text
stringlengths
222
548k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
14
7.09k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
53
113k
score
float64
2.52
5.03
int_score
int64
3
5
Channel Islands National Park lies in a remote, isolated area at the confluence of two major ocean currents, a region of persistent ocean upwelling, and the border of two tectonic plates. The powerful and dynamic forces of land and sea in this unique region have shaped the islands and their inhabitants. The park preserves some of the finest remnants of the coastal Mediterranean type of ecosystem, a rare combination of climate and vegetation that exists in only five places in the world. A unique suite of plants and animals colonized the islands and adapted to the particular conditions of each one. Isolated for eons, many evolved into species and subspecies not found anywhere else. As a result, despite its small size Channel Islands National Park harbors biological diversity characteristic of nearly 1,000 miles of the West Coast of North America. Park waters are also exceptionally productive. Cool, nutrient-rich ocean currents swirl around the islands, rising into abundant sunlight and mixing with warm coastal waters. The combination of nutrients and sun accelerates photosynthesis and the growth of multitudes of sea life all the way up the food chain-from microscopic plankton to blue whales. The park also contains a prolific paleontological record with evidence of extinct species such as pygmy mammoth, flightless sea duck, vampire bat, and giant deer mouse. The wealth of natural resources in Channel Islands National Park offers the public unparalleled opportunities for solitude, tranquility, wildlife viewing, outdoor recreation, appreciation of natural history, and environmental education.
<urn:uuid:e31ad969-1653-4415-8033-58bf61b73079>
CC-MAIN-2018-43
https://www.nps.gov/chis/learn/nature/naturalfeaturesandecosystems.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515555.58/warc/CC-MAIN-20181022222133-20181023003633-00457.warc.gz
en
0.901833
304
3.859375
4
The time required to produce a part or complete a process, as timed by actual measurement. Cycle Time-Related Terms Involving Time Effective Machine Cycle Time Machine cycle time plus load and unload time, plus the result of dividing changeover time by the number of pieces between changeovers. For example, if a machine has a cycle time of 20 seconds, plus a combined load and unload time of 30 seconds, and a changeover time of 30 seconds divided by a minimum batch size of 30, the Effective Machine Cycle Time is 20+30+(30/30) or 1 = 51 seconds. Machine Cycle Time The time a machine requires to complete all of its operations on one piece. The time spent on activities that add costs but no value to an item from the customer’s perspective. Such activities typically include storage, inspection, and rework. Operator Cycle Time The time it takes an operator to complete all the work elements at a station before repeating them, as timed by direct observation. Order Lead Time Production lead time plus time expended downstream in getting the product to the customer, including delays for processing orders and entering them into production and delays when customer orders exceed production capacity. In other words, the time the customer must wait for the product. The amount of time that elapses from the receipt of a customer order until the producer receives cash payment from the customer. This can be more or less than order lead time, depending on whether a producer is in a build-to-order or a ship-from-stock mode, on terms of payment, etc. The time a product actually is being worked on in design or production and the time an order actually is being processed. Typically, processing time is a small fraction of production lead time. Production Lead Time also Throughput Time and Total Product Cycle Time The time required for a product to move all the way through a process or a value stream from start to finish. At the plant level this often is termed door-to-door time. The concept also can be applied to the time required for a design to progress from start to finish in product development or for a product to proceed from raw materials all the way to the customer. The time of those work elements that actually transform the product in a way that the customer is willing to pay for. Usually, value-creating time is less than cycle time, which is less than production lead time.
<urn:uuid:eb548ff2-7b8b-4db4-9165-050c815ba0ad>
CC-MAIN-2018-17
https://www.lean.org/lexicon/cycle-time
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937114.2/warc/CC-MAIN-20180420042340-20180420062340-00151.warc.gz
en
0.931041
500
2.921875
3
Early Botanical Microscopy at the Academy Microscopes had already been used to study plants by the time the Academy was founded, but only a few academicians were interested in botanical microscopy. As a result, microscopic observation affected the Academy's natural history of plants only peripherally. Descriptions were meant to distinguish plants from one another, but not to include their anatomies or to clarify vegetable physiology. The engravers found microscopes useful, because the Academy wanted the smallest external details of each part of the plant to appear. Otherwise, academicians only occasionally used microscopes to study plants. Perrault recommended microscopy for research on germination. In 1667 he made these plans: Experiments on how plants grow will be made by considering the roots and seeds and examining them diligently with the microscope, both before placing them in the ground, and by taking them out of the ground at various times in order to consider the different changes which occur with respect to size, or to shape of their pores, to their saps, weight, color, odor, taste, and so on. Then one will consider what happens to their sprouts when they begin to grow, especially to those which are enclosed within large seeds, such as acorns, where one notices the root, the trunk, and the branches of the entire tree, which seems already formed and distinct before emerging between the two sections into which the acorn normally separates. Perrault hoped that microscopes would settle disputes over preformation and emboîtement and would ease comparisons between the growth of seeds and the development of the chick in an egg. Although Perrault's suggestions were not officially adopted, some members studied plants with microscopes and magnifying glasses. Examining hemp thread (fil de chanvre ), La Hire saw filaments which he compared to capillary tubes and claimed that sap passed up them to nourish the plant. Dodart examined young shoots of wheat to find the tiny grains; he was testing preformationist theory. In the 1680s some academicians considered studying plants and their distillants with the microscope. Not institutional policy but individual interests incorporated microscopes into the arsenal of discovery and argument in botany. Unlike most of his colleagues during the 1660s and 1670s, Mariotte routinely used hand lenses and compound microscopes. They were invaluable in his studies of vegetable physiology. His arguments against preformation and for the circulation of the sap depended on meticulous observations. He examined leaves, bulbs, seeds, and cut stems; his descriptions of bark, skin, fibers, vessels, spongy matter, and saps are the verbal equivalent of Grew's illustrations. In shrubs he identified "canals or pores" in the marrow of the cutting; a microscope revealed these pores to be "several small oval cells [cellules ]" resembling honeycombs. Without a lens Tournefort could not have found the "seeds" of ferns or examined the growth, desiccation, and contraction of seed cases, observations that he cited against spontaneous generation. When he examined plant vessels Tournefort found resemblances to bones and muscles, and he claimed that the very vessels that carried sap eventually dried and became fibrous, stiff, woody, and capable of supporting the plant. Microscopy provided evidence for Tournefort's theories about the motion of sap and the growth and reproduction of plants. Huygens contributed incidentally to botanical microscopy when he brought a spherical microscope to the Academy in the summer of 1678. Although his primary interest was animalcules, his colleagues examined a section of a fir tree, some pollen from a lily, and the marrow of a fig tree. But Huygens's apparatus held little interest for the botanists, and besides him only the astronomers Picard and La Hire used it to study plants, or rather their pollen. Picard compared the shapes of pollens from different plants, without conjecturing about the nature or function of that "dust" or "flour." He merely commented on the shapes, colors, and structures of pollen. Huygens and his brother Constantyn went beyond Picard's simple comparisons of appearance. They considered internal structure and the connection between pollen and the activities of bees. Huygens observed that the "dust" of crocus flowers and the dust on bees' feet looked the same, and he argued that pollen adhered to the feet of bees, who made wax from it. When his brother expressed surprise that pollen stored for two months still contained a liquid, Huygens replied, "What you say of the liquid in yellow powder confirms again what I said, that it served to make wax." Although he hypothesized about accidental uses of pollen, Huygens never applied his observations of pollen to any theories about plant physiology. No one in the Academy took more than passing notice of his or Picard's findings. Only one of the academicians who normally studied botany, La Hire, used Huygens's spherical microscope to examine plants. This surprising lack of interest among the Academy's botanists was due to the difficulty of using the spherical microscope and to its limited range of applications. Huygens noted that many of his colleagues saw animalcules only with great effort, while others never saw them at all. Proper use of the lens and careful mounting of the object were crucial for success. Huygens, Roemer, and Hartsoeker developed a way of mounting several objects on a rotating wheel, an invention to which no Frenchman contributed, Huygens was quick to point out. But even when every precaution was taken, the instrument was of limited use for studying plants, because it was not yet possible to cut plant sections so thin as to be transparent or to fit between slides. Few parts of plants, therefore, lent themselves to study with Huygens's apparatus. Despite their inherent defects and the difficulty of using them, spherical microscopes impressed Parisian scientific savants. Huygens was as gratified by the reception of his microscopes as by the inability of Parisians to make the lenses. He reported that "the curious" were "astonished by the great effect it makes"; Locke had heard of "the extraordinary goodness" of Huygens's microscope. Protestations of interest no doubt outnumbered clear sightings of animalcules, because the skepticism that had earlier greeted the telescope and air pump was now less tenable; by 1678 few amateurs would have chanced embarrassment by challenging Huygens on the basis of negative evidence. Instead, Huygens's enemies contented themselves with ghost-written articles disproving Huygens's claims of priority. Microscopy was always ancillary to other ways of studying plants at the Academy. Academicians who habitually studied the natural philosophy of plants used a convex hand lens and sometimes a compound microscope to observe the details of plant anatomy and to support various hypotheses about plant physiology; they applied the readily available microscopes to subjects that had long interested them. Huygens and Picard, on the other hand, were more engrossed by the novelty of the instrument than by its botanical applications; they never pursued plant microscopy exhaustively because they were more interested in other subjects. Finally, academicians who studied the anatomy and physiology of plants preferred theoretical issues to exhaustive description. For them microscopy was one technique among many, and they used it along with naked-eye observation, chemical analysis, and analogical reasoning in order to support their hypotheses about germination, nutrition, and growth.
<urn:uuid:3860aea0-d326-4032-9382-5e63d6ac3d0a>
CC-MAIN-2013-20
http://publishing.cdlib.org/ucpressebooks/view?docId=ft587006gh&doc.view=content&chunk.id=d0e3355&toc.depth=1&anchor.id=bkd0e3430&brand=eschol
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697552127/warc/CC-MAIN-20130516094552-00092-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968042
1,565
3.375
3
However, not numerous drugs’ consumers know how the drugs are made. The process of capsule producing includes of numerous levels. However, the most interesting is the pill filling. The consumer obtains the single pill which is found in the cover. The article will tell how the medicine is put into the cover. First of all, it is useful to see how the ingredient is placed in the tablet. The tablet is commonly split into 2, separated items, which are closed and produce 1 unit. At beginning, the device joins together the cover of the pill number one and number two. Then the content is put into one of the component and finally, the device connects together both of the covers. When the capsule is prepared, it is put to the blister and then to the package. In the end, the product can be found in the chemist’s. The complete process seems to be as effortless as a pie. Nonetheless, the production of the pills requires special tablet filler machines and makes a use only of the original capsule fillers parts, which often are worn out. Furthermore, the medicine businesses must obtain the unique permissions to start producing the capsules. Moreover, they have to use just the original machines which possess the modified certificates and can work in specific conditions. However, the authorities and the Ministry of Health do not trust those organizations and here are various tests carried out in order to verifying the quality of the drugs. The medicines are important in keeping people’s lives. The ill individual with no drugs means death individual. Nevertheless, there still should be provided particular rules in manufacturing of drugs. There should not be used unselected equipment and there must not work unselected employees.
<urn:uuid:d05355b2-d81b-417a-99f4-bc895ed95d4d>
CC-MAIN-2018-09
http://planetnewmedia.co.uk/in-what-way-drugs-are-produced-these-days/
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812405.3/warc/CC-MAIN-20180219052241-20180219072241-00399.warc.gz
en
0.954711
343
2.578125
3
Can the Kyrgyz horse seen today realistically be called a breed? Stephanie V. Sears travels throughout the mountainous Central Asian country of Kyrgyzstan to investigate the history and more recent transformation of Kyrgyz horses. Central Asia–– horse land In 2004, north of Kazakhstan, I caught sight, from the Trans-Siberian Railway, of a horse and rider that appeared like a throwback to the days of Genghis Khan or Tamerlane. In that vast empty landscape it suddenly became obvious that the horse was not just the rider’s mode of transportation but also his ultimate refuge. The horse was some fourteen hands, with a straight, short head, and a low-set tail. A trace of elegance transpired through the ordinary appearance and between his jowls dangled a harness tassel as seen on horse representations of the Tang Dynasty. Rider in lush mountain area of western Kyrgyzstan. Was this a descendant of the famed ‘celestial horses’ sought by the Emperor Wu of the Western Han dynasty (3rd century BC to 1st AD) in order to reinforce the Chinese army against northern nomadic tribes? Was this the horse bred in the Ferghana valley southwest of today’s Kyrgyzstan and southeast of today’s Uzbekistan, a horse known for sweating blood (a phenomenon said to be caused by a regional parasite), a horse whose heyday came about during the Tang period (618-907 AD)? Was this also the horse used later on by the Cossacks’ irregular cavalry and who, despite his small stature, was greatly appreciated for his mobility, good character and endurance? Since the second half of the 1990s Kazakhstan has been a regular buyer of Kyrgyz horses, taking advantage of low prices, and by the same token boosted a comeback in private breeding in Kyrgyzstan after the fall of the Soviet Union. It was possible, therefore, that the horse glimpsed from the train had come from Kyrgyzstan, southern neighbor to Kazakhstan. During World War II, a massive mobilization of Kyrgyz horses by the Russians, the removal of tens of thousands of Kyrgyz horses to Ukraine in the 1950s for use in agriculture, others confiscated to benefit local Kolkhozes, or simply slaughtered, had in fact discouraged private breeding and diminished the equine population. Yet their numbers never reached the nadir found in Turkmenistan, the other renowned horse culture of central Asia where only 2100 Akhal Teke horses and some 6650 half-breeds were recorded in 2008. In 1996 Kyrgyzstan still had a total of 308,100 horses and in the next ten years this number would increase to 384,000. In contrast with the mostly arid Turkmenistan, Kyrgyzstan is a well-watered and mountainous region with the main Tian Shan range reaching up to between 6000 and 7000 meters. Unlike the Akhal Teke horse in Turkmenistan used only for cultural displays and sport activities, horses in Kyrgyzstan are frequently seen on the roads in herds or Kosyaks (a herd of fifteen to twenty mares with a stallion), going to and from grazing grounds, mixing with herds of sheep and goats, or dotting the grassy slopes up to around 2500 meters. In spring the velvet green of these high pastures is finely etched with a multitude of hoof trails. The return of horses to these altitudes not only conveys an aspect of legendary timelessness to the magnificent landscapes, but has also helped to regenerate the grass cover. Unlike the Turkmen, for whom eating horsemeat is anathema, the no less accomplished Kyrgyz riders, reputed to begin riding before they can walk, enjoy eating horsemeat, often prepared in a favorite noodle and meat dish called Bech-barmak. Mainstay of the traditional Kyrgyz way of life and cherished companion of the Kyrgyz, the horse provides also hide, rope and the Kymyz or mare’s milk, drunk fresh or fermented and used as medicine for certain ailments. It is frequently sold along the roads, partly as a tourist attraction. The Kyrgyz horse is also the principal actor in a series of vigorous equestrian games that reflect the enduring nomadic way of life and which will no doubt serve increasingly to entertain foreign tourists. The most famous of these is the Kök Böru, derived from the traditional method used by herdsmen to fight off wolves attacking their stock; now using a sheep or goat carcass instead of a wolf’s, it is called Oulak Tartych. In the Kyz Koumaiy, a ritual bridal pursuit on horseback, a man chases a girl to kiss her while she, mounted on a faster horse, attempts to escape. One may legitimately wonder, however, if the Kyrgyz horse seen today can realistically be called a breed. The prevalence of nomadic life and of criss-crossing invasions in the history of Central Asia, the importance of far-ranging commercial circuits dubbed in the nineteenth century the ‘Silk Road’, in which the horse was a favored merchandise, the tradition among Kyrghyz nomads of stealing whole batches of horses (baranta) from each other, the absence of any written records in the Kyrgyz oral tradition, and finally the systematic cross-breeding achieved under Russian and Soviet governance interfere with such a notion. Nourlan Mamyrov owns a private stable fifteen kilometers outside of Bishkek where instead of Kyrgyz horses he keeps a few Arabians and Akhal Teke. His justification for this choice is that the Kyrgyz horse no longer looks like what he knew as a child some forty years ago; horses were taller then (1m 65 or around 16.1 hands or 5 ft 5 inches), with smaller heads, straighter profiles, smaller ears and bigger eyes. In fact, they somewhat resembled Arabians, in contrast with today’s Kyrgyz horse which, according to Nourlan, has a longer back, bigger head, a deer neck and shorter legs. His aim is therefore to breed his Arabians with local horses to bring back the old type. For Sadyr Mamytov, president of the Equestrian Federation of Kyrgyzstan, a complex situated in pleasantly shady grounds on the outskirts of Bishkek, there are two types of Kyrgyz horses: the pre-Russian or purely Central Asian type of horse and the Russian-made new or Novo kyrgyz. Uncertainty transpires in his tone, however, when mentioning the old Kyrgyz horse. One is led to wonder if the old Kyrgyz type still co-exists with or has already been erased by the Novokyrgyzkaia paroda or new breed. The Russians began the cross of larger Russian breeds with Kyrgyz mares in the second half of the nineteenth century, first with the Orloff, later with the Russian Don, Budyonny and English Thoroughbred stallions. The effort was normalized with the creation of a national stud farm in 1926 near Issyk-kul lake, and another in Naryn the following year. 17% of the Kyrgyz horse population was of the Novo Kyrgyz type in 1949. The horse Banket, born in 1946, was the Novokyrgyz champion of a 500 km mountain race and winner of the 1955 Agricultural Fair. Recognized as a breed in 1954, the Novo Kyrgyz came to represent 53% of the Kyrgyz equine population by 1980. Somewhat philosophical about a state of affairs forced upon the Kyrgyz by the Russians, Sadyr Mamytov admits that neither the old nor the new type of Kyrgyz horse is adequate for the competitive dressage, jumping or three-day events which concern the Federation. The appropriate breeds for these are foreign, (Hanoverian, Westphalian, Holstein, Thoroughbred, and the purebred or crossed Akhal Teke) and are bought in Germany, the Baltic countries and Russia. According to him, however, the traditional sphere of long-distance racing and games involving the Kyrgyz horse (old or new) is far more popular with the Kyrgyz nation than the international equestrian scene. Despite a keen interest on the part of the Ministry of Agriculture to produce international level competitors, Sadyr believes that such competitions will remain of little interest to his compatriots until the day a Kyrgyz rider and Kyrgyz horse participate and win one of them, thereby contributing to the nation’s sense of identity and pride in its native horse culture. The Tokmok animal market suggested by Sadyr as a place where I might see examples of the ‘old’ Kyrgyz horse, is some 60 km east of Bishkek, and conveniently close to the northern Kyrgyz border for Kazak buyers. The market takes place on weekends and is almost solely devoted to horses on Sundays. The spectacle is one of brimming horse energy, all ages and genders mixed and condensed to dangerous levels of intensity. Stallions kick and rear, making people suddenly disperse. Two horses stand out and they are clearly not of the ‘old’ Kyrgyz type, nor even, would it seem, of the ‘new’ type: one is a two-year-old chestnut with unmistakable Thoroughbred lines. The owner shows a document stating that the young horse descends from Noureev. He is for sale for three thousand dollars, the average price for a horse in Kyrgyzstan being $1000-1500. Another striking individual among a majority of non-descript horses is, according to his document, an Anglo-Arab sired by Secretariat. His sale price is also $3000. These two horses will probably not end up on someone’s plate but rather on a racecourse. More significantly, their origins and presence at the Tokmok market reveal how far ranging and casual is the mingling of breeds in the country. Horse reported to be a descendant of Secretariat at Tokmok market. The Bishkek hippodrome is in the process of being refurbished to become a multi-purpose equestrian center with a covered training ring, a horse pool, a breeding farm, an obstacle course, a veterinary service and a clubhouse for members. The project developed on two hectares adjacent to the racetrack and run by Alex Youlgasheb, former consul to Bruxelles, seems to have found its calling in reconciling traditional Kyrgyz and Western equestrian sport. Kyrghyz spectator at Bishkek hippodrome. On a hot May day a series of amble (jurga) and gallop flat races draws a substantial crowd to the track where the men’s white felt ak-kalpak hats mark the event as traditionally Kyrgyz. Some of the racehorses are, in Kyrgyz fashion, very young, (the Taychabysh is a 4 to 5 km race for yearlings, the Kunan Chabysh, a 9 km race for 2 year olds, the Jurgachabysh, a 6 km amble race) and ridden by young boys sometimes as young as seven or so, wearing no hard hat and riding bareback. These are short-long races from about 2 and a half to 9 km long, (in contrast with endurance races, on average 20 to 40 km long for three-year-olds). Alex informs me, however, that the racehorses are usually not Kyrgyz but Akhal Teke crossed with Thoroughbred or Thoroughbred. In fact, one of the races ends tragically: a young horse bred at the hippodrome arrives in a state of near collapse in the last stretch. Spectators rush out to prop him up on his wobbling legs as he is given an intravenous injection. Alex mutters matter-of-factly that the horse may not survive. Horse at Bishkek hippodrome. Finding the real Kyrgyz horse The Kyrgyz horse, for his part, is reputed for his resistance and frugality, and said to have been able to travel over 66 miles daily for a week, or 100 to 166 miles in twenty-four hours. Numerous other examples are given of his exceptional hardiness. Does such a horse correspond to the smallish, angular horses ridden by farmers on the country roads or hitched to a cart transporting potatoes around the Issyk-kul Lake some five hours east of Bishkek? And to the lean, rather straight-nosed little horses seen along the road accompanied by two or three mounted herders, or in the mountain pastures, grazing within sight of their owner’s yurt? Admittedly disappointing in appearance, this horse seems nonetheless to have the agility of a mountain goat, often seen on steep, high altitude slopes, apparently able to live constantly outdoors, at least during the warmer seasons and despite reported wolf attacks. For indeed no stables or animal shelters of any sort are in sight. In the valley of Sosnovka west of Bishkek, horses are larger, with a more refined conformation. Consistent with Sadyr’s information that the Russians had introduced foreign breeds into the region of Talas, a good number of them look like Thoroughbreds. Further on, in the Sousamy plain, and in conjunction with the reappearance of yurts, the horses return to a more rustic and smaller frame. Crossbreds on the road towards Talas, a small town in northwestern Kyrgyzstan. Eighty kilometers or so outside of Talas, the empty and degraded buildings of what was once a substantial Russian breeding establishment seem abandoned. One cremello horse of humble appearance keeps a somnolent guard in an enclosure. A passing rider informs me that the farm is still used and that the other sixty horses are grazing up in the surrounding hills. What type of horse are they? They are Novo Kyrgyz and reserved for equestrian games and races, which take place from September to October and from March to May; the national celebration of the 21st of March is a special occasion for the game of Kök Böru and Kyz Koumaiy. My informant never mentions the ‘old’ Kyrgyz type, as if it no longer existed. Ex-Soviet breeding farm still in use near Talas. Back in Bishkek, a request for information on native horses at the ministry of Culture - an attractive building, on the outer walls of which the Sickle and Hammer symbol remains – rapidly leads to a meeting with the dashing minister, Mr. M R. Boromayev who puts me in touch with another Kyrgyz breeder, Satar Dykambaev. Who is right, who is wrong? Satar’s horse farm is a two-hectare grassland with eleven horses in some foothills on the outskirts of Bishkek. Also present are his son Sultan, an equestrian stunt man, and his nephew Ruslan who worked as an equestrian acrobat in Las Vegas, at Ringley Bros and Barnum & Bailey’s circus from 1995 to 1999. We sit outdoors sipping tea mixed with cognac surrounded by gracefully proportioned mares at about 14 hands with their foals. Here, tells me the gravelly-voiced and extremely personable Satar, are examples of the real, purebred (asil) Kyrgyz horse. His stallion, Ushan, a liver chestnut, is brought out of the stable accompanied by a chorus of barking dogs that protect the stable against horse thieves. With his short back, broad chest, slightly dished head, the stallion has, to my eyes, a pronounced Arabian appearance. I explain my perplexity when comparing Satar’s horses to the scruffy-looking mountain animals seen north of Naryn and at Issyk-kul. ‘My horses’, he explains, ‘are Argamak Kyrgyz mountain horses for endurance racing, not to be confused with the Viouchnye or packhorse’. Nomad owned foals in western Kyrgyzstan. Traditionally, the Kyrgyz horse was divided into three types: the provider of meat and milk, the saddle/hunting/war mount, and the racehorse, to which these horses correspond and which are trained from the age of one and a half throughout the year for an hour every day over eighteen kilometers. Though Kyrgyzstan has had no studbook until very recently, hand written family records of a horse’s lineage called Sanjira, have served as certificates of origin. In the case of Satar’s horses these certificates span twenty generations. Am I at last contemplating the authentic Kyrgyz horse? Jacqueline Ripart, a French journalist and horsewoman, tells me that I am not. Residing in Kyrgyzstan, she has devoted herself to finding the last ‘real’ Kyrgyz horses that, according to her, are of a different height and conformation altogether. To breed them back into their native landscape she has created the Kyrgyz Aty Foundation and contributed to the creation of a stud farm at 2400 meters in the south Pamir region. Those horses that conform to standards agreed upon by the Ministry of Agriculture are recorded in a book, and a breeding register was established in 2011. To further select the best horses of this ’authentic’ type, a yearly endurance race festival (a 25 km race in rough terrain) on the southern bank of the Issyk-kul lake is organized in which horses no taller than 1.49 cm may participate. And yet doubt remains when Satar objects that Jacqueline Ripart has wrongfully singled out the lowest quality of Kyrgyz horse, refusing to acknowledge the existence of a more refined yet nonetheless authentic type of Kyrgyz horse. The environment defines the horse In fact, within the whole Central Asian area and over the centuries, a large number of horse breeds or types have been identified. The deeper one investigates into regional or clanic distinctions the greater the number of horse strains or types one may find. The main distinctions, however, include the Argamak, a finer type of horse sometimes also termed ‘Oriental’; the Adayev, a name applied generally to the resistant and undemanding Kazak and Kyrgyz horses; the Karabagh (Karabair) which is similar to the Argamak or to the Akhal Teke though less refined; the Kyrgyz mountain horse, an all purpose and very resistant horse of more common appearance. A nomad camp in Kyrgyzstan. A discussion on the definition and survival of the authentic Kyrgyz horse today, seems doomed to inconclusiveness and futility in light of the multiple layers of cross-breeding that have occurred for generations and that continue to occur. As in the past, the seminal influences in the shaping of the Kyrgyz horse will be his natural environment and his mode of life. Since nomadic life and traditional ways have survived, the Kyrgyz horse continues to live outdoors and at high altitudes, thus ensuring the perpetuation of fundamental qualities such as endurance and sure-footedness. In turn, improved fodder and a more rigorous genetic selection will both strengthen these characteristics and refine the type. As proposed in the early twentieth century by V.A Panovsky, Russian Commissary to local horse breeding, improvement in the quality of life of horse breeders will affect positively the quality of their horses. One typical illustration of this is that foals might profit for longer periods from their mother’s milk and therefore develop better. Another is that if yearlings and two year olds are no longer ridden as they are now, they will in all likelihood grow taller and with stronger backs. Improvement in the quality of local horses may well also revitalize the Kyrgyz economy by way of sport and tourism. The continued presence of the horse in Kyrgyzstan before and after the country’s independence in 1991, has represented something of a political and social victory over Russian and Soviet impositions. The growing horse population and enduring nomadic ways create together an ideal setting for the Kyrgyz horse to proceed towards recovery of his former self or to an avatar of that Kyrgyz archetype praised for centuries. Article and photographs by Stephanie V. Sears Stephanie V. Sears is a French American ethnologist and freelance journalist, essayist and poet living both in France and in the United States. Her other equine-related articles have been published in The Chronicle Of The Horse, on the Akhal Teke; in Conquistador, on Rejoneo, the Minorcan stallion and The Spanish pure-bred in harness; in Arizona Connection, on the Arabian horse in the United States; in The Canadian Arabian Horse News, on the bedouin-bred horse in Syria and the Arabian in Syria. - Dogs Stars of Equitrekking Quiz - The American Bashkir Curly Horse Breed Profile - The Akhal-Teke Horse Breed - Friesian Horse Breed Profile - The Arabian Horse Breed Profile - Horse Breeds from Around the World Quiz - Trail Riding Quiz - Horse Riding Kyrgyzstan - A Montana Traveler Review - The Icelandic Horse - Iceland- Icelandic Horses & Culture Video - Icelandic Horse Competition
<urn:uuid:8180d06d-0c23-4716-840a-99c3abec6769>
CC-MAIN-2014-35
http://www.equitrekking.com/articles/entry/kyrgyz-horse-breed/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909035153-00286-ip-10-180-136-8.ec2.internal.warc.gz
en
0.950906
4,523
3.203125
3
Date: 12/03/98 at 23:19:16 From: S. Smith Subject: Rubik's cube I just wanted to know about the Rubik's Cube. Who made it and how it can help me learn math? Thanks. Date: 12/04/98 at 12:46:05 From: Doctor Rick Subject: Re: Rubik's cube Hi, welcome to Dr. Math's office. Rubik's Cube was invented in the 1970s by a Hungarian named Erno Rubik. Playing with Rubik's Cube makes you think about 3-dimensional shapes, visualize what will happen if you turn a face of the cube a certain way, and plan ahead. You have to make the cube look worse before it can get better, so you can't just do it one step at a time. You learn certain patterns - sequences of 3 or 5 or 15 rotations that move the little cubes in a certain way. These things are good for stretching your mind even if it doesn't seem like math. A warning, though: it doesn't replace doing homework. The Cube can be habit-forming, so be careful with it! There is math in Rubik's Cube that you haven't learned yet. The math in Rubik's Cube is a branch of mathematics called Group Theory. Instead of multiplying or adding numbers, you rotate faces of the cube, and this kind of math helps to describe what happens when you do several rotations in a row. For instance, in regular math, 3 times 2 is 6 and 2 times 3 is also 6. But in the "group" that is Rubik's Cube (the set of rules that it follows), turning the top counterclockwise and then turning the front clockwise is NOT the same as doing these two "operations" in the reverse order. We say that the group is not "commutative". I don't think you'd understand it yet, but in case you'd like to see what the math looks like, you could try to find an old copy of Scientific American magazine in the library. In March 1981, Douglas Hofstadter wrote an article about the mathematics of Rubik's Cube. I learned how to solve the Cube by studying this article, but I must admit that 9-year-olds with no idea of the math involved could solve it faster than I. I have no idea how they did it! For another advanced source, this one on the Internet, you could try the lecture notes by Professor W. D. Joyner for a class on the mathematics of the Rubik's Cube: http://web.usna.navy.mil/~wdj/rubik_nts.htm - Doctor Rick, The Math Forum http://mathforum.org/dr.math/ Search the Dr. Math Library: Ask Dr. MathTM © 1994-2013 The Math Forum
<urn:uuid:b6e32777-5cba-40ea-9c5a-d526ff5f3048>
CC-MAIN-2013-20
http://mathforum.org/library/drmath/view/56783.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711240143/warc/CC-MAIN-20130516133400-00030-ip-10-60-113-184.ec2.internal.warc.gz
en
0.950709
588
3.203125
3
cloth, 240 pp., $60.00 Thomas Mawson (1861–1933) was an Edwardian landscape designer as well as town planner in the United Kingdom, North America, and Europe. His books — The Art and Craft of Garden Making (1900) and Civic Art (1911) – were influential. This book describes not only Mawson’s life but the evolution of planning and landscape architecture a century ago. The story of Mawson’s life starts with his humble beginnings near Lancaster with little formal education, to a flourishing business with clients ranging from industrialists to the king of Greece. The book is full of color illustrations and reproductions of plans and other documents, reflecting the diversity of Mawson’s activities. This enjoyable and accessible book will be of interest to anyone interested in the history of landscape architecture and planning in the last century. — Elaine Juhl, volunteer, Chicago Botanic Garden
<urn:uuid:046e1f76-2e41-4bc5-aa6f-e2fb03da1df6>
CC-MAIN-2016-07
http://www.chicagobotanic.org/book/thomas_mawson_life_gardens_andllandscapes
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701158601.61/warc/CC-MAIN-20160205193918-00074-ip-10-236-182-209.ec2.internal.warc.gz
en
0.931875
192
2.5625
3
Punjab, is one of the most vibrant, dynamic and culturally rich north western states of India, where people especially village women use their time productively by engaging themselves with various crafts.In the land of the five rivers - Punjab, the colourful traditional embroidery work phulkari, represents a living tradition that can be traced back to hundreds of years and it continues to this day. Phulkari is brought to the Indian Subcontinent by the migrant Jat people of Central Asia in ancient times. Techniques and patterns were not documented but transmitted by word of mouth. The tradition was associated with the Sikh heritage but was also shared with Hindus & Muslims. It has its origins in the famous love story of Heer & Ranjha (a love tale) by Waris Shah. It’s a present form and popularity goes back to 15th century. The embroideries were a mere reflection of a woman’s life and every woman had her way of representing. “PHUL” means “flower “and “KARI” means work. Also known as “Gulkari” a very intricate needle work, along with bright coloured threads mainly red, orange, blue, green, etc.Phulkari derives its richness from the use of darn stitch in different directions (horizontal, vertical, and diagonal). Unlike others, embroidery on Phulkari was done from the wrong side of the khaddar with a floss silk thread called pat. Darning stitch was the most commonly used technique to make Phulkari and the quality of a piece could be measured according to size of the stitch. The smaller the stitch, the finest was the piece. In order to create an unusual design or to border the khaddar, some other stitches like the herringbone stitch, running stitch, Holbein stitch or button hole stitch were occasionally used. Inspiration was drawn from the vegetables, flowers, animals that they had. Some of them are karela bagh (bitter gourd), gobhi bagh (cauliflower), dhaniya bagh (coriander) and mirchi bagh (chilli). Some as lehriya bagh (wave) some as satrangas meaning seven-coloured and panchrangas meaning five-coloured motifs while the most common and beautiful motifs are based on the wheat and barley stalks that grow all over Punjab. Amongst animals the most common were the mor (Peacock) Designs. Recently new motifs have been developed known as Parantha (originally with eight colours), Kanchan Design, Butti Design etc. In the process of phulkari, the motif is first carved onto the block and then printed onto the fabric. The block is made in such a way that its only the outline of the motif and guides the embroider in which direction the stitch should follow. After printing the fabric is given to a lady who starts the embroidery, it uses a variety of stitch but phulkari is distinguished by the used of the darning stitch. There are many types of phulkari namely, Bagh, Thirma, Drashan Dwar, Saichini, Vari Da Bagh, Bawan Bagh, Chope, Surajmukhi, Kaundi, Panchranja, Satranga and Meenakari. Buy Phulkari Saree directly from the artisans. Artisans will get remunerated fairly with no middlemen to manipulate prices. You get access to 100% authentic handcrafted products emerging straight from the heart of India. With every purchase of Phulkari saree of yours, you empower an artisan.
