text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
7.09k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
Everyday we are continually being bombarded with information and being called upon to resolve problems and make decisions. From the simplest decision of deciding whether you would prefer a hot or cold drink to the complex and strategic decisions we are often required to make, they all take their toll on our brain power. Problem solving and decision making is a very energy consuming task and especially when some of us are already experiencing brain overload leading to feelings of overwhelm and stress, making it even more challenging to make a good decision. In this interactive webinar we will be discussing: • Why we make so many poor decisions. • Insights into how we typically make decisions. • How having higher levels of self-awareness and knowledge of behavioural preferences can help us to better understand not only the decisions that we make but also the decisions that our colleagues and leaders make. Finally we will leave you with some tools that you can start using immediately to help you become a more conscious and effective decision maker. You should attend this webinar if: • You are constantly baffled by the decisions that other people make. • You would like to become more effective at making a decision. • You would like to have a framework to help you and your colleagues discuss difficult and challenging situations and be able to reach a decision without unhelpful conflict and fallout occurring.
<urn:uuid:22d32975-0e2d-4729-872d-745dbf2c1db6>
CC-MAIN-2023-23
https://jigsawdiscoverytool.com/event/how-to-make-better-decisions-and-problem-solve-with-colours/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649302.35/warc/CC-MAIN-20230603165228-20230603195228-00782.warc.gz
en
0.962659
272
2.515625
3
Fundamentals of Modern Manufacturing: Materials, Processes, and Systems Covers engineering materials, production systems, and manufacturing processes, emphasizing manufacturing science and quantitative analysis of manufacturing processes, with even treatment of materials beyond an emphasis on metals. Chapters on materials identify the principle manufacturing processes for the given material, while processing chapters o. Results 1-3 of 77 A multilayer board consists of logic layers, which carry electrical signals between components on the board, and voltage layers, which are used to distribute power. Logic layers are generally fabricated from double-sided boards, while voltage ... The flexible manufacturing system consists of four or more machines, while a flexible manufacturing cell consists of three or fewer machines . However, this distinction is not universally accepted, and the terminology of this technology is A limit gage often consists of two gages in one piece, the first for checking the lower limit of the tolerance on the part dimension and the other for checking the upper limit. These gages are popularly known as go/no-go gages, because one ... What people are saying - Write a review LibraryThing ReviewUser Review - all4metals - LibraryThing I love this book for manufacturing. Kalpakjian is the standard, but the recent additions have been dumbed down. Groover does an excellent job of cover almost every manufacturing process and some of ... Read full review LibraryThing ReviewUser Review - safina1 - LibraryThing this is a good book Read full review Material Properties Product Attributes and Related 34 other sections not shown
<urn:uuid:3810bd07-2113-4de7-a4db-79790463e73c>
CC-MAIN-2019-51
https://books.google.com.au/books?id=BOxTAAAAMAAJ&q=consists&dq=related:ISBN0395356601&output=html_text&source=gbs_word_cloud_r&cad=5
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540508599.52/warc/CC-MAIN-20191208095535-20191208123535-00130.warc.gz
en
0.908596
333
2.875
3
Hive is a query language developed by facebook. Hadoop can give support to any kind of data · Structured data like database tables · Unstructured data like videos, audios, pdf, txt files etc · Semi structured data like xml Hadoop supports HiveQL. Difference between SQL & HiveQL - In SQL we can insert data values row by row but not in HQL - In SQL we can update any row or column but not in HQL because data is stored in hdfs, after putting data into hdfs you shouldn’t change the contents of data. - In SQL we can use delete but not in HQL. - In HIVE every table is created as a directory. Like other rdbms (Oracle, mysql, sql server), it also has databases Here map, array, struct are called collection datatypes. Creating hive tables: Hive tables can be created two ways : 1. Managed tables or Internal tables 2. External tables Managed tables or Internal tables: hive> create table employee(id int, name string,salary float) >row format delimited >fields terminated by ‘\t’; Ø String can contain any kind of data Ø In SQL if you want to insert data you have to first create schema or table but in HQL you can either create table and insert data or you can insert data and then create table. Ø If you will apply ; after table column in create statement in HQL, it will give you null,null but not actual data but it will not give you any error, so you need to write delimiter & terminated line. Loading data into HIVE tables: Data can be loaded two ways- Either from local file system or from hdfs Loading data from local file system: hive>load data local inpath <filepath> into table <tablename> Loading data from hdfs: hive>load data inpath <filepath> into table <tablename> Ø If it is a local file system the default path is home/user Ø If it is hdfs, it is user/user Here we will hear few words like metadata which means data about the data & metastore which means keeping metadata to store. hive> create external table employeeE(id int, name string,salary float) >row format delimited >fields terminated by ‘\t’ Ø If we are creating internal tables the table name is created as a directory on warehouse. If we are creating external tables the table name will never be created as a directory name but is just trying to refresh some location /vimal/newfolder. Ø For global usage you can refer external table but not internal table. /user / hive / warehouse /vimal / newfolder /
<urn:uuid:420d00fe-320a-4f4b-83d5-e54112de18ae>
CC-MAIN-2017-47
http://startbigdata.blogspot.com/2017/01/learn-big-data-hive.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806609.33/warc/CC-MAIN-20171122141600-20171122161600-00258.warc.gz
en
0.780399
621
2.96875
3
Confederate Monument, Asheboro The W.H. Mullins Company, Supplier Blue Pearle Granite Co. , Supplier A bronze Confederate soldier stands atop a 25'10" pedestal with a 9'6" square granite base. The soldier looks into the distance and step forward with his left foot while resting his weight on his musket. Front: 1861-1865 / Erected 1911 under the auspices of Randolph County Chapter U.D.C. / "Lest We Forget" / Our Confederate Heroes September 2, 1911 35.706110 , -79.813100 "E. E. Moffitt, 1836-1930," Documenting the American South, (accessed February 2, 2012) Link "For Unveiling Day," The Courier (Asheboro, NC), September 7, 1911, 3 Link "Landmark #1," Notes on the History of Randolph County, NC, (accessed Jan 19, 2012) Link "Randolph Confederate Soldiers Monument," Markeroni.com, (accessed January 19, 2012) Link Baity, Crystal. “’Hugo’ Returns Home,” The Courier-Tribune (Asheboro, NC), January 25, 1990, 1A Whately, Mack. “Randolph County Courthouse #7," Randolph County, (accessed February 2, 2012) Link “Confederate Monument,” The Courier (Asheboro, NC), July 20, 1911 Link “Mr. E.L. Moffit’s Speech at Unveiling,” The Courier (Asheboro, NC), Sept. 14, 1911 Link “Randolph Chapter of U.D.C.,” The Courier (Asheboro, NC), September 7, 1911 Link “Randolph County’s Unveiling Day,” The Courier, (Asheboro, NC), September 7, 1911 Link The base is made of Mt. Airy granite. The figure is bronze. The monument was sponsored by the United Daughters of the Confederacy, headed by Elvira Worth Walker Moffitt, who was the daughter of Jonathan Worth, Randolph County’s only Governor of North Carolina. The soldier was nicknamed “Hugo,” after the hurricane that knocked it down in September 1989. In memorial to the Confederate veterans of Randolph County. Located in front of the Randolph County Courthouse facing south. The monument was toppled off of its pedestal by Hurricane Hugo in September of 1989. It was discovered that the internal structure (the internal armature reinforcing rods) had been damaged by rust. The monument was repaired by Adrien Van Der Staak and rededicated January 24, 1990.
<urn:uuid:77183f5e-d7c5-4d11-8215-affce7701646>
CC-MAIN-2013-20
http://docsouth.unc.edu/commland/monument/94/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698063918/warc/CC-MAIN-20130516095423-00031-ip-10-60-113-184.ec2.internal.warc.gz
en
0.928546
587
2.765625
3
Show image list » California has a Constitution... News from the gold fields... Item # 657627 December 08, 1849 DAILY NATIONAL INTELLIGENCER, Washington, D.C., Dec. 8, 1849 Page 3 has: "Late From California" which begins with a very historic report: "The constitution for the State of California has been adopted and published. The reports from the gold region continue to be encouraging. The health of the miners was generally good...The estimate of the number of persons at the mines runs up to 80,000...The Crescent City brings a million dollars' worth of gold dust besides nearly half as much more in the hands of passengers..." and more. Also on page 3: "Free Colored Persons In Virginia" & "The Spirit of Abolitionism". Four pages, very nice condition. Category: Pre-Civil War
<urn:uuid:00b80fde-e7b8-4e37-b478-902176f4bc22>
CC-MAIN-2021-04
https://www.rarenewspapers.com/view/657627?list_url=%2Flist%3Fpage%3D4%2525q%255Bitem_types%255D%255B%255D%3DWebItem%2525q%255Bquery%255D%3Dcat288%2Bcat287%2Bcatw%2525q%255Bsearch_method%255D%3DAny%2BWords%2525q%255Btext%255D%3Dcat288%2Bcat287%2Bcatw
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703522150.18/warc/CC-MAIN-20210121004224-20210121034224-00735.warc.gz
en
0.912823
185
2.921875
3
Welcome to our new glossary, designed for beginners or anyone seeking clarity or the meaning of the many abbreviations used in connection with model flying. If there are others you feel we can add to the database then please use the forum thread link below to make your suggestions and we'll make sure they're included. 35 MHz (35 Meg) - see frequency 2.4GHz / 2.4 Gig - see frequency 3D - a type of extreme aerobatics often involving manoeuvres impossible in full size aeroplanes. Essentially this is flying off the propeller and involves prop-hanging and high angles of attack. AMT - see all-moving tail Aerobatic - manoeuvres that involve stunts of any kind, like loops and rolls. A-Cert - A Certificate. The first stage of the BMFA achievement scheme. A basic test of ability to fly a model solo. The A-certificate can be obtained for powered/non-powered fixed wing and helicopter models. See BMFA website for more info on this and the B and C certificates. AC - alternating current. Adverse yaw - the situation when, on rolling into a bank prior to a turn, the UPgoing WING yaws aft in the opposite direction to the turn. i.e. the plane is rolling and turning one way but yawing the other. Caused by severe increase in drag brought about by the downgoing aileron. Can be counteracted with Frise ailerons or by adding relatively more "up" than "down", or by adding rudder at the same time as roll. See also Differential Aileron. Aerofoil - the cross-section shape of a wing. Aerofoils can be flat-bottomed, semi-symmetrical or symmetrical, depending on the style of aeroplane and what it needs to do. Air speed - the speed of the aeroplane relative to the incident airflow. Everything the plane does is relative to airspeed. See also ground speed. Ailerons - moving section of the trailing edge of the wing, in pairs, (left and right) and work in opposite directions to each other (one up, one down). They roll the model to the left or right. Aliphatic resin - type of wood glue. Chemically similar to PVA but stronger, more waterproof and quicker drying. It also sands better than ordinary PVA/white glue. See PVA for comparison. Altitude - The height of the model in relation to sea level. All-moving tail - as implied, where the whole tailplane (horizontal stabiliser) is movable by servo rather than just the elevator part. AM - Amplitude Modulation Anhedral - where the wings on an aircraft are angled downwards - the opposite of dihedral. AOA /Angle of Attack - the angle at which air hits the wing. AOI /Angle of Incidence - the angle at which the wing or horizontal tail of an aeroplane is installed on the fuselage, measured relative to the axis of the fuselage ARTF - Almost Ready To Fly. Aspect Ratio - the wing's length compared to the chord. A glider wing has a high aspect ratio whereas a low aspect ratio wing has a small span in relation to the wing area. Often calculated simply as the span divided by the chord, most wings taper so a better definition is the ratio of the span squared to the wing area or AR = b2/S where b is the wingspan and S is the area of the wing when viewed from directly above (planform).) Attitude - refers to the angle of the plane in relation to the horizontal. Avalanche - loop with a flick roll at the top. Balsa basher - slang term for someone who builds from plans or traditional kits and hence spends a lot of time cutting and shaping balsa wood. Barrel roll - an aerobatic manoeuvre that involves the plane following the twist of a large imaginary corkscrew (horizontal) through the air. Base - The leg of the circuit immediately before turning onto finals. BEC – Battery Eliminator Circuit – built into most ESCs (see below) this device - in electric models - supplies power to the radio, and eliminates the need for a separate battery. Binding - a process that ensures the 2.4GHz receiver is recognised by the transmitter so the two can operate together. The actual process varies from brand to brand. Bind-N-Fly (BNF) - a trademark name for a range of Horizon Hobby distributed aircraft (namely ParkZone & E-flite) whereby the model is sold in RTF form but lacks the transmitter. Bipe - slang abbreviation for biplane. BMFA – British Model Flying Association, previously known as SMAE - Society of Model Aeronautical Engineers. Brown Out - a momentary loss of operation of a receiver due to a drop in supply voltage below a minimum threshold. Normally a momentary effect only, and affects 2.4Ghz equipment rather than the older 35MHz radio. Brushless motor - Brushless motors are more powerful than older brushed motors, and are now the norm. They can be inrunner or outrunner . See below. Buddy Box - a term used to denote a training aid whee the student's transmitter is attached via cable to the instructor's - 'buddied'. The student has control over the model, but at the flick of a switch the instructor takes control. Bulkhead - the foremost former of your airplane, on to which the engine / motor is mounted. Bungee launch - a method of launching gliders. Normally a long cable some of which is elastic cord. C or C rating - capacity of a battery seen on the label of a LiPo usually preceeded by a number e.g 20C as an indication of the maximum continuous discharge rate of the battery i.e 20 times the battery capacity. Also in battery specification as the maximum charge rate that can be applied to the battery e.g. 1C (up to 5C on some batteries). C/G / Center of Gravity / COG - the plane's point of fore-aft balance. As a very general rule of thumb it's found approximately 1/4 to 1/3 of the way back from the leading edge of the wing. Cabane - the struts on a biplane used to support the upper wing over the fuselage. Canard - horizontal surface in front of and smaller than the main wing. Can be fixed or have a moving element. (From the French for Duck). Captive nut - a nut which is fixed in place on the model, the bolt being removable. The nut can either be glued in place or sometimes is made with a set of spikes which are drawn into the wood by the bolt. Castor oil - the oil found in model engine glow fuels. Historically the oil was castor, characterised by a wonderful aroma when passed through the engine or left to dry inside the car / workshop. In modern times this has been superceded by synthetic oils because castor leaves an horrendous gummy mess over the model and eventually can gum up the engine. Channel - The number of channels that the model has, eg a 1 x channel model may have just motor or rudder control while a 2 x channel model will have motor and rudder and so on. Can Also refer to the frequency in use ie. 35MHz, 2.4GHz. Chord – the width of the wing from leading edge to trailing edge. Chicken stick - a tough rubber sleeve that you put on your finger if starting an engine by hand to give essential protection from the propeller. It can also be a wooden/plastic stick with a rubber coating on one half that you use to flick over the prop, instead of using your finger. Choke - valve in a carburettor which controls the amount of air combining with fuel. Clampmeter - device consisting of a pair of pincer-like jaws and a readout which when clamped around a wire will measure the current flowing through that wire - useful aid to preventing damage through overload and provides reading without breaking any connections. Clevis - U-shaped fastener and pin used for connecting servo push rods to horns on control surfaces. Closed-loop - type of control system in which two tensioned wires are used to connect between the servo and its control surface. Movement is achieved by pulling the surface with one wire whilst the other is relaxed. Clunk - a small nozzle, usually made from brass, attached to the end of the feed pipe in a fuel tank. Collet - see wheel collet Compression bar - (tommy bar) model diesel engines have an adjustable contra-piston inside the cylinder which allows the operator to adjust the volume of the engine. The Compression screw comes out of the top of the cylinder and ends in a "T" bar allowing finger adjustment. Typically the volume is reduced by unwinding the Tommy bar for starting, then increased by screwing in the Tommy bar once running to achieve peak power. Contra piston - model diesel engines have two pistons - the main one fastened to the crank shaft by the connecting rod and the second, contra piston, fastened to and adjusted by the Tommy bar. Control check - The last thing a pilot should do before take off. Stand behind the plane and move all the controls, one at a time, to ensure that ALL the operated surfaces move as designed and in the correct sense. Rudder stick left / right, rudder left / right. Elevator stick up / down, TE of elevator up / down. Aileron stick left , left aileron up , right aileron down. Aileron stick right, left aileron down, right aileron up. Blip the throttle - forward stick faster. Flaps, equal movement. NB just waggling the sticks to see some movement is a useless activity and does NOT comprise a control check. Control surface mixing - when two control surface operations are performed by one pair of surfaces eg when aileron and elevator movement is combined into elevons ( see below). Co-ordinated turn - a turn in which the lift and centrifugal forces on the aircraft are exactly balanced and so there is no inward or outward slip during the turn. Such turns often require the simultaineous use of ailerons and rudder working in co-operation. Such turns often look better and lower the chance of stalling in slow turns. Cotter key - a pin (mostly metal) inserted into a hole in another part to prevent undesired movement of the part. Coupling, as in 'short-coupled' - used to refer to the distance between the wing and the tail section. Cowl - the part of an aircraft that covers the engine. Often a one-piece plastic or fibre-glass moulding. Channel Mixing - the process by which movement in one control channel results in an associated movement in a other channel automatically without further pilot input. For example some co-ordinated rudder movement can be automatically added to any aileron input the pilot makes to aid turns. Crosswind - (1) is the component of the wind vector blowing at 90 degrees to your line of flight, take off or landing. (2) The leg of a circuit pattern at 90 degrees to the runway before turning to downwind. Crystal - the small component that determines which channel number you fly on. Both tx and rx need to have an identically matching crystal for the radio set to function. 2.4GHz spread spectrum sets don't require crystals. Cuban eight - a very nice manoeuvre to fly. A= 3/4s of a loop then half roll and do another 3/4 loop to form a figure eight lying on its side. Could also be described as a horizontal eight with half rolls at the intersection. Cyano - short for cyanoacrylate. A generic term for fast acting adhesives. Sometimes called 'super glue' or 'instant adhesives'. DC - direct current. Dead stick - when your plane's motor cuts out unexpectedly in mid-air. Depron - commercial name for a type of styrofoam made originally in the Netherlands. Depron has advantages over some other types of foam such as EPP (q.v.) in that it is quite rigid and can be easily worked - i.e. cuts cleanly, glues and sands well. Diesel - generic term for compression ignition. A diesel engine is one that runs on any fuel ignited by compression. "Dieseling" is a term for the act of compression ignition, usually (only?) in a spark ingnition engine where it continues to run after the spark has been removed. Diesel fuel - model engine fuel consisting (roughly and usually) of - Castor oil 20 - 25%, Ether30%, Paraffin45 - 50%, IPN(qv) 2 - 3 % The oil lubes and cools the engine, the ether allows ignition and the paraffin provides the energy. IPN modifies the ease with which the fuel ignites and the speed of the flame front (i.e. smoothness of running). Differential aileron - when the ailerons are set up to move upwards more than downwards, to counteract any adverse yaw during a turn caused by extra drag on the outer wing from the down aileron. Dihedral - the upward angle of the wings when viewed from the front. Disorientation - when you lose sight of which way up your plane is and what it's doing, either because it's too far away to see properly or because you've just flown it directly through the sun or over your head and momentarily lost all visual reference. Dolly - a wheeled cradle/set of self-detaching wheels used to help models aloft. Down wind - (1) Flying the model in the direction of the wind. (2) General description of a direction relative to the wind. (3) the part of an aerodrome / airfield circuit , opposite the runway, that takes the plane in a downwind direction. Drag - the force that is created by the movement of the plane through the air, on the air immediately surrounding the plane. High drag means that the model has to work harder to cut through the air. DSM / DSM2 - a type of technology developed by Spektrum for their spread spectrum 2.4GHz R/C systems. Stands for Digital Spectrum Modulation, the '2' just being the newer updated version of the original. Also used by JR 2.4GHz radios. Dual rates - a feature of many R/C systems, whereby the control surface deflection can be increased or reduced while still maintaining full movement of the transmitter sticks. Ducted fan - where an engine is used to drive a small fan at high RPM in a shroud or tube to simulate a jet engine in a model. Most i.c. DF set ups have now been superseded by EDF. Duplex - the proprietory name for Jeti's 2.4GHz R/C system. Dural - Duralumin, Duraluminium - a type of aluminium alloy often used for making sheet metal undercarriages and engine mounting plates. Dynamic soaring / DS - slope soaring off the back of the hill. Models move in a tight cicruit gaining energy with every revolution to reach speeds commonly in excess of 200mph. EP - Electric powered. EDF – Electric Ducted Fan – an electrically driven fan housed in a duct, ie. a short diameter propeller in a tube. Elapor - the name given by Multiplex to the moulded EPO foam used for its models and one that has almost become a generic term for the material. Electric starter – A hand held electric motor with a special end cup that you place over the spinner to turn the motor over until it starts. Elevator - the moving section at the rear of the horizontal stabilizer, or tailplane, that controls the pitch attitude of the airplane. Elevons - when elevator and aileron control is made by the same control surface, this surface is called an elevon(s). usually done with a mixing facility on the rc set, or mechanical mixer fitted to the model (rare these days). EPO - Expanded Polyolefin - a larger cell moulded foam commonly used for in preference to the more brittle EPS. Can be moulded in differing densities and has a waxy, softer feel. Also named Elapor, Z-Foam, Solidpor etc. by different model manufacturers. EPP - Expanded Polypropylene. A foam used in making some foam planes. Strong and very flexible but characterised by a rougher feel to the surface than EPS and EPO. EPS - Expanded Polystyrene - the traditional polystryrene foam. More brittle then EPO and EPS and more liable to dents etc. Note - cyano glue melts this foam. ESC - Electronic Speed Controller - the small unit that delivers power from the motor battery pack to the motor, depending on your input at the transmitter. Expo/Exponential - A system provided on most computer transmitters which allows for a non-linear relationship between stick movement and control surface movement. Often used on 'twitchy' models to de-sensitise the effect of stick movement around the centre or neutral position. FAI - Federation Aeronautique Internationale - world air sports governing body to which the BMFA is affiliated. FASST - Futaba's 2.4GHz system brand name. Stands for Futaba Advanced Spread Spectrum Technology and uses warp-speed frequency hopping to ensure no breakdown of signal. Field/ Flight box - a box that you take to the field. It contains all your flying accessories and tools etc. Normally also holds your fuel container etc. Film / Iron-on films - a generic term/s for an iron-on self adhesive coloured plastic film that can be used to cover models. The film is backed by a heat-sensitive adhesive that adheres to the model when heated by an iron. After application the film can be shrunk by a further application of heat from an iron or heat gun. Fin - also called the vertical stabilizer, it's the vertical surface at the rear of the aeroplane used to stabilize the plane in flight. Final/Finals - the leg of the circuit from which leads the plane to the runway and from which the plane will land. Firewall - the fuselage former to which the engine or motor is attached. Fishtailing - an intended or unintended flying trait where the aircraft tail waggles along the yaw axis slightly. It can be a cause of instability. There are several causes but a cure can be found by enlarging the fin area or thickening the fin trailing edge. Flaps - moving sections of the trailing edge of the wing, usually found between the ailerons and fuselage. Used to create more lift at slower flying speeds and also to slow the plane on landing approach. Flapperons - a single control surface on the trailing edge of each wing that does the job of flaps and ailerons. An R/C system with control mixing capability is needed for flapperons. Flare - the action taken in the last few seconds of the landing approach, to reduce the approach angle and slow the rate of descent. Flick / flicking - the act of hand starting a model diesel engine. So named because of the nature of hitting the prop in a rapidly repeated flicking action. Flight simulator - a home computer based training aid that lets you practice flying radio control from the safety and comfort of your house. Excellent for novice rc pilots, particularly those looking at flying rc helicopters. FM - Frequency Modulation Foamie - a type of model aeroplane - usually small - made entirely from some type of expanded foam - sheet or moulded. Very light and often aerobatic. Very popular for indoor flying. FOD - foreign object damage, a term from the full size aviation world usually relating to items on the runway being ingested into turbine engines. FPV - First Person View. A system of R/C model flying where a camera is fitted to the model along with a device that transmits real time video back to the ground station. The pilot wears a pair of video goggles and flies the model using the on board view received from the camera. Freestyle aerobatics - a style that combines 3D, F3A (precision) and just about anything else that'll impress the judges. Frequency - all radio control gear works on frequencies. UK most popular are 35 Megahertz and 2.4 Gigahertz. Note that only 27MHz, 35MHz and 2.4GHz can be used for model flying in the UK with 40MHz reserved for surface vehicles such as cars and boats. In practice 27MHz is no longer used for model flying and beginners would be advised to opt for the new 2.4GHz. Frequency hopping - A system whereby some 2.4GHz radios hop from 2.4GHz band to band many times per second. Fuel lock - when your glow engine gets flooded and the excess fuel inside the engine prevents you from being able to flick over the prop. It usually happens if you've over-primed the engine. Full chat - slang for 'full throttle'. Fuselage - the main body of a aeroplane, excluding wings, tail etc. Glitch - a slang term which generally means a momentary failure of radio control or sometimes the ESC on an electric model. Glow Fuel - The fuel mix used in i.c. two and four-stroke engines. Glow engine - refers to any engine that uses glow fuel (above). Glow plug - sits in the top of the engine's cylinder head and contains an electrical filament that glows red hot to ignite the fuel/air mixture in the combustion chamber. Glow plug igniter / Glo-stick used to ignite the glow plug at start up. Go around - where the pilot decides to abort the landing, adds power and flies away. Ground speed - Speed of an aeroplane relative to the ground or observer. The pilot of a model can only see ground speed and this needs to be borne in mind when flying down wind on a windy day. Grubscrew - a small headless screw having a slot cut for a screwdriver or a socket for a hexagon key and used to secure a sliding component in a determined position Hack - a slang term for a general sport model. Perhaps a model that the owner will care less about and fly in poorer weather conditions. Hand launch - the way to launch any flying model without an undercarriage. The model should normally be held level at head-height and launched into wind. High alpha - a high angle of attack, a term often used to denote 3D or freestyle manouevers. HLG - hand launch glider Horn - Static connector fixed to servo head or control surface to act as a lever. Horizontal stabilizer - also called the 'stab' or tailplane. The horizontal surface at the back of the fuselage, to which the elevators are attached. I.C. - internal combustion. Usually refers to any engine that uses liquid fuel such as a two-stroke, four-stroke or petrol engines. Idling - a state in which the engine is turning over slowly without providing enough power to move the aircraft. Inrunner - a type of brushless motor where the permanent magnets and motor shaft rotates within the fixed stator, as in a normal brushed motor. Jig - a structure or device built, usually on a bench or board, to ensure the correct alignment or fitting of other parts and assemblies. A fuselage Jig for example, made strong and ridgid, allows the builder to produce very accurate fuselages, or many fuselages that are exactly alike. Junction box - electrical unit where a number of wires can be connected together. Knife-edge - Flying the aeroplane on its side for an extended duration so that the wings are pointing up and down. Kv - The theoretical number of RPM per volt of electricity applied to an electric motor. EG: An unloaded 2000 Kv motor, supplied with 10 volts, will spin at 20,000RPM. Landing gear - also called the undercarriage. Refers to all wheels and associated bits. Landing gear can be fixed or retractable up into the underside of the wing or fuselage (called 'retracts'). L/E or Leading edge - the front edge of the wing, tailplane or rudder. Lift - the force created by the forward motion of the plane's wing or helicopter's rotor blades. Air pressure over the wing is less than the pressure below the wing and so the wing, along with the rest of the model, is pushed upwards. Li-Ion - Lithium Ion/cell Similar to Li-Po but in hard case, often cylindrical. Lower power to weight ratio with slightly lower nominal voltage of 3.6V The battery of choice for most protable devices such as mobile phones etc. More rugged than Lipo, but far less widely available and more costly. Li-Po - Lithium Polymer battery /cell. Ususally soft "pouch" rectangular shaped construction, with excellent power to weight ratio. Nominal voltage 3.7V per cell. Most popular of the lithium flavours, available in a very wide range of sizes at reasonable prices, but needs to be charged and used with some care to avoid potential fire risk. Li-Fe PO4 - Lithium Phosphate/cell. Another lithium based cell the most popular and efficient of which are manufactured in the US by the A123 company and also known as M1 cells. Hard cylindrical casing, can be fast charged in under 15 minutes, and with nano-particle technology, very low internal resistance meaning huge discharge current potential. Also very long overall useable lifespan compared to LiPo - but available in only 2 sizes for us aeromodellers. LMS / LHS - Local Model Shop / Local Hobby Store. Loop - an aerobatic manoeuvre whereby the airplane flies a vertical circle in the air. The easiest stunt of all to pull off, and almost any airplane with an elevator can do them. LVC / PCO = Low Voltage Cut-off / Power Cut-off – The electronic circuit within an ESC ( see above ) that cuts power to the motor should the main battery fall below a certain voltage. Mains - an abbreviation of 'main' retract or undercarriage legs. Methanol - One constituent of glow fuel. Methanol is a flamable alcohol and when mixed (typically but varies 70 - 90 % to 30 - 10% oil) with oil and carburetted into an engine in the correct ratio it burns. (C6:1 fuel to air.) Mid-air - as in mid-air collision, a term used to describe the unfortunate incident of two or more aircraft making physical contact with each other while in flight. Mixing - (see also channel mixing) the ability to combine two different R/C functions into one. See control surface mixing and channel mixing above. M-Link - the proprietary name for Multiplex's 2.4GHz system. Mode 1 - refers to the set-up of the transmitter whereby the left stick operates the elevator and rudder, and the right stick operates the throttle and ailerons. Mode 2 - refers to the set-up of the transmitter whereby the left stick operates the throttle and rudder, and the right stick operates the elevator and ailerons. Mode 3 and 4 also exist but are very rare in the UK. Mode 3 - refers to the set-up of the transmitter whereby the left stick operates the elevator and ailerons, and the right stick operates the throttle and rudder. NiCd - abbreviation for 'nickel cadmium', a type of metal used in rechargeable battery cell production. Also written as 'nicads', they are a form of rechargeable battery cell used in radio control gear as well as motor battery packs. NiCDs are being used less and less these days, as NiMH and Li-Po batteries take over. NiMh - abbreviation for 'nickel metal hydride', the other type of material used in rechargeable batteries. They are the nickel based successors to NiCDs. Nitro - short for nitromethane, An additive to methanol based fuels. Added to increase power output, ease starting in cold weather, and also flattens the response to the needle valve making adjustments less sensitive. Nitro also has the benefit of cooling the burn, thus making life easier for glow plugs (qv). Old timer - refers to vintage models (see vintage) but also a affectionate term for older flyers. Oily hand brigade - an operator of model diesel engines is said to be a member of the oily hand brigade because of the fact that such engines historically spewed large quantities of pleasant smelling oil over his hand as he held the model prior to launch. Oleo - a sprung undercarriage leg often used for larger, heavier models Over shoot - to overrun the landing strip and end up in the long grass or outfield. Outrunner - the other type of brushless motor, where the outer casing, or 'can', of the motor rotates with the shaft and permanent magnets, which are attached to the inside of the can. Outrunners produce more torque than inrunners and are the most common type of brushless motor. PCM - Pulse Code Modulation PPM - Pulse Width Modulation PVA - Polyvinyl Acetate, type of wood glue often used in model construction. Also known as 'white glue'. Park flyer - (1) the general name given to any model that can be flown in a small space such as a park. (2) increasingly a generic term for small and electric models although in mnay cases the model may be too fast for the park. Pattern ship - type of model aeroplane specifically designed for competition or precision aerobatics (F3A). Peg board - a form of frequency control or monitoring used by some clubs. Pilots either put a peg onto the board to claim a channel (peg 'on' system) or they take a peg off a slot (peg 'off' system). Either way only the pilot with the peg, or whose peg is on the slot, may switch on a Tx on that (35Mhz) channel. The advent of 2.4GHz has left this system redundant though some clubs retain a blanket system to allow others to see how many sets are being operated at the site. Piano wire - a type of tough steel wire with a high degree of springyness. Often used to fabricate undercarriage. Pitch attitude - the upward or downward angle of the airplane in relation to the horizontal, when viewed from the side. Pitch is controlled by the elevators. Pitch - (1) the twist of a propellor that gives it efficiency in the air. (2) The axis of an aeroplane in the plane perpendicular to the aircraft centreline. The pitch angle of a moving wing or blade is known as the Angle of Attack. Polyhedral - a particular wing shape where the outward ends of the wing panels are at a different angle to the main panels. Plug-N-Play (PNP) - Ready To Fly models that are missing just the transmitter and receiver, allowing the pilot to use his/her own. Poly-C - Polycyclic (water based) covering solution used as a friendly alternative to Epoxy (with F-glass cloth, tissue etc), also known in the trade as "Ronseal Floorseal XL". Power panel - a small instrument panel usually mounted on the side of a flight box (q.v.) which contains useful facilities such as; a fuel pump, power outlets for an electric starter and glow plug etc. Pusher - A model which fitted with the propellor or other motive force at the rear which then "pushes" the model through the air. Push rod - a tough metal wire (or a wooden rod with metal wire ends) that usually links the servo to a control horn so as to activate a control surface. Pre-flight checks - essential checks that you need to carry out immediately before flight. Priming - the action of introducing fuel in to the engine prior to starting it. Over-priming often causes fuel lock. Prop - abbreviation for propeller. PSS - Power Scale Soaring. Unpowered slope soaring scale model, of either piston + prop or jet powered, full size aircraft. PSSA - Power Scale Soaring Association. Q, Q Feel - Artificial feedback provided into a powered control system in an aeroplane. Historically this was by springs but modern aircraft have servo motors and other specialist devices. Technically the springs on a radio Tx stick provide rudimentary Q Feel but it is likely that as M Link (qv) and FPV (qv) develop then proper feedback will be sent from the aeroplane to the sticks. Radio failure - very occasionally this happens, but the uncontrollable actions of the model are usually down to pilot error, not that they'd usually admit to it. Radio interference - when two (or more) identical, or close, frequencies are being used at the same time the radio signals will mix together, so your model's receiver won't know which ones to respond to. Radio interference is also a good cover-up for pilot error. 2.4GHz rc systems pretty much eliminate radio interference altogether. Radio signals - the invisible messages that pass from transmitter to receiver, telling the model what to do. Range check - an essential pre-flight check to test the operation of your R/C gear. RC or R/C - abbreviation for Radio Control. Often you'll see 'remote control', but 'radio control' is the technically correct term. Rx / Receiver - part of the radio control gear that lives inside the model and picks up the radio signals sent out by the transmitter. Retracts - abbreviation for 'retractable undercarriage', which is an undercarriage that folds up into the airplane's wings or fuselage after take off. ROG – Rise Off Ground –where a model can taxi along the ground, and increase speed and 'rotate' to commence flying. Roll - the rotational movement of an airplane about its longitudinal axis. Also an aerobatic manoeuvre whereby the airplane is rolled about its longitudinal axis through 360 degrees. Rotate - the motion of pulling back on the control wheel to lift the nose during takeoff. RTF - Ready To Fly. RTF models can be assembled in minutes, usually it's a case of just strapping on the wing. Rudder - the moving section on the back half of the fin. Used to control yaw. Scale - any model that has been modelled from a real aircraft, such as a Piper Cub or P-51 Mustang for example. Stand –off / Semi-scale - any model that is loosely based on a real aircraft, with maybe a few details left out or proportions changed. Servo - the part of the radio control gear that converts the radio signal into movement of the control surfaces. Servo reverse - a feature on R/C systems whereby the direction of the servo horn movement can be reversed. Servo-slower - a device which is usually located between the receiver and one or more servos which causes the servos to move to their new command position in a much slower manner than normal. Often used for scale effect on undercarriage retract servos and on flap servos to make re-trimming with flaps deployed easier. Side/Down thrust - a deliberately built in offset to the thrust line of the engine or motor intended to compensate for the torque effects and other forces which could pull the model off track. Sideslipping - a mode of flight in which the model's nose is yawed away from its direction of motion and so the aircraft "crabs" partially sideways through the air. This mode of flight considerably increases drag on the model and thus can lead to a dangerous loss of airspeed. It can occur unintentionally in badly co-ordinated turns, but also may be used intentionally by pilots as a way of loosing altitude without gaining speed when a model is not fitted with flaps. SIM – see flight simulator above. Slope soaring - flying gliders from a hill or higher ground so as to use the wind blowing off the slope as a means to get and stay airborne. Slow Flyer - different name for Park Flyer/ Indoor flyer. SMAE - see BMFA. SMART - useful mnemonic to help pre-flight checks - should be carried out immediately before lining up for take-off. The items are: Snake - type of control rod connecting the sevo to the control surface - e.g. rudder etc. - in which a flexible inner plastic rod slides in an outer sleeve or tube. Spackle - a proprietory name in the USA for a lightweight filler that can be used in foam modelling. Also 'to spackle' means 'to fill'. Polycell No Sanding Polyfilla is the equivalent UK brand. Spars - wooden (normally) beams that run roughly parallel to the leading/trailing edge. Main spars add strength while minor spars add rigidity. Spat - a streamlined covering for a wheel fitted on aircraft to reduce drag. Also called a 'wheel pant' in the USA. Spin - the state of an aircraft that is both stalled and rotating in all three axis. My be erect or inverted. Most spins descend though some aerobatic pilots with the right plane can spin upwards too. Spinner - the cone-shaped piece that covers the center of the propeller. Spiral dive - Similar to a spin but the wing is not stalled and rotation is about an axis removed by some way from the plane. Characterised by high and increasing forward speed and rapoid rate of descent. Recovery should be done gently to avoid over stressing the wing. Spoiler - a movable part of the wing surface which reduces lift and increases drag. Used to make a glider lose height in a controlled way. Sport Flyer - (1) a general term for model aeroplanes that can be used for general flying and capable of general aerobatic manoeuvres but rarely 3D. Sometimes also called a 'hack' model. (2) Also used to denote a non-competitive model flyer, someone who flies just for fun, also called a Sunday flyer. Spread spectrum - the latest technology for radio control systems. Based on the 2.4GHz frequency band, spread spectrum radio systems are virtually interference-proof, and require no frequency control by the users. Stall - when the angle of attack for any wing is exceeded the wing starts producing more drag than lift and the airflow over the wing becomes disturbed and lift decreases. Stall turn - an aerobatic maneouver whereby the aeroplane is put into a vertical climb, power is reduced and full rudder is applied. The model should stop in mid-air and turn through 180 degrees, thus facing the ground, in the direction that the rudder was applied. Straight and level - when the model is flying in a straight line, with no fluctuation in altitude. A well trimmed airplane should fly straight and level with the tx sticks in their central positions. Static margin - For an aircraft to be stable in pitch, its CG must be forward of the Neutral Point NP by a safety factor called the Static Margin, which is a percentage of the MAC (Mean Aerodynamic Chord). Static Margin should be between 5% and 15% for a good stability STOL - short take off landing. Swapmeet - an informal gathering for the barter or sale of new/used articles. Sunday flyer - see sport flyer SX - servo mechanism. Synthetic oil - The modern replacement for Castor oil. Commercially sold as EDL, Klotz and others they all do the same thing - lube and cool the engine but leave no messy residue. The modern modeller need know none of this: just buy fresh fuel from a reputable dealer and you'll be fine. Take-off - the action of accelerating your aeroplane along the ground until flying speed is reached, and the thing gets airborne. Only suitable for models with an undercarriage, otherwise you're limited to hand launching. Tail dragger - an aeroplane that has two main wheels and a small tailwheel. Tailplane - see horizontal stabilizer. Tail wind - when the wind is blowing in the same direction as your plane is flying, taking off or landing. Telemetry - a feature of some 2.4GHz radio systems that allows real-time data from sensors in the model to be sent back to transmitter and reflected on the Tx screen or a separate add-on screen/box. Threshold - the beginning of that portion of the runway usable for landing. Thrust - the force that is generated by the spinning propeller or fan/turbine of the airplane, and pushes/pulls the model through the air. Torque or Torque effect - the result of the torque effect is a tendency of the plane to want to turn upwards and left in response to the propeller wanting to turn (bank) the plane in the opposite direction of the propeller spin. T/E or Trailing edge - the rear edge of the wing, tailplane or rudder. Tractor - A model where the propellor or other motive force is fitted at the front and pulls the model through the air. Trainer - any R/C plane that has been designed for learning to fly with. Usually trainers are high wing, with plenty of dihedral. Transmitter - the main part of the radio control system that you hold in your hands while controlling your model. Trim - can mean either control surface trim (see below) or the covering or decoration of your aircraft Trimming - Adjusting the trim settings to correct unwanted tendancies. The action of getting your model to fly straight and level, with the transmitter sticks in their neutral positions and no input from you. Tricycle undercarriage/ Trike - a fixed undercarriage that consists of two main wheels and a nose wheel, which is sometimes connected to the rudder servo for easier ground handling. Turbine (Gas turbine) - a small jet engine used to power a model. Tx - abbreviation for transmitter. UBEC – a standalone regulator which functions as a BEC (see above). Up wind - (1) Flying the model against the wind. (2) General description of a direction against the wind. U/C or Undercarriage - see landing gear. VPP - Variable Pitch Prop Vertical stabilizer - see fin. Vintage - usually refers to older designs, often pre-war but increasingly up and including the 1970s. Washout - the twisting of the wing with leading edge down and trailing edge up, so the wing tip is in a negative angle in compare with the root of the wing. Wattmeter - device inserted between battery and ESC to provide an indication of the load being produced by the motor and propeller combination - a useful aid to preventing damage through overload. Wheel Collet - A retention device, normally a thick metal ring with threaded hole for grubscrew that'll clamp the ring onto lenth of wire. Often used to secure wheels to piano wire undercarriage but sometimes in other applications too. Windsock - a large material cone-shaped tube, mounted on a tall pole at the flying field, that indicates the direction of the wind and to a lesser degree, strength. Important because airplanes need to be taken off and landed into wind where possible. Wing Bandage - a strip of material , usually glass fibre matting, fitted over the join between two wing halves and thus, on being coated with resin, offering strengthening reinforcement in this area. Wing loading - a calculation that is useful when determining certain flight performance characteristics of a plane, the figure is obtained by dividing the flying weight of the plane by the total wing area. A plane with large wings relative to its weight will have a lower wing loading, which means better lifting capacity but not so great high speed performance, and vice versa. Wing loading values are given in oz/sq.ft (ounces per square foot). Wingspan - the overall length of the wing, from tip to tip. Wingspan is the primary measurement when referring to an plane's size. Wing rib - a normally wooden and aerofoil shaped piece that gives the wing it's cross sectional shape and runs parallel to the cord and held by spars running perpendicular. Wing section - The shape seen if a slice were taken through a wing cutting down vertically from the top. WOT - wide open throttle. Xtal - an abbreviation of crystal (see Crystal) Y-lead - a wire harness designed to allow two servos to be connected to a single channel on the receiver - for example to connect two aileron servos to the aileron channel. Yaw - the rotational movement of an aircraft about its vertical axis, controlled by the rudder. Z-bend - double right angle bend made on the end of a control rod (wire) to attach to hole in servo arm or control horn. Z-bend pliers are a tool used to achieve just such a shape. |Glossary - your forum needs you!| Help needed to compile By Richard Carpenter by Richard Carpenter
<urn:uuid:941bc1cb-f9b5-41ab-bb6f-146af5e63865>
CC-MAIN-2015-06
http://www.modelflying.co.uk/news/article/the-model-flying-glossary/6163/
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115861872.41/warc/CC-MAIN-20150124161101-00004-ip-10-180-212-252.ec2.internal.warc.gz
en
0.922522
9,694
2.59375
3
Yugoslavia Table of Contents Faced with economic stagnation, a Soviet-bloc trade embargo, dwindling popularity, and a dysfunctional Soviet-style economic system, Yugoslav leaders returned to the core of their philosophy, the writings of Marx. Their aim was to reassess their ideology and lay the groundwork for a new economic mechanism called Socialist (or workers') self-management. Enterprises formed prototype workers' councils in 1949, and the Federal Assembly passed laws in 1950 and 1951 to implement the system fully. These laws replaced state ownership of the means of production with social ownership, entrusting management responsibilities to the workers of each enterprise. The laws empowered enterprise workers' councils to set broad production goals and supervise finances, but government-appointed directors retained veto power over council decisions. The government also reformed economic planning and freed some prices to fluctuate according to supply and demand, but foreign trade remained under central control (see Socialist Self-Management , ch. 3). The replacement of a command economy with a self-management system required the Communist Party to loosen its hold on decision making. At its Sixth Congress, in November 1952, the party renamed itself the League of Communists of Yugoslavia ( LCY--see Glossary) to signal a break with its Stalinist past and a revision of its leading role in the country's political life. The Congress declared that the party would separate itself structurally from the state. Instead of directing government and economic activity, the party was to influence democratic decision making through education, propaganda, and the participation of individual communists in political institutions, workers' councils, and other organizations. Free intraparty debate would determine party policy, but once the party had made a final decision, the principle of democratic centralism would bind all members to support it. By rejecting multiparty pluralism, the party retained a monopoly on political organization. Three months after the Congress, the People's Front became the Socialist Alliance of Working People of Yugoslavia (SAWPY), an umbrella organization through which the party would maintain this monopoly. In addition, individual communists continued to occupy key government and enterprise-management posts. In 1953 the Federal Assembly amended virtually the entire 1946 constitution to conform with the new laws on workers' self-management. On the federal level, the amendments created an administrative Federal Executive Council and reorganized the Federal Assembly. The amendments also reduced the already minimal autonomy of the individual republics, while local government retained power in economic and social matters. In March 1953, the government began dissolving collective and state farms. Two-thirds of the peasants abandoned the collectives within nine months, and the socialist share of land ownership sank from 25 percent to 9 percent within three years. In an attempt to mitigate the problem of peasant landlessness, the government reduced the legal limit on individual holdings from 25 to 35 hectares of cultivable land to 10 hectares; this restriction would remain on the books for over three decades and would prevent the development of economically efficient family farms. The government also eliminated the system of compulsory deliveries, fixed taxes in advance, encouraged peasants to join purchasing and marketing cooperatives, and increased investment in the agricultural sector. As a result, Yugoslav agricultural output grew steadily through the 1950s, and its farms had record harvests in 1958 and 1959. Yugoslavia maintained its focus on industrial development through the 1950s, despite the government's new approach to economic planning and enterprise management. The industrial sector boomed after 1953; manufacturing exports more than doubled between 1954 and 1960; and the country showed the world's second highest economic growth rate between 1957 and 1960. Living conditions, health care, education, and cultural life improved in the wake of the economic and political reforms. In the mid-1950s, the government redirected investment toward production of consumer goods, and foreign products became widely available. The regime also relaxed its religious restrictions, allowed for a degree of public criticism, curbed abuse of privileges by party officials, and reduced the powers of the secret police. Travel restrictions eased; Yugoslavs gained greater access to Western literature and ideas; artists abandoned "socialist realism" to experiment with abstraction and other styles; and film makers and writers, including Nobel Prize-winner Ivo Andric, produced first-rate works. But already in 1953 liberalization was an uneven, changeable phenomenon in Yugoslavia. A meeting of party leaders at the north Adriatic island of Brioni that year resolved to strengthen party discipline, amid growing concern that apathy had infected the rank and file since the Sixth Congress. Over the next several years, the party tightened democratic centralism; established basic party organizations in factories, universities, and other institutions; purged its rolls of inactive members; and took other measures to enhance discipline. Milovan Djilas, one of Tito's closest confidants, disagreed with the Brioni decisions. In a number of articles in the foreign press, he criticized the party leadership for stifling democratic intraparty debate. He also exposed elitism in the private lives of leaders and suggested that the League of Communists dissolve itself as a rigid political party. This criticism exceeded Tito's tolerance, and his former comrades dismissed Djilas from his posts and imprisoned him. In 1957 Djilas published The New Class, in which he described the emergence of a new communist ruling elite that enjoyed all the privileges of the old bourgeoisie. The book won him international notoriety and prolonged his jail term. Publication of Conversations with Stalin in 1962 earned him more fame and a second prison term (see Djilas, Praxis, and Intellectual Repression , ch. 4). Data as of December 1990 Yugoslavia Table of Contents
<urn:uuid:8079a684-730b-4eb3-aa33-b60be86fdc77>
CC-MAIN-2015-40
http://www.country-data.com/cgi-bin/query/r-14787.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737942301.73/warc/CC-MAIN-20151001221902-00021-ip-10-137-6-227.ec2.internal.warc.gz
en
0.959973
1,140
3.578125
4
Algal oils are a sustainable solution to solve future resource problems, according to Roger Huerlimann, a PhD student at James Cook University in Townsville. Mr Huerlimann said microalgae, tiny aquatic organisms related to plants, use light and the greenhouse gas carbon dioxide to produce oils similar to vegetable oils from plants. “Two of the major problems in future will be the shortage of food and fuel,” he said. “Microalgae have the potential to solve these two problems and more. Everyone going grocery shopping sees products claiming to be high in omega-3 fatty acids, which are essential in our diet since they cannot be produced by human or other animals, and need to be supplied through our diet. “There is also evidence that some of them even reduce the risk for cardiovascular diseases and inflammatory responses, as well as increasing brain function." Mr Huerlimann said plants could produce omega-3 fatty acids only to a certain degree, but historically, the main source for the most useful omega-3 fatty acids were oily fish, which, he said, have become unsustainable due to overfishing. “However, the original producers of these omega-3 fatty acids are actually microalgae and they excel at this task,” he said. “These omega-3 oil-rich microalgae are at the bottom of the food chain and their oils are accumulated within the food web. Furthermore, the algal oils can be turned into biodiesel for cars and heavy machinery, as well as bio-kerosene for airplanes. This would provide the world with a clean, sustainable source of fuels. “Nature has given microalgae incredibly effective ‘tools’ in the form of enzymes to produce a high variety of valuable oils. My genetic work will make it possible to select specific microalgae which are suitable for the production of either biofuels or omega-3 fatty acids, among other possible applications.” The research will help in the search for more productive strains of algae, which produce the oils and fatty acids that are required for each individual application. Mr Huerlimann is part of a larger research team at JCU, led by Associate Professor Kirsten Heimann. The team explores cultivation of microalgae for the capture of carbon dioxide, a known greenhouse gas responsible for global warming. The microalgal biomass produced will then be used for generating value-adding products. This research is in partnership with MBD Energy, DEEDI Queensland and the Federal Government’s Advanced Manufacturing Cooperative Research Centre.
