichotomy between the fact that we need energy to produce water and we need water to produce energy. As we are reaching Peak Oil, we also appear to be approaching Peak Water. This creates an interesting dilemma—one which will require no small amount of innovation to solve.
Biofuels, cited as one option to wean us away from petroleum, can consume 20 or more times as much water for every mile traveled than the production of gasoline. Not all biofuels are created equal however. Some are worse offenders than others, and the US National Research Council addresses this very well in ‘Water Implications of Biofuels Productions in the United States’.
Electric hybrids are another solution to get away from imported gasoline. But if we switch to electric cars, we will need more electricity and at the moment 90 percent of electricity in the US is generated at thermal power plants—those that consume coal, oil, natural gas or uranium— and these plants are water hogs. They use vast quantities of water for cooling.
The US Army Corp of engineers is currently trying to find a middle ground in an interesting water drama unfolding between the states of Florida, Alabama and Georgia. Part of the problem is that both Georgia and Alabama have come dangerously close recently to having to shut down their nuclear power plants due to lack of water.
The Energy Vs Water article goes on to say that “any switch from gasoline to electric vehicles or biofuels is a strategic decision to switch our dependence from foreign oil to domestic water”.
The Concept of Virtual Water
To help assess issues relating to water use and water balance, Professor John Anthony Allan from Kings College London developed the concept of ‘Virtual Water’.
He was awarded the Stockholm Water Prize this year for his work in this area. According to his idea, you can calculate how much water there is in, say an apple, not just physically in the apple, but on a life cycle basis, how much water went into growing it, transporting it etc. By doing this with various food items or other commodities, a country could take a view to import ‘water heavy’ items as a kind of a virtual way of importing water. For instance, behind that morning cup of coffee are 140 liters of water used to grow, produce, package and ship the beans. The ubiquitous hamburger needs an estimated 2,400 liters of water.
Put simply, it may be more cost effective to import oranges from a region that has plenty of water than to try and desalinate water at home to irrigate an orchard. That doesn’t always work, though—you can’t grow things like oranges in wet damp countries like England.
And herein lies one of the fundamental problems. There is a reason why it is easier to grow 50% of the nations fruit and vegetables in California—it’s warm and sunny. And for this same reason, populations have been moving to the sunshine belt. If we could all live in California and import melons and oranges and strawberries from England, wouldn’t that be great? And you can’t cool a nuclear reactor with virtual water—at least not yet!
Photo Credit: Getty Images | <urn:uuid:b932cda3-1f1e-4684-9225-88e6032c423b> | CC-MAIN-2013-48 | http://cleantechnica.com/2008/11/10/energy-versus-water-is-blue-the-new-green/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052912/warc/CC-MAIN-20131204131732-00022-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.944831 | 732 | 2.84375 | 3 |
Ultraviolet Radiation and Bio-optics in Crater Lake, Oregon, 2005
Optical Proxies and the Impact of Phytoplankton on UVR Transparency
As in Case 1 marine waters, phytoplankton in Crater Lake normally are the dominant optical attenuator of UVR. During summer the UV attenuation rises from a minimum near the surface to a peak at the deep chlorophyll maximum (DCM) near 120 m. Measurements of Kd,UV at different wavelengths parallel each other with increasing depth although only the longer UVR wavelengths can be detected deep in the water column. Optical proxies for UV attenuation include the scattering of light by phytoplankton in the upper part of the photic zone (cp660, measured with a red beam transmissometer), and fluorescence of phytoplankton (Fchl, 683 nm) in the deeper regions (75–150 m). Other optical proxies for the depth range 0–40 m include inverse Secchi depth and diffuse attenuation in the broad blue waveband (400–500 nm), corresponding to historical underwater measurements with blue filter photometers. Only during rare heavy rains in summer does the optical dominance of phytoplankton give way to an optical signal from light scattering by suspended mineral particles and a likely breakdown of the proxy relationships. Excluding occasional wet summer months, Kd,UV derived from Secchi depth was correlated with phytoplankton biomass as measured by chlorophyll-a concentration for the period 1984–2002. | <urn:uuid:6cdb0a78-f7c0-4b7c-9202-e3789a45a573> | CC-MAIN-2017-34 | http://www.craterlakeinstitute.com/general-natural-history-articles/limnology-research/ultraviolet-radiation-and-bio-optics/ultraviolet-radiation-03-3/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102819.58/warc/CC-MAIN-20170817013033-20170817033033-00658.warc.gz | en | 0.898461 | 323 | 3.03125 | 3 |
You are here
|1||History of English Pronunciation||
Do we really know what Chaucer's poetry sounded like? Professor Simon Horobin introduces...
Professor Daniel Wakelin discusses the work of Chaucer and explains how he was one of the first...
|3||Why should we study Chaucer?||
Dr Laura Ashe of Worcester College, Oxford, discusses her current research and proposes why we...
|Laura Ashe, Ilana Lassman|
|1||Troilus & Criseyde||
ebook version of Troilus & Criseyde
|2||The Canterbury Tales||
ebook version of The Canterbury Tales
|3||A treatise on the astrolabe : addressed to his son Lowys||
A treatise on the astrolabe : addressed to his son Lowys by Geoffrey Chaucer. A.D. 1391 ...
The Cambridge ms (University Library, Gg.4.27) of Chaucer's Canterbury tales. | <urn:uuid:ac812eca-2b2b-4729-af6b-6b0eba682967> | CC-MAIN-2020-05 | http://writersinspire.org/writers/geoffrey-chaucer?qt-collection_media=1 | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601040.47/warc/CC-MAIN-20200120224950-20200121013950-00142.warc.gz | en | 0.746524 | 204 | 2.78125 | 3 |
These exercises are not terribly difficult,
but they should give you some idea
of the range of problems that occur when
trying to explain mathematical ideas in pictures:
a mixture of elementary geometry and occasionally
interesting programming problems,
as well as intellectual difficulties
involved in mathematical concepts. At first, you might feel
that the elementary geometry is an undignified
pursuit for a 21st century mathematician,
but as with any other language you will get better at it
with practice, and as you get better you will
enjoy it more.
I suppose that this material is the modern
replacement for what they used to teach
as `descriptive geometry'. | <urn:uuid:9e73ad56-8004-46d8-a6af-efd836221b3b> | CC-MAIN-2015-27 | http://www.math.ubc.ca/~cass/bms-2009/part4-0.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095270.70/warc/CC-MAIN-20150627031815-00046-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.947056 | 142 | 2.765625 | 3 |
2016: Sediment load and distribution in the lower Skagit River, Skagit County, Washington
Christopher A. Curran, Eric E. Grossman, Mark C. Mastin, and Raegan L. Huffman
The Skagit River delivers about 40 percent of all fluvial sediment that enters Puget Sound, influencing flood hazards in the Skagit lowlands, critically important estuarine habitat in the delta, and some of the most diverse and productive agriculture in western Washington. A total of 175 measurements of suspended-sediment load, made routinely from 1974 to 1993, and sporadically from 2006 to 2009, were used to develop and evaluate regression models of sediment transport (also known as “sediment-rating curves”) for estimating suspended-sediment load as a function of river discharge. Using a flow-range model and 75 years of daily discharge record (acquired from 1941 to 2015), the mean annual suspended-sediment load for the Skagit River near Mount Vernon, Washington, was estimated to be 2.5 teragrams (Tg, where 1 Tg = 1 million metric tons). The seasonal model indicates that 74 percent of the total annual suspended‑sediment load is delivered to Puget Sound during the winter storm season (from October through March), but also indicates that discharge is a poor surrogate for suspended‑sediment concentration (SSC) during the summer low-flow season. Sediment-rating curves developed for different time periods revealed that the regression model slope of the SSC-discharge relation increased 66 percent between the periods of 1974–76 and 2006–09 when suspended-sediment samples were collected, implying that changes in sediment supply, channel hydraulics, and (or) basin hydrology occurred between the two time intervals. In the relatively wet water year 2007 (October 1, 2006, through September 30, 2007), an automated sampler was used to collect daily samples of suspended sediment from which an annual load of 4.5 Tg was calculated, dominated by a single large flood event that contributed 1.8 Tg, or 40 percent of the total. In comparison, the annual load calculated for water year 2007 using the preferred flow-range model was 4.8 Tg (+6.7 percent), in close agreement with the measured value.
Particle size affects sediment transport, fate and distribution across watersheds, and therefore is important for predicting how coastal environments, particularly deltas and beaches, will respond to changes in climate and sea-level. Particle-size analysis of winter storm samples indicated that about one-half of the suspended-sediment load consisted of fines (that is, silt- and clay-sized particles smaller than 0.0625 mm in diameter), and the remainder consisted of mostly fine- to medium-sized sand (0.0625–0.5 mm), whereas bedload during winter storm flows (about 1–3 percent of total sediment load) was predominantly composed of medium to coarse sand (0.25–1 mm). A continuous turbidity record from the Anacortes Water Treatment Plant (water years 1999–2013), used as a surrogate for the concentration of fines (R2 = 0.93, p = 4.2E-10, n = 17), confirms that about one-half of the mean annual suspended-sediment load is composed of fines.
The distribution of flow through the delta distributaries (that is, the channels into which the main stem splits as it approaches the delta) is dynamic, with twice as much flow through the North Fork of the Skagit River relative to the South Fork during low-flow conditions, and close to equal flows in the two channels during high-flow conditions. Turbidity, monitored at several locations in the lower river in spring 2009, was essentially uniform among sites, indicating that fines are well mixed in the lower Skagit River system (defined as the Skagit River and all its distributaries downstream of the Mount Vernon streamgage). A strong relation (R2 = 0.95, p = 3.2E-14, n = 21; linear regression) between the concentration of fines and turbidity measured at various locations in summer 2009 indicates that turbidity is an effective surrogate for the concentration of fines, independent of location in the river, under naturally well-mixed fluvial conditions. This relation is especially useful for monitoring suspended sediment in western Washington rivers that are seasonally dominated by glacier meltwater because glacial melting typically produces suspended-sediment concentrations that are not well correlated with discharge. These results provide a comprehensive set of tools to estimate sediment delivery and delta responses of interest to scientists and resource managers including decision-makers examining options for flood hazard mitigation, estuary restoration, and climate change adaptation. | <urn:uuid:ea2cc45c-feea-4535-9bc1-695f1b2100bc> | CC-MAIN-2018-05 | https://www.skagitclimatescience.org/research/completed-research/sediment-load-and-distribution-in-the-lower-skagit-river-skagit-county-washington/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891886.70/warc/CC-MAIN-20180123091931-20180123111931-00655.warc.gz | en | 0.945512 | 979 | 2.59375 | 3 |
Artificial intelligence careers are in high demand. Artificial intelligence (AI) has created new opportunities during the past few years. It is creating waves throughout industries, making things that were previously inconceivable, like space exploration and melanoma diagnosis, possible. As a result, AI careers have also steadily increased; according to LinkedIn, AI professionals are among the “jobs on the rise.”
Don’t be scared of AI jargon; we have created a detailed AI glossary for the most commonly used artificial intelligence terms and explain the basics of artificial intelligence as well as the risks and benefits of artificial intelligence. After data architect, cloud computing, data engineer jobs, and machine learning engineers it’s time for artificial intelligence careers in the Hot and on the Rise series.
Table of Contents
Artificial intelligence career paths
Are you interested in artificial intelligence careers? Professionals with expertise in artificial intelligence are more needed than ever because it is a technology that is becoming more and more common. The good news is that there are many job options in the AI sector, so you can assume a variety of tasks and responsibilities depending on the position, your background, and your pursuits.
Nearly every sector has a need for skilled AI workers, including:
- Financial services
- Government and military
- National security
- IoT-enabled systems
Prospects of artificial intelligence
There are several artificial intelligence career options. The list that follows contains both AI-related employment and certain roles that collaborate closely with people in AI jobs:
|Career Path||Description||Median Annual Salary|
|Data analytics||Making predictions about the future by identifying important patterns in data by looking at the past.||$65,000|
|User experience||Work with the items to ensure that customers can utilize them readily and understand their purpose. Recognize how users interact with technology and how computer scientists might utilize this knowledge to create more sophisticated software.||$76,950|
|Natural language processing||ChatbotsVirtual assistants||$108,609|
|Researcher||AI and computer science research. Learning how to advance AI technologies.||$77,576; base-level AI research roles average $93,103|
|Research scientist||Expert in computational statistics, machine learning, and deep learning. Expected to possess a graduate degree in computer science or a similar discipline that is supported by experience.||$99,809|
|Software engineer||Create software on which AI tools can run.||$87,403|
|AI engineer||Create AI models from scratch and aid stakeholders and product managers in understanding outcomes.|
|Data mining and analysis||Finding anomalies, patterns, etc. within large data sets to predict outcomes.||$77,586|
|Machine Learning Engineer||Analyzing massive data sets for anomalies, patterns, etc. to make predictions.||$146,085|
|Data scientist||Gather, examine, and interpret data.||$115,573|
|Business intelligence (BI) developer||Determine business and market trends by analyzing large, complicated data sets.||$92,278|
|12. Big data engineer/architect||Create technologies that enable data collection and communication between enterprises.||$151,307|
Do you need a guide for these jobs? Don’t worry, we already covered you.
Artificial intelligence career guide
Despite being a young and specialized area, artificial intelligence occupations are diverse. There are many artificial intelligence career options, each requiring a unique set of qualifications.
Let’s examine some of the most wanted.
Long ago, a data analyst was someone who gathered, purified, processed, and examined data in order to draw conclusions. These were primarily routine, repetitive chores in the past. With the emergence of AI, most of the mundane work has been mechanized. The data analyst position has therefore been promoted to join the new class of AI occupations. Data analysts today compile data for machine learning models, then use the results to create insightful reports.
An AI data analyst, therefore, needs to be knowledgeable about more than simple spreadsheets. They must be knowledgeable about:
- To extract/process data, use SQL and other database languages.
- Python for analysis and cleaning.
- Dashboards for analytics and visualization software, such as Tableau, PowerBI, etc.
- Understanding the market and organizational context with business intelligence.
The typical compensation for a data analyst is $65,000. However, high-tech firms like Facebook, Google, and others pay over $100,000 for employment as data analysts.
Machine learning engineer
Software developers and data scientists come together to form the field of machine learning engineering. They use big data technologies and programming frameworks to develop data science models that are production-ready, scalable, and capable of handling terabytes of real-time data.
The ideal candidates for machine learning engineer positions have backgrounds in data science, applied research, and software engineering. Candidates for AI positions should have a solid background in mathematics, and familiarity with deep learning, neural networks, cloud applications, and Java, Python, and Scala programming. Understanding software development IDE tools like Eclipse and IntelliJ is also beneficial.
In the US, a machine learning engineer makes on average $1,31,000. Pay at companies like Apple, Facebook, Twitter, and similar ones is substantially higher, averaging between $170,000 and $200,000. Learn more about the pay for ML engineers here.
Machine learning vs artificial intelligence article explains the differences between them.
Engineers in artificial intelligence (AI) with a focus on the spoken and written human language are known as natural language processing (NLP) specialists. NLP technology is used by engineers who work on voice assistants, speech recognition, document processing, etc. Organizations require a specific degree in computational linguistics for the position of an NLP engineer. They might also be open to hiring candidates who have a background in computer science, math, or statistics.
An NLP engineer would require expertise in sentiment analysis, n-grams, modeling, general statistical analysis, computer capabilities, data structures, modeling, and sentiment analysis, among other things. It might be advantageous to have prior knowledge of Python, ElasticSearch, web development, etc.
An NLP engineer has an average salary of $78,000, but with expertise, they can make over $100,000.
For a variety of goals, data scientists gather data, examine it, and draw conclusions. To extract knowledge from data and find significant patterns, they employ a variety of technological tools, procedures, and algorithms. This could be as simple as seeing anomalies in time-series data or as complicated as generating predictions about the future and giving advice. The following are the main requirements for a data scientist:
- Advanced degree in mathematics, computer science, statistics, etc.
- Statistical analysis and unstructured data comprehension.
- Having knowledge of platforms like Hadoop and Amazon S3 for the cloud.
- Expertise in programming languages like Python, Perl, Scala, and SQL.
- Working familiarity with Hadoop, Spark, MapReduce, Pig, and Hive.
A data scientist makes $105,000 on average. A director of data science role can earn up to $200,000 with experience.
Business intelligence developer
To find trends, business intelligence (BI) developers analyze intricate internal and external data. For instance, in a business that provides financial services, this could be someone who keeps track of stock market statistics to aid in investment selection. This might be someone who keeps an eye on sales patterns for a product company to help with distribution planning.
Business intelligence developers don’t really produce the reports, in contrast to a data analysts. For business users to use dashboards, they are often in charge of designing, modeling, and maintaining complex data on highly accessible cloud-based data systems. A BI developer is expected to possess the following skills:
- Engineering, computer science, or a related subject bachelor’s degree.
- Having practical knowledge of SQL, data mining, and other related topics.
- Knowledge of BI tools like Tableau, Power BI, etc.
- Powerful technical and analytical abilities.
For AI applications, software engineers create software. For AI jobs, they combine development activities such as creating code, continuous integration, quality control, API administration, etc. They create and manage the software used by architects and data scientists. They remain knowledgeable about current developments in artificial intelligence technology.
Software engineering and artificial intelligence expertise are prerequisites for an AI software engineer. In addition to statistical and analytical abilities, they must have programming skills. A bachelor’s degree in computer science, engineering, physics, mathematics, or statistics is often required by employers. Certifications in AI or data science might also help you get hired as an AI software developer.
Software engineers make $108,000 on average. Depending on your sector, specialization, and experience, this can reach $150,000.
When industrial robots began to gain popularity in the 1950s, the robotics engineer was possibly one of the first professions in artificial intelligence. Robotics has come a long way from the manufacturing lines to teaching English. Robotic-assisted surgery is used in healthcare. Robotic humans are being created to serve as personal assistants. All of this and more is what a robotics engineer does.
AI-powered robots are created and maintained by robotics engineers. Organizations often require graduate degrees in engineering, computer science, or a related field for these positions. Robotics engineers may be required to have knowledge of CAD/CAM, 2D/3D vision systems, the Internet of Things (IoT), as well as machine learning and AI.
Robotics engineers typically make $87,000 per year, but with experience and specialization, they can earn up to $130,000.
Big data engineer/architect
Big data engineers and architects create ecosystems that enable efficient communication between multiple business verticals and technology. As big data engineers and architects are often entrusted with planning, creating, and developing big data environments on Hadoop and Spark systems, this profession may feel more complicated than that of a data scientist.
Professionals with a Ph.D. in mathematics, computer science, or similar subjects are preferred by the majority of employers. However, because this position is more practical than, say, a research scientist, practical experience is frequently viewed as a strong replacement for a lack of academic degrees. Programming knowledge in C++, Java, Python, or Scala is required of big data engineers. Additionally, they must have knowledge of data migration, data visualization, and mining.
With an average compensation of $151,300, big data engineers are among the highest-paid positions in artificial intelligence.
Artificial intelligence job requirements
The traits that enable the most successful AI professionals to excel and develop in their jobs are frequently shared by these individuals. Working with artificial intelligence demands the capacity to think analytically and to come up with economical, efficient solutions to challenges. It also calls for insight into technological advancements that result in cutting-edge software that keeps organizations competitive.
AI experts also require technical expertise to create, maintain, and fix software and hardware. Finally, in order to do their jobs effectively, AI experts need to learn how to convey highly technical knowledge to non-technical audiences. This necessitates effective teamwork skills and effective communication.
Artificial intelligence education requirements
The majority of artificial intelligence programs are built on foundational computer science and math knowledge. A bachelor’s degree is required for entry-level work, whereas master’s and doctoral degrees are usually required for jobs requiring supervision, leadership, or administrative responsibilities.
Typical curriculum includes research into:
- Numerous math topics, such as probability, statistics, algebra, calculus, logic, and algorithms are covered.
- Neural nets or Bayesian networking are two examples of graphic modeling.
- Engineering, robotics, and physics.
- Coding, programming languages, and computer science.
- Cognitive science theory.
Candidates can search for degree programs with particular AI majors or pursue an AI emphasis within other majors like computer science, engineering, health informatics, graphic design, information technology, or engineering.
Artificial intelligence career salary
Jobs in artificial intelligence are in extremely high demand, and many of them pay well into the six figures. The precise figures will vary on a variety of elements, including the particular work responsibilities, industry, experience, level of education, and location.
However, this is a common range: A research engineer will make about $92,938 annually, according to Indeed, while a machine learning engineer would make about $150,183.
An artificial intelligence programmer typically earns between $100,000 and $150,000 each year, claims Datamation. On the other side, AI engineers make an average salary of $171,715 with top earners making over $250,000.
High pay are a result of the requirement for higher degrees and a rare mix of abilities.
Is AI a good career?
With a 31.4 percent growth in opportunities for data scientists and mathematical scientists, who are essential to AI, by 2030, the field of artificial intelligence has a bright future for career advancement.
The IT revolution is centered on artificial intelligence, which is constantly improving. AI is the driving force behind computer vision, speech analysis, and natural language processing. AI has a significant impact on business and society and will do so for a very long time.
The abundance of career prospects in the AI field is therefore not surprising; in fact, there are so many of them that the industry currently faces a unique problem: there are too many open positions and not enough competent applicants. The good news is that it provides nearly assured (and well-paying) work for those who are qualified.
Is AI difficult to learn?
Is AI difficult to learn? Yes, it can be, and 93 percent of automation technologists themselves feel underprepared for impending problems in the field of smart machine technology.
Artificial intelligence implementation presents various difficulties for businesses. Lack of personnel skills ranks as the biggest problem among them, affecting 56 percent of the businesses. Since AI is inherently difficult, it seems sense that most businesses feel this way.
It can be challenging to learn because of reasons like:
- Extensive programming: Programming is essential for AI. To teach computers to make their own decisions, you must learn how to code.
- Data proficiency: For machines to become skilled at an activity, they require a lot of data to learn from. Especially if you’re just getting started, getting this can be challenging.
- Complexity: Understanding AI requires knowledge of many disciplines, including computer science, statistics, calculus, and more.
- Lack of adequate tools: The majority of artificial intelligence tools and procedures in use today were created for conventional software. Newcomers to the sector frequently have to invest time and money in creating new tools, which can be challenging and time-consuming.
These figures do not, however, imply that there are no entry-level positions available in the field of AI and ML. Such employment opportunities abound, and you may get ready for them.
How long does it take to learn AI?
Although there is no denying that artificial intelligence’s future is bright, many people wonder how to get started in the field and how long it would take to master it. There is no clear answer to this query. In actuality, a variety of things have a role. But if you want the truth, studies have shown that it takes 10,000 hours to become an expert at any craft. Therefore, you could say that this also applies to machine learning.
Advanced ideas like deep learning, reinforcement learning, and unsupervised machine learning could require more time to learn. The length of the curriculum also affects how long it will take you to learn the skill because the majority of people who study artificial intelligence complete a certification program or course.
Artificial intelligence has advanced and improved people’s quality of life ever since its invention in the 1950s and continues to do so now in a variety of industrial contexts. As a result, an artificial intelligence profession will be fulfilling and sustainable for people who possess the ability to convert digital informational snippets into meaningful human experiences.
The majority of the current technology occupations are not careers in AI. Since AI is a rapidly developing discipline, experts working in the field must continually update themselves and keep up with new developments. AI/ML experts must regularly follow the most recent research and comprehend new algorithms; it is no longer adequate to just acquire abilities.
AI-related work opportunities are growing across a range of industries and are exciting and well-paying.
Additionally, AI is the subject of intense social and governmental scrutiny. AI experts need to consider AI’s social, cultural, political, and economic effects in addition to its technical components.
If you are asking “is artificial intelligence better than human intelligence“, we already have the answer. From the precursors of artificial intelligence to today, it is evolving and opening new opportunities for humanity. Artificial intelligence in developing countries is a suitable example of it. But can this one-sided interest change one day? | <urn:uuid:bc81209c-9a0c-4ad0-8dba-646e5f400477> | CC-MAIN-2022-33 | https://dataconomy.com/2022/07/artificial-intelligence-career/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00406.warc.gz | en | 0.937055 | 3,587 | 2.671875 | 3 |
I grew up in Pennsylvania, north of the Mason-Dixon line, where I learned about the Civil War. At times it was referred to as "the war between the states". Since moving to the Carolinas, however, I've learned that some call it "the war of Northern aggression", and that the Confederate dead are still honored, as you will see in these shots, taken at the Oakwood Cemetery in Wilmington, NC.
|Approximately 258,000 Confederate soldiers died in the American Civil War.|
|In all, historians estimate that about 620,000 Americans died in the Civil War. That’s almost as many as have died in all other U.S. wars combined. - http://www.learnnc.org/lp/editions/nchist-civilwar/4601|
|The Confederate section of Oakwood Cemetery is said to contain more than 2800 soldiers. http://www.censusdiggins.com/oakwood.cem.html| | <urn:uuid:e4b7335e-6e4e-4212-a13a-641a1df04f68> | CC-MAIN-2017-22 | https://image-in-ing.blogspot.com/2013_10_01_archive.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463614615.14/warc/CC-MAIN-20170530070611-20170530090611-00398.warc.gz | en | 0.9694 | 207 | 2.8125 | 3 |
A trust has been defined, in its technical sense, as the right enforceable solely in equity to the beneficial enjoyment of property of which the legal title is in another (Bispham, "Equity", p. 68), and as a right of property, real or personal, held by one party for the benefit of another. ( Bouvier, "Law Dict.", s. v. Trusts .) It implies two interests, one in equity and one in law — an individual to hold the legal title, who is known as the trustee, and another as beneficiary, known as the cestui que trust . The term "trust" is applied sometimes to the equitable title, the obligation of the trustee, or the right which is held in trust. For the creation of a valid trust there are three essentials: a definite subject matter within the disposal of the settlor; a lawful definite object to which the subject matter is to be devoted; clear and unequivocal words or acts devoting the subject matter to the object of the trust (28 Am. and Eng. Ency. of Law, 866, title "Trusts and Trustees"). No specific words are required in the creation of a trust, but they must be sufficient to express the present intent to place a beneficial interest in a specific property in the hands of a trustee beyond the control of the person or persons who are to enjoy the benefit thereof. Any property, real, personal, or equitable, may be the subject of a trust, except in a few cases where statutes have provided to the contrary.
The English Statute of Frauds, which has been enacted in most of the United States in some of its provisions, provides that all trusts of land should be proved and manifested by writing. But trusts of personal property are not within the statute; therefore a valid trust of such property may be created verbally, but transfers of existing trusts must be in writing. Under the Roman Law trusts were created for the purpose of empowering certain individuals to inherit property. These trusts were known as fidei commissa and for their benefit a separate equitable jurisdiction was established. There has been some controversy as to whether the English trust is an outcome of the Roman institution or not. The difference between the two is that the latter is a means of carrying out substitutions, while the former separates the ownership and enjoyment of the benefits of an estate, the fundamental idea at the root of both being much the same. This system seems to have appeared in England under the reign of Edward III, for the purpose of avoiding the Statutes of Mortmain, which had been passed to check the growth of landed estates in the hands of religious houses. These trusts were abolished, except as to certain gifts or grants, by the passage of the Statute of Uses, known as the 27th Henry VIII, which held that any person entitled to the use of an estate should have the title to it. This statute has either been recognized as part of the common law in most of the United States through judicial interpretation or been enacted by legislation.
Trusts are either executed or executory, express or implied. In an executed trust the instrument must be interpreted according to the rules of law, even though the intention may be defeated. A court of equity will take jurisdiction for the purpose of carrying out executory trusts and seeing that the instrument which purports to fulfil the intention of the settlor really does so, and will reform conveyances where the intentions of the settlor have not been clearly set out. An express trust is one which is created by the direct words of the settlor. Implied trusts are those which arise when the terms or circumstances do not specifically express but simply imply a trust. Where the entire intention of the trust cannot be carried out without violating some rule of law or public policy, equity will carry it out as nearly as possible. Constructive trusts arise by a construction put by a court of equity on the conduct of the parties. The Statute of Frauds 29th Charles II requires that declarations of trust of lands should be proved by writing.
Any person worthy of confidence and possessed of the power to hold real or personal property may be a trustee, the sovereign in England, any of the states of the United States, and perhaps the Federal Government, a public officer in his private capacity or the settlor himself; even the beneficiary or cestui que trust may act as trustee providing there are other beneficiaries besides himself; so too a corporation may act in this capacity if not precluded by the terms of its charter. Municipal corporations have been trustees but the general trend of authority is to the contrary. Married women may be trustees and, acting under the direction of the court, an infant, alien, or lunatic. In cases where no trustee has been named, or for some reason the office has become vacant, the court will supply the deficiency rather than allow the trust to fall, it being inherent in a court of equity to exercise this power, while in many jurisdictions it has been specifically granted by statute. As a general rule, the trustee is appointed by the settlor and provision made for his successors. The settlor may designate whomsoever he wishes and vest in that person the power to appoint succeeding trustees, though sometimes the power is placed with the cestui que trust and sometimes with the settlor. The number of trustees is governed by the provisions of the instrument of the trust, but as a general thing the courts look unfavourably upon single trustees, particularly in the cases of large estates or those for infants or lunatics.
There is no particular method by which a trustee accepts a trust. His actions in the matter are usually equivalent to acceptance, although sometimes he joins in the instrument if it is a conveyance. There are, however, but three ways by which he may be relieved: first, the consent of all parties in interest; second, by virtue of the provisions of the instrument of trust; and third, with the consent of the court. The old rule in England forbade a trustee retiring on his own motion, but the modern rule is different except where it is impossible to provide a substitute. The conduct sufficient for the removal of a trustee from his office must be such as to endanger the trust funds, and the courts will not look favourably upon light or frivolous whims and disagreements among the parties. The powers of trustees are general and special — those which arise by construction of law incident to the office, and those provided by the settlor. Any person who has capacity to hold property may be a cestui que trust , although some jurisdictions restrict the rule to minors or other incompetents. He must be definitely ascertained either in person or as a class, but need not be actually in being at the date of the settlement. A sovereign, any of the states of the United States, or the Federal Government may be a beneficiary, or a corporation so far as personal property is concerned, and also as to real estate within the limits of its charter privilege or unless prohibited by statute. An unincorporated society, however, cannot be a cestui que trust except in the case of a charitable or religious society. The beneficiary has a right to alienate or encumber his estate unless the terms of the trust expressly or impliedly forbid or there is a statute which interferes; so too he may assign his interest or even alienate the income before it becomes due.