<urn:uuid:95324f3b-736a-499f-9f4c-9bcbd9b6b341>
CC-MAIN-2023-23
https://amounee.com/en-us/collections/saree-phulkari
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650201.19/warc/CC-MAIN-20230604161111-20230604191111-00380.warc.gz
en
0.954971
781
3.125
3
Definitions for overheadˈoʊ vərˈhɛd; ˈoʊ vərˌhɛd This page provides all possible meanings and translations of the word overhead operating expense, operating cost, overhead, budget items(noun) the expense of maintaining property (e.g., paying property taxes and utilities and insurance); it does not include depreciation or the cost of financing or income taxes command processing overhead time, command processing overhead, command overhead, overhead(noun) (computer science) the processing time required by a device prior to the execution of a command disk overhead, overhead(noun) (computer science) the disk space required for information that is not data but is used for location and timing a transparency for use with an overhead projector (nautical) the top surface of an enclosed space on a ship a hard return hitting the tennis ball above your head located or originating from above "an overhead crossing" above your head; in the sky "planes were flying overhead" above the head; over the head "bring the legs together overhead" same as overhead expenses. A compartment on a train, bus, or airplane used for storage of luggage or accessory equipment; called also overhead compartment. (Sports) A stroke with a racket in which the ball is struck with the racket over the head, moving in a downward motion; also called overhead stroke. The expense of a business not directly assigned to goods or services provided. The items or classes of expense not directly assigned to goods or services provided. Any cost or expenditure (monetary, time, effort or otherwise) incurred in a project or activity, which does not directly contribute to the progress or outcome of the project or activity. The ceiling of any enclosed space below decks in a vessel The system of overhead wires used to power electric transport, such as streetcars, trains, or buses. data or steps of computation that is only used to facilitate the computations in the system and is not directly related to the actual program code or data being processed. Network overhead is the header data that is required to route and transport data over network, whereas fork overhead is the additional time and memory cost of creating and managing new processes within operating system. An overhead throw. An overhead projector. A sheet of transparent material with an image used with an overhead projector; an overhead transparency. above one's head;in the sky Birds flying overhead. located above, especially over the head Place your luggage in the overhead bins. of, or relating to the operating expenses of a business They tried to reduce overhead costs. kicked over one's own head In business, overhead or overhead expense refers to an ongoing expense of operating a business; it is also known as an "operating expense". Examples include rent, gas, electricity, and wages. The term overhead is usually used when grouping expenses that are necessary to the continued functioning of the business but cannot be immediately associated with the products or services being offered. Closely related accounting concepts are fixed costs and variable costs as well as indirect costs and direct costs. Overhead expenses are all costs on the income statement except for direct labour, direct materials, and direct expenses. Overhead expenses include accounting fees, advertising, depreciation, insurance, interest, legal fees, rent, repairs, supplies, taxes, telephone bills, travel expenditures, and utilities. Translations for overhead From our Multilingual Translation Dictionary - Überkopf-, oben, allgemeine Unkosten, darüber, Mehraufwand, Overhead, vergeudetes GeldGerman - gastos generalesSpanish - pään, kiinteät, päällä, yläpuolella, oleva, kustannukset, yläpuolinen, taivaallaFinnish - frais généreuxFrench - fix költség, felső, rezsiHungarian - 間接費, オーバーヘッドJapanese - наверху, накладные расходы, накладнойRussian - fiksni trošak, hladni pogonSerbo-Croatian - havada, başın üstünde, yukarıda, başdan yukarıda, genel giderler, genel giderlerle ilgili, boşa harcanan paraTurkish Get even more translations for overhead » Find a translation for the overhead definition in other languages: Select another language:
<urn:uuid:00b35672-eaca-4862-9fea-cefe2792eea8>
CC-MAIN-2015-32
http://www.definitions.net/definition/overhead
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988650.53/warc/CC-MAIN-20150728002308-00129-ip-10-236-191-2.ec2.internal.warc.gz
en
0.804229
1,023
2.921875
3
To place a link here contact the webmaster. An easy-to-understand account of how world trade works. Support this web site The richer countries (also called the developed countries or Western countries) are mainly located in North America and Europe but also include Australia and Japan. These countries have the highest standards of living (at least for some of the population) and have strong currencies. The poorer countries (also called the developing countries or third world countries) are essentially treated as sources of raw materials. These materials are sold cheaply to the richer countries where they are processed into goods that are sold around the world (including back to the poorer countries which supplied the materials). Poorer countries are often unable to process their own raw materials into goods. If they do and attempt to sell these products, the richer countries put charges (called tariffs) onto these goods to make them more expensive. Some processing of raw materials does occur in the poorer countries. But this is usually controlled by companies owned by the richer countries. The reason they locate their processing plants in poorer countries is to benefit from cheap labour, lax safety laws, and a lenient tax regime. Some examples below. |1996||UK imported $12 million worth of sporting goods from India where they are manufactured by bonded child labour.| |1996||USA leisure and sporting companies use cheap labour and lax labour laws in Haiti.| People in the poorer countries struggle to live on the megre profits made by selling their raw materials. They also pay the price in terms of pollution and bad work conditions. People in the richer countries pay far more than they should for goods. The beneficiaries of this system are the large companies owned by the richer countries and the people that run them. This essay attempts to illustrate these points including a look at the language used to obscure what is actually happening. These are some of the euphamisms that are used to obscure what is actually happening in the world of economics: There are many methods of controlling trade and these are described in turn. If poorer countries impose tariffs on goods from the West, they are demonised. They are often forced to remove their tariffs by threats of sanctions (boycotts) or worse. The world trade rules as enforced by international bodies (controlled by the richer countries) insist on poorer countries removing their tariffs. A Subsidy is money given by a population to large companies to help them stay in business or produce goods at a low cost. Subsidies are given names to obscure what they really are: Subsidies make the cost of goods artificially low. In many cases the cost becomes lower than the cost to produce the same goods in the poorer countries. Inefficient produces in the rich countries are paid to rpoduce goods that could be produced more efficiently in the poorer countries. Surplusses of these goods can then be used politically. They are often sold cheaply to the poorer countries. This has the effect of putting the local produces or growers of these goods out of business. This is called dumping. A poor country could resist dumping either by putting on a tarriff or subsidising its own industry. If they attempt this, however, they are accused by the West of having closed markets or hindering free trade. Poor countries have been forced by the West to remove their own tariffs and subsidies by threats of sanctions or suspension of aid. No Western country is ever accused of "hindering free trade" in the Western media even though they impose tariffs on goods from poorer countries and subsidise their own industries. Examples of these unfair trading practices are shown below. |1950||Colombia||Dumping subsidised food.||USA||To destroy the country's agricultural industry. The country would become dependent on growing cash crops (to be sold to the USA).| |1998||South Korea||Dumping subsidised food.||USA||To destroy the country's agricultural industry and make it dependent on imported food (from the USA).| |Threats of economic sanctions.||USA| |To force countries to import (and advertise) USA and UK tobacco products. At the same time the UK and USA are running programs to stop their own citizens smoking.| |2002||China||Computer companies using poorer countries with lax pollution laws to dispose of waste products.||USA||USA wants to rid itself of waste.| |2002||West Africa||High technology fishing.||Europe| |Access to fish and seafood.| |2002||Europe||Trade tariffs.||USA||Protect its own markets.| |Large transnational companies make huge profits from coffee.| |2003||Africa||Effects of subsidies and tariffs on several countries in Africa.||Rich Countries||Richer countries benefitting from unfair trade.| |2003||Poor Countries||Effects of subsidies and tariffs on world trade.||Rich Countries||Richer countries benefitting from unfair trade.| Sanctions are essentially a boycott of a country so that it cannot trade. Sanctions can be legally approved by the United Nations in cases where a rogue country is defying the world community. More often, sanctions are imposed unilaterally by the richer countries on poorer nations and states. These sanctions are used for political or economic coersion. If sanctions do not work, some nations use economic sabotage (actions that affect the country's produce, infrastructure or economy - sometimes very violently) or offers of aid dependent on compliance (better known as bribes) to achieve their ends. Examples can be seen from the table below. |1956||Egypt||Economic sanctions and invasion.||UK| |Egypt under Adbul Nasser had nationalised (taken ownership of) the Suez Canal. The canal had been built by Western powers in Egypt while the country was a colony.| |1959||Cuba||Sanctions against sugar.||USA||Previous pro-USA dictatorship of Fulgencio Batista had been removed by a popular uprising lead by Fidel Castro. The USA continues its boycott of Cuba (to 2006), encouraging or threatening other nations to comply. A 1993 report describes the economic effects.| |1960||Cuba||Trade embargo. Threats to other countries trading with Cuba.||USA||USA wanted a pro-West government and economic influence in Cuba.| |1962||Cuba||Undercover operations against sugar and turkeys. Industrial sabotage.||USA||USA wanted a pro-West government and economic influence in Cuba.| |1963||Indonesia||Suspension of aid.||UK||Government controlled access of UK companies to the country.| |1971||Cuba||Sabotage of pig industry.||USA||USA wanted a pro-West government and economic influence in Cuba.| |1974||Vietnam||Trade embargo.||USA||To weaken the country.| |1975||Vietnam||Suspension of aid by World Bank. $70 million assets frozen.||USA||Vietnam had defeated the USA. Vietnam is eventually forced to repay South Vietnam's debt (incurred while it was a USA puppet).| |1979||Vietnam||Suspention of aid for children by European Community. Continuation of trade boycott.||UK| |Vietnam had defeated the USA.| |1980||Cambodia||Economic aid to the Khmer Rouge.||USA||This brutal ex-government opposed the new government in Cambodia that was supported by Vietnam.| |1981||Tanzania||Campaign to force the country to change its economic policies.||USA||USA companies wanted access to raw materials and markets of the country.| |Economic sabotage.||South Africa||South Africa wanted to crush independence and democracy movements in the region. The USA and UK ignore UN approved sanctions against South Africa.| |Denial of aid to help with seed storage and bee keeping.||USA||The USA disapproved of the three governments.| |1982||Mozambique||Economic sabotage. Destruction of oil pipelines.||South Africa||South Africa wanted to crush independence and democracy movements in the region. The USA and UK ignore UN approved sanctions against South Africa and secretly trade. The USA secures a $1,1000 million IMF loan for South Africa.| |1983||Nicaragua||Economic sabotage. Destruction of agricultural collectives. Mining of ports. Blocking of previously agreed loans from the World Bank.||USA||A popular uprising had removed the previous government, a USA backed dictatorship.| |1984||Mozambique||Holding back of food aid during a famine.||USA||The USA wanted the country to sign a treaty with South Africa.| |1985||New Zealand||Withdrawal of concessions for military equipment.||USA||New Zealand had supported the declaration of the Pacific Ocean as a Nuclear Free Zone.| |1986||Nicaragua||Refusal to pay $17 million when ordered by the World Court.||USA||The USA had been found guilty in the World Court for economic sabotage.| |1988||Iran||Bombing of oil facilities; shooting down commercial airliner.||USA||USA companies had been expelled from Iran. These companies had been allowed into Iran by the previous, unelected and USA backed dictatorship.| |1989||Cambodia||Arms and training to Khmer Rouge.||USA| |Cambodia's government supported by Vietnam.| |1990||Nicaragua||Promise of aid and an end to the (USA-backed) insurgency if the presidential candidate preferred by the USA wins election. $9 million in election funds for preferred party.||USA||To gain a favourable environment for USA companies.| |1991||Iraq||Severe sanctions imposed until leadership acceptible to the West is in place.||USA| |Former favourite of the USA and UK, Saddam Hussein is out of favour after invading Kuwait. The sanctions would kill 1000 children a month for the next 12 years.| |1992||Albania||Albanians are promised aid if the Communist Party does not win the elections it had won previously.||USA||To gain a favourable environment for USA companies.| |1992||Angola||Insurgents financed and armed.||USA||Government refuses to allow access to country's oil and diamonds.| |1994||Palestinian Territories||Economic blockade.||Israel||To crush resistance to occupation.| |1994||Jordan||Promise of aid if Jordan will deny the right of Palestinians to return to lands they were expelled from by Israel.||USA||To protect the existance of Israel.| |1994||Argentina||$10 million bribe to stop the investigation into the bombing of a Jewish centre in Buenos Aires.||Iran||Unknown.| |1994||Burma||USA oil company (Unocal) pays ruling military for its security.||USA||The military forceably relocate people living in the path of a pipeline being constructed.| |1995||Mexico||Aid to suppress popular revolt by indigenous people.||USA||USA companies want land inhabited by indigenous people for cash crops and access to oil and minerals.| |1995||Iran||Oil and trade embargo imposed.||USA||Iran's government does not allow USA companies access to its oil.| |1996||Iraq||Millions of dollars to the Iraqi National Accord, a group that uses terror tactics to distabilase the government of Saddam Hussein.||USA||USA would like a compliant governmnet for guaranteed access to oil.| |1996||Cuba||Agricultural sabotage.||USA||USA wanted a pro-West government and economic influence in Cuba.| |1997||Iraq||The United Nations (under USA and UK pressure) continue sanctions that have killed over 1,200,000 people.||UK| |Control of oil.| |1998||Sudan||Missile attack on a pharmaceutical factory.||USA||"An error" according to USA.| |1998||World Heath Organisation||Threatened with withdrawal of funding if the organisation examines the effects of trade conditions on world health.||USA||The USA wants to continues its business practices regardless of their human effects.| |1999||Cuba||For the eighth year running, the United Nations fails to pass a resolution condemning the USA economic embargo.||USA||Cuba is outside the USA economic sphere.| |Aid, trade and arms sales in return for support of USA attack on Afghanistan.||USA||To install a pro-West government in Afghanistan that will facilitate access to Central Asian oil.| |2002||Palestine||Destruction of economic facilities supplied by Europe.||Israel||To break resistance to the Israeli occupation.| |2002||China||Airline company places bugs in government minister's air craft.||USA||Unknown.| |2002||Angola||Former USA backed rebel, Jonas Savimbi, killed once concessions received.||USA||The USA had used Savimbi to destabilise Angola until they received concessions on the country's oil and diamonds.| |2002||Lebanon||Threats to attack a water pipleine.||Israel||Unknown.| |Economic threats and inducements in return for supporting an invasion of Iraq.||USA||Access to miltary bases and oil once a pro-West regime is installed.| |2003||Palestine||Destruction of 62 shops and a vegetable market.||Israel||To break resistance to the Israeli occupation.| |2003||78 Countries||Threats to stop aid, trade and military support unless the USA is excempt from being prosecuted under the International Criminal Court.||USA||USA does not want international laws to apply to itself.| |2003||171 Countries||Excemption forced from a treaty to curtail tobacco advertising.||USA||USA wants to sell tobacco products to other countries as anti-smoking laws affect profits in the USA.| |2003||Europe||Attempt to force testing of potentially toxic chemicals to be abandoned.||USA||USA wants to protect its exports from from regulations.| |2004||Syria||Economic sanctions.||USA||USA disagrees with Syria's support of Palestinians.| |Palestinians had elected a government not to the West's liking.| |1995||The World Trade Organisation||Founded by 134 countries.| |1997||International Monetary Fund||Privatisation of schools.| |1998||The World Trade Organisation||Canada forced to accept a dangerous petrol additive.| |1998||The World Trade Organisation||Activities to help USA companies in India, Bangladesh, South Africa and Europe.| |1999||The World Trade Organisation||Activities to help USA banana companies in Europe.| |1999||International Monetary Fund||Effects on the environment and AIDS in Brazil.| |2001||The World Trade Organisation||Attempts to over-ride local laws of Colombia, Brunei, Pakistan, Brazil, Venezuela, UK and France.| |2001||International Monetary Fund||Countries are forced to remove trade barriers, sell national assets to foreign investors, slash social spending.| Large transnational companies set up front organisations to further their interests and discredit information about unfair trade, exploitation of workers (including children in some countries), excessive pollution and other human rights violations. An example is The Global Climate Coalition. In 1996 they campaigned to discredit global warming scientists. Unelected governments are loaned money by Western banks for projects that often do not benefit the population. Most of the money disappears into secret bank accounts. Even if the country later becomes democratic, the people of these countries still have to repay the debt even though it was taken out without their consent by an unrepresentitive government. The West has often removed governments that were not helpful to Western business interests. These were usually replaced with more compliant regimes, many with dreadful human rights records. Economically compliant regimes are normally referred to by many names that obscure their relationship with the West or their own people: Non-compliant regimes are demonised. The West also has a long history of supporting repressive regimes if its business interests are served. Examples are shown in the table below. |Year||Country||Event||Perpetrators||Reasons / Benefits| |1953||Iran||Replacement of democratic leader, Mohammed Mossadeq with dictatoirship of the Shah, Reza Pahlavi.||USA| |The new regime gave access to oil for Anglo-American companies. The USA trained the Iranian secret police to oppress dissidents.| |1953||British Guyana||Removal of democratic leader, Cheddi Jagan and preventing him from taking power after being re-elected.||UK| |UK companies gained access to sugar and bauxite (an ore of aluminium).| |1954||Guatemala||Removal of democratic leader, Juan José Arévalo by a military coup.||USA||USA companies gained access to banana plantations, cheap labour and lax labour laws. The USA financed the military which brutally crushed all dissent and union activity.| |1954||Paraguay||Removal of the Ache people from their land under a newly established dictatorship.||USA| |Access forests and mines.| |1960||Congo||Assassination of popular leader, Patrice Lumumba and the placement of brutal dictator, Moise Tshombe, in his place.||Belgium| |Western companies gained access to minerals like uranium. The exesses of the dictator were used as propaganda against black rule in Africa.| |1960||Iraq||Attempted assassination of Abdul Karim Kassem. Destabilisation of country by funding minority Kurdish population.||USA||Karim had helped found OPEC to control oil prices and production for the benefit of the producers.| |1963||Dominican Republic||Military intervention to protect newly installed military government.||USA||To protect USA business interests and set up an economic system suitable for the USA. A 1989 report describes the economic results.| |1963||Honduras||Aid to the military after they take power in a coup.||USA||USA companies gained access to raw materials and plantations.| |1963||Iraq||Overthrow and execution of Abdul Karim Kassem by the Ba'ath Party.||USA| |Karim had wanted to nationalise Iraq's oil whicxh was controlled by USA and UK companies.| |1964||Brazil||Economic and political support for new military government.||USA||The previous government had passed laws helping workers and limiting the profits that could be taken out of Brazil by trans-national companies. The new government reversed these changes. A 1989 report describes the economic results.| |1965||Dominican Republic||Military intervention to prevent previously elected Juan Bosch from taking power and keep the military in power.||USA||To protect USA business interests.| |1965||Indonesia||Political and undercover support for coup.||USA| |To gain UK and USA access to the country's resources.| |1965||Congo (Zaire)||Support for Mobutu Sese Seko who had taken power in a coup.||USA||To gain USA access to cobalt, copper, and diamonds.| |1966||Central Africa||Political and economic support for Bokassa who had come to power in a military coup.||France| |To keep Western concessions on uranium mining.| |1966||Ghana||Removal of Kwame Nkrumah from power.||USA||Nkrumah had wanted to lessen his country's economic and political dependece on the West.| |1969||West Papua||Annexation by Indonesia.||Indonesia| |The West wanted control by a friendly government of the copper mining industry which was worth $1,400 million and partly owned by a UK company.| |1970||Bolivia||Military coup to remove Juan Jose Torres.||USA||Torres had nationalised oil and the tin mines.| |1973||Chile||Military coup to remove Salvador Allende.||USA||USA did not like socialist economic policies of the elected government. The USA had attempted to sabotage Allende's election campaign in 1964 (successfully) and 1970 (unsuccessfully). A 1989 report describes the economic results.| |1975||East Timor||Invasion by Indonesia.||Australia| |The West wanted access to oil in the region and preferred a friendly dictator ruling the area rather than an independent state.| |1976||Jamaica||Attempted assassination of Michael Manley.||USA||Manley had established ties with Cuba and wanted more control of the island's aluminium.| |1980||Liberia||Economic and political support for Samuel Doe who took power in a military coup.||USA||USA companies gain access to rubber.| |1983||Grenada||Removal of Maurice Bishop and replacing him with a pro-West government.||USA||The island became a tax and off-shore banking haven.| |1983||Guatemala||Loans by the World Bank to build the Chixoy Dam even though the government (which is unelected) is forceably removing and killing indigenous people who live on the site of the dam.||World Bank||This increases the country's debt.| |1988||Iraq||Secretly selling machine parts and propellant to oppressive dictatorship that had just used poison gas on its Kurdish population.||UK||Iraq was fighting Iran with Western backing. The USA also increased its trade with the regime.| |1988||Burma||Oil companies involved with the military government to remove opposition to oil exploration and to procure cheap labour.||USA| |For access to the country's oil.| |1988||Colombia||Subsidised arms sales to a brutal regime that crushes opponents and human rights activists.||USA||For access to the country's oil and coffee.| |1989||El Salvador||$1 million per day in aid to a military regime.||USA||For access to the country's coffee.| |1989||China||$300 million business contracts approved with regime that had massacred thousands of students at Tienanmen Sqaure.||USA||For access to the country's huge markets.| |1993||Nigeria||Support for military coup.||UK||Regime promises to honour oil concessions to UK companies.| |1994||Haiti||Military action to keep elected leader, Jean-Bertrand Aristide, from taking power.||USA||To gain access to agricultural land and a dispossessed population that will provide cheap labour for USA companies.| |1994||Nigeria||Providing wealth to a military regime by processing its oil.||UK| |Regime facilitates extraction of oil by oppressing the inhabitants of the Ogoni region.| |1995||Afghanistan||Offering the authoritarian Taliban 15%. on all oil and gas transported through a proposed pipeleine from Central Asia to Pakistan.||USA||Since the collapse of the Soviet Union, the USA has wanted access to the oil and gas reserves in Central Asia.| |1996||Turkey||Supply of weapons used in oppression of the Kurdish population.||NATO||Turkey has a pro-West government and houses USA military bases. Arms providers are USA, Germany, Italy, France, Netherlands, UK, Spain, Canada and Belgium| |1996||Burma||Support for tourist industry.||UK||Military government uses slave labour to build tourist infrastructure for luxury tours run by UK companies.| |1996||East Timor||Trade treaty with Indonesia, the occupying power that had killed 200,000 people.||Australia||To exploit oil and fishing. Western countries continue to arm Indonesia during this period.| |1997||Indonesia||Trading and arming a brutal dictatorship. Companies collude with military to surpress dissent.||USA| |To build a paper mill and access to oil and minerals.| |Trading with brutal dictatorship. Companies collude with military to surpress dissent.||UK||Access to oil, minerals.| |1998||Afghanistan||Financing and supporting theocratic government.||USA| |The West hopes to get an oil pipeline across the country to link Central Asia with the Persian Gulf.| |1998||Turkey||Military aid to a country that oppresses its Kurdish population.||USA||The USA has military bases in (Kurdish) eastern Turkey.| |1998||Burma||Trading with a brutal military regime that uses slave labour.||France| |For the region's oil and minerals.| |1999||East Timor||Military aid to Indonesia while it continues oppressing East Timor.||UK||UK has oil interests.| |1999||Guatemala||Military aid to brutal regime that keeps workers in virtual slavery.||USA||USA owned coffee plantations.| |2000||Kyrgyzstan||Finance to a country that oppresses oponents.||USA||To gain political influence in Central Asia and its oil.| |2000||Turkey||Selling arms which are used to oppress the Kurdish population.||UK||To maintain arms industry.| |2001||Afghanistan||Funding opposing warlords, each with dreadful human rights records.||Pakistan| |To gain influence in a strategic region.| |2001||Colombia||Funding the military government which oppresses its own people.||USA||Protecting USA oil interests.| |2001||Israel / Palestine||$1,800 million annually in aid to a country that has been occupying Palestinian land since 1967.||USA||Support for an ally in the Middle East.| |2001||Sudan||Oil companies helping military to depopulate areas wanted for oil exploration.||Canada| |Access to the country's oil.| |Suppying arms to regimes with bad human rights records.||UK||Support for arms industry.| |2001||Chad||Finance for a pipeline to a government that had won fraudulent elections.||USA| |Access to the country's oil.| |Oil and mining activities that adversly affect local people and the environment.||Canada| |Access to the countries' oil and minerals.| |2002||Botswana||Diamond mining on Bushman land after they were encoraged to leave by the government cutting off their water supply.||South Africa| |Access to the country's diamonds.| |Companies trading with countries that violate human rights.||USA| |Access to markets and raw materials.| |2002||Africa||Effects of unfair trade on Africa.||Rich Countries||Access to markets and raw materials.| |Banks finance dam that will displace people and affect water supplies.||UK| |Banks finance various projects that will adversly affect local people.||UK||Banking.| |2002||Burma||Tobacco factory (partly owned by ruling Burmese military) pays less than poverty wages.||UK| |2002||Sudan||Depopulation in areas being explored for oil.||UK| |Selling arms to undemocratic, authoritarian or oppressive regimes.||UK||Arms trade.| |2003||Algeria||Selling arms and trading with an undemocratic oppressive regime.||USA| |2003||Congo||Selling arms and financing countries with troops in the Congo war.||UK||Trade and arms sales to Rwanda, Uganda, Angola, Namibia and Burundi.| |2003||Indonesia||Selling arms to a country that is brutally repressing the Aceh region.||UK||The arms trade.| |2004||Haiti||Replacement of democratically elected leader (Jean-Bertrand Aristide) who would not privatise all the country's resources.||USA| |Mainly plantations and cheap labour.| USA, UK and French oil companies have long traded with unelected or authoritarian governments, like Saudi Arabia (an absolute monarchy), Iran (under the Shah between 1953 and 1979), Iraq (before 1989). Oil is sold at a cheap rate to run the economies of the richer countries. When the oil producing countries attempted to set up a cartel to get a better price, this was opposed by the Western countries, often with violence. Western Banks invested heavilly in apartheid South Africa (before 1991) and loaned money to military dictatorships in South America. These loans are expected to be repaid by the populations of these countries who had no say in the taking out of the loans in the first place. This is rarely true when governments are involved. Most Western aid comes from "government money". This is really money from the people of the Western country involved. This money is used to allow a poorer country to buy goods or a service that are provided by a company from a Western country. Often it is a condition of the aid that the doner country can nominate the company that provides the goods or service. The majority of the aid money often goes from a government bank account to the company's bank account without going anywhere the country receiving the aid. There will be some benefit (called a commission or a consultancy fee) to the company officials who have brokered the deal which may include politicians from the two countries. The people of the Western country pay the monetary cost of the "aid". The majority of the people of the poorer country get very little. These types of government aid projects are for dams, military goods, airports and other high profile items. Much aid has a political purpose as it is to countries with a strategic value rather than the poorest countries that might need aid. Many poorer countries have amassed an enormous debt which they are struggling to pay. Many are even struggling to pay the interest on the debt. Social services and infrastructure are sacrificed to service the debt. In a large number of cases, it is unelected governments that were loaned money by Western banks. Often the money is used for projects that fail to benefit the population. Much of the money disappears into secret bank accounts, enriching members of the government and their families. Even if the country later becomes democratic, the people of these countries still have to repay the debt even though it was taken out without their consent by an unrepresentitive government. |1989||Poor Countries||11 million children die every year from easily preventable deseases.| |1994||Poor Countries||500,000 children die every year due to debt repayments.| |1994||Malaysia||A UK company (Balfour Beatty) to build a dam at Pergau in return for Malaysia buying arms worth $1,000 million from UK companies.| |All countries that recieve a large amount of UK aid even though they are not the poorest in their regions. They are also important purchasers of UK arms.| © 2004 KryssTal Covers fair trade, the WTO, IMF and other trade issues. An interesting article about wars and resources. Global (USA) food policies cause starvation.
<urn:uuid:c03b487b-714e-45e2-b10e-29d484dfb8e6>
CC-MAIN-2015-14
http://www.krysstal.com/democracy_trade.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131297628.55/warc/CC-MAIN-20150323172137-00210-ip-10-168-14-71.ec2.internal.warc.gz
en
0.912154
6,510
3.546875
4
Fragaki, A. and Andersen, A. N. and Toke, D. (2008) 'Exploration of economical sizing of gas engine and thermal store for combined heat and power plants in the UK.', Energy., 33 (11). pp. 1659-1670. There has been discussion about the extent to which combined heat and power (CHP) plants with thermal stores are suitable for sustainable energy production. At the moment, in the UK the development of this type of plant is limited. This paper analyses the economics and optimum size of CHP operating with gas engines and thermal stores in British market conditions. This is achieved using energyPRO software. It is shown that, due to the big differences in electricity prices between day and night, the use of thermal stores could be profitable in the UK. The economical size of CHP plant for a district or community heating load of 20,000 MWh per year is found to be a 3 MWe gas engine with a 7.8 MWh thermal store. In this case the analysis reveals that the use of a thermal store more than doubles the return on investments (as measured in net present value) compared with the same size of a plant without a thermal store. It is concluded that thermal stores can improve the overall economics of CHP plants in present British circumstances. |Keywords:||CHP, Sustainable energy, Thermal store.| |Full text:||Full text not available from this repository.| |Publisher Web site:||http://dx.doi.org/10.1016/j.energy.2008.05.011| |Record Created:||17 Oct 2011 15:50| |Last Modified:||18 Apr 2016 11:37| |Social bookmarking:||Export: EndNote, Zotero | BibTex| |Look up in GoogleScholar | Find in a UK Library|
<urn:uuid:a445a82f-4796-492d-a69f-4f6a238c288b>
CC-MAIN-2017-22
http://dro.dur.ac.uk/8850/
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607786.59/warc/CC-MAIN-20170524035700-20170524055700-00010.warc.gz
en
0.860157
387
2.609375
3
'Ireland Illustrated' Project to Create Database of Travel Images from the 16th- Monday, 24 August 2009 The creation of an extensive database of illustrated travel accounts about Ireland, from the 16th-19th century, is underway at NUI Galway. The 'Ireland Illustrated' project will provide an online collection of images showing how Ireland was portrayed in centuries gone by to travellers around the world. NUI Galway's Professor Jane Conroy is one of the team heading up the project: "Travel accounts played a major role in shaping mental images in early modern and modern Europe. Particularly when images came to support the text, the suggested representation might become even truer than reality. These ancient texts and the images they contain preserved an important part of history that needs to be discovered. Bringing this part of our heritage together through the Ireland Illustrated project, we will have a resource of interest and value to all". Large numbers of images and other documents will be scanned and catalogued, including those housed in libraries and museums around the country. Researchers at NUI Galway are asking anyone with books containing images about travelling to Ireland from 1500-1900 to contact them so that copies might be included. The searchable database of travel images will be available for academic use, and for the wider public. Due for completion in 2012, the Ireland Illustrated project will give international audiences access to rare books and give Irish people a way to connect with their visual heritage. Through an interactive searchable map, visitors will also be able to search for images of their own town or county. Professor Conroy, who is also Humanities Secretary with the Royal Irish Academy, adds: "In a way, travel accounts were the Lonely Planet or Rough Guide of their day, often containing drawings or sketches of the scenery and people. Quite scarce in the 1600s, accounts from that century portrayed a wild land, with quite an uncivilised population. From the late 1700s on, manor houses, estates and towns attracted more attention and a different image of Ireland began to filter through". Experts from the world of travel literature, digital humanities and libraries from across Europe gathered at NUI Galway recently to discuss the project. A similar database has been created by the University of Paris-Sorbonne containing travel accounts on France from the same period. The project Texts, Transmission and Cultural Exchange is taking place at NUI Galway Moore Institute for Humanities and is part of an interdisciplinary PhD research programme involving NUI Galway, TCD and UCC, and is funded by PRTLI4 and the Andrew Mellon Foundation.
<urn:uuid:73182fc4-77ca-40d4-a09b-ae7d6e041097>
CC-MAIN-2016-18
https://www.nuigalway.ie/about-us/news-and-events/news-archive/2009/august2009/ireland-illustrated-project-to-create-database-of-travel-images-from-the-16th--1.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860113553.63/warc/CC-MAIN-20160428161513-00133-ip-10-239-7-51.ec2.internal.warc.gz
en
0.944089
523
2.859375
3
In the United States, an innovative vaccine has been developed that can protect against several coronaviruses at once, Medical Xpress reports. Amesh Adala, Senior Research Fellow at Johns Hopkins Center for Health Security in Baltimore, recounts the study’s findings: “Other coronaviruses cause about 25% of common colds and also pose a serious threat of emerging infectious diseases. The ability to eliminate coronaviruses as a biological threat would be a great advantage, and a generic vaccine would be the best tool for that. “ The cost of an experimental dose of a unique drug does not exceed $ 1, which is incomparable, for example, with the cost of Pfizer and Moderna vaccines, which are used in the United States. At the same time, its effectiveness has already shown itself. In animal studies, the vaccine coped well with two types of coronaviruses – SARS-CoV-2 and the one that causes epidemic diarrhea in pigs. She did not protect from the disease, but activated the immune system when infected and helped to avoid severe symptoms. The principle of action of the new vaccine is based on its following part of the SARS-CoV-2 spike protein, a “viral fusion peptide” that is essentially universal among coronaviruses.
<urn:uuid:7dbbfe9b-9f05-452d-afb6-ba04434c4b82>
CC-MAIN-2022-27
https://en.rua.gr/2021/04/27/usa-1-universal-vaccine/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103556871.29/warc/CC-MAIN-20220628142305-20220628172305-00148.warc.gz
en
0.958233
274
3.71875
4
Energy experts now confidently predict that by 2040, solar and wind will drive no less than 60 percent of global power; natural gas will replace the lion’s share of the burning of coal, and the market for electric cars will soar. Nassim Taleb, on the other hand, questions the ability of experts to predict just about anything. He asserts instead, in The Black Swan: The Impact of the Highly Improbable, that the future is consistently shaped by unexpected, high-impact outlier events, which we do our best to rationalize after the fact. Who could have predicted the Black Swan disruptive transformative impact of Henry Ford’s Model T, or Jobs and Wozniak’s Apple? As a faithful Black Swan convert, I doubt our ability to predict our planet’s energy future in 2040. We can, however, make educated guesses about the forces likely to give shape to the energy Black Swans in our immediate future. Here is one of them. By 2040, solar and wind will drive no less than 60 percent of global power. Tweet This Quote The actions of 2.5 billion or so people in the world who live on less than $2/day will shape Black Swan disruptions in the next 20 years more powerfully than most of us can imagine. They are already responsible for just about all of the planet’s population growth in the next two decades, which will profoundly affect environmental balance. That’s why the current omission of this population’s actions in predictions of our energy future is astounding. These shapers of our energy future are disproportionately distributed in poor rural areas in close proximity to strands of high energy invasive biomass, which can most easily be converted into low carbon emitting alternatives to coal. This carbon substitute will create millions of new jobs and massive new markets for village-produced energy products, helping these communities move out of poverty in the process. A perfect example of this kind of prevalent biomass is mesquite, found predominately in arid lands. Nature takes 300 million years to produce coal. But through a process called torrefaction, which is exactly the same as roasting coffee, a group of volunteer engineers at Ball Aerospace have reduced the time to one hour, producing a blackened biomass – from mesquite and others – that looks like coal, burns like coal and best of all mimics nature’s carbon cycle instead of increasing carbon emissions. The future is consistently shaped by unexpected, high-impact outlier events. Tweet This Quote Using selected agricultural waste streams and invasive species that grow in arid wastelands as inputs, it is now possible for us to design 100,000 village kilns, each capable of producing seven tons a day of a low carbon emitting substitute for coal. The shortening of the collection radius from 150 kilometers to 4 kilometers, taking advantage of low-cost labor in rural villages, and adding carbon credits to the mix is now likely to produce a new breed of multinational corporations. These new MNCs will partner with village enterprises and will be capable of replacing up to 20 percent of global carbon emissions. Best of all, if it works, it will become a profitable international corporation, supported by investment capital instead of the begging bowl. This is my dream for the future. Whether it will turn out to be a dream or a nightmare remains to be seen. This article was co-authored by Krish Desai.
<urn:uuid:a8dd3b6a-983d-427c-89c0-63fa1e2510d2>
CC-MAIN-2019-18
https://unreasonable.is/black-swans-future-energy/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528433.41/warc/CC-MAIN-20190420000959-20190420022959-00548.warc.gz
en
0.926398
701
2.671875
3
In accordance with India’s ‘Act East’ policy, relations with Indonesia, Malaysia, Thailand, Singapore, Vietnam, and the Philippines have developed and strengthened significantly. The Andaman & Nicobar Islands perched at the junction of Bay of Bengal and the Andaman Sea has remained strategically important for the times immemorial for the empires, discoverers, occupying forces and the governments who ruled the Islands. From the maritime perspective the first outpost of the Indian Navy was established during mid-1960s. A small naval establishment under the charge of Naval Officer-in-Charge was set up as a reporting station. A few patrol crafts and seaward defence boats built by Garden Reach Shipyard were based. Complete supplies, including the fresh and dry rations, milk, etc. for the local population were transported from the mainland through Ferries doing rounds from Calcutta and Madras and managed by the A&N Administration. Flat bottom Landing Ship Tanks were running naval logistical trips from Visakhapatnam. Towards the end 1960s Indian Navy began to gradually increase security measures, infrastructure, facilities, etc. Two Naval Garrisons of Company strength were established; one at Port Blair and the other at Kamorta Island in Car Nicobar. Naval personnel manned these Garrisons and wore Army uniform with naval ranks and were deployed to set up Camps on surveillance duties to various Islands. Slowly the Naval Garrisons were disbanded, and Army presence began to build gradually. The fledgling Eastern Naval Command began to grow and the Eastern Fleet slowly built up its force levels of Amphibious Ships, Patrol Vessels. Under the overall directions of the Chiefs of Staff Committee, Tri-Services Amphibious Exercises (AMPHEX) began to be held at regular intervals and the Indian Navy assigned the task to co-ordinate. For several years since its inception AMPHEX were viewed with strong suspicion by the South East Asian countries like Myanmar, Indonesia, Thailand, even Singapore. These countries saw the exercises as aggressive and expansionist design of their big neighbour, India. Mutual trust and relations started to grow when India instituted numerous confidence building measures under its ‘Look East’ policy first propounded by former Prime Minister P.V. Narsimha Rao. Since then suspicions have been replaced by regular maritime exchange programmes, visits, structured bi-lateral and multi-lateral exercises to mutual advantage. Bi-lateral exercises between India and Singapore with nomenclature of SIMBEX was instituted. Soon other South East Asian maritime forces came forward to form a multi-lateral exercises construct named MILAN to be held at Port Blair. Indian Ocean Naval Symposium Indian Ocean Naval Symposium (IONS) a unique initiative launched by the Indian Navy in 2008 has been a grand success and is continually growing in eminence as a formidable organisation with 23 ‘Member’ nations and nine ‘Observer’ countries. IONS continue its active engagements within the charter. Bangladesh is its current ‘Chair’. It is a matter of great significance that the regular Bilateral Exercise Co-ordinated Patrol (CORPAT) between India and Bangladesh was recently conducted as the first ever operational exercise designated as International Multilateral Maritime Search and Rescue Exercise (IMMSAREX) under IONS Charter. IMMSAREX was inaugurated by the Prime Minister of Bangladesh on November 27, 2017 in Cox Bazar. Indian Naval Ships Ranvir, Sahyadri, Gharial and Sukanya along with one Maritime Patrol Aircraft P-8I participated. In addition, an ‘Extraordinary Conclave of Chiefs’ (ECoC) meeting was held on November 28, 2017 and was attended by the Chiefs of the Navy. The ECoC deliberated upon the activities undertaken by IONS and reviewed progress made by three IONS Working Groups (IWG) namely ‘HADR’, ‘Maritime Security’ and ‘Information Exchange and Interoperability’ Security of the Island Territories While the security of the Islands both on the eastern and southern seaboards has always remained the focus of attention and the Indian Navy has assigned due priority to the infrastructure development, creation of support facilities, force levels and manpower development within its allocated budget and resources, it was the Post Kargil Review of the National Security System by the Group of Ministers which provided due impetus to the security of the India’s Islands territories. Consequently, the Tri-Services A&N Command (ANC), which was set up in October 2001 as the country’s only Theatre Command, with all manpower and assets of the Army, Navy and IAF placed under one operational commander. With Chinese nuclear and conventional submarines regularly popping up in the Indian Ocean region (IOR), the Navy has now commenced regular reconnaissance missions by Poseidon-8I Longrange Maritime Reconnaissance and Anti-Submarine Warfare Patrol aircraft as well as unmanned aerial vehicles in the islands. The IAF, too, occasionally deploys its frontline fighters like Su-30MKIs on surveillance missions in the Bay of Bengal. These surveillance measures are in addition to AMPHEX. Defence of Andaman and Nicobar Islands Exercise (DANX) 2017 was conducted under the aegis of ANC. The five-day exercise, which began on November 20, 2017, and concluded on November 24, 2017, comprised combat forces of fighters, special forces, naval ships and heavy-lift transport aircraft. From the planning stage onwards, a crucial and vehemently stressed tri-services approach involving joint planning and integrated operations was adopted for synergistic application of forces. The main objective of DANX was to practice and validate procedures and concepts of all the Command forces to defend the strategically located A&N Islands. Combatant units; fighters, special forces, infantry combat vehicles, regular troops, naval ships and heavy-lift transport aircraft participated in DANX-2017 to fine-tune the operational concepts and doctrines to evolve synergy among the Army, Navy and Air Force. The highlights of the exercise were fighter operations, night Parajumps at sea, slithering of troops from helicopters and amphibious landings of troops by ships. On conclusion of DANX, Vice Admiral Bimal Verma, Commander-in-Chief ANC complimented all four components for their synergistic planning and precise execution of the Command plans and urged all to focus on the take-away from the exercise for being fully prepared for any eventuality in the future. Recently concluded DANX-2017 is being viewed as a potent counter to the increased Chinese footprints in IOR. China has participated actively in anti-piracy operations in IOR on the premise that the Indian Ocean is not India’s Ocean. DANX is emerging as a potent forum to call bluff to the often-repeated rhetoric. With requisite force-levels and infrastructure, it will emerge as a powerful pivot to counter China’s moves in IOR to wield greater influence, as well as to ensure security of sea lanes of communications converging towards the Malacca Strait. The official Chinese media has alleged that Indian military exercises in the Indian Ocean targeting China were irresponsible and a violation of International Law. The exercise could be used to design a response to the regular appearance of ‘Chinese nuclear and conventional submarines’ in the Indian Ocean, the report said. Li Jie, a Beijing-based naval expert, told Global Times the military drill targeting China’s Right of passage in international waters was irresponsible and narrow-minded, as China has never threatened India’s security. “Chinese vessels including submarines entering the Indian Ocean are completely reasonable and lawful. China’s future actions in the Indian Ocean will not be affected by India,” Zhao Gancheng, director of South Asia Studies at the Shanghai Institute for International Studies, told the Global Times on November 26, 2017. India for the past several years has worked hard to build mutual trust through several confidence building measures to build and strengthen several bilateral and multi-lateral constructs within the ASEAN region for improved defence ties. In accordance with India’s ‘Act East’ policy, relations with Indonesia, Malaysia, Thailand, Singapore, Vietnam, and even the Philippines have developed and strengthened significantly. In addition to exchange programmes, port calls, visits, exercises, India also extends specialised submarine training to Indonesia and Vietnam to whom BrahMos supersonic cruise missiles and Akash area defence missile systems have been offered. It has been reported that on Wednesday, November 29, 2017, India and Singapore have signed a naval pact to significantly crank up their maritime security co-operation with access to each other’s bases, while reiterating the need for all to respect freedom of navigation and trade in international waters in the backdrop of China’s aggressive and expansionist behaviour in the Asia Pacific region. While signing the Pact, Dr Ng Eng Hen, Defence Minister of Singapore said, “We want to see more participation, co-operation and activity in both the Strait of Malacca and the Andaman Sea,” adding that it was crucial to join forces against terrorism, chemical, biological and radiological threat. His Indian counterpart, Nirmala Sitharaman said the two countries had decided to expand overall defence ties and were “strongly committed” to boosting co-operation in tackling transnational security threats, especially terrorism.
<urn:uuid:fd979c3d-6500-414f-9501-42508e0eb2d0>
CC-MAIN-2023-40
https://www.spsmai.com/military/?id=4648&q=Look-East-to-Act-East
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510528.86/warc/CC-MAIN-20230929190403-20230929220403-00387.warc.gz
en
0.963142
1,944
2.8125
3
Cancel July 4. We can't celebrate Independence Day when women's liberty has been lost On Friday, the United States Supreme Court overturned Roe v. Wade, the landmark 1973 decision where the court found that the Constitution of the United States protected a woman’s right to have an abortion. The court’s 1973 decision was based on the premise that the due process clause of the 14th Amendment to the United States Constitution provided a fundamental "right to privacy," which protects a pregnant woman's right to an abortion. The impact of the court’s ruling in 1973 was wide-ranging and extraordinary. For the first time in our nation’s history, women could make their own decision about their reproductive healthcare choices. Legalizing abortion increased the labor supply of women in the workforce, and women could pursue a career outside of the home. A family could save and plan when to have children. The decision nearly 50 years ago was based on the legal arguments, as well as the medical and scientific consensus that the embryonic stage begins with fertilization. Lawmakers falsely claim that a fetus is viable (can survive and thrive outside the uterus) when a heartbeat is detected. Scientists and doctors will tell you that isn’t true, and the Supreme Court believed in science in the 1970s. The Supreme Court’s decision in 2022 rejects science and reason. The decision is radical and unprecedented, and they ignored the long-established principle of stare decisis, which means “to stand by things decided” in Latin. When a court faces a legal argument, if a previous court has ruled on the same issue before, it will align its decision with the previous court's decision. They stick with prior legal precedents with very few exceptions. The U.S. Supreme Court ruling on Friday overturning Roe v. Wade ignored stare decisis and reversed five decades of precedent. They abandoned equality, and their decision abridges all women of their freedom, liberty, and independence. Eliminating a Constitutional right is short-sighted and contrary to the principles of equality which our nation was founded upon. As a man, I’m horrified that a longstanding institution in the United States would overturn Roe v. Wade, and consign women to being second-class citizens. In just a week we have a national federal holiday that celebrates our independence and the birth of our nation. The July 4th holiday is often celebrated with barbecues, family gatherings, parades, and fireworks displays. For the first time in my life, I can’t celebrate our country or its ideals. Demonizing immigrants and people of color. Denigrating women. Slandering drag queens while defaming LGBTQI+ people. Blocking gun control and allowing the slaughter of innocent children. These actions don’t reflect our American values. These values earn our scorn because they represent the politics of hate. I am calling on our leaders on both sides to cancel all taxpayer-funded July 4th fireworks and celebrations. We cannot celebrate Independence Day when the freedom, liberty, and independence, of women, have been lost and remains restricted. I cannot celebrate Independence Day until the independence of women is fully restored. Can you? Roy Steele lives in Palm Springs. Email him at email@example.com.
<urn:uuid:6d9f184e-5699-4a19-b5ed-90398e1fc693>
CC-MAIN-2023-23
https://www.desertsun.com/story/opinion/contributors/valley-voice/2022/07/01/abortion-we-cant-celebrate-july-4-when-womens-liberty-has-been-lost/7751495001/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644817.32/warc/CC-MAIN-20230529074001-20230529104001-00481.warc.gz
en
0.952149
681
2.5625
3
have courage. take heart. bear witness. Posttraumatic stress disorder (PTSD) is not only a combat injury. It can follow in the wake of any harrowing experience, arising in response to intense fear and helplessness in the face of extreme threat to yourself or someone close to you. Children can develop PTSD if, for example, they grow up in a family where violence is common and where there is a continuing threat of harm. If children then experience further life-threatening events as adults, it is possible for symptoms of PTSD to last a lifetime. Such was the case with Cindy Towne's brothers, Michael and Tim, whom she talks about here with her husband, Fred Towne. The three siblings shared a childhood darkened by their father's threats and violence and, likely as a result, Michael and Tim eventually sought relief in drugs and alcohol as young teenagers. Their later adolescence coincided with changes in US foreign policy when, in the mid-1960s, President Lyndon Johnson escalated the undeclared war in Viet Nam, prompting a rapid increase in the number of troops. Draft calls tripled to thirty thousand a month. Recently out of high school, and without any likelihood of entering college and obtaining a deferment, Michael was one of those called up for combat. Tim's induction took a more circuitous route. Although the pool of draft-age men had suddenly expanded as the earliest group of baby boomers came of age around that same time, the US Selective Service System (SSS) still had to scramble for recruits, having previously established a substantial number of deferments and exemptions from military service. Pressed to achieve desired quotas, the SSS changed its rules and considered some individuals who earlier would have been rejected—such as those convicted of minor crimes. Apparently, SSS Director General Lewis B. Hershey believed that military service had rehabilitative powers and would set wayward young men on a straighter, narrower path. Many judges concurred and offered some offenders the choice between a jail sentence or induction into the Army. Appeals courts eventually ruled against this practice, but until then, thousands of young men, including Tim, had "chosen" military service over incarceration. Both brothers served in the Army Infantry—the group most exposed to ground combat and which suffered the highest casualty rates among those serving in the US military. Neither young man had entered the war "whole." As experts now know, certain individuals are at higher risk of developing PTSD in response to fearsome events. Factors include age (younger individuals are at greater risk), previous exposure to physical assault, prior incidence of trauma or chronic stress, family instability, lower levels of education and income, and a history of behavioral or psychological problems, especially substance abuse. As Cindy relates, Michael and Tim's personal and family histories included all these elements, and they, like thousands of other young veterans of that war, suffered lifelong struggles with PTSD. In 2003, researchers analyzed data from the National Vietnam Veterans' Readjustment Study (1988) and the Matsunaga Vietnam Veterans Project (1997). They found that "a large majority of Vietnam veterans struggled with chronic PTSD symptoms, with four out of five reporting recent symptoms when interviewed 20-25 years after [their service in] Vietnam." Relatively few of these veterans had sought psychological help. And when Cindy mentions that her father was also "pretty damaged by war," she reveals an even earlier source of the family's troubles. (He had fought in the Battle of the Bulge, World War II's largest encounter for US troops and one in which nearly 80,000 Americans were killed, maimed, or taken prisoner.) As this account makes clear, war's violence can wreak havoc in the lives of veterans and their families long after a soldier's return, and continue to do so as the sorrows of one generation are inflicted on the next. Recorded in Corvallis, Oregon, December 2008. "You know, I think I came from the same place that my brothers did. I lived in the same family. But one of the differences that I see is that I wasn't sent off to another war zone when I was eighteen, like they were. And my life has been so much better, or peaceful and serene because of that. And I realize that we all grow up and we do change, but I think war just changes us in such a different way." * * * * * "When I started talking about my brothers, I was a little bit hesitant to talk about their experiences, because they were so negative, and I wouldn't want people to believe that I love them any less. I had never thought about that before, so just speaking made me understand that a little bit better that they made the best decision that they could have made at the time. And I don't at all judge them for that, and never will."