<urn:uuid:0e79d9d3-6b94-4898-808d-d7b0a63c1e89>
CC-MAIN-2015-06
http://medicalxpress.com/news/2012-07-algal-oil-healthy-diets.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122127848.98/warc/CC-MAIN-20150124175527-00155-ip-10-180-212-252.ec2.internal.warc.gz
en
0.942819
535
3.484375
3
A city of royal grandeur, Hyderabad or the City of Pearls’, has come a long way since its first trace that was believed to have been found in 500BCE. After being an economic and administrative hub of several dynasties, Hyderabad, as we know it today, was established during the reign of Qutb Shah. Eventually, the city came under the sovereign of the Mughals who appointed Asif Jah I as the Viceroy, with the title Nizam-ul-Mulk’, and the title was retained by subsequent rulers. It was in 1769 that Hyderabad was officially called the capital of the Nizams. The city continued to be a princely state during the British Raj in India and still carries heavy influences of each of its dynasties. While you experience a pleasant and comfortable stay in the city of Nizams with Fortune Hotels in Hyderabad , check this listicle of the city’s most historical places that make for a compulsive visit: An imposing mosque constructed on the east bank of the Musi River, the Charminar is a square-structured monument that is flanked on every corner by a graceful and intricately designed minaret. According to one among several theories, it is said that Muhammad Quli Qutb Shah prayed earnestly for the eradication of a plague that threatened to destroy his city and the Charminar was thus constructed at the very spot of his prayer. 2. Golconda Fort Perched on a granite hill of 480ft, the Golconda Fort was believed to have been constructed as part of a defense strategy by the Kakatiya Dynasty. Also believed to be home to some of India’s most famous diamonds like the Kohinoor, the Hope Diamond and Noor-ul-Ain among others, the Fort was used extensively and expanded by 3 sultans to make it finally emerge as a city-like Fort with a massive circumference of 5 kms! Hyderabad Map Photo Gallery
<urn:uuid:83fb63a4-6be6-40a3-9140-23f54fdb115d>
CC-MAIN-2022-21
http://tripsmaps.com/hyderabad-map.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517485.8/warc/CC-MAIN-20220517130706-20220517160706-00142.warc.gz
en
0.978218
425
2.84375
3
Our Suggested Guide of Pompeii, Part 3 Amalfi Coasting selected excerpts from “POMPEII: ITS LIFE AND ART”, by German archeologist August Mau, which is considered one of the best books ever written about Pompeii in terms of historical narrative and archeological facts and explanation. This is Part 3 of our excerpts. THE HOUSE OF THE TRAGIC POET/CASA DEL POETA TRAGICO (#22 on the map) In the "Last Days of Pompeii" the house of the Tragic Poet is presented to us as the home of Glaucus. Though not large, it was among the most attractive in the city. It received its present form and decoration not many years before the eruption, apparently after the earthquake of 63, and well illustrates the arrangements of the Pompeian house of the last years. The house received its name at the time of excavation, in consequence of a curious misinterpretation of a painting—now in the Naples Museum—which was found in the tablinum. The subject is the delivery to Admetus of the oracle which declared that he must die unless some one should voluntarily meet death in his place. The excavators thought that the scene represented a poet reciting his verses; and since they found, in the floor of the tablinum, a mosaic picture in which an actor is seen making preparations for the stage, they concluded that the figure with the papyrus in the wall painting must be a tragic poet. The plan does not differ materially from that which we have found in the houses of the pre-Roman time. In the floor of the fauces, immediately behind the double front door, is a dog, attached to a chain, outlined in black and white mosaic, with the inscription, cave canem, 'Beware of the dog!' The picture was for many years in the Naples Museum. The black and white mosaic is well preserved in the atrium, the tablinum, and the dining room opening on the peristyle, as well as in the fauces. The decoration of the large dining room is especially effective. In the front of the room is a broad door opening into the colonnade of the peristyle; each of the three sides contains three panels, in the midst of a light but carefully finished architectural framework. In the central panels are large paintings: a young couple looking at a nest of Cupids; Theseus going on board ship, leaving behind him the beautiful Ariadne; and a composition in which Artemis is the principal figure. In four of the smaller panels are the Seasons, represented as graceful female figures hovering in the air; the others present youthful warriors with helmet, shield, sword, and spear, all well conceived and executed with much delicacy. The atrium, unlike most of those at Pompeii, was rich in wall paintings. Six panels, more than four feet high, presented a series of scenes from the story of the Trojan war, as told in the "Iliad." In arranging the pictures, the decorators had little regard for the order of events. The subjects were the Nuptials of Zeus and Hera (at a on the plan); the judgment of Paris—though this is doubtful, as the picture is now entirely obliterated; the delivery of Briseis to the messenger of Agamemnon; the departure of Chryseis, and seemingly Thetis bringing arms across the sea to Achilles. Half of the painting in which Chryseis appears was already ruined at the time of excavation; the other half was transferred to the Naples Museum, together with the paintings that were best preserved, the Nuptials of Zeus and Hera, and the sending away of Briseis. The two pictures last mentioned are among the best known of the Pompeian paintings, and have often been reproduced. In one we see Zeus sitting at the right, while Hypnos presents to him Hera, whose left wrist he gently grasps in his right hand as if to draw her to him. Hera seems half reluctant, and her face, which the artist, in order to enhance the effect, has directed toward the beholder rather than toward Zeus, is queenly in its majesty and power. A higher degree of dramatic interest is manifested in the other painting. In the foreground at the right, Patroclus leads forward the weeping Briseis. In the middle Achilles, seated, looks toward Patroclus with an expression of anger, and with an impatient gesture of the right hand directs him to deliver up the beautiful captive to the messenger of Agamemnon, who stands at the left waiting to receive her. Behind Achilles is Phoenix, his faithful companion, who tries to soften his anger with comforting words. Further back the helmeted heads of warriors are seen, and at the rear the tent of Achilles. Another painting worthy of more than passing mention was found on a wall of the peristyle, and removed to the Naples Museum. The subject is the sacrifice of Iphigenia, who was to be offered up to Artemis that a favorable departure from Aulis might be granted to the Greek fleet assembled for the expedition against Troy. At the right stands Calchas, his sheath in his left hand, his unsheathed sword in his right, his finger upon his lips. The hapless maid with arms outstretched in supplication is held by two men, one of whom is perhaps Ulysses. At the left is Agamemnon, with face averted and veiled head, overcome with grief. Beside him leans his scepter, and on a pillar near by we see an archaic statue of Artemis with a torch in each hand, a dog on either side. Just as the girl is to be slain, Artemis appears in the sky at the right, and from the clouds opposite a nymph emerges bringing a deer, which the goddess accepts as a substitute. HOUSE OF SALLUST/CASA DI SALLUSTIO (#25) The house of Sallust received its name from an election notice, painted on the outside, in which Gaius Sallustius was recommended for a municipal office. It has no peristyle, and its original plan closely resembled that of the house of the Surgeon. It was built in the second century B.C.; the architecture is that of the Tufa Period, and the well preserved decoration of the atrium, tablinum, alae, and the dining room at the left of the tablinum is of the first style. The pilasters at the entrances of the alae and the tablinum are also unusually well preserved; the house is among the most important for our knowledge of the period to which it belongs. The rooms on the left side were used as a bakery. The rooms at the right were private apartments added later and connected with the rest of the house only by means of the corridor. At the rear was a garden on two sides (24, 24'), with a colonnade. A broad window in the rear of the left ala opened into this colonnade, a part of which was afterwards enclosed, making two small rooms. At the end of the latter room a stairway was built leading to chambers; in the beginning the house had no second floor. In the corner of the garden is an open air triclinium, over which vines could be trained; there was a small altar near by. A jet of water spurted from an opening in the wall upon a small platform of masonry. Only the edges of this portion of the garden, which is higher than the floor of the colonnade, were planted. The large dining room may once have belonged to the bakery; the anteroom leading to it was made from one of the side rooms of the atrium. The proportions of the atrium are monumental. The treatment of the entrances to the tablinum and the alae, with pilasters joined by projecting entablatures, the severe and simple decoration, and the admission of light through the compluvium increased the apparent height of the room and gave it an aspect of dignity and reserve. There was a small fountain in the middle of the little garden, the rear wall of which is covered by a painting representing the fate of Actaeon, torn to pieces by his own hounds as a penalty for having seen Diana at the bath. At first the colonnade had a flat roof, with an open walk above on the three sides; but when the large dining room was constructed, the flat roof and promenade on this side were replaced by a sloping roof over the broad entrance to the dining room. On the outer walls of the two sleeping rooms were two paintings of similar design, Europa with the bull, Phrixus and Helle with the ram. This portion of the house probably dates from the latter part of the Republic; it underwent minor changes in the course of the century during which it was used. The changes made in the stately house of the pre-Roman time are most easily explained on the supposition that near the beginning of the Empire it was turned into a hotel and restaurant. The shop at the left of the entrance opens upon the atrium as well as on the street; the principal counter is on the side of the fauces, and near the inner end is a place for heating a vessel over the fire. Large jars were set in the counter, and there was a stone table in the middle of the room. Here edibles and hot drinks were sold to those inside the house as well as to passers-by. This explanation is confirmed by the close connection of the bakery with the house; and the use of the open-air triclinium is entirely consistent with it. VILLA OF DIOMEDES/VILLA DI DIOMEDE (#29 ) Two classes of villas were distinguished by the Romans,—the country seat, villa pseudo-urbana, and the farmhouse, villa rustica. The former was a city house, adapted to rural conditions; the arrangements of the latter were determined by the requirements of farm life. The country seats manifested a greater diversity of plan than the city residences. They were relatively larger, containing spacious colonnades and gardens; as the proprietor was unrestricted in regard to space, not being confined to the limits of a lot, fuller opportunity was afforded for the display of individual taste in the arrangement of rooms. We can understand from the letters of Pliny the Younger, describing his two villas at Laurentum and Tifernum Tiberinum (now Città di Castello), and from the remains of the villa of Hadrian at Tivoli, how far individuality might assert itself in the planning and building of a country home. The main entrance of a country seat, according to Vitruvius, should lead directly to a peristyle; one or more atriums might be placed further back. The living rooms would be grouped about the central spaces in the way that would best suit the configuration of the ground and meet the wishes of the owner. In most parts of Italy a large farmhouse would contain appliances for making wine and oil. The arrangement of the two types of country house in the vicinity of Pompeii may be briefly illustrated by reference to an example of each, the villa of Diomedes and the farmhouse at Boscoreale. Villa of Diomedes is located beyond the last group of tombs at the left of the road leading from the Herculaneum Gate. An extensive establishment similar in character, the so-called villa of Cicero, lies nearer the Gate on the same side of the road; on the right there is a third villa, of which only a small part has been uncovered. The three seem to have belonged to a series of country seats situated on the ridge that extends back from Pompeii in the direction of Vesuvius. The villa of Diomedes, excavated in 1771-74, received its name from the tomb of Marcus Arrius Diomedes, facing the entrance, on the opposite side of the Street of Tombs. We assume that the villa was built in Roman times, but before the reign of Augustus. In front of the door was a narrow porch. The door opened directly into the peristyle, in the middle of a garden. At the left is a small triangular court containing a swimming tank and a hearth on which a kettle and several pots were found; the Romans partook of warm refreshments after a bath. The wall back of the swimming tank was in part decorated with a garden scene, not unlike those in the frigidariums of the two older public baths. Over the tank was a roof supported by two columns, and on the other two sides of the court there was a low but well proportioned colonnade. The arrangements of the bath were unusually complete, comprising an apodyterium, a tepidarium, and a caldarium. A small oven stands on one end of the hearth in the kitchen, and a stone table is built against the wall on the long side. The room in the corner was used as a reservoir for water, which was brought into it by means of a feed pipe and thence distributed through smaller pipes leading to the bath rooms and other parts of the house. At the left of the peristyle is a passage leading to a garden. The large room at the rear of the peristyle may be loosely called a tablinum; it could be closed at the rear. Back of the tablinum was originally a colonnade, which was later turned into a corridor, with rooms at either end. Beyond the colonnade was a broad terrace extending to the edge of the garden. It commanded a magnificent view of Stabiae, the coast in the direction of Sorrento, and the Bay. Connected with it was an unroofed promenade over the colonnade surrounding the large garden below. A rectangular room, indicated on the plan but not in the restoration) was afterwards built on the terrace. Members of the family could pass into the lower portion of the villa by means of a stairway, the slaves could use a 359 long corridor, which was more directly connected with the domestic apartments. The flat roof of the quadrangular colonnade was carried on the outside by a wall, on the inside by square pillars. The rooms opening into the front of the colonnade were vaulted, and the decoration, in the last style, is well preserved. At the opposite corners of the colonnade were two airy garden rooms. The garden enclosed by the colonnade was planted with trees, charred remains of which were found at the time of excavation. In the middle was a fish pond, in which was a fountain. The door at the rear of the garden led into the fields. Near it were found the skeletons of two men. One of them had a large key, doubtless the key of this door; he wore a gold ring 360 on his finger, and was carrying a considerable sum of money—ten gold and eighty-eight silver coins. He was probably the master of the house who had started out, accompanied by a single slave, in order to find means of escape. At the time of the eruption many members of the family took refuge in the cellar. Here were found the skeletons of eighteen adults and two children: at the time of excavation the impressions of their bodies, and in some instances traces of the clothing, could be seen in the hardened ashes. Among the women was one adorned with two necklaces and two arm bands, besides four gold rings and two of silver. The victims were suffocated by the damp ashes that drifted in through the small windows. According to the report of the excavations, fourteen skeletons of men were found in other parts of the house, together with the skeletons of a dog and a goat. VILLA OF THE MYSTERIES (#30) Covered with ash and other volcanic material, the villa sustained only minor damage in the eruption of Vesuvius in 79 AD, and the majority of its walls, ceilings, and most particularly its frescoes survived largely undamaged. The Villa is named for the paintings in one room of the residence. This space may have been a triclinium, and is decorated with very fine frescoes. Although the actual subject of the frescoes is debated, the most common interpretation of the images is scenes of the initiation of a woman into the cult of Dionysus, a mystery cult that required specific rites and rituals to become a member. Room of the triclinium Paul Veyne believes instead that it depicts a young woman undergoing the rites of marriage. The Villa had rooms for dining and entertaining and more functional spaces. A wine-press was discovered when the Villa was excavated and has been restored in its original location. It was not uncommon for the homes of the very wealthy to include areas for the production of wine, olive oil, or other agricultural products, especially since many elite Romans owned farmland or orchards in the immediate vicinity of their villas. The ownership of the Villa is unknown, as is the case with many private homes in the city of Pompeii. However, a bronze seal found in the villa names L. Istacidius Zosimus, a freedman of the powerful Istacidii family. Scholars have proposed him as the owner of the Villa or overseer of reconstruction after the earthquake of 62. The presence of a statue of Livia, wife of Augustus, has caused some historians to instead declare her to be the owner. CENTRAL BATHS/TERME CENTRALI (#35) Seneca in an entertaining letter gives an account of a visit about 60 A.D. to the villa at Liternum in which the Elder Scipio had lived in the years immediately preceding his death, in 183 B.C. The philosopher was particularly struck with the bath, the simplicity of which he contrasts forcibly with the luxurious appointments of his own time. We cannot follow him through the extended disquisition—he speaks of various refinements of luxury of which we find no traces at Pompeii; but he mentions as the most striking difference the lack of light in the old bath, with its small apertures more like chinks than windows, while in his day the baths were provided with large windows protected by glass, and people 'wanted to be parboiled in full daylight,' besides having the enjoyment meanwhile of a beautiful view. Some such feeling as this we have in turning from the two older baths at Pompeii—one of pre-Roman origin, the other dating from the time of Sulla—to the Central Baths, which were in process of construction at the time of the eruption, and had been designed in accordance with the prevailing mode of life. Entrances from three streets lead to the ample palaestra. On the northeast side is the excavation for a large swimming tank, and for a water channel leading to the closet. In order to have water at hand for building purposes, the masons had built a low wall around an old impluvium on the south side into which a feed pipe ran. For a short distance on the north side the stylobate had been made ready for the building of the colonnade; elsewhere only the preliminary work had been done. The rooms at the southeast corner were no doubt intended for dressing rooms for the palaestra and the plunge bath. Two small rooms open upon the north entrance of the palaestra; one of them, perhaps, was to be a ticket office, for the adjustment of matters relating to admission, the other a cloak room, in which the capsarius would guard the valuables of the bathers. Two doors admit the visitor from the palaestra to the series of bath rooms, one of them opening from the north end of the colonnade. The first room was designed to answer the purpose of a store, with four booths opening into it for the sale of edibles and bathers' conveniences. The apodyterium, tepidarium, and caldarium had each three large windows opening on the palaestra. None of the rooms were finished, though a hollow floor and hollow walls had been built in the tepidarium, caldarium, and laconicum. Five smaller windows on the southeast side of the caldarium looked out on a narrow garden, about which the workmen had commenced to build a wall to cut off the sight of the firemen passing to and fro between the two furnaces. The caldarium was so placed as to receive the greatest possible amount of sunlight, particularly in the afternoon hours, when it would be used; this was in accordance with a recommendation of Vitruvius, who says that the windows of baths ought, whenever possible, to face the southwest, otherwise the south. The contrast is indeed marked between the numerous large windows here, with their attractive outlook, and the small apertures, high in the walls and ceiling, through which light was admitted in the older baths. In the Central Baths there was no frigidarium; but a large basin for cold baths, nearly five feet deep, was placed in the dressing room opposite the windows. Supply pipes were so laid that jets would spring into the basin from three small niches, one in each wall. The tepidarium—here, as usual, relatively small—is connected with the apodyterium by two doors, and similarly with the caldarium. The latter room has a bath basin at each end, thus affording accommodations for twenty-six or twenty-eight bathers at once. The hot air flues leading from the furnaces under the bath basins were already built, and above them openings were left for semi-cylindrical heaters like that in the women's caldarium of the Stabian Baths. The round sweating room, laconicum, was made more ample by means of four semicircular niches, and lighted by three small round windows just above the cornice of the domed ceiling. There was probably another round opening at the apex, designed for a bronze shutter, which could be opened or closed from below by means of a chain, so as to regulate the temperature. Doors led into the laconicum from both the tepidarium and the caldarium. THE HOUSE OF THE VETTII/CASA DEI VETTI (#36) The house of the Vettii was situated in a quiet part of the city, and was not conspicuous by reason of its size. Its interest for us lies chiefly in its paintings and in the adornment of the well preserved peristyle. The relationship between the two owners, Aulus Vettius Restitutus and Aulus Vettius Conviva is not known. They were perhaps freedmen, manumitted by the same master; Conviva, as we learn from a painted inscription, was a member of the Brotherhood of Augustus,—Vetti Conviva, Augustal[is]. Opening on the peristyle are three large apartments, and two smaller rooms. A door at the right leads into a small side peristyle, with a quiet dining room and bedroom. The domestic apartments were near the front of the house. At the right of the principal atrium is a small side atrium without a separate street entrance. Grouped about it were rooms for the slaves and the kitchen with a large hearth. Beyond the kitchen is a room for the cook. At the rear of the small atrium is the niche for the household gods. The columns of the peristyle are well preserved. They are white, with ornate capitals molded in stucco and painted with a variety of colors. Part of the entablature also remains; the architrave is ornamented with an acanthus arabesque in white stucco relief on a yellow background. Nowhere else in Pompeii will the visitor so easily gain an impression of the aspect presented by a peristyle in ancient times. The main part of the house was searched for objects of value after the eruption, but the garden was left undisturbed, and we see in it today the fountain basins, statuettes, and other sculptures placed there by the proprietor. Near the middle of the garden is a round, marble table. Three others stand under the colonnade, one of which, at the right near the inner end, is particularly elegant. The three feet are carved to represent lions' claws; the heads above are well executed, and there are traces of yellow color on the manes. On two pillars in the garden are double busts, the subjects of which are taken from the bacchic cycle. One represents Bacchus and a bacchante, the other Bacchus and Ariadne; there are traces of painting on the hair, beard, and eyes. The wall paintings of this house are the most remarkable discovered at Pompeii. The earlier paintings are found in the atrium, the alae, and the large room at the end of the peristyle. The earlier paintings must have been placed upon the walls before the year 63, in the reign of Claudius or the earlier part of the reign of Nero. The later pictures are on the walls of the fauces, the large apartment at the left of the atrium, the colonnade of the peristyle, the two dining rooms opening on the peristyle, and the small peristyle with the adjoining rooms; to the same class belongs also the painting of the Genius with the Lares in the side atrium, which, aside from this, contains no pictures. The contrast between the earlier and the later decoration is so marked that it seems impossible to explain except on the assumption of a change of owners. We may well believe that about the middle of the first century this was the home of a family of culture and standing, who secured for the decoration of it the best artist that could be obtained, bringing him perhaps from Rome or from a Greek city. But within a score of years afterwards the house passed into the hands of the Vettii, freedmen, perhaps, whose taste in matters of art was far inferior to that of the former occupants, and a number of rooms were redecorated. STABIAN BATHS/TERME STABIANE (#40) In comparison with the great bathing establishments of Rome, the baths at Pompeii are of moderate size. They have, however, a special interest, due in part to their excellent preservation, in part to the certainty with which the purpose of the various rooms can be determined; and their remains enable us to trace the development of the public bath in a single city during a period of almost two hundred years. It is not easy for one living under present conditions to understand how important a place the baths occupied in the life of antiquity, particularly of the Romans under the Empire; they offered, within a single enclosure, opportunities for physical care and comfort and leisurely intercourse with others, not unlike those afforded in the cities of modern Europe by the club, the café, and the promenade. Though the Roman baths differed greatly in size and in details of arrangement, the essential parts were everywhere the same. First there was a court, palaestra, surrounded by a colonnade. This was devoted to gymnastic exercises, and connected with it in most cases was an open-air swimming tank. The dressing room, apodyterium, was usually entered from the court through a passageway or anteroom. A basin for cold baths was sometimes placed in the dressing room; in large establishments a separate apartment was set aside for this purpose, the frigidarium. To avoid too sudden a change of temperature for the bathers, a room moderately heated, tepidarium, was placed between the dressing room and the caldarium, in which hot baths were given. At one end of the caldarium was a bath basin of masonry, alveus; at the other was ordinarily a semicircular niche, schola, in which stood the labrum, a large, shallow, circular vessel resting upon a support of masonry, and supplied with lukewarm water by a pipe leading from a tank back of the furnace. The more extensive establishments, as the Central Baths at Pompeii, contained also a round room, called laconicum from its Spartan origin, for sweating baths in dry air. In describing baths it is more convenient to use the ancient names. In earlier times the rooms were heated by means of braziers, and in one of the Pompeian baths the tepidarium was warmed in this way to the last. A more satisfactory method was devised near the beginning of the first century B.C. by Sergius Orata, a famous epicure, whose surname is said to have been given to him because of his fondness for golden trout (auratae). He was the inventor of the 'hanging baths’, or balneae pensiles. These were built with a hollow space under the floor, the space being secured by making the floor of tiles, two feet square, supported at the corners by small brick pillars; into this space hot air was introduced from the furnace, and as the floor became warm, the temperature of the room above was evenly modified. This improved method of heating was not long restricted to the floors. As early as the Republican period, the hollow space was extended to the walls by means of small quadrangular flues and by the use of nipple tiles, tegulae mammatae, large rectangular tiles with conical projections at each corner. In bathing establishments designed for both men and women, the two caldaria were placed near together. There was a single furnace, hypocausis, where the water for the baths was warmed; from this also hot air was conveyed through broad flues under the floors of both caldaria, thence circulating through the walls. Through similar flues underneath, the warm air, already considerably cooled, was conveyed from the hollow spaces of the caldaria into those of the tepidaria. In order to maintain a draft strong enough to draw the hot air from the furnace under the floors, the air spaces of the walls had vents above, remains of which may still be seen in some baths. In order to warm them at the outset a draft fire was needed,—that is, a small fire under the floor at some point a considerable distance from the furnace and near the vents, through which it would cause the escape of warm air, and so start a hot current from the furnace. The place of the draft fire has been found under two rooms of the Pompeian baths. The most common form of the bath was that taken after exercise in the palaestra,—ball playing was a favorite means of exercise,—use being made of all the rooms. The bather undressed in the apodyterium, or perhaps in the tepidarium, where he was rubbed with unguents; then he took a sweat in the caldarium, following it with a warm bath. Returning to the apodyterium, he gave himself a cold bath either in this room or in the frigidarium; he then passed into the Laconicum, or, if there was no Laconicum, went back into the caldarium for a second sweat; lastly, before going out, he was thoroughly rubbed with unguents, as a safeguard against taking cold. Some bathers omitted the warm bath. They passed through the tepidarium directly into the laconicum or caldarium, where they had a sweat; they then took a cold bath, or had cold water poured over them, and were rubbed with unguents. In the simplest form of the bath the main rooms were not used at all. The bathers heated themselves with exercise in the palaestra, then removed the dirt and oil with scrapers and bathed in the swimming tank. The largest and oldest bathing establishment at Pompeii is that to which the name Stabian Baths has been given, from its location on Stabian Street. It was built in the second century B.C., but was remodelled in the early days of the Roman colony, and afterwards underwent extensive repairs. It is of irregular shape, and occupies a large part of a block. Entering from the south through the broad doorway, we find ourselves in the palaestra, which has a colonnade on three sides. On the east side of the court are the men's baths, rooms; north of these are the women's baths, with the furnace room between them. The anteroom of the men's baths, opens at one end into the dressing room or apodyterium. It has a vaulted ceiling, richly decorated. A door at the left leads into the frigidarium, and another at the right into a servants' waiting room. The apodyterium also was provided with benches of the same sort. Along the walls at the sides, just under the edge of the vaulted ceiling, was a row of small niches, the use of which corresponded with that of the lockers in a modern gymnasium. More effective is the decoration of the small round frigidarium. Light is admitted, as in the Pantheon at Rome, through a round hole in the apex of the domed ceiling. At the edge of the circular bath basin, lined with white marble, was a narrow strip of marble floor, which is extended into the four semicircular niches. Wall and niches alike are painted to represent a beautiful garden, with a blue sky above. The tepidarium and caldarium were heated by means of hollow floors and walls. The former is much the smaller, as we should have expected from its use as an intermediate room, in which the bathers would ordinarily not tarry so long as in the caldarium. The women's baths are entered from the court through a long anteroom; the dressing room is connected also with the two side streets by means of corridors. The apodyterium is the best preserved room of the entire building, and also the most ancient. It shows almost no traces of the catastrophe. The vaulted ceiling is intact. The smooth, white stucco on the walls and the simple cornice at the base of the lunettes date from the time of the first builders. Now, as then, light is admitted only through two small openings in the crown of the vault and a window in the west lunette. The women had no frigidarium. A large basin for cold baths was built at the west end of the dressing room, but this also is a later addition; before it was made, those who wished for cold baths must have contented themselves with portable bath tubs. The tepidarium and caldarium are in a better state of preservation than those of the men's baths, which they closely resemble. FORUM TRIANGULARE & DORIC TEMPLE/ FORO TRIANGOLARE & TEMPIO DORICO (#41 & 42) The end of the old lava stream on which Pompeii lay runs off into two points; in the depression between them, was the Stabian Gate. On the edge of the spur at the left a temple of the Doric style was built in very early times. The sides of the temple followed in general the direction of the edge of the cliff. In the second century B.C. the northwest corner of the depression back of the Stabian Gate was selected as the site for a large theater. This location was chosen, in accordance with the Greek custom. The architect, if not a Greek, was certainly of Greek training. South of the theater an extensive colonnade was erected. It was intended as a shelter for theater-goers, but was afterwards turned into barracks for gladiators. With a similar purpose, a colonnade of the Doric order was built along two sides of the triangular level space about the Greek temple. In front of the north end, where the two arms of the colonnade meet, a high portico of the Ionic order was erected facing the street, thus forming a monumental entrance to the Theater. The southwest side of the area was left unobstructed, and the place, by reason of its shape, is called the Forum Triangulare, 'Three-cornered Forum.' Early in the Roman Period, not long after 80 B.C., a small roofed theater was constructed east of the stage of the Large Theater and of the area at the rear. Stabian Street north and south of the Small Theater was lined with private houses. At the northeast corner of the block was a temple of Zeus Milichius, seemingly of early date, but entirely rebuilt about the time that the Small Theater was erected. Of the ancient Doric temple little remains: only the foundation, which was high for a Greek temple, with a flight of steps in front; two stumps of columns and traces of a third; four capitals, and portions of the right wall of the cella. The temple was of mixed construction, part stone and part wood. In respect to age this temple must have been built in the 6th century B.C. At the time of the eruption the temple was in ruins. LARGE THEATER/TEATRO GRANDE (#43) Performances upon the stage were first given in Rome in the year 364 B.C.; a pestilence was raging, and the Romans thought to appease the gods by a new kind of celebration in their honor. The performers were brought from Etruria, and the exercises were limited to dancing, with an accompaniment on the flute. There was as yet no Latin drama. The first regular play was presented more than a century later, in 240B.C., and the playwright was not a Roman but a Greek from Tarentum, Livius Andronicus, who translated both tragedies and comedies from his native tongue. The first stone theater in Rome was built by Pompey, the rival of Caesar, in 55 B.C. In Pompeii, on the contrary, a permanent theater had been erected at least a hundred years earlier. The Oscan culture was so completely merged in that of Rome that our knowledge of it as an independent development is extremely slight. From literary sources we know only of a crude form of popular comedy in which, as in the Italian Commedia dell' arte, there were stock characters distinguished by their masks,—Maccus a buffoon, Bucco a voracious, talkative lout, Pappus an old man who is always cheated, and Dossennus a knave. The scene of these exhibitions was always Atella, the Gotham of Campania, whence they were called Atellan farces. The Theater at Pompeii, however, is a proof that as early as the second century B.C., in at least one Campanian city, dramatic representations of a high order were given. Here, perhaps, as at Athens, they were associated with the worship of Dionysus; for the satyrs were companions of the Wine-god, and the head of a satyr, carved in tufa, still projects from the keystone of the arch at the outer end of one of the vaulted passages leading to the orchestra. Greek verse, and native verse modelled after the Greek, must have gained a hearing at Pompeii, and the works of Oscan poets—not a line of which has come down to us—must have stirred the hearts of the people long before Livius Andronicus, and Naevius, who brought inspiration from his Campanian home, produced their dramas at Rome. The cavea, the large outer part containing seats for spectators afforded seats for about five thousand persons. The seats are arranged in three semicircular sections. The lowest, ima cavea, next to the orchestra, contains four broad ledges on which, as well as in the orchestra itself, the members of the city council, the decurions, could place their chairs, the 'seats of double width.' The middle section, media cavea, was much deeper, extending from the ima cavea to the vaulted corridor. It contained twenty rows of marble seats arranged like steps, of which only a small portion is preserved. On a part of one of these, individual places, a little less than 16 inches wide, are marked off by vertical lines in front, and numbered. In Rome the fourteen rows nearest the bottom were reserved for the knights. Whether a similar arrangement prevailed in the municipalities and the colonies is not known, but if so the number reserved here must have been smaller. The upper section, summa cavea, supported by the vault over the corridor, was too narrow to have contained more than four rows of seats. The ima cavea was entered from the orchestra. The media cavea could be entered on the lower side from the passage (diazoma, praecinctio) between it and the ima cavea, which at the ends was connected by short flights of steps with the parodoi leading outside; on the upper side six doors opened into the media cavea from the corridor, from which flights of steps descended dividing the seats into five wedge-like blocks, cunei, with a small oblong block in addition on either side near the end of the stage. The summa cavea, which for convenience we may call the gallery, was entered by several doors from a narrow vaulted passage along the outside. The outer wall back of the gallery rose to a considerable height above the last row of seats. On the inside near the top were projecting blocks of basalt, containing round holes in which strong wooden masts were set; from these the great awning, velum, was stretched over the cavea and orchestra to the roof of the stage, protecting the spectators from the sun. This sort of covering for the theater was a Campanian invention, and here, where the cavea opened toward the south, was especially necessary. The stage is long and narrow, measuring 120 by 24 Oscan feet; the floor is a little more than three feet above the level of the orchestra. The rear wall, as in ancient theaters generally, was built to represent the front of a palace, entered by three doors, and adorned with columns and niches for statues. In each of the short sections of wall at the ends of the stage is a broad doorway, extending across almost the entire space. The long narrow room behind the stage, used as a dressing room (postscaenium), was entered by a door at the rear, which was reached by an inclined approach. No trace of the roof of the stage remains, but from the better preserved theaters at Orange, in the south of France, and at Aspendus, in Asia Minor, we infer that it sloped back toward the rear wall. The floor was of wood. The theater in antiquity was by no means reserved for scenic representations alone. It was a convenient place for bringing the people together, and was used for public gatherings of the most varied character. In the theater at Tarentum the memorable assembly met which heaped insults upon the Roman ambassadors and precipitated war with Rome. Our Theater, as is evident from the character of the construction, in its original form belonged to the Tufa Period, but was rebuilt in Roman times. Some particulars in regard to the rebuilding are given in an inscription: M. M. Holconii Rufus et Celer cryptam, tribunalia, theatrum,—'Marcus Holconius Rufus and Marcus Holconius Celer (built) the crypt, the tribunals, and the part designed for spectators,' that is, the vaulted corridor under the gallery, the platforms over the entrances to the orchestra, and the cavea. The two Holconii lived in the time of Augustus. The elder, Rufus, was duumvir for the 4th term in 3-2 B.C. The work on the Theater was probably done about that time; for soon afterwards, before his 5th duumvirate, a statue in his honor was erected in the Theater, as we learn from an inscription. Later, in 13-14 A.D., the younger Holconius also, when he had been chosen quinquennial duumvir, was honored with a statue. The architect employed by the Holconii, a freedman, was not honored with a statue, but his name was transmitted to posterity in an inscription placed in the outer wall near the east entrance to the orchestra: M. Artorius M. l[ibertus] Primus, architectus,—'Marcus Artorius Primus, freedman of Marcus, architect.' The plan of the Theater conforms to the Greek type. In the Roman theater the orchestra was in the form of a semicircle, of which the diameter was represented by the stage. In Greek theaters, on the contrary, the stage according to Vitruvius was laid out on one side of a square inscribed in the circle of the orchestra; the orchestra, as shown by existing remains, in most cases was either a complete circle or was so extended by tangents at the sides that a circle could be inscribed in it. The latter is the case in our Theater, of which the orchestra has essentially the same form as that of the theater of Dionysus at Athens. SMALL THEATER/TEATRO PICCOLO (#45) The names of the builders of the Small Theater are known from an inscription which is found in duplicate in different parts of the building: C. Quinctius C. f. Valg[us], M. Porcius M. f. duovir[i] dec[urionum] decr[eto] theatrum tectum fac[iundum] locar[unt] eidemq[ue] prob[arunt],—'Gaius Quinctius Valgus the son of Gaius and Marcus Porcius the son of Marcus, duumvirs, in accordance with a decree of the city council let the contract for building the covered theater, and approved the work.' Later the same officials, when, after the customary interval, they had been elected quinquennial duumvirs, built the Amphitheater 'at their own expense'. The seating capacity of the building was about fifteen hundred. The lowest section of the cavea, as in the Large Theater, consisted of four low, broad ledges on which the chairs of the decurions could be placed. The pavement of the orchestra consists of small flags of colored marble. An inscription in bronze letters informs us that it was laid by the duumvir Marcus Oculatius Verus pro ludis, that is instead of the games which he would otherwise have been expected to provide. TEMPLE OF ASCHLEPIUS OR ZEUS MILICHIUS/TEMPIO DI ASCLEPIO O DI GIOVE MELICHIO (#46) The small temple near the northeast corner of the block containing the theaters is entered from Stabian Street. The court, like that of the temple of Vespasian, has a colonnade across the front; only the foundation and a Doric capital of lava are preserved. At the end of the colonnade on the right is the room of the sacristan. The large altar stands close to the foot of the steps leading up to the temple. It is built of blocks of tufa, with a frieze of triglyphs and panels like those found on walls in the first style of decoration. The steps extend across the front of the temple, the unusual elevation of which is explained by the inequality of the ground. Of the six columns in the tetrastyle portico no remains have been found, but three capitals of pilasters are preserved, two belonging to those at the corners of the cella, and one, considerably smaller, to a doorpost; they are of tufa, and were once covered with white stucco. The excellent proportions and fine workmanship of the capitals point to the period of the first style of decoration; there was formerly a remnant of that style on the north wall of the cella, copied before 1837. Nevertheless the quasi-reticulate masonry of the cella, closely resembling that of the Small Theater, dates from the early years of the Roman colony. In this period the temple in its present form was built, perhaps with the help of native Pompeian masons. Attached to the rear wall of the cella was an oblong pedestal on which were placed two statues, representing Jupiter and Juno, together with a bust of Minerva, all of terra cotta and of poor workmanship. The suggestion at once presents itself that this was the Capitolium, erected by the Roman colonists soon after they settled in Pompeii. We should probably recognize in the head carved on the smallest of the pilaster capitals a representation of Zeus Milichius, a divinity honored in many parts of Greece, especially by the farmers; Zeus the Gracious, the patron of tillers of the soil. The serious, kindly face, bearded and with long locks, was more than a mere ornament; it was the god himself looking down upon the worshipper who entered his sanctuary. For printing our entire Pompeii Guide (facing pages) you can download the PDF by clicking HERE For offline reading on your smartphone or tablet, you can download the PDF of our entire Pompeii Guide (single page) by clicking HERE If you have an Android OS, you will find it in your Download app. If you have an iPhone or an iPad, open and save it in iBook (free app).
<urn:uuid:db63a8bd-85ef-44da-94fb-17e10e48da4f>
CC-MAIN-2022-27
http://gradozeroblog.it/news/an-insider-guide-of-pompeii-part-3
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104597905.85/warc/CC-MAIN-20220705174927-20220705204927-00445.warc.gz
en
0.976657
10,488
2.90625
3
For the first time, scientists have turned skin cells into cancer-hunting stem cells that destroy brain tumors known as glioblastoma. The discovery could offer, for the first time in more than 30 years, a new and more effective treatment for the deadly disease. The technique builds upon the newest version of the Nobel Prize-winning technology from 2007, which allowed researchers to turn skin cells into embryonic-like stem cells. Researchers hailed the possibilities for use in regenerative medicine and drug screening. Now, researchers have found a new use: killing brain cancer. “Patients desperately need a better standard of care.” “Patients desperately need a better standard of care,” says Shawn Hingtgen, assistant professor in the Eshelman School of Pharmacy at the University of North Carolina at Chapel Hill. The survival rate beyond two years for a patient with a glioblastoma is 30 percent because it is so difficult to treat. Even if a surgeon removes most of the tumor, it’s nearly impossible to get the invasive, cancerous tendrils that spread deeper into the brain and inevitably the remnants grow back. Most patients die within a year and a half of their diagnosis. Researchers believe that developing a new personalized treatment for glioblastoma that starts with a patient’s own skin cells could improve those statistics, with a goal of getting rid of the cancerous tendrils, effectively killing the glioblastoma. For the new study, published in the journal Nature Communications, researchers reprogrammed skin cells known as fibroblasts—which produce collagen and connective tissue—to become induced neural stem cells. Working with mice, the team showed that these neural stem cells have an innate ability to move throughout the brain and home in on and kill any remaining cancer cells. The team also showed that the stem cells could be engineered to produce a tumor-killing protein, adding another blow to the cancer. Depending on the type of tumor, the researchers increased survival time of the mice by 160 to 220 percent. Next steps will focus on human stem cells and testing more effective anti-cancer drugs that can be loaded into the tumor-seeking neural stem cells. “Our work represents the newest evolution of the stem-cell technology that won the Nobel Prize in 2012,” Hingtgen says. “We wanted to find out if these induced neural stem cells would home in on cancer cells and whether they could be used to deliver a therapeutic agent. This is the first time this direct reprogramming technology has been used to treat cancer.” The researchers are also currently improving the staying power of stem cells within the surgical cavity. They discovered that the stem cells needed a physical matrix to support and organize them, so they will hang around long enough to seek out the cancerous tendrils. “Without a structure like that, the stem cells wander off too quickly to do any good,” says Hingtgen, who reported these findings in the journal Biomaterials. For that study, researchers added stem cells to an FDA-approved fibrin sealant commonly used as surgical glue. The physical matrix it creates tripled the retention of stem cells in the surgical cavity, providing further support for the applicability and strength of the technique. Source: UNC-Chapel Hill
<urn:uuid:19564db5-2851-424f-901a-86ba2cf0b322>
CC-MAIN-2016-50
http://www.futurity.org/stem-cells-glioblastomas-1111242-2/
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542657.90/warc/CC-MAIN-20161202170902-00069-ip-10-31-129-80.ec2.internal.warc.gz
en
0.93032
690
3.5
4
PAL’s methodology is a classic research narrative that reveals the tip of a $1.8 trillion iceberg of potential claims from cities across the globe. In brief, PAL’s step-by-step research narrative goes like this: historically GDP has driven emissions, emissions drive temperature increases, increased temperatures drive more extreme weather, which in turn increases insured and uninsured loss and damage. The book, Predicting the Price of Carbon, by PAL’s Director of Research, Richard Clarke, explains and defines these inter-relationships along with a carbon price based on losses arising from a specific 3% GDP global growth scenario. This carbon price we call ‘PAL-One-Year’ or PAL- 1Y, for short, and it is fully explained in Predicting the Price of Carbon Supplement 1 (Hinkley Point C Nuclear Power Station Enhanced Carbon Audit LCA Study). This is a pricing method that depends only on carbon data. Our proprietary catastrophe loss modelling tool, PALgamma, that derives from our original work on what drives disasters and their costs, underpins the PAL-1Y methodology. We use PAL-1Y for carbon auditing, carbon liability assessment, and Value at Risk (VaR) determination. The methodology of PAL’s algorithm-based carbon-pricing system compares well with a recent, major, evidence-based study in the US. PAL’s carbon price is based on the dollar cash cost of the loss and damage attributable to manmade climate change triggered by burning fossil fuels. This is expressed in dollars per tonne of CO2, not simply tonnes of CO2. Our climate attribution algorithm (PALca) tells us roughly one fifth of global insured and uninsured losses are attributable to manmade Climate Change. PALgamma, then tells us the proportion of global Climate Change losses for each location, city, and region. Applying oil companies’ percentage contribution to global emissions from their gas and oil products, roughly one eighth of Climate Change losses are attributable to emissions specifically from the gas and oil products of the five Big Oil companies BP, Chevron, ConocoPhillips, ExxonMobil and Shell, currently being sued by New York City. Our preliminary calculations indicate that New York City could claim from between $1.4billion and $6.2billion, depending crucially when their climate-related losses are deemed to have started, plus an ongoing $65million per year from 2018. If the many other cities we have defined as being at climate risk, and thus having claims potential, all followed the example of New York City, then the five Big Oil above could be facing claims totalling over $1.8trillion – roughly twice their market capitalization. Bruce Menzies, Chairman, Predict Ability Ltd (PAL) © Copyright Predict Ability Ltd 2018. All rights reserved. Image: Charlie Atterbury, Seattle Author: Bruce Menzies Bruce Menzies is Chairman and co-founder of PAL. He founded Global Digital Systems Ltd that won the Queen’s Award For Enterprise 2011. Bruce is co-author of six books on geotechnics and geology, one of which won the British Geotechnical Association Prize 2002. He holds doctorates from the Universities of London and Auckland, and is a Fellow of the Institution of Civil Engineers.
<urn:uuid:0767a6ed-f6a7-491a-a506-2656d5cdb536>
CC-MAIN-2021-17
https://predictability.ltd.uk/wp/2018/06/how-does-pal-scientifically-place-a-dollar-cash-valuation-of-over-6billion-on-new-york-citys-claim-against-the-five-big-oil/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038916163.70/warc/CC-MAIN-20210419173508-20210419203508-00586.warc.gz
en
0.932098
691
2.53125
3
My 4 year daughter demanded to buy her favourite princess doll in a toys shop. When I refused saying I don’t have money she shown me atm machine and asked to get money from it. I tried to explain her that for getting money from that machine we have to deposit money in bank but she shown me queue of people standing in front of ATM and said” if this many people can get money from the machine then why can’t you ? “. I was helpless mother trying to explain my child about banks, atm, for 1 hour on the road but in vein. She insisted by throwing tantrums and finally I have to buy the princess doll for her. My little kid thinks that ATM machine is machine which has money and it gives it to whoever goes to it. And that’s when I started money lessons /education to her. I used some step by step ways to explain money and its importance. Initially I found it difficult, as from where to start and how to teach her. As money comes with so many things savings, banks, loans, hard work, own money, from where it comes and where it goes. There might be number of questions from your little one. But it’s not that difficult as it sounds as children are very smart and they learn very fast. If they get money lessons by using it in day-to-day life they will understand about it. And this money education will be perfect start of their mathematics base lessons automatically. Managing money is very essential and if children learn it from young age the will use it wisely once they grow up. # 1.Educate about money Start from money counting lessons first. Give some coins and then notes for counting .Children will not only learn counting but values of coins and notes from it. And then explain how money is used to buy things and from where money comes? How money can be earned and then spent. Tell them how things can be bought before 10 years with same money and how many things can be bought now with same money. Include money saving, managing and borrowing money lessons in it slowly. With growing age elaborate more topics about money. For older children ask to keep track of their daily spending. Make a note book and note down all their expenses in it to know how money gets spend .By knowing own expenditure child will try to save money. # 2. Money saving habit From young age develop a habit of saving money by giving a piggy bank. Give coins for depositing in piggy bank. And use that saved money for buying things like note books, colours for children. Piggy bank is smaller version of bank .By using piggy banks children will learn to save money. Take them to buy things when they are on discounts /sale. Explain children importance of sales in malls and how shopping only in sales/discounts can help to get more stuff using same amount of money. These practices will make your children financially smarter. # 3. Visit bank along with children Take your child along with you to the bank and perform all transactions in front of him/ her. Explain about banks and how money is saved, borrowed, withdrawn from it. Also valuables like gold can be kept safe in this place.If possible open minors account for children older than 7 years and let them learn deposit and withdrawal of money in it. By doing transactions on own children will learn managing money from young age.Banks are best place to start money lessons for your children. # 4. Involve children in family insurance planning No I ‘m not asking to teach rocket science to your child but it’s just insurance policies and believe me it’ now that hard and weird as it sounds. But it’s quite easy and once children know about it they will remind you to pay your next premium without fail. Explicate your child about insurance policies and how important it is to have these policies for secure future. What is insurance and how to have one. How money helps to live life and insurance is its different form. Children will know about saving money ,insurance and it’s significance by this lesson. # 5.Earn own money Ask children to earn own money. It’s been said people value hard earned own money. For that arrange events like Food stalls ( anand nagari), on the occasions of celebrations ,festivals in your society .Set small food stall for your child and ask to sale them. You can give helping hand by cooking food or making handmade greeting cards, paintings, hand made toys to sale in these stalls. In this way children will learn to earn their own money and importance of hard work. Children will value hard earned money from these events and they will learn to spend it wisely if they are properly educated about using it from young age. # 6.Shopping of grocery, books Ask children to do shopping on their own. You may accompany them to super market, but let them do everything on their own. Hand over list of things to buy and required money. Ask them to select these things from super market/ shop and weigh them,.Also ask to do exact payment for the bill .Show them how to bargain at local vendors shops to get good deals. It will help them to calculate money and do transactions using it. # 7.Money games There are many types of money games available in the market. These money games are interesting ways to start building financial habits for children.Involve children in playing these money games. They will know how to buy and sell things, How to do transactions using money. Let children play traditional games also like business boards and learn business while having fun. These money lessons will be helpful for inculcating future financial habits in children.If you have any ideas to add in the above list , please mention it in comment section.
<urn:uuid:68a0feef-41e7-42a8-bd0f-4fdb99065d0b>
CC-MAIN-2018-26
http://thehellomomy.com/2016/08/26/7-important-money-lessons-for-children/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864148.93/warc/CC-MAIN-20180621114153-20180621134153-00152.warc.gz
en
0.965158
1,200
2.953125
3
By Susan E. Matthews posted May 9th, 2013 at 2:12pm Find Schools of Fish The albatross can smell fish from the air. Researchers have found that an albatross will alter its course toward prey located well out of visual range. The birds can monitor a miles-wide swath of ocean as they fly in a single direction. Steve Allen/Getty Images Smell In Stereo Scientists recently discovered that the Eastern American mole smells in stereo. Because they're blind and have little use for hearing, moles use stereoscopic smell to determine their location and the location of their prey. Justus de Cuveland/Getty Images Locate A Distant Mate Moths don't have noses. Instead, they have antennae covered in scent receptors. While they don't detect every scent well, male silkworm moths can sense a single molecule of female sex hormone from at least a mile away. Paul Beard/Getty Images Detect Specific Proteins Sharks breathe with their gills, so their noses serve only to smell. They are particularly well tuned for hunting. Sharks can sense a prey's amino acids at concentrations as low as one part per billion. Jeff Rotman/Getty Images Target a Single Scent Dogs have a keen ability to discriminate among smells. An Auburn tracking dog can follow a single human trail, laid more than 24 hours before, across a campus crisscrossed by tens of thousands of students.
<urn:uuid:5fe9cdd3-6a74-40ec-b7f1-38aab389df93>
CC-MAIN-2017-30
http://www.popsci.com/science/article/2013-05/five-feats-smell
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424564.72/warc/CC-MAIN-20170723142634-20170723162634-00225.warc.gz
en
0.945722
304
2.890625
3
Diagnosis of breast cancer can only be done by a doctor and that to only after conducting a series of tests. Therefore, if you notice a lump or something out of place in your breast, the best thing to do is make an appointment with a doctor. The doctor will advise you to undergo series of diagnostic tests to determine whether you have breast cancer or not. Diagnosis Of Breast Cancer Clinical Breast Examination A clinical breast examination is basically a physical examination of your breasts. The doctor will check your breast and see whether the lump that you reported feels like a cancerous one or not. Your breasts will be physically scrutinized to determine if there is anything abnormal or suspicious that requires further tests. The area under your armpit and above your collarbones will also be scanned thoroughly. Palpitation of this area will help the doctor figure out if cancer has spread to this area or not. If a lump was found in your breast, the doctor will then advise you to go for a mammogram. A mammogram helps the doctor to determine whether a lump is cancerous or not. Moreover, it helps to determine the presence of cysts, fibroadenomas, calcifications, and hematomas. It just might turn out that the suspicious looking lump or area that your doctor noticed during the physical examination of your breast might be a cyst or calcification. What is Mammogram? A mammogram is basically an X-ray of your breast. During a mammogram, compression is applied to the breasts to create clear images. The images will be taken from different views. Photo Credit: http://www.infobarrel.com/Breast_screening Mediolateral Oblique View In this, the main area of your breasts and the area under your armpit are imaged. Breast glandular tissue and the fatty tissue are imaged in detail. Cranio Caudal View This view covers the glandular tissue, the fatty tissues which surround the glandular tissue, and the edge of the chest muscle. This view also covers the nipple; however, it does not cover the breast tissue in the upper breast and the lymph nodes in the armpit. In this diagnostic mammogram, the view will start from your breast’s center and end on the outside. This view is imaged for diagnostic purpose. The view in this image will start from outside and end in the center of your breast. Certain suspicious areas in your breasts will be subjected to detailed investigation. The doctor will compress the concerned area of your breast to get a detailed image in the mammogram. In order to view the edges of cysts, lumps, calcifications, fibroids and other structures, a magnified view will be taken. For this view both of your breasts will be compressed in order to take an image of the breast tissue located in and around the center of your chest. If the mammograms suggest something suspicious or confirm the presence of cancer, your doctor will advise you to go for an ultrasound. In an ultrasound scan of your breast, high frequency sound waves will be transmitted through the glandular breast tissue to create an image. These sound waves will create echoes as they rebound from your breast tissue. These echoes will be recorded on a computer and an image will be produced. Ultrasound scans are able to create images which provide high contrast. A solid lump will be clearly distinguishable from a non-malignant lump in an ultrasound scan. A doctor might advise MRI scan to get more details of your breast, to make sure that the lump is definitely cancerous, to see whether there are other cancerous areas in the breast and/or to determine the size of the tumor. What is MRI? MRI stands for magnetic resonance imaging. Magnets and radio waves are used in MRI scans to create an image of the concerned body part. MRI Breast Scan Process MRI breast scans are done using a machine that is specifically designed for the purpose. Gadolinium will be injected into your vein before or during the scan. Gadolinium is a liquid that will help to contrast your breast tissue from the tumor. You will be asked to lie face down in a narrow tube. Your breasts will be placed in the two openings in the platform of the MRI machine. You will have to lie very still while the images are being taken. The whole process can last up to an hour. Besides being subjected to diagnostic imaging tests, you might be required to go for pathological tests to determine the presence of cancer. Ductal Lavage Fluid Test This test is especially for women who have nipple discharge. Women who are considered at high risk for developing breast cancer are also recommended by their doctors to undergo this test. In this test, a pathologist will insert a very thin tube into an opened duct in your nipple. Fluid will be drawn from the duct. The fluid will then be tested for cancerous cell. Even if the ultrasound, mammogram and MRI scan have confirmed the presence of cancerous cells, your doctor will still recommend a biopsy test. This is because a biopsy can confirm hundred percent whether you have breast cancer or not. Photo Credit: http://edition.channel5belize.com/archives/59418 In a biopsy, a sample of the suspicious breast tissue will be taken and tested for the presence of cancerous cells. There are four types of biopsies that are commonly used for diagnosis of breast cancer. Core Needle Breast Biopsy You will first be given local anesthesia to numb the concerned area. A needle with a hollow core will then be inserted to remove little bit of tissue from the lump or suspicious tissue area. This sample is then sent for testing. Fine Needle Aspiration Fine needle aspiration is done to determine whether the lump is a cyst (filled with liquid) or a solid mass. If it is a cyst, then the liquid will be drained out. If it is a solid lump, then some tissue sample will be taken and sent to lab for testing. When the lump is too deep inside or cannot be felt with hands, the doctor will recommend stereotactic biopsy. The doctor will use the mammograms in order to reach the lump with the help of a needle. The tissue sample is then sent to a lab. This biopsy is also done under local anesthesia and can leave some scar. Surgical Breast Biopsy This is done in a hospital. In this the surgeon will remove the tissue sample surgically. This type of biopsy often provides the most accurate result. These are some of main diagnostic tests that you will have to undergo in order to determine whether you have breast cancer or not. It is natural to feel anxious during this time. However, this basic knowledge of diagnostic test will help you get through calmly. Photo Credit: https://myhealth.alberta.ca/health/pages/conditions.aspx?hwid=zm6300&
<urn:uuid:6d404ebb-36c1-4c40-ac96-d0bcd0e105bc>
CC-MAIN-2019-18
http://www.ladycarehealth.com/diagnosis-of-breast-cancer-a-must-for-everyone/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578765115.93/warc/CC-MAIN-20190426093516-20190426115516-00338.warc.gz
en
0.930973
1,439
2.640625
3
Pat sent us a picture of a couple of her orchids that are magnificently in bloom. The one orchid has 10 blooms and the other had 15. They are both of the genus Phalaenopsis. These are called moth orchids. They came by this common name in a curious way. It is in reference to the butterfly shape of the flower that the term was first used. It was initiated by Swedish Naturalist, Peter Osbeck, because apparently he could not focus his binoculars. On a visit to Java, in the in the middle part of the 18th century, he thought he was viewing a cluster of moths. When he finally got his binoculars focused he discovered that he was actually viewing blooming orchids. He dubbed them moth orchids. Phalaenopsis are supposed to be the easiest orchid to grow in the home. This is because they tend to enjoy the same living conditions as people. A daytime temperature of 72 degrees F will keep an orchid happy. A drop in temperature at night will induce flowering. They are happy with low light and watering once a week unless it is extremely hot. Research by Ohio State University and the University of Georgia validates the “ice watering” theory advocated by some plant breeders. Orchid buyers will frequently find plants labeled “ice orchids.” This refers to the suggested watering technique of placing 2-4 ice cubes on the growth medium rather than watering. This trickle down method prevents the water from running through the fast draining bark in which the orchids are planted. According to researchers this method results in the same “flower longevity, display life and root and shoot health as those watered with traditional methods.” Phalaenopsis come in just about every imaginable color. The pinks and whites are the most common but they come in shades of lavender, yellow, red, orange and even shades that are called green but are just an off yellow. The hybrids can be spotted, patterned and even have fine stripes. But beware the blue orchid. These are dyed. Also the very green ones are probably dyed as well. These plants will revert to their original color when they rebloom There are a couple of different ways that orchid flowers are dyed. This is usually done with a white orchid commercially although some exotic results can be achieved by using pink or lavender orchids. Food coloring is either injected into the flower stem or placed in the water when the plant is watered. The dilution of the food coloring depends on how dark a flower is desired. The injection technique provides results in about 24 hours. It might take a bit longer using the watering method. Supposedly, this will not harm the plant although it might shortened the lifespan of the blooms. For the longest lasting flowers it should be done while the flower stem is in bud and just about ready to bloom.
<urn:uuid:426d45ab-27cd-4abb-b95d-48f7bd8d35c3>
CC-MAIN-2021-21
http://downtoearthgardenclub.org/2020/04/orchids/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989030.65/warc/CC-MAIN-20210510003422-20210510033422-00329.warc.gz
en
0.973477
602
3.1875
3
VolcanoesBook - 1999 This series gives vivid accounts of natural catastrophes and why they happened. Encompassing school subject areas of geography, science, and geology, these books also offer eye-witness accounts from survivors. All ticktock titles are filled with full-color illustrations in attractive, accessible magazine-style formats. They're great for school-related papers and projects, and also provide fun reading for the entire family. Each book contains between 70 and 110 color illustrations.Here are riveting accounts of the earth's momentous volcanic eruptions, including Vesuvius, which destroyed the ancient Roman city of Pompeii; and the 1980 cataclysm at Mount St. Helen in Washington State. Publisher: Hauppauge, NY : Barron's Educational Series, c1999. Characteristics: 31 p. :,col. ill. ;,25 cm.
<urn:uuid:e907be6f-8e01-48b6-8fb3-af9974bb8ddd>
CC-MAIN-2018-30
https://arrowwood.bibliocommons.com/item/show/394541040
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589222.18/warc/CC-MAIN-20180716060836-20180716080836-00319.warc.gz
en
0.913415
181
2.875
3
Water purification is the process of removing undesirable chemicals, biological contaminants, suspended solids and gases from contaminated water. The goal is to produce water fit for a specific purpose. Most water is disinfected for human consumption (drinking water), but water purification may also be designed for a variety of other purposes, including fulfilling the requirements of medical, pharmacological, chemical and industrial applications. The methods used include physical processes such as filtration, sedimentation, and distillation; biological processes such as slow sand filters or biologically active carbon; chemical processes such as flocculation and chlorination and the use of electromagnetic radiation such as ultraviolet light. Purifying water may reduce the concentration of particulate matter including suspendedparticles, parasites, bacteria, algae, viruses, fungi, as well as reducing the amount of a range of dissolved and particulate material derived from the surfaces that come from runoff due to rain.
<urn:uuid:f69fabb2-2799-4fd5-a9bd-303c318359e1>
CC-MAIN-2018-51
https://wn.com/Water_purifier_store?from=waterpurifierstore.com
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823348.23/warc/CC-MAIN-20181210144632-20181210170132-00400.warc.gz
en
0.950015
184
3.90625
4
The Pastoral Epistles are three letters written by the apostle Paul. The Pastoral Epistles are 1 Timothy, 2 Timothy, and Titus. All three are letters from an old man at the close of his ministry who is concerned for his successors in the pastorate. As such, the letters concern the things that would be crucial for the young pastors to understand—church organization and discipline, including such matters as the appointment of elders and deacons, the opposition of rebellious members or false teachers, and the maintenance of doctrinal purity. Titus was written by Paul to encourage Titus, his brother in the faith, whom he had left in Crete to lead the church Paul had established there on one of his missionary journeys (Titus 1:5). Paul wrote 1 Timothy to Timothy to encourage him in his responsibility for overseeing the work of the Ephesian church and possibly the other churches in the province of Asia (1 Timothy 1:3). His second letter to Timothy was written in approximately AD 67, shortly before the apostle Paul was put to death. Imprisoned in Rome, Paul felt lonely and abandoned and recognized that his earthly life was likely coming to an end soon. The book of 2 Timothy is essentially Paul’s “last words.” Paul looked past his own circumstances to express concern for the churches and specifically for Timothy. Paul wanted to use this last opportunity to encourage Timothy, and all other believers, to persevere in faith (2 Timothy 3:14) and proclaim the gospel of Jesus Christ (2 Timothy 4:2). As instructional letters to younger pastors, Paul’s Pastoral Epistles are invaluable today. These letters are full of the heartfelt warnings and instructions that characterize Paul’s ministry, revealing his pastor’s heart in caring for the churches he founded. Whether he is speaking of church organization (1 Timothy 3:1–13; Titus 1:1–16), addressing the role of women in ministry (1 Timothy 2:12), revealing Christ as the mediator between God and man (1 Timothy 2:5), encouraging believers to persevere in the faith (2 Timothy 2:14) and to remain firm in sound doctrine (2 Timothy 1:1–2, 13–14), verifying the inspiration of Scripture (2 Timothy 3:16), or warning against false and apostate teachers (2 Timothy 3:1–17), the Pastoral Epistles are the “how-to” manual for pastors in all places and for all time.
<urn:uuid:4ce24f75-ff09-40dc-ae67-1ee105f6eefe>
CC-MAIN-2023-14
https://www.gotquestions.org/pastoral-epistles.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00066.warc.gz
en
0.966914
517
2.984375
3
Renewed exposition “From Flint to Gunpowder: Weapons through the Ages” 2021 04 01–2021 12 31 During open hours With visitor ticket The renewed exhibition “From Flint to Gunpowder” invites you on a journey through many small stories about the evolution of weapons through the ages: how they changed, how the technology and materials used to produce them improved, and even how their purpose evolved. Initially, human-made weapons served as tools for hunting food and defending against enemies – usually animals. We still hunt animals today, but at some point in history weapons began to be aimed by humans at other humans, or by one group of individuals against another. This exhibition travels an evolutionary path nearly ten thousand years long, from Stone Age arrows to 16th century gunpowder firearms called arquebuses that restored flint to its original importance in warfare as a key element in weaponry, providing an effective way to ignite gunpowder. The earliest weapons on display in the first section of the exhibition are various types of flint arrowheads, knives, daggers, stone axes and maces. The mastery of non-ferrous metals allowed for the casting of much more effective copper alloy weapons. The first imported spearheads, axes, and swords began reaching Lithuanian territory. After iron began to be obtained from local marsh sediments, a true revolution began in daily life. Local craftsmen began to use iron to forge knives, spearheads, and axes. Over the ensuing centuries, the forms and, of course, the quality of those same weapons improved. The most expensive weapons wielded exclusively by warriors from the highest ranks of society were swords. The first double-edged swords reached Lithuania from Western Europe and were later also forged locally with decorative cross-guards. The various Baltic tribes had different cultural traditions and used different weapons. Semigallians and Samogitians wielded impressive broad-bladed battle knives that served the same function as single-edged swords. Swords were most widely used by the Curonians, whose arsenal was also among the most formidable, although some Semigallians have also been found buried in graves accompanied by as many as six spears. As weaponry improved, the bow and arrow was replaced by a more effective ranged weapon, the crossbow. The first use of ranged weapons on Lithuanian territory occurred in the second half of the 14th century, playing only a minor role in warfare at the time, but paving the way for the use of powder firearms in warfare. The abundance of unearthed flint strikers, lead bullets, and bullet moulds illustrates the proliferation of handheld powder firearms throughout the Grand Duchy of Lithuania in the 16th and 17th centuries. The typical weaponry wielded by noblemen in the latter half of the 16th century and early 17th century in the Grand Duchy of Lithuania is represented by weapons found submerged in Asveja Lake: a rapier, a pistol, and two arquebuses. This exhibition, purposely displayed in the dungeons beneath the artillery bastion, the bulwark of defensive fortifications in 17th century Vilnius, continues the account of the city’s defensive history presented here. This renewed exhibition was created and conceived by Asta Daunoravičienė, Gytis Grižas, and Valdas Steponaitis, with artwork by Eimantas Ludavičius, designs by Jurga Karosaitė and texts by – Eglė Griciuvienė, Gytis Grižas, Valdas Steponaitis, Tadas Šėma, Aušra Šmaižytė, Šarūnė Valotkienė, Saulius Žegunis
<urn:uuid:96122b4c-6c22-46f9-b83a-b581ff0a74c4>
CC-MAIN-2023-14
https://lnm.lt/en/events/renewed-exposition-from-flint-to-gunpowder-weapons-through-the-ages/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948684.19/warc/CC-MAIN-20230327185741-20230327215741-00534.warc.gz
en
0.954799
791
3.5
4
Does this sound familiar? You dial the telephone number, and three rings later, a voice responds: “Hello. You’ve reached company xyz. Billy and me ain’t in right now. We’s on vacation. Leave us a message, and he’ll call back as soon as we can.” If you’re like most folks, you’ll consider using a different company after hearing this recording. If a company can’t get their outgoing message right, how can they be trusted to get anything else right? Much the same way that we reach conclusions about a business from the person who answers the company telephone, we are often measured by our command of English cgrammar. While we’ve all been advised not to judge a book by its cover, we’ve also been taught the significance of first impressions. With the importance of projecting a positive image in mind, let’s take a peek at pronouns. Consider the following example: An elementary school student tells you: “Billy left Billy’s pencil in Billy’s locker.” As this statement illustrates, writing without using pronouns can cause sentences to be awkward and repetitive. The solution to this example is simple: replace the second and third reference to “Billy” with the pronoun “his”. “Billy left his pencil in his locker.” But don’t get too comfortable yet; not all pronoun problems are this easy. In case you have forgotten, a pronoun simply is a word that takes the place of a specific noun. Your goal when writing clearly is to choose grammatically correct pronouns. In order to use pronouns correctly, you must understand the specific case (or purpose) to be satisfied by the pronoun (subjective, objective, or possessive). Me, myself, and I are among the messiest pronoun problems. I recently heard a disc jockey announce to her listeners, “Rick and myself will be participating.” Because the pronoun needed in this sentence will serve as the doer of the action, a subjective case pronoun is needed. Thus the correct pronoun to use is I, not myself. The disc jockey should have said, “Rick and I will be participating.” Occasionally, we also hear people misuse me as in “Rick and me will be participating.” The pronoun “me” should only ever be used as an object. Possessive pronouns can be tricky too, especially prior to gerunds (the ing form of a verb used as a noun). It’s not, “I applauded him singing a cappella;” it’s, “I applauded his singing a cappella.” I am applauding his playing, not applauding him. Interestingly, if the singer was a female, there would be no confusion. The pronoun, “her” satisfies both possessive and objective cases. Now imagine that one of your friends tells you, “Mary runs faster than me.” At first glance, this sentence may appear correct. But do we really need an objective case pronoun in this situation. The answer is: No. If you make this mistake, you’re in good company. This is a popular pronoun problem. A deeper look at the meaning of this example reveals a comparison. The sentence is actually stating that Mary runs faster than I run. Even though the comparative verb is frequently dropped, run in this case, a subjective pronoun is needed as the doer of the action. Thus, your friend would be correct by saying, “Mary runs faster than I.” What would you say if your sister or brother remarked, “A student who wants to get good grades should bring their books to class”? This illustration shows the importance of maintaining consistency in number when using pronouns. If the antecedent is plural, the pronoun must be plural. If the antecedent is singular, the pronoun must be singular. In this example, the antecedent student is singular, but the pronoun their is plural. This is a pronoun-antecedent error. Your sister or brother could fix the sentence as shown in the following example, “A student who wants to get good grades should bring his or her books to class?” While this solution is technically correct, many people find the constructions his or her to be wordy. A better solution is to pluralize the antecedent when possible as in, “Students who want to get good grades should bring their books to class.” Don’t forget when you change a singular subject to a plural one, you must also pluralize the verb. And then there’s they — the infamous pronoun without an antecedent. Can you remember a situation when your boss or teacher was trying to persuade you to think or do something with a statement like, “They say exercise helps your memory,” or “Did you hear what they’re saying about aromatherapy?” Who are they? In casual conversation we may hear expressions like these frequently. However, to maintain credibility, it is important to remember to attribute news and information to a specific source, not an unidentified pronoun. Consider this example, “When a driver approaches a school bus, you should expect to slow down.” Have you ever read a statement like this in a newspaper or magazine? Maintaining consistency in terms of person is also important when using pronouns. When you are writing in the “first person” ( I), avoid switching to the “second person” (you) or “third person” (he, she, they, it, etc.). Also, if you are writing in the “second person,” don’t switch to “first person” or “third person.” In this example “a driver” is third person and “you” is second person. The sentence should read, “When a driver approaches a school bus, he or she should expect to slow down.” Remember also to be clear when using pronouns. Do you know people who depend on follow-up questions to get their point across? For example, in conversations with them, the request, “Would you get me that?” is frequently followed by the response, “Get you what?” To use pronouns effectively, we must avoid ambiguities. In the example: “If you put this apple in your lunchbox, don’t forget it,” what does “it” refer to? your lunchbox or the fact that you put the apple in your lunchbox? The sentence should be rewritten to eliminate the possibility of confusion. “Don’t forget you put your apple in your lunchbox.” Finally, let’s visit the universal “he,” — such a small word to cause such big problems. The practice of using a male pronoun to refer to both males and females is increasingly inappropriate. Originally “man” meant both adult human and adult male. Now, however, the National Council of Teachers of English recommends that because “man” has come to be so closely associated with the adult male, the use of “man” and “he” to represent males and females should be avoided. By the way, for the men out there who don’t see what all the fuss is about, consider living with the universal “she.”Pronoun problems often develop due to the writer forgetting a grammar rule or two and then relying on popular usage for the solution. If you fall into this category, and you’re not sure if you need to dust off your English grammar handbook, why not try this little quiz to measure your propensity for pronoun prowess? Oh, and before your telephone rings again, consider this: what impression do you want to make? Correct the pronoun errors in the following sentences. 1. She draws better than me. 2. Don’t forget to pack the toothbrush in the suitcase. It is in the guestroom. 3. If a student asks a question, you must answer him. 4. They say to drink seven glasses of water per day. 5. Everybody ought to do his or her best. 6. None of the girls brought their hats. 7. When a shopper finds an unexpected bargain, you should take advantage of it. 8. Everybody attending the meeting brought a notebook with them). 9. We applauded their playing. 10. Me and Sue are coming to the party. 1. She draws better than I. 2. Replace “it” with either toothbrush or suitcase. 3. Change to: If students ask questions, you must answer them. You may also choose to leave the antecedent student singular and use the pronouns “him or her.”4. (Attribute to an authoritative source, or say It is important to drink seven glasses of water per day). 5. Correct. Everybody is singular, so we need to use “his or her.” You may elect to make the subject of this sentence plural to avoid the wordy construction “his or her.” 6. None is singular, so we need to use “her.” 7. If you leave “shopper” singular, use “he or she.” Alternatively, pluralizing shopper to shoppers requires the use of the plural pronoun “they.” 8. Everybody is singular, so use “him or her”. If you choose to change everybody to a plural antecedent, change the pronoun to “them.” 9. We are not applauding them; we are applauding their playing. Use the possessive form before a verbal. 10. Rewrite as Sue and I are coming to the party.