The cestui que trust or beneficiary has three remedies in the event of a breach of trust on the part of his trustee. He may follow the specific estate into the hands of a stranger to whom it has been wrongfully conveyed; he has the right of attaching the property into which the estate may have been converted ; and the further right of action against the trustee personally for reimbursement. As between him and the trustee there is no time limit when an action may be brought. It is the rule that purchasers must see to the application of the purchase money in the cases of trust estates, such as where it is provided that the funds be for the payment of specific legacies or annuities or debts. In some jurisdictions this rule has been abrogated by statute. Technical terms are not necessary in a devise to create a trust but if used will be interpreted in their legal and technical sense. General expressions, however, will not establish a trust unless there appears a positive intention that they should do so. Bequests in trust for accumulation must be confined within the limits established against perpetuities. A settlor can only extend the trust for the life or lives in being and twenty-one years, and any attempt to extend the trust beyond this period vitiates it in toto . By statute, accumulations are forbidden in some jurisdictions excepting during the minority of the beneficiary or for other fixed periods ( Bouvier, "Law Dict.", s. v. Perpetuity ).
As a rule, the interest of a beneficiary is liable for the payment of his debts, but this does not prevail in a majority of the United States . Spendthrift trusts, as they are called, being for the protection of the beneficiary against his own improvidence, are sustained in these jurisdictions. Since the Statute of Wills equitable interests are devisable only in writing. How far a devisee of a trust estate can execute the trust depends on the intention of the settlor expressed in the instrument. General words will not pass a trust estate unless there is a positive intention that it should so pass. In order to create a valid trust by will, the instrument must be legally executed and admitted to probate. There is this distinction between wills and declarations of trusts. The former, being ambulatory, take effect only on the death of the testator, the latter at the time of execution. Formerly under the common law an executor had title to all personal property of the decedent, and was entitled to take the surplus after the payment of debts and legacies ; now, by statute he is prima facie a trustee for the next of kin. Although a trustee is, in theory, allowed nothing for his trouble, his commissions are, in point of fact, generally fixed by statute and he is allowed his legitimate expenses. See CHARITABLE BEQUESTS; LEGACIES.
The Catholic Encyclopedia is the most comprehensive resource on Catholic teaching, history, and information ever gathered in all of human history. This easy-to-search online version was originally printed between 1907 and 1912 in fifteen hard copy volumes.
Designed to present its readers with the full body of Catholic teaching, the Encyclopedia contains not only precise statements of what the Church has defined, but also an impartial record of different views of acknowledged authority on all disputed questions, national, political or factional. In the determination of the truth the most recent and acknowledged scientific methods are employed, and the results of the latest research in theology, philosophy, history, apologetics, archaeology, and other sciences are given careful consideration.
No one who is interested in human history, past and present, can ignore the Catholic Church, either as an institution which has been the central figure in the civilized world for nearly two thousand years, decisively affecting its destinies, religious, literary, scientific, social and political, or as an existing power whose influence and activity extend to every part of the globe. In the past century the Church has grown both extensively and intensively among English-speaking peoples. Their living interests demand that they should have the means of informing themselves about this vast institution, which, whether they are Catholics or not, affects their fortunes and their destiny.
Copyright © Catholic Encyclopedia. Robert Appleton Company New York, NY. Volume 1: 1907; Volume 2: 1907; Volume 3: 1908; Volume 4: 1908; Volume 5: 1909; Volume 6: 1909; Volume 7: 1910; Volume 8: 1910; Volume 9: 1910; Volume 10: 1911; Volume 11: - 1911; Volume 12: - 1911; Volume 13: - 1912; Volume 14: 1912; Volume 15: 1912
Catholic Online Catholic Encyclopedia Digital version Compiled and Copyright © Catholic Online | <urn:uuid:65dd9062-9c8c-43f4-b633-39a9b7d07a3c> | CC-MAIN-2015-48 | http://www.catholic.org/encyclopedia/view.php?id=11727 | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398452385.31/warc/CC-MAIN-20151124205412-00147-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.963046 | 2,461 | 3.15625 | 3 |
Using detailed field study observations of the side–striped jackal (Canis adustus) and a simple stochastic model of the transmission dynamics of the virus and host demography, we discuss the epidemiology of rabies virus infection in the jackal population of Zimbabwe. Of the two jackal species in Zimbabwe, the other being the black–backed jackal (Canis mesomelas), the bulk of notified rabies cases are in side–striped jackals. Specifically, we show that the side–striped jackal population itself does not seem able to support rabies infection endemically, i.e. without frequent reintroduction from outside sources of infection. We argue that this is probably because the overall average jackal population density is too low to maintain the chain of infection. This study suggests that the disease is regularly introduced to jackals by rabid dogs from populations associated with human settlements. Given the rapidly rising dog population in Zimbabwe, estimates are derived of the future incidence of jackal rabies based on different dog vaccination scenarios. | <urn:uuid:eff15a76-fa6d-496f-a2b9-0c26322f6031> | CC-MAIN-2017-04 | http://rstb.royalsocietypublishing.org/content/353/1371/999 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00125-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.910246 | 214 | 2.625 | 3 |
Seattle, Wa (PRWEB) March 28, 2014
A birth defect is a problem, which happens while a baby is developing in the mother's body. Almost birth defects happen during the first three months of pregnancy. “How To Prevent Birth Defects,” a new report created by Jacob Dawson on the site HealthReviewCenter.com provides detailed instructions and tips to prevent birth defects easily. In the first part of this report, people will discover some steps they can take to increase their chances of bringing home a happy and healthy baby such as:
In the second part of this article, Jacob Dawson reveals to readers the reasons why resting or sleeping on their left side can help improve circulation to their baby. The writer also points out that swimming, walking, and using a stationary bike are easy and safe exercises for expectant mothers. In the final part of this report, people will discover how tobacco intake can increase the risk of a low birth weight, premature birth, and death. The author also recommends that women who smoke while pregnant will increase the risk of having a miscarriage. Smoking also is linked to SIDS (sudden infant death syndrome). Huy Tran from the site HealthReviewCenter.com says, “How To Prevent Birth Defects is a good report that covers useful tips for prevent the risk of birth defects, and tips to increase chances of having a healthy baby.”
If people want to get more detailed information from the “How To Prevent Birth Defects” article, they should visit the website: http://healthreviewcenter.com/blog/how-to-prevent-birth-defects/
About Jacob Dawson: Jacob Dawson is an editor of the website HealthReviewCenter.com. In this website, Jacob Dawson provides people with a collection of articles on tips to prevent the risk of birth defects. People could send their feedbacks to Jacob Dawson on any digital product via email. | <urn:uuid:2c610372-2ad3-4fad-8318-be8852c7b569> | CC-MAIN-2015-22 | http://www.prweb.com/releases/how-to/prevent-birth-defects/prweb11709806.htm | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929803.61/warc/CC-MAIN-20150521113209-00145-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.936656 | 397 | 3.265625 | 3 |
Smallpox long reigned as the king of dreaded contagious diseases. It killed more people than any other virus in recorded history — about 500 million people in the 20th century alone. For about 20 years smallpox seemed to have vanished, no longer haunting the dreams of most people. Many had never even heard of it. However, terrorists’ suicidal viciousness and new biological attacks have brought the threat of smallpox back to the future.
The first record of smallpox was a physical one: it was found in ancient Egyptian mummies. The first written descriptions are from early China where it was described as a disease from the west. The disease also spread as part of the great Islamic expansion across North Africa and into Spain. The ill-fated travel of the Crusades then brought it to the rest of Europe where for many generations it caused about 10% of all deaths every year.
European explorers then brought it to the American colonies, where epidemics were devastating to colonists – but especially to Native Americans. Smallpox-contaminated blankets may have been given to natives as intentional acts of biological warfare. Later, George Washington believed that British troops intentionally infected colonial forces with smallpox.
Eventually, almost everyone on earth got smallpox. This airborne disease was so contagious that it became a standard feature of life on our planet. Most people recovered, but the overall mortality rate when infected was 1 to 30% — and even higher during some epidemics.
People with the illness got sick suddenly, with a high fever, headache, and marked fatigue. Nausea, vomiting, abdominal pain, back pain, and muscle pains were also common. A few days later, pox appeared – mostly on the face and legs.
Efforts at developing immunity to smallpox first began in China. A Buddhist nun living a millennium ago noticed that some people had milder cases of smallpox than others. She took powdered scabs from people who had mild cases and put them in healthy people’s noses to prevent serious infection. This process is called “variolation” after variola, the name of the smallpox virus. Variolation spread over the next 750 years. On balance, it was a beneficial practice, even though it caused the death of 2-3% of those variolated. I suspect that those who died from variolation would probably have died from smallpox anyway.
Variolation had come to England but had been outlawed because of the deaths it caused, when Edward Jenner made his momentous observations. Jenner noticed that milkmaids had unusually beautiful complexions. Over the course of a decade, he wondered if they were safe from smallpox because they had caught a much milder illness, cowpox, from their handling of the cows. On May 14, 1796, Jenner took material from cowpox on the hand of milkmaid Sarah Nelm and inoculated it into the arm of young James Phipps. Jenner then deliberately exposed Phipps to smallpox – and Phipps didn’t get it! With the solid success of using cowpox (the virus is called vaccinia), “vaccination” was born.*
The success was so dramatic that 10 years later President Thomas Jefferson predicted that one day people would only know about the dread of smallpox from reading history books. And there was a time that it looked as if Mr. Jefferson had been proven right. Join us for the next several days for DrGreene’s discussion of smallpox, anthrax, and his surprising conclusions for children’s health.
*Vaccination did not begin with Jenner, though he did both popularize it and coin the term. Decades earlier a cattle rancher named Benjamin Jesty used cowpox to protect his family from smallpox.
Sign-up for DrGreene's Newsletter
About once a month we send updates with most popular content, childrens' health alerts and other information about raising healthy children. We will not share your email address and never spam. | <urn:uuid:3717c926-9572-4a52-9312-bcf6a2d954b3> | CC-MAIN-2014-52 | http://www.drgreene.com/history-smallpox/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768724.86/warc/CC-MAIN-20141217075248-00032-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.979719 | 824 | 3.4375 | 3 |
Learn About Line Graphs
Imagine you get a job helping your grandma clean her messy garage!
Its summer vacation, so you agree to help your grandma every day for one week.
She'll pay you $10 for every hour you work!
Creating a Line Graph
Grandma writes your earnings on a line graph, so she knows how much to pay you at the end of the week.
Here's what she draws at the beginning of the week:
👉 First, she draws the x-axis. This is the horizontal line marking the days of the week.
Then she draws the y-axis. This is the vertical axis which shows the amount of money you earned.
Every day, she draws a dot to show how much you earned that day.
- On Monday, you work for three hours, so she pays you 30 dollars.
- On Tuesday, you only worked for an hour an a half, so grandma pays you 15 dollars.
For Monday's earnings, Grandma drew the dot above "Monday" and to the right of "30".
She does this for the earnings throughout the rest of the week.
Now, when she connects the dots it makes a line graph.
Reading a Line Graph
A line graph shows points connected by a line. This kind of graph is useful for showing how the value of something changes over time.
It shows how your earnings went up and down during the week.
Look at the line graph.
👉 From Monday to Sunday, did your earnings go up or down?
It went up!
👉 How much money did you earn on Thursday?
That's right! You earned $30 on Thursday.😎
👉 On which day did you earn the most?
You earned the most on Sunday!
Watch and Learn
You can start practice now. 😃 | <urn:uuid:c9eaf979-0a3e-43b7-9c2f-62cf438ae3ce> | CC-MAIN-2021-25 | https://classace.io/learn/math/2ndgrade/line-graphs-2 | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611089.19/warc/CC-MAIN-20210613222907-20210614012907-00521.warc.gz | en | 0.964827 | 383 | 4.15625 | 4 |
Get ready for the future. It is already here.
"Scientists have developed a way to turn memories on and off—literally with the flip of a switch."
LOS ANGELES, June 17, 2011 /PRNewswire-USNewswire
The paper is entitled “A Cortical Neural Prosthesis for Restoring and Enhancing Memory.” Besides Deadwyler and Berger, the other authors are, from USC, BME Professor Vasilis Z. Marmarelis and Research Assistant Professor Dong Song, and from Wake Forest, Associate Professor Robert E. Hampson and Post-Doctoral Fellow Anushka Goonawardena. Berger, who holds the David Packard Chair in Engineering, is the Director of the USC Center for Neural Engineering, Associate Director of the National Science Foundation Biomimetic MicroElectronic Systems Engineering Research Center, and a Fellow of the IEEE, the AAAS, and the AIMBE.
Using an electronic system that duplicates the neural signals associated with memory, they managed to replicate the brain function in rats associated with long-term learned behavior, even when the rats had been drugged to forget.
“Flip the switch on, and the rats remember. Flip it off, and the rats forget,” said Theodore Berger of the USC Viterbi School of Engineering’s Department of Biomedical Engineering. Berger is the lead author of an article that will be published in the Journal of Neural Engineering. His team worked with scientists from Wake Forest University in the study, building on recent advances in our understanding of the brain area known as the hippocampus and its role in learning.
In the experiment, the researchers had rats learn a task, pressing one lever rather than another to receive a reward. Using embedded electrical probes, the experimental research team, led by Sam A. Deadwyler of the Wake Forest Department of Physiology and Pharmacology, recorded changes in the rat’s brain activity between the two major internal divisions of the hippocampus, known as subregions CA3 and CA1. During the learning process, the hippocampus converts short-term memory into long-term memory, the researchers prior work has shown.
“No hippocampus,” says Berger, “no long-term memory, but still short-term memory.” CA3 and CA1 interact to create long-term memory, prior research has shown. In a dramatic demonstration, the experimenters blocked the normal neural interactions between the two areas using pharmacological agents. The previously trained rats then no longer displayed the long-term learned behavior.
“The rats still showed that they knew ‘when you press left first, then press right next time, and vice-versa,’” Berger said. “And they still knew in general to press levers for water, but they could only remember whether they had pressed left or right for 5-10 seconds.”
Using a model created by the prosthetics research team led by Berger, the teams then went further and developed an artificial hippocampal system that could duplicate the pattern of interaction between CA3-CA1 interactions. Long-term memory capability returned to the pharmacologically blocked rats when the team activated the electronic device programmed to duplicate the memory-encoding function.
In addition, the researchers went on to show that if a prosthetic device and its associated electrodes were implanted in animals with a normal, functioning hippocampus, the device could actually strengthen the memory being generated internally in the brain and enhance the memory capability of normal rats.
“These integrated experimental modeling studies show for the first time that with sufficient information about the neural coding of memories, a neural prosthesis capable of real-time identification and manipulation of the encoding process can restore and even enhance cognitive mnemonic processes,” says the paper.
Next steps, according to Berger and Deadwyler, will be attempts to duplicate the rat results in primates (monkeys), with the aim of eventually creating prostheses that might help the human victims of Alzheimer’s disease, stroke or injury recover function.
Alexander Higgins sees a connection between the location of the researching University and The Newly Emergent and Ever So Friendly US Police State:
Scientists working at the University of Southern California, home of the Department of Homeland Security’s National Center for Risk and Economic Analysis of Terrorism Events, have created an artificial memory system that allows thoughts, memories and learned behavior to be transferred from one brain to another.
In a scene right out of a George Orwell novel, a team of scientists working in the fields of “neural engineering” and “Biomimetic MicroElectronic Systems” have successfully created a chip that controls the brain and can be used as a storage device for long-term memories. In studies the scientists have been able to record, download and transfer memories into other hosts with the same chip implanted. The advancement in technology brings the world one step closer to a global police state and the reality of absolute mind control.
And indeed, the DoD is mentioned in the Smart Planet write up of the press release:
The Matrix reality: Scientists successfully implant artificial memory system
... today we have macaque monkeys that can control a robotic arm with thoughts alone. We have paraplegics given the ability to control computer cursors and wheelchairs with their brain waves. Of course this is about the brain controlling a device. But what about the other direction where we might have a device amplifying the brain? While the cochlear implant might be the best known device of this sort, scientists have been working on brain implants with the goal to enhance memory. This sort of breakthrough could lead to building a neural prosthesis to help stroke victims or those with Alzheimer’s. Or at the extreme, think uploading Kung Fu talent into our brains.
A microchip implanted into a rat’s brain can take on the role of the hippocampus—the area responsible for long-term memories—encoding memory brain wave patterns and then sending that same electrical pattern of signals through the brain. Back in 2008, Berger told Scientific American, that if the brain patterns for the sentence, “See Spot Run,” or even an entire book could be deciphered, then we might make uploading instructions to the brain a reality. “The kinds of examples [the U.S. Department of Defense] likes to typically use are coded information for flying an F-15,” Berger is quoted in the article as saying.
Thank you Mr. Higgins.
Watch out, everybody. It will be a wild ride for some of us. Extra care will be needed not to get swept away by the tide ever so gradually into actions with which we neither agree in principle nor in practice. Your consent and attention is the most important, most coveted thing you own.
many of you have accepted the situation
of your imprisonment and will die here
like rotten cabbages.”
--No.6; Free For All
Be seeing you. | <urn:uuid:d3958ff3-5140-4494-933c-bff3d32cc454> | CC-MAIN-2017-43 | http://femalefaust.blogspot.com/2011/06/johnny-mnemonic-chip-successfully.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823260.52/warc/CC-MAIN-20171019084246-20171019104246-00805.warc.gz | en | 0.930182 | 1,437 | 3 | 3 |
Interreligious Documents & Statements
- Created: September 5, 2006
- Written by Archbishop of Canterbury and Chief Rabbis of Israel
Joint declaration by
The Archbishop of Canterbury
The Most Reverend Dr Rowan Williams
The Chief Rabbis of Israel
Chief Rabbi Shlomo Amar and Chief Rabbi Yonah Metzger
1. The Most Reverend Dr Rowan Williams, Archbishop of Canterbury, Chief Rabbi Shlomo Amar and Chief Rabbi Yonah Metzger of Israel, met in friendship at Lambeth Palace on 5th September 2006/12th of Elul 5766, to commit themselves to a continuing relationship based on mutual trust and respect. They gave thanks to the Creator and Lord of the universe for their meeting. At the end of their meeting they made the following statement:
2. "We meet today as religious leaders, Anglican Christians and Israeli Jews, each part of the wider world community of Christianity and Judaism. We seek a dialogue which draws both on our particularity and also on the universal nature of our respective communities and which makes its contribution to the wider dialogue of the religions of the world in which we share.
3. Our meeting forms a further and hopeful chapter in the long story of the relationship between Christianity and Judaism. It is a story in which Christianity emerges from within Judaism, but includes down the centuries all too many times of violence and persecution by Christians of Jews. It also includes significant signs of redemption and hope for a fruitful future together, not least in the United Kingdom where the resettlement of the Jewish communities after three and a half centuries of exile is being celebrated this year. The United Kingdom , encouraged by its Christian community, was involved in the origins of the State of Israel and the Church of England was instrumental in initiating the first Council of Christians and Jews in the dark days of 1942. Since those terrible times of the Holocaust a relationship between our communities, nationally and internationally, has grown from the steady work of encounter, discussion, reflection and reconciliation.
4. This relationship has not been without setbacks and difficulties, but for the Church of England and the Anglican Communion this is a commitment that reflects a continued determination to honour the covenant made by God with Abraham. The outworking of this determination is found in many places: in our welcome for the foundational document 'Nostra Aetate'1 of our sister Roman Catholic Church in 1965 which has happily led to her present relationship of dialogue with representatives of the Chief Rabbinate of Israel ; in the recommendations of the Lambeth Conferences of 1988 and 1998 and the document 'Sharing One Hope'; 2 & 3 in the joint declaration by the Presidents of the Council of Christians and Jews on anti-Semitism in 2001;4 in the work of the office of the Archbishop of Canterbury towards the Alexandria Declaration in 2002;5 in our strong support for the inauguration of a national Holocaust Memorial Day in the United Kingdom ; and in the statements made by the Archbishop on those occasions.6 Our prayer is that the Almighty will redeem our past and direct our future.
5. The dialogue between religions is an essential need of our time and requires that all people of faith bend their best efforts to this common task. In this connection we are sensitive in particular to the importance of continuing to develop our relationships of trust with Islam, nationally in our two countries and internationally. For Christians and Jews, however, the task of building mutual relationship has a different and prior basis than our dialogue with any other religion. Our relationship is unique, not only historically and culturally, but also scripturally, and for both religions, is rooted in the one overarching covenant of God with Abraham to which God remains faithful through all time. It is unique historically through the interaction of the Christian and Jewish communities, especially in Europe down to the Holocaust; and it is unique in the contributions made through the arts, science and humanities to a common culture.
6. Our meeting today builds also on the personal relationships which have grown between us from our previous occasions of personal meeting in Europe and in Israel and from our correspondence. We expect and intend that the friendship and respect that we hold for each other will continue to grow and provide an example to our communities.
7. We consider that the purpose of this and future meetings is to provide new opportunities for dialogue between us. Dialogue has profound value in its own right and its purposes are mutual understanding and respect of each others' traditions and beliefs; the sharing of common concerns; the development of personal human relationships, and in all these things an openness to God's initiative. Neither evangelism nor conversion has a place amongst the purposes of the dialogue and we emphasise the importance of respect for each other's faith and of rejecting actions intended to undermine the integrity of the other.
8. We recognise that we meet in the context of troubled times in many parts of a world where religious faith has an increasingly significant place in shaping the thoughts and actions of people and communities. We note both signs of hope and of concern and we seek to play our part in enabling mutual understanding between religions for the good of the world.
9. Amongst our profound concerns is the rise of anti-semitism in Britain and the rest of Europe, in the Middle East and across the world at the present time. This is a scourge that we are committed to struggle against. Where it is fostered within communities of faith we have particular responsibilities which we will not shirk; where it is fostered by governments or political parties we will openly oppose it; at all times we will seek to educate the coming generations in the history of anti-semitism, recognising that there have been times when the Church has been complicit in it.
10. The Holy Land has a very special place in our heritage, as it also has for Muslims. We long for the time of peace and justice spoken of by Isaiah: "I will make a new heavens and a new earth. They will neither harm nor destroy on all my holy mountain", but we are also conscious that we are far from such a time. The Holy Land and its people, Jewish, Christian and Muslim, continue to suffer all forms of violence and its consequences. Terrorism remains rife. Governments and political and religious movements deny the very right to existence of the State of Israel. There is no agreement on the rights of the Palestinian people and the means to mutual wellbeing and flourishing.
11. In these circumstances we commit ourselves afresh to the task of peace making in the Holy Land and we believe that our meeting today is both a sign and a potentially fruitful action to that end.
12. We reaffirm for ourselves today the condemnations of violence made by our colleagues and predecessors such as in the 2002 Alexandria Declaration. We reaffirm our belief in the rights of the state of Israel to live within recognised and secure borders and to defend itself by all legal means against those who threaten its peace and security. We condemn without reserve those who deny a place for Israel and especially those who engage in the evil work of seeking to bring about its destruction. We warmly encourage all forms of constructive engagement, whether religious, humanitarian or economic, which seek to enable closer bonds between individuals and communities.
13. In our meeting today, we have listened carefully to each other and have taken note of those aspects of our common experience and current situations which can form the basis for further discussion and reflection. In this connection we note in particular our respective relationships with national governance and the potential for good and for ill that this offers; our common hopes for the good of our societies; our concern to find ways in which our younger generations will understand and appreciate their faith; and in these times when worldwide the bonds of family and community are weakened, we hope to share the possibilities open to us to seek together ways to their strengthening.
14. In all these matters we have at heart the imperative to seek ways to show the love of God to our fellow human beings and our communities with whom we share our times and places. Our hope is that by this dialogue we may allay some of the misunderstandings and anxieties in our countries by showing a mutual concern for peace, security and mutual respect.
15. Conscious of the above, we express our mutual desire to begin a time of dialogue and conversation in the coming years. We affirm that this will be a dialogue of mutual respect in which we seek only to understand each other better and to strengthen our own communities and their affection and respect for each other. To this end we commit ourselves to further meetings in Jerusalem and at Lambeth and to invite others in our wider communities to join with us. We charge our colleagues together to put in hand the necessary arrangements which will make for further fruitful meetings.
Chief Rabbi Shlomo Amar of Israel
Chief Rabbi Yonah Metzger of Israel
The Most Reverend Dr Rowan Williams, Archbishop of Canterbury
Dated: 5th September 2006 / 12th of Elul, 5766
1965 "Declaration on the relation of the Church to non-Christian Religions". Available at: www.vatican.va/archive/hist_councils/ii_vatican_council/documents/vat-ii_decl_19651028_nostra-aetate_en.htm
1988 and 1998 Lambeth Conferences. "Jews, Christians and Muslims: The Way of Dialogue". Extract from the Report of the Dogmatic and Pastoral Section Lambeth Conference 1988.
2001 Sharing one Hope? The Church of England and Christian-Jewish Relations. Church House Publishing.
Joint declaration by the Presidents of the Council of Christians and Jews on anti-Semitism in 2004. Available at: http://www.ccj.org.uk/ccj-frames.htm?contents=articles-docs.htm
Alexandria Declaration in 2002. Available at: http://www.ccj.org.uk/ccj-frames.htm?contents=articles-docs.htm
2006 Holocaust Memorial Day statement by the Archbishop of Canterbury . Available at http://www.archbishopofcanterbury.org/ | <urn:uuid:0cd3198c-6f12-4032-8895-727f1528d3da> | CC-MAIN-2018-17 | http://ccjr.us/dialogika-resources/documents-and-statements/interreligious/696-cant-isr-06sep5 | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948950.83/warc/CC-MAIN-20180427021556-20180427041556-00101.warc.gz | en | 0.949963 | 2,046 | 2.515625 | 3 |
Camp Little Tooth
Tooth decay is the result of the build-up of bacteria and plaque on the teeth. If these bacteria aren’t brushed away, they will mix with the sugar in the food your child eats and will create an acid that eats away at the vulnerable tooth enamel protecting your child’s teeth. Tooth decay can eventually cause dental cavities, tooth infection, gum disease, and even the eventual loss of the affected tooth.
Below are a few of the common risk factors that may make your child more susceptible to tooth decay:
The best way to help your children avoid tooth decay is to teach them and assist them in practicing good oral hygiene habits. This should include:
To learn more about how to avoid tooth decay and dental cavities, please contact Camp Little Tooth® at our Lafayette, Colorado pediatric dentistry location. We’re a one-of-a-kind office! Your child’s dental health is very important to us and we’re happy to answer your questions. Our phone number is 303-604-1000.
During this time of social distancing, we are pleased to offer TeleDentistry as a way for our camp families to safely connect with us in the event of an emergency. Our goal is to provide you with the same great care you are accustomed to from the safety of your home.
Our one-of-a-kind pediatric dental office is currently accepting new patients. We can't wait to meet your family and we're going to make going to the dentist fun for your kids and easy on you! We've got all the information about making a pediatric dental appointment at Camp Little Tooth®!
Woof! Montana is pawsitively everyone's favorite Camp Dog! Montana is a registered therapy dog who loves children and is always happy to greet your little one as well as give them lots of love and comfort after their appointments.
Canoes instead of exam chairs. A treehouse instead of a waiting room. There is even a coffee station for parents. Could this be the best pediatric dental office ever?! | <urn:uuid:05cf47b6-f2ba-4101-9f4f-776dbd069d56> | CC-MAIN-2023-23 | https://camplittletooth.com/pediatric-tooth-decay/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652184.68/warc/CC-MAIN-20230605221713-20230606011713-00163.warc.gz | en | 0.954106 | 425 | 2.796875 | 3 |
The history of maritime endeavor is contained primarily in museums, libraries and archives around the world, many searchable on-line. In addition, there are many Internet discussion groups and list-serves, bibliographies, magazines and journals, and other collections of material culture that evoke the wide spectrum of life by and on the sea.
- Maritime Museums
- Libraries, Archives and Specialty Collections
- Ships and Boats
- On-line Collections and Resources
- Maritime Bibliographies
A majority of the major maritime museums or institutions with maritime collections are members of the associations below. Additional organizations can be found in the World Ocean Directory.
Libraries and archives frequently contain maritime-related collections of rare books and manuscripts, maps and charts, portraits, letters, photographs, objects and ephemera. Additional material can also be found in local historical and genealogical societies, natural history museums, folk arts and craft collections, and science and environmental centers in coastal settings.
Mystic Seaport, G.W. Blunt White Library Mystic Seaport Collections and Research Department - Online Resources
Maritime history is well told through the voyages of innumerable ships plying the high seas, transporting goods, people and ideas worldwide in a complex weave of successful passages through time. These ships are evident throughout the history of civilization. They evoke the triumphs and tragedies of human endeavor, the myriad individual stories that collectively proclaim human achievement.
On-line Collections and Resources
Maritime patrimony is also interpreted through collections of artifacts, models, paintings, archival materials, and ephemera, much of which is found in institutional settings. Several museums and other organizations with large, encyclopedic collections have made these resources publicly accessible through on-line search facility and thematic bibliographies.
Maritime Transportation - Bureau of Transportation Statistics
Atlantic World: A specialized history bibliography from Carnegie Mellon University Libraries
Includes: African diaspora, Latin America, slave trade, and many related topics | <urn:uuid:9df6c173-21e5-4d99-8005-a80b1cbf59d2> | CC-MAIN-2017-17 | http://www.worldoceanobservatory.org/content/maritime-history | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917126538.54/warc/CC-MAIN-20170423031206-00434-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.903166 | 409 | 3.140625 | 3 |
|This article is part of a series on the|
politics and government of
In the administrative divisions of Haiti, the department (French : département d'Haïti, pronounced [depaʁtəmɑ̃ d‿aiti] ; Haitian Creole : depatman Ayiti) is the first of four levels of government. Haiti is divided administratively into ten departments, which are further subdivided into 42 arrondissements, 145 communes, and 571 communal sections.