<urn:uuid:20fbbbd4-5713-43e6-a9b9-94ff2129a4e7>
CC-MAIN-2017-26
http://soldiersandcivilians.org/interviews/cindy_towne/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320263.78/warc/CC-MAIN-20170624133941-20170624153941-00061.warc.gz
en
0.976538
997
2.921875
3
Some adult nematodes live within the intestinal lumen. The disease is spread to humans: PASSIVELY by ingesting infective eggs, as occurs with Ascaris lumbricoides (’roundworm’), Trichuris trichiura (whipworm) and Enterobius vermicularis (threadworm) ACTIVELY by percutaneous spread of filariform larvae that penetrate the skin (hookworm and Strongyloides) Ascaris deviates from the simplified life-cycle shown in that it invades the duodenum and enters the venous system, via which it reaches the lungs. The worm is eventually expectorated and swallowed, entering the intestine where it completes its maturation. Strongyloides is the only nematode that is able to complete its life-cycle in humans; its rhabditiform larvae, which hatch in the intestine, are able to reinfect the host by penetrating the intestinal wall and entering the venous system. Strongyloides stercoralis is found worldwide but is particularly common in warm, wet regions such as parts of Central America and South-East Asia. Infection can persist for decades and is still being discovered in war veterans, particularly prisoners of war who worked on the Burma- Thailand railway and veterans from Vietnam. Adult worms inhabit the crypts of the small intestine, causing little damage, but in heavy infection worms are embedded in the mucosa, and cause an inflammatory response with mucosal injury. The worms are passed in the stools and autoinfection is common. After penetration of the skin by the filariform larvae, a local reaction occurs characterized by itching, erythema, oedema and urticaria. This subsides within 2 days. A week later, migration of the adolescent worms causes irritation of the upper airways, producing cough and occasionallymore severe respiratory symptoms. After about 3 weeks, intestinal colonization occurs, often leading to abdominal discomfort, intermittent diarrhoea and constipation. These symptoms can be mild and may pass unnoticed. However, in some individuals, heavy infection may lead to persistent diarrhoea, nausea, anorexia and evidence of intestinal malabsorption, notably steatorrhoea. Hypoalbuminaemia and weight loss also occur. Disseminated strongyloidiasis is a very serious and often fatal condition and has been described in patients receiving cortico-steroid or other immunosuppressive therapy or in those who are irnmunocompromised for other reasons. Motile rhabditiform larvae can be detected in fresh stool or in duodenal aspirate. Eosinophilia is common. In heavy infection, anaemia and biochemical evidence of malabsorption are found. Treatment consists of thiabendazole 1.5 g twice daily for 2 days. Therapy should be given for at least 5 days (often longer) in the hyperinfected patient with disseminated disease. Albendazole 400 mg kg” for 3 days is also effective. Repeated therapy may be required. The mortality is high in the hyperinfected group owing to an accompanying Gram-negative septicaemia and treatment should include i.v. broad-spectrum antibiotics. Hookworm infection Hookworm is seen worldwide and affects approximately 25% of the world’s population. Ancylostoma duodenale is found in Europe, the Middle East and North Africa, whereas Necator american us is found in the Western Hemisphere, sub-Saharan Africa, South-East Asia and the Far East. Adult worms inhabit the small intestine and attach firmly to the intestinal mucosa by the teeth or cutting plates in their large buccal capsule. Blood loss is approximately 0.2 ml daily in A. duodenale infection (five- to tenfold less with N. americanus); in heavy infection it has been estimated that up to 100 ml of blood is lost daily. Local irritation at the site of larval entry in the skin is known as ‘ground itch’, but this rapidly disappears to be followed some 2 weeks later by mild and transitory pulmonary symptoms. Most patients are asymptomatic once the larvae have reached the small intestine. Some patients experience ulcer-like symptoms and those with heavy chronic infection eventually develop symptoms and signs of anaemia. Hookworm infection is the commonest cause of iron deficiency anaemia worldwide. A. braziliensis (dog hookworm) causes characteristic patterns of subcutaneous infection in children. Hookworm ova appear in the stool, the number of eggs present giving a guide to the severity of the infection. Early in the infection, eosinophilia may be found in the peripheral blood. This is followed later by the appearance of iron deficiency anaemia. Mebendazole 100 mg twice daily for 3 days is effective in ooth types of hookworm, although the infection may not be cleared with a single course of treatment. Ascaris lumbricoides (’roundworm’) A lumbricoides is a large worm that is found orldwide but is particularly common in poor rural communities where there is heavy faecal contamination of the immediate environment. Infection may be entirely asymptomatic, although heavy infections are associated with nausea, vomiting, abdominal discomfort and anorexia. Worms may obstruct the small intestine, the commonest site being at the ileocaecal valve. Worms occasionally invade the appendix, causing acute appendicitis, or the bile duct, resulting in biliary obstruction and suppurative cholangitis. Larvae in the lung may produce pulmonary eosinophila. The nutritional impact of Ascaris infection in children is controversial, although it is very likely that heavy infection in malnourished children compounds the situation, largely by competition for host nutrients. Ascaris eggs may be identified in the stool and occasionally adult worms emerge from the mouth or the anus. Mebendazole 100 mg twice daily for 3 days or a single dose of piperazine 100 mg kg-lor pyrantel pamoate 10 mg kg-l are effective. Surgical or endoscopic intervention may be required for intestinal or biliary obstruction.
<urn:uuid:2511c127-6b29-496f-a134-14bcdf2c9f6b>
CC-MAIN-2023-06
https://www.medassignments.com/intestinal-nematode-infection
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764495001.99/warc/CC-MAIN-20230127164242-20230127194242-00344.warc.gz
en
0.912492
1,352
3.34375
3
Data Science Course by Quality Software Technologies Our course covers the basis to advance of both these technologies Python and Data science. The study materials are also prepared according to the syllabus and are updated often to improvise and to include the latest developments. We have selected the trainers who have extensive experience in Python and Data science training and also have very good teaching skills. We will ensure that by our our training our students are capable of getting a job on their own before arranging the recruitment drives. - Introduction: What is Data Science? - Exploratory Data Analysis and the Data Science Process - Three Basic Machine Learning Algorithms - More Machine Learning Algorithm and Usage in Applications - Motivating application: Filtering Spam - Why Linear Regression and k-NN are poor choices for Filtering Spam - Naive Bayes and why it works for Filtering Spam - Data Wrangling: APIs and other tools for scrapping the Web - Feature Generation and Feature Selection (Extracting - Meaning From Data) - Recommendation Systems: Building a User-Facing Data - Mining Social-Network Graphs - Data Visualization - Data Science and Ethical Issues
<urn:uuid:94776ffb-93a3-4d33-bd6d-6aa5c011b1a0>
CC-MAIN-2021-04
https://qualitysoftech.com/training/data-science-training
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703524270.28/warc/CC-MAIN-20210121070324-20210121100324-00252.warc.gz
en
0.904222
249
2.828125
3
Many introduced plant species rely on mutualisms in their new habitats to overcome barriers to establishment and to become naturalized and, in some cases, invasive. Mutualisms involving animalmediated pollination and seed dispersal, and symbioses between plant roots and microbiota often facilitate invasions. The spread of many alien plants, particularly woody ones, depends on pollinator mutualisms. Most alien plants are well served by generalist pollinators (insects and birds), and pollinator limitation does not appear to be a major barrier for the spread of introduced plants (special conditions relating to Ficus and orchids are described). Seeds of many of the most notorious plant invaders are dispersed by animals, mainly birds and mammals. Our review supports the view that tightly coevolved, plant-vertebrate seed dispersal systems are extremely rare. Vertebrate-dispersed plants are generally not limited reproductively by the lack of dispersers. Most mycorrhizal plants form associations with arbuscular mycorrhizal fungi which, because of their low specificity, do not seem to play a major role in facilitating or hindering plant invasions (except possibly on remote islands such as the Galapagos which are poor in arbuscular mycorrhizal fungi). The lack of symbionts has, however, been a major barrier for many ectomycorrhizal plants, notably for Pinus spp. in parts of the southern hemisphere. The roles of nitrogen-fixing associations between legumes and rhizobia and between actinorhizal plants and Frankia spp. in promoting or hindering invasions have been virtually ignored in the invasions literature. Symbionts required to induce nitrogen fixation in many plants are extremely widespread, but intentional introductions of symbionts have altered the invasibility of many, if not most, systems. Some of the world's worst invasive alien species only invaded after the introduction of symbionts. Mutualisms in the new environment sometimes re-unite the same species that form partnerships in the native range of the plant. Very often, however, different species are involved, emphasizing the diffuse nature of many (most) mutualisms. Mutualisms in new habitats usually duplicate functions or strategies that exist in the natural range of the plant. Occasionally, mutualisms forge totally novel combinations, with profound implications for the behaviour of the introduced plant in the new environment (examples are seed dispersal mutualisms involving wind-dispersed pines and cockatoos in Australia; and mycorrhizal associations involving plant roots and fungi). Many ecosystems are becoming more susceptible to invasion by introduced plants because: (a) they contain an increasing array of potential mutualistic partners (e.g. generalist frugivores and pollinators, mycorrhizal fungi with wide host ranges, rhizobia strains with infectivity across genera); and (b) conditions conducive for the establishment of various alienalien synergisms are becoming more abundant. Incorporating perspectives on mutualisms in screening protocols will improve (but not perfect) our ability to predict whether a given plant species could invade a particular habitat.
<urn:uuid:84693683-d1f3-4b56-9ef1-e4d47f8054cd>
CC-MAIN-2016-36
http://onlinelibrary.wiley.com/doi/10.1111/j.1469-185X.1999.tb00041.x/abstract?systemMessage=Wiley+Online+Library+will+be+unavailable+on+Saturday+3rd+September+2016+at+08.30+BST%2F+03%3A30+EDT%2F+15%3A30+SGT+for+5+hours+and+Sunday+4th+September+at+10%3A00+BST%2F+05%3A00+EST%2F+17%3A00+SGT+for+1+hour++for+essential+maintenance.+Apologies+for+the+inconvenience
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982952852.53/warc/CC-MAIN-20160823200912-00129-ip-10-153-172-175.ec2.internal.warc.gz
en
0.918954
643
3.484375
3
Battle of Sandwich (1460) Lua error in Module:Coordinates at line 668: callParserFunction: function "#coordinates" was not found. - Not to be confused with the Battle of Sandwich (1217). |Battle of Sandwich| |Part of the Wars of the Roses| |House of Lancaster||House of York| |Commanders and leaders| |Richard Neville, Earl of Salisbury| |Casualties and losses| The Battle of Sandwich was a naval skirmish off the town of Sandwich in January 1460 during the Wars of the Roses. In it, Sir John Denham and the Earl of Warwick, Captain of Calais, now on the Yorkist side, defeated a Lancastrian fleet and captured several of its ships. Little evidence and few details of the battle survive. Sent ahead by Warwick, Sir John Denham found the king's fleet lying at Sandwich. Arriving at dawn, Denham launched an attack while the king's officers were still in bed. His success was so overwhelming that he "tooke the principall shippes of the Kynge's navie... well furnished with ordinaunce and artillarie". With command of the English Channel secured by this battle, a small Yorkist army of about two thousand men landed in Kent from Calais ahead of March and Warwick. Once the town of Sandwich itself had been secured by his forces in June 1460, Warwick landed there with March and Salisbury on 26 June 1460. Having cleared the Channel of French pirates (who had been able to raid the town thanks to the chaos caused in England by the civil war) and having made the coast of Kent safe, Warwick was received in Kent as a hero. Warwick's army soon increased in numbers, joined by many new recruits, and was largely well supported as it proceeded by way of Canterbury and probably Wickhambreaux. The Yorkist commanders had remained popular in Kent, and the officers in charge of protecting the county against them even joined forces with the rebels. The growing army then marched on London, where it arrived on 2 July to be welcomed by William Hulin, Lord Mayor of London, and Thomas Bourchier, Archbishop of Canterbury. The Yorkist army then marched towards Northampton to meet Henry VI and his Lancastrian army, and the two forces met at the Battle of Northampton on 10 July. Sources and references - Michael K. Jones 'Edward IV, the Earl of Warwick and the Yorkist Claim to the Throne', in Historical Research 70: 173 (1997), 342–352 pp. 342-352 - John Campbell, John Kent, Biographia Nautica (1785), p. 348 - Richard Brooke, Visits to fields of battle, in England, of the fifteenth century (1857), p. 235
<urn:uuid:e462c0f6-587d-4c00-b75b-d72247aed544>
CC-MAIN-2022-21
https://infogalactic.com/info/Battle_of_Sandwich_(1460)
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531779.10/warc/CC-MAIN-20220520093441-20220520123441-00266.warc.gz
en
0.942111
809
2.8125
3
May 1964 Electronics World Table of Contents Wax nostalgic about and learn from the history of early electronics. See articles Electronics World, published May 1959 - December 1971. All copyrights hereby acknowledged. Space Race was at its peak in 1964 when this advertisement by the Capitol Radio Engineering Institute (CREI) Program in Space Electronics appeared in Electronics World magazine. Although it all began in 1957 with the Geophysical Year, the heat was turned up that year when the USSR successfully launched Sputnik 1, the world's first artificial satellite. John F. Kennedy made his famous speech before the U.S. Congress in 1961, where he said in part, "This nation should commit itself to achieving the goal, before the decade is out, of landing a man on the moon and returning him safely to the earth." A huge push was made by colleges and technical schools to educate as many engineers and technicians as possible to ensure there would not be a dearth of qualified people to get the job done. Capitol Radio Engineering Institute Program Advertisement Has the Space Age outdated your knowledge of Electronics? What happens to transistors in the Van Allen Belt? How are vacuum tubes used in space? Why can't regular lubricants be used on moving parts in a spacecraft? To what extent has the space effort changed These and other questions reflect the changes taking place with space applications of electronics. Project Apollo and other missions in the space effort are rapidly outdating conventional concepts. Project Apollo Lunar Orbit Rendezvous Mission The Lunar Excursion Module of NASA's Project Apollo will carry two men from lunar orbit to the moon's surface and, after brief exploration, back to the mother craft for return to earth. Protect your future through the New CREI Program in Space Electronics For a career in space electronics you must acquire considerable new knowledge - knowledge that just didn't exist when you studied electronics. And, because developments in space electronics are quickly applied to other areas of electronics, knowledge of space electronics is an asset to a man in any field You can protect your future through the new CREI Program in Space Electronics which offers you up-to-date knowledge of these specialties: Space Data Systems - Includes analog and digital computers, information theory, data acquisition and processing. Space Tracking Systems - Includes microelectronics, space propagation, masers, lasers, Space Guidance & Control-Includes inertial navigation, space radar, star tracker systems, tracking The first extension programs developed specifically to help men in electronics apply their experience to the space effort. Content developed to meet employment requirements as determined by consulting government and private organizations in the space field. Text material prepared in leading space-oriented organizations. CREI also offers specialized education in these important areas of electronics: Communications, Aeronautical and Navigational, Television, Automation and industrial Nuclear, Servomechanisms and Computers. You are eligible for these programs if you work in electronics and have a high school education. Free Book Gives Full Information on CREI Programs. For your copy, mail coupon or write: CREI, Dept.1105-B, 3224 Sixteenth Street, N. W., Washington, D. C. 20010 The Capitol Radio Engineering Institute Founded 1927, Accredited Member of the National Home Study Council Dept. 1105-B, 3224 Sixteenth St., N. W. Washington 10, D. C. 20010 Please send me FREE book describing CREI Home Study Programs including new Program in Space Electronics. I am employed in electronics and have a high school education. Type of Present Work Check: _ Home Study _ Residence School - G. I. Bill Posted April 6, 2017
<urn:uuid:c236ad4c-5eb4-4f68-ba04-94ee31e045b4>
CC-MAIN-2018-39
http://www.rfcafe.com/references/electronics-world/capitol-radio-engineering-program-ad-electronics-world-may-1964.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267162385.84/warc/CC-MAIN-20180925202648-20180925223048-00333.warc.gz
en
0.902908
786
2.796875
3
Arkansas Forestry Commission: March Is Most Dangerous Month For Wildfires The Arkansas Forestry Commission is asking property owners to take precautions to help prevent wildfires. "March is by far our most dangerous wildfire month in Arkansas," says Joe Fox with the Commission. Fox says that with milder weather, many residents may be inclined to burn trash or debris. But he notes windy conditions and low humidity could make things dangerous. He says anyone doing outdoor burning should be extremely careful and not leave the fire unattended. He adds it's important to have appropriate tools, like rakes and shovels, and adequate water on hand to ensure the fire doesn't spread.
<urn:uuid:db8995b1-2b65-4887-86f3-10436b209459>
CC-MAIN-2015-32
http://ualrpublicradio.org/post/arkansas-forestry-commission-march-most-dangerous-month-wildfires
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042989790.89/warc/CC-MAIN-20150728002309-00099-ip-10-236-191-2.ec2.internal.warc.gz
en
0.944733
135
2.59375
3
We are constantly trying to influence someone about something. When we are attempting to influence, we need to be careful about the words we choose. Our listeners are only going to give us a short amount of time for us to make our point, so each word, each phrase, needs to bring our listener closer to our point of view. Make a list of the words you normally when you talk about birth . Are you choosing the BEST words out of those to make your point with the fewest words in the shortest amount of time? Be sure your message is clear and easily understood. Some words give conflicting messages. The two I am thinking of now are “but” and “however” They cause the listener to do a mental “double take.” We immediately start to feel defensive and can’t help but stop listening long enough to wonder what’s next? “But” and “however” immediately negate whatever preceded them. “I love you but…..” “You did a good job but……” You probably did the best you could, however…” I am immediately apprehensive when I hear a “but” or a “however.” Those words cause a negative gut reaction and set the emotional stage for defense. They also fail to accomplish the goal. Feedback, correction, or suggestions are better dealt with after an “and” than a “but” or “however”. You know it is true with your children; it is equally true for adult conversation. To be effective communicators we need to ask ourselves, “what does the first part have to do with the second?” While we correct our children because we love them, that should be a given. There is no reason to remind the child we love them before we address behavior that needs changed. We should never give our children the idea that our love for them is conditional. When critiquing a student’s academic effort or an employee’s performance, there is no need to add a personal component to the issue. Address the feedback as the separate issue that it is, and in a way that needs no attempt at or need for buffering. Try to eliminate “but” and “however” from your conversation altogether for just one day. It is harder than you might think. I have had to erase both of those words two or three times from this little post.
<urn:uuid:d4e09c46-7244-4727-9ffa-a4245406c62d>
CC-MAIN-2017-17
http://authenticmidwiferyeducationfromaami.blogspot.com/2009/09/study-assist-communication.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121752.57/warc/CC-MAIN-20170423031201-00004-ip-10-145-167-34.ec2.internal.warc.gz
en
0.96327
518
2.6875
3
SEATTLE – One way to predict survival of many types of cancer is by counting the number of tumor-attacking immune cells that have migrated into the tumor in an effort to eradicate it – a sign of the body's immune response to the cancer. However, quantifying these armies of immune cells has been difficult – until now. Scientists at Fred Hutchinson Cancer Research Center have developed a new method for counting a special class of cancer-fighting cells – called tumor-infiltrating T lymphocytes, or TILs – reliably, quickly and cheaply in patients with early stage and advanced ovarian cancer. They describe their findings online Dec. 4 in Science Translational Medicine. Such technology, a DNA-amplification technique, has the potential to predict treatment response, cancer recurrence and disease-free survival earlier and more effectively than any current method, according to lead researcher and cancer geneticist Jason H. Bielas, Ph.D., an associate member of the Human Biology and Public Health Sciences divisions at Fred Hutch. "Our experiments demonstrate an association between higher TIL counts and improved survival among women with ovarian cancer, and are consistent with prior observations that the immune response against ovarian cancer is a meaningful and independent prognostic factor," said Bielas, who was also the paper's corresponding and senior author. "While variations in the measurement and characterization of TILs have limited their clinical utility as biomarkers of survival, our results highlight the significant translational potential of a robust, standardized, DNA-based assay to assess TILs in a variety of cancer types, including ovarian," he said. Fred Hutch researchers developed the digital assay to count TILs, determine their frequency and develop a grouping system to determine their "clonality," a measure of the tumor's T-cell population. In developing the test, Bielas and his team leveraged a technology co-created by first author Harlan S. Robins, Ph.D., a computational biologist and associate member of the Public Health Sciences and Human Biology divisions at Fred Hutch. They devised a way to easily screen T cells by capturing the genetic information of unique proteins these cells carry on their surface. Fred Hutch licensed the technology to Adaptive Biotechnologies, a company Robins co-founded. In the present study, Robins, Bielas and colleagues tested this novel technique, called "QuanTILfy," on tumor samples from 30 ovarian cancer patients with known survival outcomes ranging from one to 22 months. They looked at the levels of TILs in their tumors and compared those levels to the women's survival. They found that higher TIL numbers correlated with better survival. For example, the percentage of TILs was approximately threefold higher on average for patients with a survival rate of more than five years as compared to patients with a survival rate of less than two years. "Now that we have the sensitivity and ability to reproducibly count TILs in tumors, we may be able to stratify and more effectively treat patients based on tumor TIL count," Bielas said. The research was made possible by funding from the Listwin Family Foundation, the Ellison Medical Foundation, the National Institute of Environmental Health Sciences, the U.S. Department of Defense, the National Cancer Institute, the Susan G. Komen Foundation and the Canary Foundation. Note for media: More information, including a copy of the paper, "Digital Genomic Quantification of Tumor-Infiltrating Lymphocytes," can be found online at the Science Translational Medicine press package at http://www.eurekalert.org/jrnls/scitransmed. You will need your user ID and password to access this information. An embargoed copy of the paper can also be obtained by contacting the journal at 202-326-6440 or emailing email@example.com. At Fred Hutchinson Cancer Research Center, home to three Nobel laureates, interdisciplinary teams of world-renowned scientists seek new and innovative ways to prevent, diagnose and treat cancer, HIV/AIDS and other life-threatening diseases. Fred Hutch's pioneering work in bone marrow transplantation led to the development of immunotherapy, which harnesses the power of the immune system to treat cancer with minimal side effects. An independent, nonprofit research institute based in Seattle, Fred Hutch houses the nation's first and largest cancer prevention research program, as well as the clinical coordinating center of the Women's Health Initiative and the international headquarters of the HIV Vaccine Trials Network. Private contributions are essential for enabling Fred Hutch scientists to explore novel research opportunities that lead to important medical breakthroughs. For more information visit http://www.fredhutch.org or follow Fred Hutch on Facebook, Twitter or YouTube. AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.
<urn:uuid:fcbbdd8b-26b2-4838-b533-88f70dc4c0b8>
CC-MAIN-2014-42
http://www.eurekalert.org/pub_releases/2013-12/fhcr-poc120213.php
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637899701.11/warc/CC-MAIN-20141030025819-00208-ip-10-16-133-185.ec2.internal.warc.gz
en
0.942172
1,021
2.703125
3
For Kids: Asthma Action Plan If you have asthma, you know how it feels to have a flare-up. It’s hard to breathe. Your chest may feel tight. You may feel tired and not want to play. How you feel tells you what “asthma zone” you’re in. Know how to tell whether you are in the green, yellow, or red zone. And know what to do for each zone. Fill in the blanks! Use words from the list below. When I’m in my green zone, I feel _______. I still have to use my_______ inhaler. I also have to watch out for _________. When I’m in my yellow zone, I’m starting to have a __________. I might wheeze or have other __________. Then I have to use my __________ inhaler. When I’m in my red zone breathing is very ___________. I need to get ___________ right away. triggers healthy symptoms hard help controller quick-relief flare-up Green Zone: Safe When your breathing is OK, you’re in the green zone. You feel good. Asthma doesn’t get in your way. Keep using your controller inhaler. And watch for triggers (things that can make your asthma worse). Yellow Zone: Warning You’re starting to have a flare-up. Ask an adult for help. Use your quick-relief inhaler. Yellow zone symptoms may be: Shortness of breath Red Zone: Danger You’re having a flare-up! Tell your parents or another adult right away. Use your quick-relief inhaler and seek immediate medical care. Red zone symptoms may be: Constant coughing or wheezing Symptoms that keep you from sleeping Trouble breathing at rest Breathing very hard or fast
<urn:uuid:fe69bf9f-ec08-4379-8b24-c7ce982ece99>
CC-MAIN-2019-26
https://hcqukepro.kramesonline.com/HealthSheets/3,S,82928
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999003.64/warc/CC-MAIN-20190619163847-20190619185847-00322.warc.gz
en
0.88812
411
3.0625
3
How to Pray Luther-style In the year 1535, Peter Beskendorf—Martin Luther’s barber and friend—asked him for suggestions concerning prayer. Luther responded with a letter titled, A Simple Way to Pray. In the letter, Luther gives advice for taking each petition of the Lord’s Prayer and expanding them into meditations. For the other parts of the catechism he suggests a four-part model of meditation: instruction, thanksgiving, confession, and requests. (The second and third parts are sometimes switched in order to create a nice English acronym, ACTS. I wrote about that here.) Here is Luther’s example, using the First Commandment: I think of each commandment as, first, instruction, which is really what it is intended to be, and consider what the Lord God demands of me so earnestly. Second, I turn it into a thanksgiving; third, a confession; and fourth, a prayer. I do so in thoughts or words such as these: “I am the Lord your God, etc. You shall have no other gods before me,” etc. Here I earnestly consider that God expects and teaches me to trust him sincerely in all things and that it is his most earnest purpose to be my God. . . . Second, I give thanks for his infinite compassion by which he has come to me in such a fatherly way and, unasked, unbidden, and unmerited, has offered to be my God, to care for me, and to be my comfort, guardian, help, and strength in every time of need. We poor mortals have sought so many gods and would have to seek them still if he did not enable us to hear him openly tell us in our own language that he intends to be our God. How could we ever—in all eternity—thank him enough! Third, I confess and acknowledge my great sin and ingratitude for having so shamefully despised such sublime teachings and such a precious gift throughout my whole life, and for having fearfully provoked his wrath by countless acts of idolatry. I repent of these and ask for his grace. Fourth, I pray and say: “O my God and Lord, help me by thy grace to learn and understand thy commandments more fully every day and to live by them in sincere confidence. Preserve my heart so that I shall never again become forgetful and ungrateful, that I may never seek after other gods or other consolation on earth or in any creature, but cling truly and solely to thee, my only God. Amen, dear Lord God and Father. Amen.” The entire letter is printed in Devotional Writings II (vol. 43 of Luther’s Works, American Edition), 192–211.
<urn:uuid:09a05293-3478-4351-b950-196def07c942>
CC-MAIN-2018-51
https://www.kingofgracelutheran.com/pastorsblog/how-to-pray-luther-style
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825495.60/warc/CC-MAIN-20181214070839-20181214092339-00061.warc.gz
en
0.965034
585
2.75
3
Our Health Library information does not replace the advice of a doctor. Please be advised that this information is made available to assist our patients to learn more about their health. Our providers may not see and/or treat all topics found herein. What is nearsightedness? Nearsightedness (myopia) is a common cause of blurred vision. It can be mild, moderate, or severe. If you are nearsighted, objects in the distance appear blurry and out of focus. You might squint or frown when trying to see distant objects clearly. Nearsightedness is usually a variation from normal, not a disease. Less often, nearsightedness happens because of another disease or condition. What causes it? Most nearsightedness is caused by a natural change in the shape of the eyeball. Less often, nearsightedness may be caused by a change in the cornea or the lens. What happens when you are nearsighted? Nearsightedness usually begins in childhood between ages 6 and 12. During the teen years, as the eyeballs continue to grow, it may develop or get worse quickly. Teenagers may need new glasses every 12 months or even more often. Nearsightedness usually stops getting worse by age 20. Most nearsightedness stabilizes at a mild to moderate level. How is it diagnosed? A routine eye exam can show whether you are nearsighted. The eye exam includes questions about your eyesight and a physical exam of your eyes. Ophthalmoscopy, slit lamp exams, and other tests that check vision and eye health are also part of a routine eye exam. Eye exams should be done for new babies and at all well-child visits.footnote 1 Nearsightedness is usually first discovered in children of grade-school age. How is nearsightedness treated? Most people who are nearsighted use eyeglasses or contact lenses to correct their vision. Surgery can also reduce or fix nearsightedness. There are several surgery options, such as LASIK, PRK (photorefractive keratectomy), and artificial lens implants. The goal of surgery is to help you see more clearly without glasses or contacts. Most doctors consider 20/40 vision or better after surgery a satisfactory result. If glasses or contact lenses are inconvenient for your work or lifestyle, surgery may be a good choice. But nearsightedness is not a disease, and a nearsighted eye is otherwise normal and healthy. Weigh your desire to have clear vision without glasses or contacts against the risks and cost of surgery. And be aware that you may still need to wear glasses or contact lenses after surgery. If your vision doesn't bother you and if you have no driving problems or other safety concerns, you don't need to have any treatment. Nearsightedness won't affect the health of your eye, and it won't get worse just because you don't wear glasses or don't have surgery. If you are nearsighted, get regular eye exams, and see your eye care specialist if you have changes in your vision. Current as of: April 29, 2021 Author: Healthwise Staff Kathleen Romito MD - Family Medicine Adam Husney MD - Family Medicine E. Gregory Thompson MD - Internal Medicine Christopher J. Rudnisky MD, MPH, FRCSC - Ophthalmology Current as of: April 29, 2021 To learn more about Healthwise, visit Healthwise.org. © 1995-2021 Healthwise, Incorporated. Healthwise, Healthwise for every health decision, and the Healthwise logo are trademarks of Healthwise, Incorporated.
<urn:uuid:2cf00750-fb7e-4563-abc9-f52b5922d8d2>
CC-MAIN-2021-39
https://pediatricsbythesea.com/for-parents/parenting-help/healthwise/?DOCHWID=hw124098
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057033.33/warc/CC-MAIN-20210920070754-20210920100754-00706.warc.gz
en
0.912513
759
3.734375
4
While the world’s attention has been focussed on Ebola, another outbreak has been spreading in a number of countries across the world. Now, Oxford University infectious disease specialists are applying the lessons from the Ebola outbreak to try to support local medics and researchers to get ahead of this new pathogen. Zika, carried by the Aedes mosquito, has been known about for some years, typically causing mild illness and a rash. Now, however, reports from South America suggest that it is causing birth defects in newborn babies of women who have had Zika. The researchers in the affected regions are poised to run and lead these studies, and the international research community, through ISARIC, is working to support them and provide any input and external expertise that is needed. Trudie Lang, Head of The Global Health Network and Professor of Global Health Research The outbreak came to the attention of two Oxford-based organisations: The Global Health Network (TGHN), an online science park that guides and supports medical research around the world, especially in low and middle income countries and ISARIC, a global network of researcher groups whose aim is to enable research in disease outbreaks Professor Trudie Lang explained: 'I was at an ISARIC meeting about Ebola when Fernando Bozza of the Oswaldo Cruz Foundation told us about the Zika outbreak He asked what we knew about the Zika outbreak. The answer was not much. 'He briefed the ISARIC team and it was clear this was another situation where the research community had to come together to ensure that evidence was gathered as early as possible this time, and that we should apply the lessons from Ebola that we were discussing at that very meeting.' Zika has been known about since the late 1940s but major outbreaks were not recorded until a 2006 occurrence on the pacific island of Yap. In 2013 there were 30,000 cases in French Polynesia. Zika affected countries in the Americas: Brazil, Colombia, El Salvador, Guatemala, Honduras, Mexico, Panama, Paraguay, Suriname and Venezuela. Other current Zika outbreaks: Cape Verde. However, the South American outbreak is particularly concerning because if its apparent effect on foetal development. Dr Fernando Bozza said: 'Zika Virus has been reported in Brazil since April 2015 and up to mid-December, nine other countries in the Americas have reported local Zika transmission. 'In November, the Brazilian Ministry of Health reported an unusual increase in cases of microcephaly, with a causal link between Zika infection during pregnancy and congenital abnormalities. 2,401 microcephaly cases are under investigation in Brazil, with 134 cases confirmed related to Zika virus infection. Investigations are also on-going to assess a possible relation between Zika and Guillain-Barré Syndrome and other neurological events.' With Zika becoming a more serious disease, The Global Health Network recognised the need to move as rapidly as possible into obtaining data, which requires the integration of research into the medical and public health response. Developing research tools and strategies is key and this needed a resource for agreeing research priorities and sharing research documents Professor Lang said: 'Medical research is vital to understand, manage and hopefully stop the outbreak. However, if samples and patient information are to be used for research purposes then protocols are needed that have been given ethical approval by regulatory authorities and patients need to be informed and asked for their consent. Robust studies need to be planned and this all takes time to put into place. However, a lesson from Ebola was that it can be done faster. The researchers in the affected regions are poised to run and lead these studies, and the international research community, through ISARIC, is working to support them and provide any input and external expertise that is needed. 'The Global Health Network’s website for Zika has been set up for the local research community. It will make available documents like case record forms and consent forms, as well as sharing research priorities. By providing a common and open sharing space that is driven by the regional researchers in Brazil and other countries it should be possible to speed up getting this crucial data that is needed to understand, manage and eventually treat Zika virus infection.' The hope is that a joined up approach, where frontline health organisations are supported by a global network, will mean Zika is understood quicker and that work on treatments can begin sooner. The site is at: https://zikainfection.tghn.org/ The Global Health Network is an online science park that allows scientists to work together without geographical, institutional or financial barriers, to support researchers across world to the acquire technical expertise and develop new protocols to hasten and improve research outputs. www.theglobalhealthnetwork.org ISARIC – International Severe Acute Respiratory and Emerging Infection Consortium – is a global initiative aiming to ensure that clinical researchers have the open access protocols and data-sharing processes needed to facilitate a rapid response to emerging diseases that may turn into epidemics or pandemics. www.isaric.org
<urn:uuid:0d2c9213-e17e-497f-81c3-fc99cde54857>
CC-MAIN-2017-13
http://www.ox.ac.uk/news/2016-01-12-fight-against-little-known-zika-virus-applies-lessons-ebola
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189032.76/warc/CC-MAIN-20170322212949-00623-ip-10-233-31-227.ec2.internal.warc.gz
en
0.955321
1,033
3.265625
3
Restoring the ‘Jewel of Detroit’ This story is provided and presented by our sponsor. Belle Isle is a natural wonder. But it takes a lot of work to keep it that way. Nestled at the mouth of the Detroit River and just a stone’s throw from downtown, the 2.5-mile-long island has been a popular urban oasis since its founding as a city park in 1879. But the island is also home to 200 acres of a rare ecosystem known as wet-mesic flatwoods. These forested wetlands still contain rare plant and wildlife species common hundreds of years ago throughout southeast Michigan after the glacial period. “Belle Isle is very important because it has the largest example of flatwoods forest and one of only six high-quality examples left in Michigan,” said Glenn Palmgren, a Michigan Department of Natural Resources ecologist. Centuries ago, the Detroit River was lined with coastal wetlands sometimes a mile wide. But in the last 200 years, nearly 97 percent of all wetlands have been removed by riverfront construction. This has led to the significant decline of the wildlife, fish and plants that once thrived along the river, said Sam Lovall, Friends of Detroit River project manager. Now efforts are underway to restore those natural resources for generations to come. Protecting our natural resources The Michigan Wildlife Council was created three years ago to educate the public about how Michigan’s wildlife and natural resources are managed and how those activities are funded. “We are extremely lucky in Michigan that so many dedicated men and women work every day to conserve and protect our natural resources across the state,” said Matt Pedigo, council chair. “So even though you may not hunt or fish, we all benefit from this critical work.” While the majority of funding for wildlife conservation projects in Michigan comes from the sale of hunting and fishing licenses, many projects – such as those on Belle Isle – are funded with federal dollars. The Friends of the Detroit River, a nonprofit organization working to improve the quality of life for people, plants and animals in southeast Michigan and southwest Ontario, has played a major role in the waterway’s restoration. The group has received nearly $4 million to connect 40-acre Lake Okonoka to the river through a “partnership grant” from the National Oceanic and Atmospheric Administration. The funding originated from the Great Lakes Restoration Initiative, which was created in 2010 to help protect and restore the largest system of fresh surface water in the world – the Great Lakes. The project is part of an ongoing effort by the Friends of the Detroit River to restore fish and wildlife populations by improving habitat up and down the 32-mile waterway. “The flatwoods forest historically was connected to the Detroit River,” Lovall said. “But since the 1950s, all three of the lakes on Belle Isle and the canals have been closed off from the river. So part of this project will be to reconnect Lake Okonoka to the river and restore the wet-mesic flatwoods forest.” With the help of state and federal dollars, the Friends of the Detroit River has already completed the restoration of Blue Heron Lagoon and South Fishing Pier on Belle Isle, along with other shoreline restoration projects elsewhere on the river. Construction is expected to begin this fall and be completed next year. Restoring key waterways The project includes connecting Lake Okonoka to Blue Heron Lagoon, which was reconnected to the river in 2013. Another opening to the river will be created west of the South Fishing Pier to improve aeration and water circulation in the lake. “By connecting both of these water bodies, it will double the opportunity for fish nursery activities in the area,” Palmgren said. “Belle Isle will be a great spot for young fish to find shelter until they’re large enough to make it on their own in the Detroit River.” Paddlers can also look forward to the project’s conclusion, as they will be able to make their way throughout much of the island on the interconnected lakes and canals. Additional work will include dredging Lake Okonoka to make it deeper, as well as adding gravel spawning beds to improve fish habitat. Because Belle Isle is in the middle of a major flyway, migratory birds will also benefit from the flatwoods forest restoration. “In the urban area of Detroit, there are not a lot of places the migrating birds have to congregate,” Palmgren said. “By restoring the 200-acre forest and reconnecting the 40-acre lake to the Detroit River, it will make a huge impact on wildlife and fish.” Ancillary projects include reconstructing fish-spawning reefs upstream from Belle Isle. “It really starts to become an entire ecosystem that we’re re-creating,” Lovall said. The Detroit River is vital to the region’s well-being, he said. “The ongoing river restoration efforts respond to southeast Michigan’s anticipated next economy: jobs based on technology, clean water, healthy lifestyles, quality food, recreation and tourism,” Lovall said. “A restored Detroit River is the single most important asset we have to make this happen.” This story is provided and presented by our sponsor Michigan Wildlife Council. Members of the editorial and news staff of the USA Today Network were not involved in the creation of this content.
<urn:uuid:2d157abe-78ff-443a-ba42-e8d59da41338>
CC-MAIN-2018-13
https://www.freep.com/story/sponsor-story/michigan-wildlife-council/2017/07/10/restoring-jewel-detroit/103300210/?from=new-cookie
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648205.76/warc/CC-MAIN-20180323083246-20180323103246-00539.warc.gz
en
0.955552
1,159
3.25
3
The Comprehensive Wildlife Conservation Strategy (CWCS) Species Team created a list of species of greatest conservation need for Arkansas. Some species were chosen for inclusion on the list because they are rare, some because their populations are in decline or, in some cases, because not enough is known to determine their taxonomic, life history or conservation status Inclusion on the list of Species of Greatest Conservation Need (SGCN) does not confer any special or regulatory status as federal listing as an endangered or threatened species does. CWCS Species Team Michael Warriner, Entomologist, Arkansas Natural Heritage Commission (ANHC) Contributed by Mike Quinn on 6 April, 2016 - 6:59pm
<urn:uuid:fae7fcde-c3da-403c-965a-721ff07ee1c9>
CC-MAIN-2023-14
https://bugguide.net/node/view/1207713?printable=1
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00168.warc.gz
en
0.886945
177
2.859375
3
Bees and Pollination This week is National Pollinator Week, it’s safe to say the bee is the most recognized pollinator. No doubt bees are some of the best workers on the planet, buzzing about from flower to flower, visiting different plants and vegetation working nonstop all day long. Unfortunately bees can often be feared as a nuisance and unwanted insect. When generally bees are there to do their job and go home without causing trouble. What do these bees and pollination do for us besides create amazing honey? In truth, likely much more than we can possibly realize. There are hundreds of types of bees, all with different roles, habits, nests, and hives. Pollinating is absolutely critical and a major job role for many of the bees and plants around our world. Bees don’t only make honey and help flowers grow. They do so much more and they certainly don’t get the recognition they deserve. In addition to the flowers and many plants bees’ help, there are many crops that rely a great deal on help from the bees and just wouldn’t survive if it weren’t for the bees working hard pollinating and doing what they do. While we don’t need bees to pollinate every single crop, here is just a brief list of some of the foods we would lose if the bees weren’t around: apples, mango’s, kiwi fruit, plums, peaches, nectarines, guava, pomegranates, pears, black and red currants, alfalfa, okra, strawberries, onions, cashews, cactus, apricots, avocados, passion fruit, Lima beans, kidney beans, green beans, cherries, celery, coffee, walnuts, cotton, flax, macadamia nuts, sunflower oil, lemon, figs, limes, carrots, cucumber, hazelnut, cantaloupe, watermelon, coconut, tangerines, broccoli, cauliflower, cabbage, eggplant, raspberries, blackberries, cranberries, cocoa, vanilla, grapes, tomatoes. If you have a large amount of bees on your property that have you concerned, please do not harm them. You should contact your local bee keeper to report the bees (you can call non-emergency or even your local human society to help find the proper person). The bee professional will assess the situation and will remove the bees (often times for free) or they may conclude that the bees will be moving on soon. Either way, its bests to keep the advise of a professional to help protect the bees and ensure safety to humans.
<urn:uuid:e1f6dbfe-de0e-4750-bf89-f23a0e5b4dd6>
CC-MAIN-2020-34
https://alphahomepestcontrol.com/bees-and-pollination/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738723.55/warc/CC-MAIN-20200810235513-20200811025513-00534.warc.gz
en
0.92991
555
2.78125
3
Since first published twenty-five years ago, True Stories has provided entertaining stories and effective reading-skill instruction to English language learners throughout the world, helping them build language skills through a carefully paced, step-by-step process. The Silver Edition continues to provide stories whose universal appeal ensures a pleasurable reading experience and motivates students toward reading fluency. ● New to this edition - New and updated stories maintain the high interest of the series and capture students’ imaginations. - A colorful new design makes the readings inviting and enhance students’ understanding and enjoyment of the stories. - A uniform unit structure runs across all six books* in the edition, making it easy for students to move seamlessly from one level to the next. - Audio recordings of every reading. Every story in the series has been recorded and made available online for students or teachers to download. - Digital Resources including: - audio recordings of every reading - teaching tips - answer keys - additional practice activities ● Other highlights - Pre-reading activities introduce the units visually to ease students into the readings. - Pre- and post-reading exercises develop vocabulary, reading, listening, writing, and speaking skills. - A structured discussion activity at the end of each unit prompts students to share their own . - Interactive activities for pair and group work are ideal for multilevel classes. - Mapped to the Global Scale of English
<urn:uuid:768332f9-d585-4d8d-a5d2-52e73abc5c25>
CC-MAIN-2020-34
http://www.littlejohn.co.kr/shop/item.php?it_id=1556785873
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739328.66/warc/CC-MAIN-20200814130401-20200814160401-00079.warc.gz
en
0.917864
294
2.765625
3
Quick Majungasaurus Facts - May have indulged in cannibalism - Was 2 car lengths long - Weighed as much as a Rhinoceros - Ran on two legs - Was one of the last dinosaurs to have lived Majungasaurus is a dinosaur which lived approximately 70 million years ago during the Cretaceous Period. It was first discovered in 1896 by a French army officer along the Betsiboka River in Madagascar. It was then named Majungasaurus, a name which means “Majungha Lizard.” This dinosaur was approximately 20 feet long and weighed around a ton. It was a bipedal predator that had small hands and a short snout with thickened bone on it. It also had a single small horn on top of its skull. It is known that this dinosaur was a carnivore and may have hunted many different types of dinosaurs at the same. It may have even hunted its own kind as has been shown by the fossil record. Fossils of this dinosaur have been found bearing the teeth of other Majungasaurus dinosaurs. This is the only direct evidence of cannibalism that has ever been attributed with direct evidence to a dinosaur species. Although to be fair, it may just have scavenged the already dead remains of other Majungasaurus. An interesting fact about this dinosaur is that due to the pro ponderous of skeletal material, this dinosaur is currently one of the most studied dinosaurs of all time. It is believed to have been the apex predator of its ecosystem.
<urn:uuid:065ffc4a-e6f5-4ba9-8174-a8b4bcd21da3>
CC-MAIN-2017-13
https://www.newdinosaurs.com/majungasaurus/
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191986.44/warc/CC-MAIN-20170322212951-00365-ip-10-233-31-227.ec2.internal.warc.gz
en
0.983565
317
3.09375
3
In 2019 the American College of Cardiology and American Heart Association updated their recommendations for aspirin use. Low-dose aspirin use might be considered for primary prevention of cardiovascular disease for those who are 40 to 70 years of age, but not at increased bleeding risk.* Low-dose Aspirin May Help Manage Heart Disease Caused By Risk Factors Such As: - High Blood Pressure - Undesirable Cholesterol Adults who are >70 years of age or at increased bleeding risk are recommended against using low-dose aspirin for their hearts* unless explicitly told otherwise by their doctor or healthcare professional. Please speak to your doctor or other healthcare provider before using this product for your heart. * Source: 2019 ACC/AHA Guideline on the Primary Prevention of Cardiovascular Diseas Full Details: The Benefits of Aspirin Therapy The common cause of heart attacks and ischemic strokes is a shortage of blood supply to the heart or brain. Blood supply blockages are typically the result of fatty plaque accumulating in the lining of an artery. As this plaque accumulates, your blood flow can slow or even stop, causing a blood clot. A heart attack can occur when a blood clot blocks in an artery leading to your heart. An ischemic stroke can occur when a blood clot blocks an artery leading to your brain. The aspirin in Ecotrin® is a blood thinner and helps to prevent blood clots from forming, which may help prevent a heart attack or ischemic stroke. The Food and Drug Administration (FDA) has approved the use of aspirin to reduce the risk of heart attacks and strokes in adults who have had a heart attack or ischemic stroke or who have angina. Aspirin is not appropriate for everyone, so be sure to talk to your doctor before you begin an aspirin regimen, particularly if you have one or more of the following conditions: - You have had a heart attack - You have had an ischemic stroke or a mini-stroke (transient ischemic attack) - You have angina - You have had certain heart procedures, such as angioplasty or a bypass operation Aspirin is not appropriate for everyone, so be sure to talk to you doctor before you begin an aspirin regimen.