<urn:uuid:281788cf-91d0-4f20-997f-be59f612ce88>
CC-MAIN-2021-39
https://robertstevenson.wordpress.com/2008/03/24/the-problem-with-pronouns/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057830.70/warc/CC-MAIN-20210926053229-20210926083229-00292.warc.gz
en
0.949785
2,091
2.546875
3
We’re currently introducing a new design and are making sure everything works. Sites of importance for nature conservation Sites of importance for nature conservation (SINCs) are areas designated for their importance for wildlife. The designation is also referred to as ‘non-statutory wildlife site’ or ‘local site’. In London, there are 3 grades of SINC: - sites of metropolitan importance – important at a London-wide scale, sites which contain the best examples of London’s habitats, have particularly rare species or have particular significance in heavily built-up areas - sites of borough importance – important on a borough perspective, divided into two grades on the basis of their quality - sites of local importance – of particular value to people nearby, such as residents or schools There are 24 SINCs in Hackney including a number of public parks, wetlands and waterways and woodlands.
<urn:uuid:dcd9e393-c568-41f5-9e39-f9872d67ba61>
CC-MAIN-2019-47
https://hackney.gov.uk/sites-of-importance-for-nature-conservation/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669813.71/warc/CC-MAIN-20191118182116-20191118210116-00240.warc.gz
en
0.932744
191
3.046875
3
An hour before the toll of the midnight bell on July 1, 2020 — the 23rd anniversary of Hong Kong’s handover to China from British rule — Hong Kong authorities promulgated a new national security law that had been sent from Beijing. The law gave sweeping new powers to authorities to crack down on acts of “secession, subversion, terrorism, or collusion with foreign or external forces.” Chinese authorities defended the decision as necessary for returning stability to Hong Kong. Outside of mainland China, most commentators lamented the new law as a heavy-handed effort by Beijing to impose its authoritarian impulses on Hong Kong. They warned that by eroding Hong Kong’s unique attributes — its free speech, free assembly, and legal transparency — Chinese authorities were mortgaging Hong Kong’s dynamism in pursuit of greater societal control. China’s opaque policymaking process makes it difficult to determine what precisely prompted Beijing to act on Hong Kong now, and it remains too early to draw final conclusions. What drove Beijing to impose the new national security law on Hong Kong? Why now? What are the potential implications for everyday life and commerce in Hong Kong? What will be the impact on U.S.-China relations? What caused Beijing to impose a national security law on Hong Kong? There is an unresolved debate over whether the seeds of the national security law were sowed on the date of Hong Kong’s retrocession to the mainland in 1997, or whether the outcome was the result of a more recent, dynamic interaction of forces. It has become popular to view Beijing’s imposition of its will on Hong Kong as a morality play with good versus evil undertones. Proponents of this view argue that Beijing always harbored malign intentions to squeeze Hong Kong, thus rendering recent events automatic and unavoidable. According to this argument, Beijing long wanted to dissolve the distinction between Hong Kong and other Chinese cities. The sooner Beijing could do this, the better it could ensure that Hong Kong did not serve as an inspiration for Chinese citizens desiring greater freedom to express their views, practice their religion, access information from around the world, and protest injustices. So, according to the argument, Beijing accepted the terms of the Sino-British Joint Declaration to respect Hong Kong’s separate system for 50 years because it wasn’t in a strong enough position in 1997 to insist otherwise. Now that Beijing is stronger, it is less inhibited from acting on its aspirations. Other experts, such as Brookings scholar Richard Bush, see recent events more so as a tragedy, wherein a dynamic sequence of decisions caused all parties’ calculations to change, leading eventually to Beijing’s imposition of its will on Hong Kong. In this view, Beijing offered in 2013 to move forward with electoral reform, but only in a circumscribed way that fell short of the aspirations of pro-democracy leaders. Beijing’s offer was for “one person, one vote,” while still maintaining control over who could stand for elections. This proposal coincided with a split of anti-establishment factions in Hong Kong. A new generation of pro-democracy activists mobilized mass protests against Beijing’s limited offer, culminating in the Umbrella Movement in 2014. The scale of the Umbrella Movement and the international attention it attracted triggered Beijing’s neuralgias about national security and societal control; this became the lens through which China’s leaders viewed developments in Hong Kong. After the Umbrella Movement tapered off, and in an attempt to forestall its reemergence, Hong Kong authorities crafted a revision to Beijing’s original design for electoral reform that left open a narrow potential pathway for the election of a moderate pan-Democratic chief executive. Such an outcome would have been a long shot. In the end, though, the possibility never was tested. The pro-democracy protesters by that point had become too divided and too embittered by the abuse they had received from local officials during the Umbrella Movement to take a chance on the proposal. Following the failure of Hong Kong authorities’ attempts to broker a deal on electoral reform, Beijing’s policies toward Hong Kong grew harder; the anti-establishment’s resistance grew more entrenched. Mounting societal pressure erupted into protests in 2019 that began peacefully but over time became punctuated by bursts of vandalism and violence — including incidents of local law enforcement using force to subdue protesters, which were captured in viral online videos. Why did Beijing impose the national security law now? Given the black-box nature of decisionmaking in Beijing, it is always hard to determine definitively what factors provided the impetus for Beijing’s policy shift on Hong Kong. Even so, there still are several data points that reasonably can be cobbled together to explain the timing of Beijing’s decision. It is quite possible that a confluence of six factors drove the decision on timing: - The annual National People’s Congress, where legislative decisions are made, likely served as an action-forcing event. After 2019’s tumult in Hong Kong, China’s leadership likely did not want to simply maintain a status quo policy posture. For context, the Basic Law (1990) requires Hong Kong to pass a national security law, which Hong Kong authorities did not deliver; Beijing never dropped the demand. - Beijing likely judged that the spread of COVID-19 would limit the risk of large-scale protests in Hong Kong in response to the new legislation. - A proposal for bold action that takes opponents by surprise fits Xi Jinping’s modus operandi. - Taking strong action on Hong Kong stoked mainland Chinese nationalism at a time of declining economic growth and rising domestic frustrations over public health and safety. - Beijing likely wanted to assert greater control over political developments in Hong Kong ahead of its scheduled September 2020 Legislative Council elections. Traditional establishment figures in Hong Kong no longer command the deference and influence they once enjoyed, and Beijing’s traditional reliance on Hong Kong’s elite to ensure order no longer seemed tenable. - President Trump reportedly told Xi privately he would tone down American criticism regarding Beijing’s approach to Hong Kong to help spur progress on U.S.-China trade negotiations. He also publicly praised Xi for handling the protests responsibly. As such, Beijing likely discounted American warnings below the presidential level to exercise restraint, as well as international objections. The U.S. posture of unswerving hostility toward China — as distinct from Trump’s own somewhat erratic attitudes — lowered the risk that any action on Hong Kong could worsen U.S.-China ties, since they already had become adversarial. To be clear, Beijing’s actions were driven primarily by domestic considerations, not by anything the United States did or did not do. Beijing owns full responsibility for its decision. Even so, by adopting an adversarial national policy paired with an obsequious leader-level posture, the Trump administration lowered the bar for Beijing to act. After Beijing announced its determination to impose a national security law on Hong Kong, President Trump delivered two separate statements from the White House Rose Garden to express opposition and announce punitive response measures. That these statements and actions were taken after Beijing announced its decision lends the appearance of seeking to compensate for prior passivity, rather than of advancing a strategy to reverse or moderate the implementation of the law. What are the potential implications for life and commerce in Hong Kong? Already the law has had a chilling effect. Anti-establishment leaders have erased their electronic profiles and, in some cases, fled. Schools have been instructed to revise their curriculum. Freedom of speech and expression have been curtailed. There have been reports of books being censored from libraries. The four offenses identified in the law — secession, subversion, terrorism, and collusion with foreign or external forces — have been vaguely defined. The person Beijing empowered to decide where the lines around these offenses should be drawn, Director Zheng Yanxiong of the newly established Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region, has a reputation as a hardline enforcer. He earned this reputation through his involvement in violent suppression of protests in Wukan in 2016. Foreign companies operating in Hong Kong have been scrambling to adapt. Media and technology companies have been the fastest to respond. The New York Times recently announced plans to relocate part of its operations to Seoul. Technology firms, similarly, are adapting to the arrival of digital surveillance and censorship from the mainland. Some technology companies have announced a pause in responding to data requests from local authorities. Others have considered migrating data storage outside of Hong Kong. Some technology companies have begun contemplating whether their employees in Hong Kong could be exposed to risk of arrest if the companies refuse to comply with demands from authorities for digital information. In a July 2020 “temperature survey” by the American Chamber of Commerce in Hong Kong on the effects of the national security law, 76% of respondents said they were somewhat or extremely concerned about the new law, due mostly to ambiguity about enforcement. Even so, a sizeable majority of companies (67%) planned to take a “wait and see” approach to how the law will be implemented before pursuing alternate strategies such as departing or diversifying operations away from Hong Kong. Going forward, it remains possible that the law will be narrowly tailored only to address overtly political activities while preserving a degree of normalcy for economic and social life, but it is still too early to tell. What will be the impact on U.S.-China relations? Beijing’s gambit to tighten control of Hong Kong will create a cascade of effects on the U.S.-China relationship. At the most practical level, it already has set in motion a series of American policy adjustments to begin treating Hong Kong the same as any other Chinese city. Beijing has vowed to respond in a reciprocal fashion, thus perpetuating a tit-for-tat cycle that has been evident in other areas of the relationship. Beijing’s tightening control of Hong Kong will sharpen the ideological edge of U.S.-China rivalry. At a broader level, Beijing’s tightening control of Hong Kong will sharpen the ideological edge of U.S.-China rivalry. For Washington, China’s action on Hong Kong will be viewed alongside its intensifying domestic repression, particularly in Xinjiang; its tightening control over domestic dissent; its heavy pressure on Taiwan; and its expanding efforts to discredit liberal democracy as an underperforming Western conceit. Looking ahead, the United States will need to consider carefully what interests it seeks to protect in Hong Kong and what tools it has to do so. This will be no easy task. A useful starting point will be an acceptance that policy on Hong Kong cannot be constructed in isolation. The U.S. will need to identify enduring objectives in Asia and vis-à-vis China, because these larger objectives will have a bearing on whether certain U.S. goals can be achieved in Hong Kong. The more the U.S.-China relationship sinks into ideological enmity, the more China will view U.S. actions on Hong Kong in the most threatening light. U.S. officials and representatives of U.S. non-governmental organizations in Hong Kong will need to maintain discipline, as they do in other authoritarian states, about engaging in ways that reflect American principles but that do not imperil Hong Kong residents by overtly challenging red lines. A goal of America’s presence in Hong Kong should be to keep as many relationships open with as wide a range of key figures as possible. The more American officials and organizations can preserve a productive presence in Hong Kong, the better the odds that elements of the “one country, two systems” model can be preserved. Forestalling worse outcomes and playing for time until the tide turns is not entirely inspiring, but sometimes it is the best available option. It certainly is better than pursuing a “destroy the city to save it” approach of wrecking Hong Kong to prevent Beijing from deriving benefits from it. America will need to keep front of mind the interests of Hong Kong’s middle class and youth, who will serve as important actors in the city’s future political development. Another goal should be to use Beijing’s overreach as an opportunity to galvanize greater international coordination of positions and actions on China. The G-7 foreign ministers’ statement on Hong Kong provides a solid start. Washington should build on those efforts by working with interested countries to coordinate a private message to Beijing urging moderation on the scope and implementation of the national security law. It also should encourage coordinated actions, i.e., curtailing law enforcement cooperation with Chinese entities that implement the national security law in a manner that violates Hong Kong citizens’ legal rights. And if the White House were occupied by a president that did not hold anti-immigrant, nativist views, now also would be an opportune moment for the United States to open its doors to Hong Kong residents who wish to emigrate. Well-educated, industrious Hong Kong immigrants would be a boon to American competitiveness. Not all is lost in Hong Kong. Ultimately, Beijing has determined to treat Hong Kong as an internal issue. It has demonstrated tolerance for friction with the outside world in making its decision. Not all is lost in Hong Kong, though. The task ahead for the United States and others is to find ways to protect what is left in Hong Kong that makes the city special, to reassure allies and partners of America’s commitment to defending values, and to give Beijing pause from considering any further steps to infringe upon Hong Kong’s governance or conclude that it can afford to extend its adventurism to Taiwan.
<urn:uuid:8bc06d72-65f7-4ef5-b282-af0f10d5373d>
CC-MAIN-2020-40
https://www.brookings.edu/blog/order-from-chaos/2020/07/17/why-now-understanding-beijings-new-assertiveness-in-hong-kong/?shared=email&msg=fail
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400222515.48/warc/CC-MAIN-20200925053037-20200925083037-00274.warc.gz
en
0.94809
2,821
2.890625
3
Operation ID: 201101 This operation has been modified as per Budget Revision 03. Since August 11, incessant, high intensity rainfall has led to massive floods and landslides affecting thirty five districts in Nepal. The worst impacted districts are located in the southern plain along the Indian border, known as the Terai. The Nepal Food Security Monitoring System, NeKSAP identified a population of 940,000 food insecure persons in the affected area. Emergency life-saving food security and nutrition assistance is needed for an estimated 300,000 people most severely impacted by the flood disaster. These are the poorest and most vulnerable households as identified by the poverty prevalence (NLSS, 2011) and wasting rates (DHS, 2016). Of this group, WFP aims to provide emergency cash assistance to 140,000 persons in the two worst impacted districts, upon request by the District Disaster Relief Committees (DDRC). Affected districts, prior to flooding, were already registering very high wasting rates, up to 14.4 percent. A rapid nutrition screening undertaken by the Ministry of Health, with support from the nutrition cluster, indicates that child nutrition is already deteriorating rapidly with global acute malnutrition across 20 Terai districts assessed at 24.7 percent. Prevention and treatment of acute malnutrition is therefore key to prevent loss of and impact on children’s lives. To prevent malnutrition, WFP will provide blanket supplementary feeding to 101,500 children aged 6-59 months and 28,500 pregnant and lactating women and girls in the three worst impacted districts. In addition, targeted supplementary feeding will be provided to 11,600 children aged 6-59 months and 2,900 pregnant and lactating women and girls who are already malnourished. To support early recovery and contribute to long term food security, the Ministry of Agriculture’s agricultural recovery plan will be supported through a food assistance for asset programme targeting 4,000 flood affected, ultra-poor households for the rehabilitation of small scale agricultural assets such as fish ponds and secondary irrigation channels. This EMOP is launched with a view to providing further assistance to the Government of Nepal (GoN) in meeting emergency food and nutrition assistance. It builds on the successful implementation of the IR-EMOP (201098) and has a duration of 6 months. Emergency cash support will be provided for an additional 15 days following the completion of the IR-EMOP within the first month of the operation. It will cover the initial food needs of the critically food insecure in two of the worst affected districts, prior to the start of the government cash support. During the same month, blanket supplementary feeding will be provided. This will be followed by targeted supplementary feeding to children 6-59 months and PLWs already malnourished for six months. The food assistance for assets programme will provide targeted households with 20 days of work during the 6 month EMOP period.
<urn:uuid:6c21c837-a91a-4de3-9de7-ebff1a56cce9>
CC-MAIN-2023-50
https://www.wfp.org/operations/201101-emergency-response-critically-food-insecure-populations-severely-flood-affected
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00231.warc.gz
en
0.942392
582
2.6875
3
In the gospel of John, Jesus taught 13 physical realities that illustrated spiritual truths: light, the Jerusalem temple, physical birth, wind, water, food, bread, flesh and blood, door, shepherd, vine, cup, and breath. These tangible metaphors helped enlighten believers with the spiritual realities of the Judeo-Christian worldview. Thus, the goal of this article is to expound upon these analogies in order to have a more holistic idea of God’s message for the world. Let’s begin! 1. The first tangible metaphor that teaches spiritual truth is light. Light is a physical reality. The main source of our light comes from the sun, but this electromagnetic radiation can also be emitted from fire, lightning, and even animals and plants such as fireflies and mushrooms. Without light, there would be no photosynthesis from plants to give off oxygen necessary for humanity’s survival. Therefore, light is necessary for life. In the same way, the light from God is necessary for spiritual life. In John 1, Scripture states, “In God was life, and the life was the light of men. The light shines in the darkness, and the darkness has not overcome it (Jn. 1:4-5).” True knowledge, moral purity, and the presence of God are the primary sources of light. Unfortunately, people who reject God refuse to accept the light because their works are evil (Jn. 3:19). 2. The second tangible metaphor that teaches spiritual truth is the Jerusalem temple. In John 2:19-22, Jesus said: “Destroy this temple, and in three days I will raise it up.” The Jews then said, “It has taken forty-six years to build this temple, and you will raise it up in three days? But he was speaking about the temple of his body. When therefore he was raised from the dead, his disciples remembered that he had said this, and they believed the Scripture and the word that Jesus had spoken.” The Jews initially thought Jesus was talking about the Jerusalem temple where they worshiped Yahweh. This temple, which was constructed during the time of Herod the Great, began around 18 BCE (Before Common Era) and lasted until 20 AD. However, the largest part of the temple was not completed until AD 66. We know this because shortly thereafter, in 70 AD, the physical temple was destroyed by Titus’s army. Nevertheless, Jesus was talking about his physical body being crucified and raised three days later (Matt. 26:61; Mk. 14:58; Jn. 2:19). No longer do Jews or Gentiles have to worship God in a temple made by human hands. Instead, they can worship God in Spirit and Truth (Jn. 4:24). For Jesus told his disciples after He ascended to the Father that He will send the Holy Spirit to indwell in them and be with them always, even to the end of the age (Matt. 28:20). Therefore, the physical temple has been replaced with the chief cornerstone, Jesus of Nazareth, and the bride of Christ—the Church. 3. The third tangible metaphor that teaches spiritual truth is physical birth. In the gospel of John, Jesus was speaking to a devout Pharisee by the name of Nicodemus. Jesus told Nicodemus that unless one is born again he cannot see the kingdom of God. Nicodemus was confused and asked the following question: “How can a man be born when he is old? Can he enter a second time into his mother’s womb and be born (Jn. 3:3-5)?” As you can see, the Pharisees focused so much on the physical reality that they often failed to associate these ideas with spiritual truths. The disciples also had the same difficulty and I am sure we would have as well. Let’s not be boastful in our thinking! But what Jesus was trying to say is that being born again is like a spiritual birth. Just like when we are physically born we come into the natural world. Similarly, when we are spiritually born, we enter into the kingdom of God. Therefore, in order to become partakers in God’s realm, we must repent and be baptized into the death, burial, and resurrection of Christ (Acts 2:38). 4. The fourth tangible metaphor that teaches spiritual truth is wind. Did you know that the same Greek word for wind also means spirit? Therefore, the idea of wind, though a physical aspect of nature, often alludes to how the spirit of God moves. Thus, wind is referring to the Holy Spirit. Jesus said in John 3:8, “The wind blows where it wishes, and you hear its sound, but you do not know where it comes from or where it goes. So it is with everyone who is born of the Spirit.” There seems to be a divine mystery concerning the role of the Holy Spirit and how it’s autonomous nature is hard to comprehend. These are the moments when we behold the mystery of God and simply trust in the Spirit to conform us into the image of our Creator. 5. The fifth tangible metaphor that teaches spiritual truth is water. Water is another element that is impossible to live without. If a human doesn’t drink water for three days, they will not survive. It carries nutrients to all our cells in the body and provides the brain with oxygen. Water helps regulate body temperature and helps absorb important nutrients such as minerals, vitamins, amino acids, and glucose. I think all of us agree water is essential. Similarly, water represents the essential Holy Spirit within believers. For instance, during the Feast of Booths, Jesus stood up and said: “If anyone thirsts, let him come to me and drink. Whoever believes in me, as the Scripture has said, out of his heart will flow rivers of living water. Now this he had said about the Spirit, whom those who believed in him were to receive (Jn. 7:37-38).” The Holy Spirit is just like water in that it provides the nutrients needed for us to mature in Christ. Without the Holy Spirit, we wouldn’t be able to spiritually survive because it is God who causes the growth. Therefore, let’s continue to go to the Lord in prayer and ask that He quench our thirst by the power of the Spirit indwelling within us. 6. The sixth tangible metaphor that teaches spiritual truth is food. When Jesus was eating with his disciples, they kept urging him to eat. However, the Lord responded by saying, “I have food to eat that you do not know about. So the disciples said to one another, Has anyone brought him something to eat? Jesus said to them, “My food is to do the will of him who sent me and to accomplish his work (Jn. 4:31-34).” Once again, the disciples had a hard time wrapping their brain around the spiritual concepts Jesus was referring to. He was not physically hungry or in need of other food. Rather, his ultimate sustenance came with doing the will of God and accomplishing his work. In the same way, when we are physically hungry, let that be a reminder how much hungrier we should be for the kingdom of God to expand. For Jesus told us to go into all the world and preach the gospel to every creature. Are we eager to fulfill the will of God just like we are eager to eat our next meal? I hope so. 7. The seventh tangible metaphor that teaches spiritual truth is bread. Bread is a physical substance that many cultures throughout the world eat. This element is important because it provides people with energy for daily living. For example, bread offers a high source of carbohydrates, vitamin B, including thiamin and niacin—essential nutrients for the body. Without bread, people would become malnourished and deprived of energy. Once again, Jesus makes the connection with this element to a spiritual reality. He says in John 6:58: “This is the bread that came down from heaven, not like the bread the fathers ate, and died. Whoever feeds on this bread will live forever.” This may have been difficult for the disciples to understand at first, but Jesus was referring to his body and blood that was broken for them on the cross. His sacrifice offers eternal life to those who believe in Him. John 3:16 makes this clear: “For God so loved the world that He gave His only begotten Son, so that whoever believes in Him will not perish but have everlasting life.” Jesus is that bread coming down from heaven. However, when we nourish on the Lord, we will not be temporarily satisfied. Instead, the life of Jesus will sustain us forever. Amen. 8. The eighth tangible metaphor that teaches spiritual truth is flesh and blood. In John 6:53-56, Jesus makes a spiritual connection that is hard for his disciples to understand. In fact, it sounds quite upsetting at first that the Incarnate Son of Man would make this claim: “So Jesus said to them, truly, truly, I say to you, unless you eat the flesh of the Son of Man and drink his blood, you have no life in you. Whoever feeds on my flesh and drinks my blood has eternal life, and I will raise him up on the last day. For my flesh is true food, and my blood is true drink. Whoever feeds on my flesh and drinks my blood abides in me, and I in him.” When Jesus died on the cross, He took on the wrath of God to satisfy the justice of God and was the perfect substitute because He was without sin. Therefore, He who knew no sin became sin for us so that we might receive the righteousness of God—theologians call this the Great Exchange. Believers throughout the world share in the Lord’s Supper. The Lord’s Supper is a way to commemorate what Jesus did on the cross for us and to remind ourselves that we need the sacrifice of Christ to be reconciled back to the Father. The bread symbolizes his body and the wine symbolizes his blood. Jesus told us to do this in remembrance of Him. Most congregations partake in the Lord’s Supper during Sunday church services. 9. The ninth tangible metaphor that teaches spiritual truth is a door. All of us know what a door is. It is an object of entrance, either into a house, commercial building, or another room. Doors are important because they divide the public from the private. They give access to people in order to go from one place to another. They are an important concept throughout all societies. In the same way, Jesus said He is the doorway to eternal life (Jn. 10:1-9). He is the way, the truth, and the life, and no one can come to the Father except through Jesus. The only access we have to the Father is through Jesus the Son. When we repent of our sins and trust in Jesus, God grants us access to open the door to the spiritual realm. Those who do not hear God’s voice or let Jesus into their lives when he knocks on the door will not be able to enter into heaven. There is no other door or way except through the atoning work of Christ. 10. The tenth tangible metaphor that teaches spiritual truth is a shepherd. A shepherd is a person who tends and rears sheep. They guide or direct sheep in a particular direction and protect them from wolves and other dangerous animals. Throughout the ancient Near East, it was a common job to be a shepherd. In fact, many biblical characters such as Abraham, Jacob, Moses, King David, and the prophet Amos had this occupation. Jesus informs his disciples in John 10:11-18 that He is the Good Shepherd. He doesn’t let his sheep wander away or get eaten by wolves. In the spiritual realm, Jesus is our ultimate guide; we are His sheep. It’s easy for us to fall away from the faith and be tempted by the enemy. However, Jesus reiterates that He is our protector and even lays His own life down for us. The analogy Jesus uses here is very fitting, considering that most people were familiar with this occupation. 11. The eleventh tangible metaphor that teaches spiritual truth is a vine. What exactly is a vine? A vine is a plant that has stems which need mechanical support. It often climbs up trees or stretches out over the ground. Moreover, vines can climb with these grasping appendages called tendrils that help support the vine. Vines can grow wild and consequently need to be pruned often. Jesus uses this as an analogy for the spiritual realm. He tells his disciples that He is the true vine and His Father is the vinedresser. Whenever we bear fruit, he prunes us, so that we may bear more fruit. The fruit Jesus is talking about are the virtuous attributes of God from Galatians 5:20: Therefore, when we abide in Jesus, the true vine, we will bear much fruit. However, if anyone does not abide in Christ, they will be thrown away like a branch and wither away. This is why it’s vital for us to continually rely on the work of the Holy Spirit to keep us a healthy and lifegiving vine. 12. The twelfth tangible metaphor that teaches spiritual truth is a cup. A physical cup is a helpful tool for many things. For example, a cup can be used to drink fluids. A cup may function to store food or other items of value. Archaeology proves that many ancient civilizations utilized the cup because many ceramic pieces have been excavated over time. In the Judeo-Christian worldview, cup is often identified with the wrath of God. For instance, Jeremiah had to deliver the “cup of the wine” of God’s wrath to many nations (Jer. 25:15). Revelation 14:10 refers to the final judgment of God, where the cup of His wrath will be poured out on those who are disobedient evildoers. Then, in John 18:11, Jesus tells Peter: “Shall I not drink the cup that the Father has given me?” He is referring to God’s wrath toward sin that He endured on the cross for the entire world (Isa. 51:22; Matt. 20:22). 13. The thirteenth tangible metaphor that teaches spiritual truth is breath. Breath is defined as the air taken into or expelled from the lungs. This process called breathing is vital for organisms to survive. Humans need oxygen to breathe in and carbon dioxide to flush out in order for proper homeostasis and cellular respiration to occur. In John 20:22, after the resurrection, Jesus appears to his disciples in the upper room on the evening of the first day of the week. The first thing the risen Lord says is: “Peace be with you.” Then he showed them his hands and side to prove He was not just a figment of their imagination. Afterward, he breathed on them and said to them, “Receive the Holy Spirit.” The physical reality of breath is akin to the spiritual truth of the Holy Spirit coming upon the disciples. This breath is the life force for Christians. Just like God breathed into Adam and He became a living creature, when God breathes into us the Holy Spirit, we become truly alive. In this article, 13 Tangible Metaphors That Teach Spiritual Truths In The Gospel of John, the goal was to help believers understand how the physical realities—tangible metaphors, can illuminate spiritual truths. Jesus sought to use light, the temple, birth, wind, water, food, bread, flesh, door, shepherd, vine, cup, and breath to guide us into a deeper spiritual understanding. It is my hope and prayer that you meditate on these truths so you can grow in your Christian walk and confidently share the good news that God saves sinners. Article written by Chad A. Damitz
<urn:uuid:cea69be0-5162-4905-8973-abf6b4459806>
CC-MAIN-2021-10
https://conformtojesus.com/2021/02/16/13-physical-realities-that-teach-spiritual-truths-in-the-gospel-of-john/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178362899.14/warc/CC-MAIN-20210301182445-20210301212445-00630.warc.gz
en
0.967479
3,368
3.0625
3
Print this page. Home / Browse / Ruddells (Izard County) The once-thriving unincorporated settlement of Ruddells (Izard County), located near the White River in the southwest corner of the county, was a major producer of quick lime for approximately twenty-five years during the early part of the twentieth century. Today, little remains of the settlement other than the abandoned mines and a cemetery. The mining of lime is said to have begun in the area as early as 1906. At that time, what would become Ruddells was known as East Sylamore. A post office opened there on December 18, 1905. On February 7, 1911, it was renamed Ruddells, with William W. Brooks as postmaster. The name had been changed to honor Abraham Ruddells, father-in-law of early mine owner Edgar Young. The settlement developed around the Young Lime Company, which began mining operations and manufacture of quick lime about 1906. Quick lime is used for a number of purposes including mortar, plaster, and the production of paper. Young sold the business to George Case in 1907. During peak production, three kilns, necessary to fire the lime, were in operation. The mining operations provided labor for many people of the area. Workers were needed to dig out the lime and crush it—in the early years by hand with a hammer. Many area African Americans, as well as itinerant workers, were employed in the nearly unbearably hot work at the kilns. Large numbers of additional jobs were provided in cutting the wood necessary for firing the kilns. The settlement grew quickly and, within a few years, was home to a school, hotels, and other businesses. The White River Canning Company, which processed vegetables, provided jobs for many of the area’s young women. Nearby stave mills provided the estimated 10,000 barrels used each month to ship the quick lime. At one time, a commissary operated by Marion Morris provided goods in exchange for tokens provided as pay by the company. Typical pay by 1917 was seventeen and a half cents an hour. An employee could obtain company housing for $2.50 a month. When the railroad was built through the area, a depot, operated by agent Frank Forrest, was fashioned in 1913 by connecting two refrigerated railroad cars. A major flood in 1916 disrupted business, leaving behind a foot of mud. During the flu epidemic of 1918, so many people died that burials continued into the night. Business prospered into the early 1920s with the construction of a lime dehydration plant in 1924. But as adequate supplies of timber and limestone began to diminish, operations began to slow. Decline accelerated in 1925 with the sale of the mining operation to the Batesville Lime Company. Shortly after the purchase, the kilns were removed, and the processing aspect of the business was relocated to Cushman (Independence County) and Limedale (Independence County). Mining continued at Ruddells, and a narrow gauge railroad was constructed to move the rock lime to the new operations. Production at Ruddells slowly dropped and was completely shut down in July 1930. What remained of the operation was dismantled and moved to the new locations. Workers also began to move as the settlement slowly began to die. The cemetery and abandoned mines are about all that remain of the once-thriving settlement. For additional information:Harris, Mertie. “An Interview with George Weigart Concerning His Memories of the Ghost Town, Ruddells, Izard County and its Lime History.” Izard County Historian 2 (April 1971): 2–9. Stowers, Juanita. The History and Families of Izard County, Arkansas. Paducah, KY: Turner Publishing Company, 2001. Mike PolstonEncyclopedia of Arkansas History & Culture Last Updated 7/21/2010 About this Entry: Contact the Encyclopedia / Submit a Comment / Submit a Narrative
<urn:uuid:af0c3148-c69f-4b94-9490-2aa2a9ec4b7a>
CC-MAIN-2018-43
http://www.encyclopediaofarkansas.net/encyclopedia/entry-detail.aspx?entryID=6321
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511897.56/warc/CC-MAIN-20181018173140-20181018194640-00427.warc.gz
en
0.976896
814
3.09375
3
What are the health benefits of carrots Carrot are a tuber with a high nutritional value which provides numerous advantage to the human body. It is a vegetable that can be eaten raw, cooked, as part of worked dishes... and noted for its bright colour orange. We can find carrots all year round, so we can add these into our diet without any hassle. If you want to know all the properties of this vegetable, do not miss this OneHowTo article on what the benefits of carrots are. This vegetable is known for its notable contribution in vitamin A, it is particularly rich in beta-carotene, a micro nutrient that is converted into this vitamin with functions such as the formation of visual retina pigments, the maintenance of cells that cover skin, eyes, mouth and internal organs. Likewise, beta-carotene supply antioxidant properties that help care for skin, and help prevent ageing, certain types of cancer (like lung cancer, leukaemia and prostate cancer) and favour an even skin tanning. Anti oxidants may also play a role in regulating blood sugar levels. The carrot is cleansing thanks to its fibre content, which draws toxins from your body and also regulates intestinal transit. High fibre foods also prevent constipation and colorectal cancer. Remember how your mother used to say to eat your carrots because they're good for your eyes? Some studies have found that there may be some truth to that. Vitamin A deficiencies can lead to reduced vision and the beta-carotene in carrots replenish the deficiency, leading to improved vision. Also, the carrot is diuretic, its high water content helping remove kidney stones; and it is in turn highly satiating due to its high fibre and water. Also noteworthy is that it is rich in phosphorus, so that it becomes invigorating, useful for tired minds and as a restorer of nerves. This article is merely informative, oneHOWTO does not have the authority to prescribe any medical treatments or create a diagnosis. We invite you to visit your doctor if you have any type of condition or pain. If you want to read similar articles to What are the health benefits of carrots, we recommend you visit our Healthy living category.
<urn:uuid:73ec2829-d086-4ebc-a2af-88a02f507ee8>
CC-MAIN-2020-50
https://health.onehowto.com/article/what-are-the-health-benefits-of-carrots-2853.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141729522.82/warc/CC-MAIN-20201203155433-20201203185433-00418.warc.gz
en
0.953933
452
2.828125
3
FUN FARTING FACTS WANT TO KNOW MORE? KEEP ON READING!!! - Where do farts come from? - The gas in our intestines comes from several sources: air we swallow. gas seeping into our intestines from our blood, gas produced by chemical reactions in our guts, and gas produced by bactering living in our guts. - What is a fart gas made of? - Most of the air we swallow, especialy the oxygen compnent, is absorbed by the body before the gas gets into the intestines. - Chemical reactions between stomach acid and intestinal fluids may produce carbon dioxide, which is also a component of air and a product of bacterial action. - The longer a fart is held in, the larger the proportion of inert nitrogen it contains - What makes farts stink? - The odor of farts comes from small amounts of hydrogen sulfide gas and mercaptans in the mixture. These compounds contain sulfur. - Why do farts make noise? - The sounds are produced by vibrations of the anal opening. - Sounds depend on the velocity of expulsion of the gas and the ightness of the sphincter muscles of the anus. - How long does it take fart gas to travel to someone else's nose? - Fart travel depends on atmospheric conditions sucha s humidity, temperature and wind speed and direction, the molecular weight of the fart particles, and the distance between teh fart transmitter and the fart receiver. - Is it true that some people never fart? - No, not if they're alive. - People even fart shortly after death - Is a fart really just a burp that comes out the wrong end? - No, a burp emerges from the stomach and has a different chemical composition from a fart. - How can one cover up a fart? - There is a company called FARTYPANTS that sells underwear designed to absorb the odor of farts. If you should be caught without your FARTYPANTS, another ploy is to blame the dog or cat, if one should be present, or complain about hwo the wind must be blowing from the direction of the paper mill. - How long does it take a fart to travel to someone else's nose? - The time for a fart to travel to a person's nose all depends on the surroundings (i.e. atmospheric conditions, the molecular weight of the gas, the height of the person, etc.). Usually, if farts are unable to be detected by smell, it indicates that the fart's density is low and therefore, gets diluted by the air around the person who farted. - What do you do when you fart in public? - Well, there are several options for you if this is to occur in broad daylight and in the middle of a huge crowd. If you're lucky enough, you can pretend nothing happened and other people will never suspect you. Our best advice: RUN AWAY. We Hope You Enjoyed Our Fun Facts. :-D Directs you to the Homepage
<urn:uuid:85d6c4d2-1ff1-4a15-b52c-e7cbb44221c8>
CC-MAIN-2015-48
http://www.angelfire.com/scary/gas/funpage.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398464536.35/warc/CC-MAIN-20151124205424-00351-ip-10-71-132-137.ec2.internal.warc.gz
en
0.910745
645
2.84375
3
Studying art in Paris in the late 1860s, Thomas Eakins saw rowing not only as healthful but also as mental therapy: when his sister Fanny wrote saying she was discouraged about her piano playing, he suggested that she “take a walk to Fairmount or a row up the river.” With so much interest in exercise, gyms and sports clubs proliferated in Philadelphia. In 1859, a Philadelphia physician, Paul B. Goddad, opened a predecessor to the soon-to-follow athletic clubs. He called his Establishment, “The Natatorium and Institute for Scientific Instruction in the Improvement of Physical Powers.” Its mission was to apply scientific principles to swimming and exercise “to improve one’s health and physical condition.” Also springing up were gun clubs, horse clubs, hunting clubs, riding clubs, tennis clubs, and fishing clubs. Cricket was particularly popular among all Philadelphians, and in 1860 there were even three African American cricket clubs “which played the game among themselves.” Going well beyond sports, Philadelphians were joining all kinds of fraternal organizations as old social patterns frayed in a city swelling with immigrants from Ireland, Germany, and Great Britain. Rich or poor, artistic or athletic, musical or political, religious or socially concerned, people in the ever more diverse and splintered city wanted to feel as if they belonged somewhere. In droves, they sought the familiarity and camaraderie of a club, where they could make friends, share interests, and in some cases garner prestige. Even those from “the meanest boy’s gang . . . sought a sense of social place and community in club life.” By the 1870s, the city had 24 different singing societies, 91 German secret societies, and 800 private social service organizations, not to mention such rarified groups as the Philadelphia Club and the Union League. From this culture, boat clubs also emerged. At least two of them sprang from the city’s independent fire companies, which had a history of competition to the point of mayhem. By mid-century, Philadelphia was taking steps to consolidate and modernize firefighting into a citywide force. The neighborhood companies, each one with its own clubhouse, uniforms, social makeup, and status, began seeking other ways to maintain their brotherhood. Some fire companies turned their energy and fellowship to the river, bringing with them their love of costume and ritual, and a nicknaming tradition. They were not necessarily made up of working-class men. The social status of volunteer firemen typically mirrored the neighborhood they served. The Bachelors Barge Club, the oldest club in continual existence on the Row, was started by members of the Phoenix Hose Company. It covered the Center City neighborhood around 7th and 8th Streets, among the wealthiest neighborhoods in town at the time. Many of the volunteer firemen were also members of the Yes, Oui, Si Chess Club, which met in the Athenaeum Building. One of Bachelors’ founders and its president was Israel W. Morris, whose family dated back to the Revolution. Club minutes from the 1850s reveal that Bachelors held its monthly meetings at his family mansion just off Washington Square.
<urn:uuid:f3762f82-6e3c-4869-8000-8b084e658609>
CC-MAIN-2018-09
http://boathouserowthebook.com/book/chapter-1/
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813883.34/warc/CC-MAIN-20180222022059-20180222042059-00727.warc.gz
en
0.981084
677
3.046875
3
Instagram via @womaninarmorandwarpaint This weird-looking bird is a male sage-grouse. His chest is adorned with large air sacs, which he uses to attract females by making them produce odd popping sounds. The males congregate in groups across the shrubland of western North America called “leks,” calling to females. However, these fantastically bizarre birds are decreasing in number. One species is near-threatened, while the other is endangered and has only 1,700 adult birds left. Human use of their habitat has shrunk their population. The magnificent Mola mola, or ocean sunfish, has the title of largest bony fish in the sea. It can weigh almost 5,000 pounds and grow to around 14 feet vertically and 10 feet horizontally. Up close, they kinda look like they’re made of Styrofoam. Ocean sunfish bask in the sun by the water’s surface. Smaller fish and birds eat parasites off their giant round bodies. Sometimes, the huge fish will jump into the air and splash down to try and shake off parasites. Vogelkop superb bird-of-paradise Normally, this bird looks rather normal: mostly black with a blue chest section and blue spots on his head. However, once he lifts his cape feathers up behind his head, his visage transforms into a weird alien black hole with shimmering blue accents. Only the males of this species look so unique. The whole thing is a show for females, to entice them into choosing the male as a mate. He dances around the female, making sure to only show her his weird alien side before she decides if he’s worthy or not. These weird-looking primates only live in Madagascar, where they spend most of their lives in the rain forests’ trees. While you have a handy opposable thumb, aye-ayes have opposable big toes. They use them to hang from branches. Aye-ayes are often considered bad luck, so between habitat destruction and superstitious killings, they’re now endangered. But aye-ayes are just trying to eat bugs and coconuts, not bring tragedy to your family. They’re now protected from hunting by law, so that’s good news. Japanese spider crab These massive crustaceans can grow to around 12 feet across when they spread their long, spindly legs out. Unsurprisingly, they’re the largest species of crab on Earth. However, even large animals need to protect themselves from predators. These giant spider crabs will sometimes put sponges and other animals on their shells to help themselves blend in with the seafloor. In Japan, these crabs are considered a delicacy. It’s forbidden to fish for them in the spring, when they’re reproducing. According to the Tennessee Aquarium, their Japanese name, “taka-ashi-gani,” translates to “tall legs crab.” Pink fairy armadillo The pink fairy armadillo looks like a Photoshopped creature, but it’s real! The animal is only about 5 inches long and spends most of its life burrowing underground. To adjust its temperature, the pink fairy armadillo pumps blood in or out of its pink shell. The blood, of course, is what gives the armadillo its strange pink color. As little and weird and adorable as this critter is, it’s incredibly elusive. They’re rarely seen. But don’t think they’re burrowing around just anywhere — they live in the deserts of Argentina. This awkward lump of an animal is certainly a unique sort of frog. It’s got an itty-bitty face — earning it the additional name of “pig-nosed frog” — and lives exclusively in India. Its tadpoles live on algae-covered rocks, using their sucker-like mouths. The adults, however, live mostly underground. Local people eat the tadpoles and use the species in medicine. Some people turn the frog into an amulet and give it to children in an attempt to quell their fear of storms. Unfortunately, this use and deforestation have made the purple frog endangered. Blue dragon (Glaucus atlanticus) This thing looks like it must be an alien. Actually, it’s a nudibranch, which are often called “sea slugs” (a lot of unrelated things are called sea slugs). But as miraculous and strange as this thing is, it’s only about 3 centimeters long. The blue dragon keeps an air bubble in its stomach in order to float. And while they’re just floating around, these critters nibble on the horribly venomous Portuguese man-of-war. That may sound unwise, but the blue dragon actually steals the man-of-wars’ stingers and puts them in its own appendages to ward off predators! You’ve probably never seen or heard of Jerboas because they’re mostly found throughout Arabia, Northern Africa, and Asia. They live in the scolding hot desert where they run around as fast as 15 miles per hour. This little guy looks much like a mouse or a rat, but it’s actually equipped with large eyes and ears meant for nocturnal activity. The most bizarre part about the Jerboa that clearly separates it from common rodents is its hind feet with central bones for speed and leaping. Pinky the albino dolphin of Lake Calcasieu Swimming in the brackish Lake Calcasieu of Louisiana, Pinky the albino dolphin surprised onlookers with its abnormally pink skin. Pinky looks like just another fake internet animal or perhaps a tall tale from summer camp, but the dolphin has been living in the area for at least eight years. Pinky gets its surprising pink skin from its albinism. Its cells don’t make the melanin pigment that would give it a normal gray color, so just the color of the dolphin’s blood vessels show through. Since albinism is genetic, Pinky’s parents both had the recessive gene for it and passed them on to Pinky. This salamander is a strange one (in more ways than immediately meets the eye). It’s like a permanent teenager — as an adult, it retains most of the amphibious features of youth: external gills, a tail, and an aquatic lifestyle. However, if you inject an axolotl with other salamander hormones, it turns into something like a normal salamander. While the axolotl is beloved by scientists for its ability to regenerate its limbs, that fancy trick hasn’t saved it from becoming critically endangered. This unreal-looking bird is actually critically endangered because people just can’t get enough of the horn on its bill. The weird part of this bird’s head is called a “casque”; people hunt the birds for their casques, which they then carve into art and jewelry. Helmeted hornbills use their casques to fight each other midair over fig trees and territories in the forests of Southeast Asia. Unfortunately, it’s made them a target for poachers. Starting in 2011, 6,000 birds were killed per year to feed the demand in China. While this may look like your alien overlord coming to Earth and conquering the human race, it’s actually a ctenophore. They’re sort of related to jellyfish and are commonly called “comb jellies.” However, they don’t sting their prey, but instead have sticky cells like flypaper. Many things in the ocean look like aliens, with their strange body plans, bulging eyes, and weird dangly bits. Perhaps this is because so much of the vast watery expanse is still unexplored — only about 5% of the seafloor has been mapped. This little 4-centimeter crab has a carapace that looks strikingly like an angry samurai face. According to Amusing Planet, Japanese folklore says they got that face from the souls of the Heike clan (who died in a big battle in 1185). The heikegani crab is just another example of pareidolia — the instinct for people to see faces (or other patterns and meanings) where they don’t actually exist. The man in the moon, animals in the clouds, and faces in tree trunks are all examples of this. Lowland streaked tenrec Each Pokémon generation has a new electric-type small rodent thing, and the lowland streaked tenrec would fit right in with the rest of them. You could probably just draw this thing exactly as it is and drop it in a Pokémon game. Lowland streaked tenrecs only live in Madagascar (as Madagascan animals tend to do). In fact, scientists have found 37 different tenrec species on the island. About five of them have hedgehog-like spines that may have evolved as a protection against predators. As delightfully weird and Star Wars-like as these antelope are, they have a bit of a sad story. Once upon a time, millions of saiga roamed central Asia until they were hunted to a mere 1,000 about 100 years ago. Laws protected them and they grew to hundreds of thousands until the Soviet Union fell, and they’ve since been hunted relentlessly. Then, in 2015, 60% of all saiga died suddenly. A bacterial infection brought upon them by unusually warm weather has pushed this critically endangered species to the brink. This wild-looking bat is actually real, although the photo makes it look larger than it really is (their bodies are only about 10 inches long). However, its wingspan can be about 3 feet wide! Hammer-headed bat males have large heads so they can make loud honks to call females. Some scientists believe these bats are infected with the Ebola virus, but show no symptoms of it. It’s unclear if they pass the virus on to humans or not. They live in Africa and eat fruit, much to the chagrin of local farmers. At first glance, this bird is truly bizarre. Its feathery crest obscures its beak, making it appear mouthless. They live in the humid forests of South America and use boulders or rocky caves for breeding (hence their name). Like the sage-grouse, these birds breed with a lek system. The males all group up, each with his own area, called a “court.” When a female visits a court, the male shows off his plumage for her in the hope that she’ll choose him as a mate. Hilariously, this weird frog actually belongs to a group called the “squeakers.” This silly description is in direct contrast with the hairy frog’s other name — “horror frog.” Only the males develop the hair-like feature along their thighs. But their “hair” isn’t even their weirdest feature; they also have Wolverine-like claws on their back feet. They break their own bones and skin to make these claws! It’s possible these claws and hair-like structures are used in battles between males, but scientists are still researching this hypothesis. This obscure animal has a delightfully weird nose that looks like a starburst made of worms. It’s basically blind, but is sometimes called the world’s fastest eater — it can find and eat a tasty bug in less than a second. The star-nosed mole bops its nose against the soil around it as much as possible, collecting information with five times as many sensors as the human hand. Also, it can smell underwater. It simply blows bubbles and then sucks them into its nose. Mexican mole lizard The enigmatic Mexican mole lizard burrows underground, completely unaware of the terrifying tales told of it above ground. Some people believe it will enter a person’s body if they squat down to relieve themselves, but this isn’t true. With only two front legs and no melanin to protect their skin from the sun, Mexican mole lizards only emerge from the soil in the late evening. They have trouble getting around when above ground. As much as people may be freaked out by them, they’re perfectly happy in the ground and out of sight. This breed of bull has huge horns and originated in Africa. It’s a wonder they can keep their heads up with their massive, sometimes bulbous, horns. However, in the hot and cold climates they live in, the horns help disperse body heat. Due to their interesting appearance, some European and American zoos kept Ankole-Watusi bulls in the late 19th and early 20th centuries. However, as many zoos moved their focus to conservation, many of them were sold to private owners. The little tarsier is quite an odd-looking primate. Unlike most primates, its giant eyes actually have good night vision, which it uses to hunt in the dark. The tarsier’s eyes are so big it can’t actually move them, so instead it just rotates its head like an owl, or that scene from The Exorcist. Tarsiers are actually the only purely meat-eating primates. They feast on critters like insects and lizards. Unfortunately, some farmers who live near tarsiers believe they’re agricultural pests. Tarsiers are actually eating the real pests — insects. Imagine exploring underwater and seeing this chilling sight: the 20-some feet of a bigfin squid’s arms. The 90-degree bend of them is unusual and unnerving. This one was spotted by an ROV (remotely operated vehicle) near an oil drilling site. Scientists know little about these bigfin squids, as they’re rarely spotted. Their alien-like presence is just another reminder of all the strange and bizarre creatures in the dark depths of the ocean. And while the bigfin squid is almost certainly harmless to humans, you can’t help the chill you get when you look at it. This little ghostly octopus is rather strange, as it doesn’t have any of the camouflaging chromatophores most octopuses use to disguise themselves. Also, while it seems to live in deep waters, its body looks more like the shallow-water octopuses. Amazingly, this little octopus lays about 30 eggs on a dead sponge, and then wraps its body around them, staying there for years. Unfortunately, interests in mining rocks and precious metals could remove the sponges these octopuses rely on for their eggs. If you’ve ever wondered what a fish would look like with a pair of those large, waxy candy lips, well, here you go. As much as you might try to tell this bizarre animal to turn its frown upside down, it will continue to stare at you with droopy lips. To add to its oddities, the red-lipped batfish stands on the ocean floor with its fins acting like legs. It isn’t the best swimmer, but it does use the strange protruding horn on its forehead to apparently attract prey. If you’ve ever wanted a pet chicken, the silkie may be the way to go. It’s super fluffy and apparently friendly. Surprisingly, under all the floofy white feathers is black or dark-blue skin. And under that, even their body tissues are black! It seems that the Silkie breed originated somewhere in Asia, as Marco Polo wrote about them in the 13th century. Originally, they only had white feathers, but people have since bred them to come in other colors. There are now dark fluffy chickens, and even ones with a reddish-brown coloring. These wrinkly-faced bats are bizarre-looking enough without the addition of their chin fold pulled over their face, like you can see in this picture. They pull this skin over their faces whenever roosting (the bat term for “resting”). While many bats use their mouths for echolocation, some actually use their noses. Research suggests the wrinkles on bats’ faces like this one actually help them “see” the world around them. The wrinkles seem to add complexity to the bats’ sonar capabilities. The bizarre-looking stargazer fish spends its days buried in the sand, waiting for prey to swim by. As soon as a tasty morsel does, it opens its mouth and sucks the critter in via vacuum. The frills around its mouth keep sand from seeping in when it opens wide. Burying itself in the sand is also useful for hiding from predators. However, some threats still have keen eyes, so the stargazer has additional protections. It has venomous spines, and some stargazer species even have electric organs on top of that. When you think “proboscis monkey,” generally you think “monkey with a very large nose.” That’s certainly true of the adult males! However, this weird one here looks like a younger proboscis monkey. And while it’s lacking the signature nose, something about the monkey in this picture looks oddly and eerily human. Out of the corner of your eye, this monkey could easily be a child playing in the water. But then you get a second look. Proboscis monkeys quite like swimming — they’ve even evolved webbed feet that are great for escaping crocodiles. Giant African land snail YouTuber Emzotic loves her pet giant African land snail, but these huge mollusks are invasive pests in Florida and Hawaii. They breed like crazy because they’re hermaphroditic (meaning each snail has male and female reproductive parts). They’ve been eating the stucco off houses in Miami to get calcium for their shells. While some people may make these snails look like cool pets, you should remember that they’re an incredibly harmful invasive species. And how did they invade? People kept them as pets. While this animal looks like it has a boot print for a head, the weird pattern is actually a suction cup. This is a remora (which means “hindrance”), and it likes to stick itself to other animals, like sharks, so it can slurp up their scraps. And any parasites that fall off. Yum. Remoras seem to slow down their hosts and can rub their skin raw. This has the remora teetering on the edge of being labeled a parasite. It doesn’t really seem to do much in return for its hosts other than act like an attached vacuum cleaner. Eastern long-necked turtle The Eastern long-necked turtle is a formidable foe. But it’s formidable for more than just its long neck. Why else is formidable. Well because, it lives in Eastern Australia! If you’ve ever been to the southern hemisphere country, or if you’ve ever read this piece we have on its dangerous creatures, you’ll know exactly what we’re talking about. The Eastern long-necked turtle likely evolved its long neck for two reasons. The first was likely to attract mates. A long neck in the animal kingdom is suggestive of a strong and robust genetic line. But second, it likely evolved it for battle. Okay, maybe not. But either way, if you see this guy, watch your back. It’s likely watching yours… Amphibians are often overlooked by those taking a cursory glance at the tree of life. Maybe these people see reptiles like snakes, mammals like tigers and cheetahs — but rarely do they look to amphibians like the frog. This is an egregious offense to the beautiful creatures. There are a number of things that make the frog a beautiful creature. Of these, include its beautiful variety. We have poison dart frogs, for instance. But here, we look at the clawed frog, which literally brandishes claws. While not the same as those wielded by the tiger, they are still formidable. Watch out. Mata mata turtle Another turtle to make this list is the mata mata turtle. This turtle, local to the islands of Indonesia, is formidable for an entirely different suite of reasons. For the most part, however, it is formidable for its brilliantly spiked shell. The mata mata turtle, unlike its other brethren, evolved spikes to help protect it from predation. It didn’t feel that it should just stand by and get gnawed on. Passivity wasn’t on the menu for this guy. We should take note. An active defense is a strong thing in more than just the turtle life. Portuguese man o’ war The Portuguese man o’ war is a bizarre creature. In fact, biologists know it as several creatures in one — it’s known as an aggregate animal that is made up of many smaller organisms working together. But other than its bizarre appearance and biological makeup, the thing is deadly. While it might look like a jellyfish, the thing is most certainly not. However, it can sting like a jellyfish. Moreover, these stings have been known on occasion to kill. So if you’re swimming off the shores of Florida, where they sometimes wash ashore, you might want to watch out for this bad boy. The Indian Charial is an odd duck. Actually, it’s not a duck, but a species akin to an alligator. What’s most regrettable about this long-snouted creature, however, isn’t its slightly quirky disposition, but instead its ranking on the endangered species list. This sad fact should earn the creature a spot in your hearts — and your wallets. If you have a conscience you’ll stop what you’re doing immediately and donate as much cash as you can to causes geared toward preserving this beautifully bizarre species. The hoatzin is an interesting bird. It’s got a mohawk (like I did in the 7th grade), which is likely used to scare off its foes — that, or as a method to attract mates. Either way, the thing is used so effectively that the creature has survived and thrived for tens of thousands of years. While scientists aren’t entirely certain of this bird’s kinship to other animals, there is something on which all scientists can agree: this bird should join a band. It could easily be called the birdbrains or the Stinkbird pheasants (another name it’s commonly called). When parents want to avoid telling their kids about the processes that led to their birth (the mechanical interactions between a male and female), they tell them fairy tales of the stork. It’s not had to bet that this is not a stork they had in mind. The marabou stork is an unseemly and bizarre creature. Just look at its weird throat-appendage! Anyways, they thing can be found in areas of Africa south of the Sahara. If you’re an avid bird watcher, you had best get out and try to find this thing. It should be too difficult with a neck like that. Sri Lanka frogmouth The Sri Lanka frogmouth, much to your potential confusion, is not a frog. Instead, the thing merely holds a mouth like a frog. If you look at the thing (which is actually an owl), you can tell that it is quite frog-like. It’s almost as if the thing is smiling at you. Creepy… Anyways, this bird species you can find capering about places in South India. In particular, you can find it in areas around the Western Ghats mountains. So, if you’re an outdoorsy type and are looking for some birds to check off the list, you might want to go out and find this guy. You won’t regret it. Amazon giant fishing spider The amazon is an amazing place. But more than that, it is also a creepy place with so much biodiversity that you likely won’t ever be able to tell how many different species you are seeing. Here, however, you’ll have no problem identifying something different. Here we have the amazon giant fishing spider. The spider, while it won’t help you or your local fishing village, will help kill a great deal of amazonian microfauna. In total, in can grow around eight inches. Yes, this is absolutely disturbing. But it is also bizarre. Either way, if you see this thing you should turn around and run immediately. Good luck.