In 2014, there was a proposal by the Chamber of Deputies to increase the number of departments from 10 to 14 —perhaps as high as 16.
Each departement has a departmental council (conseil départemental) compound of three members elected by the departmental assembly for a 4-year term. The departmental council is led by a president (président). The council is the executive organ of the department.
Each department has a departmental assembly who assists the council in its work. The departmental assembly is the deliberative organ of the department. The members of the departmental assembly are also elected for 4 years. The departmental assembly is led by a president.
Three Departments have roots in the former French colony of Saint-Domingue, namely: the Nord, Sud, and Ouest. In 1801, under Governor-General Toussaint Louverture, the "provinces," became known as departments.In 1821, Artibonite was created and in 1844, Nord-Ouest, both derived out of the Nord and Ouest departments. In 1962 during the reign of Duvalier, four new departments were created out of a territorial redistribution. These departments were: Centre, Grand'Anse, Nord-Ouest and Sud-Est. In 2003, a tenth department was created out of Grand'Anse, called Nippes.
In the 1990s, before the creation of Nippes, the "10th Department" was a phrase commonly used in regards to the Haitian diaspora. As of the 21st century, it became known as the "11th".
Data based on 2015 estimates from the Haitian government.
The government of Haiti is a semi-presidential republic, a multiparty system wherein the President of Haiti is head of state elected directly by popular elections. The Prime Minister acts as head of government and is appointed by the President, chosen from the majority party in the National Assembly. Executive power is exercised by the President and Prime Minister who together constitute the government. Legislative power is vested in both the government and the two chambers of the National Assembly of Haiti. The government is organized unitarily, thus the central government delegates powers to the departments without a constitutional need for consent. The current structure of Haiti's political system was set forth in the Constitution of March 29, 1987.
Nord-Ouest is one of the ten departments of Haiti as well as the northernmost one. It has an area of 2,102.88 km² and a population of 728,807. Its capital is Port-de-Paix.
Grand'Anse is one of the ten departments of Haiti. Its capital is Jérémie.
The arrondissement of Créteil is an arrondissement of France in the Val-de-Marne department in the Île-de-France region. It has 16 communes. Its population is 310,758 (2016), and its area is 99.8 km2 (38.5 sq mi).
Nippes is one of the ten departments of Haiti. It is the most recently created department, having been split from Grand'Anse in 2003. The capital of the department is Miragoâne.
An arrondissement of Haiti is a level of administrative division in Haiti.
The administrative divisions of Haiti are concerned with the institutional and territorial organization of Haitian territory. There are many administrative divisions which may have political, electoral (districts), or administrative objectives.
Anse-à-Veau is a commune in the Anse-à-Veau Arrondissement, in the Nippes department of Haiti. The postal code is HT 7510.
Petit-Trou-de-Nippes is a commune in the Anse-à-Veau Arrondissement, in the Nippes department of Haiti. It has 36,143 inhabitants.
Plaisance-du-Sud is a commune in the Anse-à-Veau Arrondissement, in the Nippes department of Haiti.
Anse-à-Foleur is a commune in the Saint-Louis-du-Nord Arrondissement, in the Nord-Ouest department of Haiti.
Jean-Rabel is a commune located west of the city of Port-de-Paix and east of the city of the Môle-Saint-Nicolas Arrondissement, in the Nord-Ouest department of Haiti. As of 2015, the estimated adult population was 148,416.
Anse-à-Veau is an arrondissement in the Nippes Department of Haiti. As of 2015, the population was 153,639 inhabitants. Postal codes in the Anse-à-Veau Arrondissement start with the number 75.
Port-de-Paix is an arrondissement in the Nord-Ouest department of Haiti. As of 2015, the population was 336,650 inhabitants. Postal codes in the Port-de-Paix Arrondissement start with the number 31.
Liancourt is a commune in the Saint-Marc Arrondissement, in the Artibonite department of Haiti. Once a communal section, a presidential decree on 22 July 2015 made it a commune.
Lapointe is a commune in the Port-de-Paix Arrondissement, in the Nord-Ouest department of Haiti. Once a communal section, a presidential decree on 22 July 2015 made it a commune.
Little is known about the early history of Haitian license plates. Keith Marvin thought that the earliest plates were from the early 1930s, but older plates have since been found and at least one plate from 1923 exists. Early plates were marked with Rd'H,, HA., RH, or Haïti at various times. The Haitian coat of arms appeared on the plates from 1998 to 2002, the country flag was shown on the 2002 - 2005 plates, and since 2006 the background has shown a map of the country. | <urn:uuid:ce30e113-30f3-4480-a4e5-da4772baf6a0> | CC-MAIN-2020-45 | https://wikimili.com/en/Departments_of_Haiti | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107916776.80/warc/CC-MAIN-20201031062721-20201031092721-00110.warc.gz | en | 0.925519 | 1,391 | 3.53125 | 4 |
During Bible times, frequent washing of the feet was necessary as the Israelites wore sandals instead of shoes, and often went barefoot in the house. Thus, among the Israelites, it was the first duty of a host to give his guest water for washing his feet. To omit this was a sign of marked unfriendliness. According to the Jewish Encyclopedia, “it was also customary to wash the feet before meals and before going to bed (compare Cant. 5:3).” Abstaining for a long time from washing them was a sign of mourning (2 Samuel 19:24).
The priests had laws about this practice (Exodus 30:18-21). Here it is explained that a copper laver was placed in the court, between the Tabernacle and the altar of burnt offering, in which the priests had to wash their hands and feet before entering the Tabernacle or approaching the altar of burnt offerings, hence before all their priestly functions. As no one is allowed to approach a king or prince without due preparation, which includes the washing of the hands and feet, so the Israelite, and especially the priest, is forbidden in his unclean condition to approach God, for if such a one came defiled, he was subject to die.
Feet Washing in the Old Testament
The practice of providing water for guests to wash their feet is illustrated on the occasion of a mysterious visit by “three men” to Abraham.
In Genesis 18:24 we read: “And he lift up his eyes and looked, and, lo, three men stood by him: and when he saw them, he ran to meet them from the tent door, and bowed himself toward the ground, and said, My Lord, if now I have found favor in thy sight, pass not away, I pray thee, from thy servant: Let a little water, I pray you, be fetched, and wash your feet, and rest yourselves under the tree.”
Later, Abraham’s nephew (Genesis 11:27), Lot, made a similar offer to two angels who came to the city of Sodom where he and his family lived, to destroy the city because their immorality has become “so great before the LORD that the LORD has sent” angels to destroy it (verse 13).
“(1) Now the two angels came to Sodom in the evening as Lot was sitting in the gate of Sodom. When Lot saw them, he rose to meet them and bowed down with his face to the ground. (2) And he said, ‘Now behold, my lords, please turn aside into your servant’s house, and spend the night, and wash your feet; then you may rise early and go on your way.’ They said however, ‘No, but we shall spend the night in the square.’ (3) Yet he urged them strongly, so they turned aside to him and entered his house; and he prepared a feast for them, and baked unleavened bread, and they ate” (Genesis 19:13).
(See also Judges 19:20, 21. To understand the context here, starting from verse 1 may be good).
The act of feet washing in the above cases reflects a spirit of LOVE, SERVICE and HUMILITY = WILLING SACRIFICE TO PLEASE THE HEAVENLY FATHER, who reads the heart of men.
Feet Washing – In the New Testament
The Woman’s Tears and Perfume
Feet washing in the New Testament is found in Luke 7:36-50. It is six days before the Passover (Luke 12:1) a Pharisee named Simon invited Jesus to his home for a meal. While he was seated at the table, a woman “who had lived a sinful life in that town” came to the Master with an alabaster jar of costly perfume.
“(38) and standing behind him [Jesus] at his feet, weeping, she began to wet his feet with her tears, and kept wiping them with the hair of her head, and kissing his feet and anointing them with the perfume. (39) Now when the Pharisee who had invited him saw this, he said to himself, ‘If this man were a prophet he would know who and what sort of person this woman is who is touching him, that she is a sinner.’
(40) And Jesus answered him, ‘Simon, I have something to say to you.’ And he replied, ‘Say it, Teacher.’ (41) ‘A moneylender had two debtors: one owed five hundred denarii, and the other fifty.
(42) When they were unable to repay, he graciously forgave them both.
So which of them will love him more?’
(43) Simon answered and said, ‘I suppose the one whom he forgave more.‘
And He said to him, ‘You have judged correctly.’
(44) Turning toward the woman, he said to Simon, ‘Do you see this woman? I entered your house; you gave me no water for my feet, but she has wet my feet with her tears and wiped them with her hair.
(45) You gave me no kiss; but she, since the time I came in, has not ceased to kiss my feet.
(46) You did not anoint my head with oil, but she anointed My feet with perfume.
(47) For this reason I say to you, her sins, which are many, have been forgiven, for she loved much; but he who is forgiven little, loves little.’
(48) Then he said to her, ‘Your sins have been forgiven.’ (49) Those who were reclining at the table with him began to say to themselves, ‘Who is this man who even forgives sins?’ (50) And he said to the woman, ‘Your faith has saved you; go in peace‘” (Luke 7:38-50 NASB).
Dear friends, what can WE do as did this woman?
In the Mark account of another occasion, Mary, the sister of Lazarus, even poured the perfume on Jesus’ head (Mark 14:3).
How can we anoint the minds of our brethren, as suggested by the head?
Perhaps by praying for our brethren’s strength, that they might endure all for CHRIST.
This is so important, as would we not ourselves wish others to pray for us to more than overcome, which is the desire of our entire existence—to bring JOY to the Father by pleasing Him more? What more than to feel his Perfect Loving counsel moment by moment?
Perhaps anointing the head of our brethren can also mean sharing spiritually edifying thoughts and asking faith-building questions as well as letting the subject matter discussed or studied, be one that feeds the New Creation in Christ so as to encourage fellow consecrated believers to be fully consumed in their thought processes upon heavenly things since “a mind set on the flesh is hostile toward God; for it does not subject itself to the law of God, for it is not even able to do so, and those who are in the flesh cannot please God. However, you are not in the flesh but in the Spirit, if indeed the Spirit of God dwells in you” (Romans 8:7-9).
How can we wash each other’s feet as this woman did for Jesus?
How can we show true hospitality likewise to our fellow brethren in Christ?
The specific and precise answer for each consecrated child of God may be unique and personal, just as each has been given by God uniquely specific talents to use in His service in the body of Christ. But how can we make sure our talents in God’s service are not buried? Perhaps by COURAGE IN CHRIST and by asking our Heavenly Father to eradicate FEAR of man from our lives while holding on to the REVERENTIAL FEAR of GOD—the fear of doing wrong in the eyes of God alone. See post titled: A Proper Fear
Does FEAR OF MAN … fear of past mistakes (as with the Apostle Paul before he became fully enlightened) … fear of being misunderstood and thus misrepresented and shunned or separated from the general assembly, or labelled “crazy” or “a missfit,” “the radical one,” stop us from BEING as CHRISTLIKE as we can and striving to moment by moment develop into the likeness of Christ by getting outside of the CARNAL COMFORT ZONE? Let it not!
This means, going BEYOND the PAIN BARRIER!
If you are not suffering for righteousness sake in some way, shape, or form, it means YOU ARE NOT working to your full potential in CHRIST.
“Indeed, all who desire to live godly in Christ Jesus will be persecuted.” (2 Timothy 3:12)
“For you have been called for this purpose, since Christ also suffered for you, leaving you an example for you to follow in His steps…” (1 Peter 2:21)
The consecrated until death “stars of heaven” class are the “heirs according to the promise” (Galatians 3:29) and coheirs of Christ (Romans 8:17). But such will be heirs only if they display the forgiving, repenting, and humble spirit among men, as we find in the weeping woman who washed Jesus’ feet with her tears of remorse and reverential thankfulness in being worthy of but touching the hem of the garments of Jesus. (Matthew 6:15) She had heard among the crowds that his kingdom was not of this world, and now she was able to SERVE him and be CLEANSED from her sins by him—because of her desire to have her sins forgiven. Later, if she continued on, she would be washed in this antitypical lamb’s blood. Her REVERENTIAL FEAR wished only to do right in God’s sight, recognizing her need for a redeemer.
Since Simon was a Pharisee, he may have considered himself to be rather important and may have felt he had bestowed an honor to Jesus by inviting him to dinner.
Was Simon embarrassed or afraid of what others would think of him if he showed Jesus hospitality? This Jesus who had allowed the woman considered in the public eye as inferior, to come near him?
Do you think Simon’s attitude was one of self-righteousness? Self-importance?
Do we ever allow this feeling to creep into us like LEAVEN?
To rid our minds of any such poison to the New Creation in CHRIST, let us focus our thoughts upon the Son of God who humbled himself even to the death of the cross (Philippians 2:8).
Anointing the Feet
In John 12:13 Mary anointed Jesus’ feet with costly ointment of spikenard six days before the Passover, when Jesus came to Bethany. [Note: this would be Nisan 10th after 6pm and an appropriate time for anointing the Passover lamb—whom Jesus himself was, symbolically.] Mary displayed her loving devotion to the Master by using her hair to wipe Jesus’ feet.
Although Judas’ perhaps insincere words highlight his dissatisfaction with Mary’s use of this expensive perfume (“worth a year’s wages”), Jesus said that she should be let alone, because she did what she could.
In fact, Jesus commended Mary’s actions, in Matthew 26:11-13: “(11) For you always have the poor with you, but you will not always have me. (12) In pouring this ointment on my body, she has done it to prepare me for burial. (13) Truly, I say to you, wherever this gospel is proclaimed in the whole world, what she has done will also be told in memory of her.”
What a beautiful illustration how true Christians should treat their most valuable assets on earth—the feet members of Christ that remain. In these we see Christ. They profess consecration, and evidence this with acts of true loving kindness, and manifestations of concern, gentleness, patience, assistance, and sympathy. They strive to bless others as Mary did with Jesus, lavishing costly, symbolic perfume upon the body of Christ, the Church.
As the washing of another’s feet is not a glamorous work, and considering the imperfections that each of us have, it takes a large measure of love, phileo and AGAPE love, and humility, to press forward in striving to serve our brethren.
Let us not allow differences along one line or another, nor misunderstandings, hinder us from seeking to do good unto all that we have opportunity, especially the household of faith. (Galatians 6:10, 1 Peter 3:11, Psalm 34:14, Micah 6:8)
Washing the Disciples’ Feet
One of the marks of female saintship in the early church was, “if she have washed the saints’ feet” (1 Timothy 5:10). Feetwashing being necessary at that time, became a synonym of service and kind hospitality. To illustrate this same principle of service and humility, Jesus used this same custom on the night of the Last Supper:
At the end of Jesus’ ministry and “just before the Passover Feast,” and when “the evening meal was being served,” Jesus washed his disciples’ feet. The disciples must have been shocked and silent that the Great Teacher, their Lord, would do such a thing. Simon Peter did not want Jesus to wash his feet at first, until the Master said that unless he washed Peter’s feet, he could have no part with him in the kingdom. Then Peter was willing to have his whole body washed, yet Jesus pointed out that he who is clean needs only to wash his feet. Jesus pointed out that not all of them were clean, the reference obviously being made to Judas.
Jesus admonished the disciples: “(14) If I then, your Lord and Teacher, have washed your feet, you also ought to wash one another’s feet. (15) For I have given you an example, that you also should do just as I have done to you” (John 13:14-15).
Jesus’ act was intended as an example in humility and a lesson to the apostles who seem still to have had a spirit of rivalry for preeminence. To our understanding, the lesson was that our Lord’s followers were not to shun any service, however menial, that would enable them to assist or comfort one another.
Jesus’ lesson is amplified by his words in John 13:34, 35: “A new commandment I give unto you, That ye love one another; as I have loved you, that ye also love one another. By this shall all men know that ye are my disciples, if ye have love one to another.”
Not until they had received the holy Spirit on the day of Pentecost, were the disciples of Christ able to manifest their determination to serve Christ in a way that would enable them to become pillars of the Church (Acts 2:24, 16-18, 33, 38).
Feet Washing – TODAY
When it comes to helping brethren, let us gladly do the work of feet washing, illustrated for us by the Master himself who taught the disciplines the lesson of HUMILITY, “that they should love one another to such an extent that they would consider no service too great nor too degrading which would minister to each other’s comfort” (Br. Charles T. Russell, Biblical Expository 1).
Here are some encouraging words of Br. Oscar Magnuson from a 1932 Bible Students Reunion Convention Report:
“If we place a limit on what we are willing to do and to bear for the Lord, the Lord might find it necessary to give us a body with limited capacities in the resurrection. In that case a divine body would not suit us, for such a body is unlimited in bodily capacities.”
There are hundreds of opportunities of showing the meek, lowly, and loving spirit of our Master. As God’s stewards and servants, it is not self that we are to minister and serve and pamper, but it is our mission to “do good unto all men as we have opportunity, especially to the household of faith,” remembering that we are to walk in his footsteps who “came not to be ministered unto [served], but to minister [serve] and to give his life a ransom for many” (Mark 10:45, Matthew 20:28).
In Reprint 1101, Br Russell writes that “the entertainment of any of the household of faith, is really the fulfillment of our Lord’s injunction, ‘See that ye wash one another’s feet.’ But none should be permitted to overdo themselves in this blessed service, nor to deprive themselves of the spiritual communion of the meetings. To this end all have been urged to make only very simple arrangements, that both visitors and entertainers may have their principal feast upon the spiritual meat. Come, then, expecting a warm welcome to such plain things as we have ourselves.”
In our sympathetic desire to help others be more than overcomers, a reciprocal washing of one another’s feet can include:
- Desiring and maintaining loving fellowship with the members of Christ’s body as did Jesus spend in that upper room SERVING his disciples;
- Praying for each other, as our Lord Jesus taught in his prayer in John 17.
- Encouraging each other to fight the good fight of faith and become transformed in newness of life by renewing the mind when we dwell on things that are above. For example, “Speaking to yourselves in psalms and hymns and spiritual songs, singing and making melody in your heart to the Lord” (Ephesians 5:19).
- Within the ecclesia and among those with whom we have frequent fellowship, if we are actively engaged in promoting one another’s spiritual growth and development, we should be able to appreciate that all of our brethren have certain qualities, graces, or attributes that can benefit us; and we, likewise, should be on the alert as to how we can be of help to them.
- Volunteering for ecclesia projects.
- Entertaining visitors with an offer of a booklet or Divine Plan Book.
- Witnessing to all humans at every single chat we have with another.
- Providing transportation.
- Sending messages of comfort to all who write messages on the Old Ron email list.
- Sharing tapes or truth literature.
- Typing, proofreading.
- Testifying at Testimony meetings.
- Sharing hymns, psalms, and Bible Scriptures over the phone or conference calls etc.
- Sharing bible study magazine articles or poems written.
- Sending little “keep pressing onward and upward” parcels of spiritual items to edify.
- Sending item of use to our brethren worldwide E.g. Africa, Philippines…
- Visiting the ill, hospitalized or isolated.
- Reading the Scriptures morning and evening with your own children/family.
- If you have a garden: sharing some of your garden’s edible produce with brethren and friends.
- Sharing Daily Devotions over the phone/internet with others e.g. “Daily Heavenly Manna” or “Songs in the Night.”
- Creating a one or 2 page witnessing ad/flier and distributing amongst the public as a family activity.
- Helping your children leave fliers on the tables and seats at shopping centres and at supermarkets.
- Sending in bill payments with a booklet inserted inside them letting someone know about GOD’s GLORIOUS KINGDOM to come to give the world HOPE!
- Offering to set up Convention/Camp Book Tables.
- Coordinating a class choir.
- Opening up your home for a weekday Bible Study.
- Having an email sign-off Scripture “logo” — let CHRIST be what others remember you by.
- Asking the brethren who have websites how you can contribute your skills to aid in the witnessing efforts.
- Asking your Elders how you could help lighten their load by supporting them in their preparations for the Ecclesia.
- Making bookmarks from pressed leaves to sell to raise money for some Truth related cause or to give out as gifts and reminder of Scriptural words of encouragement.
- Offering your time for Sunday School teaching and Children’s Camp /Convention lessons.
- Sitting next to someone different during ecclesia meeting intermissions at ecclesia and share Scriptures and Scriptural thoughts.
- Coming prepared to class studies.
- Finding an Elder who you can be your mentor and have Bible studies, Question and Answer email studies etc.
- Take the kids on “witnessing bike trips.”
Each of us should realize that we have something to give for the edification of the body. We should be faithful in contributing to our ecclesia studies, praying for others, and being a model of someone whose life is undergoing the transformation process; being, therefore, an example of a believer.
Let us be faithful in washing one another’s feet!
- Br. Homer Montague, for source material from his article in the Herald of Christ’s Kingdom (March/April 1998), titled “The Privilege of Feet Washing.”
- Br. Charles T. Russell, Biblical Expository 1
- Br. Oscar Magnuson for source material from a 1932 Bible Students Reunion Convention Report.
This post’s URL is: | <urn:uuid:d3cc8478-6213-414f-be53-4098eb7a3c48> | CC-MAIN-2018-39 | https://biblestudentsdaily.com/2017/03/27/washing-one-anothers-feet-a-privilege/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267162385.83/warc/CC-MAIN-20180925182856-20180925203256-00375.warc.gz | en | 0.964456 | 4,649 | 3.03125 | 3 |
2 process in which an unfertilized egg develops into a new individual; common among insects and some other arthropods [syn: parthenogeny]
EtymologyFrom (parthenos) "virgin" + (genesis) "creation".
- The production of new individuals from virgin females by means of ova which have the power of developing without the intervention of the male element; the production, without fertilization, of cells capable of germination. It is one of the phenomena of alternate generation. Cf. Heterogamy, and Metagenesis.
- The production of seed without fertilization, believed to occur through the nonsexual formation of an embryo extraneous to the embrionic vesicle.
- Sometimes refers to a theory of the Virgin Birth of Jesus Christ.
Production of new individuals from virgin females
Production of seed without fertilization
Parthenogenesis (from the Greek παρθένος parthenos, "virgin", + γένεσις genesis, "creation") is an asexual form of reproduction found in females where growth and development of embryos or seeds occurs without fertilization by males. The offspring produced by parthenogenesis almost always are female in species where the XY chromosome system determines gender.
Parthenogenesis occurs naturally in some species, including most lower plants, a Kalanchoe succulent plant genus of South Africa, invertebrates (e.g. water fleas, aphids, some bees, some scorpion species, and parasitic wasps), and vertebrates (e.g. some reptiles, fish, and, very rarely, birds and sharks) and this type of reproduction has been induced artificially in other species.
The term is sometimes used inaccurately to describe reproduction modes in hermaphroditic species which can reproduce by themselves because they contain reproductive organs of both genders.
Asexual reproductionParthenogenesis is a form of asexual reproduction in which females produce eggs that develop without fertilization. Parthenogenesis is seen to occur naturally in aphids, daphnia, rotifers, and some other invertebrates, as well as in many plants. Komodo dragons have recently been added to the list of vertebrates—along with several genera of fish, amphibians, and reptiles—that exhibit differing forms of asexual reproduction, including true parthenogenesis, gynogenesis, and hybridogenesis (an incomplete form of parthenogenesis).
The offspring of parthenogenesis will be all female if two like chromosomes determine the female gender (such as the XY sex-determination system), but they will be male if two like chromosomes determine the male gender (such as the ZW sex-determination system), because the process involves the inheritance and subsequent duplication of only a single sex chromosome. The offspring may be capable of sexual reproduction, if this mode exists in the species. A parthenogenetic offspring is sometimes called a parthenogen. As with all types of asexual reproduction, there are both costs (low genetic diversity and susceptibility to adverse mutations that might occur) and benefits (reproduction without the need for a male) associated with parthenogenesis. Asexual reproduction existed alone from the beginning of life on Earth for many epochs. When sexual reproduction arose (presumably through mutation) it introduced a means to expand genetic diversity through the partial contribution of the male, providing more options for the survival of the species in which it began. Many species followed this reproductive path successfully, some to the exclusion of the asexual pattern from which it arose, some enabling both, some retaining the capacity to revert to asexual reproduction—if necessary, and yet others that abandoned sexual reproduction and reverted to the asexual. There are species, such as some Kalanchoe plants, that once had the capacity to reproduce sexually, but wherein no males ever have been discovered and the species reproduces prolifically via its retained asexual methods alone.
Parthenogenesis is distinct from artificial animal cloning, a process where the new organism is identical to the cell donor. Parthenogenesis is truly a reproductive process which creates a new individual or individuals from the naturally varied genetic material contained in the eggs of the mother. A litter of animals resulting from parthenogenesis may contain all genetically unique siblings without any twins or multiple numbers from the same genetic material.
In animals with an XY chromosome system where parthenogenic offspring are female, parthenogenic offspring of a parthenogen are, however, all genetically identical to that daughter when she becomes a mother and her offspring will be identical to each other, as a parthenogen is homozygous. Each sibling of the first generation of parthenogens will, therefore, create a linage that carries only her unique genes when reproducing via parthenogenesis.
Parthenogenesis may be achieved through an artificial process, however, as described below under the discussion of mammals.
The alternation between parthenogenesis and sexual reproduction is called heterogamy. Forms of reproduction related to parthenogenesis, but that only require the presence of sperm that do not fertilize an egg, are known as gynogenesis and hybridogenesis.
Parthenogenesis in insects can cover a wide range of mechanisms.
The different forms include:
- thelytoky - parthenogenesis in which only female offspring are produced and no mating is observed
- pseudogamy (or gynogenesis or "sperm-dependent parthenogenesis") - here mating occurs and the eggs require activation by entry of sperm but only the maternal chromosomes are expressed
- automixis - parthenogenesis in which the eggs undergo meiosis
- apomixis - parthenogenesis in which the eggs do not undergo meiosis
Polyembryony is another process that produces multiple clonal offspring from a single egg. This is known in some hymenopteran parasitoids and in strepsiptera.
In little fire ants, Wasmannia auropunctata, queens produce more queens through parthenogenesis. Sterile workers usually are produced from eggs fertilized by males. In some of the eggs fertilized by males, however, the fertilization can cause the female genetic material to be ablated from the zygote, in a process called ameiotic parthenogenesis. In this way, males pass on only their genes to become fertile male offspring. This type of reproduction results in a complete separation of the gene pools for females and males. This is the first recognized example of an animal species where both females and males can reproduce separately.
Crustacean reproduction varies both across and within species. The water flea Daphnia pulex alternates between sexual and parthenogenetic reproduction . Among the better-known large decapod crustaceans, only one species is known to reproduce by parthenogensis. "Marmorkrebs" are parthenogenetic crayfish that were discovered in the pet trade in the 1990s . This species currently has no formal scientific name, and its origin is unknown. Offspring are genetically identical to the parent, indicating it reproduces by apomixis .
Most reptiles reproduce sexually, but parthenogenesis has been observed to occur naturally in certain species of whiptails, geckos, rock lizards Because the genetics of sex determination in Komodo Dragons uses the WZ system (where WZ is female, ZZ is male, and WW is inviable) the offspring of this process will be ZZ (male) or WW (inviable), with no WZ females being born. A case has been documented of a Komodo Dragon switching back to sexual reproduction after a known parthenogenetic event. It has been postulated that this gives an advantage to colonization of islands, where a single female could theoretically have male offspring asexually, then switch to sexual reproduction with them to maintain higher level of genetic diversity than asexual reproduction alone can generate.
In 2001 a bonnethead, a type of small hammerhead shark, was found to have produced a pup, born live on the 14th December, 2001 at Henry Doorly Zoo in Nebraska, in a tank containing three female hammerheads, but no males. The pup was thought to have been conceived through parthenogenic means. The shark pup was apparently killed by a stingray within three days of birth. The investigation of the birth was conducted by the research team from Queen's University Belfast, Southeastern University in Florida, and Henry Doorly Zoo itself, and it was concluded after DNA testing that the reproduction was parthenogenic. The testing showed the female pup's DNA matched only one female who lived in the tank, and that no male DNA was present in the pup. The pup was not a twin or clone of her mother, but rather, contained only half of her mother's DNA ("automictic parthenogenesis"). This type of reproduction had been seen before in bony fish, but never in cartilaginous fish such as sharks, until this documentation.
In 2002, two white-spotted bamboo sharks were born at the Belle Isle Aquarium in Detroit. They hatched 15 weeks after being laid. The births baffled experts as the mother shared an aquarium with only one other shark, who was female. The female bamboo sharks had laid eggs in the past. This is not unexpected, as many animals will lay infertile eggs even if there is not a male to fertilize them. Normally, the eggs are assumed to be infertile and are discarded. This batch of eggs was left undisturbed by the curator as he had heard about the previous birth in 2001 in Nebraska and wanted to observe whether they would hatch.
Other possibilities had been considered for the birth of the Detroit bamboo sharks including thoughts that the sharks had been fertilized by a male and stored the sperm for a period of time, as well as the possibility that the Belle Isle bamboo shark is a hermaphrodite, harboring both male and female sex organs, and capable of fertilizing its own eggs, but that is not confirmed.
In 2008, a Hungarian aquarium had another case of parthenogenesis after its lone female shark produced a pup without ever having come into contact with a male shark.
The repercussions of parthenogenesis in sharks, which fails to increase the genetic diversity of the offspring, is a matter of concern for shark experts, taking into consideration conservation management strategies for this species, particularly in areas where there may be a shortage of males due to fishing or environmental pressures. Although parthenogenesis may help females who cannot find mates, it does reduce genetic diversity.
Unlike Komodo dragons, which have a WZ chromosome system and produce even male (ZZ) offspring by parthenogenesis, sharks have an XY chromosome system, so they produce only female (XX) offspring by parthenogenesis. As a result, sharks cannot restore a depleted male population through parthenogenesis, so an all-female population must come in contact with an outside male before sexual reproduction resulting in males can occur.