<urn:uuid:baf5c89f-c109-4332-ac7e-ec35743ab686>
CC-MAIN-2019-30
https://www.ecotrin.com/heart-health-information/ecotrin-and-your-heart-benefits-of-aspirin-therapy
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525524.12/warc/CC-MAIN-20190718063305-20190718085305-00335.warc.gz
en
0.920903
468
2.640625
3
Help support New Advent and get the full contents of this website as an instant download or CD-ROM. Includes the Catholic Encyclopedia, Church Fathers, Summa, Bible and more all for only $19.99... Italian poet, born at Marino, 1490; died at Rome, February 25, 1547. She was the daughter of Fabrizio Colonna, lord of various Roman fiefs and grand constable of Naples. Her mother, Agnese da Montefeltro, was a daughter of Federigo da Montefeltro, first Duke of Urbino. In 1509 Vittoria was married to Ferrante Francesco d'Avalos, Marquis of Pescara, a Neapolitan nobleman of Spanish origin, who was one of the chief generals of the Emperor Charles V. Pescara's military career culminated in the victory of Pavia (24 February, 1525), after which he became involved in Morone's conspiracy for the liberation of Italy, and was tempted from his allegiance to the emperor by the offer of the crown of Naples. Vittoria earnestly dissuaded him from this scheme, declaring (as her cousin, Cardinal Pompeo Colonna, tells us) that she "preferred to die the wife of a most brave marquis and a most upright general, than to live the consort of a king dishonoured with any stain of infamy". Pescara died in the following November, leaving his young heir and cousin, Alfonso d'Avalos, Marchese del Vasto, under Vittoria's care. Vittoria henceforth devoted herself entirely to religion and literature. We find her usually in various monasteries, at Rome, Viterbo, and elsewhere, living in conventual simplicity, the centre of all that was noblest in the intellectual and spiritual life of the times. She had a peculiar genius for friendship, and the wonderful spiritual tie that united her to Michelangelo Buonarroti made the romance of that great artist's life. Pietro Bembo, the literary dictator of the age, was among her most fervent admirers. She was closely in touch with Ghiberti, Contarini, Giovanni Morone, and all that group of men and women who were working for the reformation of the Church from within. For a while she had been drawn into the controversy concerning justification by faith, but was kept within the limits of orthodoxy by the influence of the beloved friend of her last years, Cardinal Reginald Pole, to whom she declared she owed her salvation. Her last wish was to be buried among the nuns of S. Anna de' Funari at Rome; but it is doubtful whether her body ultimately rested there, or was removed to the side of her husband at San Domenico in Naples. Vittoria is undoubtedly greater as a personality than as a poet. Her earlier "Rime", which are mainly devoted to the glorification of her husband, are somewhat monotonous. Her later sonnets are almost exclusively religious, and strike a deeper note. A longer poem in terza-rima, the "Trionfo di Cristo" shows the influence of Dante and Savonarola, as well as that of Petrarch. Her latest and best biographer, Mrs. Jerrold, to whom we are indebted for a number of beautiful and faithful translations of Vittoria's poetry, has drawn a suggestive analogy between it and the work of Christina Rossetti. Many of Vittoria's letters, and a prose meditation upon the Passion of Christ, have also been preserved. VISCONTI, Rime di Vittoria Colonna (Rome, 1840); LUZIO, Vittoria Colonna (Mantua, 1884); FERRERO AND MÜLLER, Carteggio di Vittoria Colonna, Marchesa di Pescara (Florence, 1892); REUMONT, tr. by MÜLLER AND FERRERO, Vittoria Colonna, Vita, Fede, e Poesia nel secolo decimosesto (Turin, 1892); TORDI, Vittoria Colonna in Orvieto (Perugia, 1895); JERROLD), Vittoria Colonna, with some account of her Friends and her Times (London and New York, 1906). APA citation. (1908). Vittoria Colonna. In The Catholic Encyclopedia. New York: Robert Appleton Company. http://www.newadvent.org/cathen/04128b.htm MLA citation. "Vittoria Colonna." The Catholic Encyclopedia. Vol. 4. New York: Robert Appleton Company, 1908. <http://www.newadvent.org/cathen/04128b.htm>. Transcription. This article was transcribed for New Advent by Douglas J. Potter. Dedicated to the Immaculate Heart of the Blessed Virgin Mary. Ecclesiastical approbation. Nihil Obstat. Remy Lafort, Censor. Imprimatur. +John M. Farley, Archbishop of New York. Contact information. The editor of New Advent is Kevin Knight. My email address is webmaster at newadvent.org. Regrettably, I can't reply to every letter, but I greatly appreciate your feedback — especially notifications about typographical errors and inappropriate ads.
<urn:uuid:dd368c73-56f2-4189-85fd-d4e9963619d8>
CC-MAIN-2015-18
http://noreply@newadvent.org/cathen/04128b.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430459118064.7/warc/CC-MAIN-20150501054518-00029-ip-10-235-10-82.ec2.internal.warc.gz
en
0.949585
1,132
2.8125
3
The construction of evil is very reminiscent of approaches to writing. In both we have to consider purpose, audience, and intent. In writing, if our purpose is to persuade a particular audience, what is our intention, why do we want to persuade the audience? Rhetoricians of yore made sport of persuading for the sake of persuasion, but in real life application outside of academia, persuasion also carries with it an additional weight. It is a means to an end. There is little difference in the construction of evil. The distinction between purpose and intent is rendered more apparent than in writing. But the language is juxtaposed due to legal terminology, particularly the phrase “with intent to kill.” The intention in an act of evil, thus, becomes equivalent with “purpose” in writing, and motivation in murder or other manifestations of socially-recognized evil equates with what we recognize in writing as “intention.” A psychopath might harm someone with the intent to kill, as dubbed by legal terminology, but what is their purpose or motivation? Do they intend to kill to squelch or satiate some unconscious, sadistic impulse? Is their motivation revenge? Generally speaking, in most modern societies motivation is a means to solving a crime, but it is not an essential criteria for evil itself. All that is needed is intent to commit a socially recognized act of evil. Motivation is a fickle mistress. Intention to commit a socially recognized act of evil without an apparent motivation is often one of the most fear-inducing manifestations of “evil.” At the same time, intent to commit a socially recognized act of evil with a clear motivation can be dubbed either evil or good, depending on the rhetoric employed to justify or condemn the act. For example, in war the intent to kill can be justified by a motivation to squelch a greater evil. The greater evil is generally established by two things: 1. chronology: the greater evil is the force that initiated the intent to kill through provocation. 2. quantification of innocence: the greater evil intends to kill those who do not wish to reciprocate, innocent civilians rather than willing soldiers. The quantification of innocence rests on a continuum in which children rest at one end with unwilling participants following and willing participants resting on the other end of the spectrum. In coming weeks (interspersed by interviews and random reflections on other topics) I plan to explore the rhetoric of evil in greater depth by looking at how theological depictions of evil are used to justify socially recognized acts of evil while simultaneously condemning other socially recognized acts of evil. Also, I hope to look at the ways that rhetoric is used to transmute acts we might not normally view as evil, like political viewpoints and alliances, into heinous crimes against humanity.
<urn:uuid:0b6c0ba7-4a11-4ce1-a091-54fc68779006>
CC-MAIN-2014-10
http://bizarrojones.com/2011/10/02/rhetoric-of-evil/
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021389272/warc/CC-MAIN-20140305120949-00023-ip-10-183-142-35.ec2.internal.warc.gz
en
0.94915
572
2.859375
3
Limonite Ore Magnetic Concentration. Limonite Ore Magnetic Concentration Iron Ore Wikipedia Iron ores are rocks and minerals from which metallic iron can be economically extracted. 3, 69.9 Fe, goethite FeOOH, 62.9 Fe, limonite FeOOHnH2O, 55 Fe or siderite FeCO3, 48.2 Fe.Read More Chinese magnetite beneficiation - Iron Ore Beneficiation chinese magnetite beneficiation problems and causes. the reserve of magnetite ore occupies a large rate in the iron minerals of china, about 48.8 . it is significant. Also known as red hematite ore of its chemical formula is Fe2O3, which is a weakly magnetic iron minerals, magnetite floatability than good, one of the main raw material is iron. The main mineral processing technology have re-election, and strong magnetic separation or flotation process and use a variety of mineral, and there have been post-low. Hematite ore magnetic concentration hematite ore magnetic concentration good news bible concentration process hematite and magnetite sep iron ore is most often found in the form of hematite and magnetite that makes the iron extraction process much less. 1000tpd Magnetite Iron Ore Beneficiation Line . Magnetite Iron Ore Processing Plant. Drying magnetite in wet separation processry ore magnetite crushing magnetic concentration plants, russia iron ore dressing beneficiation plants, russia grinding mill aug 6, 2012 hematite iron content of up to 70 and can be a large number of some plant by gravity separation. chat online Dry Magnetic Separation Of Iron Ore Process. Hematite ore magnetic concentration Hematite Wikipedia the free encyclopedia Hematite also spelled as haematite is the mineral form of ironIII oxide Fe2O3 one of several iron oxides. Process Hematite And Magnetite 88 Views Find the Right and the Top concentration of ore hematite process Iron ore beneficiation plant for concentration. A handbook on hematite beneficiation,beneficiation of hematite vs magnetite rock crusher,beneficiation of iron ores ispatguru,beneficiation of magnetite ore with some hematite,concentration process hematite and magnetite,difference between beneficiation and ore dressing,difference between gravity separation. May 09, 2016 To develop a flowsheet for separation of high grade titanium-rutile from ilmenite, that will meet market requirements. Rutile has a SG of 4.2, hardness 6.0 to 6.5 and is non-magnetic while ilmenite has a SG of 4.5 to 5.0, hardness of 5.0 to 6.0, and is weakly magnetic. Keywords Beneficiation, BHQ, Gravity concentration, Magnetic separation, Reverse flotation. INTRODUCTION India’s iron ore reserve is around 25,249 million tonnes (MT) apart from Banded Hematite- Quartzite (BHQ) and Banded Hematite Jasper (BHJ) and occupies sixth position in the world iron ore reserves.[1, 2] Although India is blessed with. Aug 31, 2020 Hematite beneficiation technology. 08-31-20 403 Views icon 0 Hematite beneficiation technology . With the rapid economic development, the iron ore resources of the concentrator are decreasing year by year, and the degree of lean, fine and heterogeneous of selected ore is obviously increasing, the supply conditions are becoming and demanding, the. Dec 24, 2015 The hematite itself is magnetic, so the hematite beneficiation process using gravity separation, magnetic separation and other operations to remove most of the impurities. However, in the process of iron smelting, sulfur, phosphorus, quartz and other impurities content has a specific requirement, so the magnetic separation of hematite beneficiation is usually added to reduce the. Hematite separation process is suitable for complex structure hematite such as hematite and impurities with uneven distribution of particle size, ore with large content of fine particle, ore with small amount of magnetite and the gangue minerals containing quartz or kaolin. Beneficiation Of Haematite Iron Ore. Beneficiation process of iron ore hematite dry separation. hematite iron ore roasting for beneficiation . hematite beneficiation process for iron ore processing 183 apr 3, 2014 iron ore is a mineral which is used after extraction and processing for the the main ores of iron usually contain fe2o3 70 iron, hematite or fe3o4 a typical flow sheet for iron ore. Aug 18, 2019 This article discusses the effect of physical and chemical modifications of starches on the anionic and cationic flotation of silica from oxidized iron ores and magnetite-taconite concentrates, and the results of the interaction of starch, pH, and calcium ions on the flocculation, clarification, and filtration of iron ore slimes and magnetite- taconite tailings. Philippines magnetic separator for hematite concentration. Chromite Ore Plant Using Gravity Separation. Hematite ore magnetic concentration cookprocessor hematite ore magnetic concentration iron ore wikipedia 2019-1-16 the lower-grade sources of iron ore generally require beneficiation using techniques like crushing milling gravity or heavy media separation screening and. Mar 30, 2021 Common hematite iron ore beneficiation processes include froth flotation, magnetic separation, gravity separation and roasting process, which means that the raw ore enters the separation process after passing through the crushing and screening, grinding and classifying stages, and the hematite concentrate is separated by flotation equipment, magnetic separation equipment and. Hematite Concentration From Tailings Of Mineral Processing Plant. Only hematite concentrate with iron grade of can be obtained by roasting operating recovery rate is , iron grade of hematite concentrate obtained by Zenith Company ore beneficiation plant includes magnetic separators and detailed. Iron Ore Beneficiation,Process,Gravity Concentration,Magnetic. Methods of Iron Ore Beneficiation. Hematite magnetic separation machine and beneficiation Hematite Magnetic Separation Technic. Magnetic separation can be processed in either a dry or wet environment, although wet systems are common. Feb 21, 2021 Hematite, however, responds better to the flotation process in iron ore beneficiation than magnetite, so it is the preferred type of ore. It responds best to what is known as gravity separation as well and several types of gravity equipment can be used to refine it, including jiggers, centrifugal separators, and shaking tables. Rotary Dryer for Magnetite Iron Ore Processing hematite magnetite iron ore dry beneficiation plant The top supplying countries are China (Mainland), India, and Australia, which supply 88 , 6 , and 2 of specifications manganese ore jaw Beneficiation Small Scale Gold Washing Plant Applied in Malaysia Gold Mining Project. Jun 28, 2018 For that reason, hematite ore is important for many mining companies.As Australia’s Magnetite Network explains, “[d]irect shipping ores, when. May 01, 2014 In China, most reserves of rich iron ores have now been depleted and sustainable development of low-grade iron ores has become a critical discussion topic in the mining industry today. The aim of this study was to evaluate the applicability of beneficiating a low-grade, hematite-magnetite ore (assaying 18.64 Fe) for subsequent utilization. In this study, process mineralogy and beneficiation. The principal separation in iron ore beneficiation, therefore, is between the iron minerals, hematite and or magnetite, and silica, principally in the form of quartz. The use of flotation, either alone or in combination with magnetic separation, has been well established as an efficient method for rejecting silica from these iron ores. Paramagnetic iron minerals such as magnetite and hematite . Goethite is typically the main component of many iron plant reject streams due to its weak magnetic properties . In the absence of further downstream processing for the reject streams from magnetic concentration. Physical Beneficiation 2013 - saimm. beneficiation as well as pre-concentration for PGM-bearing UG2 ore. Magnetic separation is key to the success of DMS by ensuring efficient recovery and magnetic separation (low intensity for magnetite and high intensity for hematite). Acids and their soaps are superior collectors for hematite flotation and among these, sodium oleate is the best collector. Rietz , Kihlstedt and Kivalo et al. have demonstrated the successful use of tall oil in hematite flota-tion. Although the interest in the beneficiation of hematite ores by flotation. Mar 10, 2021 Hydrothermal quartzite hematite and limonite are often inlaid in-uniformly and are separated by a combined process consisting of gravity separation, strong magnetic separation, and flotation. Commensal iron ore Single commensal iron ore The single commensal iron ore is mainly combined with hematite and magnetite or magnetite and siderite. Spiral separator for coal slime is widely used for coarse coal clime treatment in coal preparation plant, especially suitable for 2mm-0.1mm coarse coal slime separation in thermal coal preparation plant. Concentration. High-efficient Thickener Thickener Tilted Plate Thickener Project Cases. Tel +86-631-5781196. Classifying Screening. Solutions Feldspar ore beneficiation Limonite Beneficiation Magnetite Beneficiation Hematite Beneficiation Kaolinite Ore beneficiation. Successful Cases In Asia In Africa In European In South America.
<urn:uuid:8fcf1c9a-2f08-48c0-b36a-eb09a5908498>
CC-MAIN-2021-39
https://www.rakeshkumarsunilkumar.in/ore-beneficiation-equipment/17696.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057225.57/warc/CC-MAIN-20210921161350-20210921191350-00291.warc.gz
en
0.867145
2,067
2.703125
3
Looking for some variety in the arts and crafts department? Or some new ideas to keep kids busy this summer? Try these easy art projects that use common and inexpensive materials. 1. Foil Relief Begin by drawing your design with tacky glue on a cardboard square to create a raised design that will show through the foil. After the glue is completely dry, apply a glue stick to the back of a piece of foil larger than your cardboard square. Gently press the foil to the design, being careful not to puncture the foil. Use a cotton swab to get into the creases and tighten the foil around the glue so that the raised design shows more prominently. You can add extra detail by using a pencil to carefully etch further designs on the portion of the foil that is not raised. Use a sponge to apply paint to the foil. 2. Toilet Paper Roll Art There are some cool designs you can create by cutting toilet paper rolls into ½ inch thick strips, keeping the ends intact so you have a bunch of small circles. At this point, you can paint each of the circles a different color with basic acrylic paints. Arrange them how you like by keeping them in circles, bending them to create ovals, or cutting them to create spirals. Once you have a design you like, hot glue the pieces together. 3. Salt Relief Salt relief projects are easy for even toddlers, and they produce an amazing finished piece. On a piece of black construction paper, or black painted cardboard, create a design with white glue. While the glue is wet, pour table salt on top of the design. Shake off the extra salt and grab your watercolor paints and a small paintbrush. Lightly touch the salt with the wet brush and watch as the color expands. 4. Magazine Art With the vibrant colors from the pages of magazines, you can create relief style art easily by rolling pages or folding them. You can make beautiful butterflies jump off a canvas by painting a canvas white or black, then take various sizes of magazine pages and fold them accordion style. Once folded, connect a larger piece and smaller piece by tying them together in the middle with a small piece of string. Trim the edges with scissors to resemble wings. Using a small pin, push it through the center of the butterfly and onto the canvas where you would like it placed. 5. Melted Crayons Line up crayons in the colors you want along a canvas and glue them down with tacky glue. When it dries, tilt the canvas at an angle and aim a hairdryer at the crayons. Allow the them to melt down the canvas until you have the design you want. Be extremely careful since the wax can spray or go in places you do not intend. Afterwards, allow it to dry, add embellishments, and enjoy! Lay cheap plastic beads in a single layer in ceramic dishes or metal pans. Place in a 400 degree oven until they are melted, about 20 minutes. Once the beads are cool, remove them from the pan and drill a hole in them to hang. 7. Lace Resist Painting Place a piece of lace on paper, then spray over with Krylon’s clear gloss finish. Remove the lace and allow the finish to dry. Afterwards, begin painting with watercolors on the paper. The gloss will resist the watercolor paint, leaving a white area resembling the lace.
<urn:uuid:2101e12c-0940-4cb3-8b27-bc983336e956>
CC-MAIN-2016-40
http://yofreesamples.com/money-saving-blog/7-cheap-and-easy-art-projects/
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660931.25/warc/CC-MAIN-20160924173740-00030-ip-10-143-35-109.ec2.internal.warc.gz
en
0.926491
705
3.15625
3
President Nancy Pelosi? Here’s how A bit of history Early in our nation’s history presidential succession presented some problems. The original act of 1792 had the Senate president pro tempore and Speaker of the House in the line of succession. In fact, before the Electoral College was set up, the President and Vice-president could be from different parties as happened to both Adams and Jefferson. The modern succession was set in 1947 with the Vice President succeeding the President and putting the Speaker of the House third in line. Michael J. Glennon in a Washington Post article is arguing Speaker Nancy Pelosi could end up President. Here’s his thinking: If it proven that Donald Trump gained the Presidency through fraud or corruption, then even if Vice President Mike Pence did not know or precipitate in that, it follows that his election is also the result of that same fraud and corruption. We already know the Russians interfered in the election. What happens if it is determined that Trump and his campaign actively colluded with the Russians to become President? Keep in mind that after Chris Christie was pushed aside Pence was the head of Trump’s transition. Glennon isn’t the only one speculating that Pence could also be impeached. Googling “could Pence be impeached” results in over six million hits. It would be wrenching to impeach both Trump and Pence, but would it be any more upsetting that the last two years?
<urn:uuid:bba4cccc-8851-4307-842b-68d4b0ad067c>
CC-MAIN-2019-43
https://www.bluenelson.org/blog/2019/1/24/president-nancy-pelosi
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986677412.35/warc/CC-MAIN-20191018005539-20191018033039-00319.warc.gz
en
0.975143
306
3.125
3
Tests Offered (click color name below for more information): MC1R - Mask - Grizzle (E locus/Cream)| Agouti | Brown (Chocolate/Liver) | Dilute (Blue) | Dominant Black(K locus)| Harlequin |Piebald, Parti or Random White Spotting |Coat Length, Curl, Furnishings and Improper Coat | Natural Bobtail Mammals have two pigments that are the basis of hair color: eumelanin (black) and pheomelanin (red or yellow). The gene involved in the production of these pigments in many species including dogs is Melanocortin 1 Receptor (MC1R) which is also called Extension. Other genes modify these pigments to produce the variety of colors and patterns found in the domestic dog. The Brown gene, Tyrosinase-Related Protein 1 (TYRP1), is a modifier that dilutes black pigment to brown but does not affect red pigment. Other genes involved in dog coat color include Agouti (ASIP) which organizes the distribution of black and red pigments, Beta-defensin (CBD-103) which is unique to dogs and responsible for dominant black (K locus), and Dilute (MLPH) which dilutes black and red pigments. Other genes that add white patterns and dilute colors are also present in dogs but are specific to certain breeds. Below are expanded descriptions of the genetic tests offered by the Veterinary Genetics Laboratory for dog coat color.
<urn:uuid:0222538f-29d6-488f-9a45-193b7766fece>
CC-MAIN-2015-40
http://www.vgl.ucdavis.edu/services/coatcolordog.php
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737913039.71/warc/CC-MAIN-20151001221833-00086-ip-10-137-6-227.ec2.internal.warc.gz
en
0.90853
326
2.984375
3
In middle school, preschool, and pee wee leagues, the goalkeeper is often the forgotten player. As important as a position it is, not enough attention is given to this huge responsibility. Here are a few tips a youth coach can use, even if he’s not experienced in goalkeeping, to improve goalkeeper play without taking time away from training the positional players. If you’re the coach, you can tailor these drills and ideas to children of any age. Obviously, the goalkeeper’s main function is to prevent the ball entering his team’s goal. How he does it doesn’t really matter as long as he succeeds. Some goalkeepers like the spectacular and acrobatic looking methods while others prefer to be less eye-catching. Nevertheless, correct positioning by the goalkeeper will put him in the best area to deal with every situation. The goalkeeper should take up a position on what is called the ‘bisector’. Draw an imaginary line from the ball to both the posts, now another line from the ball to the center of goal. This line, which equally divides the first two lines, is the ‘bisector’. This puts the goal¬keeper in a central position allowing equal space on both sides. If the goalkeeper positions himself on this line he is giving himself a chance to make a save on either side with a minimum amount of movement. Although this principle should be applied when a direct shot is threatening, he must deviate from it in certain situations. When the ball is out on the flanks the goalkeeper should position himself closer to the far post in readiness to collect balls crossed into that part of the goalmouth. He should also be prepared to move forward quickly to deal with balls played into the near post area. When the ball is moved from the flanks closer to the goal, the goalkeeper should gradually move forward towards the near post because the danger of a direct shot is gradu¬ally threatening. Here’s a basic practice drill that can go a long way in strengthening goalie skills. Groups of three players can help the goalkeeper with this technique. The first player with a ball runs at and commits the second player about 25 yards out from the goal. The goalkeeper’s position must be on the ‘bisector’ in preparation to deal with a possible shot. As the attacking player commits, the second player passes the ball out to the third player on the wing. According to how the ball is played the third player can now do one of two things. If the ball is played short he can bear in at goal and shoot. If the pass is longer then he can cross for the attacking player to head at goal under pressure from the defender. The goalkeeper must be aware of these situations and react quickly. The younger the player the less he’ll be able to be aware of his surroundings. Children of pee wee age might not even have the attention spans to fully know what’s going on all over the field. That’s ok…simply teach a kindergarten age player, or younger, one concept and take it from there. As a coach, stop the play in order to check the keeper’s position. When play is deep in the opponent’s half, the goalkeeper should be encouraged to be about 12 yards out from goal, prepared to move forward to intercept long through-balls. As the play nears an area from which it’s possible for a direct shot, then the goalkeeper must retreat closer to his line in order to reduce the danger of a ball chipped over his head. During this period his attention should be focused on the ball and the movement of opponents. Once the goalie leaves the goal-line he may have problems orientating himself. He may not be able to assess his own position in relation to the goal without looking back, which is a dangerous thing to do. When standing on the goal-line between the posts he can see them peripherally while still concentrating on the ball and players. Once he moves forward, this is no longer possible, so he must find other methods. Encourage a goalie to find landmarks to use to position himself. The corners of goal area, the penalty spot, the corners and arc of the penalty area are all useful visual aids to help a goalie know where he is once he’s out of the goal. Situations change very quickly in soccer, especially around the box, so a goalie must get used to changing position with the situations without taking his eyes off the ball and the general movement. Goalkeeping is full of problems in positional play, but thought and practice, together with experience, will help a young player learn how to cope with them. Need, Develop into successful at soccer! You need good work ethic. You need to train hard, and focus on your play. It has the power to transform lives, the power to bring a lifetime of joy.
<urn:uuid:fea9e3e0-d6d4-4551-af53-e23208470b9a>
CC-MAIN-2023-14
https://www.surefiresoccer.com/basic-skills-for-the-goalkeeper-on-your-team/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943483.86/warc/CC-MAIN-20230320114206-20230320144206-00201.warc.gz
en
0.973306
1,009
2.9375
3
Problem: Two trains of equal length L,travelling at speeds v1 and v2 miles per hour in opposite directions,take t seconds to cross each other .then L in feet is: Total distance required to cover by one train is 2L. By considering one train at rest then speed of other train is v1+v2. converting into feet we get L = 11(v1+v2)T 15
<urn:uuid:e188fcb1-c849-45d4-b079-d936a187dd46>
CC-MAIN-2018-17
https://www.cheenta.com/tomato-8/
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948126.97/warc/CC-MAIN-20180426105552-20180426125552-00301.warc.gz
en
0.862326
92
3.171875
3
Story URL: http://news.medill.northwestern.edu/chicago/news.aspx?id=214271 Story Retrieval Date: 4/17/2015 11:24:09 AM CST Stock photo from Stock.XCHNG Soil after a corn harvest is susceptible to erosion and compaction. Cover crops are a sustainable option that provide both protection and Cover crops thrive in times of drought Planting cover crops as a sustainable alternative to conventional corn and soybean rotations increases soil health and benefits the environment. A warming planet and a drought that prompted the Department of Agriculture to declare the Grain Belt a natural disaster area has accelerated environmental and ecological awareness among Illinois farmers. One sign of this is renewed interest in cover crops. “Cover crops are undoubtedly the hottest topic in agriculture right now,” said Russel Higgins, a commercial agriculture educator at the University of Illinois Extension. “They’ve been around forever but people have just started talking about them in the last couple years.” Cover crops are planted after the harvest of principal cash crops such as corn and soybeans in order to improve soil quality and fertility, reduce erosion, and suppress weeds and pests. The most common types of cover crops include legumes such as alfalfa, crimson clover, and hairy vetch, a nitrogen-fixing flowering plant. Others include brassicas such as radishes and turnips, and grasses such as annual ryegrass and wheat. A study released in July by the Leopold Center for Sustainable Agriculture found that adding diverse cover crops to a corn-soybean rotation could provide higher yields, reduce the need for fertilizer, herbicide and fossil fuel inputs, and protect nearby waterways from pollution. The environmental benefits of cover crops improve over time, the study concluded. The Illinois Department of Agriculture has been working on promoting cover crops since 1988, according to Mike Rahe, the department coordinator. “We currently offer cost share assistance through the Partners for Conservation program,” Rahe said. “It helps farmers pay for cover crop seeds with up to $40 per acre for 40 acres or a maximum of $1,600.” Assistance programs for cover crops exist at the federal level as well, but considering the potential risk involved in changing farming practices, the incentives may not be enough. “One challenge is that biology-based activities like the amount of nutrients recycled or the amount of organic matter created are hard to measure,” Higgins said. “So what we are trying to do is hopefully put numbers there.” Ron Moore owns a family farm with his wife and three sons in Roseville, Ill., where they grow corn and soybeans on 2,000 acres. Moore said he was planning to implement cover crops last year but because of circumstances related to dry weather, it did not work out. “I’ve just started investigating cover crops and their benefits,” Moore said. “The ultimate goal is increased productivity, increased yields, increased water penetration and decreased costs of herbicide.” Moore said that he is planning to try planting cover crops again this year. But a large number of Illinois farmers remain reluctant to adopt them. “Farmers are afraid of not knowing enough,” said Mike Plumer, an independent agricultural consultant who has done extensive research on cover crops with the University of Illinois. A lack of information won’t be a valid excuse for long. Research on cover crops and efforts to educate farmers in the form of seminars, surveys and promotional activities have become widespread. Cost is another reason some have been slow on the uptake, according to Higgins. Cover crop seeds cost about $25-$40 an acre in seed, which can quickly add up considering the average farm in Illinois is 368 acres. “What farmers need to do is see there will be a return,” Higgins said. “Increases in yields and improved soil quality? That makes it worth while.” A typical plant-to-harvest period for corn in Illinois is mid-April to mid-November; for soybeans, it is early May to early November. Cover crops are planted in the off-season time when the land would otherwise lie fallow and are plowed down before spring planting. “Cover crops promote deeper rooting throughout the winter time,” Plumer said. “When you increase organic matter, you increase the water holding capacity so a crop can penetrate its roots much deeper.” Plumer said he measured Illinois corn roots this year at 22 inches deep compared with a healthy crop that should reach at least 60-70 inches. “The soils I review around the Midwest have severe compaction and degraded organic matter,” Plumer said. “This makes them more subject to severe weather conditions.” Soil compaction occurs when the air between soil grains is displaced, making it difficult for the ground to absorb water and susceptible to runoff and erosion. Organic matter holds water and nutrients in soil, reduces compaction, and increases water infiltration. The problem, experts say, is Midwestern soil is slowly being drained of its nutrients after decades of non-varied, chemical-heavy, subsidy-driven farming practices that are beginning to feel the heat of climate change. NASA released 2012 temperature statistics last week as part of its finding that the climate is undergoing a long-term warming trend. The statistics indicated that 2012 was the ninth warmest year since 1880 and that with the exception of 1998, all nine have occurred since 2000. Based on this trend it is reasonable to assume Illinois could be seeing higher temperatures and less water in coming years. Cover crops, though not considered a cure-all, could help make soil better able to sustain crops during a drought. “If you have bare soil and a blazing sun, you’ll lose evaporative moisture and if you have a crop on that, you won’t lose as much,” Higgins said. The modern agricultural subsidy programs of today were introduced in the New Deal, enacted by President Franklin D. Roosevelt in response to the Great Depression. These programs have evolved into a system that rewards the production of massive quantities of a select few crops, particularly corn and soybeans – Illinois’ top two agricultural commodities. From 1995-2011 Illinois received nearly $12.5 billion in subsidies for corn alone, according to the Environmental Working Group’s 2012 farm subsidy database. Soybean subsidies in Illinois for the same period totaled $3.8 billion, wheat subsidies came in at $704 million and the total amount that Illinois received in agricultural subsidies was $19.7 billion. Every five years or so the government passes a bundle of legislation commonly called the “farm bill.” While it has thus far done little to reduce farmers’ dependence on the subsidized, big-ticket crops, Congress is currently discussing a 2013 farm bill, which many hope will reflect and meet the challenges posed by climate change. Advocates of sustainable agriculture are urging policymakers to see healthy soil and land, not the quantity of crop reaped from it, as the best investment and what farmers should be rewarded for. Planting cover crops could be a good place for farmers to start. “It’s something we need to be looking at and thinking about,” Moore said. “Farmers need to experiment with it for a year or two to see if it’s advantageous.”
<urn:uuid:2cacfb14-383a-4280-83d5-23c3b6a8c6f0>
CC-MAIN-2015-35
http://newsarchive.medill.northwestern.edu/chicago/news-214271.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645261055.52/warc/CC-MAIN-20150827031421-00342-ip-10-171-96-226.ec2.internal.warc.gz
en
0.957987
1,557
3.234375
3
by Dr. Sameer Ambar Although hypertension (also referred to as high blood pressure) is most common among adults, parents should be aware that children and adolescents are not spared from this condition. In fact, cases of pediatric hypertension are on the rise each day, so, as parents, you need to have your children’s blood pressure checked, pay attention to possible underlying causes of high blood pressure, and learn about the most effective treatment. I am seeing a lot of High School children having hypertension or high normal blood pressure. I have seen almost 30 to 35 children in the past 6 months and was surprised to see Blood pressure of 8th std child 180/100 mmm of Hg. There are some alarming facts. Most common history was the mobile addiction and sleep deprivation. Students used to sleep at 3 am and get up at 8 am. They had repeated habits of checking alerts and messages late at night. This is the worst epidemic we are facing. Mood changes and rage due to social media posts, videos, games etc plus sleep deprivation is disturbing their biological clock and hormonal balance. In addition, the high salt content of packaged food and junk food is adding to this chaos. Reduced physical activity and childhood obesity are the other important factors. Having Hypertension at this small age is serious, it can lead to early heart, kidney and eye problems. Signs and Symptoms: Children with hypertension don’t usually show signs or experience symptoms, but there are instances when your child might feel Dizzy, experience headaches and start vomiting. Other children may feel fatigued and have mood swings. Management and Treatment For starters, you need to assist and motivate your child in making lifestyle changes. This may mean that you will have to follow the changes as well. Regular exercise and a healthy, balanced diet should always be in place. Weight loss is also important for children and adolescents who are overweight. Help your child control high blood pressure by following the doctor’s plan carefully. Limit the amount of time your child spends using the mobile and watching TV. Make changes to diet and exercise a family affair. Make sure your child has his or her blood pressure checked as often as recommended by your child’s doctor. Reduce salt intake More fruits and vegetables Limit screen time More play time indoors and outdoors Person to person interaction More family time So parents beware before you give electronic gadgets to your child Encourage physical activity and healthy food habits About the Author: Dr. Sameer Suresh Ambar MD,DM,FACC is a Belagavi based Interventional Cardiologist practicing since 2007 and attached to JNMC as an Associate Professor of Cardiology & Interventional Cardiologist at KLE’s Dr. Prabhakar Kore Hospital and Medical Research Centre. He also consults at Sparsh Superspeciality Clinic.
<urn:uuid:6451952d-8b42-4754-b44f-0a75d39a1404>
CC-MAIN-2019-09
https://allaboutbelgaum.com/lifestyle/hypertension-in-school-children-dr-sameer-ambar/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249550830.96/warc/CC-MAIN-20190223203317-20190223225317-00112.warc.gz
en
0.952775
595
2.6875
3
The scientific name for yeast that causes vaginitis is Candida. More than 90% of vaginal yeast infections are caused by species known as Candida albicans. Other Candida species make up the rest of the yeast infections. Candida species can be present in healthy women in the vagina without causing any symptoms. In fact, it is estimated that 20% to 50% of women already have Candida in the vagina. Take the candida quiz to find out if you have a mild, moderate or severe candida. Your Body - The Candida Host What people generally fail to realize is that the bacteria in your body literally use it as a host environment . Their need to survive is just as strong as yours and, in many ways, their basic motivation for surviving wind and tide is, because it's not influenced by factors social, more primitive and targeted. In addition, at least two countries reported outbreaks of C. auris infections affecting more than 30 patients. Although yeast infections can occur on almost any part of the body, they are more common in the vagina because there is already a natural mixture of yeasts living inside. They usually develop from the use of antibiotics - which inadvertently kills the immune cells that control yeast populations - as well as from pregnancy, uncontrolled diabetes. and taking oral contraceptives. Yeast infections are not considered a sexually transmitted disease. In men - especially uncircumcised men - yeast infections can cause a rash on the head of the penis. Yeast that accumulates in the mouth or throat is called oral candidiasis or thrush. Oral yeast infections occur when there is a change in the normal balance of microbes in the oral cavity, leading to a proliferation of yeast. Taking antibiotics, for example, can kill beneficial bacteria that prevent yeast from proliferating. Once again your immune and detox systems are under tremendous pressure. Yet, all the time this happens, because of the way we live today, we actually help the Candida survive. As I mentioned earlier, whether it's sugars or medications, household products or cosmetics, all of this will weaken the immune system that has to fight Candida or feed itselfing the Candida itself. What we are doing right now is not treating Candida but helping it to thrive. If your vaginal symptoms are not typical of a vaginal yeast infection, your doctor may look for signs of yeast or other organisms using a vaginal fitting test. You may have other tests if you have severe or recurring vaginal yeast infections, such as Although a yeast infection may be detected during a routine Pap test, this type of test is usually not used to diagnose vaginal infections. infections. They can colonize organs, your brain, any place that can have a weakened environment, making it an easy target to colonize. Depending on where these weaknesses are, Candida produces different symptoms as it colonizes different areas in each person. Since they do not need oxygen, they can get out of the circulation system to places where the immune system, herbs and other Candida killers can not access. The first thing you need to understand is that Candida is hungry for certain foods. Like all yeast, it will thrive and barise on particular foods and, at least at the beginning, you will have to deprive the mushrooms of its food sources. In this section, I explain not only why you need to deprive Candida, but also talk in detail about nutrition. In fact, I explain it with so much detail that this section of Candida Crusher is bigger than many books on Candida are in total - and certainly more than most of the electronic books you'll find on the internet today. hui. Changes can take a long time - some come in 30 days or less, some much later - but according to Dr. Bate, the improvements are cumulative and sustainable. In one way or another - the soundtrack is relaxing - similar to the sound of ocean waves - with 5 to 7 layers underneath that cause a specific modification in the models of the ocean. cerebral waves SMR. Among the other benefits, the increase in SMR brainwaves leads to a more relaxed concentration and improves the attentive abilities. Fermented foods - including dairy products such as kerif or yogurt, kombucha and vegetables - allain probiotic microflora that help protect the intestines, improve the immune system and fight against yeast. Probiotics are "good insects" that compete with harmful pathogens in the body. The right kind of bacteria that live in your body and on your skin are essentially competing with yeast Candida for the available sources of "fuel". Yeast Infection Symptoms During Pregnancy – Good Health 24h Yeast occurs naturally in the vaginal area. Yeast thrive in warm and moist parts of the body and …
<urn:uuid:a7d60937-fdae-4873-bcae-a9c20031be26>
CC-MAIN-2018-34
http://homeremediesyeastinfections.com/signs-of-a-yeast-infection-when-your-pregnant/
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221212768.50/warc/CC-MAIN-20180817182657-20180817202657-00627.warc.gz
en
0.94747
964
3.171875
3
Have you experienced shooting pain in your mouth when eating or drinking? Do your gums look swollen from an infection? These and other symptoms may signal substantial tooth decay that has reached a nerve in your tooth. A root canal may be the treatment that can cure the infection and prevent loss of the tooth. - A Root Canal is a specialized treatment - It may require 2 visits over 2-5 days - Your tooth may or may not be saved The much maligned root canal is a blessing when tooth decay causes an infection in the nerve of a tooth, causing excruciating pain. A root canal is generally performed by an endodontist who has specialized training in treatments that focus on the nerves or pulp that are in teeth. Without treatment, the tissue surrounding the tooth will become infected and an abscess may form. Signs a Root Canal may be required The following signs may indicate a root canal is needed: - Tooth sensitivity that lingers - Sharp pains when chewing or biting - Chipped or cracked teeth - Swollen or painful gums - Deep decay or darkened gums Procedure for a Root Canal An x-ray is taken to determine which teeth require this treatment. Before the root canal treatment begins, a local anesthesia is given to numb the pain. Once the mouth and jaw are numb, the endodontist will drill the decayed tooth removing the pulp while leaving as much of the tooth intact as possible and the inside of the tooth is then cleaned. (The pulp is the soft area within the center of the tooth.) To keep the area dry and free of saliva during the treatment, a rubber dam (a sheet of rubber) is placed around the tooth. As the work is done, water will be sprayed into the mouth area to ensure any debris is flushed away. The nerve canal can then be cleaned out and is it then packed with a synthetic material. Once this is done the treatment is then complete If there was an infection, your dentist may put a medication inside the tooth to clear it up first before filling or your tooth may be sealed the same day it is cleaned out. If the root canal isn’t done on the same day, a temporary filling is placed in the exterior hole in the tooth to keep out saliva and food between appointments. After a root canal, your mouth will be numb for a couple of hours. Most people can go right back to work or other activities. You may want to wait until the numbness is gone before eating. For the first few days following the completion of a root canal, the tooth may feel sensitive due to tissue inflammation especially if there was pain or infection before the procedure. Postcare Instructions for Root Canals Until your root canal procedure is completely finished with either a permanent filling or crown, try to avoid chewing with the tooth. This helps keep the area clean and may prevent a fragile tooth from breaking before it can be fully restored. Brush, floss, and use a mouthwash as you regularly would and see your dentist at normally scheduled intervals. Take the next step with us Need more information? Or ready to take the next step? Click on one of the icons above to request a Quote today!
<urn:uuid:a5ca5b9f-ce72-49d7-8291-4bd485693432>
CC-MAIN-2022-05
https://gorgeousgetaways.com/cosmetic-surgery-procedures/cosmetic-dental-procedures/root-canals/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304959.80/warc/CC-MAIN-20220126162115-20220126192115-00189.warc.gz
en
0.941389
670
3.28125
3
Written by A O’Neill DO BED BUGS HAVE NATURAL PREDATORS? The resurgence of bed bugs since the 1990s has caused untold misery to many people. With their resistance to many insecticides and their ability to stay hidden and feed without being noticed, it would seem they are masters at escaping death. But even bed bugs have some natural predators. So what eats bed bugs? 1. MASKED HUNTER The masked hunter (Reduvius personatus) is commonly known as the “masked bed bug hunter” and belongs to the assassin bug family. The masked hunter originated in Europe but can now also be found in the US and Canada. They will happily eat bed bugs, and luckily they don’t feed on humans but they will bite if they are mishandled or feel threatened. The chances are you will not see them in your home as they are nocturnal and prefer to live outside, but if you do notice a large number of them, then this might indicate an insect problem as they’ve come in to feed. The adults are noticeable as they are dark brown to black in color and about 3/4 inch in length with wings. This bug gets its name as the masked hunter nymph uses its sticky hairs to attach household dust and lint for camouflage. So unlike the adult, the nymph is barely noticeable. Pharaoh ants (Monomorium pharaonis) are identified as the top species of ant to eat bed bugs. They also eat grease, candy, soap, and lots of other stuff really. Pharaoh ants are not native to the US and are from the tropical regions of Africa. They only nest indoors and their nests can be difficult to locate and treat. Other species of ant that can eat bed bugs are Argentine ants and red imported ants. The house centipede’s (Scutigera coleoptrata) diet consists of eating bed bugs, as well as spiders, sowbugs, millipedes, and any other arthropod that is in its path. They like damp conditions such as the sink area and basements and are usually seen in homes in the spring and summertime. Centipedes are not interested in humans as a food source so a bite from a centipede is unlikely. Common household cockroaches are filthy pests that you don’t want in your home even if they are known to eat a few bed bugs. Cockroaches are active at night and tend to be found scurrying around in kitchens whereas bed bugs are found in beds. So although cockroaches are bed bug predators, they are definitely an unwanted pest in our homes. Thanatus flavidus is a species of spider that has been documented hunting and eating bed bugs. It is found in Greece, Russia, and Ukraine and there has even been a petition to introduce this spider into the US to control bed bug populations. No doubt most people will not sign this! There are also the larger spiders such as Wolf spiders, jumping spiders, and running crab spiders that kill and eat bed bugs. Bed bugs can be seen in spider webs when the infestation is heavy and been left to grow. 6. KISSING BUGS Kissing bugs also belong to the assassin bug family. They are also known as vampire bugs or cone nosed bugs. Kissing bugs can be found in the southern US states, Mexico, Central America, and South America. Although these are bed bug predators, they would be more unwelcome than bed bugs. Like bed bugs, they feed on blood by biting your face (usually around the mouth area) at night and can spread serious diseases and infections, such as Chagas disease. ARE NATURAL ENEMIES OF BED BUGS THE ANSWER? Although the above are natural predators of bed bugs, the majority are not what you want in your home and they would be far from effective in reducing a bed bug infestation. Treating a bed bug infestation as soon as possible is vital, and will also help prevent some of the above insects from invading your home to feed on the bed bugs.