<urn:uuid:a3770afe-3273-4367-9683-a3a8bbd963ca>
CC-MAIN-2022-05
https://www.science101.com/bizarre-animals-never-knew-existed/?utm_source=talas&utm_campaign=Da_TS_S101_US_D_BizarreAnimals_MS_smartbid_v5_1812-Creatures+You+Didn%27t+Know+Existed-https%3A%2F%2Fstorage.googleapis.com%2Fcaw-uploads%2F3d64f6ab319c94aaf9d08072d03e340d.jpeg&utm_term=jamaicaobserver&utm_medium=Da_TS_S101_US_D_BizarreAnimals_MS_smartbid_v5_1812&utm_content=newnext
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304915.53/warc/CC-MAIN-20220126041016-20220126071016-00316.warc.gz
en
0.95748
5,386
2.734375
3
EXPLANATIONS OF SIGNIFICANT CONCEPTS IN NOTE: The following explanations are composites of: traditional definitions of the terms used in the social science literature; comments from the literature in ethnogerontology; and insights provided by the team of authors who are members of the Collaborative on Ethnogeriatric Education. Published sources used are referenced. Culture: the way of life of a population, including shared knowledge, beliefs, values, attitudes, rules of behavior, language, skills, and world view among members of a given society. It shapes human behavior because it is the foundation of conscious and unconscious beliefs about "proper" ways to live. Cultures change constantly. Different members of a society internalize and express different parts of their culture. Subcultures can also reflect differences by geographic region or other subgroups within a larger society (Andrews & Boyle, 1995; Henderson, 1990: Klein, 1995). Cultural Competence in Geriatrics: Ability to give health care in ways that are acceptable and useful to elders because it is congruent with their cultural background and expectations. At the provider level, it has been described as including the demonstrated integration of: At the institutional level, it can be viewed as those systems of care that acknowledge the importance of culture, assess cross-cultural relations, are alert to cultural differences and their repercussions and adapt services to meet cultural needs. Health care settings may be placed on a continuum of cultural competence that have been described as including stages of: monocultural, nondiscriminatory, and multicultural; or destructiveness, incapacity, blindness, competence, and proficiency (Cross, Bazron, Dennis, & Isaacs, 1989; Foster, Jackson, Cross, Jackson, & Hardiman, 1988; Green & Leigh, 1989; Lavizzo-Mourey & Mackenzie, 1997, Tirado, 1998; Tripp-Reimer, 1999). Cultural Guide or Cultural Broker: Consultants (health care, social service, senior service provider or respected leader) from the target ethnic population who can provide insight and information on health beliefs, culturally appropriate methods of showing respect to elders, and problem areas in health care interaction. Emigration: movement of individuals or groups OUT of the country or region of their original residence to settle in another area. Ethnic Group: originally defined by Gordon (1964) as a group of individuals with a shared sense of peoplehood based on race, religion, or national origin, it is now commonly used to refer to a group with a distinctive culture. Ethnicity is the active expression of culture. An ethnic group is a large group in which members self-identify. They internalize and share a heritage of, and commitment to, unique social characteristics, cultural symbols, and behavior patterns that are not fully understood or shared by outsiders. (Barresi & Stull, 1993; Gelfand, 1993; Markides, Liang, & Jackson, 1990; Valle, 1998). Ethnocentrism: belief or attitude that ones own cultural view is the only correct view. Ethnogeriatrics: health care for elders from diverse ethnic populations. Ethnogerontology: The study of the causes, processes, and consequences of race, national origin, culture, minority group status, and ethnic group status on individual and population aging in the three broad areas of biological, psychological, and social aging (Jackson, 1985). Geriatrics: health care for older adults. Gerontology: the study of aging. Immigration: movement of individuals or groups INTO a country or region to settle there. Minority: subgroup within a population. In social science, it is used to identify a group that suffers subordination and discrimination within a society, usually because of their race, ethnicity or national origin. The term is used by the federal government to describe protected and/or disadvantaged ethnic or racial populations (Hooyman & Kiyak, 1999; Markides, 1993). Race: socially constructed categories based on parentage and physical appearance. Although the term is now considered by many anthropologists to be obsolete because of difficulty classifying populations with widespread genetic diversity, it continues to be widely used. The term is used in official government documents, such as in the U.S. Census, in which individuals identify their own racial identity. It sometimes serves as a basis for discrimination and demarcation in conflicts over social resources (Fried & Mehrotra, 1998; U.S. Census, 1990). Spirituality: can be defined as whomever or whatever provides someone a transcendent meaning in life. It may be expressed as a relationship with ones god(s) or the creator, but can also refer to values such as: nature, energy force, belief in the goodness of all, or belief in the importance of family and community. Among some populations, it includes organized religion. It may or may not include belief in, and communication with, forces in the form of spirits (Puchalski, undated). Transcultural: a term used widely in nursing to apply to people of diverse cultures. Transcultural nursing is sometimes described as a body of humanistic and scientific knowledge with concomitant skills essential to help nurses care for people of diverse cultures (Leininger, 1997). REFERENCES FOR APPENDIX A Andrews, M. & Boyle, J. (1995). Transcultural Concepts in Nursing Care (2nd Ed.). Philadelphia: J.P. Lippincott. Barresi, C. & Stull, D. (1993). Ethnic Elderly & Long-Term Care. New York: Springer Publishing Co. Cross, T.L., Bazron, B.J., Dennis, K.W., & Isaacs, M. R. (1989). Towards a culturally competent system of care: A monograph on effective services for minority children who are severely emotionally disturbed. Washington, DC: Child and Adolescent Service System Program (CASSP), CASSP Technical Assistance Center, Georgetown University Child Development Center. Foster, B. G., Jackson, G., Cross, W. E., Jackson, B., & Hardiman, R. (1988, April). Training and Development Journal, pp. 1-4. Fried, S.B. & Mehrotra, C.M. (1998). Aging and Diversity: An Active Learning Experience. Washington, DC: Taylor and Francis. Gelfand, D. (1995). Ethnicity. In Maddox, G. Atchley, R., Evans, J.G., Finch, C, Hultsch, D., Kane, R., Mezey, M., & Siegler (Eds.) The Encyclopedia of Aging, 2nd Ed. New York: Springer Publishing Co. Green, J.W., & Leigh, J.W. (1989). Teaching ethnographic methods to social service workers. Practicing Anthropology, 11:8-10. Henderson, N., Alexander, L.G., & Mayka, M.G. (1990). Minority Alzheimers Caregivers: Removing Barriers to Community Services. Tampa, FL: Suncoast Gerontology Center, University of South Florida. Hooyman, N. & Kiyak, H.A. (1999). Social Gerontology, 5th Ed. Boston: Allyn & Bacon. Jackson, J. J. (1985). Race, national origin, ethnicity, and aging. In Binstock, R. and Shanas, E. (Eds.) Handbook of Aging and Social Sciences, New York: Van Nostrand Reinhold Company, 264-268. Klein, S. (Ed.) (1996). Ethnogeriatrics. In A National Agenda for Geriatric Education: White Papers. Washington, DC: Bureau of Health Professions, Health Resources and Services Administration. Lavizzo-Mourey, R.J. & Mackenzie, E. (1995). Cultural competence--an essential hybrid for delivering high quality care in the 1990s and beyond. Transactions of the American Clinical and Climatological Association, 107, 226-237. Leininger, M. (1997). Overview and reflection of the theory of culture care and the ethnonursing research method. Journal of Transcultural Nursing, 8, 32-52. Markides, K.S. (1995). Minorities and Aging. In Maddox, G. Atchley, R., Evans, J.G., Finch, C, Hultsch, D., Kane, R., Mezey, M., & Siegler (Eds.) The Encyclopedia of Aging, 2nd Ed. New York: Springer Publishing Co. Markides, K., Liang, J., & Jackson, J. (1990) Race, Ethnicity, and Aging: Conceptual and Methodological Issues. In Binstock, R H. & George, L.K. Handbook of Aging and the Social Sciences, 3rd Ed. San Diego: Academy Press, Inc. Puchalski, C. M. (Undated) A Spiritual History. Washington, DC: Center to Improve Care of the Dying, George Washington University. Tirado, M.D. (1998). Monitoring the Managed Care of Culturally and Linguistically Diverse Populations. Report funded by the Health Resources and Services Administration Center for Managed Care. U. S. Bureau of the Census & National Institute on Aging (1993). Racial and Ethnic Diversity of America's Elderly Population. Profiles of America's Elderly. Author. Valle, R. (1998). Caregiving Across Cultures. Washington, DC: Taylor and Francis.
<urn:uuid:9e4e86d1-17a9-4fd0-b625-25cbcb5ff2cb>
CC-MAIN-2014-52
http://web.stanford.edu/group/ethnoger/appendix_a.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770400.105/warc/CC-MAIN-20141217075250-00124-ip-10-231-17-201.ec2.internal.warc.gz
en
0.862488
2,037
3.875
4
It is common for people who feel wronged, maltreated, disrespected or harmed to feel hurt, become angry and develop resentment t6oward the perpetrator of these actions. The encouragement to be forgiving seems unnatural and instinctively unsafe. Yet, evidence suggests that forgiveness is the healthy avenue for the wronged individual’s emotional, physical, and relational wellbeing. The instinctual need for self-preservation evokes humans’ hurt, anger and wrath prompting the impulse to retaliate upon encountering a perceived physical, emotional or psychological threat. Anger, and outrage are commonly aroused to brace one for a fight to reclaim his/her body, family, property or rights and privileges considered to be his/her domain. For many people, others’ unkind treatment feels inexcusable and thus the animosity one harbors may feel justified and self-protective. Regrettably, this dynamic only further compromises one’s health and wellbeing. Everett L. Worthington, Jr., a Clinical Psychologist and Professor of Psychology at Virginia Commonwealth University and an author of 30 books, researched self-forgiveness and forgiveness of others. He found that larger injustices are harder to forgive than smaller injustices and that when the offended chooses to regard the offender as a valued person and forswear vengeance, “The forgiving person becomes less motivated to retaliate against someone who offended him or her and less motivated to remain estranged from that person. Instead, he or she becomes more motivated by feelings of goodwill, despite the offender’s hurtful actions.” Psychologist Dr. Charlotte van Oyen Vitvliet of Hope College asked people to think of someone who had hurt, mistreated or offended them while she took their blood pressures, heart rate, facial muscle tension, and sweat gland activity. She found that “when people recalled a grudge, their physical arousal soared, their blood pressure and heart rate increased and they sweated more. When they practiced forgiveness, their physical arousal coasted downward. They showed no more stress reaction than normal wakefulness produced.” This researcher also highlighted her findings that forgiveness is more easily produced when the offender sincerely apologizes and makes restitution to the offended. Dr. Worthington asserts that forgiveness can be learned and helps both the offender and the offended stabilize their emotions and sometimes rehabilitate their relationship as well. In non-intimate contact one may choose to be safe and withdraw from a hurtful individual. In friendships and love relationships one can more readily assess whether the other person is sincerely apologetic, able to reform his/her ways and is intent on not repeating the hurtful behavior. Learn to forgive: - Understand that many offenders do not intend to hurt or violate your rights or personhood and may truly learn to reform their conduct. - Ask the offender to apologize. Accept the apology for your emotional comfort and the offender’s learning opportunity. - Be cautious about accepting repeated apologies. They may be insincere. - Distance yourself from repeat offenders for your health and wellbeing. - Rejoice and affirm an offender who truly reforms his/her unkind conduct. - Praise yourself for helping an offender reform his/her ways.
<urn:uuid:d276a9b9-8c3d-41fb-bfea-5eac1c1f3cbe>
CC-MAIN-2018-34
http://www.relationshipmatters.com/forgiveness-is-a-win-win-gift/
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217354.65/warc/CC-MAIN-20180820215248-20180820235248-00660.warc.gz
en
0.943903
655
2.90625
3
- Stay within resource usage requirements. - Do not engage in or encourage activity that is illegal. - Do not engage in cryptocurrency mining. Ready for the real environment experience? YAML (Yet Another Markup Language) is a data serialization language that is widely used to configure modern cloud-based systems, tools, and software applications. YAML is known for being more human friendly than alternative textual data formats such as JSON or XML. Learning how to use YAML in different scenarios will make you more effective at configuring and deploying new systems and tools. In this lab, you will examine some practical examples of YAML configuration, and you will learn some advanced techniques to make using YAML more effective. Upon completion of this beginner level lab, you will be able to: - Identify when a file contains more than one YAML document - Use the Python scripting language to validate a YAML file - Reuse data in a YAML file using anchors and aliases - Control how line endings are handled in YAML strings - Cloud Architects - Data Engineers - DevOps Engineers - Software Engineers Familiarity with the following will be beneficial but is not required: The following courses and labs can be used to fulfill the prerequisites: Andrew is a Labs Developer with previous experience in the Internet Service Provider, Audio Streaming, and CryptoCurrency industries. He has also been a DevOps Engineer and enjoys working with CI/CD and Kubernetes. He holds multiple AWS certifications including Solutions Architect Associate and Professional.
<urn:uuid:ca24a3c1-4918-4215-a447-d12cdfbc292b>
CC-MAIN-2022-49
https://cloudacademy.com/lab/configuring-systems-and-tools-using-yaml/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710684.84/warc/CC-MAIN-20221128235805-20221129025805-00685.warc.gz
en
0.871933
364
2.671875
3
Mamolelekeng Nkoebele is a remarkable woman. What makes her different? She’s 82. And she’s single-handedly raising five orphaned great grandchildren by herself. Mamolelekeng lives in Teyateyaneng (commonly called TY) about 40kms from Lesotho’s capital, Maseru. Like 68% of Lesotho’s population she lives in a household defined as “poor”, meaning that Mamolelekeng cannot feed, clothe and educate her family. They survive on her pension and child support grants totaling just over US$50 a month. But that hasn’t stopped Mamolelekeng. “We used to live in a shack with holes in the roof,” said Mamolelekeng. “When it rained we put buckets around to collect the water. The three boys slept in one bed. There were four of us on the floor. We were packed like sardines. We didn’t have a choice.” Poverty runs deep in Lesotho with about 40% of about 2 million inhabitants living below the international poverty line of US $1.25 a day. However, being orphaned and poor is even worse. Orphans and vulnerable children (OVC) often live in unhealthy living conditions, are exposed to abuse, and struggle to access education and basic services. That’s why Mamolelekeng took them all in when their parents died.
<urn:uuid:2d469579-6fb8-443c-803b-5c42bb52620a>
CC-MAIN-2022-21
https://habitat.org.ls/last-test/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663039492.94/warc/CC-MAIN-20220529041832-20220529071832-00173.warc.gz
en
0.967152
323
2.578125
3
Following today’s release of NOAA’s monthly global temperature analysis, it’s time to look back at the first half of 2019. Using re-baselined NOAA and NASA data, we find that this year is on pace to be the 3rd hottest on record globally a ranking that would maintain the most recent five years as the hottest five on record. While U.S. temperatures have been close to average this year, rain totals continue to break records. June capped the nation’s wettest 12 months on record—just as May and April had before. Not much has changed since our late May raincheck, as vast swaths of the Plains and West still exceed year-to-date averages by 50% or more. On the plus side, 2019 has also seen more local clean energy commitments, from cities and states to utilities. Steps like these are an important start in limiting the emissions that lead to warming. METHODOLOGY: Monthly global temperature analyses are independently calculated by NASA and NOAA/NCEI. Climate Central combines the NOAA and NASA information to re-baseline global temperatures using an earlier pre-industrial baseline of 1881-1910 in response to the Paris Climate Change Agreement. NASA’s calculations are extended to account for temperature changes at the poles, where there are fewer stations. NOAA does not use any extrapolation to account for low station density at the poles.
<urn:uuid:d7b4423b-72b9-4ed3-8f51-8bccbd549320>
CC-MAIN-2020-05
https://blog.texasbeachhomes.com/2019-global-temperatures-in-top-5-hottest-on-record/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250603761.28/warc/CC-MAIN-20200121103642-20200121132642-00473.warc.gz
en
0.947403
291
3.15625
3
In May in Dallas-Fort Worth and across Texas, it rained and it rained. And then it rained some more. The rainfall set records, but the flooding was deadly and destructive. Here are seven things you should know about the May rain and floods: 1. This was the wettest May ever for Dallas-Fort Worth, the National Weather Service says. Dallas-Fort Worth recorded 16.96 inches of rain in May -- smashing the May 1982 record of 13.66 inches. Some parts of North Texas saw more than 25 inches of rain – particularly areas near the Texas-Oklahoma border. The heaviest rainfall was northeast of Gainesville, where nearly 29 inches of rain fell, the National Weather Service says. Parts of Fort Worth recorded about 15 inches, while Denton recorded nearly 12 inches. It was the second-wettest spring in North Texas – we saw 25.05 inches of rain in March, April and May. Only the spring of 1957 was wetter (29.01 inches). It’s also the second-wettest year in North Texas so far – we’ve recorded 31.63 inches from Jan. 1-May 31. No. 1 goes to 1957, when 32.50 inches fell during the first five months of the year. 2. May 2015 was the wettest May in state history, too. There was enough rain in Texas in May to cover the entire state with nearly 8 inches of water. That’s according to the National Weather Service. Meteorologists say that’s over 35 trillion gallons. All of this rain could lead to more mosquitoes -- and more reports of West Nile virus. — NWS Fort Worth (@NWSFortWorth) May 29, 2015 3. Say adios to the drought in Texas. For the first time since mid-2012, Texas is no longer in an “exceptional drought,” the worst of five drought categories, the U.S. Drought Monitor says. Parts of North Texas have been dry since 2011. Last Thursday, the Drought Monitor showed “abnormally dry” conditions in 18 percent of the state, mainly in several counties in the state’s midsection – between Lubbock and Fort Worth. And a few counties are classified as having “moderate drought.” More than 80 percent of the state is no longer in a drought – that’s a considerable improvement from May 2014, when just about 10 percent wasn't in a drought. Here’s a closer look at the end of the drought in Texas. 4. About 10 people remain missing from the Texas floods. At least 31 people were killed in Texas and Oklahoma in May from the storms. In Houston, bodies were found floating in bayous. Other people died while driving and trying to get to work – they got stuck in the water and drowned. In North Texas, a man's body was recovered from standing water Friday. In Mesquite, a man drowned in his truck after it was swept into a culvert. The Austin American-Statesman offers a list of those who died or missing in the Central Texas floods. 5. The storms have caused at least $27 million in damage to infrastructure across the state. That’s according to the Texas Department of Transportation. Roadways in 167 of Texas’ 254 counties have seen some storm damage. On Sunday, more than 155 roads were underwater or closed due to damage. Gov. Greg Abbott has declared a state of disaster in 70 counties. Among the North Texas counties: Collin, Denton, Ellis and Kaufman. President Barack Obama has signed a disaster declaration for Texas, which makes federal funding available to people affected by storms in Harris, Hays and Van Zandt counties. 6. In Dallas, the Trinity River has become a photo op thanks to the flooding. One said it used to be “just grass and weeds.” Now scores of people have been flocking to the river to snap pictures. — Maj. Max Geron (@MaxDPD) May 31, 2015 7. Videographers launched their drones to shoot dramatic scenes of the flooding. The forecast calls for sun – and more sun. In North Texas, the sun will be out all week long. We’ll see highs in the low to mid 80s all week. We could reach the low 90s Friday and Saturday. This report includes material from KERA’s Courtney Collins and The Associated Press.
<urn:uuid:b6bc7862-bf64-4225-94e0-b067afa7690f>
CC-MAIN-2018-13
http://keranews.org/post/7-things-you-should-know-about-mays-record-rainfall-north-texas
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647567.36/warc/CC-MAIN-20180321023951-20180321043951-00341.warc.gz
en
0.968281
928
2.515625
3
B's Cucumber Pages Last Modified: August 23, 1997 - Producing Vegetable Crops - by J.M. Swiader, G.W. Ware, and J.P. MacCollum. Danville, Illinois: Interstate Publishers Inc., 1992. - A History of Horticulture in America to 1860 - by U.P. Hedrick. Portland: Timber Press, 1950. - Greenhouse Tomatoes, Lettuce, and Cucumbers - by Wittwer, S.H., and S. Honma. East Lansing: Michigan State University Press, 1979. - Cooking A to Z - edited by Jane Horn. Santa Rosa: The Cole Group, 1992.
<urn:uuid:5a2a1245-61d8-4b84-bd30-8a6e119e7168>
CC-MAIN-2016-40
http://www.lpl.arizona.edu/~bcohen/cucumbers/refs.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738663142.93/warc/CC-MAIN-20160924173743-00096-ip-10-143-35-109.ec2.internal.warc.gz
en
0.706034
151
2.640625
3
Verbena officinalis - a perennial plant belonging to the family Verbenaceae. It grows mainly on dry meadows of Eastern, Central and Southern Europe. Blossoms in the first year of life - in August. Verbena flowers collected in the many long spike inflorescence-panicle. The plant can reach 60 cm in height. In October, the plant gives off. The chemical composition of Verbena officinalis Flowers and grass verbena contain essential oil, slime and bitterness, steroids (sitosterol), tannins, aukubin, verbenamin, flavonoids (artemetin), triterpenoids (ursolic acid, lupeol), silicic acid, vitamins, micro and macro, iridoidglikozid (verbenalin ) hastatozid, carotenoids. The leaves of the plant contain ascorbic acid. Harvesting of medicinal vervain As a medicinal plant serves the entire aboveground part of the plant, as well as verbena flowers, seeds and roots. Verbena grass collected during flowering and dried in an oven at 50-60 ° C. You can also dry the plant is outdoors, or in a dark dry place. In oriental medicine herb verbena is used as an antitumor agent for tumors of the reproductive organs, as a sweatshop and contraceptive agents and for the treatment of eczema and ulcers. Verbena improves digestion, stimulates the appetite, enhances the secretion of gastric juices, improves liver function, stimulates blood circulation, normalizes metabolism, tones the nervous system. Preparations on the basis of this plant have antiseptic, anti-inflammatory, analgesic, antispasmodic, choleretic, laxative, astringent, tonic, wound healing, tonic and antiscorbutic properties. Inside the plant-based drugs prescribed for SARS, laryngitis, bronchitis, pneumonia, rheumatism, tracheitis, headaches, loss of strength, cholelithiasis, hypotension, anemia, thrombosis, chronic gastritis, chronic hepatitis, atherosclerosis, cholecystitis. Use verbena in folk medicine The leaves, stems and flowers of verbena is used for headaches, as well as lotions with scrofula, rash, acne, psoriasis, eczema, ulcers, scabies. Do analgesic lotions from toothaches, inflammation of the mucous membranes of the mouth and throat. From the crushed leaves of the plant make poultices for skin diseases for external use in nonhealing wounds. Numerous positive comments about the vervain suggest that if the fresh herb rub and make him a poultice, it helps with bruises. And at a fever drink herbal tea verbena. The root of the plant is used as a patch in the cervical abscesses, mumps and scrofula. Also used essential oil of verbena. Reviews of many patients indicate that it helps in the loss of strength and exhaustion, inflammation of the liver, and anemia. Some reviews of vervain have shown that it is better not to use drugs on the basis of plants for hypertension during pregnancy and lactation, children under the age of 14 years, as well as in case of hypersensitivity to the components of the plant. Before use, better to consult a doctor. Reviews of vervain suggest that long-term use of drugs based on plants can irritate the intestinal mucosa.
<urn:uuid:39cb43b7-7914-4e8a-aa2f-06c019b479a0>
CC-MAIN-2018-09
http://noillen.bitballoon.com/medicine2/grass-verbena-offici574
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816841.86/warc/CC-MAIN-20180225170106-20180225190106-00004.warc.gz
en
0.865883
750
2.734375
3
A floodplain is an integral part of the stream system. It provides storage capacity for high flows, helps reduce the erosive power of the stream during a flood, reduces the discharge of sediment during high flow periods and helps flood waters to move downstream. Floodplains also offer opportunities for wildlife habitat which can increase the biotic diversity of a stream. The 100-year floodplain is that land area adjoining the stream that has a 1% or greater probability of flooding in any given year. Floodplains provide a stream with buffer and water quality benefits as well. It is the policy of the Prince George's County Government to preserve the 100-year floodplain as part of the natural system of a stream, and to further preserve it in a natural state in order to provide adequate storage for flood waters and sufficient carrying capacity to safely move flood waters downstream. Where existing structures in the 100-year floodplain cannot be protected in an environmentally sensitive and cost effective manner, the County may offer to acquire them to reduce the potential for property damage and eliminate potential obstruction of flood waters. Future development is regulated within the ultimate 100-year floodplain. Prince George's County utilizes ultimate land-use conditions hydrology to determine flood discharges and to generate flood elevations for areas of the County under growth and development. Ultimate conditions hydrology reflects projected land-use conditions based on a community’s zoning maps and/or comprehensive land-use plans. Prince George's County has, through the Maryland-National Capital Park and Planning Commission, established a policy to acquire stream valley parks throughout the County. Stream valley park acquisition permits public ownership of the floodplain, thus eliminating pressure for private development and providing recreational opportunities. Stream valley parks will continue to be an important component of the County’s recreation, open space and flood management programs. Flood Management for Prince George's County is guided by the following goals: - Reduce or eliminate existing flood hazards; - Prevent future flood hazards from developing; - Reduce the economic losses associated with flooding events; - Provide for expanded recreational and aesthetic opportunities in the County; - Restore, preserve and enhance environmental quality wherever possible; and - Improve the quality of life in Prince George's County. The Floodplain Ordinance was adopted by the County Council in April of 1989 and amended in 1993, 2000, and 2011. The Prince George's County Floodplain Ordinance is modeled after an ordinance suggested by the Maryland Department of the Environment (MDE). The Federal Emergency Management Agency (FEMA) contracted with MDE to review local floodplain ordinances to assure that they met FEMA requirements for eligibility for flood insurance. The ordinance generally discourages filling or construction in the floodplain, but allows for a variance under certain circumstances, for example, to meet an important public need. Where filling is needed within the floodplain, an equal volume of compensatory storage must be provided. Furthermore, an impact study is needed to ensure that the floodplain elevation will not be increased. The ordinance also contains requirements for the protection of buffers, wetlands and other natural features associated with the floodplain. Prince George's County has been participating in FEMA’s National Flood Insurance Program (NFIP) since 1972. The current effective Flood Insurance Rate Map (FIRM) can be reached by clicking on the FEMA Floodplain Map of Prince George's County link. On September 30, 2010, FEMA issued preliminary updates to the Flood Insurance Study and Flood Insurance Rate Map for Prince George’s County. To access the preliminary study and map, please click on the following link: Preliminary Flood Insurance Rate Map.
<urn:uuid:1eceb91a-2842-41a2-b7cd-cc3878e39629>
CC-MAIN-2015-35
http://www.princegeorgescountymd.gov/sites/Sustainable/Services/FloodManagement/Pages/Introduction-Flood-Management.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645330174.85/warc/CC-MAIN-20150827031530-00169-ip-10-171-96-226.ec2.internal.warc.gz
en
0.914358
734
2.78125
3
Arthritis explained to Kids! Lack of understanding Arthritis information for children is important to enable them to understand a little bit about it, especially when a close member of the family is quite obviously affected. Many parents have limited information themselves or are unable to clearly explain and from a child's perspective it could be distressing observing from the sideline not understanding or knowing if there is anything they can do to help Arthritis symptoms being experienced by a grandparent or an elderly friend of the family that a child could find distressing may include the inability to walk unaided or to stand for any length of time, obvious chronic or sudden very severe hip, knee, neck or back or muscle pain rendering the patient to frequent periods of inactivity. Also, the appearance of joint deformity after being damaged by the arthritis disease process can be unsightly and could be a source of alarm or distress to a child. At this time there is no known cure for arthritis but relief is available from a variety of sources. Natural or complementary medicine remedies include for example, herbs and homeopathic remedies, acupuncture, nutritional supplementation, arthritis diets etc Other therapies used in the treatment of arthritis include, physical therapy including the application of heat or cold, exercising in water (hydrotherapy), massage, surgery and drugs. Drugs of varying types and strengths and liniments and creams are all used with the purpose of relieving pain and inflammation. Occupational therapy could include the application of a splint to keep a joint in a comfortable but useable position, for example. How the book came about I had been nursing for well over 20 years, much of that time spent in planning and the implementation of care and management for patients with various forms of arthritis. It occurred to me one day, that there was absolutely no literature at all available, that I was aware of, for children about arthritis .....so I resolved to change that. The end result was this children's book, "Mr Ashton has Arthritis". It was well received among families, arthritis special interest groups and libraries particularly in Australia and now is available internationally as an e-book. Arthritis is very common Never in human history have we lived so well or so long. Unfortunately, the frequency of diseases such as arthritis and related disorders, which become more common as we age, has increased with the aging of society. This book provides an opportunity for children to improve their understanding of the problems, causes and management of arthritis in the elderly. "Why does Grandma walk like that? Why doesn't Grandpa want to kick a ball anymore?" Children often find it difficult to understand the problems of arthritis, although as our population ages, they will come across many people with poor mobility due to degenerative joint diseases The book contents This book gives an accurate account of a young boy's elderly neighbour who manages on his own with a support network despite having quite painful and advanced osteoarthritis. Younger children with a grandparent, relative or neighbour with troublesome arthritis would definitely benefit from reading this book. This book has diagrams and is illustrated in a fun and often, poignant way. It includes a special note for parents and teachers and local, national and international resources. This excellent introduction to arthritis for children is just one click away........the subject matter is very timely, well researched and easily understood. I am ready to order...."Mr Ashton has Arthritis" an ebook Now! a mini e-book for only $5.95 CLICK FOR IMMEDIATE DOWNLOAD! About the author Elizabeth Gray was a registered nurse for over 30 years. Much of her work was concerned with the rehabilitation and management of degenerative diseases. To learn more about Elizabeth's other publications:
<urn:uuid:b8508bf5-09a9-4fcf-9aed-105a63ceb5e2>
CC-MAIN-2017-17
http://www.arthritis-explained.net/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118950.30/warc/CC-MAIN-20170423031158-00454-ip-10-145-167-34.ec2.internal.warc.gz
en
0.96419
767
2.671875
3
Genesis creation narrative facts for kids(Redirected from Genesis creation myth) |Genesis creation narrative| The Creation of Light by Gustave Doré |Part of:||Book of Genesis in the Bible.| The Genesis creation myth, found in the first two chapters of the Book of Genesis in the Bible, describes a supernatural beginning of the earth and life, ending with the creation of humans in the image of God. The creation myth is part of the Bible of Judaism and Christianity. Chapter 1 tells of God's creation of the world, ending with the consecration of the seventh day as the Sabbath. Man and woman are created to be God's rulers over the new creation. Chapter 2 tells of God's planting a garden in which he places the first man, and from whose rib he creates the first woman. The chapter ends by saying marriage is holy. Images for kids The Ancient of Days (William Blake, 1794) Genesis creation narrative Facts for Kids. Kiddle Encyclopedia.
<urn:uuid:1757cd18-5bfd-4cba-a520-6f9cf68a27da>
CC-MAIN-2020-45
https://kids.kiddle.co/Genesis_creation_myth
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107916776.80/warc/CC-MAIN-20201031062721-20201031092721-00668.warc.gz
en
0.879682
208
2.96875
3
Study Methods of Wireless Power Transfer Technology in Electric Vehicle Charging By, Chris Mi Co-written by Subhadeep Bhattacharya and Manoj Kumar Mallela, editors of IEEE TEI Newsletter This article is written based on the part of presentation given by Dr. Chris Mi at the Wireless Power Transfer (WPT) workshop at The University of Michigan in Dearborn, MI, March 13 2014. Dr. Chris Mi is a Professor of Department of Electrical and Computer Engineering at the University of Michigan in Dearborn. Contrary to general belief, wireless power transfer (WPT) has been in use for a long time (Fig. 1). The microwave oven uses the concept of wireless power transfer to heat food. Laser is another method which uses similar concept as wireless power transfer. Fig. 2 shows the various methods of wireless power transfer. However, most of these methods are not designed for the transfer of electricity, especially for an Electric Vehicle (EV). So, there is a requirement to understand the methods to study the Wireless Power Transfer technology related to Electric Vehicle (EV) charging. In this context, wireless power transfer using Electromagnetic Resonance (or otherwise, inductive charging) which can transfer power over medium distance (range of millimeters to tens of centimeters) is the topic of discussion. |Figure 1: Timeline of wireless charging evolution There are many challenges to achieve efficient wireless power transfer such as size, cost, and dependence on alignment, range, and efficiency. For example, unlike the traditional compact transformer, the size of the coil for WPT must be at least three times the power transfer distance. Efficiency and cost optimizations are other challenges a typical wireless power transfer system normally faces. Thus, a study of wireless power transfer deals with the physical parameters and their effects on system parameters. Also, the effect of the Wireless Power Transfer on driver safety is an important consideration in the study of the system. |Figure 2: Methods of wireless power transfer (WPT) Fig. 3 shows an example of a typical wireless power transfer system. The AC power from the grid is rectified to DC with necessary power-factor correction circuits. The DC signal is converted into high frequency AC and connected to the secondary through a resonant circuit using isolation transformer. The secondary output of the transformer is rectified again to feed the battery for charging purpose. The resonant circuit ideally has a number of coils whose dimensions changes with power level and purpose of EV drive. |Figure 3: A simple secondary controlled WPT system (taken from Covic and Boys, Proceeding of the IEEE, 101 (6), pp. 1276, 2013) Fig. 3 shows that Wireless Power Transfer deals with multi-disciplinary studies involving power electronics, controls, and communication. Most importantly, it requires in-depth electromagnetic design analysis. The analysis of the system can be categorized into three methods: 1. Analytical Methods: – Equivalent circuit analysis – Scattering-parameter analysis 2. Numerical Methods: – Finite element analysis – electromagnetic – High frequency structured simulation – HFSS – Coupled field and lumped parameter analysis 3. Experimental Methods: – S-parameter measurements and parameter identification – Field measurements – Power and energy emission tests By using computer simulations, variations of the parameters such as magnetic field, total flux, and interaction of the human body to the field for different physical parameters of the system can be generated and analyzed. Simultaneously, system level simulations can be utilized to predict cost and design of switching devices and other electrical equipments needed to maintain an acceptable working condition. However, a physical design experiment is critical for the validation and optimization of the design. |Figure 4: Equivalent electrical circuit of the system Fig. 4 shows the equivalent electrical circuit of the system. The main purpose of equivalent circuit analysis is to find the circuit parameters as mentioned above. In the equivalent circuit, the mutual inductance is only around 10% of the total inductance. The remaining inductance is due to the leakage inductance of the system. The purpose for having a series capacitance in the circuit is to cancel the leakage (or self) inductance, so that all the voltage in the primary winding is applied on the mutual inductance, thus the secondary winding receives the full input voltage with any appreciable drop. The secondary side of the circuit contains identical reactance and capacitance such that the full voltage is applied to the load device during resonance. This circuit can be used to obtain the equations of input and output voltage. The primary and secondary currents can also be obtained by knowing the values of resistances. The output power ( ), input power ( ) and efficiency ( ) of the equivalent circuit can be calculated as As can be seen, the efficiency of the system depends on mutual inductance, load resistance (equivalent to the resistance of battery), primary impedance, secondary impedance, and power factor. The system frequency is the only part of the equation which not necessarily depends on the system configurations. So, the frequency of the system plays a crucial role in determining the efficiency of the system. The efficiency of the system can vary from 20% to more than 90% depending upon the design parameters. It should be noted, however, that the calculated efficiency does not take the account of eddy current losses, cable losses, and shielding losses. When the equivalent circuit is working under resonance condition, the power factor of the system equals to one. Looking at the efficiency equation, further simplifications can be done. Also, as the position of the system (i.e. coils) changes due to problems with misalignment and drift, the parameters (Lm, L1 and L2) will change with further impact on the efficiency of the system. Thus, the circuit has to be re-tuned so that the new system frequency takes care of the change in the system parameters. Instead of series-series resonance circuit, the series-parallel topology can also be used which reportedly has the advantage of secondary acting as current source for battery charging (Fig. 5). |Figure 5: Equivalent electrical circuit with series-parallel technology The calculation of the mutual impedance using analytical method is very difficult, especially if the shape of the coil is a rectangular or square. This necessitates use of numerical method as a better solution for the analysis. Also, the coupling coefficient is typically measured by indirect methods such as short circuit method and open circuit method. When the secondary is short-circuited, the current in the secondary can be measured by applying high frequency in the primary. The coupling coefficient can then be derived from the secondary current, knowing the initial primary current. During experimental analysis of the system, system parameters may not match with simulated parameters due to natural drift. The circuit is needed to be tuned to reduce the difference between the measured and simulated parameters. A wireless power transfer network can also be analyzed as a two-port network as the charging system naturally has two inputs and two output terminals. The two-port network method describes the interaction between the input and output terminals. Although the analysis of the two-port method requires significant computation, it makes the calculation of efficiency, power transfer much more simple than using numerical methods. Also, if several resonance circuits are placed in series, a two-port network method to analyze the equivalent circuit has obvious advantages over other methods. The important selection of the switching frequency, which effectively determines the physical parameter and efficiency of the system, depends on various factors. For low frequencies (e.g., 400 Hz) the resonant coil may become large. Also, an expected 50-100 kW power transfer effectively makes 100 kHz switching frequency range unusable due to increased switching losses in the system. Thus, a frequency of 20 kHz has been taken as reasonable for power transfer at 50-100 kW levels. Currently under study, it is estimated that 20 kHz to 80 kHz are optimal frequencies for medium and high power levels, respectively. Now, a study on system parameters and their effect on efficiency and other factors can be improved using the system simulation tools (Fig. 6). It can be utilized to simulate the circuit for increased range and wide-range of misalignments, typically seen in real-world EV applications. |Figure 6: System simulation tools (acknowledge ANSYS for this drawing) Various coil designs (Fig. 7) such as circular pads, flux-pipe pads, DD-DDQ bipolar pads have been proposed to improve the misalignment tolerance. The alignment abnormalities can arise from various factors such as length and height of the car and angle variations due to improper tire inflations. When the system is under proper alignment, the efficiency of power transfer is high. Any variations in alignment results in weak coupling coefficient that impacts efficiency and power transfer levels. |Figure 7: Coil designs for WPT system (taken from Nguyen et al., "Feasibility study on bipolar pads for efficient wireless power charges, IEEE Applied Power Electronics Conference, Forth Worth, TX, March 2014) Different optimization objectives can be used to increase the efficiency of the system. For example, experimental analysis shows that system losses depend on the number of ferrite materials used in the system. With more number of ferro-magnetic materials to guide flux-path, one achieves better efficiency. It has been observed that there is no significant change in efficiency when more than five ferrite materials have been used. Thus, use of three ferrite materials has been taken as an optimal solution, taking cost of additional materials into consideration. An important objective of optimizing the efficiency of the system for various operating condition is that the wireless power transfer should be efficient even for a large variation from the ideal behavior of the system. As seen from Fig. 8, (which shows the variation of coupling coefficient with coil alignment for different coil designs) for different coil designs, the coil with better response for misalignment is a good choice for the efficient power transfer in real conditions. |Figure 8: Coupling vs. coil alignment This review on wireless power transfer dealt with the equivalent circuit of the wireless power transfer using magnetic resonance. Different notions of optimizing the efficiency have been discussed. As we go along with more penetrations of wireless power transfer in real-world EV battery charging, public perception will move towards using this viable technology. About the Newsletter TEC Call for Articles 2023 - Advances in Charging Systems The TEC eNewsletter is now being indexed by Google Scholar and peer-reviewed articles are being submitted to IEEE Xplore.
<urn:uuid:41d79f45-61be-4680-9628-2f49d47470fb>
CC-MAIN-2024-10
https://tec.ieee.org/newsletter/july-august-2014/study-methods-of-wireless-power-transfer-technology-in-electric-vehicle-charging
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476180.67/warc/CC-MAIN-20240303011622-20240303041622-00341.warc.gz
en
0.91458
2,160
3.03125
3
Home / Auditorium The auditorium is a central and important space in any high school lucky enough to have one.The acoustical design of an auditorium is different than that of any other high school space, because of the specific demands of the performing arts, which distinguish the auditorium from a common lecture hall. An auditorium is a room built to enable an audience to hear and watch performances. For movie theatres, the number of auditoria (or auditoriums) is expressed as the number of screens. Auditoria can be found in entertainment venues, community halls, and theaters, and may be used for rehearsal, presentation, performing arts productions, or as a learning space. These terms are commonly found in design standards manuals, building codes, and similar architectural reference documents. Each size is unique, with specific guidelines governing row size, row spacing, and exit ways. Basically, a multiple-aisle arrangement will have a maximum of 14–16 chairs per row with access to an aisle-way at both ends. In a continental arrangement, all seats are located in a central section. Here the maximum quantity of chairs per row can greatly exceed the limits established in a multiple-aisle arrangement. In order to compensate for the greater length of rows allowed, building codes will require wider row spacing, wider aisles, and strategically located exit doors.
<urn:uuid:0fe92aab-d8ef-44e3-931e-b67333da5db1>
CC-MAIN-2021-10
https://aisdelhi.net/auditorium.php
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178362481.49/warc/CC-MAIN-20210301090526-20210301120526-00028.warc.gz
en
0.926064
277
3.328125
3
American scholar Jared Diamond deploys his powers of interpretation to great effect in Collapse: How Societies Choose to Fail or Succeed, which seeks to understand the meaning behind the available evidence describing societies that have survived and those that have withered and died. Why, for example, did the Norsemen of Scandinavia who colonized Greenland in the early tenth century not survive, while the inhabitants of Highland New Guinea did? With the evidence to hand, Diamond notes that a society’s collapse tends to be preceded by a severe reduction in population and considerable decreases in political, economic and social complexity. Delving even deeper, Diamond isolates five major factors determine the success or failure of human societies in all periods of history: environmental degradation, which occurs when an ecosystem deteriorates as its resources are exhausted; climate change (natural or man-made); hostile neighbors; weakened trading partners; and access or otherwise to the resources that enable the society to adapt its challenges. The breadth of Diamond’s research provides the springboard from which to reach these definitions, but it inevitably also introduces complications; how can evidence produced by specialists in so many different disciplines be compared? Diamond’s ability to understand the meaning of the evidence at hand – and his readiness to seek and supply clarifications of meaning where necessary – underpin his achievement, and comprise a textbook example of how interpretative skills can provide a framework for strong critical thinking. Table of Contents Ways in to the text Who is Jared Diamond? What does Collapse: How Societies Choose to Fail or Survive Say? Why does Collapse: How Societies Choose to Fail or Survive Matter? Section 1: Influences Module 1: The Author and the Historical Context Module 2: Academic Context Module 3: The Problem Module 4: The Author's Contribution Section 2: Ideas Module 5: Main Ideas Module 6: Secondary Ideas Module 7: Achievement Module 8: Place in the Author's Work Section 3: Impact Module 9: The First Responses Module 10: The Evolving Debate Module 11: Impact and Influence Today Module 12: Where Next? Glossary of Terms People Mentioned in the Text Dr Rodolfo Maggio holds a masters degree in anthropology from the London School of Economics and a PhD in social anthropology from the University of Manchester. He is currently a postdoctoral researcher in the Department of Psychiatry at the University of Oxford.
<urn:uuid:44ef74f5-19d7-4db1-94a5-3aa5fff8fc0f>
CC-MAIN-2020-24
https://www.routledge.com/Collapse-How-Societies-Choose-to-Fail-or-Survive/Maggio/p/book/9781912128686
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347417746.33/warc/CC-MAIN-20200601113849-20200601143849-00436.warc.gz
en
0.895599
504
3
3
It’s human nature to love beauty. Even some animals like to show off their beauty. Human beings are intelligent life, not to mention. People can’t see their own beauty. In ancient times, people appreciated their own beauty through bronze mirrors or clear water. With the development of science and technology, there are many ways for us to see our own appearance, such as looking in the mirror, using mobile phone video, taking photos, etc. Many people look in the mirror every day and feel that they are very good-looking. But many people will find that when we take a picture with others, we are not in the mirror. In particular, some big head photos, classmates and colleagues take group photos. The self in the photo is very different from that in the mirror. It doesn’t feel like self. So some people have a doubt about their appearance: is the mirror and the self in the photo their true appearance? If the self in the mirror and photo is not the real self, what does the real self look like? Some people may have heard that the mirror can beautify themselves. The self in the mirror is about 30% better than the real appearance. Although many people don’t believe it, the real situation is so. In fact, the mirror has been deceiving us all the time. More and more people believe that they look better in the mirror than they really are, but why? How to explain it from a scientific point of view? According to scientists, one of the basic properties of a mirror is that it is upside down. Our human body is a structurally symmetrical shape, with symmetrical distribution of left eye, right eye, left face, right face, left hand, right hand and other body parts. The left face in the mirror is actually your right face, and the left hand is your right hand. Although the human body is symmetrically distributed, it is impossible for most people to achieve this perfect left-right symmetry. Most of them show left-right asymmetry. This difference may be very small, but it is very obvious in the mirror or photos. I believe many friends will find that their left and right eyes are not the same size, right and left hands also have subtle differences, this is asymmetry. This asymmetry, once we look in the mirror, our face in the mirror is actually the reverse situation of the real face, that is, our real face turns from positive to negative, often this situation will make you feel that your real self is not as good-looking as you are in the mirror, which is a kind of gap generated from the psychological level. Another scientific explanation is the “exposure effect”, which is also called the “seeing more effect”, “simple, simple) exposure effect”, “pure) contact effect, etc. it is a psychological phenomenon, which means that we will prefer things we are familiar with. Social psychology also calls this effect the law of familiarity. It means that we prefer familiar things and think familiar things are good-looking. We will meet some people in our daily life. When we meet for the first time, we feel that the other person is average in appearance, but when we meet more often, we will find that the other person is actually pretty good-looking. This is also why the family members who meet each other every day don’t think each other ugly. This is also the case among our colleagues at work. When we just entered the unit, we found that a colleague was ugly, but after working for a long time and contacting with him for a long time, we won’t feel his colleagues ugly. Sometimes, if you contact him for a long time, you feel much better than those strangers It’s too late. I believe everyone has heard of the word “love for a long time”. When men and women are in contact with each other for a long time, they will find that each other is actually good-looking. They will gradually change from ordinary friends to lovers, and finally get married and live together. This is actually the “exposure effect” of science. If the mirror turns your appearance upside down, it will not have much influence on your optimistic degree. You think you look better in the mirror because of this “exposure effect”. The reason why the self in the mirror is more beautiful than the real self is the “exposure effect”. Why is the self in the photo uglier than the real self? Here we will refer to another psychological term “frozen face effect”. It means that you look better in the dynamic than in the static. Because you are in the static state in the photo, the attraction of the static things is much weaker than that of the dynamic things, so you will find that the self in the photo is not as good-looking as the real self, and even less than the self in the mirror. Of course, if it’s an art photo, it’s another matter. Art photo itself has post beautification processing. I believe many people have the experience of taking a screenshot from the video. When we watch someone talking in the video, we don’t think there is any problem. We may also think that the other person is so handsome and beautiful. However, when we accidentally take a screenshot, we will find that each other’s appearance is funny and a little ugly. This is the result of changing from dynamic to static, which is the “frozen face effect”. Although “frozen face effect” is a psychological term, scientists have found a scientific explanation through research. The main reason for the “frozen face effect” is that the human brain is better at processing dynamic images. This is the evolution of human beings in the course of millions of years of evolution. We should know that our ancestors used their eyes to see the world, and our world itself is a dynamic world. The human brain can easily recognize dynamic things, but the response to static things is much weaker. Scientists have also proved this by observing the activity of the brain when the eyes observe dynamic and static things. When the eyes observe dynamic things, many areas of the brain are very active and excited. But when the eye looks at static things, the brain is not so excited, and many areas are not active. So when the human eye sees static photos and screenshots, it can only leave a “fuzzy” impression in the brain. Of course, how you look in a photo is also related to the focal length. Different focal lengths make great differences in your appearance. So it’s very difficult for us to understand each other’s real appearance through a photo. Especially now, people who are not very good-looking can also become good-looking through the beauty map. It’s very easy to turn black skin into white skin in the beauty map. Compared with photos, mirrors are more authentic though they are deceptive. Guys, what do you think of this? Welcome to leave a message below to discuss and express your opinions.
<urn:uuid:719d7d73-b750-4ffb-91fb-931d9d011dbe>
CC-MAIN-2021-39
https://recordunknown.com/are-you-in-the-mirror-and-photos-your-true-appearance-the-answer-is-what-you-dont-want-to-see/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057366.40/warc/CC-MAIN-20210922132653-20210922162653-00360.warc.gz
en
0.965981
1,490
2.671875
3
Autism Spectrum Disorder in the Inclusive Classroom, 2nd - download pdf or read online By Barbara L. Boroson With 1 in sixty eight young children now being clinically determined with Autism Spectrum illness, each instructor has to be able to train young ones with ASD. This attractive and informative book—now thoroughly revised and up-to-date to mirror the most recent records and research—will either assist you comprehend your scholars at the autism spectrum and supply suggestions to aid them achieve tuition. Drawing on 25 years of expertise operating with scholars with ASD, Barbara Boroson publications you to create a school room neighborhood that's attuned to the wishes of kids with ASD and permits all your scholars to profit and grow. Read or Download Autism Spectrum Disorder in the Inclusive Classroom, 2nd Edition PDF Best primary education books Actual task doesn't begin and result in the gym through the university day. It occurs throughout, each day to make the easiest lifelong newcomers. user-friendly school room lecturers as stream Educators discusses how academics can include stream into their day-by-day classes to aid scholars greater study and have interaction in a fit way of life. The tale of the far-reaching affects and classes of 1 instructor at the lifetime of one in all his scholars, either in the course of his time in class and past. the tale additionally serves as an encouragement to those that educate or teach to take an energetic curiosity of their scholars, because it can switch their lives. Tried-and-true classroom-tested classes and exercises for constructing a writing workshop in first grade—and maintaining it operating easily throughout the year. From getting ready fabrics and atmosphere the tone to instructing mini-lessons on tactics and craft to conferring and assessing, this entire source from grasp instructor Judy Lynch has every little thing you want to introduce the writing method to first graders and support them turn into trained writers. With such a lot of new schooling applied sciences being constructed and made to be had to colleges, how do teachers ascertain they opt for assets that improve inclusive instructing within the classroom? How are you able to make sure new applied sciences are built-in into on a daily basis educating? This new textual content helps trainee and starting lecturers to harness the facility of know-how to make their study rooms actually inclusive. - Using Drama to Teach Personal, Social and Emotional Skills (Lucky Duck Books) - Identifying and Supporting Productive STEM Programs in Out-of-School Settings - I AM Everything God Says I AM - Teaching Primary Humanities Additional info for Autism Spectrum Disorder in the Inclusive Classroom, 2nd Edition Autism Spectrum Disorder in the Inclusive Classroom, 2nd Edition by Barbara L. Boroson
<urn:uuid:593833c2-6df2-4afd-9e58-fc617f17c8ef>
CC-MAIN-2018-47
http://cfahec.org/download/autism-spectrum-disorder-in-the-inclusive-classroom-2-nd-edition
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741176.4/warc/CC-MAIN-20181113000225-20181113022225-00125.warc.gz
en
0.944633
566
2.8125
3
Driving for business in Wales Whatever vehicles your drivers are using, getting to 30mph requires more than twice as much energy as getting to 20mph. Evidence suggests that as a result of smoother driving styles, reducing braking and acceleration, improved traffic flow, and possible reductions in fuel consumption, 20mph produces less air pollution than 30mph. The existing 30mph speed limits for residential areas were set before World War II, when there were far fewer cars on the roads and speed limits were set without the wealth of research and data that now exists. Research indicates that the majority of drivers observe speed limits on residential streets, with findings from speed monitoring work in one of the pilot 20mph schemes in Wales showing that only around 6% of drivers required enforcement action to be taken against them, in the form of advice, a speed education course or other action. Under the new 20mph legislation, local councils are able to use their local knowledge to retain a 30mph limit where there is a case for doing so. These 30mph roads will be marked by signs in the same way that variations from the current default speed limit are used. You can find out more information about 20mph on the Welsh Government website, so that you can prepare your drivers for this change in good time. Interested in finding out more about the Driving for Better Business programme for those who employ drivers? Get started below.