MammalsThere are no known cases of naturally-occurring mammalian parthenogenesis in the wild.
In April 2004, scientists at Tokyo University of Agriculture used parthenogenesis successfully to create a fatherless mouse.
It is highly doubtful that artificial human parthenogenesis would be used to reproduce humans, due to technical (see imprinting below) concerns. Use of an electrical or chemical stimulus can produce the beginning of the process of parthenogenesis in the asexual development of viable offspring.
Induced parthenogenesis in mice and monkeys often results in abnormal development. This is because mammals have imprinted genetic regions, where either the maternal or the paternal chromosome is inactivated in the offspring in order for development to proceed normally. A mammal created by parthenogenesis would thus have double doses of maternally imprinted genes and lack paternally imprinted genes, leading to developmental abnormalities if any were present in the genes of the mother. As a consequence, research on human parthenogenesis is focused on the production of embryonic stem cells for use in medical treatment, not as a reproductive strategy.
On June 26, 2007 International Stem Cell Corporation (ISC), a California based stem cell research company, announced that their lead scientist, Dr. Elena Revazova, and her research team were the first to intentionally create human stem cells from unfertilized human eggs using parthenogenesis. The process may offer a way for creating stem cells that are genetically matched to a particular woman for the treatment of degenerative diseases that might affect her.
On August 2, 2007, after much independent investigation, it was revealed that discredited South Korean scientist, Hwang Woo-Suk, unknowingly produced the first human embryos resulting from parthenogenesis. Initially, Hwang claimed he and his team had extracted stem cells from cloned human embryos, a result which was later found to be fabricated. Further examination of the chromosomes of these cells show indicators of parthenogenesis in those extracted stem cells, similarly to those found in the mice created by Tokyo scientists in 2004. Although Hwang deceived the world about being the first to create artificially cloned human embryos, he did contribute a major breakthrough to stem cell research by creating human embryos using parthenogenesis.
On December 18, 2007 Dr. Revazova and ISC published an on-line article in the journal Cloning and Stem Cells illustrating a breakthrough in the use of parthenogenesis to produce human stem cells that are homozygous in the "HLA" region of the DNA. These stem cells are called HLA homozygous parthenogenetic human stem cells (hpSC-Hhom) and have unique characteristics that will allow derivatives of these cells to be implanted into millions of people without immune rejection. With proper selection of oocyte donors according to HLA haplotype, it is possible to generate a bank of cell lines, whose tissue derivatives collectively, could be MHC-matched with a significant number of individuals within the human population.
Although the truth about the results of Hwang's work were just discovered, those embryos were created by him and his team before February 2004, making Hwang the first, although unknowingly, to perform the process of parthenogenesis to create a human embryo and ultimately a human parthenogenetic stem cell line successfully. In 2006, a group of Italian researchers announced they had achieved the same feat, but have yet to publish their results. Therefore, ISC is the first organization to achieve artificial parthenogenesis that intentionally led to the creation of human parthenogenetic stem cell lines from unfertilized eggs.
GynogenesisA form of asexual reproduction related to parthenogenesis is gynogenesis. Here offspring are produced by the same mechanism as in parthenogenesis, but with the requirement that the egg merely be stimulated by the presence of sperm in order to develop. However, the sperm cell does not contribute any genetic material to the offspring. Since gynogenetic species are all female, activation of their eggs requires mating with males of a closely related species for the needed stimulus. Some salamanders of the genus Ambystoma are gynogenetic and appear to have been so for over a million years. It is believed that the success of those salamanders may be due to a rare fertilization of eggs by a male, introducing new material to the gene pool, which may result from perhaps, only one mating out of a million.
In hybridogenesis reproduction is not completely asexual, but instead hemiclonal: hybrid offspring pass half the genome intact to the next generation, while the other half is discarded.
Hybridogenetic females can mate with males of a "donor" species and both will contribute genetic material to the offspring. When the female offspring produce their own eggs, however, the eggs will contain no genetic material from their father, only the chromosomes from the offspring's own mother; the set of genes from the father is invariably discarded. This process continues, so that each generation is half (or hemi-) clonal on the mother's side and half new genetic material from the father's side. This form of reproduction is seen in some live-bearing fish of the genus Poeciliopsis as well as in the waterfrog Rana esculenta and the donor waterfrog species Rana lessonae.
A graphical representation of this can be seen through this link.
This is defined as a reproduction resulting when the set of chromosomes acquired from the mother, pairs with an exact copy of itself, which can be described as "half a clone". The animal still is unique and not a clone of her mother. In typical parthenogenesis the individual offspring differ from one another and their mother.
- Apomixis for a similar process in plants
- Komodo Dragon, virgin birth recorded in Komodo dragon
- Jacques Loeb was able to cause the eggs of sea urchins to begin embryonic development without sperm
- Gregory Goodwin Pincus
- Charles Bonnet conducted a series of experiments establishing what is now termed parthenogenesis in aphides or tree-lice
- Kaguya, a mouse created in 2004 by induced parthogenesis
- Dawley, Robert M. & Bogart, James P. (1989). Evolution and Ecology of Unisexual Vertebrates. Albany, New York: New York State Museum. ISBN 1-55557-179-4.
- Fangerau H. (2005). Can Artificial Parthenogenesis sidestep ethical pitfalls in human therapeutic cloning? A historical perspective, Journal of Medical Ethics 31, 733-735
- Futuyma, Douglas J. & Slatkin, Montgomery. (1983). Coevolution. Sunderland, Mass: Sinauer Associates. ISBN 0-87893-228-3.
- Maynard Smith, John. (1978). The Evolution of Sex. Cambridge: Cambridge University Press. ISBN 0-521-29302-2.
- Michod, Richard E. & Levin, Bruce R. (1988). The Evolution of Sex. Sunderland, Mass: Sinauer Associates. ISBN 0-87893-459-6.
- Phillip C. Watts, Kevin R. Buley, Stephanie Sanderson, Wayne Boardman, Claudio Ciofi and Richard Gibson. (2006). Parthenogenesis in Komodo dragons. Nature 444, 1021-1022
- Schlupp, I. (2005) The evolutionary ecology of gynogenesis. Annu. Rev. Ecol. Evol. Syst. 36: 399-417.
- Simon, Jean-Christophe, Rispe, Claude & Sunnucks, Paul. (2002). Ecology and evolution of sex in aphids. Trends in Ecology & Evolution, 17, 34-39.
- Stearns, Stephan C. (1988). The Evolution of Sex and Its Consequences (Experientia Supplementum, Vol. 55). Boston: Birkhauser. ISBN 0-8176-1807-4.
- Parthenogenesis in Incubated Turkey Eggs from Oregon State University
parthenogenesis in Arabic: التوالد البكري
parthenogenesis in Bulgarian: Партеногенеза
parthenogenesis in Catalan: Partenogènesi
parthenogenesis in Czech: Partenogeneze
parthenogenesis in Danish: Partenogenese
parthenogenesis in German: Parthenogenese
parthenogenesis in Estonian: Partenogenees
parthenogenesis in Spanish: Partenogénesis
parthenogenesis in Esperanto: Partenogenezo
parthenogenesis in French: Parthénogenèse
parthenogenesis in Hebrew: רביית בתולים
parthenogenesis in Korean: 단성생식
parthenogenesis in Indonesian: Partenogenesis
parthenogenesis in Italian: Partenogenesi
parthenogenesis in Lithuanian: Partenogenezė
parthenogenesis in Dutch: Maagdelijke voortplanting
parthenogenesis in Japanese: 単為生殖
parthenogenesis in Norwegian: Partenogenese
parthenogenesis in Polish: Partenogeneza
parthenogenesis in Portuguese: Partenogénese
parthenogenesis in Russian: Партеногенез
parthenogenesis in Slovak: Partenogenéza
parthenogenesis in Finnish: Partenogeneesi
parthenogenesis in Vietnamese: Trinh sản
parthenogenesis in Ukrainian: Партеногенез | <urn:uuid:33f29b17-b3c5-46bf-a53d-e31e5234f9fc> | CC-MAIN-2018-09 | https://parthenogenesis.askdefine.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814124.25/warc/CC-MAIN-20180222140814-20180222160814-00591.warc.gz | en | 0.921736 | 4,275 | 3.40625 | 3 |
The aim of this event is to draw the public’s attention to the highly destructive activity of spraying chemtrails into the atmosphere, which is officially known as Stratospheric Aerosol Geo-engineering. This is occurring on a massive scale worldwide, including throughout New Zealand and evidence shows it is causing droughts.
Chemtrails, otherwise known as aerosols, are emitted from aircraft into the atmosphere. They commonly include aluminium and barium and a variety of other toxins, [1, 2]. While these trails are sometimes mistaken for condensation trails, they differ from these in a variety of ways, including that they are sprayed in parallel lines, and can often be seen spreading out, forming cloud-like material and hang in the sky in atmospheric conditions where vapour trails can not.Chemtrails appear to serve at least seven functions, including use with weather modification technology and in electromagnetic operations, such as with the High-frequency Active Auroral Research Program, (HAARP), .
Research conducted for more than a decade reveals that geo-engineering has caused serious harm to the environment, making it far less able to sustain life, [1, 2]. For instance, in Northern California, a group of concerned citizens has been monitoring environmental changes attributable to chemtrails/ geo-engineering and found that it causes drought and the rain that does fall is toxic. They found that snow on Mount Shasta had 61,100 parts per billion (ppb) of aluminium in it, when it should have been at a level of about 7 ppb and the soil pH has changed from acidic to neutral,. It was also found that in only 4 years salmon spawning crashed from 160,000 to 8,000 in a local tributary, about 80% of amphibious species died off and the potato harvest declined by 80%, .
Geo-engineering has taken a huge toll on New Zealand also, as a Great Rain Robbery has taken place. Throughout 2010, when aerosols and unnatural cloud formations, akin to those associated with weather modification technology were recorded, [4-6], extremes in weather occurred. These were particularly harmful to Northland. Northland, which normally gets plenty of rain, was declared a drought zone in January, 2010 and over the following 3 months the rainfall was “extremely low” according to the National Institute of Water & Atmospheric Research. Plus, a drought was declared in the region yet again in December, 2010 and to top it off the Northern Advocate reported on December the 8th that Northland towns, Whangarei, Kaitaia and Kerikeri had ‘had their lowest spring rainfall on record,’ . It is clearly more than a coincidence that the year geo-engineering activities became prevalent, so too did the drought conditions. A report in Science in August, 2009 by Gabriele Hegerl and Susan Solomon stated ‘very large risks’ were associated with geo-engineering, including droughts.
When asked to account for the presence of aerosols in New Zealand and the evidence weather modification technology was used in Northland in 2010, the Environment and Climate Change Issues Minister, Hon. Dr Nick Smith has claimed repeatedly that chemtrails are merely condensation trails and the weather in Northland was not engineered, yet he has offered no credible explanation to account for what has been observed.
As the skies above New Zealand continue to be transformed, there is indisputable evidence that shows a massive aerosol operation has been ongoing for at least one year, [4-6]. It appears that risky geo-engineering programs have been implemented here without the public’s consent or knowledge, which makes one wonder what have they got to hide and what kind of ethics do the people in control of these operations have?
We, the people of New Zealand must question the use of these aerosols and the use of weather modification technology, not only on the grounds of their potentially catastrophic environmental effects, but also on the grounds that false claims have been made by our government. We need to become informed as a nation and uncover the truth of what is being done to our atmosphere and our climate. In light of how environments have been poisoned overseas by this activity and the rapid climatic deterioration associated with it here, there is no doubt the future of our country depends upon this.
- What In The World Are They Spraying? A documentary by Michael J Murphy, Paul Wittenberger and G Edward Griffin, (2010).
- Aerosol Crimes & Cover up, Clifford Carnicom’s website: http://www.carnicom.com/
- Audio: Dr Bill Deagle Talks To Dane Wigington About “Aerosol Armageddon,” January 5th, 2010. http://chemtrailsnorthnz.wordpress.com/2010/02/02/dr-bill-deagle-talks-to-dane-wigginton-and-dr-mike-castle-about-aerosol-armageddon/
- Northland New Zealand Chemtrails Watch, http://chemtrailsnorthnz.wordpress.com/
- Skywatch Kaikoura, The CON Trail, http://chemtrailsoverkaikoura.ning.com/
- Chemtrails NZ, http://chemtrailsnz.co.cc/
- Hot, Dry, Sunny Weather Predicted, 8 Dec, 2010, http://www.northernadvocate.co.nz/local/news/hot-dry-rainy-summer-predicted/3933073/
- Holiday Rain Welcomed With Open Arms, 14 Jan, 2011, Federated Farmers of NZ http://www.fedfarm.org.nz/n2714.html
- Grid Patterns & Wave Formations Seen Over Whangarei In November, 2010, http://chemtrailsnorthnz.wordpress.com/2010/11/16/grid-patterns-wave-formations-seen-over-whangarei-in-november-2010/
A Thank-you For The Media Coverage Of the Issue of Chemtrails In New Zealand.
The NZ Environmental Public Interest Coalition would particularly like to thank the Vinny Eastwood Show, which is broadcast via American Freedom Radio and Rush 89FM (Waikato), and Uncensored Magazine, for their excellent coverage of the chemtrail issue. We also thank Investigate Magazine, which ran a detailed article about chemtrails by William Thomas back in December 2000, and one about weather being used as a weapon, in July 2002.
A thank-you to TVNZ’s Sunday program for drawing the public’s attention to the matter of aerosols on July 4th, 2010 and teaching so many people what ‘chemtrails’ referred to.
Furthermore, we thank Philip Duncan of the NZHerald for addressing the matter of weather modification in his blog, published on May 18, 2010, and we’re appreciative of the newspapers around the country which have included articles and letters about the topic.
We now urge media outlets around the country to do likewise and use World Chemtrail Awareness Day to stand up and ask some serious questions. Do the right thing for the defence and the future of New Zealand and its people. Your country needs you.
For further information about geo-engineering/chemtrails visit:
Peter Drew: firstname.lastname@example.org Ph: 03-4675300
Clare Swinney: email@example.com
Northland New Zealand Chemtrails Watch
Will Ryan: firstname.lastname@example.org
Clear Skies Action Group of Nelson
Rose Birrell: email@example.com Ph: 03-3193089 | <urn:uuid:a6a0b3fd-3cd8-4907-ac8a-0f83258f7e3d> | CC-MAIN-2015-14 | https://clareswinney.wordpress.com/2011/01/17/world-chemtrail-awareness-day-in-new-zealand-%E2%80%93-waking-kiwis-up-to-the-great-rain-robbery/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299339.12/warc/CC-MAIN-20150323172139-00220-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.952064 | 1,610 | 3.109375 | 3 |
In 2008 and 2009, California’s San Joaquin Valley faced one of the worst droughts in the region’s history. This is a look at how the drought effected a single town.
Welcome to Mendota, California, which, because of the drought had a 40% unemployment rate during the peak of the growing season. The city and its residents were at the epicenter of a complex and debilitating clash of the lack of rain, environmental concerns, and fragmented and uncertain policy-makers. Michael independently researched and reported this story, which documents the town and its residents during this complicated period. | <urn:uuid:51cd007d-a22b-4763-911a-9f640412cff2> | CC-MAIN-2018-30 | http://filtzexpress.com/video-portfolio/magazine-story-on-the-ground-reporting/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590329.25/warc/CC-MAIN-20180718193656-20180718213656-00203.warc.gz | en | 0.971069 | 123 | 2.578125 | 3 |
Book on Bullying Release Precedes National Bullying Prevention Month October 2020
NEW BOOK HE’S NOT JUST TEASING! TEACHES KIDS TO IDENTIFY BULLYING AND PRACTICE SELF-ADVOCACY Berwyn, Pennsylvania—Is it bullying? Is it teasing? A new, quick read chapter book by author and counselor Jennifer Licate examines the differences between bullying and teasing, the fragile friendships of children, and the power of kindness. Written for children between ages 9 and 12, the book is a powerful learning tool for parents and teachers that examines emotions and behaviors within friendships, and teaches kids the importance of self-advocacy skills.
As the first book published in the “Navigating Friendships” series, He’s Not Just Teasing will be released on September 22, just in time for National Bullying Prevention Month in October. About 1 out of every 5 (20.2%) students ages 12 to 18 report being bullied during school. Children who experience bullying are at increased risk of depression, anxiety, lower academic achievement and dropping out of school. Both the children who bully and victims of bullying are at a greater risk for mental health and behavior problems, and most alarming, there is a strong relationship between bullying and suicide-related behaviors. It is important for all children to learn how to recognize bullying and know strategies to help them with bullying before their teenage years.
Beginning in October 2006, multiple youth organizations hosted the first bullying awareness week. The point of National Bullying Prevention Month was to transform a society that accepts bullying into a society that recognizes that bullying must, and can, be addressed through education and support.
“I wrote this book because I saw children confused about what bullying is and how to deal with it. The story of Malcolm, who experiences bullying, allows children to learn the differences between teasing and bullying,” Licate says. “It also provides a safe way to discuss the effects of bullying and strategies to deal with bullying. These strategies can then be carried into their interactions with friends, peers, and the whole school community.”
“I will be recommending this book to every teacher and parent that walks in the store. I am amazed how this (book) tackles so many aspects of bullying, from the boy being bullied, to his friends' reactions, his feelings after everything happens, without ever sounding preachy, condescending or dismissive.” Erica D, bookseller via NetGalley
Following the release of He’s Not Just Teasing, Licate will publish follow ups in the series I Lost My BFF! and Am I Weird? in 2021.
Bullying statistics gathered from PACER’s National Bullying Prevention Center resources. Visit www.pacer.org for more information.
Jennifer Licate is a new author through Boys Town Press Publisher. She earned her master’s degree in school counseling from West Chester University and has worked as a school counselor for K-12 students for more than a decade. She channels her love of counseling and creativity to craft children’s books with relatable characters and situations. Her aim is to help children of all ages navigate the challenges of growing up.
Contact Jennifer to set up interviews featuring her book and professional insights on bullying. email@example.com/ 267-589-9241. | <urn:uuid:8f62a85c-0fc1-4de6-8b79-a33cb5cd364d> | CC-MAIN-2023-23 | https://www.storiesbyjennifer.com/post/book-on-bullying-release-precedes-national-bullying-prevention-month-october-2020 | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00207.warc.gz | en | 0.957988 | 701 | 3.21875 | 3 |
Romanization and Word Division
The Library of Congress will continue to follow the McCune-Reischauer systemto romanize Korean with the exceptions noted in this document. See:Romanization of the Korean Language: Based upon its Phonetic Structure byG.M. McCune and E.O. Reischauer ([S.l.: s.n., 1939?), reprinted from theTransactions of the Korea Branch of the Royal Asiatic Society. Full text of theoriginal document is available online from the National Library of Australia Website: http://www.nla.gov.au/librariesaustralia/cjk/download/ras_1939.pdf Note: A romanization table appears as Appendix 7, at the end of this document.
The Library of Congress will designate certain standard dictionaries [seeAppendix 1] as final authorities to resolve questions of contemporarypronunciation. A word will be considered to be pronounced as indicated inthose dictionaries, and romanized in such a way as to represent itspronunciation most accurately.
Conflict between Romanization Rule and Pronunciation
When romanization rules conflict with the pronunciation of a word, prefer torepresent the pronunciation. | <urn:uuid:6b8564bb-10da-4b8d-a7f1-af15e36a9c9b> | CC-MAIN-2014-49 | http://www.scribd.com/doc/98158350/8/Exclamations-%EA%B0%90%ED%83%84%EC%82%AC | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416405292026.28/warc/CC-MAIN-20141119135452-00004-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.866864 | 251 | 2.734375 | 3 |
Illustrating Space-Age History and Hopes
Geracimos, Ann, Insight on the News
The space program is about dreams and opportunities, and the art helps express hope for the future of a vibrant America," says Daniel Goldin, NASA administrator and head cheerleader of the agency's art program.
The National Aeronautics and Space Administration started its art collection in the early 1960s to document its history through paintings, drawings and other media. (Other federal agencies do likewise and boast formidable collections.) Today, NASA keeps more than 800 works, most of them commissioned, on display or in storage at the Kennedy Space Center in Florida; another 2,100 works had been donated earlier to the Smithsonian's National Air and Space Museum.
Nearly every aspect of the agency's work is portrayed in these collections -- liftoffs and splashdowns and planetary exploration -- but individual portraits are less prominent. Team effort is emphasized, as well as the majesty and mysteries of the great beyond. Artistic styles range from the nostalgic realism of Norman Rockwell to the pop sensibilities of Robert Rauschenberg.
"There are parallels between artist, scientist and astronaut," says Bertram Ulrich, NASA's art curator. … | <urn:uuid:e3391dc4-8297-454d-ac8a-de161100ca9b> | CC-MAIN-2016-18 | https://www.questia.com/read/1G1-54032783/illustrating-space-age-history-and-hopes | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860121418.67/warc/CC-MAIN-20160428161521-00133-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.915362 | 249 | 3.078125 | 3 |
Sometimes myths and legends create new myths and new legends. The primordial need of the human soul to be feed on fairy tales and fantastic stories is rooted deep in human nature. Since the dawn of humanity, the stories have been a crucial part of the everyday life of men and women. Without stories, even when the belly was full, people felt the emptiness inside them. Stories narrated through verse, music, or simply with ordinary words, were used to overcome people’s fear and to bring the lost spiritual light back in the human soul.
In prehistoric ages and ancient times shamans, sacred men and women, saints, spiritual warriors, and priests had the role of storytellers. Through storytelling they brought lost people back to themselves and thus back to their true nature. That was the secret ingredient in their successful healing. Later storytellers have become poets, writers, musicians, painters. And in modern days the list of storytellers includes movie makers, directors and visual artists.
Storytellers find inspiration from various sources. Sometimes it is a sudden bliss during working something else, sometimes it is a dream and sometimes it could be smile of a special person, incredible landscape, building or an old legend.
The famous author Bram Stoker got the inspiration for his epic novel Dracula from the colossal remains of Whitby Abbey and the legend about the pale ghost of a lady who wanders in the shadowy ruins of the former Gothic monastery. The legend says that the lady was bricked up alive in one of the walls and that she was frequently seen in one of the crumbled windows. Maybe the legend is true or maybe it isn’t, but the bats are definitely here. They are for sure permanent inhabitants there.
In fact, in 1890 Bram Stoker learned about the real Vlad Dracula (Vlad III, also known as Vlad the Impaler) in the local library of the town of Whitby in North Yorkshire. He perfectly mixed the discovered information with his ingenious imagination and thus the legendary story of Dracula was born.
One legend made alive another legend. But the haunting ruins of Whitby Abbey weren’t only inspiration for Bram Stoker. Throughout the years many ordinary visitors, writers and artists were moved by the fantastic atmosphere of the collapsed structure. And also, at its peak, the monastery was regular place for pilgrimages and inspired many devoted Christians to find their path to God.
The ruins are placed on a cliff facing the North Sea in an area which archaeological discoveries show was inhabited since the Bronze Age. During the Roman Era (3rd century AD) there was a Roman signal station or maybe even a settlement. However, the first monastery at the site was built in 657 by St Hilda, who was appointed by the Saxon King of Northumbria to found a monastery in Streoneshalh (the old name of Whitby).
Very soon the place grew into one of the most crucial religious complexes for the people of the Anglo-Saxon society. The monastery’s cells became home of great number of monks and nuns. For a few years at the monastery lived the honored poet Caedmon, who is known as the earliest English poet. It is obvious that the monastery was respected by the Northumbrian Royal family because the monastery’s property served as their burial site. Years later, Norman nobles were buried at the cemetery too.
In 664 the monastery was the location of the Synod of Whitby, when King Oswiu of Northumbria decreed that the practice of Christianity according to the practices of Rome would replace Celtic Christian tradition in the region. The glory days of the monastery ended at the end of the 9th century. It was several times attacked and destroyed by the Vikings. The location was abandoned until after the Norman Conquest.
At the end of 11th century the soldier and monk Reinferd received orders from William de Percy to erect a Benedictine Abbey on the foundations of the old monastery. A huge reconstruction of the monastery church in the Gothic architectural style occurred in the 13th century. In the following centuries it was enlarged and several times reconstructed.
But the life of the secondary monastery ended in 1540s, destroyed by an order of King Henry VIII during the Reformation. His soldiers demolished large part of the structures and took away any valuable objects.
Throughout the years the ruins have been shaped by constant erosion caused by the strong winds and rain. Locals used the stones for building their houses. During World War I the remains were heavily demolished by German battleships, who were attacking the adjoining signal station. Today the roofless and ruined structure stands proudly as a shell above the town and waits for another legend to be born. | <urn:uuid:e55f0e41-808c-4d37-bacf-f338a2a070e5> | CC-MAIN-2019-39 | https://www.thevintagenews.com/2016/01/25/whitby-abbey-the-ancient-ruined-benedictine-abbey-that-provided-the-inspiration-for-bram-stokers-horror-novel-dracula/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514571360.41/warc/CC-MAIN-20190915114318-20190915140318-00528.warc.gz | en | 0.976216 | 955 | 2.546875 | 3 |
Let’s Make Things Clear.
The retina is a delicate tissue that lines the inside back wall of the eye. Light striking this tissue creates a wide variety of chemical and electrical events that trigger nerve impulses. In turn, these nerve impulses send signals to various visual centers of the brain, processing the images you see. If the eye is your body’s camera, consider the retina the film. If the film is damaged, you’ll get a fuzzy, distorted picture—or in extreme cases—no picture at all. This plays a crucial role in our ability to see. Unfortunately, it is prone to many diseases, including diabetic retinopathy, macular degeneration, retinal detachment, and more. If you’re suffering from a retinal problem, the Retina Team at EYE-Q can help.
Major blood vessels travel within the retina. High blood-sugar levels from diabetes can damage these blood vessels, causing them to leak fluid, blood or lipids. This damage is called diabetic retinopathy. The leakage affects the retina’s ability to detect and transmit images to the brain. As diabetic retinopathy progresses, your body begins growing new blood vessels in the retina to overcome/replace the vessels that have been damaged by diabetes. These new vessels are not normal and may bleed inside the eye causing vision blockage and form scar tissue that pulls it away from its proper location. This is called a tractional retinal detachment and can lead to blindness. Early diagnosis and treatment of diabetic retinopathy can help prevent vision loss, but it’s equally imperative that you maintain control of your blood sugar if you have diabetes to reduce the risk of further complications.
Age-related macular degeneration (AMD) refers to the breakdown of the macula – a small, but very important area in the back of the eye. The macula provides the sharp, central vision we need for reading, driving and seeing fine detail. Macular degeneration can cause sudden, severe loss of vision in the middle of your visual field and cannot be reversed. Its impact, however, can be reduced through laser surgery and medication.
The retina is the nerve layer at the back of your eye. When it is pulled away from its normal position, it doesn’t work and vision is blurred. If you see flashing lights, floaters, or a gray shadow in your vision, contact us right away! A detached retina is a very serious problem and it almost always causes blindness unless treated.
If you’re suffering from a retinal problem, the Retina Team at EYE-Q can help. Dr. George Bertolucci, Dr. Sumeer Thinda, Dr. Daniel C. Prescott, and Dr. Laura Teasley are experts in retinal care, each with years of experience treating diseases of the retina. Our retina experts specialize in diabetic retinopathy, macular degeneration, retinal detachments and other diseases and surgery of the retina and vitreous. Together, they make up one of the most experienced and skilled retinal specialty teams in Central California.
Time Lost = Vision Lost
If you’re suffering from a retinal disease or injury, it’s important to seek treatment immediately. A detached retina is a very serious problem that can lead to loss of vision and even blindness unless treated. Contact EYE-Q as soon as possible to schedule your consultation with our retina team. | <urn:uuid:9b5178db-d801-47b9-acd3-43b596d3808c> | CC-MAIN-2020-50 | https://eyeqvc.com/services/retina/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141205147.57/warc/CC-MAIN-20201130035203-20201130065203-00450.warc.gz | en | 0.915677 | 707 | 3.140625 | 3 |
Mercury Released from Products Down by 88 Percent
CHICAGO, Illinois, May 8, 2008 (ENS) – Mercury released from products such as thermometers and dental amalgam is much lower now than it was in 1990, but such releases continue to be a dangerous source of environmental contamination, according to new research conducted by an environmental scientist with the U.S. Environmental Protection Agency, EPA.
Releases to air and land caused by products that contain mercury decreased an estimated 88 percent from 1990 to 2005, and estimated releases to water decreased 83 percent, the new study shows.
Mercury released from products contributes nearly one-third of total mercury emissions to the air in the United States. The study shows that in 2000, mercury-containing products accounted for an estimated 32 percent of mercury releases to air, two percent of mercury releases to land, and four percent of mercury releases to water.
Mercury is also released by coal-burning power plants and factories, from transport and storage of waste because of broken mercury equipment, from cremations because of the mercury contained in dental amalgam used for tooth fillings, and from burn barrels used for trash disposal in rural areas.
“Mercury-containing products such as thermometers, switches and dental products release mercury throughout the product life-cycle, including during production, use and disposal,” says Alexis Cain, lead author of the study and an environmental scientist with the EPA Region 5 based in Chicago.
A broken thermometer spills beads
of mercury. (Photo courtesy
Michigan Dept. Community Health)
Mercury, at high levels, may damage the brain, kidneys, and developing fetus, according to the federal Agency for Toxic Substances.
When mercury falls on water or land, contact with bacteria results in the formation of methylmercury. This form of mercury accumulates in fish populations, jeopardizing the health of children and women of childbearing age who eat the fish.
Mercury’s harmful effects that may be passed from the mother to the fetus include brain damage, mental retardation, incoordination, blindness, seizures, and inability to speak. Children poisoned by mercury may develop problems of their nervous and digestive systems, and kidney damage.
A number of highly-used products release mercury throughout their lifecycles, often in ways that are difficult to measure directly, says Cain. As a result, there has been uncertainty about the magnitude of mercury release into the environment that is associated with these products.