<urn:uuid:c250a506-9c15-4aff-b0d0-c0d87c653397>
CC-MAIN-2021-10
https://www.peststopsolutions.com/what-eats-bed-bugs/
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178357984.22/warc/CC-MAIN-20210226205107-20210226235107-00602.warc.gz
en
0.962083
878
2.53125
3
A Great, Rotten Idea - Adapted from Recycling Study Guide, by Hallowell et al., Wisconsin Dept. of Natural Resources to Trash Goes To School - GRADE LEVELS: - SUBJECT AREAS: About 30% of our solid waste is valuable biodegradable material that can be used to improve soil. To have students investigate the pros and cons of composting. leaves or food scraps microscope or hand lens decomposition, biodegradable, fungi, bacteria When we mention "recycling," we often think of recycling glass bottles, aluminum cans, and newspaper. But another 30% of the household garbage we throw out also can be recycled. These recyclables are food scraps, leaves, grass clippings and other biodegradable organic wastes. Organic waste can be recycled by composting. Simply stated, composting creates optimal conditions for decomposition to occur. Decomposition is the biochemical process by which bacteria, fungi and other microscopic organisms break organic "wastes" into nutrients that can be used by plants and animals. Decomposition occurs in nature whenever a leaf falls to the ground or an animal dies. The results of decomposition in a compost pile is a nutrient-rich humus that is excellent for improving soil quality and plant growth. 1. Define: recyclable, biodegradable. List items that are recyclable and/or biodegradable. Discuss: - Are there recyclable materials that aren't biodegradable? (e.g., aluminum.) Are there biodegradable materials that aren't recyclable? (e.g. food scraps). - 2. Feel, smell, and look at the rotting log, grass clippings, leaves or food scraps. What words would you use to describe these materials? List these words. Do the words have positive and/or negative connotations? Why? - 3. Explain what is happening to the rotting material. Discuss: - What is the natural process that breaks biodegradable material into particles that can be used again by plants and animals? (decomposition) - What organisms assist in this decomposition process? (fungi, bacteria, earthworms, springtails, mites, etc.) Take a look under a microscope to find out what you cannot see with the naked eye. - What will your rotting material finally - 4. Imagine a world where decomposition doesn't take place. Discuss: - What would happen to organic materials like dead animals, leaves or sewage? - Could plants and animals survive if decomposition didn't occur? Why or why not? - Is decomposition important? Why? - 5. List items you throw away that are - How might you and your family recycle - What is composting? Why do you think people compost household organic wastes? - 6. What are some benefits of composting household food and yard wastes? For example: - - doesn't require the purchase of expensive plastic bags often used for disposing household and yard wastes. - - saves the cost of transporting wastes to and handling wastes at the landfill or incinerator. - - reduces pollution from landfill (leachate and methane gas) or incinerator. - - creates nutrient-rich humus you can use to improve the texture of your yard and garden soil; saves money you might spend on mulch. - 7. What are some possible problems with composting? What suggestions do you have for solving the problems? For example: - It's too much work. (Mowing the lawn and washing the car are work, too, but we choose to do these activities because they're satisfying - so is composting! And composting has a positive impact on the environment, which can make us feel good.) - You'd have to run outside everytime you eat an apple or peel a potato. (Just place the scraps into a plastic container with a lid. Keep the container in or under the kitchen sink, then take the waste to the compost pile whenever the container is full.) - There's not enough space. (Share a compost pile with neighbors, and encourage the town to collect and compost yard wastes from people who don't have enough space for a compost pile of their own). - Back to top
<urn:uuid:0a3f890c-1138-490a-8cd9-9f2dce640545>
CC-MAIN-2013-20
http://cwmi.css.cornell.edu/TrashGoesToSchool/Composting.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700497024/warc/CC-MAIN-20130516103457-00032-ip-10-60-113-184.ec2.internal.warc.gz
en
0.880436
963
4.09375
4
abstract (object classes) Abstract classes are used to build other object classes, but never for building direct instances of the class. A special abstract class called top is the ultimate superclass of all object classes. To build a class that doesn’t inherit any attributes, you build a class that is a direct subclass of top. ApacheDS (Apache Directory Server) is an embeddable, extendable, standards compliant, modern LDAP server written entirely in Java, and available under the Apache Software License. auxiliary (object classes) You use auxiliary classes to mix and match. An auxiliary class augments the other object classes of an entry without the costs tied to inheritance. The auxiliary class is never involved in inheritance because it is never the super class for a structural or abstract class. Instead, auxiliary classes are explicitly included in an entry rather than included implicitly via inheritance. You use auxiliary classes to add specific functionality to a standard object class without modifying the original object definition. The same auxiliary class may be added to entries with different object classes and this is the most significant advantage of the auxiliary class. In other words, the auxiliary class is not part of a chain of inheritance and you can use it with entries of differing classes. So, which is better: inheritance or Auxiliary class? The main thing to consider is the users who must create new entries. They must explicitly include both object classes unless you have some kind of user interface that abstracts this from them. If you use inheritance instead, they need to include only one object class. With the auxiliary option, problems can occur if a user forgets one of the object classes. If the object holding this attribute corresponds to a person, it is typically the person’s full name. Directory Information Tree LDAP Data Interchange Format Example LDIF file with organizational and person entries: dn: o=burlesontech.com objectclass: top objectclass: organization o: burlesontech.com dn: ou=People, o=burlesontech.com objectclass: organizationalUnit ou: people dn: ou=marketing, o=burlesontech.com objectclass: organizationalUnit ou: marketing dn: cn=Cody Burleson, ou=people, o=burlesontech.com objectclass: top objectclass: organizationalPerson cn: Cody Burleson sn: Burleson givenname: Cody uid: cburleson ou: marketing Object Identifier used to uniquely name each entity in the LDAP schema. The syntax is a string of numbers separated by periods. For example: The string can be of any length and can contain any number of segments. The left-most segments are considered ‘most significant’. An OID can be subdivided simply by adding more segments to the end; the collective group of all OIDs beginning with a specific series of numbers is commonly called an ‘arch’. Since OIDs are hierarchical, your organization can obtain one OID and then branch it as needed. For example, if your organization’s OID was 1.1, you could use 1.1.1, 1.1.2, 1.1.3, 184.108.40.206, etc. A root OID for your organization, a.k.a. Private Enterprise Number (PEN), can be obtained from IANA, the Internet Assigned Numbers Authority. You can typically receive a PEN within a few days after applying online although IANA commits only to a minimum of 30 days. There is a specific arch that is reserved for private use within an enterprise. That arch is 220.127.116.11.4.1. Following the private-OID arch, organizations add their own Private Enterprise Number (PEN) to form a sub-arch that belongs totally to that organization and is globally unique. My company, Burleson Technology Group, has been assigned the Private Enterprise Number 31751, so our LDAP arch is 18.104.22.168.4.1.31751. Thus, if we created any unique entities in our LDAP schema, that’s the arch we would start with. We could, of course, branch it or add to the end, so that OIDs like 22.214.171.124.4.1.31751.1 or 126.96.36.199.4.1.317188.8.131.52 would be valid for our schema. There is a specific arch (184.108.40.206.3) which is reserved by the IANA for experimentation and you can assign OIDs within this arch for temporary purposes, such as testing or for experimenting with your schema while waiting for your permanent PEN. OIDs within this experimental arch are not guaranteed to be globally unique, and therefore should not be published external to your organization nor used for production LDAP directories. OUs are typically used to create a hierarchy of containers within a domain. Only OUs within the same domain can have relationships. OUs of the same name in different domains are independent. Relative Distinuished Name The family name (last name) of a person structural (object classes) Each directory entry (instance) must contain at least one structural class. A structural class always uses inheritance, and it must be a subclass of some other object class. Only structural classes can use inheritance; abstract and auxiliary classes cannot use inheritance. A structural class can be a super class of another object class.
<urn:uuid:16c4d686-587c-48e7-97c2-0a823a6a155a>
CC-MAIN-2019-22
https://codyburleson.com/glossary-of-ldap-acronyms-and-terms/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257920.67/warc/CC-MAIN-20190525064654-20190525090654-00461.warc.gz
en
0.864711
1,159
2.765625
3
School districts throughout New Jersey are forced to make budget cuts, and transportation particularly courtesy busing or non state-mandated busing, is usually targeted. As a result, school districts are reaching out for help with planning so students can safely walk and bike to school when busing is eliminated or reduced. Research was conducted to collect information on cost reductions in school transportation throughout school districts in New Jersey such as changes implemented, effects and reactions from the school community as well as steps taken once busing was reduced. Strategies and recommendations are suggested when courtesy busing is reduced or eliminated. Read the full report: Confronting School Bus Cuts (PDF)
<urn:uuid:eb890a52-7624-43ed-af75-bff74685afab>
CC-MAIN-2020-34
http://www.saferoutesnj.org/confronting-school-bus-cuts/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738573.99/warc/CC-MAIN-20200809192123-20200809222123-00144.warc.gz
en
0.981286
132
2.625
3
There are different forms of government, each with its own particular characteristics. There are some guys who are more bad than others and some are currently on the verge of disappearing. Difference Between Monarchy and Republic Among the forms that we know best are the republic and the monarchy . What type of government is there in your country? Monarchy or republic? If you do not know what to answer because you do not understand the difference between the two systems, continue reading below so that you understand what distinguishes them. REPUBLIC Difference Between Monarchy and Republic The republic is a standard form of government . It is based on the principle that there should be no monarch and that the people who make up the state should be able to choose their own representative. Machiavelli helped define the concept of republic through his work and also argued that this was a better form of government compared to the others. In this system, people can choose someone who represents their interests. People have rights and they are not simply held under one authority. To ensure the rights of citizens, the laws established in the Constitution are followed. As there are no monarchs in the republics, the head of state receives the title of President. If this is also the head of government, the system is known as the presidential system. It is important to have this detail very clear, because within the republic there are different ways of governing. In some States, the main political role is not exercised by the President; but by the Legislative Assembly. In these cases the presidential role is purely ceremonial. These states are known as parliamentary republics and operate in a similar way to parliamentary monarchies where the power of the President is quite restricted. In parliamentary systems, the prime minister is the head of government and has the highest authority. A monarchy is a form of government in which power is primarily exercised by an individual ruler or monarch. It is a political system based on inheritance (the monarch’s relatives succeed him), in which people are not authorized to cast votes. The crown is passed down from one generation to another. The word monarch derives from the Greek word monarkhēs which means ” who rules alone “. In the monarchy, it is necessary to be part of the royal family to be able to aspire to the throne. For example, the monarch’s children meet in line to receive title and power. Monarchs also use other titles such as king – queen, emperor – empress, duke or duchess. E l title is held for life or until abdication. The monarch makes all the decisions for the entire state and the people . Not all citizens are treated the same before the law, some people have a higher preference depending on their rank . Citizens can obtain privileges, rights and freedoms depending on the inclinations of the monarch. There are different types of monarchies: constitutional monarchy, parliamentary monarchy, absolute monarchy and hybrid monarchy (between absolute and constitutional). Key differences between republic and monarchy - The republic is a form of government in which people or their representatives have the supreme power, while the monarchy is a form of government in which power is usually restricted to a particular individual (the monarch, king, emperor). - In the monarchy, power is received by inheritance (the most direct relatives of the monarch succeed him), while in the republic it is the people who vote to elect their representative. - In the republic there is equality regarding the legal treatment of citizens, while in the monarchy the legal treatment can be determined by the rank one has. - Examples of republics: France, Russia, Mexico, United States, Dominican Republic. - Examples of monarchies: United Kingdom, United Arab Emirates.
<urn:uuid:6a031d9e-9493-4904-94f4-a10c3a4c48ec>
CC-MAIN-2022-33
https://differencekey.com/difference-between-monarchy-and-republic
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00413.warc.gz
en
0.964444
765
3.4375
3
Goodbye elephant, jaguar, cheetah, and rhino. The Earth is amid its sixth extinction and a new study has claimed that in three lifetimes, so much biodiversity will be lost that it’ll take the planet millions of years to recover. The last mass extinction took place 65 million years ago: the dinosaurs. The picture emerging from a new study is indeed grim. Its authors suggest that vertebrates are dying 114 times faster than if humans weren’t in the picture, Live Science reported. Applied into the future, that rate translates into the loss of species across the board — 69 mammals, 80 birds, 24 reptiles, 146 amphibians, and 158 fish. The numbers suggest 1,508 vertebrates could disappear in another 100 years. That may not seem like a lot, but researcher Gerardo Ceballos pointed out that “Every time we lose a species, we’re eroding the possibilities of Earth to provide us with environmental services.” And the sixth extinction is also happening way too fast. Over the past 100 years, only nine vertebrates should have gone extinct based on past rates, but that number in reality is nearly 500. According to NBC News, human activity is firmly to blame for the sixth extinction. We’re responsible, after all, for industrialization and deforestation. Our activity on Earth has led to pollution, loss of habitat, invasive species, climate change, and ocean acidification. “Our activities are causing a massive loss of species that has no precedent in the history of humanity and few precedents in the history of life on Earth.” Researchers arrived at this alarming figure and prediction of the sixth extinction by comparing rates of loss in the past to current rates. Species go extinct naturally, without human involvement. Before we came along, the animal kingdom underwent five total extinctions — or about two per 10,000 vertebrates every 100 years. But the modern rate is much higher and based on a list of threatened and endangered species maintained and monitored by the International Union for Conservation of Nature (IUCN). Scientists compiled both highly conservative and conservative figures. But at least one scientist thinks the numbers are too bleak, since they assume current conditions will persist, which they likely will not. Danish environmentalist Bjorn Lomborg concurred with the study’s conclusion that humanity is to blame for the sixth extinction and is bringing it on more rapidly than it would arrive naturally, but had more faith in humanity. “These extinction rates are not likely to persist for many centuries, if even one century, as richer countries can afford to and do reforest, while they also can afford to embark on ever more serious conservation.” The power of humanity’s intervention to reverse this sixth extinction was the one silver lining in the new study. “Avoiding a true sixth mass extinction will require rapid, greatly intensified efforts to conserve already threatened species, and to alleviate pressures on their populations — notably, habitat loss, over-exploitation for economic gain and climate change,” the study claimed. [Photo Courtesy Brent Stirton/Getty Images]
<urn:uuid:3933e846-a6c6-4446-b60e-3ea5e21eda43>
CC-MAIN-2019-22
https://www.inquisitr.com/2187738/earth-suffering-a-sixth-extinction-and-its-all-our-fault-but-is-the-picture-really-that-grim/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257259.71/warc/CC-MAIN-20190523143923-20190523165923-00425.warc.gz
en
0.93504
650
3.46875
3
I introduced the concept of open number lines today. Basically, an open number line is a completely blank number line. Our focus was to "navigate" on a number line. To begin, I gave the students two numbers, an "I have" and "I wish I had". Using any strategy they wanted, they were to begin with what they had and move to what they wished they had. For example, I gave the students the following: - I have 17 - I wish I had 24 I asked them to place the 17 on the number line and show me how they would get to 24. Invariably, they would start with 17 and use seven tick marks to get to 24 (see below). I asked them to think about this in a different way. What if we "jumped" to friendly numbers (the nearest 5 or 10) to keep us from having to make all those tick marks (see above). From there we experimented with a variety of "I have" but "I wish I had" statements in an effort to become more comfortable working with open number lines. I also wanted them to understand the strategy of "jumping to friendly numbers." To finish our day, we created a foldable about interpreting remainders called "What do I do with a remainder?". We ran out of time before we could put our notes to any use!
<urn:uuid:4c4720f6-8c2c-4226-a727-00f67071f8e6>
CC-MAIN-2018-09
http://tdittrich.blogspot.com/2013/11/open-number-lines-and-interpreting.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814493.90/warc/CC-MAIN-20180223055326-20180223075326-00561.warc.gz
en
0.981562
284
3.875
4
Listen closely children to these harrowing tales. They have been passed down from turkey to turkey for many generations, being translated from the ancient Gobbleguese to our modern French along the way. While they may make your feathers shiver, if you pay attention, you may avoid a fate similar to what befalls our poor friends in these stories. Hansel was a charming young boy who owned a charming young turkey. His fowl pet was named Gobble, for lack of more developed creativity. Hansel and Gobble lived with the boy’s parents on the edges of the outermost town from the center of the country. They were so far away from everything, including grocery stores, that once a week Hansel’s parents had to take an excursion into the forest (that was the only thing they were near to) to hunt and gather their food. It was a successful mode of living, and Hansel’s family, including Gobble the turkey, was content. One day, which predictably turned out to be a fateful one, Hansel came up with an inspired idea. “Mother, father, can I go to the forest today to do this week’s shopping?” “Shopping” was what they jokingly called their means of food production. Hansel’s parents, concerned that he was too young to hunt and gather alone, quickly dismissed his plea. “Hansel, we’re concerned that you are too young to hunt and gather alone, so we’re going to quickly dismiss your plea,” said his father. “But I won’t be alone. Gobble can come with me.” At this, Gobble, who had been sleeping, perked up. He knew he was being dragged into something he probably would rather not do. In actuality, anything that could not be classified under sleeping was on Gobble’s mental list of things he’d rather not do. In this case, he had a rational excuse: the forest was an unpredictable place, especially for tasty boys and their young turkeys—I mean, young boys and their tasty turkeys. “Gobble, gobble!” exclaimed Gobble. “See, he wants to come along,” interpreted Hansel. This, of course, was the exact opposite of what the turkey meant. “I promise to be super careful.” Hansel’s father looked at his spouse, who just shrugged. “Fine. You can go. But be back before dark.” “Thank you! We’ll come back with as much food as we can hold,” shouted Hansel as he skipped out the door, with Gobble reluctantly following. “I doubt that,” grumbled Hansel’s father. “Sweetie, the least we can do is give him a chance. We’ll just go shopping in the woods tomorrow,” replied Hansel’s mother. “I guess you’re right. We should always strive to provide our only child with plenty of worldly experiences as he grows up.” “You’ve been reading that parenting book I got you, haven’t you?” Hansel’s father smiled sheepishly. “I have. Though some of the advice doesn’t seem well thought out. Like, ‘avoid witches at all costs.’ Doesn’t really seem to belong in the book.” “Oh, I’m sure the writers were just having some fun.” Meanwhile, Hansel was still skipping merrily between the trees. Gobble was anxiously trotting behind his owner, trying to keep up. However, what was slowing Gobble down wasn’t the fact that he was turkey. No, the hindering factor was that the bird was placing pellets of feed along the ground every few yards. This way, Gobble reasoned, they would be able to find their way back home. And as they retraced their steps, Gobble would get a tasty meal. After hours of meandering through the forest, Hansel had not found any animals to hunt or picked a single berry. Just when he was getting ready to give up, the pair reached a clearing. In it stood a cottage. But it was not your ordinary cottage. It was covered in sweet potatoes, pumpkin pie, stuffing, apple crisp, green beans, mashed potatoes, pecan pie, you name it. All of the Thanksgiving meal staples were the building materials for this quaint home. Except for one. Hansel, who having walked several hours was famished, sprinted to the cottage and began to tear off chunks of food, stuffing them in his mouth. Gobble cautiously followed, and, after having observed his owner to make sure the food was safe to consume, began to peck at the house. It was delicious. Everything tasted freshly cooked, though that could not have been the case; the house was definitively of an older architectural style. After several minutes of feasting, an old woman crept out of the Thanksgiving cottage. Hansel and his turkey were too busy scarfing scrumptious victuals to notice her. The woman coughed quietly to try getting their attention. They kept eating. She barked a little louder. Still no reaction. Finally, she shouted, “Hey, boy and turkey! Look over here!” Hansel and Gobble quickly turned, sweet potatoes and pumpkin seeds falling out of their mouths in the process. They were ashamed of what they had done, for they knew they were stealing someone’s food, not to mention dismantling the house. But the old woman was not mad. “If you want more Thanksgiving cuisine, you can come inside. I just cooked another pecan pie,” she said. Without a second’s hesitation, the visiting pair rushed inside, already salivating at the thought of more deliciousness. At this point in the tale, it would be appropriate to relate to you that this old woman who lived in the Thanksgiving food house was a witch. Not a witch as in a mean person; she was actually a witch. And she had witchy plans. “Here you go, boys,” the witch said sweetly to Hansel and Gobble, offering them a steaming plate of Thanksgiving treats. “Eat up.” As the two stuffed their bellies with food, they began to grow tired. This was not turkey tryptophan-induced sleep; as you’ll remember, turkey was the only Thanksgiving food absent. Also, a turkey eating another turkey is just plain immoral. Instead, the witch had laced the food with a sleeping potion. Soon, they were asleep, and the witch could move forward with her plan. The witch always cooked Thanksgiving food, but her favorite meal was human boy stew. And that was precisely what she planned to make with Hansel. As she boiled the water, she locked Hansel and Gobble into cages to prevent them from escaping when they awoke. Soon, the stew base was ready for its featured component. Fear makes human boys taste better, so the witch proceeded to wake Hansel up before adding the final ingredient to her meal. “Boy, it’s time to wake up. You have a job to do,” said the witch sweetly. “What? Do I need to go shopping in the woods again?” asked Hansel sleepily. “No. You need to add yourself to my stew.” After this unexpected reply, Hansel was wide awake. “You can’t do that!” “Oh yes I can. Just watch.” “I won’t taste good. I only—” But before Hansel could explain why he wouldn’t taste good, the witch picked him up and threw him into the cauldron. After a few hours of stewing, her dinner was ready. She picked up a ladle and took a big, messy slurp. “Yuck! This stew is disgusting! That boy tastes horrible.” This was precisely what Hansel was trying to explain. Due to living off forest game and gathered produce, he was extremely lean and tough, with no flavor at all. The witch now had to find a way to save her stew. She turned to Gobble, who was still fast asleep. “I wonder how turkey tastes?” she asked aloud. “Only one way to find out.” With a new plan laid out, the witch picked up Gobble, waking him with a start. Immediately, he knew something was amiss. “Gobble, gobble!” he cried. “Yes, I would be happy to add you to my stew,” replied the witch. This, of course, was the exact opposite of what the turkey meant. With no further delay, she threw the turkey into the boiling pot. A few hours later, her stew was ready again. She cautiously tried a spoonful. It was delicious. “This is the best stew I’ve ever had. That turkey really did the trick.” The witch spread the food news to her coven; after tasting the turkey, they all agreed that it was delicious. From that day on, the witches incorporated turkeys as a main part of their Thanksgiving feasts, making the Thanksgiving meal how we know it today: dangerous for turkeys.
<urn:uuid:8bbf36cd-d685-4a30-b7a7-0640fdcc572a>
CC-MAIN-2017-34
http://linguisticgimmicks.blogspot.com/2013/01/horrific-folktales-of-turkeys-hansel.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103579.21/warc/CC-MAIN-20170817151157-20170817171157-00234.warc.gz
en
0.985869
2,026
2.53125
3
2017 has begun. Soon your wait for the Amazon Go Stores might be over and all the technology related to the store will be revealed soon. We talked about RFID technology and QR Codes. Today, I am going to discuss about the present applications of one more such important technology in the Amazon Stores that is Computer Vision. Computer vision is the technology which studies the 3D scene and reconstruct, interrupt and understand the objects in that 3D scene from its 2D images in terms of the properties of the structure present in scene. Computer Vision is concerned with the theory and technology for building artificial systems that obtain information from images or multi-dimensional data. In simple terms Computer vision is concerned with modeling and replicating human vision using computer software and hardware. There is also one more term which is used synonymously for Computer vision is Machine Vision. Computer Vision refers in broad terms to the capture and automation of image analysis with an emphasis on the image analysis function across a wide range of theoretical and practical applications. Machine Vision traditionally refers to the use of computer vision in an industrial application or process where it is necessary to execute a certain function or outcome based on the image analysis done by the vision system. The primary uses for machine vision are automatic inspection and industrial robot guidance. Hence, now I am going to list some of the practical applications of Computer Vision or we can say applications of Machine Vision: Automated Train Examiner (ATEx) Systems: ATEx is suite of wayside condition monitoring systems for railroads. ATEx modules can be installed as stand-alone systems, or they can be combined into a single, multi-module station. The systems capture clear images of vehicle components at normal speed of operation. The images are processed and analyzed automatically, and critical items are identified via e-mail notification or SMS. Automated Optical Inspection: AOI is an automated visual inspection of printed circuit board manufacture where a camera autonomously scans the device under the test for both catastrophic failure and quality defects. AOIs for a PCB board with components may inspect it for area defects, component offset, volume defects, excessive solder joints, flipped component, insufficient solder joints and more such features. It is the field with most prominent application of Computer Vision. This area is characterized by the extraction of information from image data for the purpose of making a medical diagnosis of a patient. This image data is in the form of microscopy images, X-ray images, angiography images, ultrasonic images, and tomography images. The information which can be extracted from such image data is detection of tumors, arteriosclerosis or other malign changes. Eye and Head Tracking Systems: These systems are not used independently instead with other bigger systems which need these features. The miniature systems that come in this category are Gazepoint (Low-cost eye-trackers), Mirametrix (Free-head eye-tracker), Smart Eye (Systems to track eye and gaze position) and SMI (Eye and Gaze Tracking Systems). Computer Vision is used in Sports for several kinds of benefits like - Improving broadcast and viewer experience. - Improving the training process of professional athletes - Automatic sports analysis and interpretation - Improving Referee decisions Industrial Automation and Inspection: Application of Computer Vision could be observed almost across all industries. The basic feature which this technology add to industry processes are Automation of some manual work and Inspection of the intermediate and final products. Some of the industries are: Electronics Industry, Food and Agriculture, Printing and Textiles, Plastics Industry and much more. You May Also Like: Know more About the Technology in Amazon Go Stores – SCAN QR Code Augmented Reality Systems: The most prominent applications of Computer vision at present is in the augmented reality systems. Computer vision solutions in augmented reality could be split in three layers: - Lowest Level: there is image acquisition and the processing for basic feature extraction, like corners, edges, contours, motion estimation. - Intermediate Level: it is the vision processing layer in which the object recognition and tracking can be carried out, including 3D Scene Modelling. - Top Level: It is referred as the High-Level Vision. In this the interpretation of the intermediate processing layers is carried out. This interpretation tells about the surroundings and involve the conceptual description of the scene. Computer Vision is present almost in all industries which adds many features to the existing systems. For example, automation feature, image processing in robotics industry and more. Soon the people of Seattle would be telling us about how Amazon has implemented this technology in their stores and what feature it adds to the store processing.
<urn:uuid:06a85694-e88c-4b86-8fcc-299969055d33>
CC-MAIN-2018-05
https://blogs.systweak.com/2017/01/know-more-about-the-technology-in-amazon-go-stores-computer-vision/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890771.63/warc/CC-MAIN-20180121135825-20180121155825-00584.warc.gz
en
0.916211
955
2.671875
3
A new report from the Centers of Disease Control and Prevention states that the rate of HIV infection among African-America women has decreased, but still remain the most likely race to be affected by the virus among women. The study said that though blacks make up 70 percent of new HIV cases among women, the total number of new HIV cases for African-American women dropped by 21 percent. The figures place black women at a risk 20 times higher than their white counterparts. Still, the data collected between 2008 and 2010 recorded a drop in the new HIV infection rate for African-American women for the first time. As a whole, male and female African-Americans are responsible for 44 percent of new HIV infections over that time period, despite only making up 14 percent of the population. The CDC attributed the positive trend to the success of HIV awareness programs. “As a country, we are still often afraid to provide developmentally appropriate sex education to young people, despite significant scientific findings that show education about sex does not lead to increases in sexual behavior among youth,” Parsons said. “Young gay and bisexual men typically get no targeted sex education messages in the school systems, and may not actually receive the kind of education they need until long after they leave school — at which point it might very well be too late.” Young gay and bisexual men are increasingly at risk according to the report, with the rate of new infections among that group rising by 12 percent. The group has already been acknowledged as particularly vulnerable to the disease, accounting for 63 percent of new HIV infections. “The honest truth is that some communities are kind of set up to fail,” LGBT health care provider Daniel Pohl told the Chicago Sun Times. “There’s just dramatically more chance that any one encounter or partnership would expose that person to infection. That’s certainly true of young gay men,” he said, speaking about the biological process HIV transfer.
<urn:uuid:1fc8b52d-05d2-46bb-9714-15899a853a29>
CC-MAIN-2015-22
http://atlantablackstar.com/2012/12/21/rate-of-new-hiv-infections-among-african-american-woman-declines/
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207924991.22/warc/CC-MAIN-20150521113204-00261-ip-10-180-206-219.ec2.internal.warc.gz
en
0.96269
398
2.875
3
Landmark Rulings Could Be Boon to Pacific Northwest Salmon Recent rulings in U.S federal court could have a significant impact on the population and lifespan of salmon in Northwest rivers. The health and numbers of salmon in the region—which includes Canada, Washington state, Oregon, California, and Idaho—have long presented challenges. In late June, a federal appeals court ruled that treaties guarantee the rights of Native American tribes to fish for salmon. The court also ruled that the tribes have a right for there to be salmon to catch. The interests of Native American tribes, who were promised the right to access salmon in treaties signed 150 years ago, have sometimes clashed with interests in the industrial, energy, development, and agricultural sectors. Changes in the natural environment, due to pollution and global warming, have also contributed to the decline in salmon runs over time, according to numerous extensive studies by biologists. The June ruling upholds a 2013 order that Washington state must replace hundreds of culverts with more salmon-friendly setups, such as bridges. The culverts—underground diversions for streams to flow under roads—are made of large pipes that can block migrating fish. In May, a federal judge in Oregon ruled that efforts by the federal government to restore salmon habitats in the Northwest have been insufficient. Under that ruling, four large dams on the lower Snake River in Eastern Washington could be removed. The Snake River is a major tributary to the Columbia River, the fourth largest in the country. The removal of dams to restore the health of salmon runs would not be unprecedented. In April, the federal government signed agreements with state governments in Oregon and California to remove four hydroelectric dams on the Klamath River. Those dams have been blocking salmon runs for 150 years. Dams can have a devastating impact on the hundreds of thousands of more than a dozen species of salmon that swim upstream every year to spawn and die. They block the fish from migrating to their spawning grounds and degrade the water quality, leading to the spread of fish disease and algae bloom. Salmon that manage to migrate and spawn also make a vital contribution to the health of forest ecosystems. Their nutrient-rich carcasses decay in the forest, feeding the soil and enriching biodiversity in the area. Many Native American tribes in the Northwest also consider salmon sacred and use them as a cornerstone of ancient cultural ceremonies. Treaty rights grant those tribes access to and sufficient supply in their traditional runs of salmon. As several species of salmon have landed on the endangered or threatened species lists over the years, tribes have been vocal about the problem. Their interests are described as extremely personal. “Our allocation of fish this year doesn’t meet half of our subsistence for our people,” said Yurok Tribe Vice Chairman David Gensaw. “This is a threat to our culture, our religion, and the economic survival of our people.” The Yurok is California’s largest Native American tribe, with about 5,000 members. According to the National Oceanic and Atmospheric Administration (NOAA), the federal agency that monitors the oceans and rivers of the United States, salmon face more than the threat of culverts or dams. “There are a few different categories of threats we talk about—one is habitat,” said Michael Milstein, a northwest region NOAA spokesperson. “They need to have healthy river habitat to spawn and for the young to grow. There’s been a lot of work to restore habitat because a lot of fish habitat has been affected by logging, mining, dams, grazing, and development.” Milstein added that water levels and temperature can also come into play. Salmon need cold water to thrive. Often streams get diverted to irrigate farms in agricultural regions, so the government is working with farmers to find solutions. That means installing pumps for farmers—instead of diverting cold mountain streams—and providing grant funding for installing sprinklers instead of using the more wasteful method of flood irrigation to water crops. Some conditions are beyond the government’s control, though. “Both last year and this year, a lot of the snow that’s up in the mountains has melted pretty quickly,” said Milstein. “A lot of that water has gone off, which means less water is available.” A particularly strong El Nino has also impacted the ocean water temperature, where adult salmon spend most of their lives. The warmer water temperatures mean fewer nutrients, which mean less robust salmon. The fish need a tremendous amount of strength to swim upstream to return to where they were born before they spawn and die. The Columbia River Inter-Tribal Fishing Commission is dedicated to the issue. The commission is composed of four major regional tribes: Yakama, Umatilla, Warm Springs, and Nez Perce. They are looking ahead to deal with a range of threats to salmon, some of which are massive. “The threat of fossil fuels and oil trains to the Columbia River system and its fisheries population is a major issue that we are dealing with,” said Sara Thompson, a commission spokesperson. “Over the past few years we have seen an increase in water temperatures that is the direct result of climate change. This is something that the region will need to work together to address, and address quickly.” Thompson also said that the tribes in the commission want to start a regional discussion on the “health and management of our floodplains.” They will start with a mid-August technical workshop, followed by the Future of Our Salmon Conference in October. Floods and floodplains play a critical role in the health of rivers, and the commission wants to “develop a unified strategy to address climate change impacts for the benefit of the region’s fish, wildlife, and communities.” The Associated Press contributed to this report.
<urn:uuid:a80b11de-5ac4-42ec-afc7-db64935d8d51>
CC-MAIN-2018-13
https://www.theepochtimes.com/landmark-rulings-could-be-boon-to-pacific-northwest-salmon_2111722.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257651007.67/warc/CC-MAIN-20180324210433-20180324230433-00569.warc.gz
en
0.955024
1,215
3.734375
4
Discuss effective and ineffective training. What makes it effective or ineffective? What were the long term benefits? Please use APA 5th edition guidelines to cite references. References should be peer reviewed journals. I am looking for insight and information for these questions. Thank you. Interesting research project! Let's take a closer look through discussion and research, which you can consider for your final copy. It is important to understand that there are many theories about what makes an effective training program, but here are some common threads across theories. 1. Discuss effective and ineffective training. What made them effective or ineffective? What were the long-term benefits? Response should be between 200-300 words. Please use APA 5th edition guidelines to cite references. References should be peer-reviewed journals. The goal for any trainer is to present effective training and to avoid ineffective training that wastes time, money and effort and is known be decrease motivation in employees. Ineffective training is lacking the essential components of an effective training program, such as a poor design or very little planning, poorly defined objectives or is information presented without active participation of the trainees, and so on. Feedback and monitoring progress is also essential to effective training, which is often absent in ineffective training programs. The long-term effects and benefits of effective training programs are many, including the effective use of resource (cost, time, effort) and an increase in employee motivation, job satisfaction and productivity. Employees embrace training that is perceived to meet their job requirement needs and an active role in learning generalizes the training experience to the work environment. It is not just information, it is training. Let's take a closer look at some of the research that looks at components of effective training programs. According to Adult learning theory, for example effective training design should adhere to the two principles of adult learning: presenting material that is practical and the training should be active (Knowles, 1980). Knowles argues that it is essential to recognize that adult learners are different from students, as adults are more self-directed and expect to take responsibility for decisions. This must be considered in training programs in order to be effective. According to Knowles, for example, effective training designs for adults must take into account: · Adults need ... This solution discusses effective and ineffective training, and what makes it effective or ineffective. It also discuses the long term benefits. APA referencing.
<urn:uuid:88b3a4de-86ee-4b14-af8e-38d5494e0d94>
CC-MAIN-2017-26
https://brainmass.com/business/business-management/139400
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320226.61/warc/CC-MAIN-20170624050312-20170624070312-00697.warc.gz
en
0.967713
490
2.5625
3
By Irene Fountas What is the role of text difficulty in helping our students learn how to read? Over many decades teachers have attended to the difficulty level of texts. You know well when a text is too hard for a student to process and the reader begins laborious sounding and guessing that can only result in a loss of attention to the meaning of a text. You also know well what smooth, phrased reading sounds like when the student can process a text well independently. And you also know when you have given the student a text that is not too difficult or not too easy, so the reader can learn how to do something better. You know that the text supports your effective teaching and the student’s ability to learn. Over decades, many have used a variety of mathematical formulas to assess the difficulty of a text. Clay (Clay, 1991) argued for the use of a text gradient as it can support or interfere with the reader’s ability to put together an effective system for processing texts. Of course, she argued, any gradient must take into account the student’s unique experiences and language so all gradients are fallible. A consideration of difficulty level is essential but different readability measures are based on different elements. The Fountas and Pinnell Text Gradient™ A-Z was designed as a tool to support classroom teachers and teachers working with small groups to select texts for small group instruction. It is a complex gradient, as it takes into account ten different characteristics of text and goes far beyond mathematical formulas that are based on word and sentence length only. They include: - Genres/Forms- the type or kind of fiction or nonfiction text (e.g., biography, informational, historical fiction, folk tale, realistic fiction, fantasy). Also, the particular form (mystery, oral stories, picture book, graphic text, short story). - Text Structure– the way the text is organized. - Content– the subject matter of the text– what it is about, the topic or ideas. - Themes and Ideas– the big ideas in the text, the overall purpose, the messages. - Language and Literary Features– the literary features (such as plot, characters, figurative language, literary devices such as flashbacks). - Sentence Complexity– the structure of sentences includes the number of phrases and clauses. - Vocabulary– the meaning of the words in the text - Words– the length and complexity of the words (syllables, tense, etc.) - Illustrations– the photographs or art in fiction texts; the graphic features of informational texts. - Book and Print Features– the number of pages, print font, length, punctuation, and variety of readers’ tools (e.g., table of contents, glossary). When the ten characteristics are used as a composite, the approximate level of a text can be determined. And when the teacher begins with where the learner is, it can be productive and help the student climb the ladder of success. The following chart shows the approximate goals for each grade level. The arrows represent the goals, not the reality. When you begin with where the student can learn, you can provide teaching that supports continued progress up the gradient. We hope you will continue to engage in the analysis of texts to be sure to match texts to readers for one small part of the literacy instruction you provide. Of course, it will be important to also offer students daily opportunities to engage with complex texts geared to the grade and age level in interactive read aloud and book discussion groups. We encourage you so share your experiences and comments on our blog. Clay, M. (1991). Becoming literate: The construction of inner control. Portsmouth, NH. Heinemann. Fountas, I.C. and Pinnell, G.S. (2009). The Fountas & Pinnell Leveled Book List, K-8+. Portsmouth, NH. Heinemann.
<urn:uuid:f9da2b08-abf5-4082-9f3f-55e986d4150e>
CC-MAIN-2017-13
https://lesleyuniversitycrrlc.wordpress.com/2012/03/07/text-difficulty/
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189252.15/warc/CC-MAIN-20170322212949-00566-ip-10-233-31-227.ec2.internal.warc.gz
en
0.913507
827
4.21875
4
Musical Theater is a style that began in America and is an essential part of a high schooler’s music education. It’s a fun part, as well! I have chosen some musicals for high school to enjoy that have been made into film versions. If you can see these live, though, do it! Enjoy 15 Must-See Movie Musicals for High School Students. (The dates listed below are when the films were released, not when the musical was first performed.) Click here for FREE music lessons: Disclosure: I get commissions for purchases made through affiliate links in this post. Singing in the Rain The Story: Don Lockwood (an actor) and Cosmo (his musical friend) are working in silent movies in the 1920’s when “talkies” suddenly come on the scene. They come up with a scheme to save their studio by turning a recent movie into a talking film. One of the best features of Singing in the Rain is the tap dancing by Gene Kelly and Donald O’Connor. Debbie Reynolds also stars in it. Famous Song: “Singing in the Rain” (1952) Guys and Dolls The Story: Set in New York City, the men are constantly on the look-out for (illegal) opportunities to gamble. The local Salvation Army mission is trying to rescue them from this sin. Nathan Detroit bets Sky Masterson that he can’t take one of the ladies from the mission to Havana, Cuba for dinner. Meanwhile, Nathan’s fiance Adelaide is trying to get him to marry her. (The movie stars Frank Sinatra and Marlon Brando.) Famous Song: “Sit Down You’re Rocking the Boat” (1955) My Fair Lady The Story: Eliza Dolittle, who is a Cockney girl who sells flowers on the street, is taken to a famous phoneticist’s home to be taught how to speak properly. She is then put into upper-class society to see if she can be found out. (The movie stars Audrey Hepburn and Rex Harrison.) Famous Song: “Wouldn’t It Be Loverly?” (1964) By the way, is your high schooler obsessed with Hamilton, the musical? See a special Masterclass by Gena Mayo: “How and Why Hamilton Became a Sensation!” It’s exclusively in the Music in Our Homeschool membership. The Story: Jean Valjean gets a second chance in life and finds many opportunities to help others in this powerful and meaningful story set in France during the unrest of post-revolution in the 1800’s. (Stars Hugh Jackman, Russell Crowe, and Anne Hathaway.) (The themes in Les Misérables make it more appropriate for older teens.) Famous Song: “Do You Hear the People Sing?” (2012) Phantom of the Opera Famous Song: “Music of the Night” (2004) West Side Story The Story: Based on Shakespeare’s Romeo and Juliet, West Side Story is set in 1950’s New York City. The two “families” are two rival street gangs: the Jets (American) and the Sharks (immigrants from Puerto Rico). When Tony and Maria fall in love, the hatred and fighting between the two gangs escalates until a tragic ending occurs. (The themes in West Side Story make it more appropriate for older teens.) Famous Song: “America” (1961) **There is a new movie version of West Side Story that came out in December 2021. Have you seen it? Did you like it? Please leave a comment below! Seven Brides for Seven Brothers The Story: When Adam heads into town to get a bride, he finds Milly who is willing to go back with him. She is surprised, however, to learn that he neglected to tell her that she would be taking care not only of him but his six brothers. Eventually, they are all married off. Famous Song: “Lonesome Polecat” (1954) High School Musical The Story: Troy is the high school basketball star (and son of the coach). When he decides to audition for the school musical, it inspires others to break out of their molds as well and pursue other dreams. (Stars Zac Efron.) Famous Song: “What I’ve Been Looking For” (2006) The Story: Tracy’s dream is to dance on the Corny Collins Show. But there are obstacles to overcome, such as encouraging integration in 1960’s Baltimore. (Stars John Travolta, Michelle Pfeiffer, and Queen Latifah.) Famous Song: “The Nicest Kids in Town” (2007) The Story: After the famous singing duo Bob and Phil see the Haynes sisters perform, they head to Vermont and decide to put on a big production to bring business to the failing ski resort. (Stars Bing Crosby and Rosemary Clooney.) Famous Song: “Sisters” (Watch the reprise, too!) (1954) Fiddler on the Roof Famous Song: “Tradition” (1971) The Pirates of Penzance The Story: The Pirates of Penzance is an operetta (a transition from opera to musical theater) written by Gilbert and Sullivan in 1879. Frederic, an apprentice on a pirate ship, is ready to leave the pirates since his indenture is up. They arrive on an island where he falls in love with Mabel. Soon, he discovers that he in not free to leave since he was born on February 29 in leap year. (Stars Kevin Kline, Linda Ronstadt, and Angela Lansbury) Famous Song: “Poor Wandering One” (1983) Into the Woods Famous Song: “Agony” (2014) Bye Bye Birdie The Story: Conrad Birdie, a famous rock and roll singer from the 1950’s is about to be sent to war. His record label comes up with a scheme to boost his ratings by giving a last kiss to one lucky fan. (Stars Ann-Margaret and Dick Van Dyke.) (The themes in Bye Bye Birdie make it more appropriate for older teens.) (1963) Famous Song: “One Last Kiss” The Greatest Showman The Story: Based on a true story of the circus man P.T. Barnum. Music by Pasek and Paul. (2017) Famous Song: “A Million Dreams” Do you have any other movie musicals for high school students to recommend? Please share in the comments! Why I Choose These Musicals for High School Several have asked my criteria for choosing the musicals I did for this list. Let me tell you first the perspective I am coming from. I have performed in musicals myself, been a music teacher for over 20 years, have teens (and younger kids) who perform in musicals, and am a musical director of a big Christian musical theater company in our area. My goal with this list is to entertain as well as educate. I did choose some musicals that are “drivel” as one lady described them. 🙂 High School Musical, White Christmas, and Bye Bye Birdie do not have much value as far as musicality and even the story themes go. But, they are fun! Others, such as Into the Woods, but are part of the popular musical theater culture of America at this time, so I see those as valuable for education. Some of the musicals have very heavy themes, such as Les Miserables, Hairspray, and West Side Story, but those are important for their themes of recognizing hatred and evil and choosing to overcome it with forgiveness and/or acceptance. I chose Pirates of Penzance and Phantom of the Opera because they are musicals which have withstood the test of time. (Phantom of the Opera is the longest continually-running musical on Broadway.) If you have any other questions or concerns, please send me a message (through the contact form) or leave a comment! I’m updating this popular post to include Hamilton because it’s now on my list for Must-See Movie Musicals for High School Students. See a 15-Minute Music Lesson about Hamilton the Musical here, and see Hamilton the Musical Projects for Teens here. I also have a Music and Fine Arts membership with a masterclass called Hamilton the Musical: How and Why it Became a Sensation! by Gena Mayo. Be sure to get on the waitlist so you can join the membership when it opens up again!