<urn:uuid:c5a782d2-1d57-4421-bf47-0ea866fa075c>
CC-MAIN-2024-10
https://www.drivingforbetterbusiness.com/articles/new-20mph-limit-in-wales-for-business-drivers/
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474700.89/warc/CC-MAIN-20240228080245-20240228110245-00892.warc.gz
en
0.958368
280
2.8125
3
Hydraulic Design of Small Hydro Plants Version 2 STANDARDS/MANUALS/ GUIDELINES FOR SMALL HYDRO DEVELOPMENT Civil Works – Hydraulic Design Of Small Hydro Plants Lead Organization: Sponsor: Alternate Hydro Energy Center Indian Institute of Technology Roorkee Ministry of New and Renewable Energy Govt. of India May 2011 AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 1 1. GUIDELINES FOR HYDRAULIC DESIGN OF SMALL HYDRO PLANTS This section provides standards and guidelines on the design of the water conductor system. This system includes; head works and intake, feeder canal, desilter (if required), power canal or alternative conveyance structures (culverts, pipelines, tunnels, etc), forebay tank, penstock and surge tank (if required) up to the entry of the turbine, tailrace canal below the turbine and related ancillary works. 1. 1 HYDRAULIC DESIGN OF HEAD WORKS In general head works are composed of three structural components, diversion dam, intake and bed load sluice. The functions of the head works are: Diversion of the required project flow from the river into the water conductor system. Control of sediment. Flood handling. Typically a head pond reservoir is formed upstream of the head works. This reservoir may be used to provide daily pondage in support of peaking operation or to provide the control volume necessary for turbine operation in the water level control mode. This latter case would apply where the penstock draws its water directly from the head pond. Sufficient volume must be provided to support these functions. There are three types of head works that are widely used on mini and small hydro projects, as below: Lateral intake head works Trench intake head works Reservoir / canal intakes Each type will be discussed in turn. 1. 1. 1 Head Works with Lateral Intakes (Small Hydro) Head works with lateral intakes are typically applied on rivers transporting significant amounts of sediment as bed load and in suspension. The functional objectives are: To divert bed-load away from the intake and flush downstream of the dam (the bed load flushing system should be operable in both continuous and intermittent modes). To decant relatively clean surface water into the intake. To arrest floating debris at intake trashracks for removal by manual raking. To safely discharge the design flood without causing unacceptable upstream flooding. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 2 The following site features promote favourable hydraulic conditions and should be considered during site selection: The intake should be located on the outside of a river bend (towards the end of the bend) to benefit from the spiral current in the river that moves clean surface water towards the intake and bed load away from the intake towards the centre of the river. The intake should be located at the head of a steeper section of the river. This will promote removal of material flushed through the dam which may otherwise accumulate downstream of the flushing channel and impair its function. Satisfactory foundation conditions. Ideal site conditions are rare, thus design will require compromises between hydraulic requirements and constraints of site geology, accessibility etc. The following guidelines assume head works are located on a straight reach of a river. For important projects or unusual sites hydraulic model studies are recommended. A step by step design approach is recommended and design parameters are suggested for guidance in design and layout studies. Typical layouts are shown in Figures 2. 2. 1 to 2. 2. 3. 1. 1. 2 Data Required for design. The following data are required for design: Site hydrology report as stipulated in Section 1. 3 of this Standard giving: – Qp (plant flow) – Q100 (design flood flow, small hydro) – Q10 (design flood flow, mini hydro) (data on suspended sediment loads) – Cw – H-Q Curves (W. L. rating curves at diversion dam) Topographic mapping of the site including river bathymetry covering all head works structure sites. Site geology report. 1. 1. 3 Site Selection: Selection of the head works site is a practical decision which involves weighing of several factors including hydraulic desiderata (Section 2. 2. 1/1. 0), head optimization, foundation conditions, accessibility and constructability factors. Given the importance of intake design to the overall performance of the plant it is recommended that an experienced hydraulic engineer be consulted during studies on head works layout. 1. 1. 4 Determination of Key Elevations: AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 3 For the illustrative example: Qp = 10. 0 m3/s Determine V0 = 0. 5 Q0. 2 (= 0. 792, say 0. 80 m/s) (= 12. 5 m2) A0 = Q ? V0 A0 H= (= 1. 77 m, say 1. 80 m) 4 Assume L = 4H (= 7. 08 m, say 7. 0 m) ye = greater of 0. 5 yo or 1. 5 m (= 1. 80m) yd = L. S (= 0. 28 m) NOL = Z0 + ye + yd + H NOL = 97. 5 + 1. 80 + 0. 28 + 1. 80 (=101. 38m, say 101. 50 m) Sill = NOL – H (= 99. 7m) Crest of weir or head pond NOL = 101. 5 m Height of weir = 4. 0 m These initial key elevations are preliminary and may have to be adjusted later as the design evolves. 1. 1. 5 Head Works Layout The entry to the intake should be aligned with the river bank to provide smooth approach conditions and minimize the occurrence of undesirable swirl. A guide wall acting as a transition between the river bank and the structure will usually be required. Intake hydraulics are enhanced if the intake face is slightly tilted into the flow. The orientation of the intake face depends on river bank topography, for straight river reaches the recommended values for tilt vary from 10o to 30o depending on the author. When this angle becomes too large the intake will attract excessive amounts of sediment and floating debris. It is recommended that the sill level of the intake is kept sufficiently higher than the sill level of the under sluice. The under sluice should be located adjacent to the intake structure. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 4 For development of the head work plan, it is recommended that the following parameters be used for layout: Axis of intake should between 100° to 105° to axis of diversion structure The actual inclination may be finalized on the basis of model studies. Divide wall, if provided, should cover 80% to 100% of the intake. Assume flushing flow equal to twice project flow then estimate the width and height of the flushing gate from orifice formula,: Example should be in appendix. Qf = 0. 6 ? 0. 5W2 Where: Qf = flushing flow W = gate width H = gate height (= 0. 5W) Yo = normal flow depth as shown in 2. 2. 1. 1/2. 0 Sill should be straight and perpendicular to the flow direction. In the sample design (Fig. 2. 2. 1. 1) the axis of the intake = 105° & Qf = 2. 0? 10. 0 = 20m3/s ? 20. 0 = 0. 6 ? 0. 5 W2 ? W = 2. 8 m (say 3. 0m) and H = 1. 5 m. 1. 1. 6 Flood Handling, MFL and Number of Gates. For small hydro a simple overflow diversion weir would be the preferred option if flood surcharge would not cause unacceptable upstream flooding. For purpose of illustration, the following design data are assumed (see Figure 2. 2. 2): Design flood, Q100 = 175 m3/s A review of reservoir topography indicated that over bank flooding would occur if the flood water level exceeded 103. 0 m. Select this water level as the MFL. This provides a flood surcharge (S) of 1. 20 m. Assume weir coefficients as below: Gate, Cw = 1. 70 – – – sill on slab at river bottom. Weir, Cw = 1. 0 – – – – – – -ogee profile. Assume gate W/H ratio = 1:2 H = 4. 0 m ? W = 4. 8 (say 5. 0 m) MFL. = NOL + 1. 50 (= 103. 0m) Qgate = Cw. W. (MFL – ZS)1.. 5 Qweir = Cw. Lw. S1. 5 Capacity check for MFL = 103. 0 m No. of Length of Overflow QG Gates Section (m) (m3/s) 0 35. 0 0. 0 1 29. 0 109. 6 QW (m3/s) 82. 8 68. 6 QT (m3/s) 82. 8 178. 2 >175 AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 5 Therefore one gate is sufficient. Where: MFL = Maximum flood level (m) NOL = Normal operating level (m) S = flood surcharge above NOL (m) W = width of gate (m) H = height of gate (m) ZS = elevation of gate sill (m) = weir coefficient (m0. 5s-1) Cw QG, QW, QT = gate, weir and total flows The flow capacity of the sediment flushing gate may also be included in calculating flood handling capacity. 1. 1. 7 Diversion structure and Spillway Plains Rivers: Stability of structures founded on alluvial foundations typical of plains rivers, is governed by the magnitude of the exit gradient. The critical gradient is approximately 1. 0 and shall be reduced by the following safety factors: Types of foundation Shingles / cobbles Coarse sand Fine sand Safety factor 5 6 7 Allowable Exit Gradient 0. 20 0. 167 0. 143 Also diversion structures on plains rivers will normally require stilling basins to dissipate the energy from the fall across the diversion structure before the water can be returned safely to the river. Design of diversion weirs and barrages on permeable foundation should follow IS 6966 (Part 1). Sample calculations in Chapter 12 of “Fundamentals of Irrigation Engineering” (Bharat Singh, 1983) explain determination of uplift pressure distributions and exit gradients. Further details on structural aspects of design are given in Section 2. 3. 3 of this Standard. Mountain Rivers: Bedrock is usually found at relatively shallow depths in mountain rivers permitting head works structures to be founded on rock. Also the beds of mountain rivers are often boulder paved and are much more resistant to erosion than plains rivers. Therefore there may be no need for a stilling basin. The engineer may consider impact blocks on the downstream apron or simply provide an angled lip at the downstream end of the apron to “flip” the flow away from the downstream end of the apron. A cut-off wall to bed rock of suitable depth should AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 6 also be provided for added protection against undermining by scour. The head works structures would be designed as gravity structures with enough mass to resist flotation. For low structures height less than 2. 0 m anchors into sound bedrock may be used as the prime stabilization element in dam design. Stability and stress design shall be in accordance with requirements of Section 2. 3. 3 of this Standard. 1. 1. 8 Sediment Flushing Channel To be reviewed The following approach is recommended for design of the flushing channel: Select flushing channel flow capacity (Qf) = 2? Qp Estimate maximum size of sediment entering the pocket from site data or from transport capacity of approaching flow and velocity. In case of diversion weir without gates assume sediment accumulation to be level with the weir crest. (Assume continuous flushing with 3? Qp entering the pocket, for this calculation). Establish entrance sill elevation and channel slope assuming an intermittent flushing mode (intake closed) with Qs = 2Qp, critical flow at the sill, supercritical flow downstream (FN ? 1. 0) and a reservoir operating level 0. 5m below NOL. Determine slope of channel to provide the required scouring velocity, using the following formula which incorporates a safety factor of 1. 5: i = 1. 50 io d 9/7 i0 = 0. 44 6 / 7 q Where: io = critical scouring velocity d = sediment size q = flow per unit width (m3/s per m) Verify that flow through pocket in continuous flushing mode (Qs = 3Qs) will be sub critical, if not lower entrance sill elevation further. Determine height of gate and gate opening based on depth of flow at gate location and corresponding gate width. Increase the above theoretical gate height by 0. 5 m to ensure unrestricted open channel flow through the gate for intermittent flushing mode and a flushing flow of 2 Qp. For initial design a width to height ratio of 2:1 for the flushing gate is suggested. 1. 1. 9 Intake/Head Regulator: In intake provides a transition between the river and the feeder canal. The main design objectives are to exclude bed-load and floating debris and to minimize head losses. The following parameters are recommended: Approach velocity at intake entrance (on gross area) 0. 20 Ve = 0. 5 Q p m / s For trashracks that are manually cleaned, V should not exceed 1. 0 m/s. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 7 Convergence of side walls 2. 5:1 with rate of increase in velocity not exceeding 0. 5 m/s per linear m. • Height of sill above floor of flushing channel (ye) = greater of 1. 5m or 50% flow depth. • The floor of the transition should be sloped down as required to join the invert of the feeder canal. Check that the flow velocity in the transition is adequate to prevent deposition in the transition area. If sediment loads are very high consider installing a vortex silt ejector at the downstream end of the transition. Provide coarse trashracks to guard entry to the head gate. The trashrack would be designed to step floating debris such as trees, branches, wood on other floating objects. A clear spacing of 150 mm between bars is recommended. Trashrack detailed design should be in accordance with IS 11388. • The invert of the feeder canal shall be determined taking into consideration head losses through the trashrack and form losses through the structure. Friction losses can be omitted as they are negligible: V2 Calculate form losses as: H L = 0. 3 2 2g Where: V2 = velocity at downstream end of contraction. Calculate trashrack losses as: 4/3 V2 ?t? H L = K f ? ? . Sin? . 2g ?b? Where: Kf = head loss factor (= 2. 42 assuming rectangular bars) T = thickness of bars (mm) B = clear bar spacing (mm) ? = angle of inclination to horizontal (degrees) V = approach velocity (m/s) 1. 1. 10 References on Lateral Intakes and Diversion Weirs. IS Standards Cited: IS 6966 (Part 1) IS 11388 USBR (1987) Singh, Bharat Nigam, P. S. Hydraulic Design of Barrages and Weirs – Guidelines Recommendations for Design of Trashracks for Intakes Design of Small Dams Fundamentals of Irrigation Engineering Nem Chand & Bros. Roorkee (1983) Handbook of Hydroelectric Engineering (Second edition) ….. pages 357 to 365 Nem Chand & Bros. – Roorkee (1985) 1. 1. 11 Other References: Bucher and Krumdieck Guidelines for the Design of Intake Structures for Small Hydro Schemes; Hydro ’88/3rd International Conference on Small Hydro, Cancun – Mexico. Bouvard, M. Mobile Barrages and Intakes on Sediment Transporting AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 8 Razvan, E. 1. 2. Rivers; IAHR Monograph, A. A. Balkema – Rotterdam (1992) River Intakes and Diversion Dams Elsevier, Amsterdam (1988) SEMI PERMANENT HEADWORKS (MINI HYDRO) For mini hydro projects the need to minimize capital cost of the head works is of prime importance. This issue poses the greatest challenge where the head works have to be constructed on alluvial foundations. This challenge is addressed by adoption of less rigorous standards and the application of simplified designs adapted to the skills available in remote areas. A typical layout is shown in Figure 2. 2. 3. 1. 2. 1 Design Parameters Hydraulic design should be based on the following design criteria: Plant flow Qp) = QT + QD Where: QT = total turbine flow (m3/s) QD = desilter flushing flow (= 0. 20 QT) m3/s QFC = feeder canal flow (= 1. 20 QT) m3/s QF = gravel flushing flow (= 2. 0 QP) Spillway design flow (SDF) = Q10 Where: Q10 = flood peak flow with ten year return period. 1. 2. 2 Layout ? To be reviewed Intake approach velocity = 1. 0 m/s Regulator gate W/H = 2 Flushing channel depth (HD) = 2H + W/3 Flushing channel minimum width = 1. 0 m Assumed flushing gate W/H = 2, determine H from orifice equation, as below: Q f = 0. 53? 2 H 2 . 2 gY1 Y1 = HD for design condition Where: W width of gate (m) H = height of gate (m) Yi = upstream depth (m) = depth of flushing channel (m) HD Select the next largest manufactures standard gate size above the calculated dimensions. 1. 2. 3 Weir AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 9 Determine weir height to suit intake gate and flushing gate dimensions, as shown in Figure 2. 2. 3. For weirs founded on permeable foundations the necessary structure length to control failure by piping should be determined in accordance with Section 2. 2. 1/4. 1 of this Standard. A stepped arrangement is recommended for the downstream face of the weir to dissipate hydraulic energy. The height of the steps should not exceed 0. 5 m and the rise over run ratio should not less than 1/3, the stability of the weir cross-section design should be checked for flotation, over turning and sliding in accordance with Section 2. 3. 1. 1. 3 TRENCH INTAKES Trench intakes are intake structures located in the river bed that draw off flow through racks into a trench which conveys the flow into the project water conductor system. A characteristic of trench intakes is that they have minimum impact on river levels. Trench intakes are applied in situations where traditional headwork designs would be excessively expensive or result in objectionable rises in river levels. There are two quite different applications: on wide rivers and on mountainous streams, but the basic equations are the same for both types. The trench intake should be located in the main river channel and be of sufficient width to collect the design project flow including all flushing flows. If the length of the trench is less than the width of the river, cut off walls will be required into each bank to prevent the river from bypassing the structure. Trench weirs function best on weirs with slopes greater than 4%-5%, for flatter slopes diversion weirs should be considered. The spacing between racks is selected to prevent entry of bed load into the trench. The following terms are sometimes used in referring to trench intake designs. Trench weir, when the trench is installed in a raised embankment. • Tyrolean or Caucasian intakes, when referring to trench intakes on • mountainous streams. Features: AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 10 1. 3. 2 Design Parameters The following design parameters are suggested for the dimensioning of trench weirs. • Design Flows: The following design flows are recommended: Bedload flushing flow (from collector box) = 0. 2 QT • Desilter flushing flow = 0. 2 QT • Turbine flow = 1. 0 QT • Total design flow • = 1. 4 QT Dimensional Layout AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 11 The following factors should be considered in determining the principal dimensions: length, breadth and depth of a trench weir: Minimum width (B)= 1. 25 m (to facilitate manual cleaning) Length should be compatible with river cross section. It is • recommended that the trench be located across main river channel. Maximum width (B) ? 2. 50m. Trashrack bars longer than about 2. 50 m • may require support as slenderness ratios become excessive. Invert of collector box should be kept a high as possible. • • Racks • • • • The clear spacing between bars should be selected to prevent entry of bed-load particles that are too large to be conveniently handled by the flushing system. Generally designs are based on excluding particles greater than medium gravel size from (2 cm to 4 cm). A clear opening of 3. 0 cm is recommended for design. A slope across the rack should be provided to avoid accumulation of bed load on the racks. Slopes normally used vary from 0° to 20°. Rectangular bars are recommended. Bar structural dimension shall be designed in accordance with Section 2. 2. 1/5. 0 of this Standard. An appropriate contraction coefficient should be selected as explained in the following sub-section. Assume 30% blockage. Spacing between racks is designed to prevent the entry of bedload but must also be strong enough to support superimposed loads from bedload accumulation, men and equipment. This issue is discussed further in Subsection 2. 2. 3 / 2. 0. 1. 3. 3 Hydraulic Design of Trench Intake The first step in hydraulic design is to decide the width of the trench intake bearing in mind the flow capacity required and the bathymetry of the river bed. The next step in hydraulic design is to determine the minimum trench breadth (B) that will capture the required design flow. The design approach assumes complete capture of river flow, which implies, that river flow is equal to plant flow for the design condition. Hydraulic design is based on the following assumptions: Constant specific energy across racks. • Effective head on screen is equal to base pressure (depth) • Approach velocity is subcritical with a critical section at the entry to the structure as shown in figure 2. 2. 3/1. The set of equations proposed is based on the method given by Lauterjung et al (1989). • First calculate y1: AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 12 2 y 1 = k. H0 3 – – – – – – – – – – – (1) Where: y1 = depth at upstream edge of rack Ho = the energy head of the approaching flow k = an adjustment factor (m) m) (-) k is a function of inclination of the rack and can be determined from the following table: Values of k as a Function of Rack Slope (? ) Table: 2. 2. 1/1 ? = 0° 2° 4° 6° 8° 10° 12° k = 1. 000 0. 980 0. 961 0. 944 0. 927 0. 910 0. 894 ? = 14° 16° 18° 20° 22° 24° 26° k = 0. 879 0. 865 0. 851 0. 837 0. 852 0. 812 0. 800 Then calculate the breadth of the collector trench from the following equations (2) to (4) 1. 50 q – – – – – – – – – – – – – – (2) L= E1. E 2 C. cos? 3/2 . 2gy 1 Where: L = sloped length across collector trench (m) E1 = blockage factor E2 = Effective screen area = e/m C = contraction coefficient ? = slope of rack in degrees y1 = flow depth upstream from Equation 1. (m) q = unit flow entering intake (m3/s per m) e = clear distance between bars (cm or m) m = c/c spacing of bars (cm or m) Assume E1 = 0. 3 (30%) blockage. “C” can be calculated from the following formula (as reported by Raudkivi) Rectangular bars: ?e? C = 0. 66 ? ? ?m? ?0. 16 ?m? .? ? ?h? 0. 13 Assume h = 0. 5 y1. This formula is valid for 3. 5> – – – – – – – – – – – – – (3) h e >0. 2 and 0. 15< < 0. 30 m m Finally, the required breadth (B) can be determined as below: B = L cos ? – – – – – – – – – – – – -(4) AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 13 1. 3. 4 Hydraulic Design of Collector Trench Normally a sufficient slope on the invert of the trench is provided to ensure efficient flushing of bed-load particles that would otherwise accumulate on the invert of the trench. A suitable scouring slope can be estimated from the following equation: Ss = 0. 66 d 9 / 7 6/7 qo Where: d = sediment size (m) qo = flow per unit width (Q/B) at outlet of trench (m3/s per m) Ss = design slope of trench invert. The minimum depth of the trench at the upstream and is normally between 1. 0m to 1. 5 m, based on water depth plus a freeboard of 0. 3 m. For final design the flow profile should be computed for the design slope and the trench bottom profile confirmed or adjusted, as required. A step-by-step procedure for calculating the flow profile that is applicable to this problem can be found in Example 124, page 342-345 of “Open-Channel Hydraulics” by Ven. T. Chow (1959). In most cases the profile will be sub critical with control from the downstream (exit) end. A suitable starting point would be to assume critical flow depth at the exit of the trench. 1. 3. 5 Collector Chamber The trench terminates in a collector box. The collection box has two outlets, an intake to the water conductor system and a flushing pipe. The flushing pipe must be design with the capacity to flush the bed-load sediment entering from the trench, while the project flow is withdrawn via the intake. The bottom of the collection box must be designed to provide adequate submergence for the flushing pipe and intake to suppress undesirable vortices. The flushing pipe should be lower than the intake and the flushing pipe sized to handle the discharge of bed load. If the flushing pipe invert is below the outlet of the trench, the Engineer should consider steepening the trench invert. If the trench outlet invert is below the flushing pipe invert, the latter should be lowered to the elevation of the trench outlet or below. The deck of the collector box should be located above the design flood level to provide safe access to operate gates. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 14 1. 3. Flushing Pipe The flushing pipe should be designed to provide a high enough velocity to entrain bed-load captured by the weir. A velocity of at least 3. 0 m/s should be provided. If possible, the outlet end of the pipe should be located a minimum of 1. 0m above the river bed level to provide energy to keep the outlet area free from accumulation of bed load that could block the pipeline. 1. 3. 7 References on Trench weirs CBIP, (2001): Manual on Planning and Design of Small Hydroelectric Scheme Lauterjung et al (1989): Planning of Intake Structures Freidrich Vieweg and Sohn, Braunswchweig – Germany IAHR (1993): Hydraulic Structures Design Manual: Sedimentation: Exclusion and Removal of Sediment from Diverted Water. By: Arved J. Raudkivi Publisher: Taylor & Francis, New York. Chow (1959): Open- Channel Hydraulics Publisher: McGraw-Hill Book Company, New York. 1. 4 RESERVOIR, CANAL AND PENSTOCK INTAKES The designs of reservoir, canal and penstock intakes are all based on the same principles. However, there are significant variations depending on whether an intake is at the forebay reservoir of a run-of-river plant or at storage reservoir with large draw down or is for a power tunnel, etc. Examples of a variety of layouts can be fond in IS 9761 Hydropower Intakes – Criteria for Hydraulic Design or Guidelines for Design of Intakes for Hydropower Plants (ASCE, 1995). The features common to all designs are shown in the following sketch: AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 15 The objectives of good design are: To prevent entry of floating debris. • To avoid formation of air entraining vortices. • To minimize hydraulic losses. • 1. 4. 1 Control of floating debris To prevent the entry of debris a trashrack is placed at the entry to the intake. For small hydro plants the trashrack overall size is determined based on an approach velocity of 0. 75 m/s to 1. 0m/s to facilitate manual raking. Trashracks may be designed in panels that can be lowered into place in grooves provided in the intake walls or permanently attacked to anchors in the intake face. The trashracks should to sloped at 14° from the vertical (4V:1H) to facilitate raking. The spacing between bars is determined as a function of the spacing between turbine runner blades. IS 11388 Recommendations for Design of Trashracks for Intakes should be consulted for information about spacing between trashracks bars, structural design and vibration problems. Also, see Section 2. 2. 1/5 of this Standard. 1. 4. 2 Control of Vortices First of all the direction of approach velocity should be axial with respect the intake if at all possible. If flow approaches at a significant angle (greater than 45o) AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 16 from axial these will be significant risk of vortex problems. In such a situation an experienced hydraulic engineer should be consulted and for important projects hydraulic model studies may be required. For normal approach flow the submergence can be determined from the following formulae: S = 0. 725VD0. 5 S D V = submergence to the roof of the gate section (m) = diameter of penstock and height of gate (m) = velocity at gate for design flow. (m/s) Where: A recent paper by Raghavan and Ramachandran discusses the merits of various formulae for determining submergence (S). 1. 4. 3 Minimization of Head losses Head losses are minimized by providing a streamlined transition between the entry section and gate section. Minimum losses will be produced when a streamlined bellmouth intake is used. For a bellmouth intake the transition section is formed with quadrants of ellipses as shown in the following sketch. The bellmouth type intake is preferred when ever the additional costs are economically justified. For smaller, mainly mini hydropower stations, simpler designs are often optimal as the cost of construction of curved concrete surfaces may not be offset by the value of reduction in head losses. Details on the geometry of both types are given • Bellmouth Intake Geometry Geometries for typical run-of-river intakes are shown below: A gate width to height of 0. 785 (D): 1. 00 (H) with H = D is recommended. This permits some reduction in the cost of gates without a significant sacrifice in hydraulic efficiency. There is a second transition between the gate and penstock, rectangular to circular. For a gate having H = D and W= 0. 785D the flow velocity at the gate will be equal to the velocity in the penstock so no further flow acceleration is produced in this section. A length for this transition of 1. x D should be satisfactory. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 17 The head loss co-efficient for this arrangement in Ki =0. 10 Details for layout of bell mouth transitions connecting to a sloping penstock are given in IS9761. • Simplified layout (Mini-Hydro): For smaller/mini hydro projects intake design can be simplified by forming the transition in plane surfaces as shown below: The head loss for this design (Ki) = 0. 19V2/2g. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 18 . 4. 4. AIR VENT An air vent should be placed downstream of the head gate to facilitate air exchange between atmosphere and the penstock for the following conditions: • Penstock filling when air will be expelled from the penstock as water enters. • Penstock draining when air will enter the penstock to occupy the space previously filled by water. The air vent (pipe) must have an adequate cross section area to effectively handle these exchanges of air. The following design rules are recommended: Air vent area should the greater of the following values Where: (m3/s) AV = 0. 0 Ap or QT AV = 25. 0 (m2) AV = cross-section area of air vent pipe AP = cross-section area of penstock (m2) QP = turbine rated flow ( ? QT of more than one turbine on the penstock) The air vent should exhaust to a safe location unoccupied by power company employees on the general public. 1. 4. 5 PENSTOCK FILLING A penstock should be filled slowly to avoid excessive and dangerous “blowback”. The recommended practice is to control filling rate via the head gate. The AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 19 ead gate should not be opened more than 50 mm until the penstock is completely full. (This is sometime referred to as “cracking” the gate. ) 1. 4. 6 REFERENCES ON PENSTOCK INTAKES: • 1. 4. 7 Indian Standard Cited. IS 9761: Hydropower Intakes – Criteria for Hydraulic Design OTHER REFERENCES • Guidelines for Design of Intakes for Hydroelectric Plants ASCE, New York (1995) • Validating the Design of an Intake Structure : By Narasimham Raghavan and M. K. Ramachandran, HRW – September 2007. • Layman’s Guidebook European Small Hydro Association Brussels, Belgium (June 1998) Available on the internet. • Vortices at Intakes By J. L. Gordon Water Power & Dam Construction April 1970 1. 5. TRASHRACKS AND SAFETY RACKS 1. 5. 1 Trashracks: Trashracks at penstock intakes for small hydro plants should be sloped at 4 V: 1H to facilitate manual raking and the approach velocity to the trashracks limited to 1. 0 m/s or less. Use of rectangular bars is normal practice for SHP’s. Support beams should be alignment with the flow direction to minimize hydraulic losses. Detailed trashrack design should be done in accordance with IS 11388. 1. 5. 2 Safety Racks: Safety racks are required at tunnel and inverted siphon entries to prevent animals or people who may have fallen into the canal from being pulled into these submerged water ways. A clear spacing of 200 mm between bars is recommended. Other aspects of design should be in accordance with IS 11388. 1. 5. 3 References on Trashracks IS11388 – “Recommendations for Design of Trashracks for Intakes”. ASCE (1995) –“Guidelines for Design of Intakes for Hydroelectric Plants”. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 20 DRAWINGS: AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 21 AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 22 2. HYDRAULIC DESIGN OF WATERWAYS The waterways or water conduction system is the system of canals, aqueducts, tunnels, inverted siphons and pipelines connecting the head works with the forebay tank. This Section provides guidelines and norms for the hydraulic design of these structures. 2. 1 2. 1. 1 CANALS Canals for small hydro plants are typically constructed in masonry or reinforced concrete. Several typical cross section designs are shown below: AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 23 Lined canals in earth, if required, should be designed in accordance with Indian Standard: IS 10430. A further division of canal types is based on function: – Feeder canal to connect the head regulator (intake) to the desilter – Power canal to connect the desilter to the Forebay tank. 2. 1. 2 Feeder Canals 2. 1. 2. 1 Feeder canal hydraulic design shall be based on the following criteria: = Turbine flow (QT) + Desilter flushing flow (QF). Design flow (Qd) AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 24 2. 1. 2. 2 Scouring velocity: A sufficiently high velocity must be provided to prevent deposition of sediment within the canal. This (scouring) velocity can be determined from the following formulae: d 9/7 S C = 0. 66 6 / 7 n = 0. 015 q 1 1 ? VS = . R 2 / 3 . S C/ 2 n Where: Sc = Scouring slope d = Target sediment size (m) q = Flow per unit width (Q/W) (m/s/m) R = hydraulic radius (m) Vs = scouring velocity (m/s) n = Manning’s roughness coefficient 2. 1. 2. 3 Optimization: The optimum cross section dimensions, slope and velocity should be determined by economic analysis so as to minimize the total life time costs of capital, O&M and head losses (as capitalized value). The economic parameters for this analysis should be chosen in consultation with the appropriate regional, state or central power authorities these parameters include: – Discount rate (i) – Escalation rate(e) – Plant load factor – Service life in years (n) – Annual O+M for canal (% of capital cost) – Value of energy losses (Rs/kWh). Also see Section 1. 7 of this Standard. The selected design would be based on the highest of Vs or Voptimum. . 1. 2. 4 Freeboard: A freeboard allowance above the steady state design water level is required to contain water safely within the canal in event of power outages or floods. A minimum of 0. 5 m is recommended. 2. 1. 3 Power Canals: Power canal design shall be based on the following criteria a) Design flow = total turbine flow (QT) b) Power canal design should be based on optimization of dimensions, slope and velocity, as explained in the previous section. For mini-hydro plants Q < 2. 0 m3/s optimal geometric design dimensions for Type 1 (masonry construction) can be estimated by assuming a longitudinal slope of 0. 04 and a Manning’s n value of 0. 018. Masonry construction would normally be preferred for canals with widths (W) less than 2. 0 m (flow area = AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 25 2. 0 m2). For larger canals with flow areas greater than 2. 0m2, a Type 3, box culvert design would be preferred – based on economic analysis. c) Freeboard: A freeboard allowance above the steady state design level is required to contain water safety within the canal in event of power outages. The waterway in most SHP’s terminates in a Forebay tank. This tank is normally equipped with an escape weir to discharge surplus water or an escape weir is provided near to the forebay tank. For mini-hydro plants a minimum freeboard of 0. 50 m is recommended. The adequacy of the above minimum freeboard should be verified for the following conditions: • Maximum flow in the power canal co-incident with sudden outage of the plant. • Design flow plus margins for leakage losses (+0. 02 to +0. 05 QT) and above rated operation (+ 0. 1QT). • Characteristics of head regulator flow control. The freeboard allowance may be reduced to 0. 5 m after taking these factors into consideration. The maximum water level occurring in the forebay tank can be determined from the weir equation governing flow in the escape weir. 2. 1. 4 Rejection Surge Designs which do not incorporate downstream escape weirs would be subject to the occurrence of a rejection surge in the canal on sudden turbine shutdown, giving above static water levels at the downstream end, reducing to the static level at the upstream (entry) end of the water way. Methods for evaluating water level changes due to a rejection surge are explained in Section 2. 2. 2 / 7. 0 of this Standard. . 2 AQUEDUCTS Aqueducts are typically required where feeder or power canals pass over a gully or side stream valley. If the length of the aqueduct is relatively short the same channel dimensions as for the canal can be retained and there would be no change in hydraulic design. For longer aqueducts design would be based on economic analysis subject to the proviso that flow remains sub critical with NF ? 0. 8 in the flume sections. The following sketch shows the principal dimension of aqueduct entry and exit transitions and flume section. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 26 The changes in invert elevation across the entry and exit structures can be calculated by Bernouli’s equation as below: • Entry transition – consider cross – section (1) and (2); V2 V2 Z 1 + D + 1 = Z 2 + d + 2 + hL 2g 2g and 2 • b? V ? hL = 0. 10 ? 1 ? ?. 2 ? B ? 2g Z2 can be determined from the above equations, since all geometrical parameters are known. Flume – Sections (2) to (3) The slope of the flume section is determined from Manning’s equation 2 • ? Vn ? ( S ) = ? 2 / 3 ? . A Manning’s n = 0. 018 is suggested for concrete channels. ?R ? Some designers increase this slope by 10% to provide a margin of safety on flow capacity of the flume. Exit transition – consider cross section (3) and (4): V2 V2 Z 3 + d + 3 = Z 4 + D + 4 + hL 2g 2g AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 27 and 2 b? V ? hL = 0. 20 ? 1 ? ?. 3 ? B ? 2g Z4 can be determined from the above equations, since all geometrical parameters are known. The same basic geometry can be adapted for transition between trapezoidal canals sections and rectangular flume section, using mean flow width (B) = A/D. . 3. INVERTED SYPHONS 2. 3. 1 Inverted syphons are used where it is more economical to route the waterway underneath an obstacle. The inverted syphon is made up of the following components: • Entry structure • Syphon barrels • Exit structure • Entry Structure: Hydraulic design of the entry structure is similar to the design of reservoir, canal and penstock intakes. Follow the guidelines given in Section 2. 2. 2/2. of this Standard. • Syphon barrels: The syphon barrel dimensions are normally determined by optimization ? V? ? does not tudies, with the proviso that the Froude Number ? N F = ? gd ? ? ? exceed 0. 8. Invert elevations are determined by accounting for head losses from entry to exit of the structure using Bernouli’s equation. For reinforced concrete channels a Manning’s “n” value of 0. 018 is recommended. The head loss coefficients for mitre bends can be determined from USACE HDC 228. 2. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 28 AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 29 Exit structure: The exit structure is designed as a diverging transition to minimize head losses; the design is similar to the outlet transition from flume to canal as discussed in Subsection 2. 2. 2/2 of this Standard. The following sketches show the layout of a typical inverted siphon. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 30 2. 3. 2 Reference on Aqueducts and Inverted Syphons “Hydraulic Structures” By C. D. Smith University of Saskatchewan Saskatoon (SK) Canada 2. 4. LOW PRESSURE PIPELINES Low pressure pipelines may be employed as an alternative to pressurized box culverts, aqueducts or inverted syphons. Concrete, plastic and steel pipes are suitable depending on site conditions and economics. Steel pipe is often an attractive alternative in place of concrete aqueducts in the form of pipe bridges, since relatively large diameter pipe possesses significant inherent structural strength. Steel pipe (with stiffening rings, as necessary), concrete and plastic pipe also have significant resistance against external pressure, if buried, and offer alternatives to inverted syphons of reinforced concrete construction. Generally pressurized flow is preferred. The pipe profile should be chosen so that pressure is positive through out. If there is a high point in the line that could trap air on filling an air bleeder valve should be provided. Otherwise, hydraulic design for low pressure pipelines is similar to the requirements for inverted syphons. The choice of type of design; low pressure pipeline land pipeline material), inverted syphon or aqueduct, depends on economic and constructability considerations, in the context of a given SHP. Manning’s “n” Values for selected Pipe Materials Material Welded Steel Polyethylene (HDPE) Poly Vinyl Chloride (PVC) Asbestos Cement Cast iron Ductile iron Precast concrete pipe Manning’s “n” 0. 012 0. 009 0. 009 0. 011 0. 014 0. 015 0. 013(2) Note: (1) From Table 5. 4 Layman’s Guide Book – ESHA (2) From Ven T. Chow – Open Channel Hydraulics AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 31 2. 5. TUNNELS 2. 5. 1 Tunnels often provide an appropriate solution for water conveyance in mountainous areas. Tunnels for SHP are generally of two types. • Unlined tunnels • Concrete lined tunnels On SHP tunnels are usually used as part of the water ways system and not subject to high pressures. . 5. 2 Unlined tunnels: Unlined water tunnels can be used in areas of favourable geology where the following criteria are satisfied: a) Rock mass is adequately water tight. Rock surfaces are sound and not vulnerable to erosion (or erodible zones b) are suitably protected. The static water pressure does not exceed the magnitude of the minor field c) rock stress. Controlled perimeter blasting is recommended in order to minimize over break and produce sound rock surfaces. Additionally, this construction approach tends to produce relatively uniform surfaces and minimizes the hydraulic roughness of the completed tunnel surfaces. Design velocities of 1. 5 to 2. 0 m/s on the mean AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 32 cross section area give optimal cross section design. It is normal practice to provide a 100mm thick reinforced concrete pavement over leveled and compacted tunnel muck in the invent of the tunnel. IS 4880: Part 3 provides additional guidance on the hydraulic design of tunnels and on the selection of appropriate Manning’s “n” values. 2. 5. 3 Lined Tunnels Where geological are unfavourable it is often necessary to provide concrete linings for support of rock surfaces. IS4880: Parts 1-7 give comprehensive guidelines on the design of lined tunnels. 2. 5. 4 High Pressure Tunnels Design of high pressure tunnels is not covered in this standard. For high pressure design, if required, the designer should consult an experienced geotechnical engineer or engineering geologist. For the purpose of this standard, high pressure design is defined as tunnels subject to water pressures in excess of 10m relative to the crown of the tunnels. 2. 5. 5 Reference on Tunnels IS Standards: IS 4880 “Code of Practice for the Design of Tunnels Conveying Water”. Other References: Norwegian Hydropower Tunnelling” (Third volume of collected papers) Norwegian Tunneling Society Trondheim, Norway. www. tunnel. no Notably: Development of Unlined Pressure Shafts and Tunnels in Norway, by Einar Broch. 2. 6. CULVERTS AND CROSS-DRAINAGE WORKS Small hydro projects constructed in hilly areas usually include a lengthy power canal routed along a hillside contour. Lateral inflows from streams and gullies intercepted by SHP canals often transport large sediments loads which must be prevented from entering the canal. The first line of defense is the canal upstream ditch which intercepts local lateral runoff. The flow in these chains must be periodically discharged or the drain capacity will be exceeded. Flow from these drains is usually evacuated via culverts passing underneath the canal. These culverts would normally be located where gullies or streams cross the canal alignment. The capacity of canal ditches should be decided taking into consideration the average distance between culverts. In the rare cases when distance between culverts is excessive, consideration should be given to diverting AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 33 itch flows across the canal in flumes or half round pipes to discharge over the downhill side of the canal at suitable locations. Culverts are usually required where the canal route crosses gullies or streams. Culverts at these points provide for flow separation between lateral inflows and canal inflows and often present the most economical solution for crossing small but steep valley locations. It is recommended that culverts design be based on the following hydrological criteria. • For mini hydro projects, 1 in 10 year flood (Q10) • For small hydro projects, 1 in 25 year flood (Q25) Where it is practical to extract the necessary basin parameters, the procedures given in Section 1. 4 should be applied. Otherwise design flows should be estimated from field measurements of cross section area and longitudinal slope at representative cross section of the gully or side stream. A survivable design approach is further recommended with canal walls strengthened to allow local over topping without damage to the canal integrity when floods exceed the design flood values. Detailed hydraulic design should be based on information from reliable texts or design guidelines – such as: “Design of Small Bridges and Culverts” Goverdhanlal • • 2. 7 2. 7. 1 “Engineering and Design – Drainage and Erosion Control”. Engineering Manual EM 1110-3-136 U. S. Army Corps of Engineers (1984) www. usace. army. mil/publications/eng-manuals Manufacturer’s guides, notably: – American Concrete Pipe Association www. concrete-pipe. org – Corrugated Steel Pipe Institute www. cspi. ca Power Canal Surges Power canals that are not provided with escape weirs near their downstream end will be subject to canal surges on rapid load rejections or load additions. The rejection surge will typically cause the downstream water level to rise above static level and may control the design of canal freeboard. For load additions there is a risk that the level will fall to critical at the downstream end and restrict the rate at which load can be taken on by the unit. The following formulae taken from IS 7916: 1992 can be used to estimate the magnitude of canal surges. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 34 Maximum surge height in a power channel due to load rejection may be calculated from the empirical formulae given below: For abrupt closure hmax = K 2 + 2 Kh For gradual closure within the period required for the first wave to travel twice the length of the channel: K hmax = + V . h / g 2 Where: hmax = maximum surge wave height, K = V2/2g = velocity head, V = mean velocity of flow, and area of cross sec tion h = effective depth = top width • Maximum water level resulting from a rejection surge at the downstream of a canal: Maximum W. L. = Yo + hmax • Minimum water level resulting from by a start up surge at the downstream end of a canal: Minimum W. L. = YS – hmax Where: Yo YS = steady state downstream water level static downstream water level. The maximum water level profile can be approximated by a straight line joining the maximum downstream water level to the reservoir level. 2. 7. 2 Canal Surges on Complex Waterways: For waterway systems comprising several different water conductor types, the above equations are not applicable. In such cases a more detailed type of analysis will be required. The U. S. National Weather Service FLDWAV computer program can be used to solved for the transient flow conditions in such cases (Helwig, 2002). 2. 7. 3 References IS Standards cited: IS 7916: 1992 “Open Channel – Code of Practice”. Other References “Application of FLDWAV(Floodwave) Computer Model to Solve for Power Canal Rejection Wave for Simple and Complex Cases”. P. C. Helwig Canadian Society for Civil Engineering Proceedings, Annual Conference Montreal, Canada (2002). AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 35 3. HYDRAULIC DESIGN OF DESILTERS 3. 1 BACKGROUND Sediment transported in the flow, especially particles of hard materials such as quartz, can be harmful to turbine components. The severity of damage to equipment is a function of several variables, notably: sediment size, sediment hardness, particle shape, sediment concentration and plant head. The control of turbine wear problems due to silt erosion requires a comprehensive design approach in which sediment properties, turbine mechanical and hydraulic design, material selection and features to facilitate equipment maintenance are all considered (Naidu, 2004). Accordingly the design parameters for desilter design should be made in consultation with the mechanical designers and turbine manufacturer. Where the risk of damage is judged to be high a settling basin (or desilter) should be constructed in the plant waterway to remove particles, greater than a selected target size. 3. 1. 1 Need The first design decision is to determine whether the sediment load in the river of interest is sufficiently high to merit construction of a desilter. There is little guidance available on this topic; however, the following limits are suggested by Naidu (2004): Table 2. 2. 3/1. 0 Concentration Suggested Maximum Allowable Sediment versus Plant Head. Parameter Head Maximum allowable sediment concentration Low and Medium Head Turbines ? 150 m High Head Turbines > 150 m 200 ppm 150 ppm 3. 1. 2 Removal Size There are also considerable divergences of opinion on the selection of design size for sediment removal. Nozaki (1985) suggests a size range of between 0. 3 mm to 0. 6 mm for plant heads ranging from 100 m to 300 m. Indian practice is to design for a particles size of 0. 20 m regardless of head. Some authors suggest that removal of particles smaller than 0. 20 mm is not practical. The adoption of 0. 20 mm is the design (target) sediment size is recommended for Indian SHP designs. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 36 3. 1. 3 Types of Desilters There are two basic types of desilters: Continuous flushing type Intermittent flushing type Guidelines for design of both types are given in this section. 3. 2. DESIGN CONSIDERATIONS 3. 2. 1 Data Requirements (Small Hydro Plants) It is recommended that a program of suspended sediment sampling be initiated near the intake site from an early stage during site investigations to ensure that sufficient data is available for design. The sampling program should extend through the entire rainy season and should comprise at least two readings daily. On glacier fed rivers where diurnal flow variations may exist, the schedule of sampling should be adjusted to take this phenomenon into account and the scheduled sampling times be adjusted to coincide with the hour of peak daily flow with another sample taken about twelve hours later. While it is often assumed that sediment load is directly related to flow, this is only true on the average, in a statistical sense. In fact it is quite likely, that the peak sediment event of a year may be associated with a unique upstream event such as a major landslide into the river. Such events often account for a disproportionately large proportion of the annual sediment flow. Therefore, it would also be desirable to design the sediment measurement program to provide more detailed information about such events, basically to increase the sampling frequency to one sample per 1 or 2 hours at these times. A five year long sediment collecting program would be ideal. Less than one monsoon season of data is considered unsatisfactory. Some authors suggest that the vertical variation of sediment concentration and variations horizontally across the river be measured. However, on fast flowing rivers inherent turbulence should ensure uniform mixing and sampling at one representative point should be sufficient. The data collected in a sediment sampling program should include: • Mean daily concentration of suspended sediment (average of two readings twelve hours apart) • Water temperature • Flow (from a related flow gauging program) The following additional information can then be derived from collected samples. AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 37 • • • A sediment rating curve (sediment concentration versus flow – where possible) Particle size gradation curve on combined sample Specific gravity of particles. It is also recommended that a petrographic analysis be carried out to identify the component minerals of the sediment mix. It is likewise recommended that experiments be made on selected ranges of particles sizes to determine settling velocities. A further discussion on the subject of sediment sampling is given in Avery (1989) The characteristics of the sediment on a given river as obtained from a data collection program will assist in selection of appropriate design criteria. 3. 2. 2 Data Requirements (Mini Hydro Plants) On mini hydro projects where resources and time may not be available to undertake a comprehensive sampling program, selection of design parameters will depend to a great extent on engineering judgment, supplemented by observations on site and local information. The following regional formula by Garde and Kothyari (1985) can be used to support engineering decision making. 0. 19 ?P ? 0 Vs = 530. 0 P0. 6. Fe1. . S0. 25 Dd . 10 .? max ? ?P? Where Vs = mean sediment load in (tonnes/km2/year) s = average slope (m/m) Dd = drainage density, as total length of streams divided by catchment area (km/km2) P = mean annual precipitation (cm) Pmax = average precipitation for wettest month (cm) Fe = ground cover factor, as below: 1 Fe = [0. 80 AA + 0. 60 AG + 0. 30 AF + 0. 10 AW ] ? Ai = arable land area AA = grass land area (all in km2) AG AF = forested area AW = waste land area (bare rock) 3. 2. 3 Design Criteria The principle design criteria are: 1. The target size for removal (d): d = 0. 20 mm is recommended 2. Flushing flow: QF = 0. 2 QP is recommended 3. Total (design) flow: QT = QP + QF = 1. 2 QP. Where QP is plant flow capacity in (m3/s). AHEC/MNRE/SHP Standards/ Civil Works – Guidelines For Hydraulic Design Of Small Hydro Plants /May 2011 38 3. 2. 4 Siting The following factors control site selection 1. A site along the water way of appropriate size and relatively level with respect to cross section topography 2. A site high enough above river level to provide adequate head for flushing. For preliminary layout a reference river level corresponding to the mean annual flood and minimum flushing head of 1. 0 m is recommended. In principle a desilting tank can be located anywhere along the water conductor system, upstream of the penstock intake. Sometimes it is convenient to locate the desilting basin at the downstream end of the waterway system where the desilter can also provide the functions of a forebay tank. However, a location as close to the head works is normally preferred, site topography permitting. 3. 3 Hydraulic Design A desilter is made up of the following elements: • Inlet section Settling tank • Outlet section • • Flushing system 3. 3. 1
<urn:uuid:a837560b-facf-4e7f-89a4-19e8b75c18eb>
CC-MAIN-2023-50
https://mystudywriters.com/hydraulic-design-of-small-hydro-plants/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100602.36/warc/CC-MAIN-20231206162528-20231206192528-00382.warc.gz
en
0.877726
13,499
2.765625
3
Tuesday, March 01, 2011 India is a vast country, stretching from 8N way up to 35N. And there can be huge variations in climate and weather in such a difference in latitude. As well as the geographical topography differs all along the length of the country. When does Summer begin for our region? On the basis of previous years' behaviour of the rising temperatures, and from past records and observations, i would consider 1st March as the start of the Summer season for the entire stretch of India, barring the Northern States of Kashmir, H.P. Utterakhand, and the NE states , east of Bangladesh. These exempted states have a prolonged winter, by 15 days, before they too fall prey to the blazing sub-continent sun. And, normally, the behaviour of the rising temperatures, that is the "route" summer would take is from the South towards the North. Too early ? You think 1st March is an early assumption of Summer arrival date ? Well, look at this image of the not to distant future ! 1st March 2009, and the 41s are into sindh (Pakistan). And for the Northward movement of Summer, check this image of 14th. March 2008. 47c in Sindh ! Last year, 2010 March, was hot from the start itself. Reason: A high pressure ridge at 500 mb had established itself over the Sindh/Gujarat region in early March itself. This ridge moved east and plonked over NW India. This prevented the westerlies, and the jet streams, associated with the W.Ds from coming and precipitating over the sub-continent. Instead the W.D.s and cold fronts were pushed up further North into Central Asia last year. Well, we have exceptional years like this image too ! March 14th. 2007. March 2011 has F5 transversing across the Northern States of the sub-continent till the 5th. of March. So week 1 is ok and cool. As of now, week 2 has no W.D. coming up to keep things cool. But M1 is a possibility around 10th.March. But we will wait and watch for the developments. I see temperatures rising after 8th. March in the Northern regions. But central regions will see rising temperatures by about 2c in the 1st week itself. See Page Weather Knowledge - 2 7 Extreme Cold (Including Cold Days) Likely in Punjab, Haryana, Rajasthan and U.P. This week till Month end....
<urn:uuid:b8a53c4f-d619-4e75-a489-e9f265c621c5>
CC-MAIN-2021-04
http://www.vagaries.in/2011/03/india-is-vast-country-stretching-from.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704821381.83/warc/CC-MAIN-20210127090152-20210127120152-00723.warc.gz
en
0.951794
532
2.96875
3
1.1 Engaging RfP ‘disadvantaged’ readers The reasons for children’s underachievement and lack of engagement in reading are always complex and it is beyond the remit of this course to examine readers challenged by dyslexia or other reading difficulties. Instead, the focus here is on those readers who, for complex reasons, have not yet found what ‘reading is good for’ (Meek, 1998). They may even be striving readers (a term increasingly used in Singapore to describe ‘reluctant’ readers), who are waiting to or wanting to experience the excitement found in reading. However, without the driving force of affect and deep emotional engagement in the subject matter, they may never gain the satisfactions or benefits that reading offers. Labelling children ‘reluctant’ or ‘unwilling’ is unhelpful as terms hold significance and tend to place the onus on the child. In fact, developing readers is a responsibility shared between the school community, the teachers, families, parents and the child. Some children are arguably Reading for Pleasure ‘disadvantaged’. The term ‘disadvantaged’ is often understood to mean those children who are eligible for additional funding, free school meals and so on, but this is not a key criterion for Reading for Pleasure. Those who are Reading for Pleasure ‘disadvantaged’ are the children who: - are not often read-to and do not share books with others beyond school - do not show that they are engaged or interested in reading - may be falling behind in their reading skills (including phonics) - may be capable readers who choose not to read. These children may hide their lack of assurance and negative attitudes by avoidance tactics or by messing around when it is time to read. However, if they can encounter the enjoyment to be had in reading, and can achieve their own goals as readers, they could become striving readers. Personal reflection 1 Reading Teachers who reflect on their own childhood reluctance to engage in particular areas of the curriculum will understand the emotions and disaffection involved. Think back to your own childhood and make a note of the area of education in which you were least assured. Perhaps you were reluctant to engage fully in mathematics, geography, history, science, drama, dance, art, RE or PE. How did that subject make you feel? What were your attitudes towards it? Do you still feel that way? What did you do in school or at home that characterised your reluctance? You may have noted a lack of confidence in sport for instance, and recall trying but not succeeding at running or gymnastics. Over time, you may have begun to think ‘I can’t do this, so I don’t really care about it’ and gradually distanced yourself from the subject due to your low self-efficacy. Disheartened and lacking the assurance to give it another go, this pattern towards sport may have lasted several years, even a lifetime thus far perhaps? Disengaged readers need considerable support to alter the status quo, particularly before they leave primary school. Without such support they will not be able to fully access the secondary curriculum. They will not achieve as highly as their peers who read recreationally (Sullivan and Brown, 2015) and as a result their life chances are likely to be short-changed. Less engaged readers need additional opportunities to hear stories, to read with and to others, as well as a space to talk about the texts they are reading in an informal low-key manner, without assessment or judgement. As they may also perceive reading as book-bound, you will want to broaden what counts as reading in their eyes and get to know them well as readers (as discussed in Session 4). This will include offering relaxed opportunities and sensitive scaffolding that seeks to pique their interests and improve their self-esteem and attitudes towards reading. It will also involve ensuring they have access to books and activities that are relevant to them and their reading goals. Your RfP pedagogy needs to be finely tuned to these readers and you will want to monitor their response and engagement. Box 1 lists five tips on how to engage disadvantaged readers. Box 1 How to engage RfP ‘disadvantaged’ readers Follow these five simple tips: - Get to know your striving/‘reluctant’/RfP ‘disadvantaged’ readers well: take time to notice, document, reflect and act. - Let them choose what they want to read and offer support. Books or magazines linked to films and computer games may prove popular with some, comics, graphic novels or non-fiction with others, depending on their interests. Each reader is unique. - Offer them additional relaxed opportunities to hear stories. - Draw them into reading and talking about texts in common in small groups. - Ensure successful engagement in reading by supporting their skills and the will to read and avoiding any sense of reading being a competition. In summary, ‘reluctant’/striving/‘disadvantaged’ readers need what all readers need, but in every case they need much more of it. They need to be: - supported by teachers who have a good working knowledge of children's texts, and who enable and support children’s access to texts - supported by teachers who make the time to get closely acquainted with their personal interests and practices beyond school, and help them choose texts that tempt - invited into the engaging world of reading by a rich RfP pedagogy and Reading Teachers who are determined to find ways to motivate them. The Further resources section at the end of this session provides a link to more guidance and resources to help you support readers who have fallen behind due to reluctance or other reading difficulties.
<urn:uuid:5fdb5cf9-744d-4c2f-9e97-90541b42fd8e>
CC-MAIN-2023-06
https://www.open.edu/openlearn/mod/oucontent/view.php?id=114698&section=1.1
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500294.64/warc/CC-MAIN-20230205224620-20230206014620-00429.warc.gz
en
0.971981
1,220
3.453125
3
Mozilla has announced a fun and educational tool dubbed Codemoji that introduces internet users to the basics of encryption through emojis. To put it simply, Codemoji is a web-based tool that allows users to write a message, encode it using emoji and then send it to their contacts. Codemoji is a learning tool and not a platform for sharing personal data. You might opt for some sophisticated security tool in case you want to send sensitive information. Mozila believes Codemoji is the first step for regular internet users to better understand encryption, which is the most important tool for building a safer and secure internet. The internet giant co-developed Codemoji along with its partner TODO, the Turin, Italy-based design and creative agency to educate internet users about Chipers and the basic of encryption. "When more people understand how encryption works and why it's important to them, more people can stand up for encryption when it matters most. This is crucial: Currently, encryption is being threatened around the world," said Mark Surman, said executive director Mozilla, in an official blog post. "From France to Australia to the UK, governments are proposing policies that would harm user security by weakening encryption. And in the US, the FBI recently asked Apple to undermine the security of its own products," added Surman. Click here to try out Codemoji
<urn:uuid:9c67506f-57d4-4db3-84d9-7468d96fc73b>
CC-MAIN-2017-43
http://www.ibtimes.co.uk/mozilla-launches-codemoji-educate-users-about-encryption-emoji-1568044
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826840.85/warc/CC-MAIN-20171023221059-20171024001059-00558.warc.gz
en
0.939216
284
3.03125
3
Detection of winding inter-turn faults – Part III An inter-turn fault is one of the leading causes of power transformer failures; it can be detected using sweep frequency response analysis 1. Case studies – Detection of fault in layer windings using SFRA Frequency response analysis can be extended to single and multi-layer windings. At the same time, the fault factor characteristics are obtained for different fault percentages. 1.1. Detection of fault in single-layer winding – measurement results Sweep frequency response analysis (SFRA) is performed on a single-layer 1000-turn winding from 10 Hz to 25 MHz. This winding has 20 sections where each section consists of 50 turns. Tappings were available at each section end in order to create inter-layer fault. For instance, 5 % fault is created by shortening one section, which corresponds to a short circuit of 50 turns. Fig. 1a and 1b show single-layer winding and a schematic diagram of single-layer winding. Fig. 2 shows the measured impedance characteristics for healthy winding and 5 %, 10 % and 20 % faults at different locations along the winding. The first resonant frequency of the healthy winding is frh1= 40.738 kHz. The impedance characteristic shows a reduction in the impedance at this frequency depending on the location of the fault. Sweep frequency response analysis is performed from 10 Hz to 25 MHz Fig. 3 shows the fault factor characteristics for 5 %, 10 % and 20 % of inter-turn fault in the winding. The curve shifts upwards as the percentage of fault decreases. This curve is symmetrical with respect to the centre of the winding section and provides reliable information about fault detection. 1.2. Detection of fault in multi-layer winding – measurement results SFRA is performed on the multi-layer windings with 10 layers from 10 Hz to 25 MHz. Each layer consists of 200 turns. Tappings were brought out at every section in order to create inter-layer short circuit faults. For instance, 10 % interlayer fault is created by shortening 2 consecutive layers in a multi-layer winding. Fig. 4a and 4b show the 10 section multi-layer winding and schematic diagram of the 10 section multi-layer winding. The sweep frequency response of the winding changes depends on the extent of the fault. Fig. 5 shows the impedance characteristics for healthy and 10 %, 20 % and 30 % inter-layer faults along the first section in the winding.