Cain’s study, published in “Journal of Industrial Ecology,” uses a method called substance flow analysis to develop improved estimates of the environmental releases caused by mercury-containing products.
“Substance flow analysis can be used to estimate the mercury releases to air, land and water at different stages of a product lifecycle,” Cain says. “It can also help identify actions that would be effective in minimizing mercury releases.”
The model can be used as a predictive tool to evaluate the potential impact of measures to reduce the use of mercury, to improve the management of mercury wastes or to reduce mercury releases through the installation of mercury control technologies.
Cain says, “Reductions in the mercury content of some products, along with mercury emissions limitations imposed on municipal and medical incinerators, have resulted in significant reductions in mercury releases.”
Campaigns are underway to eliminate mercury in thermometers and dental amalgam, and to discontinue mercury use in energy-saving compact fluorescent light bulbs.
In August 2006, the U.S. EPA announced a national program to remove mercury-containing light switches from scrap vehicles before the vehicles are flattened, shredded, and melted to make new steel.
Together with existing state mercury switch recovery efforts, the National Vehicle Mercury Switch Recovery Program is intended to reduce mercury air emissions from the fourth leading source in the United States – the furnaces used in steel making. | <urn:uuid:fbd69480-0213-494c-a122-405136c82b51> | CC-MAIN-2017-17 | http://www.sundance.tv/blog/2008/05/mercury-released-from-products-down-by-88-percent | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121665.69/warc/CC-MAIN-20170423031201-00065-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.93889 | 800 | 3.0625 | 3 |
Democracy. (2013). [Image. Creative commons]. Retrieved from here.
The second area that I have been given, and to which this bog is dedicated, is “Democracy”. At the year six level, students will be looking at historical timelines associated with the growth of democracy, the stolen generation, how our democracy is structured and how it works. In terms of Universal Design, I will be focusing on how students can be challenged and extended beyond their comfort zone through multimodal delivery. I will also look into choice in assessment delivery. By that stage, the embedded tools in the electromagnetism spectrum unit will be familiar and can be used as a foundation to assist students in putting together creative summative assessments that align with their personal learning style and intelligence.
- TEST from Ira Socol’s tool belt- choose appropriate tools with in the constraints of the environment and skill set. Myself, the mentor and students will have to do this.
- TPACK- alignment of content and pedagogy to the most appropriate ICT tools
- Backwards design- Start with the standards and learning objectives in mind.
- Decoding Learning Report: Learning from others, experts, through exploring, practice. Learning from assessments, in and across settings
- Britannica: Use ICT to empower, engage in real world problems and prepare for a future of complex tasks.Democracy is an authentic context, and this being an election year it is relevant and meaningful.
- Koehler & Misha (2009). Alignment between Curriculum, assessment, pedagogy and teaching. Make thinking visible through assessments, assessments reflect HOTS, meaning making is individual, give opportunity to justify answers.
- Ira Socol’s Toolbelt- Give students opportunity to choose the most appropriate tool for their learning, assessment and environmental context. Students evaluate own tools for suitability.
- Finger et al (2007). Intend to cross critical use border. ICT integrated and transforms learning. Knowledgeably reflect on this integration.
- ICT general capability: Investigating, creating and communicating with ICT.
- Constructivism: Build on prior knowledge and prior skills from electromagnetism spectrum unit.
- Blooms – to engage in HOTS, LOTS must be in form of a solid foundation.
- Wiggins and McTighe- Stating a journey with the end in mind enhances success.
- Herriton& Kervin (2007). ICT to solve complex and authentic problems: Democracy and its applications. Use ICT for reflection too.
Resources: This is a work in progress
- Scootle has great time lines, interactive lessons on Australian democracy, Rights of Indigenous populations.
- Other students blogs
I will do a future post on resources found, shared and how they align, problems faces, restrictions and considerations when using those ICT tools. | <urn:uuid:9781c8c4-834c-4efc-bf42-76014819b739> | CC-MAIN-2014-52 | http://faezams.edublogs.org/2013/05/04/plan-two/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447561188.130/warc/CC-MAIN-20141224185921-00069-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.896148 | 600 | 3.59375 | 4 |
1. Islamic law recognizes two types of heirs, the first being Sharers, and the second being Residuaries. A relative who is a Sharer will take a specified portion of the deceased's estate irrespective of anything else excepting for one important exception being the Rule of Awl and Radd. A relative who is a Residuary will take whatever is left over, once the Sharers have taken their specified shares.
2. The share taken by each sharer will fluctuate in certain circumstances. A sole daughter takes a half share. Where the deceased has left behind more than one daughter, all daughters jointly take two-thirds. However, these two rules apply only in cases where the deceased has left behind no sons. If the deceased had left behind son(s) and daughter(s), then, the daughters cease to be sharers and become residuaries instead, with the residue being so distributed as to ensure that each son gets double of what each daughter gets. Lineal descendants (such as sons) exclude brothers and sisters, and therefore, the share of brothers and sisters (whether full, consanguine or uterine) will become nil in the presence of such descendants. | <urn:uuid:4f54e141-d705-44b0-b60b-09d58f5f2efe> | CC-MAIN-2016-44 | https://www.kaanoon.com/76610/property-share | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719677.59/warc/CC-MAIN-20161020183839-00017-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.963858 | 243 | 2.59375 | 3 |
Auditory Processing Disorders in Children
If your child is having trouble listening in noisy environments and often asks you to repeat yourself, he may be suffering from hearing loss, or he may have an auditory processing disorder (APD) instead.
With APD, a child's hearing is normal, but their brain has difficulty interpreting what their ears are hearing. Research indicates that between three and 20 percent of children have some form of APD and a significant number of those children also have attention disorders, such as ADHD. As with hearing impairments, early detection and treatment are important. Left untreated, APD can cause problems with critical thinking skills, a reluctance to read and behavioral issues -- all which can negatively affect academic success. Untreated APD can also result in social isolation, frustration and depression.
How do you know if your child has APD? Common symptoms include problems listening, difficulty understanding and implementing oral instructions, and poor language skills. One of the most common symptoms is a problem distinguishing between similarly sounding words. Additionally, children with APD often have problems with reading and homework.
If your child is exhibiting any of these symptoms, have them evaluated by an audiologist. This hearing health professional will use a battery of tests to determine whether or not your child has ADP. This may include testing your child's sensitivity to the loudness of the sounds they hear and how well he can recognize sounds in words and sentences. Because of the skills necessary to take these tests, most children are tested at age seven or eight.
The good news is, once APD is diagnosed, it can be successfully treated. Treatment for APD is customized according to the specific auditory issues your child is having. After the audiologist determines your child has APD, he will most likely work with a speech pathologist. This professional will work to strengthen the way your child understands and uses language.
Other types of treatment may include:
- Auditory Trainers. These electronic devices are often used in classroom situations. The teacher wears a microphone which transmits the sound of her voice directly to a set of earphones the child is wearing. This helps reduce background noise so the child can focus on classroom instruction.
- Environmental modifications, which can be as simple as changing where your child sits in the classroom or other adjustments designed to reduce noise levels in the classroom, such as putting rubber tips on chairs, using rugs and draperies, and installing acoustic tiles to soundproof walls and ceilings.
- Language-building exercises. The content of these exercises will depend upon the type of auditory processing problems your child is having. They often consist of computer programs your child can work on independently and at their own pace.
If your child is diagnosed with APD, you can help them by reducing the amount of background noise at home, asking them to look at your while you're speaking and to repeat what they heard back to you, and using pictures to illustrate what you're saying. Children with APD also do better when they are on a daily schedule and have a smooth transition between home and school. | <urn:uuid:fa8af66f-6dcd-4e5b-abd7-2e04a500efda> | CC-MAIN-2017-26 | http://www.healthyhearing.com/report/50491-Auditory-processing-disorders-in-children | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320226.61/warc/CC-MAIN-20170624050312-20170624070312-00043.warc.gz | en | 0.969657 | 623 | 3.53125 | 4 |
About The Charts and Nutrition Facts
- For accuracy, the calorie chart and fat chart are based on the biggest serving size available.
- These nutrition facts came directly from the USDA or manufacturer/restaurant.
- If you're using a calorie counter, remember that Fat, Carbs, and Protein calories are just close estimations based on the Atwater factors:
Fat: 9 cal/g Carb: 4 cal/g Protein: 4 cal/g
- Percent Daily Values are based on a 2,000 calorie diet. Please remember this when using this information to make healthy food choices for your diet.
Calories - Total Calorie count at this serving size: 180 Calories. The calorie chart below shows the breakdown for Fat, Carbs, and Protein. In this case, Calories from Fat = 14, Calories from Protein = 20, and Calories from Carbohydrate = 148.
Fat - One serving has 1.5 grams of Total Fat. There is an unknown amount of Saturated Fat and unfortunately the Trans Fat amount was not listed for this food. The rest of the Fat (1.5 grams) is unaccounted for.
Cholesterol - A serving of this size contains no Cholesterol. This is good news if cholesterol is part of your healthy eating plan.
Carbohydrates - Total Carb count for one serving: 37 grams. Sugar: 7 grams, Fiber: 1 gram, and Net Carbs: 36 grams (helpful to know if you're counting carbs).
Protein - At this serving size you'll get 5 grams of Protein per serving.
Minerals - At this serving size the Iron and Calcium amounts could not be obtained (they were not provided to us).This serving size contains 600 mg of Sodium.
Vitamins - This food may contain unknown quantities of Vitamin A and Vitamin C -- we could not obtain the values in this case. | <urn:uuid:f710a7fa-c60e-46f2-8b5c-63eccdec532f> | CC-MAIN-2014-23 | http://quitehealthy.com/nutrition-facts/great-harvest-bread/R252501.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510272680.42/warc/CC-MAIN-20140728011752-00343-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.895543 | 388 | 2.96875 | 3 |
Washington: It took nearly a decade before researchers were allowed to talk about their work identifying the anthrax strain used in the 2001 deadly letter attacks.
University of Maryland researchers have since developed their work into a genetic `fingerprinting` tool that is available online to law enforcement seeking to track down other microbial suspects.
"We found unique bio-markers to help investigators track down the source of the anthrax," said Steven Salzberg, director of the Maryland Centre for Bioinformatics and Computational Biology (CBCB), the journal Proceedings of National Academy of Sciences reports.
"At first, the tiny mutations were elusive. We thought we`d pieced together the `jigsaw puzzle` of data very neatly, until we ended up with a few oddball bits left over. When we looked more closely, we found an extra copy of a critical gene," said Salzberg.
Mihai Pop, Salzberg`s colleague and study co-author, said: "Fortunately, anthrax bacteria mutate relatively slowly, so the material in this colony developed these small distinctive mutations that resulted in physically distinct characteristics."
"If you isolate a colony of bacteria in a test tube, they`ll slowly accumulate random mutations that make them distinct from any other samples of the same type of bacteria," said Pop, according to a Maryland statement.
Salzberg said: "Our colleagues at the University of Maryland... sequenced the DNA of the bacterial samples provided by the FBI (Federal Bureau of Investigation). Then, using computational analysis, we identified four tiny changes in the DNA structure that the FBI could use as a fingerprint in their investigation." | <urn:uuid:a633132b-5700-449a-b49a-dc7d241a7ea1> | CC-MAIN-2018-17 | http://zeenews.india.com/news/eco-news/how-scientists-identified-anthrax-used-in-bioterrorism_692227.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946165.56/warc/CC-MAIN-20180423184427-20180423204427-00430.warc.gz | en | 0.943038 | 336 | 3.015625 | 3 |
How is my baby growing?
At 34 weeks of pregnancy baby development, your little one can already say hello to the world and be just fine. They will be able to manage the way any full-term infant does.
During the period of 34 weeks of pregnancy baby development, the baby’s fat layers – which will help control the temperature in the body once it is born – are piling up, giving the body a rounder shape.
At this point, the baby measures 17 and 3/4 inches long and weighs 4 ¾ pounds.
If your unborn baby has older siblings, now is the time to prepare them for the new family member. At 34 weeks of pregnancy baby development, you can also ask extra help from your mother, or other relatives or friends about taking care of the baby, especially if you are a first-time mom.
You may also start getting pantry must-haves: food, medicine, toilet paper, and toiletries. It’s a good idea to also prepare baby necessities like diapers, wipes, clothing, formula, bibs, blankets, mittens, car seats, and others.
At 34 weeks of pregnancy baby development, your growing baby has less room to move around inside your womb. Because of this, the baby’s wiggles, stretches, kicks, and other movements may feel less forceful. But you can still feel them.
Other developments are:
- Your baby is positioned deeper in your pelvis in preparation for the big day.
- Your baby’s brain is developing fast, and the little one may even experience dreams.
- As early as week 34 of pregnancy baby development, an ultrasound procedure with a healthcare professional will show that your baby has changed into a head-down position — ready for life in the outside world.
- Your baby boy’s testicles have dropped into the scrotum. At times, one or both testicles do not drop at week 34 of pregnancy baby development. But it will do so when the baby is six months old.
- Tiny fingernails and toenails have developed at the tips of the fingers and toes.
- The baby’s sleep schedule is in place because they can close their eyes while sleeping and open them when awake.
- The tiny body is wrapped in a waxy, cheesy coating called vernix, which sheds itself before the big day.
Body and Life Changes
How is my body changing?
At 34 weeks of pregnancy baby development, your body is changing and adapting to the needs of a growing fetus. You will notice:
- Braxton Hicks contractions. These are pre-labor or practice contractions. Expect them to become stronger and more frequent over time. But there is no need to worry if the cramped feeling has no set pattern. It also goes away when you vary your position. If you think the contraction has a regular interval (for example, contractions are always five minutes apart) immediately call your OB doctor.
- Bigger breasts. Enlarged breasts could bring discomfort since it stretches the skin and makes you itch. A good moisturizer and bra that gives maximum support will help.
- Swollen ankles and feet. Help yourself by refraining from standing. Prop your legs on a pillow when seated. Supportive shoes also help.
- Blurry vision. Pregnancy hormones are responsible for this. Reduced tear production can make your eyes dry and irritated, especially if you wear contact lenses. Greater fluid behind your eyes’ lenses can change their shape for some time, making you more nearsighted or farsighted. Wearing eyeglasses instead of contact lenses may make you feel better.
These changes do not last. Your vision will be back to normal after childbirth.
- More vaginal discharge. Pregnancy hormones, especially estrogen, are behind this. They boost blood flow in the pelvis and activate mucous membranes. Underwear with breathable cotton liners can keep you drier and reduce odor.
What should I be concerned about?
At 34 weeks of pregnancy baby development, you must watch out for:
- Pelvic pain. You might feel pelvic pain when your baby drops lower into your pelvis to get ready for the big day. Or you may also feel discomfort in your lower back. You might feel bladder pressure. To ease pelvic pain, stay off your feet when you feel discomfort. You may also enjoy a warm bath. Seek your health professional if these do not work.
- Constipation. Difficult, reduced bowel movements happen for various reasons. Drink lots of water, prune juice, or other fruit juices. Eat high-fiber foods like fruits, greens, whole grain bread, and bran cereal. Try walking or mild exercises to help your digestion. Take smaller, more frequent meals instead of a few large ones.
- Bloating and gas. This happens because stressed people usually swallow more air. Help yourself by inhaling deeply through your nose, and exhaling through your mouth a minute or two daily.
- Itchy rash. Pruritic Urticarial Paules and Plaques of Pregnancy (PUPPP) is characterized by itchy red bumps on your belly, thighs, or buttocks. Contact your health professional if you feel intense itchiness all over, even in the absence of a rash. This could be a symptom of a liver problem.
- Your hospital bag. Now is the time to decide what to include in your hospital bag. You will need a change of clothes, underwear, your medical records, snacks, and others.
Your Doctor Visits
What should I tell my doctor?
At 34 weeks of pregnancy baby development, you can talk about:
- Exercises or stretches you can do to relieve pressure on your lower back and other parts of your body
- Your desire to undergo an infant CPR (cardiopulmonary course)
- Your concerns if your baby is breech
- Signs that could make you seek a health professional, like vaginal bleeding, fluid from the vagina, preterm labor, pain, and others
- Your plans before and after giving birth
- Sexual activity during pregnancy
What tests should I know about?
At 34 weeks of pregnancy baby development, you must undergo the following health exams:
- Repeat routine health checks. Your health care provider will check contractions, fluid leakage, and bleeding. He or she will look at your blood pressure, check your weight gain, and feel the baby’s heartbeat and movements. You may be asked to keep track of your baby’s daily movements. You will also have to be on your toes should the movements stop. Ask about vaccinations, like flu shots, tetanus toxoid, reduced diphtheria and acellular pertussis (Tdap) vaccine. The Tdap vaccine should be administered between the 27th and 36th week of pregnancy.
- Test for group B strep. You will be checked for r group B streptococcus (GBS) at week 34 of pregnancy baby development. GBS is a bacterium that is usually seen in the intestines or lower genital tract. It does not cause harm in adults. But infants who get infected with GBS at childbirth can get seriously sick. The health care professional will swab your lower vagina and anal area. He or she will send the sample to a lab for testing. If you test positive for GBS — or if you have given birth to an infant with GBS disease — you will get intravenous antibiotics during labor to protect your baby.
- Biophysical profile (BPP). Your physician may ask for this combined ultrasound procedure and nonstress test. It will check the baby’s heart rate over time and see if the baby is responding well to stress.
Health and Safety
What should I know about being healthy and safe while pregnant?
At 34 weeks of pregnancy baby development, you should:
- Get enough calcium. This strengthens your baby’s bones and teeth. Milk, cheese, yogurt, malunggay, broccoli, and sardines are rich sources of calcium.
- Sleep on your side. A study shows that sleeping on your back raises the risk of stillbirth.
- Protect your joints. Pregnancy hormones relax your joints as a prelude to childbirth. Refrain from jumping or high-impact moves. Bend your knees, not your back, when you pick things up. Avoid carrying something heavy.
- Swimming. This is good exercise at 34 weeks of pregnancy baby development. It straightens your body and is good for your back. Avoid twisting too much as this could strain your tummy muscles or ligaments.
At 34 weeks of pregnancy baby development, you are already at the homestretch. Stay healthy, have those checkups, and relax.
Hello Health Group does not offer any advice, diagnosis, or medical treatment.
Hello Health Group does not provide medical advice, diagnosis or treatment. | <urn:uuid:e609ef3c-14c1-418e-b48e-451483d53fc3> | CC-MAIN-2020-50 | https://hellodoctor.com.ph/pregnancy/being-pregnant/pregnancy-week-34/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141182794.28/warc/CC-MAIN-20201125125427-20201125155427-00026.warc.gz | en | 0.92809 | 1,850 | 2.890625 | 3 |
OxyContin is a narcotic pain reliever that is classified as an opiate analgesic. It contains oxycodone, a synthesized medication that mimics the effects of morphine to manage or relieve pain.
How OxyContin Works
Under normal circumstances, the brain produces endorphins, which bind to opioid receptors in the brain to create feelings of euphoria and reduce pain. OxyContin mimics the behavior of endorphins, binding to the opioid receptors and changing the way users experience pain. Doing so blocks the transmission of pain signals from nerves in the brain. Consequently, even though the physical cause of pain may remain, individuals will experience fewer pain sensations.
Doctors prescribe OxyContin to relieve moderate to severe pain, such as the pain associated with surgery, traumatic injury, or cancer. The active ingredient in OxyContin, the synthesized painkiller oxycodone, is released slowly over a 12-hour period to provide prolonged pain relief. When used exactly as prescribed, users will enjoy a steady level of pain relief.
How OxyContin is Heroin, basically
OxyContin contains oxycodone, a synthesized pain reliever that mimics the behavior of heroin and morphine. Heroin works by mimicking endorphins and binding to opioid nerve cell receptors, which magnifies pain relief and produces a euphoric high. OxyContin works the same way; the medication binds to opioid receptors to block the transmission of pain signals and create feelings of euphoria.
Since OxyContin is a time-lapse medication, however, the release of its active ingredient oxycodone occurs slowly over time. Unlike heroin, which provides users with an instant rush, OxyContin offers a steady level of pain relief. However, users can bypass OxyContin’s time lapse by snorting ground up tablets or by chewing tablets. This creates instant and intense pain relief, which can be highly addictive like heroin or morphine.
Symptoms of OxyContin Addiction
The signs of OxyContin addiction are similar to the signs of other prescription drug addictions, including Percocet and Vicodin. If you think that you or a loved one might be struggling with an OxyContin addiction, watch for these signs:
- Taking more OxyContin than prescribed because the original dosage no longer relieves pain
- “Doctor shopping” in order to obtain multiple prescriptions
- Making promises to stop taking OxyContin, but failing to follow through
- Lying to friends and family about using OxyContin
- Taking OxyContin to alleviate withdrawal symptoms such as mood swings, volatile behavior, and bouts of mania
- Putting self and others at risk, such as driving under the influence of OxyContin
- Bloodshot eyes and extremely large pupils
- Change in sleeping and eating habits
- Impaired coordination and slurred speech
OxyContin Withdrawal Symptoms
Just like with heroin or morphine addiction, physical dependency on OxyContin can result in physically painful withdrawal symptoms. Depending on the amount of OxyContin being abused and frequency of abuse, some OxyContin users may experience withdrawal symptoms in as little as six hours after their last dosage.
- Emotional craving for OyxContin
- Jitters, anxiety, distraction, shaking
- Pronounced depression
- Sweating, tearing up, runny nose
- Hot and cold flashes
- Overwhelming muscle pain and aching bones
- Dilated pupils
- Inability to eat, nausea, diarrhea, vomiting
- Involuntary muscle spasms, kicking, and jerking
Seeking Help for OxyContin Addiction
If you or a loved one are suffering from an OxyContin addiction, it is imperative that you seek treatment from a drug rehabilitation center. Just like detoxing from heroin or morphine, detoxing from OxyContin is an extremely challenging and painful process. Some withdrawal side effects may be so severe that they require medical intervention. In addition to enduring emotional cravings for more, addicts suffer through painful withdrawal symptoms that include muscle spasms, cramping, diarrhea, vomiting, and sweating.
Even after the physical detox process is complete, the emotional desire remains. For individuals who used OxyContin to self-medicate, the need for this drug is deeply ingrained in their minds. Individuals who have suffered a traumatic experience, such as military personnel or rape victims, may suffer from Post-Traumatic Stress Disorder (PTSD). Individuals struggling with PTSD are at greater risk for using prescription painkillers, like OxyContin, to self-medicate.
They are also more likely to become addicted after abusing these drugs. It is essential that these individuals receive therapy and counseling to address the trauma and stress that underlies their addiction. Otherwise, these individuals will continue to struggle with intense feelings of hopelessness, depression, and anxiety in addition to a emotional craving for OxyContin, that makes it incredibly difficult to remain sober.
Overcoming OxyContin Addiction
Overcoming OxyContin addiction is a challenging process. With the right treatment center, however, there is hope. Recognizing an addiction and seeking help is the first step towards recovery. With the assistance of Best Drug Rehabilitation, users can successfully detox from OxyContin and address the emotional issues that drive their addiction.
Since OxyContin is a legal drug, remaining sober can be a challenge. Best Drug Rehabilitation will teach users coping strategies and provide a strong aftercare program to help users stay committed to their sobriety. With detox, rehabilitation, and focused group activities there is hope for overcoming an OxyContin addiction. | <urn:uuid:5bbe565f-bef4-45d5-b80c-abaf7da0d4d3> | CC-MAIN-2014-49 | http://www.bestdrugrehabilitation.com/drugs/opiates/oxycodone/oxycontin/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400376197.4/warc/CC-MAIN-20141119123256-00222-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.93024 | 1,118 | 2.875 | 3 |
Results - Part III
Velocity fields around two buildings
The building models and layout
A dummy building without openings is located in front of the cross-ventilated building. The spacing between the two buildings is 1.0H (height of the building). Oblique wind directions are created by decomposing the wind velocity profile into X and Y components for specified wind angle.
The results are presented by three main categories: | <urn:uuid:30b22541-81ce-4678-9d09-5e025a659d63> | CC-MAIN-2024-10 | http://www.wind.arch.t-kougei.ac.jp/info_center/ventilation/CFD_Result3.html | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474852.83/warc/CC-MAIN-20240229170737-20240229200737-00734.warc.gz | en | 0.958931 | 85 | 2.796875 | 3 |
Economics XII Content
The Law of diminishing marginal utility:
This law was first developed by H.H Gossen in 1854 AD, which is also the first law of Gassen. This law is based on universal human experience. It explains that for more units of commodity; its M.U derived from each additional unit diminishes in comparison to the previous unit. Hence, the law of diminishing marginal utility implies that consumption of each successive units of a particular commodity gives less and lesser satisfaction to the consumer if a consumer consumes it in a certain time period.
This law is based on the following assumptions:
- The consumption is rational
- Price of the commodity remains constant
- Income of the consumers remains constant
- There is no any time gap between the consumption of different units
- Size of commodity is suitable.
We can explain this law by the help of given table and figure:
|Units of commodity||M.U|
On the above table, when the consumer consumes one unit of commodity then marginal utility is 12. When consumption of commodities gradually increases from 1 to 8, the marginal utility decreases from 12 to -2. When consumer consumes 7 units then at that time marginal utility is 0. We can explain the same table by the help of following figure:
On the above graph x and y-axes measures units of commodity and M.U respectively. Marginal utility curve is derived on the basis of above table which is negatively slopped and tends to negative. It indicates when consumer consumes more and more commodity M.U starts to decline and it tends to the negative. | <urn:uuid:6804768c-91a3-4cc2-8f7f-220044146f8a> | CC-MAIN-2021-25 | https://tyrocity.com/topic/the-law-of-diminishing-marginal-utility/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487586390.4/warc/CC-MAIN-20210612193058-20210612223058-00299.warc.gz | en | 0.917773 | 328 | 3.453125 | 3 |
Thoughts are complex things. In AI, logic is a way to simplify thoughts to their essences in a formal manner so that they can be reasoned about by machines. Like any representation, logical representations ignore some details and make a big deal out of others.
We will discuss propositional logic, and then predicate logic. But here we'll just give you a taste of what they are like.
Let's suppose you have a thought: "Ocelots are endangered." Propositional logic would represent this with a single letter, for example, "P."
Note that it ignores the fact that Ocelots are animals, that there is more than one, etc. In predicate logic, we might represent this fact like this:
Notice that in predicate logic we have more structure. This is more powerful, and in AI, this makes it slightly less efficient. In AI, there is often a tradeoff between representational power and complexity and computational efficiency. | <urn:uuid:2f8eafc7-d63a-4b47-bd81-bea34956a341> | CC-MAIN-2018-09 | https://en.wikibooks.org/wiki/Artificial_Intelligence/Logic/Representation | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813691.14/warc/CC-MAIN-20180221163021-20180221183021-00596.warc.gz | en | 0.947794 | 195 | 3.671875 | 4 |
Toys & Gifts
Physics & Astronomy
You've probably heard reports about a recently-developed technological device that may help quadriplegics regain control of their limbs. The device is designed to read the quadriplegic's brain waves, and then transfer those signals to electrodes that stimulate the hand muscles. Other recent developments may yield hi-tech ways to treat other brain-based ailments such as the memory loss accompanying dementia. In early 2003, a University of Southern California biomedical engineering research team created a silicon chip copy of a rat's hippocampus, a brain structure used for creating and storing new memories. The artificial hippocampus has been hailed as the world's first brain prosthesis, the first step in the development of all sorts of artificial devices that could be implanted into a human brain to replace damaged neural assemblies.
In a way, all of this seems miraculous, but it's also a reminder that the brain's means of communication are run-of-the-mill electrical and chemical energy -- the same forms of energy used in a battery-powered electrical circuit. We usually think of 'mind' and 'matter' as two different things, but any act of thinking relies on the transmission of an electrical impulse along a physical neural pathway. Mind-reading technology that now seems like science fiction may be routine in the near future. Some of that technology, though, may not be such a boon to society. Using the mind to manipulate matter is one thing, but what about using matter to manipulate the mind?
In 2002, there was a report in the journal Nature about remote-controlled rats. The authors of the report implanted electrical probes in the rats' brains that picked up signals from a remote control device. By stimulating electrodes connected to a pleasure center in the rat's brain, they were able to make the rat do all sorts of things it would normally avoid by instinct. This is essentially the same technology as the neural prosthesis, except that the signal goes from an outside mechanical device to the brain rather than the other way around. Other recent research into the function of the hippocampus has yielded technology for 'reading' a sleeping rat's dreams as it replays a mental maze-running tape in a process of consolidating knowledge acquired the previous day. This sounds like great material for a science fiction novel, but not anything we would want in our real lives.
About the Author
|David Gamon, PhD|
Dr. David Gamon, one of the original writers at ScienceIQ, studied
cognitive science at U.C. Berkeley, where he received his Ph.D. in
Linguistics in 1997. He is the author of many popular books about the
human brain, including Building Mental Muscle, Use It Or Lose It!, and Brains That Work a Little Bit Differently. His current projects include books about gender differences in the brain, the brain’s construction of sensory reality, and psychopathy. | <urn:uuid:04919ebb-c3ed-4435-9340-a66df8481891> | CC-MAIN-2019-26 | http://www.scienceiq.com/Facts/Welcometo1984.cfm | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999263.6/warc/CC-MAIN-20190620165805-20190620191805-00013.warc.gz | en | 0.947513 | 595 | 3.359375 | 3 |
By justin. Bungalow. Published at Monday, June 05th, 2017 - 00:27:29 AM.
A bungalow is a one- or one-and- a-half story dwelling. Good enough, except that since the period when most bungalows were constructed – roughly 1880 to 1930 in the United States – literally every type of house has at one time been called a bungalow. Two-story houses built on the grounds of hotels are still called bungalows, for example. And to further muddy the definition, the great Southern California architect Charles Sumner Greene went out of his way to call his Gamble house (1909) in Pasadena, Calif., a bungalow. Instead, the Gamble house is a sprawling two-story residence with a third-floor pool room.