<urn:uuid:7099720d-7c5b-40d6-919c-15544e0e2fe3>
CC-MAIN-2022-49
https://musicinourhomeschool.com/15-must-see-movie-musicals-for-high-school-students/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711286.17/warc/CC-MAIN-20221208082315-20221208112315-00420.warc.gz
en
0.939931
1,876
2.65625
3
Hunger-related hormones can remain at altered levels for at least a year A drop in body fat percentage causes a decrease in the levels of certain hormones Finding an appetite suppressant of this sort is the next logical step in research Losing weight is hard, but keeping the pounds off can be even harder. By some estimates, as many as 80% of overweight people who manage to slim down noticeably after a diet gain some or all of the weight back within one year. A shortage of willpower may not be the only reason for this rebound weight gain. According to a new study in the New England Journal of Medicine, hunger-related hormones disrupted by dieting and weight loss can remain at altered levels for at least a year, fueling a heartier-than-normal appetite and thwarting the best intentions of dieters. “Maintaining weight loss may be more difficult than losing weight,” says lead researcher Joseph Proietto, Ph.D., a professor of medicine at the University of Melbourne’s Heidelberg Repatriation Hospital, in Victoria, Australia. “This may be due to biological changes rather than [a] voluntary return to old habits.” Scientists have known for years that hormones found in the gut, pancreas, and fatty tissue strongly influence body weight and processes such as hunger and calorie burning. And the reverse is also true: A drop in body fat percentage, for instance, causes a decrease in the levels of certain hormones (such as leptin, which signals to your brain when you’re full) and an increase in others (such as ghrelin, which stimulates hunger). What wasn’t so well known, until now, was whether these changes in hormone levels persist after an individual loses weight. To find out, Proietto and his colleagues put 50 overweight or obese men and women on a very low-calorie diet for 10 weeks, then tracked their hormone levels for one year. The average weight loss during the initial diet period was about 30 pounds, which for most of the participants represented at least 10% of their starting body weight. (Seven people who did not meet this target were dismissed from the study.) Blood tests showed that average levels of several hormones (including leptin, ghrelin, and insulin) had changed as a result of the weight loss. As expected, the participants also reported being hungrier – both before and after breakfast – than they had been at the study’s start. At the 10-week mark the participants were allowed to resume a normal diet, but they continued to receive periodic advice from a dietitian and were also encouraged to get 30 minutes of exercise most days of the week. One year later, they’d regained about 12 pounds, on average, and follow-up tests showed that their hormone levels had only partially stabilized. Their hunger levels remained elevated as well. The results aren’t surprising, says Charles Burant, M.D., the director of the University of Michigan Nutrition Obesity Research Center, in Ann Arbor, who was not involved in the research. In fact, he says, the hormone changes seen in the study are a well-known evolutionary survival tactic. “Multiple mechanisms have been developed, over eons of evolution, to get you to regain weight once you lose it…to tell your brain you’re hungry and to ensure that you don’t stop eating,” he says. “If you don’t have those drives, you wouldn’t be alive.” But now that we live in a world where calories are so easily consumed and physical exercise – the best way to burn off those calories – is largely unnecessary for day-to-day survival, these biological drives are backfiring and contributing to obesity, Burant says. That’s not to say that weight regain is inevitable, or that these drives can’t be overcome through willpower. Although the hormone changes noted in the study are very real physical effects, Proietto says, personality and psychological factors may play a role in an individual’s ability to manage chronic hunger. “This may explain why some people maintain weight loss for longer than others,” he says. “Maintenance of weight loss requires continued vigilance and conscious effort to resist hunger.” Promising research is being done to discover ways to restore hormone levels in people who lose weight, Burant says. Preliminary studies from Columbia University, for example, have found that when dieters are injected with replacement leptin hormones, it’s easier for them to maintain or continue weight loss. “When diabetics don’t have enough insulin in their bodies, we give them back insulin in order to maintain their blood glucose,” Burant says. Researchers should be finding a way to do the same for people who have lost weight, he adds, “whether it’s with a drug, a dietary supplement, or certain nutrients—something that will stimulate the release of these hormones.” Proietto agrees that finding an appetite suppressant of this sort is the next logical step in hormone and obesity research. Until then, he says, weight-loss surgery is a possible option for some severely obese people who have not been able to keep weight off by other methods.
<urn:uuid:e72ddc3a-1eeb-482e-9c33-25680b8d07d4>
CC-MAIN-2021-17
https://www.cnn.com/2011/10/26/health/post-diet-weight-regain
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038057476.6/warc/CC-MAIN-20210410181215-20210410211215-00564.warc.gz
en
0.957817
1,100
2.890625
3
Great pictures Thursday from space showing a classic lake breeze near Lake Superior. Look at the photos below. You can see the areas over western Lake Superior and the surrounding land areas are largely cloud free, except for an area of fog on the lake near Grand Marais. Looking inland you can see a distinct line of clouds. These are cumulus clouds forming along the lake breeze front. Images are courtesy of the University of Wisconsin Madison MODIS page. 1000 meter resolution MODIS view of Lake Superior Thursday shows cloud free areas near the west end of the lake. (click on photos for bigger images) Higher resolution (250 meter) MODIS view. Note the distinct line of cumulus inland paralleling the North Shore. Arrows on the right show cool dry stable wind flow coming off Lake Superior. Cumulus cannot develop in this stable air mass. These are the cloud free zones. Arrows from the left show wind flow from the other side. A “convergence zone” is created where the two air flows meet. This is the lake breeze front. Since the air has nowhere to go but up, cumulus clouds form as the air rises. Lake breezes are caused by temperature differences over land and water. In this case, cool air over Lake Superior is dense and pushes inland during the day as the land heats up. Thursday’s surface map shows the wind direction and temperature differences. Notice how stations near Lake Superior are in the 60s while areas inland are in the lower 80s, nearly 20 degrees warmer! In Chicago we always forecast “cooler by the lake” on spring and summer days like today. Thursday you could feel it in the air and see the effects from space near Lake Superior.
<urn:uuid:10991505-1c4c-46c7-829c-5dd9a863cb26>
CC-MAIN-2015-11
http://blogs.mprnews.org/updraft/2010/05/lake_superior_lake_breeze_visi/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00192-ip-10-28-5-156.ec2.internal.warc.gz
en
0.916585
359
2.8125
3
The "Petrified Forest" was made a National Park in 1962. In Northern Arizona tree trunks as large as 213 feet long were buried under several hundred yards of sediment. Over the course of time the wood was replaced by cryptocrystalline quartz, largely chalcedony and jasper. Petrified Wood cabochons from Northern Arizona are known as Petrified Rainbow Wood because it is found in so many colors. It is especially famous for its reds and yellows. Of the billions of trees that ever lived, only a fraction were in the right circumstances to fossilize, and only a small fraction of those are solid or have pretty colors or patterns. This pretty semi precious gemstone cabochons are from the Conifer tree. Since these cabochons are actually stone that replaced the wood, they have a hardness of 7, take an excellent polish and wear well. Petrified Wood found in the Petrified Forest began during the Triassic Period around 180,000,000 years ago. Petrified Wood is the official State Fossil of Arizona. Petrified Wood in general is said to be a stone of patience, and slow and steady growth. It is believed that Petrified Wood can help one overcome limiting emotional patterns handed down through one's ancestors.
<urn:uuid:900f7fbe-bcd5-4a80-9320-710b7c19f090>
CC-MAIN-2023-23
https://www.barlowsgems.net/petrified-wood-cabochons-arizona/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646652.16/warc/CC-MAIN-20230610233020-20230611023020-00498.warc.gz
en
0.973211
268
3.515625
4
NASA has announced it will soon be recruiting new astronauts. And, if being an astronaut isn’t cool enough, this crop of recruits may be among the first people to set foot on Mars. Apart from Matt Damon, I mean. But what does it take to be among that chosen few? Luckily, NASA also gave us a list of requirements for applicants.Aspiring astronauts will need to fulfil the following criteria: - A bachelor’s degree in science, maths or engineering - EITHER three years of relevant professional experience - OR 1,000 hours pilot-in-command flight time in jet aircraft - Pass NASA’s long-duration spaceflight physical For something that is probably a dream job to a lot of people, that’s not such an arduous list. The emphasis on academic achievement was a shift from the earliest astronauts who were selected from the military for their piloting skills. They also couldn’t be too tall (less than 5ft 11in/180cm) because the craft were so cramped. Even today, there is a maximum height of 6ft 3in/190.5cm and a minimum of 5ft 2in/157.5cm. Having the right hobbies might help, too. Nicole Cloutier-Lemasters, a public affairs representative for NASA, said: “Many applicants have hobbies including scuba or flying, which are also skills used by astronauts during training.” If you need some ideas for new hobbies (wink wink), NASA training also includes water survival, robotics and Russian. Applicants who make it through preliminary screening will then have to undergo a week of interviews and medical tests. From there, the lucky ones will have a further two years of training and evaluation before they can join the likes of Neil Armstrong and Chris Hadfield in becoming modern-day heroes. “This next group of American space explorers will inspire the Mars generation to reach for new heights, and help us realize the goal of putting boot prints on the Red Planet,” said NASA administrator Charles Bolden. Like this article? Get more delivered directly into your inbox! Sign up for our newsletter here:
<urn:uuid:7c1ab404-a1f1-4950-858e-5386295be433>
CC-MAIN-2018-47
http://www.taledo.com/blog/career-advice/be-the-first-person-on-mars-nasa-is-hiring/
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741219.9/warc/CC-MAIN-20181113041552-20181113063552-00374.warc.gz
en
0.94967
449
2.75
3
Bharatpur was founded by Maharaja Suraj Mal in 1733 and the bird’s own city is famous for its bird century all over the world. The amazing destination is carved out of the ancient kingdom of Mewar that was ruled by the Rajputs. Popularly called as the ‘Eastern Gateway of Rajasthan’ the place gives an opportunity to explore the regal and vivacious side of state. Located at an approximate distance of just 184 kilometers south-west of the national capital – Delhi the city provides passage to other famous tourist attractions such as Jaisalmer, Jodhpur, Jaipur and Udaipur. According to the Hindu epic Ramayana the township of Bharatpur is named after the Bharat, the second brother of Lord Rama the son of Dasharatha and Kaikeyi. The Ramayana says that the Laxman was worshipped as the family deity of the royal family of Bharatpur. Bharatpur Bird Sanctuary The dense forest around the region is being protected by forest department India, now a noted National Park, was declared as a bird sanctuary in 1956. Spread over an area of 29 square kilometers, site also features the world heritage site of UNESCO. The Bharatpur bird sanctuary is named as the Keoladeo Ghana National Park which is often referred to as Ornithologist’s paradise. This natural reserve gives shelter to 375 species of wonderful birds along with animals and reptiles. The deep forest area attracts thousands of indigenous as well as migratory birds annually which also includes the world famous Siberian cranes. Lohagarh fort is a huge and magnificent historical structure, erected in the early 18th century by Maharaja Suraj Mal. Due to its unconquerable defenses, the fort frustrated several British attacks and today stands proud as living testimony to the knighthood and courage of the rulers of Bharatpur. Inside the premises of the fort it has three palaces namely Kishori Mahal, Kothi Kothi Khas and Mahal Khas. Deeg Palace which is located at an approximate distance of 35 Kilometer from Bharatpur that shows a marvel of ancient engineering skills. The palace was commissioned by Maharaja Suraj Mal. The chief attraction of the Palace is quadrangle-shaped palace surrounded by many fountains, shrubs, trees and gardens and two large water tanks called Roop Sagar and Gopal Sagar. Government Museum Bharatpur is a best showcase of rich heritage and variant culture of this region. Artifacts, exquisitely carved sculptures and ample of ancient inscriptions will take you to the delightful journey to the glorious past of the vibrant Rajasthan. Some more excursions around Bharatpur: - Bayana (34 Km) - Kaman (55 Km) - Bandh Baretha (55 Km) - Fatehpur Sikri (22 Km) - Agra (55 Km) The famous Braj festival of Bharatpur makes the city alive with rural sports, horse dance, tug-of-war competitions, folk music and dances which continues for three days. The main attraction of the festival is Rasilla, depicting the eternal love story of the Radha and Krishna. How to Reach Bharatpur: Bharatpur is strategically located on the Agra-Jaipur highway, approximately 55 km from Agra and 180 Km from Jaipur. The city has good network of rail and roadways that connects major cities in the country. Two of the airports Delhi and Jaipur are located almost at same distance from Bharatpur.
<urn:uuid:59c687b0-8d2e-41f8-b945-c03f76aafcb9>
CC-MAIN-2021-31
https://rajasthantourismindia.in/bharatpur-tourism-rajasthan/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153814.37/warc/CC-MAIN-20210729011903-20210729041903-00163.warc.gz
en
0.961831
759
2.734375
3
Parents: harping and 'correcting' are out, appreciation in Cedar Rapids, Iowa — Should you "correct" the poem or story your child writes at home? My answer has to be a vociferous NO! "Correcting" the creative writing a child brings you may very well destroy the child's incentive to write. When you ask a child to write a poem and then criticize it, the child may feel that you have betrayed him. You asked for a poem, but you didn't appreciate its beauties; instead you found fault with its commas and spelling. It's bad enough that parents keep harping about the loudness of the stereo and the condition of bathtubs, kitchen counters, and fingernails, but when a parent also begins to plump the innermost thoughts of the child -- the best ideas which he or she can commit to paper -- the child may very well feel that the effort wasn't worth the hassle. Because writing has to come out of one's "secret" places, your child does you a great favor if or she writes a poem or story and is willing to show it to you. It is a real gift, a part of the self. If you start tearing this gift apart, you may be doing a great disservice to your child as well as causing him to dislike writing. If you are fortunate enough to get your child to do some writing, remember that the first reaction must be appreciation. Always find something in the work to praise. Say how much you enjoy reading it, that you appreciate the time and effort that he or she spent on it. Commend the good ideas; comment on the interesting use of sounds; compliment the interesting use of language. Even if misspelled words give you the shivers, and disagreement of verbs induces palpitations, my advice is: Don't "correct" thier work. Remember that ideas are far more important than correct comma placement. Innovative use of language is far more important than correct spelling. Although correct spelling and grammar have their virtues, the child will never know where the true emphasis lies in good writing if you concentrate on technicalities. Eventually you will discover that you do not need to correct. By praising the good qualities of the writing, you are accenting these. The child will give you more of what you praise and will not be inclined to try again the parts which are not praised. As the child continues to write, the good will crowd out the not-so-good. At least, this has been my experience. For example: If you praise metaphors (you may want to call them comparisons), your budding author will write more and better metaphors. If you praise humor, the writing will get funnier and funnier. If you praise imaginative language, he or she will stretch the imagination. If you commend alliteration, the child will use it again, and most likely will use it better as he as more practice. The parent who is seriously interested in getting children to write should try some creative writing himself. If adults take writing seriously, if it is a viable adult avocation, then it is a viable kid avocation, as well. Besides, writing, all good writers read. No writer writes out of a vacuum. So be sure that you have books of both prose and poetry around. Be sure that you read poetry yourself. When you find a poem that you think the family will enjoy, read it aloud at the dinner table and invite comments. If someone says, "I think that stinks," don't dispute this critical judgment. Kids are entitled to their opinions, too. Encourage them to share poems that they have read, and don't be too critical of their choices. Above all, don't expect perfection. Remember that the young writer is a growing individual and a growing intellect. Some things that seem obvious to you will not be obvious to the young writer. Nor should you expect that every writing effort will be sequentially better than the last. No, don't "correct" their writing; love and appreciate it instead.
<urn:uuid:3efb522b-6984-46ee-8008-723c729758e8>
CC-MAIN-2017-43
https://www.csmonitor.com/1980/1027/102704.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825464.60/warc/CC-MAIN-20171022203758-20171022223758-00000.warc.gz
en
0.966652
846
2.796875
3
Rachel Buxton (Department of Zoology, University of Otago, Dunedin, New Zealand) and colleagues have published in the New Zealand Journal of Ecology on the recovery of seven species of burrowing petrels (Fluttering Shearwater Puffinus gavia, Flesh-footed Shearwater P. carneipes, Little Shearwater P. assimilis, Sooty Shearwater P. griseus, Grey-faced Petrel Pterodroma macroptera gouldi, Pycroft’s Petrel P. pycrofti and Common Diving Petrel Pelecanoides urinatrix) following eradication of rats on New Zealand islands. The paper’s abstract follows: “The size and distribution of colonies of burrow-nesting petrels is thought to be limited partly by the availability of suitable breeding habitat and partly by predation. Historically, the availability of safe nesting habitat was restricted in New Zealand, due to the introduction of rats by humans. More recently, however, habitat has been restored by rat eradication. Petrel colony growth is mediated by both positive and negative density dependence, although it is unclear if, or how, density dependence will affect patterns in post-eradication colony recovery. Here, using burrow density as a proxy for relative abundance, we tested whether petrel colonies increase in density or area after rat eradication by sampling along a chronosequence of (1) five islands from which rats were eliminated 1 to 26 years ago, (2) two islands that never had rats, and (3) an island with rats still present, while controlling for habitat availability. We also measured a time series of burrow densities in plots on each island to compare temporal changes after rat eradication. Using Bayesian hierarchical modelling, after controlling for nesting habitat, we found that mean burrow density increased with time since rat eradication. Burrows remained clustered (i.e. spatially structured), but became more randomly distributed on islands with more time since eradication. Point density mapping indicated that colony extent increased with time since rat eradication, with colonies filling over 70% of surveyed areas on islands by 25 years after eradication. Increases in burrow density and colony area, but maintenance of clustered distribution, suggest both positive and negative density dependence may operate during colony expansion. Understanding patterns in petrel colony recovery is important, not only due to the indispensable role of petrels as island ecosystem engineers, reflecting the recovery of ecosystem functioning, but also to help guide post-eradication monitoring strategies.” Flesh-footed Shearwater, photograph by Barry Baker Buxton, R., Taylor, G., Jones, C., Lyver, P.O’B, Moller, H., Cree, A. & Towns, D. 2016. Spatio-temporal changes in density and distribution of burrow-nesting seabird colonies after rat eradication. New Zealand Journal of Ecology 40(1). John Cooper, ACAP Information Officer, 03 January 2016
<urn:uuid:47b233c2-6db3-4d5f-a2d9-1da5deaa7b35>
CC-MAIN-2020-05
https://acap.aq/fr/latest-news/2380-burrowing-petrel-area-and-density-increases-after-ridding-islands-of-rats
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250609478.50/warc/CC-MAIN-20200123071220-20200123100220-00315.warc.gz
en
0.913829
628
3.28125
3
Vitamin B Supplements May Help Fight Off Impact Of Pollution, Study Shows [VIDEO] New research revealed that Vitamin B may work to ease the effects of air pollution, particularly the damage caused by the pollutant PM2.5. Particulate matter (PM) or particle pollution is a mixture of tiny solid and liquid particles in the air that can cause health problems. It comes in various sizes with diameters ranging from 2.5 to 10 micrometers. These particles can enter the lungs when inhaled. PM2.5 is a fine particle that may cause unwanted changes in the way DNA works. It is blamed for inflammation and oxidative stress on the body. The results of the study published in the journal PNAS on Monday demonstrated how B-vitamin supplementation could help mitigate the effect of air pollution to the health. In the experiment, the volunteers were exposed to PM2.5 for two hours. It led to huge changes in a key DNA function. Vitamin B supplements which consist of 2.5 mg of folic acid, 50 mg of Vitamin B6, and 1 mg of Vitamin B12 prevented the changes from happening. It was able to alleviate the effects of the air pollutant by 28 to 76 percent. There are not many options for people to avoid the severe impact of pollution, so the outcome of the study presents valuable information as to how it can be done. The researchers warned however, that the sample is too small and that further research is needed. They also stressed that policies and efforts to keep pollution under control should remain. Along with policies and other efforts to keep pollution levels under control, Vitamin B could be used on an individual level to avoid the impact of unhealthy air to the body, the researchers suggested. The World Health Organization blames outdoor air pollution for an estimated 3 million early deaths every year. These deaths are caused by heart diseases, strokes, lung problems and cancer. Unfortunately, 92 percent of the world people live in areas where the air quality is below WHO's guidelines. Indoor smoke also needs to be reduced. Cooking and heating homes using biomass fuels and coal also contributes to the worsening air quality. It is responsible for some 4.3 million premature deaths according to the WHO. Check this page out for more contents
<urn:uuid:adc0e83c-f632-415b-9a6e-230129684559>
CC-MAIN-2020-16
https://www.counselheal.com/articles/35725/20170315/vitamin-b-supplements-help-fight-impact-pollution-study-shows-video.htm
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370518622.65/warc/CC-MAIN-20200403190006-20200403220006-00040.warc.gz
en
0.942644
465
3.421875
3
Melanoma — a rare, but deadly form of skin cancer — kills more than 10,000 men, women, and children a year in the U.S. alone. When you notice a mole that’s changing shape, size, or color, immediately call Dr. Lisa Hitchins at Dermatology Center of Northwest Houston in Cypress, Texas for diagnosis and treatment, if necessary. Whether you think you may have skin cancer or are at risk for melanoma because of age or family history, contact the warm and supportive staff at Dermatology Center for a skin cancer screening, or book an appointment online. Melanoma is the most dangerous form of skin cancer. Luckily, it only accounts for 1% of all skin cancer cases. Melanoma is a fast-growing cancer that metastasizes to your other organs if you don't receive treatment promptly. However, if you catch and treat melanoma early, the five-year survival rate is 98%. Melanoma lesions usually appear on areas of your body that were exposed to UVA and UVB rays from sunlight or a tanning bed. Melanoma that has a genetic component or is caused by other environmental factors can appear anywhere on your body. Melanoma can affect any skin color or type, but you’re more likely to develop melanoma if you have fair skin. You’re also more at risk if you have a family member who had melanoma. Other risk factors for melanoma include: Children who come from a family with a history of melanoma are at particular risk for developing melanoma early in life. Dr. Hitchins recommends twice-yearly skin cancer screenings for at-risk children ages 10 and up. You should examine your skin head to toe every month, looking for suspicious lesions. Check your moles and brown spots for the ABCDEs of melanoma: A — asymmetric (the two sides of the mole don’t match) B — borders are uneven, scalloped, or notched C — colors that vary in tone, hue, and shade (different shades of brown and black, blue, red, or white) D — diameter larger than a pencil eraser (may be smaller when first discovered) E — evolving shape, color, elevation, or size; bleeding, itching, crusting, or other changes (benign moles don’t change) When Dr. Hitchins diagnoses melanoma, she removes the lesion surgically in an in-office procedure with local anesthesia. To reduce recurrence, she may also recommend: Don’t wait if you notice a suspicious mole on yourself or your child. Contact Dr. Hitchins by phone or use the convenient online booking agent to schedule a melanoma screening.
<urn:uuid:47b29a6c-de51-4c90-be5a-c004ff921d47>
CC-MAIN-2021-31
https://www.dermatologynwhouston.com/services/melanoma
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151699.95/warc/CC-MAIN-20210725143345-20210725173345-00558.warc.gz
en
0.915201
575
3.25
3
1.1Describe your settings policies and procedures relevant to promoting childrens positive behaviour: My setting has a ‘Behaviour Policy’ that was recently updated/revised. The main aim of the policy is to promote good behaviour and respecting others through the promotion of self discipline, consideration for others and collective responsibility. The policy includes a code of conduct, and sets out the boundaries of acceptable behaviour by establishing clear rules which, are to be applied consistently and fairly across the whole school. The expected behaviour within school is widely distributed and displayed in classrooms, the dining hall and corridors, as is the behaviour expected in the playground. The policy is quite clear on rules for staff which include; Focus on good behaviour, praise wherever possible, be as fair as possible and never ignore bad behaviour. The school uses a ‘sanctions’ and ‘rewards’ system. Typically the rewards are; class points, showing good work to others, prizes, certificates, school ‘happy book’. The sanctions would typically include; Pupil goes to time out area, name on board, loss of playtime, incident noted in red book, referral to Headteacher and parents informed. Exclusion is the most serious sanction and is only taken in extreme circumstances. In the EYFS team where I am based, the class rules have been simplified relevant to the age group we are teaching/supporting. The children contributed to the rules and they are; ‘Kind Hands’ Kind Feet’ and ‘Kind Mouths’. These images are displayed in all EYFS classes and easy reference can be made to them if a pupil is not following the behaviour policy. The emphases, however, is the same throughout the school, we praise and reward good behaviour and set good examples for the children we support. 1.2Describe with examples the importance of all staff consistently and fairly applying boundaries and rules for...
<urn:uuid:a8156c89-4c14-41e9-9613-d4017367c5f8>
CC-MAIN-2017-17
http://www.studymode.com/essays/2-9-Support-Children-Young-Peoples-1183786.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118713.1/warc/CC-MAIN-20170423031158-00594-ip-10-145-167-34.ec2.internal.warc.gz
en
0.952892
397
2.703125
3
A close relative of a well-known fruit tree found in Ukambani, Taita and Voi could hold the key to a cure for some of the world’s untreatable cancers. Commonly known as soursop or custard apple, the plant belonging to the Annona species has shown dramatic success in destroying lung, breast, prostate, colon, liver, ovarian, cervical, breast, bladder and skin cancerous cells. Laboratory studies funded by the United States government through the National Cancer Institute and National Institute of Health and carried out by Purdue University show that a chemical compound in the plant selectively kills cancerous cells, leaving healthy ones unscathed. The most dramatic is a recent study by the Catholic University of South Korea and published in the Journal of Natural Products showing that an extract from the plant was 10,000 times more effective in killing colon cancer cells than the drug currently in use. The Annona tree family has over 110 species mostly growing in the wild in many parts of the world, with the main ones being Annona muricata found in the Amazon rainforest and the Annona cherimola, which is found locally and is commonly known as matomoko. The tomoko fruits that grow in the drier parts of the country are much smaller compared to recent hybrids that grow in higher areas in parts of Murang’a and Kirinyaga, in Central Kenya. Mainly because of its abundance in the Amazon rainforest and proximity to major research institutions in the US, the Amazonian variety has received the biggest share of academic research and commercial attention. Because of this attention, the Amazonian Annona has spawned a global commercial brand, Graviola, which is being traded in many parts of the world as a health supplement. The supplements, which are readily available on the Internet, are touted as the ultimate cure for a host of ailments. However, other members of the tree family have been found to contain the chemical ingredient Annonaceus acetogenins, which is responsible for its anti-cancer activity. This chemical ingredient, found in most parts of the plant but in different quantities, has been shown in laboratory tests to have strong anti-tumour properties even when administered in very small quantities. Research reveals that the plant has been used for medicinal purposes, including curing of cancer, for thousands of years. But is only in the last two decades that the tree has attracted conventional researchers. In Kenya, the fruit is quite popular, especially among the Asian community and foreigners and is readily available at the major markets in the city. Currently it is out of season. “Matomoko are some of the best selling fruits in this market. My main customers are Asians, Arabs and even whites,” said Mr Eric Mutua, who has been in the business for the past seven years at the City Market. At the Ngara open market in Nairobi, only one trader, Mr Simon Ndung’u had a handful of custard apples for sale which he said were leftovers from the previous season. Mr Ndung’u said that his clients are usually herbalists. “The herbalists say that if the fruit is crushed and mixed with pomegranate (Punica granatum) and other herbs, it can be administered as a cancer treatment,” said Mr Ndung’u. He sells one custard apple fruit for anything between Sh10 and Sh20, depending how affluent a client looks. At major supermarkets, a kilogramme of the fruit sells for Sh200 while at the City Market one can buy a kilogramme for Sh150. At open air markets like Ngara and Wakulima, a single fruit costs between Sh10 and Sh30. Emerging scientific evidence, which is freely available on the Internet, and abundant online sales of Graviola health supplements for a myriad of health complications including cancers, may have emboldened some local herbalists in recent years to claim that they have the capacity to cure malignant tumours. However, the director of Medical Services, Dr Francis Kimani has warned herbalists against advertising any such product without permission from the Pharmacy and Poisons Board. Dr Kimani is emphatic that any person claiming to have a cure for chronic diseases such as cancer and others must register their products with the Medical Services ministry. “The public must demand evidence of such registration before accepting treatment,” he said at a recent media briefing. But the fact that such herbalists can now cite some conventional scientific data to justify their claims could put the ministry in a sticky situation. Several of the studies indicate that the active ingredient in the fruit, Annonaceus acetogenins, must be administered in very small doses otherwise it could be dangerous. Some of the studies also warn that continued use of the compound could lead to the development of early Parkinson’s Disease, a degenerative disorder of the central nervous system. This has been discovered to be particularly the case when people use the crushed seed instead of the leaves, bark or the fruit pulp recommended by researchers. A city-based herbalist who requested anonymity for fear of antagonising the Pharmacy and Poisons Board and claimed to use matomoko for treating hypertension disagrees. “This could be true with conventional medicines, which are highly refined, but not so if the product is administered in its natural form,” he said. Dr Geoffry Mbijiwe of the Capito Herbal Clinic in Nairobi told the Nation on Friday: “Tomoko is a very common fruit. Though I have not used it for medicinal purposes, I am aware of the growing scientific interest in the fruit and hope any benefits from the research will be used responsibly.” Although the research community has enough evidence that the tomoko family could greatly contribute to a miracle cancer treatment, it is still many years before a pill could be put on the market because of scientific challenges and red tape. Research on the custard apple has so far failed to develop a patentable product. And since the natural extract cannot be patented, the pharmaceutical industry has to find a way to make a patentable product but which will not lose its anti-tumour properties. If the development of another successful cancer treatment drug Taxol, from the Pacific yew tree is anything to go by, then sufferers could be in for a very long wait. Taxol, one of the newer chemotherapy drugs, is an extract from the bark and needles of the yew tree, Taxus brevifolia, and is used in the treatment of ovarian, testis, breast, head, neck and lung cancers. While it has taken researchers almost a decade to successfully chemically produce the main anti-tumorous ingredient, annonacin, from the custard apple, it took 30 years to put the commercial product Taxol on the market. Make a killing Medical lobbyists who are accusing pharmaceutical companies of dragging their feet in availing what they call a miracle drug due to profit considerations, are suggesting that rich governments step in and help put the drug within reach of cancer sufferers. They say rich governments could fund basic research like the US is doing through a body like the World Health Organisation which would ensure that generated scientific knowledge would be freely available to interested parties without paying for intellectual property rights. Meanwhile, at a practical level Kenyans will continue buying Annona products from the Internet as health supplements or from the unregulated alternative medicines sector while the rest of the world makes a killing from the Graviola brand. The flesh of the ripe tomoko is usually eaten by hand or scooped out with a spoon. Occasionally it is seeded and added to fruit salads or used for making ice cream. The juice can also be diluted to make a refreshing drink. In some instances, the fruit has been fermented to produce an alcoholic beverage. Additional reporting by Isaiah Esipisu
<urn:uuid:a1aa4b94-8741-47e0-88b7-bda9717baf89>
CC-MAIN-2015-48
http://www.nation.co.ke/News/-/1056/653232/-/umrtpa/-/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398525032.0/warc/CC-MAIN-20151124205525-00102-ip-10-71-132-137.ec2.internal.warc.gz
en
0.954158
1,641
3.125
3
City of Lubbock Warns of Possible Mosquito-Related Diseases There hasn't been any reported cases of mosquito-borne diseases in Lubbock County yet, but conditions are perfect for that to change, according to a recent City of Lubbock press release. Even though summer is winding down, we're now hitting peak mosquito season. The recent rains mean puddles and other standing water, and that means mosquito larvae are getting laid all over the place. (Please dump out any shallow standing water you may have in your yard.) Some mosquito-borne illnesses that could hit the Lubbock area are Chikungunya, West Nile Virus and Zika. Each of these diseases are certainly unpleasant and potentially fatal to the very young, the elderly and the immuno-compromised. Zika has been in the news quite a bit due to the severe birth defects it can cause. The City of Lubbock recommends you reduce your exposure to mosquitoes in the following ways: • Wearing an EPA registered insect repellent • Covering up with long-sleeved shirts and long pants • Keeping mosquitoes out of living areas by using air conditioning or intact window screens • Limiting outdoor activities during peak mosquito times If you'd like to read the press release in its entirety, you can do so at the City of Lubbock's website.
<urn:uuid:8ba869aa-d131-440f-9de2-04ba9e7ba915>
CC-MAIN-2018-34
http://kfyo.com/city-of-lubbock-warns-of-possible-mosquito-related-disease/
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210243.28/warc/CC-MAIN-20180815161419-20180815181419-00384.warc.gz
en
0.948652
283
2.71875
3
I. INTRODUCTION. The three significant milestones in the history of clinical cytogenetics are the preparation of chromosome spreads from peripheral blood cultures (Exp Cell Res. 1960;20:613), the development of hypotonic methods to obtain enhanced chromosome spreads (Cancer Res. 1960;20:462), and the discovery that fluorescent quinacrine compounds could be used to demonstrate a unique banding pattern for each human chromosome pair (Hereditas. 1971;67:89). The remarkable advancement of the field of human cytogenetics is emphasized by the fact that it has been only 50 years since the correct number of human chromosomes was established. The various banding methods in current use not only permit identification of each chromosome, but also make it possible to detect specific alterations associated with hereditary syndromes and neoplasms. II. TRADITIONAL CYTOGENETIC ANALYSIS. While cytogenetic analysis is commonly used in the evaluation of congenital disorders (specifically, to diagnose syndromes associated with abnormalities of chromosomal number or structure, to establish the chromosomal sex in cases of sexual ambiguity, and to screen for karyotypic abnormalities in patients with multiple birth defects) and for prenatal diagnosis, the technique’s primary application in surgical pathology is in the evaluation of neoplastic disorders. The utility of the technique in surgical pathology rests on the fact that specific cytogenetic abnormalities have been recognized that are closely, and sometimes uniquely, associated with morphologically and clinically distinct subsets of lymphoma and leukemia, or with soft tissue neoplasms. Cancer cytogenetic studies have greatly aided targeted therapy, prognosis, and risk-based stratification of intensity of therapy. A. Advantages. The power of conventional cytogenetics lies in its ability to provide simultaneous analysis of the entire genome without any foreknowledge of the chromosomal regions involved in the disease process. In most cases, the type and location of an identified chromosomal abnormality is either directly diagnostic or can be used to direct additional testing. Contrary to some predictions, the advent of technologies such as array comparative genomic hybridization (aCGH) has not diminished the importance of traditional cytogenetics; in fact, these novel molecular techniques achieve some of their greatest utility when they are utilized in conjunction with traditional clinical cytogenetics. B. Limitations. The clinical utility of traditional cytogenetic analysis is restricted by two general features of the method. From a technical standpoint, analysis can only be performed on viable tissue specimens that contain proliferating cells (discussed in more detail below). From a sensitivity standpoint, analysis has resolution of only about 3 to 4 Mb at an 850-band level, and only about 7 to 8 Mb at a 400-band level. Traditional cytogenetic analysis is therefore only suited for detection of numerical abnormalities and gross structural rearrangements. The method does not have the sensitivity to detect mutations such as small deletions and amplifications, single base pair substitutions, and so on. C. Basic laboratory procedures. Chromosomes that can be individually distinguished by light microscopy can only be obtained during cell division, and so the fundamental requirement for traditional cytogenetic analysis is a tissue specimen that contains actively proliferating cells, or cells that can be induced to proliferate in vitro. The basic method for production of metaphase chromosomes for cytogenetic analysis is shown in Figure 58.1. Figure 58.1 Overall scheme for the production of metaphase chromosomes for traditional cytogenetic analysis. 1. Culture initiation. Different specimen types have different sample and handling requirements (Table 58.1). Inappropriate handling, as well as delay between specimen collection and culture initiation, can markedly decrease the likelihood that the sample will grow in vitro, so communication and coordination with the cytogenetics laboratory are essential. In vitro culture relies on a sterile microenvironment, and so specimens should be collected under sterile conditions. In practice, sterility is most difficult to achieve when sampling solid tissues; in this setting, clean instruments and a clean cutting surface, together with transport of the specimen in medium supplemented with broad-spectrum antibiotics, can be used to minimize contamination. TABLE 58.1 Specimen Requirements Preservative-free sodium heparin; transport refrigerated or at room temperature Bone marrow aspirate Preservative-free sodium heparin; the first several milliliters of the aspirate usually contains the greatest proportion of cells and so is the optimal sample for cytogenetic analysis; transport at room temperature Collect and transport in sterile culture medium containing broad-spectrum antibiotics; carefully select maximally viable tumor for analysis; transport on ice to minimize autolysis and microbial overgrowth Bone marrow and solid tissue neoplasms consist of cell types that proliferate spontaneously in culture, although often at a low rate. Lymph nodes are composed of cells that have a low intrinsic proliferative rate but that can be induced to divide much more rapidly by the addition of mitogens. Phytohemagglutinin (PHA) stimulates proliferation of T-lymphocytes. Lipopolysaccharide (LPS), protein A, 12-O-tetradecanolyphorbol-13-acetate (TPA), Epstein-Barr virus, synthetic oligonucleotides, and pokeweed mitogen induce proliferation of B-lymphocytes, and are also required for successful culture of some leukemias and lymphomas of B-cell origin. 2. Culture maintenance. The length of in vitro culture depends on cell type. Since bone marrow cultures contain spontaneously proliferating cells, they can be harvested after only a 24- to 48-hour culture interval, if not directly after specimen collection. Peripheral blood cultures usually require a 72-hour culture interval. The growth rate of solid tissue specimens is difficult to predict; some solid tumors require culture periods of 2 weeks or longer. 3. Cell harvest. Colcemid, a synthetic analogue of colchicine (an alkaloid from the bulb of the Mediterranean plant Colchicum), prevents separation of sister chromatids and is used to block the proliferating cells in metaphase, thus allowing an accumulation of cells at metaphase stage. A hypotonic solution is then used to swell the cells so that, after fixation, the chromosomes are adequately spread for microscopic analysis. Since cells in culture do not proceed through the cell cycle in synchrony, chemical synchronization of cell division is often required to obtain an acceptable mitotic index. A common chemical approach involves addition of excess thymidine, which stalls cells at the S-phase of the cell cycle by decreasing the amount of dCTP available for DNA synthesis. When the excess thymidine is removed (or the effect of excess thymidine is eliminated by the addition of deoxycytidine), normal DNA replication resumes, and the collective release of the cells from S-phase produces a transiently high mitotic index. Alternatively, 5-fluorodeoxyuridine (which inhibits the enzyme thymidylate synthetase) can be used to stall cells at the G1/S boundary; in this method, addition of thymidine releases the block. 4. Banding. The different techniques that can be used to stain metaphase chromosomes can be divided into two general categories: methods that produce specific alternating white and dark regions (bands) along the length of each chromosome and methods that stain only a defined region of specific chromosomes (Table 58.2). In general, the dark bands are gene-poor AT-rich regions, whereas the light bands are composed of gene-rich GC-rich regions. The quality of staining depends on several technical factors, including sufficient separation of the chromosomes in the metaphase spread to allow clear visualization. Although there are no internationally accepted standards for banding resolution, ideograms are used as reference points (e-Fig. 58.1).* Many countries, including the United States, Canada, UK, France, Japan, and Australia have established standards that specify the minimum requirements for the number and quality of cells that must be processed for chromosome analysis depending on sample type, although many cases require even more detailed analysis. 5. Microscopic analysis. The method used to stain the chromosomes dictates whether bright-field microscopy or fluorescence microscopy is used to visualize the chromosomes. Conventional photography has traditionally been used to produce high-resolution prints of the stained chromosomes, but electronic imaging systems have now replaced conventional photographic processes. TABLE 58.2 Major Chromosome Staining and Banding Techniques Techniques that produce specific alternating bands along each chromosome Giemsa banding (G-banding) Dark bands are AT rich; light bands are CG rich Quinacrine banding (Q-banding) Bright regions are AT rich Reverse banding (R-banding) AT-rich regions stain lightly (have dull fluorescence), CG-rich regions staining darkly (have bright fluorescence) 4,6-Diamidino-2-phenylindole (DAPI) staining DAPI binds AT-rich regions; produces a pattern similar to Q-banding Techniques that stain selective chromosome regions Constitutive heterochromatin banding (C-banding) Stains heterochromatin (α-satellite DNA) around the centromeres; can also be used to demonstrate some inherited polymorphisms Telomere banding (T-banding) Technical variation of R-banding used to stain telomeres Silver staining for nucleolar organizer regions (NOR staining) Stains the NORs (which contain rRNA genes) on the satellite stalks of acrocentric chromosomes Fluorescence in situ hybridization (FISH) Staining pattern is dependent on the probe 6. The final step in cytogenetic analysis is the production of a karyotype, which consists of the chromosomal complement of the cell displayed in a standard sequence on the basis of size, centromere location, and banding pattern (e-Fig. 58.2). D. Assay failure. Many of the common causes of failure to obtain a cytogenetic result (Table 58.3) can be avoided by careful selection of viable tissue with prompt specimen transport to the cytogenetics laboratory in the appropriate medium. Nonetheless, several causes of assay failure are inherent to in vitro culture and cannot be eliminated by even the most meticulous laboratory technique. TABLE 58.3 Common Reasons for Failure of Traditional Cytogenetic Analysis No viable cells present in the sample (necrotic tumor sample or improper specimen handling) Inappropriate sample (peripheral blood without blasts is submitted instead of bone marrow) Overgrowth by nonneoplastic cells Overgrowth by a nonrepresentative clone of tumor cells Post culture failure Technical errors involving cell harvest, slide preparation, or staining Misdiagnosis (an abnormality is overlooked, or an abnormality is incorrectly interpreted) Cytogenetic analysis of solid tumors highlights a number of these intrinsic technical limitations. First, since benign solid tumors contain few mitotic cells, cultures are susceptible to overgrowth by nonneoplastic cells. Second, even high-grade malignant solid tumors often grow poorly in vitro, especially if grown without the appropriate culture medium and growth factor supplementation. Third, the number of neoplastic cells in a solid tumor sample can be difficult to determine on the basis of gross examination, and the material submitted to the cytogenetics laboratory may consist primarily of stromal cells and inflammatory cells. Fourth, the viability of the neoplastic cells is often uncertain; even tumor samples that are not grossly necrotic may contain predominantly nonviable tumor cells. Fifth, in vitro culture selects for subclones within the neoplastic population that have a growth advantage, and so the karyotype may not be representative of the entire neoplasm. Sixth, contamination is often unavoidable for samples collected in the frozen section area or gross room, or from specimens arising from anatomic sites normally colonized by bacteria, such as the oral cavity, gastrointestinal tract, and skin. You may also need Full access? Get Clinical Tree
<urn:uuid:13dd9ca6-c957-4758-94ef-1ec79f715a3b>
CC-MAIN-2023-40
https://basicmedicalkey.com/cytogenetics/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510214.81/warc/CC-MAIN-20230926143354-20230926173354-00724.warc.gz
en
0.893783
2,586
2.921875
3
Mockingbirds are superb mimics that can imitate all kinds of bird, frog, and insect calls as well as mechanical sounds, urban noises, and anything else they hear in their environments. A mockingbird’s capacity to improvise is so extensive that he’ll sing many of his song types only once a season, so both human listeners and female mockingbirds never quite know what will come out of his beak next. That variety is what attracts females. Mockingbird songs (which are also occasionally sung by females, though not as persistently or loudly) are used in attracting a mate but probably have little or no role in territorial defense. Even with some noisy elements, mockingbird songs are pleasant for us to hear except when an unattached and desperate male sings the entire night through close to an open bedroom window. Small wonder the mockingbird has been named the state bird for five states. Why are female mockers most attracted to the males that sing the most songs? The number of songs is a good measure of how many life experiences a male has had—of his age and the situations he’s survived. This suggests how successful he has been, and how successful he’s likely to be during the coming nesting period. Many mockingbirds remain together as a pair year-round, defending a feeding territory in winter as well as their breeding territory in spring. And some mockingbirds remain as a pair as long as they both survive. Other mockingbirds remain together as a pair only during the nesting season, and choose new mates the following year. Mockingbirds eat lots of fruit, which they don’t like to share. Some chase away other fruit eaters, such as Cedar Waxwings, and have even been known to kill waxwings. Mockingbirds also require a lot of animal protein which they get from insects. They have a curious behavior shown most often when feeding on the ground: they raise and open their wings, flashing large white wing patches. Many scientists say this flashing behavior may help them feed by scaring up insects. Even though mockingbirds spend so much of their lives in towns and cities, often in our backyards, few ever visit feeders. But they do often come to birdbaths, so if you want to see them up close and personal, a birdbath may be very useful.