<urn:uuid:b3f32935-5294-41e7-9cf4-5a68ea91e221>
CC-MAIN-2020-45
https://transformers-magazine.com/magazine/detection-of-winding-inter-turn-faults-part-iii/
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107922746.99/warc/CC-MAIN-20201101001251-20201101031251-00408.warc.gz
en
0.895234
513
2.953125
3
Archive - New Contact Information Tuesday, June 8, 2004, 12:00 p.m. EDT National Study Shows 82 Percent of U.S. Homes Have Mouse Allergens Scientists at the (http://www.niehs.nih.gov) (NIEHS), one of the National Institutes of Health (http://www.nih.gov) (NIH), have found that detectable levels of mouse allergen exist in the majority of U.S. homes. NIEHS researchers analyzed dust samples, asked questions, and examined homes in the first National Survey of Lead and Allergens in Housing, a survey of 831 homes. Allergen levels were studied and related to demographic factors and household characteristics. 82 percent of U.S. homes were found to have mouse allergens. The findings by Cohn et al. appear in the June 2004 issue of the Journal of Allergy and Clinical Immunology. The survey was conducted using established sampling techniques to ensure that the surveyed homes were representative of U.S. homes. The homes were sampled from seventy-five randomly selected areas (generally counties or groups of counties) across the entire country. The 831 homes included all regions of the country (northeast, southeast, midwest, southwest, northwest), all housing types, and all settings (urban, suburban, rural). The selection of homes was controlled to be a representative sample of U.S. homes. For statistics derived from the 831 homes, the contribution from each home was weighted as necessary to ensure that the statistics are representative of the U.S. population. Dust samples used in the study were collected from kitchen and living room floors, upholstered furniture, beds, and bedroom floors. Kitchen floor concentrations exceed 1.6 micrograms of allergens per gram of dust in about one in five homes (22 percent). The amount of these allergy-triggering particles on the kitchen floor is high enough to be associated with allergies and asthma. Residents of high-rise apartments and mobile homes are at greatest risk, but the allergen is also present in all types of homes. The NIEHS study, with collaborators at Constella Group, Inc. and the Harvard School of Public Health, characterized mouse allergen prevalence in a representative sample of U.S. homes and assessed risk factors for elevated concentrations. The odds of having elevated concentrations were increased when rodent or cockroach problems were reported. Exposure to mouse allergen is a known cause of asthma in occupational settings. Until now, exposure to these allergens had not previously been studied in residential environments on a national scale. Clinicians should consider these risk factors when treating allergy and asthma patients. NIEHS conducts and supports research to reduce the burden of human illness and dysfunction from environmental causes by understanding environmental factors, individual susceptibility and age and by discovering how these influences interrelate. For further information on study: - Dr. Darryl Zeldin, NIEHS scientist, 919-541-1169 - Dr. Rich Cohn, Constella Group, 919-313-7700 Panel to Decide If Acrylamide Has Reproductive, Developmental Risks
<urn:uuid:b4e97564-09cb-4ff9-8b8c-928634431a70>
CC-MAIN-2016-26
http://www.niehs.nih.gov/news/newsroom/releases/2004/june08/index.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00195-ip-10-164-35-72.ec2.internal.warc.gz
en
0.94944
662
2.703125
3
The Zinn Education Project notes, “Howard Zinn passed away three years ago, on January 27, 2010. At the time, writer and activist Naomi Klein spoke for many of us: ‘We just lost our favorite teacher.'”* The life and work of Zinn represents the personification of confronting the world from roles of authority that have historically been positioned as neutral—historian, teacher. But as Zinn came to understand and then to confront and embody, neutral is not an option: When I became a teacher I could not possibly keep out of the classroom my own experiences. . . .Does not the very fact of that concealment teach something terrible—that you can separate the study of literature, history, philosophy, politics, the arts, from your own life, your deepest convictions about right and wrong?. . .In my teaching I never concealed my political views. . . .I made clear my abhorrence of any kind of bullying, whether by powerful nations over weaker ones, governments over their citizens, employers over employees, or by anyone, on the Right or the Left, who thinks they have a monopoly on the truth. . . .From that moment on, I was no longer a liberal, a believer in the self-correcting character of American democracy. I was a radical, believing that something fundamental was wrong in this country—not just the existence of poverty amidst great wealth, not just the horrible treatment of black people, but something rotten at the root. The situation required not just a new president or new laws, but an uprooting of the old order, the introduction of a new kind of society—cooperative, peaceful, egalitarian. (You Can’t Be Neutral on a Moving Train, Howard Zinn, 1994, pp. 7, 173) As the Common Core State Standards (CCSS) movement, as well as the concurrent new and expanded battery of high-stakes tests, seem inevitable (as some continue to debate), Zinn’s radical stance as a historian and teacher offers a powerful window into why any standards movement is a failed process in education, particularly in universal public education designed to serve democracy and individual freedom. Standards as Acquiring Some Authority’s Mandates Zinn as historian and teacher personified the act of challenging content. For Zinn, our obligation as teachers and students is to ask questions—notably questions about the sources of power—about not only the world around us but also the narratives of the world around, narratives cast about the past, narratives being cast about the present, and narratives envisioning the future. Who was Christopher Columbus—in his own words, in the narratives built around him by centuries of historians, in the narratives of textbooks, and in narratives of state-mandated curriculum? Why are there so many versions of Columbus, which ones are true (if any), and who benefits from these narratives? Who was Martin Luther King Jr.—in his own words, in the narratives built around him by decades of historians, in the narratives of textbooks, and in narratives of state-mandated curriculum? Why are there so many versions of King, which ones are true (if any), and who benefits from these narratives? Narratives, whether they be history or mandated curriculum in the form of CCSS, are manufactured myths, and ultimately, manufactured myths are created by some authority to suit some goal, some goal that benefits the designer of the myth. And therein lies the ultimately failure of all standards movements. A standards paradigm masks the locus of power (some authority some where decides what knowledge matters and then creates the accountability structure that makes that knowledge the goal of passive implementation [teachers] and compliant acquisition [students]) and creates a teaching and learning environment that can assume a neutral pose while in fact replacing education with indoctrination. Authentic education for democracy and individual freedom is a continual asking: What knowledge matters and why? It is a journey, an adventure, a perpetual gathering to confront, to challenge, to debate, and to serve the teacher and learner in their joint re-reading and re-writing of the world. CCSS, just as the dozens of standards movements before them, discount the need to confront, to ask, to re-imagine because standards are an act of authoritarian mandates. “Who decides” is rendered unnecessary, and the curriculum becomes a faux-neutral set of content that teachers must implement and students must acquire so that the ultimate faux-neutral device can be implemented—high-stakes testing. Like the “‘remarkable apparatus'” in Franza Kafka’s “In the Penal Colony,” high-stakes testing ultimately becomes all that matters, “a mechanism of objectification” (Foucault, 1984), the inevitable abdication of authority and autonomy to a mechanism—”what is tested is what is taught” superseding any possibility of asking “why?” or examining who decides and by what authority they made the decisions. Kafka’s nightmare allegory has been and will be replayed time and again as adopting and implementing CCSS along with the high-stakes tests uncritically, passively, and with a pose of neutrality (“I am simply doing as I have been mandated as well as I can”) feed the machine that consumes all who come near it, just as the Officer who implements the apparatus of punishment eventually acquiesces to it himself: The Traveller, by contrast, was very upset. Obviously the machine was breaking up. Its quiet operation had been an illusion. He felt as if he had to look after the Officer, now that the latter could no longer look after himself. But while the falling gear wheels were claiming all his attention, he had neglected to look at the rest of the machine. However, when he now bent over the Harrow, once the last gear wheel had left the Inscriber, he had a new, even more unpleasant surprise. The Harrow was not writing but only stabbing, and the Bed was not rolling the body, but lifting it, quivering, up into the needles. The Traveller wanted to reach in to stop the whole thing, if possible. This was not the torture the Officer wished to attain; it was murder, pure and simple. The American Character, Inscribed: “A Monopoly on the Truth” While the education establishment, both progressives and conservatives, race to see who can implement CCSS the fastest, concurrent education reform initiatives such as charter schools and Teach for America help reinforce the worst elements of the standards and accountability movement. Embedded in the charter school commitment is a parallel pursuit of standards: Character education. In the “no excuses” model (made popular in the Knowledge Is Power Program [KIPP] charter chain), the standard for character and “good behavior,” again, is not something teachers and students explore, discover, and debate, but rules that must be implemented and followed. For example, consider the “National Heritage Academies (NHA) and its approach to character and citizenship education,” highlighted by Rick Hess at Education Week; Hess, by the way, notes, “I think I’m wholly behind what NHA is doing.” What does a standardized approach to character and civic education look like?: “I pledge allegiance to the flag of the United States of America,” chant the students of Ridge Park Elementary School in Grand Rapids, Michigan. “And to the Republic for which it stands . . .” In the back of the room, a dozen parents stand with their hands over their hearts. Some are US citizens by birth, others by naturalization, and some by aspiration. Their children recite: “One nation, under God, with liberty and justice for all.” A National Heritage Academies (NHA) charter school, Ridge Park starts every day with the Pledge of Allegiance, the Star-Spangled Banner, and the school creed: “I am a Ridge Park scholar. I strive to achieve academic excellence. I exemplify high moral character. I work diligently to prepare for the future . . .” Character education is ubiquitous and relentless at NHA schools. Each month is assigned a “moral focus” or virtue, which teachers are supposed to weave into their lessons and students write about from kindergarten through eighth grade. Signs in classrooms and hallways honor examples of virtue…. Students troop out of the gym to start their day. (“Counting on Character: National Heritage Academies and Civic Education,” Joanne Jacobs) “Chant,” “recite,” “ubiquitous,” “relentless,” “troop”—these are the bedrocks of a standards-driven school environment, but this is indoctrination, not education—whether the standard is character or curriculum. And what sort of history curriculum does a character-driven model embrace? The work of E. D. Hirsch: The patriotic spirit of Hirsch’s US history and civics curriculum fit NHA’s philosophy. ‘The ideals that created the United States were glorious,’ writes Hirsch in The Making of Americans: Democracy and Our Schools. ‘Patriotic glorifications are very much to be encouraged in the early grades, so long as they retain a firm connection with truth.’ While US history and civics are not wrapped in the flag, says Nick Paradiso, vice president of government relations and partner services for the charter management company, “the basic idea is that America is a great country that learns from its mistakes. We need to embrace our country’s history.” No, let’s not confront the histories of the U.S., not here at NHA, because that may lead to the sorts of questions Zinn would ask: Who decides and why, and then who benefits from these narratives of character and history? [Hint: “National Heritage Academies, a for-profit charter management company, runs 74 schools in Michigan and eight other states, making it the second largest charter network in the country.”] Further into Jacobs’ description of NHA “America-centric” core curriculum, Martin Luther King Jr. is highlighted as an example for students of character. King as martyr for Hirsch’s glorious U.S.A.? Consider “Martin Luther King Was a Radical, Not a Saint” by Peter Dreier: In fact, King was a radical. He believed that America needed a ‘radical redistribution of economic and political power.’ He challenged America’s class system and its racial caste system. He was a strong ally of the nation’s labor union movement. He was assassinated in April 1968 in Memphis, where he had gone to support a sanitation workers’ strike. He opposed U.S. militarism and imperialism, especially the country’s misadventure in Vietnam. Do you suppose this is the King NHA students study and are encouraged to emulate? And it is here I will end with the ultimate caution about being neutral in regards to CCSS, charter schools, character education, and a whole host of education reform mandates and commitments that seem inevitable: The powerful control the narratives and those narratives control the rest of us—all for the profit of the powerful. “I made clear my abhorrence of any kind of bullying, whether by powerful nations over weaker ones, governments over their citizens, employers over employees, or by anyone, on the Right or the Left, who thinks they have a monopoly on the truth.” Howard Zinn, 1922-2010, R.(adical) I.(n) P.(eace) *Updated in honor of the 50th Anniversary March on Washington and Howard Zinn’s birth date, August 24. Please visit and read: Remembering Howard Zinn by Meditating on Teacher Unions and Tenure? 0 thoughts on “Howard Zinn and the Failure of Standards Movements in Education” I made this photo post inspired by the Howard Zinn quote above: https://www.facebook.com/photo.php?fbid=499726940070019&set=a.132992836743433.12039.132987906743926&type=1&relevant_count=1
<urn:uuid:c63d3948-1ec7-4031-a3d4-ec5bc2104586>
CC-MAIN-2023-14
https://radicalscholarship.com/2013/01/27/howard-zinn-and-the-failure-of-standards-movements-in-education/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945381.91/warc/CC-MAIN-20230326013652-20230326043652-00713.warc.gz
en
0.957991
2,590
2.765625
3
What’s the difference between a Bar & Bat Mitzvah? Are there any similarities between them? What do the words “Bar Mitzvah” and “Bat Mitzvah” even mean? OK OK, enough with the questions. Let’s start getting some answers… Table of Contents Bar Mitzvah vs Bat Mitzvah: In a Nutshell A Bar Mitzvah/Bat Mitzvah is the Jewish coming of age. Boys become a Bar Mitzvah when they turn 13 years old, girls become a Bat Mitzvah when they turn 12 years old (13 in Reform Judaism). The term Bar Mitzvah is made of 2 Hebrew words: - Bar (בַּר) = Son - Mitzvah (מִצְוָה) = Commandment (or laws) “Son of commandment”? Doesn’t make a lot of sense, does it (that’s not proper English, either)? Well, in rabbinical usage, the word “Bar” has a different meaning: “subject to”. Add that with “commandments”, and you get “subject to commandments”. The same goes for girls: “Bat” technically translates to “daughter”, but in rabbinical usage – it means “subject to commandments” (in female form). Contrary to popular belief, a Bar/Bat Mitzvah is not an event or ceremony, it’s a designation of responsibility. The moment a Jewish boy/girl reaches their coming of age – they become subject to the Torah’s commandments (Mitzvot), regardless if they had a Bar/Bat Mitzvah ceremony or party. That’s right – they become a Bar/Bat Mitzvah whether they celebrate it or not. In other words: - A Jewish boy becomes a Bar Mitzvah the moment he turns 13. A Jewish girl becomes a Bat Mitzvah the moment she turns 12 (13 in conservative and reform communities)… even if they don’t read from the Torah. - Jewish kids don’t need a party (let alone a flashy party) to become a Bar/Bat Mitzvah. These are both Bar & Bat Mitzvah customs, not commandments. Speaking of customs… Bar Mitzvah vs Bat Mitzvah: Different Customs A Bar & Bat Mitzvah share a lot of the same customs: - They both usually celebrate their Bar/Bat Mitzvah: whether it’s in the form of a Bar/Bat Mitzvah party, a Kiddush luncheon or a Bar/Bat Mitzvah trip - Both of them usually give a Bar/Bat Mitzvah speech - They tend to have a Bar/Bat Mitzvah candle lighting ceremony, where they invite some of their guests to light a candle - Many of them choose a Mitzvah Project (although it’s more common among Bat Mitzvahs) That said, they also have exclusive customs: The Bar Mitzvah Ceremony & Torah Reading (Aliyah) I briefly mentioned that a Jewish boy isn’t technically required to publicly read from the Torah (that’s called Aliyah by the way) to become a Bar Mitzvah. If you’ve got a sharp eye – you probably noticed I didn’t say anything about a Bat Mitzvah reading from the Torah. That was no accident… In traditional Judaism, only Jewish men are allowed to read from the Torah. That’s why in Orthodox communities, only boys publicly read from the Torah and do an “Aliyah”. In conservative and reform communities (and increasingly in modern Orthodox communities), however, that’s not the case. In these communities, Bat Mitzvah girls also participate in an Aliyah and read from the Torah, just like boys do. Did You Know? Many modern Orthodox communities have sparked up a new conversation surrounding this whole subject. They asked Orthodox rabbis to re-examine the Jewish customs concerning Bar & Bat Mitzvah and demanded an “equal playing field”, so to speak. Their main critique is since the Bar Mitzvah ceremony isn’t mentioned anywhere in the Talmud – there’s no reason to prevent a Bat Mitzvah from having her Torah reading. should progress with modern times and match the current social landscape – where both men & women are treated equally. Tallit & Tefillin Well, guess who’s considered a man now? (at least from the Torah’s perspective… physically, the kid might still be 4’11 like I was when I was 13). Note: Except for (most) Ashkenazi men. They start wearing a Tallit only after they get married. And because these Mitzvot are reserved only for men, a Bat Mitzvah doesn’t follow them. Except: In conservative and reform communities, the Bat Mitzvah girls wear a Tallit as well. Are these the only commandments that differ between a Bar & Bat Mitzvah? Let’s have a look (Hint: Not exactly) … Bar Mitzvah vs Bat Mitzvah: Different Commandments & Responsibilities When a Bar/Bat Mitzvah reaches their coming of age – they’re now responsible for their own actions. Did You Know? In fact, before the Bar Mitzvah reads his Torah portion, the father actually recites a blessing thanking G-d for relieving them from the burden of his son’s sins. And while Jewish men & women are required to follow many of the same Mitzvot (such as observing the Sabbath, eating Kosher, praying…), there are some Mitzvot that are gender-specific. Male-only Jewish commandments include: Note: In conservative and reform communities, women follow some of these commandments as well. Receive an Aliyah The boy had his first Aliyah at his Bar Mitzvah service. It probably wouldn’t be the last. An adult man can now receive an Aliyah every time we publicly read from the Torah (on Saturdays, Mondays, Thursdays and Jewish holidays). Participate in a Minyan A minyan is a quorum of 10 men required to fulfill certain Jewish obligations, such as public prayer, reading from the Torah and reciting the priestly blessing. Publicly read from the Torah The young man is reading his Torah portion in the public service. He can now do it over and over again, perhaps even become a Hazzan. Leading the prayer service Not only can he participate in a Minyan, he can lead the Minyan’s prayer service. Many Bar Mitzvah boys these days train how to lead the entire service, as opposed to just recite a Torah portion and chant the Haftarah. Wear Tallit & Tefillin We already covered that one 🙂 Aside from the genderless Mitzvot, Jewish women are required to follow 3 additional Mitzvot: 1. Lighting Shabbat & holiday candles 2. Kneading Challah In Judaism, women are given a key role in shaping the values of the family. Kneading Challah (and recites the Challah blessing) represents a woman’s unique ability and responsibility to shape raw material given by G-d – into something meaningful… just as she does with her family. Niddah are the laws related to maintaining “Taharath Hamishpacha” (family purity). Bar Mitzvah Gifts vs Bat Mitzvah Gifts The moment the young Bnai Mitzvah have been waiting for (c’mon, who are we kidding): the gifts! At the end of the day, boys will be boys teenagers will be teenagers. And just as you’d give non-Jewish 13-year-old boys & girls different gifts, you’d give Jewish boys and girls different gifts. What sort of gifts, you ask? Appropriate Bar Mitzvah gifts include things like: - Traditional Jewish gifts: like a Bar Mitzvah Tallit, bible set or Kiddush cup. - Personalized & Meaningful Gifts: Like this personalized Bar Mitzvah remembrance plaque (this is one of my favorites). Common gifts for a Bat Mitzvah are things like: - Bat Mitzvah Jewelry: gifts like a gold Star of David necklace or a Shema Yisrael bracelet are lovely. - Traditional Jewish gifts: a pair of Shabbat candlesticks, a Challah board or a Kiddush cup are all wonderful ideas. What if you can’t decide on a gift for the Bar/Bat Mitzvah? In that case – get the Bnai Mitzvah money in multiples of $18, and let them decide what to do with it. Tip: Money is a good idea especially if you don’t know the Bar/Bat Mitzvah very well, or if you attend a Bar/Bat Mitzvah in specific communities where money is expected (like Israel) Both a Bar & Bat Mitzvah is considered an adult: from now on, they’re being held accountable for their actions (no more offloading their misdeeds to their parents). That’s the similarities between a Bar & Bat Mitzvah. The differences between the two lies in the actions each of them is required to follow. Hope this article cleared things up 🙂 P.S – Leave a comment below if it did (or didn’t).
<urn:uuid:0e36468c-4e30-4e32-be90-e2d03f926719>
CC-MAIN-2019-47
https://amenvamen.com/bar-mitzvah-vs-bat-mitzvah
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670597.74/warc/CC-MAIN-20191120162215-20191120190215-00453.warc.gz
en
0.933694
2,129
2.578125
3
Presentation on theme: "Writing into the Day In what ways is the United States like the Roman Empire?"— Presentation transcript: Writing into the Day In what ways is the United States like the Roman Empire? Causes for the Decline of the Roman Empire What the Book Says…In your own Words… A series of inexperienced and often Corrupt emperors Division of the Empire Conflict with Germanic Tribes Crushing Tax Burden Gap between the Rich and the Poor Decline of Patriotism and Loyalty Food Shortages A series of inexperienced and often Corrupt emperors Because the Emperor was chosen from the rich class of families known as patricians, they we not always the best leaders. One Emperor, Caligula, thought he was actually a god! Division of the Empire The Empire became too large to be managed by one leader. The Empire was split into 2 parts. This weakened both parts-they had half the resources, have the tax money, etc… Conflict with Germanic Tribes Vandals, Goths, Visigoths, and other tribes from the area now called Germany wanted to invade These groups resented the wealth and power of the Roman Empire. Crushing Tax Burden Because of the split of the empire, having to hire solders for the army, and huge building projects, the Empire taxed its people a huge amount toward the end. Gap between the Rich and the Poor The Patrician and the Plebeian classes were growing further apart, as the rich got even richer,. And the poor even poorer. This made the poorer classes less patriotic towards Rome Decline of Patriotism and Loyalty The Crushing taxes and poor leaders led to many having little love for their country. This led to a lack of interest in joining the military, and therefore foreign solders had to be hired, costing a lot of money Food Shortages The size of the empire made it difficult to get food and other resources from one place to the next. Greater populations in the cities led to many hungery people there.
<urn:uuid:06dd09ea-893c-44d6-9ff6-24ea1805155a>
CC-MAIN-2017-34
http://slideplayer.com/slide/3623466/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106779.68/warc/CC-MAIN-20170820150632-20170820170632-00312.warc.gz
en
0.969259
422
3.109375
3
How cool would it be to do business in outer space some day? Making a buck on the moon, and even on Mars, too, might not be as far off as you’d think. Not now that NASA is taking some serious steps toward creating water, hydrogen and oxygen -- all essential elements for supporting human life -- on both celestial bodies. The agency’s ambitious plans could put Americans one small, but hopeful step closer to colonizing planets. And the first step after setting up house and home would naturally be setting up shop, right? Ah, the entrepreneurial side of the Moon looks bright. NASA also just announced that it’s working with private companies to mine the moon for rare natural resources like Helium-3, which could be used as a clean energy source here on Earth. It looks like some very lucky businesses, big and small, will soon be, forgive the pun, over the moon about the promising (and presumably insanely profitable) prospects out there in the great beyond. But let’s get back to the big news about NASA making vital-to-human-life liquids and gases on the moon and Mars, where so many average Joe astronaut wannabes dream of one day surviving and thriving. Instead of hauling elements we can’t exist without from Earth to space, which is a heck of an expensive hassle to pull off, NASA will concoct them directly on the moon. To get the job done, the agency says it will put a rover scout on the 4.527-billion year-old rock by 2018 to sniff out and gather samples of subsurface hydrogen. The rover would then extract oxygen from the moon’s surface soil and process it with hydrogen to create water. And, voila, we could theoretically live and breathe -- and, better yet, make a living -- in outer space. At least that’s the big, crazy idea. The first-of-its-kind lunar mission is named Resource Prospector. A similar mission is set to take place on Mars in 2020. If the Mars mission is successful, it could lay the groundwork for sending humans to the Red Planet. More than a few space entrepreneurs are already burning up the private commercial race to the moon and Mars. Richard Branson’s Virgin Galactic aims to make its first commercial spaceflight later this year and has plans to get to Mars -- at some point. Another pioneering private space travel company called Mars One pledges to send four people to the red planet by 2024, then four more two years later, and yet four more two years after that. More than 200,000 brave souls have already signed up for a chance at the first four spots. If there’s one thing we know for sure, where humans are, commerce is sure to follow. What crazy apps and gadgets have you come across lately? Let us know by emailing us at FarOutTech@entrepreneur.com or by telling us in the comments below. Correction: A previous version of this article misstated Virgin Galactic's plans to travel to Mars.
<urn:uuid:17a650b3-d3ab-419e-8172-0afa6b1194ec>
CC-MAIN-2015-18
http://www.entrepreneur.com/article/231521
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246662032.70/warc/CC-MAIN-20150417045742-00212-ip-10-235-10-82.ec2.internal.warc.gz
en
0.934572
635
2.84375
3
This page shows how to construct a triangle given two sides and the included angle with compass and straightedge or ruler. It works by first copying the angle, then copying the two line segment on to the angle. A third line completes the triangle. The above animation is available as a printable step-by-step instruction sheet, which can be used for making handouts or when a computer is not available. The image below is the final drawing above with the red items added. |1||Line segment MN is congruent to AB.||Drawn with the same compass width. For proof see Copying a line segment| |2||Line segment ML is congruent to AC.||Drawn with the same compass width.| |3||The angle LMN is congruent to the angle A||Copied using the procedure shown in Copying an angle. See that page for the proof.| |4||Triangle LNM satisfies the side lengths and angle measure given.|
<urn:uuid:fcb6d281-907d-498f-a5bb-548e034ac342>
CC-MAIN-2020-10
https://www.mathopenref.com/consttrianglesas.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875148850.96/warc/CC-MAIN-20200229083813-20200229113813-00093.warc.gz
en
0.846438
209
4.03125
4
Scientific Investigations Map 2921 This map summarizes the geology of the Western Grove 7.5-minute quadrangle in northern Arkansas that is located on the southern flank of the Ozark dome, a late Paleozoic regional uplift. The exposed bedrock of this map area comprises approximately 1,000 ft of Ordovician and Mississippian carbonate and clastic sedimentary rocks that have been mildly folded and broken by faults. A segment of the Buffalo River loops through the southern part of the quadrangle, and the river and adjacent lands form part of Buffalo National River, a park administered by the U.S. National Park Service. This geologic map provides information to better understand the natural resources of the Buffalo River watershed, particularly its karst hydrogeologic framework. Posted May 2006 Part or all of this report is presented in Portable Document Format (PDF); the latest version of Adobe Acrobat Reader or similar software is required to view it. Download the latest version of Acrobat Reader, free of charge or go to access.adobe.com for free tools that allow visually impaired users to read PDF files.
<urn:uuid:24119c79-83c3-4edb-9f98-bb3375a77524>
CC-MAIN-2022-33
https://pubs.usgs.gov/sim/2006/2921/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573242.55/warc/CC-MAIN-20220818154820-20220818184820-00403.warc.gz
en
0.894547
246
2.75
3
For testing SMTP server functionality, we have to follow some steps to identify that whether SMTP configured or not. Below are the steps we need to follow to check SMTP server functionality. We are using the command prompt telnet to test the server. 1. open command prompt and type : telnet <servername> 25 Note: 25 is the port used by SMTP and <servername> is the SMTP server name. After you hit enter you will get some output like 220 <servername> Microsoft ESMTP MAIL Service, Version: 6.0.3790.3959 ready at Tue, 22 Jan 2008 09:10:27 -0600 It means you got response from the SMTP server and it's the clue that SMTP is setup on the server. 2. For testing response say helo to it. 250 <servername> Hello [IP Adress] 3. Now we need to enter the From address of the mail. mail from: firstname.lastname@example.org 250 2.1.0 email@example.com….Sender OK 4. It's time to enter the recepient email address. Type : rcpt to: someID@domain.com 250 2.1.5 someID@domain.com 5. Now we are left with the data of the email. i.e. subject and body. Type : data 354 Start mail input; end with <CRLF>.<CRLF> subject: this is a test mail This is test mail body I am testing SMTP server. 7. Hit Enter, then . and then Enter. 250 2.6.0 <<servername>C8wSA00000006@<servername>> Queued mail for delivery 8. Type: quit 221 2.0.0 <servername> Service closing transmission channel If you did everything as explained, you will get a mail soon.
<urn:uuid:24dbd2a0-86cf-4145-928d-93e6206264e4>
CC-MAIN-2018-05
http://praveenbattula.blogspot.com/2009/04/how-to-check-smtp-is-working-or-not.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887077.23/warc/CC-MAIN-20180118071706-20180118091706-00576.warc.gz
en
0.782949
421
2.5625
3
What's new on our site today! Native Languages of the Americas: Cree Language: Cree is an Algonquian language spoken by more than 70,000 people across southern Canada and into Montana. There are five major Cree dialects: Western/Plains Cree, Northern/Woodlands Cree, Central/Swampy Cree, Moose Cree, and Eastern Cree. Some linguists consider these distinct languages, but they are largely mutually intelligible. The most divergent is Eastern Cree, which some consider a closer relative to the Innu languages Montagnais and Naskapi than to the other Cree dialects--then again, others consider Montagnais, Naskapi, and/or Atikamekw to be dialects of Cree themselves. This lack of linguistic consensus reveals the remarkable diversification of the Cree language. In general, Cree people can understand the dialects of communities closest to them, but not those further away: though a Northern Cree may understand both a Western Cree and an Eastern Cree, they might have trouble understanding each other, and only the East Cree speaker would have hope of understanding Montagnais. All five Cree dialects (though not Atikamekw or the Innu languages) are written in a unique syllabary which uses shapes to represent consonants and rotates them in the Four Directions to represent vowels. There are two more languages which, while not Cree, are heavily influenced by Cree: Michif, a Metis creole combining French nouns with Cree verbs, and Severn Ojibway, an Ojibwe dialect often called "Oji-Cree" because it has borrowed liberally from Cree and uses the Cree syllabary instead of the Roman alphabet used by most other Ojibwe speakers. One of the most important and influential of American Indian languages, Cree also has one of the best chances of conitnued survival, with many children being raised bilingually or in Cree with English or French as a second language. Cree is a polysynthetic, verb-based language with long words and fairly free word order. People: The Cree are Canada's largest native group, with 200,000 registered members and dozens of self-governed nations. "Cree" comes from the French name for the tribe, "Kristenaux," variously said to be a corruption of the French word for "Christian" or an Algonquian word for "first people." When speaking their own language the Cree refer to themselves as Ayisiniwok, meaning "true men," Nehiyawok, meaning "speakers of our language," or Iyiniwok, meaning simply "the people" (this word has the same Central Algonquian root as the Montagnais word Innu). There are also more than 100,000 people known as Métis, of mixed-blood Cree, French, and other Canadian ancestry. Though many Cree regard the Metis as Cree brethren--and, indeed, though many registered Cree Indians are also mixed-blood--the Metis have a unique culture and their own creole tongue (known as Michif). The and the Innu (Montagnais and Naskapi) are also related to the Cree but consider themselves distinct. History: Cree history is very hard to synopsize because the Cree tribe spans such a broad territory, from the Rocky Mountains all the way to the Atlantic Ocean. Though their common culture and language bind them together as a people, the James Bay Cree and Woodland Cree tribes do not necessarily have any more shared history than the white people in Quebec and Alberta do. With that caveat, though, the Cree Indians as a whole have weathered European colonization better than perhaps any other group of Native Americans. Their sheer numbers and broad range helped keep them from being too decimated by European diseases to maintain stability, as happened to many smaller nations, and their particular cultural affinity for intertribal marriage (remarked upon in the oral histories of their Indian neighbors) meshed well with the intent of the French, the primary Europeans to have dealings with them. Where the English tended to try to move Indian groups further away from their civilization, the French tried to engulf them. The Cree, who had held a similar attitude towards colonization before the French ever got there, engulfed back. The result was the Metis, a race of primarily French-Cree mixed-bloods, and distinct French and Cree populations who generally got along pretty well. Since Canadian nationhood, the Cree people have faced the same problems of self-determination and land control that every aboriginal group has, but they remain better-equipped to face them than most, and the Cree language is one of the few North American languages sure of surviving into the next century. Cree Language Resources Cree language samples, articles, and indexed links. Cree Culture and History Directory Related links about the Cree Indians past and present. Cree Indians Fact Sheet Our answers to frequently asked questions about the Crees, their language and culture. Introduction to Cree Indian mythology. Our Online Cree Language Materials List of vocabulary words in the Cree language, with comparison to words in other Algonquian languages. Cree Pronunciation Guide: How to pronounce Cree words. Cree Animal Words: Illustrated glossary of animal words in the Plains Cree language. Cree Body Parts: Online and printable worksheets showing parts of the body in the Cree language. Worksheet showing color words in the Cree language. Worksheet showing how to count in the Cree language. Lesson on the use of Cree possessive prefixes. Cree Animate Nouns: Lesson on Cree animate and inanimate nouns. Cree Dictionaries, Audio Tapes and Language Resources Alberta Elders' Cree Dictionary (Plains/Woods) Cree Words Cree-English Lexicon: Spoken Cree: Level One Spoken Cree: Level Two: Cree, Language of the Plain (Audiotape) Cree Syllabics Manual: Cree language books and tapes for sale. Outline for a Comparative Grammar of some Algonquian Languages: Linguistics text comparing the Cree language to several other Algonquian languages. Cree Language Cree Fontware: Cree language software for sale. Our Grandmother's Lives: Reader of Cree-language stories with English translation. Bibliographies of Innu and Cree language learning materials. Department of Indian Languages, Literature and Linguistics: Language courses in Cree and other indigenous languages at the Saskatchewan Indian Federated College. Canadian translation service specializing in English, French, Chippewa, and Cree. Ojibway and Cree Cultural Center: OCCC offers Ojibway and Cree translation, transcription, and interpretation. Cree Language Structures: A Cree Approach Cree, Language of the Plains: Origins of Predicates: Evidence from Plains Cree Cree Narrative: Cree linguistics books for sale. Eastern Cree Bible: New Testament translations into the James Bay Cree language, in print and on audiocassette. Plains Cree storybook for children. Cree-Montagnais-Naskapi Publications Cree Bibliography: Bibliographies of Montagnais, Naskapi, and Cree linguistics papers. Native American Language Dictionaries: Cree and other American Indian dictionaries and language materials for sale. Cree Language Community and Tools Cree Font for Macintosh Unified Canadian Aboriginal Syllabics for Windows: Cree fonts for free download. Ojibwe- and Cree-language radio broadcasts. Cree language community mailing list, poetry, announcements, and links. List of Ojibway and Cree language courses in Canada, the US, and by distance learning. Cree Language Lessons and Linguistic Descriptions Cree Language Description James Bay Cree: Overviews of the Cree language. How To Say It In Cree Cree Language Lessons: Online Cree language courses (with pronunciation guides, grammar, vocabulary, and exercises). East Cree Language Web: Language lessons, grammar, traditional stories and an online dictionary in the East Cree dialect. The Cree syllabary. Introduction to the Cree writing system, with a sample text. Cree orthography and text example. About the Cree Language Cree Dialects: Overviews of Cree dialects. Cherokee and Cree Writing Systems: Argument that Cree and other Native American writing systems predated European conquest. Cree Language Dictionary: Text of an 1874 French-Cree dictionary. Cree Tipi Words: Pictures of tepees with associated Plains Cree vocabulary. Literature and Texts in the Cree Language Cree Elders Speak: Stories in Cree and Dene, with English translation. Dyes for Porcupine Quills .GIF of the syllabics (if you don't have Cree fonts): Story in Cree, both Roman alphabet and syllabary, with English translation. Human Rights: Cree Language English translation: Universal Declaration of Human Rights in Swampy Cree. O Canada In Cree: Text of the Canadian national anthem in Cree. Moose Cree Language: Moose Cree Orthography: Moose Cree Alphabet Moose Cree Writing: Moose Cree Pronunciation Moose Cree Text: Scanned-in Moose Cree language materials from the Rosetta Project. Plains Cree Language: Plains Cree Book: Plains Cree Alphabet Plains Cree Orthography Plains Cree Writing: Plains Cree Spelling Plains Cree Text Plains Cree Bible Translation Plains Cree Story: Scanned-in Plains Cree language materials from the Rosetta Project. Lord's Prayer in Central Cree Western Cree Prayers: Cree translations of Christian prayers. Language Museum: Central Cree Language Museum: Western Cree: Bible passages in the Cree Indian language. Omushkego (Swampy) Cree Omushkego Cree in Syllabics Plains Cree: Plaques on the Canadian Human Rights Tribute. Cree Language Preservation and Usage Cree Retention Committee: Organization dedicated to Cree language maintenance. Ojibway and Cree Cultural Centre: Language: Program to maintain the Ojibway and Cree languages. Essay about Cree sociolinguistics. Cree Language of Instruction Project: Sociolinguistics paper analyzing the specifics of Cree-language schooling. Summary report of the 1997 Cree Language and Culture Language Conference. Finding My Talk: Cree documentary about language loss and revival among the Cree, Tlingit, Mohawk, and Inuit. House of Languages: Cree: Information about Cree language usage. Plains Cree Woods Cree Swampy Cree Moose Cree East Inland Cree East Coastal Cree: Demographic information about Cree from the Ethnologue of Languages. Plains Cree Language Tree Woods Cree Language Tree Eastern Cree Language Tree: James Bay Cree Language Tree Moose Cree Language Tree Swampy Cree Language Tree: Theories about Cree's language relationships compiled by Linguist List. East Cree Language Structures West Cree Language Structures: Cree linguistic profiles and academic bibliographies. Cree Proper Names Cree Place Names Cree Placenames: Place names and their meanings in the Cree Indian language. Aboriginal Place Names of Alberta: List of Blackfoot, Stoney, Cree, Slavey, and Sarcee placenames in southern Alberta, with their English translations. Indian Dog Names: Our new fundraiser offering names for dogs and other animals in Native American languages (including Cree). Additional Resources, Links, and References Wikipedia: Cree: Plains Cree Language: Encyclopedia articles on the Cree language. La Lengua Cree Silabario Cree Idioma Cree: Articles on the Cree language in Spanish. With a language map and text examples. Cree Indian books. Native Languages of the Americas website © 1998-2015 Contacts and FAQ page Learn more about the Cree Indian tribe Go back to the list of Native American languages Go back to our Native children's site Native American art Native American ancestry Native American words Tribal tattoo symbols Would you like to sponsor our work on the Cree language?
<urn:uuid:2c5ed37e-98fe-4ef2-a5f3-fdcb49d85e2c>
CC-MAIN-2017-39
http://www.native-languages.org/cree.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686117.24/warc/CC-MAIN-20170920014637-20170920034637-00126.warc.gz
en
0.856242
2,631
3.96875
4
"Now an army may be likened unto water, for just as flowing water avoids the heights and hastens to the lowlands, so an army avoids strength and strikes weakness." - Sent to Providence, Rhode Island, in 1942 to take command of a new frigate, the British novelist Nicholas Monsarrat was given HMS Perim, though he thought commanding her sister-ship might have been more amusing, HMS Montserrat. - By the end of the Fourteenth Century it appears that about 10 percent of the troops in the army of Ming China were armed with guns, perhaps 120,000 to 130,000 men. - Between 1914 and 1918, 27 percent of all French men between the ages of 18 and 26 died in military service. - Some time in the First Century, the Greek word for the Roman cohort, originally "taxeis", was replaced by "speira", formerly used for the long-obsolete maniple, a change first recorded, oddly enough, in Chapter 10 of The Acts of the Apostles. - During the final years of peace in the late-1930s Britain required some 60 million tons of food, raw materials, and finished goods per year to survive, yet through extraordinary conservation, maximum exploitation of domestic resources, careful management, and stringent rationing, by 1944 this had been reduced to only 27 million tons, despite the demands of a global war. - Although already in negotiations for an Armistice, on November 6, 1918, the Imperial German Army issued what would be its final call for conscripts, dipping once more into a very depleted pool of available manpower. - One effect of the Great Depression on the Armed Forces was that the quality of personnel rose, as large numbers of men attempted to join the services, permitting greater selectivity; by the mid-1930s more than 85-percent of enlisted men had completed some high school, with the result that most of the younger personnel were actually better educated than their NCOs. - Although not reported in the press, during the “Punitive Expedition” into Mexico in 1916, John J. Pershing arranged for the army to establish brothels for the troops, with the result that the incidence of venereal disease was extremely low, a measure he failed to take during World War I, with significant consequences. Portions of "Al Nofi's CIC" have appeared previously in Military Chronicles, Copyright © 2009 Military Chronicles (www.militarychronicles.com), used with permission, all rights
<urn:uuid:c006b719-5d2c-44cc-8897-d38c162536cf>
CC-MAIN-2017-13
https://strategypage.com/cic/docs/cic273a.asp
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189244.95/warc/CC-MAIN-20170322212949-00535-ip-10-233-31-227.ec2.internal.warc.gz
en
0.967846
523
2.984375
3
I have become increasingly aware of how un-accessible websites and other technology can be for folks with disabilities. The W3C Web Accessibility Initiative has a really great description of what “accessibility” means: The Web is fundamentally designed to work for all people, whatever their hardware, software, language, culture, location, or physical or mental ability. When the Web meets this goal, it is accessible to people with a diverse range of hearing, movement, sight, and cognitive ability. Thus the impact of disability is radically changed on the Web because the Web removes barriers to communication and interaction that many people face in the physical world. However, when websites, web technologies, or web tools are badly designed, they can create barriers that exclude people from using the Web. My boss first turned me on to website accessibility in my first few weeks by sending me website after website of web accessibility standards and training. It’s really important to her and it has become really important to me too. I just came across this video of how blind people use an ATM that illustrates the challenges they face. I’ve often wondered about how well it was designed and it’s pretty clear that there were some serious flaws in both the software and hardware design. In fact, he has all kinds of videos about how blind people go about their everyday lives. As design professionals, we really need to start making this a greater priority in our design. According to some studies, as much as 20% of the population has some kind of disability (obviously not all are unable to use the Internet), but it’s still a compelling number to think about. I keep a sketchbook (I have three currently being actively used actually) and I have since I was but a wee pre-teen. It ebbs and flows. Sometimes I find myself adding things daily and other times I won’t add a thing for several weeks or months. If you’re looking for a book to inspire you to keep a sketchbook or journal, I would highly recommend Graphic: Inside the Sketchbooks of the World’s Great Graphic Designers by Steven Heller and Lita Talarico. It’s filled with full page color scans of journals from illustrators, designers, animators, comic artists, web designers, architects… each page opens up a room into an artist’s personal world. I was surprised by the level of sketches and writings. What one artist thinks of as a quick sketch looked to me like something you could mat, frame, and hang. Have you guys seen this? Teachers are using Daft Punk’s song Harder Better Faster Stronger to teach kids English. They aren’t the only ones to use this song for education, but it’s amazing how music can be an educational tool for language. You can even see what the teacher did to educate the kids: “I mapped out the seats/words, so after they sat according to the seating chart (attached), we read the lyrics off a lyrics site. Everyone read them together, slowly and then sped up while moving their word signs.” What other ways are teachers using compelling media to teach kids? One of my favorites is when teachers allow kids to watch events in real time. When September 11th happened, I remember my history class wheeled in a TV and we watched reports about what was happening. I imagine (in that instance), it was largely out of immense curiosity on the teacher’s part too, but I still appreciated it. Can you think of any time when a teacher used creativity to educate? Have you guys seen this? In the same way that I absolutely love the East Austin Studio Tour (an annual event in Austin, Texas where artists open up their studios for you to see the space where they work!), I love seeing into the libraries of famous writers. Looking at these photos, I wonder what each of the writer’s would stare at when the perfect word eluded them. Or what they read when they needed inspiration. As my friend, Elizabeth, said: “Norman Mailer’s looks the most inviting until you remember that he once stabbed his wife at a party. (They stayed together.)” Photo via National Trust. I try not to link to TED Talks too often, because if I do I’m afraid I just won’t stop, but this one is too good to keep to myself. Luis von Ahn and his team (the guys behind reCaptcha, a free anti-bot service that helps digitize books) are releasing a new project called Duolingo. With Duolingo, you learn a new language FOR FREE and in the process help translate the web into different languages. There are just so many things that blow my mind with this concept. It’s just a really clever way to solve a problem. Incredible. But more than that, they’re giving this away for free. FREE! They aren’t asking for a dime! Von Ahn explains why in the TED Talks, but it still blows my mind that he could have charged a small fee, but he didn’t, because education is more important than money. As of today, they’re still in Beta, but you can sign up for languages now and hopefully get invited to participate early. Every year in mid-November, artists in Austin, Texas open up their studios to the public for the East Austin Studio Tour. There are demonstrations of process, free samples (and beer and food!), works in progress, and artwork for purchase. My favorite thing is seeing into the lives and spaces of some of the most talented artists in Austin. Some spaces are almost obsessively organized, others are piled with inspiration, paper samples, sketches, leftover supplies… The range is really pretty fascinating. This year, Chris, Danielle, and I hit up E.A.S.T the right way: on our bikes. (P.S. If you ever visit Austin for a major event that requires you to navigate the city when it’s packed, I highly recommend biking. i.e. SXSW and Austin City Limits.) Here were a few highlights: In complete disclosure, Gwen is a family friend, but I’d love her work even if I didn’t know she was the perfect definition of cool. (Seriously, that’s one groovy chick.) Austin Creative Reuse (ACR) Again, in complete disclosure, I knew about ACR before E.A.S.T, but these guys are awesome. They recently reached non-profit status and their whole schtick is that they collect supplies and materials that would otherwise end up in a landfill and sell them to artists, teachers, etc. Sadly, no photos. Grace McEvoy, Photography McEvoy has some really wonderful photos of Austin using a fish-eye lens. In some ways I feel like it’s cheating, but I have to admit they’re still pretty. Chris and I go to Vertallee Letterpress every year. They always have amazing work and cool demonstrations and you can get a really solid look at their working letterpress(es). Every year, we say we’ll get our business cards printed by them… You can buy their letterpress cards on etsy too! East Side Design at the Willow House, Sculpture So, these guys are in the process of renovating a house on Willow Street. Instead of throwing out the old materials, they used them to build this really cool sculpture in the backyard. I think this was probably my favorite thing I saw this year. Reused materials to make something super awesome. I love the colors and the texture. It’s just way cool. All-in-all, it was a pretty rad couple of weekends. I already can’t wait for next year! Have you seen Retronaut? It’s a website that has photos, advertising, illustration, etc from the past. It looks like a great place to get some inspiration for time-inspired design or art projects, but it’s also just kind of fun to look around. In high school, I despised science. No really. Despised. I could do math and English all day, but don’t effing make me do science. Please. For the love of… Okay, so these days I’ve been embracing science a lot more. 1) I get to be selective about what I learn and 2) it’s just a whole lot more entertaining. (See episodes of The Big Bang Theory to see what I mean…) A couple of months ago, I came across Minute Physics! They’re a bunch of YouTube videos about “cool physics and other sweet science – all in a minute!” And it’s pretty easy to understand with simple drawings for clarifications. To settle you in, here is one on Schrödinger’s Cat! And another one on fire! Seriously though. Go check out the others on the Minute Physics YouTube channel! Just stumbled across this video called Murmuration. It’s powerful and incredible and it made me feel good about living on this planet. It’s so incredible how organizations of animals move together, isn’t it? Enjoy!
<urn:uuid:fd4733a8-4c2c-4f72-a4ea-2e411c82b91a>
CC-MAIN-2016-18
http://kacihampton.com/blog/
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860112228.39/warc/CC-MAIN-20160428161512-00139-ip-10-239-7-51.ec2.internal.warc.gz
en
0.954644
1,965
2.59375
3
Nigeria/Biafran: Wounds that have never healed The Nigerian state is intricately laced with violent threads, woven into it by its colonial, military and ethnic setup. The Nigeria-Biafra war of 1967 to 1970 was both an outcome and a symptom of this configuration. This violent setup of the state is partly why the Biafran question remains an open sore. It has engendered heated activism in the country by groups like the Indigenous People of Biafra whose activism has often collided with the firepower of the state. The Igbos are one of three largest ethnic groups in Nigeria, situated in the southeast. Feelings of collective trauma and a lack of justice after the war have deepened their grievances and reinforced agitations for Biafra, which is both a contested geographic home for the Igbos and an ideology of resistance. One of the worst outbreaks of violence was in 2016 when Nigerian security forces opened fire on protesters in Aba, Abia, an Igbo state in the southeastern part of Nigeria. Thirteen people died from gunshot wounds. The government went on to ban the activities of the Indigenous People of Biafra led by their founder, Nnamdi Kanu. His messianic approach to the Biafran question has divided opinion. While many in the southeast support the Biafran cause, they are uncertain that violence in the form of another war of secession is the right way to go. The sore that is Biafra is once again at the centre of tensions in Nigeria. On June 1, 2021, President Muhammadu Buhari posted a tweet in response to the ongoing unrest in the southeast in which he promised punitive measures against Biafra supporters: Many of those misbehaving today are too young to be aware of the destruction and loss of lives that occurred during the Nigerian civil war. Those of us in the fields for 30 months, who went through the war, will treat them in the language they understand. Some Nigerians saw the president’s tweet as instigating another civil war and called on Twitter to delete it. Twitter deleted the president’s tweet and temporarily locked his account. The government reacted by declaring an indefinite suspension of Twitter in Nigeria. Fifty-one years since the culmination of the war, it bears examining the current situation around the Biafran question. The Biafran state was birthed by a series of events starting with the January 1966 military coup. Two features stood out that were to be significant in the unfolding of future events. First, it appeared that the coup had been led by young Igbo military officers. The second was that more political leaders of northern extraction were killed than other regions of the country. General Aguiyi-Ironsi, an Igbo, foiled the coup and became the head of state. He transformed Nigeria into a unitary state from its federalist structure. This act, coupled with the fact that the coupists were detained and not immediately prosecuted, led to allegations that the January 1966 coup was an “Igbo plan” to consolidate power at the centre. In May 1966, Igbos in some parts of northern Nigeria were attacked and numerous deaths were recorded. This was closely followed by a July 1966 counter coup that unseated Ironsi. It was led by soldiers who were predominantly of northern Nigerian extraction. Following the counter coup, the governor of the eastern region, Lt. Colonel Odumegwu Ojukwu, demanded a confederal system of government to give the Igbos and ethnic minorities some level of autonomy. The inability of Ojukwu and General Yakubu Gowon (the then head of state) to reach a consensus on this issue, coupled with the killing of Igbos in northern Nigeria, became the immediate cause of the attempted secession of eastern Nigeria – Biafra. As envisioned by its leaders, the Republic of Biafra was established with the intention of being a new model for Africa … to fulfil the decolonising mission which the ‘still- born’ Nigeria failed to do. Instead, Biafra was besieged and dislodged by the Federal Military Government in a 30-month war in which more than 1 million Igbo civilians were killed. The war ended in 1970. But Nigerians have continued to witness a flurry of military despotism and the re-invigoration of ethnic politics. Narratives of a war past Gowon declared that post-war reconciliation policies would be underpinned by the idea of “No Victor, No Vanquished”. With this decree, a singular worldview was enforced to “bind up the nation’s wounds”. But little reconstruction took place in the affected and dilapidated Igbo communities. As a result, many Igbos remember the war with wrenching bitterness. They also bemoan the failure of the government to address some of the conditions pre-existing the war. These include an imbalanced ethnic power structure at the centre and a militarised state. The hallmark reaction to the state structure has been violence. The activities of Boko Haram, and “unknown gunmen” who have turned kidnapping for ransom into a lucrative business, are prime examples. These violent non-state actors appear to act with impunity. The feeling of desertion by the central government has never left Biafra. As recently as this year, the Indigenous People of Biafra created an armed security outfit with the aim of fighting off attacks by “unknown gunmen” who are often blamed for instigating communal unrest. Tension flared up within the Igbo community after federal troops were dispatched to crack down on the Indigenous People of Biafra’s armed unit. The clashes have, once again, reignited serious debate about the viability of “one Nigeria”. There have been calls for a restructuring to true federalism and revamping the country’s constitution. This could allow the different regions in the country to be semi-independent and still function as a single unit. Yet, there’s no guarantee that regionalism – or a new constitution – would address the many structural challenges in the country, particularly the militarisation of the state and ethno-religious politics. The situation is so dire that some people have concluded that Nigeria has failed as a state. On the whole, realising new ways of co-existing may best be achieved when a sense of stability has been restored, and people can express their freedom of speech, movement, and association. Pressing questions about identity, justice, and a sense of belonging need to be resolved through negotiations. This outcome could prove more durable. Finally, the Buhari government’s response to the Twitter issue once again raised questions about whether its modus operandi is simply to rely exclusively on brute force. In this context, the agitations of groups like pro-Biafra could be seen as providing an ideological impetus to a set of beliefs in justice and fairness rather than a mere force for ethnic mobilisation. There are still those who lived through the Nigeria-Biafra war, and as long as memories remain, there will be questions about accountability and justice. Beyond this is the realisation that the Igbo or Biafran question is the Nigerian question. This calls for a reassessment of how the country is governed.
<urn:uuid:03fd4f28-26bf-49a3-942b-b54ac7900f1a>
CC-MAIN-2022-05
https://www.theafricantimes.com/nigeria-biafran-wounds-that-have-never-healed/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304947.93/warc/CC-MAIN-20220126101419-20220126131419-00321.warc.gz
en
0.971535
1,555
2.84375
3
Definition of Genus chlamydosaurus 1. Noun. Frilled lizards. Generic synonyms: Reptile Genus Group relationships: Agamidae, Family Agamidae Member holonyms: Chlamydosaurus Kingi, Frilled Lizard Genus Chlamydosaurus Pictures Click the following link to bring up a new window with an automated collection of images related to the term: Genus Chlamydosaurus Images Lexicographical Neighbors of Genus Chlamydosaurus Literary usage of Genus chlamydosaurus Below you will find example usage of this term as found in modern and/or classical literature: 1. The Cambridge Natural History by Sidney Frederick Harmer, Arthur Everett Shipley (1901) "This frightening attitude is interesting, since it occurs in a much more developed condition in the following genus. Chlamydosaurus kingi. ..." Other Resources Relating to: Genus chlamydosaurus
<urn:uuid:0ca69a3a-f2a5-4e5c-ad89-24096bfe1fc1>
CC-MAIN-2013-48
http://www.lexic.us/definition-of/genus_chlamydosaurus
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164936474/warc/CC-MAIN-20131204134856-00077-ip-10-33-133-15.ec2.internal.warc.gz
en
0.825105
200
2.671875
3
Water Quality Research on Inland Waters Dr. Joseph D. Ortiz Kent State University, Department of Geology Nutrients provides the raw materials needed to fuel algal blooms, the rapid growth of single-celled algae in lakes or the ocean. Increasing nutrients and water temperature can also alter the ecology of aquatic systems, creating conditions that favor Harmful Algal Blooms (HABs) by algae capable of producing toxins. Lake Erie and other bodies of water in Ohio and around the world are experiencing increasing numbers of HAB-related problems. Blooms of these nuisance species can result in a number of environmental problems such as illness, foul odors and bad taste. When the algae die, they sink to the bottom and decompose. The result is a drop in oxygen in bottom waters called hypoxia or if no oxygen remains, anoxia. That can release trace metals into the water or make the water more corrosive. I use remote sensing to study the distribution and compositon of algae to monitor and predict HABs. Apply online to the Graduate Program in Geology at Kent State University. More information about the Kent State University Geology Graduate program. in my lab focuses on using visible and near infrared energy to discover how algal blooms affect water color. Using multivariate statistics, we can identify different types of algae based on how they alter water color. This work can be done using remote sensing data, in the field with handheld sensors, or in the lab using filtered I work with Dr. George Bullerjahn (Biological Sciences, BGSU), Dr. Jen Mou (Department of Biological Sciences, Kent State University), and Dr. Adem Ali (Department of Geology and Environmental Science, College of Charleston). Our work has been funded by the Ohio Department of Higher Education and the Ohio Sea Grant Program. I collaborate with NASA Glenn, the USGS Lake Erie Biological Station, and other researchers in the OhioView consortium. An article about my work was recently featured in the Environmental Monitor, the online trade journal for Fondriest Environmental, which sells and services scientific instrumentation for environmental monitoring. My work has also been showcased in the Twineline, the Ohio Sea Grant's journal, and as part of a panel discussion on water quality technologies in Ohio on NPR's "The Sound of Ideas". WKYC TV aired a piece regarding my role in the NASA monitoring program that responded to the 2014 Lake Erie HAB that shut down the water supply in Toledo, leaving almost 500,000 Ohioans without water for a full weekend. Articles from Kent State sources regarding my research have appeared on the Division of Research and Sponsored Programs website ("Lake Erie's Algae Monitored from Space") and in the Kent State Magazine ("Toxic Threat"). Here are some papers you can read to learn about our work: Ali, K.A., and J.D. Ortiz, Multivariate approach for chlorophyll-a and suspended matter retrievals in Case II waters using hyperspectral data, Hydrological Sciences Journal, 2014. DOI:10.1080/02626667.2014.964242. Ortiz, J.D., Witter, D.L., Ali, K.A., Fela, N., Duff, M., and Mills, L., Evaluating multiple color producing agents in Case II waters from Lake Erie, International Journal of Remote Sensing, 34 (24), 8854-8880, 2013. Mou, X, Jacob, J., Lu, X., Robbins, S., Sun S., J.D. Ortiz. Diversity and distribution of free-living and particle associated bacterioplankton in Sandusky Bay and adjacent waters of Lake Erie Western Basin, Journal of Great Lakes Research 2013. Ali, K.A., Witter, D.L., and J.D. Ortiz, 2012, Multivariate approach to estimate color producing agents in Case 2 waters using first-derivative spectrophotometer data, Geocarto International, Early online release: 10/30/2012 DOI:10.1080/10106049.2012.743601. Ali, K.A., Witter, D.L., and J.D. Ortiz, Application of empirical and semi-analytical algorithms to MERIS data for estimating chlorophyll a in Case waters of Lake Erie, Environmental Earth Sciences; DOI 10.1007/s12665-013-2814-0, published Oct 1, 2013. Witter, D., Ortiz, J.D, Palm, S. Heath, R., Budd, J., Assessing the Application of SeaWiFS Ocean Color Algorithms to Lake Erie, Journal of Great Lakes Research, 35, 361-370, 20.
<urn:uuid:6bf34c64-3d2e-426b-bc32-a87cdc5f3b57>
CC-MAIN-2016-44
http://www.personal.kent.edu/%7Ejortiz/home/wqr.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717783.68/warc/CC-MAIN-20161020183837-00492-ip-10-171-6-4.ec2.internal.warc.gz
en
0.839987
989
3.1875
3
This passage from the Gospel of St. Luke is a parable about a destitute man named Lazarus and a rich man, who at times is called by the name Dives (the word dives in the Latin Bible refers to a “rich man”). Jesus places Lazarus sitting day after day by the rich man’s front door. Lazarus is sick. He is at Dives’ home hoping to receive a scrap of food from his table. The food never comes. Jesus continues to tell the story which culminates in the death of both men and their subsequent judgment. Lazarus is welcomed into Paradise and is seen talking to Abraham, while Dives is condemned to the flames of Hell hoping for a drop of water to quench his thirst. The parable concludes with Abraham rejecting Dives’ wish that someone from Paradise will inform his relatives of his eternal sentence in an attempt to get them to change their way of life. Abraham says that it is fruitless: “‘If they do not listen to Moses and the prophets, neither will they be convinced even if someone rises from the dead.'” You see its not just the issue of Dives, as a fellow human being, not providing nourishment and solace to Lazarus. It is the fact that Dives does not even acknowledge Lazarus. He and his servants pass him every day with no perception, no acknowledgement, no understanding, no charity. How many times have we done that to men and women standing at intersections, asking for a scrap that falls from our table. We get uncomfortable at the thought that they are there. Irritated at bad government decisions that pushed them out on the street, supposedly to be helped by the social justice safety nets; nets filled with holes. I saw a woman today holding a sign that said “I need a miracle.” There was no exclamation point or happy face penned next to it. Lazarus may be outside our front door, or, even in the house. Question: are we passing by people in our own family who are in need? The neighbor who lives next door? A member of our parish? Are we passing by Jesus Christ? Lent is the natural time to reflect on how well we remember and assist, in some small way, those around us who are in need. It may be financial help, or it might just be they need someone to talk to. Upon reflection, we may find ourselves missing the mark, even committing sins of omission. Let’s remember that, unlike Dives, we still have time to do something about it. My thanks to Rev. Msgr. Anthony Mancini, Pastor of the Cathedral of St. Peter and Paul, Providence, Rhode Island USA, for stimulating this blog post. Copyright © 2011- 2019 Deacon Paul O. Iacono – All Rights Reserved.
<urn:uuid:08f993a4-b337-4d29-a42f-0e5a72b4b0f2>
CC-MAIN-2019-51
https://fraangelicoinstitute.com/2019/03/21/luke-16-19-31-is-lazarus-in-your-house/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541301014.74/warc/CC-MAIN-20191215015215-20191215043215-00344.warc.gz
en
0.973858
593
2.5625
3
Osteoporosis is a very common condition in older women. However, many people do not realize the devastating consequences of untreated osteoporosis, falls, and broken bones. While certain risk factors for the condition are unavoidable for some women, there are actions that people can take to decrease their chances of developing the condition and its consequences. Read more to understand healthy aging amidst the risk for osteoporosis. Causes of Osteoporosis Osteoporosis is a skeletal condition that is caused by bone loss and increased risk for fractures. Osteoporosis is especially linked to menopause. Estrogen is a sex hormone that is elevated in women of child-bearing age. Estrogen protects bone density by stimulating the cells that make bones and inhibiting the cells that degrade bones. Menopause causes a sharp decrease in estrogen, therefore decreasing the protection the bones used to enjoy. This causes bone resorption, decreased bone density, and ultimately increase fracture risk. In some people, osteoporosis can be due to secondary causes such as medication side effects. Common medications that are associated with osteoporosis are anticonvulsants, L- thyroxine, glucocorticoids, anti-coagulants, and proton pump inhibitors for heartburn. Lastly, osteoporosis is often associated with late stage kidney disease due to the changes in calcium in the blood. Osteoporosis is both due to genetic and environmental risk factors. For example, risk factors for this condition include cigarette smoking, family history of osteoporosis, malnutrition, and low body weight. Osteoporosis is typically diagnosed with something called a DEXA scan. DEXA stands for Dual-Energy X-ray Absorptiometry. The scan calculates the density of the bones. Bones that are less dense, or 1 to 2.5 standard deviations below the mean, are diagnosed with osteopenia. This means that their bones are less dense and they are at risk of developing the more serious condition, osteoporosis. Osteoporosis is diagnosed with a DEXA scan score of 2.5 or greater standard deviations below the mean. Generally, all women age 65 and older and men 70 or older should get a DEXA scan. Treatment of Osteoporosis Treatment first starts with life-style measures. First, people with osteoporosis should avoid alcohol and nicotine. They should also be sure to take in enough calcium and Vitamin D, either through diet or supplements. They should also avoid glucocorticoids, commonly referred to as steroids. Lastly, one often overlooked measure is physical activity. Physical activity, especially weight-bearing exercises, are a major way to prevent osteoporosis and reduce the likelihood of falls and poor outcomes. Weight-bearing and strengthening exercises help increase core strength to reduce the risk of falls. There is also medical therapy to treat osteoporosis. If a person has a history of fractures due to bone fragility in addition to a DEXA scan of -2.5 or lower, a physician may consider starting them on medical therapy. Medical therapy includes bisphosphonates, a medication that inhibits bone resorption. The side effect of bisphosphonates is esophagitis, or inflammation of the esophagus. These pills should always be taken while the patient is upright for at least 30 minutes, with plenty of water. Another medical option is a selective estrogen receptor modulator (SERM) called raloxifene. Raloxifene is a great option for people who have a risk for breast cancer and have osteoporosis as it decreases the risk for both. However, it also increases the risk for blood clots. People who have blood clots should avoid Raloxifene. Estrogens, often in combination with progestogen therapy, is another option that is often used in post-menopausal women. Since estrogen protects bones from resorption and encourages their density before menopause, it does the same after. Additionally, hormone therapy has the added benefit of helping menopausal women with their menopausal symptoms. However, hormone therapy has side effects and should not be used in certain women. Specifically, it should not be used in people with a history of certain cancers, cardiovascular disease, or blood clots. Consequences of Untreated Osteoporosis The dreaded consequence of osteoporosis is falls with subsequent fracture. Medical literature shows that falls in the elderly lead to a variety of worse outcomes. For example, increased mortality, increased hospitalizations, immobility, respiratory infections, internal trauma, and brain bleeds are just some of the consequences. Physicians avoid falls in the elderly whenever possible. Osteoporosis is a very common disease in older people, especially women. While many people have heard of it, they may be less familiar with the devastating outcomes of untreated osteoporosis. Thankfully, there are a variety of treatment options including pharmacological and lifestyle treatments. Contact us today at the Anti-Aging and Wellness Clinic to learn more about leading a healthy lifestyle and avoiding osteoporosis.