Milwaukee bungalow: A large fraction of the older residential buildings in Milwaukee, Wisconsin, are bungalows in a similar Arts and Crafts style to those of Chicago, but usually with the gable perpendicular to the street. Also, many Milwaukee bungalows have white stucco on the lower portion of the exterior.
Bungalow house plans are related to the Craftsman Style but refer more specifically to small, one-story gabled houses with front or rear porches. The Bungalow style was popular in the United States in the early 1900s and has inspired many architectural descendants.
The term originated in the Indian subcontinent, deriving from the Hindi word (baṅgala), meaning Bengali and used elliptically for a house in the Bengal style. This Asian architectural form and design originated in the countryside of Bengal region in the Indian subcontinent. Such houses were traditionally small, of one story and detached, and had a wide veranda.
Any content, trademark’s, or other material that might be found on the FiveMileSkateboards.com website that is not FiveMileSkateboards.com’s property remains the copyright of its respective owner/s. In no way does FiveMileSkateboards.com claim ownership or responsibility for such items, and you should seek legal consent for any use of such materials from its owner. | <urn:uuid:bfd7174d-9b9e-4066-acac-16e9316219b1> | CC-MAIN-2019-18 | https://fivemileskateboards.com/bungalows-in-the-bahamas/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527518.38/warc/CC-MAIN-20190419081303-20190419103303-00311.warc.gz | en | 0.957099 | 458 | 2.796875 | 3 |
The purpose of this study was to explore the factors that promote or inhibit the reading achievement of elementary children. The participants for this study were administrators who were employed at eleven Title I schools in North Carolina. The study used a qualitative design and collected data by phone interviews with elementary administrators.
Several recurring themes and patterns surfaced from the data gathered from the eleven participants. However, the overarching themes that promoted reading achievement were (a) family support, (b) early literacy exposure, and (c) teacher effectiveness and expectations. The reoccurring themes that inhibited reading achievement were (a) lack of early literacy exposure, (b) lack of family support, and (c) lack of teacher and parental expectations.
Holder, Ashley; Wilson-Jones, Linda; Phillips, Brian; Jones, Paris; and Jones, Jerry D.
"Elementary Administrators' Exploring the Factors that Promote or Inhibit Reading Achievement,"
Journal of Research Initiatives: Vol. 3
, Article 16.
Available at: https://digitalcommons.uncfsu.edu/jri/vol3/iss1/16
Adult and Continuing Education Administration Commons, Community College Leadership Commons, Curriculum and Instruction Commons, Educational Leadership Commons, Elementary and Middle and Secondary Education Administration Commons, Junior High, Intermediate, Middle School Education and Teaching Commons, Online and Distance Education Commons, Other Educational Administration and Supervision Commons, Special Education and Teaching Commons, Student Counseling and Personnel Services Commons | <urn:uuid:d39762a7-32d0-40fa-b7cd-9e3e68e33711> | CC-MAIN-2019-04 | https://digitalcommons.uncfsu.edu/jri/vol3/iss1/16/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659417.14/warc/CC-MAIN-20190117224929-20190118010929-00265.warc.gz | en | 0.922932 | 300 | 2.671875 | 3 |
Image: Neurons glow red as they fire in this whole zebrafish larva brain. Credit: Misha Ahrens and Philipp Keller
Researchers have for the first time been able to image most of an entire vertebrate brain at the level of single cells, reports Nature.
A study from the Howard Hughes Medical Institute’s Janelia Farm Research Campus, published in Nature Methods on Monday, shows that modifications to existing microscopy techniques enable researchers to take snap shots of neuron-by-neuron activity in the whole brain of a living zebrafish larvae. The zebrafish larvae, whose bodies are transparent and brains are tiny, were genetically engineered to produce a protein in their neurons that glows in response to the chemical changes that occur when that neuron fires.
With conventional techniques, capturing the activity of even 2,000 neurons at once is difficult. With the modified fish and microscopy methods, the researchers were able to capture the activity of at least 80 percent of the baby fish’s 100,000 neurons over a time period of just 1.3 seconds.
The result is an encouraging announcement for proponents of the Brain Activity Map project, a still-developing scientific collaboration to establish new technologies that can record the activity of all individual neurons in a brain circuit simultaneously (see “The Brain Activity Map”). According to Nature News, Rafael Yuste, a neurobiologist at Columbia University in New York and leader of the Brain Activity Map project, thinks the zebrafish results are “phenomenal.”
“It is a bright star now in the literature, suggesting that it is not crazy to map every neuron in the brain of an animal,” [says Yuste]. | <urn:uuid:9ed88548-15c8-4352-915a-c4c556ecd108> | CC-MAIN-2014-42 | http://www.technologyreview.com/view/512631/a-near-whole-brain-activity-map-in-fish/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444829.13/warc/CC-MAIN-20141017005724-00063-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.915256 | 356 | 3.109375 | 3 |
Since bursting on to the literary scene with his 1967 memoir Down These Mean Streets, Piri Thomas has rightfully earned his status as one of the most revered Nuyorican writers to ever put pen to paper. Seen as a precursor to the Nuyorican poets movement that coalesced a few short years after his first publication, and even of rap music, Thomas’ work was defined by a rhythmic style that captured the colors of Harlem street slang and El Barrio’s Spanglish.
But it wasn’t only his style that was revolutionary for time: his preferred themes drew directly from his life experience growing up as a dark-skinned Afro-Latino in a racist American society, as well as his wayward youth as a gang member, drug addict, and eventual convict at the age of 21. And unsurprisingly, his raw, unapologetic window into Barrio life continues to scandalize polite society to this day.
Of course, anyone who’s familiar with Thomas’ work already knows all this, but few actually had the pleasure to see the Cuban-Puerto Rican author, activist, and social worker in his element before his death in 2011, at the age of 83. Thankfully, for those of us who missed the opportunity to experience his exuberant spirit first hand, we have the documentary Every Child Is Born a Poet to fill that gap in his tragic absence.
Screened as part of PBS’ Independent Lens documentary series back in 2003, Every Child Is Born a Poet is director Jonathan Robinson’s collage-like portrait of a man and his work. Flashing between scenes of a septuagenarian Thomas leading poetry writing workshops in a Bay Area prison, archival material of his childhood and young adulthood, and stylized dramatizations of his writings, Every Child Is Born a Poet seems to embody with its eclectic form the ebullient energy and firm conviction of one of the U.S.’ most groundbreaking Latino voices.
Thanks to Robinson’s portrait, we see Thomas as a natural born poet spinning improvised lines that seem to flow unconsciously to the rhythm of the clave. More importantly still, we see how committed Thomas was to the cause of urban education and drug rehabilition over the 50-plus years that followed his incarceration. Indeed, Robinson suggests that Thomas’ literary work cannot be viewed as separate from his lifelong social mission, product of a promise he made to not turn his back on those still struggling to break cycles of poverty and crime.
Since his death from pneumonia four years ago, Latinos in the United States have found ourselves bereft of one of our most passionate and genuine voices, but his legacy will live on forever through his work and through the many lives he touched. Every Child Is Born a Poet serves as a worthy companion to that legacy.
The DVD is available on Amazon. | <urn:uuid:45e7e42f-9cbb-43ab-a260-5d50a919b0ac> | CC-MAIN-2017-26 | http://remezcla.com/film/every-child-is-born-a-poet-documentary-on-afro-latino-writer-piri-thomas/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320263.78/warc/CC-MAIN-20170624133941-20170624153941-00041.warc.gz | en | 0.981076 | 593 | 2.625 | 3 |
Science Fiction Planets John Norman's Gor
About the planet Gor described in the book Tarnsman of Gor by science fiction writer John Norman.
PLANETS DISCOVERED BY SCIENCE FICTION WRITERS
5. GOR, OR COUNTER EARTH
Location: Gor occupies the same orbit as Earth but is eternally located on the exact opposite side of our sun; the physical imposition of the sun's bulk between the two planets, as well as deliberate obfuscation on the part of Gor's rulers, prevents Earth's scientists from detecting the presence of another planet in the same orbital plane.
Discoverer: No one can be said to have "discovered" Gor, since Gor's rulers keep their world hidden from Earth's prying eyes; however, Gor's saucer-shaped spacecraft have often abducted men and women from Earth to help populate Gor; one such involuntary voyager is Tarl Cabot, an instructor of English history at a small New Hampshire college, who is kidnapped in the mid-1960s while hiking in the White Mountains.
Book: Tarnsman of Gor (1967) by John Norman, together with its 13 sequels.
Description: Gor is a slightly smaller world than Earth, with a lesser gravity; the air, water, and foliage are somewhat similar, however, although the animal life includes giant lizards (tharlarions), leopardlike creatures called larls, huge fighting birds (tarns), intelligent spiders, and other unusual beasts of burden and prey. The human life is similar to that on Earth and may have derived in part or whole from Earth. The men of Gor are a proud people, semibarbaric in nature, with some elements of advanced technology and civilization mixed together with medieval weaponry and social systems. Slavery is endemic, particularly among the female population; the society is heavily male-oriented, and women are kept in subjugation, supposedly much to their liking. The unseen rulers of the planet, the Priest-Kings, limit the technology allowed the Goreans for use in warfare to swords, crossbows, spears, and the like, while permitting sophisticated computer translators, lighting systems, and heating elements. Those who transgress against the Priest-Kings suddenly erupt in blue flame and are consumed within a few moments. The Priest-Kings, who remain eternally secluded in the Sardar Mountains, are large antlike creatures of immense longevity, who have moved the planet to Earth's solar system from its original, distant location, and who nearly destroy themselves in a civil war. The resulting chaos leaves the planet open to an interstellar war with the Beasts, or Kurii, bearlike creatures that are bent on conquering both Gor and Earth. Tarl Cabot becomes a central figure in the developing saga of Gor as he changes from a mild-mannered professor to a fierce barbarian warrior determined to halt the kurii and maintain the independent life-style of his beloved Earth.
|You Are Here: Trivia-Library Home » 11 Planets Discovered by Science Fiction Writers » Science Fiction Planets John Norman's Gor|
|DISCLAIMER: PLEASE READ - By printing, downloading, or using you agree to our full terms. Review the full terms at the following URL: /disclaimer.htm| | <urn:uuid:75670b88-793c-41a9-9f67-ecfcd4b7496b> | CC-MAIN-2018-51 | https://trivia-library.com/c/science-fiction-planets-john-norman-gor.htm | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824059.7/warc/CC-MAIN-20181212155747-20181212181247-00352.warc.gz | en | 0.941505 | 675 | 2.734375 | 3 |
Three little kittens and other favorite nursery rhymes
“Hey diddle diddle______________”….can you fill in the rest of this rhyme? Do you have favorite rhymes or Mother Goose stories you remember from your childhood?
This simple form of storytelling has been used in England, North America, and many European countries for centuries. Many of the rhymes had hidden political or religious messages, but all of them were used to convey language and a sense of “story” to very young children.
Did you know, nursery rhymes can help your toddlers become ready to read?
1. Children hear new words, and new ways of making sentences from nursery rhymes.
2. The cadence and repetition of rhymes help kids remember and repeat what they know. When your child has become familiar with the rhyme, you will be able to read part, and they will recite the rest to you, giving them the happy sense that they are “reading”.
3. Many rhymes are also little stories that help children understand and remember a series of events.
Since you already know many of these rhymes from YOUR childhood, it is an easy way for you to share literacy with your children by reciting the rhymes to them. There are also great books available in the libraries that allow you to share the words and pictures with them during reading time.
At Belmar's Toddler Time each week, we have a Nursery Rhyme Time where we read, sing and act out our favorite stories. We often use books from the Favorite Mother Goose Rhymes Series published by The Child’s World.
We recommend any of the books in this series. There are many other great nursery rhyme books to share. Your librarians will be happy to help you find them! | <urn:uuid:7c7fb7bb-c377-4ad9-9f49-6f4589944baf> | CC-MAIN-2015-48 | http://engagedpatrons.org/Blogs.cfm?SiteID=2367&BlogID=255&BlogPostID=11983&Comment=Y | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398446218.95/warc/CC-MAIN-20151124205406-00239-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.960348 | 376 | 3.296875 | 3 |
Jewish World Review June 28, 2000 / 25 Sivan, 5760
You say: "Williams, what's wrong with you? America without the Bill of Rights is unthinkable!" Let's look at it.
After the 1787 Constitutional Convention, there were intense ratification debates about the proposed Constitution. Both James Madison and Alexander Hamilton expressed grave reservations about Thomas Jefferson's, George Mason's and others insistence that the Constitution be amended by the Bill of Rights. It wasn't because they had little concern with liberty guarantees. Quite to the contrary, they were concerned about the loss of liberties.
Alexander Hamilton expressed his concerns in Federalist Paper No. 84, "(B)ills of rights ... are not only unnecessary in the proposed Constitution, but would even be dangerous." Hamilton asks, "For why declare that things shall not be done (by Congress) which there is no power to do?
Why, for instance, should it be said that the liberty of the press shall not be restrained, when no power is given (to Congress) by which restrictions may be imposed?"
Hamilton's argument was that Congress can only do what the Constitution specifically gives it authority to do. Powers not granted belong to the people and the states. Another way of putting Hamilton's concern: Why have an amendment prohibiting Congress from infringing on our right to play hopscotch when the Constitution gives Congress no authority to infringe upon our hopscotch rights in the first place?
Hamilton added that a Bill of Rights would "contain various exceptions to powers not granted; and, on this very account, would afford a colorable pretext to claim more (powers) than were granted. ... (It) would furnish, to men disposed to usurp, a plausible pretense for claiming that power."
Going back to our hopscotch example, those who would usurp our G-d-given liberties might enact a law banning our playing hide-and-seek. They'd justify their actions by claiming that nowhere in the Constitution is there a guaranteed right to play hide-and-seek. They'd say, "hopscotch yes, but hide-and-seek, no."
To mollify Hamilton's fears about how a Bill of Rights might be used as a pretext to infringe on human rights, the Framers added the Ninth Amendment. The Ninth Amendment reads: "The enumeration in the Constitution of certain rights shall not be construed to deny or disparage others retained by the people."
Boiled down to its basics, the Ninth Amendment says it's impossible to list all of our G-d-given or natural rights. Just because a right is not listed doesn't mean it can be in fringed upon or disparaged by the U.S. Congress.
Applying the Ninth Amendment to our example: Just because playing hopscotch is listed and hide-and-seek is not doesn't mean that we don't have a right to play hide-and-seek.
How do courts see the Ninth Amendment today? It's more than a safe bet to say that courts, as well as lawyers, treat the Ninth Amendment with the deepest of contempt. In fact, I believe that if any appellant's lawyer argued Ninth Amendment protections on behalf of his client, he would be thrown out of court, if not disbarred. That's what the Ninth Amendment has come to mean today.
I believe we all have a right to privacy, but how do you think a Ninth
Amendment argument claiming privacy rights would fly with
information-gathering agencies like the Internal Revenue Service? Try to
assert your rights to privacy in dealing with the IRS and other government
agencies, and I'll send you cigarettes and candy while you're in | <urn:uuid:f8a971d6-f1ec-44b8-88aa-f6745f67ed99> | CC-MAIN-2017-30 | http://www.jewishworldreview.com/cols/williams062800.asp | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426050.2/warc/CC-MAIN-20170726062224-20170726082224-00700.warc.gz | en | 0.961865 | 762 | 2.875 | 3 |
What are Tyre Pressure Monitoring Systems?
Tyre Pressure Monitoring Systems (TPMS) monitor real time tyre pressures using sensors in each tyre and report to the driver with warning light and/or audible alert if there is any change in tyre pressure or temperature.
Having TPMS fitted to your vehicle improves your safety as the system checks tyre pressure every few seconds reducing your chance of an accident related to incorrect tyre pressures. TPMS can also save you money as having the correct tyre pressure maximises tyre life and also helps improve fuel efficiency.
TPMS are now fitted to all new vehicles as a standard, and have been since 2014. Vehicles fitted with TPMS as standard AND first used / registered on or after January 1st 2012 will have their TPMS system tested as part of their MOT, and if your system is not functioning correctly it means an automatic fail.
TPMS sensors should be serviced regularly to avoid sensors developing faults. One of the most common TPMS sensor issues is battery failure. The batteries in TPMS cannot be replaced and replacement sensors need to be fitted. This will mean that an electronic reset is required.
Why Do Direct TPMS Sensors Need Servicing?
Ideally, the only time a sensor should need to be replaced is when the internal battery runs flat. However, due to environmental weathering and sometimes galvanic corrosion of some of the components fastening the valve to your wheel and sealing the valve air tight, TPMS valves can become faulty or fail completely. A simple and considerably cheaper solution is to keep the valve in good condition through servicing, replacing the old components with a brand new set.
Servicing of TPMS Sensors every time the tyre bead is broken is considered a standard requirement by sensor manufacturers in order for them to last a full lifetime.
Why Do TPMS Sensors Need Replacing?
Ideally, sensors generally require replacement once the internal battery has died. Battery life of each sensor can be anything between 3 & 7 years, or around 100k-150k miles. The internal battery of a sensor is used all the time at some level, with minimal use whilst the vehicle is stationary, moderate use when the vehicle is moving and heavy use if the TPMS system is in alert mode due to low tyre pressure or puncture detection (warning light on dashboard). Unfortunately, due to incorrect handling or neglect of servicing, sensors and sensor components can also break which in some cases may require a complete sensor replacement. When TPMS sensors are replaced an electronic reset is required.
What Is An Electronic Reset?
When new sensors are fitted to a vehicle they must be paired to the ECU (the car’s computer) in order for them work, and to clear the warning lights from the vehicles dash at Cheadle Tyres we have state of the art equipment to to check the TPMS, correct any faults and reset the ECU of any vehicle. | <urn:uuid:b1ccc05d-9cb1-48b1-86cd-8a87c2ce5725> | CC-MAIN-2021-21 | http://cheadletyres.co.uk/tpms.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991759.1/warc/CC-MAIN-20210510174005-20210510204005-00514.warc.gz | en | 0.936804 | 591 | 2.6875 | 3 |
Peasants are key to food security, the fight against climate change and the conservation of biodiversity security. Yet their rights are systemically violated and they are subject to multiple discrimination. 80% of the people that suffer from hunger and extreme poverty live in rural areas and most of them are peasants. Each day peasant farms disappear because of the lack of remunerative prices or access to productive resources, and peasants are evicted from their lands or killed when they defend their rights. An international instrument can contribute to better protecting them and improving livelihoods in rural areas.
Support our campaign at the United Nations with La Vía Campesina
- to better protect the rights of peasants and improve livelihoods in rural areas
- to reinforce food sovereignty, the fight against climate change and the conservation of biodiversity
- for a real agrarian reform and a better protection against land-grabbing
- for the right of peasants to conserve, use, exchange and sell their seeds
- for remunerative prices for peasant production and rights for agricultural workers
The CETIM is for many years firmly committed to a better protection and promotion of the rights of peasants. Together with La Vía Campesina, the international peasant movement comprising more than 164 organizations in 74 countries, and representing over 200 millions peasants, the CETIM is currently the leader of the campaign for the adoption by the Human Rights Council of a United Nations Declaration on the rights of peasants and other people working in rural areas.
In September 2012, the Human Rights Council adopted by vote (23 Yes, 9 No and 15 Abs) a resolution (21/19) presented by Bolivia, Cuba, Ecuador, and South Africa establishing an intergovernmental working group to develop and adopt a Declaration on the rights of peasants and other people working in rural areas.
The decision of the Human Rights Council was the result of a long and joint effort by the CETIM, La Vía Campesina and FIAN International.
The adoption of such a Declaration can contribute to better protect the rights of peasants and improve livelihoods in rural areas in the long term and at the global level. It will recognize new rights to peasants and improve the protection of existing rights by giving them more visibility and coherence.
The 17th December 2018, the 73 Session of the United Nations General Assembly (UNGA 73) in New York adopted the UN Declaration on the Rights of Peasants and Other People Working in Rural Areas. Now that the declaration is an international legal instrument, CETIM, La Via Campesina (LVC) and its allies will mobilise to support regional and national implementation processes.
The final vote represents the culmination of a historic process for rural communities. With 122 votes in favour, 8 votes against and 54 abstentions, the forum of UNGA representing 193 Member States, ushered in a new promising chapter in the struggle for the rights of peasants and other rural communities throughout the world.
To read the Declaration, click here.
The Bolivian Ambassador Nardi Suxo Iturre presented her report on the third session of the Intergovernmental Working Group on the Rights of Peasants and Other People Working in Rural Areas to the thirty-third session of the Human Rights council in September 2016. A delegation from La Via Campesina, backed by the CETIM, took advantage of […]
The third session of the Intergovernmental Working Group on the Rights of Peasants and Other People Working in Rural Areas was held in May in Geneva. The CETIM was present with a major delegation of peasants from La Vía Campesina (LVC) and other organizations of fishers, shepherds, nomads, foresters, indigenous peoples and social organizations. The […]
The general coordinator of La Vìa Campesina was in Geneva. Elizabeth Mpofu explains in a short video how the international peasant movement was born. This movement comprises more than 164 organizations in 74 countries, and represents over 200 millions peasants.
Peasants are key to food security, the fight against climate change and the conservation of biodiversity security. CETIM struggles with La Vía Campesina for peasants’ rights.
On the occasion of the 30th session of the Human Rights Council, the CETIM, FIAN International and La Vía Campesina have the pleasure to invite you to a side event on The Rights of Peasants and Other Rural Workers: The Value Added of a UN Declaration Monday 21 September, 2015, 13:00-15:00, Palais des Nations, Room […] | <urn:uuid:9df38327-ee10-4f62-a017-65b91f9908e5> | CC-MAIN-2021-21 | https://www.cetim.ch/rights-for-peasants/page/2/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991269.57/warc/CC-MAIN-20210516105746-20210516135746-00208.warc.gz | en | 0.916012 | 924 | 2.578125 | 3 |
Just What Is It?
Pododermatitis is commonly known as bumblefoot. It is an infectious disease process that affects the feet of birds who are overweight, inactive, have bad perches or are chronically ill. Damage to the bottom of the foot (the plantar surface) can also be an instigating factor of bumblefoot.
This is a well known disease of raptors – the earliest known English reference of the disease published in the “Boke of St. Albans” in 1486. Presumably since falconry has been around since possibly 2000 BC (based on earliest accounts) and the earliest known image of falconry is dated at approximately 700 BC, there are earlier records of this disease.
Who Gets Bumblefoot?
Raptors, Anseriformes (ducks and geese), Psittaciformes (parrots) and Sphenisciformes (Penguins) are the most common groups to develop this condition.
Why Does It Occur?
There are 2 basic ways infection can set it: first via a puncture in the skin of the base of the foot (a talon, a thorn, foreign object…) and second by pressure sores on the bottom of the foot. Pressure sores occur because of uneven weight bearing that leads to damage and devitalization of the skin. Lack of exercise, poor diet, inappropriate perches (too wide, too narrow, too rough), weight gain/obesity, damage to the other foot causing increased weight bearing on the “good foot” and overgrown nails or talons causing the bird to stand inappropriately.
Both of these events lead to infection of the skin with bacteria and occasionally fungi. Once the process begins it leads to a series of changes which eventually may damage the tendons of the foot or spread to other joints and even the heart.
Stages of Bumblefoot
There are several classification schemes for bumblefoot. This disease is dynamic so divisions between the stages may seem somewhat arbitrary. The fact remains that the earlier this issue is caught, the simpler the treatment.
Early stages show loss of the scale pattern on the foot, redness and mild swelling. This can often be easily treated with topical softeners such as bag balm, improvement of the diet and modification of the environment – get rid of those bad perches!
Moderate stages usually require surgical intervention. The changes that lead to infection also reduce the ability of antibiotics to get to the problem. Debridement of the wound, surgical removal of damaged tissues and bandaging are all reasonable treatments.
Later stages are very serious and life threatening. Since the development of antibiotic impregnated beads we can treat later stages than we used to. Prosthetics may even be a solution for birds such as ducks that cannot survive with only one good foot.
A Pigeon’s Tale
This King Pigeon was found in the city- they don’t survive long in the wild so she was lucky to be picked up and brought in. We don’t know her history so we don’t know how her feet got to look like this…
You can see the large swelling of the foot with a big scab in the middle. In Wendel’s case, the scab was easily removed, revealing thick scar tissue that didn’t bleed.
Scar tissue like this just won’t go away without surgery. So we removed it!
Wendel’s doing great now and both her feet continue to look normal.
Bumblefoot, It’s Not Just For Birds
Sadly, pododermatitis can occur in our rats and guinea pigs as well. Similar to birds, an infection gets into the foot pad via trauma that may be induced by inappropriate substrate (wire grates or abrasive substrate) but poor diet and obesity are also factors.
Here is a mild instance of bumblefoot in a guinea pig followed by a foot with severe changes:
Here is an image of moderate changes in a rat:
Unfortunately it is more difficult to treat this disease in Guinea Pigs and Rats. Soaking, disinfecting and bandaging are the keys. But it may be impossible to keep bandages on their feet or the infection may have spread into the bones.
Some Guinea Pigs, like Oscar here, don’t seem to mind the bandages! | <urn:uuid:55e23f59-a9b7-4307-9132-1dab3a95a7d5> | CC-MAIN-2021-25 | https://drmarcucci.wordpress.com/2013/09/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488519735.70/warc/CC-MAIN-20210622190124-20210622220124-00369.warc.gz | en | 0.947922 | 909 | 3.84375 | 4 |
Photogravure after a photograph. Buchner (1860-1917) studied under Naegeli and Baeyer, becoming the latter's asistant. It was originally believed that fermentation required intact living yeast cells, but Buchner's research showed that the cells did not have to be intact or 'vital', and he named the active principle zymase. We now know it as one of the enzymes, proteins which are involved in nearly all biochemical changes. Buchner won the Nobel Prize for chemistry in 1907 and was killed in action serving in a field hospital in the First World War. From a collection of portraits of scientists published by Photographische Gesellschaft, Berlin, 1910. Dimensions: 460mm x 340mm.
© Science Museum / Science & Society Picture Library | <urn:uuid:2f056e97-9f09-476d-8be5-77ea03af8bbc> | CC-MAIN-2018-05 | http://www.ssplprints.com/image/102270/eduard-buchner-german-organic-chemist-1910 | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887024.1/warc/CC-MAIN-20180117232418-20180118012418-00471.warc.gz | en | 0.930565 | 160 | 3.359375 | 3 |
To Slash/Not to Slash--That Is the Question/Quandary
“Punctuation is to make clear the thought expressed.” So say the authors of the Associated Press Stylebook and Libel Manual (p. 267), and they’re right, of course. This sentiment explains some editors’ reservations about the slash (also called a solidus, slant, diagonal, virgule, forward slash, front slash, oblique stroke, or shill). In my years of editing, I’ve noticed that writers like the slash, and use it, but editors tend to, if not detest it, at least eschew it (the MLA Style Manual, for example, declares “the slash, or diagonal, is rarely necessary in formal prose”). Why? Ambiguity. Merriam-Webster’s entry on the slash illustrates perfectly the symbol’s foggy identity, defining it as “and” and “or” and “and or.”
Style, like all well-meaning advice, is sometimes a matter of urgency (e.g., “I would suggest you exit this burning house”) but more often is a matter of taste and discretion. So the sixth edition of the APA Publication Manual cautions readers not “to use a slash when a phrase would be clearer.” Or? And? “X, Y, or both?” APA Style also calls for the use of a hyphen or short dash for simple comparisons. Still, there are times when “and/or” hits the mark best, and this blogger, for one, thinks it’s a serviceable enough construction. Moreover, “and/or” is an entry in the 11th edition of Merriam-Webster’s Collegiate Dictionary.
Other sources echo APA’s cautions. Weighing in on “expressions of equivalence or duality,” the American Medical Association (AMA) allows a forward slash (actually, AMA likes the term virigule) to signify “and” but urges rewording around the virigule “in the likelihood of ambiguity” (p. 353). In Copyediting: A Practical Guide (1990), Judd noted that the slash is used to indicate options (e.g., when you’re going to a party/fete/gala) but reserved its principal use for mathematical copy. The Modern Language Association (MLA) likes the slash for “two terms paired as opposites/alternatives and used together as a noun.” The Chicago Manual of Style seems more tolerant of the slash, noting without commentary that it can be used as shorthand for “or” or “and.” (I’m disappointed that the venerable Words Into Type doesn’t address the slash.)
In sum, the shifty/flexible nature of the slash (and the lack of consensus on its use) reinforces the notion that effective writing and/or editing is always a matter of thinking through the small details. | <urn:uuid:c8e580c6-8e02-4447-9a50-75a0476d4981> | CC-MAIN-2023-40 | https://blog.apastyle.org/apastyle/2009/07/to-slashnot-to-slashthat-is-the-questionquandary.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510942.97/warc/CC-MAIN-20231002001302-20231002031302-00215.warc.gz | en | 0.890104 | 659 | 2.625 | 3 |
Root canal treatment
Root canal treatment, also called endodontic treatment, consists of removing the vital part of the tooth, disinfecting the entire internal root canal system of the tooth, widening the main channels and filling them with a sealing material to seal them.
Following root canal treatment, it is recommended to restore the tooth to protect it. Ideally, the tooth will receive a complete crown with or without screws. It is also possible, but less recommended, to place an amalgam or composite resin restoration, as these materials are not resistant enough to fractures.
- Extraction of the affected tooth;
- Implant or bridge placement to replace the extracted tooth. | <urn:uuid:2c4a21fc-92e6-445e-a979-6465217c9adb> | CC-MAIN-2022-21 | https://www.cliniquedentaireagora.com/en/traitement-de-canal/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662546071.13/warc/CC-MAIN-20220522190453-20220522220453-00027.warc.gz | en | 0.937723 | 138 | 3.234375 | 3 |
Interactive Map Shows UVM Research Around Vermont
- By Amanda Kenyon Waite
Forest health in Marshfield. Adaptive sports on Killington. Cheese caves in Greensboro. UVM programs and research projects dot the Vermont landscape. Now, thanks to an interactive Google map created by University Relations, it’s easy to visualize the scope and impact of the university’s work across the state.