<urn:uuid:84f57e4f-a586-462d-8212-26eebe25ab42>
CC-MAIN-2018-39
https://www.pennington.com/all-products/wild-bird/resources/northern-mockingbirds
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160145.76/warc/CC-MAIN-20180924050917-20180924071317-00326.warc.gz
en
0.980987
480
3.4375
3
Guest Blogger – Alex Hutcherson Alexander Hutcherson is a graduate student at the University of Central Missouri in the Mass Communication department. He completed his undergraduate work May of 2016 with a Bachelor of Science in Digital Media Production with an emphasis in Film. His dream job is to work as a content creator at Blizzard Entertainment in their marketing department and then hopes to one day complete his Ph.D. and become a college professor. With the recent hurricanes Harvey and Irma devastating the south eastern coastal areas the discussion around global warming has once again had a resurgence. Put simply global warming is the rise in the average global temperature (MacMillan, 2016). For more perspective on climate change MacMillan states that “all but one of the 16 hottest years in NASA’s 134-year record have occurred since 2000” (MacMillan, 2016). image credit: https://www.nrdc.org Why should we worry? Global warming is happening because of humans. Carbon dioxide prevents the sun’s light rays from escaping our atmosphere. Instead of bouncing off the Earth and back into space light rays hit carbon dioxide and bounce back to Earth. National geographic shows statistically that “we’ve increased the amount [carbon dioxide] in the air by nearly half, mostly since the 1960’s” (Seven things to know about climate change, n.d.). For further proof ninety percent of scientists agree that “our carbon emissions are the main cause of global warming” (Seven things to know about climate change, n.d.). Reasons to care - Ice is melting fast - Species are being disrupted - Weather is wreaking havoc (Seven things to know about climate change, n.d.) In explanation by National Geographic, if the ice continues to melt there will be a rise in sea levels and less sunlight will be reflected by ocean rather than ice. With the environment in such an unnatural state of flex species are beginning to fade. Many species continue to adapt to new environments and habitats, but it cannot last forever. Global warming does not cause disasters, but it makes them much worse. “It’s not just the heat: Global warming adds moisture to the air, removing it from land and ocean” (Seven things to know about climate change, n.d.). image credit: https://www.nbcnews.com After seeing the destruction of Harvey and Irma the question has been raised, does this have anything to do with global warming? PBS cites Jeff Masters, “The U.S. has never been hit, since we started collecting records in 1851, by two Category 4 or stronger hurricanes in the same season,” in an article discussing why hurricane Harvey and Irma were so powerful (Akpan, 2017). The first reason for the massive hurricanes is a weak wind shear (Akpan, 2017). Think of a hurricane as a spinning top and wind shear as a gust of wind hitting the bottom of the top, causing it to tilt and dampen its force (Akpan, 2017). Using Masters’ expertise Akpan continues to explain the other two factors as “warm Atlantic ocean temperatures,” and “high levels of moisture in the air,” (Akpan, 2017). National Geographic believes that renewable energy is the answer, “The switch from fossil fuels is still just beginning. Every little bit matters: Every ton of CO^2 we emit melts 32 square feet of Arctic ice, according to a 2016 study, which means the average American melts 525 square feet a year. Every energy-saving building, retired gas-guzzler, and acre of preserved forest helps. But none of it will help much if the world doesn’t switch to a carbon-free energy supply soon.” (Seven things to know about climate change, n.d.). Do not ignore the evidence; together we can save the planet. It is not too late. Walk to work, carpool, plant some trees, spread the word.
<urn:uuid:2f12b5c6-e9a8-4572-a482-b03bf5c8ebad>
CC-MAIN-2017-51
https://showmejusticefilmfestival.wordpress.com/2017/09/15/guest-blogger-alex-hutcherson/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948517917.20/warc/CC-MAIN-20171212192750-20171212212750-00460.warc.gz
en
0.932244
834
2.8125
3
Thinking about intelligence as changeable and malleable, rather than stable and fixed, results in greater academic achievement, especially for people whose groups bear the burden of negative stereotypes about their intelligence. Can people get smarter? Are some racial or social groups smarter than others? Despite a lot of evidence to the contrary, many people believe that intelligence is fixed, and, moreover, that some racial and social groups are inherently smarter than others. Merely evoking these stereotypes about the intellectual inferiority of these groups (such as women and Blacks) is enough to harm the academic perfomance of members of these groups. Social psychologist Claude Steele and his collaborators (2002) have called this phenomenon “stereotype threat.” Yet social psychologists Aronson, Fried, and Good (2001) have developed a possible antidote to stereotype threat. They taught African American and European American college students to think of intelligence as changeable, rather than fixed – a lesson that many psychological studies suggests is true. Students in a control group did not receive this message. Those students who learned about IQ’s malleability improved their grades more than did students who did not receive this message, and also saw academics as more important than did students in the control group. Even more exciting was the finding that Black students benefited more from learning about the malleable nature of intelligence than did White students, showing that this intervention may successfully counteract stereotype threat. This research showed a relatively easy way to narrow the Black-White academic achievement gap. Realizing that one’s intelligence may be improved may actually improve one’s intelligence, especially for those whose groups are targets of stereotypes alleging limited intelligence (e.g., Blacks, Latinos, and women in math domains.) Blackwell, Dweck, and Trzesniewski (2002) recently replicated and applied this research with seventh-grade students in New York City. During the first eight weeks of the spring term, these students learned about the malleability of intelligence by reading and discussing a science-based article that described how intelligence develops. A control group of seventh-grade students did not learn about intelligence’s changeability, and instead learned about memory and mnemonic strategies. As compared to the control group, students who learned about intelligence’s malleability had higher academic motivation, better academic behavior, and better grades in mathematics. Indeed, students who were members of vulnerable groups (e.g., those who previously thought that intelligence cannot change, those who had low prior mathematics achievement, and female students) had higher mathematics grades following the intelligence-is-malleable intervention, while the grades of similar students in the control group declined. In fact, girls who received the intervention matched and even slightly exceeded the boys in math grades, whereas girls in the control group performed well below the boys. These findings are especially important because the actual instruction time for the intervention totaled just three hours. Therefore, this is a very cost-effective method for improving students’ academic motivation and achievement. Aronson, J., Fried, C. B., & Good, C. (2001). Reducing the effects of stereotype threat on African American college students by shaping theories of intelligence. Journal of Experimental Social Psychology, 1-13. Steele, C. M., Spencer, S. J., & Aronson, J. (2002), Contending with group image: The psychology of stereotype and social identity threat. In Mark P. Zanna (Ed.), Advances in experimental social psychology, Vol. 34, pp. 379-440. San Diego, CA: Academic Press, Inc. Blackwell, L., Dweck, C., & Trzesniewski, K. (2002). Achievement across the adolescent transition: A longitudinal study and an intervention. Manuscript in preparation. Dweck, C., & Leggett, E. (1988). A social-cognitive approach to motivation and personality. Psychological Review, 95, 256-273.
<urn:uuid:8402b204-8881-4b55-a71a-4eea74136239>
CC-MAIN-2021-49
http://blmediahu.info/believing-you-can-get-smarter-makes-you-smarter/
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363135.71/warc/CC-MAIN-20211205035505-20211205065505-00429.warc.gz
en
0.942163
837
3.546875
4
Is Matthew a gift from God? Matthew Boy’s name meaning, origin, and popularity From the Hebrew name Matityahu, meaning “Gift from God.” Matthew was one of Jesus’s apostles and author of the first Gospel in the New Testament. The name has been popular since the 1960s. Why does Matthew mean gift from God? The name Matthew is a boy’s name of Hebrew origin meaning “gift of God”. Matthew is the English derivative of Matthaios, the Greek form of the Hebrew Mattiyahu, composed of mattan, meaning “gift” and yah, in reference to God. The biblical Matthew was the apostle who wrote the first Gospel in the New Testament. What is the full meaning of Matthew? English form of Ματθαῖος (Matthaios), which was a Greek form of the Hebrew name מַתִּתְיָהוּ (Mattityahu) meaning “gift of Yahweh“, from the roots מַתָּן (mattan) meaning “gift” and יָה (yah) referring to the Hebrew God. Matthew, also called Levi, was one of the twelve apostles. How rare is the name Matthew? According to Social Security Administration data, Matthew has been one of the most popular boy names of the last century, remaining as the third most popular names for boys throughout the ’80s, ’90s, and up until 2002. It has been on a slight decline since then, dropping out of the top 10 in 2009. Why is Matthew a good name? From the ancient Hebrew Mattityahu, Matthew means “gift of God.” Any parent regardless of faith can agree that a little one is certainly a gift. Like David and Michael, Matthew has strong biblical ties, appearing as one of the twelve apostles and penning the first gospel of the New Testament. Why is Matthew spelled with two T’s? Mathew is a variant spelling of Matthew which is the English form of the Hebrew name “Mattathia”, meaning ‘Gift of God’. Matthew is best known as the Christian evangelist who wrote the first gospel of the New Testament. How do you say Matthew in other languages? Matthew: Matej (Czech), Matthieu (French), Matthaeus (German), Mattathias or Matthias (Greek), Maitias (Celtic), Matteo (Italian), Mateusz (Polish), Matteus (Portuguese), Matvei (Russian), Mathias (Scandinavian), Mata (Gaelic), Mateo (Spanish).
<urn:uuid:1d4f8099-80c6-4bba-8e4c-f7211404ab1b>
CC-MAIN-2022-21
https://amiracarluccio.com/biblical-reading/does-matthew-mean-gift-from-god.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662519037.11/warc/CC-MAIN-20220517162558-20220517192558-00437.warc.gz
en
0.93958
592
2.78125
3
1874–1925, American poet, biographer, and critic, b. Brookline, Mass., privately educated; sister of Percival Lowell and Abbott Lawrence Lowell. In 1912 she published A Dome of Many-Colored Glass, a volume of conventional verse. The next year she went to England, where she met Ezra Pound and became identified with the imagists . After Pound abandoned the group, she became its leader and champion, publishing a three-volume anthology entitled Some Imagist Poets (1915, 1916, 1917). Lowell's own poetry is particularly notable for its rendering of sensuous images. Her experiments with polyphonic prose, a free-verse form that combines prose and poetry, are considered unsuccessful. Among her volumes of poetry are Sword Blades and Poppy Seed (1914), Men, Women, and Ghosts (1916), Can Grande's Castle (1918), What's O'Clock (1925; Pulitzer Prize), East Wind (1926), and Ballads for Sale (1927). Her best-known poems are Lowell's perceptive and dynamic criticism includes Six French Poets (1915) and Tendencies in Modern American Poetry (1917). Her most ambitious work is her two-volume biography of Keats (1925). See biographies by H. Gregory (1958) and S. F. Damon (1935, repr. 1966). The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. See more Encyclopedia articles on: American Literature: Biographies
<urn:uuid:16520cb2-69b4-432d-8646-8b030851c180>
CC-MAIN-2019-47
https://www.infoplease.com/encyclopedia/arts/bios/american-lit/lowell-amy
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668896.47/warc/CC-MAIN-20191117064703-20191117092703-00399.warc.gz
en
0.902331
332
3.53125
4
OLD TRONDHJEM NORWEGIAN LUTHERAN CHURCH Old Trondhjem Norwegian Lutheran Church is a beautiful architectural mix of Greek Revival and Gothic Revival styles, with elements of the Norwegian stave church. The original church (cruciform plan) was built in 1878. All, except the Chancel, was taken down in 1899, to allow a larger building to be erected in its place. The original Chancel was incorporated in the new building. The interior of the church was decorated with hand painted and stenciled decorative motifs; the medium used was tempera on plaster. The original interior decoration of the church can be seen in a historic photograph from 1905. In 1910, the entire ceiling was covered with embossed tin tiles, a popular type of interior decoration in the United States during the years 1910-1920. At later dates, the walls received coverings of wallpaper and particle board panels. The original 1899 painted decorations in the Nave and in the Chancel were uncovered. After the restoration of the damaged plastered walls and ceilings, the murals were restored and/or replicated. The original architectural elements (i.e., painted moldings, doors, wooden floor, etc.) were also returned to their original appearance. RESTORATION CONSISTED OF: • Removing particle board, wallpaper, and tin tiles coverings • Filling cracks, holes, and missing areas of plaster and paint • Consolidating the paint layers • Inpainting, using reversible painting materials
<urn:uuid:58b48b17-f253-4929-9ecd-62f8e510ac47>
CC-MAIN-2020-05
https://www.architecture-restoration.com/project/old-trondhjem-norwegian-church/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251789055.93/warc/CC-MAIN-20200129071944-20200129101944-00064.warc.gz
en
0.961816
320
2.609375
3
Warping Artwork Using Warp Effect Styles Open Adobe Illustrator and create a new document for this example. Before we get started, you need to have a graphic to warp. For this tutorial, we will use a checkerboard graphic that was used in an earlier article. 1. Select the graphic to be warped. Using the selection tool, click on the artwork that you want to warp. 2. Use the Warp effect dialog. Click on "Effect" on the menu bar and then "Warp" to view the warp options that are available. You can choose from Arc, Arc Lower, Arc Upper, Arch, Bulge, Shell Lower, Shell Upper, Flag, Wave, Fish, Rise, Fisheye, Inflate, Squeeze, and Twist. With fifteen different ways to warp an illustration, we can't go through them all, but we can show you how to use the effect. 4. Warp with the Fish effect. Click "Fish" from the subset of the "Warp" menu selection. The "Warp Options" dialog will appear. Click the "Preview" box so you can see the way your artwork changes based on your selections. Every warp style has the same options: Orientation (Horizontal or Vertical), Bend, and Distortion (Horizontal and Vertical). 5. Choosing other warp styles. With the "Warp Options" box, changing the style of warp you use is easy. With your artwork selected, use the "Style" combo box to choose a different option.
<urn:uuid:f99adfa6-d530-49a3-9480-7b9ebdd010ea>
CC-MAIN-2017-13
http://www.brighthub.com/multimedia/publishing/articles/71942.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189127.26/warc/CC-MAIN-20170322212949-00554-ip-10-233-31-227.ec2.internal.warc.gz
en
0.885348
318
3.078125
3
Much like trees, clam shells have growth rings. The chemistry of these rings can be used as a proxy for ocean chemistry. Recently, an international team of scientists used the growth rings found in shells of Arctica islandica to produce an annual absolutely dated marine δ18O record for the last millennium which was published in Nature Communications. The record represents the first fine scale archive longer than ~100 years. Additionally, it has higher resolution, and less age uncertainty than δ18O records produced from sediment cores. To read more into what this record means, and the full results of the study see D.J. Reynolds et al, 2016.
<urn:uuid:1a4b145d-af45-4b89-a813-b0d267a4edff>
CC-MAIN-2018-26
https://blogs.egu.eu/divisions/bg/2016/12/09/coffee-break-biogeosciences-high-resolution-%CE%B418o-record-from-bivalves/
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860089.13/warc/CC-MAIN-20180618070542-20180618090542-00627.warc.gz
en
0.947485
131
3.15625
3
You’re Right…Even with Feelings of Anxiety & Depression Jon Kabat Zinn said, “As long as you are breathing, there is more that is right with you than wrong with you.” What if, however, you do not feel this “rightness”? What if you are breathing and feeling all wrong? So many people are living in states of anxiety, depression, anger, ADHD, and other mental health diagnoses. Many are told this is just the way that it is and that medication is available. Sometimes it works, sometimes it doesn’t. In many cases, medication is a beneficial tool that helps people function of a daily basis. The problem arises when individuals take medication and still feel “wrong”. They don’t want to have to medicate to feel “okay”. Although miracles do happen, there is no miracle cure to solve mental dis-ease. That being said, there are many things people can try. As no two people are alike, everyone must figure out what works and what doesn’t work for them. Counselling and trauma therapy are great options, and there are also many things you can try at home. What are the things that lead you to feel more “rightness”? Whether it’s going for a walk, spending time with a friend, working on a project, or sitting next to a waterfall, think of some things that you know bring you a sense of, “I’m okay.” Write a list and put it up in your room as a daily reminder to do the things like bring you a feeling of, “right…okay.” - Here are some suggestions to get you started: - Take three deep breaths. - Write your thoughts in a journal. - Bring your arms up over your head as you inhale, and down by your sides as you exhale. Repeat a few times. - Write what you are grateful for. - Try laugh yoga. - Go for a massage or massage yourself by rolling around on a tennis ball. I invite you to come up with some of your own. What would it look like to do at least one of these items per day? Sometimes no matter how hard you try to motivate yourself to get up and do the things you want to do, the energy just isn’t there. At times like these, you may need to call for back up. Whether it’s spending time with a mentor or a friend, seeing a therapist, or calling a help-line, there are options available for everyone. No matter what, there is always more than is right with you than wrong with you. Even through the anxiety, depression, and other dis-ease, you are still breathing and you’re not alone.
<urn:uuid:92ed5ebe-b52e-424f-8803-4b8f3dfc9912>
CC-MAIN-2020-24
https://bestkelownacounselling.com/youre-right-even-with-feelings-of-anxiety-depression/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347425481.58/warc/CC-MAIN-20200602162157-20200602192157-00342.warc.gz
en
0.965659
594
2.59375
3
Halloween may be over, but [happysat] has found a way to listen to the dead. Satellites, that is, specifically those in the 136-138 MHz and 150-400 MHz ranges. He’s using an RTL-SDR dongle and a QFH antenna to detect the death throes of decommissioned navigation and space research satellites. [happysat] was listening to NOAA/Meteor on the 137MHz band when he made this discovery. When a satellite is near end of life, the last bit of fuel is used to push it into graveyard orbit. This doesn’t always work, however, and when the light is just right, a chemical reaction makes the long-dead batteries conduct and these satellites in purgatory transmit once more. They’re not sending out anything proprietary useful, just unmodulated carrier that sometimes interferes with currently operational satellites on the 136-138 MHz band. [happysat] captured some audio from two of the oldest satellites that are still broadcasting, and links to a TLE set of dead satellites he created. Check out his frequency database for SDR# as well. Don’t have a weather satellite-capable antenna? Build one!
<urn:uuid:ba53f83b-2051-4729-b4a8-86002059e73e>
CC-MAIN-2019-22
https://hackaday.com/2014/11/04/sdr-satellite-death-receiver/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257243.19/warc/CC-MAIN-20190523103802-20190523125802-00111.warc.gz
en
0.939719
265
2.515625
3
ONE HUNDRED YEARS WITH THE SECOND CAVALRY By Joseph I. Lambert, Major, Second Cavalry Copyright 1939 Commanding Officer, Second Cavalry, Fort Riley, Kansas Capper Printing Company, Inc. During the time the negotiations with the Indians were going on, the troops were being prepared for a winter campaign. Provisions were made for special clothing for the troops to overcome the intense cold of this northern climate. The cavalrymen’s feet were protected by lamb’s wool socks over which were drawn heavy stockings extended to the knees. Indian moccasins of buckskin, and cork soles, being warmer and lighter, were generally worn. An outer boot of buffalo hide fastened by buckles, and extending the whole length of the leg, was placed over the moccasins. For underwear they used merino and perforated buckskin, and over this was placed a heavy blue flannel shirt, and then a blouse made of blanket or Norway kid. The overcoat was buffalo, bearskin, or beaver, and occasionally one of wool lined canvas. The head was protected by a cap of heavy cloth with fur border, constructed so as to protect the ears and face from the cold blasts. The hands were covered by woolen gloves and gauntlets of beaver or muskrat. A winter campaign was being decided upon, General Crook, who commanded the Department of the Platte, was placed in command of the southern force, which assembled at Fort Fetterman. A column under General Terry was to ascend the Missouri and Yellowstone rivers, but owing to the severe weather, this force never got started until May. General Crook’s force consisted of Companies A, B, E, I, and K, Second Cavalry, five companies of the Third Cavalry, two companies of the Fourth Infantry, a party of half-breed scouts, and a wagon and pack train. This force started March 1, following the old Bozeman Trail to Fort Reno. The first night out of the post the Indians stampeded the herd of cattle, which headed back to the fort. From this time on the Indians constantly made themselves known by observation and harassing. Scouting parties were sent out under Frank Gruard to search for the camp of Crazy Horse. On March 7, General Crook decided to leave his wagon train behind and push on by night marches. After several days travel to the north the column finally came to the general vicinity of the Indian camp. On the evening of March 16, the scouts sighted two Indians from the hostile band. General Crook ordered the column to halt and bivouac as a ruse to make the hostiles believe he had no intention of following them. Colonel J. J. Reynolds, Third Cavalry, was ordered to take Companies A, B, E, I, and K, Second Cavalry, and four companies of the Third Cavalry and search for the Sioux camp in the direction the Indian hunters had gone. This force left the column at 5:00 p.m. and took up the trail in bitterly cold weather. The command marched all night over slippery and uneven ground, causing great strain upon the strength of the horses. At halts it was necessary for the officers to walk along the column shaking men in order to prevent them from trying to sleep, as it was feared they could not awaken again. Gruard finally located the camp near the mouth of the Little Powder River, Montana, just before daylight, March 17, 1876, and after the force had made a march of about thirty-five miles. Although the command was on the bluffs above the Indian village, Colonel Reynolds made his plan of attack from there. One battalion was to attack the village at once and secure the pony herd, one was to follow up and destroy the village, and the other was to occupy the high ground to the left. In moving into their positions for attack, it was found that the ground was very rough and slippery. As this movement was so slow, it was nearly nine o’clock before the troops reached their places. The leading companies in the attack were I and K, under Captains Noyes and Egan. Upon reaching the village in the valley they were discovered before the attack commenced. Company K charged mounted at once with pistols drawn, while Company I proceeded to round up the pony herd. Several of the horses were struck in Company K and one man killed and three wounded. As the supporting troops had not yet arrived, the Indians now made a counter-attack, forcing Company K to dismount and take up a position in a plum copse along the river. Meanwhile, Company I had secured the herd of about 700 horses. The battalion which was to follow the first attack finally came up and took positions on the left of Company K. Part of it continued into the village and began its destruction. The third battalion had moved to the high ground but not to the exact spot where they were directed to go. As a consequence many of their shots landed among the friendly troops in the valley. After destroying large quantities of provisions in the village, Colonel Reynolds decided to withdraw in the afternoon. Taking with them the Indian pony herd, the troops finally arrived at Lodge Pole creek after a march of about twenty miles. They were supposed to make a junction with General Crook at this place but he had not yet arrived. The men lay down to sleep in a worn-out condition after thirty-six hours of marching. The suffering was greater because there was no food for men or horses. During the night no guard was placed over the captured herd, and it was easy for the Sioux to slip into camp and drive it off. No attempt was made to follow them and recapture it on account of the exhausted condition of men and animals. General Crook arrived March 18, and decided, on account of the shortage of provisions and the condition of men and animals, to return to Fort Fetterman and prepare for another campaign. Much criticism was brought upon Colonel Reynolds for not securing the provisions captured from the Indians and holding the village until the arrival of General Crook. It was said in his favor that he surprised the village and destroyed large quantities of supplies. In the fight on March 17, the command lost four men killed and five wounded, one of the latter being Lieutenant Rawolle, Company B, Second Cavalry.
<urn:uuid:703d1341-6fc8-4d7c-bca8-b39e1c763956>
CC-MAIN-2018-39
https://dragoonshistory.com/2008/10/07/little-powder-river/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156376.8/warc/CC-MAIN-20180920020606-20180920040606-00080.warc.gz
en
0.985422
1,314
2.828125
3
Inheritance is an object oriented concept which is used to reusability of code. You can achieve inheritance by using extends keyword. To achieve inheritance a class must extend to other class. A class which is extended called super or parent class. a class which extends class is called derived or base class.Syntax Understand the Simple Example of Inheritance Scala Single Inheritance Example Salary = 10000.0 Bonus = 5000 Types of Inheritance in Scala Scala supports various types of inheritance including single, multilevel, multiple, and hybrid. You can use single, multilevel and hierarchal in your class. Multiple and hybrid can only be achieved by using traits. Here, we are representing all types of inheritance by using pictorial form. Scala Multilevel Inheritance Example salary1 = 10000 salary2 = 20000
<urn:uuid:28e559b4-c08d-457b-a050-2883caa96ca6>
CC-MAIN-2022-33
https://www.javatpoint.com/scala-inheritance
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00620.warc.gz
en
0.871687
195
4.1875
4
In any case, although the media reports and a collapsing global stock market may stoke further fears, the situation is not so bleak at present, and a vast majority of patients are only suffering from a milder form of the infection, and will recover from it. This guide covers all the essential aspects of the coronavirus outbreak and its present outlook in detail, so that you are equipped to make safe and wise decisions for you and your loved ones. Coronavirus 2019 aka COVID-19 – What is it? You might be surprised to learn that a Coronavirus is a fairly common, infection-causing virus, much like the seasonal flu. In fact, it even shares many symptoms with the common flu, like a blocked or runny nose, heightened sinusitis, infection in the throat, etc. Why then has it become such a terrifying issue, and is it really as deadly as it is made out to be? The answer is both yes and no. Coronavirus first came into global perception during the late 1960s, but its origin is as yet undetermined. The virus can be of different types, with the most common strain only resulting in relatively harmless flu-like symptoms. The medical community also shares that almost everybody gets hit with this virus during their childhood, typically resulting in fever or the common cold. While many strains of the virus are still unidentified, there have been three instances reported so far of widespread and potentially fatal infection across the globe. These include: 1. MERS, 2014 – 2015 This originated in the Middle East, specifically in Saudi Arabia, with flu-like symptoms that quickly escalated into a fatal respiratory infection (hence, the name – Middle East Respiratory Syndrome). Soon, it spread to other countries in Asia, Europe, and Africa. There were also 2 cases of MERS reported in the US in April that year. But perhaps the biggest fatalities came from its spread to Korea in 2015, and the virus outbreak affected over 800 people in total. 2. SARS 2003 This was caused by a different strain from the MERS Coronavirus outbreak, and fatally affected over 700 people across the globe. Note: Both types of the Coronavirus were considered fatal at the time of the outbreak, as they were unidentified until then, and thus without a readily available cure. Today, the medical community considers both these virus types to be containable, and thus no fresh cases have been reported since. This relates to the current outbreak, which first began in a small food market in Wuhan, China, late last year. As with previous outbreaks of the virus, this too is attributed to a different (and thus perhaps uncommon) strain of the humble Coronavirus. It was named as “COVID-19” by the World Health Organization (WHO), as the virus gained global infamy early this year, as it began quickly spreading to other parts of the world. It is these 3 fatal outbreaks that have caught public attention, and resulted in widespread paranoia about the original virus. Regardless of the type of Coronavirus, it is considered zoomatic, meaning that it affects both animals and humans. In fact, researchers believe that the virus begins with animals (typically bats), and later progresses to humans through contact. Researchers also believe that the current outbreak of COVID-19 began with bats, later to snakes, eventually affecting humans. COVID-19 – Symptoms to watch out for Remember that the original virus strain causes symptoms that are eerily similar to the flu. So, this includes the common cold, throat infections, mild difficulty in breathing, fatigue, fever, coughing, etc. But what differentiates the deadly strain from the common (manageable) virus, is the possibility of escalation of the infection. If the person infected has a weak immune system, it can lead to pneumonia or acute breathing problems, eventually leading to respiratory failure. Is it contagious? Yes it is, through person to person contact. This means that it can spread through any of the following means: - Direct contact with an animal or person already infected with COVID-19 (by touch, through hands, skin, etc.) - Through transfer of saliva. - Through breath. For instance, when an infected person coughs of sneezes, the respiratory droplets (wet semi-liquid coming out), can be carriers of the virus. When you breathe these in, you can catch the virus. - Through indirect contact, when you touch an object or person/animal that has been in contact with someone infected by the virus. This could include water taps, door handles, cutlery or any other inanimate objects (as these act as carriers of the virus). If you have flu-like symptoms, should you be worried? First, don’t panic. Remember that the common flu involves a comprehensive list of symptoms, including a blocked or runny nose, common cold, sore or itchy throat and other throat-related infections, headache, fever, shivering caused by chills, fatigue, frequent sneezing, coughing, and body aches. As you can see, this is quite a common list of symptoms that people typically fall prey to, as seasons change. Your symptoms need immediate medical attention when: - You have difficulty in breathing. - You have a cough that gets worse every day and lasts longer than 7-10 days. - You have fever that began with a mild temperature, but grows every day. Do note that these symptoms are in no way comprehensive, and may be indicative of COVID-19. New information about the virus (including potential symptoms) is being discovered every day. Are there any further complications, beyond flu-like symptoms? Unfortunately, yes. This is what makes the disease so deadly! Other potentially fatal complications that could arise from the COVID-19 disease include: - Pneumonia (This is the most common complication that has risen out of the present outbreak.) - Severe cardiac problems, including irregular or erratic heartbeat, cardio vascular shock, and heart attacks. - Chronic fatigue, which may lead to more serious nervous disorders. This can also include intense muscle pain (like myalgia). - Severe respiratory problems such as Acute Respiratory Distress Syndrome (ARDS), or even respiratory failure. As you can see from the above list, COVID-19 typically affects the lungs and the heart. But in serious cases, in can also affect other parts and organs of the body, including the stomach, intestines, blood vessels, liver and the kidneys. In these cases, it is not so much the disease itself but the body’s response to the complications that causes the damage. (These may also be heightened by a weakened immune system.) When should you panic? Hopefully, never! But, you should seek immediate medical attention if: - You or someone you know has recently returned from China, where the COVID-19 virus first originated and is most prevalent. - You know someone who is infected with the COVID-19 virus, and you have had direct or indirect contact with them in the past couple of weeks. Here, do note that the symptoms for COVID-19 can take anywhere between 2 to 14 days to manifest, after initial infection. The sooner it is discovered, the higher the chances of managing it. Is there a cure for COVID-19? At present, there is no cure that has been discovered. However, the medical and scientific research communities are hard at work, unearthing new information about the virus every day. Also remember that too was the case with MERS and SARS. Once they came to global attention, it was only a matter of time before a cure was found. Likewise, the medical community is frantically working to cure/contain the present viral strain of COVID-19. Meanwhile, doctors are working to manage current infections of the virus through: - Anti/retroviral medicines. With this, the intention is to slow down the rate at which the virus grows or replicates, thus containing the outbreak. However, this is not a permanent cure of the disease. - Medication to reduce any swelling of lungs and thus ease breathing. (This may be in the form of steroids.) - Provision of mechanical support (like ventilators) to ease/improve breathing. - Blood transfusions (typically only plasma), depending on severity of disease progression. Will infection of the virus automatically lead to death? This will come as a big relief, but the answer is a grateful No. Based on current research (which is expanding every day), doctors have found that it can be fatal when the disease affects: - Elderly people. In fact, a whopping 14.8% of the people who were fatally infected by the disease were above 80 years of age. There were also no fatalities reported for those infected, if they were below 9 years of age. - People with weakened immune systems. (If you have an autoimmune disease, or a blood-related disorder, or have recently recovered from a prolonged illness, you may be more susceptible to the virus. However, there is still no cause to panic, unless you have recently returned from China or know someone who has.) In other surprising results, studies indicate that men, especially over 45 years old, are more vulnerable to infection. (Yes, women seem to be the stronger force in fighting COVID-19!) Global outlook so far This guide is meant to help you stay updated and thus make informed decisions regarding potential COVID-19 infection. With this, here is a brief summary of statistics of the disease this year: - Over 80,000 cases of the disease have been reported to date. - Of these, 2,867 have proven fatal. - This means that over 36,700 cases have recovered from the disease. Also – before you panic or reach for a mask or even consider quarantining yourself – do note that 60 cases have been reported in the US, of which 6 have already recovered. In addition, every attempt is being made to manage the 44,000+ cases still under infection all across the globe. Precautionary measures you can and should take at this time As that wise old adage goes, precaution is indeed a billion times (or more!) better than finding a late cure. For this reason, protect yourself and your loved ones with these simple measures. - Avoid visits to China, Korea, Italy, Iran, and Japan – countries containing the top number for COVID-19 infection. - Wash your hands with soap and sanitizer frequently. This is especially necessary when you visit a public area (including hospitals, malls, restrooms, restaurants & bars, parks, etc.). - Maintain a high standard of hygiene in your home and workplace areas. - If you have touched objects in public areas, avoid touching your face until you have washed your hands. Also, warm water is preferable as it has a higher ability to kill bacteria and inactivate viruses. - If you have a weakened immune system, consult your doctor on ways to improve your immunity (including vitamin meds, nutritious diet, etc.) - Be sensitive to others when you have been recently sick with the flu, or even a cold/cough. Try to stay in until you have completely recovered, as you may otherwise become a potential carrier for bacteria or virus. - Ensure that you always cover your mouth with your hands/elbows when you cough or sneeze. If you can cover up with a tissue, this is best. Also make sure to dispose tissues immediately after use, so they do not inadvertently become live carriers of bacteria/virus. - Disinfect your surroundings on a daily basis, including objects that you come in frequent contact with (like your phone, laptop, door knobs, cutlery, etc.) - Wash all fresh produce thoroughly before use. Remember that it all started in a harmless food market in China. Also, the disease is considered zoomatic, transferred from animals to human. So be extra cautious with meat products. - Give your pets regularly baths. They will also enjoy the cooling effect considering the hot summertime season! Information and numbers relating to COVID-19 are rapidly changing every moment. The latest updates on global statistics can be retrieved here. If you are worried about potential infection for you or someone you know, it is best to consult a doctor right away.
<urn:uuid:215a1cad-19e3-43af-b7f9-f67841d63235>
CC-MAIN-2022-21
http://rmfwwp.internete.biz/blog/blog/coronavirus-2019-aka-covid-19-an-informative-guide/
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662558015.52/warc/CC-MAIN-20220523101705-20220523131705-00730.warc.gz
en
0.960699
2,606
3.15625
3
Motion Control Components Keep Curiosity on the Go - Thursday, 01 November 2012 PI Ceramic monolithic piezo actuators (PICMA) were put to use in the Chemistry and Mineralogy instrument (CheMin) on the Mars Science Laboratory rover, Curiosity. CheMin is an Xray diffraction-capable mineralogy instrument whose purpose is to determine if water was present in the formation of Martian rocks and soil. A sample handling system is required to feed mineral powder samples through a funnel into the individual sample cells. The powder in the tunable sample cells must be shaken at variable amplitudes and frequencies in the range of 0.9 to 2.2 kHz to homogenize particle size or density segregations. The precisely controlled vibrations are generated by the PICMA multilayer piezo actuators. These ceramicencapsulated actuators emerged after rigorous tests by NASA’s Jet Propulsion Laboratory (JPL). Multiple samples passed 100 billion cycles of life testing with no failures, maintaining greater than 96% of their performance at the end of the test. The PI miCos precision motorized positioning stage is used on Curiosity’s ChemCam (Chemistry and Camera instrument), which consists of a laserinduced breakdown spectrometer and a high-resolution imaging camera. ChemCam determines, through laserbased remote pre-testing, which rocks in the vicinity of the rover (distances up to 9 m) warrant a closer examination with in-situ instruments. The highpower laser beam evaporates the rock and the light emitted from the plasma is analyzed with the spectrometer (see photo below). A specially modified and space-qualified MT-40 linear positioning stage focuses the analyzing system at the desired distance by translating the secondary mirror of the telescope. Due to violent shocks and vibration during launch and landing, every component in the stage, from the stepper motor to the crossed roller bearings and limit switches, had to be closely examined and optimized to eliminate the possibility of failure or performance loss. For fast and precise focusing, high resolution and linearity were required, and backlash had to be controlled tightly. Modeling and thermal compensation were used, as well as special vacuum-compatible lubricants for all moving parts.
<urn:uuid:c269f8c6-de4f-47b7-9ca7-364551748fef>
CC-MAIN-2015-22
http://www.techbriefs.com/component/content/article/15172
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927458.37/warc/CC-MAIN-20150521113207-00285-ip-10-180-206-219.ec2.internal.warc.gz
en
0.920158
452
2.890625
3
(The Conversation) — Tens of millions of Shiite Muslims from around the world will visit Iraq on Sept. 10 this year to see the shrines of Hussain, grandson of Prophet Mohammed, and his brother Abbas on the day of “Ashura.” This annual pilgrimage marks the 10th day of Muharram, the first month of the Islamic new year. As the Islamic calendar is a lunar one, the day of Ashura changes from year to year. Muslims visit the shrines to observe the martyrdom day of Hussain, who was killed in the desert of Karbala in today’s Iraq in A.D. 680. Shiite Muslims believe that Hussain was their third imam – a line of 12 divinely appointed spiritual and political successors. Muharram may be an ancient festival, but as my research tracing the modern-day impact of Islamic pilgrimage shows, its meaning has changed over the centuries. What was once a commemoration of martyrdom today inspires much more, including social justice work around the globe. Martyrdom of Hussein The story of Muharram dates back 13 centuries, to events that followed the death of Prophet Mohammed. After the prophet’s death in A.D. 632, a dispute emerged over who would inherit the leadership of the Muslim community and the title of caliph, or “deputy of God.” A majority of Muslims backed Abu Bakr, a close companion of the prophet, to become the first caliph. A minority wanted the prophet’s cousin and son-in-law, Ali. Those that supported his claim later came to be called Shiite Muslims. Even if Ali was not made the caliph, Shiite Muslims would consider Ali their first imam – a leader divinely appointed by God. The title of imam would be passed on to his sons and his descendants. Political leadership largely remained out of the hands of Shiite Imams. They would not be caliphs, but Shiites came to believe that their imam was the true leader to be followed. By the time Ali’s youngest son, Hussain, came to be the third imam, divisions between the caliph and the imam had further deepened. In A.D. 680, during the holy month of Muharram, a caliph of the Umayyad dynasty, Yazīd, ordered Hussain to pledge allegiance to him and his caliphate – a dynasty that ruled the Islamic world from A.D. 661 to 750. Hussain refused because he believed Yazīd’s rule to be unjust and illegitimate. His rejection resulted in a massive 10-day standoff at Karbala, in modern-day Iraq, between Umayyad’s large army and Hussain’s small band, which included his half-brother, wives, children, sisters and closest followers. The Umayyad army cut off food and water for Hussain and his companions. And on the day of Ashura, Hussain was brutally killed. Among the men, only Hussain’s sick son was spared. Women were unveiled – a violation of their honor as the family members of the prophet – and paraded to Damascus, the seat of Umayyad rule. Passion plays and performances This history is reenacted throughout the world on the day of Ashura. In Iraq, millions of pilgrims fill the streets to visit the shrines, chanting poems of lamentation, and witness a reenactment of violence in Karbala and the capture of the women and children. From New York and London to Hyderabad and Melbourne, thousands take part in Ashura processions carrying replicas of Hussein’s battle standard and following a white horse. This symbolizes Hussein’s riderless horse returning to the camp after his martyrdom. Persian passion plays known as “taziyeh,” music dramas of the many martyrs and tragedies of Karbala, are performed across Iran and many other countries. Taziyeh performances are meant to evoke deep emotions of grief in the audience. A powerful set of themes In the 16th century, a vast majority of the population across Persia, or today’s Iran, would be converted to Shiite Muslims. In this region, the passion plays evolved into a popular form of religious and artistic expression. The character of Zainab, the Prophet Mohammed’s granddaughter, has also come to play a central role in remembrance of the Karbala story. Scholars have drawn attention to speeches in which Zainab denounced the violence in Karbala and lauded Hussain’s “martyrdom.” Today, Zainab is seen as a strong female model of resistance. In the Iranian Revolution in 1979, the story of Karbala became a rallying point for opponents of the shah, who were fighting against the shah’s brutal and oppressive regime. They compared the shah to the caliph Yazīd and argued that ordinary Iranians had to stand up to an oppressor, just like Hussain had. Zainab’s resistance to oppression helped emphasize the role of women in Islamic society. Today the story of Karbala has become a powerful tool of fight for social justice in Muslim communities. “Who is Hussain?,” a social movement with chapters in over 60 cities worldwide, carries out charitable activities and blood donations in the name of Hussain. Volunteers are encouraged to organize around events that will be meaningful in their communities and will tie into social justice issues that Hussain is believed to have fought for. In 2018, local volunteers donated tens of thousands of bottles of water in Flint, Michigan in remembrance of Hussain and his companions, who were denied water for three days before they were killed. As historian Yitzhak Nakash points out, the tragedy of Karbala gives Shiite Muslims a common narrative to pass on to the next generations. And commemorating it in multiple ways is an part of their unique identity. (Noorzehra Zaidi is an assistant professor of history at the University of Maryland, Baltimore County. This article is republished from The Conversation under a Creative Commons license. This post originally ran on Religion News Service in September 2019. The views expressed in this commentary do not necessarily reflect those of Religion News Service.)