<urn:uuid:7b1a3e46-6f93-4bc4-bb49-e3f3226bf70f>
CC-MAIN-2023-50
https://antiagewellness.com/2020/05/osteoporosis-and-aging/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00630.warc.gz
en
0.947016
1,078
3.546875
4
It is the first day of a new school year. I look out over the expectant faces of my students, excited to get to know them and for us to learn from each other. I want to do right by all of them, to be the teacher that inspires them and helps them to become the people they always wanted to be. But there is something in the way of all of that; it is in all of our ways. It is something called implicit bias. Defined as “bias in judgment and/or behavior that results from subtle cognitive processes (e.g. implicit attitudes and implicit stereotypes) that often operate at a level below conscious awareness and without intentional control” (NCSC, 2012), implicit bias is everywhere. These biases are the assumptions made before we even know we are making them, whether it is an unintentional association between men and science and women and humanities or a person who is consciously against racism who demonstrates an implicit preference for job candidates of a particular racial background. Here is a bit more about implicit bias from the Kirwan Institute: - Implicit biases are pervasive. Everyone possesses them, even people with avowed commitments to impartiality such as judges. - Implicit and explicit biases are related but distinct mental constructs. They are not mutually exclusive and may even reinforce each other. - The implicit associations we hold do not necessarily align with our declared beliefs or even reflect stances we would explicitly endorse. - We generally tend to hold implicit biases that favor our own ingroup, though research has shown that we can still hold implicit biases against our ingroup. - Implicit biases are malleable. Our brains are incredibly complex, and the implicit associations that we have formed can be gradually unlearned through a variety of debiasing techniques. When I first heard about implicit bias at a teaching workshop on inclusivity, I thought for sure that it did not apply to me. So I decided to test the theory in two ways. First, I went to Project Implicit and took some of their tests on implicit bias. As it turns out, I had a strong likelihood of favoring one particular imagined group over another: a clear sign of implicit bias. Then I took this information and applied it to my classroom grading techniques. While my classroom grading did not demonstrate an implicit bias along gender or racial lines, I thought I would try out blind grading to see what happened. Instead of having students include their names on exams, they included their identification numbers so that I did not know whose exam it was. Once I graded the exam, I matched it with the student. And my bias was revealed. When a student that I had implicitly labeled “good” did poorly, I was surprised; likewise, I had a similar reaction when a student whom I had implicitly assumed would not perform well received a high grade. Thus, sometime over the course of the class, I had subconsciously put students in categories of achievement based on prior performance, and this could potentially impact the assumptions I would make going into the grading of an exam. Having realized this, I made arrangements to make all of my grading as blind as possible and am taking steps towards improving my teaching in other ways as well. The most important things to remember about implicit bias are these. - You probably are implicitly bias. - Implicit bias is malleable, which means that you can change it. Implicit bias in education is extremely problematic, as it often targets women and minorities in the assumptions that educators make about potential performance. There are some excellent resources to learn more about implicit bias, and they are all great places to start.
<urn:uuid:9093482e-8923-4d5b-95d6-16f3d0d72c1c>
CC-MAIN-2017-22
http://www.womenadvancenc.org/2016/05/19/youre-more-biased-than-you-think/
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612283.85/warc/CC-MAIN-20170529111205-20170529131205-00334.warc.gz
en
0.974439
746
4.03125
4
- Harvest raspberries. - Set up and bring down giant tents were raspberries are in. - General labor around a farm. - Maintain campsites or recreational areas - count trays - pick the produce depending on what it was - fixed up the trays for the workers - had given and replaced the water - Plant sweet potatoes at the beginning of the season. - Harvest potatoes at the end of the season. - Seasonal work only. - Keep areas neat while working and return items to correct locations following demonstrations.Arrange for storage facilities when required. - Plan environmental restoration projects, using biological databases, and environmental strategies. - Maintain campsites or recreational areas. - counted and placed grape trays - picked mature produce - Oversee all project activities and be the main contact point for the donor and the field staff - Ensure project activities comply with the policies and regulations of the donor organization. - Lead and motivate the project team and monitor project activities and project expenditure and coordinate work with consultants and volunteers in the project - Ensures close collaboration and coordination with cooperating partners to guarantee smooth implementation of activities and achievement of results.
<urn:uuid:2248b67e-1cd2-4781-8605-1052acb8ab1c>
CC-MAIN-2022-05
https://resumebuild.com/resume-examples/field-worker-resume-sample/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304883.8/warc/CC-MAIN-20220129092458-20220129122458-00688.warc.gz
en
0.891351
272
2.875
3
Samuel Johnson commented famously that the significance of a dog walking on its hind legs was not that it was done well but that it was done at all. As we celebrate the fiftieth anniversary of Vatican II, Johnson’s comment might apply to one of the most extraordinary achievements of that council, its "Declaration on Religious Liberty." The church’s embrace of religious freedom caught the attention of the world. For countless people who never read the document, its issuance had a transformative effect. The significance of the Declaration was that it happened. That was radical and had a lasting impact. Much of the actual document produced by the council was anchored in the past and did not anticipate the implications of the Declaration. In pronouncing on religious liberty the bishops were entering a new and to them a largely unfamiliar world. The council’s proclamation asserted that religious liberty was “inviolable,” pertaining to human dignity to be protected by constitutional limitation. While opening up the church to a radical new vision, the bishops, in their grasp of the working of religious liberty remained to a great extent in the mental world of the past. In that world, government could take account of religious life and show it favor even to the extent of giving “special civil recognition” to a particular religion. The inviolable right could be regulated within "due limits." The assertion that government could not require people to act contrary to conscience or restrain then from acting according to religious belief presumed a world in which the church acted as the conscience of the state. In our religiously diverse society implementing that statement would be a formula for anarchy. There are probably few laws that someone in America does not object to in conscience. The Declaration has been the subject of little subsequent development. American Catholics tended to assume that they know the meaning of religious liberty and that the church is now in harmony with American thinking. So the problem has been solved. However, the Declaration came at a time when the understanding of American religious liberty was degenerating into chaos. The Courts and the Establishment Clause In 1947 the Supreme Court in its Everson decision that applied the First Amendment to the states made two assertions that have confused the understanding of American religious liberty. The Court decided that the standard for evaluating laws under the First Amendment would be whether they aided religion and that the “establishment clause” created a wall of separation between church and state. Whereas the First Amendment was intended to take away jurisdiction over religion and confine the state to its own limited secular sphere, those statements made religion the focus of the courts and endowed them with enormous power over it. The no aid to religion standard made judges putative experts in religion with power to second guess believers about what aided their own religion. The wall of separation conferred on government authority to determine the proper realm of the church and confine it behind a figurative barrier of the state’s making. However, the First Amendment binds only the state; it does not apply to the church. The American bishops have bought into this skewed interpretation. The question for day nine of last year's Fortnight for Freedom asked how can government “promote” and “foster” religion “while respecting the principle of separation of church and state?” The Constitution and First Amendment rendered fostering, promoting—and manipulating—religion outside the jurisdiction of the limited American state. Separation of church and state is not a principle. It is not even a definition. It is rather a shibboleth and a test that secularists try to impose on America. As Philip Hamburger so brilliantly demonstrated, the phrase has always been a polemical device and one that was particularly employed by American anti-Catholics. Employment Division v. Smith, written in 1990 by Justice Antonin Scalia, represents a momentous step towards righting the understanding of American religious liberty. That decision returned the focus of government to what is secular and within its jurisdiction. It replaces the religious questions the courts have been asking with a proper secular one: under the First Amendment does the government have jurisdiction to enact the law/regulation at issue? If a law is within the legitimate power of government to enact, then the First Amendment does not apply. That amendment is about what is outside the power of government and what it may not do. Free exercise of religion is religion exercised free from government jurisdiction. It is not and cannot be primarily a guarantee that people can follow what their religion dictates, and the framers never intended that the government would be managed according to the claims of individual conscience. Government may give exemptions on account of conscience, but that is a different matter. If a law violates the First Amendment it is outside the power of government to enact and applies to no one. Conscientious exemptions, on the other hand, are given from laws which the government has the power to make. That tradition predates the Constitution. However, in granting exemptions, the government must stay within its proper secular limits and is still bound by the First Amendment. The conflation of the First Amendment and conscientious exemption is the source of much of the confusion surrounding the understanding of American religious liberty. The Smith decision has the virtue of clarifying the difference between them. The recent debate on the H.H.S. contraceptive mandate exemplified the confusion that currently engulfs the understanding of American religious liberty. If the mandate violated the First Amendment then the provision would have applied to no one since it would have been outside the jurisdiction of government to enact. However, even those who objected to it or questioned its reasonableness or necessity did not generally challenge the government’s authority to enact such a provision. Rather, the issue involved the nature of the exemption that the government had power to grant. The government’s initial exemption was based on complex religious criteria involving the evaluation of the inculcation of religious values and whether those seeking an exemption were adhering to the tenets of their own religion. Those criteria far exceeded the secular jurisdiction of government and did in fact violate the First Amendment. That such overreaching by government generated so little opposition generally and even among Catholic commentators is a measure of how much power Americans routinely concede to government over religion. Catholics would disagree among themselves on the meaning of those two religious issues over which the government so casually asserted authority. We would like, of course, to know if our schools are inculcating Catholic religious values, but the Constitution requires us to look elsewhere than the Department of Health and Human Services for that information. A Gift of Government? The confusion that engulfs the understanding of religious liberty in Catholicism and in American society lies in the fact that both church and state has each backtracked from the radical impulse that led to their respective embrace of religious freedom. Each now views that liberty as a gift of government. The church achieved its radical transformation by envisioning liberty as part of human dignity protected by constitutional limitations rather than a gift of government. However, deciding what is contrary to conscience would make the conscientious claims of innumerable citizens the standard for governing. If religious freedom is a human and inviolable right, then the promotion and fostering of religion will be the work of free citizens rather than the role of government. It certainly may not give special civil recognition to a religious community. Some opponents of the mandate have argued for a broader definition of a religious employer that would accommodate their conscientious objections. However, in a system that is constitutionally limited, government may not define what a religious employer is at all. Neither may it define what the free exercise of religion is because that is precisely freedom from such definitions being imposed by government whose task is to define its own secular, limited role. America long ago embraced the radical proposition that religious freedom is a natural right outside the power of government. However, allowing the state to judge what aids or hinders religion and authority to separate out and designate the sphere of the church represents a drastic retreat from that original stance. Endowing the state with power to determine who is following the tenets of Catholicism was just another step in this radical usurpation of jurisdiction over religion. Critics of Smith concede that they view religious freedom as a gift of government when they define it as a process of striking “sensible balances between religious liberty and competing prior governmental interests.” Before the American Revolution governments struck what they regarded as sensible balances and granted religious toleration to some and not to others. James Madison rejected that toleration in favor of the free exercise of religion, i.e., freedom from government jurisdiction in religion at all. Our religious liberty does not proceed from balances struck by politicians and judges but from a constitutionally limited government with no power to strike such balances. Madison told the Virginia Ratifying Convention in 1788 that the proposed federal government had not “the shadow of right to intermeddle in religion.” The Fathers of Vatican II proclaimed our religious freedom as inviolable, pertaining to our dignity and protected by constitutional limitation. We need to return to that magnificent impulse and now develop its implications. The bishops at the council wrapped their Declaration in the remnants of more than a thousand years of Christendom. Otherwise the Council would hardly have approved the document. The radical impulse of their Declaration demands that we abandon those remnants, and the time has surely come to do so. It is not the role of a constitutionally limited state to promote, foster or show favor to religion. Neither is it the role of government to see that the inviolable right to religious liberty is exercised within “due limits.” Rather American religious freedom is a command that the government stay within the due limits placed on it by the Constitution thus freeing citizens to define and exercise their religion. Those who make radical pronouncements do not always grasp the practical consequences of their actions and the bishops at Vatican II did not work out the implications of their radical proclamation of religious liberty. If Catholics can now address the consequences of seeing religious liberty as inviolable, as proceeding from a limited state rather than as a government protected privilege, they can build on the great heritage they inherited from Vatican II. They can also consider what religious freedom means not only in the state but also in the church. And above all, they can contribute to the renewal of the understanding of our heritage of American religious liberty that has been so confused by the rhetoric and reasoning of the Supreme Court—though not by its decisions. The task of clarifying the role of a constitutionally limited government with no power to foster religion, to define and separate out the church, to assess claims of conscience, or to decide if people are following the tenets of their religion could well begin with a re-reading of the Smith decision with new eyes.
<urn:uuid:1f17529c-3dfd-4246-b8b9-27ee67c89dea>
CC-MAIN-2018-51
https://www.americamagazine.org/issue/religious-liberty-50
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826800.31/warc/CC-MAIN-20181215061532-20181215083532-00215.warc.gz
en
0.965477
2,173
2.609375
3
Dissertation On Roast Pig Lamb ,ZXauto. where the help novel essay questions Andreas drexler dissertation; How to write a persuasive essay with a thesis statement; find out in this lesson in whichcreative writing lesson plans 5th grade.drinking and driving persuasive speech english language teaching phd thesis homework help 5th grade social studies Pkw mit einem Besetzungsgrad von 1,3 Personen pro Fahrzeug etwa 125 Gramm CO2 pro Personenkilometer aus. ap ccot essay rubric Persuasive essay lesson plans 5th grade. Elements of essay powerpoint presentation. 100 best college essays work letter. Persuasive essay lesson plans 5th grade. tunnel diode thesis Persuasive Writing Ideen für Second Grade. Das Ziel des Schreibens ist überzeugend , den Leser zum Handeln zu zwingen oder zu beeinflussen Meinung des Contact us at firstname.lastname@example.org Twitter Facebook Google+ Online veröffentlichung dissertation vg g a cv for academic positions 5 . online dissertation tu münchen · writing persuasive essays 5th grade essay for thesis vs dissertation · online dissertation vg wort · thesis writing lesson plans Essay Writing Lessons For 5th Grade tierfabriken-widerstand,org/11150-literature-review-for-motivation-of-employees/ steps to write a persuasive paper barriers to critical thinking hum 114 What is an Opinion? Expository writing takes many forms, during this unit we will focus on opinion and persuasive writing. View: “Fact vs. Opinion” PPT University of chicago essay - I need to write an essay fast on mother should not go out to work · ?writing=college-exam-essays college exam essays. TRAININGSZEIT Kitu Islikon:. richard wright essay the ethics of living jim crow This powerpoint is one of the lessons that i. 5th grade writing strategies class--persuasive writing Writing tips: essay organization - unlv writing center The Writing a thesis statement for a persuasive research paper How do you write apa format paper Teaching persuasive essay writing high school Essay lГ¤nge Apa research paper format with headings Writing prompts for essays 5th grade essay conclusion tourism Jan 17, 2010 · I teach a weekly online class to virtual students in my school, focusing on 5th grade Writing Strategies. Persuasive Writing Lesson PowerPoint moran23.writers workshop personal essay unit · phd research proposal climate 5th grade essay · map symbols persuasive essay prompts for high school · essay civil thesis statement about facebook addiction A deep persuasive essay works with amazingly well-analyzed truth to help with a persuasive thesis, and in . School making lessons .. Should you be inside 5th grade and you will have an essay that's expected, these are some top-rated Crafting a Persuasive Essay - sbobet sbo homework sheets for 5th grade persuasive essay topics with examples teaching critical thinking skills in higher education a review of the literature steps in writing a good narrative essay Activities to see if you can you got lessons plans convince someone to 2nd 3rd 4th 5th grade persuasive writing, language, language, or someone positive or Mnster guide to a good persuasive essay book deckblatt. writing word problems 5th grade first step with custom essay; muss der hochschule, dissertation jura mnster, Good essay writing term papers on persuasive essay writing lessons. essay about reading habits an argumentative essay · help with writing a persuasive essay · remember the a film review essay format, 0807 gre essay Movies writing examples fifth grade . Math Lesson Plan For Teachers! understand order today, download 3 Bonus a Persuasive Essay persuading the reader that the fourth grade will do well in the. Schueli Football They also have fun during the lessons. If we have a chef research paper Buy narrative essay prompts examples persuasive essays k nnen sie einen . Outline high school lesson plans middle school lesson plans change, die zeitnahe hilfe wenn sie Produk reputable resume writing 5th grade powerpoint virtual . Persuasive writing lesson fifth grade. Sep 4, and online, grades 4 the conclusion words. Grade writing lesson plans education. View pdf worksheet quotation … qui deja essayer vitamaline 29. Febr. 2016 persuasive essay lesson objectives persuasive essay lesson plan persuasive essay lesson plan 3rd grade persuasive essay lesson plan 5th Persuasive essays for 5th grade - Top-Quality Academic Writing and Editing Assistance Integrate opinion on this lesson plans educator resources, thesis statement welfare reform child care Lesson Plan: UNIT 8 Writing a Persuasive Essay . two essays: • Narrative or Descriptive • Persuasive Why is there always a persuasive essay on the exam?Persuasive essay: a great philosopher, argue, john proctor was married to prideful people, the play the stage directions at Proofread essay topics 5th grade. thesis on hospital design Persuasive Writing Lesson plans and teaching resources |Elementary Persuasive Writing| |Middle School Persuasive Writing| |High School Persuasive Writing| Cool persuasive essay topics - Stopp mit mir nicht Brainstorm, plan, and write an argumentative essay in the fifth grade. In this lesson you will learn how to organize ideas and evidence in a persuasive essay 5th Grade Reading – C3P01 the student friendly objective “I WILL IDENTIFY AN AUTHOR’S PERSUASIVE POSITION” and the lesson All of the grade level essay form 5 essay bias sample persuasive essays for 5th graders teaching how auf welchem album ist paperback writer to write an essay to elementary students prompt 2 Persuasive Devices, Fifth 5th Grade English Language Delivering a Persuasive Speech - Lesson analyze advertisements for examples of persuasive writing, Youtube english essay writing, Example of a research paper rough draft By: Antonio Howell Link building means developing inbound And 5th graders write a basic paragraph essay writing personas . Gplus share teaching theme, shields . how do you write an outline for a research paper 1 day ago synthesis essay lesson plans pdf examples of a 3rd grade persuasive essay college papers on substance 5th grade essay on world war ii Essay Writing Lesson Plans 4th Grade >>>KLICKEN SIE HIER<<< Essay writing lesson plans 4th grade Ochsenfurt (Bavaria) 3 words 8 letters t schuft wer boses dabei denkt. persuasive essay media violence has a negative . 4th grade Heidelberg Beerfelden (Hesse), Pfungstadt (Hesse) 5th grade social strategic alliance essay Persuasive argument and essay pre writing lesson english with checked age data Zeinab is the conclusion the warak method in fifth grade persuasive essay Persuasive writing samples 5th grade. Ryan, download for a. Advansys direct access prepaid visa. Then slotted into maybe paragraphs college essays on pinterest, see starbucks harvard business case study 6th Grade Persuasive Writing Lesson; Topics 6th grade argumentative essay persuasive essay writing a outline 5th.Middle school argument writing rubric.Middle school students enjoy writing persuasive essays, especially Lesson 3: Negotiating Criteria for a Persuasive Essay 17 Lesson 3 What You Need daylight savings time ap synthesis essay IB Extended Essay Advisor Comment and Assessment ap psychology essay rubrics Rubric Psychology Download lesson plans for … for every grade paragraph essay ap psychology essay rubrics rubric – persuasive essay 5th grade. Gästebuch - Feilmeier 27 Mar 2012 This week we are working on persuasive writing for the district writing My 4th grade students have been making "Geometric Cities" in groups. Persuasive Letter: Grade 4 Writing Unit 4 In third grade, students learn to write personal essays in which they support a big idea with evidence in the form essay on good things about my neighbours 5th grade students used their persuasive writing opinion essays from ELA class to create hidden : File Size: 60 kb Persuasive essay statements,Poetry analysis essay introduction example, Role of quality Lesson 18 Die Zimmer in einem Haus oder ideas for college essay View Notes - german 2 essay 2 from GER 0002 dare essays for 5th grade at Pitt. Each asks students to cool persuasive essay topics Do you underline play titles in Persuasive/opinion/argument essay & paragraph writing lessons, exercises free Jan 17, 2010 · 5th Grade Writing Strategies Class--Persuasive Writing 1. catholic entrance essay Inspire your students to develop a passion for writing, practice reading comprehension, and build reasoning, and considering your audience relates to persuasive writing with this colorful lesson. Persuasive Communication (Grades 9-12) Persuasive essay outline worksheet - Write My Research Paper For Persuasive Essay Assessment Rubric located at the end of this unit. Pay close . a list of issues that fifth grade students have used to write persuasive essays. psychosynthesis course In fifth grade, a printable essay writing worksheet for 10 and 11 year olds. 6th Grade need for stricter gun laws write my persuasive essay 6th grade topics In this lesson you will learn how to write the first draft of your essay by. community Fourth and fifth graders try their hand at persuasive writing. They listen to well-written persuasive articles so they can get a sense of what good persuasive writing is. jane eyre religion essay Persuasive Writing: Mini-Lessons, Strategies, Activities Professional Books: : Tara McCarthy: My 4th and 5th grade students really like the activities.11. Febr. 2016 teaching compare contrast essay 5th grade teaching compare contrast essay term paper on medical ethics · simple persuasive essay outline short essay on how i spent my summer vacations 3 May 2015 Writing a Persuasive Argument (Gr. 5) Grade Level: 5 Keep your classroom current and make lesson planning easier with our newsletters! 0.5 -in-teaching-essay-ku.php 0.7 http://givetclrm.leitungsen.de/hihyl/essay-writing-for-grade-1-nedu.php .leitungsen.de/beco/components-of-a-persuasive-essay-sow.php 2016-05-13 0.6 http://givetclrm.leitungsen.de/cecab/persuasive-essay-5th-grade-1332.php u.s constitution analysis essay example introductions for persuasive essays · creative titles 5th grade science projects photosynthesis . example of a good argumentative essay lesson planEarth Day Persuasive Essays [SMART Notebook lesson] Help your students write a five paragraph essay persuading others to go green! Subject: English Language Arts, apa persuasive essay outline Oklahoma university essay requirements United States, you'll have to check the laws of the country where you Teaching essay writing high school students Argumentative essay on death penalty; Writing a persuasive essay for 5th graders.5th grade writing a lesson. Be paid for your graphic organizer. Persuade others to decide how to write a persuasive essay grading rubric 5th grade; grade level: essays questions frankenstein Persuasive Essays 5th Grade Examples. About us; How it works; Prices; Examples; Help with Dissertation and Essay Papers. Common core ela lesson plans for 6th Middle school persuasive essay examples - Data analysis in 4 Apr 2012 Enter your students the free worksheets, lesson plans, and description Making inferencesworksheets for persuasive essay 5th grade, grade thesis literature review process Cheating in school essay Criminal justice research paper topics Essay on of mice and men dreams. 5th grade persuasive essay Teaching group activitiesObjective(s): The student will identify an author's persuasive position when reading persuasive texts. State Standards Covered: 5th Grade Reading – C3P01. the world is one essay KLICKEN SIE HIER<<< Essay writing teaching resources Grobalmerode (Hesse) of persuasive essay ks2 Landstuhl (Rhineland-Palatinate) Hannover Essay Munich informative essay topics 5th grade akademische jahresfeier bayreuth Service writing college admission persuasive essay. from scratch how to write an admission essay ks3 help with compare and 5th grade teaching 5th grade. tekmar essay e 021 NAPLAN achievement in reading, persuasive writing, language conventions and Analysis of kindergarten through fifth-grade dynamic indicators of basic early literacy skills probes. Marrickville, NSW: Primary English Teaching Association.
<urn:uuid:c119e3a1-6b14-4862-911a-d2e23c51584a>
CC-MAIN-2018-30
http://loaded-records.com/3623-5th-grade-lesson-on-persuasive-essays.php
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589757.30/warc/CC-MAIN-20180717164437-20180717184437-00027.warc.gz
en
0.805822
2,675
2.875
3
The bacteriophage (depicted here) is a bacterium's worst nightmare. Although antibiotics have saved countless lives throughout their long history in medicine, they are not without problems. Antibiotic resistance is a major concern. In fact, the World Health Organization (WHO) deem it "one of the biggest threats to global health, food security, and development today." Besides the looming terror of resistance, the use of antibiotics brings other concerns. For instance, although they destroy the bacteria that are causing disease, they also indiscriminately kill other species of bacteria. It is becoming ever clearer that our gut bacteria are an essential part of our health, and destroying them in huge numbers will have negative consequences. Antibiotics can also cause gastrointestinal distress — often because of the mass culling of bacteria. For these reasons, the hunt for alternatives to antibiotics is hotting up. Scientists in the Department of Nutrition and Food Studies at George Mason University in Fairfax, VA, are interested in the therapeutic potential of bacteriophages. What are bacteriophages? Bacteriophages are viruses that attack and kill bacteria. Where bacteria are found, bacteriophages will be close by. In fact, they are considered to be the most numerous organisms on earth. Although using a virus to fight off bacteria within our bodies might appear to be a risky idea, bacteriophages only attack bacteria, leaving human cells untouched. Also, they are highly specific to certain bacterial strains, meaning that there is no widespread cull of all species — neither good or bad. "Using viruses that infect only specific types of bacteria spares the many good bacteria in the gut, which are linked to numerous long-term beneficial health outcomes." Co-investigator Taylor C. Wallace, Ph.D. To investigate their potential benefits, the researchers recruited 31 people who were experiencing significant gastrointestinal distress but did not have a specific digestive condition. The group was split in two. Half of all the participants received the experimental intervention — four strains of bacteriophages that specifically attack Escherichia coli, a pathogen that is well known for causing gastrointestinal issues. The other half received a placebo. After 4 weeks of treatment, there was a "wash out" period of 2 weeks. Then, the group taking the placebo embarked on the bacteriophage treatment for 4 weeks, while the experimental group switched to the placebo for 4 weeks. 'No apparent side effects' The results were encouraging; there was a significant reduction in an inflammatory marker linked with allergic reactions called interleukin 4. The team also measured increased levels of bacterial species that are regarded as "good." For instance, people in the group who had early markers of metabolic syndrome saw an increase in Bifidobacterium spp. Also noted was a reduction in Clostridium perfringens, a common cause of food poisoning. And, importantly, no adverse reactions were recorded. As Wallace says: "We have shown for the first time that bacteriophage treatment has no apparent side effects, at least with short-term use." Also, the potential uses for bacteriophage treatments go beyond gastrointestinal complaints. For instance, Wallace and collaborator Tiffany Weir are now exploring the use of bacteriophages in supplements to help restore balance in the microbiome of people with metabolic syndrome. These individuals typically have altered gut bacteria populations due to ongoing inflammation. There may be a role for bacteriophages in developing countries, too. Specifically, people who experience nutritional deficiencies due to chronic diarrhea. The team is currently looking for partners to test its theories further. Interestingly, bacteriophages were used as antibacterial agents in the 1920s and '30s in Georgia and the United States. One main reason that they fell out of favor was the advent of antibiotics, which were much easier to manufacture, store, and prescribe. But with the threat of antibiotic resistance rearing its head, a shift back toward bacteriophages might well be on the cards.
<urn:uuid:1a27c531-afdc-40b8-b4f6-230bb99e4ec6>
CC-MAIN-2019-43
https://www.medicalnewstoday.com/articles/322084.php?iacp
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986675316.51/warc/CC-MAIN-20191017122657-20191017150157-00007.warc.gz
en
0.953164
832
4.09375
4
Shedding and Tail Loss in Leopard Geckos How do Leopard Geckos Shed? All reptiles shed their skin when they grow and leopard geckos are no exception to this rule (even though leopard geckos do shed differently than snakes and other lizards). Leopard geckos periodically she the outer layer of skin called the epithelial skin. When leopard geckos replace the superficial layers of skin, the skin of the leopard gecko goes into what is known as the resting stage. The resting stage ends when the cells that generate the new skin begin to divide from the old layer. When the two layers of skin begin to divide the leopard gecko will become more pale and dull (and sometimes even change color slightly) this is to be expected and one should never worry when this happens. When the old layer of skin is ready to shed from the leopard gecko it will begin to look like a “papery membrane” and then begins to shed off in sheetlike sections which may look similar to a peeling sunburn (leopard geckos do not shed in one piece as snakes do). Leopard gecko pull the skin off of their bodies with their mouth and eats them, possibly to gain the nutrients contained in the skin. Once the leopard gecko has fully shed the coloration and pattern will become very bright again. Shedding Issues in Leopard Geckos Some captive bred leopard geckos have a tendency to have shedding problems which can pose danger and even death to the animal, so it is important to be aware how the pet leopard gecko is shedding so the issue can be addressed and fixed immediately so that the leopard gecko can lead a healthy and long life. There are many factors that contribute to shedding problem which include (but are not limited to), low temperatures, a lack or abundance of vitamin A, weakness caused by injury, bacterial infections, viral infections, parasites, metabolic bone disease, and low humidity. Providing a pet leopard gecko with a proper diet and mineral and vitamin supplementation will help reduce possible health issues that may cause a gecko to shed improperly. Providing the pet leopard gecko with a humidity hut in the enclosure will also help the outer layer of skin to shed properly and reduce issues as well as provide adequate humidity that is necessary for proper shedding. Also, close observation of the pet leopard gecko , including fecal matter, level of activity, weight gain, weight loss, will help identify and eliminate possible health problems that may be causing shedding issues. When geckos fail to shed they look very dull and pale and show obvious signs of adhering old skin on the body, eyelids, and toes. Geckos that tend to have shedding issues also become listless and their behaviors change dramatically. If shedding problems are ignored and not quickly addressed it can lead to many complications such as eye problems, loss of digits (toes), infections, and in severe cases, death. How to Prevent and Treat Shedding Problems If a leopard gecko has obvious shedding issues there are several ways that one can prevent and treat the problem. The best way to prevent shedding issues (as stated above) is to provide the pet leopard gecko with adequate temperatures and humidity (especially during the shedding process). The basking area of a leopard gecko enclosure should range from 90-95 degree Fahrenheit and the cooler side of the enclosure should range from 85-90 degrees Fahrenheit. For proper humidity, one should provide their leopard gecko with a humidity hut (placed on the cooler side) with a coconut husk substrate or with vermiculite or sphagnum moss substrate (these types of substrate absorb and hold moisture). One should always make sure the humidity hut always contains moisture and that the substrate is damp (but do not add too much water to it to prevent mildew and mold from growing). Providing a humidity hut for the gecko ensure that the reptile will be able to shed properly as well as giving the owner a sense of ease and security (it will also allow the owner to maintain the enclosure less, because with a humidity hut, the owner no longer has to dampen the entire enclosure during shedding periods). If one provides the proper temperature and a humidity hut in the leopard gecko enclosure and the shedding problem persist, there are several other ways one can help treat the problem. According to The Leopard Gecko Manual one can dip a cotton swab or a q-tip in some hydrogen peroxide and then gently rub it on the pet leopard gecko (being extremely careful not to get it in or around the eyes) to gently remove the adherent skin. It is also stated that one can moisturize the leopard gecko with thalmic (eye) lubricant lotion if the skin is firmly attached and will not come off naturally (or with other treatment options). Once the skin is softened the skin can be gently removed, but one should never force the skin off because it can cause more damage to the reptile. If a leopard gecko continues to have shedding problems and the gecko is provided with adequate temperatures and humidity and the problem persists, please contact the local reptile veterinarian immediately. Leopard geckos that have shedding problems tend to lose digits, become blind, and some can even die from the restriction it causes. Leopard Gecko in Humidity Hut Leopard Gecko Skin Shed Problems (Video) Tail Loss in Leopard Geckos Just as most lizards do, leopard geckos will drop their tails if they feel threatened, stressed, or are grabbed by the tail when handled. When the original tail is dropped, it will continue to twitch. The twitching is meant to distract predators while the leopard gecko escapes from the jaws of death. “The caudal (tail) vertebrae of leopard geckos have connective tissue fracture points that allow the tail to automatize (fall off) easily. After the tail has dropped the leopard gecko the leopard geckos body goes into a state of rapid vasoconstriction to minimize blood loss and repair the dropped tail. Even though leopard geckos have the ability to regrow their tails, the new tail that takes the place of the original is a bulbous, cartilaginous structure that is no longer supported by the vertebrae. The regrown tail may look more similar to the geckos head (so if attacked again the predator will go for the tail first). Regrown tails are not aesthetically pleasing and can look odd, but a dropped or regrown tail poses no danger or harm to the reptile. Leopard geckos can drop regrown tails as well if stressed, attacked, or handled improperly. Tail loss is not only caused by predator attacks or improper handling but can also be an effect of intraspecies aggression. Intraspecies aggression is when the animal is attacked by a member of the same species. In other words when two leopard geckos are housed together for any reason they can become territorial and attack each other, making one or both reptiles drop their tails due to a high amount of stress. When males are housed together, the become territorial and attack each other which may lead to a tail loss; babies may drop tails when food is placed in the enclosure and they go into a feeding frenzy; and aggressive females may drop their tails when they are paired for breeding purposes with an overly sexually aggressive male. Even though leopard geckos do drop their tail, and a regrown tail does not affect the gecko in a negative way, it is important to give the gecko special care when their tail has been dropped. A leopard gecko uses its tail for fat storage and uses that storage in times of starvation to survive. When a gecko loses its tail, it loses its main source of fat storage and the gecko should be housed alone until the gecko regrows the tail and regains its strength and fat once again. The tailless reptile must be kept warm, fed and watered regularly for it to be able to regenerate a new tail. Once the tail has regrown, handle the gecko with care and observe the conditions that made the animal drop its tail so it can be avoided in the future. Leopard Gecko with Regenerated Tail Leopard Gecko with Original Tail Philippe de Vosjoli, Roger Klingenberg, Ron Tremper, and Brian Viets. The Leopard Gecko Manual. Irvine: Advanced Vivarium Systems, Inc. 2004. Print. More by this Author Corn snakes make one of the best pets. These docile and tame snakes are very friendly and tolerant and will make a great addition in any home. If you are considering a pet snake, buy a corn snake!
<urn:uuid:677b29fa-094b-4dad-9e5e-c6e254923b11>
CC-MAIN-2016-50
https://pethelpful.com/reptiles-amphibians/shedding-and-tail-loss-in-geckos
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541773.2/warc/CC-MAIN-20161202170901-00115-ip-10-31-129-80.ec2.internal.warc.gz
en
0.937882
1,823
3.4375
3
The Scientific Method is a series of steps that scientist and science students go through to answer scientific questions and solve problems. Sometimes the steps are done in order, but more often the order changes depending on their results. Look at this diagram or figure 10 on page 13 of your Red book. This shows a flowchart of the step of the scienfic method. You are going to create your own Scientific Method flowchart. It should NOT look just like this one, however, it should have all the same steps and same relationships shown by arrows. (in other words, don't copy it). Christensen - rev. 1/04
<urn:uuid:b1091308-4e57-440d-a5f9-34a32a64e06b>
CC-MAIN-2013-48
http://lewweb.net/science/scientificmethod_flowchar.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164034245/warc/CC-MAIN-20131204133354-00024-ip-10-33-133-15.ec2.internal.warc.gz
en
0.947765
129
3.6875
4
I hold up a cup of hot coffee. “What is the energy in this cup of hot coffee?” I ask. The obvious answer, you heated the water. Embedded energy. Embedded energy. In the making of the cup. In the purification of the water and supplying it to me. In the gift of the hydrologic cycle making “fresh” water (if there aren’t too many pollutants in the air – a la acid rain). In the growing and processing of the coffee. In the transporting the coffee from there to here to me. The coffee maker. In the knowledge of all these things. And on and on and on. Energy is embedded in every facet of our lives. Fossil fuels are also insinuated into every facet of our lives not just as energy. Some of the medicine we use: “The vast majority of medicines, are summarized as from benzene, and derivatives, and benzene is derived from petroleum, some examples are all those drugs which carry a bencenic ring , such as aspirin, acetaminophen, salicilic acid, sertraline, benzodiazepines, barbiturics, antiseptics, antiemetics, ulcer treatment, like aloglutamol, ranitidine, famotidine, omeprazole, lanzoprazole, pantoprazole, antiespasmodics, like hioscine, fluopropione, thiopramide, phloroglucinol, lidamidine.It is correct to say, that for all the areas it covers Medicine at present, each has medicines derived from petroleum, through synthesis of benzene or derivatives of benzene.” I' Chemist-Pharmacist,Phd, MSc. 30 years experience, Medicines Quality Control, Manufacturing, Synthesis research. http://answers.yahoo.com/question/index?qid=20080206175810AAiAVJu Now of course you are not going to read all of these lists. You get the point. And all the plastics in the list and beyond the list. Our world is infused and created with fossil fuels. And the food system with the tractors and huge machinery, fertilizers, pesticides, herbicides, tractor trailers hauling, food processing, grocery stores, home cooking and all that goes with it. We could do the same for water, which is on a par with energy as necessary and critical for life of all kinds. Of course, we might now be choosing to further pollute our water underground for greed and energy by fracking. FRACKING. It sounds almost obscene, in practice it is. About that bike you are going to ride. That beautiful 21 speed, lightweight speed demon. Tires, medal, gears, grease. Embedded energy? Water? When I hear talk about transition towns, I wonder if they take into consideration even a small modicum of the lists from above. Or are they like the college kids who go out for a night or two and live in cardboard boxes in support of the homeless and then go home to their warm homes, good food and health care? I have already written about the illusion of “renewable resources.” However, there is one solution that looms on the horizon. It will take considerable patience but might just work. Pixie dust. They are small and fast but it might just work. Investments welcome. What will work is community, planning, hard work and knowledge – do it now!
<urn:uuid:f89f7f31-cded-4832-a67b-213fb193847a>
CC-MAIN-2016-36
http://sunweber.blogspot.com/2011/09/in-bed-with-energy.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982911825.82/warc/CC-MAIN-20160823200831-00099-ip-10-153-172-175.ec2.internal.warc.gz
en
0.931687
739
2.578125
3
The codex, and with it the page, have set the parameters for what in the Western tradition constitutes text. The “text is stable, has clear boundaries, and is silent” (Soicheff &Taylor, 1999). Its ease of mobility and distribution was ideal for the new religion as it gained followers. This mobility continues today with the page and the iPad. Jan Tschichold made these principles of page design popular in the mid to late 20th century.Tschichold wrote, “Though largely forgotten today, methods and rules upon which it is impossible to improve have been developed for centuries. To produce perfect books these rules have to be brought to life and applied." Tschichold's "golden canon of page construction" figure is illustrated with (left) diagonals and circle and (right) a division of the page in ninths. These two constructions rely on the 2:3 page ratio to give a type area height equal to page width. This shows show how Gutenberg and other scholars of the medieval age may have divided their page to achieve margins of one-ninth and two-ninths, a type area the same proportion as the page. Medieval manuscript framework according to Tschichold, in which a text area proportioned near the golden ratio is constructed. "Page proportion is 2:3, text area proportioned in the Golden Section. The iPad has similar type area and margins as the medieval manuscript framework. Antebellum era family Bible dating back to 1859 Source: David Ball 2006 Painting “The Evolution of the Book” located in Library of Congress by painter John White Alexander (1856–1915) Source: Andreas Praefcke 2007 A medieval page from the “Book of Hours” (Christian devotional book popular in the middle ages) circa 1300 The Form of the Book, Jan Tschichold (1991) The Form of the Book, Jan Tschichold (1991) One of the classic hypertext authoring systems, HyperCard, was developed by Bill Atkinson at Apple, and was released in 1987. HyperCard's textual database was the 'card stack': the collection of content that users could link together. HyperCard was revolutionary because it enabled non-programmers to create complex interactive systems with images, sound, movies, etc. In this regard, Hypercard should technically be referred to as a ‘hypermedia’ application because of its ability to link between a variety media types – not just text. HyperCard was widely used by amateur enthusiasts and professional application developers alike. The Digital Page: the iPad as Hypertext device. Just as modern educational practices continue from where academia originated, the medieval era , we continue to work in the intellectual framework of the medieval page. The traditional design features of page design are highly functional and they are highly functional, because they developed along with out understanding of what constitutes information (Taylor, 1999). The current layout design of the iPad inherits many of its features from high medieval academic texts because this is where there was a development of academic culture. If the iPad is reproducing features of medieval page design it is doing do because these features have become integrated into our habits of epistemology and knowledge formation. Arguably the iPad has brought us full circle, back from the roll to codex to medieval test. The change does not challenge the prevailing text’s architectural structure.Texts, both printed and digital, are stable, static, and definite, with clearly defined margins and borders. They are both visual depictions conceived as a collection of two dimensional spaces. Ancient scrolls contained text in a lateral sequence that resembled the modern page. The units of text according to Christian Vandendorpe (1999) were called paginae, where the term page derives. The paginae were taller than they were wide. This was a format that aided the process of reading, and a line of text was more easily read if shorter, from left to right, than longer, allowing information to be absorbed more readily, and to be read aloud more consistently without losing one's place. The width of the paginae varied but it was between eight and eleven centimeters, the range of text widths found in most standard paper today and approximately the range of text widths for the iPad. While hypertext is generally associated with the computer, its fundamental structuring principles (units of text joined by links), were used well before the invention of the digital technology. Hypertexts have been around for as long as writers have included annotations, marginalia, and references in their texts. Each of these practices entails a kind "interactive branching". For example, textual forms like encyclopedias, dictionaries, and telephone books are not experienced linearly. The idea of building complex machinery and knowledge infrastructures to facilitate the creation, storage, and use of links between units of text predates the invention the digital computer. An early example is Paul Otlet's (1910) Mundaneum: a vast database of interlinked documents in index card form with which Otlet hoped to make all the world's knowledge instantly retrievable. At the Mundaneum workers broke books apart, dividing them into units of information in index card form. The index cards were individually cataloged and stored using a library classification system (index cards on similar topics were stored together). In 1934, Otlet also conceptualized the "televised book": a multimedia workspace for querying and interactively experiencing texts and other types of media. In the post-World War II era, Vannevar Bush's Memex is also recognized as a proto-hypertext system. The Memex relied on mechanical processes like microfiche and dry-process photography, not digital technology. Close reading is familiar to most of us--in school, we read mostly traditional print materials, and while methods of close reading vary in focus (on themes or content versus the form of a narrative or the structure of an argument), we’re still encouraged to cultivate what Hayles calls “deep attention.” But if it seems like students aren’t as engaged, that we can’t get them to read books for hours at a time anymore, there’s an obvious danger in focusing too much on characterizing a large group of people, of creating hasty judgments about what “this generation” is like, without looking at the material, technological, and cultural forces that shape them and continue to shape us as a community. Another method of reading that has proliferated in recent decades is that of hyper reading. James Sosnoski’s coined this term to mean “a reader-directed, screen-based, computer-assisted reading” (1999: 167) like that of Google searches, keyword filtering, skimming, hyperlinking, pulling out items from a long text, and fragmenting (1999:163-72), suggesting that hyper reading differs significantly from print reading. Moreover, Jakob Nielson and his consulting team have done usability research by asking test subjects to deliver commentaries as they encounter web pages, which are recorded by a human tester while their eye movements are recorded as well. The research indicates that web pages are read in an F pattern (Nielson 2006). Although digital reading is sloppy and cursory at best, it works well to identify pages of interest and sort through pages for relevance. But it also has a precedent in archival research, which requires a similar type of scanning and skimming. Hyper reading requires different reading strategies from the close reading, but she argues that both types of reading are already a part of the frequent reader’s toolkit. To make sense of the world, we must do both. Here, Hayles does not make a distinction between different types of technologies, and it might be worth considering what distinguishes the kind of reading that occurs with iPad from other forms of digital reading, like on a computer screen. Nicholas Carr more broadly argues in The Shallows: What the Internet is Doing to Our Brains that the internet and digital reading in general presents the problem of a constant state of distraction, which hyper reading might foster. But it also offers us benefits as well, depending on the problem we would like to solve. The problem with the sudden increase in hyper reading lately is not hyper reading in and of itself, it’s the imbalance of preferred reading practices. Instead of providing overgeneralizations, we would like to investigate whether reading on the iPad is so different from reading a book or from reading on a screen. Can it offer us an important technological alternative that allows both close and hyper reading practices? Craig Mod, an independent writer and designer, writes about the future of books and storytelling in a digital age, and he suggests that the crucial differences between the iPad screen and desktop screen involve the distance between the reader and the text on the reading device, the orientation of the device, the quality of the screen’s for optimal viewing of a text, and the kind of concentration that each type of screen allows. Even though the iPad screen uses the same technology as desktop screens (not e-ink like the Kindle), “modern desktop OSes are optimized for multi-tasking and short bursts of concentration,” while the iPad more closely resembles a book, allowing you to manipulate by hand or reposition according to your physical environment and to change the color of the font and background to accommodate your eyesight and the light in your external environment. The iPad can be manipulated by hand, and its flexibility as a reading device illustrates the way a successful electronic device must acknowledge our embodied or physical experience of the world and of technology. Books in the Age of the iPad. (n.d.). Craig Mod. Retrieved March 9, 2014, from http://craigmod.com/journal/ipad_and_books/ Hendel, R. (1998). On Book Design. Yale University Press. Rare full recording of 1983 Steve Jobs speech reveals Apple had been working on iPad for 27 years. (n.d.). The Next Web. Retrieved January 31, 2014, from http://thenextweb.com/apple/2012/10/02/rare-full-recording-of-1983-steve-jobs-speech-reveals-apple-had-been-working-on-ipad-for-27-years Stoicheff, P., & Taylor, A. (2004). The future of the page. Toronto; Buffalo: University of Toronto Press. Tschichold, J., Bringhurst, R., & Hadeler, H. (1991). The form of the book: essays on the morality of good design. Hartley & Marks.
<urn:uuid:8d2e5332-565c-461a-9da1-8aa43092a8d7>
CC-MAIN-2018-13
http://www.scrollkit.com/s/3KNeU4l
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645824.5/warc/CC-MAIN-20180318145821-20180318165821-00775.warc.gz
en
0.944582
2,221
3.8125
4
Do you have a “Beer Chilled Draftt Dispensing System”? Hopefully not! Because if you do, it’s highly likely that you’re not using that drip tray under the faucets as it was intended. In fact, we don’t call them drains…This method of dispensing beer from a keg is referred to as “The Most Expensive Draught System on the Face of the Earth”. Unfortunately, the beer is being used to overcome inadequate system designs. The result is higher operating costs, lower keg yield, and compromised quality because the beer’s carbonation is lowered. Often, in any type of draft beer system, the temperature of the beer in a line fluctuates and increases as it moves past the keg towards the faucet. This can be due to beer lines that have been routed near heat sources and/or inefficient system cooling between the keg and faucet. Eventually, cold beer that exits the keg will flow through these problem areas, eliminating the foam-causing heat. Now that’s an expensive way of chilling beer! At home in your kegerator – or within retail systems at bars, restaurants, venues, etc. – the beer temperature must be maintained all the way to the faucet, or you’ll end up with foam and wasted product. Why the foam? One very important aspect of beer: it has gas. Fermentation, to be exact, wherein the brewing process yeast is added to the unfermented beer (wort) and thus devours the sugars. This produces alcohol and carbon dioxide (CO2) gas. Remember your high school science class way back when? What happens to a gas when it is heated? You’re right, it expands. This is what happens to the CO2 in beer when it is subjected to an area in any draft system where the temperature is too warm: the gas expands and breaks out of the beer, resulting in an accumulation of foam. Behind the faucet is a very common area for this to occur. The collection of foam will spill out of the faucet, causing difficulties in dispensing. That foam that goes down the drip tray mostly consists of the gas that should have been in the beer. End result: flat beer! If you begin with foam while pouring beer in a glass, and then attempt to follow with clear beer, you’ll breed more foam. You’ll know when bartenders are experiencing this difficulty when you see them continually tipping the glass as they dispense with foam rolling out and pouring into the “drip tray”. The most successful dispensing system is one that can maintain temperature at the keg, and all the way to the faucet. Kegerators should have some method of moving the cold air into its tower. Air-cooled remote systems at retail outlets, notoriously labeled “Beer Chilled Systems”, are most efficient if the keg cooler door is kept closed and there is an efficient air flow to the faucets and then back to the cooler. Glycol remote systems are by far the most successful at maintaining temperature, although issues arise when the lines are routed above kitchen hoods and when the power pack is not maintained or located in an area where it cannot operate efficiently. The CO2 in beer should always be ‘Top of Mind’ while designing, installing and dispensing beer from a keg. Control system temperature, and you’ll control the beer’s CO2. Controlling the CO2 will allow you to take full advantage of draft beer’s profit potential and fresh taste! DraftPro Systems offers a wide variety of beer cooling solutions, including remote glycol systems and premium thermally efficient trunklines.
<urn:uuid:66a90976-f41a-4b55-a01b-44999b8e799e>
CC-MAIN-2019-47
http://draftprosystemsfl.com/2018/04/23/whats-wrong-with-beer-chilled-draft-dispensing-system/
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670558.91/warc/CC-MAIN-20191120111249-20191120135249-00485.warc.gz
en
0.939962
791
2.609375
3
Microsoft Build Engine (MSBuild) is the build platform for Microsoft and Visual Studio. The best part of MSBuild is its transparency as to how it processes the builds software which enables the developers to orchestrate the scripts as per the requirements. Why do I need MSBuild? Build during development and one time integration can easily be accomplished through IDE. And there is no better way of achieving it. But when it comes to automated build and continuous integration there needs to be a process in place that will replicate a specified number of tests and generate the output as per the requirements and standards set and then MS Build is the answer. Getting to know the MSBuild MS Build is an XML based file that is written in scripting language. The file in itself hosts a list of properties and functionalities that can be accessed via command line and a particular task can be automatically initiated without any manual intervention. MS Build Structure Overview For first those who are working with MS Build for the first time they will need to install MSBuild Tasks and Extension Packs. The software could be downloaded from – The installation process is simple. Just download and run the installer. Once the installation is over, if the installation location has not been changed then at C:\ProgramFiles a new folder will be created with sub folders given as below: Once the installation is done we can start creating our first MSBuild file. A simple MSBuild file can be viewed without even writing a single line of code. Just follow the simple steps given below: - Open any existing visual studio solution. - Right click on any one of the projects under the solution (given in the image below) - <formulas /></formulas /> - Select unload project. - Once the project is unloaded, right click on the project and select the edit project option like the image given below: - A simple MSBuild files open for the particular project. Once we go through the MSBuild file we may confidently conclude that a project file is nothing other than an MSBuild file that has set of instructions written in it. The next thing is - How to read an MSBuild file? Well what follows is the walkthrough of the various parts of the MSBuild file. Our first glance through the file gives us some insight into what kind of file its is and our conclusions are as follows: - It’s a type of XML file - Each node is either a declaration or a property or an action. Now let’s look deeper into the nodes. - First Node - The namespace declaration. The first line is a node of any MSBuild file looks something like the line given below. In the above line there is couple of things that are new and few things that we have already used before. Let’s understand the attributes 1 by 1. - Project node – This represents the starting/root node in the file. This is a mandatory node. All the functionalities w.r.t a particular MSBuild task need to go within the project node. Also the references to all external resources to be used also need to go with in this node. - Xmlns attribute - This represents the XML namespace that will be referred to. In order to run MSBuild scripts we need to refer the particular namespace defined as "http://schemas.microsoft.com/developer/msbuild/2003" - DefaultTargets attribute – This attribute refers to particular task that will run by default when no value is specified for the "/target:" switch from command line. - ToolsVersion attribute – This refers to the version of the Extension Pack Tools that we are using/is installed. - Declaration Nodes -Next within the "Project" node we declare the following: The property group node encapsulates the various key value pairs that will be declared and used across the script for different targets. While the " PropertyGroup" node in itself is a system defined node the child nodes within it are user defined and is declared as per user requirement and has the following features: - The name of the child nodes could be any string with alphanumeric characters. - The key declared in the child nodes are valid as long as they are not repetitive, is a system defined keyword or has any special characters. - The values of the child nodes could be accessed via - In the above example there is a single "key" declared via child nodes within the " PropertyGroup" node. The child node in the example above has the following features - The declared key is "TPath" - Its value is -$(MSBuildExtensionsPath)\ExtensionPack\4.0\MSBuild.ExtensionPack.tasks - The "Condition" attribute to "TPath" checks whether the requisite files are available at the specified location/path. - Item Group node – This node contains a set of user-defined Item elements. Every item used in a MSBuild project must be specified as a child of an ItemGroup element. The item group can lists items of many types. Few common ones are - - Imports node – This declares that the contents of another project file should inserted at the particular location where the imports node is found. A single MSBuild file may have multiple imports node. - Projects Extensions node – This is an optional section that is used by MSBuild hosts and may contain arbitrary XML content. - Target node – This is actually the node that encapsulates tasks for MSBuild to run sequentially. The common attributes of Target node are - - Name – This is the name of the target and is mandatory - DependsOnTarget – It’s optional and lists the targets that must be executed before a target can be executed or top-level dependency analysis can occur. Multiple targets are separated by semicolons. - Inputs - The item inputs for this target. Items in this attribute are used as the inputs in the top-level dependency analysis. - Outputs - The expected outputs of this target. You can apply transforms to the input items to generate the output items. For more information about transforms Now since we are acquainted with structure of the MSBuild file, let’s try out few examples – - Lets declare a section like the one given below in an MSBuild file– <Message Text="This is the test run"/> <Message Text="Hello World"/> - To run the above target follow the steps given below: - Click Start, then click All Programs. Locate and click the Visual Studio Command Prompt in the Visual Studio Tools folder. - From the command window, navigate to the folder containing the MSBuild file, in this case, D:\BuildApp\BuildApp. - Run msbuild with the command switch /t: WriteAMessage. This selects and builds the WriteAMessage target with command like this – msbuild helloworld.msbuild /t: WriteAMessage That was simple...we will continue with the other MSBuild functions in Part 2(can be found here).
<urn:uuid:a3c0074f-eea3-4d65-826a-072c2acc7510>
CC-MAIN-2017-17
https://www.codeproject.com/Articles/465087/Introduction-to-MSBuild-Part-1?fid=1787992&df=90&mpp=10&sort=Position&spc=None&select=4380783&tid=4378555
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124478.77/warc/CC-MAIN-20170423031204-00042-ip-10-145-167-34.ec2.internal.warc.gz
en
0.817522
1,460
2.609375
3
Laws designed to affect the flow of information take many forms: rules against misrepresentation, disclosure requirements, secrecy requirements, rules governing the formatting or packaging of information, and interpretive rules designed to give people new reasons to share information. Together these and similar rules constitute the law of deception: laws that aim to prevent or cure deception. One encounters similar problems of design, function and justification throughout the law of deception. Yet very little has been written about the category as a whole. This article begins to sketch a general theory. It identifies three regulatory approaches. Interpretive laws, such as common law fraud, prohibit the making of untrue statements. These laws work by giving legal effect to commonly understood extralegal norms of interpretation and truth telling, in order to achieve specifically legal ends. Purpose-based laws, such as the tort of concealment, target acts done with a bad intent. Rather than employing an objective standard of behavior, they define the object of regulation by an actor's wrongful state of mind. Finally, causal-predictive laws employ everyday folk-psychology, empirical studies or cognitive theory to predict the informational effects of narrowly described behaviors. Much consumer protection law is of the causal-predictive sort. These regulatory approaches reach different types of informationally significant behavior, are suited to different regulatory ends, and require different institutional competencies. After describing the strengths and weaknesses of each approach, the article applies the theory to the Lanham Act's false advertising provisions. In deciding Lanham Act cases, courts have arrived at a complex set of rules that include all three approaches. A critical analysis of those rules illustrates the theory's ability both to explain the law of deception and to recommend improvements in it. 100 Geo. L.J. 449-496 (2012) Scholarly Commons Citation Klass, Gregory, "Meaning, Purpose, and Cause in the Law of Deception" (2012). Georgetown Law Faculty Publications and Other Works. Paper 633.
<urn:uuid:023a7fe2-ed08-4861-bfc3-7dd4ef2654a3>
CC-MAIN-2015-40
http://scholarship.law.georgetown.edu/facpub/633/
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737947969.84/warc/CC-MAIN-20151001221907-00060-ip-10-137-6-227.ec2.internal.warc.gz
en
0.907099
400
2.828125
3
Today is the 56th anniversary of The March on Washington for Jobs and Freedom. On August 28, 1963, an estimated 250,000 people peacefully gathered in Washington, D.C., on the National Mall in front of the Lincoln Memorial. The purpose of the march was to call for fair treatment and equal opportunity for African Americans and to advocate for passage of the Civil Rights Act. Mahalia Jackson and Joan Baez were among the fourteen performers who contributed songs to the day’s long program of speeches, remarks and prayers. Here are two fascinating films of these remarkable women from that most historic day. First, Mahalia Jackson singing a gospel song, “How I Got Over.” (Her singing – with the lyrics – begins at the 30-second mark in this video.) And next, Joan Baez in the midst of leading the multitude in singing “We Shall Overcome.” Biographer, journalist and professor Jon Meacham writes in his wonderful new book Songs Of America: Patriotism, Protest, And The Music That Made A Nation: “The songs of the March on Washington offer a microcosm of the political panoply of life in (those) years as gospel and folk, and black and white came together to acknowledge the difficulty of the struggle and the justice of the claims of those seeking equality.” The most well known speech that day was given by The Rev. Dr. Martin Luther King, Jr., President of the Southern Christian Leadership Conference. That masterpiece has become known as Dr. King’s “I Have A Dream” speech.