Click on any of the colored pinpoints on the map, and learn through photos, text and links to news articles about UVM faculty and student projects in service to farmers, teachers, health care providers and governmental entities, among other beneficiaries.
“As a land-grant institution, part of UVM’s mission is to use our expertise in a way that benefits the community,” says Joe Speidel, director of local government and community relations. While University Relations has long collected and communicated evidence of this work, Speidel says that Google’s map service provides a more easily accessible and richer picture of these efforts.
But it’s a sampling, says Lisa Young, University Relations coordinator and co-creator of the map. While every UVM project isn’t mapped, the tool is an ever-evolving representation of UVM’s presence not just in Chittenden County but throughout the state. Vermonters can check in periodically to see what UVM research is happening in their county, area or town.
Get on the map
UVM faculty and programs looking to add their work to the map can email firstname.lastname@example.org. | <urn:uuid:82e1305e-7b41-480f-841b-c6257200439a> | CC-MAIN-2017-43 | http://www.uvm.edu/~ccpuvm/?Page=news&storyID=17730&category=ucommall | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187821088.8/warc/CC-MAIN-20171017110249-20171017130249-00662.warc.gz | en | 0.902813 | 330 | 2.515625 | 3 |
You have 12 billiard (or snooker) balls, all the same except one which is slightly heavier – or it may be slightly lighter – than the rest.
You have scales which you can use to compare balls (or groups of balls) with each other.
How can you identify the odd ball by using the scales only three times? Continue reading
Notes from a lecture (19 June 2014) by Richard Taylor, who worked with Andrew Wiles to prove Fermat’s last theorem.
Click here for notes on Taylor’s lecture (pdf) .
And here is an article by Taylor explaining some of his ideas to non-specialist readers.
Thanks to Hasnaa Shaddad and Chris Wright for coming to CoLA on 12 November 2015 to run a session on “What engineers do, and how they use maths”, focusing on the Rayleigh-Plesset bubble equation. Continue reading | <urn:uuid:b4a9839e-3667-4b54-b16f-89cdd5ba92ec> | CC-MAIN-2017-34 | https://mathsmartinthomas.wordpress.com/2015/11/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106990.33/warc/CC-MAIN-20170820204359-20170820224359-00297.warc.gz | en | 0.925675 | 192 | 2.59375 | 3 |
Breastfeeding offers an array of benefits for mothers and newborns. Maternal antibodies are transferred via breastfeeding, protecting the gastrointestinal tracts of babies from several pathogen-caused infections. Yet the molecular mechanism by which maternal antibodies, especially immunoglobulin A (IgA), are produced in mothers during lactation still puzzles scientists.
Now, a research group led by Tomonori Nochi from Tohoku University’s Graduate School of Agricultural Science has discovered that an interorgan network between the mammary glands and the small intestine plays an essential role in maternal antibody transfer through breastfeeding.
Details of their research were published in the journal Cell Reports on September 7, 2021.
Nochi states the research was linked to a need to develop an immune strategy that enhances the quality and quantity of maternal IgA in milk. “We still lack a complete picture when it comes to antibody production in lactating mothers, and this has hindered the discovery of immunological and microbiological approaches to increasing breastfeeding quality.”
In the past, scientists have struggled fully comprehend antibody production in lactating mothers. This has hindered the discovery of immunological and microbiological approaches to increasing breastfeeding quality.”
The team’s research revealed the key part Peyer’s patches (PP)—immune sensors found in the gastrointestinal tract—play in producing maternal IgA.
They also identified two crucial bacterium types; Bacteroides acidifaciens and Prevotella buccalis, which cohabitate the gastrointestinal tract of mothers, generate immune responses in PPs through antigen sampling M cells, resulting in IgA-producing plasma cells migrating to the mammary glands.
“Our results provide significant insights into the development of probiotics that facilitate the transfer of sufficient amounts of maternal antibodies from mother to the neonates via breastfeeding,” added Nochi.
The gut microbiota induces Peyer’s patch-dependent secretion of maternal IgA into milk
Article Publication Date | <urn:uuid:ad05960a-3d90-4807-b7a4-b33e901f7ba5> | CC-MAIN-2023-06 | https://www.eurekalert.org/news-releases/927794 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500126.0/warc/CC-MAIN-20230204110651-20230204140651-00731.warc.gz | en | 0.907408 | 419 | 3.265625 | 3 |
What is a cataract?
A cataract is a loss of transparency, or clouding, of the lens of the eye. Similar to a camera, the lens of the eye focuses light onto the retina where an image is recorded. Over time, the lens can become cloudy, thus prohibiting light rays from passing through sharply.
What causes a cataract?
Cataracts may form as a result of aging, diabetes, trauma, or even long-term exposure to ultraviolet light. Although most commonly a condition found in older adults, cataracts can develop at any age including childhood.
What are the symptoms?
Symptoms include blurred vision, a reduction in color intensity, a yellowing of images, poor night vision, glare, a frequent change in eyeglass prescription and in unusual cases, double vision. Cataract formation is usually a gradual, painless lessening of vision.
How is a cataract detected?
A cataract is diagnosed during a comprehensive eye exam, which includes examination with an ocular microscope and a vision test to determine visual acuity – the sharpness of various size images.
How is a cataract treated?
When routine activities such as reading and driving are hindered by this loss of vision, the cataract may be surgically removed. There are two options for surgery: Extracapsular Cataract Extraction and Phacoemulsification. Once the cataract is removed, it is often replaced by an artificial lens, known as an Intraocular lens (IOL). IOL’s can either be acrylic or silicone.
What are the risks associated with surgery?
Risks include infection and bleeding. Severe infection may cause vision loss. Patients who undergo cataract surgery have a slightly greater chance of developing retinal detachment. The presence of other eye disorders, such as myopia (nearsightedness) may further intensify this risk. However, early treatment can prevent permanent vision loss.
Cataract surgery is a common procedure. It is safe. The majority of persons undergoing cataract surgery experience improved vision afterward. To read more about cataracts, visit our Patient Education section by clicking here. If you would like to schedule an appointment with us, call The Eye Institute of Marin, conveniently located in Terra Linda at (415) 444-0300. | <urn:uuid:93c6a703-9e49-4c8c-8619-dc787a2db091> | CC-MAIN-2019-18 | http://www.eyeinstituteofmarin.com/services/cataracts/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529606.64/warc/CC-MAIN-20190420100901-20190420122901-00540.warc.gz | en | 0.940932 | 487 | 3.203125 | 3 |
What is Continuous Guttering?
Continuous guttering originated in Canada/USA in the 1920s being introduced into the UK in the early 1970s. The 1990s saw rapid growth in the use of continuous guttering in Europe. Since the 1990s Continuous guttering has grown in the UK linked with the rapid growth in low maintenance roofline products.
The product ranges from 0.5 coil coated one side through to 0.9 coil coated both sides. The type of coil used dictates the overall products performance and life expectancy. In harsh environmental conditions, the life expectancy of 0.5 coated one side could be less than half 0.9 BBA coated.
The Continuous Aluminium Gutter is rolled and formed on site from a pre-coated Aluminium Coil, (British board of agrement certificate no 93/2913) to the required length (up to 30 metres) Due to the low linear expansion of aluminium it is only necessary to introduce a movement joint in runs in excess of 30 metres.
Continuous Guttering Applications
- Social Housing
- Public Sector, Residential and Refurbishment
- New Build Housing
- Home Improvement | <urn:uuid:a163eca0-53aa-42de-9f0e-741399a1625b> | CC-MAIN-2013-48 | http://www.arp-ltd.com/continuous-guttering | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163964642/warc/CC-MAIN-20131204133244-00079-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.935848 | 234 | 2.59375 | 3 |
Authors: Madhukar Shivajirao Dama
Balanced sex ratio evolves by a process known as frequency-dependent selection of the minority sex. Efforts to test this theory have focused mainly on experimental populations. Heterogametic sex has greater influence over the sex of the offspring. We tested the prediction that a smaller human population should favor male offspring. Our findings reveal that size of the population has significant inverse correlation with male proportion. We also present evidence for frequency-dependent selection of the minority sex and evolution of balanced sex ratio in isolated human population.
Comments: 18 Pages.
[v1] 2014-03-13 01:10:34
Unique-IP document downloads: 100 times
Vixra.org is a pre-print repository rather than a journal. Articles hosted may not yet have been verified by peer-review and should be treated as preliminary. In particular, anything that appears to include financial or legal advice or proposed medical treatments should be treated with due caution. Vixra.org will not be responsible for any consequences of actions that result from any form of use of any documents on this website.
Add your own feedback and questions here:
You are equally welcome to be positive or negative about any paper but please be polite. If you are being critical you must mention at least one specific error, otherwise your comment will be deleted as unhelpful. | <urn:uuid:c2274dc2-447c-430b-be2a-676a6682dbba> | CC-MAIN-2019-13 | http://vixra.org/abs/1403.0115 | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202658.65/warc/CC-MAIN-20190322115048-20190322141048-00154.warc.gz | en | 0.938711 | 285 | 2.640625 | 3 |
Space in urgent need of cleaning
Rising debris bound to cause catastrophic crashes.
Space could soon become too risky to visit unless derelict satellites and rockets are removed from orbit. That's the stark warning from a new simulation of space junk drifting around the Earth, and scientists are calling for swift international action to solve the problem.
"This is the first time we're going out there to ask for active removal of large debris from low Earth orbit," says J.-C. Liou of the orbital debris programme at NASA's Johnson Space Center, Houston, Texas.
More than 9,000 man-made objects currently orbit the Earth, and about two-thirds of those are debris. This includes derelict satellites, spent rockets and fragments of metal from explosions. With an estimated 5,000 tonnes of stuff flying around up there, its not surprising that US Space Command tries to track everything bigger than 10 centimetres, the size thought to present a fatal risk to spacecraft.
Liou and his colleague Nicholas Johnson used a computer model called LEGEND to predict what would happen to that space junk in the next 200 years, assuming that all space launches were halted in December 2004. That provides a 'best-case scenario', explains Liou; in reality, more and more metal is being shot into space each year.
The duo tracked fragments in low Earth orbit, which spans from 200 to 2,000 kilometres above the Earth's surface. Their simulation shows that without further space shots, the debris tally is stable until about 2055. But after that, the number of dangerous objects begins to rise again, as pieces of junk collide with each other and break up into smaller, yet still potentially fatal fragments.
Three such debris collisions are known to have happened since 1991 alone. The most recent, in January 2005, was between parts of a 31-year-old US rocket and a Chinese CZ-4 launch vehicle that exploded in March 2000.
"We only have one space," says Liou. "If we don't protect the space environment we might get to a stage where we can't launch satellites." The results are reported in this week's Science1.
For the past ten years, major space agencies have ensured than anything launched into space will come back down to Earth within 25 years of its mission end date. They do this either by adjusting the object's original orbit so that it will inevitably fall back down, or by using the last remnants of fuel to guide an object home. The pieces then burn up as they hurtle through the atmosphere.
But that leaves many older satellites and pieces of junk still whizzing around. If we were to rely solely on gravity to bring these back to Earth, it would be thousands of years before space was clean again, says Liou.
The area between 900 and 1,000 kilometres altitude sees the densest concentration of debris. LEGEND calculates that about 60% of all catastrophic collisions, between junk and craft travelling through the mess, will occur in that range. The number of objects in this region is projected to triple by 2200.
Out of reach
None of the manned spacecraft currently in operation can reach beyond about 600 kilometres altitude, and the International Space Station orbits at just 350 kilometres. Although this means that they stay clear of the most dangerous zone, it also means that retrieving junk from further away will be extremely challenging. "We don't have a simple and cheap way to do it," says Liou.
Robotic retrieval would be prohibitively expensive, and even the most powerful ground-based lasers don't have enough energy to nudge the junk into an orbit that will eventually bring it back to Earth.
Before a solution can be found, researchers first need international officials to agree that something needs to be done, says Liou. Johnson will put the scientists' case to members of the United Nations Committee on the Peaceful Uses of Outer Space on 27 February in Vienna, Austria.
- Liou J. -C.& Johnson N. L, et al. Science, 311. 340 - 341 (2006).
User Tools [+] Expand
If you need help or have a question please use the links below to help resolve your problem. | <urn:uuid:08ed5070-d25f-40e7-8af7-413d7f7484e9> | CC-MAIN-2018-51 | http://www.bioedonline.org/news/nature-news/space-urgent-need-cleaning/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823348.23/warc/CC-MAIN-20181210144632-20181210170132-00569.warc.gz | en | 0.954707 | 854 | 3.671875 | 4 |
Definition of Social network:
Family, and friends and their families, that together create an interconnected system through which alliances are formed, help is obtained, information is transmitted, and strings are pulled. In an organizational setting, it usually constitutes the group of ones peers, seniors, and subordinates who provide privileged information on how to get things done, how the power structure operates, and who holds the strings at present.
A dedicated website or other application which enables users to communicate with each other by posting information, comments, messages, images, etc.
A network of social interactions and personal relationships.
How to use Social network in a sentence?
- I like using a social network to talk with my friends because it is really quick and easy and they have the most funny stickers to send.
- There is an ongoing debate about the effects social media has on communication, but it is clear that for people who are isolated or housebound, there can be much to gain from being part of a social network.
- A key ability of modern businesses is a good social network presence in order to engage with customers at a more personal level.
- Global measures assess the degree of social integration or embeddedness in a social network more broadly.
- The data also revealed a widespread apathy to the prospect of purchasing through social networks.
Meaning of Social network & Social network Definition | <urn:uuid:153c3598-39e1-41c5-ab01-6550e13938b1> | CC-MAIN-2021-21 | https://howtodiscuss.com/t/social-network/14077 | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243990449.41/warc/CC-MAIN-20210514091252-20210514121252-00158.warc.gz | en | 0.934202 | 278 | 3.28125 | 3 |
Here is a brief guide about infographics. A good way to design amazing infographics is offered.
The slides without any infographics are a bit old hat now. People love infographics for its benefits of visualization. But with so many infographics out there, it's easy to overlook a lot of infographics with good content just because they just don't stand out from the rest of the pack. And, if you're a designer, you've probably racked your brains trying to find out how to attract viewers and create infographics that do stand out from the rest. Here is a brief guide about infographics. A good way to design amazing infographics is offered, along with various examples.
Definition of Infographics
A very simple definition of the infographic is just two words: visual communication. It is a visual presentation mode of data, information or knowledge. It aims to turn complication into simplicity when deliver message.
There are many different types of infographics and they all have different uses. To name a few, line chart, bar, column and pie chart are suitable for showing data and comparing figures. Timelines are suitable for demonstrating events chronically. Mind map is a great tool to boost brainstorm. Flowchart is the premier solution to display sequence of a process.
The purpose of creating infographics is to communicate data, information and knowledge through imaging. These images or pictures can be formed by the objects they represent or the related subject's icon). The elements can also be just simple points, lines or basic graphs. Of course, they can also be drawn by hand.
The infographic became popular in the early 1990s when news organizations began putting a stress on visual communication. Researches showed that people had small attention spans and were spending less and less time with texts. Those same surveys indicated that those people were spending more time with visual aspects of the products. Thus infographics became an alternative way to tell a story.
It is said that "A picture is worth a thousand words." The infographic displays information visually and makes it easier to consume and ultimately easier to understand. Some successful infographics tell a story with a quick glance or read. It saves both time and effort for readers. What is more, infographics add fun and enjoyment in reading. As for education, they arouse students' curiosity and boost their interests. For more related information, please go to Benefits of Infographics.
Every successful mission begins with a good plan. Do some researches and see some examples for reference beforehand. Sketch the entire concept out in your mind before you attack it on the computer. To make it simple, see the following workflow diagram.
Automatic Infographics Design Software
The above diagrams are all created by Edraw, an all-in-one infographic design tool with predefined symbols. Edraw offers you a variety of diagram makers, and provides infographics examples and libraries of ready-made templates and shapes for quick and simple creation of professional-quality infographics. All templates and examples are editable, printable and for free download.
It also supports export of vector graphic multipage documents into multiple file formats: vector graphics (SVG, EMF, EPS), bitmap graphics (PNG, JPEG, GIF, BMP, TIFF), web documents (HTML, PDF), PowerPoint presentations (PPT), and Adobe Flash (SWF).
Download Full Software Package and View More
Examples for Free
Network diagram examples
Business Plan Examples
Strategic Planning Examples
Infographics about Health | <urn:uuid:91571d36-a964-4c22-95c6-e754c2aa60c0> | CC-MAIN-2017-13 | https://www.edrawsoft.com/infographics-guide.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189686.31/warc/CC-MAIN-20170322212949-00423-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.919963 | 710 | 2.765625 | 3 |
The sweet dumplings are made of egg yolk, flour, sugar, salt, vanilla, and milk mixed into a thin dough. Then you put in stiff egg white and some raisins. You form three dumplings and put them in a form and bake it at low heat. The dessert is always freshly prepeared and is served warm with powder sugar on it. The dusting of powdered sugar is said to represent the snow-covered peaks of the Gaisberg, Moenchsberg and Nonnberg.
In the operetta "Saison in Salzburg" (Season in Salzburg) by Fred Raymond the dessert is praised in a song as "“Suess wie die Liebe und zart wie ein Kuss” (meaning Sweet as love and tender as a kiss in German). A legend says that they were invented by Salome Alt the concubine of Salzburg′s Archbishop Wolf Dietrich von Raitenau in the early 17th century. | <urn:uuid:73565e8a-68b6-485f-897f-193f77b1fb33> | CC-MAIN-2015-11 | http://simple.wikipedia.org/wiki/Salzburger_Nockerl | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462232.5/warc/CC-MAIN-20150226074102-00082-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.925896 | 212 | 2.84375 | 3 |
570 pages, 216 illustrations, 16 in colour
The major challenges of the 21st century faced by human beings are: how to achieve water security, food security, energy security and environmental security? Owing to enhanced natural/anthropogenic disasters worldwide, especially in developing countries, these challenges become much more complicated and daunting. Therefore, it is the need of the hour to highlight the risk of different disasters as well as the modern tools and techniques to minimize disaster losses.
Disaster management being highly multidisciplinary in nature, a comprehensive book dealing with different aspects of disaster management in the face of climate change and socio-economic changes, and encompassing all the important disasters faced by humankind is presently lacking; the existing books, though highly limited, provide cursory treatment of the topic or simply present introductory information. The present book is an attempt to fulfill this gap. This book provides clear, comprehensive, and up-to-date information about different facets of disaster management. The information contained in this book will not only serve as general guidelines for effective disaster management, but will also help educate engineers and scientists about various natural and anthropogenic hazards as well as modern tools/techniques and approaches for their mitigation.
This book will be very useful to the teachers, students and researchers of civil, environmental, agricultural, and land and water resources engineering fields as well as to the planners and decision makers, especially of developing nations. This book will be of interest to researchers in the fields of civil, environmental, agriculture and land and water resources engineering, as well as to planners and decision makers.
There are currently no reviews for this product. Be the first to review this product! | <urn:uuid:6b9d0a50-1c22-4cd0-8730-75e00cec055e> | CC-MAIN-2017-04 | http://www.nhbs.com/title/163031?title=natural-and-anthropogenic-disasters | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00218-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.950099 | 335 | 3.171875 | 3 |
Innovative technologies will be deployed to scale up cervical and breast cancer screening services in rural areas, the National Health Commission said.
The commission will support research into medical tools utilizing artificial intelligence and big data technologies to improve precision of early detection programs targeting abnormal cells in the cervix or breast, Mao Qun'an, director of the commission's planning and information department, said recently while talking about a health promotion guideline issued by the State Council earlier this month.
The technical upgrades will help ease the pressure on strained medical resources in the countryside and provide more rural women with access to early screening services, he said.
Early detection programs in rural areas that look for cells in the cervix or breast that might be malignant were initiated in 2009 in China, targeting women aged 35 to 64.
The decade-long efforts have seen over 100 million cervical cancer tests and 30 million tests related to breast cancer completed in the countryside, according to Qin Geng, director of the commission's maternal and child health department.
About 170,000 cases of precancerous or cancerous cells in the cervix have been detected, as well as 16,000 cases of abnormal cells in the breast, he added.
"China has already boosted its cancer screening capability by shifting screening and diagnosis methods in the past decade," Qin said.
"For example, we used to purely rely on grassroots healthcare workers to read screening reports and make diagnoses, which were inefficient and tended to be erroneous.
"Nowadays, cloud computing and big data tools have been adopted to increase efficiency and accuracy."
China aims to expand its cervical and breast cancer screening programs targeting rural women to 80 percent of all county-level regions by 2022 and 90 percent by 2030, according to the State Council guideline.
Qin said 21 provincial-level regions have achieved full coverage of such early screening services in the countryside, including some impoverished areas.
"The goal set in the guideline is within reach," he said.
The commission also plans to expand the number of disorders included in its newborn screening program, he said.
The program currently handles 23 common conditions among newborns, and incidence rates for most of them have been declining dramatically in recent years, except for congenital heart disease.
"There are as many as 10,000 forms of disorders among newborns, some of which are extremely rare," Qin said. "As we strive to allow more pregnant women to access screening and diagnosis services before giving birth, assistance efforts targeting children born with birth defects will also be strengthened."
Copyright©2023 China Daily. All rights reserved. | <urn:uuid:d0c34614-03fd-464b-861d-66fd00872426> | CC-MAIN-2023-23 | https://govt.chinadaily.com.cn/s/201907/29/WS5d3e5632498ed6fd11ca251e/screenings-of-cancer-in-countryside-to-get-a-lift.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657144.94/warc/CC-MAIN-20230610062920-20230610092920-00528.warc.gz | en | 0.967688 | 525 | 2.734375 | 3 |
- Sizing Lateral Lines Overview
- The Pressure Variation Setting
- Accounting for Differences in Elevation
- Setting the Elevation from the Point of Connection (POC) to a Valve
- Using Multiple Pipe Classes
- Calculation Information
- Getting Information and Editing Equipment
- Sizing Valve-in-Head Rotors (Use our Size Mainline Tool)
- Related Webinars
We make sizing lateral pipes simple, quick, and accurate. You can size lateral lines by either sizing one valve at a time or sizing the entire lateral system in one operation.
Looking for information on sizing mainline pipe in your design? See our Sizing the Mainline documentation page.
Sizing Lateral Lines Overview
Before you size any lateral pipe, we recommend that you:
Open the Size Lateral Pipe tool:
F/X Irrigation ribbon, Size Lateral Pipe flyout
Irrigation Piping toolbar
F/X Irrigation menu, Size Lateral Pipe option
or type PipeSize in the Command line
Sizing One Valve at a Time
When you size one valve at a time, you can enter elevation changes that affect pressure requirements in both the lateral and mainline piping.
If you size each valve one at a time, entering elevation differences at each valve, you may find that you need to change some aspect of piping, such as the type of pipe, velocity, pressure variation, etc. If you want, you can instead make those changes to the pipe data by sizing all valves at once. The system will remember the previously entered information of elevation changes for each valve.
When you select the Size Lateral tool, the cursor will turn into a pickbox and the Command line will prompt you to Select valve to size <All>.
Use the pickbox to select a valve. The system will automatically size the lateral pipes connected to that valve. The Elevation-Affected Pressure dialog box will open. If you want, enter any elevation changes for this station.
1. The Design Pressure will be based on what the selected valve is pulling from the head.
2. Maximum Velocity: Use this slide to change the speed of the water through the lateral pipes connected to the selected valve. Note that the Friction Loss will change as a result.
3. Actual Velocity: This figure will show the rate that the system will need to size to in order to avoid exceeding the current Pressure Variation.
4. Pressure Variation: Use this slide to determine how much pressure you will allow this system to lose. More info >
5. The Friction Loss will be determined by the flow of the current zone and the Maximum Velocity you set for this valve. (Friction loss is the loss generated through the length of pipe from the valve to the farthest head, per the inside diameters of the pipe class chosen, the velocity specified, and the results of the Hazen-Williams formula.)
6. Fittings Factor: Use this slide to adjust for the pressure loss that will be caused by pipe fittings in this zone. The Fittings Loss will change as a result. (This number will be relatively small.)
Enter the elevation difference between the valve and the highest head in the text field to the right, with elevation change in feet for imperial, and elevation change in meters for metric. The system will add pressure (0.433 psi per ft, 0.098 bar per meter) when sizing the lateral system to account for the elevation change. More Information >
If the highest head is at a higher elevation than the valve, enter a positive number for the elevation change (example: 3). If the highest head is at a lower elevation than the valve, enter a negative number (example: -3).
8. Loss through Valve: Here, you'll see the valve size that's currently selected, as well as the pressure loss that will occur when the current settings are applied to that valve size. You can select a different valve size from the menu to specify the valve size that will work best for the current settings. Note that the Pressure Required will change as you select different valve sizes.
9. Once you've configured all the settings for sizing your laterals, you'll see the resultant Pressure Required here.
10. List of the flow rates for all lateral sizes connected to the selected valve
Is the full flow rate/GPM not being displayed here? Here's what to do.
The Size Laterals dialog box no longer includes a setting to enter an Elevation from POC to Valve. We've added some recent improvements to our lateral sizing feature that account for elevation differences between the POC and your valves.
Note that Irrigation F/X still gives you the ability to enter a elevation differences between the POC and your valves – we've just left that option in a few more appropriate locations.
More information >
Click OK to apply your settings. The lateral system will size. The laterals connected to the selected valve will be color coded for their particular size, and pipe size callouts will be placed along the piping system.
BEFORE sizing (pipes are all magenta)
AFTER sizing (pipes are color coded with size callouts)
Let’s say you have the design pressure for your heads set relatively low – say, 1.4 bars in a metric design. If you have the Pressure Variation set at 20%, you will only be allowing 0.28 bars in friction loss. Once the design exceeds this rate, the system will slow the water down until your design requires larger pipes, and the friction loss is within the allowable margin. In this case, the system would be slowing the water down to 0.5 meters/second, resulting in 90mm pipe.
The solution would usually be to raise the Pressure Variation slider. Yet even at 40%, the distance would be generating enough friction loss to require dropping the velocity to 0.6 meters/second. If you were to raise the design pressure of the heads to 2 bars, it would allow you to get up to 1 meter/second velocity.
But let’s say you want to allow up to 1.26 meters/second. That rate would require allowing far more friction loss, or perhaps more simply to just allow all friction loss, and to not automatically reduce the velocity for any reason.
Sizing All Valves at Once
You can also choose to size the lateral pipe connected to all valves in your system design.
Sizing all valves at once could make sense with a flat site with little to no significant elevation changes.
After you select the Size Lateral tool, the cursor will turn into a pickbox and the Command line will prompt you to Select valve to size <All>.
The Size All Lateral Pipes dialog box will open.
1. Use these slides to configure the Maximum Velocity, Pressure Variation, and Fittings Factor for lateral pipes throughout your system design.
Click OK to size the laterals. The system will size the lateral pipes connected to all valves, color code each pipe, and put in the pipe size callouts. Note that you won't receive the option to review elevation changes as you would when sizing a single valve at a time.
Sizing Valves Placed Within Drip & Schematic Areas
Our Size Laterals tool now recognizes valves placed within a drip area or Schematic Irrigation area as being connected to that area – even if the valve hasn't been piped to the area.
The Pressure Variation Setting
The Pressure Variation setting allows you to set a value for how much pressure you will allow your irrigation system to lose.
As you move the Pressure Variation slide, you'll see this figure to the right. If you're sizing one valve, you'll see the Pressure Variation as both a percentage of the current Design Pressure listed at the top of the dialog box, and as the actual pressure loss that will occur based on this percentage. If sizing all valves, you'll only see the percentage.
The Pressure Variation works in conjunction with the Maximum Velocity. If the friction loss is larger than the allowable pressure variation, the system will reduce the velocity.
If you want, you can turn the Pressure Variation off by moving the slider all the way to the left. This setting will disable the automatic reduction of velocity in your design.
Accounting for Differences in Elevation
If your system has elevation differences, you can account for these differences when sizing your laterals – as well as when entering data for your valves and when sizing the mainline.
These options for configuring elevation differences can serve as a quick way to account for the pressure requirements imposed by these variations in elevation.
Using Spot Elevations
If you choose to Use Spot Elevations when sizing your laterals, you'll most likely place one near the point of connection (POC) and then place additional Spot Elevations to reflect elevation changes.
When you use our Spot Elevation tool to account for elevation changes, any head or valve will automatically look for the NEAREST spot elevation and assume the head or valve is at that elevation. Because of this feature, we recommend placing Spot Elevations generously.
The option to Use Spot Elevations can be a more time-consuming method of accounting for elevation changes, but for certain situations such as golf course design, it can be the preferred method.
Elevation from Valve to Highest Head
When sizing the laterals for one valve at a time, enter the difference in elevation between that valve and the highest head in your design.
Remember: If the highest head is at a higher elevation than the valve, enter a positive number for the elevation change (example: 3). If the highest head is at a lower elevation than the valve, enter a negative number (example: -3).
This option is only available when you're sizing one valve at a time.
When entering the elevation difference, take care to only account for positive-value head height. Only use a negative number if all heads are lower in elevation than the valve, or simply ignore entering a number if the heads are lower.
Setting the Elevation from the Point of Connection (POC) to a Valve
The Size Laterals dialog box used to include an option to enter an Elevation from POC to Valve. We've removed this option from the Size Laterals feature.
You still the ability to enter an elevation between your POC and a specific valve. Use one of these two methods:
- Option 2: Use Spot Elevations for Valve Elevations when sizing the mainline.
As long as you've placed Spot Elevations near your POC as well as near each valve, the Size Mainline tool will automatically account for the elevation difference from the POC to each valve when you select this option.
If using this method to account for elevation differences in your design, make sure you've placed your Spot Elevations as close to your POC and valves as possible.
Using Multiple Pipe Classes
The Pipe Data tool allows you to specify up to 9 classes of lateral pipe and 6 classes of mainline in each of your projects. As long as you meet a few specific criteria in setting up your pipe classes, the system will automatically assign each of your classes to the correct size of lateral or mainline pipe once you size your pipe.