<urn:uuid:92f3bfd9-8363-4c8f-813c-84c779b487e6>
CC-MAIN-2022-05
https://religionnews.com/2021/08/18/what-is-ashura-how-this-shiite-muslim-holiday-inspires-millions/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302715.38/warc/CC-MAIN-20220121010736-20220121040736-00690.warc.gz
en
0.961579
1,322
3.0625
3
The Oxford Handbook of the History of Psychology (Book Review) Editor: Baker, David B. Publisher: Oxford University Press, 2012. 672 pages. ISBN: 978-0195366556 Reviewed By: Harold Takooshian, PhD, Fordham University At over 600 pages, the purpose of this latest volume in the Oxford Library of Psychology is "to bring a historical perspective to international psychology" (page 621). It is a "handbook" in the truest sense of the term, offering a mass of detailed information in a palm-size format. Its cumulative 21-page index of names and topics alone is an invaluable index of psychology world-wide in the last century. For most of the 20th century, we saw "history of psychology" textbooks focus exclusively on North America. This myopia was natural, since most psychologists and publications by far were concentrated in the U.S. This myopia first changed in 1976, when historians Virginia Staudt Sexton and Henryk Misiak edited Psychology around the world, their first-ever panorama of psychology across nations. After 1976, their volume became a model, inspiring others' edited tomes, in which each chapter would limn the history of psychology in a different nation: in 1987 (Gilgen & Gilgen), 1992 (Sexton & Hogan), 1992 (Gielen, Adler, & Milgram), 2000 (Pawlik & Rosenzweig), 2001 (Overmier & Overmier), 2004 (Stevens & Wedding), 2006 (Stevens & Wedding). The Baker volume brings this genre to new heights in several ways. Its 29 chapters cover 27 nations, averaging about 22 pages each. The 40 contributors include key leaders in international psychology, authoring chapters that range from 8 pages (on Brunei Darussalam) up to 44 pages (on China) in proportion to the growth of psychology in that region. The tone of most of the chapters seems familiar--that the region's psychology had modest origins, grew despite challenges, and now has a bright future. The editors' format for each chapter is useful: (a) an abstract, including key words; (b) a background, including key origins/ people/ events/ specialties/ concepts; (c) a glossary of terms; and. (d) an extensive bibliography of indigenous sources. The volume benefits from two chapters at the start and end of the volume, co-authored by two master historians--David Baker himself, and his erudite mentor Ludy Benjamin. Their introductory chapter (pages 1-17) offers a fascinating overview, complete with recondite but useful lists of the international congresses since 1889, and 75 national psychological associations. Their concluding chapter (pages 616-624) describes trends in the likely future of psychology world-wide. With the index on pages 625-645, it seems intentional that it is highly detailed--as a useful resource for readers seeking people, events, or organizations of the past century. If there is one limitation to this masterful volume, it is the relative absence of internet resources in this electronic age. So much of our knowledge has now shifted to the internet, and a roster of current organizations and resources, such as the APA, international psychology, or the Union of Psychological Sciences—indispensible internet resources for anyone seeking to learn about international psychology (Takooshian & Stambaugh, 2007). Like other Oxford handbooks, this seems aimed at libraries more than individual purchasers. Whatever the case, it is an invaluable resource for those students and professionals who share the editors' desire to internationalize the history of psychology. Gielen, U.P., Adler, L.L., & Milgram, N.A. (1992). (Eds.). Psychology in international perspective: 50 years of the International Council of Psychologists. Amsterdam: Swets & Zeitlinger. [339 pages] Gilgen, A.R., & Gilgen, C.K. (1987). (Eds.). International handbook of psychology. Westport CT: Greenwood. [629 pages] Overmier, J.B., & Overmier, J.A. (2001). (Eds.). Psychology: IUPsyS global resource. East Sussex UK: Psychology Press. [CD ROM] Pawlik, K., & Rosenzweig, M.R. (2000). (Eds.). International handbook of psychology. Thousand Oaks CA: Sage. [629 pages] Sexton, V.S., & Hogan, J.D. (1992). (Eds.). International psychology: Views from around the world. Lincoln: University of Nebraska. [524 pages] Sexton, V.S., & Misiak, H. (1976). (Eds.). Psychology around the world. Monterey CA: Brooks/Cole. Stevens, M.J., & Wedding, D. (2004). Handbook of international psychology. New York: Brunner-Routledge. Stevens, M.J., & Wedding, D. (2006). Psychology: IUPsyS global resource. [CD ROM]. (7 ed.). Hove, UK: Psychology Press. Takooshian, H., & Stambaugh, L.F. (2007). Becoming involved in global psychology. In U.P. Gielen & M.J. Stevens (Eds.), Toward a global psychology: Theory, research, intervention, and pedagogy (pp. 365-389). Mahwah NJ: Erlbaum. Harold Takooshian, PhD, is professor of psychology and urban studies at Fordham University, where he directs the program in organizational leadership. Editor’s Note: Google Books offers a limited preview of The Oxford handbook of the history of psychology.
<urn:uuid:fc89af46-0b6b-4569-95f5-19631bdecabc>
CC-MAIN-2015-32
http://www.apadivisions.org/division-1/publications/reviews/history-of-psychology.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438044271733.81/warc/CC-MAIN-20150728004431-00008-ip-10-236-191-2.ec2.internal.warc.gz
en
0.809006
1,216
2.734375
3
Electric vehicle motor circulating cooling system is used in new energy vehicle battery testing. So the performance requirements are very high. Among them, the lubricating oil of the electric vehicle motor circulating cooling system has a certain role, specifically what is the role of the electric vehicle motor circulating cooling system? The lubricating oil of the electric vehicle motor circulating cooling system can reduce friction and wear inside the bearing and prevent seizure. Prevent direct contact between the bearing ring, the rolling element and the cage in contact with each other, reduce the sequence rubbing, wear, prolong the fatigue life, and the rolling fatigue life of the bearing. In the operation, if the rolling contact surface is well lubricated, it will be extended. Ground, if the viscosity of the lubricating oil is low and the thickness of the lubricating oil film is small, it is shortened. For the cycle oil supply method, etc., the heat generated by the friction can be discharged by the oil, or the heat radiated from the outside, cooled, preventing the bearing from overheating and preventing the deterioration of the lubricating oil itself. Electric vehicle motor circulating cooling system, bearing lubrication method, mainly grease lubrication and oil lubrication. In order to give full play to the bearing performance, it is necessary to first select a suitable lubrication method according to the working conditions and the purpose of use. If only the lubrication effect is considered, oil lubrication is dominant. However, grease lubrication simplifies the bearing’s peripheral structure. Electric vehicle motor circulating cooling system bearings commonly used greases are calcium-based grease, sodium-based grease, calcium-sodium-based grease, lithium-based grease, aluminum-based grease and molybdenum disulfide grease, the same kind of grease It will also vary greatly depending on the performance of the grades, so be careful when choosing. In principle, greases with different grades cannot be mixed, and mixing greases containing different types of thickeners can damage the grease structure. When selecting the grease of the electric vehicle motor circulating cooling system according to the working temperature, the main index refers to the temperature at which the grease is heated by the specified container to the flowing state, the oxidation stability and the low temperature performance. The dropping point can generally be used to evaluate the high temperature performance, and the bearing actually The working temperature should be lower than the dropping point of 10-20 °C. Synthetic grease should be used at a temperature below the drop point of 20-30 °C. When selecting the grease according to the bearing load, the grease with a small penetration should be selected for the heavy load. When working under high pressure, in addition to the small penetration, it also has higher oil film strength and extreme pressure performance. When selecting grease according to environmental conditions, calcium-based grease is not easily soluble in water and is suitable for drying and low moisture environments. In the operation of the electric motor motor circulating cooling system, there must be attention to the place where the battery test part is affected, and the fault should be solved as soon as possible. 1. Choose from the quality of the laboratory resin reactor temperature control system: can affect the quality of the laboratory resin reactor temperature control system, may be the use of accessories. There are some small factories o...View Details Nowadays, the application of industrial water chiller has involved various industries, including petrochemical industry, plastic industry, electronic industry, vacuum coating and so on. However, when purchasing industrial water chillers, m...View Details When it comes to industrial chillers, everyone probably knows it, but is it clear to you what types of industrial chillers are divided into? What is your first reaction to industrial chillers? Industrial chiller is a kind of cooling equipm...View Details The supporting equipment of the reaction kettle is the temperature control product provided by our company for the majority of users for the users. When the user selects the equipment for the reaction kettle, it is necessary to understand ...View Details
<urn:uuid:ad0ee2a4-c624-425f-9bb4-e0aba1eb2bce>
CC-MAIN-2023-50
https://www.lneya.com/news/car-motor-circulating.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00361.warc.gz
en
0.921477
822
2.921875
3
Have you been confused by encountering the term "aspect ratio" when looking at chainmaille weaves, or discussions of jump rings? I have too! Aspect ratio is a simple concept that can be helpful, incorrect, and is almost always confusing and frustrating. What is Aspect Ratio? Aspect ratio is the inner diameter of the ring, divided by the thickness of the ring. Wait, I don't understand? A jump ring is generally described using two numbers. The first is the thickness of the wire used to make the jump ring. This is called the gauge. The second number is the diameter of the jump ring. Here at UnkamenSupplies jump rings are measured using ID, or Inner Diameter. Our commercial rings are measured by their OD, or Outer Diameter. You can read about the difference in these two measurements here. So, what does that mean in regard to Aspect Ratio? Aspect ratio isn't a magical number. It is a fraction, or ratio. That means that it is a measure of the relationship of two other numbers. When you look at aspect ratio you are looking at the relationship between the inner diameter of the jump ring(in millimeters) and the thickness of the jump ring(in millimeters). FRACTIONS ARE SCARY!!!! I promise they aren't that bad. I'll even give you a tip that will make them REALLY easy! I'm sure that you know that when you divide something by 1 it doesn't change. For example 4/1=4 , 5/1=5 , and 567.89/1 = 567.89 18 gauge wire is 1mm thick! That means that the aspect ratio of an 18 gauge ring is its ID(inner diameter). If you know the aspect ratio of a weave but don't know what size rings to use, 18 gauge is really easy to figure out. Let me give you an example. Anne would like to make a new weave. She's never tried it before and it says it has an Aspect Ratio of 4.5. It has beautiful pictures in the tutorial, but the author didn't list what size rings they used. She knows that if the aspect ratio is 4.5 she will be able to make it in 18 gauge 4.5mm ID rings. In case you'd like to see the math for that AR(4.5) = ID(4.5) / 18 gauge(1mm) I thought you said it could be incorrect? Why don't I ever see it listed in your shop? The aspect ratio of a chainmaille weave is generally considered to be a range of values describing the range of jump rings with which it is possible to make that particular weave. For example, European 4 in 1 will generally work when made with rings that have an aspect ratio between 3 and 5. In a perfect world those numbers are exact and scalable. I do not run my shop in a perfect world. In my shop suppliers sometimes give me wire that is not precisely the right gauge. Because of this and other errors I find it to be too risky to rely on numbers for your products. I test every weave I offer and make sure that it works in the ring size I list, plus a margin of error. I work hard to ensure that my products never come to you in a size that "works on paper". My products are tested and proven. For all the ladies out there my wife has another point to help you understand why I don't use aspect ratio in my shop. You know your dress size right? Is it the same at every store? Just like your jean size I'm sure you rely heavily on the knowledge that your dress size will be the same in every brand, and at every store. I joke of course. I know that sizing changes between brands, and even between different product lines. Aspect ratio is a little bit like that. I hope I've helped you understand this confusing number!
<urn:uuid:9f0e7b47-8c29-40a2-9dfa-8d71ed0f1e5c>
CC-MAIN-2020-24
https://www.creatingunkamen.com/blogs/unkamenblogs/12312949-confused-by-aspect-ratio
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347391277.13/warc/CC-MAIN-20200526160400-20200526190400-00328.warc.gz
en
0.963937
821
2.734375
3
Sec.17. But no governor has full power to prevent the passage of a law. If he does not approve a bill, he must return it to the house in which it originated, stating his objections to it; and if it shall be again passed by both houses, it will be a law without the governor’s assent But in such cases greater majorities are generally required to pass a law. In some states, a majority of two-thirds of the members present is necessary; in others, a majority of all the members elected. In a few states, only the same majorities are required to pass a bill against the veto as in the first instance. Or if the governor does not return a bill within a certain number of days, it becomes a law without his signature, or without being considered a second time. In some states, bills are not sent to the governor, but are laws when passed by both houses and signed by their presiding officers. Executive Department. Governor and Lieutenant-Governor. Sec.1. The chief executive power of a state is, by the constitution, vested in a governor. The governor is chosen by the people at the general election; in South Carolina by the legislature. The term of office is not the same in all the states. In the six New England states, the governors are chosen annually; in the other states, for the different terms of two, three, and four years. Sec.2. The qualifications for the office of governor are also different in the different states. To be eligible to the office of governor, a person must have been for a certain number of years a citizen of the United States, and for a term of years preceding his election a resident of the state. He must also be above a certain age, which, in a majority of the states, is at least thirty years; and in some states he must be a freeholder. Sec.3. The powers and duties of a governor are numerous. He communicates by message to the legislature, at every session, information of the condition of the state of its affairs generally, and recommends such measures as he judges necessary and expedient. He is to take care that the laws be faithfully executed, and to transact all necessary business with the officers of the government. He may convene the legislature on extraordinary occasions: that is, if, at a time when the legislature is not in session, a matter should arise requiring immediate attention, the governor may call a special meeting of the legislature, or as it is usually termed, an extra session. Sec.4. A governor has power to grant reprieves and pardons, except in cases of impeachment, and, in some states, of treason. To reprieve is to postpone or delay for a time the execution of the sentence of death upon a criminal. To pardon is to annul the sentence by forgiving the offense and releasing the offender. A governor may also commute a sentence; which is to exchange one penalty or punishment for another of less severity; as, when a person sentenced to suffer death, is ordered to be imprisoned.
<urn:uuid:d0f752ca-a2f0-414a-9645-717d9c5edd1f>
CC-MAIN-2016-44
http://www.bookrags.com/ebooks/15319/26.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718423.65/warc/CC-MAIN-20161020183838-00129-ip-10-171-6-4.ec2.internal.warc.gz
en
0.969954
629
3.640625
4
The appearance, culture, religion… not even the language of Mallorca has always been the same. In the history of the island, there is a key moment: the entry of King Jaume I and the Christian conquest of these lands. The whole adventure this deed entailed began on 9th September of 1229 in the pleasant little port of Sant Telm, in Andratx, opposite the island of Dragonera . And it is here that we will embark on our route to follow the trail of the past. We will discover the most significant places of the Conquest, which was to conclude on 31st December 1229 in the city of Palma, and we will come to know the main figure of this historic episode: the king, ‘en Jaume’. 01.The Landing Cross We start the route in Sant Elm, in the municipal area of Andratx, the centre of the region formerly known as Palomera. On 9 September, 1229, James I's navy, with 155 large ships and some other smaller vessels, anchored at Dragonera and the islet of Pantaleu. The conquering army, basically comprising contingents of the four magnates (the count of Rosselló, Nuno Sanç; the bishop of Barcelona, Berenguer de Palou; the viscount of Bearn, Guillem de Montcada; and the count of Empordà, Hug d'Empúries) from Catalan towns and cities. It has been estimated that there were a total of 15,000 infantrymen and 1500 knights. The Ali of Palomera story took place in the small port of Sant Elm, which can be easily seen from es Pantaleu and Dragonera. The chronicles say that this character swam from the coast to the small island of Palomera, es Pantaleu where he met the King with some of his troops. He spoke to the king and foretold success for the Christian venture. Ali told him that his mother, who was an astral fortune-teller, had seen it in the stars. The king took Ali’s gesture into account and gave him favourable treatment after the conquest. Tradition has it that Ali’s mother examined the messages of the stars from the medieval tower of Sant Elm. Mossèn Alcover’s rondalla (tale) recounts that an eagle dropped a fish on the small island for King James to eat. From Sant Elm, we walk through the village of Andratx and now in the municipality of Calvià, we arrive at Santa Ponça where we will look for the Caleta and the Landing Cross near the Yacht Club. The cross commemorates the place where James I landed with the majority of his troops on the 10 September. It was erected there in 1929 to honour the seventh centenary of the conquest. It was made by the sculptor Tomàs Vila. In the lower part of the cross, it features interesting relief work with scenes of the conquest of Mallorca. The Chronicle of Bernat Desclot, written in around 1285, recalls the moment of landing: “Viren davant ells un bell port, qui ha nom Santa Ponça, en què podien molt bé eixir e que no hi havia de sarraïns negú. E aquí ells preseren terra al pus tost que pogren, cavallers e sirvents”. (They saw a beautiful port before them, called Santa Ponça, where they could land and where no Saracens were in sight. It was there that they went ashore, whoever could, knights and servants). 02.Chapel of the Pedra Sagrada /Sacred Stone Between Santa Ponça and Palma Nova, to the left of the road, is the Pedra Sagrada Chapel. This small chapel holds the stone that, as legend has it, was used to give mass to James and his soldiers before surging on to the battle of Portopí. This mass was given inside a tent. To commemorate the seventh centenary of the conquest, Mossèn Antoni Maria Alcover ordered the construction of this chapel, which was officially opened on the 12 September, 1929. It was built in line with the Neo-Romanesque style. The façade features relief work by Tomàs Vila, inside the tympanum, which represents scenes from the crucifixion. Above the doorway inside the chapel, we can see a polychrome relief of Mare de Déu de la Salut (Our Lady of Health), whose dedication is associated to the conquest. At the altar, we can observe the sacred stone which is the main piece in the chapel and next to it is Mare de Déu de la Pedra Sagrada (Our Lady of the Sacred Stone). As of 1999, we can also see an image of Mare de Déu dels Desamparats (Our Lady of the Forsaken) on the other side. The building was erected on lands belonging to the Santa Ponça possessió (estate) which were ceded by the marquise of Can Villalonga-Desbrull at the time of building. 03.The Montcada Cross We move along the old Palma road, past Cas Saboners and in the entrance of Palma Nova we will find the Montcada Cross . It sits on the site where we are to believe that Guillem de Montcada and his nephew Ramon de Montcada died during the battle of Portopí, on the 12 September, 1229. A pine tree used to stand there which was named the Pi de los Montcada (Montcada Pine). In 1886, this cross was erected to remember the act as one of the acts of tribute to the Conquest. The Montcadas consisted of Guillem, the Viscount of Bearn and Lord of Montcada and Castellvell who brought one hundred knights in the conquest party and Ramon, Lord of Tortosa, who put forward fifty knights. They were both buried and remain in the Santes Creus Monastery. Along the old Palma road, we will reach the area surrounding the neogothic Bendinat castle. We can ask permission to enter inside the estate; however, if this is not possible, we can locate the scene of these historical references in the higher part of the Bendinat Golf Course, where there is a good view of the castle and its surrounding areas. This viewpoint of the castle will serve to remind us of the legend based on popular etymology (and little on historic facts), which tells that King James uttered the sentence "Bé hem dinat" (we have eaten well). Yet the castle’s name most definitely comes from the Arabic, which we could translate as “son of the man with a very light beard”. It is most likely that the King dined near this place, and more specifically in Oliver de Térmens’ tent, as the Llibre dels Feits del Rei En Jaume Chronicle confirms. The castle was built in the second half of the 19th century, upon the orders of the Marquis of Romana. It later passed to the Despuig and the Truyols families. 05.Camí dels Reis, La Real Monastery Before we reach Palma, on the old road from Palma to Palma Nova, we turn off towards Gènova, where the camí dels Reis (the Royal Path) begins. Its name is interesting in terms of historical importance, given that it was supposedly the conquering army’s route to the Royal camp. When King James I the Conqueror saw Madina Mayurqa from the na Burguesa mountainside (near where Gènova now stands) on around the 12 September, 1229, he was left dumbstruck and uttered praising words worthy of the best slogan: “E vérem Mallorques, e semblà'ns la plus bella vila que mai haguéssem vista, jo ni aquells qui ab nós eren”. (And we saw Mallorca and it struck us as the most beautiful city that we had ever seen, both myself and those accompanying me) We continue along the Royal Path, which has been partly absorbed by the ring road, and we reach the La Real monastery where, as tradition has it, the definitive Royal camp was set up on the 13 September 1229. It did not move from this spot until the army entered Madina Mayurqa on 31 December 1229. It seems as though the Real grounds were the garden of the Muslim wali, which is where the origins of its name lie (Real means Royal in Spanish). The chronicler Bernat Desclot wrote the following about setting up camp: “Trobaren, pres de la ciutat una ballestada, un jardí qui era del rei sarraí, molt gran, que ben tenia de cascun caire dues ballestades, e era clos de totes parts de forts murs d'un estat de llança en alt, e havia-hi un bell alberg e passava l'aigua per mig. E tota la host entrà-se'n llaïns, e aquí atendaren-se e menjaren de la fruita que trobaren e'l jardí aquella nuit, que d'àls no soparen per ço cor no n'havien; e donaren als cavalls palla e herba que trobaren assats. E reposaren que molt eren treballats; mas no per tant que anc aquella nuit no es desgarniren ne null hom en tota la host no dormí, ans estegueren tota la nuit aparellats de batalla si els sarraïns los volguessen assaltar”. (Near the city we found a very large garden, around an arrow shot away, which belonged to the Saracen king and its boundaries measured two arrow shots across and it was closed all around by strong walls that were spear-height and there was a beautiful refuge with water running through it. And the whole group walked onto the plain, set up camp and ate fruit that they found in the garden that night, as they had nothing else to eat until then, and they found straw and grass to give the horses. And they rested as they had worked hard; but no man slept during the whole night and they were ever prepared for battle should the Saracens decide to attack) In around 1266, the Cistercian monastery founded by the monks of Poblet (in 1235) moved here. It was initially founded in the former Alpic farmhouse, where the Granja estate is currently located (Esporles). It seems that from 1239 onwards, the monks had already established themselves very near the Real, which now belongs to the possessió (estate) Son Cabrer. In the second half of the 13th century, Ramon Llull stayed there and wrote a few pieces, including Llibre d’Ave Maria. The monastery owned a considerable number of properties and the abbot had civil jurisdiction over these. The abbot of La Real was also a member of the council established by James III of Mallorca and held the second seat of Mallorca’s religious stratum after the bishop. Until 1517, the abbots would normally have been chosen by the Poblet monastery and would also come from there. From that year onwards however, they would be chosen by the monks of La Real themselves. The latter finally became independent from Poblet in 1560. In the 18th century, a renowned Lullist, Antoni Ramon Pasqual, was abbot. In 1835, the Cistercian order left the monastery due to Mendizábal’s exclaustration. The old monastic church became the vicarage of the village of Secar de la Real, and the Misioneros dels Sagrats Cors (Missionaries of the Sacred Heart) set up here in 1897. In 1913, the vicarage was converted into a parish church and shortly before, in 1907, the church was renovated by the architect Guillem Reynés. 06.Porta de la Conquesta, Santa Margalida church, Sant Miquel church We walk along calle 31 de Diciembre (31 December street) in Palma, whose name recalls the day of the conquest, and we go into calle de Sant Miquel. Near the crossroads of calle de la Reina Esclaramunda and calle Marie Curie is the Puerta de la Conquista (Conquest) or Santa Margalida Gate, also called Esveïdor or Puerta Pintada Vella (Old Painted Gate). In Arabic, it was the Bab-al-Kofol or Bab-al-Khal gate. It was through these gates that King James’ troops entered into Madina Mayurqa to conquer it. At dawn on the 31 December, the army were prepared for battle and heard mass. The king gave the order to attack, but upon seeing the army’s immobility, he had to insist three times. Then, Christian soldiers shouting “Santa María” (Saint Mary) charged at a demolished wall near the Santa Margalida gate. The king reprimanded the nobility, who stood immobile in the distance: Shame on you knights, shame! ... The Chronicle or Llibre dels Feits del rei en Jaume tells in legendary detail how Saint Jordi was the standard-bearer of the Christians: “E segons que els sarraïns nos contaren, deien que viren entrar primer a cavall un cavaller blanc ab armes blanques; e açò deu esser nostra creença que fos sent Jordi, car en estòries trobam que en altres batalles l’han vist de crestians e de sarraïns moltes vegades” (And according to what the Saracens told us, they firstly saw a white knight enter on a horse with swords; and we believe that it was Saint Jordi, as in stories of other battles it is said that Christians and Saracens have seen him on many occasions) An inscription on a stone plaque in calle de Sant Miquel, near the Santa Margalida church , recalls the conquest of Ciutat (City). This gate was one of the access points to the city, which was closed by walls during the Islamic period. It stood standing until the early 20th century when the walls were demolished to allow the modern city to expand. More specifically, it was demolished in 1912, amidst great controversy. The Santa Margalida church, dating back to the 13th century and in the gothic style, stands near the old Porta de la Conquesta (Gate of the Conquest), which also takes the saint’s name. From 1231 onwards it was a convent church of Franciscan monks, until it passed to the Augustine monks in 1280 when their monastery was exclaustered due to Mendizábal’s confiscation in 1837. In what is now calle de Sant Miquel, formerly calle de la Síquia, the Saracens put up great resistance to the Catalan troops who advanced towards the nearby mosque, now the Sant Miquel parish church . Many civilians were killed and a cross was erected. As legend has it, late on the 31 December, in what is now the Sant Miquel church, the new Christian church was consecrated and the first mass was given inside the city. King James took the image of the Mare de Déu (Virgin Mary) that he had carried on his boat and placed it there, which was later known as Mare de Déu de la Salut (Our Lady of Health) due its healing reputation. The uncontrollable plundering of the Madina Mayurqa and violence against the defeated would continue for some days, the first days of 1230.
<urn:uuid:610ffebd-d85a-4c28-8c68-ed019cc9a15d>
CC-MAIN-2015-18
http://balearsculturaltour.net/rutacompleta.php?codcss=&id=17&idioma=en&pag=2
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246656168.61/warc/CC-MAIN-20150417045736-00225-ip-10-235-10-82.ec2.internal.warc.gz
en
0.925395
3,458
2.53125
3
This is a great talk on the use of statistics. Mona Chalabi is a data journalist, and here she outlines three ways of questioning statistics, based on her assessment that “the one way to make numbers more accurate is to have as many people as possible be able to question them.” The three questions she provides were, I thought, generally quite obvious; as a teacher of information literacy they echo quite substantially the sorts of questions I encourage my students to ask. But there were two points that she made that I thought were really important and relevant to EDC, especially algorithmic cultures. The first was about overstating certainty and how statistics can be used in a way that makes them describe situations as either black or white, with little middle ground. Sometimes this is a result of how they’re collected in the first place, and sometimes it’s how the statistics are communicated, and sometimes it’s in how they’re interpreted. I think this is one of the reasons that I’m hesitant about learning analytics; its innate tendency towards what can be quantified might lead to an overestimation of certainty, either in the way data about students is collected, communicated or interpreted. And, as we’ve seen, that data can become predictive, or a self-fulfilling prophecy. The second point that I thought was really interesting was how Mona was responding to this situation of certainty. She takes real data sets, and turns them into hand-drawn visualisations so that the imprecision, the uncertainty, can be revealed. She says, “so that people can see that a human did this, a human found the data and visualised it”. A human did this, and so we anticipate uncertainty. Inherent here is a mistrust in the ability of technology to replicate nuance and complexity, which I think is misguided. But there’s also an underlying assumption about statistics – that a computer is able to hide the imprecision in a way that humans cannot. That computer data visualisations are sleek, while human data visualisations are shaky. This is a fascinating conceptualisation of the relationship between humans and technology, of the ways in which both humans and technology can be used instrumentally to make up for the weaknesses of the other.
<urn:uuid:3344b4ba-22ab-425c-8653-d587c7208272>
CC-MAIN-2021-04
http://edc17.education.ed.ac.uk/hmurphy/2017/04/01/how-to-spot-a-bad-statistic/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703520883.15/warc/CC-MAIN-20210120120242-20210120150242-00646.warc.gz
en
0.972956
470
2.6875
3
Reviewed by the National Society of Genetic Counselors Down Syndrome Information Act Working Group, with assistance from the National Center for Prenatal and Postnatal Down Syndrome Resources and by the University of Nebraska Medical Center Munroe-Meyer Institute. Overview of Down Syndrome Down syndrome is a genetic condition and developmental disability that is usually caused by an extra copy of the twenty-first chromosome. According to current data about 250,000 people in the United States have Down syndrome. Studies show that about 1 in 800 babies are born with Down syndrome, and the chance of having a baby with the genetic condition increases with the age of the expectant mother. Down syndrome does not typically run in families and is not caused by anything either parent did or did not do. Advances in medical care and research over the years have given people with Down syndrome better overall health. The traits, medical conditions, and abilities of people with Down syndrome vary widely and cannot be predicted before they are born. They generally have mild to moderate cognitive delays, low muscle tone, and higher chances for a variety of other health issues over their lifespan. Because of advances in health care, education, and public attitudes, common perceptions and future opportunities for people with Down syndrome have improved significantly over the past few decades. Understanding Down Syndrome Children with Down syndrome are more similar to other children than they are different. Individuals with Down syndrome have a variable range of intellectual disability from mild to moderate (not typically severe). Babies with Down syndrome usually have developmental delays and benefit from early intervention, including physical, occupational, and speech therapy, to help them meet their milestones. 80% of babies with this condition have hypotonia or low muscle tone at birth. This usually improves with time, and physical therapy can help. 50% of babies with Down syndrome will have one or more health issues: 40–60% of babies with Down syndrome have a heart condition and 12% have a gastrointestinal condition, which may require surgery. The outcomes of these surgical repairs are very good. Referrals to specialists are appropriate for identified complications. Babies with Down syndrome also have higher chances for feeding and digestive issues, hearing loss, vision impairments, and respiratory infections. Most of these conditions can be treated with good health care. Currently, the average life expectancy for people with Down syndrome is about 60 years. Raising a child with Down syndrome is much like raising any other child; however, providing for their needs may involve more time than typical children from time to time. Individuals with developmental disabilities can participate in community sports, activities, and leagues provided they have medical clearance. Individualized education programs can help children with Down syndrome reach their potential. Special education services at school can range from inclusion in the typical classroom with extra help to small group instruction. There are also over 250 college programs for people with intellectual disabilities. Individuals can be employed competitively or with supports; live independently or in a group home; and have friends and intimate relationships. Health Care Practitioners A 501(c)3 not-for-profit organization serving Omaha and the state for over 20 yrs. A 501(c)3 not-for-profit organization serving Lincoln and the state for over 20 yrs. A 501(c)3 not-for-profit organization formed by advocates with over 20 years experience to promote inclusion and acceptance. A local support group based in Norfolk. A local support group based in Kearney.
<urn:uuid:38193b22-f4b0-4c68-8588-c61d60cad622>
CC-MAIN-2018-26
http://dhhs.ne.gov/publichealth/Pages/DownSyndrome.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861899.65/warc/CC-MAIN-20180619041206-20180619061206-00330.warc.gz
en
0.954704
710
4.15625
4
Videogame (2008). Maxis. Designed by Will Wright. Platforms: Mac, Win. The Panspermia theory formulated by the Nobel Prize-winning scientist Svante Arrhenius hypothesizes that life is spread throughout the universe by drifting seeds, or spores. The game of Spore begins with a single cell, deposited in the ocean of an unknown planet by a convenient meteor; the player's goal is to evolve this organism into an intelligent species capable of building a starfaring civilization. Gameplay is divided into five distinct phases, beginning with a two-dimensional subgame in which the player must survive in the primordial soup, eating and avoiding being eaten. Food can be either other creatures or vegetable matter, depending on whether the player has chosen to adopt a herbivorous or carnivorous nature. The process of evolution is mimicked by the acquisition of body parts which can be combined with the creature's existing form, using a remarkably sophisticated and powerful software tool. At the end of this phase, the player's creation emerges from the oceans and moves on to dry land. Here it participates in a similar three-dimensional subgame in which it can either prey on others or attempt to ally with them, with the eventual goal of evolving a brain. Once this stage is complete, the physical form of the species is fixed, and it moves through phases representing tribal and technological civilizations, both of which resemble simple three-dimensional Real Time Strategy games. Again, it is possible to either cooperate with other cultures (the herbivore's approach) or conquer them (the carnivore's preference). These phases end with the (peaceful or otherwise) unification of the entire planet under the aegis of the player's civilization. The fifth, and final, stage of the game (for which Walter Jon Williams wrote the dialogue) is by far the most flexible and open ended, recalling Spore's working title of "SimEverything". In this phase the player can roam the galaxy in their own spacecraft, Terraforming and colonizing other planets, engaging in conflict or diplomacy with alien civilizations, and involving themselves in the development of primitive species (see Uplift). The design draws on both space exploration games (see Space Sim) and God Games, in a universe which has been modelled with considerable attention to detail. The overall effect of the gameplay is remarkably charming. The player created species are consistently appealing, with a "phenotype" of elegant and amusing animations generated automatically from the "genotype" supplied by the player's decisions in the creation tool. While the central themes of the game are evolution and social development, they are approached in a manner reminiscent of a children's cartoon; the biology is poetically rather than scientifically accurate. New physical characteristics are either found or taken from other creatures and then passed on to offspring, a model which only vaguely resembles the Darwinian theory of evolution. Spore is also notable for its status as the first "massively single player online game". Unlike Massively Multiplayer Online Games, only one player at a time participates directly in the game. However, each player's experience is informed by the others' actions. The various species created by Spore's users, and the behavioural patterns demonstrated by them during play, are distributed across the internet and appear in the worlds inhabited and visited by each participant. Considerable effort has been devoted to supplying players with powerful tools that make constructing their own creatures, buildings and vehicles as easy as possible, employing the collective creativity of huge numbers of individuals to populate the game's simulated universe. Structurally, Spore is perhaps best described as a God Game in which the player moulds the physical and social evolution of an entire species. It is, however, not a flawless work. While the first stage is well crafted and the last is an excellently designed, highly involving experience, the intermediate phases can become repetitive. A potentially more fundamental problem is the limited degree to which the player's actions in earlier phases affect their creations in later ones. With the exception of the basic approach taken to other creatures – peaceful or aggressive – acquired characteristics are generally only important in the stage after which they were gained. The physical form of the species, for example, has little impact on the final phase. Regardless, the creatures are clearly the stars of the show. The true goal of Spore is not, perhaps, to progress through the phases, but simply to experience the joy of shared creation. Related works: Spore Creature Creator (2008 Maxis, Mac, Win) designed by Will Wright is a standalone version of the tools used to build species in Spore, released before the main game. Spore: Creepy & Cute Parts Pack (2008 Maxis, Mac, Win) is an expansion pack for the original game which supplies new components from which species can be constructed. Spore: Galactic Adventures (2009 Maxis, Mac, Win) is another expansion pack, one which adds additional complexity to the play of the game's fifth (and final) phase. Notably, players are able to create their own missions and share them with other participants on the internet, similarly to the way in which new creatures are distributed in the original work. Many associated works have also been created, some of which appear to have little in common with their original beyond a desire to take advantage of its marketing budget. Spore Creatures (2008 Foundation 9, NDS) is a Console Role Playing Game (see Computer Role Playing Games) in which the player adopts the role of a creature kidnapped from their home planet and transported to a hostile world, an action which players of Spore can perform in the fifth stage of the game. Spore Origins (2008 Barbaroga / Tricky Software, iOS, Phone; 2009 WinPhone; 2010 Android) is an extended version of the first (two-dimensional) phase of Spore. Spore Islands (2009 Max / Area Code Entertainment, Social) is a much simplified version of the original game in which every participant controls a single Island, but every island is inhabited by species created by multiple players. Spore Hero (2009 Electronic Arts, Wii) is similar to Spore Creatures, but distinguished by the presence of a computer-controlled opponent which must be defeated. Spore Hero Arena (2009 Maxis, NDS) is a more combat-oriented variant of Spore Hero; its gameplay seems more suggestive of that of the Pokémon series of monster fighting games than that of the original Spore. Darkspore (2011 Maxis, Win) is an "action RPG" (see Computer Role Playing Games) in which participants form teams of creatures with which to play through a linear story of galactic war against the eponymous Hive Mind (see Interactive Narrative); reviews were mixed. [NT] Previous versions of this entry
<urn:uuid:262b26e7-35a5-44a8-b230-6ac7024a2edd>
CC-MAIN-2018-39
http://www.sf-encyclopedia.com/entry/spore
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160853.60/warc/CC-MAIN-20180925004528-20180925024928-00158.warc.gz
en
0.959223
1,381
2.53125
3
Cap and Trade Dictionary additionality – a concept that states, if carbon emissions were being reduced by a source before cap and trade legislation, then the source should not be given offset revenues once the system is implemented. In short, offset revenues should be used only to reward projects that truly need them. There is debate as to how to best implement the additionality concept. best management practices– Best Management Practices (BMPs) support conservation goals like protecting against soil loss and keeping nutrient’s from leaving the farm. When done right, BMPs can improve the environment while also improving the farmer’s bottom line. Our BMP Challenge supports farmers ability to implement conservation practices in a risk-free environment. biofuel production – a method for agriculture to reduce greenhouse gas emissions. Biofuels are fuels made from biological material, the most common of which is plants. Farmers can grow crops that are then transferred to refineries for fuel production. cap-and-trade systems (in regards to greenhouse gas) – a system in which a governing entity “caps” the total amount of greenhouse gases that can be emitted within their jurisdiction. Industries and other groups operating under the cap are then supplied with emission credits that permit them to emit a specified amount of greenhouse gas; the entirety of the allowances does not exceed the cap, maintaining the overall emission level. Sources then buy and sell credits from one another, depending on each one’s ability to reduce greenhouse gas emissions. In short, the buyer is being charged for polluting and the seller is rewarded for emission reductions. carbon – “Carbon dioxide (CO2) is emitted in a number of ways. It is emitted naturally through the carbon cycle and through human activities like the burning of fossil fuels. Natural sources of CO2 occur within the carbon cycle where billions of tons of atmospheric CO2 are removed from the atmosphere by oceans and growing plants, also known as ‘sinks,’ and are emitted back into the atmosphere annually through natural processes also known as ‘sources.’ When in balance, the total carbon dioxide emissions and removals from the entire carbon cycle are roughly equal. Since the Industrial Revolution in the 1700’s, human activities, such as the burning of oil, coal and gas, and deforestation, have increased CO2 concentrations in the atmosphere. In 2005, global atmospheric concentrations of CO2 were 35% higher than they were before the Industrial Revolution.” carbon leakage – refers to an increase in carbon dioxide emissions in one area, as a result of more stringent carbon reduction policy in another; as a result, no net carbon reductions are gained. For instance, if the United States passes strict climate change legislation and China does not, there is fear that the heavy greenhouse gas emitting sources will merely ‘leak’ to China. carbon sequestration – an approach of greenhouse gas mitigation in which gasses are captured from point source emitters and sequestered underground and out of the atmosphere. carbon tax – tax on carbon or other greenhouse gas emissions. The intention is to drive up the monetary cost of greenhouse gas emissions, in order to steer sources towards greater efficiency or more environmentally friendly substitutes. There is a debate between proponents of a cap and trade system and a carbon tax, as to which is the best method for reducing greenhouse gases on a national and global scale. conservation tillage – a method of growing crops in which plant residue is left on the top of the soil rather than being plowed off or into the soil. Conservation tillage augments soil health and productivity by increasing organic matter in the soil. early actor – those who have already taken steps to reduce their greenhouse gas emissions despite the absence of national climate change legislation. efficient use of fertilizers and manures – a method for agriculture to reduce greenhouse gas emissions. Fertilizers require a fossil fuel intensive manufacturing process; manure releases methane. A more efficient use of both these agriculture inputs can reduce greenhouse gas emissions at a relatively low cost. emission allowances - the designated amount of pollutants that a source may emit under a cap and trade system. There is debate regarding the best method to allocate emissions allowances. greenhouse gas (GHG) – any gasses that entrap heat in the earth’s atmosphere. Some of these occur naturally in the atmosphere, some are generated only through human activities and some are a result of both. The most common forms of human generated GHG are: Carbon Dioxide, Methane, Nitrous Oxide and Flourinated Gases. The EPA has recently proposed a rule that necessitates yearly GHG emission reports from large point source emitters. greenhouse gas offsets – a financial instrument that symbolizes a decrease in greenhouse gas emissions. Participants can compensate for their greenhouse gas emissions by purchasing greenhouse gas offsets. Greenhouse gas offsets exist in both compliant and voluntary markets. Under a cap and trade system, greenhouse gas offsets can help bring down the cost of lowering net greenhouse gas emissions. methane – “Methane (CH4) is a greenhouse gas that remains in the atmosphere for approximately 9-15 years. Methane is over 20 times more effective in trapping heat in the atmosphere than carbon dioxide (CO2) over a 100-year period and is emitted from a variety of natural and human-influenced sources. Human-influenced sources include landfills, natural gas and petroleum systems, agricultural activities, coal mining, stationary and mobile combustion, wastewater treatment, and certain industrial process.” measurement - Most forestry and agriculture sinks are not clearly defined yet. More research can help formulate metrics that assess the benefits of sequestration in these areas. methane digester – technology that burns waste methane produced in animals’ guts and uses the heat to power a generator. Digesters could help meet electricity needs while destroying methane. Moreover, extra power can be resold to electricity grids, helping to improve the economic stability of farmers. nitrous oxide – “Nitrous oxide (N2O) is produced by both natural and human-related sources. Primary human-related sources of N2O are agricultural soil management, animal manure management, sewage treatment, mobile and stationary combustion of fossil fuel, adipic acid production, and nitric acid production. Nitrous oxide is also produced naturally from a wide variety of biological sources in soil and water, particularly microbial action in wet tropical forests.” non-point source emitters – pollution that cannot be traced to any specific source, such as agriculture or urban runoff into watersheds. permanence – the ability of a project to permanently remove carbon from the atmosphere. point source emitters – individual, identifiable sources of pollution, such as a coal factory. renewable fuels – fuels produced from inexhaustible resources such as the wind and the sun. Return to the Farmers Fight Climate Change Tutorial
<urn:uuid:87c1ccb2-55c6-4751-9d8f-9aab18b08f1b>
CC-MAIN-2014-52
http://www.farmland.org/programs/environment/climate-change/cap-and-trade-dictionary.asp
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768636.90/warc/CC-MAIN-20141217075248-00043-ip-10-231-17-201.ec2.internal.warc.gz
en
0.932374
1,416
3.765625
4
Gilia clivorum facts for kids Quick facts for kidsGilia clivorum This common wildflower bears a number of erect stems reaching 6 to 30 centimeters in maximum height. It is leafy especially on the lower part of the stems, with each leaf divided into small lance-shaped leaflets. The inflorescence contains one to five hairy, glandular flowers each less than a centimeter long. The lobes of the corolla are very light to deep purple or blue, and the throat of the flower is lighter in color with dark purple and yellow spots. The fruit is a small capsule containing many seeds. Gilia clivorum Facts for Kids. Kiddle Encyclopedia.
<urn:uuid:e2b093e7-b837-499c-90da-ab02d04eecab>
CC-MAIN-2023-06
https://kids.kiddle.co/Gilia_clivorum
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.16/warc/CC-MAIN-20230203055519-20230203085519-00315.warc.gz
en
0.890077
174
3.359375
3
With new studies showing a connection between low literacy levels and high risks for poverty, one local organization is hoping to raise both money and awareness. Pediatrician Heather Michalak discussed the importance of reading on the brain development of young children Friday during the Kiwanis Club of Columbia luncheon at the Memorial Building. The discussion was part of the club’s involvement with the Imagination Library, a program that provides free books for children under the age of 5. In addition, Kiwanis hosts an annual yard sale that raises money for the literacy program. Michalak, who works at Columbia Pediatric Clinic, said a child’s brain sees some of its most rapid development from two weeks after conception to 3-months-old. With reading integrally linked to brain development, Michalak said children who are not read to do not have as many advantages as their peers. She said up to two-thirds of children who are not reading at their grade level by fourth-grade end up in jail or on welfare at some point in their lives. “There is a cycle that is very dangerous to our society and very expensive to our society,” Michalak said. “We want our kids to be as successful at school, because success at school translates into success in life. Education is the key to breaking the cycle of poverty.” Recent studies have also found that reading to children at younger ages meet key brain development benchmarks, Michalak said. While most Head Start programs target children ages 4 or 5, Michalak said recent studies have shown children start developing skills — like learning the letters of the alphabet — much earlier. By age 4 or 5, Michalak said children may find it more difficult to learn these literacy skills. “The earlier and more children are read to, the more positive effects they experience,” she said. “Head Start programs only start during the tail end of development, so we need to start looking to programs that work with these children even earlier.” Michalak said reading to children also provides them with necessary nurturing from their caretakers and a feeling of self-worth. She said reading reduces time spent in front of an electronic screen, which some researchers believe can be harmful to children under the age of 3. Michalak said her best advice to all parents is to “keep reading and keep giving (children) books.”
<urn:uuid:b8a7356f-ee52-4778-a57f-b62c90c460e5>
CC-MAIN-2014-10
http://columbiadailyherald.com/news/local-news/doctor-start-reading-children-early
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654272/warc/CC-MAIN-20140305060734-00051-ip-10-183-142-35.ec2.internal.warc.gz
en
0.968716
505
2.953125
3