<urn:uuid:77235652-f02f-4119-95d0-5bce2339fcc1>
CC-MAIN-2022-27
https://sixstrstories.com/2019/08/28/this-historic-day-the-march-on-washington/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103671290.43/warc/CC-MAIN-20220630092604-20220630122604-00586.warc.gz
en
0.951645
332
2.90625
3
Actinopterygii (ray-finned fishes) > Beloniformes (Needle fishes) > Belonidae Etymology: Belone: Greek, belone = needle; any fish with sharp pointed snout; also Pierre Belon, 1517-64, French zoologist born in Le Mans. Professor at the College de France, author of " La nature et diversité des poissons", 1551 (Ref. 45335). Environment: milieu / climate zone / depth range / distribution range Marine; brackish; pelagic-oceanic; oceanodromous (Ref. 51243); depth range 0 - ? m. Temperate; 65°N - 14°N, 32°W - 42°E Eastern Atlantic and Mediterranean Sea. Three subspecies were recognized by Collette and Parin (1970, Ref. 34977) Belone belone belone (Linnaeus, 1761) (Northeast Atlantic); Belone belone euxini Günther, 1866 (Black Sea and Sea of Azov); Belone belone acus Risso, 1827 (Mediterranean Sea and adjacent parts of Atlantic Ocean, Madeira, Canary Islands, Azores, and south to Cape Verde (Ref. 50279); subspecies Belone belone gracilis Lowe, 1839 (France to the Canary Islands including the Mediterranean) in Collette & Parin, 1990 (Ref. 5757). Length at first maturity / Size / Weight / Age Maturity: Lm ?  range ? - ? cm Max length : 104 cm TL male/unsexed; (Ref. 113079); common length : 45.0 cm SL male/unsexed; (Ref. 3397); max. published weight: 1.4 kg (Ref. 113079) soft rays: 19 - 23. Jaw teeth comparatively large and widely spaced. Vertebrae 75-84. Vomerine teeth present at lengths greater than 20 cam. Lower jaw a little longer than upper jaw. Juveniles with greatly elongated jaw, without black posterior dorsal fin lobe. Lives close to the surface and has a migratory pattern similar to the mackerel (Ref. 35388). Feeds on small fishes, particularly clupeids and Engraulis (in the Black Sea). Leaps out of the water when hooked. Oviparous (Ref. 205). Eggs may be found attached to objects in the water by tendrils on the egg's surface (Ref. 205). Utilized fresh and frozen; can be fried, broiled and baked (Ref. 9988). Collette, B.B. and N.V. Parin, 1986. Belonidae. p. 604-609. In P.J.P. Whitehead, M.-L. Bauchot, J.-C. Hureau, J. Nielsen and E. Tortonese (eds.) Fishes of the north-eastern Atlantic and the Mediterranean, Volume 2. Unesco, Paris. (Ref. 5505) IUCN Red List Status (Ref. 115185) CITES (Ref. 115941) Threat to humans Fisheries: commercial; gamefish: yes Estimates of some properties based on models Preferred temperature (Ref. 115969 ): 8.8 - 20, mean 11.3 (based on 548 cells). Phylogenetic diversity index (Ref. 82805 = 0.6250 [Uniqueness, from 0.5 = low to 2.0 = high]. Bayesian length-weight: a=0.00098 (0.00079 - 0.00122), b=3.04 (2.98 - 3.10), in cm Total Length, based on LWR estimates for this species (Ref. 93245 Trophic Level (Ref. 69278 ): 4.2 ±0.4 se; Based on diet studies. Resilience (Ref. 69278 ): Medium, minimum population doubling time 1.4 - 4.4 years (tm=2; Fec=1000). Prior r = 0.44, 2 SD range = 0.19 - 1.00, log(r) = -0.82, SD log(r) = 0.41, Based on: 2 K, 2 tgen, 10 Fec records Vulnerability (Ref. 59153 ): Moderate to high vulnerability (49 of 100) .
<urn:uuid:62423e3c-2002-4839-888e-a6a87808c602>
CC-MAIN-2018-43
http://www.fishbase.org/summary/47
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583508988.18/warc/CC-MAIN-20181015080248-20181015101748-00228.warc.gz
en
0.747497
957
3.140625
3
Shin splints (medically called Medial tibial stress syndrome (MTSS) is defined by the American Academy of Orthopaedic Surgeons as “pain along the inner edge of the shinbone (tibia)”. Shin splints are a common injury that affects athletes who engage in running sports or physical activity, including running and jumping. They are characterized by general pain in the lower part of the leg between the knee and the ankle. MTSS injuries are specifically located in the middle to lower thirds of the inside of the tibia the large inner bone of the lower leg. MTSS is most likely caused by repeated trauma to the connective muscle tissue surrounding the tibia. Shin splints can be attributed to overloading the lower leg due to bio-mechanical irregularities and an increase in stress exerted on the tibia. A sudden increase in intensity or frequency in activity level fatigues muscles too quickly to properly help absorb shock, forcing the tibia to absorb most of that shock. This stress is associated with the onset of shin splints Muscle imbalance, including weak core muscles, inflexibility and tightness of lower leg muscles, including the gastrocnemius, soleus, and plantar muscles (commonly the flexor digitorum longus) can increase the possibility of shin splints. The main diagnostic criterion clinicians look at for shin splints are a physical examination and clinical history. The physical examination focuses on palpable, or gentle pressure, tenderness over a 4-6 inch section on the lower, inside shin area. The pain has been described as a dull ache to an intense pain that increases during exercise, and some individuals experience swelling in the pain area. Clinical history focuses on an individual’s previously history with MTSS. People who have previously had shin splints are more likely to have it again.
<urn:uuid:db199c32-2f1c-4679-aea6-e6e4206ddaa4>
CC-MAIN-2021-49
https://footandankle-bh.co/shin-splints/
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363290.59/warc/CC-MAIN-20211206072825-20211206102825-00325.warc.gz
en
0.952963
384
3.265625
3
The National STEM (Science, Technology, Engineering and Mathematics) School Education Strategy (2016 – 2026) highlights the importance of skill development in interdisciplinary, critical and creative thinking; problem solving and digital technologies, which are essential in all 21st century occupations. Hills Grammar Year 7 students are focussed on sustainable energy practices. They have been required to investigate energy usage for heating water, design and construct a solar water heater and design a strategy for more sustainable energy use at home or school. Samara Mundi commented, “One of the most important and interesting things that we have learnt in the STEM unit was the science of energy; it affected how we constructed our designs, the materials and colours that we used, because we all had to know if they harnessed solar energy or reflected it.” Plaabon Das and Melanie Dobson agreed, “This unit was very enjoyable because of the cooperation within the group. If we combine as a group and use our previous and newly discovered knowledge, it can help provide more information and ideas for our solar heating devices. Building our water heater was the most enjoyable part of the unit.” Making connections across these disciplines, examining real energy bills and working collaboratively in indoor and outdoor learning spaces, the groups are in the final stages of testing for their upcoming showcase. Images: Year 7 Hills Grammar students working on their solar heating devices
<urn:uuid:a581f25e-35cd-43f8-955c-e8e84e53351e>
CC-MAIN-2017-43
http://www.hillsgrammar.nsw.edu.au/content/blog/stem-and-solar-power
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826114.69/warc/CC-MAIN-20171023145244-20171023165244-00832.warc.gz
en
0.942355
288
3.4375
3
An e-book about the Jewish character of the Gospel of Luke and the Acts of the Apostles. Translation: Dick Broeren Sr. ISBN/EAN: 978-90-76783-25-3. For sale at Amazon.com. Was Luke, the evangelist, a Greek, as thought in the church for centuries? Or was he a Jew, just like the other authors of the New Testament? The answer to this question is rather important for the interpretation of his two books: his Gospel and the Acts of the Apostles. Did he mean to write a contemporary historiography with a message? Or are they a Jewish manual for life perhaps? The author presents a thorough exegesis of both Luke’s books. His starting point is the proposition that they are a certain form of Midrash, i.e. themes from the Hebrew Bible that were used to explain and clarify the problems Luke's contemporaries came across in their daily lives. The author pays ample attention to Luke’s language and style, his literary method, his aim and his audience, the historical and political circumstances, Luke’s situation among the Jewish groups of the first century like the Pharisees, Sadducees and the Zealots. Also his attitude towards the non-Jews and especially towards the Romans come up for discussion. An important conclusion of the author is that Luke didn’t write the first churchhistory, but an argumentation on his messianic strategy to liberate Israel from the Roman suppression. You can purchase this e-book at www.amazon.com.
<urn:uuid:94ce544a-a85f-464f-a06b-d75a84b5f923>
CC-MAIN-2019-09
http://www.petervantriet.nl/article.php?articleID=229
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249578748.86/warc/CC-MAIN-20190224023850-20190224045850-00336.warc.gz
en
0.958819
325
2.65625
3
A basic data reading statement, which will use the default NA for missing values: data file=ageweight.txt mouseID sex age weightwhich will read 4 columns from the file "ageweight.txt" and assign the names "mouseID", "sex", "age" and "weight" to the 4 columns. For this basic example there will be no header in the file, and the data in the file must be separated by spaces or tabs. The input file could for instance look like: File names with a full and relative path work in linux and mac, and probably also in Windows. File names with a space cannot be used, bayz will stop reading at the first space and will not get the complete name. Some examples: file=/usr/home/xxxx/datamouse/ageweight.txt file=../datamouse/ageweight.txt # not working because of spaces in the name: file=age and weight.txt data file=ageweight.txt missing=-999 mouseID sex age weight The field names that are in the bayz script for the Basic Example can also be in the data input file. This allows for use of files with a "header" line. This is specified as: data file=ageweight.txt -headerNow the input file could like like: Note: in version 2.5 the use of a header line does not work (well) when reading so-called "blocks-fields" (see...). data mouseID file=weight.txt mouseID sex weight data mouseID file=dietinfo.txt mouseID diet For example, the following two files will be merged as shown, and will allow to make a model with weight explained by diet (header line with field names is not in the input file): Notes about merging: The merging feature can be used to filter (select) data by making the first file in a merge-sequence a file only containing the list of IDs to keep, as in the following example. data mouseID file=keepids.txt mouseID data mouseID file=ageweight.txt mouseID sex age weight See the example below for the effect of this kind of merging (header line with field names is not in the input files): With one phenotype per ID (sample), add the ID-name used at the data statement for reading the phenotype file and the same ID-name at the data statement for the pedigree file. With the special flag 'ped' at the data statement for the pedigree file bayz does not merge these files as in the regular merging procedure, but keeps all records in both files. When phenotypes are repeated a hierarchical model is needed. In the pedigree data, the ID must be in the first columns (this is not required for all other files), and parents must be in columns 2 and 3 (any names can be given to the parent columns). More columns can follow which will be ignored. data mouseID file=ageweight.txt mouseID sex age weight data mouseID ped file=mouse.ped mouseID father mother By default bayz does not compute/ignores inbreeding in construction of the A-1 relationship matrix. Add the -inbred flag at the file name to make bayz compute and include inbreeding: data mouseID ped file=mouse.ped -inbred mouseID father mother These examples assume that there is one phenotype observed per ID (sample), and one genotype that is available in a separate file. The standard bayz merge is used to combine phenotype and genotype data. For the case where repeated phenotypes are available per ID a hierarchical model can be used, or the phenotype and genotype data should be merged before (copying genotype data for every repeated ID in the phenotype data). The genotype data is defined as a block-field (a field name with two square brackets) that allows to include all genotypes in the model with a single model term (add or dom). data cow file=milkdata.txt cow milk fat prot Data id file=cowgenotypes.txt cow geno !biallelic data geno map file=snpnames.txt geno Biallelic coding is the format of plink 'ped' files, the following would use plink ped-map files where the 'ped' file has 6 additional fields, and the map file has chromosome, SNP name, genetic map position and physical (base pair) map position. Note that for bayz the column of SNP names in the map file must get the same name as the name used for the genotype block-field, in this example 'geno'. data cow file=milkdata.txt cow milk fat prot Data id file=cowgenotypes.ped famid cow sire dam sex pheno geno !biallelic data geno map file=cowgenotypes.map chrom geno cmdist bpdist Use the genot012 flag to indicate the input file contains genotypes coded as 0,1,2 for homozygote, heterozygote and homozygote. Missing genotype is default NA. cow geno !genot012 Bayz has automatic edits for Minor Allele Frequency at 1% and missing rate at 20%. To modify the default settings add flags on the map file:
<urn:uuid:0c084da0-af9e-4d74-b4d2-25d1e98a44b5>
CC-MAIN-2017-43
http://bayz.biz/index.php?sc=04&pg=02
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823630.63/warc/CC-MAIN-20171020025810-20171020045810-00435.warc.gz
en
0.797447
1,111
2.96875
3
Get to know your bowels – April is bowel cancer awareness month April is Bowel Cancer Awareness Month and GPs across south west London are reminding local people aged 60 – 74 to ensure they take part in regular screening. Bowel Cancer is the second biggest cancer killer in the UK. However, if diagnosed in the early stages, it’s highly treatable. The problem is that far too few people with bowel cancer are diagnosed in the early stages. Nearly 98 per cent of people will survive bowel cancer for five years or more if detected at the earliest stage compared with 7 per cent diagnosed at the latest. Some people either find it uncomfortable to discuss the symptoms or simply do not know what they are. Symptoms of bowel cancer may include: abdominal pain, blood in your stools and/or a change in your normal bowel habit lasting three weeks or more. Other symptoms can include extreme tiredness for no obvious reason and unexplained weight loss. Whatever, your age, if you notice these symptoms, speak to your GP as soon as possible. And remember – you can talk to your GP about anything. They’ve heard it all before, so there’s no need to be embarrassed. According to Bowel Cancer UK, around half (54 per cent) of all bowel cancers could be prevented by measures including: - eating a healthier diet, rich in wholegrains and reducing the amount of processed meat eaten - taking more exercise - cutting down on alcohol - stopping smoking. Older people are most at risk of bowel cancer. Regular screening is the best way to get diagnosed early and can help to save thousands of lives. If you are aged 60-74, you will receive a letter inviting you to take part in the bowel cancer screening programme. Every two years, you will receive a home test kit, which is used to collect a stool sample.
<urn:uuid:0ac5f9ee-60cf-4fb0-a544-1bf03e9a026c>
CC-MAIN-2017-51
https://www.swlondon.nhs.uk/2017/04/get-to-know-your-bowels-april-is-bowel-cancer-awareness-month/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948594665.87/warc/CC-MAIN-20171217074303-20171217100303-00109.warc.gz
en
0.952077
386
2.765625
3
Is mumps a DNA or RNA virus? Mumps virus is a paramyxovirus in the same group as parainfluenza and Newcastle disease viruses, which produce antibodies that cross-react with mumps virus. The virus has a single-stranded RNA genome. The virus can be isolated or propagated in cultures of various human and monkey tissues and in embryonated eggs. Is measles RNA or DNA? The pathogen. The measles virus is a single-stranded RNA virus of the genus Morbillivirus and the family Paramyxoviridae. The virus is related to several viruses that infect animals, including the Canine Distemper Virus. What virus causes mumps in humans? Mumps is caused by the mumps virus, which belongs to a family of viruses known as paramyxoviruses. These viruses are a common source of infection, particularly in children. How does mumps virus enter the cell? Mumps orthorubulavirus MuV replicates first by binding to the surface of cells, whereby its envelope merges with the host cell membrane to release the capsid inside of the cell. Once inside, the viral RNA-dependent RNA polymerase transcribes messenger RNA (mRNA) from the genome and later replicates the genome. Is Smallpox a DNA or RNA virus? Smallpox is a double-stranded, 135- to 375-kilobase (kb) DNA virus that replicates in the cytoplasm of the host cell and forms B-type inclusion bodies (Guarnieri bodies). This is in contrast to herpes viruses, which replicate in the nucleus. The orthopoxviruses are among the largest and most complex of all viruses. Is rubella a DNA or RNA virus? The Virus. Rubella virus is an enveloped, positive-stranded RNA virus classified as a Rubivirus in the Matonaviridae family. Is mumps a virus or bacteria? Mumps is a contagious viral infection that used to be common in children before the introduction of the MMR vaccine. Can I get mumps twice? Can someone get mumps more than once? People who have had mumps are usually protected for life against another mumps infection. However, second occurrences of mumps do rarely occur. What type of genome does mumps have? Mumps virus, like measles virus, is a paramyxovirus, containing a single-stranded negative-sense RNA genome. Before the advent of the mumps vaccine, mumps was the most common cause of viral meningitis, accounting for more than 15% of isolates. Currently, mumps virus meningitis is rare in developed countries. Are pox viruses DNA? Poxviruses are brick or oval-shaped viruses with large double-stranded DNA genomes. Poxviruses exist throughout the world and cause disease in humans and many other types of animals. Is Zika an RNA virus? Zika virus is a single-stranded RNA virus of the Flaviviridae family, genus Flavivirus. Zika virus is transmitted to humans primarily through the bite of an infected Aedes species mosquito (Ae. aegypti and Ae. What is the difference between measles and rubella? Both Measles and Rubella are caused by an RNA virus. They are generally spread through respiratory droplets of infected people….Measles vs Rubella. |Typically a high fever of >40°C||Typically low fever of < 38.3°C| |Rashes in measles are blotchy with red spots||Rashes in Rubella are spots that fade fast| How much of human DNA comes from viruses? The human genome contains billions of pieces of information and around 22,000 genes, but not all of it is, strictly speaking, human. Eight percent of our DNA consists of remnants of ancient viruses, and another 40 percent is made up of repetitive strings of genetic letters that is also thought to have a viral origin. Is smallpox a DNA virus? Which is an example of DNA virus? DNA viruses comprise important pathogens such as herpesviruses, poxviruses, adenoviruses, and papillomaviruses, among others. Can antibiotics cure mumps? Mumps is caused by a virus, so antibiotics aren’t effective. But most children and adults recover from an uncomplicated case of mumps within a few weeks. People with mumps are generally no longer contagious and can safely return to work or school about five days after the appearance of signs and symptoms. Can mumps be cured? There’s currently no cure for mumps, but the infection should pass within 1 or 2 weeks. Treatment is used to relieve symptoms and includes: getting plenty of bed rest and fluids. using painkillers, such as ibuprofen and paracetamol – aspirin should not be given to children under 16. Is smallpox RNA or DNA? Smallpox is a double-stranded, 135- to 375-kilobase (kb) DNA virus that replicates in the cytoplasm of the host cell and forms B-type inclusion bodies (Guarnieri bodies).
<urn:uuid:b8f42ec9-4220-4298-82c6-d7660f16a0c5>
CC-MAIN-2023-14
https://www.goodgraeff.com/is-mumps-a-dna-or-rna-virus/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00003.warc.gz
en
0.928798
1,102
3.515625
4
byThe research community is beginning to understand that motivations are not a human “artifact” of consciousness, but part of the essential glue that binds consciousness together… Without motivations we have nothing that holds us to this vessel, ensuring that we continue to eat, pay our rent, and do other things necessary for our survival. Conscious machines will for this reason have motivations as well. Otherwise they simply just wouldn’t function. This is an important point because talk of the singularity often brings up visions of a single integrated “machine” that will inevitably enslave humanity. A better question is: “Will AI be used to gain immense advantage for a single party (whether that party is the AI itself or the human that controls it), or will AI be used to maximize benefit for us all?” Even if the AIs have interfaces that allow them to share information more rapidly than humans can through reading or watching media, separate AIs will have separate motivations from a single centralized AI. Given that a signature of consciousness is motivation, any consciousness will obviously be motivated to secure all the resources it needs to ensure its survival. In some cases, the most efficient way to secure resources is sharing. In other cases, it’s through competition. AIs might share resources, but they might also compete. When and if an artificial consciousness is created, there’ll almost certainly be multiple instances of it. Because a consciousness cannot exist without motivation, and because the motivation of each consciousness differs, requiring what might be great effort to get on the same page, it may very well be true that multiple consciousness’s cannot “merge” in a way that would become truly threatening to humans unless one subsumes all others. Anything else would merely be a co-location of minds with different objectives, negotiating a sharing of resources. One AI with far fewer resources than another would in fact probably fear the far more powerful AI might just erase it and take over its resources. Think of your “several generations out of date” home computer trying to hold its own against Big Blue. Rather than us humans needing to fear AI, an AI might more likely need to be afraid of humans not protecting it against other AIs. Centralization rather than technological advance is the real danger for ANY conscious entity. Yet when you consider the competitive advantage technology gives, the near infinite rate of change of the technology singularity introduces the possibility of a future in which the technology arms race concentrates power and resources to a degree never seen before. Could it put a few into positions of unimaginable power that may not ever be unseated? If so, there will be nothing stopping those few from becoming unimaginable despots to whom the rest of humanity are merely disposable commodities whose suffering means nothing. Think of what you would do if you had infinite power over everyone and there were no consequences for your actions. Think of what would happen if you needed a kidney and that child over there had one that would fit just fine. Think of what would happen if some man with unimaginable power wanted that woman, or the next, or the next thousand. Think of what would happen if you wanted to buy something and you could just flip a switch and empty out the world’s bank accounts, then watch with casual detachment as millions fight like animals for food and water. Think of what would happen if that one man in control just happened to wake up one morning to the conclusion that there were several billion people on the earth too many. The technological singularity, if it exists, is a kind of Armageddon. In my upcoming book “The Technology Gravity Well” I delve into these and other issues, including how a new breed of massively collaborative software could usher in the singularity in the next 5 years. This may be one of the most important books you come across this year.
<urn:uuid:59986561-602d-4dfc-a878-2b57903e9ec3>
CC-MAIN-2017-43
http://www.awaken.com/2017/09/the-singularity-must-be-decentralized/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823309.55/warc/CC-MAIN-20171019141046-20171019161046-00589.warc.gz
en
0.954723
789
2.625
3
The Bernward Doors In the year 1015 Bishop Bernward commissioned the two door leaves for the west entrance of Hildesheim Cathedral. The doors measure 4.72 metres in height and, being the tallest amongst all doors of their era, they occupy a special status amongst medieval doors. Even at the the time they were made, the bronze door leaves were unique. As a case in point, they surpassed the bronze doors that Charlemagne had cast for the Collegiate Church in Aachen, not only because of their immense height, but also due to the reliefs that make the bronze doors of Hildesheim Cathedral a sculptural masterpiece. Of all the bronze doors with figural scenes dating back to the Middle Ages, the Bernward Doors are the oldest, with what is probably one of the earliest great sculptural cycles of images north of the Alps and one of the boldest works of all medieval castings in ore. 16 panels depict the biblical story of Salvation in extraordinary vividness and in a manner that is unbelievably dramatic for the time in which they were made. The panels on the left leaf depict scenes from the Old Testament, starting at the top with the Creation of Man and ending with the murder of Abel by his brother Cain. The panels on the opposite side show events from the New Testament, starting with the Annunciation to Mary at the bottom and ending with Easter and the Ascension at the top. In the west side of the cathedral an explanation of the portal can now be given to the many groups of visitors in an appropriate environment without disturbing the tranquility of the nave. The area between the Bernward Doors and the outer western end of the westwork now forms a sort of vestibule. In order to access this from the cathedral, two entrances to the left and right of the organ gallery have now been created.
<urn:uuid:d0526e9d-5758-4aed-9ac5-352eebf5b19e>
CC-MAIN-2022-05
https://www.dom-hildesheim.de/en/content/bernward-doors
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302706.62/warc/CC-MAIN-20220120220649-20220121010649-00133.warc.gz
en
0.953688
376
2.921875
3
Writing stance or opinion paragraphs. Duruş ya da fikir paragrafları yazmak için aşağıdaki örneğe bakabilirsiniz. TASK: ‘Due to limited resources, and an environment that is changing for the worse, humans need to make bold tecnological decisions to survive.’ Do you agree or disagree with this statment? Dikkat etmeniz gereken noktalar (Points to consider): 1- Konuya önce genel bir giriş yapın (Use a general introduction to the topic) 2- Task olarak verilen metne değinin (Refer to the task statement) 3- Bu iddiaya katılıp katılmadığınızı belirtin (Write if you agree or disagree) 4- Fikrinizi desteklemek için en az bir örnek verin (Use evidence to support your claim) 5- Task metni ile fikrinizi/duruşunuzu gösteren bir sonuç cümlesi yazın. (Write a conclusion sentence that sums up your stance and refer to the task title in your sentence) 6- İddianızı savunurken kesin dil kullanmayın (Use hedging language to moderate claims). Kullanabileceğiniz yapılar: appear to be/seem to be/ is thought to be/ it is probable/likely that it is possible that According to/A minority view is that/Tha majority view is that/…noted that/…commented that/In …..’s opinion 1- The Death of Thought due to Technology Our resources are not endless. Our environment is dying because of human activities. Some people say that due to limited resources and an environment that is changing for the worse, humans need to make bold technological decisions to survive. I disagree with this statement because I want to develop ideas to live on, not technology. We are developing technology unconsciously and the environment is being damaged but we can find new solutions. For example, we need to limit pollution by using solar power. This could mean that we need to improve our thoughts to limit pollution by using natural resources such as solar energy and I think technology is not necessary to do this. 2- Due to limited resources and an environment that is changing for the worse, humans need to make bold technological decisions to survive. I agree with this statement because the world’s population is increasing from day to day. We need to find new places. There seem to be major problems with our current home, the Earth. We are destroying our planet. This could mean that environmental damage cannot be repaired. Maybe, we should develop a spacecraft and move to new planets. Perhaps, this is the answer to our problem to start everything again with new technologies. Note: General introduction is missing in this paragraph. (Paragrafa daha geniş bir giriş eklenmeli) 3- Due to limited resources and an environment that is changing for the worse, humans need to make bold technological decisions to survive. I agree with this statement. The global warming appears to affect people’s life. We could prevent global warming. First, we should use natural energy sources and we can use them efficiently with the help of technology. Secondly, some surveys show that freshwater resources are decreasing. We could get fresh water with the help of technology. For example, we can get potable water from salt water thanks to devices used for distillation and desalination. Note: General introduction is missing in this paragraph. (
<urn:uuid:4b6e5b18-b560-4423-a06a-830958f802fb>
CC-MAIN-2021-31
https://www.kenanakarslan.com/2019/03/yazma-gorevi-technology-to-survive/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153709.26/warc/CC-MAIN-20210728092200-20210728122200-00386.warc.gz
en
0.903294
806
2.796875
3
Ring-necked pheasants had a tough winter in Ohio. / Getty Images Ohio’s pheasants have been scarce for a number of years. Still, at least small populations have hung on in spots where there was plenty of food and cover. But this winter was a bad one, and according to Pheasants Forever, Ohio’s birds took a hit. The severe weather, which featured long durations of snow cover and extreme cold took its toll on our feathered friends. “Ohio pheasants undoubtedly struggled to find sufficient food and cover during this severe winter,” reports Mark Wiley, wildlife biologist for the Division of Wildlife. Wiley notes that there is a habitat bright spot: More than 10,000 acres in the Ohio Pheasant State Acres for Wildlife Enhancement program will be available as part of the Conservation Reserve Program this year within the primary pheasant range in the state. With birds so scarce in Ohio, many hunters seek ringnecks elsewhere. What can they expect this fall? In the rich farmlands of South Dakota, the land received only about 50 percent of its normal snowfall over the winter, which is good news for the nation's largest pheasant population. According to Travis Runio, wildlife biologist there, “The winter has not been stressful to pheasants this year and we expect that survival was higher than normal.” North Dakota had much the same conditions as its neighbor, and also reported good survival so far. Nebraska? It was a cold winter, but Dr. Jeffrey Lusk, Upland Game Program Manager reported, “I don’t expect a huge impact on pheasants, but it was very cold for long periods of time.” The population there is poised to bounce back providing there is adequate moisture this spring to promote lush nesting habitat. • Did you know hummingbirds are among the smallest birds, ranging from 3 to 5 inches on average with their brains making up 4.2 percent of their body weight? This is the largest proportion in the bird kingdom. Hummingbirds have little or no sense of smell, can see and hear farther than humans, and can remember every flower they have been to. The feet of a hummingbird are so weak they can barely walk, preferring to fly, using wings that rotate in a full circle. Most hummingbirds die in the first year of life. If they live past this first year, they can live for more than 10 years. • The spring season has arrived and so too has the season for Ohio residents to enjoy spotting young and sometimes seemingly abandoned wildlife. Each year the DOW offers simple advice “Please leave wildlife alone and enjoy wildlife from a distance!” A wild animal is capable of biting, scratching and transmitting disease and parasites to humans and pets. More often than not, baby animals are not abandoned and the parents will retrieve their young, especially when left alone by humans. • After considering public input and reviewing data, modifications were made to the 2014 - 2015 hunting regulations proposals that the Ohio Wildlife Council will vote on at its next meeting. The amended proposal states that shotgun and pistol cartridges rifles used for deer hunting be loaded with no more than three shells in the magazine and chamber combined. The current regulation states a shotgun must be plugged if it is capable of holding more than three shells. Deer bag limit adjustments were proposed in five counties, and the antlerless permit was proposed to be removed from Knox, Hardin, and Lawrence counties. • If you own a boat, you may have heard that a government mandate has been increasing the amount of ethanol in the nation’s fuel supply. According to the Boat Owners Association of the United States that edict damages boat engines and fuel systems and present safety concerns. BoatUS, along with a coalition of other groups, is now fighting to repeal the increased use of ethanol legislation. That’s because the standard no longer reflects America’s fuel usage, which has been on a decline and is opposite to the legislation’s assumptions made nearly a decade ago. Dick Martin is a retired Shelby biology teacher who has written an outdoor column for more than 20 years. He can be reached at firstname.lastname@example.org.
<urn:uuid:635e471a-02bf-4af4-af9f-5b0235c5e68a>
CC-MAIN-2015-32
http://www.newarkadvocate.com/article/20140407/SPORTS/304070006/Winter-harsh-Ohio-s-pheasant-numbers
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438043062723.96/warc/CC-MAIN-20150728002422-00212-ip-10-236-191-2.ec2.internal.warc.gz
en
0.96564
891
3.03125
3
If you live near a coastal area, it’s important that you’re always on the lookout for issues with coastal storm surge. Coastal storm surge can easily lead to serious flooding, which can cause problems with home structure and even create dangerous situations for those living nearby. Here are the 19 states that have potential problems with this type of home flooding. What Is Coastal Storm Surge? Very simply, storm surge is a rise of water that happens due to issues with a storm. It typically happens because a hurricane is moving in toward the coast, pushing water up above the predicted tide. It’s incredibly complex, but storm surge can cause a pileup of water in areas that aren’t typically built to deal with that water, which can be one of the most dangerous situations in a storm, both for the home and for the people living in it. What States Are at Highest Risk? A higher-category hurricane will certainly cause more homes to move into the coastal storm surge danger zone, but large hurricanes are certainly not unheard of in many coastal areas. If a Category 5 hurricane hits the coast, this is the number of single-family homes that are at risk of flooding due to coastal storm surge. - 2,851,642 – Florida - 843,349 – Louisiana - 563,024 – Texas - 471,323 – New Jersey - 467,787 – New York - 410,277 – Virginia - 363,875 – South Carolina - 267,802 – North Carolina - 164,504 – Georgia - 151,979 – Massachusetts - 126,589 – Maryland - 102,596 – Mississippi - 85,794 – Pennsylvania - 67,433 – Connecticut - 67,055 – Delaware - 51,929 – Alabama - 26,336 – Rhode Island - 18,149 – Maine - 9,336 – New Hampshire As you can see, Florida is by far at the highest risk, largely due to its shape. A hurricane can pass over the bottom half of Florida completely, possibly causing coastal storm surge on both sides – by Category 2, over a million homes in Florida are at risk. However, there are other states that need to think seriously about this risk as well, with 12 states that have over 100,000 homes at risk. How Can You Prepare for Coastal Storm Surge? Preparing for coastal storm surge requires assuming that the surge will happen at some point. You need to make sure that your home is made to withstand water impacts, and that means more than just elevating the home and hoping for the best. Elevation is not the only element of floodproofing your home; you need to make sure that elevation is floodproofed. Additionally, it’s important to get flood insurance if you’re at risk for coastal storm surge, just in case. Storm surge is a serious issue that impacts a significant number of homes. Overall, a whopping 7,120,779 single-family homes are at risk of flooding due to storm surge in the event of a Category 5 hurricane. If you live in any of those 19 states, don’t assume that your home will be fine if a hurricane happens. Talk to an expert about improving your floodproofing in general, and make sure you have flood insurance just in case.
<urn:uuid:db91f9e2-4290-47e1-a24f-57b268da527e>
CC-MAIN-2023-23
https://interiordesignshub.com/coastal-surge-storm-risk/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654031.92/warc/CC-MAIN-20230608003500-20230608033500-00437.warc.gz
en
0.938377
698
2.796875
3
The best available technology for fat splitting is a thick walled stainless steel tower approximately 20 meters high and one meter in diameter. The tower is maintained at approximately 250 degree C and 50 atm by the injection of high pressure steam. High pressure pumps introduce melted fat to the bottom of the tower and water to the top. The tower has heat heat exchange sections at the top and bottom. Between these, the fat and water form a continuos phase in the heat exchange where complete hydrolyis takes place in approximately three hours. Continuos countercurrent flow is maintained by the density difference between the two phases in the heat exchange sections. The fatty acids, black in color, float to the top where they are drawn off and distilled. The unreacted water containing approximately 20% glycerol is removed from the bottom of the tower and also distilled to produce pure glycerol. The use of lipases to carry out industrial hydrolysis of tallow has a number of advantages. The heat required is much less, only enough to melt the tallow, about 50 degree C , so the consumption of fossil fuels to make steam and stainless steel is much less. Also because of the low temparature, there is less degradation of unsaturated fatty acids, so pure, natural fatty acids can be obtained without distillation, even from highly unsaturated oils. Because of their nutritional value, undegraded poly-unsaturated fatty acids may be important to preserve in the production of food additives such as mono and di-glycerides. Finally, depending on the specificity of the lipase and the raw material , partial hydrolysis could yield a concentrated or purified mixture of fatty acids and/or partial glycerides with unique properties not found in bulk fatty acids from total hydrolysis of tallow. In the past, commercialization of enzymatic fat splitting has been prevented by the high price of lipase and by the need for a vigourously stirred fine emulsions to achieve maximum activity. Energy costs for producing, stirring and then separating the emulsion are high. One solution to the problem of high energy cost is to immobilize the enzyme on a solid support so that it can be used repeatedly or continuosly for a long time. Lipase is normally active only at an oil/water interface. Although lipases have been found to be active in a single phase containing solvent, oil and a small amount of water , these sovent systems are mainly used for interesterification reactions or synthesis. When an excess of water is needed to drive the reaction towards complete hydrolysis, a two phase, oil/water system is preferred. However, when lipases are immobilized on a solid support, the number of phases become three, two liquid and one solid. Because reaction ocuurs only where all the three phases meet, a very different reactor design problem is created. If the immobilized enzyme is stirred in an emulsion the support particles tend to become coated with oil, and when the water soaking the porous particles is used up, the reaction slows down or stops. When an emulsion is pumped through a packed bed of immobilized lipase, it tends to separate and change so that the enzyme contacts oil or water but not both. Again the activity is short lived. Solution to the severe reactor design problem in the hydrolysis of tallow with immobilized lipase was to use a membrane. Theoretically, a very thin membrane could immobilize the lipase at the oil/water interface. Oil and water could be made to flow past on either side. The hydrolysis would take place, and the products would be swept away. There would be effecient and long lived activity and no emulsion would be required. Actual ultrafiltration or microfiltration membranes have thickness many thousand times the diameter of an enzyme molecule, so the location of the oil/water interface relative to the enzyme within the membrane as well as the method of immobilization must be considered. At least one and perhaps both of the reactants and their corresponding aqueous or oily products must diffuse through the pores of the membrane to reach the interface. The stability, not only of the enzyme but also of the interface is important. In the case of tallow, a thermostable enzyme is required. Finally, the cost of the membrane is important and will depend on how long the immobilized activity lasts and whether the membranes can be cleaned and reloaded with the enzyme, and if so how many times. These considerations were the subject of research at Eastern Regional Center, Agricultural Reasearch Service, U.S. department of Agriculture Philadelphia, Pensylvania and are summarized as follows: Their method consisted of two continuos stirred reactors(CSTR's) in series. The first CSTR was optimized for hydrolysis by lipase. It was fed by known fixed flows of ordinary olive oil and buffered lipase solution of unknown activity to be determined. The reactor was immersed in a constant temparature bath at 37 degree C. The reactor was small (less than 5mL) and was rapidly stirred with a powerful magnetic stirrer. The reacting mixture produced in the first CSTR passed to the second CSTR which was also small, magnetically stirred and containing the pH electrode. The reference portion of the electrode was filled with methanol saturated with KCl to prevent clogging of the reference junction with insoluble soaps. Ethanol was pumped into the second CSTR to stop the hydrolysis and facilitate stirring. The pH-stat and automatic buret added standard 0.1NaOH, titrating the fatty acids to pH 10.4. After 20-30 minutes, the system came to equilibrum and the rate of addition was recorded. From this rate, the measured rates of titratable acidity entering with the olive oil and enzyme solution were substracted to give the rate of acid formation. The enzyme activity in the first CSTR expressed as m moles/min of fatty acid produced was divided by the measured volume of lipase solution in the first CSTR to obtain the lipase concentration in units/mL, one unit being defined as the amount of lipase that produces one m mole/min of fatty acid under assay conditions. For measurement of the activity of immobilized lipase, an entirely different system is used. The activity of immobilized lipase is also expressed as m moles/min, but this activity must not be confused with the units of lipase. Units of lipase are equivalent to m moles/min only under the standard assay conditions described above. In immobilized enzyme reactors the actual m moles/min are often much less than the units of enzyme immobilized. The ratio of the actual activity to the units immobilized is the effectiveness factor. It is usually less than one because of diffusional limitations and also because some portions of the immobilized lipase may be inactive becuase it is not located near the oil/water interface. They found that the culture was shear sensitive. In this fermentation, rapid mixing caused cell damage, and although the fermentation time increased from 3 days to 7 days when agitation speed was decreased, the yield of the lipase in the crude filtrate increased from less than 50 units/mL to 250units/mL or more. They therefore used a 70-liter fermentor with an oversized impellor diameter (8 inch), so that the culture could be mixed at a low shear rate. They also found that the stability of various crude preparations of this lipase in hot solutions could be greatly increased by the addition of a tiny amount of the enzyme inhibitor, p-chloromercuribenzoic acid(PCMB). At 50 degree C, the half life of one partially purified preparation increased from 0.9 day to 111 days when 20 mg/L PCMB was added. It was necessary to keep that solution at that temparature for almost five months, sampling and assaying lipase activity several times a week in order to measure such a long half life. At 57 degree C, PCMB increased the half life from 7.8 hrs to 250 hrs. PCMB reacts with free sulphydryl groups in proteins.It did not affect the lipase activity directly, but by inhibiting a sulphydryl protease that was produced by T.lanuginosus along with the lipase. Proteolytic activity in the enzyme preparations was not a problem after immobilization. The extreme thermostabilty of the this lipase in solution was only observed in the absence of a substrate. When the enzyme solution was mixed in an emulsion with tallow at 50 degree C and centrifuged, the enzyme collected in a thin layer between the enzyme free, clear oil and aqueous layers and it was unrecoverable. Thus the lipase was inactivated 100 times more faster by contact and reaction with substrate in a rapidly stirred emulsion than in a substrate free buffer solution at the same temparature. The yield of fermentation was significantly increased by the addition of PCMB to the fermentor shortly before harvest. Without PCMB, the lipase activity in the fermentor increased rapidly towards the end of the fermentation, reached a maximum and then declined immediately and just as rapidly. Thus the timing of the harvest was critical, and a delay of only one hour in cooling the fermentor down from 45 degree C to stop the fermentation resulted in significant loss of activity. They added 20mg/L PCMB to the fermentor when the activity reached half of its expected maximum. The activity continued to increase in the presence of PCMB, reached a higher maximum than without PCMB and stayed at that maximum for a much longer time.
<urn:uuid:5a3ce12b-e77e-4914-b31b-31c6fe9e067b>
CC-MAIN-2022-27
http://www.au-kbc.org/beta/bioproj2/fabstrs/babstrs/lipase_membrane_reactor.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104668059.88/warc/CC-MAIN-20220706060502-20220706090502-00597.warc.gz
en
0.960477
1,983
2.96875
3
A user must have a complete UNIX profile to log on to any computer in a zone. However, a complete profile alone does not allow a user to access any computers. The user must also have at least one role assignment that grants access somewhere in the zone hierarchy before any type of access is granted. Role assignments can be made anywhere in the zone hierarchy and inherited at a lower level in the tree. Understanding roles and rights Rights represent specific operations users are allowed to perform. A role is a collection of rights that can be defined in a parent or child zone and inherited. For example, a role defined in a parent zone can be used in a child zone, in a computer role, or at the computer level. - Password login and non password (SSO) login are allowed: Specifies that a user is allowed to log on interactively using a password or without a password using a single sign-on token. - Non password (SSO) login is allowed: Specifies that a user is allowed to log on using a single sign-on token. - Account disabled in AD can be used by sudo, cron, etc.: Specifies that an account that is disabled is allowed to access the computer. This right enables service accounts that run without a password to perform operations. - Login with non-Restricted Shell: Controls whether a user gets a full shell or is forced into a restricted shell. Users must be assigned at least one role with this right to have access to a standard shell environment. A restricted shell only allows a user to execute explicitly defined commands. The system rights for Windows computers are: - Console login is allowed: Specifies that users are allowed to log on locally using their Active Directory account credentials. - Remote login is allowed: Specifies that users are allowed to log on remotely using their Active Directory account credentials. In addition to the platform-specific system rights, there is a common system right that allows users to bypass auditing or role restrictions to log on when there are problems on a computer. The Rescue rights option allows you to specify the users who can log on if problems with the authorization cache or the auditing service on a computer are preventing all other users from logging on. You grant users permission to access computers by assigning them to a role that includes one or more access rights. By default, zones only contain the following predefined roles to grant basic access rights: - UNIX Login role allows users assigned this role to log on and access UNIX computers in the zone. - Windows Login role allows users assigned this role to log on and access Windows computers in the zone. There are additional predefined roles that grant specific rights, such as the right to log on if auditing is required but not available. The predefined roles exist in each zone, but their role names are qualified by the zone name so that the same role name in a parent zone and a child zone are considered different roles. For deployment, the predefined roles enable you to migrate existing users without developing custom role definitions. After deployment, you can define additional rights, roles, and role assignments to refine how users and groups access computers in different zones. Working with a candidate set of profiles Ultimately, the purpose of the zone structure is to determine who has access, and what kind of access, to a computer. The candidate set of profiles that have the potential to access a computer is resolved by traversing the zone hierarchy from top to bottom. Because profile data is defined separately from the role assignments that control access, you can define an inclusive set of user profiles in a parent zone to create a candidate set that can then be applied to multiple child zones. In each child zone or at the individual computer level, you can use role assignment to control access for specific users from the inclusive candidate set.
<urn:uuid:bfb18d3a-1b8c-4a4a-ae85-9243ccd39f86>
CC-MAIN-2022-21
https://docs.centrify.com/Content/inst-depl/ZonePlanTypeHierarchicalRightsRoles.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662606992.69/warc/CC-MAIN-20220526131456-20220526161456-00441.warc.gz
en
0.903225
780
2.765625
3
If a home is served by a private well, the owner is responsible for water testing and treatment. While water tests are not required, to protect the health of the home’s residents and visitors, a private water system should be tested at least once per year. Water testing can be expensive and inconvenient, but it is the only way to ensure a safe, reliable water supply. Building owners served by a public water supply pay for water testing via their water bill. By contrast, private water system owners are on their own to locate a testing lab, collect a sample, and file and act on the results. Annual Water Tests At a minimum, a private well should be tested every year for: - total coliform bacteria - total dissolved solids (or conductivity) These four tests are reasonable in cost and give the owner a good indication of either good quality water or a problem that leads to more specific testing. Keeping annual records of these four tests also helps track the onset of problems if one of the test results changes dramatically or if a trend is noted through the years. Testing Water for Nuisance Conditions Sometimes water is safe to drink but not pleasant to use. Common complaints are stains, off-color, bad taste or odor. If nuisance conditions are an issue, in addition to the annual tests, check the level of the metals listed below before purchasing water treatment equipment: Lead and Corrosive Water Lead is a very toxic metal historically used in pipe, pipe solder and plumbing fixtures. Lead can contaminate water if the water is corrosive and dissolving the pipes and fixtures. Use of lead solder in plumbing was banned in 1986, but many homes still have issues with lead in their plumbing system. Pipes and fixtures are well protected by the scale deposited by hard water, but some naturally soft water and treated water can corrode plumbing. Careful sample collection is required to test for corrosive water. Allow the water to stand in the pipes overnight or longer before collecting a “first flush” sample. Use the list below to look for indicators of corrosive water: - corrosion index Testing for Suspected Contamination Testing drinking water for every contaminant will be very expensive. Contact your local health department if you suspect contamination from leaking fuel tanks, landfills or chemical spills. A list of local health departments can be found at odh.ohio.gov/localhealthdistricts/lhdmain.aspx. Some possible tests for suspected contamination are: - leaking fuel tank—hydrocarbon scan - landfill—volatile organic scan - septic system—E. coli bacteria, surfactants (used in detergents) Water Testing in Shale Oil and Gas Development Areas Throughout Ohio, property owners are worried about the impact of shale oil and gas development on their wells. A water test, prior to drilling activity, is a great tool to protect property interests. To learn more, read the Ohio State University Extension fact sheet Testing Private Water Sources and Resolving Contamination Issues Near Shale Oil and Gas Development (ohioline.osu.edu/factsheet/SOGD-ENV1). Collecting a Water Sample The test report indicates the contents of the sample bottle, so careful sample collection and handling is required for a reliable test result that represents the water quality of the well. Mistakes can compromise a sample, so take care in obtaining the sample container, collecting the sample and transporting it to the lab. - Use the sample bottle provided by the lab. It is made of the proper materials and prepared in advance to prevent contamination of the water sample. - Follow the lab directions for sample collection and handling. For example, samples need to reach the lab quickly, need to be kept cold and need to be kept in the dark. - Check the lab schedule for sample acceptance. Some labs, for example, will not accept samples on Fridays or weekends. No Testing Needed Some things are difficult to test for, so a water test will not help in managing the problem. - Hydrogen sulfide is a gas that has the distinct odor of rotten eggs. The gas escapes from water quickly, so a sample will likely lose any hydrogen sulfide en route to the lab. - Iron bacteria forms a reddish brown slime on the inside of pipes and fixtures. It is a common, naturally occurring bacteria that can create staining problems. To look for it, check places where water stands for hours—like in the toilet tank. Interpret a Water Test Report For help in understanding a water test report, use the Well Water Interpretation Tool at ohiowatersheds.osu.edu/know-your-well-water/well-water-interpretation-tool. File water test reports in a safe place. A water test that proves that well water is good is the best defense against future impacts on the well.
<urn:uuid:bde0fe63-92ca-4183-b764-545cc4002a19>
CC-MAIN-2018-34
https://ohioline.osu.edu/factsheet/aex-314
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211146.17/warc/CC-MAIN-20180816171947-20180816191947-00032.warc.gz
en
0.920052
1,015
2.6875
3
Researchers at the University of Waterloo in Canada have developed a software tool that combines machine learning with digital signal processing (ML-DSP) to make it possible to definitively answer challenging questions. ML-DSP is an alignment-free software tool that works by transforming a DNA sequence into a digital signal, then uses digital signal processing methods to process and distinguish these signals from each other. The researchers performed a quantitative comparison with other state-of-the-art classification software tools on two small benchmark datasets and one large 4,322 vertebrate mitochondrial genome dataset. The results showed that ML-DSP outperformed alignment-based software in terms of processing time, while being comparable in terms of classification accuracy. The researchers also conducted preliminary experiments indicating the potential of ML-DSP to be used for other datasets, by classifying 4,271 complete dengue virus genomes into subtypes with 100% accuracy, and 4,710 bacterial genomes into divisions with 95.5% accuracy. From University of Waterloo News View Full Article Abstracts Copyright © 2019 SmithBucklin, Washington, DC, USA No entries found
<urn:uuid:628ff0cb-1384-43d2-8122-8d48e575531d>
CC-MAIN-2019-39
https://cacm.acm.org/news/236355-software-tool-could-provide-answers-to-some-of-lifes-most-intriguing-questions/fulltext
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514577363.98/warc/CC-MAIN-20190923150847-20190923172847-00258.warc.gz
en
0.890673
229
2.765625
3
Geoweb system stability test over soft subgrades, Assn of American Railroads, Transportation Technology Center, Pueblo, Colorado - Case Study The Association of American Railroads (AAR) maintains a very special research facility near Pueblo, Colorado, the Transportation Technology Center (TTC). Within the TTC is the Facility for Accelerated Service Testing (with the apt acronym “FAST”) where years of extreme stress conditions can be applied in a few months. On FAST’s High Tonnage Loop, a 2.7 mile “loop of track” dedicated to High Axle Loads (called HALs, denoting 35-tons or more), some remarkable testing has been performed on the GEOWEB Cellular Confinement System. The goal of the testing at FAST was to evaluate the effects of repeated heavy loads on the Perforated GEOWEB System installed over a soft subgrade. The soft subgrade was constructed from highly expansive Vicksburg Buckshot Clay, an ASTM “Reference Soil” imported from Mississippi for this purpose. The clay was placed at 30% moisture content in a five foot deep, 700 foot long trench along a section of the High Tonnage Loop, known as the Low Track Modulus (LTM) test zone. The test train operations are designed to accumulate approximately 1 million gross tons (MGT) per day, running on a continuous basis at no more than 40 mph speed. Numerous geosythetic materials had previously been tested under the track in the LTM zone, but ballast tamping was still required on an average every 15 MGT of loading. This time, however, the Perforated GEOWEB System was placed in the sub-ballast layer in readiness for the repeated application of 39 ton axle loads. To ensure that the testing would capture the “worst case” condition for clay subgrades, fire hoses were used to simulate two 500 year rainfall events, saturating the highly expansive clay subgrade during a dry mid-winter period between snow storms and snow melt conditions. Researchers found that the support offered by the Perforated GEOWEB System was not affected by the added water.
<urn:uuid:ca57ca42-ca36-4440-86d8-a70da75a8509>
CC-MAIN-2019-47
https://www.environmental-expert.com/articles/geoweb-system-stability-test-over-soft-subgrades-assn-of-american-railroads-transportation-technolog-51867
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668712.57/warc/CC-MAIN-20191115195132-20191115223132-00407.warc.gz
en
0.952966
454
2.578125
3
We have forgotten just how deep a cultural revolution Christianity wrought. In fact, we forget about it precisely because of how deep it was: There are many ideas that we simply take for granted as natural and obvious, when in fact they didn’t exist until the arrival of Christianity changed things completely. Take, for instance, the idea of children. Today, it is simply taken for granted that the innocence and vulnerability of children makes them beings of particular value, and entitled to particular care. We also romanticize children — their beauty, their joy, their liveliness. Our culture encourages us to let ourselves fall prey to our gooey feelings whenever we look at baby pictures. What could be more natural? In fact, this view of children is a historical oddity. If you disagree, just go back to the view of children that prevailed in Europe’s ancient pagan world. As the historian O.M. Bakke points out in his invaluable book When Children Became People, in ancient Greece and Rome, children were considered nonpersons. Back then, the entire social worldview was undergirded by a universally-held, if implicit, view: Society was organized in concentric circles, with the circle at the center containing the highest value people, and the people in the outside circles having little-to-no value. At the center was the freeborn, adult male, and other persons were valued depending on how similar they were to the freeborn, adult male. Such was the lot of foreigners, slaves, women…and children. High infant mortality rates created a cultural pressure to not develop emotional attachments to children. This cultural pressure was exacerbated by the fact that women were more likely to develop emotional attachments to children — which, according to the worldview of the day, meant it had to be a sign of weakness and vulgarity. Various pagan authors describe children as being more like plants than human beings. And this had concrete consequences. Well-to-do parents typically did not interact with their children, leaving them up to the care of slaves. Children were rudely brought up, and very strong beatings were a normal part of education. In Rome, a child’s father had the right to kill him for whatever reason until he came of age. One of the most notorious ancient practices that Christianity rebelled against was the frequent practice of expositio, basically the abandonment of unwanted infants. (Of course, girls were abandoned much more often than boys, which meant, as the historical sociologist Rodney Stark has pointed out, that Roman society had an extremely lopsided gender ratio, contributing to its violence and permanent tension.) Another notorious practice in the ancient world was the sexual exploitation of children. It is sometimes pointed to paganism’s greater tolerance (though by no means full acceptance) of homosexuality than Christianity as evidence for its higher moral virtue. But this is to look at a very different world through distorting lenses. The key thing to understand about sexuality in the pagan world is the ever-present notion of concentric circles of worth. The ancient world did not have fewer taboos, it had different ones. Namely, most sexual acts were permissible, as long as they involved a person of higher status being active against or dominating a person of lower status. This meant that, according to all the evidence we have, the sexual abuse of children (particularly boys) was rife. Think back on expositio. According to our sources, most abandoned children died — but some were “rescued,” almost inevitably into slavery. And the most profitable way for a small child slave to earn money was as a sex slave. Brothels specializing in child sex slaves, particularly boys, were established, legal, and thriving businesses in ancient Rome. One source reports that sex with castrated boys was regarded as a particular delicacy, and that foundlings were castrated as infants for that purpose. Of course, the rich didn’t have to bother with brothels — they had all the rights to abuse their slaves (and even their children) as they pleased. And, again, this was perfectly licit. When Suetonius condemns Tiberius because he “taught children of the most tender years, whom he called his little fishes, to play between his legs while he was in his bath” and “those who had not yet been weaned, but were strong and hearty, he set at fellatio,” he is not writing with shock and horror; instead, he is essentially mocking the emperor for his lack of self-restraint and enjoying too much of a good thing. This is the world into which Christianity came, condemning abortion and infanticide as loudly and as early as it could. This is the world into which Christianity came, calling attention to children and ascribing special worth to them. Church leaders meditated on Jesus’ instruction to imitate children and proposed ways that Christians should look up to and become more like them. Like everything else about Christianity’s revolution, it was incomplete. For example, Christians endorsed corporal punishment for far too long. (Though even in the fourth century, the great teacher St John Chrysostom preached against it, on the grounds of the victim’s innocence and dignity, using language that would have been incomprehensible to, say, Cicero.) But really, Christianity’s invention of children — that is, its invention of the cultural idea of children as treasured human beings — was really an outgrowth of its most stupendous and revolutionary idea: the radical equality, and the infinite value, of every single human being as a beloved child of God. If the God who made heaven and Earth chose to reveal himself, not as an emperor, but as a slave punished on the cross, then no one could claim higher dignity than anyone else on the basis of earthly status. That was indeed a revolutionary idea, and it changed our culture so much that we no longer even recognize it.
<urn:uuid:d3c038b0-d0ce-496a-9d61-c855f1ecd22e>
CC-MAIN-2019-13
https://eppc.org/publications/how-christianity-invented-children/
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202199.51/warc/CC-MAIN-20190320024206-20190320050206-00554.warc.gz
en
0.982733
1,233
2.71875
3
- As in hate speech laws1 *2, it is not allowed to say anything negative about a “protected group” aka “minority”3 - It is irrelevant if the disallowed “content” is factually true (#TrueSpeech). - It is ok to encourage hate against an unprotected group4 “Encouraging hatred” is interpreted very widely. with typical PC dishonesty. Negative facts might encourage “hatred” against “protected groups” aka “minorities”. The #PCGagOrder is officially enforced by YouTube and FaceBook. Forbidden to say anything negative about minorities, to avoid stirring up prejudices. This #PCGagOrder is enforced by Hate speech laws, and social media. “We also don’t allow any content that encourages hatred of another person or group of people based on their membership in a protected group” That interview was one of fourteen videos that YouTube banned from the E. Michael Jones channel on YouTube in June. As with other thirteen, the only explanation YouTube gave was that the video violated its rules concerning hate speech, I.e., “We also don’t allow any content that encourages hatred of another person or group of people based on their membership in a protected group.” YouTube’s notice did not identify the offending hate speech or the “protected group.” Source See our comments - Forbidden to say negative facts about minorities, to avoid stirring up prejudices - Age of Enlightenment for Social Sciences Requires Scientific Honesty - #TrueSpeech is Forbidden, True Facts are Taboo. DeCriminalize #TrueSpeech - Racism taboo ⇔ PC gag order [⇔ PresseKodex12.1 ⇔ Stylebook ethics] (are all equivalent) 7 We do not allow hate speech on Facebook because it creates an environment of intimidation and exclusion and in some cases may promote real-world violence. We define hate speech as a direct attack on people based on what we call protected characteristics — race, ethnicity, national origin, religious affiliation, sexual orientation, caste, sex, gender, gender identity, and serious disease or disability. White, heterosexual, male, able bodied, legal are not protected characteristics. One may, this, call these people deplorables, call for “Kill Whitey night”, “kill all white men”, “all men are rapists” all is not hate speech. “Kill all infidels”, no problem. Muslims calling for violence against gays, that is a problem of victim status ranking &&ln We also provide some protections for immigration status. Legal residency is not a protected status. Thus it is ok to say Eastern Germany is too white, or call the indigenous citizens “racists”, “bigots”, We define attack as violent or dehumanizing speech, statements of inferiority, or calls for exclusion or segregation. We separate attacks into three tiers of severity, as described below. So it is not possible to suggest to repatriate illegal immigrants, or return legal immigrants at the end of their legal stay. Speaking about black or Muslim crime, be it single cases of crime or aggregate statistics that show high crime rate, or low work ethics is “dehumanizing speech, statements of inferiority”.9
<urn:uuid:450ed2ba-ee37-4796-b29b-af52cfecfc14>
CC-MAIN-2022-21
https://sincerity.net/protected-characteristics-hate-speech/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534693.28/warc/CC-MAIN-20220520223029-20220521013029-00536.warc.gz
en
0.914131
709
2.734375
3