Our software uses the Hazen-Williams formula to size pipe. This formula calculates the inside diameter required, as well as related pressure losses for given flows and lengths of pipe. The calculations are derived from data supplied by the flow in the pipe resulting from:
- Heads placed in your drawing,
- The maximum velocity, and
- The roughness coefficient
After sizing, the system will check what is known as the Pressure Variation allowance to balance the pressure to your needs.
You can control all data and system requirements using our Pipe Data feature. For more information, including descriptions of the various factors that affect the lateral pipe calculation, see our Pipe Data documentation page.
Getting Information and Editing Equipment
The Edit Equipment / View Data tool is valuable for reviewing the requirements of a piece of irrigation equipment, such as a head or valve, or any given length of pipe.
For more information on this tool, see our Editing and Revisions documentation page.
Valve-in-Head (VIH) Rotors
Valve-in-head (VIH) rotors are generally piped with constantly pressurized pipe, which, by definition, is mainline. Although you'll use our Lateral Pipe tool when piping to and between VIH rotors, the system will recognize the valves in the heads and will treat the pipe as if it's mainline. When sizing this pipe, you should use our Size Mainline tool. See our VIH Rotors page for more information.
- Getting Started with Irrigation F/X: Join us for this webinar to get going with the essential capabilities of Irrigation F/X. We'll show how to navigate through the Irrigation ribbon and build a familiarity with our conceptual-level tools. You'll also learn the basics of adding equipment to a project, placing, piping, sizing, and scheduling. (1 hr 8 min)
- Start to Finish Basics of Irrigation Design: This webinar will help give you an understanding of how to specify the proper equipment, talk about important concepts of irrigation design, and create a complete irrigation plan from start to finish. (1 hr 31 min)
- Irrigation Tools – What You Need to Know: We'll show you the ins and outs of basic irrigation setup using our software. You'll also learn the essentials of placing equipment such as drip, sprays, and rotors. (1 hr 6 min)
- Irrigation Tips & Tricks: We'll show you some advanced tools you may or may not know about. You'll also learn techniques and best practices that will help speed up your workflow. (1 hr 3 min)
- Existing Irrigation: Learn the techniques, tools, and tricks you'll need to expand an existing system, including how to use a pipe cap to account for existing flow and add new valves to an existing mainline. (56 min)
- Advanced Irrigation Troubleshooting: Learn to think like a Land F/X irrigation troubleshooter. We'll show you why your symbols don't match, why you would see the message "Error accessing equipment data" (and how to fix these issues, as well as tips on pressure losses and precip rates, pipe caps, system monitors, and flow zones. (1 hr 3 min)
- Golf Course Irrigation: We'll demonstrate some of the great tools Irrigation F/X offers to help ensure proper mainline sizing and scheduling. We'll also discuss the use of using flow zones, shut-off valves, and valve-in-head rotors. (1 hr 4 min)
- Irrigation Tools – What You Need to Know: We'll show you the ins and outs of basic irrigation setup using our software. (1 hr 6 min)
Issue: Error when attempting to size all lateral pipes in a design: Unsizeable valve encountered. Flow velocity has been reduced to minimum, and friction loss still exceeds allowable pressure variation. Erroring out. | <urn:uuid:8387c335-96cb-405c-b482-3d8125ef1b54> | CC-MAIN-2020-05 | https://www.landfx.com/docs/irrigation/piping/item/189-sizing-lateral-lines.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592636.25/warc/CC-MAIN-20200118135205-20200118163205-00535.warc.gz | en | 0.900827 | 3,144 | 2.5625 | 3 |
What is marble?
Marble is a rock resulting from metamorphism of sedimentary carbonate rocks, most commonly limestone or dolomite rock. Metamorphism causes variable recrystallization of the original carbonate mineral grains. It is composed primarily of the mineral calcite (CaCO3) and usually contains other minerals such as: clay minerals, micas, quartz, pyrite, iron oxides and graphite. Under the conditions of metamorphism the calcite in the limestone recrystallizes to form a rock that is a mass of interlocking calcite crystals. A related rock, dolomitic marble, is produced when dolostoneis subjected to heat and pressure.
The resulting marble rock is typically composed of an interlocking mosaic of carbonate crystals. Primary sedimentary textures and structures of the original carbonate rock (protolithic) have typically been modified or destroyed. | <urn:uuid:da60171a-22ac-483b-9f6c-750127d15f99> | CC-MAIN-2018-17 | http://traonyx.eu/index.php/marble-stone?virtuemart_manufacturer_id=0&orderby=category_name | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945942.19/warc/CC-MAIN-20180423110009-20180423130009-00092.warc.gz | en | 0.887821 | 187 | 3.875 | 4 |
Since 2014, Ukrainian troops in the eastern Donbas region have been battling Russian-backed separatists in a bloody conflict that continues to take its toll on civilians.
This year alone, the fighting has either disrupted or entirely halted the water supply for 3.2 million people, the children's rights organization said in a new statement released Wednesday. Some families living near the disputed city of Donetsk have had no running water or electricity for months, even years, according to UNICEF.
Since the beginning of the year, fighting has damaged water and sanitation facilities nearly 60 times, escalating the threat of communicable diseases in an area where immunization rates are low. In 2018, water suFighting also limits the possibility for essential repairs, UNICEF said, adding that dozens of workers at water facilities have been injured since the start of the conflict.
"When access is cut or reduced, children and their families often have no choice but to rely on contaminated water and unsafe sanitation," UNICEF's Ukraine Deputy Representative, Laura Bill, said Wednesday. "This is particularly dangerous during the stifling summer temperatures we have seen recently."pply in eastern Ukraine was disrupted 89 times, UNICEF said in a report published in March.
Water interruption in April caused an outbreak of gastroenteritis in the area within days, she said.
One single incident damaging a water facility can disrupt water supply for an entire region, Sebastien Truffaut, Chief of UNICEF's Water and Sanitation Program in Ukraine, told CNN. "It brings a lot of concerns for us because if bad luck reaches one of the main water facilities, the water supplies for 300,000 - 500,000 people could be stopped," he said.
On June 29, shrapnel from exploding shells damaged water pipelines near the town of Horlivka, along the Siversky Donets-Donbas channel, which supplies water to more than 3 million people on both sides of the contact line, UNICEF said. In another incident, workers at a pumping station near Vasylivka had to run to a bomb shelter to escape the shelling, UNICEF said.
Children under the age of 15 living in areas of protracted military conflicts are about three times more likely to die from diseases caused by a lack of safe water, sanitation and hygiene than by direct violence, according to UNICEF figures published earlier this year based on mortality rates in 16 countries with protracted conflict.
Those countries include Afghanistan, Burkina Faso, Cameroon, Central African Republic, Chad, the Democratic Republic of Congo, Ethiopia, Iraq, Libya, Mali, Myanmar, Somalia, South Sudan, Sudan, Syria and Yemen.
In Ukraine, over 54,000 children live on the government-controlled side within 9 miles (15km) of the direct line of contact between the two warring sides, according to the latest UNICEF numbers.
In addition to limited access to clean water, children living in those areas are also facing numerous daily ceasefire violations, the presence of unexploded mines, limited or no access to healthcare, education or transportation, sexual exploitation, neglect at home and deepening poverty, according to the UNICEF report published in March.
Those hazards continue to endanger the physical and psychological wellbeing of children living in conflict areas, UNICEF said.
More about: Ukraine | <urn:uuid:e1cdd1f6-8884-4580-a176-f010d29c8902> | CC-MAIN-2019-30 | https://en.azvision.az/news/108201/fighting-in-ukraine-threatens-water-supply-for-3.2-million.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526446.61/warc/CC-MAIN-20190720045157-20190720071157-00028.warc.gz | en | 0.959246 | 675 | 2.53125 | 3 |
Dr. Craig Wilder says many people are unaware of the role slavery had in the rise of America’s esteemed institutions.
The regret expressed by several top universities in recent years for their connection to slavery has led to a number of institutions probing to uncover how deeply linked they were to the slave enterprise.
Schools like Harvard and Brown have acknowledged that they benefitted from slavery. Many others have acknowledged buying or renting out slaves, using slave labor for construction and accepting funds for endowed chairs or start-up seed money from wealthy merchants who were profiting from the slave trade.
These revelations and a growing body of research suggest that prior to the Civil War, universities with no ties to slavery were the exception and not the norm. The academia connection to slavery has gained more attention recently with the publication of Ebony and Ivy: Race, Slavery and the Troubled History of America’s Universities, by Dr. Craig Steven Wilder, a professor of history at the Massachusetts Institute of Technology.
“People are surprised at the role that slavery played in the rise of these cherished institutions,” says Wilder, adding that many people don’t realize the central role slavery had to the economy of the colonies. He says 20th century historian “Samuel Eliot Morison admits in one of his books that it’s the West Indian trade and the slave trade that saved the New England economy.”
Wilder says that six of the nation’s nine oldest universities — Princeton, Rutgers, Dartmouth, Columbia, Brown and the University of Pennsylvania — were founded between 1746 and 1769, the period “when the African slave trade [reached] its peak.” He notes that all of these institutions were founded with some funding by slave merchants, who were also the biggest philanthropists of their day, providing seed money for community institutions, including hospitals, libraries and colleges.
“You have universities — particularly old and established universities in the northeast — that owe their endowment to the slave trade,” says Dr. Joshua Rothman, a professor of history at the University of Alabama whose research interests include race and slavery. “If you go deep enough you will find money linked to the slave trade. When you get into universities founded in the south [in] the 18th and first half of 19th century, you will find multiple issues. State money comes from slavery. If you have private money it comes from people making a fortune from slavery.”
Many historians note that slavery was so deeply embedded into the fabric of society that it would be hard to find an industry or institution in those days that was not tainted by it.
Dr. James Campbell, head of the commission at Brown that studied that university’s connection to slavery, says most industries, including banks, insurance companies and railroads, benefited from slavery or used slave labor. He notes that at least one newspaper, the Hartford Courant, has acknowledged ties to slavery. According to a series published in the newspaper in 2002, the Courant ran slavery advertisements for nearly 60 years.
“If your institution has roots going back to the 17th, 18th or early 19th century, it’s hard to believe that it didn’t have an entanglement with slavery,” says Campbell, now the Edgar E. Robinson Professor in United States History at Stanford.
Finding the slave connection
Yale inadvertently got the ball rolling on the connection between higher education institutions and slavery in 2001 when a team of graduate students, working on behalf of some disgruntled unions, published a report titled “Yale and Slavery.” Among other things, the report alleged that nine of Yale’s 12 residential colleges were named for slave owners.
“It was designed to embarrass the university,” says Campbell. “They discovered some interesting facts and they also made some mistakes.” Some scholars criticized the study, saying it lacked historical context.
But it was Brown’s bold decision to take a critical look at its own record that garnered the most attention, which happened shortly after Dr. Ruth Simmons was appointed president in 2000. The first African-American to head an Ivy League school, she assumed the helm while Brown was still reeling from a controversial debate over slavery. The debate was sparked by the publication of an ad in the collage paper, written by controversial columnist David Horowitz who argued against reparations.
In response, Simmons established a Steering Committee on Slavery and Justice to fully explore Brown’s relationship with slavery. Simmons’ decision to set up the committee was deemed controversial at the time and met with pushback from many, including alumni. In the end, the committee made several recommendations, including calling for an unqualified acknowledgment that the founders of the university had profited from the slave trade. One of the most visible outcomes of the committee’s study was the creation of a Center for the Study of Slavery & Justice, whose mission includes studying slavery in the Atlantic world and its modern day consequences.
Dr. Anthony Bogues, Lyn Crost Professor of Social Sciences and Critical Theory and director of the center, says a second objective is to educate people about its work. The center also partners with groups to enhance public education in the Providence area.
Since the establishment of the committee at Brown, several other colleges and universities have investigated their own slavery connections.
On the eve of its 175th anniversary in 2011, Emory University’s board of trustees issued a formal statement of regret over the school’s involvement with slavery. Emory’s founders and early leaders were supporters of slavery. The Atlanta-area school was named for John Emory, a Methodist bishop who owned slaves. University officials have said publicly that research shows slaves played an important role in building the institution in its early days in the 1830s.
The University of Alabama, a school with a turbulent racial history, has also expressed regret over its connection to slavery. Slaves appear to have been a common presence at the institution.
According to Dr. F. Erik Brooks, chair of the Department of African American Studies at Western Illinois University and an Alabama native, many of the buildings on UA’s campus were built by slaves; they also worked in the president’s home as servants. Not only did some slaves serve professors, but the university rented out slaves and some students brought slaves to campus with them, Brooks says.
Brooks says in one instance, a slave named Sam was beaten by an assistant to a professor for refusing to measure the amount of coal for an experiment the professor was conducting. That professor was a renowned scientist by the name of Frederick Barnard, who would later become president of Columbia University and for whom Barnard College is named.
Other universities that have apologized for their connection to slavery or sought to fully explore the record of their connection to slavery include the College of William & Mary, the University of Virginia and Princeton.
Many historians say these ongoing revelations provide an important context for people.
“Most Americans today have little if any appreciation of the scale and importance of slavery in the history of the modern world,” says Campbell. “The value of enslaved property in the United States at the beginning of the Civil War was greater than the value of all American banks, factories and railroads combined.
“Even that doesn’t capture the centrality of the institution,” continues Campbell. “The idea that some Americans have that this was a peripheral institution, that this was a curious anomaly in society … is just not true. I think the abolition of slavery in this country is one of the epic achievements of democracy.”
Brooks says these reports showing the colleges’ connection to slavery are important because the United States has never really addressed the issue of slavery.
“Universities are supposed to be places where we discuss and investigate intellectual issues,” he says. “We haven’t done our job if we don’t study these issues.”
Adds Bogues: “We still need to have a national conversation about slavery, as something that was grounded in the historical structure of this society. We are
not living in a post-racial society.”
Your email address will not be published. Required fields are marked *
Save my name, email, and website in this browser for the next time I comment. | <urn:uuid:9cb8c970-1fc4-46e0-a2c5-17ffdd5a550a> | CC-MAIN-2020-40 | https://diverseeducation.com/article/60734/?utm_campaign=Diverse%20Newsletter%203&utm_medium=email&utm_source=Eloqua&elq=3d2fcf6985c140cf80579fa54b0febd9&elqCampaignId=218 | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400221382.33/warc/CC-MAIN-20200924230319-20200925020319-00086.warc.gz | en | 0.971575 | 1,730 | 3.265625 | 3 |
When Sir Richard Burton teas preparing his famous translation of The Arabian Nights' he inserted a short but devastating footnote that undercut rival orientalist William Lane and at the same time conferred a new measure of fame on a talented artist named William Harvey. The success of Mr. Lane's 1861 version of The Arabian Nights', wrote Sir Richard, "teas greatly indebted to the many wonderful engravings on wood from original designs by William Harvey; with a host of quaint and curious arabesques, Cufic inscriptions, vignettes, head pieces. These were excellent and showed for the first time the realistic East and not the absurdities drawn from the depths of artistic ignorance and self consciousness."
Whatever the merits of his attack on the hapless Mr. Lane, Sir Richard's praise of Harvey's work was certainly justified. As the accompanying samples suggest, Harvey was a master of one of the perenially popular but extremely difficult art forms of all time: woodcutting.
Woodcutting is a very ancient art. It goes back at least as far as the Egyptians who cut hieroglyphic characters on bricks and clay by pressing the blocks into the clay. The Chinese used woodcuts to pint textile patterns and centuries later the Romans used them to print numerals and symbols. In the 15th century Western Europe also took up the art as a way of printing patterns on textiles.
In the early stages, artisans drew their lines with the grain on the surface of soft wood and then cut away the excess wood so that the lines would print black. Since this type of block could be inked and used on a press it was the perfect method for illustrating books when movable type was introduced and opened the way for the mass printing of books. It became popular and such men as Albert Dürer in the early 16th century raised it to a high art form— although by then the artist and the craftsman who actually carved the blocks were rarely the same person.
During the 16th and 17th centuries, however, metal engraving developed into an even more suitable, if more expensive method, and the popularity of woodcuts declined sharply. By the 18th century it was almost an obsolescent art form. But by experimenting with hard end-grained wood and sharper tools, craftsmen developed a new technique that teas the reverse of the older method. It was called the "white line method." Instead of cutting away the wood so that the lines printed black, they cut V-shaped trenches into the wood. These V-shaped trenches printed white—like a chalk line on a blackboard. The technique is known now as wood engraving and although it could not match the fine crisp lines of copper plates immediately, constant improvement in execution plus the cost of copper engraving—copper plates had to be printed separately—enabled the art to survive. With the advent of Thomas Bewick wood engraving even began to surpass the metal engravings. Thomas Bewick, (1753 to 1828) was a talented Scots artist who is called the father of modern wood engraving. Not only did he turn out such masterpieces as the illustrations he designed and cut for British Birds and The Fables of Aesop,—unmatched to this day—but he also taught his art to a long list of notable pupils. One of them was William Harvey.
A skilled engraver himself as well as an excellent artist, William Harvey was "a master of florid and luxurious decoration"—a skill that fitted him uniquely for the task of providing illustrations for The Arabian Nights' when Mr. Lane turned in his translation to his publishers. Working under the critical eye of Lane him self, Harvey drew each design with painstaking attention to detail and then turned it over to the engravers to cut into the blocks. There were so many illustrations—he illustrated three volumes—that he employed no less than 25 different wood engravers. It was to be his finest work and provides to this day some of the best examples of woodcuts ever to appear between the covers of a book.
John Brinton specializes in material on the Middle East found in his personal collection of old books about the region. | <urn:uuid:68fbb2b6-8b90-4c0f-9211-6323dd892b55> | CC-MAIN-2022-21 | https://archive.aramcoworld.com/issue/196801/the.white.lines.and.the.black.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662593428.63/warc/CC-MAIN-20220525182604-20220525212604-00526.warc.gz | en | 0.974425 | 856 | 3.34375 | 3 |
Making the decision between a lumpectomy and a mastectomy can be difficult. It’s a decision that is often left up to the patient, rather than the doctor. Understanding the advantages and disadvantages of each choice can help you make a more informed decision about the treatment option you choose.
A lumpectomy, also called “breast conserving surgery,” is the removal of the cancerous lump in the breast, as well as a margin of tissue surrounding the cancer. A lumpectomy usually also requires radiation therapy, even if the cancer is limited to the breast tissue. A mastectomy, on the other hand, is the removal of one or both breasts, sometimes including the lymph nodes under the corresponding armpit. These two procedures have an almost identical success rate in terms of survival, but a lumpectomy has a slightly higher chance of the breast cancer recurring.
Advantages of a Lumpectomy
The main advantage of a lumpectomy is that the breast is conserved as much as possible. It is also a more minor surgery than a mastectomy, with a shorter and easier recovery time and fewer potential side effects. You can usually go home later in the day after a lumpectomy, rather than staying overnight in the hospital, as with a mastectomy.
Disadvantages of a Lumpectomy
Although the idea of keeping your beasts virtually intact can make the prospect of a lumpectomy more inviting than that of a mastectomy, a lumpectomy does have several potential disadvantages. First of all, a lumpectomy is usually followed by five to seven weeks of radiation therapy, to ensure that the cancer has been completely removed. The radiation therapy can affect the timing of any reconstruction, as well as your reconstruction options, depending on the extent of the radiation therapy needed.
In addition, a lumpectomy does have a higher chance of a local recurrence of breast cancer than a mastectomy. If the same breast experiences a recurrence of breast cancer, additional radiation therapy is no longer an option, which means that you would have to undergo a mastectomy anyway.
Factors to Consider In order to decide which procedure is best for your specific case, it is important to ask yourself some important questions. For example, how important is it to you to keep your original breast? Breast reconstruction is an option for those who opt for a mastectomy, but the breasts will not experience sensation and may require multiple additional surgeries in order to ensure that they are aesthetically pleasing. Also, you’ll have to consider the size of the cancer that would be removed by a lumpectomy. If the lump is very large, a lumpectomy may leave you with a distorted breast that can be very difficult to repair to your approval. In addition, your level of anxiety about recurring breast cancer should be taken into account, since a mastectomy radically lowers your risk of recurring cancer.
Keywords: mastectomy, breast cancer, lumpectomy, radiation therapy | <urn:uuid:1bbaab28-69e3-4d94-9f8b-606be2c0ade1> | CC-MAIN-2022-33 | https://breastdoctorshouston.com/blog/lumpectomy-vs-mastectomy/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00665.warc.gz | en | 0.965951 | 609 | 2.65625 | 3 |
When it comes to 3D, most people are familiar with the type that requires you to wear a pair of glasses and things are tinted in reds and blues. This type of 3D is called Anaglyph. An alternate means of viewing 3D are stereographs, where two slightly different photographs were printed on a card side by side. You were meant to look at the two images and cross your eyes, and supposedly you could see the image in 3D.
An example of a stereographic card
I say “supposedly” because I can’t see these 3D things, so really I am not sure. All these new movies coming out in 3D? Yeah, I’m deprived. I am an amblyope, and am essentially blind in my left eye. I can see small bits of color in large blurs, but not very much. Since you need two good, working eyes to see most types of 3D, I’m out of luck.
Historically, stereographic cards seemed to be pretty popular. The New York Public Library has a collection of quite a few of them, and many were taken of the old Grand Central Depot in the 1800’s. However, in order to simulate the 3D illusion, you can quickly animate the left and right sides of a stereograph together. So I figured I’d try it out with a bunch of the old railroad stereographs I had found. And on some it works pretty well. The technique seems to work best when there is something somewhat close in the foreground of the photo, which you can focus on. That is why the indoor images look better than the exterior images, where everything is rather far away and there isn’t a lot of depth. If you focus on the part of the image that doesn’t move much, you should be able to see it better. If it doesn’t work for you… well, I guess you get to see some jumpy old photos of a long-demolished train station of New York City. Click on each image to see the effect.
Quick Info: Grand Central Depot was built in 1871. It was replaced in 1913 by Grand Central Terminal, which is what we’re familiar with today.
Animated Stereoview Page in the Historical Archives | <urn:uuid:bac462e3-cdf6-4c14-9e5b-bf5a6193a39d> | CC-MAIN-2022-05 | https://www.iridetheharlemline.com/2010/04/16/friday%E2%80%99s-from-the-historical-archive-1800s-animated-stereoviews-of-old-grand-central-depot/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302715.38/warc/CC-MAIN-20220121010736-20220121040736-00601.warc.gz | en | 0.972416 | 483 | 2.796875 | 3 |
A class of compounds that can prevent degeneration of neurons, the underlying cause of conditions like Alzheimer's disease, Parkinson's disease, and amyotrophic lateral sclerosis (ALS), has been identified by US researchers.
Researchers at the University of Texas at Dallas and Southern Methodist University insist that their study attains significance because current medications for such neurodegenerative diseases alleviate only their symptoms but not the underlying cause.
AdvertisementThe researchers describe the compounds they have identified as 3-substituted indolones.
They have also conducted a structure-activity relationship study to identify substituent groups that are important for neuroprotective efficacy.
A previous study by the same group showed that one of these 3-substituted indolones, called GW5074, prevents neurodegeneration and improves behavioural outcome in a mouse model of neurodegeneration.
Dr. Santosh D'Mello, the study's senior author, said: "More recent but unpublished work by our group and Doris Kretzschmar, a collaborator at the Oregon Health and Science University, found that GW5074 and other related 3-substituted indolones are also protective in a fly model of Alzheimer's disease."
The current study has unveiled several compounds that are more efficacious than GW5074, and that do not display any cytotoxicity even when used at high doses.
Thus, say the researchers, these 3-substituted indolones are thus novel and promising candidate therapeutic agents for pre-clinical testing against human neurodegenerative conditions.
Dr. D'Mello said: "Studies into the mechanisms underlying neuronal apoptosis has identified several molecules that can be targeted in developing drugs to treat neurodegenerative diseases. Some of these have been tested in human clinical studies but have not proven to be effective at reducing neurodegeneration in patients. Our study has identified some 3-substituted indolones that might be suitable for development as therapeutic agents.
The structure-activity relationship analysis we have described in our report, although not exhaustive, also provides useful information on which other efficacious 3-substituted indolones can be synthesized and tested in pre-clinical and clinical studies".
Dr. Steven R. Goodman, Editor-in-Chief of Experimental Biology and Medicine, said: "The work by D'Mello and colleagues has provided the basis for testing new versions of 3-substituted indolones for efficacy in the treatment of Alzheimer's disease and other neurodegenerative disorders. These drugs provide promising new therapeutic approaches to deal with the underlying cause of these disorders: neuronal cell death."
You May Also Like | <urn:uuid:0a36ecf3-6075-4eb8-930e-3abbe40cfc99> | CC-MAIN-2016-50 | http://www.medindia.net/news/Scientists-Identify-Novel-Therapeutic-Compounds-That-can-Prevent-Neurodegeneration-43510-1.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541876.62/warc/CC-MAIN-20161202170901-00142-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.925512 | 552 | 2.65625 | 3 |
|Part of a series on|
Strategy researchers want to understand differences in firm performance. For example, what can explain performance differences between Toyota’s cars business and Samsung’s mobile phones business? Studies show that just three effects account for most performance differences between such businesses: the industry to which a business belongs (automotive industry vs electronics industry), the corporation it is part of (Toyota vs. Samsung), and the business itself.
A performance effect is an observed difference in business performance. For example, it compares the performance of Toyota's cars business and that of Samsung's mobile phones business. A performance effect is not a causal effect. For example, it does not indicate what the performance of the mobile phone business would have been if Toyota instead of Samsung was the owner.
Levels of analysis
Performance effects occur at multiple level of analysis.
Industry, corporate, business, and year effects
Industry, corporate, business, and year effects are among the most investigated levels of analyses. An industry is a group of businesses that sell similar goods or services. For example, Toyota's cars business belongs to the automotive industry and Samsung's mobile phones business to the electronics industry. A corporation is the legal owner of the business. For example, Berkshire Hathaway owns many businesses including of clothing, building products, and insurance. Thus, a corporation can own more than one business. A business is then defined by what it does (i.e. industry) and by whom it is owned (i.e. corporation). Year refers to the year of performance.
An industry effect is the performance difference of businesses in an industry and those in other industries. A corporate effect is the performance difference of businesses of a corporation and those of other corporations. A business effect is the performance difference of a business and those of other businesses. A year effect is the performance difference of businesses in one year and those in another year.
Formally, the performance () of a business in industry , corporation , and year can be written as:
Here is the mean performance of all businesses across all years. is the industry effect for industry (the performance difference between industry and the mean); is the corporate effect for corporation (the performance difference between corporation and the mean); is the business effect for a business in industry and corporation (the performance difference between that business and the mean); is the year effect for year (the performance difference between year and the mean); and is an error term (the performance difference between a business and the mean that is not accounted for by industry, corporate, business, and year effects).
A meta-analysis finds that the strongest effects are business, then corporate, then industry, and then year. Figures 1 and 2 show the strength of each effect with effect sizes in variance and in standard deviation, respectively.
Other performance effects include the chief executive officer and geographical region or country.
An effect size is a measure of the magnitude of performance differences.
A common measure is the variance. A finding of 36% for business effects means that the variance in business effects is 36% of the total variance in performance. Conversely, the variance in performance is for about one third related to differences between business with the other two-thirds related to other effects (e.g. different industries, different corporations, different year, and random differences). An upside of the variance measure is that the effects sum to 100%. A downside is that the variance uses squared distances so that large effects are amplified and small effects are shrunk.
Another measure is standard deviation, which is the square root of variance. An upside of this measure is that the standard deviation relates to linear distances so effects are not similarly amplified or shrunk. For example, business effects are greater than year effects by about factor 45 when using variance and by about only factor 8 when using standard deviation. Relatedly, the standard deviation measure has the same unit of measurement as performance. For example, if performance is in dollars, then the standard deviation is also in dollars (the variance would be in dollars squared). A downside is that the effects measured in standard deviations do not sum to 100%.
An alternative measure is the sum of squares measure. It seeks to attribute squared performance difference to the different effects. Because the sum of squares measure does not account for degrees of freedom, it is sensitive to sample dimensions. For example, sampling more businesses in the same number of industries will change the ratio of sum of squares due to industry and sum of squares due to business.
- Rumelt, R. P., Schendel, D. E., & Teece, D. J. (1994). Fundamental Issues in Strategy: A Research Agenda. Harvard Business School Press, Boston.
- Nag, R., Hambrick, D. C., & Chen, M. J. (2007). What is strategic management, really? Inductive derivation of a consensus definition of the field. Strategic Management Journal, 28(9): 935–955. https://doi.org/10.1002/smj.615
- Vanneste, B. S. (2017). How much do industry, corporation, and business matter, really? A meta-analysis. Strategy Science, 2(2): 121–139. https://doi.org/10.1287/stsc.2017.0029
- Rumelt, R. (1991). How much does industry matter? Strategic Management Journal, 12(3): 167–185. https://doi.org/10.1002/smj.4250120302
- Brush, T. H. & Bromiley, P. (1997). What does a small corporate effect mean? A variance components simulation of corporate and business effects. Strategic Management Journal, 18(10): 825–835. https://www.jstor.org/stable/3088203
- McGahan, A. M. & Porter, M. E (1997). "How much does industry matter, really?" Strategic Management Journal, 18(S1): 15–30. https://www.jstor.org/stable/3088208
- Rumelt, R. (1991). "How much does industry matter?" Strategic Management Journal, 12(3): 167–185. https://doi.org/10.1002/smj.4250120302
- Vanneste, B. S. (2017). "How much do industry, corporation, and business matter, really? A meta-analysis." Strategy Science, 2(2): 121–139. https://doi.org/10.1287/stsc.2017.0029 | <urn:uuid:3ffd0021-52cf-4da7-8bf7-0be17b66135b> | CC-MAIN-2023-40 | https://en.wikipedia.org/wiki/Performance_effects | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00159.warc.gz | en | 0.923288 | 1,428 | 3.046875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.